query
stringlengths
7
3.85k
document
stringlengths
11
430k
metadata
dict
negatives
sequencelengths
0
101
negative_scores
sequencelengths
0
101
document_score
stringlengths
3
10
document_rank
stringclasses
102 values
GetRole returns the Role field value if set, zero value otherwise.
func (o *AccessRequestData) GetRole() string { if o == nil || o.Role == nil { var ret string return ret } return *o.Role }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (m *Membership) GetRole() string {\n\tif m == nil || m.Role == nil {\n\t\treturn \"\"\n\t}\n\treturn *m.Role\n}", "func (o *Content) GetRole() string {\n\tif o == nil || o.Role == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Role\n}", "func (o *MemberResponse) GetRole() string {\n\tif o == nil || o.Role == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Role\n}", "func (robot Robot) GetRole() string {\n\treturn robot.role\n}", "func (o *StorageVdMemberEpAllOf) GetRole() string {\n\tif o == nil || o.Role == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Role\n}", "func (nr NodeRecord) GetRole() (insolar.StaticRole, error) {\n\treturn nr.Record.Role, nil\n}", "func (u *User) GetRole() Role {\n\treturn u.role\n}", "func (x *Acl) GetRole() Acl_Role {\n\tif x != nil {\n\t\treturn x.Role\n\t}\n\treturn Acl_READER\n}", "func (n *Node) GetRole() string {\n\tswitch n.Role {\n\tcase RedisMasterRole:\n\t\treturn RedisMasterRole\n\tcase RedisSlaveRole:\n\t\treturn RedisSlaveRole\n\tdefault:\n\t\tif n.MasterReferent != \"\" {\n\t\t\treturn RedisSlaveRole\n\t\t}\n\t\tif len(n.Slots) > 0 {\n\t\t\treturn RedisMasterRole\n\t\t}\n\t}\n\n\treturn \"none\"\n}", "func (s *RaftServer) GetRole() Role {\n\treturn s.role\n}", "func GetRole(c *gin.Context) {\n\tid, _ := strconv.Atoi(c.Param(\"id\"))\n\tresult := service.GetRole(uint8(id))\n\n\tif result.ID == 0 {\n\t\tc.JSON(404, nil)\n\t} else {\n\t\tc.JSON(200, result)\n\t}\n}", "func (gomd *Govasmd) GetRole(uuid string) (string, error) {\n\tdoc := etree.NewDocument()\n\tcmd := doc.CreateElement(\"get_roles\")\n\tcmd.CreateAttr(\"role_id\", uuid)\n\treturn gomd.sendXmlCommand(doc)\n}", "func (i *Invitation) GetRole() string {\n\tif i == nil || i.Role == nil {\n\t\treturn \"\"\n\t}\n\treturn *i.Role\n}", "func (o *RoleMapping) GetRole() RoleType {\n\tif o == nil {\n\t\tvar ret RoleType\n\t\treturn ret\n\t}\n\n\treturn o.Role\n}", "func (o *UserDisco) GetRole() UserRoleEnum {\n\tif o == nil || o.Role == nil {\n\t\tvar ret UserRoleEnum\n\t\treturn ret\n\t}\n\treturn *o.Role\n}", "func (s *Server) GetRole(ctx context.Context, params *authorization.ID) (*authorization.Role, error) {\n\treturn &authorization.Role{}, nil\n}", "func (o *InlineObject72) GetRole() ProjectsIdRolesJsonRole {\n\tif o == nil || o.Role == nil {\n\t\tvar ret ProjectsIdRolesJsonRole\n\t\treturn ret\n\t}\n\treturn *o.Role\n}", "func (s *MemStore) GetRole(k string) common.Role {\n\treturn s.did[k]\n}", "func (a *Config) GetRole(c echo.Context) string {\n\treqToken := c.Request().Header.Get(\"Authorization\")\n\tsplitToken := strings.Split(reqToken, \"Bearer\")\n\tif len(splitToken) != 2 {\n\t\treturn \"\"\n\t}\n\treqToken = strings.TrimSpace(splitToken[1])\n\treturn a.Source.GetRoleByToken(reqToken)\n}", "func (m *LaunchPlanSpec) GetRole() string {\n\tif m != nil {\n\t\treturn m.Role\n\t}\n\treturn \"\"\n}", "func (store *Store) GetRole(name string) (*graylog.Role, error) {\n\tstore.imutex.RLock()\n\tdefer store.imutex.RUnlock()\n\ts, ok := store.roles[name]\n\tif ok {\n\t\treturn &s, nil\n\t}\n\treturn nil, nil\n}", "func (u *Role) Get(db *gorm.DB, roleid string) (*schemago.RespRole, error) {\n\tvar role = new(schemago.SRole)\n\tvar rolemenu = new(schemago.SRoleMenus)\n\tif err := db.Where(\"recid = ?\", roleid).Find(&role).Error; err != nil {\n\t\treturn nil, err\n\t}\n\tif err := db.Where(\"roleId = ?\", roleid).Find(&rolemenu).Error; err != nil {\n\t\treturn nil, err\n\t}\n\tresprole := role.ToRespondRole()\n\tresprole.Menus = rolemenu.ToRespondRoleMenus()\n\treturn resprole, nil\n}", "func (bn *BootstrapNode) GetRole() insolar.StaticRole {\n\treturn insolar.GetStaticRoleFromString(bn.NodeRole)\n}", "func (i *Identity) Role() org.RoleType {\n\treturn i.OrgRoles[i.OrgID]\n}", "func (c *ConfigurationFile) GetRole() string {\n\treturn c.CurrentRole\n}", "func (m *UserMutation) Role() (r int, exists bool) {\n\tv := m.role\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (x Identity) Role() Role {\n\tif len(x.Roles) == 0 {\n\t\treturn RoleAnonymous\n\t} else {\n\t\treturn x.Roles[0]\n\t}\n}", "func (n *Node) Role() string {\n\t// use the cached version populated by NewNode\n\treturn n.role\n}", "func (r *RoleRead) GetRoleID() uint64 {\n\treturn r.RoleID\n}", "func GetRole(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *RoleState, opts ...pulumi.ResourceOption) (*Role, error) {\n\tvar resource Role\n\terr := ctx.ReadResource(\"alicloud:ram/role:Role\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (m *RoleMutation) Role() (r string, exists bool) {\n\tv := m._Role\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (m *VpnConfiguration) GetRole()(*string) {\n val, err := m.GetBackingStore().Get(\"role\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "func GetRole(db *sql.DB, email string) (int, string, error) {\n\tvar role string\n\tvar id int\n\trow := db.QueryRow(\"select id,role from users where email=$1;\", strings.TrimSpace(email))\n\terr := row.Scan(&id, &role)\n\treturn id, role, err\n}", "func GetRole(client *gophercloud.ServiceClient, id string, roleID string) (r GetRoleResult) {\n\tresp, err := client.Get(getRoleURL(client, id, roleID), &r.Body, nil)\n\t_, r.Header, r.Err = gophercloud.ParseResponse(resp, err)\n\treturn\n}", "func (c *CreateOrgInvitationOptions) GetRole() string {\n\tif c == nil || c.Role == nil {\n\t\treturn \"\"\n\t}\n\treturn *c.Role\n}", "func (client *Client) GetRole(name string) (*graylog.Role, *ErrorInfo, error) {\n\treturn client.GetRoleContext(context.Background(), name)\n}", "func (r *RoleUnarchive) GetRoleID() uint64 {\n\treturn r.RoleID\n}", "func (ref *UIElement) Role() string {\n\tret, _ := ref.StringAttr(RoleAttribute)\n\treturn ret\n}", "func (r *RoleTriggerScript) GetRoleID() uint64 {\n\treturn r.RoleID\n}", "func (u User) GetRole(id string) (User, error) {\n\tdb := mysql.DB\n\tvar user User\n\tstmt, err := db.Prepare(\"SELECT role FROM users WHERE id = ?\")\n\tif err != nil {\n\t\treturn user, err\n\t}\n\tdefer stmt.Close()\n\n\terr = stmt.QueryRow(id).Scan(&user.Role)\n\tif err != nil {\n\t\treturn user, err\n\t}\n\n\treturn user, nil\n\n}", "func (r *RoleMerge) GetRoleID() uint64 {\n\treturn r.RoleID\n}", "func GetRole(tstCtx diagnostics.TestContext, id string) (*RoleInfo, error) {\n\troleInfo := RoleInfo{}\n\terr := MustJSONDecodeSuccess(tstCtx.DoLBRequest(\n\t\tfmt.Sprintf(\"/apis/iam/v2/roles/%s\", id),\n\t)).WithValue(&roleInfo)\n\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Could not fetch role\")\n\t}\n\treturn &roleInfo, nil\n}", "func (e *ClusterElector) Role() Role {\n\tif (e.state & stateLeaderBootStrapping) != 0 {\n\t\treturn RoleUnstable\n\t}\n\treturn e.role\n}", "func (db *MySQLDB) GetUserRole(ctx context.Context, user *User, role *Role) (*UserRole, error) {\n\tfLog := mysqlLog.WithField(\"func\", \"GetUserRole\").WithField(\"RequestID\", ctx.Value(constants.RequestID))\n\tq := \"SELECT COUNT(*) CNT FROM HANSIP_USER_ROLE WHERE USER_REC_ID=? AND ROLE_REC_ID=?\"\n\trow := db.instance.QueryRowContext(ctx, q, user.RecID, role.RecID)\n\tcount := 0\n\terr := row.Scan(&count)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn nil, nil\n\t\t}\n\t\tfLog.Errorf(\"db.instance.QueryRowContext got %s\", err.Error())\n\t\treturn nil, &ErrDBScanError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error GetUserRole\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tif count == 0 {\n\t\treturn nil, &ErrDBNoResult{\n\t\t\tMessage: fmt.Sprintf(\"role %s is not owned by user %s\", role.RoleName, user.Email),\n\t\t\tSQL: q,\n\t\t}\n\t}\n\treturn &UserRole{\n\t\tUserRecID: user.RecID,\n\t\tRoleRecID: role.RecID,\n\t}, nil\n}", "func (a *Client) GetRole(params *GetRoleParams) (*GetRoleOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewGetRoleParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"getRole\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/AccountService/Roles/{identifier}\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &GetRoleReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*GetRoleOK), nil\n\n}", "func (s Service) GetRole(ctx context.Context, docID, roleID []byte) (*coredocumentpb.Role, error) {\n\treturn s.pendingDocSrv.GetRole(ctx, docID, roleID)\n}", "func (r *RoleUpdate) GetRoleID() uint64 {\n\treturn r.RoleID\n}", "func (o *Content) GetRoleOk() (*string, bool) {\n\tif o == nil || o.Role == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Role, true\n}", "func (element *Element) Role(value string) *Element {\n\treturn element.Attr(\"role\", value)\n}", "func (roles *RoleProvider) Get(name string) (*idam.Role, error) {\n\troles.lock.RLock()\n\tdefer roles.lock.RUnlock()\n\n\tr, ok := roles.getRole(name)\n\tif !ok {\n\t\treturn nil, idam.ErrUnknownRole\n\t}\n\n\treturn copyRole(r), nil\n}", "func (m NoPartyIDs) GetPartyRole() (v enum.PartyRole, err quickfix.MessageRejectError) {\n\tvar f field.PartyRoleField\n\tif err = m.Get(&f); err == nil {\n\t\tv = f.Value()\n\t}\n\treturn\n}", "func (auth *Authenticator) GetRole(name string) (Role, error) {\n\tprinc, err := auth.getPrincipal(docIDForRole(name), func() Principal { return &roleImpl{} })\n\trole, _ := princ.(Role)\n\treturn role, err\n}", "func (o ServiceIamMemberOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ServiceIamMember) pulumi.StringOutput { return v.Role }).(pulumi.StringOutput)\n}", "func GetRole(c *gin.Context) {\n\tlogrus.Info(\"\\n\\n-------Get one role in scanner--------\")\n\tuuid := c.Param(\"role_id\")\n\tlogrus.Info(\"Role's UUID: \", uuid)\n\tgovas := AuthConnection(c)\n\trespond, err := govas.GetRole(uuid)\n\tif err != nil {\n\t\trespond = CreatJsonErro(\"Error in server\")\n\t} else {\n\t\t//_, err = fmt.Fprint(w, respond)\n\t\tif err != nil {\n\t\t\tlogrus.Error(\"Get role fail: \", err)\n\t\t} else {\n\t\t\tlogrus.Info(\"Get role success\")\n\t\t}\n\t}\n\tgovas.Disconnect()\n\tc.Data(http.StatusOK, \"application/json; charset=utf-8\", []byte(respond))\n}", "func (r *RoleMemberList) GetRoleID() uint64 {\n\treturn r.RoleID\n}", "func (e *Election) Role() role.Role {\n\treturn e.role\n}", "func (r *RoleArchive) GetRoleID() uint64 {\n\treturn r.RoleID\n}", "func (o *RoleMapping) GetRoleOk() (*RoleType, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Role, true\n}", "func (o *AccessRequestData) GetRoleOk() (*string, bool) {\n\tif o == nil || o.Role == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Role, true\n}", "func (r *RoleUndelete) GetRoleID() uint64 {\n\treturn r.RoleID\n}", "func (o *StorageVdMemberEpAllOf) GetRoleOk() (*string, bool) {\n\tif o == nil || o.Role == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Role, true\n}", "func (r *RoleMemberAdd) GetRoleID() uint64 {\n\treturn r.RoleID\n}", "func TestGetSetRole(t *testing.T) {\n\troleTest1, _ := roleFactory.GetRole(1)\n\troleTest2, _ := roleFactory.GetRole(2)\n\troleTest3, _ := roleFactory.GetRole(3)\n\n\texampleUser := NewUser()\n\tfmt.Println(exampleUser.GetRoleValue())\n\n\texampleUser.SetRole(roleTest1)\n\tfmt.Println(exampleUser.GetRoleValue())\n\n\texampleUser.SetRole(roleTest2)\n\tfmt.Println(exampleUser.GetRoleValue())\n\n\texampleUser.SetRole(roleTest3)\n\tfmt.Println(exampleUser.GetRoleValue())\n}", "func (a *Authorizer) GetRole(name string) Role {\n\ta.RLock()\n\tr := a.roles[name]\n\ta.RUnlock()\n\treturn r\n}", "func (o *AuthNMappingUpdateRelationships) GetRole() RelationshipToRole {\n\tif o == nil || o.Role == nil {\n\t\tvar ret RelationshipToRole\n\t\treturn ret\n\t}\n\treturn *o.Role\n}", "func (o *InlineObject72) GetRoleOk() (*ProjectsIdRolesJsonRole, bool) {\n\tif o == nil || o.Role == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Role, true\n}", "func (o BucketReplicationConfigurationPtrOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *BucketReplicationConfiguration) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Role\n\t}).(pulumi.StringPtrOutput)\n}", "func (_TellorMesosphere *TellorMesosphereCaller) GetRoleMember(opts *bind.CallOpts, role [32]byte, index *big.Int) (common.Address, error) {\n\tvar out []interface{}\n\terr := _TellorMesosphere.contract.Call(opts, &out, \"getRoleMember\", role, index)\n\n\tif err != nil {\n\t\treturn *new(common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\n\treturn out0, err\n\n}", "func (m *MachineScope) Role() string {\n\tif util.IsControlPlaneMachine(m.Machine) {\n\t\treturn infrav1.ControlPlane\n\t}\n\treturn infrav1.Node\n}", "func (o DataExchangeListingIamBindingOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *DataExchangeListingIamBinding) pulumi.StringOutput { return v.Role }).(pulumi.StringOutput)\n}", "func (o ClientTlsPolicyIamBindingOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ClientTlsPolicyIamBinding) pulumi.StringOutput { return v.Role }).(pulumi.StringOutput)\n}", "func (aaa *RolesService) GetRole(input *roles.GetRoleParams) (*iamclientmodels.ModelRoleResponse, error) {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tok, unauthorized, forbidden, notFound, err := aaa.Client.Roles.GetRole(input, client.BearerToken(*token.AccessToken))\n\tif unauthorized != nil {\n\t\treturn nil, unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn nil, forbidden\n\t}\n\tif notFound != nil {\n\t\treturn nil, notFound\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ok.GetPayload(), nil\n}", "func (r *RoleMove) GetRoleID() uint64 {\n\treturn r.RoleID\n}", "func (o BucketAccessControlTypeOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v BucketAccessControlType) *string { return v.Role }).(pulumi.StringPtrOutput)\n}", "func (c *configuration) Role(clientSet ClientSet) *Role {\n\tif clientSet != nil {\n\t\treturn NewRole(clientSet)\n\t}\n\treturn nil\n\n}", "func (o DatasetAccessTypeOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v DatasetAccessType) *string { return v.Role }).(pulumi.StringPtrOutput)\n}", "func GetRole(iamc aws.IAMAPI, roleName *string) (*Role, error) {\n\tout, err := iamc.GetRole(&iam.GetRoleInput{\n\t\tRoleName: roleName,\n\t})\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\toutRole := Role{\n\t\tArn: out.Role.Arn,\n\t\tTags: map[string]*string{},\n\t}\n\n\tif out.Role.Tags != nil {\n\t\tfor _, tag := range out.Role.Tags {\n\t\t\tif tag.Key == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\toutRole.Tags[*tag.Key] = tag.Value\n\t\t}\n\t}\n\n\treturn &outRole, nil\n}", "func (a ScalewayDomainV2alpha2ContactRoles_Roles) Get(fieldName string) (value interface{}, found bool) {\n\tif a.AdditionalProperties != nil {\n\t\tvalue, found = a.AdditionalProperties[fieldName]\n\t}\n\treturn\n}", "func (_AccessControl *AccessControlCaller) GetRoleMember(opts *bind.CallOpts, role [32]byte, index *big.Int) (common.Address, error) {\n\tvar out []interface{}\n\terr := _AccessControl.contract.Call(opts, &out, \"getRoleMember\", role, index)\n\n\tif err != nil {\n\t\treturn *new(common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\n\treturn out0, err\n\n}", "func (_TellorMesosphere *TellorMesosphereCaller) GetRoleAdmin(opts *bind.CallOpts, role [32]byte) ([32]byte, error) {\n\tvar out []interface{}\n\terr := _TellorMesosphere.contract.Call(opts, &out, \"getRoleAdmin\", role)\n\n\tif err != nil {\n\t\treturn *new([32]byte), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new([32]byte)).(*[32]byte)\n\n\treturn out0, err\n\n}", "func (_TellorMesosphere *TellorMesosphereSession) GetRoleMember(role [32]byte, index *big.Int) (common.Address, error) {\n\treturn _TellorMesosphere.Contract.GetRoleMember(&_TellorMesosphere.CallOpts, role, index)\n}", "func (_TellorMesosphere *TellorMesosphereCallerSession) GetRoleMember(role [32]byte, index *big.Int) (common.Address, error) {\n\treturn _TellorMesosphere.Contract.GetRoleMember(&_TellorMesosphere.CallOpts, role, index)\n}", "func (r *roles)getRole(roleName string) (*role, error) {\n\tif role, ok := r.rolesMap[roleName]; ok {\n\t\treturn role, nil\n\t}\n\treturn nil, errors.New(\"no such role:\" + roleName)\n}", "func (o *UserDisco) GetRoleOk() (*UserRoleEnum, bool) {\n\tif o == nil || o.Role == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Role, true\n}", "func (c *Config) Role() int {\n\trole := c.Get(\"role\", \"follower\")\n\tswitch role {\n\tcase \"follower\":\n\t\treturn FOLLOWER\n\tcase \"leader\":\n\t\treturn LEADER\n\tdefault:\n\t\tlog.Panic(\"Invalid role: %s.\", role)\n\t}\n\treturn LEADER\n}", "func (o ObjectAccessControlResponseOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ObjectAccessControlResponse) string { return v.Role }).(pulumi.StringOutput)\n}", "func (guild *Guild) GetRoleID(r string) (string, error) {\n\tfor _, role := range guild.Guild.Roles {\n\t\tif strings.ToLower(role.Name) == strings.ToLower(r) {\n\t\t\treturn role.ID, nil\n\t\t}\n\t}\n\n\treturn \"\", &botError{ERR_MISSING_ROLE, r}\n}", "func (r *RoleDelete) GetRoleID() uint64 {\n\treturn r.RoleID\n}", "func (o ObjectAccessControlTypeOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ObjectAccessControlType) *string { return v.Role }).(pulumi.StringPtrOutput)\n}", "func (cs *CachingAuthClient) GetRole(name string) (services.Role, error) {\n\tcs.try(func() error {\n\t\troles, err := cs.ap.GetRoles()\n\t\tif err == nil {\n\t\t\tcs.Lock()\n\t\t\tdefer cs.Unlock()\n\t\t\tcs.roles = roles\n\t\t}\n\t\treturn err\n\t})\n\tcs.RLock()\n\tdefer cs.RUnlock()\n\tfor i := range cs.roles {\n\t\tif cs.roles[i].GetName() == name {\n\t\t\treturn cs.roles[i], nil\n\t\t}\n\t}\n\treturn nil, trace.NotFound(\"role %v is not found\", name)\n}", "func (o BucketReplicationConfigOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *BucketReplicationConfig) pulumi.StringOutput { return v.Role }).(pulumi.StringOutput)\n}", "func RoleGetByID(id int) *models.Role {\n\tvar role models.Role\n\n\tbootstrap.Db().First(&role, id)\n\n\treturn &role\n}", "func (_Distributor *DistributorCaller) GetRoleMember(opts *bind.CallOpts, role [32]byte, index *big.Int) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _Distributor.contract.Call(opts, out, \"getRoleMember\", role, index)\n\treturn *ret0, err\n}", "func (o BucketAccessControlResponseOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BucketAccessControlResponse) string { return v.Role }).(pulumi.StringOutput)\n}", "func (_TellorMesosphere *TellorMesosphereSession) GetRoleAdmin(role [32]byte) ([32]byte, error) {\n\treturn _TellorMesosphere.Contract.GetRoleAdmin(&_TellorMesosphere.CallOpts, role)\n}", "func (o TriggerOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Trigger) pulumi.StringPtrOutput { return v.Role }).(pulumi.StringPtrOutput)\n}", "func (o *MemberResponse) GetRoleOk() (*string, bool) {\n\tif o == nil || o.Role == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Role, true\n}", "func (_DelegationController *DelegationControllerCaller) GetRoleMember(opts *bind.CallOpts, role [32]byte, index *big.Int) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _DelegationController.contract.Call(opts, out, \"getRoleMember\", role, index)\n\treturn *ret0, err\n}", "func (o BucketReplicationConfigurationOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BucketReplicationConfiguration) string { return v.Role }).(pulumi.StringOutput)\n}", "func (r *RoleMemberRemove) GetRoleID() uint64 {\n\treturn r.RoleID\n}" ]
[ "0.7699163", "0.74284345", "0.73174334", "0.7315947", "0.73132426", "0.7311263", "0.73038447", "0.7296618", "0.72799486", "0.725389", "0.7199151", "0.7020626", "0.7019671", "0.70188147", "0.6957171", "0.6952969", "0.6925363", "0.68734515", "0.6863754", "0.68605274", "0.6836734", "0.6797832", "0.6778532", "0.6708969", "0.6683379", "0.6658968", "0.6635736", "0.6632718", "0.6620751", "0.66112936", "0.66086197", "0.65985817", "0.6564305", "0.65467346", "0.6540409", "0.65238005", "0.6478641", "0.6476768", "0.6455942", "0.6451483", "0.64478815", "0.6439621", "0.6434968", "0.6434147", "0.6429928", "0.6429313", "0.63810575", "0.6376199", "0.63755", "0.63382256", "0.6332067", "0.6328871", "0.6326912", "0.63182926", "0.6308129", "0.6307171", "0.6302166", "0.630122", "0.62986195", "0.6277867", "0.6243342", "0.62201625", "0.62025887", "0.6202352", "0.6191681", "0.61907756", "0.6186959", "0.6179554", "0.61743975", "0.6153054", "0.6149324", "0.61453354", "0.6141374", "0.6136378", "0.6133197", "0.6125785", "0.6125286", "0.6118153", "0.61178124", "0.6113755", "0.6106808", "0.60920686", "0.608982", "0.6075705", "0.60711795", "0.606498", "0.6063714", "0.60558856", "0.6053933", "0.6053659", "0.6041033", "0.60396034", "0.6035806", "0.60341394", "0.60095304", "0.6002757", "0.60019815", "0.6000051", "0.5991774", "0.5976673" ]
0.73522216
2
GetRoleOk returns a tuple with the Role field value if set, nil otherwise and a boolean to check if the value has been set.
func (o *AccessRequestData) GetRoleOk() (*string, bool) { if o == nil || o.Role == nil { return nil, false } return o.Role, true }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *Content) GetRoleOk() (*string, bool) {\n\tif o == nil || o.Role == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Role, true\n}", "func (o *StorageVdMemberEpAllOf) GetRoleOk() (*string, bool) {\n\tif o == nil || o.Role == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Role, true\n}", "func (o *RoleMapping) GetRoleOk() (*RoleType, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Role, true\n}", "func (o *UserDisco) GetRoleOk() (*UserRoleEnum, bool) {\n\tif o == nil || o.Role == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Role, true\n}", "func (o *MemberResponse) GetRoleOk() (*string, bool) {\n\tif o == nil || o.Role == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Role, true\n}", "func (o *InlineObject72) GetRoleOk() (*ProjectsIdRolesJsonRole, bool) {\n\tif o == nil || o.Role == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Role, true\n}", "func (o *AuthNMappingUpdateRelationships) GetRoleOk() (*RelationshipToRole, bool) {\n\tif o == nil || o.Role == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Role, true\n}", "func (m *UserMutation) Role() (r int, exists bool) {\n\tv := m.role\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (m *RoleMutation) Role() (r string, exists bool) {\n\tv := m._Role\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (o *Invitation) GetRolesOk() (*string, bool) {\n\tif o == nil || o.Roles == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Roles, true\n}", "func (o *GroupWithPrincipalsAndRolesAllOf) GetRolesOk() (*[]RoleOut, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Roles, true\n}", "func (o *ModelsLegacyAccountBinding) GetRoleNameOk() (*string, bool) {\n\tif o == nil || o.RoleName == nil {\n\t\treturn nil, false\n\t}\n\treturn o.RoleName, true\n}", "func NewGetRoleOK() *GetRoleOK {\n\treturn &GetRoleOK{}\n}", "func (o *IamPermissionToRoles) GetRolesOk() ([]MoMoRef, bool) {\n\tif o == nil || o.Roles == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Roles, true\n}", "func HasRole(ctx context.Context, role model.Role) (bool, error) {\n\tlogger := appcontext.ZLogger(ctx)\n\tprincipal := appcontext.Principal(ctx)\n\tswitch role {\n\tcase model.RoleEasiUser:\n\t\tif !principal.AllowEASi() {\n\t\t\tlogger.Info(\"does not have EASi job code\")\n\t\t\treturn false, nil\n\t\t}\n\t\tlogger.Info(\"user authorized as EASi user\", zap.Bool(\"Authorized\", true))\n\t\treturn true, nil\n\tcase model.RoleEasiGovteam:\n\t\tif !principal.AllowGRT() {\n\t\t\tlogger.Info(\"does not have Govteam job code\")\n\t\t\treturn false, nil\n\t\t}\n\t\tlogger.Info(\"user authorized as Govteam member\", zap.Bool(\"Authorized\", true))\n\t\treturn true, nil\n\tcase model.RoleEasi508Tester:\n\t\tif !principal.Allow508Tester() {\n\t\t\tlogger.Info(\"does not have 508 tester job code\")\n\t\t\treturn false, nil\n\t\t}\n\t\tlogger.Info(\"user authorized as 508 Tester\", zap.Bool(\"Authorized\", true))\n\t\treturn true, nil\n\tcase model.RoleEasi508User:\n\t\tif !principal.Allow508User() {\n\t\t\tlogger.Info(\"does not have 508 User job code\")\n\t\t\treturn false, nil\n\t\t}\n\t\tlogger.Info(\"user authorized as 508 User\", zap.Bool(\"Authorized\", true))\n\t\treturn true, nil\n\tcase model.RoleEasi508TesterOrUser:\n\t\tis508UserOrTester := principal.Allow508Tester() || principal.Allow508User()\n\t\tif !is508UserOrTester {\n\t\t\tlogger.Info(\"does not have 508 User nor Tester job code\")\n\t\t\treturn false, nil\n\t\t}\n\t\treturn true, nil\n\tcase model.RoleEasiTrbAdmin:\n\t\tif !principal.AllowTRBAdmin() {\n\t\t\tlogger.Info(\"does not have TRB Admin job code\")\n\t\t\treturn false, nil\n\t\t}\n\t\tlogger.Info(\"user authorized as TRB admin\", zap.Bool(\"Authorized\", true))\n\t\treturn true, nil\n\tdefault:\n\t\tlogger.With(zap.String(\"Role\", role.String())).Info(\"Unrecognized user role\")\n\t\treturn false, nil\n\t}\n}", "func (o *VirtualizationIweHost) GetMasterRoleOk() (*bool, bool) {\n\tif o == nil || o.MasterRole == nil {\n\t\treturn nil, false\n\t}\n\treturn o.MasterRole, true\n}", "func (_TellorMesosphere *TellorMesosphereCaller) HasRole(opts *bind.CallOpts, role [32]byte, account common.Address) (bool, error) {\n\tvar out []interface{}\n\terr := _TellorMesosphere.contract.Call(opts, &out, \"hasRole\", role, account)\n\n\tif err != nil {\n\t\treturn *new(bool), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(bool)).(*bool)\n\n\treturn out0, err\n\n}", "func (o *RoleAssignment) GetRoleDefinitionOk() (AnyOfmicrosoftGraphRoleDefinition, bool) {\n\tif o == nil || o.RoleDefinition == nil {\n\t\tvar ret AnyOfmicrosoftGraphRoleDefinition\n\t\treturn ret, false\n\t}\n\treturn *o.RoleDefinition, true\n}", "func (n *Node) GetRole() string {\n\tswitch n.Role {\n\tcase RedisMasterRole:\n\t\treturn RedisMasterRole\n\tcase RedisSlaveRole:\n\t\treturn RedisSlaveRole\n\tdefault:\n\t\tif n.MasterReferent != \"\" {\n\t\t\treturn RedisSlaveRole\n\t\t}\n\t\tif len(n.Slots) > 0 {\n\t\t\treturn RedisMasterRole\n\t\t}\n\t}\n\n\treturn \"none\"\n}", "func (robot Robot) GetRole() string {\n\treturn robot.role\n}", "func (o *MemberResponse) GetRole() string {\n\tif o == nil || o.Role == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Role\n}", "func (o *AccessRequestData) GetRole() string {\n\tif o == nil || o.Role == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Role\n}", "func NewGetAuthRoleOK() *GetAuthRoleOK {\n\treturn &GetAuthRoleOK{}\n}", "func (o *MemberResponse) HasRole() bool {\n\tif o != nil && o.Role != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Content) GetRole() string {\n\tif o == nil || o.Role == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Role\n}", "func (s *RaftServer) GetRole() Role {\n\treturn s.role\n}", "func (m *UserMutation) AddedRole() (r int, exists bool) {\n\tv := m.addrole\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (*OpenconfigSystem_System_Aaa_Authentication_Users_User_State_Role_Union_E_OpenconfigAaaTypes_SYSTEM_DEFINED_ROLES) Is_OpenconfigSystem_System_Aaa_Authentication_Users_User_State_Role_Union() {}", "func (m *Membership) GetRole() string {\n\tif m == nil || m.Role == nil {\n\t\treturn \"\"\n\t}\n\treturn *m.Role\n}", "func (o *GetRoleOK) IsSuccess() bool {\n\treturn true\n}", "func (_AccessControl *AccessControlCaller) HasRole(opts *bind.CallOpts, role [32]byte, account common.Address) (bool, error) {\n\tvar out []interface{}\n\terr := _AccessControl.contract.Call(opts, &out, \"hasRole\", role, account)\n\n\tif err != nil {\n\t\treturn *new(bool), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(bool)).(*bool)\n\n\treturn out0, err\n\n}", "func HasRole(c *JWTClaims, r string) bool {\n\tfor _, role := range c.Roles {\n\t\tif r == role {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (o *ProjectsIdRolesJsonRole) GetDescriptionOk() (*string, bool) {\n\tif o == nil || o.Description == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Description, true\n}", "func (o *Content) HasRole() bool {\n\tif o != nil && o.Role != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (*OpenconfigOfficeAp_System_Aaa_Authentication_Users_User_State_Role_Union_E_OpenconfigAaaTypes_SYSTEM_DEFINED_ROLES) Is_OpenconfigOfficeAp_System_Aaa_Authentication_Users_User_State_Role_Union() {\n}", "func (ref *UIElement) Role() string {\n\tret, _ := ref.StringAttr(RoleAttribute)\n\treturn ret\n}", "func (o *MicrosoftGraphEducationUser) GetPrimaryRoleOk() (AnyOfmicrosoftGraphEducationUserRole, bool) {\n\tif o == nil || o.PrimaryRole == nil {\n\t\tvar ret AnyOfmicrosoftGraphEducationUserRole\n\t\treturn ret, false\n\t}\n\treturn *o.PrimaryRole, true\n}", "func (*OpenconfigSystem_System_Aaa_Authentication_Users_User_Config_Role_Union_E_OpenconfigAaaTypes_SYSTEM_DEFINED_ROLES) Is_OpenconfigSystem_System_Aaa_Authentication_Users_User_Config_Role_Union() {}", "func (_BREM *BREMCaller) HasRole(opts *bind.CallOpts, _operator common.Address, _role string) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _BREM.contract.Call(opts, out, \"hasRole\", _operator, _role)\n\treturn *ret0, err\n}", "func GetRole(c *gin.Context) {\n\tid, _ := strconv.Atoi(c.Param(\"id\"))\n\tresult := service.GetRole(uint8(id))\n\n\tif result.ID == 0 {\n\t\tc.JSON(404, nil)\n\t} else {\n\t\tc.JSON(200, result)\n\t}\n}", "func (o *StorageVdMemberEpAllOf) GetRole() string {\n\tif o == nil || o.Role == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Role\n}", "func (u *User) GetRole() Role {\n\treturn u.role\n}", "func (nr NodeRecord) GetRole() (insolar.StaticRole, error) {\n\treturn nr.Record.Role, nil\n}", "func (*System_Aaa_Authentication_User_Role_Union_E_OpenconfigAaaTypes_SYSTEM_DEFINED_ROLES) Is_System_Aaa_Authentication_User_Role_Union() {\n}", "func (o *AccessRequestData) HasRole() bool {\n\tif o != nil && o.Role != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (ctx *serverRequestContextImpl) hasRole(role string) (bool, error) {\n\tif ctx.callerRoles == nil {\n\t\tctx.callerRoles = make(map[string]bool)\n\t}\n\n\troleStatus, hasRole := ctx.callerRoles[role]\n\tif hasRole {\n\t\treturn roleStatus, nil\n\t}\n\n\tcaller, err := ctx.GetCaller()\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\troleAttr, err := caller.GetAttribute(role)\n\tif err != nil {\n\t\treturn false, caerrors.NewAuthorizationErr(caerrors.ErrInvokerMissAttr, \"Invoker does not have following role'%s': '%s'\", role, err)\n\t}\n\troleStatus, err = strconv.ParseBool(roleAttr.Value)\n\tif err != nil {\n\t\treturn false, caerrors.NewHTTPErr(400, caerrors.ErrInvalidBool, \"Failed to get boolean value of '%s': '%s'\", role, err)\n\t}\n\tctx.callerRoles[role] = roleStatus\n\n\treturn ctx.callerRoles[role], nil\n}", "func (*OpenconfigSystem_System_Aaa_Authentication_Users_User_Config_Role_Union_String) Is_OpenconfigSystem_System_Aaa_Authentication_Users_User_Config_Role_Union() {}", "func (o ClientTlsPolicyIamBindingOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ClientTlsPolicyIamBinding) pulumi.StringOutput { return v.Role }).(pulumi.StringOutput)\n}", "func (*OpenconfigOfficeAp_System_Aaa_Authentication_Users_User_Config_Role_Union_E_OpenconfigAaaTypes_SYSTEM_DEFINED_ROLES) Is_OpenconfigOfficeAp_System_Aaa_Authentication_Users_User_Config_Role_Union() {\n}", "func (_RBAC *RBACCaller) HasRole(opts *bind.CallOpts, _operator common.Address, _role string) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _RBAC.contract.Call(opts, out, \"hasRole\", _operator, _role)\n\treturn *ret0, err\n}", "func (m *VpnConfiguration) GetRole()(*string) {\n val, err := m.GetBackingStore().Get(\"role\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "func (*OpenconfigSystem_System_Aaa_Authentication_Users_User_State_Role_Union_String) Is_OpenconfigSystem_System_Aaa_Authentication_Users_User_State_Role_Union() {}", "func (m *LaunchPlanSpec) GetRole() string {\n\tif m != nil {\n\t\treturn m.Role\n\t}\n\treturn \"\"\n}", "func (o BuildStrategySpecBuildStepsSecurityContextSeLinuxOptionsPtrOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *BuildStrategySpecBuildStepsSecurityContextSeLinuxOptions) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Role\n\t}).(pulumi.StringPtrOutput)\n}", "func (o *ProjectsIdRolesJsonRole) GetNameOk() (*string, bool) {\n\tif o == nil || o.Name == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Name, true\n}", "func (o BindingResponseOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BindingResponse) string { return v.Role }).(pulumi.StringOutput)\n}", "func (o BindingResponseOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BindingResponse) string { return v.Role }).(pulumi.StringOutput)\n}", "func (o BindingResponseOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BindingResponse) string { return v.Role }).(pulumi.StringOutput)\n}", "func (o BindingResponseOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BindingResponse) string { return v.Role }).(pulumi.StringOutput)\n}", "func (o BindingResponseOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BindingResponse) string { return v.Role }).(pulumi.StringOutput)\n}", "func (i *Invitation) GetRole() string {\n\tif i == nil || i.Role == nil {\n\t\treturn \"\"\n\t}\n\treturn *i.Role\n}", "func (e *ClusterElector) Role() Role {\n\tif (e.state & stateLeaderBootStrapping) != 0 {\n\t\treturn RoleUnstable\n\t}\n\treturn e.role\n}", "func (o BucketAccessControlResponseOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BucketAccessControlResponse) string { return v.Role }).(pulumi.StringOutput)\n}", "func (x *Acl) GetRole() Acl_Role {\n\tif x != nil {\n\t\treturn x.Role\n\t}\n\treturn Acl_READER\n}", "func NewUpdateRoleOK() *UpdateRoleOK {\n\treturn &UpdateRoleOK{}\n}", "func (o ObjectAccessControlResponseOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ObjectAccessControlResponse) string { return v.Role }).(pulumi.StringOutput)\n}", "func hasRole(m *discordgo.Member, autorizedRoles map[string]struct{}) bool {\n\tfor _, r := range m.Roles {\n\t\tif _, ok := autorizedRoles[r]; ok {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "func (_SweetToken *SweetTokenCaller) HasRole(opts *bind.CallOpts, roleName string) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _SweetToken.contract.Call(opts, out, \"hasRole\", roleName)\n\treturn *ret0, err\n}", "func (o BucketAccessControlTypeOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v BucketAccessControlType) *string { return v.Role }).(pulumi.StringPtrOutput)\n}", "func (o TriggerOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Trigger) pulumi.StringPtrOutput { return v.Role }).(pulumi.StringPtrOutput)\n}", "func (m NoPartyIDs) GetPartyRole() (v enum.PartyRole, err quickfix.MessageRejectError) {\n\tvar f field.PartyRoleField\n\tif err = m.Get(&f); err == nil {\n\t\tv = f.Value()\n\t}\n\treturn\n}", "func (o ClusterBuildStrategySpecBuildStepsSecurityContextSeLinuxOptionsPtrOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ClusterBuildStrategySpecBuildStepsSecurityContextSeLinuxOptions) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Role\n\t}).(pulumi.StringPtrOutput)\n}", "func (_TellorMesosphere *TellorMesosphereSession) HasRole(role [32]byte, account common.Address) (bool, error) {\n\treturn _TellorMesosphere.Contract.HasRole(&_TellorMesosphere.CallOpts, role, account)\n}", "func (_TellorMesosphere *TellorMesosphereCallerSession) HasRole(role [32]byte, account common.Address) (bool, error) {\n\treturn _TellorMesosphere.Contract.HasRole(&_TellorMesosphere.CallOpts, role, account)\n}", "func (element *Element) Role(value string) *Element {\n\treturn element.Attr(\"role\", value)\n}", "func (bn *BootstrapNode) GetRole() insolar.StaticRole {\n\treturn insolar.GetStaticRoleFromString(bn.NodeRole)\n}", "func (o *AuthNMappingUpdateRelationships) HasRole() bool {\n\treturn o != nil && o.Role != nil\n}", "func (_BREM *BREMCaller) CheckRole(opts *bind.CallOpts, _operator common.Address, _role string) error {\n\tvar ()\n\tout := &[]interface{}{}\n\terr := _BREM.contract.Call(opts, out, \"checkRole\", _operator, _role)\n\treturn err\n}", "func (m *UserMutation) RoleID() (id int, exists bool) {\n\tif m.role != nil {\n\t\treturn *m.role, true\n\t}\n\treturn\n}", "func (o *UserDisco) HasRole() bool {\n\tif o != nil && o.Role != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (_BREMFactory *BREMFactoryCaller) HasRole(opts *bind.CallOpts, _operator common.Address, _role string) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _BREMFactory.contract.Call(opts, out, \"hasRole\", _operator, _role)\n\treturn *ret0, err\n}", "func validateRole(fl validator.FieldLevel) bool {\n\t// Only allow role \"user\"\n\treturn fl.Field().String() == \"user\"\n}", "func (_RBAC *RBACCaller) CheckRole(opts *bind.CallOpts, _operator common.Address, _role string) error {\n\tvar ()\n\tout := &[]interface{}{}\n\terr := _RBAC.contract.Call(opts, out, \"checkRole\", _operator, _role)\n\treturn err\n}", "func (o *Permissao) GetUsrOk() (*int64, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Usr.Get(), o.Usr.IsSet()\n}", "func (i *Identity) Role() org.RoleType {\n\treturn i.OrgRoles[i.OrgID]\n}", "func NewPatchRoleOK() *PatchRoleOK {\n\treturn &PatchRoleOK{}\n}", "func (o *UpdateRole) GetAclOk() (string, bool) {\n\tif o == nil || o.Acl == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.Acl, true\n}", "func (a *Config) GetRole(c echo.Context) string {\n\treqToken := c.Request().Header.Get(\"Authorization\")\n\tsplitToken := strings.Split(reqToken, \"Bearer\")\n\tif len(splitToken) != 2 {\n\t\treturn \"\"\n\t}\n\treqToken = strings.TrimSpace(splitToken[1])\n\treturn a.Source.GetRoleByToken(reqToken)\n}", "func (c *Config) Role() int {\n\trole := c.Get(\"role\", \"follower\")\n\tswitch role {\n\tcase \"follower\":\n\t\treturn FOLLOWER\n\tcase \"leader\":\n\t\treturn LEADER\n\tdefault:\n\t\tlog.Panic(\"Invalid role: %s.\", role)\n\t}\n\treturn LEADER\n}", "func (o *RoleWithAccess) GetModifiedOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Modified, true\n}", "func (o BindingOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v Binding) *string { return v.Role }).(pulumi.StringPtrOutput)\n}", "func (o BindingOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v Binding) *string { return v.Role }).(pulumi.StringPtrOutput)\n}", "func (o BindingOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v Binding) *string { return v.Role }).(pulumi.StringPtrOutput)\n}", "func (o BindingOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v Binding) *string { return v.Role }).(pulumi.StringPtrOutput)\n}", "func (o BindingOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v Binding) *string { return v.Role }).(pulumi.StringPtrOutput)\n}", "func (r *RoleMerge) HasRoleID() bool {\n\treturn r.hasRoleID\n}", "func (o BucketReplicationConfigurationPtrOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *BucketReplicationConfiguration) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Role\n\t}).(pulumi.StringPtrOutput)\n}", "func (c *CreateOrgInvitationOptions) GetRole() string {\n\tif c == nil || c.Role == nil {\n\t\treturn \"\"\n\t}\n\treturn *c.Role\n}", "func (_Userable *UserableCaller) HasRole(opts *bind.CallOpts, _operator common.Address, _role string) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _Userable.contract.Call(opts, out, \"hasRole\", _operator, _role)\n\treturn *ret0, err\n}", "func (o *RoleMapping) GetRole() RoleType {\n\tif o == nil {\n\t\tvar ret RoleType\n\t\treturn ret\n\t}\n\n\treturn o.Role\n}" ]
[ "0.7974441", "0.7821189", "0.77569216", "0.76330847", "0.7557643", "0.7213401", "0.707731", "0.68062085", "0.6679669", "0.65814954", "0.64259917", "0.6399483", "0.6326925", "0.6245282", "0.62428945", "0.6015128", "0.60056996", "0.5996535", "0.591151", "0.58959687", "0.58632034", "0.585696", "0.5852996", "0.5836819", "0.5828879", "0.5817873", "0.5816437", "0.57984495", "0.57727295", "0.57698345", "0.5768897", "0.57479", "0.5707404", "0.5689628", "0.56881917", "0.568817", "0.56818295", "0.5673588", "0.5671362", "0.56671625", "0.5665637", "0.56470835", "0.5634934", "0.5629105", "0.5621092", "0.5614552", "0.5613867", "0.5607613", "0.5607442", "0.55973506", "0.5596696", "0.5593703", "0.55859345", "0.55778974", "0.5564212", "0.5553717", "0.5553717", "0.5553717", "0.5553717", "0.5553717", "0.55533457", "0.55472326", "0.5544669", "0.5536703", "0.5534204", "0.5529295", "0.5525794", "0.5520312", "0.5518509", "0.55184215", "0.55177057", "0.5516847", "0.55122524", "0.5512135", "0.5509017", "0.5501527", "0.5489387", "0.5489173", "0.5485078", "0.54846495", "0.54776794", "0.5476191", "0.54723936", "0.5463719", "0.5458", "0.54546434", "0.5453617", "0.545143", "0.54503894", "0.5435144", "0.54336137", "0.54336137", "0.54336137", "0.54336137", "0.54336137", "0.5421437", "0.54193604", "0.5417319", "0.54148597", "0.5410464" ]
0.8037556
0
HasRole returns a boolean if a field has been set.
func (o *AccessRequestData) HasRole() bool { if o != nil && o.Role != nil { return true } return false }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (_Userable *UserableCaller) HasRole(opts *bind.CallOpts, _operator common.Address, _role string) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _Userable.contract.Call(opts, out, \"hasRole\", _operator, _role)\n\treturn *ret0, err\n}", "func (z *User) HasRole(role string) bool {\n\tresult := false\n\tif len(z.Roles) > 0 {\n\t\tfor _, value := range z.Roles {\n\t\t\tif value == role {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t}\n\treturn result\n}", "func (_Auditable *AuditableCaller) HasRole(opts *bind.CallOpts, _operator common.Address, _role string) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _Auditable.contract.Call(opts, out, \"hasRole\", _operator, _role)\n\treturn *ret0, err\n}", "func (o *InlineObject72) HasRole() bool {\n\tif o != nil && o.Role != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *UserDisco) HasRole() bool {\n\tif o != nil && o.Role != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (_DelegationController *DelegationControllerCaller) HasRole(opts *bind.CallOpts, role [32]byte, account common.Address) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _DelegationController.contract.Call(opts, out, \"hasRole\", role, account)\n\treturn *ret0, err\n}", "func (o *MemberResponse) HasRole() bool {\n\tif o != nil && o.Role != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (_RBAC *RBACCaller) HasRole(opts *bind.CallOpts, _operator common.Address, _role string) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _RBAC.contract.Call(opts, out, \"hasRole\", _operator, _role)\n\treturn *ret0, err\n}", "func (_Superuserable *SuperuserableCaller) HasRole(opts *bind.CallOpts, _operator common.Address, _role string) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _Superuserable.contract.Call(opts, out, \"hasRole\", _operator, _role)\n\treturn *ret0, err\n}", "func (_AccessControl *AccessControlCaller) HasRole(opts *bind.CallOpts, role [32]byte, account common.Address) (bool, error) {\n\tvar out []interface{}\n\terr := _AccessControl.contract.Call(opts, &out, \"hasRole\", role, account)\n\n\tif err != nil {\n\t\treturn *new(bool), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(bool)).(*bool)\n\n\treturn out0, err\n\n}", "func (_BREM *BREMCaller) HasRole(opts *bind.CallOpts, _operator common.Address, _role string) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _BREM.contract.Call(opts, out, \"hasRole\", _operator, _role)\n\treturn *ret0, err\n}", "func (_BREMFactory *BREMFactoryCaller) HasRole(opts *bind.CallOpts, _operator common.Address, _role string) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _BREMFactory.contract.Call(opts, out, \"hasRole\", _operator, _role)\n\treturn *ret0, err\n}", "func (_Distributor *DistributorCaller) HasRole(opts *bind.CallOpts, role [32]byte, account common.Address) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _Distributor.contract.Call(opts, out, \"hasRole\", role, account)\n\treturn *ret0, err\n}", "func (o *StorageVdMemberEpAllOf) HasRole() bool {\n\tif o != nil && o.Role != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (u ScimUser) HasRole(role string) bool {\n\tfor _, r := range u.Roles {\n\t\tif r.Value == role {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (store *Store) HasRole(name string) (bool, error) {\n\tstore.imutex.RLock()\n\tdefer store.imutex.RUnlock()\n\t_, ok := store.roles[name]\n\treturn ok, nil\n}", "func (_TellorMesosphere *TellorMesosphereCaller) HasRole(opts *bind.CallOpts, role [32]byte, account common.Address) (bool, error) {\n\tvar out []interface{}\n\terr := _TellorMesosphere.contract.Call(opts, &out, \"hasRole\", role, account)\n\n\tif err != nil {\n\t\treturn *new(bool), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(bool)).(*bool)\n\n\treturn out0, err\n\n}", "func (o *Content) HasRole() bool {\n\tif o != nil && o.Role != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (_SweetToken *SweetTokenCaller) HasRole(opts *bind.CallOpts, roleName string) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _SweetToken.contract.Call(opts, out, \"hasRole\", roleName)\n\treturn *ret0, err\n}", "func hasRole(m *discordgo.Member, autorizedRoles map[string]struct{}) bool {\n\tfor _, r := range m.Roles {\n\t\tif _, ok := autorizedRoles[r]; ok {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "func (u User) HasRole(candidate string) bool {\n\tfor _, role := range u.Roles {\n\t\tif role == candidate {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "func HasRole(c *JWTClaims, r string) bool {\n\tfor _, role := range c.Roles {\n\t\tif r == role {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (account *Account) HasRole(roleID int) bool {\n\tif _, ok := account.accountRoles[roleID]; ok {\n\t\treturn true\n\t}\n\treturn false\n}", "func HasRole(role string, token *jwt.Token) bool {\n\tfor _, r := range Roles(token) {\n\t\tif r == role {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (g ScimGroup) HasRole(role string) bool {\n\tfor _, groupRole := range g.Roles {\n\t\tif groupRole.Value == role {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (_DelegationController *DelegationControllerCallerSession) HasRole(role [32]byte, account common.Address) (bool, error) {\n\treturn _DelegationController.Contract.HasRole(&_DelegationController.CallOpts, role, account)\n}", "func (_BREMFactory *BREMFactorySession) HasRole(_operator common.Address, _role string) (bool, error) {\n\treturn _BREMFactory.Contract.HasRole(&_BREMFactory.CallOpts, _operator, _role)\n}", "func (_Distributor *DistributorCallerSession) HasRole(role [32]byte, account common.Address) (bool, error) {\n\treturn _Distributor.Contract.HasRole(&_Distributor.CallOpts, role, account)\n}", "func (_AccessControl *AccessControlCallerSession) HasRole(role [32]byte, account common.Address) (bool, error) {\n\treturn _AccessControl.Contract.HasRole(&_AccessControl.CallOpts, role, account)\n}", "func (_BREMFactory *BREMFactoryCallerSession) HasRole(_operator common.Address, _role string) (bool, error) {\n\treturn _BREMFactory.Contract.HasRole(&_BREMFactory.CallOpts, _operator, _role)\n}", "func (_DelegationController *DelegationControllerSession) HasRole(role [32]byte, account common.Address) (bool, error) {\n\treturn _DelegationController.Contract.HasRole(&_DelegationController.CallOpts, role, account)\n}", "func (_Distributor *DistributorSession) HasRole(role [32]byte, account common.Address) (bool, error) {\n\treturn _Distributor.Contract.HasRole(&_Distributor.CallOpts, role, account)\n}", "func HasRole(ctx context.Context, role model.Role) (bool, error) {\n\tlogger := appcontext.ZLogger(ctx)\n\tprincipal := appcontext.Principal(ctx)\n\tswitch role {\n\tcase model.RoleEasiUser:\n\t\tif !principal.AllowEASi() {\n\t\t\tlogger.Info(\"does not have EASi job code\")\n\t\t\treturn false, nil\n\t\t}\n\t\tlogger.Info(\"user authorized as EASi user\", zap.Bool(\"Authorized\", true))\n\t\treturn true, nil\n\tcase model.RoleEasiGovteam:\n\t\tif !principal.AllowGRT() {\n\t\t\tlogger.Info(\"does not have Govteam job code\")\n\t\t\treturn false, nil\n\t\t}\n\t\tlogger.Info(\"user authorized as Govteam member\", zap.Bool(\"Authorized\", true))\n\t\treturn true, nil\n\tcase model.RoleEasi508Tester:\n\t\tif !principal.Allow508Tester() {\n\t\t\tlogger.Info(\"does not have 508 tester job code\")\n\t\t\treturn false, nil\n\t\t}\n\t\tlogger.Info(\"user authorized as 508 Tester\", zap.Bool(\"Authorized\", true))\n\t\treturn true, nil\n\tcase model.RoleEasi508User:\n\t\tif !principal.Allow508User() {\n\t\t\tlogger.Info(\"does not have 508 User job code\")\n\t\t\treturn false, nil\n\t\t}\n\t\tlogger.Info(\"user authorized as 508 User\", zap.Bool(\"Authorized\", true))\n\t\treturn true, nil\n\tcase model.RoleEasi508TesterOrUser:\n\t\tis508UserOrTester := principal.Allow508Tester() || principal.Allow508User()\n\t\tif !is508UserOrTester {\n\t\t\tlogger.Info(\"does not have 508 User nor Tester job code\")\n\t\t\treturn false, nil\n\t\t}\n\t\treturn true, nil\n\tcase model.RoleEasiTrbAdmin:\n\t\tif !principal.AllowTRBAdmin() {\n\t\t\tlogger.Info(\"does not have TRB Admin job code\")\n\t\t\treturn false, nil\n\t\t}\n\t\tlogger.Info(\"user authorized as TRB admin\", zap.Bool(\"Authorized\", true))\n\t\treturn true, nil\n\tdefault:\n\t\tlogger.With(zap.String(\"Role\", role.String())).Info(\"Unrecognized user role\")\n\t\treturn false, nil\n\t}\n}", "func (_Userable *UserableCallerSession) HasRole(_operator common.Address, _role string) (bool, error) {\n\treturn _Userable.Contract.HasRole(&_Userable.CallOpts, _operator, _role)\n}", "func (_Auditable *AuditableCallerSession) HasRole(_operator common.Address, _role string) (bool, error) {\n\treturn _Auditable.Contract.HasRole(&_Auditable.CallOpts, _operator, _role)\n}", "func (ctx *serverRequestContextImpl) HasRole(role string) error {\n\thasRole, err := ctx.hasRole(role)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !hasRole {\n\t\treturn caerrors.NewAuthorizationErr(caerrors.ErrMissingRole, \"Caller has a value of 'false' for attribute/role '%s'\", role)\n\t}\n\treturn nil\n}", "func (_TellorMesosphere *TellorMesosphereSession) HasRole(role [32]byte, account common.Address) (bool, error) {\n\treturn _TellorMesosphere.Contract.HasRole(&_TellorMesosphere.CallOpts, role, account)\n}", "func (_BREM *BREMCallerSession) HasRole(_operator common.Address, _role string) (bool, error) {\n\treturn _BREM.Contract.HasRole(&_BREM.CallOpts, _operator, _role)\n}", "func (_AccessControl *AccessControlSession) HasRole(role [32]byte, account common.Address) (bool, error) {\n\treturn _AccessControl.Contract.HasRole(&_AccessControl.CallOpts, role, account)\n}", "func (_TellorMesosphere *TellorMesosphereCallerSession) HasRole(role [32]byte, account common.Address) (bool, error) {\n\treturn _TellorMesosphere.Contract.HasRole(&_TellorMesosphere.CallOpts, role, account)\n}", "func (_Auditable *AuditableSession) HasRole(_operator common.Address, _role string) (bool, error) {\n\treturn _Auditable.Contract.HasRole(&_Auditable.CallOpts, _operator, _role)\n}", "func (u Users) HasRole(role RoleInterface, userID Owner) (bool, error) {\n\tif _, ok := userID.(string); ok {\n\t\tif userID.(string) == \"\" {\n\t\t\treturn false, ErrUserRequired\n\t\t}\n\t} else if _, ok := userID.(int64); ok {\n\t\tif userID.(int64) == 0 {\n\t\t\treturn false, ErrUserRequired\n\t\t}\n\t}\n\n\troleID, err := u.rbac.Roles().GetRoleID(role)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\tquery := fmt.Sprintf(`\n\tSELECT COUNT(*) FROM user_roles AS TUR\n\tJOIN roles AS TRdirect ON (TRdirect.ID=TUR.role_id)\n\tJOIN roles AS TR ON (TR.Lft BETWEEN TRdirect.Lft AND TRdirect.Rght)\n\tWHERE\n\tTUR.user_id=? AND TR.ID=?`)\n\n\tvar result int64\n\terr = u.rbac.db.QueryRow(query, userID, roleID).Scan(&result)\n\tif err != nil {\n\t\tif err != sql.ErrNoRows {\n\t\t\treturn false, err\n\t\t}\n\t}\n\n\tif result > 0 {\n\t\treturn true, nil\n\t}\n\n\treturn false, nil\n}", "func (_BREM *BREMSession) HasRole(_operator common.Address, _role string) (bool, error) {\n\treturn _BREM.Contract.HasRole(&_BREM.CallOpts, _operator, _role)\n}", "func (_Userable *UserableSession) HasRole(_operator common.Address, _role string) (bool, error) {\n\treturn _Userable.Contract.HasRole(&_Userable.CallOpts, _operator, _role)\n}", "func (_Superuserable *SuperuserableCallerSession) HasRole(_operator common.Address, _role string) (bool, error) {\n\treturn _Superuserable.Contract.HasRole(&_Superuserable.CallOpts, _operator, _role)\n}", "func (_RBAC *RBACCallerSession) HasRole(_operator common.Address, _role string) (bool, error) {\n\treturn _RBAC.Contract.HasRole(&_RBAC.CallOpts, _operator, _role)\n}", "func (o *AuthNMappingUpdateRelationships) HasRole() bool {\n\treturn o != nil && o.Role != nil\n}", "func (_Superuserable *SuperuserableSession) HasRole(_operator common.Address, _role string) (bool, error) {\n\treturn _Superuserable.Contract.HasRole(&_Superuserable.CallOpts, _operator, _role)\n}", "func HasRole(roles ...string) web.Middleware {\n\n\t// This is the actual middleware function to be executed.\n\tf := func(after web.Handler) web.Handler {\n\n\t\th := func(ctx context.Context, w http.ResponseWriter, r *http.Request) error {\n\t\t\tctx, span := trace.StartSpan(ctx, \"internal.mid.HasRole\")\n\t\t\tdefer span.End()\n\n\t\t\tclaims, ok := ctx.Value(auth.Key).(auth.Claims)\n\t\t\tif !ok {\n\t\t\t\treturn errors.New(\"claims missing from context: HasRole called without/before Authenticate\")\n\t\t\t}\n\n\t\t\tif !claims.HasRole(roles...) {\n\t\t\t\treturn ErrForbidden\n\t\t\t}\n\n\t\t\treturn after(ctx, w, r)\n\t\t}\n\n\t\treturn h\n\t}\n\n\treturn f\n}", "func (r *RoleTriggerScript) HasRoleID() bool {\n\treturn r.hasRoleID\n}", "func (ctx *serverRequestContextImpl) hasRole(role string) (bool, error) {\n\tif ctx.callerRoles == nil {\n\t\tctx.callerRoles = make(map[string]bool)\n\t}\n\n\troleStatus, hasRole := ctx.callerRoles[role]\n\tif hasRole {\n\t\treturn roleStatus, nil\n\t}\n\n\tcaller, err := ctx.GetCaller()\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\troleAttr, err := caller.GetAttribute(role)\n\tif err != nil {\n\t\treturn false, caerrors.NewAuthorizationErr(caerrors.ErrInvokerMissAttr, \"Invoker does not have following role'%s': '%s'\", role, err)\n\t}\n\troleStatus, err = strconv.ParseBool(roleAttr.Value)\n\tif err != nil {\n\t\treturn false, caerrors.NewHTTPErr(400, caerrors.ErrInvalidBool, \"Failed to get boolean value of '%s': '%s'\", role, err)\n\t}\n\tctx.callerRoles[role] = roleStatus\n\n\treturn ctx.callerRoles[role], nil\n}", "func (_RBAC *RBACSession) HasRole(_operator common.Address, _role string) (bool, error) {\n\treturn _RBAC.Contract.HasRole(&_RBAC.CallOpts, _operator, _role)\n}", "func (_SweetToken *SweetTokenCallerSession) HasRole(roleName string) (bool, error) {\n\treturn _SweetToken.Contract.HasRole(&_SweetToken.CallOpts, roleName)\n}", "func (o *Invitation) HasRoles() bool {\n\tif o != nil && o.Roles != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (r *RoleRead) HasRoleID() bool {\n\treturn r.hasRoleID\n}", "func (_SweetToken *SweetTokenSession) HasRole(roleName string) (bool, error) {\n\treturn _SweetToken.Contract.HasRole(&_SweetToken.CallOpts, roleName)\n}", "func (r *RoleUpdate) HasRoleID() bool {\n\treturn r.hasRoleID\n}", "func (r *RoleUndelete) HasRoleID() bool {\n\treturn r.hasRoleID\n}", "func (r *RoleMemberAdd) HasRoleID() bool {\n\treturn r.hasRoleID\n}", "func (o *RoleAssignment) HasRoleDefinition() bool {\n\tif o != nil && o.RoleDefinition != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *IamPermissionToRoles) HasRoles() bool {\n\tif o != nil && o.Roles != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (r *RoleDelete) HasRoleID() bool {\n\treturn r.hasRoleID\n}", "func (r *RoleMemberList) HasRoleID() bool {\n\treturn r.hasRoleID\n}", "func (r *RoleMerge) HasRoleID() bool {\n\treturn r.hasRoleID\n}", "func (m NoPartyIDs) HasPartyRole() bool {\n\treturn m.Has(tag.PartyRole)\n}", "func (r *RoleMemberRemove) HasRoleID() bool {\n\treturn r.hasRoleID\n}", "func (r *RoleUnarchive) HasRoleID() bool {\n\treturn r.hasRoleID\n}", "func hasRole(c context.Context, metas []*api.PrefixMetadata, role api.Role) (bool, error) {\n\tcaller := string(auth.CurrentIdentity(c)) // e.g. \"user:[email protected]\"\n\n\t// E.g. if 'role' is READER, 'roles' will be {READER, WRITER, OWNER}.\n\troles := impliedRolesRev[role]\n\tif roles == nil {\n\t\troles = roleSet(role)\n\t}\n\n\t// Enumerate the set of principals that have any of the requested roles in any\n\t// of the prefixes. Exit early if hitting the direct match, otherwise proceed\n\t// to more expensive group membership checks. Note that we don't use isInACL\n\t// here because we want to postpone all group checks until the very end,\n\t// checking memberships in all groups mentioned in 'metas' at once.\n\tgroups := stringset.New(10) // 10 is picked arbitrarily\n\tfor _, meta := range metas {\n\t\tfor _, acl := range meta.Acls {\n\t\t\tif _, ok := roles[acl.Role]; !ok {\n\t\t\t\tcontinue // not the role we are interested in\n\t\t\t}\n\t\t\tfor _, p := range acl.Principals {\n\t\t\t\tif p == caller {\n\t\t\t\t\treturn true, nil // the caller was specified in ACLs explicitly\n\t\t\t\t}\n\t\t\t\t// Is this a reference to a group?\n\t\t\t\tif s := strings.SplitN(p, \":\", 2); len(s) == 2 && s[0] == \"group\" {\n\t\t\t\t\tgroups.Add(s[1])\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tyes, err := auth.IsMember(c, groups.ToSlice()...)\n\tif err != nil {\n\t\treturn false, errors.Annotate(err, \"failed to check group memberships when checking ACLs for role %s\", role).Err()\n\t}\n\treturn yes, nil\n}", "func (e *SyncedEnforcer) HasRoleForUser(name string, role string) (bool, error) {\n\te.m.RLock()\n\tdefer e.m.RUnlock()\n\treturn e.Enforcer.HasRoleForUser(name, role)\n}", "func (r *RoleMove) HasRoleID() bool {\n\treturn r.hasRoleID\n}", "func (r *RoleArchive) HasRoleID() bool {\n\treturn r.hasRoleID\n}", "func (a *ACLToken) HasRoles(roleIDs []string) bool {\n\n\t// Generate a set of role IDs that the token is assigned.\n\troleSet := set.FromFunc(a.Roles, func(roleLink *ACLTokenRoleLink) string { return roleLink.ID })\n\n\t// Iterate the role IDs within the request and check whether these are\n\t// present within the token assignment.\n\tfor _, roleID := range roleIDs {\n\t\tif !roleSet.Contains(roleID) {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "func (o *MicrosoftGraphEducationUser) HasPrimaryRole() bool {\n\tif o != nil && o.PrimaryRole != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func hasAuthorizedRole(sourceRole, providedRole string) bool {\n\tswitch sourceRole {\n\tcase ViewerRoleName:\n\t\tswitch providedRole {\n\t\tcase ViewerRoleName, EditorRoleName, AdminRoleName:\n\t\t\treturn true\n\t\t}\n\tcase EditorRoleName:\n\t\tswitch providedRole {\n\t\tcase EditorRoleName, AdminRoleName:\n\t\t\treturn true\n\t\t}\n\tcase AdminRoleName:\n\t\tswitch providedRole {\n\t\tcase AdminRoleName:\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "func (c *client) HasPermission(org, repo, user string, roles ...string) (bool, error) {\n\tperm, err := c.GetUserPermission(org, repo, user)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\tfor _, r := range roles {\n\t\tif r == perm {\n\t\t\treturn true, nil\n\t\t}\n\t}\n\treturn false, nil\n}", "func (e *Enforcer) HasRoleForUser(name string, role string) (bool, error) {\n\troles, err := e.GetRolesForUser(name)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\thasRole := false\n\tfor _, r := range roles {\n\t\tif r == role {\n\t\t\thasRole = true\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn hasRole, nil\n}", "func (r *RoleList) HasPerPage() bool {\n\treturn r.hasPerPage\n}", "func (o *ModelsLegacyAccountBinding) HasRoleName() bool {\n\tif o != nil && o.RoleName != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *User) HasLicenseDetails() bool {\n\tif o != nil && o.LicenseDetails != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (r *RoleCreate) HasMembers() bool {\n\treturn r.hasMembers\n}", "func (ctx Context) UserHasRole(roleID string) bool {\n\tusers := ctx.Guild.Members\n\n\tfor _, u := range users {\n\t\tif u.User.ID == ctx.User.ID {\n\t\t\tfor _, r := range u.Roles {\n\t\t\t\tif r == roleID {\n\t\t\t\t\treturn true\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn false\n}", "func validateRole(fl validator.FieldLevel) bool {\n\t// Only allow role \"user\"\n\treturn fl.Field().String() == \"user\"\n}", "func (r *RoleList) HasPage() bool {\n\treturn r.hasPage\n}", "func (user *EcbUserProfile) HasAdminRole(encryptedProfile []byte) (bool, error) {\n\tplainText, err := user.cipher.Decrypt(encryptedProfile)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\t// Remove padding and just assume it's correct\n\tplainTextLength := len(plainText)\n\tplainText = plainText[:plainTextLength-int(plainText[plainTextLength-1])]\n\n\tdict := util.DecodeQueryString(string(plainText), \"=\", \"&\")\n\treturn dict[\"role\"] == \"admin\", nil\n}", "func (o *VirtualizationIweHost) HasMasterRole() bool {\n\tif o != nil && o.MasterRole != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func HasUser_rolesViaLangcode(iLangcode string) bool {\n\tif has, err := Engine.Where(\"langcode = ?\", iLangcode).Get(new(User_roles)); err != nil {\n\t\treturn false\n\t} else {\n\t\tif has {\n\t\t\treturn true\n\t\t}\n\t\treturn false\n\t}\n}", "func (ctx *RequestContext) HasRight(right string) bool {\n\tif ctx.principal == nil {\n\t\treturn false\n\t}\n\n\treturn hasItem(right, ctx.principal.Rights)\n}", "func (r *RoleUpdate) HasMembers() bool {\n\treturn r.hasMembers\n}", "func HasRights(r *http.Request, rights RightBits, f func(r *http.Request, rights RightBits) bool) bool {\n\tauth, ok := GetAuthenticatedToken(r)\n\t//If has no right and no auth then OK\n\tif !ok && !rights.Has(NoRight) {\n\t\treturn false\n\t}\n\t//If user is ok, then check right and function\n\tret := f(r, rights)\n\treturn auth.UserRights.Has(rights) && ret\n}", "func (role *Role) HasName() (bool, error) {\n\tif err := db.Where(\"name = ?\", role.Name).First(&role).Error; err != nil {\n\t\tlogger.Error(\"Failed to find role by name.\", err)\n\t\treturn false, err\n\t}\n\treturn role.RoleID != \"\", nil\n}", "func (o *UpdateRole) HasMembers() bool {\n\tif o != nil && o.Members != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func HasAnyRole(ctx context.Context, roles []string, r *http.Request) bool {\n\trequestRoles := strings.Split(r.Header.Get(constant.HeaderAuthorisedRole), \",\")\n\tlogger.Debugf(ctx, \"security util\", \"request roles %#v \", requestRoles)\n\n\tif len(requestRoles) > 0 {\n\t\tfor _, role := range roles {\n\t\t\tfor _, requestRole := range requestRoles {\n\t\t\t\tif strings.Compare(role, requestRole) == 0 {\n\t\t\t\t\tlogger.Debugf(ctx, \"security util\", \"request has one required role required:%s found:%s\", role, requestRole)\n\t\t\t\t\treturn true\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t}\n\n\treturn false\n}", "func (o *Permissao) HasUsr() bool {\n\tif o != nil && o.Usr.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (r *RoleMemberAdd) HasUserID() bool {\n\treturn r.hasUserID\n}", "func userHaveRole(user User, role string) (b bool){\n\tb = true\n\tfor _, e := range user.Roles {\n\t\tif e == role {\n\t\t\treturn\n\t\t}\n\t}\n\tb = false\n\treturn\n}", "func (m *UserMutation) Role() (r int, exists bool) {\n\tv := m.role\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (o *RoleWithAccess) HasDisplayName() bool {\n\tif o != nil && o.DisplayName != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func HasOwnerRole() predicate.ProfileUKM {\n\treturn predicate.ProfileUKM(func(s *sql.Selector) {\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(Table, FieldID),\n\t\t\tsqlgraph.To(OwnerRoleTable, FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.M2O, true, OwnerRoleTable, OwnerRoleColumn),\n\t\t)\n\t\tsqlgraph.HasNeighbors(s, step)\n\t})\n}", "func (ls Set) Has(field string) bool {\n\t_, exists := ls[field]\n\treturn exists\n}", "func (o *UpdateRole) HasAcl() bool {\n\tif o != nil && o.Acl != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}" ]
[ "0.76164496", "0.75751364", "0.7571959", "0.74941885", "0.74918455", "0.74793696", "0.74737513", "0.7457505", "0.74475944", "0.744502", "0.74370944", "0.7435719", "0.7424597", "0.7421471", "0.74052817", "0.73856986", "0.73623514", "0.7334919", "0.7274456", "0.7259838", "0.72501385", "0.71618706", "0.70862186", "0.70744705", "0.70357126", "0.7033866", "0.70332503", "0.7028064", "0.70233244", "0.7003454", "0.6994437", "0.69696707", "0.69503796", "0.69428957", "0.6926586", "0.69254625", "0.69210595", "0.69184595", "0.69151", "0.690684", "0.6888729", "0.687815", "0.6863758", "0.682329", "0.67915934", "0.67672104", "0.6758375", "0.673128", "0.67221385", "0.6707124", "0.6702145", "0.669357", "0.6681274", "0.66747016", "0.664401", "0.66119576", "0.660689", "0.65926796", "0.65718687", "0.65423465", "0.65065515", "0.64861625", "0.6474467", "0.6380924", "0.6347509", "0.631253", "0.6269754", "0.6203805", "0.61951137", "0.6178188", "0.6153137", "0.6146066", "0.61117274", "0.6094326", "0.60540015", "0.6013736", "0.5988859", "0.5890212", "0.58818877", "0.5867437", "0.5842467", "0.58341104", "0.58008236", "0.5760065", "0.5759158", "0.56999373", "0.5695323", "0.5685579", "0.5660591", "0.56537694", "0.56302494", "0.5624854", "0.56212926", "0.5618803", "0.5612559", "0.56098145", "0.56065726", "0.5574857", "0.55598325", "0.55593956" ]
0.7320606
18
SetRole gets a reference to the given string and assigns it to the Role field.
func (o *AccessRequestData) SetRole(v string) { o.Role = &v }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (pge *PgEngine) SetRole(ctx context.Context, tx pgx.Tx, runUID pgtype.Varchar) {\n\tl := log.GetLogger(ctx)\n\tl.Info(\"Setting Role to \", runUID.String)\n\t_, err := tx.Exec(ctx, fmt.Sprintf(\"SET ROLE %v\", runUID.String))\n\tif err != nil {\n\t\tl.WithError(err).Error(\"Error in Setting role\", err)\n\t}\n}", "func (s *MemStore) SetRole(k string, r common.Role) {\n\ts.did[k] = r\n}", "func (e *Election) SetRole(r role.Role) {\n\te.roleMutex.Lock()\n\tdefer e.roleMutex.Unlock()\n\te.role = r\n\te.RoleCh <- r\n}", "func (robot *Robot) SetRole(role string) {\n\trobot.role = role\n}", "func (m *VpnConfiguration) SetRole(value *string)() {\n err := m.GetBackingStore().Set(\"role\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *RoleMutation) SetRole(s string) {\n\tm._Role = &s\n}", "func (a *Authorizer) SetRole(r Role) error {\n\tif r.Name == \"\" {\n\t\treturn errors.New(\"Role needs to have a name\")\n\t}\n\n\tfor _, rule := range r.Rules {\n\t\tif len(rule.Verbs) == 0 {\n\t\t\treturn errors.New(\"Every rule needs at least a verb\")\n\t\t}\n\n\t\tif len(rule.Resources) == 0 {\n\t\t\treturn errors.New(\"Every rule needs at least a resource\")\n\t\t}\n\n\t\tfor _, v := range rule.Verbs {\n\t\t\tif v == \"\" {\n\t\t\t\treturn errors.New(\"Every rule needs to have valid verbs\")\n\t\t\t}\n\t\t}\n\t}\n\n\ta.Lock()\n\ta.roles[r.Name] = r\n\ta.Unlock()\n\treturn nil\n}", "func (o *Content) SetRole(v string) {\n\to.Role = &v\n}", "func (n *Node) SetRole(flags string) {\n\tn.Role = \"\" // reset value before setting the new one\n\tvals := strings.Split(flags, \",\")\n\tfor _, val := range vals {\n\t\tswitch val {\n\t\tcase RedisMasterRole:\n\t\t\tn.Role = RedisMasterRole\n\t\tcase RedisSlaveRole:\n\t\t\tn.Role = RedisSlaveRole\n\t\t}\n\t}\n}", "func (m *UserMutation) SetRole(i int) {\n\tm.role = &i\n\tm.addrole = nil\n}", "func TeamSetRole(ctx context.Context, w http.ResponseWriter, req *http.Request) error {\n\tvar db = ctx.Value(DBKey).(*sql.DB)\n\tvar user = ctx.Value(UserKey).(*dash.User)\n\tvar team = ctx.Value(TeamKey).(*dash.Team)\n\n\tif team.OwnerID != user.ID {\n\t\treturn ErrNotTeamOwner\n\t}\n\n\tvar dec = json.NewDecoder(req.Body)\n\n\tvar payload teamSetRoleRequest\n\tdec.Decode(&payload)\n\n\tif payload.Role == \"\" {\n\t\treturn ErrMissingRoleParameter\n\t}\n\tif payload.Role != \"member\" && payload.Role != \"moderator\" {\n\t\treturn ErrInvalidRoleParameter\n\t}\n\tif payload.Username == \"\" {\n\t\treturn ErrMissingUsernameParameter\n\t}\n\tvar target, err = findUserByUsername(db, payload.Username)\n\tif err != nil {\n\t\treturn ErrUnknownUser\n\t}\n\n\tif _, err := db.Exec(`UPDATE team_user SET role = ? WHERE team_id = ? AND user_id = ?`, payload.Role, team.ID, target.ID); err != nil {\n\t\treturn err\n\t}\n\n\tjson.NewEncoder(w).Encode(map[string]string{\n\t\t\"status\": \"success\",\n\t})\n\treturn nil\n}", "func (in *ActionIpAddressIndexInput) SetRole(value string) *ActionIpAddressIndexInput {\n\tin.Role = value\n\n\tif in._selectedParameters == nil {\n\t\tin._selectedParameters = make(map[string]interface{})\n\t}\n\n\tin._selectedParameters[\"Role\"] = nil\n\treturn in\n}", "func (s *GetWorkspaceOutput) SetRole(v string) *GetWorkspaceOutput {\n\ts.Role = &v\n\treturn s\n}", "func (s *Pipeline) SetRole(v string) *Pipeline {\n\ts.Role = &v\n\treturn s\n}", "func (o *MemberResponse) SetRole(v string) {\n\to.Role = &v\n}", "func (r *RoleVar) Set(s string) error {\n\tswitch Role(s) {\n\tcase RoleData:\n\t\tr.role = RoleData\n\tcase RoleClient:\n\t\tr.role = RoleClient\n\tcase RoleMaster:\n\t\tr.role = RoleMaster\n\tdefault:\n\t\treturn fmt.Errorf(\"role should be one of '%s', '%s' or '%s'\", RoleData, RoleClient, RoleMaster)\n\t}\n\n\treturn nil\n}", "func (s *UpdatePipelineInput) SetRole(v string) *UpdatePipelineInput {\n\ts.Role = &v\n\treturn s\n}", "func (s *UpdateWorkspaceInput) SetRole(v string) *UpdateWorkspaceInput {\n\ts.Role = &v\n\treturn s\n}", "func (s *CreatePipelineInput) SetRole(v string) *CreatePipelineInput {\n\ts.Role = &v\n\treturn s\n}", "func (s *CreateServiceInput) SetRole(v string) *CreateServiceInput {\n\ts.Role = &v\n\treturn s\n}", "func (b *GroupsEditManagerBuilder) Role(v string) *GroupsEditManagerBuilder {\n\tb.Params[\"role\"] = v\n\treturn b\n}", "func (s *CreateWorkspaceInput) SetRole(v string) *CreateWorkspaceInput {\n\ts.Role = &v\n\treturn s\n}", "func (o *InlineObject72) SetRole(v ProjectsIdRolesJsonRole) {\n\to.Role = &v\n}", "func (o *DcimRacksListParams) SetRole(role *string) {\n\to.Role = role\n}", "func (o *StorageVdMemberEpAllOf) SetRole(v string) {\n\to.Role = &v\n}", "func (s *TestRoleInput) SetRole(v string) *TestRoleInput {\n\ts.Role = &v\n\treturn s\n}", "func (o *RoleMapping) SetRole(v RoleType) {\n\to.Role = v\n}", "func (uc *UserCreate) SetRole(i int) *UserCreate {\n\tuc.role = &i\n\treturn uc\n}", "func (uc *UserCreate) SetRole(i int) *UserCreate {\n\tuc.role = &i\n\treturn uc\n}", "func (c *ConfigurationFile) SetRole(name string) {\n\tc.CurrentRole = name\n}", "func (o *AuthNMappingUpdateRelationships) SetRole(v RelationshipToRole) {\n\to.Role = &v\n}", "func (o *IpamIPAddressesListParams) SetRole(role *string) {\n\to.Role = role\n}", "func (conf *ConfigType) SetRole(r Role) {\n\tconf.role = r\n}", "func (z *User) SetRoles(rolestr string) {\n\troles := strings.Split(rolestr, \",\")\n\tz.Roles = []string{}\n\tfor _, role := range roles {\n\t\tz.AddRole(strings.TrimSpace(role))\n\t}\n}", "func (uu *UserUpdate) SetRole(u user.Role) *UserUpdate {\n\tuu.role = &u\n\treturn uu\n}", "func (uuo *UserUpdateOne) SetRole(u user.Role) *UserUpdateOne {\n\tuuo.role = &u\n\treturn uuo\n}", "func (epc *EntryPointCreate) SetRole(fpr flowschema.EntryPointRole) *EntryPointCreate {\n\tepc.mutation.SetRole(fpr)\n\treturn epc\n}", "func (element *Element) Role(value string) *Element {\n\treturn element.Attr(\"role\", value)\n}", "func (o *BucketsCollectionGetParams) SetRole(role *string) {\n\to.Role = role\n}", "func (o *UserDisco) SetRole(v UserRoleEnum) {\n\to.Role = &v\n}", "func (me *TxsdContactRole) Set(s string) { (*xsdt.Nmtoken)(me).Set(s) }", "func TestGetSetRole(t *testing.T) {\n\troleTest1, _ := roleFactory.GetRole(1)\n\troleTest2, _ := roleFactory.GetRole(2)\n\troleTest3, _ := roleFactory.GetRole(3)\n\n\texampleUser := NewUser()\n\tfmt.Println(exampleUser.GetRoleValue())\n\n\texampleUser.SetRole(roleTest1)\n\tfmt.Println(exampleUser.GetRoleValue())\n\n\texampleUser.SetRole(roleTest2)\n\tfmt.Println(exampleUser.GetRoleValue())\n\n\texampleUser.SetRole(roleTest3)\n\tfmt.Println(exampleUser.GetRoleValue())\n}", "func setRoleManifest(roleManifestPath string, manifestContent []byte, releases Releases) (*RoleManifest, error) {\n\troleManifest := NewRoleManifest()\n\troleManifest.ManifestFilePath = roleManifestPath\n\troleManifest.ManifestContent = manifestContent\n\n\terr := yaml.Unmarshal(manifestContent, roleManifest)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\troleManifest.Configuration = &Configuration{RawTemplates: yaml.MapSlice{}}\n\troleManifest.LoadedReleases = releases\n\treturn roleManifest, nil\n}", "func (ac *ansibleConfig) setRole() error {\n\ti, err := ac.findEC2Instance()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, tag := range i.Tags {\n\t\tif tag.Key == ac.settings.RoleKey {\n\t\t\tac.Role = tag.Value\n\t\t}\n\t}\n\tif ac.Role == \"\" {\n\t\treturn errors.New(\"role tag not defined on ec2 instance \" + i.InstanceId)\n\t}\n\treturn nil\n}", "func (c *configuration) Role(clientSet ClientSet) *Role {\n\tif clientSet != nil {\n\t\treturn NewRole(clientSet)\n\t}\n\treturn nil\n\n}", "func (r *RoleCollection) SetRoles(input string) error {\n\troles := []Role{}\n\tif err := jsonUnmarshal([]byte(input), &roles); err != nil {\n\t\treturn fmt.Errorf(\"set roles was unable to unmarshal json with error %w\", err)\n\t}\n\treturn r.setRoles(roles)\n}", "func (m *EmployeeWorkingHoursMutation) SetRoleID(id int) {\n\tm.role = &id\n}", "func (t *AuroraTask) Role(role string) *AuroraTask {\n\tt.task.Job.Role = role\n\treturn t\n}", "func (s *Shell) ChangeRole(c *cli.Context) (err error) {\n\trequest := struct {\n\t\tEmail string `json:\"email\"`\n\t\tNewRole string `json:\"newRole\"`\n\t}{\n\t\tEmail: c.String(\"email\"),\n\t\tNewRole: c.String(\"new-role\"),\n\t}\n\n\trequestData, err := json.Marshal(request)\n\tif err != nil {\n\t\treturn s.errorOut(err)\n\t}\n\n\tbuf := bytes.NewBuffer(requestData)\n\tresponse, err := s.HTTP.Patch(\"/v2/users\", buf)\n\tif err != nil {\n\t\treturn s.errorOut(err)\n\t}\n\tdefer func() {\n\t\tif cerr := response.Body.Close(); cerr != nil {\n\t\t\terr = multierr.Append(err, cerr)\n\t\t}\n\t}()\n\n\treturn s.renderAPIResponse(response, &AdminUsersPresenter{}, \"Successfully updated API user\")\n}", "func (o BucketAccessControlTypeOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v BucketAccessControlType) *string { return v.Role }).(pulumi.StringPtrOutput)\n}", "func setRaftRole(t *testing.T, database *db.Node, address string) client.NodeStore {\n\trequire.NoError(t, database.Transaction(context.Background(), func(ctx context.Context, tx *db.NodeTx) error {\n\t\terr := tx.UpdateConfig(map[string]string{\"cluster.https_address\": address})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t_, err = tx.CreateRaftNode(address, \"test\")\n\t\treturn err\n\t}))\n\n\tstore := client.NewNodeStore(database.DB(), \"main\", \"raft_nodes\", \"address\")\n\treturn store\n}", "func (o *SetRoleParams) WithBody(body SetRoleBody) *SetRoleParams {\n\to.SetBody(body)\n\treturn o\n}", "func (s *Server) Set(ctx context.Context, r *proto.DeviceRoleChangeRequest) (*proto.DeviceRoleChangeResponse, error) {\n\tvar err error\n\tvar cfg = r.GetConfig()\n\tvar changeType = proto.DeviceRoleChange_UPDATED\n\n\tswitch r.GetChange() {\n\tcase proto.DeviceRoleChangeRequest_ADD:\n\t\tchangeType = proto.DeviceRoleChange_ADDED\n\t\terr = manager.GetManager().RoleStore.WriteRole(cfg, false)\n\tcase proto.DeviceRoleChangeRequest_UPDATE:\n\t\terr = manager.GetManager().RoleStore.WriteRole(cfg, true)\n\tcase proto.DeviceRoleChangeRequest_DELETE:\n\t\tchangeType = proto.DeviceRoleChange_DELETED\n\t\tcfg, err = manager.GetManager().RoleStore.DeleteRole(cfg.Role)\n\t}\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tchange := proto.DeviceRoleChange{\n\t\tChange: changeType,\n\t\tConfig: cfg,\n\t}\n\n\t// Queue up device role change for subscribers\n\tmanager.GetManager().ChangesChannel <- change\n\n\t// ...and return it to the caller\n\treturn &proto.DeviceRoleChangeResponse{\n\t\tChange: &change,\n\t}, nil\n}", "func (ref *UIElement) Role() string {\n\tret, _ := ref.StringAttr(RoleAttribute)\n\treturn ret\n}", "func (j *AuroraJob) Role(role string) Job {\n\tj.jobConfig.Key.Role = role\n\n\t// Will be deprecated\n\tidentity := &aurora.Identity{User: role}\n\tj.jobConfig.Owner = identity\n\tj.jobConfig.TaskConfig.Owner = identity\n\treturn j\n}", "func (s *SampleStore) SetRoles(roles []*model.Role) error {\n\ts.roles = make(map[string]*model.Role)\n\tfor _, role := range roles {\n\t\ts.roles[role.Id] = role\n\t}\n\treturn nil\n}", "func (o ObjectAccessControlTypeOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ObjectAccessControlType) *string { return v.Role }).(pulumi.StringPtrOutput)\n}", "func (gtx *GuardTx) Role(role *schema.Role) *schema.Role {\n\tif role == nil {\n\t\trole = &schema.Role{\n\t\t\tEntity: schema.Entity{DBContract: gtx.dbTx},\n\t\t}\n\t} else {\n\t\trole.DBContract = gtx.dbTx\n\t}\n\trole.SetValidator(gtx.validator.Role)\n\treturn role\n}", "func (a *Authorizer) SetRoleBinding(r RoleBinding) error {\n\tif r.Name == \"\" {\n\t\treturn errors.New(\"RoleBinding needs to have a name\")\n\t}\n\n\tif r.Role == \"\" {\n\t\treturn errors.New(\"RoleBinding needs to have a Role\")\n\t}\n\n\tif len(r.Subjects) == 0 {\n\t\treturn errors.New(\"RoleBinding needs to have at least a Subject\")\n\t}\n\n\tfor _, subject := range r.Subjects {\n\t\tif subject.Name == \"\" {\n\t\t\treturn errors.New(\"every Subject needs to have a name\")\n\t\t}\n\n\t\tif subject.Kind.String() == \"\" {\n\t\t\treturn errors.New(\"every Subject needs to have a valid type\")\n\t\t}\n\t}\n\n\ta.Lock()\n\ta.rolebindings[r.Name] = r\n\ta.Unlock()\n\treturn nil\n}", "func (o DataExchangeListingIamBindingOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *DataExchangeListingIamBinding) pulumi.StringOutput { return v.Role }).(pulumi.StringOutput)\n}", "func (dal *DalNavElement) AssignToRole(ctx context.Context, tx *sql.Tx,\n\telementID, roleId string,\n) error {\n\trecord := goqu.Record{\n\t\tCoreNavElementRole.NerRoleID: elementID,\n\t\tCoreNavElementRole.NerNavElementID: roleId,\n\t}\n\tins := NewInsert(T.CoreNavElementRole).Rows(record)\n\t_, err := DoInsert(ctx, tx, ins)\n\tif err != nil {\n\t\tDebugErr(ctx, err)\n\t\treturn err\n\t}\n\treturn nil\n}", "func (db *MySQLDB) UpdateRole(ctx context.Context, role *Role) error {\n\tfLog := mysqlLog.WithField(\"func\", \"UpdateRole\").WithField(\"RequestID\", ctx.Value(constants.RequestID))\n\texist, err := db.IsRoleRecIDExist(ctx, role.RecID)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !exist {\n\t\treturn ErrNotFound\n\t}\n\tq := \"UPDATE HANSIP_ROLE SET ROLE_NAME=?, ROLE_DOMAIN=?, DESCRIPTION=? WHERE REC_ID=?\"\n\t_, err = db.instance.ExecContext(ctx, q,\n\t\trole.RoleName, role.RoleDomain, role.Description, role.RecID)\n\tif err != nil {\n\t\tfLog.Errorf(\"db.instance.ExecContext got %s. SQL = %s\", err.Error(), q)\n\t\treturn &ErrDBExecuteError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error UpdateRole\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\treturn nil\n}", "func (m *RoleMutation) SetField(name string, value ent.Value) error {\n\tswitch name {\n\tcase role.FieldRole:\n\t\tv, ok := value.(string)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"unexpected type %T for field %s\", value, name)\n\t\t}\n\t\tm.SetRole(v)\n\t\treturn nil\n\t}\n\treturn fmt.Errorf(\"unknown Role field %s\", name)\n}", "func (z *User) RoleString() string {\n\tvar result string\n\tfor i, role := range z.Roles {\n\t\tif i > 0 {\n\t\t\tresult = result + \", \"\n\t\t}\n\t\tresult = result + role\n\t}\n\treturn result\n}", "func (o ClientTlsPolicyIamBindingOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ClientTlsPolicyIamBinding) pulumi.StringOutput { return v.Role }).(pulumi.StringOutput)\n}", "func (p *MockPeer) SetRoles(roles []string) {\r\n\tp.MockRoles = roles\r\n}", "func UpdateRole(c *gin.Context) {\n\tupdatedRole := model.Role{}\n\tc.BindJSON(&updatedRole)\n\n\terr := service.UpdateRole(updatedRole)\n\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\terror := service.GetGormErrorCode(err.Error())\n\n\t\tc.JSON(500, error)\n\t} else {\n\t\tc.String(200, \"ok\")\n\t}\n}", "func NewRoleFromString(s string) (Role, error) {\n\tswitch strings.ToLower(s) {\n\tcase \"none\":\n\t\treturn NoneRole, nil\n\tcase \"reader\":\n\t\treturn ReaderRole, nil\n\tcase \"writer\":\n\t\treturn WriterRole, nil\n\tcase \"admin\":\n\t\treturn AdminRole, nil\n\tdefault:\n\t\treturn NoneRole, fmt.Errorf(\"invalid role: %s\", s)\n\t}\n}", "func (m *UnifiedRoleAssignmentScheduleRequest) SetRoleDefinition(value UnifiedRoleDefinitionable)() {\n m.roleDefinition = value\n}", "func (o *Content) GetRole() string {\n\tif o == nil || o.Role == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Role\n}", "func (o *SetRoleParams) WithTimeout(timeout time.Duration) *SetRoleParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "func (a *ScalewayDomainV2alpha2ContactRoles_Roles) Set(fieldName string, value interface{}) {\n\tif a.AdditionalProperties == nil {\n\t\ta.AdditionalProperties = make(map[string]interface{})\n\t}\n\ta.AdditionalProperties[fieldName] = value\n}", "func (p *Permission) SetRoles(perm string) revel.Result {\n\tpermType := models.Permission{}\n\tif app.DB.Where(\"name = ?\", perm).First(&permType).RecordNotFound() {\n\t\treturn util.AppResponse{400, \"unknown role\", nil}\n\t}\n\troles := new([]models.Role)\n\tp.Params.BindJSON(&roles)\n\tapp.DB.Model(&permType).Association(\"Roles\").Clear()\n\tapp.DB.Model(&permType).Association(\"Roles\").Append(roles)\n\tapp.DB.Model(&permType).Related(&roles, \"Roles\")\n\treturn util.AppResponse{200, \"success\", roles}\n}", "func (p *MockPeer) SetRoles(roles []string) {\n\tp.MockRoles = roles\n}", "func (rg *Registry) RegisterRole(role Role, rights ...Right) {\n\trg.roles[role] = rights\n}", "func (m *RoleMutation) SetField(name string, value ent.Value) error {\n\tswitch name {\n\tcase role.FieldRoleName:\n\t\tv, ok := value.(string)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"unexpected type %T for field %s\", value, name)\n\t\t}\n\t\tm.SetRoleName(v)\n\t\treturn nil\n\t}\n\treturn fmt.Errorf(\"unknown Role field %s\", name)\n}", "func (o ObjectAccessControlResponseOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ObjectAccessControlResponse) string { return v.Role }).(pulumi.StringOutput)\n}", "func NewRoleSet(roles ...Role) RoleSet {\n\treturn roles\n}", "func (o BucketReplicationConfigurationPtrOutput) Role() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *BucketReplicationConfiguration) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Role\n\t}).(pulumi.StringPtrOutput)\n}", "func getRoleFromString(str string) *Role {\n\tfor i := 0; i < len(_Role_index)-1; i++ {\n\t\tif str == _Role_name[_Role_index[i]:_Role_index[i+1]] {\n\t\t\trole := Role(i)\n\t\t\treturn &role\n\t\t}\n\t}\n\treturn nil\n}", "func (s *Store) AssignRole(ctx context.Context, roleUser *RoleUser) error {\n\terr := roleUser.Validate()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = s.FindRoleByID(ctx, roleUser.RoleID)\n\tif err != nil {\n\t\treturn errors.Wrap(err, errors.ErrorNotFound, \"\")\n\t}\n\n\tselectedRoleUser := &RoleUser{}\n\terr = s.db.QueryRowxContext(\n\t\tctx,\n\t\t\"SELECT * FROM roles_users WHERE role_id = ? AND user_id = ? FOR UPDATE\",\n\t\troleUser.RoleID, roleUser.UserID,\n\t).StructScan(selectedRoleUser)\n\tif err != nil && err != sql.ErrNoRows {\n\t\treturn errors.Wrap(err, errors.ErrorUnknown, \"\")\n\t}\n\tif err == nil {\n\t\treturn errors.New(errors.ErrorAlreadyExists, \"\")\n\t}\n\n\t_, err = sqlx.NamedExecContext(\n\t\tctx,\n\t\ts.db,\n\t\t\"INSERT INTO roles_users (role_id, user_id) VALUES (:role_id, :user_id)\",\n\t\t&roleUser)\n\tif err != nil {\n\t\treturn errors.Wrap(err, errors.ErrorUnknown, \"\")\n\t}\n\treturn nil\n}", "func (o *MemberResponse) GetRole() string {\n\tif o == nil || o.Role == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Role\n}", "func (*TeleportRoleMarshaler) UnmarshalRole(bytes []byte) (Role, error) {\n\treturn UnmarshalRole(bytes)\n}", "func (o ServiceIamMemberOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ServiceIamMember) pulumi.StringOutput { return v.Role }).(pulumi.StringOutput)\n}", "func (g *GroupsService) AssignRole(group Group, role Role) (bool, *Response, error) {\n\treturn g.roleAction(group, role, \"$assign-role\")\n}", "func (o *SetRoleParams) WithHTTPClient(client *http.Client) *SetRoleParams {\n\to.SetHTTPClient(client)\n\treturn o\n}", "func (s *Server) UpdateRole(ctx context.Context, params *authorization.Role) (*authorization.Role, error) {\n\treturn &authorization.Role{}, nil\n}", "func (aaa *RolesService) SetRoleAsAdmin(input *roles.SetRoleAsAdminParams) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, badRequest, unauthorized, forbidden, notFound, err := aaa.Client.Roles.SetRoleAsAdmin(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (o BucketAccessControlResponseOutput) Role() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BucketAccessControlResponse) string { return v.Role }).(pulumi.StringOutput)\n}", "func (m *RoleMutation) SetField(name string, value ent.Value) error {\n\tswitch name {\n\tcase role.FieldName:\n\t\tv, ok := value.(string)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"unexpected type %T for field %s\", value, name)\n\t\t}\n\t\tm.SetName(v)\n\t\treturn nil\n\tcase role.FieldDescription:\n\t\tv, ok := value.(string)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"unexpected type %T for field %s\", value, name)\n\t\t}\n\t\tm.SetDescription(v)\n\t\treturn nil\n\tcase role.FieldUpdatedAt:\n\t\tv, ok := value.(time.Time)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"unexpected type %T for field %s\", value, name)\n\t\t}\n\t\tm.SetUpdatedAt(v)\n\t\treturn nil\n\tcase role.FieldCreatedAt:\n\t\tv, ok := value.(time.Time)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"unexpected type %T for field %s\", value, name)\n\t\t}\n\t\tm.SetCreatedAt(v)\n\t\treturn nil\n\t}\n\treturn fmt.Errorf(\"unknown Role field %s\", name)\n}", "func (pu *ProjectUtil) AssignRole(projectName, username string) error {\n\tif len(strings.TrimSpace(projectName)) == 0 ||\n\t\tlen(strings.TrimSpace(username)) == 0 {\n\t\treturn errors.New(\"Project name and username are required for assigning role\")\n\t}\n\n\tpid := pu.GetProjectID(projectName)\n\tif pid == -1 {\n\t\treturn fmt.Errorf(\"Failed to get project ID with name %s\", projectName)\n\t}\n\n\tm := models.Member{\n\t\tRoleID: 2,\n\t\tMemberUser: &models.MemUser{\n\t\t\tUserName: username,\n\t\t},\n\t}\n\n\tbody, err := json.Marshal(&m)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\turl := fmt.Sprintf(\"%s%s%d%s\", pu.rootURI, \"/api/v2.0/projects/\", pid, \"/members\")\n\tif err := pu.testingClient.Post(url, body); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (m *SequentialActivationRenewalsAlertIncident) SetRoleDefinitionId(value *string)() {\n err := m.GetBackingStore().Set(\"roleDefinitionId\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *UserMutation) SetRoleID(id int) {\n\tm.role = &id\n}", "func (sc *ServiceController) UpdateRole(name string, body map[string]interface{}) (bool, string) {\n\turl := urlRole(sc.ID, name)\n\n\treturn sc.c.boolResponse(\"PUT\", url, body)\n}", "func (n *Node) Role() string {\n\t// use the cached version populated by NewNode\n\treturn n.role\n}", "func (cl *APIClient) SetRoleCredentials(uid string, role string, pw string) *APIClient {\n\tif len(role) > 0 {\n\t\treturn cl.SetCredentials(uid+\"!\"+role, pw)\n\t}\n\treturn cl.SetCredentials(uid, pw)\n}", "func (m *SequentialActivationRenewalsAlertIncident) SetRoleDisplayName(value *string)() {\n err := m.GetBackingStore().Set(\"roleDisplayName\", value)\n if err != nil {\n panic(err)\n }\n}", "func (s Service) UpdateRole(ctx context.Context, docID, roleID []byte, dids []identity.DID) (*coredocumentpb.Role, error) {\n\treturn s.pendingDocSrv.UpdateRole(ctx, docID, roleID, dids)\n}", "func (m *RoleMutation) SetField(name string, value ent.Value) error {\n\tswitch name {\n\tcase role.FieldName:\n\t\tv, ok := value.(string)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"unexpected type %T for field %s\", value, name)\n\t\t}\n\t\tm.SetName(v)\n\t\treturn nil\n\tcase role.FieldTitle:\n\t\tv, ok := value.(string)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"unexpected type %T for field %s\", value, name)\n\t\t}\n\t\tm.SetTitle(v)\n\t\treturn nil\n\tcase role.FieldDescription:\n\t\tv, ok := value.(string)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"unexpected type %T for field %s\", value, name)\n\t\t}\n\t\tm.SetDescription(v)\n\t\treturn nil\n\tcase role.FieldStage:\n\t\tv, ok := value.(int)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"unexpected type %T for field %s\", value, name)\n\t\t}\n\t\tm.SetStage(v)\n\t\treturn nil\n\tcase role.FieldEtag:\n\t\tv, ok := value.([]byte)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"unexpected type %T for field %s\", value, name)\n\t\t}\n\t\tm.SetEtag(v)\n\t\treturn nil\n\t}\n\treturn fmt.Errorf(\"unknown Role field %s\", name)\n}", "func (b EntitlementBuilder) SetRoleData(data datastructure.EntitledRole) EntitlementBuilder {\n\treturn b.marshalData(data)\n}" ]
[ "0.7601339", "0.7427905", "0.73289317", "0.71653134", "0.709252", "0.7048541", "0.70082974", "0.69942594", "0.69493026", "0.6918413", "0.68714905", "0.6841258", "0.6782201", "0.67787164", "0.67478967", "0.67341834", "0.66740686", "0.6614993", "0.66060364", "0.6597959", "0.65770036", "0.6564203", "0.65423554", "0.65357065", "0.65056914", "0.6464197", "0.64607453", "0.6458538", "0.6458538", "0.64527345", "0.6316927", "0.63133", "0.62942", "0.62901664", "0.62560475", "0.6244415", "0.6235433", "0.6187066", "0.61715025", "0.60876876", "0.60245407", "0.6014793", "0.6005841", "0.59805083", "0.5932517", "0.5805489", "0.57709724", "0.5754263", "0.57240593", "0.5721123", "0.57151926", "0.57106674", "0.5707172", "0.56442267", "0.5623816", "0.56236655", "0.56232023", "0.5619798", "0.56019694", "0.5599948", "0.55612415", "0.5531853", "0.55288476", "0.5528299", "0.5523388", "0.5511344", "0.550277", "0.54767376", "0.54587525", "0.5457566", "0.5455515", "0.5448976", "0.54461604", "0.5445151", "0.54317546", "0.5430401", "0.5424779", "0.5424664", "0.54144686", "0.5412325", "0.5403961", "0.5392908", "0.5388438", "0.53825647", "0.53805405", "0.5379588", "0.5376933", "0.53709245", "0.53593636", "0.5358119", "0.5349632", "0.5349527", "0.5348176", "0.53389657", "0.53346336", "0.5325666", "0.53231084", "0.53131104", "0.53087187", "0.5306055" ]
0.6933644
9
GetCreatedTimestamp returns the CreatedTimestamp field value if set, zero value otherwise.
func (o *AccessRequestData) GetCreatedTimestamp() int64 { if o == nil || o.CreatedTimestamp == nil { var ret int64 return ret } return *o.CreatedTimestamp }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o EventDataStoreOutput) CreatedTimestamp() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *EventDataStore) pulumi.StringOutput { return v.CreatedTimestamp }).(pulumi.StringOutput)\n}", "func (o *AccessRequestData) SetCreatedTimestamp(v int64) {\n\to.CreatedTimestamp = &v\n}", "func (o *AccessRequestData) GetCreatedTimestampOk() (*int64, bool) {\n\tif o == nil || o.CreatedTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedTimestamp, true\n}", "func (o *SecureScore) GetCreatedDateTime() time.Time {\n\tif o == nil || o.CreatedDateTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.CreatedDateTime\n}", "func (o *InstanceStatusKubernetes) GetCreateTimestamp() float32 {\n\tif o == nil || o.CreateTimestamp == nil {\n\t\tvar ret float32\n\t\treturn ret\n\t}\n\treturn *o.CreateTimestamp\n}", "func (o *IncidentTeamResponseAttributes) GetCreated() time.Time {\n\tif o == nil || o.Created == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.Created\n}", "func (m *User) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.createdDateTime\n}", "func (m *CallTranscript) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"createdDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (m *Set) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"createdDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (o *Comment) GetCreatedAtTimestamp() int64 {\n\tif o == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\n\treturn o.CreatedAtTimestamp\n}", "func (o *FeatureFlag) GetCreated() time.Time {\n\tif o == nil || o.Created == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.Created\n}", "func (s *SessionTrackerV1) GetCreated() time.Time {\n\treturn s.Spec.Created\n}", "func (o *Transfer) GetCreated() time.Time {\n\tif o == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\n\treturn o.Created\n}", "func (o *PendingDeleteCluster) GetCreationTimestamp() (value time.Time, ok bool) {\n\tok = o != nil && o.bitmap_&32 != 0\n\tif ok {\n\t\tvalue = o.creationTimestamp\n\t}\n\treturn\n}", "func (m *ConditionalAccessPolicy) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"createdDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (a *Authorization) GetCreatedAt() Timestamp {\n\tif a == nil || a.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *a.CreatedAt\n}", "func (m *Group) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.createdDateTime\n}", "func (o *LocalDatabaseProvider) GetCreated() time.Time {\n\tif o == nil || o.Created == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.Created\n}", "func (m *ChatMessage) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.createdDateTime\n}", "func (m *Vulnerability) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"createdDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (o *AccessRequestData) HasCreatedTimestamp() bool {\n\tif o != nil && o.CreatedTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (r *Repository) GetCreatedAt() Timestamp {\n\tif r == nil || r.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *r.CreatedAt\n}", "func (m *ThreatAssessmentResult) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.createdDateTime\n}", "func (s *Subscription) GetCreatedAt() Timestamp {\n\tif s == nil || s.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *s.CreatedAt\n}", "func (o *ZoneZone) GetCreated() time.Time {\n\tif o == nil || o.Created == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.Created\n}", "func (m *AccessPackage) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.createdDateTime\n}", "func (h *Hook) GetCreatedAt() time.Time {\n\tif h == nil || h.CreatedAt == nil {\n\t\treturn time.Time{}\n\t}\n\treturn *h.CreatedAt\n}", "func (o *NormalizedProjectRevisionHook) GetCreatedAt() time.Time {\n\tif o == nil || o.CreatedAt == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.CreatedAt\n}", "func (m *ThreatAssessmentRequest) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.createdDateTime\n}", "func (m *ThreatAssessmentRequest) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"createdDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (o *ReservationModel) GetCreated() time.Time {\n\tif o == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\n\treturn o.Created\n}", "func (u *User) GetCreatedAt() Timestamp {\n\tif u == nil || u.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *u.CreatedAt\n}", "func (o *Lifecycle) GetCreatedAt() time.Time {\n\tif o == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\n\treturn o.CreatedAt\n}", "func (m *Application) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.createdDateTime\n}", "func (m *ManagementTemplateStepTenantSummary) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"createdDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (m *ManagedAppPolicy) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.createdDateTime\n}", "func (m *ManagementTemplateStep) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"createdDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (o *Content) GetCreatedTime() time.Time {\n\tif o == nil || o.CreatedTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.CreatedTime\n}", "func (d *Deployment) GetCreatedAt() Timestamp {\n\tif d == nil || d.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *d.CreatedAt\n}", "func (o *Handoff) GetCreatedAt() (value time.Time, ok bool) {\n\tok = o != nil && o.bitmap_&8 != 0\n\tif ok {\n\t\tvalue = o.createdAt\n\t}\n\treturn\n}", "func (s *StatusEvent) GetCreatedAt() Timestamp {\n\tif s == nil || s.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *s.CreatedAt\n}", "func (o *MicrosoftGraphWindows10CompliancePolicy) GetCreatedDateTime() time.Time {\n\tif o == nil || o.CreatedDateTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.CreatedDateTime\n}", "func (d *DeploymentStatus) GetCreatedAt() Timestamp {\n\tif d == nil || d.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *d.CreatedAt\n}", "func (o *LogicalDatabaseResponse) GetCreatedAt() time.Time {\n\tif o == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\n\treturn o.CreatedAt\n}", "func (i *Installation) GetCreatedAt() Timestamp {\n\tif i == nil || i.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *i.CreatedAt\n}", "func (o *ApiKey) GetCreated() string {\n\tif o == nil || o.Created == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Created\n}", "func (img Image) GetCreated() time.Time {\n\treturn img.Created\n}", "func (o *Ga4ghTumourboard) GetCreated() string {\n\tif o == nil || o.Created == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Created\n}", "func (e GenericPersistable) GetTimeCreated() time.Time {\n\t\treturn time.Now()\n\t}", "func (r *RepositoryRelease) GetCreatedAt() Timestamp {\n\tif r == nil || r.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *r.CreatedAt\n}", "func (p *PushEventRepository) GetCreatedAt() Timestamp {\n\tif p == nil || p.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *p.CreatedAt\n}", "func (o *RoleWithAccess) GetCreated() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Created\n}", "func (m *CustomAccessPackageWorkflowExtension) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"createdDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (g *Grant) GetCreatedAt() Timestamp {\n\tif g == nil || g.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *g.CreatedAt\n}", "func (o *SecureScore) GetCreatedDateTimeOk() (time.Time, bool) {\n\tif o == nil || o.CreatedDateTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret, false\n\t}\n\treturn *o.CreatedDateTime, true\n}", "func (o *Ga4ghChemotherapy) GetCreated() string {\n\tif o == nil || o.Created == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Created\n}", "func (m *LongRunningOperation) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"createdDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (fdf ExfatFileDirectoryEntry) CreateTimestamp() time.Time {\n\treturn fdf.CreateTimestampRaw.TimestampWithOffset(int(fdf.CreateUtcOffset))\n}", "func (p *Project) GetCreatedAt() Timestamp {\n\tif p == nil || p.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *p.CreatedAt\n}", "func (o *ImageImportOperation) GetCreatedAt() time.Time {\n\tif o == nil || o.CreatedAt == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.CreatedAt\n}", "func (r *RepositoryInvitation) GetCreatedAt() Timestamp {\n\tif r == nil || r.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *r.CreatedAt\n}", "func (e *Entity) Created() time.Time {\n\tcreated := e.Property(\"_created\").Int()\n\treturn time.Unix(int64(created), 0)\n}", "func (p *PagesBuild) GetCreatedAt() Timestamp {\n\tif p == nil || p.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *p.CreatedAt\n}", "func (o *MemberResponse) GetCreatedAt() time.Time {\n\tif o == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\n\treturn o.CreatedAt\n}", "func (o NetworkAttachmentOutput) CreationTimestamp() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *NetworkAttachment) pulumi.StringOutput { return v.CreationTimestamp }).(pulumi.StringOutput)\n}", "func (m *NamedLocation) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.createdDateTime\n}", "func (m *Migration) GetCreatedAt() time.Time { return m.CreatedAt }", "func (w *WebHookPayload) GetCreated() bool {\n\tif w == nil || w.Created == nil {\n\t\treturn false\n\t}\n\treturn *w.Created\n}", "func (t *TeamDiscussion) GetCreatedAt() Timestamp {\n\tif t == nil || t.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *t.CreatedAt\n}", "func (x WorkloadEntity) GetCreatedAt() *nrtime.EpochMilliseconds {\n\treturn x.CreatedAt\n}", "func (o *Comment) GetCreatedAtTimestampOk() (*int64, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.CreatedAtTimestamp, true\n}", "func (o *BaseItem) GetCreatedDateTime() time.Time {\n\tif o == nil || o.CreatedDateTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.CreatedDateTime\n}", "func (g *GistFork) GetCreatedAt() Timestamp {\n\tif g == nil || g.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *g.CreatedAt\n}", "func (o VpnGatewayOutput) CreationTimestamp() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *VpnGateway) pulumi.StringOutput { return v.CreationTimestamp }).(pulumi.StringOutput)\n}", "func (o *Giveaway) GetCreated() time.Time {\n\tif o == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\n\treturn o.Created\n}", "func (o *Commitstatus) GetCreatedOn() time.Time {\n\tif o == nil || o.CreatedOn == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.CreatedOn\n}", "func (o *PendingDeleteCluster) CreationTimestamp() time.Time {\n\tif o != nil && o.bitmap_&32 != 0 {\n\t\treturn o.creationTimestamp\n\t}\n\treturn time.Time{}\n}", "func (m *AccessPackageCatalog) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.createdDateTime\n}", "func (m *DeviceManagementConfigurationPolicy) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"createdDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (m *TeamsAsyncOperation) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.createdDateTime\n}", "func (m *DeviceAndAppManagementAssignmentFilter) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"createdDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (t *Timeline) GetCreatedAt() time.Time {\n\tif t == nil || t.CreatedAt == nil {\n\t\treturn time.Time{}\n\t}\n\treturn *t.CreatedAt\n}", "func (p *ProjectColumn) GetCreatedAt() Timestamp {\n\tif p == nil || p.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *p.CreatedAt\n}", "func (o *InstanceStatusKubernetes) GetCreateTimestampOk() (*float32, bool) {\n\tif o == nil || o.CreateTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreateTimestamp, true\n}", "func (o *Snippet) GetCreatedOn() time.Time {\n\tif o == nil || o.CreatedOn == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.CreatedOn\n}", "func (lockedCtx *UserCtx) CreatedTime() time.Time {\n\treturn lockedCtx.created\n}", "func (o *RecurrenceRepetition) GetCreatedAt() time.Time {\n\tif o == nil || o.CreatedAt == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.CreatedAt\n}", "func (m *EducationAssignment) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.createdDateTime\n}", "func (o *Authorization) GetCreatedAt() time.Time {\n\tif o == nil || o.CreatedAt == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.CreatedAt\n}", "func (o *MicrosoftGraphSharedPcConfiguration) GetCreatedDateTime() time.Time {\n\tif o == nil || o.CreatedDateTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.CreatedDateTime\n}", "func (r *ReleaseAsset) GetCreatedAt() Timestamp {\n\tif r == nil || r.CreatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *r.CreatedAt\n}", "func (o RegionTargetHttpsProxyOutput) CreationTimestamp() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *RegionTargetHttpsProxy) pulumi.StringOutput { return v.CreationTimestamp }).(pulumi.StringOutput)\n}", "func (o *DeeplinkRule) GetCreated() string {\n\tif o == nil || o.Created == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Created\n}", "func (o *DeeplinkApp) GetCreatedTs() int32 {\n\tif o == nil || o.CreatedTs == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.CreatedTs\n}", "func (o *Vm) GetCreatedOn() time.Time {\n\tif o == nil || o.CreatedOn == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.CreatedOn\n}", "func (cd *CreationDateField) GetCreationTime() common.Timestamp {\n\treturn cd.CreationDate\n}", "func (m *ProgramControl) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"createdDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (m *Model) GetCreatedAt() time.Time {\n\treturn m.CreatedAt\n}", "func (m *ItemFacet) GetCreatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"createdDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (o *Wireless) GetCreatedAt() float32 {\n\tif o == nil || o.CreatedAt == nil {\n\t\tvar ret float32\n\t\treturn ret\n\t}\n\treturn *o.CreatedAt\n}" ]
[ "0.733542", "0.7253468", "0.72143674", "0.71570736", "0.71235895", "0.7112109", "0.70619345", "0.7045454", "0.70323634", "0.6990017", "0.6938418", "0.69281167", "0.6919914", "0.6893275", "0.6867365", "0.6867259", "0.6849889", "0.6819258", "0.6781062", "0.6777412", "0.67762053", "0.67730117", "0.6767907", "0.6760008", "0.6754931", "0.6736135", "0.67350173", "0.6732261", "0.67212856", "0.6715277", "0.6711675", "0.6700652", "0.6697333", "0.66870004", "0.66655207", "0.66570115", "0.6655767", "0.6628915", "0.6621874", "0.6611741", "0.6601453", "0.6597169", "0.65917224", "0.65911", "0.6586704", "0.6585162", "0.65796953", "0.65715957", "0.65684927", "0.65626556", "0.65596175", "0.65434086", "0.6540704", "0.6538378", "0.6527938", "0.6527611", "0.6515791", "0.65131396", "0.65085644", "0.6496346", "0.6489931", "0.64858544", "0.64840305", "0.6482661", "0.64774567", "0.6477033", "0.647163", "0.6468873", "0.64660144", "0.6463814", "0.6460109", "0.6454493", "0.64466864", "0.6431308", "0.6424636", "0.6422973", "0.6421805", "0.6420373", "0.6406837", "0.64060843", "0.6390676", "0.63880473", "0.6383453", "0.6381691", "0.63793725", "0.6370026", "0.6367137", "0.63653046", "0.6346942", "0.6344242", "0.6341783", "0.6332558", "0.63287234", "0.63271785", "0.63233143", "0.6320096", "0.6309299", "0.63051194", "0.6279164", "0.62778914" ]
0.81903744
0
GetCreatedTimestampOk returns a tuple with the CreatedTimestamp field value if set, nil otherwise and a boolean to check if the value has been set.
func (o *AccessRequestData) GetCreatedTimestampOk() (*int64, bool) { if o == nil || o.CreatedTimestamp == nil { return nil, false } return o.CreatedTimestamp, true }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *InstanceStatusKubernetes) GetCreateTimestampOk() (*float32, bool) {\n\tif o == nil || o.CreateTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreateTimestamp, true\n}", "func (o *SecureScore) GetCreatedDateTimeOk() (time.Time, bool) {\n\tif o == nil || o.CreatedDateTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret, false\n\t}\n\treturn *o.CreatedDateTime, true\n}", "func (o *Comment) GetCreatedAtTimestampOk() (*int64, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.CreatedAtTimestamp, true\n}", "func (o *FeatureFlag) GetCreatedOk() (time.Time, bool) {\n\tif o == nil || o.Created == nil {\n\t\tvar ret time.Time\n\t\treturn ret, false\n\t}\n\treturn *o.Created, true\n}", "func (o *IncidentTeamResponseAttributes) GetCreatedOk() (*time.Time, bool) {\n\tif o == nil || o.Created == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Created, true\n}", "func (o *AccessRequestData) HasCreatedTimestamp() bool {\n\tif o != nil && o.CreatedTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ZoneZone) GetCreatedOk() (*time.Time, bool) {\n\tif o == nil || o.Created == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Created, true\n}", "func (o *LocalDatabaseProvider) GetCreatedOk() (*time.Time, bool) {\n\tif o == nil || o.Created == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Created, true\n}", "func (o *NormalizedProjectRevisionHook) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *Lifecycle) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.CreatedAt, true\n}", "func (o *ApiKey) GetCreatedOk() (*string, bool) {\n\tif o == nil || o.Created == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Created, true\n}", "func (o *MicrosoftGraphWindows10CompliancePolicy) GetCreatedDateTimeOk() (time.Time, bool) {\n\tif o == nil || o.CreatedDateTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret, false\n\t}\n\treturn *o.CreatedDateTime, true\n}", "func (o *LogicalDatabaseResponse) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.CreatedAt, true\n}", "func (o *MicrosoftGraphSharedPcConfiguration) GetCreatedDateTimeOk() (time.Time, bool) {\n\tif o == nil || o.CreatedDateTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret, false\n\t}\n\treturn *o.CreatedDateTime, true\n}", "func (o *DeeplinkApp) GetCreatedTsOk() (*int32, bool) {\n\tif o == nil || o.CreatedTs == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedTs, true\n}", "func (o *Transfer) GetCreatedOk() (*time.Time, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Created, true\n}", "func (o *ReservationModel) GetCreatedOk() (*time.Time, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Created, true\n}", "func (o *Ga4ghTumourboard) GetCreatedOk() (string, bool) {\n\tif o == nil || o.Created == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.Created, true\n}", "func (o *RecurrenceRepetition) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *ProjectApiKey) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *NewData) GetTimestampOk() (*string, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *Authorization) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *Wireless) GetCreatedAtOk() (float32, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\tvar ret float32\n\t\treturn ret, false\n\t}\n\treturn *o.CreatedAt, true\n}", "func (o *SmscSession) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *PiggyBankEvent) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *Ga4ghChemotherapy) GetCreatedOk() (string, bool) {\n\tif o == nil || o.Created == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.Created, true\n}", "func (o *ActionDTO) GetTimestampOk() (*string, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *RoleWithAccess) GetCreatedOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Created, true\n}", "func (o *Snippet) GetCreatedOnOk() (*time.Time, bool) {\n\tif o == nil || o.CreatedOn == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedOn, true\n}", "func (o *Commitstatus) GetCreatedOnOk() (*time.Time, bool) {\n\tif o == nil || o.CreatedOn == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedOn, true\n}", "func (o *Content) GetCreatedTimeOk() (*time.Time, bool) {\n\tif o == nil || o.CreatedTime == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedTime, true\n}", "func (o *Channel) GetCreatedAtOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.CreatedAt, true\n}", "func (o *BaseItem) GetCreatedDateTimeOk() (time.Time, bool) {\n\tif o == nil || o.CreatedDateTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret, false\n\t}\n\treturn *o.CreatedDateTime, true\n}", "func (o *Account) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.CreatedAt, true\n}", "func (o *HyperflexSnapshotStatus) GetTimestampOk() (*int64, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *ImageImportOperation) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *HyperflexClusterHealthCheckExecutionSnapshot) GetTimestampOk() (*time.Time, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *MemberResponse) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.CreatedAt, true\n}", "func (o *ResourceVersion) GetCreationTsOk() (*int64, bool) {\n\tif o == nil || o.CreationTs == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreationTs, true\n}", "func (o *BulletinDTO) GetTimestampOk() (*string, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *Vm) GetCreatedOnOk() (*time.Time, bool) {\n\tif o == nil || o.CreatedOn == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedOn, true\n}", "func (o *BankTransferSweep) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.CreatedAt, true\n}", "func (o *Service) GetCreatedAtOk() (float32, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\tvar ret float32\n\t\treturn ret, false\n\t}\n\treturn *o.CreatedAt, true\n}", "func (o *IdentityAccount) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *EventAttributes) GetTimestampOk() (*int64, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *ViewCustomFieldTask) GetCreatedAtOk() (*string, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *ShortenBitlinkBodyAllOf) GetCreatedAtOk() (*string, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *ServiceCheck) GetTimestampOk() (*int64, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *ProjectDeploymentRuleResponse) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.CreatedAt, true\n}", "func (o *DeeplinkRule) GetCreatedOk() (*string, bool) {\n\tif o == nil || o.Created == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Created, true\n}", "func (o *ArchivedAnalysis) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *DeviceParameterValue) GetTimestampOk() (*string, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *VulnUpdateNotification) GetCreatedAtOk() (*int32, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *PaymentStatusUpdateWebhook) GetTimestampOk() (*time.Time, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Timestamp, true\n}", "func (o *LogContent) GetTimestampOk() (*time.Time, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *IPAllowlistEntryAttributes) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *MicrosoftGraphListItem) GetCreatedDateTimeOk() (time.Time, bool) {\n\tif o == nil || o.CreatedDateTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret, false\n\t}\n\treturn *o.CreatedDateTime, true\n}", "func (o *ModelsUser) GetCreatedAtOk() (*string, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *HyperflexHealthCheckPackageChecksum) GetTimestampOk() (*time.Time, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *InstanceStatusKubernetes) HasCreateTimestamp() bool {\n\tif o != nil && o.CreateTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *GetMessagesAllOf) GetTimestampOk() (*interface{}, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Timestamp, true\n}", "func (o *DeviceResourceVersionValueWeb) GetTimestampOk() (*string, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *AvailableBudget) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *ShowSystem) GetCreatedDateOk() (*string, bool) {\n\tif o == nil || IsNil(o.CreatedDate) {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedDate, true\n}", "func (o *DatasetEvent) GetTimestampOk() (*string, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *AccessRequestData) GetCreatedTimestamp() int64 {\n\tif o == nil || o.CreatedTimestamp == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.CreatedTimestamp\n}", "func (o *URL) GetCreatedAtOk() (*time.Time, bool) {\n\tif o == nil || IsNil(o.CreatedAt) {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *RiskRulesListAllOfData) GetCreatedAtOk() (*string, bool) {\n\tif o == nil || IsNil(o.CreatedAt) {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *ViewUserDashboard) GetCreatedAtOk() (*string, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *IncidentTeamResponseAttributes) HasCreated() bool {\n\treturn o != nil && o.Created != nil\n}", "func (o *PostWebhook) GetTagCreatedOk() (*bool, bool) {\n\tif o == nil || o.TagCreated == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TagCreated, true\n}", "func (o *Invitation) GetCreatedAtOk() (*string, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *TenantWithOfferWeb) GetCreationTsOk() (*int64, bool) {\n\tif o == nil || o.CreationTs == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreationTs, true\n}", "func (w *WebHookPayload) GetCreated() bool {\n\tif w == nil || w.Created == nil {\n\t\treturn false\n\t}\n\treturn *w.Created\n}", "func WasCreated(o metav1.Object) bool {\n\t// This looks a little different from WasDeleted because DeletionTimestamp\n\t// returns a reference while CreationTimestamp returns a value.\n\tt := o.GetCreationTimestamp()\n\treturn !t.IsZero()\n}", "func (o *SecureScore) HasCreatedDateTime() bool {\n\tif o != nil && o.CreatedDateTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *UserDisco) GetCreatedAtOk() (*int64, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *Handoff) GetCreatedAt() (value time.Time, ok bool) {\n\tok = o != nil && o.bitmap_&8 != 0\n\tif ok {\n\t\tvalue = o.createdAt\n\t}\n\treturn\n}", "func (o *SecurityProblemEvent) GetTimestampOk() (*int64, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *ViewProjectBudget) GetCreatedAtOk() (*string, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *InlineResponse20027Person) GetCreatedAtOk() (*string, bool) {\n\tif o == nil || o.CreatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedAt, true\n}", "func (o *PostWebhook) GetPrCreatedOk() (*bool, bool) {\n\tif o == nil || o.PrCreated == nil {\n\t\treturn nil, false\n\t}\n\treturn o.PrCreated, true\n}", "func (o *PendingDeleteCluster) GetCreationTimestamp() (value time.Time, ok bool) {\n\tok = o != nil && o.bitmap_&32 != 0\n\tif ok {\n\t\tvalue = o.creationTimestamp\n\t}\n\treturn\n}", "func (o *Service) GetServiceCreatedAtOk() (float32, bool) {\n\tif o == nil || o.ServiceCreatedAt == nil {\n\t\tvar ret float32\n\t\treturn ret, false\n\t}\n\treturn *o.ServiceCreatedAt, true\n}", "func (o *ViewProjectBudget) GetDateCreatedOk() (*string, bool) {\n\tif o == nil || o.DateCreated == nil {\n\t\treturn nil, false\n\t}\n\treturn o.DateCreated, true\n}", "func (m *TokenMutation) CreatedAt() (r time.Time, exists bool) {\n\tv := m.created_at\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (o *AccessKey) GetCreationDateOk() (*string, bool) {\n\tif o == nil || o.CreationDate == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreationDate, true\n}", "func (o *ViewMilestone) GetCreatedOnOk() (*string, bool) {\n\tif o == nil || o.CreatedOn == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedOn, true\n}", "func (o *IncidentTeamResponseAttributes) GetCreated() time.Time {\n\tif o == nil || o.Created == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.Created\n}", "func (o *Volume) GetCreationDateOk() (*string, bool) {\n\tif o == nil || o.CreationDate == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreationDate, true\n}", "func (o *MicrosoftGraphWindows10CompliancePolicy) HasCreatedDateTime() bool {\n\tif o != nil && o.CreatedDateTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AccessRequestData) SetCreatedTimestamp(v int64) {\n\to.CreatedTimestamp = &v\n}", "func (o *DataExportQuery) GetCreatedBeforeOk() (*int32, bool) {\n\tif o == nil || o.CreatedBefore == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedBefore, true\n}", "func (o *NormalizedProjectRevisionHook) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o EventDataStoreOutput) CreatedTimestamp() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *EventDataStore) pulumi.StringOutput { return v.CreatedTimestamp }).(pulumi.StringOutput)\n}", "func (o *SecurityProblem) GetFirstSeenTimestampOk() (*int64, bool) {\n\tif o == nil || o.FirstSeenTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.FirstSeenTimestamp, true\n}", "func (o *FeatureFlag) GetCreated() time.Time {\n\tif o == nil || o.Created == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.Created\n}", "func (o *InlineResponse20034Milestone) GetCreatedOnOk() (*string, bool) {\n\tif o == nil || o.CreatedOn == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedOn, true\n}", "func (m *UserMutation) CreatedAt() (r time.Time, exists bool) {\n\tv := m.created_at\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (m *UserMutation) CreatedAt() (r time.Time, exists bool) {\n\tv := m.created_at\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}" ]
[ "0.79766554", "0.7756692", "0.7752898", "0.75658107", "0.7564472", "0.7487447", "0.7467725", "0.7441611", "0.73352545", "0.729879", "0.72933596", "0.7291611", "0.72639084", "0.7248168", "0.72409433", "0.72188914", "0.7182752", "0.7147611", "0.71170324", "0.71060306", "0.7102338", "0.7085202", "0.70805854", "0.70788205", "0.7074391", "0.70664424", "0.7039182", "0.7032929", "0.70268434", "0.70103824", "0.70067006", "0.70022935", "0.6992286", "0.6965544", "0.6965126", "0.6958903", "0.6956498", "0.6955651", "0.6946572", "0.6915154", "0.69099665", "0.69026536", "0.6899351", "0.68977565", "0.6877865", "0.687727", "0.6870072", "0.6863188", "0.6847442", "0.6844881", "0.68369514", "0.6829717", "0.68243915", "0.6818442", "0.67884684", "0.67823476", "0.6770899", "0.6749473", "0.6736079", "0.6721683", "0.6720969", "0.6700972", "0.6684142", "0.6680706", "0.6673093", "0.66545844", "0.66380954", "0.6636941", "0.66085327", "0.6604869", "0.6603839", "0.660244", "0.65938324", "0.65704423", "0.65558857", "0.65554863", "0.65460074", "0.6441998", "0.64272857", "0.64244527", "0.64158463", "0.63674885", "0.63613826", "0.63506365", "0.6314331", "0.6278382", "0.6267406", "0.62551486", "0.6242295", "0.6218917", "0.62157124", "0.6202474", "0.61978006", "0.61846614", "0.6172541", "0.61440545", "0.61424184", "0.614082", "0.6132104", "0.6132104" ]
0.85020834
0
HasCreatedTimestamp returns a boolean if a field has been set.
func (o *AccessRequestData) HasCreatedTimestamp() bool { if o != nil && o.CreatedTimestamp != nil { return true } return false }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *SecureScore) HasCreatedDateTime() bool {\n\tif o != nil && o.CreatedDateTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InstanceStatusKubernetes) HasCreateTimestamp() bool {\n\tif o != nil && o.CreateTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphWindows10CompliancePolicy) HasCreatedDateTime() bool {\n\tif o != nil && o.CreatedDateTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *NewData) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *IncidentTeamResponseAttributes) HasCreated() bool {\n\treturn o != nil && o.Created != nil\n}", "func (o *Content) HasCreatedTime() bool {\n\tif o != nil && o.CreatedTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ActionDTO) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *BulletinDTO) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *NormalizedProjectRevisionHook) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *HyperflexSnapshotStatus) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ServiceCheck) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *LocalDatabaseProvider) HasCreated() bool {\n\tif o != nil && o.Created != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *BaseItem) HasCreatedDateTime() bool {\n\tif o != nil && o.CreatedDateTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ShowSystem) HasCreatedDate() bool {\n\tif o != nil && !IsNil(o.CreatedDate) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewCustomFieldTask) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *EventAttributes) HasTimestamp() bool {\n\treturn o != nil && o.Timestamp != nil\n}", "func (o *ApiKey) HasCreated() bool {\n\tif o != nil && o.Created != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ModelsUser) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *LogContent) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *HyperflexClusterHealthCheckExecutionSnapshot) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FeatureFlag) HasCreated() bool {\n\tif o != nil && o.Created != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphSharedPcConfiguration) HasCreatedDateTime() bool {\n\tif o != nil && o.CreatedDateTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphListItem) HasCreatedDateTime() bool {\n\tif o != nil && o.CreatedDateTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DatasetEvent) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Ga4ghTumourboard) HasCreated() bool {\n\tif o != nil && o.Created != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Wireless) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DeviceParameterValue) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewUserDashboard) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Service) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Authorization) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func WasCreated(o metav1.Object) bool {\n\t// This looks a little different from WasDeleted because DeletionTimestamp\n\t// returns a reference while CreationTimestamp returns a value.\n\tt := o.GetCreationTimestamp()\n\treturn !t.IsZero()\n}", "func (o *Snippet) HasCreatedOn() bool {\n\tif o != nil && o.CreatedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *VulnUpdateNotification) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *PiggyBankEvent) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SecurityProblemEvent) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DeviceResourceVersionValueWeb) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Vm) HasCreatedOn() bool {\n\tif o != nil && o.CreatedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *HyperflexHealthCheckPackageChecksum) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *GetMessagesAllOf) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ZoneZone) HasCreated() bool {\n\tif o != nil && o.Created != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AccessRequestData) GetCreatedTimestampOk() (*int64, bool) {\n\tif o == nil || o.CreatedTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedTimestamp, true\n}", "func (o *ViewProjectBudget) HasDateCreated() bool {\n\tif o != nil && o.DateCreated != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ShortenBitlinkBodyAllOf) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Ga4ghChemotherapy) HasCreated() bool {\n\tif o != nil && o.Created != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *RecurrenceRepetition) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ProjectApiKey) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (d UserData) HasCreateDate() bool {\n\treturn d.ModelData.Has(models.NewFieldName(\"CreateDate\", \"create_date\"))\n}", "func (o *ViewProjectBudget) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ImageImportOperation) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DeeplinkApp) HasCreatedTs() bool {\n\tif o != nil && o.CreatedTs != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Commitstatus) HasCreatedOn() bool {\n\tif o != nil && o.CreatedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *UserDisco) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SmscSession) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AccessKey) HasCreationDate() bool {\n\tif o != nil && o.CreationDate != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DeeplinkRule) HasCreated() bool {\n\tif o != nil && o.Created != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *IdentityAccount) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (w *WebHookPayload) GetCreated() bool {\n\tif w == nil || w.Created == nil {\n\t\treturn false\n\t}\n\treturn *w.Created\n}", "func (o *Invitation) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ResourceVersion) HasCreationTs() bool {\n\tif o != nil && o.CreationTs != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Volume) HasCreationDate() bool {\n\tif o != nil && o.CreationDate != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InlineResponse20027Person) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ArchivedAnalysis) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Post) HasReceivedDateTime() bool {\n\tif o != nil && o.ReceivedDateTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewMilestone) HasCreatedOn() bool {\n\tif o != nil && o.CreatedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AvailableBudget) HasCreatedAt() bool {\n\tif o != nil && o.CreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *RiskRulesListAllOfData) HasCreatedAt() bool {\n\tif o != nil && !IsNil(o.CreatedAt) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InlineResponse20034Milestone) HasCreatedOn() bool {\n\tif o != nil && o.CreatedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InstanceStatusKubernetes) GetCreateTimestampOk() (*float32, bool) {\n\tif o == nil || o.CreateTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreateTimestamp, true\n}", "func (o *HyperflexVmSnapshotInfoAllOf) HasSourceTimestamp() bool {\n\tif o != nil && o.SourceTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *IPAllowlistEntryAttributes) HasCreatedAt() bool {\n\treturn o != nil && o.CreatedAt != nil\n}", "func (o *InlineResponse20014Projects) HasCreatedOn() bool {\n\tif o != nil && o.CreatedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (d *Desc) IsCreated() bool {\n\td.createLock.RLock()\n\tdefer d.createLock.RUnlock()\n\n\treturn d.isCreated\n}", "func (p *PushEvent) GetCreated() bool {\n\tif p == nil || p.Created == nil {\n\t\treturn false\n\t}\n\treturn *p.Created\n}", "func (o *DataExportQuery) HasCreatedBefore() bool {\n\tif o != nil && o.CreatedBefore != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Environment) HasCreationDate() bool {\n\tif o != nil && o.CreationDate != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SecureScore) GetCreatedDateTimeOk() (time.Time, bool) {\n\tif o == nil || o.CreatedDateTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret, false\n\t}\n\treturn *o.CreatedDateTime, true\n}", "func (o *Service) HasServiceCreatedAt() bool {\n\tif o != nil && o.ServiceCreatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InlineResponse20051TodoItems) HasCreatedOn() bool {\n\tif o != nil && o.CreatedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (st *Store) IsCreated() bool {\n\treturn true\n}", "func (o *AccessRequestData) HasExpirationTimestamp() bool {\n\tif o != nil && o.ExpirationTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *TenantWithOfferWeb) HasCreationTs() bool {\n\tif o != nil && o.CreationTs != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *PostWebhook) HasTagCreated() bool {\n\tif o != nil && o.TagCreated != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FeatureFlag) GetCreatedOk() (time.Time, bool) {\n\tif o == nil || o.Created == nil {\n\t\tvar ret time.Time\n\t\treturn ret, false\n\t}\n\treturn *o.Created, true\n}", "func (o *InlineResponse20033Milestones) HasCreatedOn() bool {\n\tif o != nil && o.CreatedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *PostWebhook) HasPrCreated() bool {\n\tif o != nil && o.PrCreated != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AccessRequestData) SetCreatedTimestamp(v int64) {\n\to.CreatedTimestamp = &v\n}", "func (m *TokenMutation) CreatedAt() (r time.Time, exists bool) {\n\tv := m.created_at\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (m *UserMutation) CreatedAt() (r time.Time, exists bool) {\n\tv := m.created_at\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (m *UserMutation) CreatedAt() (r time.Time, exists bool) {\n\tv := m.created_at\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (m *UserMutation) CreatedAt() (r time.Time, exists bool) {\n\tv := m.created_at\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (o *ViewCustomFieldTask) HasCreatedBy() bool {\n\tif o != nil && o.CreatedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *URL) HasCreatedAt() bool {\n\tif o != nil && !IsNil(o.CreatedAt) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Comment) GetCreatedAtTimestampOk() (*int64, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.CreatedAtTimestamp, true\n}", "func (o *MicrosoftGraphUsageDetails) HasLastModifiedDateTime() bool {\n\tif o != nil && o.LastModifiedDateTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *UserMutation) CreatedAt() (r time.Time, exists bool) {\n\tv := m.createdAt\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (o *SecurityProblem) HasFirstSeenTimestamp() bool {\n\tif o != nil && o.FirstSeenTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AccessRequestData) GetCreatedTimestamp() int64 {\n\tif o == nil || o.CreatedTimestamp == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.CreatedTimestamp\n}", "func (o *SecurityProblem) HasLastUpdatedTimestamp() bool {\n\tif o != nil && o.LastUpdatedTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *LocalDatabaseProvider) GetCreatedOk() (*time.Time, bool) {\n\tif o == nil || o.Created == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Created, true\n}", "func (m *ProfileMutation) CreatedAt() (r time.Time, exists bool) {\n\tv := m.createdAt\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}" ]
[ "0.7635653", "0.76296335", "0.71708095", "0.7166095", "0.70998865", "0.7083333", "0.7064311", "0.70459265", "0.7038226", "0.7037386", "0.70354944", "0.7024472", "0.70197123", "0.7008103", "0.6932781", "0.6922684", "0.6892192", "0.6853825", "0.6851016", "0.68441415", "0.6834863", "0.6796099", "0.67860436", "0.6770641", "0.6752243", "0.6748525", "0.67072433", "0.6688192", "0.66844386", "0.6679484", "0.66780156", "0.6657818", "0.66504204", "0.66378623", "0.66223544", "0.6617924", "0.659948", "0.6597815", "0.6594459", "0.6590388", "0.65884244", "0.6562518", "0.6562142", "0.656106", "0.6560551", "0.6555072", "0.6544671", "0.6513389", "0.6486106", "0.6472105", "0.64477646", "0.64236635", "0.6420585", "0.64029765", "0.63812953", "0.63766", "0.6352741", "0.6346291", "0.6343819", "0.6339192", "0.63333184", "0.63227093", "0.6298917", "0.6286503", "0.62844455", "0.62295127", "0.6226047", "0.6215902", "0.6213376", "0.62071455", "0.6177109", "0.6169984", "0.61595", "0.6143801", "0.6138518", "0.6138195", "0.61148053", "0.61056423", "0.61054415", "0.60871756", "0.6085032", "0.6047486", "0.60250854", "0.6006322", "0.5991718", "0.597303", "0.59658974", "0.5965066", "0.5965066", "0.5965066", "0.59582484", "0.59518987", "0.5951551", "0.59501284", "0.59426785", "0.59385437", "0.59383315", "0.5914334", "0.5904635", "0.58996165" ]
0.82408744
0
SetCreatedTimestamp gets a reference to the given int64 and assigns it to the CreatedTimestamp field.
func (o *AccessRequestData) SetCreatedTimestamp(v int64) { o.CreatedTimestamp = &v }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (m *User) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.createdDateTime = value\n}", "func (m *AccessPackage) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.createdDateTime = value\n}", "func (m *Set) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"createdDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *CallTranscript) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"createdDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *AccessPackageCatalog) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.createdDateTime = value\n}", "func (m *Group) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.createdDateTime = value\n}", "func (m *Vulnerability) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"createdDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *ThreatAssessmentResult) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.createdDateTime = value\n}", "func (o *LocalDatabaseProvider) SetCreated(v time.Time) {\n\to.Created = &v\n}", "func (m *LongRunningOperation) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"createdDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *ManagedAppPolicy) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.createdDateTime = value\n}", "func (m *Application) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.createdDateTime = value\n}", "func (m *EducationAssignment) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.createdDateTime = value\n}", "func (m *CustomAccessPackageWorkflowExtension) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"createdDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *ChatMessage) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.createdDateTime = value\n}", "func (m *ThreatAssessmentRequest) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.createdDateTime = value\n}", "func (o *FeatureFlag) SetCreated(v time.Time) {\n\to.Created = &v\n}", "func (m *NamedLocation) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.createdDateTime = value\n}", "func (m *TeamsAsyncOperation) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.createdDateTime = value\n}", "func (o *Transfer) SetCreated(v time.Time) {\n\to.Created = v\n}", "func (m *ManagementTemplateStep) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"createdDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *ConditionalAccessPolicy) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"createdDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (o *AccessRequestData) GetCreatedTimestamp() int64 {\n\tif o == nil || o.CreatedTimestamp == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.CreatedTimestamp\n}", "func setCreatedTimeStamp(scope *gorm.Scope) {\n\tif !scope.HasError() {\n\t\tif createdAtField, ok := scope.FieldByName(\"CreatedAt\"); ok {\n\t\t\t// If its blank then only we update it with current timestamp\n\t\t\t// This is done because sometimes we may get the timestamp from\n\t\t\t// other service or we might need to set it ourselves\n\t\t\tif createdAtField.IsBlank {\n\t\t\t\tcreatedAtField.Set(utils.GetCurrentTimeStamp())\n\t\t\t}\n\t\t}\n\n\t\tsetUpdatedTimeStamp(scope)\n\t}\n}", "func (m *ThreatAssessmentRequest) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"createdDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (g *Generator) SetCreated(created time.Time) {\n\tg.image.Created = &created\n}", "func (m *ManagementTemplateStepTenantSummary) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"createdDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (b *ClusterBuilder) CreationTimestamp(value time.Time) *ClusterBuilder {\n\tb.creationTimestamp = value\n\tb.bitmap_ |= 8192\n\treturn b\n}", "func (s *SessionTrackerV1) SetCreated(created time.Time) {\n\ts.Spec.Created = created\n}", "func (o *IncidentTeamResponseAttributes) SetCreated(v time.Time) {\n\to.Created = &v\n}", "func (rec *RawEventCreate) SetTimestamp(t time.Time) *RawEventCreate {\n\trec.mutation.SetTimestamp(t)\n\treturn rec\n}", "func (o *InstanceStatusKubernetes) SetCreateTimestamp(v float32) {\n\to.CreateTimestamp = &v\n}", "func (b *AddonInstallationBuilder) CreationTimestamp(value time.Time) *AddonInstallationBuilder {\n\tb.creationTimestamp = value\n\tb.bitmap_ |= 64\n\treturn b\n}", "func (news *News) SetCreatedTime() {\n\tnews.CreatedTime=time.Now()\n}", "func (o *SecureScore) SetCreatedDateTime(v time.Time) {\n\to.CreatedDateTime = &v\n}", "func (m *ProgramControl) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"createdDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (sc *SessionCreate) SetCreated(t time.Time) *SessionCreate {\n\tsc.mutation.SetCreated(t)\n\treturn sc\n}", "func (o *ReservationModel) SetCreated(v time.Time) {\n\to.Created = v\n}", "func (m *ItemFacet) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"createdDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (cp *CustomerOrder) SetCreated() {\n\tcp.state = CREATED\n\t// Add some new value\n\t//cp.Owner = ''\n\tcp.CreatedDate = time.Now()\n}", "func (m *DeviceAndAppManagementAssignmentFilter) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"createdDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *DeviceManagementConfigurationPolicy) SetCreatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"createdDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (o *Ga4ghTumourboard) SetCreated(v string) {\n\to.Created = &v\n}", "func (o *ZoneZone) SetCreated(v time.Time) {\n\to.Created = &v\n}", "func (o *Giveaway) SetCreated(v time.Time) {\n\to.Created = v\n}", "func (o *RoleWithAccess) SetCreated(v string) {\n\to.Created = v\n}", "func (o *Ga4ghChemotherapy) SetCreated(v string) {\n\to.Created = &v\n}", "func (o *Comment) SetCreatedAtTimestamp(v int64) {\n\to.CreatedAtTimestamp = v\n}", "func Timestamp(createdBy string) (createdAtUnix int64) {\n\ttimestamp, err := time.Parse(time.RFC3339, createdBy)\n\tif err != nil {\n\t\tcreatedAtUnix = time.Now().Unix()\n\t\tErrorLog(err)\n\t} else {\n\t\tcreatedAtUnix = timestamp.Unix()\n\t}\n\treturn\n}", "func (e *DiscordWebhookEmbed) SetTimestamp() {\n\te.Timestamp = time.Now().UTC().Format(\"2006-01-02T15:04:05-0700\")\n}", "func (o *DeeplinkApp) SetCreatedTs(v int32) {\n\to.CreatedTs = &v\n}", "func (o *ApiKey) SetCreated(v string) {\n\to.Created = &v\n}", "func (o *SecureScore) SetCreatedDateTimeExplicitNull(b bool) {\n\to.CreatedDateTime = nil\n\to.isExplicitNullCreatedDateTime = b\n}", "func (o EventDataStoreOutput) CreatedTimestamp() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *EventDataStore) pulumi.StringOutput { return v.CreatedTimestamp }).(pulumi.StringOutput)\n}", "func (o *MicrosoftGraphWindows10CompliancePolicy) SetCreatedDateTime(v time.Time) {\n\to.CreatedDateTime = &v\n}", "func (sh *ServerPropertiesHandle) SetTimestamp(timestamp string) {\n\tsh.timestamp = timestamp\n}", "func (ms Int64DataPoint) SetTimestamp(v TimestampUnixNano) {\n\t(*ms.orig).TimeUnixNano = uint64(v)\n}", "func (o *DeeplinkRule) SetCreated(v string) {\n\to.Created = &v\n}", "func (s *Evaluation) SetCreatedTime(v time.Time) *Evaluation {\n\ts.CreatedTime = &v\n\treturn s\n}", "func (o *Content) SetCreatedTime(v time.Time) {\n\to.CreatedTime = &v\n}", "func (o *HyperflexSnapshotStatus) SetTimestamp(v int64) {\n\to.Timestamp = &v\n}", "func (o *GetPublicAuthParams) SetTimestamp(timestamp string) {\n\to.Timestamp = timestamp\n}", "func (o *BaseItem) SetCreatedDateTime(v time.Time) {\n\to.CreatedDateTime = &v\n}", "func (o *CircuitsCircuitTerminationsListParams) SetCreated(created *string) {\n\to.Created = created\n}", "func (ms HistogramBucketExemplar) SetTimestamp(v TimestampUnixNano) {\n\t(*ms.orig).TimeUnixNano = uint64(v)\n}", "func (r *JSONResponse) SetCreated() {\n\tr.status = StatusCreated\n}", "func (s *Rule) SetCreatedTime(v time.Time) *Rule {\n\ts.CreatedTime = &v\n\treturn s\n}", "func (info *Info) SetTimestamp(t time.Time) {\n\tinfo.Attributes[\"sig.timestamp\"] = t.UTC()\n}", "func (o *DcimRacksListParams) SetCreated(created *string) {\n\to.Created = created\n}", "func (o *MicrosoftGraphSharedPcConfiguration) SetCreatedDateTime(v time.Time) {\n\to.CreatedDateTime = &v\n}", "func (ms SummaryDataPoint) SetTimestamp(v TimestampUnixNano) {\n\t(*ms.orig).TimeUnixNano = uint64(v)\n}", "func (l *LockArgs) SetTimestamp(tstamp time.Time) {\n\tl.Timestamp = tstamp\n}", "func (s *Instance) SetCreatedTime(v time.Time) *Instance {\n\ts.CreatedTime = &v\n\treturn s\n}", "func (s *EvaluationSummary) SetCreatedTime(v time.Time) *EvaluationSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "func (o *IpamIPAddressesListParams) SetCreated(created *string) {\n\to.Created = created\n}", "func (o *HyperflexClusterHealthCheckExecutionSnapshot) SetTimestamp(v time.Time) {\n\to.Timestamp = &v\n}", "func (s *EvaluationFormVersionSummary) SetCreatedTime(v time.Time) *EvaluationFormVersionSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "func (o *ShowSystem) SetCreatedDate(v string) {\n\to.CreatedDate = &v\n}", "func (s *RuleSummary) SetCreatedTime(v time.Time) *RuleSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "func (s *InstanceSummary) SetCreatedTime(v time.Time) *InstanceSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "func (ms HistogramDataPoint) SetTimestamp(v TimestampUnixNano) {\n\t(*ms.orig).TimeUnixNano = uint64(v)\n}", "func (o *InstanceStatusKubernetes) GetCreateTimestamp() float32 {\n\tif o == nil || o.CreateTimestamp == nil {\n\t\tvar ret float32\n\t\treturn ret\n\t}\n\treturn *o.CreateTimestamp\n}", "func (fdf ExfatFileDirectoryEntry) CreateTimestamp() time.Time {\n\treturn fdf.CreateTimestampRaw.TimestampWithOffset(int(fdf.CreateUtcOffset))\n}", "func (o *Snippet) SetCreatedOn(v time.Time) {\n\to.CreatedOn = &v\n}", "func (s *EvaluationForm) SetCreatedTime(v time.Time) *EvaluationForm {\n\ts.CreatedTime = &v\n\treturn s\n}", "func (o *MicrosoftGraphListItem) SetCreatedDateTime(v time.Time) {\n\to.CreatedDateTime = &v\n}", "func SetWatchdogViaTimestamp(iTimestamp int, watchdog *Watchdog) (int64, error) {\n\twatchdog.Timestamp = iTimestamp\n\treturn Engine.Insert(watchdog)\n}", "func (o *AccessRequestData) HasCreatedTimestamp() bool {\n\tif o != nil && o.CreatedTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (s *EvaluationFormSummary) SetCreatedTime(v time.Time) *EvaluationFormSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "func (s *UpdateTaskTemplateOutput) SetCreatedTime(v time.Time) *UpdateTaskTemplateOutput {\n\ts.CreatedTime = &v\n\treturn s\n}", "func WithCreationTimestamp(t time.Time) RevisionOption {\n\treturn func(rev *v1alpha1.Revision) {\n\t\trev.ObjectMeta.CreationTimestamp = metav1.Time{t}\n\t}\n}", "func (s *GetTaskTemplateOutput) SetCreatedTime(v time.Time) *GetTaskTemplateOutput {\n\ts.CreatedTime = &v\n\treturn s\n}", "func (s *ImportReferenceFilter) SetCreatedBefore(v time.Time) *ImportReferenceFilter {\n\ts.CreatedBefore = &v\n\treturn s\n}", "func (f *Format) SetTimestamp(timestampFormat string) {\n\n\tf.Timestamp = timestampFormat\n\n}", "func (bb *BlockBuilder) SetTimestamp(timestamp uint64) {\n\tbb.block.Timestamp = timestamp\n}", "func (store *Store) CreateTimestamp(name string) *Timestamp {\n\ttimestamp := newTimestamp()\n\tstore.Register(name, timestamp.ReadI, TIMESTAMP)\n\treturn timestamp\n}", "func (s *View) SetCreatedTime(v time.Time) *View {\n\ts.CreatedTime = &v\n\treturn s\n}", "func (s *ImportReadSetFilter) SetCreatedBefore(v time.Time) *ImportReadSetFilter {\n\ts.CreatedBefore = &v\n\treturn s\n}", "func (o *EventAttributes) SetTimestamp(v int64) {\n\to.Timestamp = &v\n}", "func (s *SequenceStoreFilter) SetCreatedBefore(v time.Time) *SequenceStoreFilter {\n\ts.CreatedBefore = &v\n\treturn s\n}" ]
[ "0.6999454", "0.6938366", "0.69090176", "0.6830104", "0.68142295", "0.6761093", "0.6760562", "0.67210853", "0.6699308", "0.66933596", "0.6678543", "0.66466373", "0.66341954", "0.66090614", "0.66031075", "0.6591164", "0.65838224", "0.65653867", "0.6545292", "0.65306205", "0.6483345", "0.6477632", "0.64734775", "0.64680415", "0.6466737", "0.64420456", "0.64251614", "0.6423848", "0.63914627", "0.63905895", "0.63772035", "0.62717927", "0.625213", "0.6251241", "0.62390417", "0.61879486", "0.61847275", "0.61810064", "0.6162302", "0.6149395", "0.6137047", "0.6135814", "0.612826", "0.61082387", "0.6105782", "0.60979366", "0.6072985", "0.6029512", "0.5969644", "0.5958044", "0.5920935", "0.58772135", "0.5873806", "0.5860255", "0.5805766", "0.5755107", "0.5750739", "0.5719505", "0.5708527", "0.56945115", "0.56867224", "0.5664496", "0.5644353", "0.5625107", "0.5619235", "0.5615177", "0.56139004", "0.56026906", "0.5602473", "0.56015474", "0.5595711", "0.5561864", "0.5544201", "0.55438197", "0.5541008", "0.55283535", "0.55227405", "0.54994124", "0.5493313", "0.5485795", "0.54853165", "0.5484841", "0.5481598", "0.54737526", "0.5457969", "0.54548913", "0.5435676", "0.54350984", "0.54217005", "0.53940797", "0.5392198", "0.53903073", "0.5375324", "0.53744715", "0.53656036", "0.5348318", "0.5348036", "0.53248835", "0.532269", "0.53134465" ]
0.78317076
0
GetExpirationTimestamp returns the ExpirationTimestamp field value if set, zero value otherwise.
func (o *AccessRequestData) GetExpirationTimestamp() int64 { if o == nil || o.ExpirationTimestamp == nil { var ret int64 return ret } return *o.ExpirationTimestamp }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (m *ConsensusCreateTopicTransactionBody) GetExpirationTime() *Timestamp {\n\tif m != nil {\n\t\treturn m.ExpirationTime\n\t}\n\treturn nil\n}", "func (o *AccessRequestData) SetExpirationTimestamp(v int64) {\n\to.ExpirationTimestamp = &v\n}", "func (m *UploadSession) GetExpirationDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.expirationDateTime\n}", "func (transaction *AccountUpdateTransaction) GetExpirationTime() time.Time {\n\tif transaction.expirationTime != nil {\n\t\treturn *transaction.expirationTime\n\t}\n\treturn time.Time{}\n}", "func (m *VppToken) GetExpirationDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.expirationDateTime\n}", "func (c Certificate) GetExpiration() time.Time {\n\treturn c.expiration\n}", "func (m *Group) GetExpirationDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.expirationDateTime\n}", "func (s *Handshake) SetExpirationTimestamp(v time.Time) *Handshake {\n\ts.ExpirationTimestamp = &v\n\treturn s\n}", "func (o *SparseSSHAuthorizationPolicy) GetExpirationTime() (out time.Time) {\n\n\tif o.ExpirationTime == nil {\n\t\treturn\n\t}\n\n\treturn *o.ExpirationTime\n}", "func (o *AccessRequestData) GetExpirationTimestampOk() (*int64, bool) {\n\tif o == nil || o.ExpirationTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ExpirationTimestamp, true\n}", "func (s *Store) GetExpiration() time.Duration {\n\texpiration, ok := s.Get(expirationAttributeKey).(int64)\n\tif !ok {\n\t\treturn s.defaultExpiration\n\t}\n\treturn time.Duration(expiration) * time.Second\n}", "func (m *WindowsInformationProtectionDataRecoveryCertificate) GetExpirationDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"expirationDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (m *AgreementAcceptance) GetExpirationDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.expirationDateTime\n}", "func (k KeyData) GetExpiration() time.Duration {\n\tif k.Expiration == 0 {\n\t\treturn time.Duration(0)\n\t}\n\treturn time.Duration(k.Expiration-time.Now().Unix()) * time.Second\n}", "func (o *SSHAuthorizationPolicy) GetExpirationTime() time.Time {\n\n\treturn o.ExpirationTime\n}", "func (o *AccessRequestData) HasExpirationTimestamp() bool {\n\tif o != nil && o.ExpirationTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (ci *auditInfo) Expiration() time.Time {\n\treturn ci.expiration\n}", "func (ci *auditInfo) Expiration() time.Time {\n\treturn ci.expiration\n}", "func (ci *auditInfo) Expiration() time.Time {\n\treturn ci.expiration\n}", "func (s *GetCredentialsOutput) SetExpiration(v time.Time) *GetCredentialsOutput {\n\ts.Expiration = &v\n\treturn s\n}", "func (b *ClusterBuilder) ExpirationTimestamp(value time.Time) *ClusterBuilder {\n\tb.expirationTimestamp = value\n\tb.bitmap_ |= 131072\n\treturn b\n}", "func (q *Address) GetExpiration() int64 {\n\treturn q.Expiration\n}", "func (a *Authorization) Expiry() time.Time {\n\tif a.timestamp == 0 {\n\t\treturn time.Time{}\n\t}\n\treturn time.Unix(a.timestamp, 0)\n}", "func (i *InstallationToken) GetExpiresAt() time.Time {\n\tif i == nil || i.ExpiresAt == nil {\n\t\treturn time.Time{}\n\t}\n\treturn *i.ExpiresAt\n}", "func generateExpirationTimestamp() int64 {\n\treturn time.Now().Unix() + int64(3600)\n}", "func GenerateExpirationTimestamp(currentTimestamp time.Time, addDays int) (*time.Time, error) {\n\tif currentTimestamp.IsZero() {\n\t\treturn nil, consts.ErrInvalidTimeStamp\n\t}\n\n\tif addDays <= 0 {\n\t\treturn nil, consts.ErrInvalidNumberOfDays\n\t}\n\n\ttimeZonedTimestamp := currentTimestamp\n\tif currentTimestamp.Location().String() != utc {\n\t\ttimeZonedTimestamp = currentTimestamp.UTC()\n\t}\n\n\t// addDays to current weekday to get to addDays later\n\t// ie: adding 7 days to current weekday gets you one week later timestamp\n\tmodifiedTimestamp := timeZonedTimestamp.AddDate(0, 0, addDays)\n\n\t// reset time to 3 AM\n\texpirationTimestamp := time.Date(modifiedTimestamp.Year(), modifiedTimestamp.Month(), modifiedTimestamp.Day(),\n\t\t3, 0, 0, 0, timeZonedTimestamp.Location())\n\n\treturn &expirationTimestamp, nil\n}", "func (o *MuteFindingRequestProperties) GetExpirationDate() int64 {\n\tif o == nil || o.ExpirationDate == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.ExpirationDate\n}", "func (r *swapReceipt) Expiration() time.Time {\n\treturn r.expiration\n}", "func (r *swapReceipt) Expiration() time.Time {\n\treturn r.expiration\n}", "func (r *swapReceipt) Expiration() time.Time {\n\treturn r.expiration\n}", "func (s *DataLakeLifecycleConfiguration) SetExpiration(v *DataLakeLifecycleExpiration) *DataLakeLifecycleConfiguration {\n\ts.Expiration = v\n\treturn s\n}", "func (o *MuteFindingResponseProperties) GetExpirationDate() int64 {\n\tif o == nil || o.ExpirationDate == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.ExpirationDate\n}", "func (s *Credentials) SetExpiration(v time.Time) *Credentials {\n\ts.Expiration = &v\n\treturn s\n}", "func (o *PaymentStatusUpdateWebhook) GetTimestamp() time.Time {\n\tif o == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\n\treturn o.Timestamp\n}", "func (o *AccessKey) GetExpirationDate() string {\n\tif o == nil || o.ExpirationDate == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.ExpirationDate\n}", "func (o SslCertOutput) ExpirationTime() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *SslCert) pulumi.StringOutput { return v.ExpirationTime }).(pulumi.StringOutput)\n}", "func (i *InputIdentityDocument) GetExpirationDate() (value Date) {\n\tif i == nil {\n\t\treturn\n\t}\n\treturn i.ExpirationDate\n}", "func (s Session) GetExpiry() time.Time {\n\treturn s.Expires\n}", "func (s *RoleCredentials) SetExpiration(v int64) *RoleCredentials {\n\ts.Expiration = &v\n\treturn s\n}", "func timestampToExpiration(t *types.Timestamp) string {\n\treturn time.Unix(int64(t.Seconds), int64(t.Nanos)).UTC().Format(\"2006-01-02 15:05:05\")\n}", "func (o *ImageImportOperation) GetExpiresAt() time.Time {\n\tif o == nil || o.ExpiresAt == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.ExpiresAt\n}", "func (o ResourcePolicyInstanceSchedulePolicyPtrOutput) ExpirationTime() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ResourcePolicyInstanceSchedulePolicy) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ExpirationTime\n\t}).(pulumi.StringPtrOutput)\n}", "func (g *GPGKey) GetExpiresAt() time.Time {\n\tif g == nil || g.ExpiresAt == nil {\n\t\treturn time.Time{}\n\t}\n\treturn *g.ExpiresAt\n}", "func ExpirationTime(m jwtgo.MapClaims) (time.Time, error) {\n\texp, err := numField(m, \"exp\")\n\treturn time.Unix(exp, 0), err\n}", "func (o *SecurityProblemEvent) GetTimestamp() int64 {\n\tif o == nil || o.Timestamp == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.Timestamp\n}", "func (o ResourcePolicyInstanceSchedulePolicyOutput) ExpirationTime() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ResourcePolicyInstanceSchedulePolicy) *string { return v.ExpirationTime }).(pulumi.StringPtrOutput)\n}", "func (o *HyperflexClusterHealthCheckExecutionSnapshot) GetTimestamp() time.Time {\n\tif o == nil || o.Timestamp == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.Timestamp\n}", "func (m *UploadSession) SetExpirationDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.expirationDateTime = value\n}", "func (w *WebHookCommit) GetTimestamp() time.Time {\n\tif w == nil || w.Timestamp == nil {\n\t\treturn time.Time{}\n\t}\n\treturn *w.Timestamp\n}", "func (m *AccessPackageAssignment) GetExpiredDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.expiredDateTime\n}", "func (m *RequestSchedule) GetExpiration()(ExpirationPatternable) {\n val, err := m.GetBackingStore().Get(\"expiration\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(ExpirationPatternable)\n }\n return nil\n}", "func (o *ServiceCheck) GetTimestamp() int64 {\n\tif o == nil || o.Timestamp == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.Timestamp\n}", "func (o ResourcePolicyInstanceSchedulePolicyResponsePtrOutput) ExpirationTime() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ResourcePolicyInstanceSchedulePolicyResponse) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.ExpirationTime\n\t}).(pulumi.StringPtrOutput)\n}", "func (m *Metadata) Expiry() time.Time {\n\tif m.Expires == nil {\n\t\treturn time.Time{}\n\t}\n\treturn *m.Expires\n}", "func (o ResourcePolicyInstanceSchedulePolicyResponseOutput) ExpirationTime() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ResourcePolicyInstanceSchedulePolicyResponse) string { return v.ExpirationTime }).(pulumi.StringOutput)\n}", "func (d *Result) Expiration() uint32 {\n\treturn d.expiration\n}", "func (o CertificateOutput) Expiration() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Certificate) pulumi.StringOutput { return v.Expiration }).(pulumi.StringOutput)\n}", "func (o LicenseOutput) ExpirationTime() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *License) pulumi.StringOutput { return v.ExpirationTime }).(pulumi.StringOutput)\n}", "func (ldb *LevelDB) GetExpireAt(key []byte) *time.Time {\n\tat := ldb.get(encodeExpireKey(key))\n\t// no expire, return nil\n\tif len(at) == 0 {\n\t\treturn nil\n\t}\n\n\tr := time.Unix(int64(binary.BigEndian.Uint64(at)), 0)\n\treturn &r\n}", "func (o LookupNoteResultOutput) ExpirationTime() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupNoteResult) string { return v.ExpirationTime }).(pulumi.StringOutput)\n}", "func (t *token) ExpiryTime() time.Time {\n\treturn t.Expiry\n}", "func (o *EventAttributes) GetTimestamp() int64 {\n\tif o == nil || o.Timestamp == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.Timestamp\n}", "func (w *Watcher) MaxExpirationTime() *big.Int {\n\treturn w.maxExpirationTime\n}", "func (subscription *Subscription) SetExpiration(expiration time.Time) (*SubscriptionInfo, error) {\n\treturn subscription.Update(map[string]interface{}{\n\t\t\"expirationDateTime\": expiration,\n\t})\n}", "func (m *VppToken) SetExpirationDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.expirationDateTime = value\n}", "func (o *LogContent) GetTimestamp() time.Time {\n\tif o == nil || o.Timestamp == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.Timestamp\n}", "func (b *AuthBindTempAuthKeyRequest) GetExpiresAt() (value int) {\n\tif b == nil {\n\t\treturn\n\t}\n\treturn b.ExpiresAt\n}", "func (this *ValueTransaction) GetTimestamp() (result uint) {\n\tthis.timestampMutex.RLock()\n\tif this.timestamp == nil {\n\t\tthis.timestampMutex.RUnlock()\n\t\tthis.timestampMutex.Lock()\n\t\tdefer this.timestampMutex.Unlock()\n\t\tif this.timestamp == nil {\n\t\t\ttimestamp := uint(trinary.TritsToInt(this.trits[TIMESTAMP_OFFSET:TIMESTAMP_END]))\n\n\t\t\tthis.timestamp = &timestamp\n\t\t}\n\t} else {\n\t\tdefer this.timestampMutex.RUnlock()\n\t}\n\n\tresult = *this.timestamp\n\n\treturn\n}", "func (m *WindowsInformationProtectionDataRecoveryCertificate) SetExpirationDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"expirationDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *PresenceStatusMessage) GetExpiryDateTime()(DateTimeTimeZoneable) {\n val, err := m.GetBackingStore().Get(\"expiryDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(DateTimeTimeZoneable)\n }\n return nil\n}", "func (transaction *FileCreateTransaction) SetExpirationTime(expiration time.Time) *FileCreateTransaction {\n\ttransaction._RequireNotFrozen()\n\ttransaction.expirationTime = &expiration\n\treturn transaction\n}", "func (m *TermsExpiration) GetStartDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.startDateTime\n}", "func (x *UpdateResult) GetTimestamp() int64 {\n\tif x != nil {\n\t\treturn x.Timestamp\n\t}\n\treturn 0\n}", "func (m *Group) SetExpirationDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.expirationDateTime = value\n}", "func (transaction *TokenUpdateTransaction) SetExpirationTime(expirationTime time.Time) *TokenUpdateTransaction {\n\ttransaction._RequireNotFrozen()\n\ttransaction.expirationTime = &expirationTime\n\treturn transaction\n}", "func (sg *StorageGroup) ExpirationEpoch() uint64 {\n\treturn (*storagegroup.StorageGroup)(sg).\n\t\tGetExpirationEpoch()\n}", "func (o BucketLifecycleRuleOutput) Expiration() BucketLifecycleRuleExpirationPtrOutput {\n\treturn o.ApplyT(func(v BucketLifecycleRule) *BucketLifecycleRuleExpiration { return v.Expiration }).(BucketLifecycleRuleExpirationPtrOutput)\n}", "func Expires_AtTimestamp(t *float64) Expires {\n\t_init_.Initialize()\n\n\tvar returns Expires\n\n\t_jsii_.StaticInvoke(\n\t\t\"monocdk.aws_s3_deployment.Expires\",\n\t\t\"atTimestamp\",\n\t\t[]interface{}{t},\n\t\t&returns,\n\t)\n\n\treturn returns\n}", "func (m NoMDEntries) GetExpireTime() (v time.Time, err quickfix.MessageRejectError) {\n\tvar f field.ExpireTimeField\n\tif err = m.Get(&f); err == nil {\n\t\tv = f.Value()\n\t}\n\treturn\n}", "func NewExpirationTimeGenerator() ExpirationTimeGenerator {\n\treturn ExpirationTimeGeneratorFunc(generateExpirationTimestamp)\n}", "func (p *PrincipalMock) ExpiryTime() int64 {\n\treturn p.ExpiryTimeFunc()\n}", "func (o *HyperflexSnapshotStatus) GetTimestamp() int64 {\n\tif o == nil || o.Timestamp == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.Timestamp\n}", "func (s *Store) SetExpiration(expiration time.Duration) error {\n\ts.lock.Lock()\n\ts.expirationChanged = true\n\ts.lock.Unlock()\n\ts.Set(expirationAttributeKey, int64(expiration.Seconds()))\n\treturn nil\n}", "func getDefaultAttributesExpiration() time.Time {\n\treturn time.Now().Add(365 * 24 * time.Hour)\n}", "func GetCertExpirationDate(certPEM []byte) (time.Time, error) {\n\treturn tls.GetCertExpirationDate(certPEM)\n}", "func (o *GetMessagesAllOf) GetTimestamp() interface{} {\n\tif o == nil {\n\t\tvar ret interface{}\n\t\treturn ret\n\t}\n\treturn o.Timestamp\n}", "func (a *Authorization) GetUpdatedAt() Timestamp {\n\tif a == nil || a.UpdatedAt == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *a.UpdatedAt\n}", "func (ucd *UserContextData) GetTokenExpiresAt() time.Time {\n\tif ucd == nil {\n\t\treturn time.Time{}\n\t}\n\treturn ucd.tokenExpiresAt\n}", "func (b *ProviderBasis) SetExpiration(expiration time.Time) {\n\tb.expiration = expiration\n\tif b.ExpireWindow > 0 {\n\t\tb.expiration = b.expiration.Add(-b.ExpireWindow)\n\t}\n}", "func (o InstanceServerCaCertOutput) ExpireTime() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v InstanceServerCaCert) *string { return v.ExpireTime }).(pulumi.StringPtrOutput)\n}", "func (o *NewData) GetTimestamp() string {\n\tif o == nil || o.Timestamp == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Timestamp\n}", "func (y *Yaraus) ExpireAt() time.Time {\n\ty.mu.RLock()\n\tdefer y.mu.RUnlock()\n\treturn y.expireAt\n}", "func (p *PushEventCommit) GetTimestamp() Timestamp {\n\tif p == nil || p.Timestamp == nil {\n\t\treturn Timestamp{}\n\t}\n\treturn *p.Timestamp\n}", "func (r *PromRule) GetEvaluationTimestamp() time.Time {\n\tr.mtx.Lock()\n\tdefer r.mtx.Unlock()\n\treturn r.evaluationTimestamp\n}", "func (o *HyperflexHealthCheckPackageChecksum) GetTimestamp() time.Time {\n\tif o == nil || o.Timestamp == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.Timestamp\n}", "func (em *IGMedia) GetTimestamp() int64 {\n\treturn em.TakenAtTimestamp\n}", "func (m AggregationRecord) GetTimestamp() time.Time {\n\treturn m.Timestamp\n}", "func (o Options) ExpirationValue() time.Duration {\n\treturn o.Expiration\n}", "func (c *Store) getMessageExpiration(msg *messages.JSONMessage) time.Time {\n\tdiff := float64((time.Now().Sub(msg.Date) / time.Minute) + 1)\n\n\t// 4.46489 log(1.56508 x)\n\texpiresIn := time.Duration(4.46489*math.Log(1.56508*diff)) * time.Minute\n\n\treturn time.Now().Add(expiresIn)\n}", "func (o *Echo) GetTimestamp() time.Time {\n\tvar dt interface{} = o.UpdatedAt\n\tswitch v := dt.(type) {\n\tcase int64:\n\t\treturn datetime.DateFromEpoch(v).UTC()\n\tcase string:\n\t\ttv, err := datetime.ISODateToTime(v)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\treturn tv.UTC()\n\tcase time.Time:\n\t\treturn v.UTC()\n\t}\n\tpanic(\"not sure how to handle the date time format for Echo\")\n}" ]
[ "0.7225385", "0.7208853", "0.71586376", "0.70565337", "0.70007324", "0.69957805", "0.6959247", "0.681264", "0.6796871", "0.67930305", "0.6735783", "0.66907835", "0.6607468", "0.65812397", "0.6451612", "0.6371978", "0.62267935", "0.62267935", "0.62267935", "0.6192751", "0.61585355", "0.61460817", "0.6103011", "0.61009675", "0.6067504", "0.60165906", "0.60145074", "0.59930414", "0.59930414", "0.59930414", "0.5973168", "0.5955831", "0.59169054", "0.5899352", "0.5895861", "0.5868433", "0.58629555", "0.58375835", "0.58185226", "0.58045924", "0.5804346", "0.5798622", "0.5718105", "0.57134116", "0.5698579", "0.5696896", "0.56944585", "0.56930983", "0.5680388", "0.5675393", "0.5670767", "0.5665081", "0.56545043", "0.56419414", "0.56254274", "0.56213975", "0.55734897", "0.5560028", "0.5559052", "0.55389273", "0.550486", "0.54909766", "0.5487453", "0.5469956", "0.54579633", "0.5436425", "0.54181254", "0.5412535", "0.5403683", "0.5387527", "0.53793544", "0.53782284", "0.5355401", "0.53417665", "0.5321541", "0.5308598", "0.5306692", "0.5306234", "0.52928627", "0.52837735", "0.5265391", "0.5262036", "0.5259455", "0.52576566", "0.5241528", "0.523954", "0.5237513", "0.5230478", "0.52183276", "0.5217587", "0.52144945", "0.5203159", "0.51855266", "0.5158702", "0.5152443", "0.5149129", "0.5148794", "0.5147478", "0.51443434", "0.51417774" ]
0.80913234
0
GetExpirationTimestampOk returns a tuple with the ExpirationTimestamp field value if set, nil otherwise and a boolean to check if the value has been set.
func (o *AccessRequestData) GetExpirationTimestampOk() (*int64, bool) { if o == nil || o.ExpirationTimestamp == nil { return nil, false } return o.ExpirationTimestamp, true }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *AccessRequestData) HasExpirationTimestamp() bool {\n\tif o != nil && o.ExpirationTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *PaymentStatusUpdateWebhook) GetTimestampOk() (*time.Time, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Timestamp, true\n}", "func (o *EventAttributes) GetTimestampOk() (*int64, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *ServiceCheck) GetTimestampOk() (*int64, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *SecurityProblemEvent) GetTimestampOk() (*int64, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *HyperflexSnapshotStatus) GetTimestampOk() (*int64, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *HyperflexClusterHealthCheckExecutionSnapshot) GetTimestampOk() (*time.Time, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *NewData) GetTimestampOk() (*string, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *LogContent) GetTimestampOk() (*time.Time, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *AccessKey) GetExpirationDateOk() (*string, bool) {\n\tif o == nil || o.ExpirationDate == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ExpirationDate, true\n}", "func (o *MuteFindingRequestProperties) GetExpirationDateOk() (*int64, bool) {\n\tif o == nil || o.ExpirationDate == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ExpirationDate, true\n}", "func (o *DeviceParameterValue) GetTimestampOk() (*string, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *MuteFindingResponseProperties) GetExpirationDateOk() (*int64, bool) {\n\tif o == nil || o.ExpirationDate == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ExpirationDate, true\n}", "func (o *BulletinDTO) GetTimestampOk() (*string, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *AccessRequestData) GetExpirationTimestamp() int64 {\n\tif o == nil || o.ExpirationTimestamp == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.ExpirationTimestamp\n}", "func (o *ActionDTO) GetTimestampOk() (*string, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *HyperflexHealthCheckPackageChecksum) GetTimestampOk() (*time.Time, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *DatasetEvent) GetTimestampOk() (*string, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (o *AccessRequestData) GetCreatedTimestampOk() (*int64, bool) {\n\tif o == nil || o.CreatedTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedTimestamp, true\n}", "func (o *DeviceResourceVersionValueWeb) GetTimestampOk() (*string, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timestamp, true\n}", "func (d *Result) HasExpiration() bool {\n\treturn d.withExpiration\n}", "func (o *GetMessagesAllOf) GetTimestampOk() (*interface{}, bool) {\n\tif o == nil || o.Timestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Timestamp, true\n}", "func (o *QueryTradeInfoRequest) GetTimeStampOk() (*int, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.TimeStamp, true\n}", "func (o *Transaction) GetDatetimeOk() (*time.Time, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Datetime.Get(), o.Datetime.IsSet()\n}", "func (o *QueryCreditCardPeriodInfoRequest) GetTimeStampOk() (*int, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.TimeStamp, true\n}", "func (o *ImageImportOperation) GetExpiresAtOk() (*time.Time, bool) {\n\tif o == nil || o.ExpiresAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ExpiresAt, true\n}", "func (o *SecurityProblem) GetLastUpdatedTimestampOk() (*int64, bool) {\n\tif o == nil || o.LastUpdatedTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LastUpdatedTimestamp, true\n}", "func (o *SecurityProblem) GetFirstSeenTimestampOk() (*int64, bool) {\n\tif o == nil || o.FirstSeenTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.FirstSeenTimestamp, true\n}", "func (o *SecurityProblemEvent) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *EventAttributes) HasTimestamp() bool {\n\treturn o != nil && o.Timestamp != nil\n}", "func (o *DeviceParameterValue) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InstanceStatusKubernetes) GetCreateTimestampOk() (*float32, bool) {\n\tif o == nil || o.CreateTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreateTimestamp, true\n}", "func (o *NewData) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AccessRequestData) SetExpirationTimestamp(v int64) {\n\to.ExpirationTimestamp = &v\n}", "func (o *DeviceResourceVersionValueWeb) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func isExpired(timestamp interface{}) bool {\n\tif validity, ok := timestamp.(float64); ok {\n\t\ttm := time.Unix(int64(validity), 0)\n\t\tremainder := tm.Sub(time.Now())\n\t\tif remainder > 0 {\n\t\t\treturn true\n\t\t}\n\t} else {\n\t\tglog.Error(\"Error casting timestamp to string. This may be due to a invalid token\")\n\t\textension.Exit(extension.ErrorExitCode)\n\t}\n\treturn false\n}", "func (o *ActionDTO) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ServiceCheck) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Authorization) GetUpdatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.UpdatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedAt, true\n}", "func (o *BulletinDTO) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Comment) GetCreatedAtTimestampOk() (*int64, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.CreatedAtTimestamp, true\n}", "func (o *MuteFindingResponseProperties) HasExpirationDate() bool {\n\treturn o != nil && o.ExpirationDate != nil\n}", "func (o *HyperflexSnapshotStatus) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MuteFindingRequestProperties) HasExpirationDate() bool {\n\treturn o != nil && o.ExpirationDate != nil\n}", "func (o *VersionedConnection) GetFlowFileExpirationOk() (*string, bool) {\n\tif o == nil || o.FlowFileExpiration == nil {\n\t\treturn nil, false\n\t}\n\treturn o.FlowFileExpiration, true\n}", "func (m *VppToken) GetExpirationDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.expirationDateTime\n}", "func (a *ACLToken) HasExpirationTime() bool {\n\tif a == nil || a.ExpirationTime == nil {\n\t\treturn false\n\t}\n\treturn !a.ExpirationTime.IsZero()\n}", "func (o *Transaction) GetAuthorizedDatetimeOk() (*time.Time, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.AuthorizedDatetime.Get(), o.AuthorizedDatetime.IsSet()\n}", "func (m *ConsensusCreateTopicTransactionBody) GetExpirationTime() *Timestamp {\n\tif m != nil {\n\t\treturn m.ExpirationTime\n\t}\n\treturn nil\n}", "func (o *AccessKey) HasExpirationDate() bool {\n\tif o != nil && o.ExpirationDate != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ProjectApiKey) GetUpdatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.UpdatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedAt, true\n}", "func (o *HyperflexVmSnapshotInfoAllOf) GetTargetCompletionTimestampOk() (*int64, bool) {\n\tif o == nil || o.TargetCompletionTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TargetCompletionTimestamp, true\n}", "func (o *AccessRequestData) HasCreatedTimestamp() bool {\n\tif o != nil && o.CreatedTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *CheckoutResponse) GetExpiresAtOk() (*int64, bool) {\n\tif o == nil || IsNil(o.ExpiresAt) {\n\t\treturn nil, false\n\t}\n\treturn o.ExpiresAt, true\n}", "func (o *Lifecycle) GetUpdatedAtOk() (*time.Time, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.UpdatedAt, true\n}", "func (o *HyperflexClusterHealthCheckExecutionSnapshot) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *UploadSession) GetExpirationDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.expirationDateTime\n}", "func (o *LogContent) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *NotebookLogStreamCellAttributes) GetTimeOk() (*NotebookCellTime, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Time.Get(), o.Time.IsSet()\n}", "func (o *SecurityProblem) HasLastUpdatedTimestamp() bool {\n\tif o != nil && o.LastUpdatedTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *HyperflexHealthCheckPackageChecksum) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (e LifecycleExpiration) IsSet() bool {\n\treturn e.ExpirationDate != nil && !e.ExpirationDate.IsZero() || e.ExpirationInDays > 0\n}", "func (s *Handshake) SetExpirationTimestamp(v time.Time) *Handshake {\n\ts.ExpirationTimestamp = &v\n\treturn s\n}", "func (o *NormalizedProjectRevisionHook) GetUpdatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.UpdatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedAt, true\n}", "func IsTimeExpired(timestamp int64, offsetInSeconds float64) bool {\n\ttt := UTCUnixToTime(timestamp)\n\tremainder := tt.Sub(time.Now())\n\tlog.Info(\"remainder: %v calc : %v\", remainder, (remainder.Seconds() + offsetInSeconds))\n\n\treturn !((remainder.Seconds() + offsetInSeconds) > 0)\n}", "func (b *ClusterBuilder) ExpirationTimestamp(value time.Time) *ClusterBuilder {\n\tb.expirationTimestamp = value\n\tb.bitmap_ |= 131072\n\treturn b\n}", "func (o *IdentityAccount) GetUpdatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.UpdatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedAt, true\n}", "func (err *ValidationError) IsExpired() bool { return err.exp }", "func (o *TenantWithOfferWeb) GetCreationTsOk() (*int64, bool) {\n\tif o == nil || o.CreationTs == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreationTs, true\n}", "func (o *MicrosoftGraphWindows10CompliancePolicy) GetLastModifiedDateTimeOk() (time.Time, bool) {\n\tif o == nil || o.LastModifiedDateTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret, false\n\t}\n\treturn *o.LastModifiedDateTime, true\n}", "func (o *SecurityProblem) HasFirstSeenTimestamp() bool {\n\tif o != nil && o.FirstSeenTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *AgreementAcceptance) GetExpirationDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.expirationDateTime\n}", "func IsExpired(ttl uint32, timestamp uint64) bool {\n\tif ttl == Persistent {\n\t\treturn false\n\t}\n\n\tnow := time.UnixMilli(time.Now().UnixMilli())\n\texpireTime := time.UnixMilli(int64(timestamp))\n\texpireTime = expireTime.Add(time.Duration(ttl) * time.Second)\n\n\treturn expireTime.Before(now)\n}", "func (o *HyperflexVmSnapshotInfoAllOf) GetSourceTimestampOk() (*int64, bool) {\n\tif o == nil || o.SourceTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SourceTimestamp, true\n}", "func (m *WindowsInformationProtectionDataRecoveryCertificate) GetExpirationDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"expirationDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (o *Account) GetUpdatedAtOk() (*time.Time, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.UpdatedAt, true\n}", "func (o *StorageHyperFlexStorageContainer) GetLastModifiedTimeOk() (*time.Time, bool) {\n\tif o == nil || o.LastModifiedTime == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LastModifiedTime, true\n}", "func timestampIsFinal(t comments.Timestamp) bool {\n\treturn t.TxID != \"\"\n}", "func (m *Group) GetExpirationDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.expirationDateTime\n}", "func (c Certificate) GetExpiration() time.Time {\n\treturn c.expiration\n}", "func (o *Channel) GetUpdatedAtOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.UpdatedAt, true\n}", "func (entry *UtxoEntry) HasExpiry() bool {\n\treturn entry.packedFlags&utxoFlagHasExpiry == utxoFlagHasExpiry\n}", "func (o *MicrosoftGraphSharedPcConfiguration) GetLastModifiedDateTimeOk() (time.Time, bool) {\n\tif o == nil || o.LastModifiedDateTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret, false\n\t}\n\treturn *o.LastModifiedDateTime, true\n}", "func (s *Store) HasExpirationChanged() bool {\n\ts.lock.RLock()\n\texpirationChanged := s.expirationChanged\n\ts.lock.RUnlock()\n\treturn expirationChanged\n}", "func (_BaseAccessWallet *BaseAccessWalletCaller) ValidateTimestamp(opts *bind.CallOpts, _ts *big.Int) (bool, error) {\n\tvar out []interface{}\n\terr := _BaseAccessWallet.contract.Call(opts, &out, \"validateTimestamp\", _ts)\n\n\tif err != nil {\n\t\treturn *new(bool), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(bool)).(*bool)\n\n\treturn out0, err\n\n}", "func (k KeyData) GetExpiration() time.Duration {\n\tif k.Expiration == 0 {\n\t\treturn time.Duration(0)\n\t}\n\treturn time.Duration(k.Expiration-time.Now().Unix()) * time.Second\n}", "func (o *RecurrenceRepetition) GetUpdatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.UpdatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedAt, true\n}", "func (o *DatasetEvent) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (t Timestamp) IsZeroValue() bool {\n\treturn t.IsZero()\n}", "func (o *GetMessagesAllOf) GetLastEditTimestampOk() (*int32, bool) {\n\tif o == nil || o.LastEditTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LastEditTimestamp, true\n}", "func HasExpired(cloudEvent map[string]interface{}) bool {\n\te, ok := cloudEvent[ExpirationField]\n\tif ok && e != \"\" {\n\t\texpiration, err := time.Parse(time.RFC3339, fmt.Sprintf(\"%s\", e))\n\t\tif err != nil {\n\t\t\treturn false\n\t\t}\n\n\t\treturn expiration.UTC().Before(time.Now().UTC())\n\t}\n\n\treturn false\n}", "func (o *GetMessagesAllOf) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *PiggyBankEvent) GetUpdatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.UpdatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedAt, true\n}", "func (o *Invitation) GetUpdatedAtOk() (*string, bool) {\n\tif o == nil || o.UpdatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedAt, true\n}", "func (o *ResourceVersion) GetCreationTsOk() (*int64, bool) {\n\tif o == nil || o.CreationTs == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreationTs, true\n}", "func (o *SyntheticMonitorStepResult) GetStartTimestampOk() (*int64, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.StartTimestamp, true\n}", "func (m *SessionMutation) ExpiredAt() (r time.Time, exists bool) {\n\tv := m.expiredAt\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (o *MicrosoftGraphUsageDetails) GetLastModifiedDateTimeOk() (time.Time, bool) {\n\tif o == nil || o.LastModifiedDateTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret, false\n\t}\n\treturn *o.LastModifiedDateTime, true\n}", "func (o *Post) GetReceivedDateTimeOk() (time.Time, bool) {\n\tif o == nil || o.ReceivedDateTime == nil {\n\t\tvar ret time.Time\n\t\treturn ret, false\n\t}\n\treturn *o.ReceivedDateTime, true\n}", "func (p *Permission) IsExpired() (bool, error) {\n\tcreatedAt, err := time.Parse(time.RFC3339, p.CreatedAt)\n\tif err != nil {\n\t\treturn false, fmt.Errorf(\"invalid time format for field \\\"created_at\\\": %s\", p.CreatedAt)\n\t}\n\treturn p.TTL >= 0 && time.Since(createdAt) > p.TTL, nil\n}" ]
[ "0.72603524", "0.6756117", "0.66905344", "0.66560125", "0.6611092", "0.6585459", "0.65163803", "0.64554447", "0.64243674", "0.640673", "0.639401", "0.63736403", "0.6364121", "0.6341019", "0.6313269", "0.6240817", "0.62230587", "0.6222547", "0.6210668", "0.62092924", "0.6120525", "0.6060152", "0.6035867", "0.601804", "0.5986044", "0.59116155", "0.59015954", "0.590059", "0.5860884", "0.5803653", "0.5708399", "0.56805015", "0.5669947", "0.56489044", "0.5643017", "0.56079906", "0.558819", "0.5587312", "0.5559781", "0.55581814", "0.55576897", "0.55512476", "0.5550056", "0.55487835", "0.5541973", "0.55407834", "0.55374724", "0.5534547", "0.55232894", "0.5508561", "0.54942983", "0.5493051", "0.5490446", "0.54807943", "0.5475367", "0.54742384", "0.5473059", "0.5452971", "0.5429153", "0.5428179", "0.54168844", "0.54136837", "0.53973985", "0.5363212", "0.53456295", "0.5332838", "0.5316223", "0.5313174", "0.5311851", "0.5301622", "0.52898467", "0.52848107", "0.52822304", "0.5275857", "0.52754194", "0.5273303", "0.5263286", "0.52513224", "0.52489203", "0.52472425", "0.52406746", "0.5235524", "0.52340233", "0.5223853", "0.5223075", "0.5220831", "0.5220303", "0.5218505", "0.52082354", "0.5203639", "0.519598", "0.51879436", "0.5173809", "0.51662135", "0.5156845", "0.5153224", "0.51515055", "0.5145198", "0.5137251", "0.5137211" ]
0.83418256
0
HasExpirationTimestamp returns a boolean if a field has been set.
func (o *AccessRequestData) HasExpirationTimestamp() bool { if o != nil && o.ExpirationTimestamp != nil { return true } return false }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (d *Result) HasExpiration() bool {\n\treturn d.withExpiration\n}", "func (o *AccessKey) HasExpirationDate() bool {\n\tif o != nil && o.ExpirationDate != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MuteFindingRequestProperties) HasExpirationDate() bool {\n\treturn o != nil && o.ExpirationDate != nil\n}", "func (o *MuteFindingResponseProperties) HasExpirationDate() bool {\n\treturn o != nil && o.ExpirationDate != nil\n}", "func (a *ACLToken) HasExpirationTime() bool {\n\tif a == nil || a.ExpirationTime == nil {\n\t\treturn false\n\t}\n\treturn !a.ExpirationTime.IsZero()\n}", "func HasExpired(cloudEvent map[string]interface{}) bool {\n\te, ok := cloudEvent[ExpirationField]\n\tif ok && e != \"\" {\n\t\texpiration, err := time.Parse(time.RFC3339, fmt.Sprintf(\"%s\", e))\n\t\tif err != nil {\n\t\t\treturn false\n\t\t}\n\n\t\treturn expiration.UTC().Before(time.Now().UTC())\n\t}\n\n\treturn false\n}", "func (e LifecycleExpiration) IsSet() bool {\n\treturn e.ExpirationDate != nil && !e.ExpirationDate.IsZero() || e.ExpirationInDays > 0\n}", "func (s *Store) HasExpirationChanged() bool {\n\ts.lock.RLock()\n\texpirationChanged := s.expirationChanged\n\ts.lock.RUnlock()\n\treturn expirationChanged\n}", "func (o *BulletinDTO) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func HasExpired(dev *schemas.Developer) bool {\n\t// null time or before now\n\treturn dev.Expiration.Equal(time.Time{}) || dev.Expiration.Before(time.Now())\n}", "func (o *ServiceCheck) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (entry *UtxoEntry) HasExpiry() bool {\n\treturn entry.packedFlags&utxoFlagHasExpiry == utxoFlagHasExpiry\n}", "func (me TGetReviewableHITsSortProperty) IsExpiration() bool { return me.String() == \"Expiration\" }", "func (o *EventAttributes) HasTimestamp() bool {\n\treturn o != nil && o.Timestamp != nil\n}", "func (o *SecurityProblemEvent) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *NewData) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ImageImportOperation) HasExpiresAt() bool {\n\tif o != nil && o.ExpiresAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *Attachment) HasExpired() bool {\n\tvar validTime = m.SigningTime.Add(time.Duration(m.SigningMinutes) * time.Minute)\n\treturn validTime.Unix() < time.Now().Unix()\n}", "func (me TSearchHITsSortProperty) IsExpiration() bool { return me.String() == \"Expiration\" }", "func IsExpired(ttl uint32, timestamp uint64) bool {\n\tif ttl == Persistent {\n\t\treturn false\n\t}\n\n\tnow := time.UnixMilli(time.Now().UnixMilli())\n\texpireTime := time.UnixMilli(int64(timestamp))\n\texpireTime = expireTime.Add(time.Duration(ttl) * time.Second)\n\n\treturn expireTime.Before(now)\n}", "func (o *ActionDTO) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *LogContent) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DeviceParameterValue) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *HyperflexSnapshotStatus) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DeviceResourceVersionValueWeb) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (p *Permission) IsExpired() (bool, error) {\n\tcreatedAt, err := time.Parse(time.RFC3339, p.CreatedAt)\n\tif err != nil {\n\t\treturn false, fmt.Errorf(\"invalid time format for field \\\"created_at\\\": %s\", p.CreatedAt)\n\t}\n\treturn p.TTL >= 0 && time.Since(createdAt) > p.TTL, nil\n}", "func (r *Record) IsExpired() bool {\n\treturn IsExpired(r.H.Meta.TTL, r.H.Meta.Timestamp)\n}", "func (o *AccessRequestData) GetExpirationTimestampOk() (*int64, bool) {\n\tif o == nil || o.ExpirationTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ExpirationTimestamp, true\n}", "func (o *HyperflexClusterHealthCheckExecutionSnapshot) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (upload *Upload) IsExpired() bool {\n\tif upload.ExpireAt != nil {\n\t\tif time.Now().After(*upload.ExpireAt) {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (t *BcsUser) HasExpired() bool {\n\tif time.Now().After(t.ExpiresAt) {\n\t\treturn true\n\t}\n\treturn false\n}", "func (o *NetworkLicenseFile) HasExpiryDate() bool {\n\tif o != nil && o.ExpiryDate != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AccessRequestData) HasCreatedTimestamp() bool {\n\tif o != nil && o.CreatedTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func isExpired(timestamp interface{}) bool {\n\tif validity, ok := timestamp.(float64); ok {\n\t\ttm := time.Unix(int64(validity), 0)\n\t\tremainder := tm.Sub(time.Now())\n\t\tif remainder > 0 {\n\t\t\treturn true\n\t\t}\n\t} else {\n\t\tglog.Error(\"Error casting timestamp to string. This may be due to a invalid token\")\n\t\textension.Exit(extension.ErrorExitCode)\n\t}\n\treturn false\n}", "func (o *DatasetEvent) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (c CachedObject) IsExpired() bool {\r\n\r\n\telapsed := time.Now().Sub(c.CreatedAt.Add(time.Hour * getExpiryTimeInHrs()))\r\n\r\n\tif elapsed > 0.0 {\r\n\t\treturn true\r\n\t}\r\n\r\n\treturn false\r\n}", "func (r *record) isExpired(now time.Time) bool {\n\tif r.Expires == 0 {\n\t\treturn false\n\t}\n\texpiryDateUTC := time.Unix(r.Expires, 0).UTC()\n\treturn now.UTC().After(expiryDateUTC)\n}", "func (o *CheckoutResponse) HasExpiresAt() bool {\n\tif o != nil && !IsNil(o.ExpiresAt) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func IsExpired(targetDate time.Time, timeAdded time.Duration) bool {\n\treturn time.Since(targetDate.Add(timeAdded)) > 0\n}", "func (m NoMDEntries) HasExpireTime() bool {\n\treturn m.Has(tag.ExpireTime)\n}", "func (err *ValidationError) IsExpired() bool { return err.exp }", "func (s *subscription) IsExpired() bool {\n\treturn s.ExpiresAt.Before(time.Now())\n}", "func (t *token) IsExpired() bool {\n\tif t == nil {\n\t\treturn true\n\t}\n\treturn t.Expired()\n}", "func (request *AccessToken) HasExpired() bool {\n\tcurrentTime := time.Now().Unix()\n\treturn currentTime > request.ExpiresAt\n}", "func (k Key) IsExpired() bool {\n\texpiry := k.Expires()\n\tif expiry.Equal(timeZero) {\n\t\treturn false\n\t}\n\n\treturn expiry.Before(time.Now().UTC())\n}", "func (tv *TimedValue) IsExpired() bool {\n\treturn tv.IsExpiredAt(time.Now())\n}", "func (l Info) IsExpired() bool {\n\treturn l.ExpiresAt.Before(time.Now())\n}", "func (b *ProviderBasis) IsExpired() bool {\n\tif b.CurrentTime == nil {\n\t\tb.CurrentTime = time.Now\n\t}\n\treturn !b.AlwaysValid && !b.CurrentTime().Before(b.expiration)\n}", "func (o *HyperflexHealthCheckPackageChecksum) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (s *Static) IsExpired() bool {\n\treturn false\n}", "func (o *RollbackDeductedLoyaltyPointsEffectProps) HasExpiryDate() bool {\n\tif o != nil && o.ExpiryDate != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (task *Task) IsExpired() bool {\n\tswitch task.Schedule.Regularity {\n\tcase apiModels.OneTime, apiModels.Trigger:\n\t\treturn common.ValidTime(time.Now().UTC(), task.RunTimeUTC)\n\tcase apiModels.Recurrent:\n\t\treturn !common.ValidTime(task.Schedule.EndRunTime.UTC(), task.RunTimeUTC)\n\t}\n\treturn true\n}", "func (o *SecurityProblem) HasLastUpdatedTimestamp() bool {\n\tif o != nil && o.LastUpdatedTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (t *MongoDBToken) IsExpired() bool {\n\treturn time.Now().UTC().Unix() >= t.Expired.Unix()\n}", "func (o *NewCoupons) HasExpiryDate() bool {\n\tif o != nil && o.ExpiryDate != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *VersionedConnection) HasFlowFileExpiration() bool {\n\tif o != nil && o.FlowFileExpiration != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *GetMessagesAllOf) HasTimestamp() bool {\n\tif o != nil && o.Timestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *PaymentMethodCash) HasExpiresAt() bool {\n\tif o != nil && !IsNil(o.ExpiresAt) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (s *StaticProvider) IsExpired() bool {\n\treturn false\n}", "func (o *Authorization) HasUpdatedAt() bool {\n\tif o != nil && o.UpdatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func IsTimeExpired(timestamp int64, offsetInSeconds float64) bool {\n\ttt := UTCUnixToTime(timestamp)\n\tremainder := tt.Sub(time.Now())\n\tlog.Info(\"remainder: %v calc : %v\", remainder, (remainder.Seconds() + offsetInSeconds))\n\n\treturn !((remainder.Seconds() + offsetInSeconds) > 0)\n}", "func (item Item) isExpired() bool {\n\tif item.Expiration == 0 {\n\t\treturn false\n\t}\n\treturn item.Expiration < time.Now().UnixNano()\n}", "func (c *CIDOffer) HasExpired() bool {\n\texpiryTime := time.Unix(c.expiry, 0)\n\tnow := time.Now()\n\treturn expiryTime.Before(now)\n}", "func (exp *ControlleeExpectations) isExpired() bool {\n\treturn clock.RealClock{}.Since(exp.timestamp) > ExpectationsTimeout\n}", "func (o *LoyaltySubLedger) HasExpiringPoints() bool {\n\tif o != nil && o.ExpiringPoints != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (t *Token) IsExpired() bool {\n\tif t.Expiry.IsZero() {\n\t\treturn false\n\t}\n\treturn t.Expiry.Round(0).Add(-expiryDelta).Before(timeNow())\n}", "func isExpired(expiryBytes []byte) bool {\n\texpiry := &time.Time{}\n\terr := expiry.UnmarshalText(expiryBytes)\n\tif err != nil {\n\t\treturn true\n\t}\n\treturn time.Now().After(*expiry)\n}", "func (v Value) IsExpiredForTime(time int64) bool {\n\treturn time >= v.EndSeconds\n}", "func (p *SSOCredentialProvider) IsExpired() bool {\n\tt, err := time.Parse(\"2006-01-02T15:04:05UTC\", p.Cache.ExpiresAt)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn t.Before(time.Now())\n}", "func (ti *TimeInfo) Expires() bool {\n\treturn !ti.ExpiryTime.IsZero()\n}", "func (m CrossOrderCancelReplaceRequest) HasExpireTime() bool {\n\treturn m.Has(tag.ExpireTime)\n}", "func (o *LoginRequestResponseData) HasOtpExpiresIn() bool {\n\tif o != nil && o.OtpExpiresIn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m NoMDEntries) HasExpireDate() bool {\n\treturn m.Has(tag.ExpireDate)\n}", "func (t *Token) Expired() bool {\n\treturn time.Now().Unix() >= t.ExpiredAt\n}", "func (o *Post) HasReceivedDateTime() bool {\n\tif o != nil && o.ReceivedDateTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (d *AccessData) IsExpired() bool {\n\treturn d.IsExpiredAt(time.Now())\n}", "func (k KeyData) Expired() bool {\n\tif k.Expiration == 0 {\n\t\treturn false\n\t}\n\n\tdelta := k.GetExpiration()\n\n\tif delta <= 0 {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func IsExpired(ctx Context, t UnixTime) bool {\n\tblockNow, err := BlockTime(ctx)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"%+v\", err))\n\t}\n\treturn t <= AsUnixTime(blockNow)\n}", "func (i *info) expired(now int64) bool {\n\treturn i.TTLStamp <= now\n}", "func (k2h *K2hash) SetExpirationDuration(duration int) (bool, error) {\n\tcDuration := C.time_t(duration)\n\tok := C.k2h_set_common_attr(k2h.handle, nil, nil, nil, nil, (*C.time_t)(&cDuration))\n\tif ok != true {\n\t\treturn false, fmt.Errorf(\"k2h_set_common_attr() returns false\")\n\t}\n\treturn true, nil\n}", "func (e Expiration) IsDateNull() bool {\n\treturn e.Date.Time.IsZero()\n}", "func (e Expiration) IsNull() bool {\n\treturn e.IsDaysNull() && e.IsDateNull()\n}", "func (o *AccessRequestData) SetExpirationTimestamp(v int64) {\n\to.ExpirationTimestamp = &v\n}", "func (j *Service) IsExpired(claims Claims) bool {\n\treturn !claims.VerifyExpiresAt(time.Now().Unix(), true)\n}", "func (o *Invitation) HasUpdatedAt() bool {\n\tif o != nil && o.UpdatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Service) HasUpdatedAt() bool {\n\tif o != nil && o.UpdatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (i *Info) expired(now int64) bool {\n\treturn i.TTLStamp <= now\n}", "func (o *InstanceStatusKubernetes) HasCreateTimestamp() bool {\n\tif o != nil && o.CreateTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (r IABResponse) IsExpired() bool {\n\tswitch {\n\tcase !r.IsValidSubscription():\n\t\treturn false\n\tdefault:\n\t\tnow := time.Now().UnixNano() / int64(time.Millisecond)\n\t\treturn r.SubscriptionPurchase.ExpiryTimeMillis < now\n\t}\n}", "func (o *SecurityProblem) HasFirstSeenTimestamp() bool {\n\tif o != nil && o.FirstSeenTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (d *Driver) Expired() bool {\n\tif d.Expiration == 0 {\n\t\treturn false\n\t}\n\treturn time.Now().UnixNano() > d.Expiration\n}", "func (b *Object) expired() bool {\n\tif b.expire <= 0 {\n\t\treturn false\n\t}\n\n\treturn time.Now().Unix() >= b.expire\n}", "func (o *AccessRequestData) GetExpirationTimestamp() int64 {\n\tif o == nil || o.ExpirationTimestamp == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.ExpirationTimestamp\n}", "func (o *MicrosoftGraphUsageDetails) HasLastModifiedDateTime() bool {\n\tif o != nil && o.LastModifiedDateTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (v *Value) Expired() bool {\n\tif v.Expires > 0 {\n\t\texpires := time.Unix(int64(v.Expires), 0)\n\t\tif expires.Before(time.Now()) {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphWindows10CompliancePolicy) HasLastModifiedDateTime() bool {\n\tif o != nil && o.LastModifiedDateTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (i *Item) IsExpired() bool {\n\t//zero means never expire\n\tif i.ExpiresAt.IsZero() {\n\t\treturn false\n\t}\n\treturn time.Now().After(i.ExpiresAt)\n}", "func (i *Item) IsExpired() bool {\n\t//zero means never expire\n\tif i.ExpiresAt.IsZero() {\n\t\treturn false\n\t}\n\treturn time.Now().After(i.ExpiresAt)\n}", "func (c *mockCredentialsProvider) IsExpired() bool {\n\treturn false\n}", "func (o *GuardianPolicyDataData) HasPolicyDelayedTime() bool {\n\tif o != nil && o.PolicyDelayedTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}" ]
[ "0.75199544", "0.75149095", "0.75095165", "0.741784", "0.71689016", "0.69214314", "0.6910806", "0.66951984", "0.6668346", "0.663676", "0.66352177", "0.661064", "0.656269", "0.65617937", "0.6548828", "0.65061426", "0.6496683", "0.6454688", "0.6446801", "0.6437165", "0.6395174", "0.63606447", "0.6330202", "0.6320821", "0.62620044", "0.6258999", "0.625431", "0.6250298", "0.6220372", "0.619855", "0.6189259", "0.6174091", "0.61632895", "0.61581033", "0.61549556", "0.61461186", "0.61378086", "0.61240864", "0.61171657", "0.6115752", "0.6099449", "0.6088776", "0.60716987", "0.6058332", "0.6044146", "0.6031303", "0.60243404", "0.6017785", "0.6008301", "0.60004276", "0.59991795", "0.59377694", "0.5936075", "0.59321547", "0.5920646", "0.59145814", "0.5906684", "0.5883566", "0.58816826", "0.5870844", "0.5856931", "0.585575", "0.5848569", "0.5817169", "0.57746845", "0.57697725", "0.5758402", "0.57493246", "0.5748995", "0.57483023", "0.5746386", "0.5742925", "0.5736414", "0.57305133", "0.57265633", "0.5723993", "0.572161", "0.5705596", "0.569745", "0.5684158", "0.56745785", "0.56676126", "0.5667198", "0.5659466", "0.56564647", "0.5652999", "0.5640129", "0.563137", "0.56300545", "0.56266844", "0.5611814", "0.5605711", "0.5597842", "0.5583643", "0.55820894", "0.5577348", "0.55757207", "0.55757207", "0.5568332", "0.5564998" ]
0.82977796
0
SetExpirationTimestamp gets a reference to the given int64 and assigns it to the ExpirationTimestamp field.
func (o *AccessRequestData) SetExpirationTimestamp(v int64) { o.ExpirationTimestamp = &v }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (s *Handshake) SetExpirationTimestamp(v time.Time) *Handshake {\n\ts.ExpirationTimestamp = &v\n\treturn s\n}", "func (m *VppToken) SetExpirationDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.expirationDateTime = value\n}", "func (m *UploadSession) SetExpirationDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.expirationDateTime = value\n}", "func (m *WindowsInformationProtectionDataRecoveryCertificate) SetExpirationDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"expirationDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (b *ClusterBuilder) ExpirationTimestamp(value time.Time) *ClusterBuilder {\n\tb.expirationTimestamp = value\n\tb.bitmap_ |= 131072\n\treturn b\n}", "func (m *Group) SetExpirationDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.expirationDateTime = value\n}", "func (s *Store) SetExpiration(expiration time.Duration) error {\n\ts.lock.Lock()\n\ts.expirationChanged = true\n\ts.lock.Unlock()\n\ts.Set(expirationAttributeKey, int64(expiration.Seconds()))\n\treturn nil\n}", "func (subscription *Subscription) SetExpiration(expiration time.Time) (*SubscriptionInfo, error) {\n\treturn subscription.Update(map[string]interface{}{\n\t\t\"expirationDateTime\": expiration,\n\t})\n}", "func (m *AgreementAcceptance) SetExpirationDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.expirationDateTime = value\n}", "func (mt *mockTokenBuilder) SetExpiration(t time.Duration) {\n\t//TODO some mocking\n}", "func (b *ProviderBasis) SetExpiration(expiration time.Time) {\n\tb.expiration = expiration\n\tif b.ExpireWindow > 0 {\n\t\tb.expiration = b.expiration.Add(-b.ExpireWindow)\n\t}\n}", "func (s *GetCredentialsOutput) SetExpiration(v time.Time) *GetCredentialsOutput {\n\ts.Expiration = &v\n\treturn s\n}", "func (s *Credentials) SetExpiration(v time.Time) *Credentials {\n\ts.Expiration = &v\n\treturn s\n}", "func (s *RoleCredentials) SetExpiration(v int64) *RoleCredentials {\n\ts.Expiration = &v\n\treturn s\n}", "func (o *AccessRequestData) GetExpirationTimestamp() int64 {\n\tif o == nil || o.ExpirationTimestamp == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.ExpirationTimestamp\n}", "func (m *RequestSchedule) SetExpiration(value ExpirationPatternable)() {\n err := m.GetBackingStore().Set(\"expiration\", value)\n if err != nil {\n panic(err)\n }\n}", "func SetExpiration(key string, val string, exp time.Duration, acc *tk.Account) {\n\tif acc != nil {\n\t\taccKeys[acc.Username] = append(accKeys[acc.Username], key)\n\t}\n\tclient.Set(key, val, exp)\n}", "func (s *DataLakeLifecycleConfiguration) SetExpiration(v *DataLakeLifecycleExpiration) *DataLakeLifecycleConfiguration {\n\ts.Expiration = v\n\treturn s\n}", "func (e *DiscordWebhookEmbed) SetTimestamp() {\n\te.Timestamp = time.Now().UTC().Format(\"2006-01-02T15:04:05-0700\")\n}", "func (k2h *K2hash) SetExpirationDuration(duration int) (bool, error) {\n\tcDuration := C.time_t(duration)\n\tok := C.k2h_set_common_attr(k2h.handle, nil, nil, nil, nil, (*C.time_t)(&cDuration))\n\tif ok != true {\n\t\treturn false, fmt.Errorf(\"k2h_set_common_attr() returns false\")\n\t}\n\treturn true, nil\n}", "func (transaction *TokenUpdateTransaction) SetExpirationTime(expirationTime time.Time) *TokenUpdateTransaction {\n\ttransaction._RequireNotFrozen()\n\ttransaction.expirationTime = &expirationTime\n\treturn transaction\n}", "func (o *SparseSSHAuthorizationPolicy) SetExpirationTime(expirationTime time.Time) {\n\n\to.ExpirationTime = &expirationTime\n}", "func (m *AccessPackageAssignment) SetExpiredDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.expiredDateTime = value\n}", "func (transaction *ContractUpdateTransaction) SetExpirationTime(expiration time.Time) *ContractUpdateTransaction {\n\ttransaction.requireNotFrozen()\n\ttransaction.pb.ExpirationTime = timeToProtobuf(expiration)\n\treturn transaction\n}", "func (transaction *FileCreateTransaction) SetExpirationTime(expiration time.Time) *FileCreateTransaction {\n\ttransaction._RequireNotFrozen()\n\ttransaction.expirationTime = &expiration\n\treturn transaction\n}", "func (DummyStore) SetWithExpiration(key string, value interface{}, expiration time.Duration) error {\n\treturn nil\n}", "func generateExpirationTimestamp() int64 {\n\treturn time.Now().Unix() + int64(3600)\n}", "func (s *Store) setExpiration(key string, expiration int64) error {\n\tconn := s.pool.Get()\n\tdefer conn.Close()\n\n\t_, err := conn.Do(\"EXPIRE\", key, expiration)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (r *StorageImpl) SetValidationTimestamp(ctx context.Context, qid string) error {\n\treturn retry(ctx, func() error {\n\t\tif err := r.client.Set(keyLastValidationTs(qid), fmt.Sprintf(\"%d\", time.Now().Unix()), 0).Err(); err != nil {\n\t\t\treturn newTempError(err)\n\t\t}\n\t\treturn nil\n\t}, defaultRetryLimit)\n}", "func (ms Int64DataPoint) SetTimestamp(v TimestampUnixNano) {\n\t(*ms.orig).TimeUnixNano = uint64(v)\n}", "func (ms HistogramBucketExemplar) SetTimestamp(v TimestampUnixNano) {\n\t(*ms.orig).TimeUnixNano = uint64(v)\n}", "func GenerateExpirationTimestamp(currentTimestamp time.Time, addDays int) (*time.Time, error) {\n\tif currentTimestamp.IsZero() {\n\t\treturn nil, consts.ErrInvalidTimeStamp\n\t}\n\n\tif addDays <= 0 {\n\t\treturn nil, consts.ErrInvalidNumberOfDays\n\t}\n\n\ttimeZonedTimestamp := currentTimestamp\n\tif currentTimestamp.Location().String() != utc {\n\t\ttimeZonedTimestamp = currentTimestamp.UTC()\n\t}\n\n\t// addDays to current weekday to get to addDays later\n\t// ie: adding 7 days to current weekday gets you one week later timestamp\n\tmodifiedTimestamp := timeZonedTimestamp.AddDate(0, 0, addDays)\n\n\t// reset time to 3 AM\n\texpirationTimestamp := time.Date(modifiedTimestamp.Year(), modifiedTimestamp.Month(), modifiedTimestamp.Day(),\n\t\t3, 0, 0, 0, timeZonedTimestamp.Location())\n\n\treturn &expirationTimestamp, nil\n}", "func (l *LockArgs) SetTimestamp(tstamp time.Time) {\n\tl.Timestamp = tstamp\n}", "func (r *PromRule) SetEvaluationTimestamp(ts time.Time) {\n\tr.mtx.Lock()\n\tdefer r.mtx.Unlock()\n\tr.evaluationTimestamp = ts\n}", "func (o *SSHAuthorizationPolicy) SetExpirationTime(expirationTime time.Time) {\n\n\to.ExpirationTime = expirationTime\n}", "func (o *MuteFindingRequestProperties) SetExpirationDate(v int64) {\n\to.ExpirationDate = &v\n}", "func (s *Shadow) SetExpire(t *time.Time) { s.expire = secToDay(t.Unix()) }", "func SetWatchdogViaTimestamp(iTimestamp int, watchdog *Watchdog) (int64, error) {\n\twatchdog.Timestamp = iTimestamp\n\treturn Engine.Insert(watchdog)\n}", "func (rec *RawEventCreate) SetTimestamp(t time.Time) *RawEventCreate {\n\trec.mutation.SetTimestamp(t)\n\treturn rec\n}", "func (sg *StorageGroup) SetExpirationEpoch(epoch uint64) {\n\t(*storagegroup.StorageGroup)(sg).\n\t\tSetExpirationEpoch(epoch)\n}", "func timestampToExpiration(t *types.Timestamp) string {\n\treturn time.Unix(int64(t.Seconds), int64(t.Nanos)).UTC().Format(\"2006-01-02 15:05:05\")\n}", "func (o *MuteFindingResponseProperties) SetExpirationDate(v int64) {\n\to.ExpirationDate = &v\n}", "func (sh *ServerPropertiesHandle) SetTimestamp(timestamp string) {\n\tsh.timestamp = timestamp\n}", "func (c Claims) SetExpiry(tm time.Time) Claims {\n\tc[\"exp\"] = tm.UTC().Unix()\n\treturn c\n}", "func (m *Vulnerability) SetLastModifiedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"lastModifiedDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (info *Info) SetTimestamp(t time.Time) {\n\tinfo.Attributes[\"sig.timestamp\"] = t.UTC()\n}", "func Expires_AtTimestamp(t *float64) Expires {\n\t_init_.Initialize()\n\n\tvar returns Expires\n\n\t_jsii_.StaticInvoke(\n\t\t\"monocdk.aws_s3_deployment.Expires\",\n\t\t\"atTimestamp\",\n\t\t[]interface{}{t},\n\t\t&returns,\n\t)\n\n\treturn returns\n}", "func (c *cache) setExpiration(key string, expires time.Duration) {\n\tif expires != 0 {\n\t\ttimeStamp := time.Now().Add(expires)\n\t\theap.Push(&c.Exps, expiration{key, timeStamp})\n\t} else {\n\t\tindex, ok := c.Exps.Indexes[key]\n\t\tif ok {\n\t\t\theap.Remove(&c.Exps, index)\n\t\t}\n\t}\n}", "func (ldb *LevelDB) SetExpireAt(key []byte, at *time.Time) {\n\tif at == nil || at.IsZero() {\n\t\treturn\n\t}\n\n\tbuf := make([]byte, 8)\n\tbinary.BigEndian.PutUint64(buf, uint64(at.Unix()))\n\tldb.put(encodeExpireKey(key), buf)\n}", "func (m *VppToken) SetLastModifiedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.lastModifiedDateTime = value\n}", "func (k Key) SetExpires(value time.Time) {\n\texpire := value.Unix()\n\tif expire > 0 {\n\t\texpire = expire - timeOffset\n\t}\n\tk[20] = byte(uint32(expire) >> 24)\n\tk[21] = byte(uint32(expire) >> 16)\n\tk[22] = byte(uint32(expire) >> 8)\n\tk[23] = byte(uint32(expire))\n}", "func (s Scheduler) SetExpire(t TaskRecord, time int) {\n s.Cache.Expire(buildTaskKey(t), time)\n}", "func SetSessionExpiration(sessionID string, ttl int) error {\n\tkey := stringutil.Build(\"sessionid:\", sessionID, \":userid\")\n\terr := Expire(key, ttl)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"cannot expire key in Redis\")\n\t}\n\treturn nil\n}", "func (c *Client) SetInt64(ctx context.Context, key string, value int64, expiration time.Duration) error {\n\terr := c.client.Set(ctx, key, value, expiration).Err()\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (this *ValueTransaction) SetTimestamp(timestamp uint) bool {\n\tthis.timestampMutex.RLock()\n\tif this.timestamp == nil || *this.timestamp != timestamp {\n\t\tthis.timestampMutex.RUnlock()\n\t\tthis.timestampMutex.Lock()\n\t\tdefer this.timestampMutex.Unlock()\n\t\tif this.timestamp == nil || *this.timestamp != timestamp {\n\t\t\tthis.timestamp = &timestamp\n\n\t\t\tthis.BlockHasher()\n\t\t\tcopy(this.trits[TIMESTAMP_OFFSET:TIMESTAMP_END], trinary.MustPadTrits(trinary.IntToTrits(int64(timestamp)), TIMESTAMP_SIZE)[:TIMESTAMP_SIZE])\n\t\t\tthis.UnblockHasher()\n\n\t\t\tthis.SetModified(true)\n\t\t\tthis.ReHash()\n\n\t\t\treturn true\n\t\t}\n\t} else {\n\t\tthis.timestampMutex.RUnlock()\n\t}\n\n\treturn false\n}", "func (_e *ExpiryStore_Expecter) SetIPBanExpiration(ip interface{}, expiry interface{}) *ExpiryStore_SetIPBanExpiration_Call {\n\treturn &ExpiryStore_SetIPBanExpiration_Call{Call: _e.mock.On(\"SetIPBanExpiration\", ip, expiry)}\n}", "func (m *PaymentTerm) SetLastModifiedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"lastModifiedDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *PresenceStatusMessage) SetExpiryDateTime(value DateTimeTimeZoneable)() {\n err := m.GetBackingStore().Set(\"expiryDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (tru *TradeRecordUpdate) SetTimestamp(t time.Time) *TradeRecordUpdate {\n\ttru.mutation.SetTimestamp(t)\n\treturn tru\n}", "func (s *DatabaseServerV3) SetExpiry(expiry time.Time) {\n\ts.Metadata.SetExpiry(expiry)\n}", "func (bb *BlockBuilder) SetTimestamp(timestamp types.Uint64) {\n\tbb.block.Timestamp = timestamp\n}", "func (ms SummaryDataPoint) SetTimestamp(v TimestampUnixNano) {\n\t(*ms.orig).TimeUnixNano = uint64(v)\n}", "func (bb *BlockBuilder) SetTimestamp(timestamp uint64) {\n\tbb.block.Timestamp = timestamp\n}", "func Expiration(expiration time.Duration) Option {\n\treturn func(s *Store) {\n\t\ts.expiration = expiration\n\t}\n}", "func (m *Metadata) SetTTL(clock Clock, ttl time.Duration) {\n\texpireTime := clock.Now().UTC().Add(ttl)\n\tm.Expires = &expireTime\n}", "func (s *SQLite) ExpirableSet(key string, val []byte, t time.Time) error {\n\t// Override the old value with new one.\n\tstmt, err := s.db.Prepare(\"REPLACE INTO key_value_expire (key, expireAt, value) VALUES (?,?,?)\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer stmt.Close()\n\t_, err = stmt.Exec(key, t, val)\n\n\treturn err\n}", "func (aruo *AuthRequestUpdateOne) SetExpiry(t time.Time) *AuthRequestUpdateOne {\n\taruo.mutation.SetExpiry(t)\n\treturn aruo\n}", "func (m *CustomAccessPackageWorkflowExtension) SetLastModifiedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"lastModifiedDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (o *AccessRequestData) HasExpirationTimestamp() bool {\n\tif o != nil && o.ExpirationTimestamp != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (truo *TradeRecordUpdateOne) SetTimestamp(t time.Time) *TradeRecordUpdateOne {\n\ttruo.mutation.SetTimestamp(t)\n\treturn truo\n}", "func (sess *Session) UpdateExpirationTime() error {\n\tconst q = `UPDATE Sessions SET (expires, updatedAt) = ($1, now())\n\t WHERE token=$2\n\t RETURNING *`\n\n\treturn database.Get(sess, q, time.Now().Add(conf.GetServerConfig().SessionLifeTime), sess.Token)\n}", "func (ms HistogramDataPoint) SetTimestamp(v TimestampUnixNano) {\n\t(*ms.orig).TimeUnixNano = uint64(v)\n}", "func (o *AccessKey) SetExpirationDate(v string) {\n\to.ExpirationDate = &v\n}", "func (m *ManagedAppPolicy) SetLastModifiedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.lastModifiedDateTime = value\n}", "func (s *Session) SetExpiry(exp time.Duration) {\n\ts.exp = exp\n}", "func (v *Value) SetExpiry(t time.Time) *Value {\n\tv.expires = t\n\treturn v\n}", "func (aru *AuthRequestUpdate) SetExpiry(t time.Time) *AuthRequestUpdate {\n\taru.mutation.SetExpiry(t)\n\treturn aru\n}", "func (m *VppToken) GetExpirationDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.expirationDateTime\n}", "func (_e *ExpiryStore_Expecter) SetPeerBanExpiration(id interface{}, expiry interface{}) *ExpiryStore_SetPeerBanExpiration_Call {\n\treturn &ExpiryStore_SetPeerBanExpiration_Call{Call: _e.mock.On(\"SetPeerBanExpiration\", id, expiry)}\n}", "func (m *Metadata) SetExpiry(expires time.Time) {\n\tm.Expires = &expires\n}", "func (ms DoubleDataPoint) SetTimestamp(v TimestampUnixNano) {\n\t(*ms.orig).TimeUnixNano = uint64(v)\n}", "func (m *TermsExpiration) SetStartDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.startDateTime = value\n}", "func (o *SecurityProblemEvent) SetTimestamp(v int64) {\n\to.Timestamp = &v\n}", "func (in *ActionUserDeleteInput) SetExpirationDate(value string) *ActionUserDeleteInput {\n\tin.ExpirationDate = value\n\n\tif in._selectedParameters == nil {\n\t\tin._selectedParameters = make(map[string]interface{})\n\t}\n\n\tin._selectedParameters[\"ExpirationDate\"] = nil\n\treturn in\n}", "func (n *Namespace) SetExpiry(expires time.Time) {\n\tn.Metadata.SetExpiry(expires)\n}", "func (b *ProviderBasis) SetExpirationFromJWT(jwt string) error {\n\tclaims, err := DecodeTokenWithKey(jwt, b.Pub)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"failed to decode jwt '%v'\", jwt)\n\t}\n\n\tb.AlwaysValid = claims.ExpiresAt == 0 // if unset\n\tb.SetExpiration(time.Unix(claims.ExpiresAt, 0))\n\treturn nil\n}", "func (c *Cache) Set(key string, value interface{}, exp time.Duration) error {\n\t// By default, go-cache uses -1 for NoExpiration, but we expect 0 to be no expiration.\n\tif exp == 0 {\n\t\texp = -1\n\t}\n\tc.gc.Set(key, value, exp)\n\treturn nil\n}", "func (b *taskBuilder) expiration(e time.Duration) {\n\tb.Spec.Expiration = e\n}", "func (m *UploadSession) GetExpirationDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.expirationDateTime\n}", "func (o *EventAttributes) SetTimestamp(v int64) {\n\to.Timestamp = &v\n}", "func (f *Format) SetTimestamp(timestampFormat string) {\n\n\tf.Timestamp = timestampFormat\n\n}", "func (a *Authorization) Expires(t time.Time) {\n\ta.timestamp = t.Unix()\n}", "func (h *ResourceHeader) SetExpiry(t time.Time) {\n\th.Metadata.SetExpiry(t)\n}", "func (m *TradeRecordMutation) SetTimestamp(t time.Time) {\n\tm.timestamp = &t\n}", "func (m *EducationAssignment) SetLastModifiedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.lastModifiedDateTime = value\n}", "func (druo *DeviceRequestUpdateOne) SetExpiry(t time.Time) *DeviceRequestUpdateOne {\n\tdruo.mutation.SetExpiry(t)\n\treturn druo\n}", "func (o *HyperflexSnapshotStatus) SetTimestamp(v int64) {\n\to.Timestamp = &v\n}", "func (m *SecureScoreControlProfile) SetLastModifiedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.lastModifiedDateTime = value\n}", "func (m *GroupPolicyDefinition) SetLastModifiedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"lastModifiedDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (s *AppServerV3) SetExpiry(expiry time.Time) {\n\ts.Metadata.SetExpiry(expiry)\n}" ]
[ "0.7312452", "0.721172", "0.71144074", "0.7087753", "0.7070104", "0.7031022", "0.69244564", "0.68076855", "0.675629", "0.67473906", "0.65214986", "0.6499722", "0.6499677", "0.64324677", "0.64122295", "0.64063156", "0.63514966", "0.62901646", "0.5995", "0.59732956", "0.5971779", "0.59263736", "0.5916714", "0.59070957", "0.5886834", "0.58819026", "0.585283", "0.58197284", "0.58165354", "0.5815433", "0.5714537", "0.5635949", "0.56218934", "0.56148857", "0.56092733", "0.56090075", "0.5590491", "0.556861", "0.55613786", "0.5560895", "0.55462664", "0.5525827", "0.55230266", "0.5483581", "0.5476691", "0.54668385", "0.5464365", "0.5463855", "0.5451485", "0.54449576", "0.54356986", "0.54159087", "0.53988844", "0.539046", "0.5389214", "0.5389169", "0.5344043", "0.53431475", "0.53354645", "0.5321149", "0.53196156", "0.5313168", "0.5304599", "0.5297404", "0.52911043", "0.527841", "0.5274325", "0.52502966", "0.52392185", "0.52367866", "0.5236352", "0.52360064", "0.5198151", "0.51962453", "0.5188902", "0.5186721", "0.51830524", "0.51818067", "0.51709604", "0.51656806", "0.51632726", "0.5159906", "0.51457965", "0.51457137", "0.513498", "0.5127246", "0.5100613", "0.5096872", "0.5090624", "0.5085161", "0.5080659", "0.5069197", "0.5068922", "0.5068766", "0.5059223", "0.5054987", "0.50363624", "0.50344634", "0.5031682", "0.5023893" ]
0.79927087
0
GetState returns the State field value if set, zero value otherwise.
func (o *AccessRequestData) GetState() string { if o == nil || o.State == nil { var ret string return ret } return *o.State }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (m *Device) GetState() (val map[string]Property, set bool) {\n\tif m.State == nil {\n\t\treturn\n\t}\n\n\treturn *m.State, true\n}", "func (m *UpdateDeviceRequest) GetState() (val map[string]interface{}, set bool) {\n\tif m.State == nil {\n\t\treturn\n\t}\n\n\treturn *m.State, true\n}", "func (b *OGame) GetState() (bool, string) {\n\treturn atomic.LoadInt32(&b.lockedAtom) == 1, b.state\n}", "func (rf *Raft) GetState() (int, bool) {\r\n\r\n\tvar term int\r\n\tvar isleader bool\r\n\t// Your code here.\r\n\tterm = int(rf.getTerm())\r\n\tisleader = rf.isState(LEADER)\r\n\treturn term, isleader\r\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t{\n\t\trf.mu.Lock()\n\t\tterm = int(rf.currentTerm)\n\n\t\tif rf.leaderId == LEADER {\n\t\t\tisleader = true\n\t\t} else {\n\t\t\tisleader = false\n\t\t}\n\t\trf.mu.Unlock()\n\t}\n\treturn term, isleader\n}", "func (s *StatusEvent) GetState() string {\n\tif s == nil || s.State == nil {\n\t\treturn \"\"\n\t}\n\treturn *s.State\n}", "func (c *Client) GetState() (int, error) {\n\tctx, cancel := context.WithTimeout(context.Background(), c.rpcTimeout)\n\tdefer cancel()\n\treq := &pb.EmptyReq{}\n\tres, err := c.rpcClient.GetState(ctx, req)\n\treturn int(res.GetState()), err\n}", "func (ld *LibvirtDomain) GetState() (DomainState, error) {\n\treturn DOMAIN_NOSTATE, fmt.Errorf(\"not supported\")\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n\tvar term int\n\tvar isleader bool\n\tterm=rf.term\n\tif rf.state==2{\n\t\tisleader=true\n\t}else{\n\t\tisleader=false\n\t}\n\trf.mu.Unlock()\n\t// Your code here (2A).\n\treturn term, isleader\n}", "func (b *Button) GetState() int {\n\treturn int(b.SendMessage(win.BM_GETSTATE, 0, 0))\n}", "func (o *Vm) GetState() string {\n\tif o == nil || o.State == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.State\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\tterm = rf.currentTerm\n\tif rf.state == \"leader\" {\n\t\tisleader = true\n\t} else {\n\t\tisleader = false\n\t}\n\t//DPrintf(\"GetState of %d, term=%d, isleader=%v\", rf.me, term, isleader)\n\treturn term, isleader\n}", "func (obj *StateObject) GetState(db Database, key math.Hash) math.Hash {\n\t// If we have a dirty value for this state entry, return it\n\tvalue, dirty := obj.dirtyStorage[key]\n\tif dirty {\n\t\treturn value\n\t}\n\t// Otherwise return the entry's original value\n\treturn obj.GetCommittedState(db, key)\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tterm = rf.currentTerm\n\tisleader = (rf.state == Leader)\n\trf.mu.Unlock()\n\treturn term, isleader\n}", "func (o *V0037Node) GetState() string {\n\tif o == nil || o.State == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.State\n}", "func (o *Volume) GetState() string {\n\tif o == nil || o.State == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.State\n}", "func (o *Volume) GetState() string {\n\tif o == nil || o.State == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.State\n}", "func GetState(key string) interface{} {\n\tmu.Lock()\n\tdefer mu.Unlock()\n\treturn state[key]\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.currentTerm\n\tisleader = rf.getState() == Leader\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\tvar term int\n\tvar isleader bool\n\trf.mu.Lock()\n\tterm = rf.CurrentTerm\n\tisleader = rf.isLeader\n\trf.mu.Unlock()\n\treturn term, isleader\n}", "func (w *Watcher) GetState(key string) any {\n\tw.lock.RLock()\n\tdefer w.lock.RUnlock()\n\n\treturn w.stateCache[key]\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tterm = rf.currentTerm\n\tisleader = rf.state == LEADER\n\trf.mu.Unlock()\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.CurrentTerm\n\tisleader = rf.IsLeader\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\n\tterm = rf.currentTerm\n\tisleader = rf.state == leader\n\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\n\tterm = rf.currentTerm\n\tisleader = rf.IsLeader()\n\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tterm = rf.currentTerm\n\tif rf.state == leader {\n\t\tisleader = true\n\t} else {\n\t\tisleader = false\n\t}\n\trf.mu.Unlock()\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.currentTerm\n\tisleader = rf.state == Leader\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tif rf.state == Leader {\n\t\tisleader = true\n\t} else {\n\t\tisleader = false\n\t}\n\n\tterm = rf.currentTerm\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here.\n\n\trf.mu.Lock()\n\tterm = rf.currentTerm\n\tif rf.state == Leader {\n\t\tisleader = true\n\t} else {\n\t\tisleader = false\n\t}\n\trf.mu.Unlock()\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\t// Your code here.\n\t//rf.mtx.Lock()\n\t//defer rf.mtx.Unlock()\n\treturn rf.currentTerm, rf.state == STATE_LEADER\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\n\t// Your code here (2A).\n\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\n\tterm = rf.currentTerm\n\tisleader = rf.status == Leader\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\t//var term int\n\t//var isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\treturn rf.currentTerm, rf.currentState == StateLeader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\tterm = rf.currentTerm\n\tif rf.currentState ==\"LEADER\"{\n\t\tisleader =true\n\t} else{\n\t\tisleader =false\n\t}\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.RLock()\n\tdefer rf.mu.RUnlock()\n\treturn int(rf.currentTerm), rf.IsLeader()\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isLeader bool\n\trf.stateCond.L.Lock()\n\tisLeader = rf.state == Leader\n\tterm = *rf.CurrentTerm\n\trf.stateCond.L.Unlock()\n\treturn term, isLeader\n}", "func (rf *Raft) GetState() (int, bool) {\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.currentTerm\n\tisleader = rf.state == Leader\n\treturn term, isleader\n}", "func (f *Machine) State() uint8 {\n\treturn f.state\n}", "func (o *VirtualGateway) GetState() string {\n\tif o == nil || o.State == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.State\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.currentTerm\n\tisleader = (rf.role == LEADER)\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here.\n\tterm = rf.currentTerm\n\tisleader = (rf.state == LEADER)\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\tvar term int\n\tvar isleader bool\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.currentTerm\n\tisleader = rf.state == Leader\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\n\tterm = rf.currentTerm\n\tif rf.hasLeader && rf.leader == rf.me {\n\t\tisleader = true\n\t} else {\n\t\tisleader = false\n\t}\n\n\treturn term, isleader\n}", "func (o *EquipmentBaseSensor) GetState() string {\n\tif o == nil || o.State == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.State\n}", "func (rf *Raft) GetState() (int, bool) {// {{{\n\trf.mu.Lock()\n\tterm := rf.curTerm\n\tisleader := (rf.state == LEADER)\n\trf.mu.Unlock() \n\treturn term, isleader\n}", "func (peer *Peer) GetState() uint64 {\n\tpeer.lock.RLock()\n\tdefer peer.lock.RUnlock()\n\treturn peer.state\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.currentTerm\n\treturn term, rf.state == Leader\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\n\tvar term int\n\tvar isleader bool\n\n\t// Your code here (2A).\n\n\tterm = rf.currentTerm\n\tif rf.state == LEADER {\n\t\tisleader = true\n\t} else {\n\t\tisleader = false\n\t}\n\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.lock(\"GetState()\")\n\tdefer rf.unlock(\"GetState()\")\n\tterm = rf.currentTerm\n\tisleader = rf.state == LEADER\n\t// DPrintf(\"the [%d]raft's term is [%d]\", rf.me, term)\n\treturn term, isleader\n}", "func (stateObj *stateObject) GetState(db StateDatabase, key common.Hash) common.Hash {\n\t// If the fake storage is set, only lookup the state here(in the debugging mode)\n\tif stateObj.fakeStorage != nil {\n\t\treturn stateObj.fakeStorage[key]\n\t}\n\t// If we have a dirty value for this state entry, return it\n\tvalue, dirty := stateObj.dirtyStorage[key]\n\tif dirty {\n\t\treturn value\n\t}\n\t// Otherwise return the entry's original value\n\treturn stateObj.GetCommittedState(db, key)\n}", "func (o *AccessKey) GetState() string {\n\tif o == nil || o.State == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.State\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\t// Your code here.\n\treturn rf.currentTerm, rf.serverState == Leader\n}", "func (_DelegationController *DelegationControllerCaller) GetState(opts *bind.CallOpts, delegationId *big.Int) (uint8, error) {\n\tvar (\n\t\tret0 = new(uint8)\n\t)\n\tout := ret0\n\terr := _DelegationController.contract.Call(opts, out, \"getState\", delegationId)\n\treturn *ret0, err\n}", "func (c FieldsCollection) State() *models.Field {\n\treturn c.MustGet(\"State\")\n}", "func (rf *Raft) GetState() (int, bool) {\n\t// Your code here (2A).\n\trf.stateLock.Lock()\n\tdefer rf.stateLock.Unlock()\n\treturn int(rf.currentTerm), atomic.LoadInt32(&rf.isLeader) == 1\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\n//\trf.mu.Lock()\n\tterm = rf.currentTerm\n\tisleader = (rf.role == LEADER)\n//\trf.mu.Unlock()\n\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.currentTerm\n\tisleader = rf.role == Leader\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\t// this is important\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\n\treturn rf.currentTerm, rf.state == LEADER\n}", "func (rf *Raft) GetState() (int, bool) {\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\tterm = rf.currentTerm\n\tif rf.state == Leader {\n\t\tisleader = true\n\t} else {\n\t\tisleader = false\n\t}\n\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\tisleader = false\n\tif rf.status == 2 {\n\t\tisleader = true\n\t}\n\tterm = rf.currentTerm\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n defer rf.mu.Unlock()\n\t// Your code here (2A).\n\treturn rf.currentTerm, rf.role == 2\n}", "func (rf *Raft) GetState() (int, bool) {\n\tvar term int\n\tvar isLeader bool\n\t// Your code here (2A).\n\trf.lock(\"GetState\")\n\tisLeader = rf.state == Leader\n\tterm = rf.currentTerm\n\tdefer rf.unlock(\"GetState\")\n\tif isLeader {\n\t\tDPrintf(\"Server %v get state is leader: %v\", rf.me, isLeader)\n\t}\n\treturn term, isLeader\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\tterm = rf.currenctTerm\n\tisleader = rf.Role == \"leader\"\n\t// here just return the fields\n\treturn term, isleader\n}", "func (p *PhidgetDigitalOutput) GetState() (bool, error) {\n\tvar r C.int\n\tcerr := C.PhidgetDigitalOutput_getState(p.handle, &r)\n\tif cerr != C.EPHIDGET_OK {\n\t\treturn false, p.phidgetError(cerr)\n\t}\n\treturn r != 0, nil\n}", "func (rf *Raft) GetState() (int, bool) {\n\t// fmt.Printf(\"State for server %v... currentTerm: %v; state: %v; isLeader: %v\\n\", rf.me, rf.currentTerm, rf.state, rf.state == Leader)\n\treturn rf.currentTerm, (rf.state == Leader)\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\treturn rf.currentTerm, rf.state==LEADER\n}", "func (rf *Raft) GetState() (int, bool) {\n\t// Your code here (2A).\n\t// warn GetState不加锁,因为后续在处理请求时,会频繁调用GetState()函数,影响raft layer的performance,并且读操作此时不需要线程安全,data race is acceptable\n\tterm := rf.Term\n\tisLeader := rf.state == Leader\n\treturn term, isLeader\n}", "func (stub *MockStub) GetState(key string) ([]byte, error) {\n\tvalue := stub.State[key]\n\treturn value, nil\n}", "func (d *DeploymentStatusRequest) GetState() string {\n\tif d == nil || d.State == nil {\n\t\treturn \"\"\n\t}\n\treturn *d.State\n}", "func (rf *Raft) GetState() (int, bool) {\n\tvar term int\n\tvar isleader bool\n\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.currentTerm\n\tisleader = rf.electionState == leader\n\n\treturn term, isleader\n}", "func (m *Membership) GetState() string {\n\tif m == nil || m.State == nil {\n\t\treturn \"\"\n\t}\n\treturn *m.State\n}", "func (rf *Raft) GetState() (int, int, bool) {\n\trf.mux.Lock() //CS for accessing state variables\n\tdefer rf.mux.Unlock()\n\n\tme, term := rf.me, rf.currTerm\n\tisleader := rf.role == Leader\n\n\trf.logger.Printf(\"Showing current state of server. Role is %v \\n\", rf.role)\n\treturn me, term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\n\tvar term int\n\tvar isleader bool\n\n\tterm = rf.currentTerm\n\tisleader = rf.role == LEADER\n\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\tswitch rf.State {\n\tcase Leader:\n\t\tDPrintf(\"[GetState] Server%v is Leader.\\n\", rf.me)\n\tcase Candidates:\n\t\tDPrintf(\"[GetState] Server%v is Candidate.\\n\", rf.me)\n\tcase Follower:\n\t\tDPrintf(\"[GetState] Server%v is Follower.\\n\", rf.me)\n\t}\n\n\tterm = rf.CurrentTerm\n\tif rf.State == Leader {\n\t\tisleader = true\n\t} else {\n\t\tisleader = false\n\t}\n\t// Your code here (2A).\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n var term int\n var isleader bool\n \n rf.mu.Lock()\n term = rf.currentTerm\n isleader = (rf.state == \"Leader\")\n rf.mu.Unlock()\n\n return term, isleader\n}", "func (o *NotificationAllOf) GetState() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.State\n}", "func GetState(fd uintptr) (*State, error) {\n\treturn &State{}, nil\n}", "func (rf *Raft) GetState() (int, bool) {\n\t// Your code here (2A).\n\tterm := rf.currentTerm\n\tisleader := rf.state == Leader\n\treturn term, isleader\n}", "func (n *Node) GetState() ginterface.INodeState {\n\treturn n.State\n}", "func (rf *Raft) GetState() (term int, isleader bool) {\n\tterm = rf.currentTerm.Load().(int)\n\tisleader = rf.state.Load().(int) == leader\n\treturn\n}", "func GetState(context context.Context, obj runtime.Object) func() string {\n\treturn func() string {\n\t\tif obj := GetObject(context, obj)(); obj != nil {\n\t\t\tif status := resv1.GetStatus(obj); status != nil {\n\t\t\t\treturn status.GetState()\n\t\t\t}\n\t\t}\n\t\treturn \"\"\n\t}\n}", "func (rf *Raft) GetState() (int, bool) {\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\tterm = rf.currentTerm\n\tisleader = rf.role == Leader\n\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.Lock()\n\tdefer rf.Unlock()\n\tterm := rf.currentTerm\n\tisleader := rf.state == Leader\n\t// Your code here (2A).\n\treturn term, isleader\n}", "func (i *IssueRequest) GetState() string {\n\tif i == nil || i.State == nil {\n\t\treturn \"\"\n\t}\n\treturn *i.State\n}", "func (g *Gameboi) GetState() string {\n\treturn fmt.Sprintf(\"Acc: %d Ptr: %d Instr: %#v\\n\", g.acc, g.instrPointer, g.program[g.instrPointer])\n}", "func (i *Issue) GetState() string {\n\tif i == nil || i.State == nil {\n\t\treturn \"\"\n\t}\n\treturn *i.State\n}", "func (c *Connection) GetState() State {\n\treturn c.state\n}", "func (sm *StateMachine) State() int {\n\treturn sm.state\n}", "func (rf *Raft) GetState() (int, bool) {\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\treturn rf.currentTerm, rf.raftState == Leader\n\n}", "func (rf *Raft) GetState() (int, bool) {\n\t// Your code here (2A).\n\n\treturn rf.currentTerm, rf.IsLeader()\n}", "func (_DelegationController *DelegationControllerCallerSession) GetState(delegationId *big.Int) (uint8, error) {\n\treturn _DelegationController.Contract.GetState(&_DelegationController.CallOpts, delegationId)\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\treturn rf.CurrentTerm, rf.state == Leader\n}", "func (_DelegationController *DelegationControllerSession) GetState(delegationId *big.Int) (uint8, error) {\n\treturn _DelegationController.Contract.GetState(&_DelegationController.CallOpts, delegationId)\n}", "func (o *HyperflexEncryption) GetState() string {\n\tif o == nil || o.State == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.State\n}", "func (c *CombinedStatus) GetState() string {\n\tif c == nil || c.State == nil {\n\t\treturn \"\"\n\t}\n\treturn *c.State\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\t// Your code here.\n\treturn rf.currentTerm, rf.state == StateLeader\n}", "func (m *MacOSSoftwareUpdateStateSummary) GetState()(*MacOSSoftwareUpdateState) {\n val, err := m.GetBackingStore().Get(\"state\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*MacOSSoftwareUpdateState)\n }\n return nil\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.Lock()\n\tdefer rf.Unlock()\n\n\tvar term int = rf.currentTerm\n\tvar isleader bool = rf.state == Leader\n\t// Your code here (2A).\n\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) { //获取服务器的任期和他是否认为自己是leader\n\n\tterm := rf.currentTerm\n\tisLeader := rf.state == 1 //1 is leader\n\t// Your code here.\n\treturn term, isLeader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tterm := rf.currentTerm\n\tisleader := (rf.role == Leader)\n\n\treturn term, isleader\n}" ]
[ "0.7272373", "0.70393276", "0.69039804", "0.668216", "0.66630924", "0.6645837", "0.6636979", "0.66332215", "0.66159344", "0.6603467", "0.6587229", "0.65817314", "0.6575687", "0.65719956", "0.6571494", "0.65650856", "0.6564096", "0.6564096", "0.655525", "0.65534186", "0.6550282", "0.65457356", "0.65439904", "0.6543232", "0.65330553", "0.6532984", "0.6532941", "0.6528727", "0.6527119", "0.65262395", "0.6522055", "0.6515553", "0.6515098", "0.6512061", "0.6506923", "0.65045947", "0.65020037", "0.6501832", "0.6496793", "0.64926213", "0.6492081", "0.6490543", "0.64873505", "0.6483008", "0.648105", "0.64804685", "0.64738375", "0.64699614", "0.64618105", "0.64563656", "0.6450384", "0.64455795", "0.64447016", "0.64435124", "0.6441667", "0.6439969", "0.6438703", "0.6436011", "0.6429861", "0.64269155", "0.64212906", "0.64112", "0.640314", "0.6397818", "0.6397099", "0.6392215", "0.6391728", "0.6388639", "0.63867086", "0.6375745", "0.63743275", "0.636418", "0.636294", "0.63580865", "0.63552845", "0.6351153", "0.63335544", "0.63310295", "0.6330306", "0.6325935", "0.63214874", "0.6315119", "0.63102865", "0.63022566", "0.6297002", "0.6295203", "0.62869674", "0.62853676", "0.62795126", "0.6270071", "0.626212", "0.62581795", "0.6253669", "0.6252145", "0.625174", "0.624776", "0.6247551", "0.62417465", "0.6240738", "0.62372786" ]
0.6433026
58
GetStateOk returns a tuple with the State field value if set, nil otherwise and a boolean to check if the value has been set.
func (o *AccessRequestData) GetStateOk() (*string, bool) { if o == nil || o.State == nil { return nil, false } return o.State, true }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *Vm) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (o *AccessKey) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (o *Volume) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (o *Volume) GetStateOk() (string, bool) {\n\tif o == nil || o.State == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.State, true\n}", "func (o *NotificationAllOf) GetStateOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.State, true\n}", "func (o *VirtualGateway) GetStateOk() (string, bool) {\n\tif o == nil || o.State == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.State, true\n}", "func (o *HyperflexEncryption) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (o *V0037Node) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (o *Environment) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (o *User) GetStateOk() (string, bool) {\n\tif o == nil || o.State == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.State, true\n}", "func (o *EquipmentBaseSensor) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (o *LinkNic) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (o *Commitstatus) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (o *ControllerServiceReferencingComponentDTO) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (o *CloudVolumeInstanceAttachment) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (o *InstallTemplateJobJob) GetStateOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.State, true\n}", "func (o *SLOOverallStatuses) GetStateOk() (*SLOState, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (o *VulnUpdateNotification) GetRecordStateValOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.RecordStateVal.Get(), o.RecordStateVal.IsSet()\n}", "func (o *V0037Node) GetStateFlagsOk() (*[]string, bool) {\n\tif o == nil || o.StateFlags == nil {\n\t\treturn nil, false\n\t}\n\treturn o.StateFlags, true\n}", "func (b *OGame) GetState() (bool, string) {\n\treturn atomic.LoadInt32(&b.lockedAtom) == 1, b.state\n}", "func (m *UpdateDeviceRequest) GetState() (val map[string]interface{}, set bool) {\n\tif m.State == nil {\n\t\treturn\n\t}\n\n\treturn *m.State, true\n}", "func (o *DnsZoneDataData) GetServerStateOk() (*string, bool) {\n\tif o == nil || o.ServerState == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ServerState, true\n}", "func (o *FiltersNet) GetStatesOk() ([]string, bool) {\n\tif o == nil || o.States == nil {\n\t\tvar ret []string\n\t\treturn ret, false\n\t}\n\treturn *o.States, true\n}", "func (m *Device) GetState() (val map[string]Property, set bool) {\n\tif m.State == nil {\n\t\treturn\n\t}\n\n\treturn *m.State, true\n}", "func (o *VirtualizationVmwareVirtualMachineAllOf) GetConnectionStateOk() (*string, bool) {\n\tif o == nil || o.ConnectionState == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ConnectionState, true\n}", "func (o *FiltersVirtualGateway) GetStatesOk() ([]string, bool) {\n\tif o == nil || o.States == nil {\n\t\tvar ret []string\n\t\treturn ret, false\n\t}\n\treturn *o.States, true\n}", "func (o *NiatelemetryNicc) GetNiccStateOk() (*string, bool) {\n\tif o == nil || o.NiccState == nil {\n\t\treturn nil, false\n\t}\n\treturn o.NiccState, true\n}", "func (o *FiltersNatService) GetStatesOk() ([]string, bool) {\n\tif o == nil || o.States == nil {\n\t\tvar ret []string\n\t\treturn ret, false\n\t}\n\treturn *o.States, true\n}", "func (o *Cluster) GetOperationStateOk() (*string, bool) {\n\tif o == nil || o.OperationState == nil {\n\t\treturn nil, false\n\t}\n\treturn o.OperationState, true\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\treturn term, isleader\n}", "func (o *HyperflexHxapDvUplink) GetBondStateOk() (*HyperflexBondState, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BondState.Get(), o.BondState.IsSet()\n}", "func (rf *Raft) GetState() (int, bool) {\r\n\r\n\tvar term int\r\n\tvar isleader bool\r\n\t// Your code here.\r\n\tterm = int(rf.getTerm())\r\n\tisleader = rf.isState(LEADER)\r\n\treturn term, isleader\r\n}", "func (o *VirtualizationVmwareVirtualMachineAllOf) GetGuestStateOk() (*string, bool) {\n\tif o == nil || o.GuestState == nil {\n\t\treturn nil, false\n\t}\n\treturn o.GuestState, true\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\n\tterm = rf.currentTerm\n\tif rf.hasLeader && rf.leader == rf.me {\n\t\tisleader = true\n\t} else {\n\t\tisleader = false\n\t}\n\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\t// fmt.Printf(\"State for server %v... currentTerm: %v; state: %v; isLeader: %v\\n\", rf.me, rf.currentTerm, rf.state, rf.state == Leader)\n\treturn rf.currentTerm, (rf.state == Leader)\n}", "func (o *FiltersSubnet) GetStatesOk() ([]string, bool) {\n\tif o == nil || o.States == nil {\n\t\tvar ret []string\n\t\treturn ret, false\n\t}\n\treturn *o.States, true\n}", "func (rf *Raft) GetState() (int, bool) {\n var term int\n var isleader bool\n \n rf.mu.Lock()\n term = rf.currentTerm\n isleader = (rf.state == \"Leader\")\n rf.mu.Unlock()\n\n return term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\t// Your code here (2A).\n\trf.stateLock.Lock()\n\tdefer rf.stateLock.Unlock()\n\treturn int(rf.currentTerm), atomic.LoadInt32(&rf.isLeader) == 1\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t{\n\t\trf.mu.Lock()\n\t\tterm = int(rf.currentTerm)\n\n\t\tif rf.leaderId == LEADER {\n\t\t\tisleader = true\n\t\t} else {\n\t\t\tisleader = false\n\t\t}\n\t\trf.mu.Unlock()\n\t}\n\treturn term, isleader\n}", "func (ts *triState) Get() interface{} {\n\treturn *ts == setTrue\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\n\tterm = rf.currentTerm\n\tisleader = rf.IsLeader()\n\n\treturn term, isleader\n}", "func (s *State) Ok() bool {\n\treturn s.Want.Compare(&s.Got)\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n\tvar term int\n\tvar isleader bool\n\tterm=rf.term\n\tif rf.state==2{\n\t\tisleader=true\n\t}else{\n\t\tisleader=false\n\t}\n\trf.mu.Unlock()\n\t// Your code here (2A).\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\tterm = rf.currentTerm\n\tif rf.state == \"leader\" {\n\t\tisleader = true\n\t} else {\n\t\tisleader = false\n\t}\n\t//DPrintf(\"GetState of %d, term=%d, isleader=%v\", rf.me, term, isleader)\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here.\n\tterm = rf.currentTerm\n\tisleader = (rf.state == LEADER)\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\n\tterm = rf.currentTerm\n\tisleader = rf.state == leader\n\n\treturn term, isleader\n}", "func (o *VulnUpdateNotification) GetRecordStateKeyOk() (*string, bool) {\n\tif o == nil || o.RecordStateKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.RecordStateKey, true\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.CurrentTerm\n\tisleader = rf.IsLeader\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\tvar term int\n\tvar isleader bool\n\trf.mu.Lock()\n\tterm = rf.CurrentTerm\n\tisleader = rf.isLeader\n\trf.mu.Unlock()\n\treturn term, isleader\n}", "func (o *NodeUpdate) GetBootStateOk() (*BootStateType, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.BootState, true\n}", "func (o *CommitteeInfoResponse) GetStateAddressOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.StateAddress, true\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tterm = rf.currentTerm\n\tif rf.state == leader {\n\t\tisleader = true\n\t} else {\n\t\tisleader = false\n\t}\n\trf.mu.Unlock()\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tterm = rf.currentTerm\n\tisleader = rf.state == LEADER\n\trf.mu.Unlock()\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\t// Your code here (2A).\n\n\treturn rf.currentTerm, rf.IsLeader()\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\tterm = rf.currenctTerm\n\tisleader = rf.Role == \"leader\"\n\t// here just return the fields\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {// {{{\n\trf.mu.Lock()\n\tterm := rf.curTerm\n\tisleader := (rf.state == LEADER)\n\trf.mu.Unlock() \n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\tterm = rf.currentTerm\n\tif rf.currentState ==\"LEADER\"{\n\t\tisleader =true\n\t} else{\n\t\tisleader =false\n\t}\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.currentTerm\n\tisleader = rf.getState() == Leader\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tterm = rf.currentTerm\n\tisleader = (rf.state == Leader)\n\trf.mu.Unlock()\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\n\t// Your code here (2A).\n\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\n\tterm = rf.currentTerm\n\tisleader = rf.status == Leader\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tif rf.state == Leader {\n\t\tisleader = true\n\t} else {\n\t\tisleader = false\n\t}\n\n\tterm = rf.currentTerm\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.currentTerm\n\tisleader = (rf.role == LEADER)\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) { //获取服务器的任期和他是否认为自己是leader\n\n\tterm := rf.currentTerm\n\tisLeader := rf.state == 1 //1 is leader\n\t// Your code here.\n\treturn term, isLeader\n}", "func (o *EquipmentFanModule) GetOperStateOk() (*string, bool) {\n\tif o == nil || o.OperState == nil {\n\t\treturn nil, false\n\t}\n\treturn o.OperState, true\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.currentTerm\n\tisleader = rf.state == Leader\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\tterm = rf.currentTerm\n\tif rf.state == Leader {\n\t\tisleader = true\n\t} else {\n\t\tisleader = false\n\t}\n\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\t// Your code here (2A).\n\treturn rf.term, rf.state == RaftLeader\n}", "func (o *EquipmentLocatorLed) GetOperStateOk() (*string, bool) {\n\tif o == nil || o.OperState == nil {\n\t\treturn nil, false\n\t}\n\treturn o.OperState, true\n}", "func (rf *Raft) GetState() (int, bool) {\n\t//var term int\n\t//var isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\treturn rf.currentTerm, rf.currentState == StateLeader\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here.\n\n\trf.mu.Lock()\n\tterm = rf.currentTerm\n\tif rf.state == Leader {\n\t\tisleader = true\n\t} else {\n\t\tisleader = false\n\t}\n\trf.mu.Unlock()\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.currentTerm\n\tisleader = rf.state == Leader\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\tisleader = false\n\tif rf.status == 2 {\n\t\tisleader = true\n\t}\n\tterm = rf.currentTerm\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\tvar term int\n\tvar isleader bool\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.currentTerm\n\tisleader = rf.state == Leader\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\tterm = rf.currentTerm\n\tisleader = rf.role == Leader\n\n\treturn term, isleader\n}", "func (p *PhidgetDigitalOutput) GetState() (bool, error) {\n\tvar r C.int\n\tcerr := C.PhidgetDigitalOutput_getState(p.handle, &r)\n\tif cerr != C.EPHIDGET_OK {\n\t\treturn false, p.phidgetError(cerr)\n\t}\n\treturn r != 0, nil\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\tswitch rf.State {\n\tcase Leader:\n\t\tDPrintf(\"[GetState] Server%v is Leader.\\n\", rf.me)\n\tcase Candidates:\n\t\tDPrintf(\"[GetState] Server%v is Candidate.\\n\", rf.me)\n\tcase Follower:\n\t\tDPrintf(\"[GetState] Server%v is Follower.\\n\", rf.me)\n\t}\n\n\tterm = rf.CurrentTerm\n\tif rf.State == Leader {\n\t\tisleader = true\n\t} else {\n\t\tisleader = false\n\t}\n\t// Your code here (2A).\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.currentTerm\n\tisleader = rf.role == Leader\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\tvar term int\n\tvar isleader bool\n\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.currentTerm\n\tisleader = rf.electionState == leader\n\n\treturn term, isleader\n}", "func (o *EquipmentIoCardBase) GetOperStateOk() (*string, bool) {\n\tif o == nil || o.OperState == nil {\n\t\treturn nil, false\n\t}\n\treturn o.OperState, true\n}", "func (o *StorageNetAppHighAvailability) GetGivebackStateOk() (*string, bool) {\n\tif o == nil || o.GivebackState == nil {\n\t\treturn nil, false\n\t}\n\treturn o.GivebackState, true\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\t// Your code here.\n\treturn rf.currentTerm, rf.state == StateLeader\n}", "func (o *RuleActionStore) GetValueOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Value.Get(), o.Value.IsSet()\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.RLock()\n\tdefer rf.mu.RUnlock()\n\treturn int(rf.currentTerm), rf.IsLeader()\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isLeader bool\n\trf.stateCond.L.Lock()\n\tisLeader = rf.state == Leader\n\tterm = *rf.CurrentTerm\n\trf.stateCond.L.Unlock()\n\treturn term, isLeader\n}", "func (o *StorageNetAppHighAvailability) GetTakeoverStateOk() (*string, bool) {\n\tif o == nil || o.TakeoverState == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TakeoverState, true\n}", "func (rf *Raft) GetState() (int, bool) {\n\t// Your code here.\n\t//rf.mtx.Lock()\n\t//defer rf.mtx.Unlock()\n\treturn rf.currentTerm, rf.state == STATE_LEADER\n}", "func (rf *Raft) GetState() (int, int, bool) {\n\trf.mux.Lock() //CS for accessing state variables\n\tdefer rf.mux.Unlock()\n\n\tme, term := rf.me, rf.currTerm\n\tisleader := rf.role == Leader\n\n\trf.logger.Printf(\"Showing current state of server. Role is %v \\n\", rf.role)\n\treturn me, term, isleader\n}", "func (o *LoginRequestResponseData) GetNextStateOk() (*LoginRequestResponseDataNextState, bool) {\n\tif o == nil || o.NextState == nil {\n\t\treturn nil, false\n\t}\n\treturn o.NextState, true\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\trf.lock(\"GetState()\")\n\tdefer rf.unlock(\"GetState()\")\n\tterm = rf.currentTerm\n\tisleader = rf.state == LEADER\n\t// DPrintf(\"the [%d]raft's term is [%d]\", rf.me, term)\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\n\tvar term int\n\tvar isleader bool\n\n\t// Your code here (2A).\n\n\tterm = rf.currentTerm\n\tif rf.state == LEADER {\n\t\tisleader = true\n\t} else {\n\t\tisleader = false\n\t}\n\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\t// Your code here (2A).\n\tterm := rf.currentTerm\n\tisleader := rf.state == Leader\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n defer rf.mu.Unlock()\n\t// Your code here (2A).\n\treturn rf.currentTerm, rf.role == 2\n}", "func (rf *Raft) GetState() (int, bool) {\n\n\tvar term int\n\t// Your code here (2A).\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\tterm = rf.currentTerm\n\treturn term, rf.state == Leader\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\t// Your code here.\n\treturn rf.currentTerm, rf.serverState == Leader\n}", "func (o *StorageSasExpander) GetOperStateOk() (*string, bool) {\n\tif o == nil || o.OperState == nil {\n\t\treturn nil, false\n\t}\n\treturn o.OperState, true\n}", "func (rf *Raft) GetState() (int, bool) {\n\t// Your code here (2A).\n\t// warn GetState不加锁,因为后续在处理请求时,会频繁调用GetState()函数,影响raft layer的performance,并且读操作此时不需要线程安全,data race is acceptable\n\tterm := rf.Term\n\tisLeader := rf.state == Leader\n\treturn term, isLeader\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\n\tvar term int\n\tvar isleader bool\n\t// Your code here (2A).\n\n//\trf.mu.Lock()\n\tterm = rf.currentTerm\n\tisleader = (rf.role == LEADER)\n//\trf.mu.Unlock()\n\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.Lock()\n\tdefer rf.Unlock()\n\tterm := rf.currentTerm\n\tisleader := rf.state == Leader\n\t// Your code here (2A).\n\treturn term, isleader\n}", "func (rf *Raft) GetState() (int, bool) {\n\trf.mu.Lock()\n\tdefer rf.mu.Unlock()\n\n\tvar term int\n\tvar isleader bool\n\n\tterm = rf.currentTerm\n\tisleader = rf.role == LEADER\n\n\treturn term, isleader\n}", "func (o *SecurityProblemEvent) GetMuteStateOk() (*MuteState, bool) {\n\tif o == nil || o.MuteState == nil {\n\t\treturn nil, false\n\t}\n\treturn o.MuteState, true\n}" ]
[ "0.7589492", "0.75121105", "0.7503609", "0.74723244", "0.74699265", "0.7450466", "0.74355227", "0.7420525", "0.74169767", "0.7381603", "0.73352504", "0.7156172", "0.7119504", "0.70898294", "0.7009648", "0.68938947", "0.685247", "0.6795851", "0.6654229", "0.6601526", "0.65699184", "0.6566133", "0.6446486", "0.636003", "0.63572156", "0.6310613", "0.6304139", "0.6300463", "0.62871027", "0.6271012", "0.62563705", "0.61520034", "0.6136604", "0.6115068", "0.60858727", "0.60701936", "0.60688084", "0.60677975", "0.6063473", "0.60583985", "0.60449654", "0.6037892", "0.6035946", "0.60353804", "0.6034932", "0.60252315", "0.60243875", "0.6022206", "0.60205984", "0.6015167", "0.601372", "0.600619", "0.5995115", "0.59899515", "0.5988419", "0.5985103", "0.59840447", "0.59838325", "0.5980422", "0.5976178", "0.597518", "0.5974098", "0.5972949", "0.5963351", "0.5955893", "0.594956", "0.59468204", "0.5935901", "0.59305745", "0.5927935", "0.59249735", "0.5906415", "0.59024054", "0.58953315", "0.589335", "0.5891987", "0.5889168", "0.5888629", "0.58883995", "0.5887737", "0.5887324", "0.5884584", "0.58836156", "0.588318", "0.58796656", "0.58679765", "0.5864448", "0.5863383", "0.5863108", "0.585716", "0.58561474", "0.5855218", "0.58549756", "0.5852542", "0.5845798", "0.5841469", "0.5833254", "0.58231676", "0.58212394", "0.5814679" ]
0.7520873
1
HasState returns a boolean if a field has been set.
func (o *AccessRequestData) HasState() bool { if o != nil && o.State != nil { return true } return false }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (d UserData) HasState() bool {\n\treturn d.ModelData.Has(models.NewFieldName(\"State\", \"state_id\"))\n}", "func (o *User) HasState() bool {\n\tif o != nil && o.State != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Vm) HasState() bool {\n\tif o != nil && o.State != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *VirtualGateway) HasState() bool {\n\tif o != nil && o.State != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *CloudVolumeInstanceAttachment) HasState() bool {\n\tif o != nil && o.State != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AccessKey) HasState() bool {\n\tif o != nil && o.State != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *EquipmentBaseSensor) HasState() bool {\n\tif o != nil && o.State != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Volume) HasState() bool {\n\tif o != nil && o.State != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Volume) HasState() bool {\n\tif o != nil && o.State != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ControllerServiceReferencingComponentDTO) HasState() bool {\n\tif o != nil && o.State != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *V0037Node) HasState() bool {\n\tif o != nil && o.State != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *HyperflexEncryption) HasState() bool {\n\tif o != nil && o.State != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *LinkNic) HasState() bool {\n\tif o != nil && o.State != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Environment) HasState() bool {\n\tif o != nil && o.State != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (s *Structx) HasField(name string) bool {\n\t_, ok := s.value.Type().FieldByName(name)\n\treturn ok\n}", "func (o *Commitstatus) HasState() bool {\n\tif o != nil && o.State != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *StatusDescriptorDTO) HasField() bool {\n\tif o != nil && o.Field != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *VulnUpdateNotification) HasRecordStateVal() bool {\n\tif o != nil && o.RecordStateVal.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func IsHasField(st interface{}, fieldName string) bool {\n\treturn HasField(st, fieldName)\n}", "func (o *SLOOverallStatuses) HasState() bool {\n\treturn o != nil && o.State != nil\n}", "func (s *Struct) HasField(name string) bool {\n\tfor _, f := range s.Fields {\n\t\tif f.Name == name {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (o *SyntheticsGlobalVariableParseTestOptions) HasField() bool {\n\treturn o != nil && o.Field != nil\n}", "func (x *fastReflection_GenesisState) Has(fd protoreflect.FieldDescriptor) bool {\n\tswitch fd.FullName() {\n\tcase \"cosmos.gov.v1.GenesisState.starting_proposal_id\":\n\t\treturn x.StartingProposalId != uint64(0)\n\tcase \"cosmos.gov.v1.GenesisState.deposits\":\n\t\treturn len(x.Deposits) != 0\n\tcase \"cosmos.gov.v1.GenesisState.votes\":\n\t\treturn len(x.Votes) != 0\n\tcase \"cosmos.gov.v1.GenesisState.proposals\":\n\t\treturn len(x.Proposals) != 0\n\tcase \"cosmos.gov.v1.GenesisState.deposit_params\":\n\t\treturn x.DepositParams != nil\n\tcase \"cosmos.gov.v1.GenesisState.voting_params\":\n\t\treturn x.VotingParams != nil\n\tcase \"cosmos.gov.v1.GenesisState.tally_params\":\n\t\treturn x.TallyParams != nil\n\tcase \"cosmos.gov.v1.GenesisState.params\":\n\t\treturn x.Params != nil\n\tcase \"cosmos.gov.v1.GenesisState.constitution\":\n\t\treturn x.Constitution != \"\"\n\tdefault:\n\t\tif fd.IsExtension() {\n\t\t\tpanic(fmt.Errorf(\"proto3 declared messages do not support extensions: cosmos.gov.v1.GenesisState\"))\n\t\t}\n\t\tpanic(fmt.Errorf(\"message cosmos.gov.v1.GenesisState does not contain field %s\", fd.FullName()))\n\t}\n}", "func (s *State) Exists() bool {\n\treturn s._exists\n}", "func (o *RiskRulesListAllOfData) HasField() bool {\n\tif o != nil && !IsNil(o.Field) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FiltersVirtualGateway) HasStates() bool {\n\tif o != nil && o.States != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (ls Set) Has(field string) bool {\n\t_, exists := ls[field]\n\treturn exists\n}", "func (o *VulnUpdateNotification) HasRecordStateKey() bool {\n\tif o != nil && o.RecordStateKey != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (p ByName) HasBeenSet() bool {\n\treturn len(p.whereIsParamSet) > 0\n}", "func (x *fastReflection_GenesisState) Has(fd protoreflect.FieldDescriptor) bool {\n\tswitch fd.FullName() {\n\tcase \"cosmos.distribution.v1beta1.GenesisState.params\":\n\t\treturn x.Params != nil\n\tcase \"cosmos.distribution.v1beta1.GenesisState.fee_pool\":\n\t\treturn x.FeePool != nil\n\tcase \"cosmos.distribution.v1beta1.GenesisState.delegator_withdraw_infos\":\n\t\treturn len(x.DelegatorWithdrawInfos) != 0\n\tcase \"cosmos.distribution.v1beta1.GenesisState.previous_proposer\":\n\t\treturn x.PreviousProposer != \"\"\n\tcase \"cosmos.distribution.v1beta1.GenesisState.outstanding_rewards\":\n\t\treturn len(x.OutstandingRewards) != 0\n\tcase \"cosmos.distribution.v1beta1.GenesisState.validator_accumulated_commissions\":\n\t\treturn len(x.ValidatorAccumulatedCommissions) != 0\n\tcase \"cosmos.distribution.v1beta1.GenesisState.validator_historical_rewards\":\n\t\treturn len(x.ValidatorHistoricalRewards) != 0\n\tcase \"cosmos.distribution.v1beta1.GenesisState.validator_current_rewards\":\n\t\treturn len(x.ValidatorCurrentRewards) != 0\n\tcase \"cosmos.distribution.v1beta1.GenesisState.delegator_starting_infos\":\n\t\treturn len(x.DelegatorStartingInfos) != 0\n\tcase \"cosmos.distribution.v1beta1.GenesisState.validator_slash_events\":\n\t\treturn len(x.ValidatorSlashEvents) != 0\n\tdefault:\n\t\tif fd.IsExtension() {\n\t\t\tpanic(fmt.Errorf(\"proto3 declared messages do not support extensions: cosmos.distribution.v1beta1.GenesisState\"))\n\t\t}\n\t\tpanic(fmt.Errorf(\"message cosmos.distribution.v1beta1.GenesisState does not contain field %s\", fd.FullName()))\n\t}\n}", "func (o *FiltersNet) HasStates() bool {\n\tif o != nil && o.States != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *Measurement) HasField(name string) bool {\n\tm.mu.RLock()\n\tdefer m.mu.RUnlock()\n\t_, hasField := m.fieldNames[name]\n\treturn hasField\n}", "func (o *HyperflexHxapDvUplink) HasBondState() bool {\n\tif o != nil && o.BondState.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphListItem) HasFields() bool {\n\tif o != nil && o.Fields != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (obj *transaction) HasSet() bool {\n\treturn obj.set != nil\n}", "func (o *FieldError) HasField() bool {\n\tif o != nil && o.Field != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *V0037Node) HasStateFlags() bool {\n\tif o != nil && o.StateFlags != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FiltersNatService) HasStates() bool {\n\tif o != nil && o.States != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (sv SV) HasBeenSet() bool { return sv.hasBeenSet }", "func (c *Configuration) Has(field string) bool {\n\tout := getField(c.App, field)\n\tif out == nil {\n\t\tout = getField(c.Base, field)\n\t}\n\n\treturn out != nil\n}", "func (o *FiltersSubnet) HasStates() bool {\n\tif o != nil && o.States != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *ccMetric) HasField(key string) bool {\n\t_, ok := m.fields[key]\n\treturn ok\n}", "func (field Field) IsDefined() bool {\n\treturn field.Var != nil\n}", "func (m *Model) HasField(field string) (bool, error) {\n\treturn m.db.GetCore().HasField(m.GetCtx(), m.tablesInit, field)\n}", "func (o *DnsZoneDataData) HasServerState() bool {\n\tif o != nil && o.ServerState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func HasField(st interface{}, fieldName string) bool {\n\tvalueIface := reflect.ValueOf(st)\n\n\t// Check if the passed interface is a pointer\n\tif valueIface.Type().Kind() != reflect.Ptr {\n\t\t// Create a new type of Iface's Type, so we have a pointer to work with\n\t\tvalueIface = reflect.New(reflect.TypeOf(st))\n\t}\n\n\t// 'dereference' with Elem() and get the field by name\n\tfield := valueIface.Elem().FieldByName(fieldName)\n\treturn field.IsValid()\n}", "func (o *EtherPhysicalPort) HasLicenseState() bool {\n\tif o != nil && o.LicenseState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InlineObject1187) HasFields() bool {\n\tif o != nil && o.Fields != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (e *Event) HasFired() bool {\n\treturn atomic.LoadInt32(&e.fired) == 1\n}", "func HasValue(field reflect.Value) bool {\n\tswitch field.Kind() {\n\tcase reflect.Slice, reflect.Map, reflect.Ptr, reflect.Interface, reflect.Chan, reflect.Func:\n\t\treturn !field.IsNil()\n\tdefault:\n\t\treturn field.IsValid() && field.Interface() != reflect.Zero(field.Type()).Interface()\n\t}\n}", "func (f *Form) Has(field string, r *http.Request) bool {\n\tx := r.Form.Get(field)\n\tif x == \"\" {\n\t\treturn false\n\t}\n\treturn true\n}", "func (o *NotificationAllOf) HasFields() bool {\n\tif o != nil && o.Fields != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (s *State) HasPendingKeyExchange() bool {\n\treturn s.pendingKeyExchange != nil\n}", "func Has(from Getter, t string) bool {\n\treturn Get(from, t) != nil\n}", "func (o *DeferredResultVoid) HasSetOrExpired() bool {\n\tif o != nil && o.SetOrExpired != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewMilestone) HasLockdown() bool {\n\tif o != nil && o.Lockdown != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (state *State) Has(name string) bool {\n\tif _, ok := state.Problem[name]; ok {\n\t\treturn true\n\t}\n\tif _, ok := state.Solution[name]; ok {\n\t\treturn true\n\t}\n\treturn false\n}", "func (o *StorageNetAppHighAvailability) HasGivebackState() bool {\n\tif o != nil && o.GivebackState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (b Bool) IsSet() bool {\n\treturn b.InitDone()\n}", "func (o *StoragePhysicalDisk) HasDriveState() bool {\n\tif o != nil && o.DriveState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *StorageNetAppHighAvailability) HasTakeoverState() bool {\n\tif o != nil && o.TakeoverState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *EquipmentFanModule) HasOperState() bool {\n\tif o != nil && o.OperState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *KanbanViewView) HasSingleSelectField() bool {\n\tif o != nil && o.SingleSelectField.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (f *Flag) IsSet() bool {\n\treturn f.count > 0\n}", "func (o *StorageSasExpander) HasOperState() bool {\n\tif o != nil && o.OperState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ApplianceSetupInfoAllOf) HasSetupStates() bool {\n\tif o != nil && o.SetupStates != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DhcpRangeDataData) HasRangeState() bool {\n\tif o != nil && o.RangeState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *W2) HasStateAndLocalWages() bool {\n\tif o != nil && o.StateAndLocalWages != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (f Unstructured) HasByName(field string) bool {\n\tif f.IsUndefined() {\n\t\treturn true\n\t}\n\t_, ok := f.fields[field]\n\treturn ok\n}", "func (f ExtensionField) IsSet() bool {\n\treturn f.typ != nil\n}", "func HasStateFile(stateDir string, stateFile string) bool {\n\tstepStateFile := filepath.Join(stateDir, fmt.Sprintf(\"%s.tfstate\", stateFile))\n\t_, err := os.Stat(stepStateFile)\n\treturn !os.IsNotExist(err)\n}", "func (o *VirtualizationVmwareVirtualMachineAllOf) HasGuestState() bool {\n\tif o != nil && o.GuestState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (f Unstructured) Has(v ...interface{}) bool {\n\thf, err := ParseUnstructured(v)\n\tif f.fields == nil {\n\t\treturn true\n\t}\n\tif err != nil {\n\t\treturn false\n\t}\n\tif hf.IsUndefined() {\n\t\treturn false\n\t}\n\tmissing := hf.FindField(func(fieldName string, fieldFragment Fragment) bool {\n\t\tif fieldFragment.IsUndefined() {\n\t\t\treturn !f.HasByName(fieldName)\n\t\t} else if !f.HasByName(fieldName) {\n\t\t\treturn true\n\t\t} else {\n\t\t\tcurrentFieldFragment := f.Field(fieldName)\n\t\t\tif currentFieldFragment == nil || currentFieldFragment.IsUndefined() {\n\t\t\t\treturn false\n\t\t\t}\n\t\t\treturn currentFieldFragment.Has(fieldFragment)\n\t\t}\n\t})\n\treturn missing == nil\n}", "func (o *User) HasLicenseAssignmentStates() bool {\n\tif o != nil && o.LicenseAssignmentStates != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (d UserData) HasStreet() bool {\n\treturn d.ModelData.Has(models.NewFieldName(\"Street\", \"street\"))\n}", "func (o *StoragePhysicalDiskAllOf) HasDriveState() bool {\n\tif o != nil && o.DriveState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *VirtualizationVmwareVirtualMachineAllOf) HasConnectionState() bool {\n\tif o != nil && o.ConnectionState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *StoragePhysicalDisk) HasConfigurationState() bool {\n\tif o != nil && o.ConfigurationState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *LoginRequestResponseData) HasNextState() bool {\n\tif o != nil && o.NextState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *Map) HasMember(field string) bool {\n\tm.convert()\n\t_, hasMember := m.items[field]\n\n\treturn hasMember\n}", "func (o *StoragePhysicalDisk) HasDiskState() bool {\n\tif o != nil && o.DiskState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m FieldMap) Has(tag Tag) bool {\n\t_, ok := m.tagLookup[tag]\n\treturn ok\n}", "func (o *Object) HasProperty(key StringOrSymbol) Boolean {\n\t_, ok := o.fields[key]\n\treturn Boolean(ok)\n}", "func (x *fastReflection_GenesisState) IsValid() bool {\n\treturn x != nil\n}", "func (x *fastReflection_GenesisState) IsValid() bool {\n\treturn x != nil\n}", "func HasFields(field string, fields ...string) Condition {\n\treturn func(_ context.Context, m ent.Mutation) bool {\n\t\tif _, exists := m.Field(field); !exists {\n\t\t\treturn false\n\t\t}\n\t\tfor _, field := range fields {\n\t\t\tif _, exists := m.Field(field); !exists {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\t\treturn true\n\t}\n}", "func (o *SecurityProblemEvent) HasMuteState() bool {\n\tif o != nil && o.MuteState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (ppr *ProcedureParamReference) HasBeenSet(name string) bool {\n\tname = strings.ToLower(name)\n\tparamRefVal, ok := ppr.nameToParam[name]\n\tif !ok {\n\t\treturn false\n\t}\n\treturn paramRefVal.HasBeenSet\n}", "func (a Meta_UsState) Get(fieldName string) (value interface{}, found bool) {\n\tif a.AdditionalProperties != nil {\n\t\tvalue, found = a.AdditionalProperties[fieldName]\n\t}\n\treturn\n}", "func (o *User) HasPostalCode() bool {\n\tif o != nil && o.PostalCode != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *StoragePhysicalDisk) HasLinkState() bool {\n\tif o != nil && o.LinkState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AccessRequestData) HasStateModifiedByUser() bool {\n\tif o != nil && o.StateModifiedByUser != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewMilestone) HasCompletedOn() bool {\n\tif o != nil && o.CompletedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (state ZenformState) ExistsTicketField(slug string) bool {\n\treturn state.TicketFields[slug].ID != NotFoundID\n}", "func (m *UserMutation) StateCleared() bool {\n\t_, ok := m.clearedFields[user.FieldState]\n\treturn ok\n}", "func (o *FormField) HasResponse() bool {\n\tif o != nil && o.Response != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (s SnapshotState) HasOnDisk() bool {\n\treturn uint32(s)&2 != 0\n}", "func (s Scene) IsSet() bool {\n\treturn len(s.Fields) > 0 || s.Ctx != nil || s.Err != nil\n}", "func (f *FlagBase[T, C, V]) IsSet() bool {\n\treturn f.hasBeenSet\n}", "func (o *ViewMilestone) HasCompleted() bool {\n\tif o != nil && o.Completed != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}" ]
[ "0.74425083", "0.73110616", "0.69777817", "0.69519645", "0.68284285", "0.67607516", "0.6684047", "0.667987", "0.667987", "0.6667193", "0.66145426", "0.656677", "0.6498896", "0.6490424", "0.64557964", "0.64384645", "0.64355093", "0.64201254", "0.6414595", "0.63826406", "0.63078636", "0.6290885", "0.6269723", "0.6175513", "0.61722547", "0.6149049", "0.61098063", "0.60952216", "0.604051", "0.6002292", "0.5959783", "0.594427", "0.59387153", "0.5902388", "0.5847607", "0.58071184", "0.58028346", "0.5800575", "0.57951206", "0.5787276", "0.5778953", "0.57760555", "0.57705295", "0.5758208", "0.57556593", "0.56863236", "0.56840855", "0.5673418", "0.5670467", "0.56562966", "0.56533533", "0.5631926", "0.56269073", "0.56214166", "0.55862314", "0.55800116", "0.55763125", "0.5571313", "0.5545462", "0.5535265", "0.55298686", "0.55090857", "0.5493368", "0.5486527", "0.5486452", "0.54798585", "0.54754", "0.5467853", "0.54600865", "0.54261535", "0.5424758", "0.5417865", "0.54135144", "0.5413016", "0.54119414", "0.53986907", "0.53982574", "0.5369964", "0.53614044", "0.53605586", "0.53599066", "0.535565", "0.5355511", "0.5336942", "0.5336942", "0.5336014", "0.5332019", "0.53301865", "0.5311524", "0.5306133", "0.52886456", "0.52839625", "0.5283086", "0.5273964", "0.5269029", "0.5257879", "0.5255057", "0.5252341", "0.5252166", "0.5244918" ]
0.6740409
6
SetState gets a reference to the given string and assigns it to the State field.
func (o *AccessRequestData) SetState(v string) { o.State = &v }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (m *User) SetState(value *string)() {\n m.state = value\n}", "func (x *StrState) Set(val string) error {\n\tv, err := ParseStrState(val)\n\t*x = v\n\treturn err\n}", "func (me *TstyleStateEnumType) Set(s string) { (*xsdt.String)(me).Set(s) }", "func SetState(stub shim.ChaincodeStubInterface) peer.Response {\r\n\targs := stub.GetStringArgs()\r\n\r\n\tif len(args) != 3 {\r\n\t\treturn shim.Error(\"Incorrect arguments. Expecting two arguments 'name of state' & 'state code'\")\r\n\t}\r\n\r\n\t_, err := strconv.Atoi(args[2])\r\n\tif err != nil {\r\n\t\treturn shim.Error(\"Incorrect data type state code should be a number!!!\")\r\n\t}\r\n\r\n\tkey := strings.ToLower(args[1])\r\n\tstub.PutState(key, []byte(args[2]))\r\n\r\n\treturn shim.Success([]byte(\"true\"))\r\n}", "func (m *AgreementAcceptance) SetState(value *AgreementAcceptanceState)() {\n m.state = value\n}", "func (m *AccessPackageAssignment) SetState(value *AccessPackageAssignmentState)() {\n m.state = value\n}", "func (l *LED) SetState(s State) error {\n\tvar v int\n\tv, ok := l.states[s]\n\tif !ok {\n\t\treturn fmt.Errorf(\"unrecognized %s LED state %q [%d]\", l.spi.Name(), s, s)\n\t}\n\n\treturn l.spi.Write(v)\n}", "func (t *Textarea) SetState(val string, selStart, selEnd int) {\n\tt.Set(\"value\", val)\n\tt.SetSelectionStart(selStart)\n\tt.SetSelectionEnd(selEnd)\n}", "func (obj *StateObject) SetState(db Database, key, value math.Hash) {\n\t// If the new value is the same as old, don't set\n\tprev := obj.GetState(db, key)\n\tif prev == value {\n\t\treturn\n\t}\n\n\tobj.setState(key, value)\n}", "func StateString(s string) (State, error) {\n\tif val, ok := _StateNameToValueMap[s]; ok {\n\t\treturn val, nil\n\t}\n\treturn 0, fmt.Errorf(\"%s does not belong to State values\", s)\n}", "func (cs *ConnectivityState) SetState(state string) error {\n\tcs.mu.Lock()\n\tdefer cs.mu.Unlock()\n\n\tif _, ok := connectivityStates[state]; !ok {\n\t\treturn fmt.Errorf(\"Invalid connectivity state provided (provided: %s)\", state)\n\t}\n\n\tcs.state = connectivityStates[state]\n\treturn nil\n}", "func (m *VppToken) SetState(value *VppTokenState)() {\n m.state = value\n}", "func (w *Watcher) SetState(key string, value any) {\n\tw.lock.Lock()\n\tdefer w.lock.Unlock()\n\n\tw.stateCache[key] = value\n}", "func (m *ScheduleChangeRequest) SetState(value *ScheduleChangeState)() {\n err := m.GetBackingStore().Set(\"state\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *Mob) SetState(state MobStateType) {\n\tnext := time.Now().UnixMilli()\n\n\tswitch state {\n\tcase MobStateFind:\n\t\tnext += m.FindInterval\n\tcase MobStateMove:\n\t\tnext += m.MoveInterval\n\t}\n\n\tm.mutex.Lock()\n\tm.state = state\n\tm.nextRun = next\n\tm.findRemain = m.FindCount\n\tm.mutex.Unlock()\n}", "func (m *ExternalConnection) SetState(value *ConnectionState)() {\n m.state = value\n}", "func (s *StateMgr) SetState(n State) {\n\ts.current = n\n}", "func (me *TitemIconStateEnumType) Set(s string) { (*xsdt.String)(me).Set(s) }", "func SetState(newState map[string]interface{}) {\n\tmu.Lock()\n\tdefer mu.Unlock()\n\tfor key, value := range newState {\n\t\tstate[key] = value\n\t}\n}", "func (ledger *Ledger) SetState(chaincodeID string, key string, value []byte) error {\n\tif key == \"\" || value == nil {\n\t\treturn newLedgerError(ErrorTypeInvalidArgument,\n\t\t\tfmt.Sprintf(\"An empty string key or a nil value is not supported. Method invoked with key='%s', value='%#v'\", key, value))\n\t}\n\treturn ledger.chaincodeState.Set(chaincodeID, key, value)\n}", "func (me *TitemIconStateType) Set(s string) { (*xsdt.String)(me).Set(s) }", "func (s *server) setState(state string) {\n\ts.mutex.Lock()\n\tdefer s.mutex.Unlock()\n\n\t// Temporarily store previous values.\n\t//prevState := s.state\n\t//prevLeader := s.leader\n\n\t// Update state and leader.\n\ts.state = state\n\tif state == Leader {\n\t\ts.leader = s.Name()\n\t\ts.syncedPeer = make(map[string]bool)\n\t}\n\t\t//\n\t\t//// Dispatch state and leader change events.\n\t\t//s.DispatchEvent(newEvent(StateChangeEventType, s.state, prevState))\n\t\t//\n\t\t//if prevLeader != s.leader {\n\t\t//\ts.DispatchEvent(newEvent(LeaderChangeEventType, s.leader, prevLeader))\n\t\t//}\n}", "func (m *AccessPackageCatalog) SetState(value *AccessPackageCatalogState)() {\n m.state = value\n}", "func SetState(state bool, macAdd string) {\n\tvar statebit string\n\tif state == true {\n\t\tstatebit = \"01\"\n\t} else {\n\t\tstatebit = \"00\"\n\t}\n\tsendMessage(\"686400176463\"+macAdd+twenties+\"00000000\"+statebit, sockets[macAdd].IP)\n\tgo func() { Events <- EventStruct{\"stateset\", *sockets[macAdd]} }()\n}", "func (s *Service) SetState(ctx context.Context, params *light.SetStateParams) (*light.Light, error) {\n\t_, span := trace.StartSpan(ctx, \"hue.lights.state.set\")\n\tdefer span.End()\n\n\tctx = context.WithValue(ctx, hue.UserKey{}, params.GetUser())\n\tctx = context.WithValue(ctx, hue.HostKey{}, params.GetHost())\n\n\tres, err := s.hue.LightState(ctx, int(params.GetID()), params.GetUpdate())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tl, ok := res.(*light.Light)\n\tif !ok {\n\t\treturn nil, errors.Errorf(\"failed to convert '%T' to *light.Light\", res)\n\t}\n\n\treturn l, nil\n}", "func (f FooBarDef) SetState(state FooBarState) {\n\tf.ComponentDef.SetState(state)\n}", "func (p *Resolver) SetState(state int64) {\n\tp.state.Store(state)\n}", "func (c ChooserDef) SetState(state ChooserState) {\n\tc.ComponentDef.SetState(state)\n}", "func (delegateObject *delegateObject) SetState(db Database, key, value common.Hash) {\n\tdelegateObject.db.journal = append(delegateObject.db.journal, storageChange{\n\t\taccount: &delegateObject.address,\n\t\tkey: key,\n\t\tprevalue: delegateObject.GetState(db, key),\n\t})\n\tdelegateObject.setState(key, value)\n}", "func (sm *StateMachine) SetState(in *Msg, label string) string {\n\tdesiredState := sm.states[label]\n\n\t// If we're in a state beyond the desired state, go back. There are NO\n\t// checks for state when going backward, so if you're changing state\n\t// after its been completed, you'll need to do sanity checks OnEntry.\n\tif sm.state > desiredState {\n\t\tsm.state = desiredState\n\t\tsm.stateEntered = false\n\t\tsm.plugin.SetMemory(in, StateKey, desiredState)\n\t\tsm.plugin.SetMemory(in, stateEnteredKey, false)\n\t\treturn sm.Handlers[desiredState].OnEntry(in)\n\t}\n\n\t// If we're in a state before the desired state, go forward only as far\n\t// as we're allowed by the Complete guards.\n\tfor s := sm.state; s < desiredState; s++ {\n\t\tok, _ := sm.Handlers[s].Complete(in)\n\t\tif !ok {\n\t\t\tsm.state = s\n\t\t\tsm.stateEntered = false\n\t\t\tsm.plugin.SetMemory(in, StateKey, s)\n\t\t\tsm.plugin.SetMemory(in, stateEnteredKey, false)\n\t\t\treturn sm.Handlers[s].OnEntry(in)\n\t\t}\n\t}\n\n\t// No guards were triggered (go to state), or the state == desiredState,\n\t// so reset the state and run OnEntry again unless the plugin is now\n\t// complete.\n\tsm.state = desiredState\n\tsm.stateEntered = false\n\tsm.plugin.SetMemory(in, StateKey, desiredState)\n\tsm.plugin.SetMemory(in, stateEnteredKey, false)\n\treturn sm.Handlers[desiredState].OnEntry(in)\n}", "func (v *Component) SetState(c *Change) {\n\tks := c.Keys()\n\tfor _, k := range ks {\n\t\to := c.Get(k)\n\t\tv.State().Set(k, o)\n\t}\n\tgo v.redraw()\n}", "func (m *DeviceManagementIntentDeviceState) SetState(value *ComplianceStatus)() {\n err := m.GetBackingStore().Set(\"state\", value)\n if err != nil {\n panic(err)\n }\n}", "func (mg *MoveGen) SetState(st *GameState) {\n\tmg.state = st\n\n\t// reset any data associated with the old state\n\tmg.Clear()\n}", "func (stateObj *stateObject) SetState(db StateDatabase, key, value common.Hash) {\n\t// If the fake storage is set, put the temporary state update here.\n\tif stateObj.fakeStorage != nil {\n\t\tstateObj.fakeStorage[key] = value\n\t\treturn\n\t}\n\t// If the new value is the same as old, don't set\n\tprev := stateObj.GetState(db, key)\n\tif prev == value {\n\t\treturn\n\t}\n\t// New value is different, update and journal the change\n\tstateObj.db.journal.append(storageChange{\n\t\taccount: &stateObj.address,\n\t\tkey: key,\n\t\tprevalue: prev,\n\t})\n\tstateObj.setState(key, value)\n}", "func (m *MacOSSoftwareUpdateStateSummary) SetState(value *MacOSSoftwareUpdateState)() {\n err := m.GetBackingStore().Set(\"state\", value)\n if err != nil {\n panic(err)\n }\n}", "func (c *chain) SetState(state byte) {\n\tc.Lock() // -- lock\n\tc.JobChain.State = state\n\tc.Unlock() // -- unlock\n}", "func (us *UserState) Set(val string) error {\n\tnewUserState := UserState(val)\n\n\tif !isValidUserState(newUserState) {\n\t\treturn errInvalidUserState\n\t}\n\n\t*us = newUserState\n\treturn nil\n}", "func (p *TransportBasePriv) SetState(st TransportState) {\n\tif p.b.state == st {\n\t\treturn\n\t}\n\tp.b.state = st\n\tp.b.emitter.EmitSync(evtStateChange, st)\n}", "func (s *ServiceManager) setState(st ManagerStateEnum) {\n\ts.mu.Lock()\n\tdefer s.mu.Unlock()\n\ts.state = st\n}", "func (m *mStateSwitcherMocksetState) Set(f func(p State)) *StateSwitcherMock {\n\tm.mock.setStateFunc = f\n\tm.mockExpectations = nil\n\treturn m.mock\n}", "func (g *Group) SetState(s State) error {\n\treturn g.SetStateContext(context.Background(), s)\n}", "func (r *Runner) SetState(state RunnerState) {\n\tr.state = state\n\tswitch r.state {\n\tcase Idle:\n\t\tr.animation.Play(\"Idle\")\n\tcase Running:\n\t\tr.animation.Play(\"Run\")\n\t}\n}", "func (self *StateObject) SetState(db trie.Database, key, value helper.Hash) {\n\tself.db.journal = append(self.db.journal, storageChange{\n\t\taccount: &self.address,\n\t\tkey: key,\n\t\tprevalue: self.GetState(db, key),\n\t})\n\tself.setState(key, value)\n}", "func (p *ComputationPlugin) SetState(state []byte,\n\tresponse *string) error {\n\tp.mx.Lock()\n\tdefer p.mx.Unlock()\n\t*response = \"ok\"\n\terr := p.impl.SetState(state)\n\treturn err\n}", "func (o *ControllerServiceReferencingComponentDTO) SetState(v string) {\n\to.State = &v\n}", "func (m *PrintJobStatus) SetState(value *PrintJobProcessingState)() {\n m.state = value\n}", "func (o *V0037Node) SetState(v string) {\n\to.State = &v\n}", "func (state *State) SetState(newState bool) error {\n\tnewNum := uint32(0)\n\n\tif newState {\n\t\tnewNum = 1\n\t}\n\n\tpreviousState := atomic.SwapUint32((*uint32)(state), newNum)\n\n\tif previousState == 0 && !newState ||\n\t\tpreviousState == 1 && newState {\n\t\treturn errors.New(\"Already set.\")\n\t}\n\n\treturn nil\n}", "func (c *Client) setState(s ConnState) {\n\tprev := c.state\n\tif prev == s || prev == Closed {\n\t\treturn\n\t}\n\tc.state = s\n\tif s != Selected {\n\t\tc.Logf(LogState, \"State change: %v -> %v\", prev, s)\n\t\tc.Mailbox = nil\n\t\tif s == Closed {\n\t\t\tif c.cch != nil {\n\t\t\t\tclose(c.cch)\n\t\t\t\truntime.Gosched()\n\t\t\t}\n\t\t\tc.setCaps(nil)\n\t\t\tc.deliver(abort)\n\t\t}\n\t} else if c.debugLog.mask&LogState != 0 {\n\t\tmb, rw := c.Mailbox.Name, \"[RW]\"\n\t\tif c.Mailbox.ReadOnly {\n\t\t\trw = \"[RO]\"\n\t\t}\n\t\tc.Logf(LogState, \"State change: %v -> %v (%+q %s)\", prev, s, mb, rw)\n\t}\n}", "func SetState(conn db.Connection, channel string, state State) error {\n\tif testStateSaveError != nil {\n\t\treturn testStateSaveError\n\t}\n\n\treturn db.SetWithTTL(conn, StateKey(channel), state, StateTTL)\n}", "func SetState(conn db.Connection, channel string, state State) error {\n\tif testStateSaveError != nil {\n\t\treturn testStateSaveError\n\t}\n\n\treturn db.SetWithTTL(conn, StateKey(channel), state, StateTTL)\n}", "func SetState(conn db.Connection, channel string, state State) error {\n\tif testStateSaveError != nil {\n\t\treturn testStateSaveError\n\t}\n\n\treturn db.SetWithTTL(conn, StateKey(channel), state, StateTTL)\n}", "func (s *SimpleBlockFactory) SetStateDB(sdb *state.ChainStateDB) {\n}", "func (aru *AuthRequestUpdate) SetState(s string) *AuthRequestUpdate {\n\taru.mutation.SetState(s)\n\treturn aru\n}", "func (l *ChainLedger) SetState(addr types.Address, key []byte, v []byte) {\n\taccount := l.GetOrCreateAccount(addr)\n\taccount.SetState(key, v)\n}", "func (aruo *AuthRequestUpdateOne) SetState(s string) *AuthRequestUpdateOne {\n\taruo.mutation.SetState(s)\n\treturn aruo\n}", "func (og *OpacityGauge) SetState() string {\n\tfor {\n\t\tuiEvents := ui.PollEvents()\n\t\te := <-uiEvents\n\t\tswitch e.ID {\n\t\tcase \"<C-c>\", \"q\", \"A\", \"S\", \"W\", \"D\":\n\t\t\treturn e.ID\n\t\tcase \"a\", \"d\":\n\t\t\tnewOpacity := og.toggleOpacity(e.ID)\n\t\t\tnewPercent := int(newOpacity / float64(255) * 100)\n\t\t\tog.Widget.Percent = newPercent\n\n\t\t\t(*og.settingsConfig)[opacityProperty] = newOpacity\n\t\t\tutils.WriteFileJSON(og.settingsConfig)\n\n\t\t\tui.Render(og.Widget)\n\t\t}\n\t}\n}", "func (b *Button) SetState(state bool) {\n\tb.state = state\n}", "func (cmd *Start) SetState(agg types.Aggregate) error {\n\tif s, ok := agg.(*aggregates.Session); ok {\n\t\tcmd.session = s\n\t\treturn nil\n\t} else {\n\t\treturn errors.New(\"can't cast\")\n\t}\n}", "func (m *mStateSwitcherMockGetState) Set(f func() (r State)) *StateSwitcherMock {\n\tm.mock.GetStateFunc = f\n\n\treturn m.mock\n}", "func (uc *UserCreate) SetState(s string) *UserCreate {\n\tuc.mutation.SetState(s)\n\treturn uc\n}", "func (m *DeviceEnrollmentWindowsHelloForBusinessConfiguration) SetState(value *Enablement)() {\n err := m.GetBackingStore().Set(\"state\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *StateSwitcherMock) setState(p State) {\n\tatomic.AddUint64(&m.setStatePreCounter, 1)\n\tdefer atomic.AddUint64(&m.setStateCounter, 1)\n\n\tif m.setStateMock.mockExpectations != nil {\n\t\ttestify_assert.Equal(m.t, *m.setStateMock.mockExpectations, StateSwitcherMocksetStateParams{p},\n\t\t\t\"StateSwitcher.setState got unexpected parameters\")\n\n\t\tif m.setStateFunc == nil {\n\n\t\t\tm.t.Fatal(\"No results are set for the StateSwitcherMock.setState\")\n\n\t\t\treturn\n\t\t}\n\t}\n\n\tif m.setStateFunc == nil {\n\t\tm.t.Fatal(\"Unexpected call to StateSwitcherMock.setState\")\n\t\treturn\n\t}\n\n\tm.setStateFunc(p)\n}", "func (c *Client) SetTransferState(t *Transfer, state string) error {\n\n\tllog.Tracef(\"[%v] [%v] Setting state %v\", c.shortId, t.id, state)\n\n\tcql := c.setTransferState\n\tcql.Bind(state, t.id, c.clientId)\n\trow := Row{}\n\tif applied, err := cql.MapScanCAS(row); err != nil || !applied {\n\t\tif err != nil {\n\t\t\treturn merry.Wrap(err)\n\t\t}\n\t\trowClientId, exists := row[\"client_id\"]\n\t\tif !exists || rowClientId == nilUuid {\n\t\t\tllog.Tracef(\"[%v] [%v] Failed to set state: no such transfer\",\n\t\t\t\tc.shortId, t.id)\n\t\t\treturn merry.Wrap(gocql.ErrNotFound)\n\t\t}\n\t\treturn merry.New(fmt.Sprintf(\"our id %v, previous id %v\",\n\t\t\tc.clientId, rowClientId))\n\t}\n\tt.state = state\n\treturn nil\n}", "func (o *AccessKey) SetState(v string) {\n\to.State = &v\n}", "func (fu *FlowUpdate) SetState(u uuid.UUID) *FlowUpdate {\n\tfu.mutation.SetState(u)\n\treturn fu\n}", "func (impl *Server) SetState(ID string, state string) (base.ModelInterface, error) {\n\tvar (\n\t\tc = impl.TemplateImpl.GetConnection()\n\t\tserver = new(entity.Server)\n\t)\n\ttx := c.Begin()\n\tif err := tx.Error; err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"id\": ID,\n\t\t\t\"op\": \"SetState\",\n\t\t\t\"error\": err,\n\t\t}).Warn(\"DB operation failed, start transaction failed.\")\n\t\treturn nil, base.ErrorTransaction\n\t}\n\tfound, err := impl.GetInternal(tx, ID, server)\n\tif !found || err != nil {\n\t\ttx.Rollback()\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"id\": ID,\n\t\t\t\"op\": \"SetState\",\n\t\t}).Warn(\"DB operation failed, load server failed.\")\n\t\treturn nil, base.ErrorTransaction\n\t}\n\tif err := tx.Model(server).UpdateColumn(\"State\", state).Error; err != nil {\n\t\ttx.Rollback()\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"id\": ID,\n\t\t\t\"op\": \"SetState\",\n\t\t\t\"error\": err,\n\t\t}).Warn(\"DB opertion failed, update server failed, transaction rollback.\")\n\t\treturn nil, base.ErrorTransaction\n\t}\n\tif err := tx.Commit().Error; err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"id\": ID,\n\t\t\t\"op\": \"SetState\",\n\t\t\t\"error\": err,\n\t\t}).Warn(\"DB opertion failed, commit failed.\")\n\t\treturn nil, base.ErrorTransaction\n\t}\n\treturn server.ToModel(), nil\n}", "func (o *GetPublicAuthParams) SetState(state *string) {\n\to.State = state\n}", "func (gau *GithubAssetUpdate) SetState(s string) *GithubAssetUpdate {\n\tgau.mutation.SetState(s)\n\treturn gau\n}", "func (l *ListElemDef) SetState(state ListElemState) {\n\tl.ComponentDef.SetState(state)\n}", "func (fuo *FlowUpdateOne) SetState(u uuid.UUID) *FlowUpdateOne {\n\tfuo.mutation.SetState(u)\n\treturn fuo\n}", "func SetState(pinNum int, state int) error {\n\tvar err error\n\n\t//Validate function input\n\tif state != 1 || state != 0 {\n\t\treturn ErrNoState\n\t}\n\n\t//Open gpio memory range\n\terr = rpio.Open()\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer rpio.Close() //Close gpio memory range when function ends\n\n\t//Convert pin Number to pin\n\tpin := rpio.Pin(pinNum)\n\t//Set pin mode to write\n\tpin.Mode(rpio.Output)\n\t//Write mode to gpio pin\n\tpin.Write(rpio.State(state))\n\n\tfmt.Println(pinNum)\n\treturn nil\n}", "func (w *StatusWorker) SetState(state StatusWorkerState) {\n\tw.mu.Lock()\n\tdefer w.mu.Unlock()\n\n\tw.state = state\n\tstatsState.Set(string(state))\n}", "func (me *TrefreshModeEnumType) Set(s string) { (*xsdt.String)(me).Set(s) }", "func (me *TshapeEnumType) Set(s string) { (*xsdt.String)(me).Set(s) }", "func (gauo *GithubAssetUpdateOne) SetState(s string) *GithubAssetUpdateOne {\n\tgauo.mutation.SetState(s)\n\treturn gauo\n}", "func (peer *Peer) SetState(state uint64) {\n\tpeer.lock.Lock()\n\tdefer peer.lock.Unlock()\n\tpeer.state = state\n}", "func (o *PostOauthTokenParams) SetState(state *string) {\n\to.State = state\n}", "func (o *GetJobEventsParams) SetState(state *string) {\n\to.State = state\n}", "func (c *APIClient) State(strID string) (string, error) {\n\tid := types.StringID(strID)\n\tif id.IsEmpty() {\n\t\treturn \"\", fmt.Errorf(\"ServerID is invalid: %s\", strID)\n\t}\n\tserver, err := sacloud.NewServerOp(c.caller).Read(context.Background(), c.Zone, id)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn string(server.InstanceStatus), nil\n}", "func (me *TviewRefreshModeEnumType) Set(s string) { (*xsdt.String)(me).Set(s) }", "func (o *Vm) SetState(v string) {\n\to.State = &v\n}", "func (me *TxsdActuate) Set(s string) { (*xsdt.String)(me).Set(s) }", "func (me *TxsdActuate) Set(s string) { (*xsdt.String)(me).Set(s) }", "func (lockedCtx *UserCtx) SetState(s aka.AkaState) {\n\tif !lockedCtx.locked {\n\t\tpanic(\"Expected locked\")\n\t}\n\tlockedCtx.state, lockedCtx.stateTime = s, time.Now()\n}", "func (o *Volume) SetState(v string) {\n\to.State = &v\n}", "func (o *Volume) SetState(v string) {\n\to.State = &v\n}", "func (csm *RedisCsm) Set(sessionID int64, state string) {\n\tkey := csm.key(sessionID)\n\toldData := csm.getOrCreate(key)\n\n\toldData[\"__state__\"] = state\n\n\tbody, err := json.Marshal(oldData)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tcsm.set(key, string(body))\n\n}", "func (rl *RateLimiter) SetState(state State) {\n\trl.lock.Lock()\n\tdefer rl.lock.Unlock()\n\tif rl.state == state {\n\t\treturn\n\t}\n\tif rl.state == StateDisabled {\n\t\trl.cycle = 0\n\t\trl.tokens = 0\n\t\trl.startTime = nowFunc()\n\t}\n\trl.state = state\n}", "func (in *ActionMigrationPlanIndexInput) SetState(value string) *ActionMigrationPlanIndexInput {\n\tin.State = value\n\n\tif in._selectedParameters == nil {\n\t\tin._selectedParameters = make(map[string]interface{})\n\t}\n\n\tin._selectedParameters[\"State\"] = nil\n\treturn in\n}", "func ParseStrState(name string) (StrState, error) {\n\tif x, ok := _StrStateValue[name]; ok {\n\t\treturn x, nil\n\t}\n\t// Case insensitive parse, do a separate lookup to prevent unnecessary cost of lowercasing a string if we don't need to.\n\tif x, ok := _StrStateValue[strings.ToLower(name)]; ok {\n\t\treturn x, nil\n\t}\n\treturn StrState(\"\"), fmt.Errorf(\"%s is %w\", name, ErrInvalidStrState)\n}", "func (p *PhidgetDigitalOutput) SetState(state bool) error {\n\treturn p.phidgetError(C.PhidgetDigitalOutput_setState(p.handle, boolToCInt(state)))\n}", "func (b *Button) SetState(highlight bool) {\n\twParam := 0\n\tif highlight {\n\t\twParam = 1\n\t}\n\tb.SendMessage(win.BM_SETSTATE, uintptr(wParam), 0)\n}", "func (s *ocmClient) SetState(value string, description string, policyId string, clusterId string) error {\n\n\tpolicyState := UpgradePolicyStateRequest{\n\t\tValue: string(value),\n\t\tDescription: description,\n\t}\n\n\t// Create the URL path to send to\n\treqUrl, err := url.Parse(s.ocmBaseUrl.String())\n\tif err != nil {\n\t\treturn fmt.Errorf(\"can't read OCM API url: %v\", err)\n\t}\n\treqUrl.Path = path.Join(reqUrl.Path, CLUSTERS_V1_PATH, clusterId, UPGRADEPOLICIES_V1_PATH, policyId, STATE_V1_PATH)\n\n\tresponse, err := s.httpClient.R().\n\t\tSetHeader(\"Content-Type\", \"application/json\").\n\t\tSetBody(policyState).\n\t\tExpectContentType(\"application/json\").\n\t\tPatch(reqUrl.String())\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"can't set upgrade policy state: request to '%v' returned error '%v'\", reqUrl.String(), err)\n\t}\n\toperationId := response.Header().Get(OPERATION_ID_HEADER)\n\tif response.IsError() {\n\t\treturn fmt.Errorf(\"request to '%v' received error code %v, operation id '%v'\", reqUrl.String(), response.StatusCode(), operationId)\n\t}\n\n\treturn nil\n}", "func GuiTextBoxSetState(state GuiTextBoxState) {\n\tcstate := *state.cptr()\n\tC.GuiTextBoxSetState(cstate)\n}", "func (t *SignalingState) Set(state SignalingState) {\n\tatomic.StoreInt32((*int32)(t), int32(state))\n}", "func (m *mStateSwitcherMockSwitchToState) Set(f func(p context.Context, p1 State, p2 interface{})) *StateSwitcherMock {\n\tm.mock.SwitchToStateFunc = f\n\tm.mockExpectations = nil\n\treturn m.mock\n}", "func (gpio *GPIOInterface) SetState(newState models.ACState) error {\n\t// TODO: Enabled when IRBlaster supports other pins than 18:\n\t//\n\t//pin := C.uint(gpio.pin)\n\tvar b [0x200]byte\n\tdata := gpio.mapper.MapToProtocolBinaryString(&newState)\n\tcopy(b[:], data)\n\tcfg := iRBlasterConfig{\n\t\tLeadingPulseWidth: 9000,\n\t\tLeadingGapWidth: 4500,\n\t\tOnePulseWidth: 560,\n\t\tOneGapWidth: 1680,\n\t\tZeroPulseWidth: 560,\n\t\tZeroGapWidth: 560,\n\t\tTrailingPulseWidth: 560,\n\t\tFrequency: 38000,\n\t\tDCN: 50,\n\t\tDCM: 100,\n\t\tcode: b,\n\t}\n\tbuf := &bytes.Buffer{}\n\terr := binary.Write(buf, binary.LittleEndian, cfg)\n\tif err != nil {\n\t\treturn errors.New(\"could not generate IRBlaster transmission buffer\")\n\t}\n\n\tf, err := os.OpenFile(\"/dev/irblaster\", os.O_WRONLY, 0600)\n\tif err != nil {\n\t\treturn errors.New(\"could not open kernel driver file descriptor\")\n\t}\n\tdefer f.Close()\n\tf.Write(buf.Bytes())\n\treturn nil\n}", "func (w *GitWatcher) SetState(state config.State) error {\n\tif !w.initialised {\n\t\treturn w.doInit(state)\n\t}\n\tw.newState <- state\n\treturn nil\n}", "func SetStateDb() {\n\tgenCode(flagSetStateDb)\n}" ]
[ "0.7070501", "0.6957232", "0.6809219", "0.6807629", "0.6577374", "0.6548086", "0.6482371", "0.64595443", "0.6442232", "0.6434297", "0.64214665", "0.63642067", "0.63639104", "0.63628244", "0.63376546", "0.6314403", "0.62782437", "0.62636966", "0.62464017", "0.62410814", "0.62289095", "0.62277335", "0.6222575", "0.62156296", "0.61892414", "0.6180941", "0.61777735", "0.6150156", "0.61311334", "0.6129881", "0.60667264", "0.60348755", "0.60293144", "0.60191596", "0.6000108", "0.59877807", "0.5977786", "0.5962064", "0.5960844", "0.5940753", "0.59325886", "0.59322435", "0.5931392", "0.590264", "0.5884437", "0.58744806", "0.58707297", "0.5856053", "0.58535844", "0.58516514", "0.58516514", "0.58516514", "0.5850475", "0.5849563", "0.5839095", "0.58101743", "0.5809023", "0.5784557", "0.57767326", "0.5763189", "0.5758914", "0.57422465", "0.57317066", "0.57275176", "0.5727403", "0.571873", "0.57137275", "0.569574", "0.56926155", "0.5690273", "0.5683839", "0.5680237", "0.56794506", "0.5676495", "0.5664751", "0.56514376", "0.56391925", "0.563692", "0.56305337", "0.56186104", "0.5595833", "0.558675", "0.55693066", "0.55693066", "0.55572945", "0.55521137", "0.55521137", "0.55481356", "0.5539196", "0.55279106", "0.5523297", "0.55153465", "0.55067164", "0.549353", "0.5491361", "0.5487202", "0.5483342", "0.54793084", "0.54758245", "0.5473863" ]
0.5551902
87
GetStateModifiedByUser returns the StateModifiedByUser field value if set, zero value otherwise.
func (o *AccessRequestData) GetStateModifiedByUser() string { if o == nil || o.StateModifiedByUser == nil { var ret string return ret } return *o.StateModifiedByUser }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *AccessRequestData) SetStateModifiedByUser(v string) {\n\to.StateModifiedByUser = &v\n}", "func (o *AccessRequestData) GetStateModifiedByUserOk() (*string, bool) {\n\tif o == nil || o.StateModifiedByUser == nil {\n\t\treturn nil, false\n\t}\n\treturn o.StateModifiedByUser, true\n}", "func (o *AccessRequestData) HasStateModifiedByUser() bool {\n\tif o != nil && o.StateModifiedByUser != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *BaseItem) GetLastModifiedByUser() AnyOfmicrosoftGraphUser {\n\tif o == nil || o.LastModifiedByUser == nil {\n\t\tvar ret AnyOfmicrosoftGraphUser\n\t\treturn ret\n\t}\n\treturn *o.LastModifiedByUser\n}", "func (o *BaseItem) GetLastModifiedByUserOk() (AnyOfmicrosoftGraphUser, bool) {\n\tif o == nil || o.LastModifiedByUser == nil {\n\t\tvar ret AnyOfmicrosoftGraphUser\n\t\treturn ret, false\n\t}\n\treturn *o.LastModifiedByUser, true\n}", "func (o *MicrosoftGraphListItem) GetLastModifiedByUser() AnyOfmicrosoftGraphUser {\n\tif o == nil || o.LastModifiedByUser == nil {\n\t\tvar ret AnyOfmicrosoftGraphUser\n\t\treturn ret\n\t}\n\treturn *o.LastModifiedByUser\n}", "func (m *SystemMutation) OldUpdateByUser(ctx context.Context) (v int, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser is only allowed on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldUpdateByUser: %w\", err)\n\t}\n\treturn oldValue.UpdateByUser, nil\n}", "func (o *MicrosoftGraphListItem) GetLastModifiedByUserOk() (AnyOfmicrosoftGraphUser, bool) {\n\tif o == nil || o.LastModifiedByUser == nil {\n\t\tvar ret AnyOfmicrosoftGraphUser\n\t\treturn ret, false\n\t}\n\treturn *o.LastModifiedByUser, true\n}", "func (o *BaseItem) HasLastModifiedByUser() bool {\n\tif o != nil && o.LastModifiedByUser != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *OrganizationMutation) OldUpdateByUser(ctx context.Context) (v int, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser is only allowed on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldUpdateByUser: %w\", err)\n\t}\n\treturn oldValue.UpdateByUser, nil\n}", "func (o *BaseItem) SetLastModifiedByUser(v AnyOfmicrosoftGraphUser) {\n\to.LastModifiedByUser = &v\n}", "func (m *OrgUnitMutation) OldUpdateByUser(ctx context.Context) (v int, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser is only allowed on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldUpdateByUser: %w\", err)\n\t}\n\treturn oldValue.UpdateByUser, nil\n}", "func (m *OrgUnitPositionMutation) OldUpdateByUser(ctx context.Context) (v int, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser is only allowed on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldUpdateByUser: %w\", err)\n\t}\n\treturn oldValue.UpdateByUser, nil\n}", "func (m *UserMutation) OldUpdateByUser(ctx context.Context) (v int, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser is only allowed on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldUpdateByUser: %w\", err)\n\t}\n\treturn oldValue.UpdateByUser, nil\n}", "func (o *Vm) GetModifiedBy() string {\n\tif o == nil || o.ModifiedBy == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.ModifiedBy\n}", "func (o *FeatureFlag) GetModified() time.Time {\n\tif o == nil || o.Modified == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.Modified\n}", "func (m *OrgUnitMemberMutation) OldUpdateByUser(ctx context.Context) (v int, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser is only allowed on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldUpdateByUser: %w\", err)\n\t}\n\treturn oldValue.UpdateByUser, nil\n}", "func (o *MicrosoftGraphListItem) SetLastModifiedByUser(v AnyOfmicrosoftGraphUser) {\n\to.LastModifiedByUser = &v\n}", "func (m *SystemMutation) UpdateByUser() (r int, exists bool) {\n\tv := m.update_by\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (u *UserCalculator) Changed() bool { return u.changed }", "func (o *MicrosoftGraphListItem) HasLastModifiedByUser() bool {\n\tif o != nil && o.LastModifiedByUser != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Vm) HasModifiedBy() bool {\n\tif o != nil && o.ModifiedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewProjectBudget) GetUpdatedByUserId() int32 {\n\tif o == nil || o.UpdatedByUserId == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.UpdatedByUserId\n}", "func (o *IncidentTeamResponseAttributes) GetModified() time.Time {\n\tif o == nil || o.Modified == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.Modified\n}", "func (m *ItemSitesSiteItemRequestBuilder) LastModifiedByUser()(*ItemSitesItemLastModifiedByUserRequestBuilder) {\n return NewItemSitesItemLastModifiedByUserRequestBuilderInternal(m.BaseRequestBuilder.PathParameters, m.BaseRequestBuilder.RequestAdapter)\n}", "func (m *ItemItemsDriveItemItemRequestBuilder) LastModifiedByUser()(*ItemItemsItemLastModifiedByUserRequestBuilder) {\n return NewItemItemsItemLastModifiedByUserRequestBuilderInternal(m.BaseRequestBuilder.PathParameters, m.BaseRequestBuilder.RequestAdapter)\n}", "func (o *ViewProjectBudget) GetUpdatedByUserIdOk() (*int32, bool) {\n\tif o == nil || o.UpdatedByUserId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedByUserId, true\n}", "func (m *SystemMutation) UpdateByUserCleared() bool {\n\t_, ok := m.clearedFields[system.FieldUpdateByUser]\n\treturn ok\n}", "func (o *ViewProjectBudget) HasUpdatedByUserId() bool {\n\tif o != nil && o.UpdatedByUserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewProjectBudget) GetUpdatedBy() int32 {\n\tif o == nil || o.UpdatedBy == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.UpdatedBy\n}", "func (obj *BlobAttribute) GetIsModified() bool {\n\treturn obj.getIsModified()\n}", "func (o *Vm) GetModifiedByOk() (*string, bool) {\n\tif o == nil || o.ModifiedBy == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ModifiedBy, true\n}", "func (o *ReservationModel) GetModified() time.Time {\n\tif o == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\n\treturn o.Modified\n}", "func (entry *UtxoEntry) isModified() bool {\n\treturn entry.state&utxoStateModified == utxoStateModified\n}", "func (o *RoleWithAccess) GetModified() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Modified\n}", "func (x WorkloadEntity) GetCreatedByUser() users.UserReference {\n\treturn x.CreatedByUser\n}", "func (o *ViewMilestone) GetUserFollowingChanges() bool {\n\tif o == nil || o.UserFollowingChanges == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.UserFollowingChanges\n}", "func (m *ConditionalAccessPolicy) GetModifiedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"modifiedDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (o *ViewMilestone) GetUpdatedBy() int32 {\n\tif o == nil || o.UpdatedBy == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.UpdatedBy\n}", "func (m *OrganizationMutation) UpdateByUser() (r int, exists bool) {\n\tv := m.update_by\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (m *OrgUnitPositionMutation) UpdateByUser() (r int, exists bool) {\n\tv := m.update_by\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (o *FeatureFlag) GetModifiedOk() (time.Time, bool) {\n\tif o == nil || o.Modified == nil {\n\t\tvar ret time.Time\n\t\treturn ret, false\n\t}\n\treturn *o.Modified, true\n}", "func (m *SecurityActionState) GetUpdatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"updatedDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (m *OrgUnitMutation) UpdateByUser() (r int, exists bool) {\n\tv := m.update_by\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (m *User) GetExternalUserState()(*string) {\n return m.externalUserState\n}", "func (m *NOCWidget) LastUpdatedBy() string {\n\treturn m.lastUpdatedByField\n}", "func (o *ReservationModel) GetModifiedOk() (*time.Time, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Modified, true\n}", "func (r *DeviceManagementScriptUserStateRequest) Get(ctx context.Context) (resObj *DeviceManagementScriptUserState, err error) {\n\tvar query string\n\tif r.query != nil {\n\t\tquery = \"?\" + r.query.Encode()\n\t}\n\terr = r.JSONRequest(ctx, \"GET\", query, nil, &resObj)\n\treturn\n}", "func (o *Vm) GetModifiedOn() time.Time {\n\tif o == nil || o.ModifiedOn == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.ModifiedOn\n}", "func (m *User) GetState()(*string) {\n return m.state\n}", "func (o *IncidentTeamResponseAttributes) HasModified() bool {\n\treturn o != nil && o.Modified != nil\n}", "func (m *SystemMutation) OldCreateByUser(ctx context.Context) (v int, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldCreateByUser is only allowed on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldCreateByUser requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldCreateByUser: %w\", err)\n\t}\n\treturn oldValue.CreateByUser, nil\n}", "func UpdatedByIsNil() predicate.GameServer {\n\treturn predicate.GameServer(func(s *sql.Selector) {\n\t\ts.Where(sql.IsNull(s.C(FieldUpdatedBy)))\n\t})\n}", "func (o *RoleWithAccess) GetModifiedOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Modified, true\n}", "func (o *V0037Node) GetReasonSetByUserOk() (*string, bool) {\n\tif o == nil || o.ReasonSetByUser == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ReasonSetByUser, true\n}", "func (o *DeeplinkApp) GetModifiedTs() int32 {\n\tif o == nil || o.ModifiedTs == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.ModifiedTs\n}", "func (m *UserMutation) UpdateByUser() (r int, exists bool) {\n\tv := m.update_by\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (m *OrgUnitMemberMutation) UpdateByUser() (r int, exists bool) {\n\tv := m.update_by\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (m *OrgUnitPositionMutation) UpdateByUserCleared() bool {\n\t_, ok := m.clearedFields[orgunitposition.FieldUpdateByUser]\n\treturn ok\n}", "func (c *Controller) CurrentUserState(w http.ResponseWriter, r *http.Request, u *studynook.User) {\n\n\tcoins, err := c.DB.GetCoins(u.ID)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\texp, err := c.DB.GetEXPAmount(u.ID)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tuserLevel, userExp := CalculateLevelEXP(exp)\n\n\tcurrentBackground, err := c.DB.GetCurrentBackground(u.ID)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tcurrentAvatar, err := c.DB.GetCurrentAvatar(u.ID)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tcurrentUser := &currentUserState{Email: u.Email,\n\t\tName: u.Name,\n\t\tUsername: u.Username,\n\t\tCoins:\t strconv.Itoa(coins),\n\t\tLevel:\t strconv.Itoa(userLevel),\n\t\tEXP:\t strconv.Itoa(userExp),\n\t\tZone:\t currentBackground,\n\t\tAvatar:\t currentAvatar,\n\t}\n\n\terr = json.NewEncoder(w).Encode(currentUser)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n}", "func (m *OrganizationMutation) UpdateByUserCleared() bool {\n\t_, ok := m.clearedFields[organization.FieldUpdateByUser]\n\treturn ok\n}", "func (a *AttachMenuBotsNotModified) AsModified() (*AttachMenuBots, bool) {\n\treturn nil, false\n}", "func (m *OrgUnitMutation) UpdateByUserCleared() bool {\n\t_, ok := m.clearedFields[orgunit.FieldUpdateByUser]\n\treturn ok\n}", "func (o *ViewMilestone) GetUpdatedByOk() (*int32, bool) {\n\tif o == nil || o.UpdatedBy == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedBy, true\n}", "func UpdatedByIsNil() predicate.Ethnicity {\n\treturn predicate.Ethnicity(func(s *sql.Selector) {\n\t\ts.Where(sql.IsNull(s.C(FieldUpdatedBy)))\n\t})\n}", "func (m *User) GetExternalUserStateChangeDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.externalUserStateChangeDateTime\n}", "func (o *ViewProjectBudget) HasUpdatedBy() bool {\n\tif o != nil && o.UpdatedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *IncidentTeamResponseAttributes) GetModifiedOk() (*time.Time, bool) {\n\tif o == nil || o.Modified == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Modified, true\n}", "func (o *ViewProjectBudget) GetUpdatedByOk() (*int32, bool) {\n\tif o == nil || o.UpdatedBy == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedBy, true\n}", "func (o *VulnUpdateNotification) GetLastUpdated() int32 {\n\tif o == nil || o.LastUpdated == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.LastUpdated\n}", "func GetLogedUser() STRUCTURES.USER {\n\tif IsLogged() {\n\t\treturn UserLogued\n\t}\n\treturn STRUCTURES.USER{}\n}", "func (o *Vm) GetModifiedOnOk() (*time.Time, bool) {\n\tif o == nil || o.ModifiedOn == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ModifiedOn, true\n}", "func (m *JobHistoryMutation) OldCreateByUser(ctx context.Context) (v int, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldCreateByUser is only allowed on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldCreateByUser requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldCreateByUser: %w\", err)\n\t}\n\treturn oldValue.CreateByUser, nil\n}", "func (o *Vm) SetModifiedBy(v string) {\n\to.ModifiedBy = &v\n}", "func (o *ViewMilestone) HasUpdatedBy() bool {\n\tif o != nil && o.UpdatedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *V0037Node) GetReasonSetByUser() string {\n\tif o == nil || o.ReasonSetByUser == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.ReasonSetByUser\n}", "func EmbeddedSIMDeviceStateValuePRemovedByUser() *EmbeddedSIMDeviceStateValue {\n\tv := EmbeddedSIMDeviceStateValueVRemovedByUser\n\treturn &v\n}", "func (m *NamedLocation) GetModifiedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n return m.modifiedDateTime\n}", "func (m *MacOSSoftwareUpdateStateSummary) GetLastUpdatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"lastUpdatedDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "func (o *FeatureFlag) HasModified() bool {\n\tif o != nil && o.Modified != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *OrgUnitPositionMutation) OldCreateByUser(ctx context.Context) (v int, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldCreateByUser is only allowed on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldCreateByUser requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldCreateByUser: %w\", err)\n\t}\n\treturn oldValue.CreateByUser, nil\n}", "func (x WorkloadEntityOutline) GetCreatedByUser() users.UserReference {\n\treturn x.CreatedByUser\n}", "func (o *User) GetState() string {\n\tif o == nil || o.State == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.State\n}", "func (d *MessagesDialogsNotModified) AsModified() (ModifiedMessagesDialogs, bool) {\n\tvalue, ok := (MessagesDialogsClass(d)).(ModifiedMessagesDialogs)\n\treturn value, ok\n}", "func (o *InlineResponse20051TodoItems) GetUserFollowingChanges() bool {\n\tif o == nil || o.UserFollowingChanges == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.UserFollowingChanges\n}", "func (m *UserMutation) UpdateByUserCleared() bool {\n\t_, ok := m.clearedFields[user.FieldUpdateByUser]\n\treturn ok\n}", "func UpdatedBy(v int) predicate.Ethnicity {\n\treturn predicate.Ethnicity(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldUpdatedBy), v))\n\t})\n}", "func (o *VulnUpdateNotification) GetUserId() string {\n\tif o == nil || o.UserId == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.UserId\n}", "func (s *sharedPullerState) Updated() time.Time {\n\ts.mut.RLock()\n\tt := s.updated\n\ts.mut.RUnlock()\n\treturn t\n}", "func (m *OrganizationMutation) OldCreateByUser(ctx context.Context) (v int, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldCreateByUser is only allowed on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldCreateByUser requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldCreateByUser: %w\", err)\n\t}\n\treturn oldValue.CreateByUser, nil\n}", "func (a *AttachMenuBots) AsModified() (*AttachMenuBots, bool) {\n\treturn a, true\n}", "func (s *MessagesStickersNotModified) AsModified() (*MessagesStickers, bool) {\n\treturn nil, false\n}", "func (m *OrgUnitMutation) OldCreateByUser(ctx context.Context) (v int, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldCreateByUser is only allowed on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldCreateByUser requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldCreateByUser: %w\", err)\n\t}\n\treturn oldValue.CreateByUser, nil\n}", "func (o *VulnUpdateNotification) GetLastUpdatedOk() (*int32, bool) {\n\tif o == nil || o.LastUpdated == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LastUpdated, true\n}", "func (m *OrgUnitMemberMutation) UpdateByUserCleared() bool {\n\t_, ok := m.clearedFields[orgunitmember.FieldUpdateByUser]\n\treturn ok\n}", "func (o *IPAllowlistEntryAttributes) GetModifiedAt() time.Time {\n\tif o == nil || o.ModifiedAt == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.ModifiedAt\n}", "func (m *UserMutation) OldCreateByUser(ctx context.Context) (v int, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldCreateByUser is only allowed on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldCreateByUser requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldCreateByUser: %w\", err)\n\t}\n\treturn oldValue.CreateByUser, nil\n}", "func (p *ModifiedPropertyType) GetModified() string {\n\treturn p.Modified\n}", "func (m *SecurityActionState) GetUser()(*string) {\n val, err := m.GetBackingStore().Get(\"user\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "func UpdatedBy(v int) predicate.GameServer {\n\treturn predicate.GameServer(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldUpdatedBy), v))\n\t})\n}" ]
[ "0.7398161", "0.7206049", "0.7144577", "0.5827528", "0.5715213", "0.5666565", "0.5614777", "0.55757856", "0.55161786", "0.5498995", "0.5384752", "0.5381846", "0.5374556", "0.5367959", "0.5358326", "0.5345847", "0.53149945", "0.5310359", "0.52704084", "0.5268703", "0.52522403", "0.5234459", "0.5199909", "0.5178011", "0.5136796", "0.50903094", "0.50814927", "0.50650984", "0.5047537", "0.50401115", "0.50193036", "0.50129026", "0.50076306", "0.50062704", "0.49970877", "0.4986161", "0.49683538", "0.49382252", "0.49327022", "0.4913851", "0.48946375", "0.48729026", "0.4859161", "0.48530108", "0.48328963", "0.48277444", "0.48276162", "0.48258078", "0.480426", "0.47982156", "0.47786567", "0.47778925", "0.47602504", "0.47577953", "0.47551194", "0.47517017", "0.47426018", "0.47407785", "0.47387826", "0.47183684", "0.47157913", "0.4705738", "0.46980405", "0.46941295", "0.46913862", "0.46896997", "0.46870124", "0.46815127", "0.46792403", "0.46660113", "0.4655134", "0.4649871", "0.46420285", "0.4630903", "0.46273386", "0.46250466", "0.46035853", "0.45953378", "0.4588724", "0.45880055", "0.4585022", "0.45813793", "0.45804244", "0.45796245", "0.45649776", "0.4564961", "0.45638204", "0.45631266", "0.45618492", "0.45575738", "0.45513514", "0.45398754", "0.4533334", "0.45257503", "0.45199344", "0.4512671", "0.45044133", "0.45029202", "0.44955897", "0.449042" ]
0.81134456
0
GetStateModifiedByUserOk returns a tuple with the StateModifiedByUser field value if set, nil otherwise and a boolean to check if the value has been set.
func (o *AccessRequestData) GetStateModifiedByUserOk() (*string, bool) { if o == nil || o.StateModifiedByUser == nil { return nil, false } return o.StateModifiedByUser, true }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *AccessRequestData) GetStateModifiedByUser() string {\n\tif o == nil || o.StateModifiedByUser == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.StateModifiedByUser\n}", "func (o *AccessRequestData) HasStateModifiedByUser() bool {\n\tif o != nil && o.StateModifiedByUser != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AccessRequestData) SetStateModifiedByUser(v string) {\n\to.StateModifiedByUser = &v\n}", "func (o *BaseItem) GetLastModifiedByUserOk() (AnyOfmicrosoftGraphUser, bool) {\n\tif o == nil || o.LastModifiedByUser == nil {\n\t\tvar ret AnyOfmicrosoftGraphUser\n\t\treturn ret, false\n\t}\n\treturn *o.LastModifiedByUser, true\n}", "func (o *MicrosoftGraphListItem) GetLastModifiedByUserOk() (AnyOfmicrosoftGraphUser, bool) {\n\tif o == nil || o.LastModifiedByUser == nil {\n\t\tvar ret AnyOfmicrosoftGraphUser\n\t\treturn ret, false\n\t}\n\treturn *o.LastModifiedByUser, true\n}", "func (o *RoleWithAccess) GetModifiedOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Modified, true\n}", "func (o *FeatureFlag) GetModifiedOk() (time.Time, bool) {\n\tif o == nil || o.Modified == nil {\n\t\tvar ret time.Time\n\t\treturn ret, false\n\t}\n\treturn *o.Modified, true\n}", "func (o *Vm) GetModifiedByOk() (*string, bool) {\n\tif o == nil || o.ModifiedBy == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ModifiedBy, true\n}", "func (o *IncidentTeamResponseAttributes) GetModifiedOk() (*time.Time, bool) {\n\tif o == nil || o.Modified == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Modified, true\n}", "func (o *ReservationModel) GetModifiedOk() (*time.Time, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Modified, true\n}", "func (o *Vm) GetModifiedOnOk() (*time.Time, bool) {\n\tif o == nil || o.ModifiedOn == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ModifiedOn, true\n}", "func (o *ViewProjectBudget) GetUpdatedByUserIdOk() (*int32, bool) {\n\tif o == nil || o.UpdatedByUserId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedByUserId, true\n}", "func (o *ViewMilestone) GetUserFollowingChangesOk() (*bool, bool) {\n\tif o == nil || o.UserFollowingChanges == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UserFollowingChanges, true\n}", "func (o *ViewMilestone) GetUpdatedByOk() (*int32, bool) {\n\tif o == nil || o.UpdatedBy == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedBy, true\n}", "func (o *V0037Node) GetReasonSetByUserOk() (*string, bool) {\n\tif o == nil || o.ReasonSetByUser == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ReasonSetByUser, true\n}", "func (o *Ga4ghTumourboard) GetUpdatedOk() (string, bool) {\n\tif o == nil || o.Updated == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.Updated, true\n}", "func (o *User) GetStateOk() (string, bool) {\n\tif o == nil || o.State == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.State, true\n}", "func (o *Ga4ghChemotherapy) GetUpdatedOk() (string, bool) {\n\tif o == nil || o.Updated == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.Updated, true\n}", "func (o *ViewProjectBudget) GetUpdatedByOk() (*int32, bool) {\n\tif o == nil || o.UpdatedBy == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedBy, true\n}", "func (entry *UtxoEntry) isModified() bool {\n\treturn entry.state&utxoStateModified == utxoStateModified\n}", "func (o *VulnUpdateNotification) GetLastUpdatedOk() (*int32, bool) {\n\tif o == nil || o.LastUpdated == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LastUpdated, true\n}", "func (o *VulnUpdateNotification) GetUserIdOk() (*string, bool) {\n\tif o == nil || o.UserId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UserId, true\n}", "func (o *LocalDatabaseProvider) GetUpdatedOk() (*time.Time, bool) {\n\tif o == nil || o.Updated == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Updated, true\n}", "func (u *UserCalculator) Changed() bool { return u.changed }", "func (o *DeeplinkApp) GetModifiedTsOk() (*int32, bool) {\n\tif o == nil || o.ModifiedTs == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ModifiedTs, true\n}", "func (o *Commitstatus) GetUpdatedOnOk() (*time.Time, bool) {\n\tif o == nil || o.UpdatedOn == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedOn, true\n}", "func (o *IPAllowlistEntryAttributes) GetModifiedAtOk() (*time.Time, bool) {\n\tif o == nil || o.ModifiedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ModifiedAt, true\n}", "func (o *BaseItem) HasLastModifiedByUser() bool {\n\tif o != nil && o.LastModifiedByUser != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DeeplinkRule) GetModifiedOk() (*string, bool) {\n\tif o == nil || o.Modified == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Modified, true\n}", "func (o *Invitation) GetToUserOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ToUser.Get(), o.ToUser.IsSet()\n}", "func (o *IncidentTeamResponseAttributes) HasModified() bool {\n\treturn o != nil && o.Modified != nil\n}", "func (o *Vm) GetUserMetadataOk() (*string, bool) {\n\tif o == nil || o.UserMetadata == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UserMetadata, true\n}", "func (o *MicrosoftGraphListItem) HasLastModifiedByUser() bool {\n\tif o != nil && o.LastModifiedByUser != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AnalysisUpdateNotificationData) GetNotificationUserOk() (*string, bool) {\n\tif o == nil || o.NotificationUser == nil {\n\t\treturn nil, false\n\t}\n\treturn o.NotificationUser, true\n}", "func (o *TransactionSplit) GetUserOk() (*string, bool) {\n\tif o == nil || o.User == nil {\n\t\treturn nil, false\n\t}\n\treturn o.User, true\n}", "func (o *BaseItem) GetLastModifiedByUser() AnyOfmicrosoftGraphUser {\n\tif o == nil || o.LastModifiedByUser == nil {\n\t\tvar ret AnyOfmicrosoftGraphUser\n\t\treturn ret\n\t}\n\treturn *o.LastModifiedByUser\n}", "func (o *MicrosoftGraphListItem) GetLastModifiedByUser() AnyOfmicrosoftGraphUser {\n\tif o == nil || o.LastModifiedByUser == nil {\n\t\tvar ret AnyOfmicrosoftGraphUser\n\t\treturn ret\n\t}\n\treturn *o.LastModifiedByUser\n}", "func (o *ViewMilestone) GetUserFollowingChanges() bool {\n\tif o == nil || o.UserFollowingChanges == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.UserFollowingChanges\n}", "func (o *FileversionFileversion) GetNotifyCurrentUserOk() (*bool, bool) {\n\tif o == nil || o.NotifyCurrentUser == nil {\n\t\treturn nil, false\n\t}\n\treturn o.NotifyCurrentUser, true\n}", "func (o *UserPasswordCredentials) GetUserOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.User, true\n}", "func (obj *BlobAttribute) GetIsModified() bool {\n\treturn obj.getIsModified()\n}", "func (o *Snippet) GetUpdatedOnOk() (*time.Time, bool) {\n\tif o == nil || o.UpdatedOn == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedOn, true\n}", "func (o *MicrosoftGraphModifiedProperty) GetNewValueOk() (string, bool) {\n\tif o == nil || o.NewValue == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.NewValue, true\n}", "func (o *MicrosoftGraphModifiedProperty) GetOldValueOk() (string, bool) {\n\tif o == nil || o.OldValue == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.OldValue, true\n}", "func (o *ViewMilestone) GetLastChangedOnOk() (*string, bool) {\n\tif o == nil || o.LastChangedOn == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LastChangedOn, true\n}", "func (o *Vm) HasModifiedBy() bool {\n\tif o != nil && o.ModifiedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FeatureFlag) GetModified() time.Time {\n\tif o == nil || o.Modified == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.Modified\n}", "func (o *InlineResponse20051TodoItems) GetUserFollowingChangesOk() (*bool, bool) {\n\tif o == nil || o.UserFollowingChanges == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UserFollowingChanges, true\n}", "func (o *BaseItem) GetCreatedByUserOk() (AnyOfmicrosoftGraphUser, bool) {\n\tif o == nil || o.CreatedByUser == nil {\n\t\tvar ret AnyOfmicrosoftGraphUser\n\t\treturn ret, false\n\t}\n\treturn *o.CreatedByUser, true\n}", "func (o *UcsdBackupInfoAllOf) GetLastModifiedOk() (*time.Time, bool) {\n\tif o == nil || o.LastModified == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LastModified, true\n}", "func (o *ViewProjectBudget) HasUpdatedByUserId() bool {\n\tif o != nil && o.UpdatedByUserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *SystemMutation) UpdateByUser() (r int, exists bool) {\n\tv := m.update_by\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (o *IncidentTeamResponseAttributes) GetModified() time.Time {\n\tif o == nil || o.Modified == nil {\n\t\tvar ret time.Time\n\t\treturn ret\n\t}\n\treturn *o.Modified\n}", "func (o *ColumnBoardColumnMeta) GetUserOk() (*ColumnBoardColumnMetaUser, bool) {\n\tif o == nil || o.User == nil {\n\t\treturn nil, false\n\t}\n\treturn o.User, true\n}", "func (o *ModelsUser) GetUpdatedAtOk() (*string, bool) {\n\tif o == nil || o.UpdatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedAt, true\n}", "func (o *ZoneZone) GetUpdatedOk() (*time.Time, bool) {\n\tif o == nil || o.Updated == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Updated, true\n}", "func (o *VulnUpdateNotification) GetRecordStateValOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.RecordStateVal.Get(), o.RecordStateVal.IsSet()\n}", "func (o *WorkflowServiceItemActionInstance) GetUserOk() (*IamUserRelationship, bool) {\n\tif o == nil || o.User == nil {\n\t\treturn nil, false\n\t}\n\treturn o.User, true\n}", "func (o *CreditBankIncomeItem) GetLastUpdatedTimeOk() (*time.Time, bool) {\n\tif o == nil || o.LastUpdatedTime == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LastUpdatedTime, true\n}", "func (*OpenconfigOfficeAp_System_Aaa_Authentication_Users_User_State) IsYANGGoStruct() {}", "func (d *MessagesDialogsNotModified) AsModified() (ModifiedMessagesDialogs, bool) {\n\tvalue, ok := (MessagesDialogsClass(d)).(ModifiedMessagesDialogs)\n\treturn value, ok\n}", "func (o *GetMessagesAllOf) GetLastEditTimestampOk() (*int32, bool) {\n\tif o == nil || o.LastEditTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LastEditTimestamp, true\n}", "func (o *NormalizedProjectRevisionHook) GetUpdatedAtOk() (*time.Time, bool) {\n\tif o == nil || o.UpdatedAt == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UpdatedAt, true\n}", "func (c *ChannelsChannelParticipantsNotModified) AsModified() (*ChannelsChannelParticipants, bool) {\n\treturn nil, false\n}", "func (o *ViewProjectBudget) GetDateUpdatedOk() (*string, bool) {\n\tif o == nil || o.DateUpdated == nil {\n\t\treturn nil, false\n\t}\n\treturn o.DateUpdated, true\n}", "func (o *FeatureFlag) HasModified() bool {\n\tif o != nil && o.Modified != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *WatchlistScreeningIndividualUpdateResponse) GetClientUserIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ClientUserId.Get(), o.ClientUserId.IsSet()\n}", "func (o *UpdatesV3Request) GetOptimisticUpdatesOk() (*bool, bool) {\n\tif o == nil || o.OptimisticUpdates == nil {\n\t\treturn nil, false\n\t}\n\treturn o.OptimisticUpdates, true\n}", "func (o *PostWebhook) GetPrUpdatedOk() (*bool, bool) {\n\tif o == nil || o.PrUpdated == nil {\n\t\treturn nil, false\n\t}\n\treturn o.PrUpdated, true\n}", "func (o *RoleWithAccess) GetModified() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Modified\n}", "func (o *V0037JobProperties) GetGetUserEnvironmentOk() (*bool, bool) {\n\tif o == nil || o.GetUserEnvironment == nil {\n\t\treturn nil, false\n\t}\n\treturn o.GetUserEnvironment, true\n}", "func (a *AttachMenuBotsNotModified) AsModified() (*AttachMenuBots, bool) {\n\treturn nil, false\n}", "func (o *ViewMilestone) GetCreatedByOk() (*int32, bool) {\n\tif o == nil || o.CreatedBy == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedBy, true\n}", "func (m *OrganizationMutation) UpdateByUser() (r int, exists bool) {\n\tv := m.update_by\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (o *BaseItem) GetLastModifiedByOk() (AnyOfmicrosoftGraphIdentitySet, bool) {\n\tif o == nil || o.LastModifiedBy == nil {\n\t\tvar ret AnyOfmicrosoftGraphIdentitySet\n\t\treturn ret, false\n\t}\n\treturn *o.LastModifiedBy, true\n}", "func (o *InlineResponse20051TodoItems) GetUserFollowingChanges() bool {\n\tif o == nil || o.UserFollowingChanges == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.UserFollowingChanges\n}", "func (m *OrganizationMutation) OldUpdateByUser(ctx context.Context) (v int, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser is only allowed on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldUpdateByUser: %w\", err)\n\t}\n\treturn oldValue.UpdateByUser, nil\n}", "func (o *ArchivedAnalysis) GetLastUpdatedOk() (*time.Time, bool) {\n\tif o == nil || o.LastUpdated == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LastUpdated, true\n}", "func (a *AttachMenuBots) AsModified() (*AttachMenuBots, bool) {\n\treturn a, true\n}", "func (o *WorkflowServiceItemActionInstance) GetUserIdOrEmailOk() (*string, bool) {\n\tif o == nil || o.UserIdOrEmail == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UserIdOrEmail, true\n}", "func (o *MicrosoftGraphListItem) GetLastModifiedByOk() (AnyOfmicrosoftGraphIdentitySet, bool) {\n\tif o == nil || o.LastModifiedBy == nil {\n\t\tvar ret AnyOfmicrosoftGraphIdentitySet\n\t\treturn ret, false\n\t}\n\treturn *o.LastModifiedBy, true\n}", "func (o *AccessRequestData) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (o *NotificationProjectBudgetNotification) GetUserIdsOk() (*[]int32, bool) {\n\tif o == nil || o.UserIds == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UserIds, true\n}", "func (o *PasswordUpdate) GetOldPasswordOk() (*string, bool) {\n\tif o == nil || o.OldPassword == nil {\n\t\treturn nil, false\n\t}\n\treturn o.OldPassword, true\n}", "func (o *MicrosoftGraphListItem) GetCreatedByUserOk() (AnyOfmicrosoftGraphUser, bool) {\n\tif o == nil || o.CreatedByUser == nil {\n\t\tvar ret AnyOfmicrosoftGraphUser\n\t\treturn ret, false\n\t}\n\treturn *o.CreatedByUser, true\n}", "func (o *V0037JobProperties) GetMailUserOk() (*string, bool) {\n\tif o == nil || o.MailUser == nil {\n\t\treturn nil, false\n\t}\n\treturn o.MailUser, true\n}", "func (lugb *LastUpdatedGroupBy) Bool(ctx context.Context) (_ bool, err error) {\n\tvar v []bool\n\tif v, err = lugb.Bools(ctx); err != nil {\n\t\treturn\n\t}\n\tswitch len(v) {\n\tcase 1:\n\t\treturn v[0], nil\n\tcase 0:\n\t\terr = &NotFoundError{lastupdated.Label}\n\tdefault:\n\t\terr = fmt.Errorf(\"ent: LastUpdatedGroupBy.Bools returned %d results when one was expected\", len(v))\n\t}\n\treturn\n}", "func (o *SecurityProblem) GetLastUpdatedTimestampOk() (*int64, bool) {\n\tif o == nil || o.LastUpdatedTimestamp == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LastUpdatedTimestamp, true\n}", "func (o *ViewProjectBudget) HasUpdatedBy() bool {\n\tif o != nil && o.UpdatedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InlineResponse20034Milestone) GetLastChangedOnOk() (*string, bool) {\n\tif o == nil || o.LastChangedOn == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LastChangedOn, true\n}", "func (o *Transfer) GetUserOk() (*TransferUserInResponse, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.User, true\n}", "func (m *UserMutation) UpdateByUser() (r int, exists bool) {\n\tv := m.update_by\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (c *ChannelsChannelParticipants) AsModified() (*ChannelsChannelParticipants, bool) {\n\treturn c, true\n}", "func (*OpenconfigSystem_System_Aaa_Authentication_Users_User_State) IsYANGGoStruct() {}", "func (d *MessagesDialogs) AsModified() (ModifiedMessagesDialogs, bool) {\n\tvalue, ok := (MessagesDialogsClass(d)).(ModifiedMessagesDialogs)\n\treturn value, ok\n}", "func (o *ViewMilestone) HasUpdatedBy() bool {\n\tif o != nil && o.UpdatedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewCustomFieldTask) GetCreatedByOk() (*int32, bool) {\n\tif o == nil || o.CreatedBy == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreatedBy, true\n}", "func (m *OrgUnitMutation) UpdateByUser() (r int, exists bool) {\n\tv := m.update_by\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (o *Vm) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (m *SystemMutation) UpdateByUserCleared() bool {\n\t_, ok := m.clearedFields[system.FieldUpdateByUser]\n\treturn ok\n}" ]
[ "0.7612322", "0.72171247", "0.6692978", "0.6572933", "0.64820665", "0.6391565", "0.63481003", "0.6194298", "0.6191534", "0.6107251", "0.59802675", "0.5972622", "0.58879256", "0.582527", "0.5796085", "0.5780506", "0.577609", "0.5761749", "0.57557315", "0.57359755", "0.57288957", "0.5711696", "0.5689741", "0.5658202", "0.56243986", "0.5599086", "0.5564265", "0.5563706", "0.5533157", "0.54843736", "0.54605037", "0.5459877", "0.5447201", "0.5439279", "0.54211724", "0.54011863", "0.5390044", "0.53884965", "0.5383901", "0.5381746", "0.53801924", "0.537591", "0.5368617", "0.536507", "0.5322952", "0.52974373", "0.528111", "0.52778405", "0.5270766", "0.524517", "0.52198875", "0.51869965", "0.51786286", "0.51782924", "0.51715827", "0.51714915", "0.5167974", "0.5115253", "0.5087803", "0.50792855", "0.5060424", "0.5057436", "0.50553167", "0.5051061", "0.5050141", "0.50253147", "0.5021507", "0.5006404", "0.4998932", "0.4995225", "0.4991343", "0.49909815", "0.49901995", "0.49855852", "0.49850026", "0.4972055", "0.49713847", "0.49666426", "0.49600965", "0.49586552", "0.49515566", "0.49515235", "0.4950431", "0.49503586", "0.49463326", "0.49367282", "0.4933927", "0.49328712", "0.49301982", "0.49215695", "0.49167585", "0.49159813", "0.4907153", "0.49024755", "0.49002382", "0.48999706", "0.48987007", "0.48959842", "0.4888819", "0.48855484" ]
0.83527094
0
HasStateModifiedByUser returns a boolean if a field has been set.
func (o *AccessRequestData) HasStateModifiedByUser() bool { if o != nil && o.StateModifiedByUser != nil { return true } return false }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *Vm) HasModifiedBy() bool {\n\tif o != nil && o.ModifiedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *BaseItem) HasLastModifiedByUser() bool {\n\tif o != nil && o.LastModifiedByUser != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewProjectBudget) HasUpdatedByUserId() bool {\n\tif o != nil && o.UpdatedByUserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewMilestone) HasUpdatedBy() bool {\n\tif o != nil && o.UpdatedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphListItem) HasLastModifiedByUser() bool {\n\tif o != nil && o.LastModifiedByUser != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewProjectBudget) HasUpdatedBy() bool {\n\tif o != nil && o.UpdatedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AccessRequestData) GetStateModifiedByUserOk() (*string, bool) {\n\tif o == nil || o.StateModifiedByUser == nil {\n\t\treturn nil, false\n\t}\n\treturn o.StateModifiedByUser, true\n}", "func (o *AccessRequestData) SetStateModifiedByUser(v string) {\n\to.StateModifiedByUser = &v\n}", "func (o *AccessRequestData) GetStateModifiedByUser() string {\n\tif o == nil || o.StateModifiedByUser == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.StateModifiedByUser\n}", "func (o *FeatureFlag) HasModified() bool {\n\tif o != nil && o.Modified != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *IncidentTeamResponseAttributes) HasModified() bool {\n\treturn o != nil && o.Modified != nil\n}", "func (o *User) HasState() bool {\n\tif o != nil && o.State != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewMilestone) HasUserFollowingChanges() bool {\n\tif o != nil && o.UserFollowingChanges != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Vm) HasModifiedOn() bool {\n\tif o != nil && o.ModifiedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *BaseItem) HasLastModifiedBy() bool {\n\tif o != nil && o.LastModifiedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewMilestone) HasCreatedBy() bool {\n\tif o != nil && o.CreatedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *OrganizationMutation) UpdateByUserCleared() bool {\n\t_, ok := m.clearedFields[organization.FieldUpdateByUser]\n\treturn ok\n}", "func (o *VulnUpdateNotification) HasUserId() bool {\n\tif o != nil && o.UserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (entry *UtxoEntry) isModified() bool {\n\treturn entry.state&utxoStateModified == utxoStateModified\n}", "func (o *BaseItem) HasCreatedByUser() bool {\n\tif o != nil && o.CreatedByUser != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphModifiedProperty) HasNewValue() bool {\n\tif o != nil && o.NewValue != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (d UserData) HasLastUpdate() bool {\n\treturn d.ModelData.Has(models.NewFieldName(\"LastUpdate\", \"__last_update\"))\n}", "func (o *ViewMilestone) HasLastChangedOn() bool {\n\tif o != nil && o.LastChangedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *SystemMutation) UpdateByUserCleared() bool {\n\t_, ok := m.clearedFields[system.FieldUpdateByUser]\n\treturn ok\n}", "func (o *ViewProjectBudget) HasCreatedByUserId() bool {\n\tif o != nil && o.CreatedByUserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewProjectBudget) HasCreatedBy() bool {\n\tif o != nil && o.CreatedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphListItem) HasLastModifiedBy() bool {\n\tif o != nil && o.LastModifiedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *UserMutation) UpdateByUserCleared() bool {\n\t_, ok := m.clearedFields[user.FieldUpdateByUser]\n\treturn ok\n}", "func (o *ViewCustomFieldTask) HasCreatedBy() bool {\n\tif o != nil && o.CreatedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *OrgUnitMutation) UpdateByUserCleared() bool {\n\t_, ok := m.clearedFields[orgunit.FieldUpdateByUser]\n\treturn ok\n}", "func (o *IPAllowlistEntryAttributes) HasModifiedAt() bool {\n\treturn o != nil && o.ModifiedAt != nil\n}", "func (d UserData) HasState() bool {\n\treturn d.ModelData.Has(models.NewFieldName(\"State\", \"state_id\"))\n}", "func (o *Vm) HasCreatedBy() bool {\n\tif o != nil && o.CreatedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DeeplinkRule) HasModified() bool {\n\tif o != nil && o.Modified != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Vm) HasUserMetadata() bool {\n\tif o != nil && o.UserMetadata != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *OrgUnitMemberMutation) UpdateByUserCleared() bool {\n\t_, ok := m.clearedFields[orgunitmember.FieldUpdateByUser]\n\treturn ok\n}", "func (o *VulnUpdateNotification) HasLastUpdated() bool {\n\tif o != nil && o.LastUpdated != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphEducationUser) HasCreatedBy() bool {\n\tif o != nil && o.CreatedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *BaseItem) HasCreatedBy() bool {\n\tif o != nil && o.CreatedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *OrgUnitPositionMutation) UpdateByUserCleared() bool {\n\t_, ok := m.clearedFields[orgunitposition.FieldUpdateByUser]\n\treturn ok\n}", "func (o *BaseItem) GetLastModifiedByUserOk() (AnyOfmicrosoftGraphUser, bool) {\n\tif o == nil || o.LastModifiedByUser == nil {\n\t\tvar ret AnyOfmicrosoftGraphUser\n\t\treturn ret, false\n\t}\n\treturn *o.LastModifiedByUser, true\n}", "func (o *ShowSystem) HasCreatedBy() bool {\n\tif o != nil && !IsNil(o.CreatedBy) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InlineResponse20034Milestone) HasLastChangedOn() bool {\n\tif o != nil && o.LastChangedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Ga4ghChemotherapy) HasUpdated() bool {\n\tif o != nil && o.Updated != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Ga4ghTumourboard) HasUpdated() bool {\n\tif o != nil && o.Updated != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *OrganizationMutation) UpdateByUser() (r int, exists bool) {\n\tv := m.update_by\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (o *MicrosoftGraphListItem) HasCreatedByUser() bool {\n\tif o != nil && o.CreatedByUser != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *UserMutation) UpdateByCleared() bool {\n\treturn m.UpdateByUserCleared() || m.clearedupdate_by\n}", "func (o *InlineResponse20051TodoItems) HasUserFollowingChanges() bool {\n\tif o != nil && o.UserFollowingChanges != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *CreditBankIncomeItem) HasLastUpdatedTime() bool {\n\tif o != nil && o.LastUpdatedTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InlineResponse20027Person) HasLastChangedOn() bool {\n\tif o != nil && o.LastChangedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewMilestone) GetUserFollowingChanges() bool {\n\tif o == nil || o.UserFollowingChanges == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.UserFollowingChanges\n}", "func (o *ViewProjectBudget) HasCompletedByUserId() bool {\n\tif o != nil && o.CompletedByUserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Commitstatus) HasUpdatedOn() bool {\n\tif o != nil && o.UpdatedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *SystemMutation) UpdateByUser() (r int, exists bool) {\n\tv := m.update_by\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (l Lambda) IsUpdatable() bool {\n\treturn l.updatable\n}", "func (o *LocalDatabaseProvider) HasUpdated() bool {\n\tif o != nil && o.Updated != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphListItem) GetLastModifiedByUserOk() (AnyOfmicrosoftGraphUser, bool) {\n\tif o == nil || o.LastModifiedByUser == nil {\n\t\tvar ret AnyOfmicrosoftGraphUser\n\t\treturn ret, false\n\t}\n\treturn *o.LastModifiedByUser, true\n}", "func (o *ModelsUser) HasUpdatedAt() bool {\n\tif o != nil && o.UpdatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *WorkflowServiceItemActionInstance) HasUserIdOrEmail() bool {\n\tif o != nil && o.UserIdOrEmail != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *EditBankConnectionParams) HasBankingUserId() bool {\n\tif o != nil && o.BankingUserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *UserMutation) UpdateByUser() (r int, exists bool) {\n\tv := m.update_by\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (r *AttachmentOriginal) HasUserID() bool {\n\treturn r.hasUserID\n}", "func (o *InlineResponse20049Post) HasLastChangedOn() bool {\n\tif o != nil && o.LastChangedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewProjectBudget) HasDateUpdated() bool {\n\tif o != nil && o.DateUpdated != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *OrgUnitMemberMutation) UpdateByUser() (r int, exists bool) {\n\tv := m.update_by\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (u *Update) IsEdited() bool {\n\treturn u.EditedMessage != nil\n}", "func (o *ViewMilestone) HasCreatorUserId() bool {\n\tif o != nil && o.CreatorUserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *PostWebhook) HasPrUpdated() bool {\n\tif o != nil && o.PrUpdated != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphListItem) HasCreatedBy() bool {\n\tif o != nil && o.CreatedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphModifiedProperty) HasOldValue() bool {\n\tif o != nil && o.OldValue != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *WorkflowServiceItemDefinitionAllOf) HasUserIdOrEmail() bool {\n\tif o != nil && o.UserIdOrEmail != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *BasicBot) HasUserId() bool {\n\tif o != nil && o.UserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *User) HasHireDate() bool {\n\tif o != nil && o.HireDate != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Invitation) HasToUser() bool {\n\tif o != nil && o.ToUser.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *BaseItem) SetLastModifiedByUser(v AnyOfmicrosoftGraphUser) {\n\to.LastModifiedByUser = &v\n}", "func (o *ViewMilestone) HasChangeFollowerIds() bool {\n\tif o != nil && o.ChangeFollowerIds != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (t *Trade) CanBeModifiedBy(user *User) errstack.E {\n\tif user.ID != t.Buyer.UserID && user.ID != t.Seller.UserID && !user.IsModerator() {\n\t\treturn ErrUnauthorized\n\t}\n\treturn nil\n}", "func (o *MicrosoftGraphEducationSchool) HasCreatedBy() bool {\n\tif o != nil && o.CreatedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InlineResponse200115) HasUserDisplayPostedTime() bool {\n\tif o != nil && o.UserDisplayPostedTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *V0037Node) HasReasonSetByUser() bool {\n\tif o != nil && o.ReasonSetByUser != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (r *AttachmentPreview) HasUserID() bool {\n\treturn r.hasUserID\n}", "func (o *Snippet) HasUpdatedOn() bool {\n\tif o != nil && o.UpdatedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *SystemMutation) UpdateByCleared() bool {\n\treturn m.UpdateByUserCleared() || m.clearedupdate_by\n}", "func (o *MicrosoftGraphListItem) SetLastModifiedByUser(v AnyOfmicrosoftGraphUser) {\n\to.LastModifiedByUser = &v\n}", "func (m *OrgUnitMutation) UpdateByUser() (r int, exists bool) {\n\tv := m.update_by\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (obj *BlobAttribute) GetIsModified() bool {\n\treturn obj.getIsModified()\n}", "func (d UserData) HasUser() bool {\n\treturn d.ModelData.Has(models.NewFieldName(\"User\", \"user_id\"))\n}", "func (o *InlineResponse20049Post) HasUserDisplayPostedTime() bool {\n\tif o != nil && o.UserDisplayPostedTime != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewMilestone) HasChangeFollowers() bool {\n\tif o != nil && o.ChangeFollowers != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InlineResponse20033Milestones) HasLastChangedOn() bool {\n\tif o != nil && o.LastChangedOn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *OrganizationMutation) UpdateByCleared() bool {\n\treturn m.UpdateByUserCleared() || m.clearedupdate_by\n}", "func (m *OrgUnitPositionMutation) UpdateByUser() (r int, exists bool) {\n\tv := m.update_by\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (p ByName) HasBeenSet() bool {\n\treturn len(p.whereIsParamSet) > 0\n}", "func (o *AccessRequestData) HasUserId() bool {\n\tif o != nil && o.UserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (u *UserCalculator) Changed() bool { return u.changed }", "func (o *ViewMilestone) HasCompletedBy() bool {\n\tif o != nil && o.CompletedBy != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (d UserData) HasWriteUID() bool {\n\treturn d.ModelData.Has(models.NewFieldName(\"WriteUID\", \"write_uid\"))\n}", "func (u *user) IsPasswordChangeNeeded() bool {\n\treturn u.data.ChangePassword\n}", "func (o *Vm) GetModifiedByOk() (*string, bool) {\n\tif o == nil || o.ModifiedBy == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ModifiedBy, true\n}" ]
[ "0.709096", "0.6915815", "0.6843877", "0.6615869", "0.6559862", "0.6527901", "0.64500046", "0.64295846", "0.64245284", "0.6188029", "0.6098064", "0.5972756", "0.5929441", "0.58675754", "0.58357716", "0.5793472", "0.576481", "0.57646877", "0.5751647", "0.5746388", "0.57210857", "0.5710895", "0.5705846", "0.56945425", "0.568071", "0.5669269", "0.561609", "0.5606829", "0.5555419", "0.55210245", "0.55179095", "0.55168444", "0.5501902", "0.5500688", "0.5489797", "0.5484353", "0.54749334", "0.5445275", "0.54289514", "0.5412063", "0.5407877", "0.538531", "0.5379204", "0.53538436", "0.5347664", "0.53472596", "0.532852", "0.53233045", "0.53105164", "0.528415", "0.5279035", "0.52683944", "0.52674764", "0.52446795", "0.5226895", "0.52156544", "0.5205744", "0.5196745", "0.5193628", "0.5182351", "0.5180851", "0.51694596", "0.51694095", "0.5164964", "0.5162631", "0.5155091", "0.5147855", "0.5138183", "0.5136472", "0.5133883", "0.5116618", "0.5116179", "0.5098473", "0.50975674", "0.5095828", "0.5095439", "0.50909203", "0.5090388", "0.50831765", "0.5077746", "0.5076132", "0.50759155", "0.50562555", "0.50488096", "0.5048695", "0.50449705", "0.50409096", "0.50341386", "0.5032257", "0.50284183", "0.5015631", "0.50132096", "0.50047046", "0.4992942", "0.49903202", "0.49890527", "0.4988395", "0.49883518", "0.49819773", "0.49795327" ]
0.8069499
0
SetStateModifiedByUser gets a reference to the given string and assigns it to the StateModifiedByUser field.
func (o *AccessRequestData) SetStateModifiedByUser(v string) { o.StateModifiedByUser = &v }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *AccessRequestData) GetStateModifiedByUser() string {\n\tif o == nil || o.StateModifiedByUser == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.StateModifiedByUser\n}", "func (m *User) SetState(value *string)() {\n m.state = value\n}", "func (o *AccessRequestData) HasStateModifiedByUser() bool {\n\tif o != nil && o.StateModifiedByUser != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *SecurityActionState) SetUser(value *string)() {\n err := m.GetBackingStore().Set(\"user\", value)\n if err != nil {\n panic(err)\n }\n}", "func (o *AccessRequestData) GetStateModifiedByUserOk() (*string, bool) {\n\tif o == nil || o.StateModifiedByUser == nil {\n\t\treturn nil, false\n\t}\n\treturn o.StateModifiedByUser, true\n}", "func (m *User) SetExternalUserState(value *string)() {\n m.externalUserState = value\n}", "func (us *UserState) Set(val string) error {\n\tnewUserState := UserState(val)\n\n\tif !isValidUserState(newUserState) {\n\t\treturn errInvalidUserState\n\t}\n\n\t*us = newUserState\n\treturn nil\n}", "func (client IdentityClient) updateUserState(ctx context.Context, request common.OCIRequest, binaryReqBody *common.OCIReadSeekCloser, extraHeaders map[string]string) (common.OCIResponse, error) {\n\n\thttpRequest, err := request.HTTPRequest(http.MethodPut, \"/users/{userId}/state\", binaryReqBody, extraHeaders)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response UpdateUserStateResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "func (o *RoleWithAccess) SetModified(v string) {\n\to.Modified = v\n}", "func (m *NamedLocation) SetModifiedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.modifiedDateTime = value\n}", "func (o *Vm) SetModifiedBy(v string) {\n\to.ModifiedBy = &v\n}", "func (m *DeviceManagementIntentDeviceState) SetUserName(value *string)() {\n err := m.GetBackingStore().Set(\"userName\", value)\n if err != nil {\n panic(err)\n }\n}", "func (s *Store) Set(user string, m *fsm.FSM) {\n\tmachine := FSMORM{}\n\ts.DB.First(&machine, \"user = ?\", user)\n\tmachine.User = user\n\tmachine.State = m.State\n\tmachine.Slots = slotsToJSONString(m.Slots)\n\tif res := s.DB.Save(&machine); res.Error != nil {\n\t\tlog.Error(res.Error)\n\t}\n}", "func (o *FeatureFlag) SetModified(v time.Time) {\n\to.Modified = &v\n}", "func (t *SimpleChaincode) set_user(stub *shim.ChaincodeStub, args []string) ([]byte, error) {\n var err error\n \n // 0 1\n // \"name\", \"bob\"\n if len(args) < 2 {\n return nil, errors.New(\"Incorrect number of arguments. Expecting 2\")\n }\n \n fmt.Println(\"- start set user\")\n fmt.Println(args[0] + \" - \" + args[1])\n termAsBytes, err := stub.GetState(args[0])\n if err != nil {\n return nil, errors.New(\"Failed to get thing\")\n }\n res := SearchTerm{}\n json.Unmarshal(termAsBytes, &res) //un stringify it aka JSON.parse()\n res.User = args[1] //change the user\n \n jsonAsBytes, _ := json.Marshal(res)\n err = stub.PutState(args[0], jsonAsBytes) //rewrite the term with id as key\n if err != nil {\n return nil, err\n }\n \n fmt.Println(\"- end set user\")\n return nil, nil\n}", "func (o *MicrosoftGraphListItem) SetLastModifiedByUser(v AnyOfmicrosoftGraphUser) {\n\to.LastModifiedByUser = &v\n}", "func (o *BaseItem) SetLastModifiedByUser(v AnyOfmicrosoftGraphUser) {\n\to.LastModifiedByUser = &v\n}", "func (m *ScheduleChangeRequest) SetManagerUserId(value *string)() {\n err := m.GetBackingStore().Set(\"managerUserId\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *AccessPackage) SetModifiedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.modifiedDateTime = value\n}", "func (auo *ArticleUpdateOne) SetModifiedBy(s string) *ArticleUpdateOne {\n\tauo.mutation.SetModifiedBy(s)\n\treturn auo\n}", "func (au *ArticleUpdate) SetModifiedBy(s string) *ArticleUpdate {\n\tau.mutation.SetModifiedBy(s)\n\treturn au\n}", "func (uimuo *UserIDMappingUpdateOne) SetModifiedAt(t time.Time) *UserIDMappingUpdateOne {\n\tuimuo.mutation.SetModifiedAt(t)\n\treturn uimuo\n}", "func (o *DeeplinkRule) SetModified(v string) {\n\to.Modified = &v\n}", "func (m *SecurityActionState) SetUpdatedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"updatedDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *ConditionalAccessPolicy) SetModifiedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n err := m.GetBackingStore().Set(\"modifiedDateTime\", value)\n if err != nil {\n panic(err)\n }\n}", "func (uimu *UserIDMappingUpdate) SetModifiedAt(t time.Time) *UserIDMappingUpdate {\n\tuimu.mutation.SetModifiedAt(t)\n\treturn uimu\n}", "func (o *V0037Node) SetReasonSetByUser(v string) {\n\to.ReasonSetByUser = &v\n}", "func (m *User) SetGivenName(value *string)() {\n m.givenName = value\n}", "func (o *IncidentTeamResponseAttributes) SetModified(v time.Time) {\n\to.Modified = &v\n}", "func (m *ItemFacet) SetLastModifiedBy(value IdentitySetable)() {\n err := m.GetBackingStore().Set(\"lastModifiedBy\", value)\n if err != nil {\n panic(err)\n }\n}", "func (s *server) setState(state string) {\n\ts.mutex.Lock()\n\tdefer s.mutex.Unlock()\n\n\t// Temporarily store previous values.\n\t//prevState := s.state\n\t//prevLeader := s.leader\n\n\t// Update state and leader.\n\ts.state = state\n\tif state == Leader {\n\t\ts.leader = s.Name()\n\t\ts.syncedPeer = make(map[string]bool)\n\t}\n\t\t//\n\t\t//// Dispatch state and leader change events.\n\t\t//s.DispatchEvent(newEvent(StateChangeEventType, s.state, prevState))\n\t\t//\n\t\t//if prevLeader != s.leader {\n\t\t//\ts.DispatchEvent(newEvent(LeaderChangeEventType, s.leader, prevLeader))\n\t\t//}\n}", "func (t *Trade) CanBeModifiedBy(user *User) errstack.E {\n\tif user.ID != t.Buyer.UserID && user.ID != t.Seller.UserID && !user.IsModerator() {\n\t\treturn ErrUnauthorized\n\t}\n\treturn nil\n}", "func (s *Store) Set(user string, m *fsm.FSM) {\n\tif err := s.R.Set(ctx, user+\":state\", m.State, s.TTL).Err(); err != nil {\n\t\tlog.Error(\"Error setting state:\", err)\n\t}\n\tif len(m.Slots) > 0 {\n\t\tkvs := make([]string, 0)\n\t\tfor k, v := range m.Slots {\n\t\t\tkvs = append(kvs, k, v)\n\t\t}\n\n\t\tif err := s.R.HSet(ctx, user+\":slots\", kvs).Err(); err != nil {\n\t\t\tlog.Error(\"Error setting slots:\", err)\n\t\t}\n\t\tif err := s.R.Expire(ctx, user+\":slots\", s.TTL).Err(); err != nil {\n\t\t\tlog.Error(\"Error expiring slots:\", err)\n\t\t}\n\t}\n}", "func (m *ChatMessage) SetLastEditedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.lastEditedDateTime = value\n}", "func (c *APIClient) UpdateUserState(ctx _context.Context, id int32) apiUpdateUserStateRequest {\n\treturn apiUpdateUserStateRequest{\n\t\tclient: c,\n\t\tctx: ctx,\n\t\tid: id,\n\t}\n}", "func (m *EducationAssignment) SetLastModifiedBy(value IdentitySetable)() {\n m.lastModifiedBy = value\n}", "func (p *ModifiedPropertyType) SetModified(t interface{}) error {\n\tts, _ := timestamp.ToString(t, \"milli\")\n\tp.Modified = ts\n\treturn nil\n}", "func (m *User) SetLastPasswordChangeDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.lastPasswordChangeDateTime = value\n}", "func (w *ServerInterfaceWrapper) ChangeUserPassword(ctx echo.Context) error {\n\tvar err error\n\t// ------------- Path parameter \"id\" -------------\n\tvar id int\n\n\terr = runtime.BindStyledParameter(\"simple\", false, \"id\", ctx.Param(\"id\"), &id)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf(\"Invalid format for parameter id: %s\", err))\n\t}\n\n\tctx.Set(\"OAuth.Scopes\", []string{\"\"})\n\n\t// Invoke the callback with all the unmarshalled arguments\n\terr = w.Handler.ChangeUserPassword(ctx, id)\n\treturn err\n}", "func (m *MailTips) SetIsModerated(value *bool)() {\n err := m.GetBackingStore().Set(\"isModerated\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *User) SetSurname(value *string)() {\n m.surname = value\n}", "func (u *User) changeName(name string) {\n u.name = name\n}", "func UpdatedBy(v int) predicate.GameServer {\n\treturn predicate.GameServer(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldUpdatedBy), v))\n\t})\n}", "func (m *User) SetExternalUserStateChangeDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.externalUserStateChangeDateTime = value\n}", "func (DBConnection *MariaDBPlugin) SetUserDisableState(userID uint64, isDisabled bool) error {\n\t_, err := DBConnection.DBHandle.Exec(\"UPDATE Users SET Disabled=? WHERE ID=?\", isDisabled, userID)\n\treturn err\n}", "func (this *File) SetModified() {\n\tthis.log.Debug2(\"<persistence.File>SetModified{}\")\n\tthis.Lock()\n\tdefer this.Unlock()\n\tthis.modified = true\n}", "func (o *ReservationModel) SetModified(v time.Time) {\n\to.Modified = v\n}", "func (m *ManagementTemplateStep) SetLastActionByUserId(value *string)() {\n err := m.GetBackingStore().Set(\"lastActionByUserId\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *RegistryKeyState) SetOldValueName(value *string)() {\n m.oldValueName = value\n}", "func (m *ManagementTemplateStep) SetCreatedByUserId(value *string)() {\n err := m.GetBackingStore().Set(\"createdByUserId\", value)\n if err != nil {\n panic(err)\n }\n}", "func (client IdentityClient) UpdateUserState(ctx context.Context, request UpdateUserStateRequest) (response UpdateUserStateResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.updateUserState, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = UpdateUserStateResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = UpdateUserStateResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(UpdateUserStateResponse); ok {\n\t\tcommon.EcContext.UpdateEndOfWindow(time.Duration(240 * time.Second))\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into UpdateUserStateResponse\")\n\t}\n\treturn\n}", "func (m *DirectoryAudit) SetLoggedByService(value *string)() {\n m.loggedByService = value\n}", "func (u *UserCalculator) Changed() bool { return u.changed }", "func (m *BrowserSiteList) SetLastModifiedBy(value IdentitySetable)() {\n err := m.GetBackingStore().Set(\"lastModifiedBy\", value)\n if err != nil {\n panic(err)\n }\n}", "func (db *CassandraDB) SetState(userid gocql.UUID, state State) error {\n\tif err := db.Session.Query(`\n UPDATE user set gamesPlayed = ?, score = ? where id = ?`,\n\t\tstate.GamesPlayed, state.Highscore, state.Id).Exec(); err != nil {\n\t}\n\treturn nil\n}", "func (m *ScheduleChangeRequest) SetSenderUserId(value *string)() {\n err := m.GetBackingStore().Set(\"senderUserId\", value)\n if err != nil {\n panic(err)\n }\n}", "func (suo *StateUpdateOne) SetUpdatedBy(i int) *StateUpdateOne {\n\tsuo.mutation.ResetUpdatedBy()\n\tsuo.mutation.SetUpdatedBy(i)\n\treturn suo\n}", "func (c *Client) ModifyCurrentUser(data ModifyCurrentUserData) (*discord.User, error) {\n\tvar u *discord.User\n\treturn u, c.RequestJSON(\n\t\t&u,\n\t\t\"PATCH\", EndpointMe,\n\t\thttputil.WithJSONBody(data), httputil.WithHeaders(data.Header()),\n\t)\n}", "func (a *Meta_UsState) Set(fieldName string, value interface{}) {\n\tif a.AdditionalProperties == nil {\n\t\ta.AdditionalProperties = make(map[string]interface{})\n\t}\n\ta.AdditionalProperties[fieldName] = value\n}", "func UnmarshalUserState(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(UserState)\n\terr = core.UnmarshalPrimitive(m, \"state\", &obj.State)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"set_by\", &obj.SetBy)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"set_at\", &obj.SetAt)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func (me *TitemIconStateType) Set(s string) { (*xsdt.String)(me).Set(s) }", "func (mc *MenuCreate) SetUpdatedBy(s string) *MenuCreate {\n\tmc.mutation.SetUpdatedBy(s)\n\treturn mc\n}", "func (f *Fake) ModifyState(ctx context.Context, newState tree.State) {\n\tf.mu.Lock()\n\tdefer f.mu.Unlock()\n\tif f.TreeStatus.State != newState {\n\t\tf.TreeStatus.State = newState\n\t\tf.TreeStatus.Since = clock.Now(ctx).UTC()\n\t}\n}", "func UpdateUser(person *Person, id string) (err error) {\n\tfmt.Println(person)\n\tConfig.DB.Save(person)\n\treturn nil\n}", "func changeOwner(newOwner []byte){\n\t_onlyOwner()\n\taddress.ValidateAddress(newOwner)\n\tstate.WriteBytes(OWNER_KEY, newOwner)\n}", "func (options *UpdateActionOptions) SetUserState(userState *UserState) *UpdateActionOptions {\n\toptions.UserState = userState\n\treturn options\n}", "func sendUserChange(conn *userConn, entityId uint64, key, value string) {\n\tvar msg cliproto_down.UserDataChange\n\tmsg.UserId = new(uint64)\n\tmsg.Key = new(string)\n\tmsg.Value = new(string)\n\tmsg.FirstUnapplied = new(uint64)\n\t*msg.UserId = entityId\n\t*msg.Key = key\n\t*msg.Value = value\n\t*msg.FirstUnapplied = store.InstructionFirstUnapplied()\n\tconn.conn.SendProto(8, &msg)\n}", "func (m *SmsLogRow) SetUserId(value *string)() {\n err := m.GetBackingStore().Set(\"userId\", value)\n if err != nil {\n panic(err)\n }\n}", "func editUser(userID int, firstName string, MI string, lastName string, privLevel int) error {\n\n\tdb, err := sql.Open(\"mysql\", DB_USER_NAME+\":\"+DB_PASSWORD+\"@unix(/var/run/mysql/mysql.sock)/\"+DB_NAME)\n\tif err != nil {\n\t\treturn errors.New(\"No connection\")\n\t}\n\n\tres, err := db.Exec(\"update Users set FirstName=?, MiddleInitial=?, LastName=?, PrivLevel=? where UserID=?\", firstName, MI, lastName, privLevel, userID)\n\n\tif err != nil {\n\t\treturn errors.New(\"User update failed.\")\n\t}\n\n\trowsAffected, err := res.RowsAffected()\n\n\tif rowsAffected != 1 {\n\t\treturn errors.New(\"Query didn't match any users.\")\n\t}\n\n\treturn nil\n}", "func (m *MockHandler) UserEdit(userName string, newUser map[domain.UserUpdatableProperty]*string) (*domain.User, string, error) {\n\tret := m.ctrl.Call(m, \"UserEdit\", userName, newUser)\n\tret0, _ := ret[0].(*domain.User)\n\tret1, _ := ret[1].(string)\n\tret2, _ := ret[2].(error)\n\treturn ret0, ret1, ret2\n}", "func (o *DeeplinkApp) SetModifiedTs(v int32) {\n\to.ModifiedTs = &v\n}", "func (m *SystemMutation) OldUpdateByUser(ctx context.Context) (v int, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser is only allowed on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldUpdateByUser: %w\", err)\n\t}\n\treturn oldValue.UpdateByUser, nil\n}", "func (c *Client) SetNote(userID discord.UserID, note string) error {\n\tvar body = struct {\n\t\tNote string `json:\"note\"`\n\t}{\n\t\tNote: note,\n\t}\n\n\treturn c.FastRequest(\n\t\t\"PUT\", EndpointMe+\"/notes/\"+userID.String(),\n\t\thttputil.WithJSONBody(body),\n\t)\n}", "func changeString(input *string) {\n\t*input = \"The string has been changed\"\n}", "func SetUser(username string) {\n\tcurrentUser = username\n}", "func (m *AccessPackageCatalog) SetModifiedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.modifiedDateTime = value\n}", "func (su *StateUpdate) SetUpdatedBy(i int) *StateUpdate {\n\tsu.mutation.ResetUpdatedBy()\n\tsu.mutation.SetUpdatedBy(i)\n\treturn su\n}", "func (*RegDBService) EditUser(reg *Registration) error {\n\terr := rdb.Model(reg).Update(reg).Error\n\treturn err\n}", "func (m *MockUserLogic) UserEdit(userName string, newUser map[domain.UserUpdatableProperty]*string) (*domain.User, string, error) {\n\tret := m.ctrl.Call(m, \"UserEdit\", userName, newUser)\n\tret0, _ := ret[0].(*domain.User)\n\tret1, _ := ret[1].(string)\n\tret2, _ := ret[2].(error)\n\treturn ret0, ret1, ret2\n}", "func SetUserGeoID(geoId GEOID) bool {\n\tret1 := syscall3(setUserGeoID, 1,\n\t\tuintptr(geoId),\n\t\t0,\n\t\t0)\n\treturn ret1 != 0\n}", "func (r *DeviceManagementScriptUserStateRequest) Update(ctx context.Context, reqObj *DeviceManagementScriptUserState) error {\n\treturn r.JSONRequest(ctx, \"PATCH\", \"\", reqObj, nil)\n}", "func (m *User) SetTeamwork(value UserTeamworkable)() {\n m.teamwork = value\n}", "func UpdatedBy(v int) predicate.Ethnicity {\n\treturn predicate.Ethnicity(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldUpdatedBy), v))\n\t})\n}", "func (me *TstyleStateEnumType) Set(s string) { (*xsdt.String)(me).Set(s) }", "func (m *AgreementAcceptance) SetUserId(value *string)() {\n m.userId = value\n}", "func (m *OrganizationMutation) OldUpdateByUser(ctx context.Context) (v int, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser is only allowed on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldUpdateByUser requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldUpdateByUser: %w\", err)\n\t}\n\treturn oldValue.UpdateByUser, nil\n}", "func (m *ExternalActivity) SetPerformedBy(value Identityable)() {\n err := m.GetBackingStore().Set(\"performedBy\", value)\n if err != nil {\n panic(err)\n }\n}", "func (h *Host) SetUser(u string) {\n}", "func SetUser(ctx context.Context, user string) context.Context {\n\treturn context.WithValue(ctx, UserIdentityKey, user)\n}", "func (h *handler) SetTag(ctx context.Context, userID int, tag string, expire *time.Time) error {\n\tus, err := h.user.Get(ctx, userID, time.Now())\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcurb, err := h.setting.BundlesByID(ctx, us.Bundles)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tnewb, err := h.setting.BundlesByTag(ctx, tag)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tus.Expire = expire\n\tus.Bundles = MergeBundles(curb, newb)\n\n\treturn h.user.Set(ctx, userID, us)\n}", "func (o *Vm) GetModifiedBy() string {\n\tif o == nil || o.ModifiedBy == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.ModifiedBy\n}", "func (m *ChatMessage) SetLastModifiedDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.lastModifiedDateTime = value\n}", "func (sys *IAMSys) SetUser(accessKey string, uinfo madmin.UserInfo) error {\n\tobjectAPI := newObjectLayerFn()\n\tif objectAPI == nil {\n\t\treturn errServerNotInitialized\n\t}\n\n\tidFile := getUserIdentityPath(accessKey, false)\n\tu := newUserIdentity(auth.Credentials{\n\t\tAccessKey: accessKey,\n\t\tSecretKey: uinfo.SecretKey,\n\t\tStatus: string(uinfo.Status),\n\t})\n\n\tsys.Lock()\n\tdefer sys.Unlock()\n\n\tvar err error\n\tif globalEtcdClient != nil {\n\t\terr = saveIAMConfigItemEtcd(context.Background(), u, idFile)\n\t} else {\n\t\terr = saveIAMConfigItem(objectAPI, u, idFile)\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\tsys.iamUsersMap[accessKey] = u.Credentials\n\n\t// Set policy if specified.\n\tif uinfo.PolicyName != \"\" {\n\t\treturn sys.policyDBSet(objectAPI, accessKey, uinfo.PolicyName, false)\n\t}\n\treturn nil\n}", "func SetUser(s Span, id string, opts ...UserMonitoringOption) {\n\tif s == nil {\n\t\treturn\n\t}\n\tsp, ok := s.(*span)\n\tif !ok || sp.context == nil {\n\t\treturn\n\t}\n\tsp = sp.context.trace.root\n\tvar cfg UserMonitoringConfig\n\tfor _, fn := range opts {\n\t\tfn(&cfg)\n\t}\n\tsp.setUser(id, cfg)\n}", "func (su *StateUpdate) SetCreatedBy(i int) *StateUpdate {\n\tsu.mutation.ResetCreatedBy()\n\tsu.mutation.SetCreatedBy(i)\n\treturn su\n}", "func (r *DeviceManagementIntentUserStateRequest) Update(ctx context.Context, reqObj *DeviceManagementIntentUserState) error {\n\treturn r.JSONRequest(ctx, \"PATCH\", \"\", reqObj, nil)\n}", "func (r *DeviceManagementIntentUserStateRequest) Update(ctx context.Context, reqObj *DeviceManagementIntentUserState) error {\n\treturn r.JSONRequest(ctx, \"PATCH\", \"\", reqObj, nil)\n}", "func (m *WindowsInformationProtectionDeviceRegistration) SetUserId(value *string)() {\n err := m.GetBackingStore().Set(\"userId\", value)\n if err != nil {\n panic(err)\n }\n}", "func (o *GetContactsParams) SetModifiedSince(modifiedSince *strfmt.DateTime) {\n\to.ModifiedSince = modifiedSince\n}", "func (g *GitLocal) SetUsername(dir string, username string) error {\n\t// Use GitFake as this is a global setting\n\treturn g.GitFake.SetUsername(dir, username)\n}" ]
[ "0.6708874", "0.58218443", "0.5723848", "0.57123005", "0.5675458", "0.56091493", "0.53814995", "0.52602226", "0.51791763", "0.51372916", "0.5050765", "0.5008622", "0.49830252", "0.49666825", "0.4947747", "0.48959655", "0.48712862", "0.48426035", "0.48295242", "0.48239356", "0.47816354", "0.47605303", "0.47244138", "0.47206247", "0.4715257", "0.47146568", "0.46561974", "0.46552745", "0.4599555", "0.4595601", "0.45846373", "0.4578464", "0.4575231", "0.45636663", "0.45543563", "0.45420814", "0.45196247", "0.44978765", "0.44952083", "0.44879252", "0.44873115", "0.44734368", "0.44686958", "0.44527045", "0.44526857", "0.44474494", "0.44473708", "0.4446358", "0.44259983", "0.4419997", "0.44067368", "0.44041896", "0.43995893", "0.4399472", "0.43969196", "0.43909073", "0.43901175", "0.4383491", "0.43788868", "0.43724835", "0.43717894", "0.43634707", "0.43615597", "0.43596306", "0.43548012", "0.43481478", "0.4347222", "0.4346398", "0.43418324", "0.43399513", "0.43391177", "0.43326023", "0.43314016", "0.4325652", "0.43248287", "0.4322636", "0.43187147", "0.43176165", "0.43144444", "0.43121338", "0.42983022", "0.4297079", "0.42960694", "0.42930737", "0.42884326", "0.4288245", "0.42783737", "0.42646915", "0.4264588", "0.42613423", "0.42585692", "0.42565838", "0.42552698", "0.42544785", "0.42529353", "0.425182", "0.425182", "0.4249524", "0.42455408", "0.42313188" ]
0.76645404
0
SetupLogger configures the global logger using the configuration provided.
func SetupLogger(cfg *viper.Viper, fields map[string]interface{}) error { // Add some context to global logger log.Logger = log.With().Fields(fields).Logger() // Set log level level, err := zerolog.ParseLevel(cfg.GetString("log.level")) if err != nil { return err } zerolog.SetGlobalLevel(level) // Enable pretty logging (not JSON) if requested if cfg.GetBool("log.pretty") { log.Logger = log.Output(zerolog.ConsoleWriter{Out: os.Stderr}) } return nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func SetupLogger(cfg *config.LogConf) error {\n\tzerolog.TimeFieldFormat = \"\"\n\tlevel, err := zerolog.ParseLevel(cfg.Level)\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"error returned when parsing log level\")\n\t\treturn err\n\t}\n\tzerolog.SetGlobalLevel(level)\n\n\tif cfg.DevelopmentLogger {\n\t\tzerolog.ErrorStackMarshaler = func(err error) interface{} {\n\t\t\tfmt.Println(string(debug.Stack()))\n\t\t\treturn nil\n\t\t}\n\t\tlog.Logger = log.Output(zerolog.ConsoleWriter{Out: os.Stdout, TimeFormat: time.RFC3339}).With().Timestamp().Caller().Stack().Logger()\n\t} else {\n\t\tzerolog.ErrorStackMarshaler = pkgerrors.MarshalStack\n\t\tlog.Logger = zerolog.New(os.Stdout).With().Timestamp().Caller().Stack().Logger()\n\n\t}\n\treturn nil\n}", "func SetupLogger(spec *config.Specification) {\n\tlogrus.SetOutput(os.Stdout)\n\tif spec.Debug {\n\t\tlogrus.SetLevel(logrus.DebugLevel)\n\t\treturn\n\t}\n\tlogrus.SetLevel(logrus.InfoLevel)\n}", "func SetupLogging(config *logger.Config) error {\n\tmu.Lock()\n\tdefer mu.Unlock()\n\n\tvar err error\n\n\tglobal, err = New(config)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error creating global logger: %w\", err)\n\t}\n\n\treturn nil\n}", "func SetupLogger(cfg AppLogger) {\n\tlogLevel, err := logrus.ParseLevel(cfg.Level)\n\tif err != nil {\n\t\tlogLevel = logrus.DebugLevel\n\t}\n\n\tlogrus.SetLevel(logLevel)\n\n\tif !cfg.StdOut {\n\t\tlogrus.SetOutput(ioutil.Discard)\n\n\t\tlogrus.AddHook(NewRotateFileHook(RotateFileConfig{\n\t\t\tFilename: cfg.Path,\n\t\t\tMaxSize: cfg.MaxSize,\n\t\t\tMaxBackups: cfg.MaxBackups,\n\t\t\tMaxAge: cfg.MaxAge,\n\t\t\tLocalTime: true,\n\t\t\tCompress: true,\n\t\t\tLevel: logLevel,\n\t\t\tFormatter: &logrus.JSONFormatter{\n\t\t\t\tTimestampFormat: time.RFC3339,\n\t\t\t\tDisableTimestamp: false,\n\t\t\t\tFieldMap: logrus.FieldMap{\n\t\t\t\t\tlogrus.FieldKeyMsg: \"message\",\n\t\t\t\t\tlogrus.FieldKeyTime: \"timestamp\",\n\t\t\t\t},\n\t\t\t},\n\t\t}))\n\t} else {\n\t\tlogrus.SetOutput(os.Stdout)\n\n\t\tif logLevel == logrus.DebugLevel {\n\t\t\tlogrus.SetFormatter(&logrus.TextFormatter{\n\t\t\t\tFullTimestamp: true,\n\t\t\t\tTimestampFormat: time.RFC3339,\n\t\t\t})\n\t\t} else {\n\t\t\tlogrus.SetFormatter(&logrus.JSONFormatter{\n\t\t\t\tTimestampFormat: time.RFC3339,\n\t\t\t})\n\t\t}\n\t}\n\n\tlogrus.SetReportCaller(true)\n}", "func SetupLogger() (err error) {\n\tvar (\n\t\tlf = strings.ToLower(viper.GetString(\"output\"))\n\t)\n\n\t// Set log format\n\tswitch lf {\n\tcase \"json\":\n\t\tlog.SetFormatter(&log.JSONFormatter{})\n\tdefault:\n\t\tlog.SetFormatter(&log.TextFormatter{\n\t\t\tDisableLevelTruncation: true,\n\t\t})\n\t}\n\treturn nil\n}", "func SetupLogger(token string, level Level, tags []string, bulk bool, debugMode bool) {\n\tif loggerSingleton != nil {\n\t\treturn\n\t}\n\n\t// Setup logger with options.\n\tloggerSingleton = &logger{\n\t\ttoken: token,\n\t\tLevel: level,\n\t\turl: \"\",\n\t\tbulk: bulk,\n\t\tbufferSize: 1000,\n\t\tflushInterval: 10 * time.Second,\n\t\tbuffer: nil,\n\t\ttags: tags,\n\t\tdebugMode: debugMode,\n\t}\n\n\t// If the bulk option is set make sure we set the url to the bulk endpoint.\n\tif bulk {\n\t\tloggerSingleton.url = \"https://logs-01.loggly.com/bulk/\" + token + \"/tag/\" + tagList() + \"/\"\n\n\t\t// Start flush interval\n\t\tgo start()\n\t} else {\n\t\tloggerSingleton.url = \"https://logs-01.loggly.com/inputs/\" + token + \"/tag/\" + tagList() + \"/\"\n\t}\n\n}", "func setupLogger() {\n\tif !knf.GetB(LOG_ENABLED, true) {\n\t\tlog.Set(os.DevNull, 0)\n\t\treturn\n\t}\n\n\tlog.Set(knf.GetS(LOG_FILE), knf.GetM(LOG_PERMS, 0644))\n\tlog.MinLevel(knf.GetS(LOG_LEVEL, \"info\"))\n}", "func (ec *ExecutionContext) setupLogger() {\n\tif ec.Logger == nil {\n\t\tlogger := logrus.New()\n\t\tec.Logger = logger\n\t\tec.Logger.SetOutput(ec.Stderr)\n\t}\n\n\tif ec.LogLevel != \"\" {\n\t\tlevel, err := logrus.ParseLevel(ec.LogLevel)\n\t\tif err != nil {\n\t\t\tec.Logger.WithError(err).Error(\"error parsing log-level flag\")\n\t\t\treturn\n\t\t}\n\t\tec.Logger.SetLevel(level)\n\t}\n\n\tec.Logger.Hooks = make(logrus.LevelHooks)\n\tec.Logger.AddHook(newSpinnerHandlerHook(ec.Logger, ec.Spinner, ec.IsTerminal, ec.NoColor))\n\n\t// set the logger for telemetry\n\tif ec.Telemetry.Logger == nil {\n\t\tec.Telemetry.Logger = ec.Logger\n\t}\n}", "func SetupGlobalLogger(botName string, structuredOutput bool) error {\n\tmu.Lock()\n\tdefer mu.Unlock()\n\n\tif fileLoggingConfiguredCorrectly {\n\t\tglobalLogFile = &Rotate{\n\t\t\tFileName: globalLogConfig.LoggerFileConfig.FileName,\n\t\t\tMaxSize: globalLogConfig.LoggerFileConfig.MaxSize,\n\t\t\tRotate: globalLogConfig.LoggerFileConfig.Rotate,\n\t\t}\n\t}\n\n\twriters, err := getWriters(&globalLogConfig.SubLoggerConfig)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, subLogger := range SubLoggers {\n\t\tsubLogger.setLevels(splitLevel(globalLogConfig.Level))\n\t\tsubLogger.structuredLogging = structuredOutput\n\t\terr = subLogger.setOutput(writers)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsubLogger.botName = botName\n\t}\n\tlogger = newLogger(globalLogConfig, botName)\n\treturn nil\n}", "func setupLogger(l log.Logger, cfg *operator.Config) log.Logger {\n\tnewLogger, err := cortex_log.NewPrometheusLogger(cfg.LogLevel, cfg.LogFormat)\n\tif err != nil {\n\t\tlevel.Error(l).Log(\"msg\", \"failed to create logger\", \"err\", err)\n\t\tos.Exit(1)\n\t}\n\tl = newLogger\n\n\tadapterLogger := logutil.Wrap(l)\n\n\t// NOTE: we don't set up a caller field here, unlike the normal agent.\n\t// There's too many multiple nestings of the logger that prevent getting the\n\t// caller from working properly.\n\n\t// Set up the global logger and the controller-local logger.\n\tcontroller.SetLogger(adapterLogger)\n\tcfg.Controller.Logger = adapterLogger\n\treturn l\n}", "func SetupLogger(i GoSNMPServer.ILogger) {\n\tg_Logger = i\n}", "func SetupLogger(development *bool) {\n\tlogf.SetLogger(logf.ZapLogger(*development))\n\tLog = log.Log.WithName(\"controller-jenkins\")\n}", "func SetupLogging(lvl string) {\n\tSetLogger(log.New(os.Stderr, \"\", log.LstdFlags|log.Lshortfile|log.Lmicroseconds), strings.ToLower(lvl))\n}", "func setupLogger() {\n\tsl := logrus.New()\n\tsrvLog = sl.WithField(\"context\", \"server\")\n}", "func SetupGlobalSystemLogger(logger *log.Logger) {\n\tglobalLogger = logger\n}", "func SetupLogger(name string) *zap.SugaredLogger {\n\treturn setupLogger.Named(name)\n}", "func SetupLogger(logStdout bool) {\n\tif logStdout {\n\t\tlogger := log.New(os.Stdout, \"exoip \", 0)\n\t\tLogger = &wrappedLogger{syslog: false, stdWriter: logger}\n\t} else {\n\t\tlogger, err := syslog.New(syslog.LOG_DAEMON, \"exoip\")\n\t\tif err != nil {\n\t\t\t_, errP := fmt.Fprintf(os.Stderr, \"fatal error: %s\\n\", err)\n\t\t\tif errP != nil {\n\t\t\t\tpanic(errP)\n\t\t\t}\n\t\t\tos.Exit(1)\n\t\t}\n\t\tLogger = &wrappedLogger{syslog: true, syslogWriter: logger}\n\t}\n}", "func Setup(config *Configuration) error {\n\tl, err := newZapLogger(config)\n\tif err != nil {\n\t\treturn err\n\t}\n\tlog = l\n\treturn nil\n}", "func ConfigureLogger(enableOutput bool, logPath string, inputLogLevels map[string]string) {\n\n\t// if we are not supposed to do anything here, then short circuit and do not set\n\t// anything up.\n\tif !enableOutput {\n\t\trootLogger.Level(zerolog.Disabled)\n\t\treturn\n\t}\n\n\t// update the global logLevels\n\t// I don't love globals, but feels like the right use here.\n\tlogLevels = inputLogLevels\n\n\t// Create the log file if doesn't exist. And append to it if it already exists.\n\t// TODO log to stderr so at least terraform's TF_LOG can capture an issue if this file isn't created\n\tf, err := os.OpenFile(logPath, os.O_WRONLY|os.O_APPEND|os.O_CREATE, 0644)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// using a multi-writer here so we can easily add additional log destination (like a json file)\n\t// for now though using just the console writer because it makes pretty logs\n\tconsoleWriter := zerolog.ConsoleWriter{Out: f, TimeFormat: time.RFC1123Z}\n\tmulti := zerolog.MultiLevelWriter(consoleWriter)\n\n\t// create an init logger for logging just stuff before the root logger can get going\n\t// this has a hard coded set of information to ensure we can log stuff before the root logger is live\n\tinitLogger := zerolog.New(multi).With().Timestamp().Caller().Logger().Level(zerolog.InfoLevel)\n\n\t// look to see if there is a default level we should be using\n\tdefaultLevelString, ok := logLevels[\"_default\"]\n\tif !ok {\n\t\tdefaultLevelString = \"info\"\n\t}\n\n\t// set the log level using the default of INFO unless it is\n\t// overriden by the logLevels map by \"_root\" level\n\trootLevelString, ok := logLevels[\"_root\"]\n\tif !ok {\n\t\trootLevelString = defaultLevelString\n\t}\n\n\t// translate the received log level into the zerolog Level type\n\trootLevel, err := levelStringToZerologLevel(rootLevelString)\n\tif err != nil {\n\t\tinitLogger.Info().Msgf(\"Received bad logLevel for _root logger: %v. Failing back to INFO level.\", rootLevelString)\n\t\trootLevel = zerolog.InfoLevel\n\t}\n\n\t// create the root logger\n\t// note there is no initialization here. we WANT this to be set to the global logger\n\trootLogger = zerolog.New(multi).With().Timestamp().Caller().Logger().Level(rootLevel)\n\n\t// mirror Stdout to the debug log file as well\n\t// useful as we can debug the communication to/from the plugin and terraform\n\torigStdout := os.Stdout\n\torigStderr := os.Stderr\n\tmwriter := io.MultiWriter(f, origStdout)\n\tmwriterStderr := io.MultiWriter(f, origStderr)\n\n\t// get pipe reader and writer | writes to pipe writer come out pipe reader\n\treader, writer, _ := os.Pipe()\n\treaderStderr, writerStderr, _ := os.Pipe()\n\n\t// replace stdout,stderr with pipe writer | all writes to stdout, stderr will go through pipe instead (fmt.print, log)\n\tos.Stdout = writer\n\tos.Stderr = writerStderr\n\n\t// look to see if we should capture all logs going through the native log library\n\t// this is mostly useful in this particular case to see logs from the proxmox api library.\n\t// just the presense of the _capturelog key (no matter the level set) is indication we should capture it\n\t_, ok = logLevels[\"_capturelog\"]\n\tif ok {\n\t\trootLogger.Info().Msg(\"Enabling the capture of log-library logs as ithe _capturelog flag was detected\")\n\t\tlog.SetOutput(f) // so we capture logs from any other dependencies not using logrus\n\t}\n\n\t//create channel to control exit | will block until all copies are finished\n\tcommunicateLogExit := make(chan bool)\n\n\tgo func() {\n\t\t// copy all reads from pipe to multiwriter, which writes to stdout and file\n\t\t_, _ = io.Copy(mwriter, reader)\n\t\t// when r or w is closed copy will finish and true will be sent to channel\n\t\tcommunicateLogExit <- true\n\t}()\n\n\tgo func() {\n\t\t// copy all reads from pipe to multiwriter, which writes to stdout and file\n\t\t_, _ = io.Copy(mwriterStderr, readerStderr)\n\t\t// when r or w is closed copy will finish and true will be sent to channel\n\t\tcommunicateLogExit <- true\n\t}()\n\n\t// yep this is a huge leak.. need to figure out a better way to close stuff down,\n\t// but for now, yolo! we're just debugging.\n\t//\n\t//// function to be deferred in main until program exits\n\t//return func() {\n\t//\t// close writer then block on exit channel | this will let mw finish writing before the program exits\n\t//\t_ = w.Close()\n\t//\t<-communicateLogExit\n\t//\t// close file after all writes have finished\n\t//\t_ = f.Close()\n\t//}\n\n\trootLogger.Info().Msgf(\"Logging Started. Root Logger Set to level %v\", rootLevel)\n}", "func InitLogger(config Config) (err error) {\n\tlogLock.Lock()\n\tdefer logLock.Unlock()\n\tlogger, err = InitNacosLogger(config)\n\treturn\n}", "func setupLoggerPlugin() error {\n\tlogOpt := &hclog.LoggerOptions{\n\t\t// Name: name,\n\t\tLevel: hclog.Debug,\n\t\tOutput: os.Stderr,\n\t\tJSONFormat: true,\n\t}\n\tmut.Lock()\n\tdefer mut.Unlock()\n\tlogger = &Logger{\n\t\thclogger: hclog.New(logOpt),\n\t}\n\treturn nil\n}", "func loggingSetup() {\n\tlogs := utility.NewLogging()\n\thandler.Logs = logs\n\tcontroller.Logs = logs\n\trepository.Logs = logs\n\tlogs.LogInfo(\"Global logs setup done.\")\n}", "func SetupLogging(token, env string) {\n\tsetupLogging(token, env, defaultTriggerLevels)\n}", "func SetupLogging(loggers []string, logOpts LogOptions, tag string, debug bool) error {\n\t// Bridge klog to logrus. Note that this will open multiple pipes and fork\n\t// background goroutines that are not cleaned up.\n\tinitializeKLog()\n\n\t// Updating the default log format\n\tSetLogFormat(logOpts.GetLogFormat())\n\n\t// Set default logger to output to stdout if no loggers are provided.\n\tif len(loggers) == 0 {\n\t\t// TODO: switch to a per-logger version when we upgrade to logrus >1.0.3\n\t\tlogrus.SetOutput(os.Stdout)\n\t}\n\n\t// Updating the default log level, overriding the log options if the debug arg is being set\n\tif debug {\n\t\tSetLogLevelToDebug()\n\t} else {\n\t\tSetLogLevel(logOpts.GetLogLevel())\n\t}\n\n\t// always suppress the default logger so libraries don't print things\n\tlogrus.SetLevel(logrus.PanicLevel)\n\n\t// Iterate through all provided loggers and configure them according\n\t// to user-provided settings.\n\tfor _, logger := range loggers {\n\t\tswitch logger {\n\t\tcase Syslog:\n\t\t\tif err := setupSyslog(logOpts, tag, debug); err != nil {\n\t\t\t\treturn fmt.Errorf(\"failed to set up syslog: %w\", err)\n\t\t\t}\n\t\tdefault:\n\t\t\treturn fmt.Errorf(\"provided log driver %q is not a supported log driver\", logger)\n\t\t}\n\t}\n\n\treturn nil\n}", "func (c *LogConfig) SetLogger() {\n\tif c == nil || c.Logfile == \"\" {\n\t\tInfof(\"Sending log messages to stdout since no log file specified.\")\n\t\treturn\n\t}\n\tfmt.Printf(\"Sending log messages to: %s\\n\", c.Logfile)\n\tl := &lumberjack.Logger{\n\t\tFilename: c.Logfile,\n\t\tMaxSize: c.MaxSize, // megabytes\n\t\tMaxAge: c.MaxAge, //days\n\t}\n\tlog.SetOutput(l)\n\tlogger = stdLogger{l}\n}", "func SetupLogging(c LogConfiguration) {\n\tvar cores []zapcore.Core\n\n\tif c.Console {\n\t\tatom := zap.NewAtomicLevel()\n\t\tatom.SetLevel(c.ConsoleLevel)\n\t\tencoderCfg := zap.NewDevelopmentEncoderConfig()\n\t\tencoderCfg.EncodeLevel = zapcore.CapitalColorLevelEncoder\n\t\tconsoleCore := zapcore.NewCore(\n\t\t\tzapcore.NewConsoleEncoder(encoderCfg),\n\t\t\tzapcore.Lock(os.Stdout),\n\t\t\tatom,\n\t\t)\n\t\tcores = append(cores, consoleCore)\n\t}\n\n\tif c.FilePath != \"\" {\n\t\tfileCore, err := addFileLog(c.FilePath, c.FileLevel)\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Unable to open log file, %s: %v\\n\", c.FilePath, err)\n\t\t} else {\n\t\t\tcores = append(cores, fileCore)\n\t\t}\n\t}\n\n\tif c.GoogleCloudProject != \"\" && c.GoogleCloudCreds != \"\" {\n\t\tgcCore, err := addGoogleCloud(c.GoogleCloudProject, c.GoogleCloudCreds)\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"unable to start cloud logging to project %s with creds %s: %v\\n\", c.GoogleCloudProject, c.GoogleCloudCreds, err)\n\t\t} else {\n\t\t\tcores = append(cores, gcCore)\n\t\t}\n\t}\n\n\ttee := zapcore.NewTee(cores...)\n\tsugarfree := zap.New(tee, zap.AddCaller(), zap.AddStacktrace(zap.FatalLevel))\n\tundo, err := zap.RedirectStdLogAt(sugarfree, zap.DebugLevel)\n\tif err != nil {\n\t\tundo()\n\t}\n\n\tLog = sugarfree.Sugar()\n}", "func ConfigureLogger() {\n\t// From https://github.com/op/go-logging/blob/master/examples/example.go.\n\tlogFormat := logging.MustStringFormatter(\"%{color}%{time:15:04:05.000} %{shortfunc} ▶ %{level}%{color:reset} %{message}\")\n\tlogging.SetBackend(logging.NewBackendFormatter(logging.NewLogBackend(os.Stderr, \"\", 0), logFormat))\n\t// Let's grab the log level from the environment, or set it to INFO.\n\tenvlvl := os.Getenv(\"LOG_LEVEL\")\n\tif envlvl != \"\" {\n\t\tlvl, err := logging.LogLevel(envlvl)\n\t\tif err == nil {\n\t\t\tlog.Notice(\"Set logging level to %s.\\n\", lvl)\n\t\t\tlogging.SetLevel(lvl, \"\")\n\t\t} else {\n\t\t\tfmt.Printf(\"%s\", err)\n\t\t}\n\t} else {\n\t\tlog.Notice(\"No log level defined in environment. Defaulting to INFO.\\n\")\n\t\tlogging.SetLevel(logging.INFO, \"\")\n\t}\n}", "func InitLogger(conf Conf) {\n\tonce.Do(func() {\n\t\tvar logWriter io.Writer\n\t\tlogWriter = os.Stdout\n\t\tsyncWriter = log.NewSyncWriter(logWriter)\n\t\tloggerInstance = log.NewLogfmtLogger(syncWriter)\n\t\tif conf.TZLocal {\n\t\t\tloggerInstance = log.With(loggerInstance, \"time\", log.DefaultTimestamp)\n\t\t} else {\n\t\t\tloggerInstance = log.With(loggerInstance, \"time\", log.DefaultTimestampUTC)\n\t\t}\n\t\tloggerInstance = level.NewFilter(loggerInstance, getLogLevel(conf.LogLevel))\n\n\t})\n}", "func SetLogger(l Logger) {\n\tmainLogger = l\n}", "func InitLogger(config *LoggerConfig) *Logger {\n\tlog := logrus.New()\n\tlog.SetFormatter(config.Format.Get())\n\tlog.SetLevel(config.Level.Get())\n\tfields := logrus.Fields{\n\t\t\"module\": config.Name,\n\t}\n\tif config.AdditionalFields != nil {\n\t\tfor key, value := range *config.AdditionalFields {\n\t\t\tfields[key] = value\n\t\t}\n\t}\n\tlogger := &Logger{\n\t\tconfig: config,\n\t\tinstanceRaw: log,\n\t\tinstance: log.WithFields(fields),\n\t}\n\treturn logger\n}", "func InitLogger(cfg *Config, opts ...zap.Option) error {\n\tvar output = make([]zapcore.WriteSyncer, 0)\n\tvar err error\n\tif len(cfg.File.Filename) > 0 {\n\t\toutput, err = GetFileLogs(cfg)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"init log file failed\")\n\t\t}\n\t} else {\n\t\tstdOut, _, err := zap.Open([]string{\"stdout\"}...)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"init stdout log failed\")\n\t\t}\n\t\toutput = []zapcore.WriteSyncer{stdOut}\n\t}\n\tlogger, err := InitLoggerWithWriteSyncer(cfg, output, opts...)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"InitLoggerWithWriteSyncer failed\")\n\t}\n\t_globalL.Store(logger)\n\tsugar := logger.Sugar()\n\t_globalS.Store(sugar)\n\treturn nil\n}", "func InitLogger(logger Logger) {\n\tsingleton.Do(func() {\n\t\tdefaultLogger = logger\n\t})\n}", "func SetupLoggers(root *build.RotatingLogWriter, intercept signal.Interceptor) {\n\tgenLogger := genSubLogger(root, intercept)\n\n\tlogWriter = root\n\tlog = build.NewSubLogger(Subsystem, genLogger)\n\tinterceptor = intercept\n\n\tlnd.SetSubLogger(root, Subsystem, log)\n\tlnd.AddSubLogger(root, \"LOOP\", intercept, loop.UseLogger)\n\tlnd.AddSubLogger(root, \"LNDC\", intercept, lndclient.UseLogger)\n\tlnd.AddSubLogger(root, \"STORE\", intercept, loopdb.UseLogger)\n\tlnd.AddSubLogger(root, lsat.Subsystem, intercept, lsat.UseLogger)\n\tlnd.AddSubLogger(\n\t\troot, liquidity.Subsystem, intercept, liquidity.UseLogger,\n\t)\n}", "func InitLogger(debug bool) {\n\tvar cfg zap.Config\n\n\tif debug {\n\t\tcfg = zap.NewDevelopmentConfig()\n\t} else {\n\t\tcfg = zap.NewProductionConfig()\n\t\tcfg.EncoderConfig.LevelKey = \"lvl\"\n\t\tcfg.EncoderConfig.MessageKey = \"msg\"\n\t\tcfg.EncoderConfig.TimeKey = \"timestamp\"\n\t\tcfg.EncoderConfig.EncodeTime = Rfc3339NanoEncoder\n\t}\n\n\tvar err error\n\tif log, err = cfg.Build(); err != nil {\n\t\tpanic(\"Error create logger.\")\n\t}\n}", "func SetupLogging(logDir string) {\n\tlogrus.SetFormatter(&utcFormatter{\n\t\t&logrus.TextFormatter{\n\t\t\tTimestampFormat: \"2006-01-02T15:04:05.000000000Z07:00\",\n\t\t\tFullTimestamp: true,\n\t\t\tDisableColors: false,\n\t\t\tDisableTimestamp: false,\n\t\t\tDisableSorting: false,\n\t\t},\n\t})\n\tif logDir != \"\" {\n\t\t_ = os.Mkdir(logDir, os.ModePerm)\n\t\tlogrus.AddHook(dugong.NewFSHook(\n\t\t\tfilepath.Join(logDir, \"info.log\"),\n\t\t\tfilepath.Join(logDir, \"warn.log\"),\n\t\t\tfilepath.Join(logDir, \"error.log\"),\n\t\t\t&utcFormatter{\n\t\t\t\t&logrus.TextFormatter{\n\t\t\t\t\tTimestampFormat: \"2006-01-02T15:04:05.000000000Z07:00\",\n\t\t\t\t\tDisableColors: true,\n\t\t\t\t\tDisableTimestamp: false,\n\t\t\t\t\tDisableSorting: false,\n\t\t\t\t},\n\t\t\t},\n\t\t\t&dugong.DailyRotationSchedule{GZip: true},\n\t\t))\n\t}\n}", "func Setup(format string, level int) {\n\tformatter := logging.MustStringFormatter(format)\n\tlogging.SetFormatter(formatter)\n\tlogging.SetLevel(logging.Level(level), mainLoggerName)\n}", "func (dhtClient *DHTClient) setupLogger() {\n\tfields := map[string]string{\n\t\t\"package\": \"DHTClient\",\n\t\t\"relayid\": dhtClient.relayPeer.Pretty(),\n\t}\n\tif dhtClient.routedHost != nil {\n\t\tfields[\"peerid\"] = dhtClient.routedHost.ID().Pretty()\n\t}\n\tdhtClient.logger = utils.NewDefaultLoggerWithFields(fields)\n}", "func InitLogger(conf *LoggerConfig) (err error) {\n\t// If logger has been initialized, return directly\n\tif gLogger != nil {\n\t\treturn nil\n\t}\n\n\tgLogger, err = l.New(\n\t\tconf.Module,\n\t\tconf.Color,\n\t\tconf.Writer,\n\t\tparseLogLevel(conf.LogLevel))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func SetLogger(l logr.Logger) {\n\tsingleton.Propagate(l)\n}", "func InitLogger(conf config.LogConfig, e *echo.Echo) {\n\tlog.SetOutput(os.Stdout)\n\tlog.SetLevel(log.DebugLevel)\n\n\te.Use(middleware.LoggerWithConfig(middleware.LoggerConfig{\n\t\tFormat: \"[${time_rfc3339_nano}] (${id}) ${method} '${uri}' [${status}] Host: ${host}, IP: ${remote_ip}, error: '${error}', (latency: ${latency_human}) \\n\",\n\t}))\n}", "func SetLogger() {\n\tlogFile = handleLogFile()\n\tcfg := config.GetConf()\n\tl := logrus.New()\n\tl.SetFormatter(&logrus.TextFormatter{})\n\tl.SetReportCaller(true)\n\tl.SetLevel(parseLevel(cfg.Global.LogLevel))\n\tl.SetOutput(logFile)\n\tlogHandle = l\n\tlogEntry = logrus.NewEntry(logHandle)\n}", "func InitLogger(cfg *LogConfig) error {\n\tlog.SetLevel(stringToLogLevel(cfg.Level))\n\n\tif cfg.Format == \"\" {\n\t\tcfg.Format = defaultLogFormat\n\t}\n\tformatter := stringToLogFormatter(cfg.Format, cfg.DisableTimestamp)\n\tlog.SetFormatter(formatter)\n\n\tif len(cfg.File.Filename) != 0 {\n\t\tif err := initFileLog(&cfg.File, nil); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func InitializeLogger(config *Config) Logger {\n\tif log != nil {\n\t\treturn log\n\t}\n\tabsPath := \"\"\n\tfmt.Println(\"Output File Path: \", config.Logger.OutputFilePath)\n\tif config.Logger.OutputFilePath != \"\" {\n\t\tvar err error\n\t\tabsPath, err = filepath.Abs(config.Logger.OutputFilePath)\n\t\tif err != nil {\n\t\t\tpanic(fmt.Errorf(\"failed to load logfile : %s\", err.Error()))\n\t\t}\n\t\tfmt.Println(\"Abs Path: \", absPath)\n\t\tpath := strings.Split(absPath, \"/\")\n\t\t_, err = os.Stat(strings.Join(path[:len(path)-1], \"/\"))\n\t\tif err != nil {\n\t\t\tpanic(fmt.Errorf(\"failed to load logfile : %s\", err.Error()))\n\t\t}\n\t}\n\n\tbaseLogger := logrus.New()\n\n\t// set REQUESTS_LOGLEVEL for custom_logger level, defaults to info\n\tlevel, err := logrus.ParseLevel(config.Logger.Level)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"failed to parse log level : %s\", err.Error()))\n\t}\n\n\t// setting custom_logger format to string\n\tbaseLogger.SetFormatter(&logrus.TextFormatter{\n\t\tDisableColors: false,\n\t\tFullTimestamp: config.Logger.FullTimestamp,\n\t})\n\n\t// directing log output to a file if OutfilePath is defined, by default it will log to stdout\n\tif config.Logger.OutputFilePath != \"\" {\n\t\tfd, err = os.OpenFile(absPath, os.O_CREATE|os.O_WRONLY|os.O_APPEND, 0755)\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"failed to open file %s for logging - %s\", absPath, err.Error())\n\t\t\tos.Exit(1)\n\t\t}\n\t\tbaseLogger.SetOutput(fd)\n\t}\n\n\t// set to true for showing filename and line number from where custom_logger being called\n\tbaseLogger.SetReportCaller(false)\n\tbaseLogger.SetLevel(level)\n\n\tlog = baseLogger\n\treturn log\n}", "func Setup(logFilePath string, debugMode bool) {\n\t//if !debugMode {\n\t\tlog.SetOutput(&lumberjack.Logger{\n\t\t\tFilename: logFilePath,\n\t\t\tMaxBackups: 3,\n\t\t\tMaxAge: 28, //days\n\t\t})\n\t//}\n}", "func configureLogger(verbose bool, flag int) {\n\tif verbose {\n\t\tlog = golog.New(os.Stderr, \"\", flag)\n\t} else {\n\t\tlog = &quietlogger{golog.New(os.Stderr, \"\", flag)}\n\t}\n}", "func SetLogger(l LevelledLogger) {\n\tlogger = &logPrefixer{log: l}\n}", "func SetLogger(l Logger) {\n\tglobal = l\n}", "func InitLogger() {\n\n\tcfg := zap.Config{\n\t\tOutputPaths: []string{\"stdout\"},\n\t\tEncoding: \"json\",\n\t\tLevel: zap.NewAtomicLevelAt(zap.InfoLevel),\n\t\tEncoderConfig: zapcore.EncoderConfig{\n\t\t\tMessageKey: \"msg\",\n\t\t\tLevelKey: \"level\",\n\t\t\tTimeKey: \"time\",\n\t\t\tEncodeTime: zapcore.ISO8601TimeEncoder,\n\t\t\tEncodeLevel: zapcore.LowercaseLevelEncoder,\n\t\t\tEncodeCaller: zapcore.ShortCallerEncoder,\n\t\t},\n\t}\n\n\tvar zLogger *zap.Logger\n\tvar err error\n\tzLogger, err = cfg.Build()\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tdefer zLogger.Sync()\n\tzSugarLog := zLogger.Sugar()\n\n\tLog = &zapLogger{log: zSugarLog}\n}", "func initLogger() {\n\t// newGenericLogger()\n\tnewRotatedLogger()\n\n\tLogger.Info(\"logger construction succeeded\")\n}", "func LogSetup(level int) {\n\n\tbackend1 := logging.NewLogBackend(os.Stderr, \"\", 0)\n\tbackend1Formatter := logging.NewBackendFormatter(backend1, format)\n\tbackend1Leveled := logging.AddModuleLevel(backend1Formatter)\n\tswitch level {\n\tcase 0:\n\t\tbackend1Leveled.SetLevel(logging.NOTICE, \"astralboot\")\n\tcase 1:\n\t\tbackend1Leveled.SetLevel(logging.INFO, \"astralboot\")\n\tcase 2:\n\t\tbackend1Leveled.SetLevel(logging.DEBUG, \"astralboot\")\n\t}\n\tlogging.SetBackend(backend1Leveled)\n}", "func SetupLogging(token, env string, h ...RollrusInitializer) io.Closer {\n\tlog.SetFormatter(&log.TextFormatter{DisableTimestamp: true})\n\n\tvar closer io.Closer\n\tif token != \"\" {\n\t\th := NewHook(token, env, h...)\n\t\tlog.AddHook(h)\n\t\tcloser = h\n\t} else {\n\t\tcloser = noopCloser{}\n\t}\n\n\treturn closer\n}", "func GlobalLoggerConfig(stdout io.Writer, stderr io.Writer, cfgs ...logCfg) {\n\tif stdout == nil {\n\t\tstdout = os.Stdout\n\t}\n\n\tif stderr == nil {\n\t\tstderr = os.Stderr\n\t}\n\n\tLOGHANDLER = loggerWithCfg(stdout, stderr, cfgs...)\n}", "func SetLogger(logName string, conf *conf.LogConfiguration) error {\n\tLogger.lock.Lock()\n\tdefer Logger.lock.Unlock()\n\tif log, ok := logAdapters[logName]; ok {\n\t\tlg := log()\n\t\tlg.Init(conf)\n\t\tLogger.outputs[logName] = lg\n\t\treturn nil\n\t} else {\n\t\treturn fmt.Errorf(\"logs: unknown log type %q (forgotten Register?)\", logName)\n\t}\n}", "func SetLogger(l Logger) {\n\tglobalLoggerLock.Lock()\n\tdefer globalLoggerLock.Unlock()\n\tglobalLogger.Store(logWrapper{logger: l})\n}", "func (serve *Server) configureLogger() error {\n\tlevel, err := logrus.ParseLevel(serve.config.LogLevel)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tserve.logger.SetLevel(level)\n\treturn nil\n}", "func SetLogger(logger log_Logger) {\n\tglobalLoggerLock.Lock()\n\tglobalLogger = logger\n\tglobalLoggerLock.Unlock()\n}", "func SetupLogging(logLevel string, daemonized bool) func() error {\n\tlevel, err := logrus.ParseLevel(logLevel)\n\tif err != nil {\n\t\tlogrus.Fatal(err)\n\t}\n\n\tif daemonized {\n\t\tlogFile := openLogFile()\n\n\t\tlogrus.SetOutput(logFile)\n\t\tlogrus.SetLevel(level)\n\t\treturn logFile.Close\n\t}\n\tlogrus.SetFormatter(&logrus.TextFormatter{DisableLevelTruncation: true, FullTimestamp: true})\n\tlogrus.SetLevel(level)\n\treturn func() error {\n\t\treturn nil\n\t}\n}", "func InitLogger() {\n\tonce.Do(func() {\n\t\tcfg := *NewConfig()\n\t\tcfg.Level = zap.NewAtomicLevelAt(zap.DebugLevel)\n\t\tcfg.EncoderConfig = *NewLalamoveEncoderConfig()\n\t\tLog, _ = cfg.Build()\n\t})\n}", "func ConfigureLogger() (*zap.Logger, *zap.AtomicLevel) {\n\tvar level zap.AtomicLevel\n\tvar syncOutput zapcore.WriteSyncer\n\n\t// Set config defaults for logging\n\tviper.SetDefault(\"logging.level\", \"info\")\n\tviper.SetDefault(\"logging.maxsize\", 100)\n\tviper.SetDefault(\"logging.maxbackups\", 10)\n\tviper.SetDefault(\"logging.maxage\", 30)\n\n\t// Create an AtomicLevel that we can use elsewhere to dynamically change the logging level\n\tlogLevel := viper.GetString(\"logging.level\")\n\tswitch strings.ToLower(logLevel) {\n\tcase \"\", \"info\":\n\t\tlevel = zap.NewAtomicLevelAt(zap.InfoLevel)\n\tcase \"debug\":\n\t\tlevel = zap.NewAtomicLevelAt(zap.DebugLevel)\n\tcase \"warn\":\n\t\tlevel = zap.NewAtomicLevelAt(zap.WarnLevel)\n\tcase \"error\":\n\t\tlevel = zap.NewAtomicLevelAt(zap.ErrorLevel)\n\tcase \"panic\":\n\t\tlevel = zap.NewAtomicLevelAt(zap.PanicLevel)\n\tcase \"fatal\":\n\t\tlevel = zap.NewAtomicLevelAt(zap.FatalLevel)\n\tdefault:\n\t\tfmt.Printf(\"Invalid log level supplied. Defaulting to info: %s\", logLevel)\n\t\tlevel = zap.NewAtomicLevelAt(zap.InfoLevel)\n\t}\n\n\t// If a filename has been set, set up a rotating logger. Otherwise, use Stdout\n\tlogFilename := viper.GetString(\"logging.filename\")\n\tif logFilename != \"\" {\n\t\tsyncOutput = zapcore.AddSync(&lumberjack.Logger{\n\t\t\tFilename: logFilename,\n\t\t\tMaxSize: viper.GetInt(\"logging.maxsize\"),\n\t\t\tMaxBackups: viper.GetInt(\"logging.maxbackups\"),\n\t\t\tMaxAge: viper.GetInt(\"logging.maxage\"),\n\t\t\tLocalTime: viper.GetBool(\"logging.use-localtime\"),\n\t\t\tCompress: viper.GetBool(\"logging.use-compression\"),\n\t\t})\n\t} else {\n\t\tsyncOutput = zapcore.Lock(os.Stdout)\n\t}\n\n\tcore := zapcore.NewCore(\n\t\tzapcore.NewJSONEncoder(zap.NewProductionEncoderConfig()),\n\t\tsyncOutput,\n\t\tlevel,\n\t)\n\tlogger := zap.New(core)\n\tzap.ReplaceGlobals(logger)\n\treturn logger, &level\n}", "func setupLogging(logWriter io.Writer, debug bool) {\n\toutput := zerolog.ConsoleWriter{Out: logWriter, TimeFormat: time.RFC822}\n\n\tzerolog.SetGlobalLevel(zerolog.WarnLevel)\n\tif debug {\n\t\tzerolog.SetGlobalLevel(zerolog.DebugLevel)\n\t}\n\n\tCtx.Logger = zerolog.New(output).With().Timestamp().Logger()\n}", "func SetupLocalLogger(logModule string) *logging.Logger {\n\tvar format = logging.MustStringFormatter(\"%{color}%{time:15:04:05.000} \" +\n\t\t\"%{shortfunc} ▶ %{level} \" +\n\t\t\"%{color:reset} %{message}\")\n\tbackend := logging.NewLogBackend(os.Stderr, \"\", 0)\n\tformatter := logging.NewBackendFormatter(backend, format)\n\tlogging.SetBackend(formatter)\n\n\tlog := logging.MustGetLogger(logModule)\n\tlogging.SetLevel(logging.DEBUG, logModule)\n\n\t// Compensate for all the wrapping layers around the logger\n\tlog.ExtraCalldepth = 3\n\n\tlog.Debug(\"Debug logging enabled.\")\n\n\treturn log\n}", "func (c *Config) setupLogging(appType AppType) error {\n\n\tvar output *os.File\n\tvar appDescription string\n\n\tswitch {\n\tcase appType.Inspecter:\n\t\t// CLI app logging goes to stdout\n\t\toutput = os.Stdout\n\t\tappDescription = appTypeInspecter\n\n\tcase appType.Plugin:\n\t\t// plugin logging goes to stderr to prevent mixing in with stdout output\n\t\t// intended for the Nagios console\n\t\toutput = os.Stderr\n\t\tappDescription = appTypePlugin\n\n\tcase appType.Scanner:\n\t\t// CLI app logging goes to stdout\n\t\toutput = os.Stdout\n\t\tappDescription = appTypeScanner\n\t}\n\n\t// We set some common fields here so that we don't have to repeat them\n\t// explicitly later. This approach is intended to help standardize the log\n\t// messages to make them easier to search through later when\n\t// troubleshooting. We can extend the logged fields as needed by each\n\t// CLI application or Nagios plugin to cover unique details.\n\tc.Log = zerolog.New(output).With().Timestamp().Caller().\n\t\tStr(\"version\", Version()).\n\t\tStr(\"logging_level\", c.LoggingLevel).\n\t\tStr(\"app_type\", appDescription).\n\t\tStr(\"filename\", c.Filename).\n\t\tStr(\"server\", c.Server).\n\t\tInt(\"port\", c.Port).\n\t\tStr(\"cert_check_timeout\", c.Timeout().String()).\n\t\tInt(\"age_warning\", c.AgeWarning).\n\t\tInt(\"age_critical\", c.AgeCritical).\n\t\tLogger()\n\n\tif err := setLoggingLevel(c.LoggingLevel); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n\n}", "func SetLogger(l StdLogger) {\n\tlogger = &prefixLogger{StdLogger: l, prefix: \"zerodt:\"}\n}", "func SetupLogging(prefix string) error {\n\tlogFile := fmt.Sprintf(\"%s_%s_pid_%d.log\",\n\t\tprefix, time.Now().Format(filenameTimestamp), os.Getpid())\n\n\tsender, err := send.MakeFileLogger(logFile)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"problem constructing log writer for file %s\", logFile)\n\t}\n\n\treturn errors.Wrapf(grip.SetSender(sender),\n\t\t\"problem setting logger to write to %s\", logFile)\n}", "func ConfigLogger() func() {\n\tcfg := config.Global().Log\n\tlogger.SetLevel(cfg.Level)\n\tlogger.SetFormatter(cfg.Format)\n\treleaseCall, err := logger.SetOutput(cfg.Output, cfg.OutputFile)\n\thandleError(err)\n\t\n\treturn releaseCall\n}", "func (p *LogParams) InitLogger() *zerolog.Logger {\n\tonceLog.Do(func() {\n\t\tLogger = &log.Logger\n\t\tp.setLogFieldsName()\n\t\tp.caller()\n\t\tp.output()\n\t})\n\tmonitor(p)\n\treturn Logger\n}", "func InitLogger() {\n\tonce.Do(func() {\n\t\tlogger = newLogger()\n\t})\n}", "func setupLogging() {\n\tlogger := logrus.New()\n\tlogger.Formatter = &logrus.JSONFormatter{}\n\n\t// Log everything and colorize logs in development mode\n\t// You can customize to any level but \"info\" in development mode\n\tif viper.GetString(\"environment\") == \"development\" {\n\t\tlogger.Formatter = &logrus.TextFormatter{}\n\t\tlogger.Level = logrus.DebugLevel\n\t}\n\n\tmiddleware.SetLogger(logger)\n}", "func InitLogger() {\n\tlog.SetFlags(0)\n\tlog.SetOutput(new(logWriter))\n}", "func (Logger) InitLogger(logPath string) {\n\tl4g.LoadConfiguration(logPath)\n}", "func InitLogger() {\n\tc := Get().Logger\n\n\tlb, err := logger.NewFileBackend(c.Dir)\n\tif err != nil {\n\t\tfmt.Println(\"cannot init logger:\", err)\n\t\tos.Exit(1)\n\t}\n\n\tlb.SetRotateByHour(true)\n\tlb.SetKeepHours(c.KeepHours)\n\n\tlogger.SetLogging(c.Level, lb)\n}", "func InitLogger() {\n\tc := Get().Logger\n\n\tlb, err := logger.NewFileBackend(c.Dir)\n\tif err != nil {\n\t\tfmt.Println(\"cannot init logger:\", err)\n\t\tos.Exit(1)\n\t}\n\n\tlb.SetRotateByHour(true)\n\tlb.SetKeepHours(c.KeepHours)\n\n\tlogger.SetLogging(c.Level, lb)\n}", "func ConfigureLogger(logger *logrus.Logger, logConfig *LogConfig) error {\n\t// Manage log format\n\tif logConfig.Format == \"json\" {\n\t\tlogger.SetFormatter(&logrus.JSONFormatter{})\n\t} else {\n\t\tlogger.SetFormatter(&logrus.TextFormatter{})\n\t}\n\n\t// Manage log level\n\tlvl, err := logrus.ParseLevel(logConfig.Level)\n\tif err != nil {\n\t\treturn err\n\t}\n\tlogger.SetLevel(lvl)\n\n\treturn nil\n}", "func SetLogger(logger logger) {\n\tif logger != nil {\n\t\tglobalLogger = &mgoLogger{\n\t\t\tlogger: logger,\n\t\t}\n\t}\n}", "func ConfigureLogger(level logrus.Level, prod bool) {\n\n\tif prod {\n\t\tLog.Formatter = &prefixed.TextFormatter{\n\t\t\tForceColors: true,\n\t\t\tForceFormatting: true,\n\t\t\tFullTimestamp: true,\n\t\t\tTimestampFormat: \"Mon 2 Jan 2006 15:04:05\",\n\t\t}\n\t}\n\n\tLog.Level = level\n}", "func SetLogger(logLevelVar string) {\n\tlevel, err := log.ParseLevel(logLevelVar)\n\tif err != nil {\n\t\tlevel = log.InfoLevel\n\t}\n\tlog.SetLevel(level)\n\n\tlog.SetReportCaller(true)\n\tcustomFormatter := new(log.TextFormatter)\n\tcustomFormatter.TimestampFormat = \"2006-01-02 15:04:05\"\n\tcustomFormatter.QuoteEmptyFields = true\n\tcustomFormatter.FullTimestamp = true\n\tcustomFormatter.CallerPrettyfier = func(f *runtime.Frame) (string, string) {\n\t\trepopath := strings.Split(f.File, \"/\")\n\t\tfunction := strings.Replace(f.Function, \"go-pkgdl/\", \"\", -1)\n\t\treturn fmt.Sprintf(\"%s\\t\", function), fmt.Sprintf(\" %s:%d\\t\", repopath[len(repopath)-1], f.Line)\n\t}\n\n\tlog.SetFormatter(customFormatter)\n\tfmt.Println(\"Log level set at \", level)\n}", "func SetLogger(ctx context.Context, logger *logrus.Entry) {\n\tfields := rootlessLog.Data\n\trootlessLog = logger.WithFields(fields)\n}", "func InitLogger(l, file string) {\n\tconf := &log.Config{Level: l, File: log.FileLogConfig{Filename: file}}\n\tlg, _, _ := log.InitLogger(conf)\n\tLogger = lg\n}", "func InitLogger(config *Config, node string) {\n\tformattedLogger := logrus.New()\n\tformattedLogger.Formatter = &logrus.TextFormatter{FullTimestamp: true}\n\n\tlevel, err := logrus.ParseLevel(config.LogLevel)\n\tif err != nil {\n\t\tlogrus.WithError(err).Error(\"Error parsing log level, using: info\")\n\t\tlevel = logrus.InfoLevel\n\t}\n\n\tformattedLogger.Level = level\n\tlog = logrus.NewEntry(formattedLogger).WithField(\"node\", node)\n}", "func InitLogger() {\n\terr := ParseLoggerConfig(fileutil.LogConfigPath())\n\t//initialize log in any case\n\tif err != nil {\n\t\tlager.Init(&lager.Options{\n\t\t\tLoggerLevel: lager.LevelDebug,\n\t\t\tWriters: lager.Stdout,\n\t\t})\n\t\tif os.IsNotExist(err) {\n\t\t\topenlog.Info(fmt.Sprintf(\"[%s] not exist\", fileutil.LogConfigPath()))\n\t\t} else {\n\t\t\tlog.Panicln(err)\n\t\t}\n\t} else {\n\t\tlager.Init(LoggerOptions)\n\t}\n}", "func (ps *PlatformService) ConfigureLogger(name string, logger *mlog.Logger, logSettings *model.LogSettings, getPath func(string) string) error {\n\t// Advanced logging is E20 only, however logging must be initialized before the license\n\t// file is loaded. If no valid E20 license exists then advanced logging will be\n\t// shutdown once license is loaded/checked.\n\tvar err error\n\tdsn := *logSettings.AdvancedLoggingConfig\n\tvar logConfigSrc config.LogConfigSrc\n\tif dsn != \"\" {\n\t\tlogConfigSrc, err = config.NewLogConfigSrc(dsn, ps.configStore)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"invalid config source for %s, %w\", name, err)\n\t\t}\n\t\tps.logger.Info(\"Loaded configuration for \"+name, mlog.String(\"source\", dsn))\n\t}\n\n\tcfg, err := config.MloggerConfigFromLoggerConfig(logSettings, logConfigSrc, getPath)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"invalid config source for %s, %w\", name, err)\n\t}\n\n\tif err := logger.ConfigureTargets(cfg, nil); err != nil {\n\t\treturn fmt.Errorf(\"invalid config for %s, %w\", name, err)\n\t}\n\treturn nil\n}", "func SetupLoggingFile(f *os.File, lvl string) {\n\tSetLogger(log.New(f, \"\", log.LstdFlags|log.Lshortfile|log.Lmicroseconds), strings.ToLower(lvl))\n}", "func Setup() {\n\tlogger.SetOutput(os.Stdout) // Send all logs to console\n\n\t_logger := new(OCLogger)\n\tlogger.AddHook(_logger)\n\n\tLogger = _logger\n}", "func initLogger(cfg domain.LoggingConfig) {\n\tif cfg.Default {\n\t\tlog.SetFormatter(&log.TextFormatter{\n\t\t\tFullTimestamp: true,\n\t\t})\n\t} else {\n\t\tlog.SetFormatter(&logging.TextFormatter{\n\t\t\tTimestampFormat: cfg.TimestampFormat,\n\t\t})\n\t}\n\tlog.SetOutput(os.Stdout)\n\tlog.SetLevel(log.Level(cfg.Level))\n}", "func InitLogger(serviceName, loggingLevel string) {\n\tif serviceName == \"\" {\n\t\tserviceName = \"UNKNOWN\"\n\t}\n\tswitch loggingLevel {\n\tcase \"DEBUG\":\n\t\tlogLevel = 1\n\tcase \"ERROR\":\n\t\tlogLevel = 0\n\tdefault:\n\t\tlogLevel = 0\n\t}\n\n\tformat := fmt.Sprintf(\"[%s]: \", serviceName)\n\tlogger = log.New(os.Stdout, format, log.Lshortfile)\n\tlogger.SetFlags(0)\n\tlogger.SetOutput(new(logWriter))\n}", "func InitLogger() {\n\tc := Config.Logger\n\n\tlb, err := logger.NewFileBackend(c.Dir)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\tlogger.SetLogging(c.Level, lb)\n\tlb.Rotate(c.Rotatenum, 1024*1024*c.Rotatemb)\n}", "func (s *Session) InitLogger() {\n\ts.Out = &log.Logger{}\n\ts.Out.SetDebug(*s.Options.Debug)\n\ts.Out.SetSilent(*s.Options.Silent)\n}", "func (s *App) ConfigureLogger() error {\n\tlevel, err := logrus.ParseLevel(s.Config.Default.LogLevel)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ts.Logger.SetLevel(level)\n\n\treturn nil\n}", "func InitLogger(logfile string, size, num int) (err error) {\n\tlogger, err := NewLogger(logfile, size, num, L_INFO, -1, -1)\n\tif logger != nil {\n\t\tlogger.level = L_INFO - 1\n\t}\n\treturn\n}", "func ConfigLogger(f func(logger *log.Logger)) {\n\tf(logger)\n}", "func InitLogger() (err error) {\n\t// once ensures the singleton is initialized only once\n\tonceLogger.Do(func() {\n\t\tlogger, err = initLogger()\n\t})\n\n\treturn\n}", "func ConfigureLogger(conf Logger) {\n\tswitch strings.ToLower(conf.Level) {\n\tcase \"debug\":\n\t\tlog.SetLevel(log.DebugLevel)\n\tcase \"info\":\n\t\tlog.SetLevel(log.InfoLevel)\n\tcase \"warn\", \"warning\":\n\t\tlog.SetLevel(log.WarnLevel)\n\tcase \"error\":\n\t\tlog.SetLevel(log.ErrorLevel)\n\tdefault:\n\t\tlog.Warningf(\"Unknown log level: '%s'; defaulting to 'info'\", conf.Level)\n\t\tlog.SetLevel(log.InfoLevel)\n\t}\n\n\tswitch strings.ToLower(conf.Formatter) {\n\tcase \"json\":\n\t\tlog.SetFormatter(&jsonFormatter{\n\t\t\tconf: conf.JSONFormat,\n\t\t})\n\n\t// Default to text\n\tdefault:\n\t\tif strings.ToLower(conf.Formatter) != \"text\" {\n\t\t\tlog.Warningf(\"Unknown log formatter: '%s'; defaulting to 'text'\", conf.Formatter)\n\t\t}\n\t\tlog.SetFormatter(&textFormatter{\n\t\t\tconf.TextFormat,\n\t\t\tjsonFormatter{\n\t\t\t\tconf: conf.JSONFormat,\n\t\t\t},\n\t\t})\n\t}\n\n\tif conf.OutputFile != \"\" {\n\t\tlogFile, err := os.OpenFile(\n\t\t\tconf.OutputFile, os.O_RDWR|os.O_CREATE|os.O_APPEND, 0666,\n\t\t)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Can't open log output file: %s\", conf.OutputFile)\n\t\t} else {\n\t\t\tlog.SetOutput(logFile)\n\t\t}\n\t}\n}", "func InitializeLogger(c config.Config) {\n\tswitch c.LogLevel {\n\tcase \"DEBUG\":\n\t\tlogrus.SetLevel(logrus.DebugLevel)\n\tcase \"WARN\", \"WARNING\":\n\t\tlogrus.SetLevel(logrus.WarnLevel)\n\tcase \"CRITICAL\", \"FATAL\":\n\t\tlogrus.SetLevel(logrus.FatalLevel)\n\tcase \"PANIC\":\n\t\tlogrus.SetLevel(logrus.PanicLevel)\n\tdefault:\n\t\tlogrus.SetLevel(logrus.InfoLevel)\n\t}\n\tlog = logrus.WithField(originField, botOrigin)\n}", "func SetLogger(lg Logger) {\n\tlogger = lg\n}", "func SetLogger(l Logger) {\n\tdLog.Fulfill(l)\n}", "func LoggerInit() error {\n\tif !logger.Prepare() {\n\t\treturn errors.New(\"error occurred while preparing logger\")\n\t}\n\n\treturn nil\n}", "func (a *WalletApplication) initLogger() {\n\tlogFile, err := os.OpenFile(a.paths.DAGDir+\"/wallet.log\", os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0664)\n\tif err != nil {\n\t\ta.log.Fatal(\"Unable to create log file.\")\n\t}\n\tmw := io.MultiWriter(os.Stdout, logFile)\n\ta.log.SetOutput(mw)\n\ta.log.SetFormatter(&log.TextFormatter{\n\t\tForceColors: true,\n\t\tFullTimestamp: true,\n\t})\n}", "func SetGlobalLogger(cores ...zapcore.Core) {\n\tcore := zapcore.NewTee(cores...)\n\tzap.ReplaceGlobals(zap.New(core))\n\n\tlogger = zap.L()\n}", "func (wr *WeightedRoundRobin) SetLogger(cfg *utils.LoggerConfig) (err error) {\r\n\t// e.g LogPath is \"./log/\", LogFileName is \"WeightedRoundRobin-1\", LogSuffix is \".log\"\r\n\t// then log file is ./log/WeightedRoundRobin-1.log\r\n\tlogName := cfg.LogPath + cfg.LogFileName + cfg.LogSuffix\r\n\tfd, err := os.OpenFile(logName, os.O_CREATE|os.O_WRONLY, 0755)\r\n\tif err != nil {\r\n\t\tfmt.Println(\"ngoinx.ldbls.WeightedRoundRobin.SetLogger error: create/open log file\", logName, \"failed\")\r\n\t\treturn err\r\n\t}\r\n\twr.log = utils.LoggerGenerator(cfg.LogFormatter, fd, cfg.LogLevel)\r\n\treturn\r\n}", "func (dl *dummyLogger) Setup() error {\n return nil\n}" ]
[ "0.7687613", "0.75892633", "0.7582981", "0.7485878", "0.7445715", "0.7439065", "0.7379821", "0.7232991", "0.72057545", "0.7112704", "0.7057201", "0.69785136", "0.69619364", "0.68904823", "0.6776435", "0.6756356", "0.6737018", "0.67346954", "0.672922", "0.6724592", "0.6716896", "0.6655311", "0.66536427", "0.6630055", "0.66152364", "0.66050154", "0.6602545", "0.65841675", "0.65723747", "0.6553502", "0.6550354", "0.65490717", "0.6532715", "0.6509173", "0.6506977", "0.65060306", "0.6501629", "0.64623797", "0.6459527", "0.64579445", "0.6438292", "0.64309835", "0.6399193", "0.6379335", "0.6375899", "0.6371379", "0.63705224", "0.6362645", "0.6360298", "0.6344614", "0.6343405", "0.6340283", "0.63286746", "0.63189083", "0.6310546", "0.63047993", "0.6299418", "0.62966895", "0.62870646", "0.62834686", "0.62775326", "0.6274633", "0.6271296", "0.62566364", "0.6256339", "0.6249574", "0.62446284", "0.623852", "0.62372786", "0.6228782", "0.6225428", "0.6225428", "0.62180823", "0.6215609", "0.62136775", "0.6210319", "0.620328", "0.619875", "0.61926925", "0.61819834", "0.61791074", "0.61765325", "0.6169785", "0.6166989", "0.6164382", "0.61556584", "0.61511886", "0.61501706", "0.6143395", "0.6140209", "0.6132408", "0.61267275", "0.61148494", "0.6108918", "0.60948217", "0.6092681", "0.60695344", "0.6059469", "0.6044313", "0.603644" ]
0.77276975
0
create webhook,return id of webhook
func CreateWebhook(user string, repo string, accesstoken string, webhookUrl string, secret string) (int, error) { data := user + ":" + accesstoken sEnc := base64.StdEncoding.EncodeToString([]byte(data)) name := "web" active := true hook := github.Hook{ Name: &name, Active: &active, Config: make(map[string]interface{}), Events: []string{"push"}, } hook.Config["url"] = webhookUrl hook.Config["content_type"] = "json" hook.Config["secret"] = secret hook.Config["insecure_ssl"] = "1" logrus.Infof("hook to create:%v", hook) b := new(bytes.Buffer) json.NewEncoder(b).Encode(hook) hc := http.Client{} APIURL := fmt.Sprintf("https://api.github.com/repos/%v/%v/hooks", user, repo) req, err := http.NewRequest("POST", APIURL, b) req.Header.Add("Authorization", "Basic "+sEnc) resp, err := hc.Do(req) if err != nil { return -1, err } respData, err := ioutil.ReadAll(resp.Body) logrus.Infof("respData:%v", string(respData)) if resp.StatusCode > 399 { return -1, errors.New(string(respData)) } err = json.Unmarshal(respData, &hook) if err != nil { return -1, err } return hook.GetID(), err }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (t *TauAPI) CreateWebhook(webhook Webhook) (ID int64, error error) {\n\tjsonPostMsg, _ := json.Marshal(webhook)\n\tjsonData, err := t.doTauRequest(&TauReq{\n\t\tVersion: 2,\n\t\tMethod: \"POST\",\n\t\tPath: \"webhooks/webhooks\",\n\t\tNeedsAuth: true,\n\t\tPostMsg: jsonPostMsg,\n\t})\n\tif err != nil {\n\t\treturn 0, nil\n\t}\n\tif string(jsonData) == \"[\\\"Limit reached\\\"]\" {\n\t\treturn 0, fmt.Errorf(\"Limit of webhooks reached (5)\")\n\t}\n\tvar d struct {\n\t\tID int64 `json:\"id\"`\n\t}\n\tif err := json.Unmarshal(jsonData, &d); err != nil {\n\t\treturn 0, fmt.Errorf(\"CreateWebhook -> unmarshal jsonData %v\", err)\n\t}\n\treturn d.ID, nil\n}", "func (wh *Webhook) Create(accountId string, data map[string]interface{}, extraHeaders map[string]string) (map[string]interface{}, error) {\n\tif accountId != \"\" {\n\t\turl := fmt.Sprintf(\"/%s%s/%s%s\", constants.VERSION_V2, constants.ACCOUNT_URL, url.PathEscape(accountId), constants.WEBHOOK)\n\t\treturn wh.Request.Post(url, data, extraHeaders)\n\t}\n\turl := fmt.Sprintf(\"/%s%s\", constants.VERSION_V1, constants.WEBHOOK)\n\treturn wh.Request.Post(url, data, extraHeaders)\n}", "func (s *WebhooksServiceOp) Create(webhook Webhook, options ...interface{}) (Webhook, error) {\n\tvar webhookResponse GetWebhookResponse\n\tjsonBody, err := json.Marshal(webhook)\n\tif err != nil {\n\t\treturn webhookResponse.Data, err\n\t}\n\treqBody := bytes.NewReader(jsonBody)\n\tbody, reqErr := s.client.DoRequest(http.MethodPost, \"/v3/hooks\", reqBody)\n\tif reqErr != nil {\n\t\treturn webhookResponse.Data, reqErr\n\t}\n\n\tjsonErr := json.Unmarshal(body, &webhookResponse)\n\tif jsonErr != nil {\n\t\treturn webhookResponse.Data, jsonErr\n\t}\n\n\treturn webhookResponse.Data, nil\n}", "func (c *EcomClient) CreateWebhook(ctx context.Context, p *CreateWebhookRequest) (*WebhookResponse, error) {\n\trequest, err := json.Marshal(&p)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"%w: client: json marshal\", err)\n\t}\n\n\turl := c.endpoint + \"/webhooks\"\n\tbody := strings.NewReader(string(request))\n\tres, err := c.request(http.MethodPost, url, body)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"%w: request\", err)\n\t}\n\tdefer res.Body.Close()\n\n\tif res.StatusCode >= 400 {\n\t\tvar e badRequestResponse\n\t\tdec := json.NewDecoder(res.Body)\n\t\tdec.DisallowUnknownFields()\n\t\tif err := dec.Decode(&e); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"%w: client decode\", err)\n\t\t}\n\t\treturn nil, fmt.Errorf(\"status: %d, code: %s, message: %s\", e.Status, e.Code, e.Message)\n\t}\n\n\tvar webhook WebhookResponse\n\tif err = json.NewDecoder(res.Body).Decode(&webhook); err != nil {\n\t\treturn nil, fmt.Errorf(\"%w: decode\", err)\n\t}\n\treturn &webhook, nil\n}", "func (z *Client) CreateWebhook(ctx context.Context, hook *Webhook) (*Webhook, error) {\n\tvar data, result struct {\n\t\tWebhook *Webhook `json:\"webhook\"`\n\t}\n\tdata.Webhook = hook\n\n\tbody, err := z.post(ctx, \"/webhooks\", data)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = json.Unmarshal(body, &result)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.Webhook, nil\n}", "func (s *WebhookServiceOp) Create(ctx context.Context, webhook Webhook) (*Webhook, error) {\n\tpath := fmt.Sprintf(\"%s.json\", webhooksBasePath)\n\twrappedData := WebhookResource{Webhook: &webhook}\n\tresource := new(WebhookResource)\n\terr := s.client.Post(ctx, path, wrappedData, resource)\n\treturn resource.Webhook, err\n}", "func (w Webhook) Create(ctx context.Context, webhook *postmand.Webhook) error {\n\tquery, args := insertQuery(\"webhooks\", webhook)\n\t_, err := w.db.ExecContext(ctx, query, args...)\n\treturn err\n}", "func (w *WebhookServiceOp) Create(webhook Webhook) (*Webhook, error) {\n\tpath := fmt.Sprintf(\"%s\", webhooksBasePath)\n\tresource := new(Webhook)\n\terr := w.client.Post(path, webhook, &resource)\n\treturn resource, err\n}", "func (c *Client) CreateWebhook(req CreateWebhookReq) (Webhook, error) {\n\tvar res Webhook\n\terr := c.post(c.baseURL+\"/webhooks\", webhookReq{Webhook: req}, &res)\n\n\treturn res, err\n}", "func (c *ApiService) CreateWebhook(ServiceSid string, params *CreateWebhookParams) (*VerifyV2Webhook, error) {\n\tpath := \"/v2/Services/{ServiceSid}/Webhooks\"\n\tpath = strings.Replace(path, \"{\"+\"ServiceSid\"+\"}\", ServiceSid, -1)\n\n\tdata := url.Values{}\n\theaders := make(map[string]interface{})\n\n\tif params != nil && params.FriendlyName != nil {\n\t\tdata.Set(\"FriendlyName\", *params.FriendlyName)\n\t}\n\tif params != nil && params.EventTypes != nil {\n\t\tfor _, item := range *params.EventTypes {\n\t\t\tdata.Add(\"EventTypes\", item)\n\t\t}\n\t}\n\tif params != nil && params.WebhookUrl != nil {\n\t\tdata.Set(\"WebhookUrl\", *params.WebhookUrl)\n\t}\n\tif params != nil && params.Status != nil {\n\t\tdata.Set(\"Status\", *params.Status)\n\t}\n\tif params != nil && params.Version != nil {\n\t\tdata.Set(\"Version\", *params.Version)\n\t}\n\n\tresp, err := c.requestHandler.Post(c.baseURL+path, data, headers)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefer resp.Body.Close()\n\n\tps := &VerifyV2Webhook{}\n\tif err := json.NewDecoder(resp.Body).Decode(ps); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ps, err\n}", "func (s *WebhooksService) CreateWebhook(webhookCreateRequest *WebhookCreateRequest) (*Webhook, *resty.Response, error) {\n\n\tpath := \"/webhooks/\"\n\n\tresponse, err := s.client.R().\n\t\tSetBody(webhookCreateRequest).\n\t\tSetResult(&Webhook{}).\n\t\tSetError(&Error{}).\n\t\tPost(path)\n\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tresult := response.Result().(*Webhook)\n\treturn result, response, err\n\n}", "func InsertWebhook(url string, events []models.EventType) (int, error) {\n\tlog.Traceln(\"Adding new webhook\")\n\n\teventsString := strings.Join(events, \",\")\n\n\ttx, err := _db.Begin()\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tstmt, err := tx.Prepare(\"INSERT INTO webhooks(url, events) values(?, ?)\")\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tdefer stmt.Close()\n\n\tinsertResult, err := stmt.Exec(url, eventsString)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\tif err = tx.Commit(); err != nil {\n\t\treturn 0, err\n\t}\n\n\tnewID, err := insertResult.LastInsertId()\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\treturn int(newID), err\n}", "func TestCreateAndGetWebhook(t *testing.T) {\n\tc, _ := NewClient(testClientID, testSecret, APIBaseSandBox)\n\tc.GetAccessToken()\n\n\tpayload := &CreateWebhookRequest{\n\t\tURL: \"https://example.com/paypal_webhooks\",\n\t\tEventTypes: []WebhookEventType{\n\t\t\tWebhookEventType{\n\t\t\t\tName: \"PAYMENT.AUTHORIZATION.CREATED\",\n\t\t\t},\n\t\t},\n\t}\n\n\tcreatedWebhook, err := c.CreateWebhook(payload)\n\tif err != nil {\n\t\tt.Errorf(\"Webhook couldn't be created, error %v\", err)\n\t}\n\n\t_, err = c.GetWebhook(createdWebhook.ID)\n\tif err != nil {\n\t\tt.Errorf(\"An error occurred while getting webhook, error %v\", err)\n\t}\n\n\terr = c.DeleteWebhook(createdWebhook.ID)\n\tif err != nil {\n\t\tt.Errorf(\"An error occurred while webhooks deletion, error %v\", err)\n\t}\n}", "func webhookCreateVersion(serviceID string, version *api.Version) error {\n\t// Find service info from DB.\n\tds := store.NewStore()\n\tdefer ds.Close()\n\tservice, err := ds.FindServiceByID(serviceID)\n\tif err != nil {\n\t\tmessage := fmt.Sprintf(\"Unable to find service %v\", version.ServiceID)\n\t\tlog.ErrorWithFields(message, log.Fields{\"user_id\": service.UserID, \"error\": err})\n\t\treturn fmt.Errorf(\"%s\", message)\n\t}\n\n\tif \"\" == version.URL {\n\t\tversion.URL = service.Repository.URL\n\t}\n\tversion.Operator = api.WebhookOperator\n\n\t// To create a version, we must first make sure repository is healthy.\n\tif service.Repository.Status != api.RepositoryHealthy {\n\t\tmessage := fmt.Sprintf(\"Repository of service %s is not healthy, current status %s\", service.Name, service.Repository.Status)\n\t\tlog.ErrorWithFields(message, log.Fields{\"user_id\": service.UserID})\n\t\treturn fmt.Errorf(\"%s\", message)\n\t}\n\n\t// Request looks good, now fill up initial version status.\n\tversion.CreateTime = time.Now()\n\tversion.Status = api.VersionPending\n\n\t// Create a new version in database. Note the version is NOT the final version:\n\t// there can be error when running tests or building docker image. The version\n\t// ID is only a record that a version build has occurred. If the version build\n\t// succeeds, it'll be added to the service and is considered as a final version;\n\t// otherwise, it is just a version recorded in database.\n\t_, err = ds.NewVersionDocument(version)\n\tif err != nil {\n\t\tmessage := \"Unable to create version document in database\"\n\t\tlog.ErrorWithFields(message, log.Fields{\"user_id\": service.UserID, \"error\": err})\n\t\treturn fmt.Errorf(\"%s\", message)\n\t}\n\n\t// Start building the version asynchronously, and make sure event is successfully\n\t// created before return.\n\terr = event.SendCreateVersionEvent(service, version)\n\tif err != nil {\n\t\tmessage := \"Unable to create build version job\"\n\t\tlog.ErrorWithFields(message, log.Fields{\"user_id\": service.UserID, \"service\": service, \"version\": version, \"error\": err})\n\t\treturn fmt.Errorf(\"%s\", message)\n\t}\n\n\treturn nil\n}", "func APIProjectWebhookCreateHandler(er *Errorly) http.HandlerFunc {\n\treturn func(rw http.ResponseWriter, r *http.Request) {\n\t\tsession, _ := er.Store.Get(r, sessionName)\n\t\tdefer er.SaveSession(session, r, rw)\n\n\t\tvars := mux.Vars(r)\n\n\t\t// Authenticate the user\n\t\tauth, user := er.AuthenticateSession(session)\n\t\tif !auth {\n\t\t\tpassResponse(rw, \"You must be logged in to do this\", false, http.StatusForbidden)\n\n\t\t\treturn\n\t\t}\n\n\t\tproject, viewable, elevated, ok := verifyProjectVisibility(er, rw, vars, user, auth, true)\n\t\tif !ok {\n\t\t\t// If ok is False, an error has already been provided to the ResponseWriter so we should just return\n\t\t\treturn\n\t\t}\n\n\t\tif !viewable {\n\t\t\t// No permission to view project. We will treat like the project\n\t\t\t// does not exist.\n\t\t\tpassResponse(rw, \"Could not find this project\", false, http.StatusBadRequest)\n\n\t\t\treturn\n\t\t}\n\n\t\tif !elevated {\n\t\t\t// No permission to execute on project. We will simply tell them\n\t\t\t// they cannot do this.\n\t\t\tpassResponse(rw, \"Guests to a project cannot do this\", false, http.StatusForbidden)\n\n\t\t\treturn\n\t\t}\n\n\t\twebhookURL, err := url.Parse(r.FormValue(\"url\"))\n\t\tif err != nil {\n\t\t\tpassResponse(rw, \"Webhook url is not valid\", false, http.StatusBadRequest)\n\n\t\t\treturn\n\t\t}\n\n\t\twebhookSecret := r.FormValue(\"secret\")\n\n\t\tuseJSON, err := strconv.ParseBool(r.FormValue(\"use_json\"))\n\t\tif err != nil {\n\t\t\tpassResponse(rw, \"Passed use_json value is not valid\", false, http.StatusBadRequest)\n\n\t\t\treturn\n\t\t}\n\n\t\twebhookDiscord, err := strconv.ParseBool(r.FormValue(\"webhook_discord\"))\n\t\tif err != nil {\n\t\t\tpassResponse(rw, \"Passed webhook_discord value is not valid\", false, http.StatusBadRequest)\n\n\t\t\treturn\n\t\t}\n\n\t\tvar webhookType structs.WebhookType\n\t\tif webhookDiscord {\n\t\t\twebhookType = structs.RegularPayload\n\t\t} else {\n\t\t\twebhookType = structs.DiscordWebhook\n\t\t}\n\n\t\twebhook := &structs.Webhook{\n\t\t\tID: er.IDGen.GenerateID(),\n\t\t\tProjectID: project.ID,\n\n\t\t\tCreatedAt: time.Now().UTC(),\n\t\t\tCreatedByID: user.ID,\n\n\t\t\tSecret: webhookSecret,\n\t\t\tURL: webhookURL.String(),\n\t\t\tType: webhookType,\n\t\t\tJSONContent: useJSON,\n\t\t\tActive: true,\n\n\t\t\tFailures: 0,\n\t\t}\n\n\t\t_, err = er.Postgres.Model(webhook).\n\t\t\tInsert()\n\t\tif err != nil {\n\t\t\tpassResponse(rw, err.Error(), false, http.StatusInternalServerError)\n\t\t}\n\n\t\tpassResponse(rw, webhook, true, http.StatusOK)\n\t}\n}", "func (a *API) RegisterWebhook(webhook *Webhook) (string, error) {\n\tvar resp registerWebhookResponse\n\terr := a.Call(\"register_webhook\", webhook, &resp)\n\n\treturn resp.ID, err\n}", "func CreateTrigger(w http.ResponseWriter, r *http.Request) {\n\tlog.Println(\"Received a POST against an ID. Working.\")\n\n\tvars := mux.Vars(r)\n\tid := vars[\"id\"]\n\n\t// We use the same error every time, as this makes it harder to try and hack from the outside with\n\t// brute force attempt to get the message. Timing attacks are still an issue however.\n\tfof := fmt.Sprintf(\"{\\\"error\\\":\\\"Invalid endpoint/token.\\\",\\\"details\\\":\\\"Could not find requested endpoint.\\\"}\")\n\n\tif !checkToken(id) {\n\t\tlog.Println(\"Invalid endpoint: \", id)\n\t\thttp.Error(w, fof, 401)\n\t\treturn\n\t}\n\n\tendpoint, err := FindEndpoint(id)\n\n\tif err != nil {\n\t\tlog.Println(\"Problem finding endpoint in database: \", err)\n\t\thttp.Error(w, fof, 401)\n\t\treturn\n\t}\n\n\t// Load the JSON.\n\tpayload, err := simplejson.NewFromReader(r.Body)\n\n\tif err != nil {\n\t\tlog.Println(\"Failed to parse request JSON: \")\n\t\thttp.Error(w, fmt.Sprintf(\"{\\\"error\\\":\\\"Request body invalid.\\\",\\\"details\\\":\\\"%v\\\"}\", err), 400)\n\t\treturn\n\t}\n\n\ttoken := payload.Get(\"token\").MustString()\n\tmessage := payload.Get(\"message\").MustString()\n\taction := payload.Get(\"action\").MustString()\n\n\tif !checkToken(token) {\n\t\tlog.Println(\"Invalid token: \", token)\n\t\thttp.Error(w, fof, 401)\n\t\treturn\n\t}\n\n\tif !validateRequest(token, endpoint) {\n\t\tlog.Println(\"Token was not valid against the endpoint: \", token)\n\t\thttp.Error(w, fof, 401)\n\t}\n\n\t// Now check against the JSON\n\tlog.Println(\"Valid alert: \", token, message, action)\n\n\tif token != endpoint.Token {\n\t\tlog.Println(\"Endpoint token did not match DB stored token: \", token, vars[\"token\"])\n\t\thttp.Error(w, fof, 404)\n\t\treturn\n\t}\n\n\tnotif, err := CreateNotification(endpoint, message, false)\n\n\tif err != nil {\n\t\tlog.Println(\"Failed to create notification: \", err)\n\t\thttp.Error(w, fmt.Sprintf(\"{\\\"error\\\":\\\"Creating the notification failed.\\\",\\\"details\\\":\\\"%v\\\"}\", err), 400)\n\t\treturn\n\t}\n\n\t// Identify the service we'll use to deliver the message\n\tif endpoint.DeviceType == \"IOS\" {\n\t\t// This should be a GO Func.\n\t\tgo func(endpoint *Endpoint, notif *Notification) {\n\t\t\tlog.Println(\"Sending Notification to Apple: \", notif.Id)\n\t\t\tSendIOSNotification(endpoint, notif)\n\t\t}(endpoint, notif)\n\t\t// } else if endpoint.DeviceType == \"ANDROID\" {\n\t\t// serviceId = \"Not implemented!\"\n\t\t// } else if endpoint.DeviceType == \"WINDOWS\" {\n\t\t// serviceId = \"Not implemented!\"\n\t} else {\n\t\tlog.Println(\"Failed to find a device service match: '\", endpoint.DeviceType, \"'\")\n\t\thttp.Error(w, \"{\\\"error\\\":\\\"Could not identify device type.\\\",\\\"details\\\":\\\"Device type did not match a configured type.\\\"}\", 400)\n\t\treturn\n\t}\n\n\t// 201 and return the notifcation ID so it can be queried later\n\tw.WriteHeader(http.StatusCreated)\n\tfmt.Fprintf(w, \"{ \\\"status\\\":\\\"%v\\\" \\\"id\\\": \\\"%v.\\\" }\", notif.Status, notif.Id)\n}", "func postWebhook(webhookUrl string, webhookType string, p []byte) {\n\n\tvar payloadName string\n\tswitch webhookType {\n\tcase \"slack\":\n\t\tpayloadName = \"payload\"\n\tcase \"discord\":\n\t\tpayloadName = \"payload_json\"\n\t}\n\tresp, _ := http.PostForm(\n\t\twebhookUrl,\n\t\turl.Values{payloadName: {string(p)}},\n\t)\n\n\tbody, _ := ioutil.ReadAll(resp.Body)\n\tdefer resp.Body.Close()\n\tfmt.Println(string(body))\n}", "func webhookKey(context context.Context, handler string) *datastore.Key {\n\treturn datastore.NewKey(context, \"Webhook\", handler, 0, nil)\n}", "func handleNewHook(resp http.ResponseWriter, request *http.Request) {\n\tcors := handleCors(resp, request)\n\tif cors {\n\t\treturn\n\t}\n\n\tuser, err := handleApiAuthentication(resp, request)\n\tif err != nil {\n\t\tlog.Printf(\"Api authentication failed in set new workflowhandler: %s\", err)\n\t\tresp.WriteHeader(401)\n\t\tresp.Write([]byte(`{\"success\": false}`))\n\t\treturn\n\t}\n\n\ttype requestData struct {\n\t\tType string `json:\"type\"`\n\t\tDescription string `json:\"description\"`\n\t\tId string `json:\"id\"`\n\t\tName string `json:\"name\"`\n\t\tWorkflow string `json:\"workflow\"`\n\t}\n\n\tbody, err := ioutil.ReadAll(request.Body)\n\tif err != nil {\n\t\tlog.Printf(\"Body data error: %s\", err)\n\t\tresp.WriteHeader(401)\n\t\tresp.Write([]byte(`{\"success\": false}`))\n\t\treturn\n\t}\n\n\tlog.Println(\"Data: %s\", string(body))\n\n\tctx := context.Background()\n\tvar requestdata requestData\n\terr = yaml.Unmarshal([]byte(body), &requestdata)\n\tif err != nil {\n\t\tlog.Printf(\"Failed unmarshaling inputdata: %s\", err)\n\t\tresp.WriteHeader(401)\n\t\tresp.Write([]byte(`{\"success\": false}`))\n\t\treturn\n\t}\n\tlog.Printf(\"%#v\", requestdata)\n\n\t// CBA making a real thing. Already had some code lol\n\tnewId := requestdata.Id\n\tif len(newId) != 36 {\n\t\tlog.Printf(\"Bad ID\")\n\t\tresp.WriteHeader(401)\n\t\tresp.Write([]byte(`{\"success\": false, \"reason\": \"Invalid ID\"}`))\n\t\treturn\n\t}\n\n\tif requestdata.Id == \"\" || requestdata.Name == \"\" {\n\t\tresp.WriteHeader(401)\n\t\tresp.Write([]byte(`{\"success\": false, \"reason\": \"Requires fields id and name can't be empty\"}`))\n\t\treturn\n\n\t}\n\n\tvalidTypes := []string{\n\t\t\"webhook\",\n\t}\n\n\tisTypeValid := false\n\tfor _, thistype := range validTypes {\n\t\tif requestdata.Type == thistype {\n\t\t\tisTypeValid = true\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif !(isTypeValid) {\n\t\tlog.Printf(\"Type %s is not valid. Try any of these: %s\", requestdata.Type, strings.Join(validTypes, \", \"))\n\t\tresp.WriteHeader(401)\n\t\tresp.Write([]byte(`{\"success\": false}`))\n\t\treturn\n\t}\n\n\thook := Hook{\n\t\tId: newId,\n\t\tWorkflows: []string{requestdata.Workflow},\n\t\tInfo: Info{\n\t\t\tName: requestdata.Name,\n\t\t\tDescription: requestdata.Description,\n\t\t\tUrl: fmt.Sprintf(\"https://shuffler.io/functions/webhooks/webhook_%s\", newId),\n\t\t},\n\t\tType: \"webhook\",\n\t\tOwner: user.Username,\n\t\tStatus: \"uninitialized\",\n\t\tActions: []HookAction{\n\t\t\tHookAction{\n\t\t\t\tType: \"workflow\",\n\t\t\t\tName: requestdata.Name,\n\t\t\t\tId: requestdata.Workflow,\n\t\t\t\tField: \"\",\n\t\t\t},\n\t\t},\n\t\tRunning: false,\n\t}\n\n\tlog.Printf(\"Hello\")\n\n\t// FIXME: Add cloud function execution?\n\t//b, err := json.Marshal(hook)\n\t//if err != nil {\n\t//\tlog.Printf(\"Failed marshalling: %s\", err)\n\t//\tresp.WriteHeader(401)\n\t//\tresp.Write([]byte(`{\"success\": false}`))\n\t//\treturn\n\t//}\n\n\t//environmentVariables := map[string]string{\n\t//\t\"FUNCTION_APIKEY\": user.ApiKey,\n\t//\t\"CALLBACKURL\": \"https://shuffler.io\",\n\t//\t\"HOOKID\": hook.Id,\n\t//}\n\n\t//applocation := fmt.Sprintf(\"gs://%s/triggers/webhook.zip\", bucketName)\n\t//hookname := fmt.Sprintf(\"webhook_%s\", hook.Id)\n\t//err = deployWebhookFunction(ctx, hookname, defaultLocation, applocation, environmentVariables)\n\t//if err != nil {\n\t//\tlog.Printf(\"Error deploying hook: %s\", err)\n\t//\tresp.WriteHeader(401)\n\t//\tresp.Write([]byte(fmt.Sprintf(`{\"success\": false, \"reason\": \"Issue with starting hook. Please wait a second and try again\"}`)))\n\t//\treturn\n\t//}\n\n\thook.Status = \"running\"\n\thook.Running = true\n\terr = setHook(ctx, hook)\n\tif err != nil {\n\t\tlog.Printf(\"Failed setting hook: %s\", err)\n\t\tresp.WriteHeader(401)\n\t\tresp.Write([]byte(`{\"success\": false}`))\n\t\treturn\n\t}\n\n\terr = increaseStatisticsField(ctx, \"total_workflow_triggers\", requestdata.Workflow, 1)\n\tif err != nil {\n\t\tlog.Printf(\"Failed to increase total workflows: %s\", err)\n\t}\n\n\tlog.Println(\"Generating new hook\")\n\tresp.WriteHeader(200)\n\tresp.Write([]byte(`{\"success\": true}`))\n}", "func (v *Kounta) CreateSaleWebHook(token string, company string, webhook WebHook) error {\n\n\tfmt.Println(\"CreateSaleWebHook\", token, company, webhook)\n\n\tb, err := json.Marshal(webhook)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tu, err := url.ParseRequestURI(baseURL)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tu.Path = fmt.Sprintf(webHookURL+\".json\", company)\n\turlStr := fmt.Sprintf(\"%v\", u)\n\n\tclient := &http.Client{}\n\tclient.CheckRedirect = checkRedirectFunc\n\n\tr, err := http.NewRequest(\"POST\", urlStr, bytes.NewBuffer(b))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tr.Header.Add(\"Authorization\", \"Bearer \"+token)\n\tr.Header.Add(\"Content-Type\", \"application/json\")\n\tr.Header.Add(\"Content-Length\", strconv.Itoa(len(b)))\n\n\tres, err := client.Do(r)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif res.StatusCode >= 400 {\n\t\treturn fmt.Errorf(\"Failed init sale webhooks %s\", res.Status)\n\t}\n\n\treturn nil\n}", "func (g *V3) CreateWebhook(repo string, webhook *scm.Webhook) error {\n\tif webhook == nil || len(webhook.URL) == 0 || len(webhook.Events) == 0 {\n\t\treturn fmt.Errorf(\"The webhook %v is not correct\", webhook)\n\t}\n\n\t_, err := g.GetWebhook(repo, webhook.URL)\n\tif err != nil {\n\t\tif !cerr.ErrorContentNotFound.Derived(err) {\n\t\t\treturn err\n\t\t}\n\n\t\thook := generateV3ProjectHook(webhook)\n\t\t_, resp, err := g.client.Projects.AddProjectHook(repo, hook)\n\t\tif err != nil {\n\t\t\treturn convertGitlabError(err, resp)\n\t\t}\n\t\treturn nil\n\t}\n\n\tlog.Warningf(\"Webhook already existed: %+v\", webhook)\n\treturn err\n}", "func (client *WebhooksClient) createCreateRequest(ctx context.Context, resourceGroupName string, registryName string, webhookName string, webhookCreateParameters WebhookCreateParameters, options *WebhooksClientBeginCreateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerRegistry/registries/{registryName}/webhooks/{webhookName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif registryName == \"\" {\n\t\treturn nil, errors.New(\"parameter registryName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{registryName}\", url.PathEscape(registryName))\n\tif webhookName == \"\" {\n\t\treturn nil, errors.New(\"parameter webhookName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{webhookName}\", url.PathEscape(webhookName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPut, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, webhookCreateParameters)\n}", "func (c *Client) CreateWebhook(ctx context.Context, repo bitbucket.Repo, hook bitbucket.Webhook) (bitbucket.Webhook, error) {\n\tmarshalledPayload, err := json.Marshal(hook)\n\tif err != nil {\n\t\treturn bitbucket.Webhook{}, err\n\t}\n\n\turl := c.BaseURL + fmt.Sprintf(\"/rest/api/1.0/projects/%s/repos/%s/webhooks\",\n\t\turl.PathEscape(repo.ProjectKey), url.PathEscape(repo.Repo))\n\n\treq, err := http.NewRequestWithContext(ctx, http.MethodPost, url, bytes.NewBuffer(marshalledPayload))\n\tif err != nil {\n\t\treturn bitbucket.Webhook{}, err\n\t}\n\n\tvar response bitbucket.Webhook\n\tif err := c.sendRequest(req, &response); err != nil {\n\t\treturn bitbucket.Webhook{}, err\n\t}\n\treturn response, nil\n}", "func (a *Client) PostWebhooks(params *PostWebhooksParams, authInfo runtime.ClientAuthInfoWriter) (*PostWebhooksCreated, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewPostWebhooksParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"PostWebhooks\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/webhooks\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &PostWebhooksReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*PostWebhooksCreated)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for PostWebhooks: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "func HandlerInviteCreate(responseWriter http.ResponseWriter, request *http.Request) {\n\trequest.ParseForm()\n\n\ttoken := GetCookieToken(request)\n\tisValid, userId := DbIsTokenValid(token, nil)\n\tlog.Printf(\"HandlerInvite, token=%s, isValid=%t, userId=%d\", token, isValid, userId)\n\tif !isValid {\n\t\tServeLogin(responseWriter, STR_MSG_login)\n\t\treturn\n\t}\n\n\tvar strApiKey string = STR_EMPTY\n\tvar strAppName string = STR_EMPTY\n\tsliceApiKeys := request.Form[API_KEY_apikey]\n\tsliceAppNames := request.Form[API_KEY_appname]\n\tif sliceApiKeys != nil && len(sliceApiKeys) > 0 {\n\t\tstrApiKey = sliceApiKeys[0]\n\t}\n\tif sliceAppNames != nil && len(sliceAppNames) > 0 {\n\t\tstrAppName = sliceAppNames[0]\n\t}\n\n\tvar inviteId = DbInviteAdd(strApiKey, nil)\n\n\ttemplateApiKeys, err := template.ParseFiles(STR_template_invite_html)\n\tif err != nil {\n\t\tlog.Printf(\"Error parsing template %s, error=%s\", STR_template_invite_html, err.Error())\n\t}\n\tvar templateData = struct {\n\t\tApiUrlInvite string\n\t\tInviteId string\n\t\tApiKey string\n\t\tAppName string\n\t}{\n\t\tGetApiUrlInvite(),\n\t\tinviteId,\n\t\tstrApiKey,\n\t\tstrAppName,\n\t}\n\terrorExecute := templateApiKeys.Execute(responseWriter, templateData)\n\tif errorExecute != nil {\n\t\tlog.Printf(\"Error executing template, %s, error=%s\", STR_template_invite_html, errorExecute.Error())\n\t}\n}", "func NewWebhook(db *sqlx.DB) *Webhook {\n\treturn &Webhook{db: db}\n}", "func Webhook(u *url.URL, h http.Header, req *stripe.Event) (int, http.Header, interface{}, error) {\n\t// if we dont support the handler, just return success so they dont try again.\n\thandler, err := payment.GetHandler(req.Type)\n\tif err != nil {\n\t\treturn response.NewDefaultOK()\n\t}\n\n\t// get the event from stripe api again since they dont provide a way to\n\t// authenticate incoming requests\n\tevent, err := event.Get(req.ID, nil)\n\tif err != nil {\n\t\treturn response.NewBadRequest(err)\n\t}\n\n\tif err := handler(event.Data.Raw); err != nil {\n\t\treturn response.NewBadRequest(err)\n\t}\n\n\treturn response.NewDefaultOK()\n}", "func (g *GitHub) CreateHook(service *api.Service) error {\n\twebhooktype := service.Repository.Webhook\n\tif webhooktype == \"\" {\n\t\treturn fmt.Errorf(\"no need webhook registry\")\n\t}\n\n\tif webhooktype == api.GITHUB {\n\t\turl := getHookURL(webhooktype, service.ServiceID)\n\t\tif url == \"\" {\n\t\t\tlog.Infof(\"url is empty\", log.Fields{\"user_id\": service.UserID})\n\t\t\treturn nil\n\t\t}\n\n\t\tds := store.NewStore()\n\t\tdefer ds.Close()\n\n\t\ttok, err := ds.FindtokenByUserID(service.UserID, api.GITHUB)\n\t\tif err != nil {\n\t\t\tlog.ErrorWithFields(\"find token failed\", log.Fields{\"user_id\": service.UserID, \"error\": err})\n\t\t\treturn err\n\t\t}\n\n\t\tts := oauth2.StaticTokenSource(\n\t\t\t&oauth2.Token{AccessToken: tok.Vsctoken.AccessToken},\n\t\t)\n\t\ttc := oauth2.NewClient(oauth2.NoContext, ts)\n\t\tclient := github.NewClient(tc)\n\n\t\tvar hook github.Hook\n\t\thook.Name = github.String(\"web\")\n\t\thook.Events = []string{\"push\", \"pull_request\"}\n\t\thook.Config = map[string]interface{}{}\n\t\thook.Config[\"url\"] = url\n\t\thook.Config[\"content_type\"] = \"json\"\n\t\tonwer, name := parseURL(service.Repository.URL)\n\t\t_, _, err = client.Repositories.CreateHook(onwer, name, &hook)\n\t\treturn err\n\t}\n\tlog.WarnWithFields(\"not support vcs repository\", log.Fields{\"vcs repository\": webhooktype})\n\treturn fmt.Errorf(\"not support vcs repository in create webhook\")\n}", "func (c *Client) Webhook(id int) (*Webhook, error) {\n\tvar res Webhook\n\terr := c.get(c.baseURL+fmt.Sprintf(\"/webhooks/%d\", id), &res)\n\n\treturn &res, err\n}", "func (a *ManagementApiService) CreateNotificationWebhook(ctx _context.Context, applicationId int32) apiCreateNotificationWebhookRequest {\n\treturn apiCreateNotificationWebhookRequest{\n\t\tapiService: a,\n\t\tctx: ctx,\n\t\tapplicationId: applicationId,\n\t}\n}", "func webhookHandler(w http.ResponseWriter, r *http.Request) {\n\t// parse request body\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn\n\t}\n\tfmt.Println(string(body))\n\t// decoder := json.NewDecoder(r.Body)\n\t// Get student public URL\n\t// run Webdriver IO test against the URL and get its result\n\t// Store result and SHA\n\t// publish status to Github\n\tfmt.Println(\"Hello\")\n}", "func create(l *lambdasrv.Lambda, version string, note CreateNote) (string, error) {\n\tnoteId := &id{}\n\tstatus, err := lambda.InvokeLambda(l, version, nil, nil, note, noteId)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"saver lambda: %w\", err)\n\t}\n\tif status != http.StatusCreated {\n\t\treturn \"\", fmt.Errorf(\"create note: expected status: %v got %v\", http.StatusCreated, status)\n\t}\n\treturn noteId.ID, nil\n}", "func AddWebhook(ctx context.Context, w *Webhook) error {\n\treturn db.Bun().RunInTx(ctx, nil, func(ctx context.Context, tx bun.Tx) error {\n\t\t_, err := tx.NewInsert().Model(w).Exec(ctx)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfor _, t := range w.Triggers {\n\t\t\tt.WebhookID = w.ID\n\t\t}\n\n\t\tif len(w.Triggers) != 0 {\n\t\t\t_, err = tx.NewInsert().Model(&w.Triggers).Exec(ctx)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t})\n}", "func (db *MongoDB) Add(w Webhook) (string, error) {\n\tw.ID = bson.NewObjectId()\n\n\terr := w.Validate()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\terr = Session.DB(db.DatabaseName).C(db.WebhooksCollectionName).Insert(w)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn w.ID.Hex(), nil\n}", "func CreateHook(db DB, gameID string, eventType int, url string) (*Hook, error) {\n\thook := GetHookByDetails(db, gameID, eventType, url)\n\n\tif hook != nil {\n\t\treturn hook, nil\n\t}\n\n\tpublicID := uuid.NewV4().String()\n\thook = &Hook{\n\t\tGameID: gameID,\n\t\tPublicID: publicID,\n\t\tEventType: eventType,\n\t\tURL: url,\n\t}\n\terr := db.Insert(hook)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn hook, nil\n}", "func hookPerformWebPOST(url string, data interface{}) error {\n\t// Generate a buffer for us to store some JSON\n\tb := new(bytes.Buffer)\n\n\t// Take the data we have received and encode it in JSON to POST\n\tjson.NewEncoder(b).Encode(data)\n\n\t// It's always important to log.\n\tlog.WithFields(log.Fields{\n\t\t\"url\": url,\n\t\t\"data\": b,\n\t}).Debug(\"POSTing to webhook\")\n\n\t// POST up our data and then return if we got an error or not.\n\tres, err := http.Post(url, \"application/json; charset=utf-8\", b)\n\n\tlog.WithFields(log.Fields{\n\t\t\"url\": url,\n\t\t\"code\": res.StatusCode,\n\t\t\"status\": res.Status,\n\t}).Debug(\"Response received from webhook\")\n\n\treturn err\n}", "func createWebhookService(\n\townerReference metav1.OwnerReference,\n\tserviceName string,\n\tnamespace string,\n) error {\n\n\tvar createService = false\n\t_, err := observer.GetService(namespace, serviceName)\n\tif err == nil {\n\t\t// service already present, no need to do anything\n\t\tcreateService = false\n\t} else {\n\t\tif errors.IsNotFound(err) {\n\t\t\tcreateService = true\n\t\t} else {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif !createService {\n\t\treturn nil\n\t}\n\n\t// create service resource that refers to KubeDirector pod\n\tkdName, _ := k8sutil.GetOperatorName()\n\tserviceLabels := map[string]string{\"name\": kdName}\n\tservice := &v1.Service{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"Service\",\n\t\t\tAPIVersion: \"v1\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tNamespace: namespace,\n\t\t\tName: serviceName,\n\t\t\tLabels: map[string]string{\"webhook\": kdName},\n\t\t\tOwnerReferences: []metav1.OwnerReference{ownerReference},\n\t\t},\n\t\tSpec: v1.ServiceSpec{\n\t\t\tSelector: serviceLabels,\n\t\t\tPorts: []v1.ServicePort{\n\t\t\t\t{\n\t\t\t\t\tProtocol: \"TCP\",\n\t\t\t\t\tPort: 443,\n\t\t\t\t\tTargetPort: intstr.FromInt(validationPort),\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\treturn shared.Create(context.TODO(), service)\n}", "func (c *Client) WebhookPost(falcopayload types.FalcoPayload) {\n\terr := c.Post(falcopayload)\n\tif err != nil {\n\t\tc.Stats.Webhook.Add(Error, 1)\n\t\tc.PromStats.Outputs.With(map[string]string{\"destination\": \"webhook\", \"status\": Error}).Inc()\n\t} else {\n\t\tc.Stats.Webhook.Add(OK, 1)\n\t\tc.PromStats.Outputs.With(map[string]string{\"destination\": \"webhook\", \"status\": OK}).Inc()\n\t}\n\n\tc.Stats.Webhook.Add(Total, 1)\n}", "func TestCreateAndUpdateWebhook(t *testing.T) {\n\tc, _ := NewClient(testClientID, testSecret, APIBaseSandBox)\n\tc.GetAccessToken()\n\n\tcreationPayload := &CreateWebhookRequest{\n\t\tURL: \"https://example.com/paypal_webhooks\",\n\t\tEventTypes: []WebhookEventType{\n\t\t\tWebhookEventType{\n\t\t\t\tName: \"PAYMENT.AUTHORIZATION.CREATED\",\n\t\t\t},\n\t\t},\n\t}\n\n\tcreatedWebhook, err := c.CreateWebhook(creationPayload)\n\tif err != nil {\n\t\tt.Errorf(\"Webhook couldn't be created, error %v\", err)\n\t}\n\n\tupdatePayload := []WebhookField{\n\t\tWebhookField{\n\t\t\tOperation: \"replace\",\n\t\t\tPath: \"/event_types\",\n\t\t\tValue: []interface{}{\n\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\"name\": \"PAYMENT.SALE.REFUNDED\",\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\t_, err = c.UpdateWebhook(createdWebhook.ID, updatePayload)\n\tif err != nil {\n\t\tt.Errorf(\"Couldn't update webhook, error %v\", err)\n\t}\n\n\terr = c.DeleteWebhook(createdWebhook.ID)\n\tif err != nil {\n\t\tt.Errorf(\"An error occurred while webhooks deletion, error %v\", err)\n\t}\n}", "func (client *WebhooksClient) getCreateRequest(ctx context.Context, resourceGroupName string, registryName string, webhookName string, options *WebhooksClientGetOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerRegistry/registries/{registryName}/webhooks/{webhookName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif registryName == \"\" {\n\t\treturn nil, errors.New(\"parameter registryName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{registryName}\", url.PathEscape(registryName))\n\tif webhookName == \"\" {\n\t\treturn nil, errors.New(\"parameter webhookName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{webhookName}\", url.PathEscape(webhookName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewWebhook(ctx *pulumi.Context,\n\tname string, args *WebhookArgs, opts ...pulumi.ResourceOption) (*Webhook, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.Name == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Name'\")\n\t}\n\tif args.Url == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Url'\")\n\t}\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource Webhook\n\terr := ctx.RegisterResource(\"datadog:index/webhook:Webhook\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (r apiCreateNotificationWebhookRequest) Execute() (NotificationWebhook, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue NotificationWebhook\n\t)\n\n\tlocalBasePath, err := r.apiService.client.cfg.ServerURLWithContext(r.ctx, \"ManagementApiService.CreateNotificationWebhook\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v1/applications/{applicationId}/notification_webhooks\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"applicationId\"+\"}\", _neturl.QueryEscape(parameterToString(r.applicationId, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.body == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"body is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = r.body\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif auth, ok := auth[\"Authorization\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif auth.Prefix != \"\" {\n\t\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = auth.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif auth, ok := auth[\"Authorization\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif auth.Prefix != \"\" {\n\t\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = auth.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := r.apiService.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := r.apiService.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 201 {\n\t\t\tvar v NotificationWebhook\n\t\t\terr = r.apiService.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = r.apiService.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func CreateAlert(w http.ResponseWriter, r *http.Request) {\n\tparams := mux.Vars(r)\n\tauth := r.Header.Get(\"X-Vault-Auth\")\n\tif tokens.Search(String(auth)) == nil {\n\t\tlog.Printf(\" [x] Token not found\")\n\t\tw.WriteHeader(http.StatusForbidden)\n\t\treturn\n\t}\n\tif len(params[\"id\"]) > 0 {\n\t\tvar alert Alert\n\t\t_ = json.NewDecoder(r.Body).Decode(&alert)\n\t\talert.ID = params[\"id\"]\n\t\tamqpCaller(alert)\n\t}\n}", "func testPostWebhook(p bytes.Buffer) {\n\tresp, _ := http.PostForm(\n\t\t\"\",\n\t\turl.Values{\"payload_json\": {p.String()}},\n\t)\n\n\tbody, _ := ioutil.ReadAll(resp.Body)\n\tdefer resp.Body.Close()\n\tfmt.Println(string(body))\n}", "func (c *MockWebhookClient) CreateWebhook(ctx context.Context, repo bitbucket.Repo, hook bitbucket.Webhook) (result bitbucket.Webhook, err error) {\n\treturn c.MockCreateWebhook(ctx, repo, hook)\n}", "func (m *HookManager) Create(r *Hook) error {\n\treturn m.post(m.uri(\"hooks\"), r)\n}", "func DeleteWebhook(id int) error {\n\tlog.Traceln(\"Deleting webhook\")\n\n\ttx, err := _db.Begin()\n\tif err != nil {\n\t\treturn err\n\t}\n\tstmt, err := tx.Prepare(\"DELETE FROM webhooks WHERE id = ?\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer stmt.Close()\n\n\tresult, err := stmt.Exec(id)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif rowsDeleted, _ := result.RowsAffected(); rowsDeleted == 0 {\n\t\t_ = tx.Rollback()\n\t\treturn errors.New(fmt.Sprint(id) + \" not found\")\n\t}\n\n\tif err = tx.Commit(); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func New(\n\tctx context.Context,\n\tcontrollers []interface{},\n) (webhook *Webhook, err error) {\n\n\t// ServeMux.Handle panics on duplicate paths\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\terr = fmt.Errorf(\"error creating webhook %v\", r)\n\t\t}\n\t}()\n\n\topts := GetOptions(ctx)\n\tif opts == nil {\n\t\treturn nil, errors.New(\"context must have Options specified\")\n\t}\n\tlogger := logging.FromContext(ctx)\n\n\tif opts.StatsReporter == nil {\n\t\treporter, err := NewStatsReporter()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\topts.StatsReporter = reporter\n\t}\n\n\tdefaultTLSMinVersion := uint16(tls.VersionTLS13)\n\tif opts.TLSMinVersion == 0 {\n\t\topts.TLSMinVersion = TLSMinVersionFromEnv(defaultTLSMinVersion)\n\t} else if opts.TLSMinVersion != tls.VersionTLS12 && opts.TLSMinVersion != tls.VersionTLS13 {\n\t\treturn nil, fmt.Errorf(\"unsupported TLS version: %d\", opts.TLSMinVersion)\n\t}\n\n\tsyncCtx, cancel := context.WithCancel(context.Background())\n\n\twebhook = &Webhook{\n\t\tOptions: *opts,\n\t\tLogger: logger,\n\t\tsynced: cancel,\n\t}\n\n\tif opts.SecretName != \"\" {\n\t\t// Injection is too aggressive for this case because by simply linking this\n\t\t// library we force consumers to have secret access. If we require that one\n\t\t// of the admission controllers' informers *also* require the secret\n\t\t// informer, then we can fetch the shared informer factory here and produce\n\t\t// a new secret informer from it.\n\t\tsecretInformer := kubeinformerfactory.Get(ctx).Core().V1().Secrets()\n\n\t\twebhook.tlsConfig = &tls.Config{\n\t\t\tMinVersion: opts.TLSMinVersion,\n\n\t\t\t// If we return (nil, error) the client sees - 'tls: internal error\"\n\t\t\t// If we return (nil, nil) the client sees - 'tls: no certificates configured'\n\t\t\t//\n\t\t\t// We'll return (nil, nil) when we don't find a certificate\n\t\t\tGetCertificate: func(*tls.ClientHelloInfo) (*tls.Certificate, error) {\n\t\t\t\tsecret, err := secretInformer.Lister().Secrets(system.Namespace()).Get(opts.SecretName)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlogger.Errorw(\"failed to fetch secret\", zap.Error(err))\n\t\t\t\t\treturn nil, nil\n\t\t\t\t}\n\t\t\t\twebOpts := GetOptions(ctx)\n\t\t\t\tsKey, sCert := getSecretDataKeyNamesOrDefault(webOpts.ServerPrivateKeyName, webOpts.ServerCertificateName)\n\t\t\t\tserverKey, ok := secret.Data[sKey]\n\t\t\t\tif !ok {\n\t\t\t\t\tlogger.Warn(\"server key missing\")\n\t\t\t\t\treturn nil, nil\n\t\t\t\t}\n\t\t\t\tserverCert, ok := secret.Data[sCert]\n\t\t\t\tif !ok {\n\t\t\t\t\tlogger.Warn(\"server cert missing\")\n\t\t\t\t\treturn nil, nil\n\t\t\t\t}\n\t\t\t\tcert, err := tls.X509KeyPair(serverCert, serverKey)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\treturn &cert, nil\n\t\t\t},\n\t\t}\n\t}\n\n\twebhook.mux.HandleFunc(\"/\", func(w http.ResponseWriter, r *http.Request) {\n\t\thttp.Error(w, fmt.Sprint(\"no controller registered for: \", html.EscapeString(r.URL.Path)), http.StatusBadRequest)\n\t})\n\n\tfor _, controller := range controllers {\n\t\tswitch c := controller.(type) {\n\t\tcase AdmissionController:\n\t\t\thandler := admissionHandler(logger, opts.StatsReporter, c, syncCtx.Done())\n\t\t\twebhook.mux.Handle(c.Path(), handler)\n\n\t\tcase ConversionController:\n\t\t\thandler := conversionHandler(logger, opts.StatsReporter, c)\n\t\t\twebhook.mux.Handle(c.Path(), handler)\n\n\t\tdefault:\n\t\t\treturn nil, fmt.Errorf(\"unknown webhook controller type: %T\", controller)\n\t\t}\n\t}\n\n\treturn\n}", "func NewProjectWebhookID(customerID string, ProjectID string) string {\n\treturn hash.Values(customerID, ProjectID)\n}", "func createurl(w http.ResponseWriter, r *http.Request) {\n\tvar url Myurl\n\tjson.NewDecoder(r.Body).Decode(&url)\n\thd := hashids.NewData()\n\th, _ := hashids.NewWithData(hd)\n\tnow := time.Now()\n\turl.ID, _ = h.Encode([]int{int(now.Unix())})\n\turl.ShortURL = \"http://localhost:8080/\" + url.ID\n\tdb.Create(&url)\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(url)\n}", "func WebhookHandler(w http.ResponseWriter, r *http.Request, reconciler gitopsconfig.Reconciler) {\n\tlog.Info(\"received webhook call\")\n\tif r.Method != \"POST\" {\n\t\tlog.Info(\"webhook handler only accepts the POST method\", \"sent_method\", r.Method)\n\t\tw.WriteHeader(405)\n\t\treturn\n\t}\n\n\tpayload, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tlog.Error(err, \"error reading webhook request body\")\n\t\treturn\n\t}\n\tdefer r.Body.Close()\n\n\twebHookEvent, err := github.ParseWebHook(github.WebHookType(r), payload)\n\tif err != nil {\n\t\tlog.Error(err, \"error parsing webhook event payload\")\n\t\treturn\n\t}\n\n\tswitch e := webHookEvent.(type) {\n\tcase *github.PushEvent:\n\t\t// A commit push was received, determine if there is are GitOpsConfigs that match the event\n\t\t// The repository url and Git ref must match for the templateSource or parameterSource\n\t\t{\n\t\t\tlist, err := reconciler.GetAll()\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(err, \"error getting the list of GitOpsConfigs\")\n\t\t\t\tw.WriteHeader(500)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\ttargetList := gitopsv1alpha1.GitOpsConfigList{\n\t\t\t\tTypeMeta: list.TypeMeta,\n\t\t\t\tListMeta: list.ListMeta,\n\t\t\t\tItems: make([]gitopsv1alpha1.GitOpsConfig, 0, len(list.Items)),\n\t\t\t}\n\n\t\t\tfor _, instance := range list.Items {\n\t\t\t\tif !gitopsconfig.ContainsTrigger(&instance, \"Webhook\") {\n\t\t\t\t\tlog.Info(\"skip instance without webhook trigger\", \"instance_name\", instance.Name)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tlog.Info(\"comparing instance and event metadata\", \"event_name\", e.Repo.GetFullName(), \"event_ref\", e.GetRef(),\n\t\t\t\t\t\"template_uri\", instance.Spec.TemplateSource.URI, \"template_ref\", instance.Spec.TemplateSource.Ref,\n\t\t\t\t\t\"parameter_uri\", instance.Spec.ParameterSource.URI, \"parameter_ref\", instance.Spec.ParameterSource.Ref)\n\n\t\t\t\tif !repoURLAndRefMatch(&instance, e) {\n\t\t\t\t\tlog.Info(\"skip instance without matching repo url or git ref of the event\", \"instance_name\", instance.Name)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tlog.Info(\"found matching instance\", \"instance_name\", instance.Name)\n\t\t\t\ttargetList.Items = append(targetList.Items, instance)\n\t\t\t}\n\n\t\t\tif len(targetList.Items) == 0 {\n\t\t\t\tlog.Info(\"no gitopsconfigs match the webhook event\", \"event_repo\", e.Repo.GetFullName(), \"event_ref\", strings.TrimPrefix(e.GetRef(), \"refs/heads/\"))\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tfor _, instance := range targetList.Items {\n\t\t\t\t//if secured discard those that do not validate\n\t\t\t\tsecret := getWebhookSecret(&instance)\n\t\t\t\tif secret != \"\" {\n\t\t\t\t\t_, err := github.ValidatePayload(r, []byte(secret))\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.Error(err, \"webhook payload could not be validated with instance secret --> ignoring\", \"instance\", instance.GetName(), \"namespace\", instance.GetNamespace())\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tlog.Info(\"Webhook triggering job\", \"instance\", instance.GetName(), \"namespace\", instance.GetNamespace())\n\t\t\t\t_, err := reconciler.CreateJob(\"create\", &instance)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Error(err, \"Webhook unable to create job for instance\", \"instance\", instance.GetName(), \"namespace\", instance.GetNamespace())\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\tdefault:\n\t\t{\n\t\t\tlog.Info(\"unknown event type\", \"type\", github.WebHookType(r))\n\t\t\treturn\n\t\t}\n\t}\n\tlog.Info(\"webhook handling concluded correctly\")\n}", "func HandleRoot(w http.ResponseWriter, r *http.Request) {\n\tif r.Method == \"POST\" {\n\t\twh := Webhook{}\n\t\terr := json.NewDecoder(r.Body).Decode(&wh)\n\t\tif err != nil {\n\t\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\tid, err := Db.Add(wh)\n\t\tif err != nil {\n\t\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\t\tfmt.Fprint(w, id)\n\t} else {\n\t\thttp.Error(w, \"Not implemted\", http.StatusBadRequest)\n\t}\n}", "func (a *Client) PostV1ServicesTypeIncomingWebhook(params *PostV1ServicesTypeIncomingWebhookParams, authInfo runtime.ClientAuthInfoWriter) (*PostV1ServicesTypeIncomingWebhookCreated, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewPostV1ServicesTypeIncomingWebhookParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"PostV1ServicesTypeIncomingWebhook\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/v1/services/?type=incoming-webhook\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &PostV1ServicesTypeIncomingWebhookReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*PostV1ServicesTypeIncomingWebhookCreated), nil\n\n}", "func CreateAPI(reqBody *APIReqBody) (string, error) {\n\treq, err := creatHTTPPOSTAPIRequest(publisherAPIEndpoint, reqBody)\n\tvar resBody APICreateResp\n\terr = send(CreateAPIContext, req, &resBody, http.StatusCreated)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn resBody.ID, nil\n}", "func (e *EventAPI) Create(eventType *EventType) error {\n\tconst errMsg = \"unable to create event type\"\n\n\tresponse, err := e.client.httpPOST(e.backOffConf.create(), e.eventBaseURL(), eventType, errMsg)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer response.Body.Close()\n\n\tif response.StatusCode != http.StatusCreated {\n\t\tbuffer, err := io.ReadAll(response.Body)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"%s: unable to read response body\", errMsg)\n\t\t}\n\t\treturn decodeResponseToError(buffer, errMsg)\n\t}\n\n\treturn nil\n}", "func (client *WebhooksClient) pingCreateRequest(ctx context.Context, resourceGroupName string, registryName string, webhookName string, options *WebhooksClientPingOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerRegistry/registries/{registryName}/webhooks/{webhookName}/ping\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif registryName == \"\" {\n\t\treturn nil, errors.New(\"parameter registryName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{registryName}\", url.PathEscape(registryName))\n\tif webhookName == \"\" {\n\t\treturn nil, errors.New(\"parameter webhookName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{webhookName}\", url.PathEscape(webhookName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (d *Daemon) createHandler(w *rest.ResponseWriter, r *rest.Request) {\n\terr := r.ParseForm()\n\tif err != nil {\n\t\tApiResponse(w, 500, \"BAD_REQUEST\")\n\t\treturn\n\t}\n\n\tvar id string\n\tvar blockType string\n\tfType, typeExists := r.Form[\"blockType\"]\n\tfID, idExists := r.Form[\"id\"]\n\n\tif typeExists == false {\n\t\tApiResponse(w, 500, \"MISSING_BLOCKTYPE\")\n\t\treturn\n\t} else {\n\t\tblockType = fType[0]\n\t}\n\n\t_, inLibrary := blocks.Library[blockType]\n\tif inLibrary == false {\n\t\tApiResponse(w, 500, \"INVALID_BLOCKTYPE\")\n\t\treturn\n\t}\n\n\tif idExists == false {\n\t\tid = <-idChan\n\t} else {\n\n\t\tif len(strings.TrimSpace(fID[0])) == 0 {\n\t\t\tApiResponse(w, 500, \"BAD_BLOCK_ID\")\n\t\t\treturn\n\t\t}\n\n\t\t_, notUnique := d.blockMap[fID[0]]\n\t\tif notUnique == true {\n\t\t\tApiResponse(w, 500, \"BLOCK_ID_ALREADY_EXISTS\")\n\t\t\treturn\n\t\t} else {\n\t\t\tid = fID[0]\n\t\t}\n\t}\n\n\td.CreateBlock(blockType, id)\n\n\tApiResponse(w, 200, \"BLOCK_CREATED\")\n}", "func New(req *http.Request) (hook *Hook, err error) {\n\thook = new(Hook)\n\tif !strings.EqualFold(req.Method, \"POST\") {\n\t\treturn nil, errors.New(\"unknown method\")\n\t}\n\n\tif hook.Signature = req.Header.Get(\"X-ChatWorkWebhookSignature\"); len(hook.Signature) == 0 {\n\t\treturn nil, errors.New(\"no signature\")\n\t}\n\n\thook.RawPayload, err = ioutil.ReadAll(req.Body)\n\treturn\n}", "func (g *Gitlab) CreateWebHook(cfg *api.SCMConfig, repoURL string, webHook *scm.WebHook) error {\n\tif webHook == nil || len(webHook.Url) == 0 || len(webHook.Events) == 0 {\n\t\treturn fmt.Errorf(\"The webhook %v is not correct\", webHook)\n\t}\n\n\tclient, err := newGitlabClient(cfg.Server, cfg.Username, cfg.Token)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tenableState, disableState := true, false\n\t// Push event is enable for Gitlab webhook in default, so need to remove this default option.\n\thook := gitlab.AddProjectHookOptions{\n\t\tPushEvents: &disableState,\n\t}\n\n\tfor _, e := range webHook.Events {\n\t\tswitch e {\n\t\tcase scm.PullRequestEventType:\n\t\t\thook.MergeRequestsEvents = &enableState\n\t\tcase scm.PullRequestCommentEventType:\n\t\t\thook.NoteEvents = &enableState\n\t\tcase scm.PushEventType:\n\t\t\thook.PushEvents = &enableState\n\t\tcase scm.TagReleaseEventType:\n\t\t\thook.TagPushEvents = &enableState\n\t\tdefault:\n\t\t\tlog.Errorf(\"The event type %s is not supported, will be ignored\", e)\n\t\t\treturn nil\n\t\t}\n\t}\n\thook.URL = &webHook.Url\n\n\tonwer, name := parseURL(repoURL)\n\t_, _, err = client.Projects.AddProjectHook(onwer+\"/\"+name, &hook)\n\treturn err\n}", "func CreateShaEndpoint(w http.ResponseWriter, req *http.Request) {\n if req.Body == nil {\n errorHandler(w, req, http.StatusBadRequest)\n return\n }\n var r MessageRequest\n _ = json.NewDecoder(req.Body).Decode(&r)\n err := r.Validate(w, req)\n if err != nil {\n errorHandler(w, req, http.StatusBadRequest)\n return\n }\n\n //hash digest\n h := sha256.New()\n h.Write([]byte(r.Msg))\n sha256_hash := hex.EncodeToString(h.Sum(nil))\n s := Sha_256{Digest: sha256_hash}\n mutex.Lock()\n digests[s] = r\n mutex.Unlock()\n json.NewEncoder(w).Encode(s)\n}", "func registerWebhookAPIs(ws *restful.WebService) {\n\tws.Route(ws.POST(\"/{service_id}/webhook_github\").\n\t\tTo(webhookGithub).\n\t\tDoc(\"webhook from github\").\n\t\tParam(ws.PathParameter(\"service_id\", \"identifier of the service\").DataType(\"string\")).\n\t\tReads(api.WebhookGithub{}).\n\t\tWrites(api.WebhookResponse{}))\n\n\tws.Route(ws.POST(\"/{service_id}/webhook_gitlab\").\n\t\tTo(webhookGitLab).\n\t\tDoc(\"webhook from gitlab\").\n\t\tParam(ws.PathParameter(\"service_id\", \"identifier of the service\").DataType(\"string\")).\n\t\tReads(api.WebhookGitlab{}).\n\t\tWrites(api.WebhookResponse{}))\n\n\tws.Route(ws.POST(\"/{service_id}/webhook_svn\").\n\t\tTo(webhookSVN).\n\t\tDoc(\"webhook from svn\").\n\t\tParam(ws.PathParameter(\"service_id\", \"identifier of the service\").DataType(\"string\")).\n\t\tReads(api.WebhookSVN{}).\n\t\tWrites(api.WebhookResponse{}))\n}", "func createPostHandler(res http.ResponseWriter, req *http.Request) {\n\tvar post MongoPostSchema\n\tpost.Timestamp = time.Now()\n\tjson.NewDecoder(req.Body).Decode(&post)\n\n\tpostsCol := client.Database(\"Aviroop_Nandy_Appointy\").Collection(\"posts\")\n\tctx, _ := context.WithTimeout(context.Background(), 15*time.Second)\n\tpostResult, insertErrorPost := postsCol.InsertOne(ctx, post)\n\n\tif insertErrorPost != nil {\n\t\tfmt.Println(\"Error while creating post: \", insertErrorPost)\n\t} else {\n\t\tnewPostID := postResult.InsertedID\n\t\tfmt.Println(\"New post ID: \", newPostID)\n\t}\n\n\tres.Header().Add(\"content-type\", \"application/json\")\n\tres.WriteHeader(http.StatusOK)\n}", "func createHandler(w http.ResponseWriter, r *http.Request) *appError {\n\tvideo, err := videoFromForm(r)\n\tif err != nil {\n\t\treturn appErrorf(err, \"could not parse video from form: %v\", err)\n\t}\n\tid, err := bittube.DB.AddVideo(video)\n\tif err != nil {\n\t\treturn appErrorf(err, \"could not save video: %v\", err)\n\t}\n\t// go publishUpdate(id)\n\thttp.Redirect(w, r, fmt.Sprintf(\"/videos/%d\", id), http.StatusFound)\n\treturn nil\n}", "func CreateHook(ctx *context.APIContext) {\n\t// swagger:operation POST /user/hooks user userCreateHook\n\t// ---\n\t// summary: Create a hook\n\t// consumes:\n\t// - application/json\n\t// produces:\n\t// - application/json\n\t// parameters:\n\t// - name: body\n\t// in: body\n\t// required: true\n\t// schema:\n\t// \"$ref\": \"#/definitions/CreateHookOption\"\n\t// responses:\n\t// \"201\":\n\t// \"$ref\": \"#/responses/Hook\"\n\n\tutils.AddOwnerHook(\n\t\tctx,\n\t\tctx.Doer,\n\t\tweb.GetForm(ctx).(*api.CreateHookOption),\n\t)\n}", "func (c *Controller) createInAPI(uri string, data io.Reader) error {\n\tresp, err := http.Post(uri, \"application/json; charset=utf-8\", data)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif resp.StatusCode != http.StatusCreated {\n\t\tlog.Printf(\"status code received back was not expected during creation\")\n\t}\n\n\treturn nil\n}", "func TestCreateTaskWebhook(t *testing.T) {\n\tdata := []byte(`{\n \"eventType\": \"taskCreated\",\n \"userId\": \"ec1b92fb1868c44aa9a041583c000e2a\",\n \"userFullName\": \"John Doe\",\n \"timestamp\": \"2015-10-20T14:45:06.331Z\",\n \"task\": {\n \"_id\": \"60e8b629fc8d6d28b513807d7d86b133\",\n \"name\": \"Write report\",\n \"description\": \"For school\",\n \"color\": \"green\",\n \"columnId\": \"ff31c6b2374911e49d115f7064763810\",\n \"totalSecondsSpent\": 0,\n \"totalSecondsEstimate\": 0,\n \"swimlaneId\": \"e037a6400e8911e5bdc9053860f3e5c0\",\n \"dates\": [\n {\n \"targetColumnId\": \"ff31c6b4374911e49d115f7064763810\",\n \"status\": \"active\",\n \"dateType\": \"dueDate\",\n \"dueTimestamp\": \"2015-10-20T15:00:00Z\",\n \"dueTimestampLocal\": \"2015-10-20T17:00:00+02:00\"\n }\n ],\n \"subTasks\": [\n {\n \"name\": \"Proofread\",\n \"finished\": false\n }\n ],\n \"labels\": [\n {\n \"name\": \"Writing\",\n \"pinned\": false\n }\n ]\n }\n }`)\n\n\ts := &CreateTaskWebhook{}\n\tdecodeAndEncodeData(t, data, s)\n}", "func getSetWebhook(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\tif r.Method == \"GET\" {\n\t\tgetResponse := valueStringResponse{Success: true, Value: config.Config.WebHookURL}\n\n\t\t// I can't see any way this will fail\n\t\tjs, _ := json.Marshal(getResponse)\n\t\tw.Write(js)\n\t} else if r.Method == \"POST\" {\n\t\terr := r.ParseForm()\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tconfig.Config.WebHookURL = r.PostForm.Get(\"value\")\n\t\tconfig.SaveConfig()\n\t\tpostResponse := valueStringResponse{Success: true, Value: config.Config.WebHookURL}\n\n\t\tjs, _ := json.Marshal(postResponse)\n\t\tw.Write(js)\n\t}\n}", "func createServicePostHook(event *api.Event) {\n\tlogdog.Infof(\"create service post hook\")\n\tif event.Service.Repository.Status == api.RepositoryAccepted {\n\t\tif event.Status == api.EventStatusSuccess {\n\t\t\tevent.Service.Repository.Status = api.RepositoryHealthy\n\t\t} else {\n\t\t\tevent.Service.Repository.Status = api.RepositoryMissing\n\t\t}\n\t}\n\n\tds := store.NewStore()\n\tdefer ds.Close()\n\n\tif err := ds.UpdateRepositoryStatus(event.Service.ServiceID, event.Service.Repository.Status); err != nil {\n\t\tevent.Service.Repository.Status = api.RepositoryInternalError\n\t\tlogdog.Errorf(\"Unable to update repository status in post hook for %+v: %v\\n\", event.Service, err)\n\t}\n\n\tif remote, err := remoteManager.FindRemote(event.Service.Repository.Webhook); err == nil &&\n\t\tevent.Service.Repository.Status == api.RepositoryHealthy {\n\t\tif err := remote.CreateHook(&event.Service); err != nil {\n\t\t\tlogdog.Error(\"create hook failed\", logdog.Fields{\"user_id\": event.Service.UserID, \"error\": err})\n\t\t}\n\t}\n\n\tautoPublishVersion(&event.Service)\n}", "func New(mgr manager.Manager, args Args) (*Webhook, error) {\n\tlogger := log.Log.WithName(args.Name).WithValues(\"provider\", args.Provider)\n\n\t// Create handler\n\tbuilder := NewBuilder(mgr, logger)\n\n\tfor val, objs := range args.Validators {\n\t\tbuilder.WithValidator(val, objs...)\n\t}\n\n\tfor mut, objs := range args.Mutators {\n\t\tbuilder.WithMutator(mut, objs...)\n\t}\n\n\tbuilder.WithPredicates(args.Predicates...)\n\n\thandler, err := builder.Build()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Create webhook\n\tlogger.Info(\"Creating webhook\")\n\n\treturn &Webhook{\n\t\tPath: args.Path,\n\t\tWebhook: &admission.Webhook{Handler: handler},\n\t}, nil\n}", "func (s *eventServer) Create(ctx context.Context, in *eventPb.CreateRequest) (*eventPb.CreateReply, error) {\n\tid := uuid.Must(uuid.NewV4()).String()\n\n\tidentity := &identityPb.Identity{}\n\tproto.Unmarshal(in.Data, identity)\n\tdata[in.ProcessId] = identity\n\tfmt.Printf(\"Create Event Called %s: %s\\n\", id, data[in.ProcessId].PhoneNumber)\n\treturn &eventPb.CreateReply{Id: id}, nil\n}", "func (u *Projects) Webhook(c echo.Context) error {\n\tpc, ok := c.(*middlewares.ProjectContext)\n\tif !ok {\n\t\terr := errors.New(\"Can not cast context\")\n\t\tlogging.SharedInstance().ControllerWithStacktrace(err, c).Error(err)\n\t\treturn err\n\t}\n\tp := pc.Project\n\n\tr, err := board.ProjectRepository(p)\n\tif err != nil {\n\t\tlogging.SharedInstance().Controller(c).Error(err)\n\t\treturn NewJSONError(err, http.StatusNotFound, c)\n\t}\n\ttoken, _ := board.OauthTokenFromProject(p)\n\terr = r.CreateWebhook(token)\n\tif err != nil {\n\t\tlogging.SharedInstance().ControllerWithStacktrace(err, c).Errorf(\"failed to create webhook: %v\", err)\n\t\treturn err\n\t}\n\tlogging.SharedInstance().Controller(c).Info(\"success to create webhook\")\n\treturn c.JSON(http.StatusOK, nil)\n}", "func (client *WebhooksClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, registryName string, webhookName string, options *WebhooksClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerRegistry/registries/{registryName}/webhooks/{webhookName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif registryName == \"\" {\n\t\treturn nil, errors.New(\"parameter registryName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{registryName}\", url.PathEscape(registryName))\n\tif webhookName == \"\" {\n\t\treturn nil, errors.New(\"parameter webhookName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{webhookName}\", url.PathEscape(webhookName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treturn req, nil\n}", "func createNewBlog(c blogpb.BlogServiceClient, blog *blogpb.Blog) {\n\tblogRes, err := c.CreateBlog(context.Background(), &blogpb.CreateBlogRequest{\n\t\tBlog: blog,\n\t})\n\tif err == nil {\n\t\tfmt.Printf(\"%+v\\n\\n\", blogRes.GetBlog())\n\t\tblog.Id = blogRes.Blog.Id\n\t} else {\n\t\tfmt.Println(err)\n\t}\n}", "func PostWebhooks(diagnostic structs.DiagnosticSpec, status string, promotestatus string, isCron bool, result structs.ResultSpec) error {\n\t// No configured webhook destinations\n\tif diagnostic.WebhookURLs == \"\" {\n\t\treturn nil\n\t}\n\n\t// Assemble the webhook payload\n\tpayload := WebhookPayload{\n\t\tJob: diagnostic.JobSpace + \"/\" + diagnostic.Job,\n\t\tTarget: diagnostic.App + \"-\" + diagnostic.Space,\n\t\tStatus: status,\n\t\tIsPreview: diagnostic.IsPreview,\n\t\tIsCron: isCron,\n\t\tLogURL: os.Getenv(\"LOG_URL\") + \"/logs/\" + diagnostic.RunID,\n\t\tKibanaURL: os.Getenv(\"KIBANA_URL\") + \"/app/kibana#/doc/logs/logs/run/?id=\" + diagnostic.RunID,\n\t\tArtifactsURL: os.Getenv(\"ARTIFACTS_URL\") + \"/v1/artifacts/\" + diagnostic.RunID + \"/\",\n\t\tRerunURL: os.Getenv(\"RERUN_URL\") + \"?space=\" + diagnostic.Space + \"&app=\" + diagnostic.App + \"&action=\" + diagnostic.Action + \"&result=\" + diagnostic.Result + \"&releaseid=\" + diagnostic.ReleaseID + \"&buildid=\" + diagnostic.BuildID,\n\t\tCommitAuthor: diagnostic.CommitAuthor,\n\t\tStartTime: result.Payload.StartTime,\n\t\tStopTime: result.Payload.StopTime,\n\t\tRunDurationMs: result.Payload.BuildTimeMillis,\n\t\tPromotionResults: PromotionResults{},\n\t}\n\n\tif diagnostic.GithubVersion != \"\" {\n\t\tpayload.GithubVersion = diagnostic.GithubVersion\n\t}\n\n\tif status != \"success\" {\n\t\tpayload.PromotionResults.Message = \"No promotion triggered - tests not successful\"\n\t} else if diagnostic.PipelineName == \"manual\" {\n\t\tpayload.PromotionResults.Message = \"No promotion triggered - set to manual\"\n\t\tpayload.PromotionResults.Pipeline = diagnostic.PipelineName\n\t} else {\n\t\tpayload.PromotionResults.Message = \"Promotion was triggered with result \" + promotestatus\n\t\tpayload.PromotionResults.Status = promotestatus\n\t\tpayload.PromotionResults.From = diagnostic.TransitionFrom\n\t\tpayload.PromotionResults.To = diagnostic.TransitionTo\n\t\tpayload.PromotionResults.Pipeline = diagnostic.PipelineName\n\t}\n\n\t// Send message to each hook URL\n\tfor _, hookURL := range strings.Split(diagnostic.WebhookURLs, \",\") {\n\t\tpayloadBytes, err := json.Marshal(payload)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\treturn err\n\t\t}\n\n\t\tif !strings.HasPrefix(hookURL, \"http://\") && !strings.HasPrefix(hookURL, \"https://\") {\n\t\t\thookURL = \"https://\" + hookURL\n\t\t}\n\n\t\treq, err := http.NewRequest(\"POST\", hookURL, bytes.NewBuffer(payloadBytes))\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\treturn err\n\t\t}\n\t\treq.Header.Add(\"Content-type\", \"application/json\")\n\n\t\tclient := http.Client{}\n\t\t_, err = client.Do(req)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\treturn err\n\t\t}\n\n\t\t// If we ever want to save the result and do something with it\n\t\t// defer resp.Body.Close()\n\t\t// bodybytes, err := ioutil.ReadAll(resp.Body)\n\t\t// if err != nil {\n\t\t// \tfmt.Println(err)\n\t\t// \treturn err\n\t\t// }\n\t\t// fmt.Println(string(bodybytes))\n\t\t// fmt.Println(resp.status)\n\t}\n\treturn nil\n}", "func (trello *Trello) EnsureHook(callbackURL string) {\n /* Check if we have a hook already */\n var data []webhookInfo\n GenGET(trello, \"/token/\" + trello.Token + \"/webhooks/\", &data)\n found := false\n\n for _, v := range data {\n /* Check if we have a hook for our own URL at same model */\n if v.Model == trello.BoardId {\n if v.URL == callbackURL {\n log.Print(\"Hook found, nothing to do here.\")\n found = true\n break\n }\n }\n }\n\n /* If not, install one */\n if !found {\n /* TODO: save hook reference and uninstall maybe? */\n GenPOSTForm(trello, \"/webhooks/\", nil, url.Values{\n \"name\": { \"trellohub for \" + trello.BoardId },\n \"idModel\": { trello.BoardId },\n \"callbackURL\": { callbackURL } })\n\n log.Print(\"Webhook installed.\")\n } else {\n log.Print(\"Reusing existing webhook.\")\n }\n}", "func newWebhookNotify(accountID string) (*logrus.Logger, error) {\n\trNotify := serverConfig.Notify.GetWebhookByID(accountID)\n\tif rNotify.Endpoint == \"\" {\n\t\treturn nil, errInvalidArgument\n\t}\n\n\tif err := lookupEndpoint(rNotify.Endpoint); err != nil {\n\t\treturn nil, err\n\t}\n\n\tconn := httpConn{\n\t\t// Configure aggressive timeouts for client posts.\n\t\tClient: &http.Client{\n\t\t\tTransport: &http.Transport{\n\t\t\t\tTLSClientConfig: &tls.Config{RootCAs: globalRootCAs},\n\t\t\t\tDialContext: (&net.Dialer{\n\t\t\t\t\tTimeout: 5 * time.Second,\n\t\t\t\t\tKeepAlive: 5 * time.Second,\n\t\t\t\t}).DialContext,\n\t\t\t\tTLSHandshakeTimeout: 3 * time.Second,\n\t\t\t\tResponseHeaderTimeout: 3 * time.Second,\n\t\t\t\tExpectContinueTimeout: 2 * time.Second,\n\t\t\t},\n\t\t},\n\t\tEndpoint: rNotify.Endpoint,\n\t}\n\n\tnotifyLog := logrus.New()\n\tnotifyLog.Out = ioutil.Discard\n\n\t// Set default JSON formatter.\n\tnotifyLog.Formatter = new(logrus.JSONFormatter)\n\n\tnotifyLog.Hooks.Add(conn)\n\n\t// Success\n\treturn notifyLog, nil\n}", "func (store *Engine) CreateRequest(request *Request) (string, error) {\n\tvar id struct {\n\t\tID string `json:\"id\"`\n\t}\n\n\t_, err := store.api.\n\t\tURL(\"/workflow-engine/api/v1/requests\").\n\t\tPost(&request, &id)\n\n\treturn id.ID, err\n}", "func unmarshalCreateBottlePayload(ctx context.Context, service *goa.Service, req *http.Request) error {\n\tpayload := &createBottlePayload{}\n\tif err := service.DecodeRequest(req, payload); err != nil {\n\t\treturn err\n\t}\n\tif err := payload.Validate(); err != nil {\n\t\t// Initialize payload with private data structure so it can be logged\n\t\tgoa.ContextRequest(ctx).Payload = payload\n\t\treturn err\n\t}\n\tgoa.ContextRequest(ctx).Payload = payload.Publicize()\n\treturn nil\n}", "func APIProjectWebhookTestHandler(er *Errorly) http.HandlerFunc {\n\treturn func(rw http.ResponseWriter, r *http.Request) {\n\t\tsession, _ := er.Store.Get(r, sessionName)\n\t\tdefer er.SaveSession(session, r, rw)\n\n\t\tvars := mux.Vars(r)\n\n\t\twebhookID := vars[\"webhook_id\"]\n\n\t\t// Authenticate the user\n\t\tauth, user := er.AuthenticateSession(session)\n\t\tif !auth {\n\t\t\tpassResponse(rw, \"You must be logged in to do this\", false, http.StatusForbidden)\n\n\t\t\treturn\n\t\t}\n\n\t\tproject, viewable, elevated, ok := verifyProjectVisibility(er, rw, vars, user, auth, true)\n\t\tif !ok {\n\t\t\t// If ok is False, an error has already been provided to the ResponseWriter so we should just return\n\t\t\treturn\n\t\t}\n\n\t\tif !viewable {\n\t\t\t// No permission to view project. We will treat like the project\n\t\t\t// does not exist.\n\t\t\tpassResponse(rw, \"Could not find this project\", false, http.StatusBadRequest)\n\n\t\t\treturn\n\t\t}\n\n\t\tif !elevated {\n\t\t\t// No permission to execute on project. We will simply tell them\n\t\t\t// they cannot do this.\n\t\t\tpassResponse(rw, \"Guests to a project cannot do this\", false, http.StatusForbidden)\n\n\t\t\treturn\n\t\t}\n\n\t\twebhook := &structs.Webhook{}\n\n\t\terr := er.Postgres.Model(webhook).\n\t\t\tWhere(\"id = ?\", webhookID).\n\t\t\tWhere(\"project_id = ?\", project.ID).\n\t\t\tSelect()\n\t\tif err != nil {\n\t\t\tif errors.Is(err, pg.ErrNoRows) {\n\t\t\t\tpassResponse(rw, \"Invalid webhook passed\", false, http.StatusBadRequest)\n\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// Unexpected error\n\t\t\tpassResponse(rw, err.Error(), false, http.StatusInternalServerError)\n\n\t\t\treturn\n\t\t}\n\n\t\ttestPayload := structs.WebhookMessage{\n\t\t\tType: structs.TestWebhook,\n\t\t}\n\n\t\tok, err = er.DoWebhook(webhook, testPayload)\n\t\tif !ok || err != nil {\n\t\t\twebhook.Failures++\n\t\t} else {\n\t\t\twebhook.Failures = 0\n\t\t}\n\n\t\tif webhook.Failures >= 5 {\n\t\t\twebhook.Active = false\n\t\t} else {\n\t\t\twebhook.Active = true\n\t\t}\n\n\t\t_, err = er.Postgres.Model(webhook).\n\t\t\tWherePK().\n\t\t\tUpdate()\n\t\tif err != nil {\n\t\t\tpassResponse(rw, err.Error(), false, http.StatusInternalServerError)\n\n\t\t\treturn\n\t\t}\n\n\t\tresp := structs.WebhookTest{\n\t\t\tOK: ok,\n\t\t\tWebhook: webhook,\n\t\t}\n\n\t\tif err != nil {\n\t\t\tresp.Error = err.Error()\n\t\t}\n\n\t\tpassResponse(rw, resp, true, http.StatusOK)\n\t}\n}", "func createVersionPostHook(event *api.Event) {\n\tlogdog.Infof(\"create version post hook\")\n\tif event.Status == api.EventStatusSuccess {\n\t\tevent.Version.Status = api.VersionHealthy\n\t} else if event.Status == api.EventStatusCancel {\n\t\tevent.Version.Status = api.VersionCancel\n\t} else {\n\t\tevent.Version.Status = api.VersionFailed\n\t\tevent.Version.ErrorMessage = event.ErrorMessage\n\t}\n\n\toperation := string(event.Version.Operation)\n\t// Record that whether this event is a deploy for project. According this flag, we will make some special operations.\n\tDeployInProject := false\n\tif (operation == string(api.DeployOperation)) && (event.Version.ProjectVersionID != \"\") {\n\t\tDeployInProject = true\n\t}\n\n\tds := store.NewStore()\n\tdefer ds.Close()\n\n\tif err := ds.UpdateVersionDocument(event.Version.VersionID, event.Version); err != nil {\n\t\tlogdog.Errorf(\"Unable to update version status post hook for %+v: %v\", event.Version, err)\n\t}\n\n\tif remote, err := remoteManager.FindRemote(event.Service.Repository.Webhook); err == nil {\n\t\tif err := remote.PostCommitStatus(&event.Service, &event.Version); err != nil {\n\t\t\tlogdog.Errorf(\"Unable to post commit status to %s: %v\", event.Service.Repository.Webhook, err)\n\t\t}\n\t}\n\n\tif DeployInProject == false {\n\t\tif event.Version.Status == api.VersionHealthy {\n\t\t\tif err := ds.AddNewVersion(event.Version.ServiceID, event.Version.VersionID); err != nil {\n\t\t\t\tlogdog.Errorf(\"Unable to add new version in post hook for %+v: %v\", event.Version, err)\n\t\t\t}\n\t\t} else {\n\t\t\tif err := ds.AddNewFailVersion(event.Version.ServiceID, event.Version.VersionID); err != nil {\n\t\t\t\tlogdog.Errorf(\"Unable to add new version in post hook for %+v: %v\", event.Version, err)\n\t\t\t}\n\t\t}\n\n\t}\n\tif err := ds.UpdateServiceLastInfo(event.Version.ServiceID, event.Version.CreateTime, event.Version.Name); err != nil {\n\t\tlogdog.Errorf(\"Unable to update new version info in service %+v: %v\", event.Version, err)\n\t}\n\n\t// Use for checking project's version deploy status.\n\tif DeployInProject == true {\n\t\tevent.Version.FinalStatus = \"finished\"\n\t}\n\n\t// TODO: poll version log, not query once.\n\tversionLog, err := ds.FindVersionLogByVersionID(event.Version.VersionID)\n\tif err != nil {\n\t\tlogdog.Warnf(\"Notify error, getting version failed: %v\", err)\n\t} else {\n\t\tnotify.Notify(&event.Service, &event.Version, versionLog.Logs)\n\t}\n\n\t// trigger after create end\n\ttriggerHooks(event, PreStopPhase)\n}", "func CreatePostHandler(w http.ResponseWriter, r *http.Request) {\n\tif r.Method != http.MethodPost {\n\t\tw.Write([]byte(\"Only Post.\"))\n\t\treturn\n\t}\n\tvar post data.Post\n\terr := json.NewDecoder(r.Body).Decode(&post)\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn\n\t}\n\tuser, err := auth.GetSignInUser(r)\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn\n\t}\n\tpost.UserID = user.UserID\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\terr = post.Save()\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn\n\t}\n\treturnMsg := fmt.Sprintf(\"Created Post(ID: %d)\", post.ID)\n\tw.Write([]byte(returnMsg))\n\treturn\n}", "func (a *Client) GetWebhooksID(params *GetWebhooksIDParams, authInfo runtime.ClientAuthInfoWriter) (*GetWebhooksIDOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewGetWebhooksIDParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"GetWebhooksID\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/webhooks/{id}\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &GetWebhooksIDReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*GetWebhooksIDOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for GetWebhooksID: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "func (c *Client) TimestampCreate(ctx context.Context, hash string, options *CreateOptions) (*TimestampResponse, error) {\n\n\ttype createRequest struct {\n\t\tComment string `json:\"comment,omitempty\"`\n\t\tHash string `json:\"hash\"`\n\t\tNotifications []Notification `json:\"notifications,omitempty\"`\n\t\tURL string `json:\"url,omitempty\"`\n\t}\n\n\tcReq := &createRequest{\n\t\tHash: hash,\n\t}\n\n\tif options != nil {\n\t\tcReq.Comment = options.Comment\n\t\tcReq.URL = options.URL\n\t\tcReq.Notifications = options.Notifications\n\t}\n\n\tpayload, err := json.Marshal(cReq)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tendpoint := path.Join(\"timestamp\", \"create\")\n\twrapper, err := c.Request(ctx, http.MethodPost, endpoint, bytes.NewReader(payload))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp := &TimestampResponse{}\n\terr = json.Unmarshal(wrapper.Data, resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn resp, nil\n}", "func (a *Client) PutWebhooksID(params *PutWebhooksIDParams, authInfo runtime.ClientAuthInfoWriter) (*PutWebhooksIDOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewPutWebhooksIDParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"PutWebhooksID\",\n\t\tMethod: \"PUT\",\n\t\tPathPattern: \"/webhooks/{id}\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &PutWebhooksIDReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*PutWebhooksIDOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for PutWebhooksID: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "func (c GitHubWebhookController) PostWebhook(ctx *gin.Context) (err error) {\n\n\t// Switch by Request Header\n\tswitch ctx.Request.Header.Get(\"X-GitHub-Event\") {\n\tcase \"pull_request\":\n\t\tpullRequest := PullRequestEvent{}\n\t\terr = ctx.Bind(&pullRequest)\n\t\tif err != nil {\n\t\t\tc.Logger.Error(err.Error())\n\t\t\tctx.JSON(http.StatusInternalServerError, err)\n\t\t\treturn err\n\t\t}\n\t\trequest := domain.GitHubPullRequest{\n\t\t\tOrganization: pullRequest.Repository.Owner.Login,\n\t\t\tRepository: pullRequest.Repository.Name,\n\t\t\tNumber: uint(pullRequest.PullRequest.Number),\n\t\t\tTitle: pullRequest.PullRequest.Title,\n\t\t\tURL: pullRequest.PullRequest.IssueURL,\n\t\t\tSenderUsername: pullRequest.Sender.Login,\n\t\t\tOpenedUsername: pullRequest.PullRequest.User.Login,\n\t\t}\n\n\t\t// Switch by Request Body\n\t\tswitch pullRequest.Action {\n\t\tcase \"opened\", \"reopened\": // user Open/ReOpen PullRequest\n\t\t\tres, err := c.Interactor.OpenPullRequest(request)\n\t\t\tif err != nil {\n\t\t\t\tc.Logger.Error(err.Error())\n\t\t\t\tctx.JSON(http.StatusInternalServerError, err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tctx.JSON(http.StatusOK, res)\n\t\tcase \"closed\":\n\t\t\tswitch pullRequest.PullRequest.Merged {\n\t\t\tcase true:\n\t\t\t\tres, err := c.Interactor.MergePullRequest(domain.GitHubPullRequest{})\n\t\t\t\tif err != nil {\n\t\t\t\t\tc.Logger.Error(err.Error())\n\t\t\t\t\tctx.JSON(http.StatusInternalServerError, err)\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tctx.JSON(http.StatusOK, res)\n\t\t\tcase false:\n\t\t\t\tres, err := c.Interactor.ClosePullRequest(request)\n\t\t\t\tif err != nil {\n\t\t\t\t\tc.Logger.Error(err.Error())\n\t\t\t\t\tctx.JSON(http.StatusInternalServerError, err)\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tctx.JSON(http.StatusOK, res)\n\t\t\t}\n\t\t}\n\n\tcase \"issue_comment\":\n\t\tissue := IssueCommentEvent{}\n\t\terr := ctx.Bind(&issue)\n\t\tif err != nil {\n\t\t\tc.Logger.Error(err.Error())\n\t\t\tctx.JSON(http.StatusInternalServerError, err)\n\t\t\treturn err\n\t\t}\n\t\trequest := domain.GitHubPullRequest{\n\t\t\tOrganization: issue.Repository.Owner.Login,\n\t\t\tRepository: issue.Repository.Name,\n\t\t\tNumber: uint(issue.Issue.Number),\n\t\t\tTitle: issue.Issue.Title,\n\t\t\tURL: issue.Issue.URL,\n\t\t\tSenderUsername: issue.Sender.Login,\n\t\t\tOpenedUsername: issue.Issue.User.Login,\n\t\t}\n\n\t\t// Switch by Request Body\n\t\tswitch issue.Action {\n\t\tcase \"created\": // User created Comment in PullRequest\n\t\t\tcommand := trimNewlineChar(issue.Comment.Body)\n\t\t\tif !strings.HasPrefix(command, \"/\") {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\tcommands := strings.Split(strings.TrimLeft(command, \"/\"), \" \")\n\n\t\t\t// Switch by command\n\t\t\tswitch commands[0] {\n\t\t\tcase \"request\":\n\t\t\t\tres, err := c.Interactor.CommentRequest(request)\n\t\t\t\tif err != nil {\n\t\t\t\t\tc.Logger.Error(err.Error())\n\t\t\t\t\tctx.JSON(http.StatusInternalServerError, err)\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tctx.JSON(http.StatusOK, res)\n\t\t\tcase \"reviewed\":\n\t\t\t\tres, err := c.Interactor.CommentReviewed(request)\n\t\t\t\tif err != nil {\n\t\t\t\t\tc.Logger.Error(err.Error())\n\t\t\t\t\tctx.JSON(http.StatusInternalServerError, err)\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tctx.JSON(http.StatusOK, res)\n\t\t\t}\n\t\t}\n\tdefault:\n\t\tc.Logger.Info(fmt.Sprintf(\"X-GitHub-Event: %s: Skiped.\", ctx.Request.Header.Get(\"X-GitHub-Event\")))\n\t\tctx.JSON(http.StatusForbidden, nil)\n\t}\n\treturn nil\n}", "func createHandler(w http.ResponseWriter, r *http.Request) {\n\n\tlog.Printf(\"CreateHandler Called...\\n\")\n\tw.Header().Add(\"Content-Type\", \"application/json\")\n\tparams := mux.Vars(r)\n\tgameName := params[\"gameName\"]\n\tplayerName := params[\"playerName\"]\n\tdieNum, _ := strconv.Atoi(params[\"dieNum\"])\n\tgameId := storewrapper.GreateUniqueGameId(game_db)\n\tplayerId := storewrapper.GreateUniquePlayerId(player_db, gameId)\n\tgame := NewDiceChessGame(gameId, gameName, playerName, \"\", dieNum)\n\tvalue, err := json.Marshal(game)\n\tif err != nil {\n\t\tlog.Println(\"Failed to parse inputs.\")\n\t\tReturnFailure(w, \"Failed to parse inputs.\")\n\t\treturn\n\t}\n\tgame_db.Set(gameId, string(value), 0)\n\tresp := createResponse{RESPONSE_CREATE, gameId, playerId, gameName, playerName, int(WAITING), strconv.Itoa(dieNum)}\n\tjson.NewEncoder(w).Encode(resp)\n}", "func (o *PostWebhook) GetId() int32 {\n\tif o == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\n\treturn o.Id\n}", "func Webhooks(w http.ResponseWriter, r *http.Request) {\n\tctx := r.Context()\n\tlog.Infof(ctx, \"GET /webhooks\")\n\tvar webhooksObj model.WebhooksObj\n\tmakeWebhooksObj(&webhooksObj, r.URL.Query())\n\tlog.Infof(ctx, \"webhooksObj is: %+v\", webhooksObj)\n\n\tgaeMail := makeGaeMailForWebhooks(ctx, &webhooksObj)\n\tgaeMail.Send()\n}", "func APIProjectWebhookDeleteHandler(er *Errorly) http.HandlerFunc {\n\treturn func(rw http.ResponseWriter, r *http.Request) {\n\t\tsession, _ := er.Store.Get(r, sessionName)\n\t\tdefer er.SaveSession(session, r, rw)\n\n\t\tvars := mux.Vars(r)\n\n\t\twebhookID := vars[\"webhook_id\"]\n\n\t\t// Authenticate the user\n\t\tauth, user := er.AuthenticateSession(session)\n\t\tif !auth {\n\t\t\tpassResponse(rw, \"You must be logged in to do this\", false, http.StatusForbidden)\n\n\t\t\treturn\n\t\t}\n\n\t\tproject, viewable, elevated, ok := verifyProjectVisibility(er, rw, vars, user, auth, true)\n\t\tif !ok {\n\t\t\t// If ok is False, an error has already been provided to the ResponseWriter so we should just return\n\t\t\treturn\n\t\t}\n\n\t\tif !viewable {\n\t\t\t// No permission to view project. We will treat like the project\n\t\t\t// does not exist.\n\t\t\tpassResponse(rw, \"Could not find this project\", false, http.StatusBadRequest)\n\n\t\t\treturn\n\t\t}\n\n\t\tif !elevated {\n\t\t\t// No permission to execute on project. We will simply tell them\n\t\t\t// they cannot do this.\n\t\t\tpassResponse(rw, \"Guests to a project cannot do this\", false, http.StatusForbidden)\n\n\t\t\treturn\n\t\t}\n\n\t\twebhook := &structs.Webhook{}\n\n\t\tres, err := er.Postgres.Model(webhook).\n\t\t\tWhere(\"id = ?\", webhookID).\n\t\t\tWhere(\"project_id = ?\", project.ID).\n\t\t\tDelete()\n\t\tif err != nil {\n\t\t\tif errors.Is(err, pg.ErrNoRows) {\n\t\t\t\tpassResponse(rw, \"Invalid webhook passed\", false, http.StatusBadRequest)\n\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// Unexpected error\n\t\t\tpassResponse(rw, err.Error(), false, http.StatusInternalServerError)\n\n\t\t\treturn\n\t\t}\n\n\t\tif res.RowsAffected() == 0 {\n\t\t\tpassResponse(rw, \"Invalid webhook passed\", false, http.StatusBadRequest)\n\n\t\t\treturn\n\t\t}\n\n\t\tpassResponse(rw, \"OK\", true, http.StatusOK)\n\t}\n}", "func addKey(Writer http.ResponseWriter, Request *http.Request) {\n\tdefer Request.Body.Close()\n\terr := jwt.ValidateToken(Request.Header[\"Authorization\"][0])\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stdout, \"POST\\t\\\\KeyHook\\t\"+string(http.StatusUnauthorized)+\"\\n\")\n\t\tWriter.WriteHeader(http.StatusUnauthorized)\n\t\tWriter.Write([]byte(\"Invalid Token\"))\n\t\treturn\n\t}\n\n\taddRequest := keyHookRequest{}\n\terr = json.NewDecoder(Request.Body).Decode(&addRequest)\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, err.Error()+\"\\n\")\n\t\tfmt.Fprintf(os.Stdout, \"POST\\t\\\\KeyHook\\t\"+string(http.StatusInternalServerError)+\"\\n\")\n\t\tWriter.WriteHeader(http.StatusInternalServerError)\n\t\tWriter.Write([]byte(err.Error()))\n\t\treturn\n\t}\n\n\terr = keyhook.AddNewKey(addRequest.ID, addRequest.Website)\n\tif err != nil {\n\t\tfmt.Printf(\"POST\\t\\\\Auth\\t500\\n\")\n\t\tWriter.WriteHeader(http.StatusInternalServerError)\n\t\tWriter.Write([]byte(err.Error()))\n\t\treturn\n\t}\n\n\tfmt.Printf(\"POST\\t\\\\Auth\\t202\\n\")\n\tWriter.WriteHeader(http.StatusAccepted)\n\treturn\n\n}", "func CreateCertif(w http.ResponseWriter, r *http.Request) {\r\n\tparams := mux.Vars(r)\r\n var certifi Certificate\r\n\t\r\n _ = json.NewDecoder(r.Body).Decode(&certifi) //Collect information entered in the 'Body' section by the user \r\n\t\r\n\t//Whatever the certificate ID entered by the user, we create the certificate with the next available ID (ex.: if 5 certificates in the database: available ID = 6)\r\n\tvar taille = len(certif) //Number of certificates\r\n\ttaille=taille+1\t//Available ID\r\n\tt:=strconv.Itoa(taille) //Convert an integer into string\r\n\t\r\n\t//Define Certificate ID and Owner ID, add it to the existing certificates\r\n\tcertifi.Id = t\r\n\tcertifi.Ownerid = clientnum\r\n\tcertifi.Transfer = \"Nil\"\r\n\tcertif=append(certif, certifi)\r\n\t//Then, we inform the user\r\n\tif params[\"id\"] != t {\r\n\t\tfmt.Fprintf(w, \"This certificate number was not available, we automatically created your new certificate with the ID:\"+\" \"+t)\r\n\t}\r\n}", "func (m *Client) CreateWebhook(arg0 context.Context, arg1 *zendesk.Webhook) (*zendesk.Webhook, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"CreateWebhook\", arg0, arg1)\n\tret0, _ := ret[0].(*zendesk.Webhook)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "func (c *Client) WebhookInfo(id int) (*Webhook, error) {\n\treturn c.WebhookInfoContext(context.TODO(), id)\n}", "func HandleHook(w http.ResponseWriter, req *http.Request) {\n\tpayload, err := ioutil.ReadAll(req.Body)\n\tif err != nil {\n\t\tlog.Printf(\"error reading request body: err=%s\\n\", err)\n\t\treturn\n\t}\n\n\tdefer req.Body.Close()\n\n\tgo func() {\n\t\tevent, err := github.ParseWebHook(github.WebHookType(req), payload)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"could not parse webhook: err=%s\\n\", err)\n\t\t\treturn\n\t\t}\n\n\t\tswitch e := event.(type) {\n\t\tcase *github.PullRequestEvent:\n\t\t\tif *e.Action == \"opened\" || *e.Action == \"synchronize\" {\n\t\t\t\tlog.Println(\"GOING FOR PR\", *e.Action)\n\n\t\t\t\tstack, err := getStackByRepo(*e.Repo.Name, *e.Repo.Owner.Login)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Println(\"Cannot build container for\", *e.Repo.FullName, err.Error())\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tbuildID := generateRandomID()\n\t\t\t\tstack.Build = &storage.BuildModel{\n\t\t\t\t\tLatest: buildID,\n\t\t\t\t}\n\n\t\t\t\tgo updateStacks(*e.Repo.Owner.Login, stack)\n\n\t\t\t\tPush(ContainerRunParams{\n\t\t\t\t\tAWSAccess: os.Getenv(\"PIPELINE_DEPLOYER_ACCESS\"),\n\t\t\t\t\tAWSSecret: os.Getenv(\"PIPELINE_DEPLOYER_SECRET\"),\n\t\t\t\t\tBranch: getBranchFromRef(\"pr\"),\n\t\t\t\t\tBucket: stack.BucketID,\n\t\t\t\t\tRepo: stack.Repo.Name,\n\t\t\t\t\tCommit: *e.PullRequest.Head.SHA,\n\t\t\t\t\tCDN: stack.CDN.ID,\n\t\t\t\t\tUser: *e.Repo.Owner.Login,\n\t\t\t\t\tToken: GetUserToken(*e.Sender.Login),\n\t\t\t\t\tbuildID: buildID,\n\t\t\t\t\tPrID: strconv.Itoa(*e.Number),\n\t\t\t\t})\n\t\t\t}\n\n\t\tcase *github.ReleaseEvent:\n\t\t\tstack, err := getStackByRepo(*e.Repo.Name, *e.Repo.Owner.Login)\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(\"Cannot build container for\", *e.Repo.FullName, err.Error())\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tawsAccess := os.Getenv(\"PIPELINE_DEPLOYER_ACCESS\")\n\t\t\tawsSecrect := os.Getenv(\"PIPELINE_DEPLOYER_SECRET\")\n\n\t\t\tif stack.IsThirdParty {\n\t\t\t\tuser, err := storage.Store.User.Get(*e.Repo.Owner.Login)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Println(\"Cannot build container for\", err.Error())\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tawsAccess = user.ThirdPartyAWS.AccessKey\n\t\t\t\tawsSecrect = user.ThirdPartyAWS.SecretKey\n\t\t\t}\n\n\t\t\tbuildID := generateRandomID()\n\t\t\tstack.Build = &storage.BuildModel{\n\t\t\t\tLatest: buildID,\n\t\t\t}\n\n\t\t\tgo updateStacks(*e.Repo.Owner.Login, stack)\n\n\t\t\tif *e.Action == githubActionReleased {\n\t\t\t\tPush(ContainerRunParams{\n\t\t\t\t\tAWSAccess: awsAccess,\n\t\t\t\t\tAWSSecret: awsSecrect,\n\t\t\t\t\tBranch: getBranchFromRef(*e.Release.TargetCommitish) + \":tag\",\n\t\t\t\t\tBucket: stack.BucketID,\n\t\t\t\t\tRepo: stack.Repo.Name,\n\t\t\t\t\tCDN: stack.CDN.ID,\n\t\t\t\t\tUser: *e.Repo.Owner.Login,\n\t\t\t\t\tToken: GetUserToken(*e.Sender.Login),\n\t\t\t\t\tbuildID: buildID,\n\t\t\t\t})\n\t\t\t}\n\n\t\tcase *github.PushEvent:\n\t\t\tif strings.Contains(*e.Ref, \"tags\") {\n\t\t\t\tlog.Println(\"Skipping because TAG\")\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tstack, err := getStackByRepo(*e.Repo.Name, *e.Repo.Owner.Name)\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(\"Cannot build container for\", *e.Repo.FullName, err.Error())\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tawsAccess := os.Getenv(\"PIPELINE_DEPLOYER_ACCESS\")\n\t\t\tawsSecrect := os.Getenv(\"PIPELINE_DEPLOYER_SECRET\")\n\n\t\t\tif stack.IsThirdParty {\n\t\t\t\tuser, err := storage.Store.User.Get(*e.Repo.Owner.Name)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Println(\"Cannot build container for\", err.Error())\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tawsAccess = user.ThirdPartyAWS.AccessKey\n\t\t\t\tawsSecrect = user.ThirdPartyAWS.SecretKey\n\t\t\t}\n\n\t\t\tbuildID := generateRandomID()\n\t\t\tstack.Build = &storage.BuildModel{\n\t\t\t\tLatest: buildID,\n\t\t\t}\n\t\t\tgo updateStacks(*e.Repo.Owner.Name, stack)\n\n\t\t\tPush(ContainerRunParams{\n\t\t\t\tAWSAccess: awsAccess,\n\t\t\t\tAWSSecret: awsSecrect,\n\t\t\t\tBranch: getBranchFromRef(*e.Ref),\n\t\t\t\tCommit: *e.After,\n\t\t\t\tBucket: stack.BucketID,\n\t\t\t\tRepo: stack.Repo.Name,\n\t\t\t\tCDN: stack.CDN.ID,\n\t\t\t\tUser: *e.Repo.Owner.Name,\n\t\t\t\tToken: GetUserToken(*e.Pusher.Name),\n\t\t\t\tbuildID: buildID,\n\t\t\t})\n\n\t\tdefault:\n\t\t\tlog.Printf(\"unknown event type %s\\n\", github.WebHookType(req))\n\t\t\treturn\n\t\t}\n\t}()\n\n\tw.WriteHeader(200)\n}", "func SetupWebhooks(mgr ctrl.Manager) error {\n\t/*\n\t\tTotally undocumented and hard-to-find feature is that the builder automatically registers the URL path for the webhook.\n\t\tWhat's more, not even the tests in upstream controller-runtime reveal what this path is _actually_ going to look like.\n\t\tSo here's how the path is built (dots replaced with dash, lower-cased, single-form):\n\t\t /validate-<group>-<version>-<kind>\n\t\t /mutate-<group>-<version>-<kind>\n\t\tExample:\n\t\t /validate-clustercode-github-io-v1alpha1-blueprint\n\t\tThis path has to be given in the `//+kubebuilder:webhook:...` magic comment, see example:\n\t\t +kubebuilder:webhook:verbs=create;update;delete,path=/validate-clustercode-github-io-v1alpha1-blueprint,mutating=false,failurePolicy=fail,groups=clustercode.github.io,resources=blueprints,versions=v1alpha1,name=blueprints.clustercode.github.io,sideEffects=None,admissionReviewVersions=v1\n\t\tPay special attention to the plural forms and correct versions!\n\t*/\n\tfor _, setup := range []func(ctrl.Manager) error{\n\t\tblueprintwebhook.SetupWebhook,\n\t} {\n\t\tif err := setup(mgr); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func NewWebhook(token string) *Webhook {\n\treturn &Webhook{\n\t\tToken: token,\n\t}\n}", "func (client *WebhooksClient) listCreateRequest(ctx context.Context, resourceGroupName string, registryName string, options *WebhooksClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerRegistry/registries/{registryName}/webhooks\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif registryName == \"\" {\n\t\treturn nil, errors.New(\"parameter registryName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{registryName}\", url.PathEscape(registryName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (b *Bot) Webhook() (*Webhook, error) {\n\tdata, err := b.Raw(\"getWebhookInfo\", nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar resp struct {\n\t\tResult Webhook\n\t}\n\tif err := json.Unmarshal(data, &resp); err != nil {\n\t\treturn nil, wrapError(err)\n\t}\n\treturn &resp.Result, nil\n}", "func CreateTicketHandler(w http.ResponseWriter, r *http.Request) {\n\tnewTicket := tickets.Create()\n\n\trenderer.JSON(w, http.StatusOK, map[string]int64{\"ticket_number\": newTicket.ID})\n}" ]
[ "0.7674164", "0.6756438", "0.6737942", "0.6660755", "0.6571268", "0.6540989", "0.6527676", "0.65261644", "0.6501551", "0.6487405", "0.6473175", "0.6356307", "0.63473403", "0.6342638", "0.6280245", "0.62517196", "0.6172104", "0.61656094", "0.6128617", "0.60469335", "0.6017046", "0.59924585", "0.5961795", "0.59526235", "0.59312344", "0.58744836", "0.5860228", "0.5850912", "0.58371115", "0.58087265", "0.5802731", "0.57465726", "0.5739573", "0.5694668", "0.56941944", "0.56401044", "0.56261337", "0.5600287", "0.5596616", "0.55833477", "0.55729294", "0.5515989", "0.5512971", "0.54889125", "0.5472255", "0.54637885", "0.5435903", "0.5434748", "0.54143107", "0.54106903", "0.5363665", "0.53481454", "0.5338445", "0.5329343", "0.5321029", "0.5316966", "0.5291505", "0.5273308", "0.52724", "0.5270813", "0.523986", "0.52370495", "0.522582", "0.5206796", "0.5195021", "0.51766473", "0.51711875", "0.5169437", "0.5168743", "0.51626027", "0.51562274", "0.5155812", "0.5147775", "0.5147733", "0.51417625", "0.51409113", "0.51394767", "0.5137458", "0.51351017", "0.5131807", "0.5123695", "0.51177436", "0.5113736", "0.5109534", "0.5097885", "0.5095525", "0.50862026", "0.50854087", "0.5082942", "0.5075178", "0.50683165", "0.50675946", "0.5061379", "0.5060409", "0.5059893", "0.5053677", "0.50477326", "0.5038237", "0.5028426", "0.50255924" ]
0.6917234
1
NewMigrationClient creates a new client facade for the provided cl.namespace
func NewMigrationClient(client serving_v1_client.ServingV1Interface, namespace string) MigrationClient { return &migrationClient{ client: client, namespace: namespace, } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func newSubscriptionMigrator(kymaClient kymaeventingclientset.Interface,\n\tknativeClient kneventingclientset.Interface, namespaces []string) (*subscriptionMigrator, error) {\n\n\tm := &subscriptionMigrator{\n\t\tkymaClient: kymaClient,\n\t\tknativeClient: knativeClient,\n\t}\n\n\tif err := m.populateSubscriptions(namespaces); err != nil {\n\t\treturn nil, err\n\t}\n\tif err := m.populateTriggers(namespaces); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn m, nil\n}", "func New(client client.Client) Migrator {\n\treturn &migrator{\n\t\tclient: client,\n\t}\n}", "func New(client client.Client) Migrator {\n\treturn &migrator{\n\t\tclient: client,\n\t}\n}", "func newClient(conf config) (*storage.Client, error) {\n\tdb, err := storage.NewDBClient(conf.MongoURI, conf.DBName, conf.MongoMICol, conf.MongoAgCol)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error creating DB client: %q\", err)\n\t}\n\tdb.Collection(conf.MongoMICol)\n\tbc := storage.NewCloudClient(conf.SwiftUsername, conf.SwiftAPIKey, conf.SwiftAuthURL, conf.SwiftDomain, conf.SwiftContainer)\n\tclient, err := storage.NewClient(db, bc)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error creating storage.client: %q\", err)\n\t}\n\treturn client, nil\n}", "func NewMigrationServiceClient(cc grpc.ClientConnInterface) MigrationServiceClient {\n\treturn src.NewMigrationServiceClient(cc)\n}", "func newClient(opts *ClientOpts) (*Client, error) {\n\tbaseClient, err := newAPIClient(opts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient := &Client{\n\t\tAPIClient: *baseClient,\n\t}\n\n\t// init base operator\n\tclient.Node = newNodeClient(client)\n\tclient.Namespace = newNameSpaceClient(client)\n\tclient.ConfigMap = newConfigMapClient(client)\n\tclient.Service = newServiceClient(client)\n\tclient.Pod = newPodClient(client)\n\tclient.ReplicationController = newReplicationControllerClient(client)\n\tclient.StatefulSet = newStatefulSetClient(client)\n\tclient.DaemonSet = newDaemonSetClient(client)\n\tclient.Deployment = newDeploymentClient(client)\n\tclient.ReplicaSet = newReplicaSetClient(client)\n\n\treturn client, nil\n}", "func New(c transport.ClientConfig, opts ...thrift.ClientOption) Interface {\n\treturn client{\n\t\tc: thrift.New(thrift.Config{\n\t\t\tService: \"WorkflowService\",\n\t\t\tClientConfig: c,\n\t\t}, opts...),\n\t}\n}", "func ExampleNewClient() {\n\t// initialize registrar\n\treg, err := dosaRenamed.NewRegistrar(\"test\", \"myteam.myservice\", cte1)\n\tif err != nil {\n\t\t// registration will fail if the object is tagged incorrectly\n\t\tfmt.Printf(\"NewRegistrar error: %s\", err)\n\t\treturn\n\t}\n\n\t// use a devnull connector for example purposes\n\tconn := devnull.NewConnector()\n\n\t// create the client using the registrar and connector\n\tclient := dosaRenamed.NewClient(reg, conn)\n\n\terr = client.Initialize(context.Background())\n\tif err != nil {\n\t\tfmt.Printf(\"Initialize error: %s\", err)\n\t\treturn\n\t}\n}", "func NewClient(opts ...Option) (Client, error) {\n\tlogger := zap.NewNop()\n\tns := &namespaceClient{\n\t\tclient: m3admin.NewClient(),\n\t\tlogger: logger,\n\t\turl: m3admin.DefaultURL,\n\t}\n\tfor _, o := range opts {\n\t\tif err := o.execute(ns); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn ns, nil\n}", "func newClient(cs ConnectionSettings) *client {\n\treturn &client{\n\t\tConnectionSettings: cs,\n\t}\n}", "func NewClient(endpointURL, soapActionBase string, cl *http.Client) Caller {\n\tif cl == nil {\n\t\tcl = http.DefaultClient\n\t}\n\tif cl.Transport == nil {\n\t\tcl.Transport = http.DefaultTransport\n\t}\n\tcl.Transport = soaptrip.New(cl.Transport)\n\treturn &soapClient{\n\t\tClient: cl,\n\t\tURL: endpointURL,\n\t\tSOAPActionBase: soapActionBase,\n\t\tbufpool: bp.New(1024),\n\t}\n}", "func NewClient(\n\tprovider iaas.Provider,\n\ttfCLI terraform.CLIInterface,\n\tboshClientFactory bosh.ClientFactory,\n\tflyClientFactory func(fly.Credentials, io.Writer, io.Writer, []byte) (fly.IClient, error),\n\tcertGenerator func(constructor func(u *certs.User) (certs.AcmeClient, error), caName string, ip ...string) (*certs.Certs, error),\n\tconfigClient config.IClient,\n\tdeployArgs *deploy.Args,\n\tstdout, stderr io.Writer,\n\tipChecker func() (string, error),\n\tacmeClientConstructor func(u *certs.User) (certs.AcmeClient, error),\n\tversion string) *Client {\n\treturn &Client{\n\t\tprovider: provider,\n\t\ttfCLI: tfCLI,\n\t\tboshClientFactory: boshClientFactory,\n\t\tflyClientFactory: flyClientFactory,\n\t\tconfigClient: configClient,\n\t\tcertGenerator: certGenerator,\n\t\tdeployArgs: deployArgs,\n\t\tstdout: stdout,\n\t\tstderr: stderr,\n\t\tipChecker: ipChecker,\n\t\tacmeClientConstructor: acmeClientConstructor,\n\t\tversionFile: versionFile,\n\t\tversion: version,\n\t}\n}", "func NewClient(cacheDB *bbolt.DB, cacheKey string, orgID int64) (*Client, error) {\n\ttransactionalStore := newTransactionalStore(cacheDB)\n\tlocalStoreConfig, err := newLocalStoreConfig(transactionalStore, cacheKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tlocalStoreDirector, err := newLocalStoreDirector(transactionalStore, cacheKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ttargetStore := newTargetStore(transactionalStore, cacheKey)\n\tc := &Client{\n\t\torgID: orgID,\n\t\tconfigLocalStore: localStoreConfig,\n\t\tconfigRemoteStore: newRemoteStoreConfig(targetStore),\n\t\tdirectorLocalStore: localStoreDirector,\n\t\tdirectorRemoteStore: newRemoteStoreDirector(targetStore),\n\t\ttargetStore: targetStore,\n\t\ttransactionalStore: transactionalStore,\n\t}\n\tc.configTUFClient = client.NewClient(c.configLocalStore, c.configRemoteStore)\n\tc.directorTUFClient = client.NewClient(c.directorLocalStore, c.directorRemoteStore)\n\treturn c, nil\n}", "func newClientFromFlags(fs tbnflag.FlagSet) client {\n\treturn &clientImpl{}\n}", "func (c *client) newClient() *gitea.Client {\n\treturn c.newClientToken(\"\")\n}", "func (c *config) newClient(u *model.User) *internal.Client {\n\treturn c.newClientToken(u.Token, u.Secret)\n}", "func newClient(uri string, hc *http.Client, opts jsonclient.Options, log *entitylist.LogInfo) (*LogClient, error) {\n\tlogClient, err := jsonclient.New(uri, hc, opts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &LogClient{*logClient, *log}, err\n}", "func NewClient(opts ...Option) *Client {\n\tc := config{log: log.Println}\n\tc.options(opts...)\n\treturn &Client{\n\t\tconfig: c,\n\t\tSchema: migrate.NewSchema(c.driver),\n\t\tModule: NewModuleClient(c),\n\t\tModuleVersion: NewModuleVersionClient(c),\n\t}\n}", "func NewClient(config *sdk.Config, credential *auth.Credential) *Client {\n\tvar handler sdk.RequestHandler = func(c *sdk.Client, req request.Common) (request.Common, error) {\n\t\terr := req.SetProjectId(PickResourceID(req.GetProjectId()))\n\t\treturn req, err\n\t}\n\tvar (\n\t\tuaccountClient = *uaccount.NewClient(config, credential)\n\t\tuhostClient = *uhost.NewClient(config, credential)\n\t\tunetClient = *unet.NewClient(config, credential)\n\t\tvpcClient = *vpc.NewClient(config, credential)\n\t\tudpnClient = *udpn.NewClient(config, credential)\n\t\tpathxClient = *pathx.NewClient(config, credential)\n\t\tudiskClient = *udisk.NewClient(config, credential)\n\t\tulbClient = *ulb.NewClient(config, credential)\n\t\tudbClient = *udb.NewClient(config, credential)\n\t\tumemClient = *umem.NewClient(config, credential)\n\t\tuphostClient = *uphost.NewClient(config, credential)\n\t\tpuhostClient = *puhost.NewClient(config, credential)\n\t\tpudbClient = *pudb.NewClient(config, credential)\n\t\tpumemClient = *pumem.NewClient(config, credential)\n\t\tppathxClient = *ppathx.NewClient(config, credential)\n\t)\n\n\tuaccountClient.Client.AddRequestHandler(handler)\n\tuhostClient.Client.AddRequestHandler(handler)\n\tunetClient.Client.AddRequestHandler(handler)\n\tvpcClient.Client.AddRequestHandler(handler)\n\tudpnClient.Client.AddRequestHandler(handler)\n\tpathxClient.Client.AddRequestHandler(handler)\n\tudiskClient.Client.AddRequestHandler(handler)\n\tulbClient.Client.AddRequestHandler(handler)\n\tudbClient.Client.AddRequestHandler(handler)\n\tumemClient.Client.AddRequestHandler(handler)\n\tuphostClient.Client.AddRequestHandler(handler)\n\tpuhostClient.Client.AddRequestHandler(handler)\n\tpudbClient.Client.AddRequestHandler(handler)\n\tpumemClient.Client.AddRequestHandler(handler)\n\tppathxClient.Client.AddRequestHandler(handler)\n\n\treturn &Client{\n\t\tuaccountClient,\n\t\tuhostClient,\n\t\tunetClient,\n\t\tvpcClient,\n\t\tudpnClient,\n\t\tpathxClient,\n\t\tudiskClient,\n\t\tulbClient,\n\t\tudbClient,\n\t\tumemClient,\n\t\tuphostClient,\n\t\tpuhostClient,\n\t\tpudbClient,\n\t\tpumemClient,\n\t\tppathxClient,\n\t}\n}", "func NewClient(flName string) (CSVClient, model.Error) {\n\tcli := csvClient{cltFl: &os.File{}}\n\tif flName == \"\" {\n\t\treturn &cli, model.NewErrorNil()\n\t}\n\n\tgocsv.SetCSVReader(func(in io.Reader) gocsv.CSVReader {\n\t\tr := csv.NewReader(in)\n\t\tr.Comma = columnSeparator\n\t\treturn r\n\t})\n\n\tcltFl, err := os.Open(fileTmpFolderPath + flName)\n\tif err != nil {\n\t\treturn &cli, model.NewErrorServer(\"Error to open a file \" + flName).WithError(err)\n\t}\n\tcli.cltFl = cltFl\n\treturn &cli, model.NewErrorNil()\n}", "func newRoleClient(subID string, authorizer auth.Authorizer) (*client, error) {\n\tc, err := wssdcloudclient.GetRoleClient(&subID, authorizer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &client{c}, nil\n}", "func NewClient(profileName string) (*newrelic.NewRelic, error) {\n\tapiKey := configAPI.GetProfileString(profileName, config.APIKey)\n\tinsightsInsertKey := configAPI.GetProfileString(profileName, config.InsightsInsertKey)\n\n\tif apiKey == \"\" && insightsInsertKey == \"\" {\n\t\treturn nil, errors.New(\"a User API key or Ingest API key is required, set a default profile or use the NEW_RELIC_API_KEY or NEW_RELIC_INSIGHTS_INSERT_KEY environment variables\")\n\t}\n\n\tregion := configAPI.GetProfileString(profileName, config.Region)\n\tuserAgent := fmt.Sprintf(\"newrelic-cli/%s (https://github.com/newrelic/newrelic-cli)\", cli.Version())\n\n\t// Feed our logrus instance to the client's logrus adapter\n\tlogger := clientLogging.NewLogrusLogger(clientLogging.ConfigLoggerInstance(config.Logger))\n\n\tcfgOpts := []newrelic.ConfigOption{\n\t\tnewrelic.ConfigPersonalAPIKey(apiKey),\n\t\tnewrelic.ConfigInsightsInsertKey(insightsInsertKey),\n\t\tnewrelic.ConfigLogger(logger),\n\t\tnewrelic.ConfigRegion(region),\n\t\tnewrelic.ConfigUserAgent(userAgent),\n\t\tnewrelic.ConfigServiceName(serviceName),\n\t}\n\n\tnrClient, err := newrelic.New(cfgOpts...)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to create New Relic client with error: %s\", err)\n\t}\n\n\treturn nrClient, nil\n}", "func NewClient(httpClient *http.Client, space string, apiKey string) *Client {\n\tif httpClient == nil {\n\t\thttpClient = http.DefaultClient\n\t}\n\n\tbaseURL, _ := url.Parse(\"https://\" + space + \".backlog.com/api/v2/\")\n\tc := &Client{client: httpClient, BaseURL: baseURL, apiKey: apiKey}\n\tc.common.client = c\n\tc.Space = (*SpaceService)(&c.common)\n\tc.Projects = (*ProjectsService)(&c.common)\n\tc.Issues = (*IssuesService)(&c.common)\n\treturn c\n}", "func newClient() (*client, error) {\n\tconfig, err := parsePgEnv()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc := client{\n\t\tconnConfig: config,\n\n\t\tuser: pg.NewUserService(\n\t\t\tpg.WithHost(config.Host),\n\t\t\tpg.WithPort(config.Port),\n\t\t\tpg.WithDatabase(config.Database),\n\t\t\tpg.WithUser(config.User),\n\t\t\tpg.WithPassword(config.Password),\n\t\t),\n\t}\n\treturn &c, nil\n}", "func newNs(ctx context.Context, cl client.Client, name string) error {\n\tns := &corev1.Namespace{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t},\n\t}\n\tif err := cl.Create(ctx, ns); err != nil {\n\t\tif !errors.IsAlreadyExists(err) {\n\t\t\treturn fmt.Errorf(\"failed to create namespace %s: %v\", ns.Name, err)\n\t\t}\n\t}\n\treturn nil\n}", "func NewClient(cfg watson.Config) (Client, error) {\n\tci := Client{version: \"/\" + defaultMajorVersion}\n\tif len(cfg.Credentials.ServiceName) == 0 {\n\t\tcfg.Credentials.ServiceName = \"retrieve_and_rank\"\n\t}\n\tif len(cfg.Credentials.Url) == 0 {\n\t\tcfg.Credentials.Url = defaultUrl\n\t}\n\tclient, err := watson.NewClient(cfg.Credentials)\n\tif err != nil {\n\t\treturn Client{}, err\n\t}\n\tci.watsonClient = client\n\treturn ci, nil\n}", "func newClientFromFlags(fs tbnflag.FlagSet) clientFromFlags {\n\treturn &clientFromFlagsImpl{config.NewFromFlags(fs)}\n}", "func NewClient(log logr.Logger, config *helmv1alpha1.Configuration) (*Client, error) {\n\tociClient, err := oci.NewClient(log, oci.WithConfiguration(config.OCI))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Client{\n\t\toci: ociClient,\n\t}, nil\n}", "func NewClient(cfg *Config) (*Client, error) {\r\n\tBaseURL := new(url.URL)\r\n\tvar err error\r\n\r\n\tviper.SetEnvPrefix(\"TS\")\r\n\tviper.BindEnv(\"LOG\")\r\n\r\n\tswitch l := viper.Get(\"LOG\"); l {\r\n\tcase \"trace\":\r\n\t\tlog.SetLevel(log.TraceLevel)\r\n\tcase \"debug\":\r\n\t\tlog.SetLevel(log.DebugLevel)\r\n\tcase \"info\":\r\n\t\tlog.SetLevel(log.InfoLevel)\r\n\tcase \"warn\":\r\n\t\tlog.SetLevel(log.WarnLevel)\r\n\tcase \"fatal\":\r\n\t\tlog.SetLevel(log.FatalLevel)\r\n\tcase \"panic\":\r\n\t\tlog.SetLevel(log.PanicLevel)\r\n\t}\r\n\r\n\tif cfg.BaseURL != \"\" {\r\n\t\tBaseURL, err = url.Parse(cfg.BaseURL)\r\n\t\tif err != nil {\r\n\t\t\treturn nil, err\r\n\t\t}\r\n\t} else {\r\n\t\tBaseURL, err = url.Parse(defaultBaseURL)\r\n\t\tif err != nil {\r\n\t\t\treturn nil, err\r\n\t\t}\r\n\t}\r\n\r\n\tnewClient := &Client{\r\n\t\tBaseURL: BaseURL,\r\n\t\tclient: http.DefaultClient,\r\n\t\tcreds: &Credentials{\r\n\t\t\tAPIKey: cfg.APIKey,\r\n\t\t\tOrganizationID: cfg.OrganizationID,\r\n\t\t\tUserID: cfg.UserID,\r\n\t\t},\r\n\t}\r\n\r\n\tnewClient.Rulesets = &RulesetService{newClient}\r\n\tnewClient.Rules = &RuleService{newClient}\r\n\r\n\treturn newClient, nil\r\n}", "func newBkCli() (*bkCli, error) {\n\tconfig := config.CurrentConfig()\n\n\tclient, err := newClient(config)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &bkCli{config, client}, nil\n}", "func NewClient(getToken func() []byte, censor func([]byte) []byte, graphqlEndpoint string, bases ...string) (Client, error) {\n\treturn NewClientWithFields(logrus.Fields{}, getToken, censor, graphqlEndpoint, bases...)\n}", "func newClient(token string) *Client {\n\treturn &Client{\n\t\tToken: token,\n\t}\n}", "func NewClient(ctx context.Context, cli *containerd.Client, stateDir, ns string, b libcontainerdtypes.Backend) (libcontainerdtypes.Client, error) {\n\tc := &client{\n\t\tstateDir: stateDir,\n\t\tbackend: b,\n\t\tlogger: log.G(ctx).WithField(\"module\", \"libcontainerd\").WithField(\"namespace\", ns),\n\t}\n\n\treturn c, nil\n}", "func NewClient(cfg *rest.Config) (versioned.Interface, error) {\n\tglog.Info(\"NewClient()\")\n\tscheme := runtime.NewScheme()\n\tif err := v1.AddToScheme(scheme); err != nil {\n\t\treturn nil, err\n\t}\n\n\tconfig := *cfg\n\tconfig.GroupVersion = &v1.SchemeGroupVersion\n\tconfig.APIPath = \"/apis\"\n\tconfig.ContentType = runtime.ContentTypeJSON\n\tconfig.NegotiatedSerializer = serializer.WithoutConversionCodecFactory{CodecFactory: serializer.NewCodecFactory(scheme)}\n\n\tcs, err := versioned.NewForConfig(&config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn cs, nil\n}", "func newPackageClient() *PackageClient {\n\treturn NewPackageClient(&DBPackage{\n\t\tBaseURL: \"http://localhost:5555\",\n\t\tSigningKey: \"bubbles\",\n\t})\n}", "func NewClient(appId, appKey, masterKey string) *leanClient {\n\n\tret := &leanClient{\n\t\tappId: appId,\n\t\tappKey: appKey,\n\t\tmasterKey: masterKey,\n\t}\n\n\tinstallation := ret.Collection(\"_Installation\")\n\tret.Installation = &installation\n\tret.Installation.classSubfix = \"/installaions\"\n\n\tuser := ret.Collection(\"_User\")\n\tret.User = &(user)\n\tret.User.classSubfix = \"/users\"\n\n\trole := ret.Collection(\"_Role\")\n\tret.Role = &(role)\n\tret.Role.classSubfix = \"/roles\"\n\n\tfile := ret.Collection(\"_File\")\n\tret.File = &(file)\n\tret.File.classSubfix = \"/files\"\n\n\treturn ret\n}", "func newClient(ctx context.Context, cfg oconf.Config) (*client, error) {\n\tc := &client{\n\t\texportTimeout: cfg.Metrics.Timeout,\n\t\trequestFunc: cfg.RetryConfig.RequestFunc(retryable),\n\t\tconn: cfg.GRPCConn,\n\t}\n\n\tif len(cfg.Metrics.Headers) > 0 {\n\t\tc.metadata = metadata.New(cfg.Metrics.Headers)\n\t}\n\n\tif c.conn == nil {\n\t\t// If the caller did not provide a ClientConn when the client was\n\t\t// created, create one using the configuration they did provide.\n\t\tconn, err := grpc.DialContext(ctx, cfg.Metrics.Endpoint, cfg.DialOptions...)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\t// Keep track that we own the lifecycle of this conn and need to close\n\t\t// it on Shutdown.\n\t\tc.ourConn = true\n\t\tc.conn = conn\n\t}\n\n\tc.msc = colmetricpb.NewMetricsServiceClient(c.conn)\n\n\treturn c, nil\n}", "func (cfg *Config) newClient(args []interface{}) (connector endpoint.Connector, err error) {\n\n\tvar clientArgs *newClientArgs\n\tclientArgs, err = getNewClientArguments(args)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar connectionTrustBundle *x509.CertPool\n\n\tif cfg.ConnectionTrust != \"\" {\n\t\tlog.Println(\"You specified a trust bundle.\")\n\t\tconnectionTrustBundle = x509.NewCertPool()\n\t\tif !connectionTrustBundle.AppendCertsFromPEM([]byte(cfg.ConnectionTrust)) {\n\t\t\treturn nil, fmt.Errorf(\"%w: failed to parse PEM trust bundle\", verror.UserDataError)\n\t\t}\n\t}\n\n\tswitch cfg.ConnectorType {\n\tcase endpoint.ConnectorTypeCloud:\n\t\tconnector, err = cloud.NewConnector(cfg.BaseUrl, cfg.Zone, cfg.LogVerbose, connectionTrustBundle)\n\tcase endpoint.ConnectorTypeTPP:\n\t\tconnector, err = tpp.NewConnector(cfg.BaseUrl, cfg.Zone, cfg.LogVerbose, connectionTrustBundle)\n\tcase endpoint.ConnectorTypeFirefly:\n\t\tconnector, err = firefly.NewConnector(cfg.BaseUrl, cfg.Zone, cfg.LogVerbose, connectionTrustBundle)\n\tcase endpoint.ConnectorTypeFake:\n\t\tconnector = fake.NewConnector(cfg.LogVerbose, connectionTrustBundle)\n\tdefault:\n\t\terr = fmt.Errorf(\"%w: ConnectorType is not defined\", verror.UserDataError)\n\t}\n\tif err != nil {\n\t\treturn\n\t}\n\n\tconnector.SetZone(cfg.Zone)\n\tconnector.SetHTTPClient(cfg.Client)\n\n\tif clientArgs.authenticate {\n\t\terr = connector.Authenticate(cfg.Credentials)\n\t}\n\n\treturn\n}", "func newClient(auth azure.Authorizer) *azureClient {\n\tc := newPrivateZonesClient(auth.SubscriptionID(), auth.BaseURI(), auth.Authorizer())\n\tv := newVirtualNetworkLinksClient(auth.SubscriptionID(), auth.BaseURI(), auth.Authorizer())\n\tr := newRecordSetsClient(auth.SubscriptionID(), auth.BaseURI(), auth.Authorizer())\n\treturn &azureClient{c, v, r}\n}", "func newClient(httpClient *http.Client) (c *Client) {\n\tc = &Client{httpClient: httpClient}\n\tc.service.client = c\n\tc.Auth = (*AuthService)(&c.service)\n\tc.Providers = (*ProvidersService)(&c.service)\n\tc.Projects = (*ProjectsService)(&c.service)\n\tc.Releases = (*ReleasesService)(&c.service)\n\tc.SlackChannels = (*SlackChannelsService)(&c.service)\n\tc.TelegramChats = (*TelegramChatsService)(&c.service)\n\tc.DiscordChannels = (*DiscordChannelsService)(&c.service)\n\tc.HangoutsChatWebhooks = (*HangoutsChatWebhooksService)(&c.service)\n\tc.MicrosoftTeamsWebhooks = (*MicrosoftTeamsWebhooksService)(&c.service)\n\tc.MattermostWebhooks = (*MattermostWebhooksService)(&c.service)\n\tc.RocketchatWebhooks = (*RocketchatWebhooksService)(&c.service)\n\tc.MatrixRooms = (*MatrixRoomsService)(&c.service)\n\tc.Webhooks = (*WebhooksService)(&c.service)\n\tc.Tags = (*TagsService)(&c.service)\n\treturn c\n}", "func ExampleReplicationMigrationItemsClient_BeginCreate() {\n\tcred, err := azidentity.NewDefaultAzureCredential(nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to obtain a credential: %v\", err)\n\t}\n\tctx := context.Background()\n\tclient, err := armrecoveryservicessiterecovery.NewReplicationMigrationItemsClient(\"migrationvault\",\n\t\t\"resourcegroup1\",\n\t\t\"cb53d0c3-bd59-4721-89bc-06916a9147ef\", cred, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create client: %v\", err)\n\t}\n\tpoller, err := client.BeginCreate(ctx,\n\t\t\"vmwarefabric1\",\n\t\t\"vmwareContainer1\",\n\t\t\"virtualmachine1\",\n\t\tarmrecoveryservicessiterecovery.EnableMigrationInput{\n\t\t\tProperties: &armrecoveryservicessiterecovery.EnableMigrationInputProperties{\n\t\t\t\tPolicyID: to.Ptr(\"/Subscriptions/cb53d0c3-bd59-4721-89bc-06916a9147ef/resourceGroups/resourcegroup1/providers/Microsoft.RecoveryServices/vaults/migrationvault/replicationPolicies/vmwarepolicy1\"),\n\t\t\t\tProviderSpecificDetails: &armrecoveryservicessiterecovery.VMwareCbtEnableMigrationInput{\n\t\t\t\t\tInstanceType: to.Ptr(\"VMwareCbt\"),\n\t\t\t\t\tDataMoverRunAsAccountID: to.Ptr(\"/Subscriptions/cb53d0c3-bd59-4721-89bc-06916a9147ef/resourceGroups/resourcegroup1/providers/Microsoft.OffAzure/VMwareSites/vmwaresite1/runasaccounts/dataMoverRunAsAccount1\"),\n\t\t\t\t\tDisksToInclude: []*armrecoveryservicessiterecovery.VMwareCbtDiskInput{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tDiskID: to.Ptr(\"disk1\"),\n\t\t\t\t\t\t\tIsOSDisk: to.Ptr(\"true\"),\n\t\t\t\t\t\t\tLogStorageAccountID: to.Ptr(\"/Subscriptions/cb53d0c3-bd59-4721-89bc-06916a9147ef/resourceGroups/resourcegroup1/providers/Microsoft.Storage/storageAccounts/logStorageAccount1\"),\n\t\t\t\t\t\t\tLogStorageAccountSasSecretName: to.Ptr(\"logStorageSas\"),\n\t\t\t\t\t\t}},\n\t\t\t\t\tSnapshotRunAsAccountID: to.Ptr(\"/Subscriptions/cb53d0c3-bd59-4721-89bc-06916a9147ef/resourceGroups/resourcegroup1/providers/Microsoft.OffAzure/VMwareSites/vmwaresite1/runasaccounts/snapshotRunAsAccount1\"),\n\t\t\t\t\tTargetNetworkID: to.Ptr(\"/Subscriptions/cb53d0c3-bd59-4721-89bc-06916a9147ef/resourceGroups/resourcegroup1/providers/Microsoft.Network/virtualNetworks/virtualNetwork1\"),\n\t\t\t\t\tTargetResourceGroupID: to.Ptr(\"/Subscriptions/cb53d0c3-bd59-4721-89bc-06916a9147ef/resourceGroups/resourcegroup1\"),\n\t\t\t\t\tVmwareMachineID: to.Ptr(\"/Subscriptions/cb53d0c3-bd59-4721-89bc-06916a9147ef/resourceGroups/resourcegroup1/providers/Microsoft.OffAzure/VMwareSites/vmwaresite1/machines/virtualmachine1\"),\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\tnil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to finish the request: %v\", err)\n\t}\n\tres, err := poller.PollUntilDone(ctx, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to pull the result: %v\", err)\n\t}\n\t// TODO: use response item\n\t_ = res\n}", "func New(authedClient HTTPClient, labsAddr, tenantID, realmID string) BundleClient {\n\treturn &bundleClientImpl{\n\t\tidpClient: authedClient,\n\t\tlabsAddr: labsAddr,\n\t\tTenantID: tenantID,\n\t\tRealmID: realmID,\n\t}\n}", "func NewClient(config *latest.Config, kubeClient kubectl.Client, tillerNamespace string, log log.Logger) (types.Client, error) {\n\tif tillerNamespace == \"\" {\n\t\ttillerNamespace = kubeClient.Namespace()\n\t}\n\n\treturn &client{\n\t\tconfig: config,\n\n\t\tkubeClient: kubeClient,\n\t\ttillerNamespace: tillerNamespace,\n\n\t\texec: command.Command,\n\t\textract: extract.NewExtractor(),\n\t\thttpGet: http.Get,\n\n\t\tlog: log,\n\t}, nil\n}", "func NewClient(add, get, transfer, defaultPhoto, update, listMine, listProject, listAssociated, listProjectAssociated, downloadPhoto, listAll, delete_, adminSearch, progress, updateModule goa.Endpoint) *Client {\n\treturn &Client{\n\t\tAddEndpoint: add,\n\t\tGetEndpoint: get,\n\t\tTransferEndpoint: transfer,\n\t\tDefaultPhotoEndpoint: defaultPhoto,\n\t\tUpdateEndpoint: update,\n\t\tListMineEndpoint: listMine,\n\t\tListProjectEndpoint: listProject,\n\t\tListAssociatedEndpoint: listAssociated,\n\t\tListProjectAssociatedEndpoint: listProjectAssociated,\n\t\tDownloadPhotoEndpoint: downloadPhoto,\n\t\tListAllEndpoint: listAll,\n\t\tDeleteEndpoint: delete_,\n\t\tAdminSearchEndpoint: adminSearch,\n\t\tProgressEndpoint: progress,\n\t\tUpdateModuleEndpoint: updateModule,\n\t}\n}", "func NewIamMigrateClient(opt *Options) (PermMigrateClient, error) {\n\terr := opt.validate()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"NewIamMigrateClient options invalid: %v\", err)\n\t}\n\n\t// register interface metric\n\tif opt.Metric {\n\t\tmetric.RegisterMetrics()\n\t}\n\n\tclient := &iamClient{\n\t\topt: opt,\n\t}\n\n\tif opt.External {\n\t\t// true directCAll + ESB API\n\t\tclient.cli = iam.NewIAM(opt.SystemID, opt.AppCode, opt.AppSecret, opt.IAMHost, opt.BkiIAMHost)\n\t} else {\n\t\t// false APIGW\n\t\tclient.cli = iam.NewAPIGatewayIAM(opt.SystemID, opt.AppCode, opt.AppSecret, opt.GateWayHost)\n\t}\n\n\t// init IAM logger\n\tsetIAMLogger(opt)\n\n\treturn client, nil\n}", "func (s *server) newRepoClient(ctx context.Context, storageName string) (gitalypb.RepositoryServiceClient, error) {\n\tgitalyServerInfo, err := storage.ExtractGitalyServer(ctx, storageName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tconn, err := s.conns.Dial(ctx, gitalyServerInfo.Address, gitalyServerInfo.Token)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn gitalypb.NewRepositoryServiceClient(conn), nil\n}", "func newDBClient() connection {\n\tc := client{}\n\terr := c.connect()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\terr = c.applySchema()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn &c\n}", "func newClient(cfg upspin.Config, server, cache *upspin.Endpoint) (upspin.Config, upspin.Client) {\n\tcfg = setCertPool(cfg)\n\tcfg = config.SetStoreEndpoint(cfg, *server)\n\tcfg = config.SetDirEndpoint(cfg, *server)\n\tcfg = config.SetCacheEndpoint(cfg, *cache)\n\treturn cfg, client.New(cfg)\n}", "func newIdentityClient(subID string, authorizer auth.Authorizer) (*client, error) {\n\tc, err := wssdcloudclient.GetIdentityClient(&subID, authorizer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &client{c}, nil\n}", "func NewClient(cfg *rest.Config) (versioned.Interface, error) {\n\tscheme := runtime.NewScheme()\n\tif err := api.AddToScheme(scheme); err != nil {\n\t\treturn nil, err\n\t}\n\n\tconfig := *cfg\n\tconfig.GroupVersion = &api.SchemeGroupVersion\n\tconfig.APIPath = \"/apis\"\n\tconfig.ContentType = runtime.ContentTypeJSON\n\tconfig.NegotiatedSerializer = serializer.DirectCodecFactory{CodecFactory: serializer.NewCodecFactory(scheme)}\n\n\tcs, err := versioned.NewForConfig(&config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn cs, nil\n}", "func newRpcServices(c *RpccontrollerV1Client, namespace string) *rpcServices {\n\treturn &rpcServices{\n\t\tclient: c.RESTClient(),\n\t\tns: namespace,\n\t}\n}", "func newMetadataClient(provider config.Provider, version string, repository Repository, config config.VariablesClient) *metadataClient {\n\treturn &metadataClient{\n\t\tconfigVarClient: config,\n\t\tprovider: provider,\n\t\tversion: version,\n\t\trepository: repository,\n\t}\n}", "func NewClient(acls *gitacls.ACLs) Client {\n\treturn &implementation{acls: acls}\n}", "func newClient(origin, ignoreDestCSV, excludeSecretsCSV string) (*client, error) {\n\tconfig, err := rest.InClusterConfig()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to load in-cluster config: %s\", err)\n\t}\n\n\tclientset, err := kubernetes.NewForConfig(config)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to load clientset: %s\", err)\n\t}\n\n\tsv := strings.Split(ignoreDestCSV, \",\")\n\tignoreDests := map[string]int{\n\t\torigin: 0, // ignore origin\n\t}\n\tfor _, dest := range sv {\n\t\tignoreDests[dest] = 0 // meaningless value\n\t}\n\n\tes := strings.Split(excludeSecretsCSV, \",\")\n\texcludeSecrets := make(map[string]struct{}, len(es))\n\tfor _, secret := range es {\n\t\texcludeSecrets[secret] = struct{}{}\n\t}\n\n\treturn &client{\n\t\tclientset: clientset,\n\t\torigin: origin,\n\t\tignoreDests: ignoreDests,\n\t\texcludeSecrets: excludeSecrets,\n\t}, nil\n}", "func newClient() (client *Client) {\n\n\tclient = new(Client)\n\n\tid := <-uuidBuilder\n\tclient.Id = id.String()\n\tclient.subscriptions = make(map[string]bool)\n\n\tclients[client.Id] = client\n\n\tlog.WithField(\"clientID\", id.String()).Info(\"Created new Client\")\n\treturn\n}", "func newBackingServices(c *Client, namespace string) *backingservices {\n\treturn &backingservices{\n\t\tr: c,\n\t\tns: namespace,\n\t}\n}", "func NewClient(httpClient *http.Client, username string, password string) *Client {\n\tbase := sling.New().Client(httpClient).Base(msfUrl)\n\tbase.SetBasicAuth(username, password)\n\treturn &Client{\n\t\tsling: base,\n\t\tNBA: newNBAService(base.New()),\n\t}\n}", "func NewClient(c Configuration) (Client, error) {\n\tcli := Client{\n\t\tName: \"splunk-http-collector-client\",\n\t}\n\tif err := cli.Configure(c.Collector.Proto, c.Collector.Host, c.Collector.Port); err != nil {\n\t\treturn cli, err\n\t}\n\tlog.Debugf(\"%s: proto=%s\", cli.Name, c.Collector.Proto)\n\tlog.Debugf(\"%s: host=%s\", cli.Name, c.Collector.Host)\n\tlog.Debugf(\"%s: port=%d\", cli.Name, c.Collector.Port)\n\tlog.Debugf(\"%s: token=%s\", cli.Name, c.Collector.Token)\n\tlog.Debugf(\"%s: timeout=%d\", cli.Name, c.Collector.Timeout)\n\tlog.Debugf(\"%s: endpoint.health=%s\", cli.Name, cli.Endpoints.Health)\n\tlog.Debugf(\"%s: endpoint.event=%s\", cli.Name, cli.Endpoints.Event)\n\tlog.Debugf(\"%s: endpoint.raw=%s\", cli.Name, cli.Endpoints.Raw)\n\tt := &http.Transport{\n\t\tTLSClientConfig: &tls.Config{\n\t\t\tInsecureSkipVerify: true,\n\t\t},\n\t}\n\tcli.client = &http.Client{\n\t\tTimeout: time.Duration(c.Collector.Timeout) * time.Second,\n\t\tTransport: t,\n\t}\n\tcli.Token = c.Collector.Token\n\tif err := cli.HealthCheck(); err != nil {\n\t\treturn cli, err\n\t}\n\treturn cli, nil\n}", "func NewClient(conf db.Option) (db.DataStore, error) {\n\tlog().Info(\"initializing mysql connection: \" + formatDSN())\n\tcli, err := sqlx.Connect(\"mysql\", formatDSN())\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to connect to db\")\n\t}\n\treturn &client{db: cli}, nil\n}", "func NewClient(conf db.Option) (db.DataStore, error) {\n\tlog().Info(\"initializing mysql connection: \" + formatDSN())\n\tcli, err := sqlx.Connect(\"mysql\", formatDSN())\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to connect to db\")\n\t}\n\treturn &client{db: cli}, nil\n}", "func newServiceAccount(cr *storagev1.CSIPowerMaxRevProxy) *v1.ServiceAccount {\n\treturn &v1.ServiceAccount{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: ReverseProxyName,\n\t\t\tNamespace: cr.Namespace,\n\t\t\tOwnerReferences: getOwnerReferences(cr),\n\t\t},\n\t}\n}", "func NewClient(ctx context.Context, cfg ClientConfig) (*Client, error) {\n\tconfig := &tfe.Config{\n\t\tToken: cfg.Token,\n\t}\n\ttfeClient, err := tfe.NewClient(config)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not create a new TFE tfeClient: %w\", err)\n\t}\n\n\tw, err := tfeClient.Workspaces.Read(ctx, cfg.Organization, cfg.Workspace)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not retrieve workspace '%v/%v': %w\", cfg.Organization, cfg.Workspace, err)\n\t}\n\n\tc := Client{\n\t\tclient: tfeClient,\n\t\tworkspace: w,\n\t}\n\treturn &c, nil\n}", "func NewClient() *cobra.Command {\n\tcommand := cobra.Command{\n\t\tUse: \"tabloctl\",\n\t\tShort: \"the one point of view to all your task boards\",\n\t\tLong: \"The one point of view to all your task boards.\",\n\n\t\tSilenceErrors: false,\n\t\tSilenceUsage: true,\n\t}\n\t/* configure instance */\n\tcommand.AddCommand( /* related commands */ )\n\treturn &command\n}", "func NewClient(token string) *CLI {\n\treturn &CLI{\n\t\tToken: token,\n\t}\n}", "func (net *Network) NewClient(cfg *ClientCfg) (*Client, error) {\n\tclientName := fmt.Sprintf(\"client-%d\", len(net.clients))\n\n\tclientDir, err := net.baseDir.NewSubDir(clientName)\n\tif err != nil {\n\t\tnet.logger.Error(\"failed to create client subdir\",\n\t\t\t\"err\", err,\n\t\t\t\"client_name\", clientName,\n\t\t)\n\t\treturn nil, fmt.Errorf(\"oasis/client: failed to create client subdir: %w\", err)\n\t}\n\n\tclient := &Client{\n\t\tNode: Node{\n\t\t\tName: clientName,\n\t\t\tnet: net,\n\t\t\tdir: clientDir,\n\t\t\tconsensus: cfg.Consensus,\n\t\t\ttermEarlyOk: cfg.AllowEarlyTermination,\n\t\t\ttermErrorOk: cfg.AllowErrorTermination,\n\t\t},\n\t\tmaxTransactionAge: cfg.MaxTransactionAge,\n\t\tconsensusPort: net.nextNodePort,\n\t\tp2pPort: net.nextNodePort + 1,\n\t}\n\tclient.doStartNode = client.startNode\n\n\tnet.clients = append(net.clients, client)\n\tnet.nextNodePort += 2\n\n\treturn client, nil\n}", "func newClient(iface *net.Interface) (*client, error) {\n\t// TODO(reddaly): At least attempt to bind to the port required in the spec.\n\t// Create a IPv4 listener\n\tconn, err := NewConn(&Config{Zone: nil})\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"[ERR] mdns: Failed to create client conn: %v\", err)\n\t}\n\n\tc := &client{\n\t\tconn: conn,\n\t\tclosedCh: make(chan struct{}),\n\t}\n\treturn c, nil\n}", "func NewClient(base string) *Client {\n\treturn &Client{\n\t\tLogger: slf4go.Get(\"ethclient\"),\n\t\tclient: sling.New().Base(base),\n\t}\n}", "func newClient(auth azure.Authorizer) *azureClient {\n\treturn &azureClient{\n\t\tscalesetvms: newVirtualMachineScaleSetVMsClient(auth.SubscriptionID(), auth.BaseURI(), auth.Authorizer()),\n\t}\n}", "func NewClient(appID int, appHash string, opt Options) *Client {\n\topt.setDefaults()\n\n\tmode := manager.ConnModeUpdates\n\tif opt.NoUpdates {\n\t\tmode = manager.ConnModeData\n\t}\n\tclient := &Client{\n\t\trand: opt.Random,\n\t\tlog: opt.Logger,\n\t\tappID: appID,\n\t\tappHash: appHash,\n\t\tupdateHandler: opt.UpdateHandler,\n\t\tsession: pool.NewSyncSession(pool.Session{\n\t\t\tDC: opt.DC,\n\t\t}),\n\t\tdomains: opt.DCList.Domains,\n\t\ttestDC: opt.DCList.Test,\n\t\tcfg: manager.NewAtomicConfig(tg.Config{\n\t\t\tDCOptions: opt.DCList.Options,\n\t\t}),\n\t\tcreate: defaultConstructor(),\n\t\tresolver: opt.Resolver,\n\t\tdefaultMode: mode,\n\t\tconnBackoff: opt.ReconnectionBackoff,\n\t\tclock: opt.Clock,\n\t\tdevice: opt.Device,\n\t\tmigrationTimeout: opt.MigrationTimeout,\n\t\tnoUpdatesMode: opt.NoUpdates,\n\t\tmw: opt.Middlewares,\n\t}\n\tif opt.TracerProvider != nil {\n\t\tclient.tracer = opt.TracerProvider.Tracer(oteltg.Name)\n\t}\n\tclient.init()\n\n\t// Including version into client logger to help with debugging.\n\tif v := version.GetVersion(); v != \"\" {\n\t\tclient.log = client.log.With(zap.String(\"v\", v))\n\t}\n\n\tif opt.SessionStorage != nil {\n\t\tclient.storage = &session.Loader{\n\t\t\tStorage: opt.SessionStorage,\n\t\t}\n\t}\n\n\tclient.opts = mtproto.Options{\n\t\tPublicKeys: opt.PublicKeys,\n\t\tRandom: opt.Random,\n\t\tLogger: opt.Logger,\n\t\tAckBatchSize: opt.AckBatchSize,\n\t\tAckInterval: opt.AckInterval,\n\t\tRetryInterval: opt.RetryInterval,\n\t\tMaxRetries: opt.MaxRetries,\n\t\tCompressThreshold: opt.CompressThreshold,\n\t\tMessageID: opt.MessageID,\n\t\tExchangeTimeout: opt.ExchangeTimeout,\n\t\tDialTimeout: opt.DialTimeout,\n\t\tClock: opt.Clock,\n\n\t\tTypes: getTypesMapping(),\n\n\t\tTracer: client.tracer,\n\t}\n\tclient.conn = client.createPrimaryConn(nil)\n\n\treturn client\n}", "func newClient(ctx context.Context, cfg vcConfig) (*vsClient, error) {\n\tu := url.URL{\n\t\tScheme: \"https\",\n\t\tHost: cfg.server,\n\t\tPath: \"sdk\",\n\t}\n\n\tu.User = url.UserPassword(cfg.user, cfg.password)\n\tinsecure := cfg.insecure\n\n\tgc, err := govmomi.NewClient(ctx, &u, insecure)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"connecting to vSphere API: %w\", err)\n\t}\n\n\trc := rest.NewClient(gc.Client)\n\ttm := tags.NewManager(rc)\n\n\tvsc := vsClient{\n\t\tgovmomi: gc,\n\t\trest: rc,\n\t\ttagManager: tm,\n\t}\n\n\terr = vsc.rest.Login(ctx, u.User)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"logging into rest api: %w\", err)\n\t}\n\n\treturn &vsc, nil\n}", "func NewClient(conf ClientConfig) (*Client, error) {\n\tkubeClient, kubeConfig, err := getKubeClient(conf.DNSAddress)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\ttunnel, err := portforwarder.New(\"kube-system\", kubeClient, kubeConfig)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\toptions := []helm.Option{\n\t\thelm.Host(fmt.Sprintf(\"127.0.0.1:%d\", tunnel.Local)),\n\t}\n\treturn &Client{\n\t\tclient: helm.NewClient(options...),\n\t\ttunnel: tunnel,\n\t}, nil\n}", "func newClient(cfg Config) *Client {\n\treturn &Client{bitclient: bitclient.NewBitClient(cfg.Bitbucket.Host, cfg.Bitbucket.User, cfg.Bitbucket.Password)}\n}", "func newInputService18ProtocolTestClient(cfg aws.Config, handlers request.Handlers, endpoint, signingRegion string) *InputService18ProtocolTest {\n\tsvc := &InputService18ProtocolTest{\n\t\tClient: client.New(\n\t\t\tcfg,\n\t\t\tmetadata.ClientInfo{\n\t\t\t\tServiceName: \"inputservice18protocoltest\",\n\t\t\t\tSigningRegion: signingRegion,\n\t\t\t\tEndpoint: endpoint,\n\t\t\t\tAPIVersion: \"2014-01-01\",\n\t\t\t},\n\t\t\thandlers,\n\t\t),\n\t}\n\n\t// Handlers\n\tsvc.Handlers.Sign.PushBack(v4.Sign)\n\tsvc.Handlers.Build.PushBackNamed(restxml.BuildHandler)\n\tsvc.Handlers.Unmarshal.PushBackNamed(restxml.UnmarshalHandler)\n\tsvc.Handlers.UnmarshalMeta.PushBackNamed(restxml.UnmarshalMetaHandler)\n\tsvc.Handlers.UnmarshalError.PushBackNamed(restxml.UnmarshalErrorHandler)\n\n\treturn svc\n}", "func newClient(configuration *Configuration, options ...ClientOption) (Client, error) {\n\tclientCfg, err := newTLSClientConfig(configuration)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error reading and/or parsing the certification files. Cause: %w\", err)\n\t}\n\n\tnetClient := http.Client{\n\t\tTransport: &http.Transport{\n\t\t\tTLSClientConfig: clientCfg,\n\t\t},\n\t}\n\n\tinstance := &client{client: &netClient, configuration: configuration, encoder: newJSONEncoder(), decoder: newJSONDecoder()}\n\n\t// Apply options if there are any, can overwrite default\n\tfor _, option := range options {\n\t\toption(instance)\n\t}\n\n\treturn instance, nil\n}", "func NewClient(userList, getUser, createUser, updateUser, deleteUser goa.Endpoint) *Client {\n\treturn &Client{\n\t\tUserListEndpoint: userList,\n\t\tGetUserEndpoint: getUser,\n\t\tCreateUserEndpoint: createUser,\n\t\tUpdateUserEndpoint: updateUser,\n\t\tDeleteUserEndpoint: deleteUser,\n\t}\n}", "func New(kubeconfig string, clusterContextOptions ...string) (*Client, error) {\n\tvar clusterCtxName string\n\tif len(clusterContextOptions) > 0 {\n\t\tclusterCtxName = clusterContextOptions[0]\n\t}\n\n\t// creating cfg for each client type because each\n\t// setup needs its own cfg default which may not be compatible\n\tdynCfg, err := makeRESTConfig(kubeconfig, clusterCtxName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tclient, err := dynamic.NewForConfig(dynCfg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdiscoCfg, err := makeRESTConfig(kubeconfig, clusterCtxName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdisco, err := discovery.NewDiscoveryClientForConfig(discoCfg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresources, err := restmapper.GetAPIGroupResources(disco)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tmapper := restmapper.NewDiscoveryRESTMapper(resources)\n\n\trestCfg, err := makeRESTConfig(kubeconfig, clusterCtxName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsetCoreDefaultConfig(restCfg)\n\trestc, err := rest.RESTClientFor(restCfg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Client{Client: client, Disco: disco, CoreRest: restc, Mapper: mapper}, nil\n}", "func NewBillServiceClientFactory(t thrift.TTransport, f thrift.TProtocolFactory) *BillServiceClient {\n return &BillServiceClient{\n c: thrift.NewTStandardClient(f.GetProtocol(t), f.GetProtocol(t)),\n }\n}", "func newClient(project string) (*client, error) {\n\tctx := context.Background()\n\tcl, err := pubsub.NewClient(ctx, project)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &client{\n\t\tclient: cl,\n\t}, nil\n}", "func NewClient(conf *Config, auth *AuthConfig) (*Client, error) {\n\tconfig := DefaultConfig\n\tif conf != nil {\n\t\tconfig = *conf\n\t}\n\n\tauthConf := DefaultAuth\n\tif auth != nil {\n\t\tauthConf = *auth\n\t}\n\n\tlogger, _ := zap.NewProduction()\n\tc := &Client{\n\t\tlog: logger.Sugar(),\n\t\tconfig: config,\n\t\tauthConfig: authConf,\n\t}\n\n\tvar err error\n\tc.TokenService = &TokenService{client: c}\n\tif c.IfNeedAuth() {\n\t\tc.authConfig.JWT, err = c.TokenService.GetNew()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tc.Company = &CompanyService{client: c}\n\tc.Device = &DeviceService{client: c}\n\tc.DeviceGroup = &DeviceGroupService{client: c}\n\tc.Parameter = &ParameterService{client: c}\n\tc.User = &UserService{client: c}\n\tc.Location = &LocationService{client: c}\n\tc.Role = &RoleService{client: c}\n\tc.Subscription = &SubscriptionService{client: c}\n\tc.Manufacturer = &ManufacturerService{client: c}\n\tc.DeviceModel = &DeviceModelService{client: c}\n\tc.Event = &EventService{client: c}\n\tc.EventsSession = &EventsSessionService{client: c}\n\n\treturn c, nil\n}", "func New(c transport.ClientConfig, opts ...thrift.ClientOption) Interface {\n\treturn client{\n\t\tc: thrift.New(thrift.Config{\n\t\t\tService: \"ThriftTest\",\n\t\t\tClientConfig: c,\n\t\t}, opts...),\n\t\tnwc: thrift.NewNoWire(thrift.Config{\n\t\t\tService: \"ThriftTest\",\n\t\t\tClientConfig: c,\n\t\t}, opts...),\n\t}\n}", "func NewClient() (*Client, error) {\n\tconfig, err := rest.InClusterConfig()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttypes := runtime.NewScheme()\n\tschemeBuilder := runtime.NewSchemeBuilder(\n\t\tfunc(scheme *runtime.Scheme) error {\n\t\t\treturn nil\n\t\t})\n\n\terr = schemeBuilder.AddToScheme(types)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient, err := newClientForAPI(config, v1alpha1.GroupVersion, types)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Client{\n\t\tclient: client,\n\t}, err\n}", "func NewClient(token string) (*Client, error) {\n\tbase, err := url.Parse(\"https://api.clashofclans.com/v1/\")\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not pass base url: %s\", err.Error())\n\t}\n\n\tclient := Client{\n\t\tBaseURL: base,\n\t\tToken: token,\n\t\tlogger: log.New(os.Stdout, \"[LIBCLASH] \", 1),\n\t}\n\n\tcommonSvc := service{&client}\n\tclient.Clan = (*ClanService)(&commonSvc)\n\tclient.Player = (*PlayerService)(&commonSvc)\n\tclient.League = (*LeagueService)(&commonSvc)\n\tclient.Location = (*LocationService)(&commonSvc)\n\tclient.Label = (*LabelService)(&commonSvc)\n\n\treturn &client, nil\n}", "func NewClient(conn *grpc.ClientConn) Client {\n\treturn &spiceDBClient{\n\t\tv0Client: &spiceDBv0Client{\n\t\t\tACLServiceClient: v0.NewACLServiceClient(conn),\n\t\t\tNamespaceServiceClient: v0.NewNamespaceServiceClient(conn),\n\t\t},\n\t\tv1alpha1Client: &spiceDBv1alpha1Client{\n\t\t\tSchemaServiceClient: v1alpha1.NewSchemaServiceClient(conn),\n\t\t},\n\t\tv1Client: &spiceDBv1Client{\n\t\t\tPermissionsServiceClient: v1.NewPermissionsServiceClient(conn),\n\t\t\tSchemaServiceClient: v1.NewSchemaServiceClient(conn),\n\t\t},\n\t}\n}", "func NewClient(redis redis.Conn, namespace string) *Client {\n\tif namespace == \"\" {\n\t\tnamespace = \"goreds\"\n\t}\n\n\treturn &Client{\n\t\t&ClientCh{redis, namespace, gojieba.NewJieba()},\n\t\t&ClientEn{redis, namespace}}\n}", "func newRoleAssignmentClient(subID string, authorizer auth.Authorizer) (*client, error) {\n\tc, err := wssdcloudclient.GetRoleAssignmentClient(&subID, authorizer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &client{c}, nil\n}", "func NewClient(ctx context.Context) (*sm.Client, error) {\n\tclient, err := sm.NewClient(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn client, nil\n}", "func NewClient(sclient SClientFactory, kclient servicecatalogclient.Interface) ClientInterface {\n\treturn &Client{\n\t\tcreateSvcatClient: sclient,\n\t\tkclient: kclient,\n\t}\n}", "func NewClient(clientID string, appAccessToken string, custom *http.Client) *Client {\n\tif custom == nil {\n\t\tcustom = http.DefaultClient\n\t}\n\n\tc := &Client{\n\t\thttp: custom,\n\t\trootURL: igdbURL,\n\t\tclientID: clientID,\n\t\ttoken: appAccessToken,\n\t}\n\n\tc.AgeRatings = &AgeRatingService{client: c, end: EndpointAgeRating}\n\tc.AgeRatingContents = &AgeRatingContentService{client: c, end: EndpointAgeRatingContent}\n\tc.AlternativeNames = &AlternativeNameService{client: c, end: EndpointAlternativeName}\n\tc.Artworks = &ArtworkService{client: c, end: EndpointArtwork}\n\tc.Characters = &CharacterService{client: c, end: EndpointCharacter}\n\tc.CharacterMugshots = &CharacterMugshotService{client: c, end: EndpointCharacterMugshot}\n\tc.Collections = &CollectionService{client: c, end: EndpointCollection}\n\tc.Companies = &CompanyService{client: c, end: EndpointCompany}\n\tc.CompanyLogos = &CompanyLogoService{client: c, end: EndpointCompanyLogo}\n\tc.CompanyWebsites = &CompanyWebsiteService{client: c, end: EndpointCompanyWebsite}\n\tc.Covers = &CoverService{client: c, end: EndpointCover}\n\tc.ExternalGames = &ExternalGameService{client: c, end: EndpointExternalGame}\n\tc.Franchises = &FranchiseService{client: c, end: EndpointFranchise}\n\tc.Games = &GameService{client: c, end: EndpointGame}\n\tc.GameEngines = &GameEngineService{client: c, end: EndpointGameEngine}\n\tc.GameEngineLogos = &GameEngineLogoService{client: c, end: EndpointGameEngineLogo}\n\tc.GameModes = &GameModeService{client: c, end: EndpointGameMode}\n\tc.GameVersions = &GameVersionService{client: c, end: EndpointGameVersion}\n\tc.GameVersionFeatures = &GameVersionFeatureService{client: c, end: EndpointGameVersionFeature}\n\tc.GameVersionFeatureValues = &GameVersionFeatureValueService{client: c, end: EndpointGameVersionFeatureValue}\n\tc.GameVideos = &GameVideoService{client: c, end: EndpointGameVideo}\n\tc.Genres = &GenreService{client: c, end: EndpointGenre}\n\tc.InvolvedCompanies = &InvolvedCompanyService{client: c, end: EndpointInvolvedCompany}\n\tc.Keywords = &KeywordService{client: c, end: EndpointKeyword}\n\tc.MultiplayerModes = &MultiplayerModeService{client: c, end: EndpointMultiplayerMode}\n\tc.Platforms = &PlatformService{client: c, end: EndpointPlatform}\n\tc.PlatformLogos = &PlatformLogoService{client: c, end: EndpointPlatformLogo}\n\tc.PlatformVersions = &PlatformVersionService{client: c, end: EndpointPlatformVersion}\n\tc.PlatformVersionCompanies = &PlatformVersionCompanyService{client: c, end: EndpointPlatformVersionCompany}\n\tc.PlatformVersionReleaseDates = &PlatformVersionReleaseDateService{client: c, end: EndpointPlatformVersionReleaseDate}\n\tc.PlatformWebsites = &PlatformWebsiteService{client: c, end: EndpointPlatformWebsite}\n\tc.PlayerPerspectives = &PlayerPerspectiveService{client: c, end: EndpointPlayerPerspective}\n\tc.PlatformFamilies = &PlatformFamilyService{client: c, end: EndpointPlatformFamily}\n\tc.ReleaseDates = &ReleaseDateService{client: c, end: EndpointReleaseDate}\n\tc.Screenshots = &ScreenshotService{client: c, end: EndpointScreenshot}\n\tc.Themes = &ThemeService{client: c, end: EndpointTheme}\n\tc.Websites = &WebsiteService{client: c, end: EndpointWebsite}\n\n\treturn c\n}", "func New(g *godo.Client) Client {\n\tc := &client{\n\t\tg: g,\n\t}\n\treturn c\n}", "func NewClient(query, list, versionsByID, byCatalogKindNameVersion, byCatalogKindNameVersionReadme, byCatalogKindNameVersionYaml, byVersionID, byCatalogKindName, byID, getRawYamlByCatalogKindNameVersion, getLatestRawYamlByCatalogKindName goa.Endpoint) *Client {\n\treturn &Client{\n\t\tQueryEndpoint: query,\n\t\tListEndpoint: list,\n\t\tVersionsByIDEndpoint: versionsByID,\n\t\tByCatalogKindNameVersionEndpoint: byCatalogKindNameVersion,\n\t\tByCatalogKindNameVersionReadmeEndpoint: byCatalogKindNameVersionReadme,\n\t\tByCatalogKindNameVersionYamlEndpoint: byCatalogKindNameVersionYaml,\n\t\tByVersionIDEndpoint: byVersionID,\n\t\tByCatalogKindNameEndpoint: byCatalogKindName,\n\t\tByIDEndpoint: byID,\n\t\tGetRawYamlByCatalogKindNameVersionEndpoint: getRawYamlByCatalogKindNameVersion,\n\t\tGetLatestRawYamlByCatalogKindNameEndpoint: getLatestRawYamlByCatalogKindName,\n\t}\n}", "func NewClient(cfg Config, l *logrus.Logger) (*Client, error) {\n\tctx := context.Background()\n\tkClient := gocloak.NewClient(cfg.Host)\n\tadmin, err := kClient.Login(ctx, adminClientID, cfg.AdminSecret, cfg.AdminRealm, cfg.AdminUser, cfg.AdminPassword)\n\tif err != nil {\n\t\tl.Errorf(\"NewClient\", err, \"failed to log admin user in\")\n\t\treturn nil, err\n\t}\n\tclients, err := kClient.GetClients(ctx, admin.AccessToken, cfg.ClientRealm, gocloak.GetClientsParams{ClientID: &cfg.ClientID})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(clients) == 0 {\n\t\treturn nil, ErrClientNotFound\n\t}\n\n\treturn &Client{\n\t\tcfg: cfg,\n\t\tctx: ctx,\n\t\tkc: kClient,\n\t\tac: &adminClient{\n\t\t\tadmin: admin,\n\t\t\taccessExpiry: time.Now().Add(time.Second * time.Duration(admin.ExpiresIn)),\n\t\t\trefreshExpiry: time.Now().Add(time.Second * time.Duration(admin.RefreshExpiresIn)),\n\t\t},\n\t\tclient: keycloakClient{\n\t\t\tid: *clients[0].ID,\n\t\t\tclientID: *clients[0].ClientID,\n\t\t},\n\t\trealm: cfg.ClientRealm,\n\t\tiss: cfg.Host + \"/auth/realms/\" + cfg.ClientRealm,\n\t\tl: l,\n\t}, nil\n}", "func NewClient(c ConnectionInterface, id string) *Client {\n return &Client{\n Id: id,\n Conn: c,\n Send: make(chan Event),\n Traits: new(sync.Map),\n Subscribers: new(sync.Map),\n }\n}", "func NewClient(apiVersion ApiVersion, tenantId string) Client {\n\treturn Client{\n\t\tEndpoint: environments.AadGraphGlobal.Endpoint,\n\t\tApiVersion: apiVersion,\n\t\tTenantId: tenantId,\n\t\thttpClient: http.DefaultClient,\n\t}\n}", "func NewClient(baseURL *url.URL, token string, httpClient *http.Client) *Client {\n\tif httpClient == nil {\n\t\thttpClient = http.DefaultClient\n\t}\n\n\tc := &Client{client: httpClient, BaseURL: baseURL, token: token}\n\tc.Dashboards = NewDashboardsService(c)\n\tc.Datasources = NewDatasourcesService(c)\n\n\treturn c\n}", "func NewClient(apiKey string) Client {\n\treturn &defaultClient{\n\t\tapiKey: apiKey,\n\t}\n}", "func NewConversationsClient() ConversationsClient {\n return NewConversationsClientWithBaseURI(DefaultBaseURI, )\n}", "func NewClient(connectionstring, pooluser string) (sc GenericClient) {\n\tif strings.HasPrefix(connectionstring, \"stratum+tcp://\") {\n\t\tsc = &StratumClient{\n\t\t\tconnectionstring: strings.TrimPrefix(connectionstring, \"stratum+tcp://\"),\n\t\t\tUser: pooluser,\n\t\t}\n\t} else {\n\t\ts := SiadClient{}\n\t\ts.siadurl = \"http://\" + connectionstring + \"/miner/header\"\n\t\tsc = &s\n\t}\n\treturn\n}", "func newAPI(cfg *ClientConfig, options ...ClientOption) *Client {\n\tclient := &Client{\n\t\tConfig: cfg,\n\t\thttpClient: &http.Client{},\n\t}\n\n\tfor _, option := range options {\n\t\toption(client)\n\t}\n\n\treturn client\n}", "func NewClient(cc *grpc.ClientConn, opts ...grpc.CallOption) *Client {\n\treturn &Client{\n\t\tgrpccli: steppb.NewStepClient(cc),\n\t\topts: opts,\n\t}\n}", "func newCustomReplicationControllers(c *CustomrcClient, namespace string) *customReplicationControllers {\n\treturn &customReplicationControllers{\n\t\tclient: c.RESTClient(),\n\t\tns: namespace,\n\t}\n}" ]
[ "0.60357934", "0.60140467", "0.60140467", "0.59611017", "0.58931166", "0.58054805", "0.578861", "0.57077706", "0.5698917", "0.568915", "0.56499505", "0.5596916", "0.5566251", "0.5557535", "0.554492", "0.5529814", "0.5520712", "0.55134845", "0.55014735", "0.5476757", "0.54727465", "0.54703194", "0.546704", "0.5465547", "0.5457862", "0.5429951", "0.5415263", "0.54131335", "0.5397933", "0.5397095", "0.53857017", "0.5383677", "0.5383409", "0.53758013", "0.5363764", "0.5356139", "0.5341231", "0.5341091", "0.53395855", "0.53349787", "0.5332084", "0.5331093", "0.53015393", "0.53010434", "0.5299274", "0.52948344", "0.52925533", "0.5291041", "0.528614", "0.52819103", "0.5274653", "0.5264975", "0.5262726", "0.52598214", "0.5255662", "0.5243876", "0.5238102", "0.5236509", "0.52303576", "0.52303576", "0.5215921", "0.5208392", "0.5207009", "0.5205937", "0.52030003", "0.51987314", "0.5196574", "0.51963663", "0.5193697", "0.5180216", "0.51802", "0.517963", "0.5177459", "0.51764613", "0.51669025", "0.5166647", "0.51650155", "0.5162665", "0.51590914", "0.51588655", "0.5146542", "0.51410365", "0.5137718", "0.51376504", "0.5134679", "0.5129744", "0.51295054", "0.5122145", "0.5121252", "0.5116375", "0.5108649", "0.5108466", "0.51079774", "0.51070696", "0.51029855", "0.5100102", "0.50968784", "0.5095159", "0.50912476", "0.50910836" ]
0.6987398
0
NewChannel create channel for using by OutForward() and InTail().
func NewChannel() (chan *fluent.FluentRecordSet, chan Stat) { messageCh := make(chan *fluent.FluentRecordSet, MessageChannelBufferLen) monitorCh := make(chan Stat, MonitorChannelBufferLen) return messageCh, monitorCh }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewChannel() Channel {\n\treturn Channel{&sync.Mutex{}, map[string]map[*struct{}]JoinOptions{}}\n}", "func NewChannel(cli, svr int) *Channel {\n\tc := new(Channel)\n\tc.CliProto.Init(cli)\n\n\t// grpc接收資料的緩充量\n\tc.signal = make(chan *grpc.Proto, svr)\n\tc.watchOps = make(map[int32]struct{})\n\treturn c\n}", "func createChannel() Channel {\n\tchannel := channelStruct{}\n\treturn &channel\n}", "func NewChannel(name string) *Channel {\n\treturn &Channel{\n\t\tusers: make([]User, 0),\n\t\tname: name,\n\t\tin: make(chan Message, 5),\n\t\tjoin: make(chan User, 5),\n\t\tpart: make(chan User, 5),\n\t}\n}", "func New(rw io.ReadWriteCloser, t reflect.Type, buffer int) *Chan {\n\tbuffer--\n\tif buffer < 0 {\n\t\tbuffer = 0\n\t}\n\treturn newChan(t, buffer, rw)\n}", "func newChannel() *messagingv1alpha1.Channel {\n\tlbls := make(map[string]string, len(tChLabels))\n\tfor k, v := range tChLabels {\n\t\tlbls[k] = v\n\t}\n\n\treturn &messagingv1alpha1.Channel{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tNamespace: tNs,\n\t\t\tName: tName,\n\t\t\tLabels: lbls,\n\t\t\tOwnerReferences: []metav1.OwnerReference{tOwnerRef},\n\t\t},\n\t}\n}", "func NewChannel(ctx Context) Channel {\n\tstate := getState(ctx)\n\tstate.dispatcher.channelSequence++\n\treturn NewNamedChannel(ctx, fmt.Sprintf(\"chan-%v\", state.dispatcher.channelSequence))\n}", "func NewChannel(changeChan chan bool) *Channel {\n\treturn &Channel{\n\t\tcurSpeed: 0,\n\t\tmaxSpeed: 0,\n\t\tmanualSpeed: 0,\n\t\ttemp: 0,\n\t\tcurAlarm: 0,\n\t\ttargetSpeed: 65535,\n\t\ttargetAlarm: 255,\n\t\tdirty: false,\n\t\tinit: 0x00,\n\t\tchange: changeChan,\n\t}\n}", "func execNewChan(_ int, p *gop.Context) {\n\targs := p.GetArgs(2)\n\tret := types.NewChan(types.ChanDir(args[0].(int)), args[1].(types.Type))\n\tp.Ret(2, ret)\n}", "func NewChannel(ctx *pulumi.Context,\n\tname string, args *ChannelArgs, opts ...pulumi.ResourceOption) (*Channel, error) {\n\tif args == nil {\n\t\targs = &ChannelArgs{}\n\t}\n\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource Channel\n\terr := ctx.RegisterResource(\"aws-native:medialive:Channel\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func newCh(pch perun.Channel, currency string, parts []string, timeoutCfg timeoutConfig,\n\tchallengeDurSecs uint64) *Channel {\n\tch := &Channel{\n\t\tid: fmt.Sprintf(\"%x\", pch.ID()),\n\t\tpch: pch,\n\t\tstatus: open,\n\t\tcurrState: pch.State().Clone(),\n\t\ttimeoutCfg: timeoutCfg,\n\t\tchallengeDurSecs: challengeDurSecs,\n\t\tcurrency: currency,\n\t\tparts: parts,\n\t\tchUpdateResponders: make(map[string]chUpdateResponderEntry),\n\t\twatcherWg: &sync.WaitGroup{},\n\t}\n\tch.watcherWg.Add(1)\n\tgo func(ch *Channel) {\n\t\terr := ch.pch.Watch()\n\t\tch.watcherWg.Done()\n\n\t\tch.HandleWatcherReturned(err)\n\t}(ch)\n\treturn ch\n}", "func NewChannel(prefix string, name string, server *Server) *Channel {\n\treturn &Channel{\n\t\tPrefix: prefix,\n\t\tName: name,\n\t\tKey: \"\",\n\t\tServer: server,\n\t\tMembers: make([]*Client, 0),\n\t\tMemberModes: make(map[int]*MemberMode, 0),\n\t\tMessages: make(chan string, 1),\n\t\tChannelInfo: NewChannelInfo(),\n\t\tAlive: true,\n\t}\n}", "func NewChan(chanSize int) *Chan {\n\treturn &Chan{\n\t\toutMsgChan: make(chan outMessage, chanSize),\n\t\tinMsgChan: make(chan []byte, chanSize),\n\t\tCloseChan: make(chan struct{}),\n\t}\n}", "func NewChannel() Channel {\n\t// dependency injection? never heard of it...\n\treturn Channel{request{validator.New()}}\n}", "func NewChannel(network, name string) *Channel {\n\treturn &Channel{\n\t\tClient: NewClient(),\n\t\tScope: data.Scope{\n\t\t\tNet: network,\n\t\t\tName: name,\n\t\t},\n\t}\n}", "func NewFanOut(inChannel <-chan interface{}, lag int) *FanOut {\n\tfanOut := &FanOut{\n\t\tlag: lag,\n\t\toutChannels: make(map[<-chan interface{}]chan interface{}),\n\t\tmutex: &sync.Mutex{},\n\t}\n\tgo func() {\n\t\tfor value := range inChannel {\n\t\t\tfanOut.mutex.Lock()\n\t\t\tfor _, c := range fanOut.outChannels {\n\t\t\t\tc <- value\n\t\t\t}\n\t\t\tfanOut.mutex.Unlock()\n\t\t}\n\t\tfanOut.mutex.Lock()\n\t\tfanOut.closed = true\n\t\tfor _, c := range fanOut.outChannels {\n\t\t\tclose(c)\n\t\t}\n\t\tfanOut.mutex.Unlock()\n\t}()\n\treturn fanOut\n}", "func CreateLocalChannel(port, maxConcurrency int, conn *grpc.ClientConn, spec config.TracingSpec, maxRequestBodySize int, readBufferSize int, baseAddress string) *Channel {\n\t// readBufferSize is unused\n\tc := &Channel{\n\t\tappCallbackClient: runtimev1pb.NewAppCallbackClient(conn),\n\t\tconn: conn,\n\t\tbaseAddress: net.JoinHostPort(baseAddress, strconv.Itoa(port)),\n\t\ttracingSpec: spec,\n\t\tappMetadataToken: security.GetAppToken(),\n\t\tmaxRequestBodySizeMB: maxRequestBodySize,\n\t}\n\tif maxConcurrency > 0 {\n\t\tc.ch = make(chan struct{}, maxConcurrency)\n\t}\n\treturn c\n}", "func NewChan(elem *types.Chan) Type {\n\treturn &Chan{\n\t\tnewBaseType(),\n\t\telem,\n\t}\n}", "func (c *chanlist) newChan(t *transport) *clientChan {\n\tc.Lock()\n\tdefer c.Unlock()\n\tfor i := range c.chans {\n\t\tif c.chans[i] == nil {\n\t\t\tch := newClientChan(t, uint32(i))\n\t\t\tc.chans[i] = ch\n\t\t\treturn ch\n\t\t}\n\t}\n\ti := len(c.chans)\n\tch := newClientChan(t, uint32(i))\n\tc.chans = append(c.chans, ch)\n\treturn ch\n}", "func NewChan(elem Type) *Chan {\n\treturn &Chan{elem}\n}", "func newClientChan(t *transport, id uint32) *clientChan {\n\tc := &clientChan{\n\t\tpacketWriter: t,\n\t\tid: id,\n\t\tmsg: make(chan interface{}, 16),\n\t}\n\tc.stdin = &chanWriter{\n\t\twin: make(chan int, 16),\n\t\tclientChan: c,\n\t}\n\tc.stdout = &chanReader{\n\t\tdata: make(chan []byte, 16),\n\t\tclientChan: c,\n\t}\n\tc.stderr = &chanReader{\n\t\tdata: make(chan []byte, 16),\n\t\tclientChan: c,\n\t}\n\treturn c\n}", "func newPopChannel() popChannel {\n\t// The pop channel is stacked, so only a buffer of 1 is required\n\t// see http://gowithconfidence.tumblr.com/post/31426832143/stacked-channels\n\treturn make(chan []*URLContext, 1)\n}", "func newWebSocketChan(ctx context.Context, addr string, conn *websocket.Conn) wormhole.DataChannel {\n\treturn &webSocketChan{\n\t\tctx: ctx,\n\t\taddr: addr,\n\t\tconn: conn,\n\t\twfh: wormhole_msgp.Handler,\n\t}\n}", "func chanMake(elementSize uintptr, bufSize uintptr) *channel {\n\treturn &channel{\n\t\telementSize: elementSize,\n\t\tbufSize: bufSize,\n\t\tbuf: alloc(elementSize * bufSize),\n\t}\n}", "func (p *LightningPool) new(ctx context.Context) (*amqp.Channel, error) {\n\treturn p.conn.Channel(ctx)\n}", "func (fr *frame) makeChan(chantyp types.Type, size *govalue) *govalue {\n\t// TODO(pcc): call __go_new_channel_big here if needed\n\tdyntyp := fr.types.ToRuntime(chantyp)\n\tsize = fr.convert(size, types.Typ[types.Uintptr])\n\tch := fr.runtime.newChannel.call(fr, dyntyp, size.value)[0]\n\treturn newValue(ch, chantyp)\n}", "func NewChan() chan Tick {\n\treturn make(chan Tick, MetronomeTickChanBufSize)\n}", "func NewChannel(name, namespace string, o ...ChannelOption) *eventingv1.Channel {\n\tc := &eventingv1.Channel{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"messaging.knative.dev/v1\",\n\t\t\tKind: \"Channel\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tNamespace: namespace,\n\t\t},\n\t}\n\tfor _, opt := range o {\n\t\topt(c)\n\t}\n\tc.SetDefaults(context.Background())\n\treturn c\n}", "func New(bufferLen int) *Chanx {\n\tchanx := &Chanx{\n\t\tchans: list.New(),\n\t\tbufferLen: bufferLen,\n\t\tchansLock: &sync.Mutex{},\n\t\tStopChan: make(chan struct{}),\n\t}\n\tchanx.ReadChan = chanx.createChan()\n\tchanx.WriteChan = chanx.ReadChan\n\tchanx.pushChan(chanx.ReadChan)\n\treturn chanx\n}", "func (t *OpenconfigPlatform_Components_Component_Transceiver_PhysicalChannels) NewChannel(Index uint16) (*OpenconfigPlatform_Components_Component_Transceiver_PhysicalChannels_Channel, error){\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Channel == nil {\n\t\tt.Channel = make(map[uint16]*OpenconfigPlatform_Components_Component_Transceiver_PhysicalChannels_Channel)\n\t}\n\n\tkey := Index\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Channel[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Channel\", key)\n\t}\n\n\tt.Channel[key] = &OpenconfigPlatform_Components_Component_Transceiver_PhysicalChannels_Channel{\n\t\tIndex: &Index,\n\t}\n\n\treturn t.Channel[key], nil\n}", "func (c *Component) Channel(n string, ch ChannelInterface) {\n\tc.GM.Server.NewChannels(map[string]ChannelInterface{n: ch})\n}", "func New(c chan<- string) ChanPrinter {\n\treturn ChanPrinter(c)\n}", "func NewChannel(ourState, partenerState *EndState, externState *ExternalState, tokenAddr common.Address, channelIdentifier *contracts.ChannelUniqueID,\n\trevealTimeout, settleTimeout int) (c *Channel, err error) {\n\tif settleTimeout <= revealTimeout {\n\t\terr = errors.New(\"reveal_timeout can not be larger-or-equal to settle_timeout\")\n\t\treturn\n\t}\n\tif revealTimeout < 3 {\n\t\terr = errors.New(\"reveal_timeout must be at least 3\")\n\t\treturn\n\t}\n\tc = &Channel{\n\t\tOurState: ourState,\n\t\tPartnerState: partenerState,\n\t\tExternState: externState,\n\t\tChannelIdentifier: *channelIdentifier,\n\t\tTokenAddress: tokenAddr,\n\t\tRevealTimeout: revealTimeout,\n\t\tSettleTimeout: settleTimeout,\n\t\tState: channeltype.StateOpened,\n\t}\n\tif externState.ClosedBlock != 0 {\n\t\tc.State = channeltype.StateClosed\n\t}\n\tif externState.SettledBlock != 0 {\n\t\tc.State = channeltype.StateSettled\n\t}\n\treturn\n}", "func newDefaultChannelPipe(bufSize int, listener PipeEventListener) *channelPipe {\n\tif listener == nil {\n\t\tlistener = &StatListener{}\n\t}\n\tc := &channelPipe{\n\t\tin: make(chan interface{}),\n\t\tout: make(chan interface{}, 1),\n\t\tdone: make(chan interface{}),\n\n\t\tqueue: NewPressableQueue(bufSize),\n\t\tstop: make(chan interface{}),\n\n\t\tlistener: listener,\n\t}\n\n\treturn c\n}", "func newChannelNode(t *testing.T) *testNode {\n\tch, err := tchannel.NewChannel(\"test\", nil)\n\trequire.NoError(t, err, \"channel must create successfully\")\n\n\t// Set the channel listening so it binds to the socket and we get a port\n\t// allocated by the OS\n\terr = ch.ListenAndServe(\"127.0.0.1:0\")\n\trequire.NoError(t, err, \"channel must listen\")\n\n\thostport := ch.PeerInfo().HostPort\n\tc := clock.NewMock()\n\tnode := NewNode(\"test\", hostport, ch.GetSubChannel(\"test\"), &Options{\n\t\tClock: c,\n\t})\n\n\treturn &testNode{node, ch, c}\n}", "func New(ch chan interface{}) Ctx {\n\treturn Ctx{bridge.New(ch)}\n}", "func newCommune(n int) *commune {\n\treturn &commune{ch: make(chan string, n)}\n}", "func NewChannelMap() *MyStruct{\n\tvar cMap MyStruct\n\tcMap.adding =make(chan string, 32)\n\tcMap.asking = make(chan string, 8)\n\tcMap.reducing = make(chan ReduceStruct)\n\tcMap.reduceTemp = make(chan ReduceStruct)\n\tcMap.stop = make(chan bool)\n\tcMap.wordCountMap = make(map[string]int)\n\tcMap.temp = make(chan int)\n\treturn &cMap\n}", "func NewChannel(id string, createdAt string, updatedAt string, resourceOwnerId string, name string, ) *Channel {\n\tthis := Channel{}\n\tthis.Id = id\n\tthis.CreatedAt = createdAt\n\tthis.UpdatedAt = updatedAt\n\tthis.ResourceOwnerId = resourceOwnerId\n\tthis.Name = name\n\treturn &this\n}", "func NewChannelIdentity()(*ChannelIdentity) {\n m := &ChannelIdentity{\n }\n m.SetAdditionalData(make(map[string]interface{}));\n return m\n}", "func (p *HostedProgramInfo) Channel() io.ReadWriteCloser {\n\treturn p.TaoChannel\n}", "func NewChannel(name string) *unstructured.Unstructured {\n\tvalidateDNS1123Subdomain(name)\n\n\tc := &unstructured.Unstructured{}\n\n\tc.SetAPIVersion(APIMessaging)\n\tc.SetKind(\"Channel\")\n\tc.SetName(name)\n\n\treturn c\n}", "func NewChanTransport(nhConfig config.NodeHostConfig,\n\trequestHandler raftio.RequestHandler,\n\tchunkHandler raftio.IChunkHandler) raftio.IRaftRPC {\n\treturn &ChanTransport{\n\t\tnhConfig: nhConfig,\n\t\trequestHandler: requestHandler,\n\t\tchunkHandler: chunkHandler,\n\t\tstopper: syncutil.NewStopper(),\n\t}\n}", "func (s *f64) Channel(c int) Floating {\n\treturn floatingChannel{\n\t\tbuffer: s,\n\t\tchannel: c,\n\t}\n}", "func buildChannel() (rChan *RabbitChanWriter) {\n connection, err := amqp.Dial(*uri)\n if err != nil {\n log.Printf(\"Dial: %s\", err)\n return nil\n }\n\n channel, err := connection.Channel()\n if err != nil {\n log.Printf(\"Channel: %s\", err)\n return nil\n }\n\n // build the exchange\n if err := channel.ExchangeDeclare(\n *exchange, // name\n *exchangeType, // type\n true, // durable\n false, // auto-deleted\n false, // internal\n false, // noWait\n nil, // arguments\n ); err != nil {\n log.Fatalf(\"Exchange Declare: %s\", err)\n }\n\n // create a queue with the routing key and bind to it\n if _, err := channel.QueueDeclare(\n *routingKey, // name\n true, // durable\n false, // autoDelete\n false, // exclusive\n false, // noWait\n nil, // args\n ); err != nil {\n log.Fatalf(\"Queue Declare: %s\", err)\n }\n\n if err := channel.QueueBind(\n *routingKey, // name\n *routingKey, // key\n *exchange, // exchange\n false, // noWait\n nil, // args\n ); err != nil {\n log.Fatalf(\"Queue Bind: %s\", err)\n }\n\n\n rChan = &RabbitChanWriter{channel, connection}\n return\n}", "func (r Rabbit) NewCh() (*amqp.Channel, error) {\n\treturn r.conn.Channel()\n}", "func (service *QueueService) CreateChannel() (*amqp.Channel, error) {\n\treturn service.amqp.Channel()\n}", "func NewChannelEdge(typ pipeline.EdgeType, size int) Edge {\n\treturn &channelEdge{\n\t\taborting: make(chan struct{}),\n\t\tmessages: make(chan Message, size),\n\t\tstate: edgeOpen,\n\t\ttyp: typ,\n\t}\n}", "func Channel(m *operatorsv1.MultiClusterHub) *unstructured.Unstructured {\n\tch := &unstructured.Unstructured{\n\t\tObject: map[string]interface{}{\n\t\t\t\"apiVersion\": \"apps.open-cluster-management.io/v1\",\n\t\t\t\"kind\": \"Channel\",\n\t\t\t\"metadata\": map[string]interface{}{\n\t\t\t\t\"name\": ChannelName,\n\t\t\t\t\"namespace\": m.Namespace,\n\t\t\t},\n\t\t\t\"spec\": map[string]interface{}{\n\t\t\t\t\"type\": \"HelmRepo\",\n\t\t\t\t\"pathname\": channelURL(m),\n\t\t\t},\n\t\t},\n\t}\n\tif m.Status.CurrentVersion != version.Version {\n\t\tch.SetAnnotations(AnnotationRateHigh)\n\t} else {\n\t\tch.SetAnnotations(AnnotationRateLow)\n\t}\n\n\tch.SetOwnerReferences([]metav1.OwnerReference{\n\t\t*metav1.NewControllerRef(m, m.GetObjectKind().GroupVersionKind()),\n\t})\n\treturn ch\n}", "func New(config Config) *Channel {\n\treturn &Channel{config.CallbackToken}\n}", "func (n *NetworkService) Channel(id string) (*Channel, error) {\n\tch, err := n.fns.Channel(id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Channel{sp: n.sp, ch: ch}, nil\n}", "func (_PaymentContract *PaymentContractTransactor) CreateChannel(opts *bind.TransactOpts, _agent_address common.Address, _deposit *big.Int) (*types.Transaction, error) {\n\treturn _PaymentContract.contract.Transact(opts, \"createChannel\", _agent_address, _deposit)\n}", "func NewChannel(chID string) (*Channel, error) {\n\tvar chDoc db.Channel\n\n\tctx, _ := context.WithTimeout(context.Background(), time.Second*2)\n\t// Find the channel with the UUID of chID.\n\tif err := db.Mongo.Database(config.C.MongoDB.Name).Collection(\"channels\").FindOne(ctx, bson.M{\n\t\t\"_id\": chID,\n\t}).Decode(&chDoc); err != nil {\n\t\treturn nil, err\n\t}\n\n\tchannel := &Channel{\n\t\tClients: make(map[string][]*Client),\n\t\tSend: make(chan []byte),\n\t\tpossibleClients: chDoc.Users,\n\t\tregister: make(chan *Client),\n\t\tunregister: make(chan *Client),\n\t}\n\n\tC.Channels[chID] = channel\n\treturn channel, nil\n}", "func GetChannel(protocol, host string, port int, secureConfig *tls.Config) (ReaderWriterCloser, error) {\n\tvar conn net.Conn\n\tvar err error\n\tconn, err = net.Dial(protocol, host+\":\"+strconv.Itoa(port))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif protocol == \"tcp\" {\n\t\tconn.(*net.TCPConn).SetKeepAlive(true)\n\t\tconn.(*net.TCPConn).SetKeepAlivePeriod(30 * time.Second)\n\t}\n\tif secureConfig != nil {\n\t\tconn = tls.Client(conn, secureConfig)\n\t}\n\tvar readerWriter ReaderWriterCloser = &Channel{\n\t\tprotocol: protocol,\n\t\thost: host,\n\t\tport: port,\n\t\tconn: conn,\n\t\tmaxRead: 8 * 1024,\n\t\treadBuffer: make([]byte, 0),\n\t\twriteBuffer: make([]byte, 0),\n\t\twriteChannel: make(chan writeComplete, 100),\n\t\treadTimeout: 60 * time.Second,\n\t\twriteTimeout: 60 * time.Second,\n\t}\n\tgo readerWriter.(*Channel).writeRoutine()\n\treturn readerWriter, nil\n}", "func (_PaymentContract *PaymentContractTransactorSession) CreateChannel(_agent_address common.Address, _deposit *big.Int) (*types.Transaction, error) {\n\treturn _PaymentContract.Contract.CreateChannel(&_PaymentContract.TransactOpts, _agent_address, _deposit)\n}", "func newClockChan(d time.Duration) <-chan chan struct{} {\n\tch := make(chan chan struct{}, 1)\n\tgo func() { time.Sleep(d); ch <- make(chan struct{}) }()\n\treturn ch\n}", "func NewChannel(channel *types.Channel) {\n\tif db.NewRecord(channel) {\n\t\tdb.Create(channel)\n\t}\n}", "func New(fabricProvider api.FabricProvider) (*ChannelProvider, error) {\n\tcp := ChannelProvider{fabricProvider: fabricProvider}\n\treturn &cp, nil\n}", "func (s *Server) NewChannels(c map[string]ChannelInterface) {\n for k, v := range c {\n v.SetGM(s.GM)\n v.Open()\n s.Channels.Store(k, v)\n }\n}", "func NewRingChannel(size int) *RingChannel {\n\tif size <= 0 {\n\t\tpanic(\"invalid negative or empty size in NewRingChannel\")\n\t}\n\n\tch := &RingChannel{\n\t\tinput: make(chan interface{}),\n\t\toutput: make(chan interface{}, size),\n\t\tsize: size,\n\t}\n\tgo ch.run()\n\treturn ch\n}", "func (p *Pool) new(ctx context.Context) (ChannelKeeper, error) {\n\tch, err := p.conn.Channel(ctx)\n\tif err != nil {\n\t\treturn ChannelKeeper{}, errors.Wrap(err, \"failed to receive channel from connection\")\n\t}\n\n\terrorCh := ch.NotifyClose(make(chan *amqp.Error, 1))\n\n\terr = ch.Confirm(false)\n\tif err != nil {\n\t\t_ = ch.Close() //nolint: gosec\n\n\t\treturn ChannelKeeper{}, errors.Wrap(err, \"failed to setup confirm mode for channel\")\n\t}\n\n\tconfirmCh := ch.NotifyPublish(make(chan amqp.Confirmation, 1))\n\n\treturnCh := ch.NotifyReturn(make(chan amqp.Return, 1))\n\n\treturn ChannelKeeper{ch, errorCh, confirmCh, returnCh}, nil\n}", "func (c *Client) Channel(ctx context.Context, r ChannelRequest) (*ChannelReply, error) {\r\n\treq, err := http.NewRequestWithContext(\r\n\t\tctx,\r\n\t\thttp.MethodGet,\r\n\t\tfmt.Sprintf(\"%s/%s/channel/%s\", c.getChanelBaseEndpoint(), r.AccountID, r.ChannelID),\r\n\t\tnil,\r\n\t)\r\n\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\tres := ChannelReply{}\r\n\tif err := c.sendRequest(req, &res); err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\treturn &res, nil\r\n}", "func New(options ...func(pushers.Channel) error) (pushers.Channel, error) {\n\tch := make(chan map[string]interface{}, 100)\n\n\tc := Console{\n\t\tWriter: os.Stdout,\n\t\tch: ch,\n\t}\n\n\tfor _, optionFn := range options {\n\t\toptionFn(&c)\n\t}\n\n\tgo c.run()\n\n\treturn &c, nil\n}", "func (wet *WETReader) Channel() (<-chan struct { Entry *WETEntry; Err error }) {\n channel := make(chan struct { Entry *WETEntry; Err error })\n go func() {\n defer func() {\n wet.Close()\n close(channel)\n }()\n for {\n entry, err := wet.extractEntry()\n channel <- struct { Entry *WETEntry; Err error }{ entry, err }\n if err != nil {\n return\n }\n }\n }()\n return channel\n}", "func newPingChannelServer(s *StorjTelehash) func() ChannelHandler {\n\treturn func() ChannelHandler {\n\t\tlogging.Println(\"factory\")\n\t\tlogging.Println(s)\n\t\treturn &pingChannelServer{st: s}\n\t}\n}", "func NewInterruptChannel(numListeners int) <-chan error {\n\tinterruptCh := make(chan error, numListeners)\n\tgo func() {\n\t\terr := fmt.Errorf(\"%v\", <-interrupt())\n\t\tfor i := 0; i < numListeners; i++ {\n\t\t\tinterruptCh <- err\n\t\t}\n\t}()\n\treturn interruptCh\n}", "func newKafkaChannel(name, namespace string) *kafkav1alpha1.KafkaChannel {\n\treturn &kafkav1alpha1.KafkaChannel{\n\t\tObjectMeta: v1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tNamespace: namespace,\n\t\t},\n\t}\n}", "func (t *StreamService) CreateChannel(request *CreateChannelRequest) (*CreateChannelResponse, error) {\n\n\trsp := &CreateChannelResponse{}\n\treturn rsp, t.client.Call(\"stream\", \"CreateChannel\", request, rsp)\n\n}", "func (p *LightningPool) Channel(ctx context.Context) (*amqp.Channel, error) {\n\tvar (\n\t\tk *amqp.Channel\n\t\terr error\n\t)\n\n\tp.mx.Lock()\n\tlast := len(p.set) - 1\n\tif last >= 0 {\n\t\tk = p.set[last]\n\t\tp.set = p.set[:last]\n\t}\n\tp.mx.Unlock()\n\n\t// If pool is empty create new channel\n\tif last < 0 {\n\t\tk, err = p.new(ctx)\n\t\tif err != nil {\n\t\t\treturn k, errors.Wrap(err, \"failed to create new\")\n\t\t}\n\t}\n\n\treturn k, nil\n}", "func NewChannelReader(c <-chan []byte) *ChannelReader {\n\treturn &ChannelReader{\n\t\tc: c,\n\t}\n}", "func (_PaymentContract *PaymentContractSession) CreateChannel(_agent_address common.Address, _deposit *big.Int) (*types.Transaction, error) {\n\treturn _PaymentContract.Contract.CreateChannel(&_PaymentContract.TransactOpts, _agent_address, _deposit)\n}", "func (db *Database) NewChannel(name string, topic string) error {\n\t_, err := db.db.Exec(`\n\t\tINSERT INTO melodious.channels (name, topic) VALUES ($1, $2);\n\t`, name, topic)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func CreateChannel(service *service.Service, name, botName string) (*models.Channel, error) {\n\t// Call create channel\n\tres, err := service.SimpleCall(\"private.channel.create\", nil, wamp.Dict{\"name\": name, \"botName\": botName})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t//Check and return result\n\tif len(res.Arguments) > 0 {\n\t\tchannel, err := conv.ToStringMap(res.Arguments[0])\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tignored, err := conv.ToBool(channel[\"ignored\"])\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn &models.Channel{\n\t\t\tName: conv.ToString(channel[\"name\"]),\n\t\t\tBotName: conv.ToString(channel[\"bot_name\"]),\n\t\t\tNotes: conv.ToString(channel[\"notes\"]),\n\t\t\tIgnored: ignored,\n\t\t}, nil\n\t}\n\treturn nil, nil\n}", "func (c *Client) CreateChannel(topic string) (Channel, error) {\n\tvar err error\n\tchannel := Channel{\n\t\tTopic: topic,\n\t}\n\tchannel.client = NewIngestClient(c.conn)\n\tctx := addTokenToContext(context.Background(), c.Token)\n\tchannel.stream, err = channel.client.StreamEvents(ctx)\n\tif err != nil {\n\t\treturn channel, err\n\t}\n\treturn channel, nil\n}", "func newMsgPipe(pipeMaxCount int, input <-chan *Message, newNc func() NodeConn, ncp *NodeConnPipe) (mp *msgPipe) {\n\tmp = &msgPipe{\n\t\tnewNc: newNc,\n\t\tinput: input,\n\t\tncp: ncp,\n\t\tbatch: make([]*Message, pipeMaxCount),\n\t\tpipeMaxCount: pipeMaxCount,\n\t}\n\tmp.nc.Store(newNc())\n\tgo mp.pipe()\n\treturn\n}", "func ChannelAfterCreate(\n\targChannel *types.Channel,\n\targOldChannel *types.Channel,\n) *channelAfterCreate {\n\treturn &channelAfterCreate{\n\t\tchannelBase: &channelBase{\n\t\t\timmutable: false,\n\t\t\tchannel: argChannel,\n\t\t\toldChannel: argOldChannel,\n\t\t},\n\t}\n}", "func New(channels ...<-chan []byte) *Plexer {\n\treturn &Plexer{\n\t\tchannels: channels,\n\t\toutput: make(chan []byte),\n\t}\n}", "func NewFlattenerChan(size int) interface{} {\n\treturn &FlatChannel{In: make(chan *sfgo.FlatRecord, size)}\n}", "func NewChannelList() *ChannelList {\n\tl := &ChannelList{channels: []*ChannelBucket{}}\n\t// split hashmap to many bucket\n\tlog.Debug(\"create %d ChannelBucket\", Conf.ChannelBucketCount)\n\tfor i := 0; i < Conf.ChannelBucketCount; i++ {\n\t\tb := &ChannelBucket{\n\t\t\tdata: map[string]*Channel{},\n\t\t\tmutex: &sync.Mutex{},\n\t\t}\n\t\tl.channels = append(l.channels, b)\n\t}\n\treturn l\n}", "func (p *P2PProxy) ManageOutChannel(w *worker.Thread) {\n\tw.OnRun(func() {\n\t\tfor data := range p.BroadcastOut {\n\t\t\tswitch data.(type) {\n\t\t\tcase FactomMessage:\n\t\t\t\tfmessage := data.(FactomMessage)\n\t\t\t\t// Wrap it in a parcel and send it out channel ToNetwork.\n\t\t\t\tparcel := p2p.NewParcel(fmessage.PeerHash, fmessage.Message)\n\t\t\t\tp.Network.Send(parcel)\n\t\t\tdefault:\n\t\t\t\tp.logger.Errorf(\"Garbage on f.BrodcastOut. %+v\", data)\n\t\t\t}\n\t\t}\n\t})\n}", "func NewChannelWriter(channel chan []byte) *channelWriter {\n\treturn &channelWriter{channel: channel}\n}", "func NewPipe(input chan interface{}) *Pipe {\n\t// echo input to output\n\treturn &Pipe{Output: input}\n}", "func NewNamedChannel(ctx Context, name string) Channel {\n\treturn &channelImpl{name: name}\n}", "func NewTimeoutChan(ctx context.Context, resolution time.Duration, limit int) *TimeoutChan {\n\tsize := limit\n\tif limit == 0 {\n\t\tsize = 1024\n\t}\n\tin := make(chan Deadliner)\n\tout := make(chan Deadliner)\n\ttc := &TimeoutChan{\n\t\tIn: in,\n\t\tOut: out,\n\n\t\tctx: ctx,\n\t\tpushCtrl: NewController(ctx, \"TimeoutChan Push\"),\n\t\tpopCtrl: NewController(ctx, \"TimeoutChan Pop\"),\n\t\tresolution: resolution,\n\t\tlimit: limit,\n\t\tin: in,\n\t\tout: out,\n\t\tresumePush: make(chan interface{}),\n\t\tresumePop: make(chan interface{}),\n\t\treschedule: make(chan interface{}),\n\t\tclosePush: make(chan interface{}),\n\n\t\tmu: &sync.RWMutex{},\n\t\tpq: NewPriorityQueue(false, size),\n\t\tpushed: 0,\n\t\tpopped: 0,\n\t\tcleared: 0,\n\t}\n\ttc.popCtrl.Go(tc.popProcess)\n\ttc.pushCtrl.Go(tc.pushProcess)\n\treturn tc\n}", "func CreateNonLocalChannel(config ChannelConfigurationForHTTPEndpoints) (channel.HTTPEndpointAppChannel, error) {\n\tc := &HTTPEndpointAppChannel{\n\t\tpipeline: config.Pipeline,\n\t\tclient: config.Client,\n\t\tcompStore: config.CompStore,\n\t\ttracingSpec: config.TracingSpec,\n\t\tappHeaderToken: auth.GetAppToken(),\n\t\tmaxResponseBodySizeMB: config.MaxRequestBodySizeMB,\n\t}\n\n\tif config.MaxConcurrency > 0 {\n\t\tc.ch = make(chan struct{}, config.MaxConcurrency)\n\t}\n\n\treturn c, nil\n}", "func createFork() Fork {\n return Fork { make(chan bool), make(chan bool)}\n}", "func (mq *MessageQueue) NewChannel() (*amqp.Channel, error) {\n\tch, err := mq.Connection.Channel()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tch.Qos(mq.Prefetch, 0, false)\n\treturn ch, nil\n}", "func newProxyConn(client *ssh.Client, stderr io.Writer, free func()) (*proxyConn, error) {\n\t// Open new session to the agent\n\tsession, err := client.NewSession()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Get a pipe to stdin so that we can send data down\n\tstdin, err := session.StdinPipe()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Get a pipe to stdout so that we can get responses back\n\tstdout, err := session.StdoutPipe()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Set stderr\n\tsession.Stderr = stderr\n\n\t// Start the shell on the other side\n\tif err := session.Shell(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &proxyConn{\n\t\tclient: client,\n\t\tsession: session,\n\t\tstdin: stdin,\n\t\tstdout: stdout,\n\t\tfree: free,\n\t}, nil\n}", "func mkChannel(path string) (chan uint8, <-chan vm.Msg, error) {\n\tfd, err := os.OpenFile(path, unix.O_RDWR, 0600|os.ModeExclusive)\n\tif err != nil {\n\t\treturn nil, nil, errors.Wrapf(err, \"OpenFile %s\", path)\n\t}\n\n\tackChan := make(chan uint8)\n\tmsgChan := make(chan vm.Msg, 1)\n\n\tgo func() {\n\t\tfor {\n\t\t\tvalue := <-ackChan\n\t\t\tif _, err := fd.Write([]byte{value}); err != nil {\n\t\t\t\tlog.Printf(\"Write: %v\", err)\n\t\t\t}\n\t\t\tackChan <- 0\n\t\t}\n\t}()\n\n\tgo func() {\n\t\tfor {\n\t\t\t// read header\n\t\t\tbuf := make([]byte, headerSize)\n\t\t\tif _, err := io.ReadFull(fd, buf); err != nil {\n\t\t\t\tlog.Panic(err)\n\t\t\t}\n\n\t\t\tpayloadSize := int(binary.BigEndian.Uint32(buf[:4]))\n\t\t\tmsgType := vm.Msgtype(buf[4])\n\n\t\t\t// read payload\n\t\t\tbuf = make([]byte, payloadSize)\n\t\t\trd := bufio.NewReaderSize(fd, payloadSize)\n\t\t\tif _, err := io.ReadFull(rd, buf); err != nil {\n\t\t\t\tlog.Panic(err)\n\t\t\t}\n\n\t\t\tmsgChan <- vm.Msg{\n\t\t\t\tType: msgType,\n\t\t\t\tData: buf,\n\t\t\t}\n\t\t}\n\t}()\n\n\treturn ackChan, msgChan, nil\n}", "func NewChannelQueue(handle HandlerFunc, cfg, exemplar interface{}) (Queue, error) {\n\tconfigInterface, err := toConfig(ChannelQueueConfiguration{}, cfg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tconfig := configInterface.(ChannelQueueConfiguration)\n\tif config.BatchLength == 0 {\n\t\tconfig.BatchLength = 1\n\t}\n\n\tterminateCtx, terminateCtxCancel := context.WithCancel(context.Background())\n\tshutdownCtx, shutdownCtxCancel := context.WithCancel(terminateCtx)\n\n\tqueue := &ChannelQueue{\n\t\tshutdownCtx: shutdownCtx,\n\t\tshutdownCtxCancel: shutdownCtxCancel,\n\t\tterminateCtx: terminateCtx,\n\t\tterminateCtxCancel: terminateCtxCancel,\n\t\texemplar: exemplar,\n\t\tworkers: config.Workers,\n\t\tname: config.Name,\n\t}\n\tqueue.WorkerPool = NewWorkerPool(func(data ...Data) []Data {\n\t\tunhandled := handle(data...)\n\t\tif len(unhandled) > 0 {\n\t\t\t// We can only pushback to the channel if we're paused.\n\t\t\tif queue.IsPaused() {\n\t\t\t\tatomic.AddInt64(&queue.numInQueue, int64(len(unhandled)))\n\t\t\t\tgo func() {\n\t\t\t\t\tfor _, datum := range data {\n\t\t\t\t\t\tqueue.dataChan <- datum\n\t\t\t\t\t}\n\t\t\t\t}()\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t\treturn unhandled\n\t}, config.WorkerPoolConfiguration)\n\n\tqueue.qid = GetManager().Add(queue, ChannelQueueType, config, exemplar)\n\treturn queue, nil\n}", "func InitChannel() {\n\tfor i := range raft.ClientHandlerChannel {\n\t\traft.ClientHandlerChannel[i] = make(chan raft.CommitInfo)\n\t}\n}", "func NewChannelWriter(c chan<- []byte) *ChannelWriter {\n\treturn &ChannelWriter{\n\t\tc: c,\n\t}\n}", "func ChannelHandler(w http.ResponseWriter, r *http.Request) {\n\tswitch r.Method {\n\tcase http.MethodGet:\n\t\terr := fmt.Errorf(\"Unsupported method %s\", r.Method)\n\t\terrorHandler(w, r, http.StatusInternalServerError, err)\n\t\treturn\n\tcase http.MethodPost:\n\t\t// Create a new channel.\n\t\tc := &channel.Channel{}\n\t\tdecoder := json.NewDecoder(r.Body)\n\t\tvar payload *channel.CreatePayload\n\t\terr := decoder.Decode(&payload)\n\t\tif err != nil {\n\t\t\terrorHandler(w, r, http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\n\t\treq := &channel.CreateRequest{Payload: payload}\n\t\tres, err := c.Create(req)\n\t\tif err != nil {\n\t\t\terrorHandler(w, r, http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\t\tb, err := json.Marshal(res)\n\t\tif err != nil {\n\t\t\terrorHandler(w, r, http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusOK)\n\t\tw.Write(b)\n\t\treturn\n\tcase http.MethodPut:\n\t\terr := fmt.Errorf(\"Unsupported method %s\", r.Method)\n\t\terrorHandler(w, r, http.StatusInternalServerError, err)\n\t\treturn\n\tcase http.MethodDelete:\n\t\terr := fmt.Errorf(\"Unsupported method %s\", r.Method)\n\t\terrorHandler(w, r, http.StatusInternalServerError, err)\n\t\treturn\n\tdefault:\n\t\terr := fmt.Errorf(\"Unsupported method %s\", r.Method)\n\t\terrorHandler(w, r, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n}", "func MakeChan[T any](size int) (chan<- T, <-chan T) {\n\tswitch {\n\tcase size == 0:\n\t\tch := make(chan T)\n\t\treturn ch, ch\n\tcase size > 0:\n\t\tch := make(chan T, size)\n\t\treturn ch, ch\n\tcase size != -1:\n\t\tpanic(\"unsupported buffer size\")\n\tdefault:\n\t\t// size == 1\n\t}\n\n\tin, out := make(chan T), make(chan T)\n\n\tgo func() {\n\t\tvar q []T\n\t\tfor {\n\t\t\te, ok := <-in\n\t\t\tif !ok {\n\t\t\t\tclose(out)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tq = append(q, e)\n\t\t\tfor len(q) > 0 {\n\t\t\t\tselect {\n\t\t\t\tcase out <- q[0]:\n\t\t\t\t\tq = q[1:]\n\t\t\t\tcase e, ok := <-in:\n\t\t\t\t\tif ok {\n\t\t\t\t\t\tq = append(q, e)\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t\tfor _, e := range q {\n\t\t\t\t\t\tout <- e\n\t\t\t\t\t}\n\t\t\t\t\tclose(out)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}()\n\treturn in, out\n}", "func (rmq *RabbitMQ) Channel(prefetch int, prefSize int, global bool) (*amqp.Channel, error) {\n\n\t//create ch and declare its topology\n\tch, err := rmq.Conn.Channel()\n\n\tif err != nil {\n\n\t\treturn ch, fmt.Errorf(\"Failed to open a channel %v\", err)\n\n\t}\n\n\terr = ch.Qos(\n\t\tprefetch, // prefetch count\n\t\tprefSize, // prefetch size\n\t\tglobal, // global\n\t)\n\tif err != nil {\n\n\t\treturn ch, err\n\t}\n\treturn ch, nil\n}", "func (plugin *Plugin) NewAPIChannel() (govppapi.Channel, error) {\n\tch, err := plugin.vppConn.NewAPIChannel()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif plugin.config.ReplyTimeout > 0 {\n\t\tch.SetReplyTimeout(plugin.config.ReplyTimeout)\n\t}\n\tretryCfg := retryConfig{\n\t\tplugin.config.RetryRequestCount,\n\t\tplugin.config.RetryRequestTimeout,\n\t}\n\treturn &goVppChan{ch, retryCfg, plugin.tracer}, nil\n}", "func PipeChan(capacity int) (inputCh chan notify.EventInfo, outputCh chan notify.EventInfo) {\n\n\t// A set of channels which store all elements received from input\n\tchannels := make(chan chan notify.EventInfo, 1000)\n\n\tinputCh = make(chan notify.EventInfo, capacity)\n\n\t// A goroutine which receives elements from inputCh and creates\n\t// new channels when needed.\n\tgo func() {\n\t\t// Create the first channel\n\t\tcurrCh := make(chan notify.EventInfo, capacity)\n\t\tchannels <- currCh\n\n\t\tfor elem := range inputCh {\n\t\t\t// Prepare next channel with a double capacity when\n\t\t\t// half of the current channel is already filled.\n\t\t\tif len(currCh) >= cap(currCh)/2 {\n\t\t\t\tclose(currCh)\n\t\t\t\tcurrCh = make(chan notify.EventInfo, cap(currCh)*2)\n\t\t\t\tchannels <- currCh\n\t\t\t}\n\t\t\t// Prepare next channel with half capacity when\n\t\t\t// current channel is 1/4 filled\n\t\t\tif len(currCh) >= capacity && len(currCh) <= cap(currCh)/4 {\n\t\t\t\tclose(currCh)\n\t\t\t\tcurrCh = make(chan notify.EventInfo, cap(currCh)/2)\n\t\t\t\tchannels <- currCh\n\t\t\t}\n\t\t\t// Send element to current channel\n\t\t\tcurrCh <- elem\n\t\t}\n\n\t\tclose(currCh)\n\t\tclose(channels)\n\t}()\n\n\t// Copy elements from infinite channel set to the output\n\toutputCh = make(chan notify.EventInfo, capacity)\n\tgo func() {\n\t\tfor {\n\t\t\tcurrCh, ok := <-channels\n\t\t\tif !ok {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tfor v := range currCh {\n\t\t\t\toutputCh <- v\n\t\t\t}\n\t\t}\n\t\tclose(outputCh)\n\t}()\n\treturn inputCh, outputCh\n}", "func (repo *BaseRepository) CreateNewChannel(channelToAdd *models.Channel) error {\n\trepo.mutex.Lock()\n\tdefer repo.mutex.Unlock()\n\n\t// First, check that there is no user with the same Twitch ID.\n\t// Don't check for username because the streamer may call this right after changing username.\n\t_, err := repo.getChannelFromTwitchID(channelToAdd.TwitchID)\n\tif err == nil {\n\t\treturn ErrChannelAlreadyExists\n\t}\n\n\t// updateChannel() adds the channel to DB and channelMap if not exists.\n\treturn repo.updateChannel(channelToAdd)\n}", "func (cs *ChannelService) Channel() (apifabclient.Channel, error) {\n\treturn cs.fabricProvider.CreateChannelClient(cs.identityContext, cs.cfg)\n}" ]
[ "0.6943764", "0.6724315", "0.6660033", "0.6496732", "0.6489501", "0.6475652", "0.64709884", "0.6418794", "0.6394252", "0.636316", "0.6304634", "0.62712103", "0.6232865", "0.6189117", "0.6187454", "0.6178903", "0.6157887", "0.6102881", "0.6102447", "0.60799974", "0.6072467", "0.6023561", "0.5997501", "0.5951255", "0.59321123", "0.5919798", "0.59058416", "0.590234", "0.5877584", "0.5849262", "0.5823556", "0.57775635", "0.5721385", "0.57206416", "0.5719495", "0.5703454", "0.56822765", "0.56812316", "0.564117", "0.56238455", "0.5621916", "0.56024826", "0.5598232", "0.5591948", "0.5590609", "0.5583899", "0.5578183", "0.5567083", "0.5550701", "0.5549066", "0.55332255", "0.55262244", "0.55037445", "0.5495013", "0.5486561", "0.5481671", "0.5476192", "0.5468006", "0.5464582", "0.5452237", "0.5451813", "0.54474777", "0.5421654", "0.5421415", "0.5410304", "0.5397894", "0.53963554", "0.5389121", "0.538748", "0.5371461", "0.53710604", "0.5369916", "0.5363814", "0.53430504", "0.5339365", "0.5330434", "0.5328705", "0.5320241", "0.53157586", "0.5314641", "0.5310503", "0.53096944", "0.53045696", "0.52919084", "0.52793586", "0.5271225", "0.52702695", "0.5254961", "0.5253288", "0.5252709", "0.5245154", "0.52436584", "0.5240636", "0.52105457", "0.5190182", "0.51864785", "0.5179125", "0.51782286", "0.5176221" ]
0.5573728
48
ReadResponse reads a server response into the received o.
func (o *VoiceHistoryExportGetReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) { switch response.Code() { case 200: result := NewVoiceHistoryExportGetOK() if err := result.readResponse(response, consumer, o.formats); err != nil { return nil, err } return result, nil case 400: result := NewVoiceHistoryExportGetBadRequest() if err := result.readResponse(response, consumer, o.formats); err != nil { return nil, err } return nil, result case 401: result := NewVoiceHistoryExportGetUnauthorized() if err := result.readResponse(response, consumer, o.formats); err != nil { return nil, err } return nil, result case 403: result := NewVoiceHistoryExportGetForbidden() if err := result.readResponse(response, consumer, o.formats); err != nil { return nil, err } return nil, result case 404: result := NewVoiceHistoryExportGetNotFound() if err := result.readResponse(response, consumer, o.formats); err != nil { return nil, err } return nil, result case 405: result := NewVoiceHistoryExportGetMethodNotAllowed() if err := result.readResponse(response, consumer, o.formats); err != nil { return nil, err } return nil, result case 429: result := NewVoiceHistoryExportGetTooManyRequests() if err := result.readResponse(response, consumer, o.formats); err != nil { return nil, err } return nil, result default: result := NewVoiceHistoryExportGetDefault(response.Code()) if err := result.readResponse(response, consumer, o.formats); err != nil { return nil, err } if response.Code()/100 == 2 { return result, nil } return nil, result } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (d *ResourceHandler) ReadResponse(dataOut unsafe.Pointer, bytesToRead int32, bytesRead *int32, callback *Callback) int32 {\n\treturn lookupResourceHandlerProxy(d.Base()).ReadResponse(d, dataOut, bytesToRead, bytesRead, callback)\n}", "func (o *GetServerReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetServerOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *InteractionBindReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewInteractionBindOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 404:\n\t\tresult := NewInteractionBindNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 500:\n\t\tresult := NewInteractionBindInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *InteractionUnbindReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewInteractionUnbindOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 404:\n\t\tresult := NewInteractionUnbindNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 500:\n\t\tresult := NewInteractionUnbindInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (r *ResponseReader) ReadResponse(req *Request) (res *Response, err error) {\n\tres = CreateEmptyResponse(req)\n\t_, err = readFirstLine(r, res)\n\tif err != nil {\n\t\treturn\n\t}\n\n\terr = readHeaders(r, res)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t_, err = readBodyContent(r, res)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn res, nil\n}", "func (c *Conn) ReadResponse(rmsg *Response) error {\n\tdata, err := c.ReadDataUnit()\n\tif err != nil {\n\t\treturn err\n\t}\n\tcolor.Printf(\"@{c}<!-- RESPONSE -->\\n%s\\n\\n\", string(data))\n\terr = xml.Unmarshal(data, rmsg)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// color.Fprintf(os.Stderr, \"@{y}%s\\n\", spew.Sprintf(\"%+v\", msg))\n\tif len(rmsg.Results) != 0 {\n\t\tr := rmsg.Results[0]\n\t\tif r.IsError() {\n\t\t\treturn r\n\t\t}\n\t}\n\treturn nil\n}", "func (o *VerifyConnectionReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewVerifyConnectionOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *GetAvailableReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewGetAvailableOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *ClosePositionReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewClosePositionOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 400:\n\t\tresult := NewClosePositionBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 401:\n\t\tresult := NewClosePositionUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 404:\n\t\tresult := NewClosePositionNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 405:\n\t\tresult := NewClosePositionMethodNotAllowed()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *DescribeServerReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewDescribeServerOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewDescribeServerBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 404:\n\t\tresult := NewDescribeServerNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 409:\n\t\tresult := NewDescribeServerConflict()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 500:\n\t\tresult := NewDescribeServerInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *GetServerSessionReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetServerSessionOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewGetServerSessionBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 401:\n\t\tresult := NewGetServerSessionUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewGetServerSessionNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 500:\n\t\tresult := NewGetServerSessionInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\tdata, err := ioutil.ReadAll(response.Body())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treturn nil, fmt.Errorf(\"Requested GET /dsmcontroller/namespaces/{namespace}/servers/{podName}/session returns an error %d: %s\", response.Code(), string(data))\n\t}\n}", "func (o *StartReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewStartOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (resp *PharosResponse) readResponse() {\n\tif !resp.hasBeenRead && resp.Response != nil && resp.Response.Body != nil {\n\t\tresp.data, resp.Error = ioutil.ReadAll(resp.Response.Body)\n\t\tresp.Response.Body.Close()\n\t\tresp.hasBeenRead = true\n\t}\n}", "func (o *HelloWorldReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewHelloWorldOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewHelloWorldBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 500:\n\t\tresult := NewHelloWorldInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (reader *BasicRpcReader) ReadResponse(r io.Reader, method string, requestID int32, resp proto.Message) error {\n\trrh := &hadoop.RpcResponseHeaderProto{}\n\terr := readRPCPacket(r, rrh, resp)\n\tif err != nil {\n\t\treturn err\n\t} else if int32(rrh.GetCallId()) != requestID {\n\t\treturn errors.New(\"unexpected sequence number\")\n\t} else if rrh.GetStatus() != hadoop.RpcResponseHeaderProto_SUCCESS {\n\t\treturn &NamenodeError{\n\t\t\tmethod: method,\n\t\t\tmessage: rrh.GetErrorMsg(),\n\t\t\tcode: int(rrh.GetErrorDetail()),\n\t\t\texception: rrh.GetExceptionClassName(),\n\t\t}\n\t}\n\n\treturn nil\n}", "func (o *UpdateAntivirusServerReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 204:\n\t\tresult := NewUpdateAntivirusServerNoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\tresult := NewUpdateAntivirusServerDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *HasEventsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewHasEventsOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 401:\n\t\tresult := NewHasEventsUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 403:\n\t\tresult := NewHasEventsForbidden()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *GetV2Reader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetV2OK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 500:\n\t\tresult := NewGetV2InternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *SaveReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 204:\n\t\tresult := NewSaveNoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 500:\n\t\tresult := NewSaveInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *TestWriteReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewTestWriteOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 401:\n\t\tresult := NewTestWriteUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *AllConnectionsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewAllConnectionsOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewAllConnectionsBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 404:\n\t\tresult := NewAllConnectionsNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *SendDataToDeviceReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewSendDataToDeviceOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewSendDataToDeviceBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 500:\n\t\tresult := NewSendDataToDeviceInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *HealthNoopReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewHealthNoopOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *PutOutOfRotationReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 204:\n\t\tresult := NewPutOutOfRotationNoContent()\n\t\tresult.HttpResponse = response\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\terrorResult := kbcommon.NewKillbillError(response.Code())\n\t\tif err := consumer.Consume(response.Body(), &errorResult); err != nil && err != io.EOF {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, errorResult\n\t}\n}", "func (o *GetReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *StatusReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewStatusOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 401:\n\t\tresult := NewStatusUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 403:\n\t\tresult := NewStatusForbidden()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *ReplaceServerReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewReplaceServerOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 202:\n\t\tresult := NewReplaceServerAccepted()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewReplaceServerBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 404:\n\t\tresult := NewReplaceServerNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\tresult := NewReplaceServerDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func ReadResponse(r *bfe_bufio.Reader, req *Request) (*Response, error) {\n\ttp := textproto.NewReader(r)\n\tresp := &Response{\n\t\tRequest: req,\n\t}\n\n\t// Parse the first line of the response.\n\tline, err := tp.ReadLine()\n\tif err != nil {\n\t\tif err == io.EOF {\n\t\t\terr = io.ErrUnexpectedEOF\n\t\t}\n\t\treturn nil, err\n\t}\n\tf := strings.SplitN(line, \" \", 3)\n\tif len(f) < 2 {\n\t\treturn nil, &badStringError{\"malformed HTTP response\", line}\n\t}\n\treasonPhrase := \"\"\n\tif len(f) > 2 {\n\t\treasonPhrase = f[2]\n\t}\n\tresp.Status = f[1] + \" \" + reasonPhrase\n\tresp.StatusCode, err = strconv.Atoi(f[1])\n\tif err != nil {\n\t\treturn nil, &badStringError{\"malformed HTTP status code\", f[1]}\n\t}\n\n\tresp.Proto = f[0]\n\tvar ok bool\n\tif resp.ProtoMajor, resp.ProtoMinor, ok = ParseHTTPVersion(resp.Proto); !ok {\n\t\treturn nil, &badStringError{\"malformed HTTP version\", resp.Proto}\n\t}\n\n\t// Parse the response headers.\n\tmimeHeader, err := tp.ReadMIMEHeader()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresp.Header = Header(mimeHeader)\n\n\tfixPragmaCacheControl(resp.Header)\n\n\terr = readTransfer(resp, r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp, nil\n}", "func (o *PostChatroomsChannelHashReadReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewPostChatroomsChannelHashReadOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 403:\n\t\tresult := NewPostChatroomsChannelHashReadForbidden()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *TogglePacketGeneratorsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 201:\n\t\tresult := NewTogglePacketGeneratorsCreated()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *FrontPutBinaryReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewFrontPutBinaryOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *SystemPingReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewSystemPingOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 500:\n\t\tresult := NewSystemPingInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *SendDummyAlertReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewSendDummyAlertOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 400:\n\t\tresult := NewSendDummyAlertBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 404:\n\t\tresult := NewSendDummyAlertNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *GetViewsConnectionReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetViewsConnectionOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewGetViewsConnectionBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *SyncCopyReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewSyncCopyOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewSyncCopyDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *PostPatientsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewPostPatientsOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 400:\n\t\tresult := NewPostPatientsBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 405:\n\t\tresult := NewPostPatientsMethodNotAllowed()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (c *Conn) readResponse(res *response_) error {\n\terr := c.readDataUnit()\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = IgnoreEOF(scanResponse.Scan(c.decoder, res))\n\tif err != nil {\n\t\treturn err\n\t}\n\tif res.Result.IsError() {\n\t\treturn res.Result\n\t}\n\treturn nil\n}", "func (o *AllConnectionsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n switch response.Code() {\n \n case 200:\n result := NewAllConnectionsOK()\n if err := result.readResponse(response, consumer, o.formats); err != nil {\n return nil, err\n }\n return result, nil\n \n case 400:\n result := NewAllConnectionsBadRequest()\n if err := result.readResponse(response, consumer, o.formats); err != nil {\n return nil, err\n }\n return nil, result\n \n case 404:\n result := NewAllConnectionsNotFound()\n if err := result.readResponse(response, consumer, o.formats); err != nil {\n return nil, err\n }\n return nil, result\n \n default:\n return nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n }\n}", "func (o *GetMsgVpnReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewGetMsgVpnOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\tresult := NewGetMsgVpnDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (r *Response) Read(p []byte) (n int, err error) {\n\n\tif r.Error != nil {\n\t\treturn -1, r.Error\n\t}\n\n\treturn r.RawResponse.Body.Read(p)\n}", "func (o *PostPciLinksMoidReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 201:\n\t\tresult := NewPostPciLinksMoidCreated()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewPostPciLinksMoidDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *THSRAPIODFare2121Reader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewTHSRAPIODFare2121OK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 299:\n\t\tresult := NewTHSRAPIODFare2121Status299()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 304:\n\t\tresult := NewTHSRAPIODFare2121NotModified()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *PostGatewayConnectNetaddressReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 204:\n\t\tresult := NewPostGatewayConnectNetaddressNoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewPostGatewayConnectNetaddressDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *DNSGetReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewDNSGetOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewDNSGetDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *GetGreetStatusReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetGreetStatusOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *PostAPIV2EventsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 201:\n\t\tresult := NewPostAPIV2EventsNoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewPostAPIV2EventsBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 403:\n\t\tresult := NewPostAPIV2EventsForbidden()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *CreateAntivirusServerReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewCreateAntivirusServerOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\tresult := NewCreateAntivirusServerDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *PostCarsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewPostCarsOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 405:\n\t\tresult := NewPostCarsMethodNotAllowed()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *LogReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewLogOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewLogNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *ChatGetConnectedReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewChatGetConnectedOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 400:\n\t\tresult := NewChatGetConnectedBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 401:\n\t\tresult := NewChatGetConnectedUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 404:\n\t\tresult := NewChatGetConnectedNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *WebModifyReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewWebModifyOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 202:\n\t\tresult := NewWebModifyAccepted()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewWebModifyDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *GetHyperflexServerModelsMoidReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetHyperflexServerModelsMoidOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewGetHyperflexServerModelsMoidNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\tresult := NewGetHyperflexServerModelsMoidDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *KillQueryReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 204:\n\t\tresult := NewKillQueryNoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewKillQueryBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 404:\n\t\tresult := NewKillQueryNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 422:\n\t\tresult := NewKillQueryUnprocessableEntity()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *GetProgressionViewReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetProgressionViewOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewGetProgressionViewBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *UpdateRackTopoReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewUpdateRackTopoOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewUpdateRackTopoBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *UtilTestReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewUtilTestOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *GetByUIDReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetByUIDOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewGetByUIDNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *GetMeReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetMeOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewGetMeDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *Delete1Reader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 204:\n\t\tresult := NewDelete1NoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewDelete1NotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *RevokeReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewRevokeOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 401:\n\t\tresult := NewRevokeUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 404:\n\t\tresult := NewRevokeNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *PostGatewayDisconnectNetaddressReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 204:\n\t\tresult := NewPostGatewayDisconnectNetaddressNoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewPostGatewayDisconnectNetaddressDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *GetProtocolsUsingGETReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetProtocolsUsingGETOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *DestroySessionUsingPOSTReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewDestroySessionUsingPOSTOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *CompleteTransactionReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 204:\n\t\tresult := NewCompleteTransactionNoContent()\n\t\tresult.HttpResponse = response\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\terrorResult := kbcommon.NewKillbillError(response.Code())\n\t\tif err := consumer.Consume(response.Body(), &errorResult); err != nil && err != io.EOF {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, errorResult\n\t}\n}", "func (o *GetMapNameEventsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetMapNameEventsOK(o.writer)\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewGetMapNameEventsNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *RecoveryReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewRecoveryOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 500:\n\t\tresult := NewRecoveryInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *GetPeersReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewGetPeersOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 403:\n\t\tresult := NewGetPeersForbidden()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *InstallEventsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewInstallEventsOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *SetMemoRequiredReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewSetMemoRequiredOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewSetMemoRequiredBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 500:\n\t\tresult := NewSetMemoRequiredInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *UpdateRackTopoReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewUpdateRackTopoOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewUpdateRackTopoBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 404:\n\t\tresult := NewUpdateRackTopoNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 500:\n\t\tresult := NewUpdateRackTopoInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *GetVoicesReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetVoicesOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *PatchHyperflexServerModelsMoidReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 201:\n\t\tresult := NewPatchHyperflexServerModelsMoidCreated()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewPatchHyperflexServerModelsMoidDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *BounceReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tresult := NewBounceDefault(response.Code())\n\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\treturn nil, err\n\t}\n\tif response.Code()/100 == 2 {\n\t\treturn result, nil\n\t}\n\treturn nil, result\n}", "func (o *PostHyperflexHxdpVersionsMoidReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 201:\n\t\tresult := NewPostHyperflexHxdpVersionsMoidCreated()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewPostHyperflexHxdpVersionsMoidDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *GetObmsLibraryIdentifierReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewGetObmsLibraryIdentifierOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 404:\n\t\tresult := NewGetObmsLibraryIdentifierNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\tresult := NewGetObmsLibraryIdentifierDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *DeleteApplianceRestoresMoidReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewDeleteApplianceRestoresMoidOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewDeleteApplianceRestoresMoidNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\tresult := NewDeleteApplianceRestoresMoidDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *UserQuerySessionReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewUserQuerySessionOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewUserQuerySessionBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 500:\n\t\tresult := NewUserQuerySessionInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\tdata, err := ioutil.ReadAll(response.Body())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treturn nil, fmt.Errorf(\"Requested GET /sessionbrowser/namespaces/{namespace}/gamesession returns an error %d: %s\", response.Code(), string(data))\n\t}\n}", "func (o *GetDiscoverReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewGetDiscoverOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (r *overwriteConsumerReader) ReadResponse(resp runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tif r.forStatusCode == ForAllStatusCodes || resp.Code() == r.forStatusCode {\n\t\treturn r.requestReader.ReadResponse(resp, r.consumer)\n\t}\n\n\treturn r.requestReader.ReadResponse(resp, consumer)\n}", "func (o *UnclaimTrafficFilterLinkIDReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewUnclaimTrafficFilterLinkIDOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewUnclaimTrafficFilterLinkIDBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 500:\n\t\tresult := NewUnclaimTrafficFilterLinkIDInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *GetDebugRequestReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewGetDebugRequestOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 404:\n\t\tresult := NewGetDebugRequestNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *ChangeaspecificSpeedDialReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 204:\n\t\tresult := NewChangeaspecificSpeedDialNoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *PostMemoryArraysMoidReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 201:\n\t\tresult := NewPostMemoryArraysMoidCreated()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewPostMemoryArraysMoidDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (c *Client) readResponse(conn net.Conn) ([]byte, error) {\n\tif c.Timeout > 0 {\n\t\t_ = conn.SetReadDeadline(time.Now().Add(c.Timeout))\n\t}\n\n\tproto := \"udp\"\n\tif _, ok := conn.(*net.TCPConn); ok {\n\t\tproto = \"tcp\"\n\t}\n\n\tif proto == \"udp\" {\n\t\tbufSize := c.UDPSize\n\t\tif bufSize == 0 {\n\t\t\tbufSize = dns.MinMsgSize\n\t\t}\n\t\tresponse := make([]byte, bufSize)\n\t\tn, err := conn.Read(response)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn response[:n], nil\n\t}\n\n\t// If we got here, this is a TCP connection\n\t// so we should read a 2-byte prefix first\n\treturn readPrefixed(conn)\n}", "func (o *PayReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewPayOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewPayBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewPayNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 409:\n\t\tresult := NewPayConflict()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\tdata, err := ioutil.ReadAll(response.Body())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treturn nil, fmt.Errorf(\"Requested POST /platform/public/namespaces/{namespace}/payment/orders/{paymentOrderNo}/pay returns an error %d: %s\", response.Code(), string(data))\n\t}\n}", "func (o *CountReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewCountOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 400:\n\t\tresult := NewCountBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *PostNodesIdentifierObmIdentifyReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 201:\n\t\tresult := NewPostNodesIdentifierObmIdentifyCreated()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 404:\n\t\tresult := NewPostNodesIdentifierObmIdentifyNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\tresult := NewPostNodesIdentifierObmIdentifyDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *GetInterpreterReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetInterpreterOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewGetInterpreterNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *DeleteEventsEventIDReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 204:\n\t\tresult := NewDeleteEventsEventIDNoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 401:\n\t\tresult := NewDeleteEventsEventIDUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 404:\n\t\tresult := NewDeleteEventsEventIDNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *UtilityServiceReadyReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewUtilityServiceReadyOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewUtilityServiceReadyDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *HTTPGetPersistenceItemDataReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewHTTPGetPersistenceItemDataOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewHTTPGetPersistenceItemDataNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *SubscriptionReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewSubscriptionOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *PostEquipmentIoExpandersMoidReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 201:\n\t\tresult := NewPostEquipmentIoExpandersMoidCreated()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewPostEquipmentIoExpandersMoidDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *FrontSessionReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewFrontSessionOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (pr *PushedRequest) ReadResponse(ctx context.Context) (*http.Response, error) {\n\tselect {\n\tcase <-ctx.Done():\n\t\tpr.Cancel()\n\t\tpr.pushedStream.bufPipe.CloseWithError(ctx.Err())\n\t\treturn nil, ctx.Err()\n\tcase <-pr.pushedStream.peerReset:\n\t\treturn nil, pr.pushedStream.resetErr\n\tcase resErr := <-pr.pushedStream.resc:\n\t\tif resErr.err != nil {\n\t\t\tfmt.Println(resErr.err.Error())\n\t\t\tpr.Cancel()\n\t\t\tpr.pushedStream.bufPipe.CloseWithError(resErr.err)\n\t\t\treturn nil, resErr.err\n\t\t}\n\t\tresErr.res.Request = pr.Promise\n\t\tresErr.res.TLS = pr.pushedStream.cc.tlsState\n\t\treturn resErr.res, resErr.err\n\t}\n}", "func (o *GetZippedReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tresult := NewGetZippedDefault(response.Code())\n\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\treturn nil, err\n\t}\n\tif response.Code()/100 == 2 {\n\t\treturn result, nil\n\t}\n\treturn nil, result\n}", "func (o *DeleteFirmwareUpgradesMoidReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewDeleteFirmwareUpgradesMoidOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewDeleteFirmwareUpgradesMoidNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\tresult := NewDeleteFirmwareUpgradesMoidDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *GetEtherPhysicalPortsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetEtherPhysicalPortsOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewGetEtherPhysicalPortsDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *ZoneStreamReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewZoneStreamOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *ByNamespaceReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewByNamespaceOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 404:\n\t\tresult := NewByNamespaceNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *GetRequestTrackerReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetRequestTrackerOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 403:\n\t\tresult := NewGetRequestTrackerForbidden()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 404:\n\t\tresult := NewGetRequestTrackerNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}" ]
[ "0.7640225", "0.7607834", "0.75210214", "0.7509121", "0.74803215", "0.74724656", "0.7433606", "0.74244606", "0.7375357", "0.7367311", "0.73589337", "0.73551553", "0.7350114", "0.7347274", "0.7346054", "0.733966", "0.7336042", "0.73239547", "0.7315819", "0.73155594", "0.7310195", "0.730769", "0.72904205", "0.7287086", "0.72826135", "0.72742283", "0.7274111", "0.72655845", "0.726384", "0.7262403", "0.7255057", "0.72496617", "0.72492456", "0.72479755", "0.72409135", "0.7224629", "0.722366", "0.7219326", "0.7216009", "0.72122216", "0.72110355", "0.72099286", "0.7209348", "0.72004783", "0.71978456", "0.719778", "0.71926844", "0.7177653", "0.71745974", "0.71737057", "0.716626", "0.7155474", "0.71500206", "0.7149536", "0.7148374", "0.7143972", "0.7143686", "0.7141745", "0.71397567", "0.713703", "0.7136677", "0.7136661", "0.7135863", "0.7135147", "0.71337897", "0.71312535", "0.7124361", "0.7123878", "0.71200526", "0.7120036", "0.7119569", "0.71148854", "0.7104891", "0.7100936", "0.70989054", "0.70989", "0.70984536", "0.70977753", "0.709657", "0.70961034", "0.70941985", "0.70932794", "0.70886916", "0.70850074", "0.7083912", "0.7080819", "0.7078785", "0.70775825", "0.70765215", "0.7076268", "0.7070042", "0.70699906", "0.7068155", "0.7068122", "0.7066828", "0.70625323", "0.70621973", "0.70599294", "0.70577264", "0.7054454", "0.70509636" ]
0.0
-1
NewVoiceHistoryExportGetOK creates a VoiceHistoryExportGetOK with default headers values
func NewVoiceHistoryExportGetOK() *VoiceHistoryExportGetOK { return &VoiceHistoryExportGetOK{} }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewVoiceHistoryExportGetDefault(code int) *VoiceHistoryExportGetDefault {\n\treturn &VoiceHistoryExportGetDefault{\n\t\t_statusCode: code,\n\t}\n}", "func getHistory(ctx context.Context, args *map[string]interface{}) error {\n\tvar resultRows []Operation\n\n\tha, ok := (*args)[\"historyArgs\"].(historyArgs)\n\tif !ok {\n\t\treturn fmt.Errorf(\"unable to cast arguments to type historyArgs\")\n\t}\n\n\texportType := ha.exportType\n\n\t// Get everything from the fhir_endpoints_info_history table for the given URL\n\n\tvar selectHistory string\n\tif exportType == \"month\" {\n\t\tselectHistory = `\n\t\tSELECT fhir_endpoints_info_history.url, fhir_endpoints_metadata.http_response, fhir_endpoints_metadata.response_time_seconds, fhir_endpoints_metadata.errors,\n\t\tcapability_statement, tls_version, mime_types, operation_resource,\n\t\tfhir_endpoints_metadata.smart_http_response, smart_response, fhir_endpoints_info_history.updated_at, capability_fhir_version\n\t\tFROM fhir_endpoints_info_history, fhir_endpoints_metadata\n\t\tWHERE fhir_endpoints_info_history.metadata_id = fhir_endpoints_metadata.id AND fhir_endpoints_info_history.url=$1 AND (date_trunc('month', fhir_endpoints_info_history.updated_at) = date_trunc('month', current_date - INTERVAL '1 month'))\n\t\tORDER BY fhir_endpoints_info_history.updated_at DESC;`\n\t} else if exportType == \"30days\" {\n\t\tselectHistory = `\n\t\tSELECT fhir_endpoints_info_history.url, fhir_endpoints_metadata.http_response, fhir_endpoints_metadata.response_time_seconds, fhir_endpoints_metadata.errors,\n\t\tcapability_statement, tls_version, mime_types, operation_resource,\n\t\tfhir_endpoints_metadata.smart_http_response, smart_response, fhir_endpoints_info_history.updated_at, capability_fhir_version\n\t\tFROM fhir_endpoints_info_history, fhir_endpoints_metadata\n\t\tWHERE fhir_endpoints_info_history.metadata_id = fhir_endpoints_metadata.id AND fhir_endpoints_info_history.url=$1 AND (date_trunc('day', fhir_endpoints_info_history.updated_at) >= date_trunc('day', current_date - INTERVAL '30 day'))\n\t\tORDER BY fhir_endpoints_info_history.updated_at DESC;`\n\t} else if exportType == \"all\" {\n\t\tselectHistory = `\n\t\tSELECT fhir_endpoints_info_history.url, fhir_endpoints_metadata.http_response, fhir_endpoints_metadata.response_time_seconds, fhir_endpoints_metadata.errors,\n\t\tcapability_statement, tls_version, mime_types, operation_resource,\n\t\tfhir_endpoints_metadata.smart_http_response, smart_response, fhir_endpoints_info_history.updated_at, capability_fhir_version\n\t\tFROM fhir_endpoints_info_history, fhir_endpoints_metadata\n\t\tWHERE fhir_endpoints_info_history.metadata_id = fhir_endpoints_metadata.id AND fhir_endpoints_info_history.url=$1\n\t\tORDER BY fhir_endpoints_info_history.updated_at DESC;`\n\t}\n\n\thistoryRows, err := ha.store.DB.QueryContext(ctx, selectHistory, ha.fhirURL)\n\tif err != nil {\n\t\tlog.Warnf(\"Failed getting the history rows for URL %s. Error: %s\", ha.fhirURL, err)\n\t\tresult := Result{\n\t\t\tURL: ha.fhirURL,\n\t\t\tRows: resultRows,\n\t\t}\n\t\tha.result <- result\n\t\treturn nil\n\t}\n\n\t// Puts the rows in an array and sends it back on the channel to be processed\n\tdefer historyRows.Close()\n\tfor historyRows.Next() {\n\t\tvar op Operation\n\t\tvar url string\n\t\tvar capStat []byte\n\t\tvar smartRsp []byte\n\t\tvar opRes []byte\n\t\terr = historyRows.Scan(\n\t\t\t&url,\n\t\t\t&op.HTTPResponse,\n\t\t\t&op.HTTPResponseTimeSecond,\n\t\t\t&op.Errors,\n\t\t\t&capStat,\n\t\t\t&op.TLSVersion,\n\t\t\tpq.Array(&op.MIMETypes),\n\t\t\t&opRes,\n\t\t\t&op.SMARTHTTPResponse,\n\t\t\t&smartRsp,\n\t\t\t&op.UpdatedAt,\n\t\t\t&op.FHIRVersion)\n\t\tif err != nil {\n\t\t\tlog.Warnf(\"Error while scanning the rows of the history table for URL %s. Error: %s\", ha.fhirURL, err)\n\t\t\tresult := Result{\n\t\t\t\tURL: ha.fhirURL,\n\t\t\t\tRows: resultRows,\n\t\t\t}\n\t\t\tha.result <- result\n\t\t\treturn nil\n\t\t}\n\n\t\top.SMARTResponse = getSMARTResponse(smartRsp)\n\t\top.SupportedResources = getSupportedResources(opRes)\n\n\t\tresultRows = append(resultRows, op)\n\t}\n\tresult := Result{\n\t\tURL: ha.fhirURL,\n\t\tRows: resultRows,\n\t}\n\tha.result <- result\n\treturn nil\n}", "func NewVoiceHistoryExportGetUnauthorized() *VoiceHistoryExportGetUnauthorized {\n\treturn &VoiceHistoryExportGetUnauthorized{}\n}", "func get_history(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 1\")\n\t}\n\n\tkey := args[0]\n\tfmt.Printf(\"- start getHistory: %s\\n\", key)\n\n\t// Get History\n\tresultsIterator, err := stub.GetHistoryForKey(key)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\tresults, err := ConvHistoryResult(resultsIterator)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tfmt.Println(\"end getHistory\")\n\n\treturn shim.Success(results)\n}", "func (s *HeroesServiceChaincode) gethistory(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tif len(args) < 2 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 3\")\n\t}\n\n\tvegKey := args[1]\n\tfmt.Printf(\"##### start History of Record: %s\\n\", vegKey)\n\n\tresultsIterator, err := stub.GetHistoryForKey(vegKey)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\t// buffer is a JSON array containing historic values for the marble\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(\"[\")\n\n\tbArrayMemberAlreadyWritten := false\n\tfor resultsIterator.HasNext() {\n\t\tresponse, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\t// Add a comma before array members, suppress it for the first array member\n\t\tif bArrayMemberAlreadyWritten == true {\n\t\t\tbuffer.WriteString(\",\")\n\t\t}\n\t\tbuffer.WriteString(\"{\\\"TxId\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(response.TxId)\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"Value\\\":\")\n\t\t// if it was a delete operation on given key, then we need to set the\n\t\t//corresponding value null. Else, we will write the response.Value\n\t\t//as-is (as the Value itself a JSON marble)\n\t\tif response.IsDelete {\n\t\t\tbuffer.WriteString(\"null\")\n\t\t} else {\n\t\t\tbuffer.WriteString(string(response.Value))\n\t\t}\n\n\t\tbuffer.WriteString(\", \\\"Timestamp\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String())\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"IsDelete\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(strconv.FormatBool(response.IsDelete))\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\"}\")\n\t\tbArrayMemberAlreadyWritten = true\n\t}\n\tbuffer.WriteString(\"]\")\n\n\tfmt.Printf(\"- getHistoryForVegetable returning:\\n%s\\n\", buffer.String())\n\n\treturn shim.Success(buffer.Bytes())\n}", "func NewVoiceHistoryExportGetNotFound() *VoiceHistoryExportGetNotFound {\n\treturn &VoiceHistoryExportGetNotFound{}\n}", "func (o *VoiceHistoryExportGetReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewVoiceHistoryExportGetOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 400:\n\t\tresult := NewVoiceHistoryExportGetBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 401:\n\t\tresult := NewVoiceHistoryExportGetUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 403:\n\t\tresult := NewVoiceHistoryExportGetForbidden()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 404:\n\t\tresult := NewVoiceHistoryExportGetNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 405:\n\t\tresult := NewVoiceHistoryExportGetMethodNotAllowed()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 429:\n\t\tresult := NewVoiceHistoryExportGetTooManyRequests()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\tresult := NewVoiceHistoryExportGetDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func getHistory(stub shim.ChaincodeStubInterface, args []string) (string, error) {\n\tif len(args) != 1 {\n\t\treturn \"\", fmt.Errorf(\"Incorrect arguments. Expecting a key\")\n\t}\n\n\tresultsIterator, err := stub.GetHistoryForKey(args[0])\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"Failed to get asset: %s with error: %s\", args[0], err)\n\t}\n\tif resultsIterator == nil {\n\t\treturn \"\", fmt.Errorf(\"history not found: %s\", args[0])\n\t}\n\n\tdefer resultsIterator.Close()\n\n\t// buffer is a JSON array containing historic values for the marble\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(\"[\")\n\n\tbArrayMemberAlreadyWritten := false\n\tfor resultsIterator.HasNext() {\n\t\tresponse, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn \"iterating error\", err\n\t\t}\n\t\t// Add a comma before array members, suppress it for the first array member\n\t\tif bArrayMemberAlreadyWritten == true {\n\t\t\tbuffer.WriteString(\",\")\n\t\t}\n\t\tbuffer.WriteString(\"{\\\"TxId\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(response.TxId)\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"Value\\\":\")\n\t\t// if it was a delete operation on given key, then we need to set the\n\t\t//corresponding value null. Else, we will write the response.Value\n\t\t//as-is (as the Value itself a JSON marble)\n\t\tif response.IsDelete {\n\t\t\tbuffer.WriteString(\"null\")\n\t\t} else {\n\t\t\tbuffer.WriteString(string(response.Value))\n\t\t}\n\n\t\tbuffer.WriteString(\", \\\"Timestamp\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String())\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"IsDelete\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(strconv.FormatBool(response.IsDelete))\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\"}\")\n\t\tbArrayMemberAlreadyWritten = true\n\t}\n\tbuffer.WriteString(\"]\")\n\n\tfmt.Printf(\"- getHistoryForMarble returning:\\n%s\\n\", buffer.String())\n\n\treturn buffer.String(), nil\n}", "func (_obj *Apichannels) Channels_readHistory(params *TLchannels_readHistory, _opt ...map[string]string) (ret Bool, err error) {\n\n\tvar length int32\n\tvar have bool\n\tvar ty byte\n\t_os := codec.NewBuffer()\n\terr = params.WriteBlock(_os, 1)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tvar _status map[string]string\n\tvar _context map[string]string\n\tif len(_opt) == 1 {\n\t\t_context = _opt[0]\n\t} else if len(_opt) == 2 {\n\t\t_context = _opt[0]\n\t\t_status = _opt[1]\n\t}\n\t_resp := new(requestf.ResponsePacket)\n\ttarsCtx := context.Background()\n\n\terr = _obj.s.Tars_invoke(tarsCtx, 0, \"channels_readHistory\", _os.ToBytes(), _status, _context, _resp)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\t_is := codec.NewReader(tools.Int8ToByte(_resp.SBuffer))\n\terr = ret.ReadBlock(_is, 0, true)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tif len(_opt) == 1 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t} else if len(_opt) == 2 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t\tfor k := range _status {\n\t\t\tdelete(_status, k)\n\t\t}\n\t\tfor k, v := range _resp.Status {\n\t\t\t_status[k] = v\n\t\t}\n\n\t}\n\t_ = length\n\t_ = have\n\t_ = ty\n\treturn ret, nil\n}", "func (t *MedChain) getHistory(stub shim.ChaincodeStubInterface, recordKey string) []byte {\n\n\t\tfmt.Printf(\"- start getHistory: %s\\n\", recordKey)\n\n\t\tresultsIterator, err := stub.GetHistoryForKey(recordKey)\n\t\tif err != nil {\n\t\t\terrors.New(err.Error())\n\t\t//\treturn shim.Error(err.Error())\n\t\t}\n\t\tdefer resultsIterator.Close()\n\n\t\t// buffer is a JSON array containing historic values for the key/value pair\n\t\tvar buffer bytes.Buffer\n\t\tbuffer.WriteString(\"[\")\n\n\t\tbArrayMemberAlreadyWritten := false\n\t\tfor resultsIterator.HasNext() {\n\t\t\tresponse, err := resultsIterator.Next()\n\t\t\tif err != nil {\n\t\t\t\terrors.New(err.Error())\n\t\t\t\t//return shim.Error(err.Error())\n\t\t\t}\n\t\t\t// Add a comma before array members, suppress it for the first array member\n\t\t\tif bArrayMemberAlreadyWritten == true {\n\t\t\t\tbuffer.WriteString(\",\")\n\t\t\t}\n\t\t\tbuffer.WriteString(\"{\\\"TxId\\\":\")\n\t\t\tbuffer.WriteString(\"\\\"\")\n\t\t\tbuffer.WriteString(response.TxId)\n\t\t\tbuffer.WriteString(\"\\\"\")\n\n\t\t\tbuffer.WriteString(\", \\\"Value\\\":\")\n\t\t\t// if it was a delete operation on given key, then we need to set the\n\t\t\t//corresponding value null. Else, we will write the response.Value\n\t\t\t//as-is (as the Value itself a JSON vehiclePart)\n\t\t\tif response.IsDelete {\n\t\t\t\tbuffer.WriteString(\"null\")\n\t\t\t} else {\n\t\t\t\tbuffer.WriteString(string(response.Value))\n\t\t\t}\n\n\t\t\tbuffer.WriteString(\", \\\"Timestamp\\\":\")\n\t\t\tbuffer.WriteString(\"\\\"\")\n\t\t\tbuffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String())\n\t\t\tbuffer.WriteString(\"\\\"\")\n\n\t\t\tbuffer.WriteString(\", \\\"IsDelete\\\":\")\n\t\t\tbuffer.WriteString(\"\\\"\")\n\t\t\tbuffer.WriteString(strconv.FormatBool(response.IsDelete))\n\t\t\tbuffer.WriteString(\"\\\"\")\n\n\t\t\tbuffer.WriteString(\"}\")\n\t\t\tbArrayMemberAlreadyWritten = true\n\t\t}\n\t\tbuffer.WriteString(\"]\")\n\n\t\tfmt.Printf(\"- getHistoryForRecord returning:\\n%s\\n\", buffer.String())\n\n\t\treturn buffer.Bytes()\n\t}", "func NewVoiceHistoryExportGetTooManyRequests() *VoiceHistoryExportGetTooManyRequests {\n\treturn &VoiceHistoryExportGetTooManyRequests{}\n}", "func (p *RestPresence) History(params *PaginateParams) (*PaginatedResult, error) {\n\tpath := \"/channels/\" + p.channel.uriName + \"/presence/history\"\n\treturn newPaginatedResult(presMsgType, path, params, query(p.client.get), p.logger())\n}", "func (t *shimTestCC) historyq(stub ChaincodeStubInterface, args []string) pb.Response {\n\tif len(args) < 1 {\n\t\treturn Error(\"Incorrect number of arguments. Expecting 1\")\n\t}\n\n\tkey := args[0]\n\n\tresultsIterator, err := stub.GetHistoryForKey(key)\n\tif err != nil {\n\t\treturn Error(err.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(\"[\")\n\n\tbArrayMemberAlreadyWritten := false\n\tfor resultsIterator.HasNext() {\n\t\tresponse, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn Error(err.Error())\n\t\t}\n\t\t// Add a comma before array members, suppress it for the first array member\n\t\tif bArrayMemberAlreadyWritten == true {\n\t\t\tbuffer.WriteString(\",\")\n\t\t}\n\t\tbuffer.WriteString(\"{\\\"TxId\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(response.TxId)\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"Value\\\":\")\n\t\tif response.IsDelete {\n\t\t\tbuffer.WriteString(\"null\")\n\t\t} else {\n\t\t\tbuffer.WriteString(string(response.Value))\n\t\t}\n\n\t\tbuffer.WriteString(\", \\\"IsDelete\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(strconv.FormatBool(response.IsDelete))\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\"}\")\n\t\tbArrayMemberAlreadyWritten = true\n\t}\n\tbuffer.WriteString(\"]\")\n\n\treturn Success(buffer.Bytes())\n}", "func NewDescribeAlarmHistoryRequestWithoutParam() *DescribeAlarmHistoryRequest {\n\n return &DescribeAlarmHistoryRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/regions/{regionId}/describeAlarmHistory\",\n Method: \"GET\",\n Header: nil,\n Version: \"v2\",\n },\n }\n}", "func GetHistory(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\ttype KeyModificationWrapper struct {\n\t\tRealValue interface{} `json:\"InterfaceValue\"`\n\t\tTx queryresult.KeyModification\n\t}\n\tvar sliceReal []KeyModificationWrapper\n\n\tvar history []queryresult.KeyModification\n\tvar value interface{}\n\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 1\")\n\t}\n\n\tkey := args[0]\n\tfmt.Printf(\"- start GetHistory: %s\\n\", key)\n\n\t// Get History\n\tresultsIterator, err := stub.GetHistoryForKey(key)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\tfor resultsIterator.HasNext() {\n\t\thistoryData, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\n\t\tvar singleReal KeyModificationWrapper\n\t\tvar tx queryresult.KeyModification\n\t\tsingleReal.Tx.TxId = historyData.TxId //copy transaction id over\n\t\tjson.Unmarshal(historyData.Value, &value) //un stringify it aka JSON.parse()\n\t\tif historyData.Value == nil { //value has been deleted\n\t\t\tvar emptyBytes []byte\n\t\t\tsingleReal.Tx.Value = emptyBytes //copy nil value\n\t\t} else {\n\t\t\tjson.Unmarshal(historyData.Value, &value) //un stringify it aka JSON.parse()\n\t\t\tsingleReal.Tx.Value = historyData.Value //copy value over\n\t\t\tsingleReal.Tx.Timestamp = historyData.Timestamp\n\t\t\tsingleReal.Tx.IsDelete = historyData.IsDelete\n\t\t\tsingleReal.RealValue = value\n\t\t}\n\t\thistory = append(history, tx) //add this Tx to the list\n\t\tsliceReal = append(sliceReal, singleReal)\n\t}\n\t// fmt.Printf(\"- getHistoryForService returning:\\n%s\", history)\n\tPrettyPrintHistory(history)\n\n\t//change to array of bytes\n\t// historyAsBytes, _ := json.Marshal(history) //convert to array of bytes\n\n\trealAsBytes, _ := json.Marshal(sliceReal)\n\treturn shim.Success(realAsBytes)\n}", "func (client *RecommendationsClient) listHistoryForHostingEnvironmentCreateRequest(ctx context.Context, resourceGroupName string, hostingEnvironmentName string, options *RecommendationsClientListHistoryForHostingEnvironmentOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/hostingEnvironments/{hostingEnvironmentName}/recommendationHistory\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif hostingEnvironmentName == \"\" {\n\t\treturn nil, errors.New(\"parameter hostingEnvironmentName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{hostingEnvironmentName}\", url.PathEscape(hostingEnvironmentName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.ExpiredOnly != nil {\n\t\treqQP.Set(\"expiredOnly\", strconv.FormatBool(*options.ExpiredOnly))\n\t}\n\treqQP.Set(\"api-version\", \"2021-03-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tunencodedParams := []string{req.Raw().URL.RawQuery}\n\tif options != nil && options.Filter != nil {\n\t\tunencodedParams = append(unencodedParams, \"$filter=\"+*options.Filter)\n\t}\n\treq.Raw().URL.RawQuery = strings.Join(unencodedParams, \"&\")\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (t *evidence_management) getHistoryForRecord(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\n\trecordKey := args[1]\n\n\tfmt.Printf(\"- start getHistoryForRecord: %s\\n\", recordKey)\n\n\tresultsIterator, err := stub.GetHistoryForKey(recordKey)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\t// buffer is a JSON array containing historic values for the key/value pair\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(\"[\")\n\n\tbArrayMemberAlreadyWritten := false\n\tfor resultsIterator.HasNext() {\n\t\tresponse, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\t// Add a comma before array members, suppress it for the first array member\n\t\tif bArrayMemberAlreadyWritten == true {\n\t\t\tbuffer.WriteString(\",\")\n\t\t}\n\t\tbuffer.WriteString(\"{\\\"TxId\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(response.TxId)\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"Value\\\":\")\n\t\t// if it was a delete operation on given key, then we need to set the\n\t\t//corresponding value null. Else, we will write the response.Value\n\t\t//as-is (as the Value itself a JSON vehiclePart)\n\t\tif response.IsDelete {\n\t\t\tbuffer.WriteString(\"null\")\n\t\t} else {\n\t\t\tbuffer.WriteString(string(response.Value))\n\t\t}\n\n\t\tbuffer.WriteString(\", \\\"Timestamp\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String())\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"IsDelete\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(strconv.FormatBool(response.IsDelete))\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\"}\")\n\t\tbArrayMemberAlreadyWritten = true\n\t}\n\tbuffer.WriteString(\"]\")\n\n\tfmt.Printf(\"- getHistoryForRecord returning:\\n%s\\n\", buffer.String())\n\n\treturn shim.Success(buffer.Bytes())\n}", "func GetHistory(store Store, datatype, realm, user, id string, r *http.Request) (*cpb.History, int, error) {\n\thlist := make([]proto.Message, 0)\n\tif err := store.ReadHistory(datatype, realm, user, id, &hlist); err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\t// TODO: perhaps this should be the empty list?\n\t\t\treturn nil, http.StatusBadRequest, fmt.Errorf(\"no config history available\")\n\t\t}\n\t\treturn nil, http.StatusBadRequest, fmt.Errorf(\"service storage unavailable: %v, retry later\", err)\n\t}\n\the := make([]*cpb.HistoryEntry, len(hlist))\n\tvar ok bool\n\tfor i, e := range hlist {\n\t\the[i], ok = e.(*cpb.HistoryEntry)\n\t\tif !ok {\n\t\t\treturn nil, http.StatusInternalServerError, fmt.Errorf(\"cannot load history entry %d\", i)\n\t\t}\n\t}\n\thistory := &cpb.History{\n\t\tHistory: he,\n\t}\n\tpageToken := r.URL.Query().Get(\"pageToken\")\n\tstart, err := strconv.ParseInt(pageToken, 10, 64)\n\tif err != nil {\n\t\tstart = 0\n\t}\n\n\tpageSize := r.URL.Query().Get(\"pageSize\")\n\tsize, err := strconv.ParseInt(pageSize, 10, 64)\n\tif err != nil || size < 1 {\n\t\tsize = 50\n\t}\n\tif size > 1000 {\n\t\tsize = 1000\n\t}\n\t// Reverse order\n\ta := history.History\n\tfor i := len(a)/2 - 1; i >= 0; i-- {\n\t\topp := len(a) - 1 - i\n\t\ta[i], a[opp] = a[opp], a[i]\n\t}\n\n\tfor i, entry := range history.History {\n\t\tif entry.Revision <= start {\n\t\t\thistory.History = history.History[i:]\n\t\t\tbreak\n\t\t}\n\t}\n\tif len(history.History) > int(size) {\n\t\thistory.NextPageToken = fmt.Sprintf(\"%d\", history.History[size].Revision)\n\t\thistory.History = history.History[:size]\n\t}\n\treturn history, http.StatusOK, nil\n}", "func (t *AtlchainCC) getHistoryByKey(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\targsNeed := 1\n\targsLength := len(args)\n\tif argsLength != argsNeed {\n\t\treturn shim.Error(strconv.Itoa(argsNeed) + \" args wanted, but given \" + strconv.Itoa(argsLength))\n\t}\n\n\tresultsIterator, error := stub.GetHistoryForKey(args[0])\n\tif error != nil {\n\t\treturn shim.Error(error.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(\"[\")\n\n\tbArrayMemberAlreadyWritten := false\n\tfor resultsIterator.HasNext() {\n\t\tresponse, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\t// Add a comma before array members, suppress it for the first array member\n\t\tif bArrayMemberAlreadyWritten == true {\n\t\t\tbuffer.WriteString(\",\")\n\t\t}\n\t\tbuffer.WriteString(\"{\\\"TxId\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(response.TxId)\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"Value\\\":\")\n\t\t// if it was a delete operation on given key, then we need to set the\n\t\t//corresponding value null. Else, we will write the response.Value\n\t\t//as-is (as the Value itself a JSON marble)\n\t\tif response.IsDelete {\n\t\t\tbuffer.WriteString(\"null\")\n\t\t} else {\n\t\t\tbuffer.WriteString(string(response.Value))\n\t\t}\n\n\t\tbuffer.WriteString(\", \\\"Timestamp\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String())\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"IsDelete\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(strconv.FormatBool(response.IsDelete))\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\"}\")\n\t\tbArrayMemberAlreadyWritten = true\n\t}\n\tbuffer.WriteString(\"]\")\n\n\tfmt.Printf(\"- getHistoryForMarble returning:\\n%s\\n\", buffer.String())\n\n\treturn shim.Success(buffer.Bytes())\n}", "func NewVoiceHistoryExportGetForbidden() *VoiceHistoryExportGetForbidden {\n\treturn &VoiceHistoryExportGetForbidden{}\n}", "func NewGetUserBanHistoryOK() *GetUserBanHistoryOK {\n\treturn &GetUserBanHistoryOK{}\n}", "func (client *RecommendationsClient) listHistoryForHostingEnvironmentCreateRequest(ctx context.Context, resourceGroupName string, hostingEnvironmentName string, options *RecommendationsListHistoryForHostingEnvironmentOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/hostingEnvironments/{hostingEnvironmentName}/recommendationHistory\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif hostingEnvironmentName == \"\" {\n\t\treturn nil, errors.New(\"parameter hostingEnvironmentName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{hostingEnvironmentName}\", url.PathEscape(hostingEnvironmentName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.ExpiredOnly != nil {\n\t\treqQP.Set(\"expiredOnly\", strconv.FormatBool(*options.ExpiredOnly))\n\t}\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tunencodedParams := []string{req.Raw().URL.RawQuery}\n\tif options != nil && options.Filter != nil {\n\t\tunencodedParams = append(unencodedParams, \"$filter=\"+*options.Filter)\n\t}\n\treq.Raw().URL.RawQuery = strings.Join(unencodedParams, \"&\")\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (t *SimpleChaincode) getproducthistory(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\n\tfmt.Printf(\"In getproducthistory Function\")\n\n\tif len(args) < 1 {\n\t\tfmt.Printf(\"In getproducthistory Error Function\")\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 1\")\n\t}\n\n\tSerialNo := args[0]\n\n\tfmt.Printf(\"- start getHistoryForWatch: %s\\n\", SerialNo)\n\n\tresultsIterator, err := stub.GetHistoryForKey(SerialNo)\n\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\t// buffer is a JSON array containing historic values for the marble\n\tvar buffer bytes.Buffer\n\n\tbuffer.WriteString(\"[\")\n\n\tbArrayMemberAlreadyWritten := false\n\tfor resultsIterator.HasNext() {\n\t\tresponse, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\t// Add a comma before array members, suppress it for the first array member\n\t\tif bArrayMemberAlreadyWritten == true {\n\t\t\tbuffer.WriteString(\",\")\n\t\t}\n\t\tbuffer.WriteString(\"{\\\"TxId\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(response.TxId)\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"Value\\\":\")\n\t\t// if it was a delete operation on given key, then we need to set the\n\t\t//corresponding value null. Else, we will write the response.Value\n\t\t//as-is (as the Value itself a JSON marble)\n\t\tif response.IsDelete {\n\t\t\tbuffer.WriteString(\"null\")\n\t\t} else {\n\t\t\tbuffer.WriteString(string(response.Value))\n\t\t}\n\n\t\tbuffer.WriteString(\", \\\"Timestamp\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String())\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"IsDelete\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(strconv.FormatBool(response.IsDelete))\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\"}\")\n\t\tbArrayMemberAlreadyWritten = true\n\t}\n\tbuffer.WriteString(\"]\")\n\n\tfmt.Printf(\"- getHistoryForMarble returning:\\n%s\\n\", buffer.String())\n\nreturn shim.Success(buffer.Bytes())\n}", "func getHistory(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\ttype AuditHistory struct {\n\t\tTxId string `json:\"txId\"`\n\t\tValue Listing `json:\"value\"`\n\t}\n\tvar history []AuditHistory\n\tvar listing Listing\n\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 1\")\n\t}\n\n\tlistingId := args[0]\n\tfmt.Printf(\"- start getHistoryForListing: %s\\n\", listingId)\n\n\t// Get History\n\tresultsIterator, err := stub.GetHistoryForKey(listingId)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\tfor resultsIterator.HasNext() {\n\t\thistoryData, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\n\t\tvar tx AuditHistory\n\t\ttx.TxId = historyData.TxId //copy transaction id over\n\t\tjson.Unmarshal(historyData.Value, &listing) //un stringify it aka JSON.parse()\n\t\tif historyData.Value == nil { //listing has been deleted\n\t\t\tvar emptyListing Listing\n\t\t\ttx.Value = emptyListing //copy nil listing\n\t\t} else {\n\t\t\tjson.Unmarshal(historyData.Value, &listing) //un stringify it aka JSON.parse()\n\t\t\ttx.Value = listing //copy listing over\n\t\t}\n\t\thistory = append(history, tx) //add this tx to the list\n\t}\n\tfmt.Printf(\"- getHistoryForListing returning:\\n%s\", history)\n\n\t//change to array of bytes\n\thistoryAsBytes, _ := json.Marshal(history) //convert to array of bytes\n\treturn shim.Success(historyAsBytes)\n}", "func NewVoiceHistoryExportGetBadRequest() *VoiceHistoryExportGetBadRequest {\n\treturn &VoiceHistoryExportGetBadRequest{}\n}", "func NewHeaders()(*Headers) {\n m := &Headers{\n }\n m.backingStore = ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStoreFactoryInstance();\n m.SetAdditionalData(make(map[string]any))\n return m\n}", "func (s *SmartContract) getLCHistory(APIstub shim.ChaincodeStubInterface, args []string) sc.Response {\n \n\t lcId := args[0];\n \n\t resultsIterator, err := APIstub.GetHistoryForKey(lcId)\n\t if err != nil {\n\t\t return shim.Error(\"Error retrieving LC history.\")\n\t }\n\t defer resultsIterator.Close()\n \n\t // buffer is a JSON array containing historic values for the marble\n\t var buffer bytes.Buffer\n\t buffer.WriteString(\"[\")\n \n\t bArrayMemberAlreadyWritten := false\n\t for resultsIterator.HasNext() {\n\t\t response, err := resultsIterator.Next()\n\t\t if err != nil {\n\t\t\t return shim.Error(\"Error retrieving LC history.\")\n\t\t }\n\t\t // Add a comma before array members, suppress it for the first array member\n\t\t if bArrayMemberAlreadyWritten == true {\n\t\t\t buffer.WriteString(\",\")\n\t\t }\n\t\t buffer.WriteString(\"{\\\"TxId\\\":\")\n\t\t buffer.WriteString(\"\\\"\")\n\t\t buffer.WriteString(response.TxId)\n\t\t buffer.WriteString(\"\\\"\")\n \n\t\t buffer.WriteString(\", \\\"Value\\\":\")\n\t\t // if it was a delete operation on given key, then we need to set the\n\t\t //corresponding value null. Else, we will write the response.Value\n\t\t //as-is (as the Value itself a JSON marble)\n\t\t if response.IsDelete {\n\t\t\t buffer.WriteString(\"null\")\n\t\t } else {\n\t\t\t buffer.WriteString(string(response.Value))\n\t\t }\n \n\t\t buffer.WriteString(\", \\\"Timestamp\\\":\")\n\t\t buffer.WriteString(\"\\\"\")\n\t\t buffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String())\n\t\t buffer.WriteString(\"\\\"\")\n \n\t\t buffer.WriteString(\", \\\"IsDelete\\\":\")\n\t\t buffer.WriteString(\"\\\"\")\n\t\t buffer.WriteString(strconv.FormatBool(response.IsDelete))\n\t\t buffer.WriteString(\"\\\"\")\n \n\t\t buffer.WriteString(\"}\")\n\t\t bArrayMemberAlreadyWritten = true\n\t }\n\t buffer.WriteString(\"]\")\n \n\t fmt.Printf(\"- getLCHistory returning:\\n%s\\n\", buffer.String())\n \n\t return shim.Success(buffer.Bytes())\n }", "func (s *SimpleChaincode) pat_gethistory(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tif len(args) < 2 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 3\")\n\t}\n\n\tpatKey := args[1]\n\tfmt.Printf(\"##### start History of Record: %s\\n\", patKey)\n\n\tresultsIterator, err := stub.GetHistoryForKey(patKey)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\t// buffer is a JSON array containing historic values for the marble\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(\"[\")\n\n\tbArrayMemberAlreadyWritten := false\n\tfor resultsIterator.HasNext() {\n\t\tresponse, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\t// Add a comma before array members, suppress it for the first array member\n\t\tif bArrayMemberAlreadyWritten == true {\n\t\t\tbuffer.WriteString(\",\")\n\t\t}\n\t\tbuffer.WriteString(\"{\\\"TxId\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(response.TxId)\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"Value\\\":\")\n\t\t// if it was a delete operation on given key, then we need to set the\n\t\t//corresponding value null. Else, we will write the response.Value\n\t\t//as-is (as the Value itself a JSON marble)\n\t\tif response.IsDelete {\n\t\t\tbuffer.WriteString(\"null\")\n\t\t} else {\n\t\t\tbuffer.WriteString(string(response.Value))\n\t\t}\n\n\t\tbuffer.WriteString(\", \\\"Timestamp\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String())\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"IsDelete\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(strconv.FormatBool(response.IsDelete))\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\"}\")\n\t\tbArrayMemberAlreadyWritten = true\n\t}\n\tbuffer.WriteString(\"]\")\n\n\tfmt.Printf(\"- getHistoryForPatient returning:\\n%s\\n\", buffer.String())\n\n\treturn shim.Success(buffer.Bytes())\n}", "func WrapHistory(h Handler, w http.ResponseWriter, r *http.Request) {\n\tvar aOffset *int32\n\tvar aLimit *int32\n\n\tq := r.URL.Query()\n\n\tif _, ok := q[\"offset\"]; ok {\n\t\t{\n\t\t\tparsed, err := strconv.ParseInt(q.Get(\"offset\"), 10, 32)\n\t\t\tif err != nil {\n\t\t\t\thttp.Error(w, \"Parameter 'offset': \"+err.Error(), http.StatusBadRequest)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tconverted := int32(parsed)\n\t\t\taOffset = &converted\n\t\t}\n\t}\n\n\tif _, ok := q[\"limit\"]; ok {\n\t\t{\n\t\t\tparsed, err := strconv.ParseInt(q.Get(\"limit\"), 10, 32)\n\t\t\tif err != nil {\n\t\t\t\thttp.Error(w, \"Parameter 'limit': \"+err.Error(), http.StatusBadRequest)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tconverted := int32(parsed)\n\t\t\taLimit = &converted\n\t\t}\n\t}\n\n\th.History(w,\n\t\tr,\n\t\taOffset,\n\t\taLimit)\n}", "func (th *translationHandler) GetHistory(w http.ResponseWriter, r *http.Request) {\n\t// All and all this part could have been done better\n\t// with TreeMap but I decided to stick with this custom solution\n\tsort.Strings(th.history.englishWordKeys)\n\tresultArray := []map[string]string{}\n\n\tfor _, key := range th.history.englishWordKeys {\n\t\tresultArray = append(resultArray, th.history.db[key])\n\t}\n\n\tth.history.WordHistory = resultArray\n\tth.codec.Encode(w, th.history)\n}", "func (*HistoryResponse) Descriptor() ([]byte, []int) {\n\treturn file_ric_action_ricaction_proto_rawDescGZIP(), []int{18}\n}", "func (b *Binance) GetNewHistoryTrades(symbol string) {\n\thist, err := b.client.NewHistoricalTradesService().Symbol(symbol).Do(context.Background())\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\tfor k, v := range hist {\n\t\tfmt.Printf(\"%v %s\\n\", k, v.Quantity)\n\t}\n}", "func getHistory(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\ttype AuditHistory struct {\n\t\tTxId string `json:\"txId\"`\n\t\tValue Marble `json:\"value\"`\n\t}\n\tvar history []AuditHistory;\n\tvar marble Marble\n\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 1\")\n\t}\n\n\tmarbleId := args[0]\n\tfmt.Printf(\"- start getHistoryForMarble: %s\\n\", marbleId)\n\n\t// Get History\n\tresultsIterator, err := stub.GetHistoryForKey(marbleId)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\tfor resultsIterator.HasNext() {\n\t\thistoryData, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\n\t\tvar tx AuditHistory\n\t\ttx.TxId = historyData.TxId //copy transaction id over\n\t\tjson.Unmarshal(historyData.Value, &marble) //un stringify it aka JSON.parse()\n\t\tif historyData.Value == nil { //marble has been deleted\n\t\t\tvar emptyMarble Marble\n\t\t\ttx.Value = emptyMarble //copy nil marble\n\t\t} else {\n\t\t\tjson.Unmarshal(historyData.Value, &marble) //un stringify it aka JSON.parse()\n\t\t\ttx.Value = marble //copy marble over\n\t\t}\n\t\thistory = append(history, tx) //add this tx to the list\n\t}\n\tfmt.Printf(\"- getHistoryForMarble returning:\\n%s\", history)\n\n\t//change to array of bytes\n\thistoryAsBytes, _ := json.Marshal(history) //convert to array of bytes\n\treturn shim.Success(historyAsBytes)\n}", "func (s *SmartContract) GetProductHistory(ctx contractapi.TransactionContextInterface, args []string) error {\n\n\tfmt.Printf(\"In getproducthistory Function\")\n\n\tif len(args) < 1 {\n\t\tfmt.Printf(\"In getproducthistory Error Function\")\n\t\treturn fmt.Errorf(\"Incorrect number of arguments. Expecting 1\")\n\t}\n\n\tSerialNo := args[0]\n\n\tfmt.Printf(\"- start getHistoryForWatch: %s\\n\", SerialNo)\n\n\tresultsIterator, err := ctx.GetStub().GetHistoryForKey(SerialNo)\n\n\tif err != nil {\n\t\treturn fmt.Errorf(err.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\t// buffer is a JSON array containing historic values for the marble\n\tvar buffer bytes.Buffer\n\n\tbuffer.WriteString(\"[\")\n\n\tbArrayMemberAlreadyWritten := false\n\tfor resultsIterator.HasNext() {\n\t\tresponse, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(err.Error())\n\t\t}\n\t\t// Add a comma before array members, suppress it for the first array member\n\t\tif bArrayMemberAlreadyWritten == true {\n\t\t\tbuffer.WriteString(\",\")\n\t\t}\n\t\tbuffer.WriteString(\"{\\\"TxId\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(response.TxId)\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"Value\\\":\")\n\t\t// if it was a delete operation on given key, then we need to set the\n\t\t//corresponding value null. Else, we will write the response.Value\n\t\t//as-is (as the Value itself a JSON marble)\n\t\tif response.IsDelete {\n\t\t\tbuffer.WriteString(\"null\")\n\t\t} else {\n\t\t\tbuffer.WriteString(string(response.Value))\n\t\t}\n\n\t\tbuffer.WriteString(\", \\\"Timestamp\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String())\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"IsDelete\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(strconv.FormatBool(response.IsDelete))\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\"}\")\n\t\tbArrayMemberAlreadyWritten = true\n\t}\n\tbuffer.WriteString(\"]\")\n\n\tfmt.Printf(\"- getHistoryForMarble returning:\\n%s\\n\", buffer.String())\n\n\treturn ctx.GetStub().PutState(args[0], buffer.Bytes())\n}", "func orderHistoryGet(c *gin.Context) {\n\tIsUsrSectionActive, usrName := session.SessinStatus(c, \"user_session_cookie\")\n\tif !IsUsrSectionActive {\n\t\tc.HTML(\n\t\t\thttp.StatusOK,\n\t\t\t\"user_login.html\",\n\t\t\tgin.H{\"title\": \"User Login\",\n\t\t\t\t\"diplay\": \"none\", // TBD make use of this logic to diplay error\n\t\t\t},\n\t\t)\n\n\t} else {\n\t\tsessionCookie, _ := c.Cookie(\"user_session_cookie\")\n\t\t_, _, _, _, _, custID := db.TraceUserWithSIDinDB(sessionCookie)\n\t\t//Collecting all Order details to show\n\t\toK, UserOrderHisory := db.GetOrderHistory(custID)\n\t\tif !oK {\n\t\t\tfmt.Println(\"Something is went wrong while collecting order details !!\")\n\t\t}\n\t\tc.HTML(\n\t\t\thttp.StatusOK,\n\t\t\t\"orderhistory.html\",\n\t\t\tgin.H{\"title\": \"Orders\",\n\t\t\t\t\"OrderHistrory\": UserOrderHisory,\n\t\t\t\t\"usrName\": usrName,\n\t\t\t},\n\t\t)\n\n\t}\n\n}", "func NewGetVoicesOK() *GetVoicesOK {\n\treturn &GetVoicesOK{}\n}", "func DeriveResponseHeader(tokenRegistry TokenRegistry, model Model) (*documentpb.ResponseHeader, error) {\n\tcs, err := model.GetCollaborators()\n\tif err != nil {\n\t\treturn nil, errors.NewTypedError(ErrCollaborators, err)\n\t}\n\n\t// we ignore error here because it can happen when a model is first created but its not anchored yet\n\ta, _ := model.Author()\n\tauthor := a.String()\n\n\t// we ignore error here because it can happen when a model is first created but its not anchored yet\n\ttime := \"\"\n\tt, err := model.Timestamp()\n\tif err == nil {\n\t\ttime = t.UTC().String()\n\t}\n\n\tnfts := model.NFTs()\n\tcnfts, err := convertNFTs(tokenRegistry, nfts)\n\tif err != nil {\n\t\t// this could be a temporary failure, so we ignore but warn about the error\n\t\tlog.Warningf(\"errors encountered when trying to set nfts to the response: %v\", errors.NewTypedError(ErrNftNotFound, err))\n\t}\n\n\trcs, wcs := ToClientCollaboratorAccess(cs)\n\treturn &documentpb.ResponseHeader{\n\t\tDocumentId: hexutil.Encode(model.ID()),\n\t\tVersion: hexutil.Encode(model.CurrentVersion()),\n\t\tAuthor: author,\n\t\tCreatedAt: time,\n\t\tReadAccess: rcs,\n\t\tWriteAccess: wcs,\n\t\tNfts: cnfts,\n\t}, nil\n}", "func NewProtoHistoryResponse(result *chatterviews.ChatSummaryView) *chatterpb.HistoryResponse {\n\tmessage := &chatterpb.HistoryResponse{\n\t\tMessage_: *result.Message,\n\t\tSentAt: *result.SentAt,\n\t}\n\tif result.Length != nil {\n\t\tlength := int32(*result.Length)\n\t\tmessage.Length = &length\n\t}\n\treturn message\n}", "func (t *BenchmarkerChaincode) GetHistoryForKey(stub shim.ChaincodeStubInterface, seed, keySizeLo, keySizeHi int) pb.Response {\n\tvar (\n\t\tkm NoopKeyMapper\n\t)\n\n\tkey := km.GetKeys(seed, 1, keySizeLo, keySizeHi)[0]\n\n\tresultsIterator, err := stub.GetHistoryForKey(key)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\tfmt.Printf(\"GetHistoryForKey: Getting history for key '%s'\\n\", key)\n\n\t// buffer is a JSON array containing historic values for the marble\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(\"[\")\n\n\tbArrayMemberAlreadyWritten := false\n\tfor resultsIterator.HasNext() {\n\t\tresponse, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\t// Add a comma before array members, suppress it for the first array member\n\t\tif bArrayMemberAlreadyWritten == true {\n\t\t\tbuffer.WriteString(\",\")\n\t\t}\n\t\tbuffer.WriteString(\"{\\\"TxId\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(response.TxId)\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"Value\\\":\")\n\t\t// if it was a delete operation on given key, then we need to set the\n\t\t//corresponding value null. Else, we will write the response.Value\n\t\t//as-is (as the Value itself a JSON marble)\n\t\tif response.IsDelete {\n\t\t\tbuffer.WriteString(\"null\")\n\t\t} else {\n\t\t\tbuffer.WriteString(string(response.Value))\n\t\t}\n\n\t\tbuffer.WriteString(\", \\\"Timestamp\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String())\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"IsDelete\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(strconv.FormatBool(response.IsDelete))\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\"}\")\n\t\tbArrayMemberAlreadyWritten = true\n\t}\n\tbuffer.WriteString(\"]\")\n\n\treturn shim.Success(buffer.Bytes())\n}", "func getHistory(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\nfmt.Println(\"************************ READ HISTORY ************************* \")\nfmt.Printf(\"- args value: %s\\n\", args)\nfmt.Printf(\"- len(args) value: %s\\n\", len(args))\n\n\ttype AuditHistory struct {\n\t\tTxId string `json:\"txId\"`\n\t\tValue mystruct `json:\"value\"`\n\t}\n\tvar history []AuditHistory;\n\tvar mys mystruct\n\n\t\t\n\tmode1serial := strings.Join(args,\"\")\n\tfmt.Printf(\"- start getHistoryForModel_SerialNumber Combination: %s\\n\", mode1serial)\n\n\t// Get History\n\tresultsIterator, err := stub.GetHistoryForKey(mode1serial)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tdefer resultsIterator.Close()\nfmt.Printf(\"resultsIterator.HasNext()\\n%s\", resultsIterator.HasNext())\n\n\tfor resultsIterator.HasNext() {\n\tfmt.Printf(\"Inside loop\\n%s\")\n\t\thistoryData, err := resultsIterator.Next()\n\t\tfmt.Printf(\"Inside loop : \\n%s\", historyData)\n\t\t\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\n\t\tvar tx AuditHistory\n\t\ttx.TxId = historyData.TxId //copy transaction id over\n\t\t\tfmt.Printf(\"Inside loop historyData.TxId : \\n%s\", historyData.TxId )\n\t\tjson.Unmarshal(historyData.Value, &mys) //un stringify it aka JSON.parse()\n\t\tif historyData.Value == nil { //product has been deleted\n\t\t\tvar emptymys mystruct\n\t\t\ttx.Value = emptymys //copy nil product\n\t\t} else {\n\t\t\tjson.Unmarshal(historyData.Value, &mys) //un stringify it aka JSON.parse()\n\t\t\ttx.Value = mys //copy product over\n\t\t}\n\t\thistory = append(history, tx) //add this tx to the list\n\t}\n\tfmt.Printf(\"- getHistoryForProduct returning:\\n%s\", history)\n\n\t//change to array of bytes\n\thistoryAsBytes, _ := json.Marshal(history) //convert to array of bytes\n\tfmt.Printf(\"- getHistoryForProduct returning historyAsBytes:\\n%s\", historyAsBytes)\n\treturn shim.Success(historyAsBytes)\n}", "func (client *WebAppsClient) getTriggeredWebJobHistoryCreateRequest(ctx context.Context, resourceGroupName string, name string, webJobName string, id string, options *WebAppsGetTriggeredWebJobHistoryOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/triggeredwebjobs/{webJobName}/history/{id}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif webJobName == \"\" {\n\t\treturn nil, errors.New(\"parameter webJobName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{webJobName}\", url.PathEscape(webJobName))\n\tif id == \"\" {\n\t\treturn nil, errors.New(\"parameter id cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{id}\", url.PathEscape(id))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (c *Client) GetHistory(project string) (Events, error) {\n\tu := make(map[string]string)\n\tu[\"project\"] = project\n\tvar data Events\n\tvar res []byte\n\tif err := c.Get(&res, \"history\", u); err != nil {\n\t\treturn data, err\n\t}\n\txmlErr := xml.Unmarshal(res, &data)\n\treturn data, xmlErr\n}", "func (_obj *Apichannels) Channels_deleteHistory(params *TLchannels_deleteHistory, _opt ...map[string]string) (ret Bool, err error) {\n\n\tvar length int32\n\tvar have bool\n\tvar ty byte\n\t_os := codec.NewBuffer()\n\terr = params.WriteBlock(_os, 1)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tvar _status map[string]string\n\tvar _context map[string]string\n\tif len(_opt) == 1 {\n\t\t_context = _opt[0]\n\t} else if len(_opt) == 2 {\n\t\t_context = _opt[0]\n\t\t_status = _opt[1]\n\t}\n\t_resp := new(requestf.ResponsePacket)\n\ttarsCtx := context.Background()\n\n\terr = _obj.s.Tars_invoke(tarsCtx, 0, \"channels_deleteHistory\", _os.ToBytes(), _status, _context, _resp)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\t_is := codec.NewReader(tools.Int8ToByte(_resp.SBuffer))\n\terr = ret.ReadBlock(_is, 0, true)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tif len(_opt) == 1 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t} else if len(_opt) == 2 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t\tfor k := range _status {\n\t\t\tdelete(_status, k)\n\t\t}\n\t\tfor k, v := range _resp.Status {\n\t\t\t_status[k] = v\n\t\t}\n\n\t}\n\t_ = length\n\t_ = have\n\t_ = ty\n\treturn ret, nil\n}", "func GetOHLC(w http.ResponseWriter, r *http.Request) {\n\ttoken := chi.URLParam(r, \"token\")\n\tinterval := chi.URLParam(r, \"interval\")\n\tfrom := r.URL.Query().Get(\"from\")\n\tto := r.URL.Query().Get(\"to\")\n\tohlc := getTicks(token, interval, from, to)\n\n\trender.JSON(w, r, ohlc) // A chi router helper for serializing and returning json\n}", "func (c *CoinbasePro) GetOrderHistory(ctx context.Context, req *order.MultiOrderRequest) (order.FilteredOrders, error) {\n\terr := req.Validate()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar respOrders []GeneralizedOrderResponse\n\tif len(req.Pairs) > 0 {\n\t\tvar fPair currency.Pair\n\t\tvar resp []GeneralizedOrderResponse\n\t\tfor i := range req.Pairs {\n\t\t\tfPair, err = c.FormatExchangeCurrency(req.Pairs[i], asset.Spot)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tresp, err = c.GetOrders(ctx, []string{\"done\"}, fPair.String())\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\trespOrders = append(respOrders, resp...)\n\t\t}\n\t} else {\n\t\trespOrders, err = c.GetOrders(ctx, []string{\"done\"}, \"\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tformat, err := c.GetPairFormat(asset.Spot, false)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\torders := make([]order.Detail, len(respOrders))\n\tfor i := range respOrders {\n\t\tvar curr currency.Pair\n\t\tcurr, err = currency.NewPairDelimiter(respOrders[i].ProductID,\n\t\t\tformat.Delimiter)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvar side order.Side\n\t\tside, err = order.StringToOrderSide(respOrders[i].Side)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvar orderStatus order.Status\n\t\torderStatus, err = order.StringToOrderStatus(respOrders[i].Status)\n\t\tif err != nil {\n\t\t\tlog.Errorf(log.ExchangeSys, \"%s %v\", c.Name, err)\n\t\t}\n\t\tvar orderType order.Type\n\t\torderType, err = order.StringToOrderType(respOrders[i].Type)\n\t\tif err != nil {\n\t\t\tlog.Errorf(log.ExchangeSys, \"%s %v\", c.Name, err)\n\t\t}\n\t\tdetail := order.Detail{\n\t\t\tOrderID: respOrders[i].ID,\n\t\t\tAmount: respOrders[i].Size,\n\t\t\tExecutedAmount: respOrders[i].FilledSize,\n\t\t\tRemainingAmount: respOrders[i].Size - respOrders[i].FilledSize,\n\t\t\tCost: respOrders[i].ExecutedValue,\n\t\t\tCostAsset: curr.Quote,\n\t\t\tType: orderType,\n\t\t\tDate: respOrders[i].CreatedAt,\n\t\t\tCloseTime: respOrders[i].DoneAt,\n\t\t\tFee: respOrders[i].FillFees,\n\t\t\tFeeAsset: curr.Quote,\n\t\t\tSide: side,\n\t\t\tStatus: orderStatus,\n\t\t\tPair: curr,\n\t\t\tPrice: respOrders[i].Price,\n\t\t\tExchange: c.Name,\n\t\t}\n\t\tdetail.InferCostsAndTimes()\n\t\torders[i] = detail\n\t}\n\treturn req.Filter(c.Name, orders), nil\n}", "func (_obj *Apichannels) Channels_readHistoryWithContext(tarsCtx context.Context, params *TLchannels_readHistory, _opt ...map[string]string) (ret Bool, err error) {\n\n\tvar length int32\n\tvar have bool\n\tvar ty byte\n\t_os := codec.NewBuffer()\n\terr = params.WriteBlock(_os, 1)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tvar _status map[string]string\n\tvar _context map[string]string\n\tif len(_opt) == 1 {\n\t\t_context = _opt[0]\n\t} else if len(_opt) == 2 {\n\t\t_context = _opt[0]\n\t\t_status = _opt[1]\n\t}\n\t_resp := new(requestf.ResponsePacket)\n\n\terr = _obj.s.Tars_invoke(tarsCtx, 0, \"channels_readHistory\", _os.ToBytes(), _status, _context, _resp)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\t_is := codec.NewReader(tools.Int8ToByte(_resp.SBuffer))\n\terr = ret.ReadBlock(_is, 0, true)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tif len(_opt) == 1 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t} else if len(_opt) == 2 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t\tfor k := range _status {\n\t\t\tdelete(_status, k)\n\t\t}\n\t\tfor k, v := range _resp.Status {\n\t\t\t_status[k] = v\n\t\t}\n\n\t}\n\t_ = length\n\t_ = have\n\t_ = ty\n\treturn ret, nil\n}", "func (client *VirtualMachineScaleSetsClient) getOSUpgradeHistoryCreateRequest(ctx context.Context, resourceGroupName string, vmScaleSetName string, options *VirtualMachineScaleSetsGetOSUpgradeHistoryOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/virtualMachineScaleSets/{vmScaleSetName}/osUpgradeHistory\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif vmScaleSetName == \"\" {\n\t\treturn nil, errors.New(\"parameter vmScaleSetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vmScaleSetName}\", url.PathEscape(vmScaleSetName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *WebAppsClient) listTriggeredWebJobHistoryCreateRequest(ctx context.Context, resourceGroupName string, name string, webJobName string, options *WebAppsListTriggeredWebJobHistoryOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/triggeredwebjobs/{webJobName}/history\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif webJobName == \"\" {\n\t\treturn nil, errors.New(\"parameter webJobName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{webJobName}\", url.PathEscape(webJobName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (o *GetStatisticsHistoryParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.requestTimeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Begin != nil {\n\n\t\t// query param begin\n\t\tvar qrBegin int64\n\t\tif o.Begin != nil {\n\t\t\tqrBegin = *o.Begin\n\t\t}\n\t\tqBegin := swag.FormatInt64(qrBegin)\n\t\tif qBegin != \"\" {\n\t\t\tif err := r.SetQueryParam(\"begin\", qBegin); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Degraded != nil {\n\n\t\t// query param degraded\n\t\tvar qrDegraded bool\n\t\tif o.Degraded != nil {\n\t\t\tqrDegraded = *o.Degraded\n\t\t}\n\t\tqDegraded := swag.FormatBool(qrDegraded)\n\t\tif qDegraded != \"\" {\n\t\t\tif err := r.SetQueryParam(\"degraded\", qDegraded); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tvaluesDevid := o.Devid\n\n\tjoinedDevid := swag.JoinByFormat(valuesDevid, \"\")\n\t// query array param devid\n\tif err := r.SetQueryParam(\"devid\", joinedDevid...); err != nil {\n\t\treturn err\n\t}\n\n\tif o.End != nil {\n\n\t\t// query param end\n\t\tvar qrEnd int64\n\t\tif o.End != nil {\n\t\t\tqrEnd = *o.End\n\t\t}\n\t\tqEnd := swag.FormatInt64(qrEnd)\n\t\tif qEnd != \"\" {\n\t\t\tif err := r.SetQueryParam(\"end\", qEnd); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.ExpandClientid != nil {\n\n\t\t// query param expand_clientid\n\t\tvar qrExpandClientid bool\n\t\tif o.ExpandClientid != nil {\n\t\t\tqrExpandClientid = *o.ExpandClientid\n\t\t}\n\t\tqExpandClientid := swag.FormatBool(qrExpandClientid)\n\t\tif qExpandClientid != \"\" {\n\t\t\tif err := r.SetQueryParam(\"expand_clientid\", qExpandClientid); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Interval != nil {\n\n\t\t// query param interval\n\t\tvar qrInterval int64\n\t\tif o.Interval != nil {\n\t\t\tqrInterval = *o.Interval\n\t\t}\n\t\tqInterval := swag.FormatInt64(qrInterval)\n\t\tif qInterval != \"\" {\n\t\t\tif err := r.SetQueryParam(\"interval\", qInterval); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tvaluesKey := o.Key\n\n\tjoinedKey := swag.JoinByFormat(valuesKey, \"\")\n\t// query array param key\n\tif err := r.SetQueryParam(\"key\", joinedKey...); err != nil {\n\t\treturn err\n\t}\n\n\tvaluesKeys := o.Keys\n\n\tjoinedKeys := swag.JoinByFormat(valuesKeys, \"\")\n\t// query array param keys\n\tif err := r.SetQueryParam(\"keys\", joinedKeys...); err != nil {\n\t\treturn err\n\t}\n\n\tif o.MemoryOnly != nil {\n\n\t\t// query param memory_only\n\t\tvar qrMemoryOnly bool\n\t\tif o.MemoryOnly != nil {\n\t\t\tqrMemoryOnly = *o.MemoryOnly\n\t\t}\n\t\tqMemoryOnly := swag.FormatBool(qrMemoryOnly)\n\t\tif qMemoryOnly != \"\" {\n\t\t\tif err := r.SetQueryParam(\"memory_only\", qMemoryOnly); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Resolution != nil {\n\n\t\t// query param resolution\n\t\tvar qrResolution int64\n\t\tif o.Resolution != nil {\n\t\t\tqrResolution = *o.Resolution\n\t\t}\n\t\tqResolution := swag.FormatInt64(qrResolution)\n\t\tif qResolution != \"\" {\n\t\t\tif err := r.SetQueryParam(\"resolution\", qResolution); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Substr != nil {\n\n\t\t// query param substr\n\t\tvar qrSubstr bool\n\t\tif o.Substr != nil {\n\t\t\tqrSubstr = *o.Substr\n\t\t}\n\t\tqSubstr := swag.FormatBool(qrSubstr)\n\t\tif qSubstr != \"\" {\n\t\t\tif err := r.SetQueryParam(\"substr\", qSubstr); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Timeout != nil {\n\n\t\t// query param timeout\n\t\tvar qrTimeout int64\n\t\tif o.Timeout != nil {\n\t\t\tqrTimeout = *o.Timeout\n\t\t}\n\t\tqTimeout := swag.FormatInt64(qrTimeout)\n\t\tif qTimeout != \"\" {\n\t\t\tif err := r.SetQueryParam(\"timeout\", qTimeout); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (app *application) historyCmd(p *project, cmd *historyApiCommand) (*response, error) {\n\n\tresp := newResponse(\"history\")\n\n\tchannel := cmd.Channel\n\n\tif channel == \"\" {\n\t\tlogger.ERROR.Println(\"channel required\")\n\t\treturn nil, ErrInvalidApiMessage\n\t}\n\n\tbody := map[string]interface{}{\n\t\t\"channel\": channel,\n\t}\n\n\tresp.Body = body\n\n\tchOpts, err := app.channelOpts(p.Name, channel)\n\tif err != nil {\n\t\tresp.Err(err)\n\t\treturn resp, nil\n\t}\n\n\tif chOpts.HistorySize <= 0 || chOpts.HistoryLifetime <= 0 {\n\t\tresp.Err(ErrNotAvailable)\n\t\treturn resp, nil\n\t}\n\n\thistory, err := app.history(p.Name, channel)\n\tif err != nil {\n\t\tresp.Err(ErrInternalServerError)\n\t\treturn resp, nil\n\t}\n\n\tresp.Body = map[string]interface{}{\n\t\t\"channel\": channel,\n\t\t\"data\": history,\n\t}\n\treturn resp, nil\n}", "func getLiftHistory(c *echo.Context) error {\n\tid, err := strconv.ParseUint(c.Param(\"ID\"), 10, 64)\n\tif err != nil {\n\t\treturn jsonResp(c, err.Error())\n\t}\n\tlift := LiftHistory{DeviceID: c.Param(\"DeviceID\"), ID: id}\n\n\thas, err := g_engine.Get(&lift)\n\tif err != nil {\n\t\treturn jsonResp(c, err.Error())\n\t}\n\tif !has {\n\t\treturn jsonResp(c, \"not exists\")\n\t}\n\n\treturn c.JSON(http.StatusOK, lift)\n}", "func NewHistory(capacity int) History {\n history := History{}\n history.results = list.New()\n history.results.Init()\n return history\n}", "func get(url string, qparms rest.QParms) ([]byte, error) {\n\theaders := rest.Headers{\"Authorization\": \"Bearer \" + token}\n\tfor k, v := range defaultHeaders {\n\t\theaders[k] = v\n\t}\n\tclient := rest.NewClient(headers, qparms)\n\n\tbody, err := client.Get(url)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn body, nil\n}", "func (t *SimpleChaincode) getHistoryForArtwork(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\n\tif len(args) < 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 1 (TokenID)\")\n\t}\n\n\ttokenID := args[0]\n\n\tfmt.Printf(\"- start getHistoryForArtwork: %s\\n\", tokenID)\n\n\tresultsIterator, err := stub.GetHistoryForKey(tokenID)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\t// buffer is a JSON array containing historic values for the Artwork\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(\"[\")\n\n\tbArrayMemberAlreadyWritten := false\n\tfor resultsIterator.HasNext() {\n\t\tresponse, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\t// Add a comma before array members, suppress it for the first array member\n\t\tif bArrayMemberAlreadyWritten == true {\n\t\t\tbuffer.WriteString(\",\")\n\t\t}\n\t\tbuffer.WriteString(\"{\\\"TxId\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(response.TxId)\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"Value\\\":\")\n\t\t// if it was a delete operation on given key, then we need to set the\n\t\t//corresponding value null. Else, we will write the response.Value\n\t\t//as-is (as the Value itself a JSON Artwork)\n\t\tif response.IsDelete {\n\t\t\tbuffer.WriteString(\"null\")\n\t\t} else {\n\t\t\tbuffer.WriteString(string(response.Value))\n\t\t}\n\n\t\tbuffer.WriteString(\", \\\"Timestamp\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String())\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"IsDelete\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(strconv.FormatBool(response.IsDelete))\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\"}\")\n\t\tbArrayMemberAlreadyWritten = true\n\t}\n\tbuffer.WriteString(\"]\")\n\n\tfmt.Printf(\"- getHistoryForArtwork returning:\\n%s\\n\", buffer.String())\n\n\treturn shim.Success(buffer.Bytes())\n}", "func (client *RecommendationsClient) listHistoryForWebAppCreateRequest(ctx context.Context, resourceGroupName string, siteName string, options *RecommendationsClientListHistoryForWebAppOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{siteName}/recommendationHistory\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif siteName == \"\" {\n\t\treturn nil, errors.New(\"parameter siteName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{siteName}\", url.PathEscape(siteName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.ExpiredOnly != nil {\n\t\treqQP.Set(\"expiredOnly\", strconv.FormatBool(*options.ExpiredOnly))\n\t}\n\treqQP.Set(\"api-version\", \"2021-03-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tunencodedParams := []string{req.Raw().URL.RawQuery}\n\tif options != nil && options.Filter != nil {\n\t\tunencodedParams = append(unencodedParams, \"$filter=\"+*options.Filter)\n\t}\n\treq.Raw().URL.RawQuery = strings.Join(unencodedParams, \"&\")\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (f *FileV1) toHistory() History {\n\tm := make(map[string]Record)\n\tfor k, v := range f.Records {\n\t\tr := v.toRecord()\n\t\tm[k] = r\n\t}\n\treturn History{\n\t\trecords: m,\n\t}\n}", "func NewHistory() *History {\n\treturn &History{\n\t\thistories: []string{},\n\t\ttmp: []string{\"\"},\n\t\tselected: 0,\n\t}\n}", "func NewGetCSVOK() *GetCSVOK {\n\n\treturn &GetCSVOK{}\n}", "func CreateQueryTaskDetailHistoryResponse() (response *QueryTaskDetailHistoryResponse) {\n\tresponse = &QueryTaskDetailHistoryResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func (d *Dao) HistoryView(c context.Context, mid, hid int64, ip string) (history *archive.ArcHistory, err error) {\n\tparams := url.Values{}\n\tparams.Set(\"hid\", strconv.FormatInt(hid, 10))\n\tparams.Set(\"mid\", strconv.FormatInt(mid, 10))\n\tvar res struct {\n\t\tCode int `json:\"code\"`\n\t\tData *archive.ArcHistory `json:\"data\"`\n\t}\n\tif err = d.client.Get(c, d.hView, ip, params, &res); err != nil {\n\t\tlog.Error(\"archive.HistoryView url(%s) mid(%d) error(%v)\", d.hView+\"?\"+params.Encode(), mid, err)\n\t\terr = ecode.CreativeArchiveAPIErr\n\t\treturn\n\t}\n\tif res.Code != 0 {\n\t\tlog.Error(\"archive.HistoryView url(%s) mid(%d) res(%v)\", d.hView+\"?\"+params.Encode(), mid, res)\n\t\terr = ecode.CreativeArchiveAPIErr\n\t\treturn\n\t}\n\thistory = res.Data\n\treturn\n}", "func (client ConversationsClient) SendConversationHistoryMethodResponder(resp *http.Response) (result ResourceResponseType, err error) {\n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK,http.StatusCreated,http.StatusAccepted),\n autorest.ByUnmarshallingJSON(&result),\n autorest.ByClosing())\n result.Response = autorest.Response{Response: resp}\n return\n }", "func NewWeaviateThingHistoryGet(ctx *middleware.Context, handler WeaviateThingHistoryGetHandler) *WeaviateThingHistoryGet {\n\treturn &WeaviateThingHistoryGet{Context: ctx, Handler: handler}\n}", "func (client *RecommendationsClient) listHistoryForWebAppCreateRequest(ctx context.Context, resourceGroupName string, siteName string, options *RecommendationsListHistoryForWebAppOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{siteName}/recommendationHistory\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif siteName == \"\" {\n\t\treturn nil, errors.New(\"parameter siteName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{siteName}\", url.PathEscape(siteName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.ExpiredOnly != nil {\n\t\treqQP.Set(\"expiredOnly\", strconv.FormatBool(*options.ExpiredOnly))\n\t}\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tunencodedParams := []string{req.Raw().URL.RawQuery}\n\tif options != nil && options.Filter != nil {\n\t\tunencodedParams = append(unencodedParams, \"$filter=\"+*options.Filter)\n\t}\n\treq.Raw().URL.RawQuery = strings.Join(unencodedParams, \"&\")\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func HostSpotifyListeningHistory(refreshToken string) ([]types.SingleTrack, error) {\n\tspotifyAPIBase := os.Getenv(\"SPOTIFY_API_BASE\")\n\taccessToken, err := HostSpotifyGetAuthorizedAcessToken(refreshToken)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\turl := fmt.Sprintf(\"%s/v1/me/player/recently-played\", spotifyAPIBase)\n\thistory := &types.HostSpotifyHistory{}\n\terr = MakeSpotifyRequest(url, accessToken.AccessToken, history)\n\tif err != nil {\n\t\t// log.Printf(\"Error making request to the listening history: %s\", err)\n\t\treturn nil, err\n\t}\n\n\thist := []types.SingleTrack{}\n\tfor _, h := range history.Items {\n\t\tbase := h.Track.Album\n\t\timg := \"\"\n\t\tif len(base.Images) > 0 {\n\t\t\timg = base.Images[0].URL\n\t\t}\n\t\tartistes := []string{}\n\t\tfor _, k := range h.Track.Artists {\n\t\t\tartistes = append(artistes, k.Name)\n\t\t}\n\n\t\ttrack := types.SingleTrack{Cover: img, Artistes: artistes, Duration: h.Track.DurationMs,\n\t\t\tExplicit: h.Track.Explicit, ID: h.Track.ID, Platform: util.HostSpotify, Preview: h.Track.PreviewURL,\n\t\t\tReleaseDate: h.Track.Album.ReleaseDate, Title: h.Track.Name, URL: h.Track.ExternalUrls.Spotify, PlayedAt: h.PlayedAt.String(),\n\t\t}\n\t\thist = append(hist, track)\n\t}\n\n\treturn hist, nil\n}", "func (b *Bitmex) GetOrderHistory(ctx context.Context, req *order.MultiOrderRequest) (order.FilteredOrders, error) {\n\terr := req.Validate()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tparams := OrdersRequest{}\n\tresp, err := b.GetOrders(ctx, &params)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tformat, err := b.GetPairFormat(asset.PerpetualContract, false)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\torders := make([]order.Detail, len(resp))\n\tfor i := range resp {\n\t\torderSide := orderSideMap[resp[i].Side]\n\t\tvar orderStatus order.Status\n\t\torderStatus, err = order.StringToOrderStatus(resp[i].OrdStatus)\n\t\tif err != nil {\n\t\t\tlog.Errorf(log.ExchangeSys, \"%s %v\", b.Name, err)\n\t\t}\n\n\t\tpair := currency.NewPairWithDelimiter(resp[i].Symbol, resp[i].SettlCurrency, format.Delimiter)\n\n\t\tvar oType order.Type\n\t\toType, err = b.getOrderType(resp[i].OrdType)\n\t\tif err != nil {\n\t\t\tlog.Errorf(log.ExchangeSys, \"%s %v\", b.Name, err)\n\t\t}\n\n\t\torderDetail := order.Detail{\n\t\t\tPrice: resp[i].Price,\n\t\t\tAverageExecutedPrice: resp[i].AvgPx,\n\t\t\tAmount: resp[i].OrderQty,\n\t\t\tExecutedAmount: resp[i].CumQty,\n\t\t\tRemainingAmount: resp[i].LeavesQty,\n\t\t\tDate: resp[i].TransactTime,\n\t\t\tCloseTime: resp[i].Timestamp,\n\t\t\tExchange: b.Name,\n\t\t\tOrderID: resp[i].OrderID,\n\t\t\tSide: orderSide,\n\t\t\tStatus: orderStatus,\n\t\t\tType: oType,\n\t\t\tPair: pair,\n\t\t}\n\t\torderDetail.InferCostsAndTimes()\n\n\t\torders[i] = orderDetail\n\t}\n\treturn req.Filter(b.Name, orders), nil\n}", "func (c *BalanceClient) History() (*BalanceTransactionListResponse, error) {\n\treturn c.HistoryWithFilters(Filters{})\n}", "func GetUserHistory(username string, filter UserHistoryFilter) (*UserHistory, error) {\n\tres := &UserHistory{}\n\treq := fmt.Sprintf(\"/users/%s/history\", url.QueryEscape(username))\n\tif filter != \"\" {\n\t\treq += fmt.Sprintf(\"?type=%s\", filter)\n\t}\n\terr := urlToStruct(req, res)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn res, nil\n}", "func (*InvHistory) Descriptor() ([]byte, []int) {\n\treturn file_proto_inventory_proto_rawDescGZIP(), []int{1}\n}", "func (s *Service) TogetherHistory(c context.Context, res []*hismodle.Resource, mid, build int64, platform string, plat int8) (data []*history.ListRes) {\n\tvar (\n\t\taids []int64\n\t\tepids []int64\n\t\tarticleIDs []int64\n\t\troomIDs []int64\n\t\tarchive map[int64]*arcmdl.View3\n\t\tpgcInfo map[int64]*history.PGCRes\n\t\tarticle map[int64]*artmodle.Meta\n\t\tlive map[int64]*livemdl.RoomInfo\n\t)\n\ti := 0\n\tfor _, his := range res {\n\t\ti++\n\t\t//由于出现过history吐出数量无限制,限制请求archive的数量逻辑保留\n\t\tif i > 80 {\n\t\t\tbreak\n\t\t}\n\t\tswitch his.TP {\n\t\tcase _tpOld, _tpOffline, _tpArchive:\n\t\t\taids = append(aids, his.Oid)\n\t\tcase _tpPGC:\n\t\t\taids = append(aids, his.Oid) //用cid拿时长duration\n\t\t\tepids = append(epids, his.Epid)\n\t\tcase _tpArticle:\n\t\t\tarticleIDs = append(articleIDs, his.Oid)\n\t\tcase _tpLive:\n\t\t\troomIDs = append(roomIDs, his.Oid)\n\t\tcase _tpCorpus:\n\t\t\tarticleIDs = append(articleIDs, his.Cid)\n\t\tdefault:\n\t\t\tlog.Warn(\"unknow history type(%d) msg(%+v)\", his.TP, his)\n\t\t}\n\t}\n\teg, ctx := errgroup.WithContext(c)\n\tif len(aids) > 0 {\n\t\teg.Go(func() (err error) {\n\t\t\tarchive, err = s.historyDao.Archive(ctx, aids)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(\"%+v\", err)\n\t\t\t\terr = nil\n\t\t\t}\n\t\t\treturn\n\t\t})\n\t}\n\tif len(epids) > 0 {\n\t\teg.Go(func() (err error) {\n\t\t\tpgcInfo, err = s.historyDao.PGC(ctx, xstr.JoinInts(epids), platform, build, mid)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(\"%+v\", err)\n\t\t\t\terr = nil\n\t\t\t}\n\t\t\treturn\n\t\t})\n\t}\n\tif len(articleIDs) > 0 {\n\t\teg.Go(func() (err error) {\n\t\t\tarticle, err = s.historyDao.Article(ctx, articleIDs)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(\"%+v\", err)\n\t\t\t\terr = nil\n\t\t\t}\n\t\t\treturn\n\t\t})\n\t}\n\tif len(roomIDs) > 0 {\n\t\teg.Go(func() (err error) {\n\t\t\tlive, err = s.liveDao.LiveByRIDs(ctx, roomIDs)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(\"%+v\", err)\n\t\t\t\terr = nil\n\t\t\t}\n\t\t\treturn\n\t\t})\n\t}\n\teg.Wait()\n\tfor _, his := range res {\n\t\t// 国际版不出直播\n\t\tif plat == model.PlatAndroidI && his.TP == _tpLive {\n\t\t\tcontinue\n\t\t}\n\t\ttmpInfo := &history.ListRes{\n\t\t\tGoto: gotoDesc[his.TP],\n\t\t\tViewAt: his.Unix,\n\t\t}\n\t\ttmpInfo.History.Oid = his.Oid\n\t\ttmpInfo.History.Tp = his.TP\n\t\ttmpInfo.History.Business = his.Business\n\t\tswitch his.TP {\n\t\tcase _tpOld, _tpOffline, _tpArchive:\n\t\t\tarc, ok := archive[his.Oid]\n\t\t\tif !ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ttmpInfo.Title = arc.Title\n\t\t\ttmpInfo.Cover = arc.Pic\n\t\t\ttmpInfo.Mid = arc.Author.Mid\n\t\t\ttmpInfo.Name = arc.Author.Name\n\t\t\ttmpInfo.Progress = his.Pro\n\t\t\ttmpInfo.Videos = arc.Videos\n\t\t\tfor _, p := range arc.Pages {\n\t\t\t\tif p.Cid == his.Cid {\n\t\t\t\t\ttmpInfo.Duration = p.Duration\n\t\t\t\t\ttmpInfo.History.Cid = p.Cid\n\t\t\t\t\ttmpInfo.History.Page = p.Page\n\t\t\t\t\ttmpInfo.History.Part = p.Part\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\ttmpInfo.URI = model.FillURI(tmpInfo.Goto, strconv.FormatInt(his.Oid, 10), model.AvHandler(arc.Archive3))\n\t\tcase _tpPGC:\n\t\t\tpgc, okPGC := pgcInfo[his.Epid]\n\t\t\tarc, okArc := archive[his.Oid]\n\t\t\tif !okPGC || !okArc {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ttmpInfo.Title = pgc.Title\n\t\t\ttmpInfo.ShowTitle = pgc.ShowTitle\n\t\t\ttmpInfo.Cover = pgc.Cover\n\t\t\ttmpInfo.Badge = badge[his.STP]\n\t\t\ttmpInfo.Progress = his.Pro\n\t\t\ttmpInfo.URI = model.FillURI(tmpInfo.Goto, strconv.FormatInt(his.Sid, 10), nil)\n\t\t\tfor _, p := range arc.Pages {\n\t\t\t\tif p.Cid == his.Cid {\n\t\t\t\t\ttmpInfo.Duration = p.Duration\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\tcase _tpArticle:\n\t\t\tart, ok := article[his.Oid]\n\t\t\tif !ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ttmpInfo.Title = art.Title\n\t\t\ttmpInfo.Covers = art.ImageURLs\n\t\t\ttmpInfo.Mid = art.Author.Mid\n\t\t\ttmpInfo.Name = art.Author.Name\n\t\t\ttmpInfo.Badge = \"专栏\"\n\t\t\ttmpInfo.URI = model.FillURI(tmpInfo.Goto, strconv.FormatInt(his.Oid, 10), nil)\n\t\tcase _tpLive:\n\t\t\tlv, ok := live[his.Oid]\n\t\t\tif !ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ttmpInfo.Title = lv.Title\n\t\t\ttmpInfo.Cover = lv.UserCover\n\t\t\tif lv.UserCover == \"\" {\n\t\t\t\ttmpInfo.Cover = lv.Cover\n\t\t\t}\n\t\t\ttmpInfo.Mid = lv.Mid\n\t\t\ttmpInfo.Name = lv.Name\n\t\t\ttmpInfo.TagName = lv.TagName\n\t\t\tif lv.Status == 1 { //1是直播中,0、2是未开播\n\t\t\t\ttmpInfo.LiveStatus = 1\n\t\t\t}\n\t\t\tif model.IsAndroid(plat) && build < _androidBroadcast {\n\t\t\t\tlv = nil\n\t\t\t}\n\t\t\ttmpInfo.URI = model.FillURI(tmpInfo.Goto, strconv.FormatInt(his.Oid, 10), model.LiveHandler(lv))\n\t\tcase _tpCorpus:\n\t\t\tart, ok := article[his.Cid]\n\t\t\tif !ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ttmpInfo.Title = art.Title\n\t\t\ttmpInfo.Covers = art.ImageURLs\n\t\t\ttmpInfo.Mid = art.Author.Mid\n\t\t\ttmpInfo.Name = art.Author.Name\n\t\t\ttmpInfo.Badge = \"专栏\"\n\t\t\ttmpInfo.URI = model.FillURI(\"article\", strconv.FormatInt(his.Cid, 10), nil)\n\t\tdefault:\n\t\t\tcontinue\n\t\t}\n\t\tdata = append(data, tmpInfo)\n\t}\n\treturn\n}", "func CreateQueryTaskInfoHistoryResponse() (response *QueryTaskInfoHistoryResponse) {\n\tresponse = &QueryTaskInfoHistoryResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func (*TranslationHistoryResponse) Descriptor() ([]byte, []int) {\n\treturn file_translation_proto_rawDescGZIP(), []int{3}\n}", "func (h *Hbdm) HistoryOrders(symbol string, tradeType, orderType, status, create int, pageIndex, pageSize *int) (orders *OrdersResponse, err error) {\n\tpayload := make(map[string]interface{}, 7)\n\tpayload[\"symbol\"] = symbol\n\tpayload[\"trade_type\"] = tradeType\n\tpayload[\"type\"] = orderType\n\tpayload[\"status\"] = status\n\tpayload[\"create_date\"] = create\n\n\tif pageIndex != nil {\n\t\tpayload[\"page_index\"] = *pageIndex\n\t}\n\tif pageSize != nil {\n\t\tpayload[\"page_size\"] = *pageSize\n\t}\n\n\tr, err := h.client.do(\"POST\", \"contract_hisorders\", payload, true)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tvar response interface{}\n\tif err = json.Unmarshal(r, &response); err != nil {\n\t\treturn\n\t}\n\n\tif err = handleErr(response); err != nil {\n\t\treturn\n\t}\n\n\terr = json.Unmarshal(r, &orders)\n\treturn\n}", "func (p *Proxy) Historical(startDate time.Time, endDate time.Time) ([]byte, error) {\n\trelativePath := \"v1/bpi/historical/close.json\"\n\tp.APIURL.Path = relativePath\n\tquery := url.Values{}\n\tquery.Add(\"start\", startDate.Format(RFC3339custom))\n\tquery.Add(\"end\", endDate.Format(RFC3339custom))\n\tp.APIURL.RawQuery = query.Encode()\n\tresponse, err := httpGet(p.APIURL.String())\n\tif err != nil {\n\t\treturn []byte{}, err\n\t}\n\tdefer response.Body.Close()\n\tbody, err := ioutil.ReadAll(response.Body)\n\tif err != nil {\n\t\treturn []byte{}, err\n\t}\n\treturn body, nil\n}", "func addStdHeaders(headers http.Header) http.Header {\n\theaders.Set(\"Accept-Encoding\", \"gzip\")\n\t// So that I can have a static id for tests.\n\tif testID != \"\" {\n\t\theaders.Set(\"client-request-id\", testID)\n\t\theaders.Set(\"Return-Client-Request-Id\", \"false\")\n\t} else {\n\t\theaders.Set(\"client-request-id\", uuid.New().String())\n\t\theaders.Set(\"Return-Client-Request-Id\", \"false\")\n\t}\n\theaders.Set(\"x-client-sku\", \"MSAL.Go\")\n\theaders.Set(\"x-client-os\", runtime.GOOS)\n\theaders.Set(\"x-client-cpu\", runtime.GOARCH)\n\theaders.Set(\"x-client-ver\", version.Version)\n\treturn headers\n}", "func NewGetStatisticsHistoryParams() *GetStatisticsHistoryParams {\n\tvar ()\n\treturn &GetStatisticsHistoryParams{\n\n\t\trequestTimeout: cr.DefaultTimeout,\n\t}\n}", "func (c *Connecter) GetCurrenciesSupplyHistory(cshReq CurrenciesSupplyHistoryRequest) ([]CurrenciesSupplyHistoryResponse, error) {\n\treq, err := c.newRequest(currenciesSupplyHistoryURL)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Formulate query params.\n\tq := req.URL.Query()\n\tq.Add(\"key\", c.apiKey)\n\tif cshReq.Currency == \"\" {\n\t\treturn nil, errors.New(\"currency is required\")\n\t}\n\tq.Add(\"currency\", cshReq.Currency)\n\tif cshReq.Start.IsZero() {\n\t\treturn nil, errors.New(\"start is required\")\n\t}\n\tq.Add(\"start\", cshReq.Start.Format(time.RFC3339))\n\tif !cshReq.End.IsZero() {\n\t\tq.Add(\"end\", cshReq.End.Format(time.RFC3339))\n\t}\n\tif cshReq.Format != \"\" {\n\t\tif cshReq.Format == \"csv\" && cshReq.FileNameWithPath == \"\" {\n\t\t\treturn nil, errors.New(\"csv file path is required\")\n\t\t}\n\t\tq.Add(\"format\", cshReq.Format)\n\t}\n\treq.URL.RawQuery = q.Encode()\n\n\t// Do the requset to server.\n\tresp, err := c.do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\t// Creates formatted response from the server's response, if the requested format is json.\n\tif cshReq.Format == \"\" || cshReq.Format == \"json\" {\n\t\tvar cshResp []CurrenciesSupplyHistoryResponse\n\t\tif err := json.NewDecoder(resp.Body).Decode(&cshResp); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn cshResp, nil\n\t}\n\n\t// Creates a CSV file and then copies the server's response, if the requested format is csv.\n\terr = c.createFile(resp.Body, cshReq.FileNameWithPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, nil\n}", "func (c *Client) History(ctx context.Context, p *HistoryPayload) (res HistoryClientStream, err error) {\n\tvar ires any\n\tires, err = c.HistoryEndpoint(ctx, p)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn ires.(HistoryClientStream), nil\n}", "func (client SmartGroupsClient) GetHistorySender(req *http.Request) (*http.Response, error) {\n\treturn client.Send(req, azure.DoRetryWithRegistration(client.Client))\n}", "func (b *BinanceWorker) GetHistoryTrades(symbol string, start, end int64, number int) {\n\ttrades, err := b.Cli.NewAggTradesService().\n\t\tSymbol(symbol).StartTime(start).EndTime(end).\n\t\tDo(context.Background())\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\n\tvar sum int = 0\n\tvar qul float64 = 0.\n\tvar allQul float64 = 0.\n\tfor _, t := range trades {\n\t\ti, _ := strconv.ParseFloat(t.Quantity, 64)\n\t\tallQul += i\n\t\tif t.IsBuyerMaker {\n\t\t\tsum++\n\t\t\tqul += i\n\t\t}\n\n\t}\n\n\tfmt.Println(float64(float64(sum)/float64(len(trades)))*100, float64(float64(qul)/float64(allQul))*100)\n\t// err = json.Unmarshal(jsonBlob, &rankings)\n\t// if err != nil {\n\t// \t// nozzle.printError(\"opening config file\", err.Error())\n\t// }\n\torders, err := json.Marshal(trades)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\t//fmt.Println(string(orders))\n\t// rankingsJson, _ := json.Marshal(rankings)\n\terr = ioutil.WriteFile(fmt.Sprintf(\"%d.json\", number), orders, 0644)\n\t// fmt.Printf(\"%+v\", rankings)\n}", "func (c *BalanceClient) HistoryWithFilters(filters Filters) (*BalanceTransactionListResponse, error) {\n\tresponse := BalanceTransactionListResponse{}\n\tvalues := url.Values{}\n\taddFiltersToValues([]string{\"count\", \"offset\", \"currency\", \"source\", \"transfer\", \"type\"}, filters, &values)\n\terr := c.client.get(\"/balance/history\", values, &response)\n\treturn &response, err\n}", "func (b *Bitmex) GetHistoricCandlesExtended(_ context.Context, _ currency.Pair, _ asset.Item, _ kline.Interval, _, _ time.Time) (*kline.Item, error) {\n\treturn nil, common.ErrFunctionNotSupported\n}", "func httpGetRecents(store *ForwardStore) func(w http.ResponseWriter, r *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tjson.NewEncoder(w).Encode(store.Recents)\n\t}\n}", "func getHistory(source string) ([]TransferData, error) {\n\turl := fmt.Sprintf(\"%s/history?duration=%s\", source, url.QueryEscape(AgentRouter.CronInterval))\n\tresp := utils.FetchResponse(url, []byte{})\n\tif resp.Error != nil {\n\t\treturn nil, resp.Error\n\t}\n\tvar transferRecords []TransferData\n\terr := json.Unmarshal(resp.Data, &transferRecords)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn transferRecords, nil\n}", "func (*CMsgGCGetHeroStatsHistoryResponse) Descriptor() ([]byte, []int) {\n\treturn file_dota_gcmessages_client_proto_rawDescGZIP(), []int{166}\n}", "func (*GetTransactionHistoryResponse) Descriptor() ([]byte, []int) {\n\treturn file_wallet_proto_rawDescGZIP(), []int{31}\n}", "func (self* userRestAPI) flightHistory(w http.ResponseWriter, r *http.Request) {\n\n\t// Read arguments\n\tband,number,err := self.extractBandAndNumber(r)\n\tif err != nil {\n\t\tlogError(err)\n\t\thttp.Error(w, fmt.Sprintf(\"\\nFailed to parse arguments '%s'\\n\",err), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// Retrieve history for specified traveller\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t_,history,err := self.engine.TripHistoryAsJSON(band,number)\n\tif err != nil {\n\t\tlogError(err)\n\t\thttp.Error(w, fmt.Sprintf(\"\\nFailed to retrieve flight history with error '%s'\\n\",err), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tio.WriteString(w,history)\n\n}", "func CreateGetTaobaoOrderResponse() (response *GetTaobaoOrderResponse) {\n\tresponse = &GetTaobaoOrderResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func (format *HttpStreamFormat) Export() interface{} {\n export := make(map[string]interface{})\n if (format.Close) {\n export[\"action\"] = \"close\"\n } else {\n if (format.Content != nil) {\n content := string(format.Content)\n if (utf8.ValidString(content)) {\n export[\"content\"] = content\n } else {\n export[\"content-bin\"] =\n base64.StdEncoding.EncodeToString(format.Content)\n }\n }\n }\n return export\n}", "func History(ctx context.Context, nameOrID string, options *HistoryOptions) ([]*types.HistoryResponse, error) {\n\tif options == nil {\n\t\toptions = new(HistoryOptions)\n\t}\n\t_ = options\n\tvar history []*types.HistoryResponse\n\tconn, err := bindings.GetClient(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresponse, err := conn.DoRequest(ctx, nil, http.MethodGet, \"/images/%s/history\", nil, nil, nameOrID)\n\tif err != nil {\n\t\treturn history, err\n\t}\n\tdefer response.Body.Close()\n\n\treturn history, response.Process(&history)\n}", "func (t *SupplyChaincode) getTradeHistory(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\n\tif len(args) < 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 1\")\n\t}\n\n\tmarbleName := args[0]\n\n\tfmt.Printf(\"- start getHistoryForMarble: %s\\n\", marbleName)\n\n/*\n// TODO: not implemented in current stable version. Waiting for v1.0 beta release.\n\tresultsIterator, err := stub.GetHistoryForKey(marbleName)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\t// buffer is a JSON array containing historic values for the marble\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(\"[\")\n\n\tbArrayMemberAlreadyWritten := false\n\tfor resultsIterator.HasNext() {\n\t\ttxID, historicValue, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\t// Add a comma before array members, suppress it for the first array member\n\t\tif bArrayMemberAlreadyWritten == true {\n\t\t\tbuffer.WriteString(\",\")\n\t\t}\n\t\tbuffer.WriteString(\"{\\\"TxId\\\":\")\n\t\tbuffer.WriteString(\"\\\"\")\n\t\tbuffer.WriteString(txID)\n\t\tbuffer.WriteString(\"\\\"\")\n\n\t\tbuffer.WriteString(\", \\\"Value\\\":\")\n\t\t// historicValue is a JSON marble, so we write as-is\n\t\tbuffer.WriteString(string(historicValue))\n\t\tbuffer.WriteString(\"}\")\n\t\tbArrayMemberAlreadyWritten = true\n\t}\n\tbuffer.WriteString(\"]\")\n\n\tfmt.Printf(\"- getHistoryForMarble returning:\\n%s\\n\", buffer.String())\n\n\treturn shim.Success(buffer.Bytes())\n*/\n\n\tqueryString := args[0]\n\tqueryResults, err := stub.GetState(queryString)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\t\n\treturn shim.Success(queryResults)\t\n}", "func parseHistoryFileV1(b []byte) (*History, error) {\n\tvar f FileV1\n\n\terr := json.Unmarshal(b, &f)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\th := f.toHistory()\n\n\treturn &h, nil\n}", "func (this ResponseDetailsViewV5) GetHeaders() map[string][]string { return this.Headers }", "func (*GetVmxcTxHistoryResponse) Descriptor() ([]byte, []int) {\n\treturn file_wallet_proto_rawDescGZIP(), []int{21}\n}", "func (f *ExtensionStoreGetPublisherFunc) History() []ExtensionStoreGetPublisherFuncCall {\n\tf.mutex.Lock()\n\thistory := make([]ExtensionStoreGetPublisherFuncCall, len(f.history))\n\tcopy(history, f.history)\n\tf.mutex.Unlock()\n\n\treturn history\n}", "func (e *TarantoolEngine) addHistory(chID ChannelID, message Message, size, lifetime int64) (err error) {\n\t// not implemented\n\treturn\n}", "func GetVoices(lang string) Response {\n\tvar res Response\n\tsess, err := session.NewSession()\n\tif err != nil {\n\t\tres.Error = err\n\t\treturn res\n\t}\n\n\tsvc := polly.New(sess, &aws.Config{Region: aws.String(\"us-east-1\")})\n\n\tparams := &polly.DescribeVoicesInput{\n\t\tLanguageCode: aws.String(lang),\n\t}\n\tresp, err := svc.DescribeVoices(params)\n\tif err != nil {\n\t\tres.Error = err\n\t\treturn res\n\t}\n\n\tres.Voices = resp\n\treturn res\n}", "func (_obj *Apichannels) Channels_readHistoryOneWayWithContext(tarsCtx context.Context, params *TLchannels_readHistory, _opt ...map[string]string) (ret Bool, err error) {\n\n\tvar length int32\n\tvar have bool\n\tvar ty byte\n\t_os := codec.NewBuffer()\n\terr = params.WriteBlock(_os, 1)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tvar _status map[string]string\n\tvar _context map[string]string\n\tif len(_opt) == 1 {\n\t\t_context = _opt[0]\n\t} else if len(_opt) == 2 {\n\t\t_context = _opt[0]\n\t\t_status = _opt[1]\n\t}\n\t_resp := new(requestf.ResponsePacket)\n\n\terr = _obj.s.Tars_invoke(tarsCtx, 1, \"channels_readHistory\", _os.ToBytes(), _status, _context, _resp)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tif len(_opt) == 1 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t} else if len(_opt) == 2 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t\tfor k := range _status {\n\t\t\tdelete(_status, k)\n\t\t}\n\t\tfor k, v := range _resp.Status {\n\t\t\t_status[k] = v\n\t\t}\n\n\t}\n\t_ = length\n\t_ = have\n\t_ = ty\n\treturn ret, nil\n}", "func getQueryHistory(w http.ResponseWriter, req *http.Request) {\n\tr := render.New(render.Options{})\n\tdbHandler := core.GetDBHandler()\n\tsearch := req.URL.Query().Get(\"search[value]\")\n\tstart, _ := strconv.Atoi(req.URL.Query().Get(\"start\"))\n\tdraw, _ := strconv.Atoi(req.URL.Query().Get(\"draw\"))\n\tlength, _ := strconv.Atoi(req.URL.Query().Get(\"length\"))\n\tresponse, err := dbHandler.GetDNSQueryHistory(start, length, search)\n\tif err != nil {\n\t\tr.JSON(w, http.StatusOK, map[string]interface{}{\n\t\t\t\"error\": err.Error(),\n\t\t})\n\t\treturn\n\t}\n\tr.JSON(w, http.StatusOK, map[string]interface{}{\n\t\t\"draw\": draw,\n\t\t\"data\": response,\n\t})\n}", "func (o *OKEX) GetHistoricCandles(pair currency.Pair, a asset.Item, start, end time.Time, interval time.Duration) (kline.Item, error) {\n\treturn kline.Item{}, common.ErrFunctionNotSupported\n}", "func getStock(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\tvar stoc AutoGenerated\n\n\t//Gets and saves the JSON into response from YFinance\n\tresponse, err := http.Get(\"https://query1.finance.yahoo.com/v10/finance/quoteSummary/AAPL?modules=summaryDetail%2CsummaryProfile\")\n\tif err != nil {\n\t\tpanic(err)\n\t} else {\n\t\tdecoder := json.NewDecoder(response.Body)\n\t\terr := decoder.Decode(&stoc)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tdefer response.Body.Close()\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\tvar stock Stock\n\n\t\tfor _, s := range stoc.QuoteSummary.Result {\n\t\t\tprice := s.SummaryDetail.RegularMarketOpen.Raw\n\t\t\tcap := s.SummaryDetail.RegularMarketVolume.Fmt\n\t\t\tloc := s.SummaryProfile.City\n\t\t\tstock = Stock{Name: \"Apple\", Symbol: \"AAPL\", Price: price, Capacity: cap, Location: loc}\n\t\t}\n\n\t\tjson.NewEncoder(w).Encode(stock)\n\n\t}\n\n}" ]
[ "0.5685055", "0.53256553", "0.52415866", "0.5178177", "0.5007872", "0.50005347", "0.4938313", "0.49331212", "0.49284822", "0.48844498", "0.48610875", "0.48363313", "0.48068082", "0.47741792", "0.4745012", "0.47428113", "0.47039258", "0.47032028", "0.4688403", "0.46870822", "0.46839726", "0.46780565", "0.46537253", "0.46217844", "0.4615011", "0.46092936", "0.45792684", "0.45491627", "0.45489094", "0.45440534", "0.45337918", "0.45092484", "0.44899392", "0.44703814", "0.44650573", "0.4440611", "0.44090936", "0.44045705", "0.43911055", "0.43817726", "0.43811494", "0.4374666", "0.43568352", "0.43527183", "0.4341492", "0.43277535", "0.43090513", "0.43050703", "0.43026832", "0.42992723", "0.42925793", "0.4289501", "0.42805567", "0.42793375", "0.4279222", "0.4276291", "0.42653087", "0.42618093", "0.42588267", "0.42546606", "0.4240718", "0.42299476", "0.422632", "0.42216986", "0.4211392", "0.42104125", "0.42089638", "0.42035097", "0.42019477", "0.41985193", "0.41869977", "0.4186107", "0.41823548", "0.41808206", "0.41805062", "0.41788545", "0.41778925", "0.41737223", "0.4165617", "0.41522744", "0.41509855", "0.4132842", "0.4132548", "0.41316277", "0.4131377", "0.41312557", "0.4129815", "0.41249487", "0.41161358", "0.41134542", "0.4105835", "0.40989342", "0.40943885", "0.4090894", "0.40896386", "0.40723604", "0.40710106", "0.40614328", "0.40554965", "0.4054527" ]
0.7189199
0
NewVoiceHistoryExportGetBadRequest creates a VoiceHistoryExportGetBadRequest with default headers values
func NewVoiceHistoryExportGetBadRequest() *VoiceHistoryExportGetBadRequest { return &VoiceHistoryExportGetBadRequest{} }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewVoiceHistoryExportGetNotFound() *VoiceHistoryExportGetNotFound {\n\treturn &VoiceHistoryExportGetNotFound{}\n}", "func NewVoiceHistoryExportGetUnauthorized() *VoiceHistoryExportGetUnauthorized {\n\treturn &VoiceHistoryExportGetUnauthorized{}\n}", "func NewVoiceHistoryExportGetDefault(code int) *VoiceHistoryExportGetDefault {\n\treturn &VoiceHistoryExportGetDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewDescribeAlarmHistoryRequestWithoutParam() *DescribeAlarmHistoryRequest {\n\n return &DescribeAlarmHistoryRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/regions/{regionId}/describeAlarmHistory\",\n Method: \"GET\",\n Header: nil,\n Version: \"v2\",\n },\n }\n}", "func NewVoiceHistoryExportGetForbidden() *VoiceHistoryExportGetForbidden {\n\treturn &VoiceHistoryExportGetForbidden{}\n}", "func (client *RecommendationsClient) listHistoryForHostingEnvironmentCreateRequest(ctx context.Context, resourceGroupName string, hostingEnvironmentName string, options *RecommendationsClientListHistoryForHostingEnvironmentOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/hostingEnvironments/{hostingEnvironmentName}/recommendationHistory\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif hostingEnvironmentName == \"\" {\n\t\treturn nil, errors.New(\"parameter hostingEnvironmentName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{hostingEnvironmentName}\", url.PathEscape(hostingEnvironmentName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.ExpiredOnly != nil {\n\t\treqQP.Set(\"expiredOnly\", strconv.FormatBool(*options.ExpiredOnly))\n\t}\n\treqQP.Set(\"api-version\", \"2021-03-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tunencodedParams := []string{req.Raw().URL.RawQuery}\n\tif options != nil && options.Filter != nil {\n\t\tunencodedParams = append(unencodedParams, \"$filter=\"+*options.Filter)\n\t}\n\treq.Raw().URL.RawQuery = strings.Join(unencodedParams, \"&\")\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *RecommendationsClient) listHistoryForHostingEnvironmentCreateRequest(ctx context.Context, resourceGroupName string, hostingEnvironmentName string, options *RecommendationsListHistoryForHostingEnvironmentOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/hostingEnvironments/{hostingEnvironmentName}/recommendationHistory\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif hostingEnvironmentName == \"\" {\n\t\treturn nil, errors.New(\"parameter hostingEnvironmentName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{hostingEnvironmentName}\", url.PathEscape(hostingEnvironmentName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.ExpiredOnly != nil {\n\t\treqQP.Set(\"expiredOnly\", strconv.FormatBool(*options.ExpiredOnly))\n\t}\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tunencodedParams := []string{req.Raw().URL.RawQuery}\n\tif options != nil && options.Filter != nil {\n\t\tunencodedParams = append(unencodedParams, \"$filter=\"+*options.Filter)\n\t}\n\treq.Raw().URL.RawQuery = strings.Join(unencodedParams, \"&\")\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewGetConnectionStatusHistoryBadRequest() *GetConnectionStatusHistoryBadRequest {\n\treturn &GetConnectionStatusHistoryBadRequest{}\n}", "func (client MultipleResponsesClient) Get202None204NoneDefaultNone400InvalidSender(req *http.Request) (*http.Response, error) {\n return autorest.SendWithSender(client, req)\n}", "func NewGetStockBadRequest() *GetStockBadRequest {\n\treturn &GetStockBadRequest{}\n}", "func HS400(w http.ResponseWriter) {\n\tw.Header().Set(\"Content-Type\", \"text/plain\")\n\tw.Header().Set(\"X-Content-Type-Options\", \"nosniff\")\n\tw.Header().Set(\"Cache-Control\", \"no-cache,no-store\")\n\tw.WriteHeader(http.StatusBadRequest)\n\tw.Write([]byte(\"400 Bad Request\"))\n}", "func NewVoiceHistoryExportGetTooManyRequests() *VoiceHistoryExportGetTooManyRequests {\n\treturn &VoiceHistoryExportGetTooManyRequests{}\n}", "func NewVoiceHistoryExportGetOK() *VoiceHistoryExportGetOK {\n\treturn &VoiceHistoryExportGetOK{}\n}", "func (client MultipleResponsesClient) Get202None204NoneDefaultNone400InvalidResponder(resp *http.Response) (result autorest.Response, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK,http.StatusAccepted,http.StatusNoContent),\n autorest.ByClosing())\n result.Response = resp\n return\n}", "func NewGetRecentFoodsBadRequest() *GetRecentFoodsBadRequest {\n\treturn &GetRecentFoodsBadRequest{}\n}", "func HS400t(w http.ResponseWriter, errmsg string) {\n\tw.Header().Set(\"Content-Type\", \"text/plain\")\n\tw.Header().Set(\"X-Content-Type-Options\", \"nosniff\")\n\tw.Header().Set(\"Cache-Control\", \"no-cache,no-store\")\n\tw.WriteHeader(http.StatusBadRequest)\n\tw.Write([]byte(\"400 Bad Request: \" + errmsg))\n}", "func (client *LROSADsClient) post202RetryInvalidHeaderCreateRequest(ctx context.Context, options *LROSADsClientBeginPost202RetryInvalidHeaderOptions) (*policy.Request, error) {\n\turlPath := \"/lro/error/post/202/retry/invalidheader\"\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\tif options != nil && options.Product != nil {\n\t\tif err := runtime.MarshalAsJSON(req, *options.Product); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn req, nil\n\t}\n\treturn req, nil\n}", "func (client MultipleResponsesClient) Get202None204NoneDefaultNone400InvalidPreparer() (*http.Request, error) {\n preparer := autorest.CreatePreparer(\n autorest.AsGet(),\n autorest.WithBaseURL(client.BaseURI),\n autorest.WithPath(\"/http/payloads/202/none/204/none/default/none/response/400/invalid\"))\n return preparer.Prepare(&http.Request{})\n}", "func (client MultipleResponsesClient) Get202None204NoneDefaultNone202InvalidPreparer() (*http.Request, error) {\n preparer := autorest.CreatePreparer(\n autorest.AsGet(),\n autorest.WithBaseURL(client.BaseURI),\n autorest.WithPath(\"/http/payloads/202/none/204/none/default/none/response/202/invalid\"))\n return preparer.Prepare(&http.Request{})\n}", "func invalid_request(w http.ResponseWriter, statCode int, message string){\n w.Header().Set(\"Content-Type\", \"application/json\")\n switch statCode {\n case 400: w.WriteHeader(http.StatusBadRequest)\n case 403: w.WriteHeader(http.StatusForbidden)\n case 404: w.WriteHeader(http.StatusNotFound)\n default: w.WriteHeader(http.StatusNotFound)\n }\n err := Error {\n StatusCode: statCode,\n ErrorMessage: message}\n json.NewEncoder(w).Encode(err)\n}", "func (client MultipleResponsesClient) GetDefaultNone400InvalidResponder(resp *http.Response) (result autorest.Response, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK),\n autorest.ByClosing())\n result.Response = resp\n return\n}", "func (client MultipleResponsesClient) Get202None204NoneDefaultNone202InvalidSender(req *http.Request) (*http.Response, error) {\n return autorest.SendWithSender(client, req)\n}", "func ListGuestbookBadRequest(t goatest.TInterface, ctx context.Context, service *goa.Service, ctrl app.GuestbookController) (http.ResponseWriter, *app.GuestbookError) {\n\t// Setup service\n\tvar (\n\t\tlogBuf bytes.Buffer\n\t\tresp interface{}\n\n\t\trespSetter goatest.ResponseSetterFunc = func(r interface{}) { resp = r }\n\t)\n\tif service == nil {\n\t\tservice = goatest.Service(&logBuf, respSetter)\n\t} else {\n\t\tlogger := log.New(&logBuf, \"\", log.Ltime)\n\t\tservice.WithLogger(goa.NewLogger(logger))\n\t\tnewEncoder := func(io.Writer) goa.Encoder { return respSetter }\n\t\tservice.Encoder = goa.NewHTTPEncoder() // Make sure the code ends up using this decoder\n\t\tservice.Encoder.Register(newEncoder, \"*/*\")\n\t}\n\n\t// Setup request context\n\trw := httptest.NewRecorder()\n\tu := &url.URL{\n\t\tPath: fmt.Sprintf(\"/guestbook/\"),\n\t}\n\treq, err := http.NewRequest(\"GET\", u.String(), nil)\n\tif err != nil {\n\t\tpanic(\"invalid test \" + err.Error()) // bug\n\t}\n\tprms := url.Values{}\n\tif ctx == nil {\n\t\tctx = context.Background()\n\t}\n\tgoaCtx := goa.NewContext(goa.WithAction(ctx, \"GuestbookTest\"), rw, req, prms)\n\tlistCtx, _err := app.NewListGuestbookContext(goaCtx, req, service)\n\tif _err != nil {\n\t\te, ok := _err.(goa.ServiceError)\n\t\tif !ok {\n\t\t\tpanic(\"invalid test data \" + _err.Error()) // bug\n\t\t}\n\t\tt.Errorf(\"unexpected parameter validation error: %+v\", e)\n\t\treturn nil, nil\n\t}\n\n\t// Perform action\n\t_err = ctrl.List(listCtx)\n\n\t// Validate response\n\tif _err != nil {\n\t\tt.Fatalf(\"controller returned %+v, logs:\\n%s\", _err, logBuf.String())\n\t}\n\tif rw.Code != 400 {\n\t\tt.Errorf(\"invalid response status code: got %+v, expected 400\", rw.Code)\n\t}\n\tvar mt *app.GuestbookError\n\tif resp != nil {\n\t\tvar _ok bool\n\t\tmt, _ok = resp.(*app.GuestbookError)\n\t\tif !_ok {\n\t\t\tt.Fatalf(\"invalid response media: got variable of type %T, value %+v, expected instance of app.GuestbookError\", resp, resp)\n\t\t}\n\t\t_err = mt.Validate()\n\t\tif _err != nil {\n\t\t\tt.Errorf(\"invalid response media type: %s\", _err)\n\t\t}\n\t}\n\n\t// Return results\n\treturn rw, mt\n}", "func validateGetTestResultHistoryRequest(in *pb.GetTestResultHistoryRequest) error {\n\tif in.GetRealm() == \"\" {\n\t\treturn errors.Reason(\"realm is required\").Err()\n\t}\n\tif err := realms.ValidateRealmName(in.Realm, realms.GlobalScope); err != nil {\n\t\treturn errors.Annotate(err, \"realm\").Err()\n\t}\n\t// TODO(crbug.com/1107680): Add support for commit position ranges.\n\ttr := in.GetTimeRange()\n\tif tr == nil {\n\t\treturn errors.Reason(\"time_range must be specified\").Err()\n\t}\n\tif in.GetPageSize() < 0 {\n\t\treturn errors.Reason(\"page_size, if specified, must be a positive integer\").Err()\n\t}\n\tif in.GetVariantPredicate() != nil {\n\t\tif err := pbutil.ValidateVariantPredicate(in.GetVariantPredicate()); err != nil {\n\t\t\treturn errors.Annotate(err, \"variant_predicate\").Err()\n\t\t}\n\t}\n\tif in.GetPageToken() != \"\" {\n\t\tif err := history.ValidatePageToken(in.GetPageToken()); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func badRequest(resp *ApiResponse, msg string) error {\n resp.StatusCode = http.StatusBadRequest\n resp.Message = []byte(msg)\n resp.ErrorMessage = msg\n\n return nil\n}", "func (client *LROSADsClient) delete202RetryInvalidHeaderCreateRequest(ctx context.Context, options *LROSADsClientBeginDelete202RetryInvalidHeaderOptions) (*policy.Request, error) {\n\turlPath := \"/lro/error/delete/202/retry/invalidheader\"\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewGetEchoNameBadRequest() *GetEchoNameBadRequest {\n\n\treturn &GetEchoNameBadRequest{}\n}", "func NewGetDetailBadRequest() *GetDetailBadRequest {\n\treturn &GetDetailBadRequest{}\n}", "func (client MultipleResponsesClient) GetDefaultNone400InvalidSender(req *http.Request) (*http.Response, error) {\n return autorest.SendWithSender(client, req)\n}", "func NewGetProfileVersionsBadRequest() *GetProfileVersionsBadRequest {\n\treturn &GetProfileVersionsBadRequest{}\n}", "func (ctx *CreateOutputContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func (ctx *CreateMessageContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func (ctx *CreateHostContext) BadRequest() error {\n\tctx.ResponseData.WriteHeader(400)\n\treturn nil\n}", "func BadRequest(w http.ResponseWriter, r *http.Request, h *render.Renderer) {\n\taccept := strings.Split(r.Header.Get(\"Accept\"), \",\")\n\taccept = append(accept, strings.Split(r.Header.Get(\"Content-Type\"), \",\")...)\n\n\tswitch {\n\tcase prefixInList(accept, ContentTypeHTML):\n\t\th.RenderHTMLStatus(w, http.StatusBadRequest, \"400\", nil)\n\tcase prefixInList(accept, ContentTypeJSON):\n\t\th.RenderJSON(w, http.StatusBadRequest, apiErrorBadRequest)\n\tdefault:\n\t\thttp.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n\t}\n}", "func NewRestException (\n status int, code, message, developerMessage string, extraInfo *url.URL,\n) RestException {\n if 400 > status || 499 < status || \"\" == message {\n return nil\n }\n\n return &_RestException {\n status: status,\n code: code,\n message: message,\n developerMessage: developerMessage,\n extraInfo: extraInfo,\n }\n}", "func ListQuizzesBadRequest(t goatest.TInterface, ctx context.Context, service *goa.Service, ctrl app.QuizzesController) (http.ResponseWriter, *app.StandardError) {\n\t// Setup service\n\tvar (\n\t\tlogBuf bytes.Buffer\n\t\tresp interface{}\n\n\t\trespSetter goatest.ResponseSetterFunc = func(r interface{}) { resp = r }\n\t)\n\tif service == nil {\n\t\tservice = goatest.Service(&logBuf, respSetter)\n\t} else {\n\t\tlogger := log.New(&logBuf, \"\", log.Ltime)\n\t\tservice.WithLogger(goa.NewLogger(logger))\n\t\tnewEncoder := func(io.Writer) goa.Encoder { return respSetter }\n\t\tservice.Encoder = goa.NewHTTPEncoder() // Make sure the code ends up using this decoder\n\t\tservice.Encoder.Register(newEncoder, \"*/*\")\n\t}\n\n\t// Setup request context\n\trw := httptest.NewRecorder()\n\tu := &url.URL{\n\t\tPath: fmt.Sprintf(\"/v1/quizzes\"),\n\t}\n\treq, err := http.NewRequest(\"GET\", u.String(), nil)\n\tif err != nil {\n\t\tpanic(\"invalid test \" + err.Error()) // bug\n\t}\n\tprms := url.Values{}\n\tif ctx == nil {\n\t\tctx = context.Background()\n\t}\n\tgoaCtx := goa.NewContext(goa.WithAction(ctx, \"QuizzesTest\"), rw, req, prms)\n\tlistCtx, _err := app.NewListQuizzesContext(goaCtx, req, service)\n\tif _err != nil {\n\t\te, ok := _err.(goa.ServiceError)\n\t\tif !ok {\n\t\t\tpanic(\"invalid test data \" + _err.Error()) // bug\n\t\t}\n\t\tt.Errorf(\"unexpected parameter validation error: %+v\", e)\n\t\treturn nil, nil\n\t}\n\n\t// Perform action\n\t_err = ctrl.List(listCtx)\n\n\t// Validate response\n\tif _err != nil {\n\t\tt.Fatalf(\"controller returned %+v, logs:\\n%s\", _err, logBuf.String())\n\t}\n\tif rw.Code != 400 {\n\t\tt.Errorf(\"invalid response status code: got %+v, expected 400\", rw.Code)\n\t}\n\tvar mt *app.StandardError\n\tif resp != nil {\n\t\tvar _ok bool\n\t\tmt, _ok = resp.(*app.StandardError)\n\t\tif !_ok {\n\t\t\tt.Fatalf(\"invalid response media: got variable of type %T, value %+v, expected instance of app.StandardError\", resp, resp)\n\t\t}\n\t\t_err = mt.Validate()\n\t\tif _err != nil {\n\t\t\tt.Errorf(\"invalid response media type: %s\", _err)\n\t\t}\n\t}\n\n\t// Return results\n\treturn rw, mt\n}", "func (ctx *PubPshbContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func (e HttpHeadersValidationError) Reason() string { return e.reason }", "func (ctx *ListMessageContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func NewVoiceHistoryExportGetMethodNotAllowed() *VoiceHistoryExportGetMethodNotAllowed {\n\treturn &VoiceHistoryExportGetMethodNotAllowed{}\n}", "func (ctx *GetOutputContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func HeaderFieldsTooLarge(message ...interface{}) Err {\n\treturn Boomify(http.StatusRequestHeaderFieldsTooLarge, message...)\n}", "func TestInvalidParameter_missingParameter(t *testing.T) {\n\trouter := SetupRouter()\n\n\tw := performRequest(router, \"GET\", \"/v1/fizzbuzz?string1=Fizz&string2=Buzz&int1=3&int2=5\")\n\tassert.Equal(t, http.StatusBadRequest, w.Code)\n\n\tvar response FizzbuzzResponse\n\terr := json.Unmarshal([]byte(w.Body.String()), &response)\n\tassert.Nil(t, err)\n\n\tassert.Equal(t, 400, response.Status)\n}", "func NewGetTournamentBadRequest() *GetTournamentBadRequest {\n\n\treturn &GetTournamentBadRequest{}\n}", "func (ctx *SubPshbContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func (ctx *CreateFilterContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func CreateBadRequestResponse(w http.ResponseWriter, err error) {\n\tw.WriteHeader(http.StatusBadRequest)\n\tbytes, _ := json.Marshal(err.Error())\n\tw.Write(bytes)\n}", "func (ctx *CreateOfferContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func (client MultipleResponsesClient) Get202None204NoneDefaultNone202InvalidResponder(resp *http.Response) (result autorest.Response, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK,http.StatusAccepted,http.StatusNoContent),\n autorest.ByClosing())\n result.Response = resp\n return\n}", "func (ctx *CreateFeedContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func (e CreateMovableObjectResponseValidationError) Reason() string { return e.reason }", "func (e HeadersResponseValidationError) Reason() string { return e.reason }", "func (ctx *GetFilterContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func (ctx *DeleteOutputContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func (o *GetNFTContractTokenBadRequest) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(400)\n}", "func (ctx *CreateVerificationContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func (o *SearchTournamentsBadRequest) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(400)\n}", "func (ctx *AcceptOfferContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func NewBadRequest(err error, msg ...string) *Errs {\n\tif err == nil {\n\t\terr = ErrBadRequest\n\t}\n\n\treturn &Errs{\n\t\tcodeHTTP: http.StatusBadRequest,\n\t\terr: err,\n\t\tkind: trace(2),\n\t\tmessage: msg,\n\t}\n}", "func NewGetAPIV1GamesBadRequest() *GetAPIV1GamesBadRequest {\n\n\treturn &GetAPIV1GamesBadRequest{}\n}", "func (ctx *CreateItemContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func (r *Response) BadRequest(v interface{}) {\n\tr.writeResponse(http.StatusBadRequest, v)\n}", "func (ctx *ListOfferContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func (ctx *RegisterAuthenticationContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func (ctx *GetFeedContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func (e GetMovableObjectResponseValidationError) Reason() string { return e.reason }", "func NewStocksGetBadRequest() *StocksGetBadRequest {\n\treturn &StocksGetBadRequest{}\n}", "func InvalidArgument(msg string, fields []FieldError) error {\n\treturn APIError{\n\t\tcode: http.StatusBadRequest,\n\t\tMessage: msg,\n\t\tFields: fields,\n\t}\n}", "func NewGetInteractionsBadRequest() *GetInteractionsBadRequest {\n\n\treturn &GetInteractionsBadRequest{}\n}", "func (ctx *ListFeedContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func TestGetSlidesDocumentWithFormatInvalidformat(t *testing.T) {\n request := createGetSlidesDocumentWithFormatRequest()\n request.format = invalidizeTestParamValue(request.format, \"format\", \"string\").(string)\n e := initializeTest(\"GetSlidesDocumentWithFormat\", \"format\", request.format)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := getTestApiClient().DocumentApi.GetSlidesDocumentWithFormat(request)\n assertError(t, \"GetSlidesDocumentWithFormat\", \"format\", int32(r.StatusCode), e)\n}", "func RespondBadRequest(err error) events.APIGatewayProxyResponse {\n\treturn Respond(http.StatusBadRequest, Error{Error: err.Error()})\n}", "func BadRequest(w ResponseWriter, r *Request) {\n\tw.SetHeader(CodeBadRequest, \"bad request\")\n}", "func NewGetHostGroupsBadRequest() *GetHostGroupsBadRequest {\n\treturn &GetHostGroupsBadRequest{}\n}", "func NewGetBicsBadRequest() *GetBicsBadRequest {\n\treturn &GetBicsBadRequest{}\n}", "func (o *GetProfileVersionsBadRequest) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(400)\n}", "func NewGetVulnerabilitiesAdditionBadRequest() *GetVulnerabilitiesAdditionBadRequest {\n\treturn &GetVulnerabilitiesAdditionBadRequest{}\n}", "func NewInsuranceGetBadRequest() *InsuranceGetBadRequest {\n\treturn &InsuranceGetBadRequest{}\n}", "func (ctx *GetOpmlContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func NewCopyCurrentStateForProjectVersionBadRequest() *CopyCurrentStateForProjectVersionBadRequest {\n\treturn &CopyCurrentStateForProjectVersionBadRequest{}\n}", "func bytesAPIFn_ReqInvalid(\n\tme interface{}, hd me_packet.Header, rbody []byte) (\n\tme_packet.Header, interface{}, error) {\n\t// robj, err := me_json.UnmarshalPacket(hd, rbody)\n\t// if err != nil {\n\t// \treturn hd, nil, fmt.Errorf(\"Packet type miss match %v\", rbody)\n\t// }\n\t// recvBody, ok := robj.(*me_obj.ReqInvalid_data)\n\t// if !ok {\n\t// \treturn hd, nil, fmt.Errorf(\"Packet type miss match %v\", robj)\n\t// }\n\t// _ = recvBody\n\n\tsendHeader := me_packet.Header{\n\t\tErrorCode: me_error.None,\n\t}\n\tsendBody := &me_obj.RspInvalid_data{}\n\treturn sendHeader, sendBody, nil\n}", "func (client MultipleResponsesClient) GetDefaultNone400InvalidPreparer() (*http.Request, error) {\n preparer := autorest.CreatePreparer(\n autorest.AsGet(),\n autorest.WithBaseURL(client.BaseURI),\n autorest.WithPath(\"/http/payloads/default/none/response/400/invalid\"))\n return preparer.Prepare(&http.Request{})\n}", "func (ctx *GetByIDHostContext) BadRequest() error {\n\tctx.ResponseData.WriteHeader(400)\n\treturn nil\n}", "func (ctx *ShowProfileContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func ErrHTTPVersionNotSupportedf(format string, arguments ...interface{}) *Status {\n\treturn &Status{Code: http.StatusHTTPVersionNotSupported, Text: fmt.Sprintf(format, arguments...)}\n}", "func ErrRequestHeaderFieldsTooLargef(format string, arguments ...interface{}) *Status {\n\treturn &Status{Code: http.StatusRequestHeaderFieldsTooLarge, Text: fmt.Sprintf(format, arguments...)}\n}", "func ERROR_TRX_NOT_SET(w http.ResponseWriter) {\n\tbuildForeignError(w, http.StatusBadRequest, \"ERROR_TRX_NOT_SET\", \"\")\n}", "func NewImportVersionedFlowBadRequest() *ImportVersionedFlowBadRequest {\n\treturn &ImportVersionedFlowBadRequest{}\n}", "func notFound(resp *ApiResponse, msg string) error {\n resp.StatusCode = http.StatusNotFound\n resp.Message = []byte(msg)\n resp.ErrorMessage = http.StatusText(http.StatusNotFound)\n\n return nil\n}", "func BadRequest(format string, args ...interface{}) error {\n\treturn New(http.StatusBadRequest, format, args...)\n}", "func NewGetWhaleTranfersBadRequest() *GetWhaleTranfersBadRequest {\n\n\treturn &GetWhaleTranfersBadRequest{}\n}", "func TestInvalidParameter_withGoodType(t *testing.T) {\n\trouter := SetupRouter()\n\n\tw := performRequest(router, \"GET\", \"/v1/fizzbuzz?string1=Fizz&string2=Buzz&int1=3&int2=5&limit=-15\")\n\tassert.Equal(t, http.StatusBadRequest, w.Code)\n\n\tvar response FizzbuzzResponse\n\terr := json.Unmarshal([]byte(w.Body.String()), &response)\n\tassert.Nil(t, err)\n\n\tassert.Equal(t, 400, response.Status)\n}", "func newErrorResp(key, msg string, err error) *ResponseType {\n\treturn &ResponseType{Ok: false, Message: msg, Error: err.Error(), Key: key}\n}", "func (r *Responder) RequestHeaderFieldsTooLarge() { r.write(http.StatusRequestHeaderFieldsTooLarge) }", "func (ctx *StartFeedContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func (ctx *CreateProfileContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func (o *GetVMVolumeBadRequest) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(400)\n}", "func DefaultOnErrorResponse(_ ErrorResponseReason, _ error) {\n\treturn\n}", "func (c ApiWrapper) BadRequest(msg string, objs ...interface{}) revel.Result {\n\treturn c.renderErrorString(400, fmt.Sprintf(msg, objs))\n}", "func RenderBadRequest(w http.ResponseWriter) {\n\tw.WriteHeader(http.StatusBadRequest)\n\treturn\n}" ]
[ "0.5389364", "0.5369098", "0.52357423", "0.5170997", "0.5162142", "0.5121058", "0.50704986", "0.5065044", "0.50538963", "0.4994252", "0.4950436", "0.49491405", "0.48964727", "0.4870676", "0.48636582", "0.48497292", "0.48413137", "0.4830948", "0.47481397", "0.47478327", "0.47473475", "0.46937114", "0.4680938", "0.46808276", "0.46670744", "0.4662466", "0.4661791", "0.46476173", "0.46375176", "0.46248195", "0.46240848", "0.46109274", "0.45850536", "0.45575488", "0.45573407", "0.45534855", "0.45510828", "0.4546193", "0.45380425", "0.45364586", "0.45236447", "0.4517548", "0.44958323", "0.44926476", "0.44921592", "0.44898033", "0.44830686", "0.44735116", "0.4472772", "0.44721845", "0.44643915", "0.44573042", "0.44571117", "0.44535083", "0.44421142", "0.44382998", "0.44364986", "0.4435837", "0.44289264", "0.44259357", "0.44256964", "0.44198665", "0.44179726", "0.44175407", "0.44168285", "0.4412551", "0.44056594", "0.44053918", "0.43989563", "0.439159", "0.43828434", "0.4381222", "0.43808866", "0.43807286", "0.43783894", "0.43751046", "0.43720725", "0.4370142", "0.43685213", "0.4367103", "0.4364184", "0.4360359", "0.43596822", "0.4358951", "0.43527576", "0.43428138", "0.43410316", "0.43408394", "0.4340399", "0.4338969", "0.43384403", "0.4330156", "0.43256876", "0.43254396", "0.43237096", "0.43216485", "0.4320546", "0.4320316", "0.431503", "0.43113607" ]
0.7107703
0
NewVoiceHistoryExportGetUnauthorized creates a VoiceHistoryExportGetUnauthorized with default headers values
func NewVoiceHistoryExportGetUnauthorized() *VoiceHistoryExportGetUnauthorized { return &VoiceHistoryExportGetUnauthorized{} }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewVoiceHistoryExportGetForbidden() *VoiceHistoryExportGetForbidden {\n\treturn &VoiceHistoryExportGetForbidden{}\n}", "func unauthorized(resp *ApiResponse, msg string) error {\n resp.StatusCode = http.StatusUnauthorized\n resp.Message = []byte(msg)\n resp.ErrorMessage = msg\n\n return nil\n}", "func Unauthorized(w http.ResponseWriter, r *http.Request, h *render.Renderer) {\n\taccept := strings.Split(r.Header.Get(\"Accept\"), \",\")\n\taccept = append(accept, strings.Split(r.Header.Get(\"Content-Type\"), \",\")...)\n\n\tswitch {\n\tcase prefixInList(accept, ContentTypeHTML):\n\t\tm := TemplateMapFromContext(r.Context())\n\t\tm.Title(http.StatusText(http.StatusUnauthorized))\n\t\th.RenderHTMLStatus(w, http.StatusUnauthorized, \"401\", m)\n\tcase prefixInList(accept, ContentTypeJSON):\n\t\th.RenderJSON(w, http.StatusUnauthorized, apiErrorUnauthorized)\n\tdefault:\n\t\thttp.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)\n\t}\n}", "func NewGetUserBanHistoryUnauthorized() *GetUserBanHistoryUnauthorized {\n\treturn &GetUserBanHistoryUnauthorized{}\n}", "func Unauthorized(data Serializer, logging ...interface{}) Response {\n\tif data == nil {\n\t\tdata = String(\"401 Unauthorized\")\n\t}\n\treturn Response{\n\t\tStatus: http.StatusUnauthorized,\n\t\tData: data,\n\t\tLogging: logging,\n\t}\n}", "func (c ApiWrapper) Unauthorized(msg string, objs ...interface{}) revel.Result {\n\treturn c.renderErrorString(401, fmt.Sprintf(msg, objs))\n}", "func (r *Responder) Unauthorized() { r.write(http.StatusUnauthorized) }", "func NewGetConnectionStatusHistoryUnauthorized() *GetConnectionStatusHistoryUnauthorized {\n\treturn &GetConnectionStatusHistoryUnauthorized{}\n}", "func unauthorized(out http.ResponseWriter) {\n\tout.WriteHeader(http.StatusUnauthorized)\n}", "func NewUnauthorized(cause error) Unauthorized { return Unauthorized(cause.Error()) }", "func DeriveResponseHeader(tokenRegistry TokenRegistry, model Model) (*documentpb.ResponseHeader, error) {\n\tcs, err := model.GetCollaborators()\n\tif err != nil {\n\t\treturn nil, errors.NewTypedError(ErrCollaborators, err)\n\t}\n\n\t// we ignore error here because it can happen when a model is first created but its not anchored yet\n\ta, _ := model.Author()\n\tauthor := a.String()\n\n\t// we ignore error here because it can happen when a model is first created but its not anchored yet\n\ttime := \"\"\n\tt, err := model.Timestamp()\n\tif err == nil {\n\t\ttime = t.UTC().String()\n\t}\n\n\tnfts := model.NFTs()\n\tcnfts, err := convertNFTs(tokenRegistry, nfts)\n\tif err != nil {\n\t\t// this could be a temporary failure, so we ignore but warn about the error\n\t\tlog.Warningf(\"errors encountered when trying to set nfts to the response: %v\", errors.NewTypedError(ErrNftNotFound, err))\n\t}\n\n\trcs, wcs := ToClientCollaboratorAccess(cs)\n\treturn &documentpb.ResponseHeader{\n\t\tDocumentId: hexutil.Encode(model.ID()),\n\t\tVersion: hexutil.Encode(model.CurrentVersion()),\n\t\tAuthor: author,\n\t\tCreatedAt: time,\n\t\tReadAccess: rcs,\n\t\tWriteAccess: wcs,\n\t\tNfts: cnfts,\n\t}, nil\n}", "func (r *Response) Unauthorized(v interface{}) {\n\tr.writeResponse(http.StatusUnauthorized, v)\n}", "func unauthorized(ctx *goa.Context, spec *Specification) error {\n\tctx.Header().Set(\"WWW-Authenticate\", fmt.Sprintf(\"Basic realm=%q\", spec.Realm))\n\t// return ctx.Respond(http.StatusUnauthorized, http.StatusText(http.StatusUnauthorized))\n\treturn ctx.Respond(http.StatusUnauthorized, map[string]interface{}{\"ID\": -1, \"Title\": \"Unauthorized\", \"Msg\": \"Unauthorized Request\"})\n}", "func (r Response) Unauthorized(code string, payload Payload, header ...ResponseHeader) {\n\tr.Response(code, http.Unauthorized, payload, header...)\n}", "func Unauthorized(format string, args ...interface{}) error {\n\targs = append(args, withDefaultMessage(UnauthorizedDefaultMsg))\n\treturn Errorf(http.StatusUnauthorized, format, args...)\n}", "func responseWithUnauthorized(w http.ResponseWriter, v ...interface{}) {\n\tvar errTxt string\n\tif len(v) > 0 {\n\t\terrTxt = fmt.Sprintf(\"%v\", v[0])\n\t} else {\n\t\terrTxt = http.StatusText(http.StatusUnauthorized)\n\t}\n\tresponseWithJSON(w, http.StatusUnauthorized,\n\t\tmap[string]string{\"error\": errTxt})\n}", "func Unauthorized(message string, errors []Error) {\n\tresponse := Response{\n\t\tStatus: http.StatusUnauthorized,\n\t\tMessage: message,\n\t\tData: nil,\n\t\tErrors: errors,\n\t}\n\tpanic(response)\n}", "func NewGetRecentFoodsUnauthorized() *GetRecentFoodsUnauthorized {\n\treturn &GetRecentFoodsUnauthorized{}\n}", "func NewVoiceHistoryExportGetOK() *VoiceHistoryExportGetOK {\n\treturn &VoiceHistoryExportGetOK{}\n}", "func ExampleMakeProxyAuthorizationHeaderValue_nothing() {\n\tu := &url.URL{\n\t\tScheme: \"http\",\n\t\tHost: \"127.0.0.1:3128\",\n\t}\n\n\tfmt.Println(u)\n\tfmt.Println(MakeProxyAuthorizationHeaderValue(u))\n\t// Output:\n\t// http://127.0.0.1:3128\n\t// []\n}", "func NewVoiceHistoryExportGetDefault(code int) *VoiceHistoryExportGetDefault {\n\treturn &VoiceHistoryExportGetDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewUnauthorized(err error, msg ...string) *Errs {\n\tif err == nil {\n\t\terr = ErrUnauthorized\n\t}\n\treturn &Errs{\n\t\tcodeHTTP: http.StatusUnauthorized,\n\t\terr: err,\n\t\tkind: trace(2),\n\t\tmessage: msg,\n\t}\n}", "func Unauthorized(message ...interface{}) Err {\n\treturn Boomify(http.StatusUnauthorized, message...)\n}", "func (h *Handler) Unauthorized(w http.ResponseWriter, r *http.Request) {\n\twriteResponse(r, w, http.StatusUnauthorized, &SimpleResponse{\n\t\tTraceID: tracing.FromContext(r.Context()),\n\t\tMessage: \"unauthorized\",\n\t})\n}", "func Unauthorized(w http.ResponseWriter) {\n\thttp.Error(w, \"Unauthorized\", http.StatusUnauthorized)\n}", "func (this *Context) Unauthorized() {\n\tthis.ResponseWriter.WriteHeader(401)\n}", "func NewUnauthorized(res calcsvc.Unauthorized) Unauthorized {\n\tbody := Unauthorized(res)\n\treturn body\n}", "func authentication(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(req http.ResponseWriter, res *http.Request) {\n\t\txdate := res.Header.Get(\"xdate\")\n\t\tif len(xdate) == 0 {\n\t\t\tlog.Println(\"Unauthorized Request\")\n\t\t\treq.WriteHeader(http.StatusUnauthorized)\n\t\t\treq.Write([]byte(\"Unauthorized\"))\n\t\t} else {\n\t\t\tnext.ServeHTTP(req, res)\n\t\t}\n\t})\n}", "func NewVoiceHistoryExportGetNotFound() *VoiceHistoryExportGetNotFound {\n\treturn &VoiceHistoryExportGetNotFound{}\n}", "func Unauthorized(msg string) error {\n\tif msg == \"\" {\n\t\tmsg = \"no está autenticado para realizar la acción solicitada.\"\n\t}\n\treturn echo.NewHTTPError(http.StatusUnauthorized, msg)\n}", "func Unauthorized(w http.ResponseWriter, err error) {\n\tError(w, http.StatusUnauthorized, err)\n}", "func unauthorized(rw http.ResponseWriter, r *http.Request) {\n\n}", "func NewGetModelUnauthorized() *GetModelUnauthorized {\n\treturn &GetModelUnauthorized{}\n}", "func Unauthorized(msg string) ErrorResponse {\n\tif msg == \"\" {\n\t\tmsg = \"You are not authenticated to perform the requested action.\"\n\t}\n\treturn ErrorResponse{\n\t\tStatus: http.StatusUnauthorized,\n\t\tMessage: msg,\n\t}\n}", "func NewUnauthorized(err error, msg string) error {\n\treturn &unauthorized{wrap(err, msg, \"\")}\n}", "func defaultUnauthorizedHandler(w http.ResponseWriter, r *http.Request) {\n\thttp.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)\n}", "func NewGetWhoamiUnauthorized() *GetWhoamiUnauthorized {\n\n\treturn &GetWhoamiUnauthorized{}\n}", "func (e Unauthorized) Code() int { return http.StatusUnauthorized }", "func NewGetEntriesUnauthorized() *GetEntriesUnauthorized {\n\treturn &GetEntriesUnauthorized{}\n}", "func (ctx *PlayLocationsContext) Unauthorized(r *Error) error {\n\tctx.ResponseData.Header().Set(\"Content-Type\", \"error\")\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "func NewGetCoreAPIVersionsUnauthorized() *GetCoreAPIVersionsUnauthorized {\n\n\treturn &GetCoreAPIVersionsUnauthorized{}\n}", "func NewVoiceHistoryExportGetBadRequest() *VoiceHistoryExportGetBadRequest {\n\treturn &VoiceHistoryExportGetBadRequest{}\n}", "func Unathorized(w http.ResponseWriter, message ...interface{}) {\n\tboom(w, 401, message...)\n}", "func NewGetIntrospectionUnauthorized() *GetIntrospectionUnauthorized {\n\treturn &GetIntrospectionUnauthorized{}\n}", "func NewVoiceHistoryExportGetMethodNotAllowed() *VoiceHistoryExportGetMethodNotAllowed {\n\treturn &VoiceHistoryExportGetMethodNotAllowed{}\n}", "func (ctx *Context) Unauthorized() {\n\tctx.WriteError(http.StatusUnauthorized, \"Unauthorized\")\n}", "func NewDescribeAlarmHistoryRequestWithoutParam() *DescribeAlarmHistoryRequest {\n\n return &DescribeAlarmHistoryRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/regions/{regionId}/describeAlarmHistory\",\n Method: \"GET\",\n Header: nil,\n Version: \"v2\",\n },\n }\n}", "func NewGetUnauthorized(body *GetUnauthorizedResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "func TestHttpClient_Authorization(t *testing.T) {\n\n\tcfg := NewConfig(accessKeyID, accessKeySecret, host)\n\tc := New(cfg)\n\n\tparams := map[string]string{\n\t\t\"query\": `config=format:json,start:0,hit:20,rerank_size:200&&query=create_time:[1579449600000,1582127999000]&&filter=content_type=3 AND in(status,\"1|2\") AND create_time >=1579449600000 AND create_time<=1582127999000&&sort=-pv`,\n\t\t\"fetch_fields\": \"id;source_id;source_name\",\n\t}\n\n\tresp, err := c.Request(appName, params, map[string]string{})\n\tt.Log(err, resp)\n}", "func NewGetResourceActionsUsingGET1Unauthorized() *GetResourceActionsUsingGET1Unauthorized {\n\treturn &GetResourceActionsUsingGET1Unauthorized{}\n}", "func MustHaveAuthHeader(res http.ResponseWriter, arc services.AuxRequestContext, log *config.CustomLog) {\n\tif arc.Header.Get(\"Authorization\") == \"\" {\n\t\tservices.Res(res).Error(401, \"invalid_request\", \"missing authorization header field\")\n\t}\n}", "func (o *GetCoreAPIVersionsUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(401)\n}", "func (o *ListVsphereResourceUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(401)\n}", "func NewGetCardsUnauthorized() *GetCardsUnauthorized {\n\n\treturn &GetCardsUnauthorized{}\n}", "func NewListReportDefinitionUnauthorized() *ListReportDefinitionUnauthorized {\n\treturn &ListReportDefinitionUnauthorized{}\n}", "func NewWeaviateThingsGetUnauthorized() *WeaviateThingsGetUnauthorized {\n\treturn &WeaviateThingsGetUnauthorized{}\n}", "func (ctx *ListUserContext) Unauthorized(r error) error {\n\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "func noValidTokenTest(t *testing.T, r *http.Request, h http.Handler, auth *mock.Authenticator) {\n\toriginal := auth.AuthenticateFn\n\tauth.AuthenticateFn = authenticateGenerator(false, errors.New(\"An error\"))\n\tw := httptest.NewRecorder()\n\th.ServeHTTP(w, r)\n\ttest.Equals(t, http.StatusBadRequest, w.Result().StatusCode)\n\tauth.AuthenticateFn = authenticateGenerator(false, nil)\n\tw = httptest.NewRecorder()\n\th.ServeHTTP(w, r)\n\ttest.Equals(t, http.StatusUnauthorized, w.Result().StatusCode)\n\tauth.AuthenticateFn = original\n}", "func NewGetOrderUnauthorized() *GetOrderUnauthorized {\n\treturn &GetOrderUnauthorized{}\n}", "func (ctx *ShowUserContext) Unauthorized(r error) error {\n\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "func NewGetActivitiesLogUnauthorized() *GetActivitiesLogUnauthorized {\n\treturn &GetActivitiesLogUnauthorized{}\n}", "func get(url string, qparms rest.QParms) ([]byte, error) {\n\theaders := rest.Headers{\"Authorization\": \"Bearer \" + token}\n\tfor k, v := range defaultHeaders {\n\t\theaders[k] = v\n\t}\n\tclient := rest.NewClient(headers, qparms)\n\n\tbody, err := client.Get(url)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn body, nil\n}", "func NewGetApisUnauthorized() *GetApisUnauthorized {\n\n\treturn &GetApisUnauthorized{}\n}", "func NewAuthorizationHeader(clientID, secret string) string {\n\treturn \"Basic \" + base64.StdEncoding.EncodeToString([]byte(clientID+\":\"+secret))\n}", "func (h *HTTPHandler) ProxyAuthorizationRequired(rw http.ResponseWriter, req *http.Request) {\n\tdata := \"Proxy Authentication Required\"\n\tresp := &http.Response{\n\t\tStatusCode: http.StatusProxyAuthRequired,\n\t\tHeader: http.Header{\n\t\t\t\"Proxy-Authenticate\": []string{\"Basic realm=\\\"Proxy Authentication Required\\\"\"},\n\t\t},\n\t\tRequest: req,\n\t\tContentLength: int64(len(data)),\n\t\tBody: ioutil.NopCloser(strings.NewReader(data)),\n\t}\n\tfor key, values := range resp.Header {\n\t\tfor _, value := range values {\n\t\t\trw.Header().Add(key, value)\n\t\t}\n\t}\n\trw.WriteHeader(resp.StatusCode)\n\tyaputil.IOCopy(rw, resp.Body)\n}", "func (h *unauthorizedHandler) ServeHTTP(w stdhttp.ResponseWriter, r *stdhttp.Request) {\n\tw.WriteHeader(stdhttp.StatusUnauthorized)\n}", "func NewGetAllStorageUnauthorized() *GetAllStorageUnauthorized {\n\n\treturn &GetAllStorageUnauthorized{}\n}", "func Unauthorized(message string, args ...interface{}) *Failure {\n\treturn NewWithStatus(fmt.Sprintf(message, args...), http.StatusUnauthorized)\n}", "func NewGetServiceLevelUnauthorized() *GetServiceLevelUnauthorized {\n\treturn &GetServiceLevelUnauthorized{}\n}", "func jsonAuthFail(w http.ResponseWriter) {\n\tw.Header().Add(\"WWW-Authenticate\", `Basic realm=\"btcwallet RPC\"`)\n\thttp.Error(w, \"401 Unauthorized.\", http.StatusUnauthorized)\n}", "func setHeaders(w http.ResponseWriter, h http.Header, u *users.User) {\n\tw.Header().Set(\"Docker-Distribution-Api-Version\", \"registry/2.0\")\n\tfor k, v := range h {\n\t\tif strings.ToLower(k) == \"content-length\" {\n\t\t\tcontinue\n\t\t}\n\t\tw.Header().Set(k, strings.Join(v, \",\"))\n\t}\n}", "func NewGetAPIUnauthorized() *GetAPIUnauthorized {\n\treturn &GetAPIUnauthorized{}\n}", "func NewHeaders()(*Headers) {\n m := &Headers{\n }\n m.backingStore = ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStoreFactoryInstance();\n m.SetAdditionalData(make(map[string]any))\n return m\n}", "func (c DBaseController) UnauthorizedResponse() revel.Result {\n\tc.Response.Status = http.StatusUnauthorized\n\n\treturn c.RenderJSON(serializers.UnauthorizedResponse())\n}", "func addStdHeaders(headers http.Header) http.Header {\n\theaders.Set(\"Accept-Encoding\", \"gzip\")\n\t// So that I can have a static id for tests.\n\tif testID != \"\" {\n\t\theaders.Set(\"client-request-id\", testID)\n\t\theaders.Set(\"Return-Client-Request-Id\", \"false\")\n\t} else {\n\t\theaders.Set(\"client-request-id\", uuid.New().String())\n\t\theaders.Set(\"Return-Client-Request-Id\", \"false\")\n\t}\n\theaders.Set(\"x-client-sku\", \"MSAL.Go\")\n\theaders.Set(\"x-client-os\", runtime.GOOS)\n\theaders.Set(\"x-client-cpu\", runtime.GOARCH)\n\theaders.Set(\"x-client-ver\", version.Version)\n\treturn headers\n}", "func NewGetAllActionsUnauthorized() *GetAllActionsUnauthorized {\n\n\treturn &GetAllActionsUnauthorized{}\n}", "func (suite *TenantTestSuite) TestCreateUnauthorized() {\n\trequest, _ := http.NewRequest(\"POST\", \"/api/v2/admin/tenants\", strings.NewReader(\"\"))\n\trequest.Header.Set(\"x-api-key\", \"FOO\")\n\trequest.Header.Set(\"Accept\", \"application/json\")\n\tresponse := httptest.NewRecorder()\n\n\tsuite.router.ServeHTTP(response, request)\n\n\tcode := response.Code\n\toutput := response.Body.String()\n\n\tsuite.Equal(401, code, \"Internal Server Error\")\n\tsuite.Equal(suite.respUnauthorized, output, \"Response body mismatch\")\n}", "func NewVoiceHistoryExportGetTooManyRequests() *VoiceHistoryExportGetTooManyRequests {\n\treturn &VoiceHistoryExportGetTooManyRequests{}\n}", "func Unauthorized(err string) *APIError {\n\treturn NewAPIError(http.StatusUnauthorized, \"UNAUTHORIZED\", Params{\"error\": err}, \"\")\n}", "func Header(h http.Header) http.Header {\n\tscrubbedHeader := http.Header{}\n\tfor k, v := range h {\n\t\tif strings.ToLower(k) == authHeaderLowerCase {\n\t\t\tscrubbedValues := []string{}\n\t\t\tfor _, auth := range v {\n\t\t\t\tsubstrs := strings.SplitN(auth, \" \", 2)\n\t\t\t\tscrubbed := scrubbedValue\n\t\t\t\tif len(substrs) > 1 {\n\t\t\t\t\tscrubbed = fmt.Sprintf(\"%s %s\", substrs[0], scrubbedValue)\n\t\t\t\t}\n\t\t\t\tscrubbedValues = append(scrubbedValues, scrubbed)\n\t\t\t}\n\t\t\tscrubbedHeader[k] = scrubbedValues\n\n\t\t\tcontinue\n\t\t}\n\n\t\tif _, contains := RestrictedHeaders[strings.ToLower(k)]; contains {\n\t\t\tscrubbedHeader[k] = []string{scrubbedValue}\n\t\t\tcontinue\n\t\t}\n\n\t\tscrubbedHeader[k] = v\n\t}\n\n\treturn scrubbedHeader\n}", "func NewGetLimitsUnauthorized() *GetLimitsUnauthorized {\n\treturn &GetLimitsUnauthorized{}\n}", "func NewGetTeamDetailUnauthorized() *GetTeamDetailUnauthorized {\n\treturn &GetTeamDetailUnauthorized{}\n}", "func NewObjectsGetUnauthorized() *ObjectsGetUnauthorized {\n\treturn &ObjectsGetUnauthorized{}\n}", "func (rest *TestTokenStorageREST) TestRetrieveExternalTokenUnauthorized() {\n\trest.checkRetrieveExternalTokenUnauthorized(\"https://github.com/sbose78\", \"github\")\n\trest.checkRetrieveExternalTokenUnauthorized(\"github\", \"github\")\n\trest.checkRetrieveExternalTokenUnauthorized(\"https://api.starter-us-east-2.openshift.com\", \"openshift-v3\")\n\trest.checkRetrieveExternalTokenUnauthorized(\"openshift\", \"openshift-v3\")\n}", "func NewGetAllActionsUnauthorized() *GetAllActionsUnauthorized {\n\treturn &GetAllActionsUnauthorized{}\n}", "func (h *HTTP2Handler) ProxyAuthorizationRequired(rw http.ResponseWriter, req *http.Request) {\n\tdata := \"Proxy Authentication Required\"\n\tresp := &http.Response{\n\t\tStatusCode: http.StatusProxyAuthRequired,\n\t\tHeader: http.Header{\n\t\t\t\"Proxy-Authenticate\": []string{\"Basic realm=\\\"Proxy Authentication Required\\\"\"},\n\t\t},\n\t\tRequest: req,\n\t\tContentLength: int64(len(data)),\n\t\tBody: ioutil.NopCloser(strings.NewReader(data)),\n\t}\n\tfor key, values := range resp.Header {\n\t\tfor _, value := range values {\n\t\t\trw.Header().Add(key, value)\n\t\t}\n\t}\n\trw.WriteHeader(resp.StatusCode)\n\tyaputil.IOCopy(rw, resp.Body)\n}", "func NewCatalogGetUnauthorized() *CatalogGetUnauthorized {\n\treturn &CatalogGetUnauthorized{}\n}", "func NewGetActionUnauthorized() *GetActionUnauthorized {\n\treturn &GetActionUnauthorized{}\n}", "func Unauthorizedf(format string, args ...interface{}) error {\n\treturn &unauthorized{wrap(nil, format, \"\", args...)}\n}", "func FilterHeader(header http.Header) http.Header {\n\tnewHeader := make(http.Header)\n\tfor k, v := range header {\n\t\tswitch k {\n\t\tcase \"Authorization\":\n\t\t// ignore these headers\n\t\tdefault:\n\t\t\tnewHeader[k] = v\n\t\t}\n\t}\n\n\treturn newHeader\n}", "func NewGetLogsUnauthorized() *GetLogsUnauthorized {\n\treturn &GetLogsUnauthorized{}\n}", "func (v *Vault) setHeaders() {\n\theaders := map[string][]string{\"X-Vault-Token\": {v.token}}\n\tv.client.SetHeaders(headers)\n\tv.client.SetToken(v.token)\n}", "func UnauthorizedResponse(w http.ResponseWriter) error {\n\tw.WriteHeader(http.StatusUnauthorized)\n\n\tdata, err := unauthorizedBody.MarshalJSON()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"marshal json\")\n\t}\n\tif _, err := w.Write(data); err != nil {\n\t\treturn errors.Wrap(err, \"write response\")\n\t}\n\treturn nil\n}", "func NewGetLanguagesUnauthorized() *GetLanguagesUnauthorized {\n\treturn &GetLanguagesUnauthorized{}\n}", "func NewInsuranceGetUnauthorized() *InsuranceGetUnauthorized {\n\treturn &InsuranceGetUnauthorized{}\n}", "func RenderUnauthorized(w http.ResponseWriter, message ...interface{}) {\n\tRender(w, Unauthorized(message...))\n}", "func (ctx *CreateUserContext) Unauthorized(r error) error {\n\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "func (c *SeaterController) TraceUnauthorizedf(err error, format string, args ...interface{}) {\n\tmsg := fmt.Sprintf(format, args...)\n\tc.traceJSONAbort(err, 401, msg)\n}", "func NewGetVulnerabilitiesAdditionUnauthorized() *GetVulnerabilitiesAdditionUnauthorized {\n\treturn &GetVulnerabilitiesAdditionUnauthorized{}\n}", "func (o *WeaviateSchemaActionsDeleteUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(401)\n}" ]
[ "0.54507214", "0.54133785", "0.53524154", "0.53316885", "0.53032815", "0.52615523", "0.5240692", "0.52069694", "0.51689976", "0.51506424", "0.51299435", "0.50728345", "0.5068282", "0.5063016", "0.5016903", "0.49345008", "0.49330872", "0.4932315", "0.48879808", "0.48825082", "0.4858486", "0.4842143", "0.48218715", "0.4809109", "0.4765524", "0.47613436", "0.4760914", "0.47315595", "0.47307032", "0.4721262", "0.4703454", "0.46988696", "0.4696737", "0.46915466", "0.4679915", "0.46453154", "0.46218482", "0.46160766", "0.45960265", "0.45859703", "0.45668942", "0.45524144", "0.45367268", "0.45271888", "0.45265055", "0.45188862", "0.4516641", "0.45113805", "0.44923627", "0.4490201", "0.44843325", "0.44842803", "0.44831988", "0.4480803", "0.4480758", "0.4477069", "0.44756782", "0.44727188", "0.44725955", "0.4470906", "0.4468148", "0.44611377", "0.4460234", "0.44559607", "0.44511795", "0.44469422", "0.44445518", "0.44435108", "0.44398877", "0.44396296", "0.44382414", "0.44257647", "0.4420999", "0.44207227", "0.44204196", "0.44194785", "0.4412251", "0.4397304", "0.43933478", "0.43916214", "0.4391409", "0.43907574", "0.4388145", "0.43866012", "0.43843552", "0.43730286", "0.436674", "0.4366035", "0.4362521", "0.4356313", "0.43456796", "0.43413374", "0.4337321", "0.4336182", "0.43356684", "0.43331164", "0.43328804", "0.43287578", "0.4326581", "0.4325832" ]
0.72562784
0
NewVoiceHistoryExportGetForbidden creates a VoiceHistoryExportGetForbidden with default headers values
func NewVoiceHistoryExportGetForbidden() *VoiceHistoryExportGetForbidden { return &VoiceHistoryExportGetForbidden{} }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewVoiceHistoryExportGetUnauthorized() *VoiceHistoryExportGetUnauthorized {\n\treturn &VoiceHistoryExportGetUnauthorized{}\n}", "func NewVoiceHistoryExportGetMethodNotAllowed() *VoiceHistoryExportGetMethodNotAllowed {\n\treturn &VoiceHistoryExportGetMethodNotAllowed{}\n}", "func NewGetUserBanHistoryForbidden() *GetUserBanHistoryForbidden {\n\treturn &GetUserBanHistoryForbidden{}\n}", "func (r *Responder) Forbidden() { r.write(http.StatusForbidden) }", "func NewGetConnectionStatusHistoryForbidden() *GetConnectionStatusHistoryForbidden {\n\treturn &GetConnectionStatusHistoryForbidden{}\n}", "func (r *Response) Forbidden(v interface{}) {\n\tr.writeResponse(http.StatusForbidden, v)\n}", "func (aee *ActiveEndpointsError) Forbidden() {}", "func NewVoiceHistoryExportGetTooManyRequests() *VoiceHistoryExportGetTooManyRequests {\n\treturn &VoiceHistoryExportGetTooManyRequests{}\n}", "func Forbidden(format string, args ...interface{}) error {\n\treturn New(http.StatusForbidden, format, args...)\n}", "func Forbidden(w http.ResponseWriter, err error) {\n\t(Response{Error: err.Error()}).json(w, http.StatusForbidden)\n}", "func (r Response) Forbidden(code string, payload Payload, header ...ResponseHeader) {\n\tr.Response(code, http.Forbidden, payload, header...)\n}", "func (c ApiWrapper) Forbidden(msg string, objs ...interface{}) revel.Result {\n\treturn c.renderErrorString(403, fmt.Sprintf(msg, objs))\n}", "func (this *Context) Forbidden() {\n\tthis.ResponseWriter.WriteHeader(403)\n}", "func (response BasicJSONResponse) Forbidden(writer http.ResponseWriter) {\n\tForbidden(writer, response)\n}", "func Forbidden(err error) Response {\n\tmessage := \"not authorized\"\n\tif err != nil {\n\t\tmessage = err.Error()\n\t}\n\treturn &errorResponse{\n\t\tcode: http.StatusForbidden,\n\t\tmsg: message,\n\t}\n}", "func Forbidden(messages ...string) Error {\n\treturn createMessageError(http.StatusText(http.StatusForbidden), messages)\n}", "func Forbidden(msg string) ErrorResponse {\n\tif msg == \"\" {\n\t\tmsg = \"You are not authorized to perform the requested action.\"\n\t}\n\treturn ErrorResponse{\n\t\tStatus: http.StatusForbidden,\n\t\tMessage: msg,\n\t}\n}", "func Forbidden(message ...interface{}) Err {\n\treturn Boomify(http.StatusForbidden, message...)\n}", "func (o *GetLegacyUserSearchKeywordForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func NewForbidden(err error, msg ...string) *Errs {\n\tif err == nil {\n\t\terr = ErrForbidden\n\t}\n\n\treturn &Errs{\n\t\tcodeHTTP: http.StatusForbidden,\n\t\terr: err,\n\t\tkind: trace(2),\n\t\tmessage: msg,\n\t}\n}", "func forbidden(rw http.ResponseWriter, r *http.Request) {\n\n}", "func getForbiddenResponse(req *http.Request) *http.Response {\n\treturn buildResponse(req, http.StatusForbidden, \"403 Forbidden\", \"403 Forbidden\", nil)\n}", "func NewGetRecentFoodsForbidden() *GetRecentFoodsForbidden {\n\treturn &GetRecentFoodsForbidden{}\n}", "func (JSONPresenter) Forbidden() string {\n\treturn \"{ \\\"error\\\": \\\"Forbidden\\\" }\"\n}", "func (o *WeaviateThingsGetForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(403)\n}", "func Forbidden(msg string) error {\n\tif msg == \"\" {\n\t\tmsg = \"no está autorizado a realizar la acción solicitada.\"\n\t}\n\treturn echo.NewHTTPError(http.StatusForbidden, msg)\n}", "func NewVoiceHistoryExportGetBadRequest() *VoiceHistoryExportGetBadRequest {\n\treturn &VoiceHistoryExportGetBadRequest{}\n}", "func newDefaultDenyResponse() *admission.AdmissionResponse {\n\treturn &admission.AdmissionResponse{\n\t\tAllowed: false,\n\t\tResult: &metav1.Status{},\n\t}\n}", "func Forbidden(w http.ResponseWriter, message ...interface{}) {\n\tboom(w, 403, message...)\n}", "func Forbidden(msg string) Error {\n\te := err{msg: msg, code: forbiddenCode, group: generic, kind: forbidden}\n\treturn &e\n}", "func (o *GetReposOwnerRepoStatsCommitActivityForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (o *CreateWebhookSubscriptionForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (client *RecommendationsClient) listHistoryForHostingEnvironmentCreateRequest(ctx context.Context, resourceGroupName string, hostingEnvironmentName string, options *RecommendationsClientListHistoryForHostingEnvironmentOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/hostingEnvironments/{hostingEnvironmentName}/recommendationHistory\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif hostingEnvironmentName == \"\" {\n\t\treturn nil, errors.New(\"parameter hostingEnvironmentName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{hostingEnvironmentName}\", url.PathEscape(hostingEnvironmentName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.ExpiredOnly != nil {\n\t\treqQP.Set(\"expiredOnly\", strconv.FormatBool(*options.ExpiredOnly))\n\t}\n\treqQP.Set(\"api-version\", \"2021-03-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tunencodedParams := []string{req.Raw().URL.RawQuery}\n\tif options != nil && options.Filter != nil {\n\t\tunencodedParams = append(unencodedParams, \"$filter=\"+*options.Filter)\n\t}\n\treq.Raw().URL.RawQuery = strings.Join(unencodedParams, \"&\")\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (o *GetUserKeysKeyIDForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (o *ServiceAddForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (client *RecommendationsClient) listHistoryForHostingEnvironmentCreateRequest(ctx context.Context, resourceGroupName string, hostingEnvironmentName string, options *RecommendationsListHistoryForHostingEnvironmentOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/hostingEnvironments/{hostingEnvironmentName}/recommendationHistory\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif hostingEnvironmentName == \"\" {\n\t\treturn nil, errors.New(\"parameter hostingEnvironmentName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{hostingEnvironmentName}\", url.PathEscape(hostingEnvironmentName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.ExpiredOnly != nil {\n\t\treqQP.Set(\"expiredOnly\", strconv.FormatBool(*options.ExpiredOnly))\n\t}\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tunencodedParams := []string{req.Raw().URL.RawQuery}\n\tif options != nil && options.Filter != nil {\n\t\tunencodedParams = append(unencodedParams, \"$filter=\"+*options.Filter)\n\t}\n\treq.Raw().URL.RawQuery = strings.Join(unencodedParams, \"&\")\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (o *GetTeamsForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(403)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func (o *RequestPPMExpenseSummaryForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func NewGetVulnerabilitiesAdditionForbidden() *GetVulnerabilitiesAdditionForbidden {\n\treturn &GetVulnerabilitiesAdditionForbidden{}\n}", "func (o *WeaviateActionsPatchForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (o *CreateMovingExpenseDocumentForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (o *GetRefreshTokenForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(403)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func (o *PutRecordingsForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (o *PutTeamsTeamIDMembersUsernameForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (ctx *Context) Forbidden() {\n\tctx.WriteError(http.StatusForbidden, \"Forbidden\")\n}", "func NewGetForbidden(body *GetForbiddenResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "func (o *DeleteAllRevisionsForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (o *V2ListOperatorPropertiesForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(403)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func methodNotAllowed(w http.ResponseWriter){\n w.WriteHeader(405)\n fmt.Fprintln(w, \"Method not allowed\")\n return\n}", "func (o *PutPerformancesForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (o *GetMoveCounselingEvaluationReportsListForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(403)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func (o *WeaviatePeersAnnounceForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(403)\n}", "func (o *CreatePersonallyProcuredMoveForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func NewGetModelRegistryForbidden() *GetModelRegistryForbidden {\n\treturn &GetModelRegistryForbidden{}\n}", "func (o *GetFleetsFleetIDMembersForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(403)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func (client *RecommendationsClient) listHistoryForWebAppCreateRequest(ctx context.Context, resourceGroupName string, siteName string, options *RecommendationsClientListHistoryForWebAppOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{siteName}/recommendationHistory\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif siteName == \"\" {\n\t\treturn nil, errors.New(\"parameter siteName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{siteName}\", url.PathEscape(siteName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.ExpiredOnly != nil {\n\t\treqQP.Set(\"expiredOnly\", strconv.FormatBool(*options.ExpiredOnly))\n\t}\n\treqQP.Set(\"api-version\", \"2021-03-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tunencodedParams := []string{req.Raw().URL.RawQuery}\n\tif options != nil && options.Filter != nil {\n\t\tunencodedParams = append(unencodedParams, \"$filter=\"+*options.Filter)\n\t}\n\treq.Raw().URL.RawQuery = strings.Join(unencodedParams, \"&\")\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (o *ShowOrdersForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func NewGetAPIForbidden() *GetAPIForbidden {\n\treturn &GetAPIForbidden{}\n}", "func Forbidden(msg string) error {\n\treturn &forbiddenError{errors.New(msg)}\n}", "func (o *GetCapabilityForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(403)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func (o *WeaviateThingTemplatesCreateForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(403)\n}", "func methodNotAllowed(resp *ApiResponse, msg string) error {\n resp.StatusCode = http.StatusMethodNotAllowed\n resp.Message = []byte(msg)\n resp.ErrorMessage = msg\n\n return nil\n}", "func NewGetLimitsForbidden() *GetLimitsForbidden {\n\treturn &GetLimitsForbidden{}\n}", "func NewGetUserBanHistoryUnauthorized() *GetUserBanHistoryUnauthorized {\n\treturn &GetUserBanHistoryUnauthorized{}\n}", "func NewForbidden(a Attributes, internalError error) error {\n\t// do not double wrap an error of same type\n\tif apierrors.IsForbidden(internalError) {\n\t\treturn internalError\n\t}\n\tname, resource, err := extractResourceName(a)\n\tif err != nil {\n\t\treturn apierrors.NewInternalError(utilerrors.NewAggregate([]error{internalError, err}))\n\t}\n\treturn apierrors.NewForbidden(resource, name, internalError)\n}", "func NewVoiceHistoryExportGetNotFound() *VoiceHistoryExportGetNotFound {\n\treturn &VoiceHistoryExportGetNotFound{}\n}", "func (o *WeaviateThingsPatchForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(403)\n}", "func (client *RecommendationsClient) listHistoryForWebAppCreateRequest(ctx context.Context, resourceGroupName string, siteName string, options *RecommendationsListHistoryForWebAppOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{siteName}/recommendationHistory\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif siteName == \"\" {\n\t\treturn nil, errors.New(\"parameter siteName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{siteName}\", url.PathEscape(siteName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.ExpiredOnly != nil {\n\t\treqQP.Set(\"expiredOnly\", strconv.FormatBool(*options.ExpiredOnly))\n\t}\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tunencodedParams := []string{req.Raw().URL.RawQuery}\n\tif options != nil && options.Filter != nil {\n\t\tunencodedParams = append(unencodedParams, \"$filter=\"+*options.Filter)\n\t}\n\treq.Raw().URL.RawQuery = strings.Join(unencodedParams, \"&\")\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (o *GetReposOwnerRepoLanguagesForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (o *CancelLaunchForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (c *SeaterController) TraceForbiddenf(err error, format string, args ...interface{}) {\n\tmsg := fmt.Sprintf(format, args...)\n\tc.traceJSONAbort(err, 403, msg)\n}", "func (o *ValidateDesignForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (o *GetValidationByIDForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (o *GetUserReposForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func notAllowed(w http.ResponseWriter, req *http.Request) {\n\tapiError := apirouter.ErrorFromRequest(req, fmt.Sprintf(\"405 occurred: %s method: %s\", req.RequestURI, req.Method), \"Whoops - this method is not allowed\", http.StatusMethodNotAllowed, http.StatusMethodNotAllowed, \"\")\n\tapirouter.ReturnResponse(w, req, apiError.Code, apiError)\n}", "func NewGetActionForbidden() *GetActionForbidden {\n\treturn &GetActionForbidden{}\n}", "func (o *GetReportViolationsByReportIDForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(403)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func (o *DeleteServiceIDForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func NewExportAchievementsForbidden() *ExportAchievementsForbidden {\n\treturn &ExportAchievementsForbidden{}\n}", "func (o *GetUsersUsernameKeysForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (o *IndexSignedCertificationForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (o *GetQuestionFromTeamForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(403)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func (o *PutWorkpaceByIDForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func NewGetPayportForbidden() *GetPayportForbidden {\n\treturn &GetPayportForbidden{}\n}", "func NewVoiceHistoryExportGetDefault(code int) *VoiceHistoryExportGetDefault {\n\treturn &VoiceHistoryExportGetDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewListReportDefinitionForbidden() *ListReportDefinitionForbidden {\n\treturn &ListReportDefinitionForbidden{}\n}", "func (o *UpdateOfficeUserForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func NewQueryForbiddenInfoListRequestWithoutParam() *QueryForbiddenInfoListRequest {\n\n return &QueryForbiddenInfoListRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/forbiddenInfo:query\",\n Method: \"POST\",\n Header: nil,\n Version: \"v1\",\n },\n }\n}", "func (o *GetGistsIDCommentsForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func NewGetCapabilityForbidden() *GetCapabilityForbidden {\n\treturn &GetCapabilityForbidden{}\n}", "func (o *GetVisiblePruebasFromQuestionTestForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(403)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func (o *GetOrgsOrgMembersUsernameForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (o *GetGistsForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func unauthorized(resp *ApiResponse, msg string) error {\n resp.StatusCode = http.StatusUnauthorized\n resp.Message = []byte(msg)\n resp.ErrorMessage = msg\n\n return nil\n}", "func (o *PutOrgsOrgPublicMembersUsernameForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func (o *GetNotificationsThreadsIDSubscriptionForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func NewFleetServerHistoryForbidden() *FleetServerHistoryForbidden {\n\treturn &FleetServerHistoryForbidden{}\n}", "func (o *UserEditForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}", "func NewWeaviateThingsGetForbidden() *WeaviateThingsGetForbidden {\n\treturn &WeaviateThingsGetForbidden{}\n}", "func (o *GetGitignoreTemplatesForbidden) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(403)\n}" ]
[ "0.58894473", "0.56179315", "0.54308164", "0.53673095", "0.5362502", "0.5350544", "0.5300363", "0.5293486", "0.5285386", "0.5212645", "0.5173334", "0.51455694", "0.51393104", "0.5122952", "0.5105755", "0.51044357", "0.51035744", "0.5073262", "0.5072176", "0.50706464", "0.5043478", "0.5023267", "0.4964559", "0.4949968", "0.49494812", "0.49267998", "0.49248967", "0.49002573", "0.48766747", "0.4870664", "0.48185375", "0.48146567", "0.47993055", "0.4797569", "0.47640017", "0.4741888", "0.47411332", "0.4739785", "0.4734281", "0.47337016", "0.47312152", "0.47310454", "0.47292164", "0.47131157", "0.47102633", "0.470849", "0.47035426", "0.46945986", "0.46880892", "0.46799597", "0.46756124", "0.4673782", "0.4673178", "0.46727055", "0.46638393", "0.4654298", "0.4639635", "0.46344978", "0.46325886", "0.4632322", "0.46311063", "0.46191525", "0.4614719", "0.46115458", "0.46101287", "0.46066552", "0.46049175", "0.46013448", "0.4600332", "0.45961723", "0.45952952", "0.45878434", "0.45807564", "0.4575328", "0.45748833", "0.45717493", "0.4571281", "0.45673877", "0.4566041", "0.4564783", "0.45645872", "0.455584", "0.45537496", "0.45510525", "0.45505822", "0.45451194", "0.45449066", "0.45422933", "0.4541389", "0.45349702", "0.45310348", "0.45279923", "0.45211285", "0.45136213", "0.45106626", "0.45056537", "0.45021647", "0.4497709", "0.44876498", "0.4482641" ]
0.7286458
0
NewVoiceHistoryExportGetNotFound creates a VoiceHistoryExportGetNotFound with default headers values
func NewVoiceHistoryExportGetNotFound() *VoiceHistoryExportGetNotFound { return &VoiceHistoryExportGetNotFound{} }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewVoiceHistoryExportGetDefault(code int) *VoiceHistoryExportGetDefault {\n\treturn &VoiceHistoryExportGetDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewVoiceHistoryExportGetUnauthorized() *VoiceHistoryExportGetUnauthorized {\n\treturn &VoiceHistoryExportGetUnauthorized{}\n}", "func notFound(resp *ApiResponse, msg string) error {\n resp.StatusCode = http.StatusNotFound\n resp.Message = []byte(msg)\n resp.ErrorMessage = http.StatusText(http.StatusNotFound)\n\n return nil\n}", "func NewVoiceHistoryExportGetOK() *VoiceHistoryExportGetOK {\n\treturn &VoiceHistoryExportGetOK{}\n}", "func notFound(resource string) middleware.Responder {\n\tmessage := fmt.Sprintf(\"404 %s not found\", resource)\n\treturn operations.NewGetChartDefault(http.StatusNotFound).WithPayload(\n\t\t&models.Error{Code: helpers.Int64ToPtr(http.StatusNotFound), Message: &message},\n\t)\n}", "func notfound(out http.ResponseWriter, format string, args ...interface{}) {\n\tsend(http.StatusNotFound, out, format, args...)\n}", "func (a *API) getNotFound(ctx context.Context, res *common.HttpResponseWriter) error {\n\tres.WriteHeader(http.StatusNotFound)\n\treturn nil\n}", "func NotFound(w ResponseWriter, r *Request) {\n\tw.SetHeader(CodeNotFound, \"not found\")\n}", "func notFound(w http.ResponseWriter, req *http.Request) {\n\t// w.Header().Set(\"Content-Type\", \"text/plain; charset=utf-8\")\n\tapiError := apirouter.ErrorFromRequest(req, fmt.Sprintf(\"404 occurred: %s\", req.RequestURI), \"Whoops - this request is not recognized\", http.StatusNotFound, http.StatusNotFound, \"\")\n\tapirouter.ReturnResponse(w, req, apiError.Code, apiError)\n}", "func NotFound(w ResponseWriter, r *Request) { Error(w, \"404 page not found\", StatusNotFound) }", "func noFound(msg string) error {\n\treturn status.Error(codes.NotFound, msg)\n}", "func ERROR_TRX_NOT_FOUND(w http.ResponseWriter) {\n\tbuildForeignError(w, http.StatusNotFound, \"ERROR_TRX_NOT_FOUND\", \"\")\n}", "func (uee *UnknownEndpointError) NotFound() {}", "func NotFound(w http.ResponseWriter, r *http.Request, h *render.Renderer) {\n\taccept := strings.Split(r.Header.Get(\"Accept\"), \",\")\n\taccept = append(accept, strings.Split(r.Header.Get(\"Content-Type\"), \",\")...)\n\n\tswitch {\n\tcase prefixInList(accept, ContentTypeHTML):\n\t\tm := TemplateMapFromContext(r.Context())\n\t\tm.Title(http.StatusText(http.StatusNotFound))\n\t\th.RenderHTMLStatus(w, http.StatusNotFound, \"404\", m)\n\tcase prefixInList(accept, ContentTypeJSON):\n\t\th.RenderJSON(w, http.StatusNotFound, http.StatusText(http.StatusNotFound))\n\tdefault:\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t}\n}", "func (response BasicJSONResponse) NotFound(writer http.ResponseWriter) {\n\tNotFound(writer, response)\n}", "func (nse ErrNoSuchEndpoint) NotFound() {}", "func NewVoiceHistoryExportGetBadRequest() *VoiceHistoryExportGetBadRequest {\n\treturn &VoiceHistoryExportGetBadRequest{}\n}", "func (c ApiWrapper) NotFound(msg string, objs ...interface{}) revel.Result {\n\treturn c.renderErrorString(404, fmt.Sprintf(msg, objs))\n}", "func NotFound(w http.ResponseWriter, r *http.Request) {\n\tresponse := response.CreateResponse()\n\tresponse.SendDataWithStatusCode(w, \"not found\", http.StatusOK)\n}", "func NotFound(c *routing.Context, msg string, service string) error {\n\tResponse(c, `{\"error\": true, \"msg\": \"`+msg+`\"}`, 404, service, \"application/json\")\n\treturn nil\n}", "func NewVoiceHistoryExportGetForbidden() *VoiceHistoryExportGetForbidden {\n\treturn &VoiceHistoryExportGetForbidden{}\n}", "func NotFound(w http.ResponseWriter, r *http.Request) { Error(w, \"404 page not found\", http.StatusNotFound) }", "func NewVoiceHistoryExportGetMethodNotAllowed() *VoiceHistoryExportGetMethodNotAllowed {\n\treturn &VoiceHistoryExportGetMethodNotAllowed{}\n}", "func (ctx *GetOutputContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "func NotFound(data Serializer, logging ...interface{}) Response {\n\tif data == nil {\n\t\tdata = String(\"404 Not Found\")\n\t}\n\treturn Response{Status: http.StatusNotFound, Data: data, Logging: logging}\n}", "func (r *Responder) NotFound() { r.write(http.StatusNotFound) }", "func NotFoundHandler() ServiceHttpHandler { return ServiceHttpHandler{Handler: NotFound} }", "func notFound(w http.ResponseWriter, req *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"text/html\")\n\thttp.NotFound(w, req)\n}", "func (r Response) NotFound(code string, payload Payload, header ...ResponseHeader) {\n\tr.Response(code, http.NotFound, payload, header...)\n}", "func (client HTTPSuccessClient) Head404Responder(resp *http.Response) (result autorest.Response, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK,http.StatusNoContent,http.StatusNotFound),\n autorest.ByClosing())\n result.Response = resp\n return\n}", "func NewNotFound(s string, v ...interface{}) error {\n\treturn asNotFound(fmt.Errorf(s, v...))\n}", "func NotFound(w http.ResponseWriter, r *http.Request) {\n\tw.WriteHeader(http.StatusNotFound)\n\tjson.NewEncoder(w).Encode(&ServiceError{\n\t\tMessage: \"Endpoint not found\",\n\t\tSolution: \"See / for possible directives\",\n\t\tErrorCode: http.StatusNotFound,\n\t})\n}", "func (r *Response) NotFound(v interface{}) {\n\tr.writeResponse(http.StatusNotFound, v)\n}", "func NotFound(message string, errors []Error) {\n\tresponse := Response{\n\t\tStatus: http.StatusNotFound,\n\t\tMessage: message,\n\t\tData: nil,\n\t\tErrors: errors,\n\t}\n\tpanic(response)\n}", "func NotFound(format string, args ...interface{}) error {\n\targs = append(args, withDefaultMessage(NotFoundDefaultMsg))\n\treturn Errorf(http.StatusNotFound, format, args...)\n}", "func (ctx *GetAllHostContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "func NewNotFoundError(message string)*RestErr{\n\treturn &RestErr{\n\t\tMessage: message,\n\t\tStatus: http.StatusNotFound,\n\t\tError: \"Not Found\",\n\t}\n}", "func NotFound(w http.ResponseWriter, _ error) {\n\t(Response{Error: \"resource not found\"}).json(w, http.StatusNotFound)\n}", "func (h *Handler) NotFound(w http.ResponseWriter, r *http.Request) {\n\twriteResponse(r, w, http.StatusNotFound, &SimpleResponse{\n\t\tTraceID: tracing.FromContext(r.Context()),\n\t\tMessage: \"not found\",\n\t})\n}", "func NewGetUserBanHistoryNotFound() *GetUserBanHistoryNotFound {\n\treturn &GetUserBanHistoryNotFound{}\n}", "func (this *Context) NotFound(message string) {\n\tthis.ResponseWriter.WriteHeader(404)\n\tthis.ResponseWriter.Write([]byte(message))\n}", "func NotFound(rw http.ResponseWriter) {\n\tHttpError(rw, \"not found\", 404)\n}", "func NotFound(c *gin.Context) {\n\tresponse := types.APIErrResponse{Msg: \"Something went wrong\", Success: false, Err: \"Not found\"}\n\tc.JSON(http.StatusNotFound, response)\n}", "func (ctx *GetFeedContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "func NewNotFound(err error, msg ...string) *Errs {\n\tif err == nil {\n\t\terr = ErrNotFound\n\t}\n\treturn &Errs{\n\t\tcodeHTTP: http.StatusNotFound,\n\t\terr: err,\n\t\tkind: trace(2),\n\t\tmessage: msg,\n\t}\n}", "func NotFound(w http.ResponseWriter, message ...interface{}) {\n\tboom(w, 404, message...)\n}", "func writeInsightNotFound(w http.ResponseWriter, str string) {\n\tw.Header().Set(\"Content-Type\", \"text/html; charset=utf-8\")\n\tw.WriteHeader(http.StatusNotFound)\n\tio.WriteString(w, str)\n}", "func (ctx *GetByIDHostContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "func (ctx *GetFilterContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "func NotFound(w http.ResponseWriter) {\n\trenderError(w, http.StatusNotFound, nil)\n}", "func NotFound(message ...interface{}) Err {\n\treturn Boomify(http.StatusNotFound, message...)\n}", "func (o *GetNFTContractTokenNotFound) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(404)\n}", "func NewVoiceHistoryExportGetTooManyRequests() *VoiceHistoryExportGetTooManyRequests {\n\treturn &VoiceHistoryExportGetTooManyRequests{}\n}", "func (une *UnknownNetworkError) NotFound() {}", "func NewGetStockNotFound() *GetStockNotFound {\n\treturn &GetStockNotFound{}\n}", "func (ctx *AcceptOfferContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "func (ctx *ListMessageContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "func notFound(c router.Control) {\n\tc.Code(http.StatusNotFound)\n\tc.Body(\"Method not found for \" + c.Request().URL.Path)\n}", "func (Http) getNotFound(name string) *Http {\n\treturn &Http{\n\t\tCode: http.StatusNotFound,\n\t\tStatus: http.StatusText(http.StatusNotFound),\n\t\tMessage: fmt.Sprintf(\"%s not found\", toUpperFirstChar(name)),\n\t}\n}", "func (ctx *StartFeedContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "func NotFound(w http.ResponseWriter, err error) {\n\tError(w, http.StatusNotFound, err)\n}", "func NotFound(fn http.HandlerFunc) {\n\tinfoMutex.Lock()\n\tvestigo.CustomNotFoundHandlerFunc(fn)\n\tinfoMutex.Unlock()\n}", "func NotFound(err error) error {\n\treturn New(http.StatusNotFound, err)\n}", "func NotFound(mw relay.MessageWriter, r *relay.Request, a *Action) {\n\tmw.WriteCommand(irc.INFO)\n\tmw.Params().Set(r.Receivers()...)\n\tfmt.Fprintf(mw, \"Oops... action %s not found.\", a.Method)\n}", "func TestGetWrongUUID(t *testing.T) {\n\tclearTable()\n nt := New{{.NameExported}}()\n add{{.NameExported}}(nt)\n badUid := \"00000000-d01d-4c09-a4e7-59026d143b89\"\n\n\tstatement := fmt.Sprintf({{.NameExported}}URL, badUid)\n\n\treq, _ := http.NewRequest(\"GET\", statement, nil)\n\tresponse := executeRequest(req)\n\n\tcheckResponseCode(t, http.StatusNotFound, response.Code)\n}", "func unknownRoute(res http.ResponseWriter, req *http.Request) {\n\tres.WriteHeader(http.StatusNotFound)\n\tres.Header().Set(\"Content-Type\", \"html\")\n\tfmt.Fprintf(\n\t\tres,\n\t\t`<html>\n\t\t<body>\n\t\t<p>These are not the URLs you're looking for.</p>\n\t\t</body>\n\t\t</html>`,\n\t)\n}", "func unknownRoute(res http.ResponseWriter, req *http.Request) {\n\tres.WriteHeader(http.StatusNotFound)\n\tres.Header().Set(\"Content-Type\", \"html\")\n\tfmt.Fprintf(\n\t\tres,\n\t\t`<html>\n\t\t<body>\n\t\t<p>These are not the URLs you're looking for.</p>\n\t\t</body>\n\t\t</html>`,\n\t)\n}", "func (m *mockAPI) notFound() *expectation {\n\treturn &expectation{code: http.StatusNotFound, body: nil}\n}", "func (client HTTPSuccessClient) Head404Sender(req *http.Request) (*http.Response, error) {\n return autorest.SendWithSender(client, req)\n}", "func ERROR_ASSET_NOT_FOUND(w http.ResponseWriter, payload string) {\n\tbuildForeignError(w, http.StatusNotFound, \"ERROR_ASSET_NOT_FOUND\", payload)\n}", "func (ctx *ShowVerificationContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "func NotFound(w http.ResponseWriter) {\n\thttp.Error(w, \"404 not found!!!\", http.StatusNotFound)\n}", "func (ctx *ListFeedContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "func (he *HTTPErrors) NotFound(ctx *Context) {\n\the.Emit(http.StatusNotFound, ctx)\n}", "func (ctx *DeleteOutputContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "func SendKeyNotFoundError(key string, w httppkg.ResponseWriter) {\n\tw.Header().Add(CACHE_HEADER_KEY, \"miss\")\n\tw.WriteHeader(httppkg.StatusNotFound)\n\tio.WriteString(w, \"\")\n\n\tlog.Printf(\"404 - unexisting key %s\", key)\n}", "func getHistory(ctx context.Context, args *map[string]interface{}) error {\n\tvar resultRows []Operation\n\n\tha, ok := (*args)[\"historyArgs\"].(historyArgs)\n\tif !ok {\n\t\treturn fmt.Errorf(\"unable to cast arguments to type historyArgs\")\n\t}\n\n\texportType := ha.exportType\n\n\t// Get everything from the fhir_endpoints_info_history table for the given URL\n\n\tvar selectHistory string\n\tif exportType == \"month\" {\n\t\tselectHistory = `\n\t\tSELECT fhir_endpoints_info_history.url, fhir_endpoints_metadata.http_response, fhir_endpoints_metadata.response_time_seconds, fhir_endpoints_metadata.errors,\n\t\tcapability_statement, tls_version, mime_types, operation_resource,\n\t\tfhir_endpoints_metadata.smart_http_response, smart_response, fhir_endpoints_info_history.updated_at, capability_fhir_version\n\t\tFROM fhir_endpoints_info_history, fhir_endpoints_metadata\n\t\tWHERE fhir_endpoints_info_history.metadata_id = fhir_endpoints_metadata.id AND fhir_endpoints_info_history.url=$1 AND (date_trunc('month', fhir_endpoints_info_history.updated_at) = date_trunc('month', current_date - INTERVAL '1 month'))\n\t\tORDER BY fhir_endpoints_info_history.updated_at DESC;`\n\t} else if exportType == \"30days\" {\n\t\tselectHistory = `\n\t\tSELECT fhir_endpoints_info_history.url, fhir_endpoints_metadata.http_response, fhir_endpoints_metadata.response_time_seconds, fhir_endpoints_metadata.errors,\n\t\tcapability_statement, tls_version, mime_types, operation_resource,\n\t\tfhir_endpoints_metadata.smart_http_response, smart_response, fhir_endpoints_info_history.updated_at, capability_fhir_version\n\t\tFROM fhir_endpoints_info_history, fhir_endpoints_metadata\n\t\tWHERE fhir_endpoints_info_history.metadata_id = fhir_endpoints_metadata.id AND fhir_endpoints_info_history.url=$1 AND (date_trunc('day', fhir_endpoints_info_history.updated_at) >= date_trunc('day', current_date - INTERVAL '30 day'))\n\t\tORDER BY fhir_endpoints_info_history.updated_at DESC;`\n\t} else if exportType == \"all\" {\n\t\tselectHistory = `\n\t\tSELECT fhir_endpoints_info_history.url, fhir_endpoints_metadata.http_response, fhir_endpoints_metadata.response_time_seconds, fhir_endpoints_metadata.errors,\n\t\tcapability_statement, tls_version, mime_types, operation_resource,\n\t\tfhir_endpoints_metadata.smart_http_response, smart_response, fhir_endpoints_info_history.updated_at, capability_fhir_version\n\t\tFROM fhir_endpoints_info_history, fhir_endpoints_metadata\n\t\tWHERE fhir_endpoints_info_history.metadata_id = fhir_endpoints_metadata.id AND fhir_endpoints_info_history.url=$1\n\t\tORDER BY fhir_endpoints_info_history.updated_at DESC;`\n\t}\n\n\thistoryRows, err := ha.store.DB.QueryContext(ctx, selectHistory, ha.fhirURL)\n\tif err != nil {\n\t\tlog.Warnf(\"Failed getting the history rows for URL %s. Error: %s\", ha.fhirURL, err)\n\t\tresult := Result{\n\t\t\tURL: ha.fhirURL,\n\t\t\tRows: resultRows,\n\t\t}\n\t\tha.result <- result\n\t\treturn nil\n\t}\n\n\t// Puts the rows in an array and sends it back on the channel to be processed\n\tdefer historyRows.Close()\n\tfor historyRows.Next() {\n\t\tvar op Operation\n\t\tvar url string\n\t\tvar capStat []byte\n\t\tvar smartRsp []byte\n\t\tvar opRes []byte\n\t\terr = historyRows.Scan(\n\t\t\t&url,\n\t\t\t&op.HTTPResponse,\n\t\t\t&op.HTTPResponseTimeSecond,\n\t\t\t&op.Errors,\n\t\t\t&capStat,\n\t\t\t&op.TLSVersion,\n\t\t\tpq.Array(&op.MIMETypes),\n\t\t\t&opRes,\n\t\t\t&op.SMARTHTTPResponse,\n\t\t\t&smartRsp,\n\t\t\t&op.UpdatedAt,\n\t\t\t&op.FHIRVersion)\n\t\tif err != nil {\n\t\t\tlog.Warnf(\"Error while scanning the rows of the history table for URL %s. Error: %s\", ha.fhirURL, err)\n\t\t\tresult := Result{\n\t\t\t\tURL: ha.fhirURL,\n\t\t\t\tRows: resultRows,\n\t\t\t}\n\t\t\tha.result <- result\n\t\t\treturn nil\n\t\t}\n\n\t\top.SMARTResponse = getSMARTResponse(smartRsp)\n\t\top.SupportedResources = getSupportedResources(opRes)\n\n\t\tresultRows = append(resultRows, op)\n\t}\n\tresult := Result{\n\t\tURL: ha.fhirURL,\n\t\tRows: resultRows,\n\t}\n\tha.result <- result\n\treturn nil\n}", "func noCacheNotFound(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Cache-Control\", \"no-cache, no-store, must-revalidate\")\n\thttp.NotFound(w, r)\n}", "func NotFound(context *gin.Context) {\n\tcontext.JSON(404, gin.H{\n\t\t\"error\": \"404 not found\",\n\t\t\"url\": context.Request.URL,\n\t})\n}", "func (ctx *PlayLocationsContext) NotFound(r *Error) error {\n\tctx.ResponseData.Header().Set(\"Content-Type\", \"error\")\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 404, r)\n}", "func NotFound(msg string) ErrorResponse {\n\tif msg == \"\" {\n\t\tmsg = \"The requested resource was not found.\"\n\t}\n\treturn ErrorResponse{\n\t\tStatus: http.StatusNotFound,\n\t\tMessage: msg,\n\t}\n}", "func NewNotFound() error {\n\treturn requestError{\n\t\tClientError: ClientError{\n\t\t\tErrors: []clientErrorSubError{{Message: \"status code 404\"}},\n\t\t},\n\t}\n}", "func (wa *webapi) defaultHandler(w http.ResponseWriter, r *http.Request) {\n\tw.WriteHeader(http.StatusNotFound)\n}", "func ListQuizzesNotFound(t goatest.TInterface, ctx context.Context, service *goa.Service, ctrl app.QuizzesController) (http.ResponseWriter, *app.StandardError) {\n\t// Setup service\n\tvar (\n\t\tlogBuf bytes.Buffer\n\t\tresp interface{}\n\n\t\trespSetter goatest.ResponseSetterFunc = func(r interface{}) { resp = r }\n\t)\n\tif service == nil {\n\t\tservice = goatest.Service(&logBuf, respSetter)\n\t} else {\n\t\tlogger := log.New(&logBuf, \"\", log.Ltime)\n\t\tservice.WithLogger(goa.NewLogger(logger))\n\t\tnewEncoder := func(io.Writer) goa.Encoder { return respSetter }\n\t\tservice.Encoder = goa.NewHTTPEncoder() // Make sure the code ends up using this decoder\n\t\tservice.Encoder.Register(newEncoder, \"*/*\")\n\t}\n\n\t// Setup request context\n\trw := httptest.NewRecorder()\n\tu := &url.URL{\n\t\tPath: fmt.Sprintf(\"/v1/quizzes\"),\n\t}\n\treq, err := http.NewRequest(\"GET\", u.String(), nil)\n\tif err != nil {\n\t\tpanic(\"invalid test \" + err.Error()) // bug\n\t}\n\tprms := url.Values{}\n\tif ctx == nil {\n\t\tctx = context.Background()\n\t}\n\tgoaCtx := goa.NewContext(goa.WithAction(ctx, \"QuizzesTest\"), rw, req, prms)\n\tlistCtx, _err := app.NewListQuizzesContext(goaCtx, req, service)\n\tif _err != nil {\n\t\te, ok := _err.(goa.ServiceError)\n\t\tif !ok {\n\t\t\tpanic(\"invalid test data \" + _err.Error()) // bug\n\t\t}\n\t\tt.Errorf(\"unexpected parameter validation error: %+v\", e)\n\t\treturn nil, nil\n\t}\n\n\t// Perform action\n\t_err = ctrl.List(listCtx)\n\n\t// Validate response\n\tif _err != nil {\n\t\tt.Fatalf(\"controller returned %+v, logs:\\n%s\", _err, logBuf.String())\n\t}\n\tif rw.Code != 404 {\n\t\tt.Errorf(\"invalid response status code: got %+v, expected 404\", rw.Code)\n\t}\n\tvar mt *app.StandardError\n\tif resp != nil {\n\t\tvar _ok bool\n\t\tmt, _ok = resp.(*app.StandardError)\n\t\tif !_ok {\n\t\t\tt.Fatalf(\"invalid response media: got variable of type %T, value %+v, expected instance of app.StandardError\", resp, resp)\n\t\t}\n\t\t_err = mt.Validate()\n\t\tif _err != nil {\n\t\t\tt.Errorf(\"invalid response media type: %s\", _err)\n\t\t}\n\t}\n\n\t// Return results\n\treturn rw, mt\n}", "func NotFound(msg string) error {\n\tif msg == \"\" {\n\t\tmsg = \"no se ha encontrado el recurso solicitado.\"\n\t}\n\treturn echo.NewHTTPError(http.StatusNotFound, msg)\n}", "func (hr *httpRouter) NotFound(h http.Handler) {\n\thr.notFound = h\n}", "func (JSONPresenter) NotFound() string {\n\treturn \"{ \\\"error\\\": \\\"Not Found\\\" }\"\n}", "func TestGetNonExistentChannel(t *testing.T) {\n\tclearTable()\n\t// Generate JWT for authorization.\n\tvalidToken, err := auth.GenerateJWT()\n\tif err != nil {\n\t\tt.Error(\"Failed to generate token\")\n\t}\n\treq, _ := http.NewRequest(\"GET\", \"/api/channel/\"+channelTestID.String(), nil)\n\t// Add \"Token\" header to request with generated token.\n\treq.Header.Add(\"Token\", validToken)\n\tresponse := executeRequest(req)\n\n\tcheckResponseCode(t, http.StatusNotFound, response.Code)\n\n\tvar m map[string]string\n\tjson.Unmarshal(response.Body.Bytes(), &m)\n\tif m[\"error\"] != \"Channel not found\" {\n\t\tt.Errorf(\"Expected the 'error' key of the response to be set to 'Channel not found'. Got '%s'\", m[\"error\"])\n\t}\n}", "func (o *GetAPIV1GamesNotFound) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(404)\n}", "func (ctx *ShowBottleContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "func (ctx *ShowBottleContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "func NotFound(ctx context.Context, w http.ResponseWriter, message string) {\n\tfhirError(ctx, w, http.StatusNotFound, fhir.IssueSeverityWarning, fhir.IssueTypeNotFound, message)\n}", "func NotFoundHandler() Handler { return HandlerFunc(NotFound) }", "func NotFoundHandler() Handler { return HandlerFunc(NotFound) }", "func NewNotFound(parameters ...wparams.ParamStorer) Error {\n\treturn newGenericError(nil, DefaultNotFound, wparams.NewParamStorer(parameters...))\n}", "func NotFound(msg string, args ...interface{}) error {\n\tif len(args) > 0 {\n\t\treturn status.Errorf(codes.NotFound, msg, args...)\n\t}\n\treturn status.Error(codes.NotFound, msg)\n}", "func notFoundHandler(w http.ResponseWriter, r *http.Request) {\n\tw.WriteHeader(http.StatusNotFound)\n\n\twritten, err := json.Marshal(struct{ Message string }{Message: \"Bulamadık :(\"})\n\tif err != nil {\n\t\tbadImplementationHandler(w, r, err)\n\t}\n\t_, err = w.Write(written)\n\tif err != nil {\n\n\t\tbadImplementationHandler(w, r, err)\n\t}\n}", "func getNotFound() (pages []Page) {\n\treturn []Page{{\"Not found.\", \"\", \"\", \"\", 0}}\n}", "func (r *Macross) NotFound(handlers ...Handler) {\n\tr.notFound = handlers\n\tr.notFoundHandlers = combineHandlers(r.handlers, r.notFound)\n}", "func (a API) NotFound() (int, string) {\n\treturn http.StatusNotFound, \"\"\n}" ]
[ "0.58318883", "0.5515478", "0.5510531", "0.54812586", "0.54304826", "0.53927165", "0.5376441", "0.5310388", "0.5307749", "0.5297608", "0.5151754", "0.5080179", "0.5064473", "0.5062785", "0.50531876", "0.5050314", "0.5045456", "0.50128335", "0.49989256", "0.49982432", "0.49914798", "0.49639145", "0.4944939", "0.4928223", "0.49053833", "0.48814586", "0.48660153", "0.4857238", "0.48350862", "0.48348486", "0.48294574", "0.4822287", "0.48145005", "0.4788789", "0.47822392", "0.4780996", "0.4778472", "0.47679475", "0.47558156", "0.47480732", "0.4742919", "0.47385204", "0.47241187", "0.47174102", "0.47148532", "0.47096068", "0.46994498", "0.46956512", "0.46927002", "0.4690411", "0.4689264", "0.46774074", "0.46746746", "0.467091", "0.46606568", "0.46568087", "0.46517566", "0.46472678", "0.46426746", "0.46362585", "0.4633792", "0.46204886", "0.46072882", "0.46047553", "0.45990834", "0.45914176", "0.45914176", "0.4589085", "0.45797607", "0.45786333", "0.4576313", "0.4576095", "0.45720088", "0.45655182", "0.45649007", "0.45611292", "0.45574874", "0.4551662", "0.45358357", "0.45277476", "0.4513221", "0.45048785", "0.45039463", "0.4497684", "0.44964197", "0.44959277", "0.4495406", "0.44922298", "0.44892356", "0.44822025", "0.44822025", "0.4477111", "0.44737568", "0.44737568", "0.44735414", "0.4472008", "0.44719082", "0.44665527", "0.4466143", "0.44566366" ]
0.7155989
0
NewVoiceHistoryExportGetMethodNotAllowed creates a VoiceHistoryExportGetMethodNotAllowed with default headers values
func NewVoiceHistoryExportGetMethodNotAllowed() *VoiceHistoryExportGetMethodNotAllowed { return &VoiceHistoryExportGetMethodNotAllowed{} }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func methodNotAllowed(resp *ApiResponse, msg string) error {\n resp.StatusCode = http.StatusMethodNotAllowed\n resp.Message = []byte(msg)\n resp.ErrorMessage = msg\n\n return nil\n}", "func methodNotAllowed(w http.ResponseWriter){\n w.WriteHeader(405)\n fmt.Fprintln(w, \"Method not allowed\")\n return\n}", "func methodNotAllowed(rw http.ResponseWriter, r *http.Request) {\n\n}", "func (r *Responder) MethodNotAllowed() { r.write(http.StatusMethodNotAllowed) }", "func NewVoiceHistoryExportGetForbidden() *VoiceHistoryExportGetForbidden {\n\treturn &VoiceHistoryExportGetForbidden{}\n}", "func unsupportedMethodHandler(ctx apiContext, w http.ResponseWriter, r *http.Request) {\n\thttp.Error(w, http.StatusText(http.StatusMethodNotAllowed), http.StatusMethodNotAllowed)\n}", "func responseMethodNotAllowed(rw http.ResponseWriter) {\n\tresponseString(rw, http.StatusMethodNotAllowed, \"method not allowed\")\n}", "func methodNotAllowedHandler(w http.ResponseWriter, r *http.Request) {\n\tw.WriteHeader(405)\n\tif _, err := w.Write(nil); err != nil {\n\t\tpanic(err)\n\t}\n}", "func (r *Response) MethodNotAllowed(v interface{}) {\n\tr.writeResponse(http.StatusMethodNotAllowed, v)\n}", "func TestMethodNotSupported(t *testing.T) {\n\tassert := audit.NewTestingAssertion(t, true)\n\t// Setup the test server.\n\tmux := newMultiplexer(assert)\n\tts := restaudit.StartServer(mux, assert)\n\tdefer ts.Close()\n\terr := mux.Register(\"test\", \"no-options\", NewTestHandler(\"no-options\", assert))\n\tassert.Nil(err)\n\t// Perform test requests.\n\treq := restaudit.NewRequest(\"OPTIONS\", \"/base/test/no-options\")\n\tresp := ts.DoRequest(req)\n\tresp.AssertStatusEquals(http.StatusMethodNotAllowed)\n\tresp.AssertBodyContains(\"no-options\")\n}", "func RespondMethodNotAllowed(err error) events.APIGatewayProxyResponse {\n\treturn Respond(http.StatusMethodNotAllowed, Error{Error: err.Error()})\n}", "func MethodNotAllowed(message ...interface{}) Err {\n\treturn Boomify(http.StatusMethodNotAllowed, message...)\n}", "func (client ConversationsClient) SendConversationHistoryMethodResponder(resp *http.Response) (result ResourceResponseType, err error) {\n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK,http.StatusCreated,http.StatusAccepted),\n autorest.ByUnmarshallingJSON(&result),\n autorest.ByClosing())\n result.Response = autorest.Response{Response: resp}\n return\n }", "func (h *HandleHelper) MethodNotAllow() {\n\tMethodNotAllowed(h.w, h.r)\n}", "func notSupported(method string) (int, interface{}, error) {\n\tresponse := make(map[string]string)\n\tcode := http.StatusMethodNotAllowed\n\n\tresponse[\"code\"] = strconv.Itoa(code)\n\tresponse[\"reason\"] = http.StatusText(code)\n\tresponse[\"message\"] = fmt.Sprintf(\"This resource does not support HTTP %s.\", method)\n\treturn code, response, nil\n}", "func (rc RequestCall) SendMethodNotAllowed(ctx context.Context) {\n\trc.Response.ForceWriteHeader(http.StatusMethodNotAllowed)\n\n\ttelemetry.From(ctx).RegisterStatusCode(http.StatusMethodNotAllowed)\n}", "func DefaultOptions(\n server Server,\n transactor *Transactor,\n methods []*RouteControllerHelper,\n) responses.Data {\n var methodStrings []string\n seenMethods := map[RequestMethod]bool{\n MethodOPTIONS: true,\n }\n for _, rch := range(methods) {\n for _, method := range rch.AllMethods() {\n if _, ok := seenMethods[method]; !ok {\n methodStrings = append(methodStrings, method.String())\n seenMethods[method] = true\n }\n }\n }\n sort.Strings(methodStrings)\n methodStrings = append([]string{MethodOPTIONS.String()}, methodStrings...)\n err := transactor.SetHeader(\n \"Access-Control-Allow-Methods\",\n strings.Join(methodStrings, \", \"),\n )\n if err != nil {\n return transactor.Abort(\n http.StatusInternalServerError,\n neterr.DefaultOptionsHeaderSetError,\n neterr.CodedErrorFromError(0, err),\n )\n }\n\n return transactor.Respond(http.StatusOK)\n}", "func SupportedMethods(method string, additional ...string) Middleware {\n\tsupported := make(map[string]bool, len(additional)+1)\n\tsupported[strings.ToUpper(method)] = true\n\tfor _, m := range additional {\n\t\tsupported[strings.ToUpper(m)] = true\n\t}\n\tif supported[http.MethodGet] {\n\t\tsupported[http.MethodHead] = true\n\t}\n\n\tallowed := make([]string, len(supported))\n\ti := 0\n\tfor m := range supported {\n\t\tallowed[i] = m\n\t\ti++\n\t}\n\tsort.Strings(allowed)\n\tallowedHeader := strings.Join(allowed, \",\")\n\n\treturn func(name string, next HandlerFunc) HandlerFunc {\n\t\treturn func(ctx context.Context, w http.ResponseWriter, r *http.Request) error {\n\t\t\tif !supported[r.Method] {\n\t\t\t\tw.Header().Set(AllowHeader, allowedHeader)\n\t\t\t\treturn RawError(\n\t\t\t\t\tMethodNotAllowed(),\n\t\t\t\t\tfmt.Errorf(\"method %q is not supported by %q\", r.Method, name),\n\t\t\t\t\tPlainTextContentType,\n\t\t\t\t)\n\t\t\t}\n\t\t\treturn next(ctx, w, r)\n\t\t}\n\t}\n}", "func NewVoiceHistoryExportGetUnauthorized() *VoiceHistoryExportGetUnauthorized {\n\treturn &VoiceHistoryExportGetUnauthorized{}\n}", "func unsupportedRequestType(t *testing.T, f func(inputs yt_stats.Inputs) http.Handler, url string, rType string) {\n\treq, err := http.NewRequest(rType, url, nil)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\trr := httptest.NewRecorder()\n\thandler := f(getInputs())\n\thandler.ServeHTTP(rr, req)\n\tif status := rr.Code; status != http.StatusMethodNotAllowed {\n\t\tt.Errorf(\"handler returned wrong status code: expected %v actually %v\", http.StatusMethodNotAllowed, status)\n\t}\n\texpected := fmt.Sprintf(`{\"quota_usage\":0,\"status_code\":%d,\"status_message\":\"methodNotSupported\"}`,\n\t\thttp.StatusMethodNotAllowed)\n\tif strings.Trim(rr.Body.String(), \"\\n\") != expected {\n\t\tt.Errorf(\"handler returned wrong body: expected %v actually %v\", expected, rr.Body.String())\n\t}\n}", "func (r Response) MethodNotAllowed(code string, payload Payload, header ...ResponseHeader) {\n\tr.Response(code, http.MethodNotAllowed, payload, header...)\n}", "func notAllowed(w http.ResponseWriter, req *http.Request) {\n\tapiError := apirouter.ErrorFromRequest(req, fmt.Sprintf(\"405 occurred: %s method: %s\", req.RequestURI, req.Method), \"Whoops - this method is not allowed\", http.StatusMethodNotAllowed, http.StatusMethodNotAllowed, \"\")\n\tapirouter.ReturnResponse(w, req, apiError.Code, apiError)\n}", "func renderMethodNotAllowed(w http.ResponseWriter, r *http.Request) {\n\tif r.Proto == \"HTTP/1.1\" {\n\t\tw.WriteHeader(http.StatusMethodNotAllowed)\n\t\tw.Write([]byte(\"Method Not Allowed\"))\n\t} else {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(\"Bad Request\"))\n\t}\n}", "func MethodNotAllowed(w http.ResponseWriter, message ...interface{}) {\n\tboom(w, 405, message...)\n}", "func MethodNotAllowed(w http.ResponseWriter) {\n\thttp.Error(w, \"Method not allowed\", http.StatusMethodNotAllowed)\n}", "func MethodNotAllowed(err error) error {\n\treturn New(http.StatusMethodNotAllowed, err)\n}", "func MethodNotAllowed(w http.ResponseWriter, err error) {\n\tError(w, http.StatusMethodNotAllowed, err)\n}", "func BadMethod(w http.ResponseWriter, _ error) {\n\t(Response{Error: \"method not allowed\"}.json(w, http.StatusMethodNotAllowed))\n}", "func MethodNotAllowedJSON(ctx *gin.Context) {\n\tctx.JSON(200, BaseJSONResponse(http.StatusMethodNotAllowed, \"Method Not Allowed\"))\n}", "func (*MethodsAllowed) Descriptor() ([]byte, []int) {\n\treturn file_external_iam_v2_response_introspect_proto_rawDescGZIP(), []int{0}\n}", "func WriteErr405(w http.ResponseWriter, r *http.Request, methods ...string) {\n\tw.Header().Set(\"Allow\", strings.Join(methods, \", \"))\n\tif r.Method == http.MethodOptions {\n\t\tw.WriteHeader(http.StatusOK)\n\t} else {\n\t\thttp.Error(w, http.StatusText(http.StatusMethodNotAllowed), http.StatusMethodNotAllowed)\n\t}\n}", "func NewVoiceHistoryExportGetNotFound() *VoiceHistoryExportGetNotFound {\n\treturn &VoiceHistoryExportGetNotFound{}\n}", "func (this *Http) NoMethod(handlers ...HandlerFunc) {\n\tthis.noMethod = handlers\n\tthis.rebuild405Handlers()\n}", "func (h methodNotAllowedHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {\n\t// Sets the Allow header\n\tw.Header().Add(\"Allow\", strings.Join(h, \", \"))\n\tw.WriteHeader(http.StatusMethodNotAllowed)\n}", "func (ms *MicroService) NotAllowed(method string, path string) {\n\tfmt.Printf(\"NotAllowed resource [%s] %s\\n\", method, path)\n\tMethodNotAllowed := func(w http.ResponseWriter, r *http.Request, c *Context) {\n\t\tw.WriteHeader(http.StatusMethodNotAllowed)\n\t}\n \n\tms.muxx.Handle(path, Context{\n\t next: AccessLogger{MethodNotAllowed}.ServeHTTP,\n\t}).Methods(method)\n}", "func (o *DepositNewFileMethodNotAllowed) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(405)\n}", "func (app *application) methodNotAllowedResponse(w http.ResponseWriter, r *http.Request) {\n\tmessage := fmt.Sprintf(\"the %s method is not supported for this resource\", r.Method)\n\tapp.errorResponse(w, r, http.StatusMethodNotAllowed, message)\n}", "func (r *Reply) MethodNotAllowed() *Reply {\n\treturn r.Status(http.StatusMethodNotAllowed)\n}", "func MethodNotAllowedHandler(c *Context) error {\n\tmethods := c.Macross().findAllowedMethods(string(c.Path()))\n\tif len(methods) == 0 {\n\t\treturn nil\n\t}\n\tmethods[\"OPTIONS\"] = true\n\tms := make([]string, len(methods))\n\ti := 0\n\tfor method := range methods {\n\t\tms[i] = method\n\t\ti++\n\t}\n\tsort.Strings(ms)\n\tc.Response.Header.Set(\"Allow\", strings.Join(ms, \", \"))\n\tif string(c.Method()) != \"OPTIONS\" {\n\t\tc.Response.SetStatusCode(StatusMethodNotAllowed)\n\t}\n\treturn c.Abort()\n}", "func (s *Server) unsupportedMethod(p *packet.Packet) {\n\tp.Response.StatusCode = http.StatusNotImplemented\n\tp.Response.StatusText = http.StatusText(p.Response.StatusCode)\n}", "func ErrMethodNotAllowedf(format string, arguments ...interface{}) *Status {\n\treturn &Status{Code: http.StatusMethodNotAllowed, Text: fmt.Sprintf(format, arguments...)}\n}", "func newMethod(apiDef *raml.APIDefinition, r *raml.Resource, rd *cr.Resource, m *raml.Method,\n\tmethodName string) (cr.MethodInterface, error) {\n\n\trm := cr.NewMethod(r, rd, m, methodName, setBodyName)\n\n\trm.MethodName = getMethodName(r.FullURI(), rm.DisplayName, methodName)\n\n\trm.ResourcePath = commons.ParamizingURI(rm.Endpoint, \"&\")\n\tif apiDef != nil {\n\t\trm.SecuredBy = security.GetMethodSecuredBy(apiDef, r, m)\n\t}\n\treturn method{Method: &rm}, nil\n}", "func NewVoiceHistoryExportGetDefault(code int) *VoiceHistoryExportGetDefault {\n\treturn &VoiceHistoryExportGetDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewGetFlowMethodNotAllowed() *GetFlowMethodNotAllowed {\n\n\treturn &GetFlowMethodNotAllowed{}\n}", "func (o *GetFlowMethodNotAllowed) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(405)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func (client ConversationsClient) SendConversationHistoryMethodSender(req *http.Request) (*http.Response, error) {\n sd := autorest.GetSendDecorators(req.Context(), autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))\n return autorest.SendWithSender(client, req, sd...)\n }", "func (HttpMethod_Registered) EnumDescriptor() ([]byte, []int) {\n\treturn file_viz_proto_rawDescGZIP(), []int{10, 0}\n}", "func (s *Server) methodNotAllowed(p *packet.Packet) {\n\tp.Response.StatusCode = http.StatusMethodNotAllowed\n\tp.Response.StatusText = http.StatusText(p.Response.StatusCode)\n}", "func (client ConversationsClient) SendConversationHistoryMethod(ctx context.Context, conversationID string, history TranscriptType) (result ResourceResponseType, err error) {\n if tracing.IsEnabled() {\n ctx = tracing.StartSpan(ctx, fqdn + \"/ConversationsClient.SendConversationHistoryMethod\")\n defer func() {\n sc := -1\n if result.Response.Response != nil {\n sc = result.Response.Response.StatusCode\n }\n tracing.EndSpan(ctx, sc, err)\n }()\n }\n req, err := client.SendConversationHistoryMethodPreparer(ctx, conversationID, history)\n if err != nil {\n err = autorest.NewErrorWithError(err, \".ConversationsClient\", \"SendConversationHistoryMethod\", nil , \"Failure preparing request\")\n return\n }\n\n resp, err := client.SendConversationHistoryMethodSender(req)\n if err != nil {\n result.Response = autorest.Response{Response: resp}\n err = autorest.NewErrorWithError(err, \".ConversationsClient\", \"SendConversationHistoryMethod\", resp, \"Failure sending request\")\n return\n }\n\n result, err = client.SendConversationHistoryMethodResponder(resp)\n if err != nil {\n err = autorest.NewErrorWithError(err, \".ConversationsClient\", \"SendConversationHistoryMethod\", resp, \"Failure responding to request\")\n }\n\n return\n }", "func GenerateMethod(resp *svcsdk.Method) *svcapitypes.Method {\n\tcr := &svcapitypes.Method{}\n\n\tif resp.ApiKeyRequired != nil {\n\t\tcr.Spec.ForProvider.APIKeyRequired = resp.ApiKeyRequired\n\t} else {\n\t\tcr.Spec.ForProvider.APIKeyRequired = nil\n\t}\n\tif resp.AuthorizationScopes != nil {\n\t\tf1 := []*string{}\n\t\tfor _, f1iter := range resp.AuthorizationScopes {\n\t\t\tvar f1elem string\n\t\t\tf1elem = *f1iter\n\t\t\tf1 = append(f1, &f1elem)\n\t\t}\n\t\tcr.Spec.ForProvider.AuthorizationScopes = f1\n\t} else {\n\t\tcr.Spec.ForProvider.AuthorizationScopes = nil\n\t}\n\tif resp.AuthorizationType != nil {\n\t\tcr.Spec.ForProvider.AuthorizationType = resp.AuthorizationType\n\t} else {\n\t\tcr.Spec.ForProvider.AuthorizationType = nil\n\t}\n\tif resp.AuthorizerId != nil {\n\t\tcr.Spec.ForProvider.AuthorizerID = resp.AuthorizerId\n\t} else {\n\t\tcr.Spec.ForProvider.AuthorizerID = nil\n\t}\n\tif resp.HttpMethod != nil {\n\t\tcr.Spec.ForProvider.HTTPMethod = resp.HttpMethod\n\t} else {\n\t\tcr.Spec.ForProvider.HTTPMethod = nil\n\t}\n\tif resp.OperationName != nil {\n\t\tcr.Spec.ForProvider.OperationName = resp.OperationName\n\t} else {\n\t\tcr.Spec.ForProvider.OperationName = nil\n\t}\n\tif resp.RequestModels != nil {\n\t\tf6 := map[string]*string{}\n\t\tfor f6key, f6valiter := range resp.RequestModels {\n\t\t\tvar f6val string\n\t\t\tf6val = *f6valiter\n\t\t\tf6[f6key] = &f6val\n\t\t}\n\t\tcr.Spec.ForProvider.RequestModels = f6\n\t} else {\n\t\tcr.Spec.ForProvider.RequestModels = nil\n\t}\n\tif resp.RequestParameters != nil {\n\t\tf7 := map[string]*bool{}\n\t\tfor f7key, f7valiter := range resp.RequestParameters {\n\t\t\tvar f7val bool\n\t\t\tf7val = *f7valiter\n\t\t\tf7[f7key] = &f7val\n\t\t}\n\t\tcr.Spec.ForProvider.RequestParameters = f7\n\t} else {\n\t\tcr.Spec.ForProvider.RequestParameters = nil\n\t}\n\tif resp.RequestValidatorId != nil {\n\t\tcr.Spec.ForProvider.RequestValidatorID = resp.RequestValidatorId\n\t} else {\n\t\tcr.Spec.ForProvider.RequestValidatorID = nil\n\t}\n\n\treturn cr\n}", "func NewDescribeAlarmHistoryRequestWithoutParam() *DescribeAlarmHistoryRequest {\n\n return &DescribeAlarmHistoryRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/regions/{regionId}/describeAlarmHistory\",\n Method: \"GET\",\n Header: nil,\n Version: \"v2\",\n },\n }\n}", "func (r *Responder) HTTPVersionNotSupported() { r.write(http.StatusHTTPVersionNotSupported) }", "func (*HistoryResponse) Descriptor() ([]byte, []int) {\n\treturn file_ric_action_ricaction_proto_rawDescGZIP(), []int{18}\n}", "func (r *Route) methodNotAllowed() http.Handler {\n\n\t// determine what methods ARE supported by this route\n\tmethods := make([]string, 0, 8)\n\n\tfor method := range r.handlers {\n\t\tif method != methodAny && method != notFound {\n\t\t\tmethods = append(methods, method)\n\t\t}\n\t}\n\n\t// 405 only makes sense if some methods are allowed\n\tif len(methods) > 0 {\n\t\treturn methodNotAllowedHandler(methods)\n\t}\n\n\treturn nil\n}", "func NotAllowed(w http.ResponseWriter, r *http.Request) {\n\thandlerMu.RLock()\n\tf, ok := handlerMap[http.StatusMethodNotAllowed]\n\thandlerMu.RUnlock()\n\tif ok {\n\t\tf.ServeHTTP(w, r)\n\t} else {\n\t\tdefaultNotAllowed(w, r)\n\t}\n}", "func (o *ClientPermissionCreateMethodNotAllowed) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(405)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func AllowMethod(w http.ResponseWriter, m string, ms ...string) bool {\n\tfor _, meth := range ms {\n\t\tif m == meth {\n\t\t\treturn true\n\t\t}\n\t}\n\tw.Header().Set(\"Allow\", strings.Join(ms, \",\"))\n\thttp.Error(w, \"Method Not Allowed\", http.StatusMethodNotAllowed)\n\treturn false\n}", "func (t *RestURLDescriptor) MaybeGet() *ggt.MethodDescriptor { return t.methodMaybeGet }", "func (o *AddKeypairMethodNotAllowed) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(405)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func (h *RequestHeader) SetMethod(method string) {\n\th.method = append(h.method[:0], method...)\n}", "func (h *RequestHeader) Method() []byte {\n\tif len(h.method) == 0 {\n\t\treturn []byte(MethodGet)\n\t}\n\treturn h.method\n}", "func (o *UpdateHostIgnitionMethodNotAllowed) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(405)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func (o *SetResourceMethodNotAllowed) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(405)\n}", "func MethodNotAllowedHandler(method string) func(w http.ResponseWriter, r *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Printf(\"Method (%s) not allowed on url (%s)\", r.Method, r.URL.String())\n\t\tservice.WriteProblem(w, fmt.Sprintf(\"Method not allowed. Allowed methods are (%s)\", method), \"ERROR_METHOD_NOT_ALLOWED\", http.StatusMethodNotAllowed, errors.New(\"Method not allowed\"))\n\t}\n}", "func (r *Responder) NotImplemented() { r.write(http.StatusNotImplemented) }", "func (o *GetEventsEventIDMethodNotAllowed) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(405)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func NewBindHostMethodNotAllowed() *BindHostMethodNotAllowed {\n\treturn &BindHostMethodNotAllowed{}\n}", "func NewDisableHostMethodNotAllowed() *DisableHostMethodNotAllowed {\n\treturn &DisableHostMethodNotAllowed{}\n}", "func (t *RestControllerDescriptor) Create() *ggt.MethodDescriptor { return t.methodCreate }", "func notFoundHandler(w http.ResponseWriter, r *http.Request) {\n\tglog.V(0).Infof(\"unsupported %s %s\", r.Method, r.RequestURI)\n\twriteErrorResponse(w, s3err.ErrMethodNotAllowed, r.URL)\n}", "func (HttpMethod_Registered) EnumDescriptor() ([]byte, []int) {\n\treturn file_http_types_proto_rawDescGZIP(), []int{0, 0}\n}", "func (h *RequestHeader) SetProtocol(method string) {\n\th.proto = append(h.proto[:0], method...)\n\th.noHTTP11 = !bytes.Equal(h.proto, strHTTP11)\n}", "func WithMethodNotAllowed(f http.Handler) ConfigOption {\n\treturn ConfigOptionFunc(func(c *Config) { c.MethodNotAllowed = f })\n}", "func (serv *Server) NoMethod(handlers ...Handler) {\n\tAssert(len(handlers) > 0, \"there must be at least one handler\")\n\tAssert(len(serv.middleware)+len(handlers) < int(abortIndex), \"too many handlers\")\n\tserv.noMethod = handlers\n}", "func (mx *Mux) MethodNotAllowed(handlerFn http.HandlerFunc) {\n\t// Build MethodNotAllowed handler chain\n\tmx.methodNotAllowedHandler = handlerFn\n}", "func doNotAllowedTest(t *testing.T, method string, uri string, expected_allow_header string) {\n\tclient := testHttpClient()\n\treq, err := http.NewRequest(method, testServer.URL+uri, nil)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tres, err := client.Do(req)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tif res.StatusCode != 405 {\n\t\tt.Errorf(\"%s %s : Expected HTTP Status Code 405, got %d\\n\", method, uri, res.StatusCode)\n\t}\n\tif res.Header.Get(\"Allow\") == \"\" {\n\t\tt.Errorf(\"%s %s : Expected an 'Allow' HTTP response header, none found\\n\", method, uri)\n\t}\n\tif res.Header.Get(\"Allow\") != expected_allow_header {\n\t\tt.Errorf(\"%s %s : Expected 'Allow' HTTP response header of %s, got %s\\n\", method, uri, expected_allow_header, res.Header.Get(\"Allow\"))\n\t}\n}", "func (o CorsPolicyResponseOutput) AllowMethods() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v CorsPolicyResponse) []string { return v.AllowMethods }).(pulumi.StringArrayOutput)\n}", "func (*HttpMethod) Descriptor() ([]byte, []int) {\n\treturn file_viz_proto_rawDescGZIP(), []int{10}\n}", "func SignalIfMethodNotAllowed(w http.ResponseWriter, r *http.Request, method string) (notAllowed bool) {\n\tnotAllowed = r.Method != method\n\tif notAllowed {\n\t\tw.WriteHeader(http.StatusMethodNotAllowed)\n\t\tw.Write([]byte(`{\"code\": 405, \"msg\": \"Method Not Allowed.\"}`))\n\t}\n\treturn\n}", "func (o *V2PostStepReplyMethodNotAllowed) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(405)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func (client MultipleResponsesClient) Get202None204NoneDefaultNone202InvalidSender(req *http.Request) (*http.Response, error) {\n return autorest.SendWithSender(client, req)\n}", "func NewVoiceHistoryExportGetOK() *VoiceHistoryExportGetOK {\n\treturn &VoiceHistoryExportGetOK{}\n}", "func NewMethod(in *yaml.Node, context *compiler.Context) (*Method, error) {\n\terrors := make([]error, 0)\n\tx := &Method{}\n\tm, ok := compiler.UnpackMap(in)\n\tif !ok {\n\t\tmessage := fmt.Sprintf(\"has unexpected value: %+v (%T)\", in, in)\n\t\terrors = append(errors, compiler.NewError(context, message))\n\t} else {\n\t\tallowedKeys := []string{\"description\", \"etagRequired\", \"flatPath\", \"httpMethod\", \"id\", \"mediaUpload\", \"parameterOrder\", \"parameters\", \"path\", \"request\", \"response\", \"scopes\", \"streamingType\", \"supportsMediaDownload\", \"supportsMediaUpload\", \"supportsSubscription\", \"useMediaDownloadService\"}\n\t\tvar allowedPatterns []*regexp.Regexp\n\t\tinvalidKeys := compiler.InvalidKeysInMap(m, allowedKeys, allowedPatterns)\n\t\tif len(invalidKeys) > 0 {\n\t\t\tmessage := fmt.Sprintf(\"has invalid %s: %+v\", compiler.PluralProperties(len(invalidKeys)), strings.Join(invalidKeys, \", \"))\n\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t}\n\t\t// string id = 1;\n\t\tv1 := compiler.MapValueForKey(m, \"id\")\n\t\tif v1 != nil {\n\t\t\tx.Id, ok = compiler.StringForScalarNode(v1)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for id: %s\", compiler.Display(v1))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// string path = 2;\n\t\tv2 := compiler.MapValueForKey(m, \"path\")\n\t\tif v2 != nil {\n\t\t\tx.Path, ok = compiler.StringForScalarNode(v2)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for path: %s\", compiler.Display(v2))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// string http_method = 3;\n\t\tv3 := compiler.MapValueForKey(m, \"httpMethod\")\n\t\tif v3 != nil {\n\t\t\tx.HttpMethod, ok = compiler.StringForScalarNode(v3)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for httpMethod: %s\", compiler.Display(v3))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// string description = 4;\n\t\tv4 := compiler.MapValueForKey(m, \"description\")\n\t\tif v4 != nil {\n\t\t\tx.Description, ok = compiler.StringForScalarNode(v4)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for description: %s\", compiler.Display(v4))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// Parameters parameters = 5;\n\t\tv5 := compiler.MapValueForKey(m, \"parameters\")\n\t\tif v5 != nil {\n\t\t\tvar err error\n\t\t\tx.Parameters, err = NewParameters(v5, compiler.NewContext(\"parameters\", v5, context))\n\t\t\tif err != nil {\n\t\t\t\terrors = append(errors, err)\n\t\t\t}\n\t\t}\n\t\t// repeated string parameter_order = 6;\n\t\tv6 := compiler.MapValueForKey(m, \"parameterOrder\")\n\t\tif v6 != nil {\n\t\t\tv, ok := compiler.SequenceNodeForNode(v6)\n\t\t\tif ok {\n\t\t\t\tx.ParameterOrder = compiler.StringArrayForSequenceNode(v)\n\t\t\t} else {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for parameterOrder: %s\", compiler.Display(v6))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// Request request = 7;\n\t\tv7 := compiler.MapValueForKey(m, \"request\")\n\t\tif v7 != nil {\n\t\t\tvar err error\n\t\t\tx.Request, err = NewRequest(v7, compiler.NewContext(\"request\", v7, context))\n\t\t\tif err != nil {\n\t\t\t\terrors = append(errors, err)\n\t\t\t}\n\t\t}\n\t\t// Response response = 8;\n\t\tv8 := compiler.MapValueForKey(m, \"response\")\n\t\tif v8 != nil {\n\t\t\tvar err error\n\t\t\tx.Response, err = NewResponse(v8, compiler.NewContext(\"response\", v8, context))\n\t\t\tif err != nil {\n\t\t\t\terrors = append(errors, err)\n\t\t\t}\n\t\t}\n\t\t// repeated string scopes = 9;\n\t\tv9 := compiler.MapValueForKey(m, \"scopes\")\n\t\tif v9 != nil {\n\t\t\tv, ok := compiler.SequenceNodeForNode(v9)\n\t\t\tif ok {\n\t\t\t\tx.Scopes = compiler.StringArrayForSequenceNode(v)\n\t\t\t} else {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for scopes: %s\", compiler.Display(v9))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// bool supports_media_download = 10;\n\t\tv10 := compiler.MapValueForKey(m, \"supportsMediaDownload\")\n\t\tif v10 != nil {\n\t\t\tx.SupportsMediaDownload, ok = compiler.BoolForScalarNode(v10)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for supportsMediaDownload: %s\", compiler.Display(v10))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// bool supports_media_upload = 11;\n\t\tv11 := compiler.MapValueForKey(m, \"supportsMediaUpload\")\n\t\tif v11 != nil {\n\t\t\tx.SupportsMediaUpload, ok = compiler.BoolForScalarNode(v11)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for supportsMediaUpload: %s\", compiler.Display(v11))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// bool use_media_download_service = 12;\n\t\tv12 := compiler.MapValueForKey(m, \"useMediaDownloadService\")\n\t\tif v12 != nil {\n\t\t\tx.UseMediaDownloadService, ok = compiler.BoolForScalarNode(v12)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for useMediaDownloadService: %s\", compiler.Display(v12))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// MediaUpload media_upload = 13;\n\t\tv13 := compiler.MapValueForKey(m, \"mediaUpload\")\n\t\tif v13 != nil {\n\t\t\tvar err error\n\t\t\tx.MediaUpload, err = NewMediaUpload(v13, compiler.NewContext(\"mediaUpload\", v13, context))\n\t\t\tif err != nil {\n\t\t\t\terrors = append(errors, err)\n\t\t\t}\n\t\t}\n\t\t// bool supports_subscription = 14;\n\t\tv14 := compiler.MapValueForKey(m, \"supportsSubscription\")\n\t\tif v14 != nil {\n\t\t\tx.SupportsSubscription, ok = compiler.BoolForScalarNode(v14)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for supportsSubscription: %s\", compiler.Display(v14))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// string flat_path = 15;\n\t\tv15 := compiler.MapValueForKey(m, \"flatPath\")\n\t\tif v15 != nil {\n\t\t\tx.FlatPath, ok = compiler.StringForScalarNode(v15)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for flatPath: %s\", compiler.Display(v15))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// bool etag_required = 16;\n\t\tv16 := compiler.MapValueForKey(m, \"etagRequired\")\n\t\tif v16 != nil {\n\t\t\tx.EtagRequired, ok = compiler.BoolForScalarNode(v16)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for etagRequired: %s\", compiler.Display(v16))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// string streaming_type = 17;\n\t\tv17 := compiler.MapValueForKey(m, \"streamingType\")\n\t\tif v17 != nil {\n\t\t\tx.StreamingType, ok = compiler.StringForScalarNode(v17)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for streamingType: %s\", compiler.Display(v17))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t}\n\treturn x, compiler.NewErrorGroupOrNil(errors)\n}", "func Test_Ctx_InvalidMethod(t *testing.T) {\n\tt.Parallel()\n\tapp := New()\n\tapp.Get(\"/\", func(c *Ctx) {})\n\n\tfctx := &fasthttp.RequestCtx{}\n\tfctx.Request.Header.SetMethod(\"InvalidMethod\")\n\tfctx.Request.SetRequestURI(\"/\")\n\n\tapp.handler(fctx)\n\n\tutils.AssertEqual(t, 400, fctx.Response.StatusCode())\n\tutils.AssertEqual(t, []byte(\"Invalid http method\"), fctx.Response.Body())\n}", "func NewVoiceHistoryExportGetTooManyRequests() *VoiceHistoryExportGetTooManyRequests {\n\treturn &VoiceHistoryExportGetTooManyRequests{}\n}", "func RenderMethodNotAllowed(w http.ResponseWriter, message ...interface{}) {\n\tRender(w, MethodNotAllowed(message...))\n}", "func (r Response) HTTPVersionNotSupported(code string, payload Payload, header ...ResponseHeader) {\n\tr.Response(code, http.VersionNotSupported, payload, header...)\n}", "func HTTPMethodToString(method *pb.HttpMethod) string {\n\t// Check Unregistered first as Registered (being an enum) defaults\n\t// to GET when empty\n\tif method.GetUnregistered() != \"\" {\n\t\treturn method.GetUnregistered()\n\t}\n\treturn method.GetRegistered().String()\n}", "func NoMethodHandler() gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\tc.JSON(405, gin.H{\"message\": \"method not allowed\"})\n\t}\n}", "func NewGetOrderMethodNotAllowed() *GetOrderMethodNotAllowed {\n\treturn &GetOrderMethodNotAllowed{}\n}", "func NewGetIPAMSearchMethodNotAllowed() *GetIPAMSearchMethodNotAllowed {\n\treturn &GetIPAMSearchMethodNotAllowed{}\n}", "func (o *PostBackendsOauth2MethodNotAllowed) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(405)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func (r *Router) MethodNotAllowed(c func(ctx *Context)) {\n\tr.router.MethodNotAllowed = c\n}", "func (t *RestControllerDescriptor) Remove() *ggt.MethodDescriptor { return t.methodRemove }", "func notFound(c router.Control) {\n\tc.Code(http.StatusNotFound)\n\tc.Body(\"Method not found for \" + c.Request().URL.Path)\n}", "func (o *AddRegionAZMethodNotAllowed) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.Header().Del(runtime.HeaderContentType) //Remove Content-Type on empty responses\n\n\trw.WriteHeader(405)\n}", "func (*HttpMethod) Descriptor() ([]byte, []int) {\n\treturn file_http_types_proto_rawDescGZIP(), []int{0}\n}", "func (client MultipleResponsesClient) Get202None204NoneDefaultNone400InvalidSender(req *http.Request) (*http.Response, error) {\n return autorest.SendWithSender(client, req)\n}", "func CreateNotificaNoVoiceCall(w http.ResponseWriter, r *http.Request) {\n\n\t//Crea p come tipo Notifica con i suoi structs\n\tvar p Notifica\n\tdecoder := json.NewDecoder(r.Body)\n\tif err := decoder.Decode(&p); err != nil {\n\t\trespondWithError(w, http.StatusBadRequest, \"Invalid request payload\")\n\t\treturn\n\t}\n\tdefer r.Body.Close()\n\n\t//fmt.Println(p) //debug\n\n\thostname, err := url.QueryUnescape(p.Hostname)\n\n\tservice, err := url.QueryUnescape(p.Service)\n\n\tpiattaforma, err := url.QueryUnescape(p.Piattaforma)\n\n\treperibile, err := url.QueryUnescape(p.Reperibile)\n\n\tcellulare, err := url.QueryUnescape(p.Cellulare)\n\n\tmessaggio, err := url.QueryUnescape(p.Messaggio)\n\n\tif err != nil {\n\t\trespondWithError(w, http.StatusBadRequest, err.Error())\n\t\tlog.Fatal(err.Error())\n\t\treturn\n\t}\n\n\tresult := fmt.Sprintf(\"Ok. campi ricevuti: Hostname: %s, Service: %s, Piattaforma: %s, Reperibile: %s, Cellulare: %s, Messaggio: %s\", hostname, service, piattaforma, reperibile, cellulare, messaggio)\n\n\trespondWithJSON(w, http.StatusCreated, result)\n\t//log.Println(\"ok\")\n\n\tfmt.Println(time.Now().Format(\"2006-01-02 15:04:05\"), result)\n\n\t//Invia cmq la chiamata se è per la piattaforma CDN\n\tif piattaforma == \"CDN\" {\n\t\tCellpertest := viper.GetString(\"Cellpertest\")\n\t\tif len(Cellpertest) != 0 {\n\t\t\treperibile = Cellpertest\n\t\t\tlog.Println(\"Impostato reperibile di test\", reperibile)\n\t\t}\n\t\torariofobstr := viper.GetString(\"OrarioFob\")\n\t\torariofob, err := strconv.Atoi(orariofobstr)\n\t\tif err != nil {\n\t\t\tlog.Println(err.Error())\n\t\t}\n\t\tlog.Println(\"L'orario impostato per inizio FOB è\", orariofob)\n\t\t//Se siamo in fuori orario base\n\t\tif fob := isfob(time.Now(), orariofob); fob == true {\n\t\t\tfmt.Println(\"Siamo in FOB. Notifiche vocali attive!\")\n\t\t\t//Verifica che sia passato abbastanza tempo dall'ultima chiamata prima di chiamare nuovamente\n\t\t\terrstorm := AntiStorm(p.Piattaforma)\n\t\t\tif errstorm != nil {\n\t\t\t\tlog.Println(errstorm)\n\t\t\t\treturn\n\t\t\t}\n\t\t\t//Logga sul db la notifica in entrata\n\t\t\terr := LogNotifica(p)\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err.Error())\n\t\t\t}\n\t\t\tCreateCall(hostname, service, piattaforma, reperibile, cellulare, messaggio)\n\n\t\t}\n\n\t}\n\n\treturn\n}", "func NewDepositNewFileMethodNotAllowed() *DepositNewFileMethodNotAllowed {\n\treturn &DepositNewFileMethodNotAllowed{}\n}" ]
[ "0.58754605", "0.55080956", "0.5373964", "0.5297997", "0.5274845", "0.523363", "0.51573926", "0.51211447", "0.5111701", "0.5092046", "0.5090219", "0.50626075", "0.5062472", "0.5054269", "0.5051052", "0.50156367", "0.4994693", "0.49753666", "0.49381858", "0.49340644", "0.4917248", "0.49171364", "0.49136487", "0.49000704", "0.4818894", "0.47984162", "0.47982234", "0.47594643", "0.4739432", "0.47145656", "0.47036552", "0.46357667", "0.46353683", "0.4632236", "0.46011326", "0.4599227", "0.4572303", "0.4568249", "0.4559307", "0.45576185", "0.45518196", "0.45448664", "0.4517765", "0.45113564", "0.44951594", "0.44767335", "0.44497737", "0.44441426", "0.44144726", "0.4392717", "0.43849298", "0.4377713", "0.4374436", "0.43615726", "0.43546623", "0.4352167", "0.43504393", "0.43345723", "0.43270427", "0.43224117", "0.4321251", "0.43201098", "0.43097866", "0.43078476", "0.43042004", "0.43019447", "0.42986324", "0.42877522", "0.4272309", "0.42634606", "0.42612916", "0.42611355", "0.425079", "0.42388338", "0.42339388", "0.42288992", "0.42241552", "0.42231226", "0.42224303", "0.42216027", "0.42203507", "0.42168108", "0.4213389", "0.42126274", "0.4203176", "0.4201045", "0.41966492", "0.4195111", "0.4192252", "0.4188866", "0.4187925", "0.41813624", "0.41779166", "0.41755503", "0.41743565", "0.4173002", "0.41711807", "0.41704935", "0.41659203", "0.41605407" ]
0.74862516
0
NewVoiceHistoryExportGetTooManyRequests creates a VoiceHistoryExportGetTooManyRequests with default headers values
func NewVoiceHistoryExportGetTooManyRequests() *VoiceHistoryExportGetTooManyRequests { return &VoiceHistoryExportGetTooManyRequests{} }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (r *Responder) TooManyRequests() { r.write(http.StatusTooManyRequests) }", "func TooManyRequests(w http.ResponseWriter, message ...interface{}) {\n\tboom(w, 429, message...)\n}", "func TooManyRequests(message ...interface{}) Err {\n\treturn Boomify(http.StatusTooManyRequests, message...)\n}", "func (r *Responder) RequestHeaderFieldsTooLarge() { r.write(http.StatusRequestHeaderFieldsTooLarge) }", "func (r Response) TooManyRequests(code string, payload Payload, header ...ResponseHeader) {\n\tr.Response(code, http.TooManyRequests, payload, header...)\n}", "func TooManyRequests() echo.Checker {\n\tcodeStr := strconv.Itoa(http.StatusTooManyRequests)\n\treturn func(result echo.CallResult, _ error) error {\n\t\tfor _, r := range result.Responses {\n\t\t\tif codeStr == r.Code {\n\t\t\t\t// Successfully received too many requests.\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t\treturn errors.New(\"no request received StatusTooManyRequest error\")\n\t}\n}", "func Exhausted(w http.ResponseWriter, err error) {\n\t(Response{Error: err.Error()}).json(w, http.StatusTooManyRequests)\n}", "func ErrTooManyRequestsf(format string, arguments ...interface{}) *Status {\n\treturn &Status{Code: http.StatusTooManyRequests, Text: fmt.Sprintf(format, arguments...)}\n}", "func newLimiter() *limiter.Limiter {\n\n\tlmt := tollbooth.NewLimiter(2, &limiter.ExpirableOptions{DefaultExpirationTTL: time.Hour})\n\n\tlmt.SetIPLookups([]string{\"X-Forwarded-For\", \"RemoteAddr\", \"X-Real-IP\"})\n\tlmt.SetOnLimitReached(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Println(\"request limit reached\")\n\t})\n\n\treturn lmt\n\n}", "func (w *response) requestTooLarge() {\n\tw.closeAfterReply = true\n\tw.requestBodyLimitHit = true\n\tif !w.wroteHeader {\n\t\tw.Header().Set(\"Connection\", \"close\")\n\t}\n}", "func (l *Limiter) limit(w http.ResponseWriter, r *http.Request, h http.Handler) {\n\tavailable := l.bucket.TakeAvailable(1)\n\n\theaders := w.Header()\n\theaders.Set(\"X-RateLimit-Limit\", strconv.Itoa(l.capacity()))\n\theaders.Set(\"X-RateLimit-Remaining\", strconv.Itoa(l.remaining()))\n\n\t// If tokens are not available, reply with error, usually with 429\n\tif available == 0 {\n\t\tl.responder(w, r)\n\t\treturn\n\t}\n\n\t// Otherwise track time and forward the request\n\th.ServeHTTP(w, r)\n}", "func TestDeprecatedUsage(t *testing.T) {\n\t// Declare interfaces to statically check that names haven't changed\n\tvar st throttled.Store\n\tvar thr *throttled.Throttler\n\tvar q throttled.Quota\n\n\tst = store.NewMemStore(100)\n\tvary := &throttled.VaryBy{Path: true}\n\tq = throttled.PerMin(2)\n\tthr = throttled.RateLimit(q, vary, st)\n\thandler := thr.Throttle(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.WriteHeader(200)\n\t}))\n\n\tcases := []struct {\n\t\tpath string\n\t\tcode int\n\t\theaders map[string]string\n\t}{\n\t\t{\"/foo\", 200, map[string]string{\"X-Ratelimit-Limit\": \"2\", \"X-Ratelimit-Remaining\": \"1\", \"X-Ratelimit-Reset\": \"30\"}},\n\t\t{\"/foo\", 200, map[string]string{\"X-Ratelimit-Limit\": \"2\", \"X-Ratelimit-Remaining\": \"0\", \"X-Ratelimit-Reset\": \"60\"}},\n\t\t{\"/foo\", 429, map[string]string{\"X-Ratelimit-Limit\": \"2\", \"X-Ratelimit-Remaining\": \"0\", \"X-Ratelimit-Reset\": \"60\", \"Retry-After\": \"30\"}},\n\t\t{\"/bar\", 200, map[string]string{\"X-Ratelimit-Limit\": \"2\", \"X-Ratelimit-Remaining\": \"1\", \"X-Ratelimit-Reset\": \"30\"}},\n\t}\n\n\tfor i, c := range cases {\n\t\treq, err := http.NewRequest(\"GET\", c.path, nil)\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\n\t\trr := httptest.NewRecorder()\n\t\thandler.ServeHTTP(rr, req)\n\t\tif have, want := rr.Code, c.code; have != want {\n\t\t\tt.Errorf(\"Expected request %d at %s to return %d but got %d\",\n\t\t\t\ti, c.path, want, have)\n\t\t}\n\n\t\tfor name, want := range c.headers {\n\t\t\tif have := rr.HeaderMap.Get(name); have != want {\n\t\t\t\tt.Errorf(\"Expected request %d at %s to have header '%s: %s' but got '%s'\",\n\t\t\t\t\ti, c.path, name, want, have)\n\t\t\t}\n\t\t}\n\t}\n}", "func HeaderFieldsTooLarge(message ...interface{}) Err {\n\treturn Boomify(http.StatusRequestHeaderFieldsTooLarge, message...)\n}", "func NewVoiceHistoryExportGetForbidden() *VoiceHistoryExportGetForbidden {\n\treturn &VoiceHistoryExportGetForbidden{}\n}", "func MaxAPIKeys(msg string) ErrorResponse {\n\tif msg == \"\" {\n\t\tmsg = \"You are not authorized to perform the requested action anymore.\"\n\t}\n\treturn ErrorResponse{\n\t\tStatus: http.StatusForbidden,\n\t\tMessage: msg,\n\t}\n}", "func (r Response) RequestHeaderFieldsTooLarge(code string, payload Payload, header ...ResponseHeader) {\n\tr.Response(code, http.RequestHeaderFieldsTooLarge, payload, header...)\n}", "func DefaultLimitReachedHandler(w http.ResponseWriter, r *http.Request) {\n\thttp.Error(w, \"Limit exceeded\", http.StatusTooManyRequests)\n}", "func RateLimit(r *http.Response) int {\n\treturn intResponseHeaderOrNegOne(r, \"X-RateLimit-Limit\")\n}", "func asErrRateLimit(resp *http.Response) *ErrRateLimit {\n\trateLimitResetHeader := resp.Header.Get(\"X-RateLimit-Reset\")\n\trateLimitReset, err := strconv.Atoi(rateLimitResetHeader)\n\tif err != nil {\n\t\treturn nil\n\t}\n\n\trateLimitRemainingHeader := resp.Header.Get(\"X-RateLimit-Remaining\")\n\trateLimitRemaining, err := strconv.Atoi(rateLimitRemainingHeader)\n\tif err != nil {\n\t\treturn nil\n\t}\n\n\tif rateLimitRemaining == 0 {\n\t\treturn &ErrRateLimit{\n\t\t\terrRetryLater{time.Unix(int64(rateLimitReset)+1, 0)},\n\t\t}\n\t}\n\n\treturn nil\n}", "func (o *ListAvailableStreamsOAuth2TooManyRequests) Code() int {\n\treturn 429\n}", "func (r *Responder) RequestEntityTooLarge() { r.write(http.StatusRequestEntityTooLarge) }", "func Test_Limiter_Fixed_Window_Custom_Storage_No_Skip_Choices(t *testing.T) {\n\tt.Parallel()\n\tapp := fiber.New()\n\n\tapp.Use(New(Config{\n\t\tMax: 2,\n\t\tExpiration: 2 * time.Second,\n\t\tSkipFailedRequests: false,\n\t\tSkipSuccessfulRequests: false,\n\t\tStorage: memory.New(),\n\t\tLimiterMiddleware: FixedWindow{},\n\t}))\n\n\tapp.Get(\"/:status\", func(c *fiber.Ctx) error {\n\t\tif c.Params(\"status\") == \"fail\" {\n\t\t\treturn c.SendStatus(400)\n\t\t}\n\t\treturn c.SendStatus(200)\n\t})\n\n\tresp, err := app.Test(httptest.NewRequest(fiber.MethodGet, \"/fail\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 400, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 429, resp.StatusCode)\n\n\ttime.Sleep(3 * time.Second)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n}", "func NewLimiter(max int64, ttl time.Duration, conf *rate.ConfigRedis) *Limiter {\n\tlimiter := &Limiter{Max: max, TTL: ttl}\n\tlimiter.MessageContentType = \"text/plain; charset=utf-8\"\n\tlimiter.Message = \"You have reached maximum request limit.\"\n\tlimiter.StatusCode = 429\n\tlimiter.tokenBuckets = make(map[string]*rate.Limiter)\n\tlimiter.IPLookups = []string{\"RemoteAddr\", \"X-Forwarded-For\", \"X-Real-IP\"}\n\n\tif err := rate.SetRedis(conf); err != nil {\n\t\tlog.Println(\"fail to set rate limiter's redis: \", err)\n\t}\n\n\treturn limiter\n}", "func Test_Limiter_Sliding_Window_Custom_Storage_No_Skip_Choices(t *testing.T) {\n\tt.Parallel()\n\tapp := fiber.New()\n\n\tapp.Use(New(Config{\n\t\tMax: 2,\n\t\tExpiration: 2 * time.Second,\n\t\tSkipFailedRequests: false,\n\t\tSkipSuccessfulRequests: false,\n\t\tStorage: memory.New(),\n\t\tLimiterMiddleware: SlidingWindow{},\n\t}))\n\n\tapp.Get(\"/:status\", func(c *fiber.Ctx) error {\n\t\tif c.Params(\"status\") == \"fail\" {\n\t\t\treturn c.SendStatus(400)\n\t\t}\n\t\treturn c.SendStatus(200)\n\t})\n\n\tresp, err := app.Test(httptest.NewRequest(fiber.MethodGet, \"/fail\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 400, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 429, resp.StatusCode)\n\n\ttime.Sleep(4 * time.Second)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n}", "func (client *RecommendationsClient) listHistoryForWebAppCreateRequest(ctx context.Context, resourceGroupName string, siteName string, options *RecommendationsClientListHistoryForWebAppOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{siteName}/recommendationHistory\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif siteName == \"\" {\n\t\treturn nil, errors.New(\"parameter siteName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{siteName}\", url.PathEscape(siteName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.ExpiredOnly != nil {\n\t\treqQP.Set(\"expiredOnly\", strconv.FormatBool(*options.ExpiredOnly))\n\t}\n\treqQP.Set(\"api-version\", \"2021-03-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tunencodedParams := []string{req.Raw().URL.RawQuery}\n\tif options != nil && options.Filter != nil {\n\t\tunencodedParams = append(unencodedParams, \"$filter=\"+*options.Filter)\n\t}\n\treq.Raw().URL.RawQuery = strings.Join(unencodedParams, \"&\")\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func WrapHistory(h Handler, w http.ResponseWriter, r *http.Request) {\n\tvar aOffset *int32\n\tvar aLimit *int32\n\n\tq := r.URL.Query()\n\n\tif _, ok := q[\"offset\"]; ok {\n\t\t{\n\t\t\tparsed, err := strconv.ParseInt(q.Get(\"offset\"), 10, 32)\n\t\t\tif err != nil {\n\t\t\t\thttp.Error(w, \"Parameter 'offset': \"+err.Error(), http.StatusBadRequest)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tconverted := int32(parsed)\n\t\t\taOffset = &converted\n\t\t}\n\t}\n\n\tif _, ok := q[\"limit\"]; ok {\n\t\t{\n\t\t\tparsed, err := strconv.ParseInt(q.Get(\"limit\"), 10, 32)\n\t\t\tif err != nil {\n\t\t\t\thttp.Error(w, \"Parameter 'limit': \"+err.Error(), http.StatusBadRequest)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tconverted := int32(parsed)\n\t\t\taLimit = &converted\n\t\t}\n\t}\n\n\th.History(w,\n\t\tr,\n\t\taOffset,\n\t\taLimit)\n}", "func (o *GetStatisticsHistoryParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.requestTimeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Begin != nil {\n\n\t\t// query param begin\n\t\tvar qrBegin int64\n\t\tif o.Begin != nil {\n\t\t\tqrBegin = *o.Begin\n\t\t}\n\t\tqBegin := swag.FormatInt64(qrBegin)\n\t\tif qBegin != \"\" {\n\t\t\tif err := r.SetQueryParam(\"begin\", qBegin); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Degraded != nil {\n\n\t\t// query param degraded\n\t\tvar qrDegraded bool\n\t\tif o.Degraded != nil {\n\t\t\tqrDegraded = *o.Degraded\n\t\t}\n\t\tqDegraded := swag.FormatBool(qrDegraded)\n\t\tif qDegraded != \"\" {\n\t\t\tif err := r.SetQueryParam(\"degraded\", qDegraded); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tvaluesDevid := o.Devid\n\n\tjoinedDevid := swag.JoinByFormat(valuesDevid, \"\")\n\t// query array param devid\n\tif err := r.SetQueryParam(\"devid\", joinedDevid...); err != nil {\n\t\treturn err\n\t}\n\n\tif o.End != nil {\n\n\t\t// query param end\n\t\tvar qrEnd int64\n\t\tif o.End != nil {\n\t\t\tqrEnd = *o.End\n\t\t}\n\t\tqEnd := swag.FormatInt64(qrEnd)\n\t\tif qEnd != \"\" {\n\t\t\tif err := r.SetQueryParam(\"end\", qEnd); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.ExpandClientid != nil {\n\n\t\t// query param expand_clientid\n\t\tvar qrExpandClientid bool\n\t\tif o.ExpandClientid != nil {\n\t\t\tqrExpandClientid = *o.ExpandClientid\n\t\t}\n\t\tqExpandClientid := swag.FormatBool(qrExpandClientid)\n\t\tif qExpandClientid != \"\" {\n\t\t\tif err := r.SetQueryParam(\"expand_clientid\", qExpandClientid); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Interval != nil {\n\n\t\t// query param interval\n\t\tvar qrInterval int64\n\t\tif o.Interval != nil {\n\t\t\tqrInterval = *o.Interval\n\t\t}\n\t\tqInterval := swag.FormatInt64(qrInterval)\n\t\tif qInterval != \"\" {\n\t\t\tif err := r.SetQueryParam(\"interval\", qInterval); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tvaluesKey := o.Key\n\n\tjoinedKey := swag.JoinByFormat(valuesKey, \"\")\n\t// query array param key\n\tif err := r.SetQueryParam(\"key\", joinedKey...); err != nil {\n\t\treturn err\n\t}\n\n\tvaluesKeys := o.Keys\n\n\tjoinedKeys := swag.JoinByFormat(valuesKeys, \"\")\n\t// query array param keys\n\tif err := r.SetQueryParam(\"keys\", joinedKeys...); err != nil {\n\t\treturn err\n\t}\n\n\tif o.MemoryOnly != nil {\n\n\t\t// query param memory_only\n\t\tvar qrMemoryOnly bool\n\t\tif o.MemoryOnly != nil {\n\t\t\tqrMemoryOnly = *o.MemoryOnly\n\t\t}\n\t\tqMemoryOnly := swag.FormatBool(qrMemoryOnly)\n\t\tif qMemoryOnly != \"\" {\n\t\t\tif err := r.SetQueryParam(\"memory_only\", qMemoryOnly); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Resolution != nil {\n\n\t\t// query param resolution\n\t\tvar qrResolution int64\n\t\tif o.Resolution != nil {\n\t\t\tqrResolution = *o.Resolution\n\t\t}\n\t\tqResolution := swag.FormatInt64(qrResolution)\n\t\tif qResolution != \"\" {\n\t\t\tif err := r.SetQueryParam(\"resolution\", qResolution); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Substr != nil {\n\n\t\t// query param substr\n\t\tvar qrSubstr bool\n\t\tif o.Substr != nil {\n\t\t\tqrSubstr = *o.Substr\n\t\t}\n\t\tqSubstr := swag.FormatBool(qrSubstr)\n\t\tif qSubstr != \"\" {\n\t\t\tif err := r.SetQueryParam(\"substr\", qSubstr); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Timeout != nil {\n\n\t\t// query param timeout\n\t\tvar qrTimeout int64\n\t\tif o.Timeout != nil {\n\t\t\tqrTimeout = *o.Timeout\n\t\t}\n\t\tqTimeout := swag.FormatInt64(qrTimeout)\n\t\tif qTimeout != \"\" {\n\t\t\tif err := r.SetQueryParam(\"timeout\", qTimeout); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func NewDescribeAlarmHistoryRequestWithoutParam() *DescribeAlarmHistoryRequest {\n\n return &DescribeAlarmHistoryRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/regions/{regionId}/describeAlarmHistory\",\n Method: \"GET\",\n Header: nil,\n Version: \"v2\",\n },\n }\n}", "func NewGetBicsTooManyRequests() *GetBicsTooManyRequests {\n\treturn &GetBicsTooManyRequests{}\n}", "func Test_Limiter_Fixed_Window_Custom_Storage_Skip_Failed_Requests(t *testing.T) {\n\tt.Parallel()\n\tapp := fiber.New()\n\n\tapp.Use(New(Config{\n\t\tMax: 1,\n\t\tExpiration: 2 * time.Second,\n\t\tStorage: memory.New(),\n\t\tSkipFailedRequests: true,\n\t\tLimiterMiddleware: FixedWindow{},\n\t}))\n\n\tapp.Get(\"/:status\", func(c *fiber.Ctx) error {\n\t\tif c.Params(\"status\") == \"fail\" {\n\t\t\treturn c.SendStatus(400)\n\t\t}\n\t\treturn c.SendStatus(200)\n\t})\n\n\tresp, err := app.Test(httptest.NewRequest(fiber.MethodGet, \"/fail\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 400, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 429, resp.StatusCode)\n\n\ttime.Sleep(3 * time.Second)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n}", "func Test_Limiter_Sliding_Window_Custom_Storage_Skip_Failed_Requests(t *testing.T) {\n\tt.Parallel()\n\tapp := fiber.New()\n\n\tapp.Use(New(Config{\n\t\tMax: 1,\n\t\tExpiration: 2 * time.Second,\n\t\tStorage: memory.New(),\n\t\tSkipFailedRequests: true,\n\t\tLimiterMiddleware: SlidingWindow{},\n\t}))\n\n\tapp.Get(\"/:status\", func(c *fiber.Ctx) error {\n\t\tif c.Params(\"status\") == \"fail\" {\n\t\t\treturn c.SendStatus(400)\n\t\t}\n\t\treturn c.SendStatus(200)\n\t})\n\n\tresp, err := app.Test(httptest.NewRequest(fiber.MethodGet, \"/fail\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 400, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 429, resp.StatusCode)\n\n\ttime.Sleep(4 * time.Second)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n}", "func (client *RecommendationsClient) listHistoryForWebAppCreateRequest(ctx context.Context, resourceGroupName string, siteName string, options *RecommendationsListHistoryForWebAppOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{siteName}/recommendationHistory\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif siteName == \"\" {\n\t\treturn nil, errors.New(\"parameter siteName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{siteName}\", url.PathEscape(siteName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.ExpiredOnly != nil {\n\t\treqQP.Set(\"expiredOnly\", strconv.FormatBool(*options.ExpiredOnly))\n\t}\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tunencodedParams := []string{req.Raw().URL.RawQuery}\n\tif options != nil && options.Filter != nil {\n\t\tunencodedParams = append(unencodedParams, \"$filter=\"+*options.Filter)\n\t}\n\treq.Raw().URL.RawQuery = strings.Join(unencodedParams, \"&\")\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func RenderTooManyRequests(w http.ResponseWriter, message ...interface{}) {\n\tRender(w, TooManyRequests(message...))\n}", "func NewVoiceHistoryExportGetBadRequest() *VoiceHistoryExportGetBadRequest {\n\treturn &VoiceHistoryExportGetBadRequest{}\n}", "func RateLimit(max float64) gin.HandlerFunc {\n\n\tlmt := tollbooth.NewLimiter(max, nil)\n\n\treturn func(c *gin.Context) {\n\t\thttpError := tollbooth.LimitByRequest(lmt, c.Writer, c.Request)\n\t\tif httpError != nil {\n\t\t\tc.Data(httpError.StatusCode, lmt.GetMessageContentType(), []byte(httpError.Message))\n\t\t\tc.Abort()\n\t\t} else {\n\t\t\tc.Next()\n\t\t}\n\t}\n}", "func NewGetPayportTooManyRequests() *GetPayportTooManyRequests {\n\treturn &GetPayportTooManyRequests{}\n}", "func asErrAbuseRateLimit(resp *http.Response, logger log.Logger, defaultSleep time.Duration) *ErrAbuseRateLimit {\n\tif resp.StatusCode != http.StatusForbidden {\n\t\treturn nil\n\t}\n\n\tretryInHeader := resp.Header.Get(\"Retry-After\")\n\tretryIn, err := strconv.Atoi(retryInHeader)\n\tif err == nil {\n\t\treturn &ErrAbuseRateLimit{\n\t\t\terrRetryLater{time.Now().Add(time.Duration(retryIn) * time.Second)},\n\t\t}\n\t}\n\n\terrorResponse := &apiErrorResponse{}\n\terr = readAPIErrorResponse(resp, errorResponse)\n\tif err == nil && errorResponse.isAbuseRateLimit() {\n\t\tlogger.Warningf(\"error reading 'Retry-After=%s' header from the '403 Forbidden' response, using default '%s': %s\",\n\t\t\tretryInHeader,\n\t\t\tdefaultSleep,\n\t\t\terr,\n\t\t)\n\n\t\treturn &ErrAbuseRateLimit{\n\t\t\terrRetryLater{time.Now().Add(defaultSleep)},\n\t\t}\n\t}\n\n\tlogger.Warningf(\"403 Forbidden response got, but could not be read as an Abuse Rate Limit response\")\n\treturn nil\n}", "func MaxOutstandingMessages(n int) func(e *Endpoint) {\n\treturn func(e *Endpoint) { e.maxOutstandingMessages = n }\n}", "func NewGetHostGroupsTooManyRequests() *GetHostGroupsTooManyRequests {\n\treturn &GetHostGroupsTooManyRequests{}\n}", "func GatherRemainingRequests() {\r\n\r\n}", "func WithMax(maxRetries int) *CallOption {\n\treturn &CallOption{apply: func(options *options) {\n\t\toptions.max = maxRetries\n\t}}\n}", "func ReplyTooManyRecipients() *Reply { return &Reply{552, []string{\"Too many recipients\"}, nil} }", "func ErrRequestHeaderFieldsTooLargef(format string, arguments ...interface{}) *Status {\n\treturn &Status{Code: http.StatusRequestHeaderFieldsTooLarge, Text: fmt.Sprintf(format, arguments...)}\n}", "func TestMetricTooMany(t *testing.T) { //nolint:maintidx\n\thelper := newHelper(t)\n\tdefer helper.Close()\n\n\thelper.preregisterAgent(t)\n\thelper.initSynchronizer(t)\n\n\tmetricResource, _ := helper.api.resources[mockAPIResourceMetric].(*genericResource)\n\tdefaultPatchHook := metricResource.PatchHook\n\n\t// API always reject more than 3 active metrics\n\tmetricResource.PatchHook = func(r *http.Request, body []byte, valuePtr interface{}, oldValue interface{}) error {\n\t\tif defaultPatchHook != nil {\n\t\t\terr := defaultPatchHook(r, body, valuePtr, oldValue)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\tmetric, _ := valuePtr.(*metricPayload)\n\n\t\tif metric.DeactivatedAt.IsZero() {\n\t\t\tmetrics := helper.MetricsFromAPI()\n\t\t\tcountActive := 0\n\n\t\t\tfor _, m := range metrics {\n\t\t\t\tif m.DeactivatedAt.IsZero() && m.ID != metric.ID {\n\t\t\t\t\tcountActive++\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif countActive >= 3 {\n\t\t\t\treturn clientError{\n\t\t\t\t\tbody: `{\"label\":[\"Too many non standard metrics\"]}`,\n\t\t\t\t\tstatusCode: http.StatusBadRequest,\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\treturn nil\n\t}\n\n\tmetricResource.CreateHook = func(r *http.Request, body []byte, valuePtr interface{}) error {\n\t\treturn metricResource.PatchHook(r, body, valuePtr, nil)\n\t}\n\n\thelper.AddTime(time.Minute)\n\thelper.pushPoints(t, []labels.Labels{\n\t\tlabels.New(\n\t\t\tlabels.Label{Name: types.LabelName, Value: \"metric1\"},\n\t\t),\n\t\tlabels.New(\n\t\t\tlabels.Label{Name: types.LabelName, Value: \"metric2\"},\n\t\t),\n\t})\n\n\tif err := helper.runOnceWithResult(t).CheckMethodWithFull(syncMethodMetric); err != nil {\n\t\tt.Error(err)\n\t}\n\n\t// list active metrics, register agent_status + 2x metrics to register\n\thelper.api.AssertCallPerResource(t, mockAPIResourceMetric, 6)\n\n\tmetrics := helper.MetricsFromAPI()\n\tif len(metrics) != 3 { // 2 + agent_status\n\t\tt.Errorf(\"len(metrics) = %d, want 3\", len(metrics))\n\t}\n\n\thelper.AddTime(5 * time.Minute)\n\thelper.pushPoints(t, []labels.Labels{\n\t\tlabels.New(\n\t\t\tlabels.Label{Name: types.LabelName, Value: \"metric3\"},\n\t\t),\n\t\tlabels.New(\n\t\t\tlabels.Label{Name: types.LabelName, Value: \"metric4\"},\n\t\t),\n\t})\n\n\tif err := helper.runOnceWithResult(t).CheckMethodWithoutFull(syncMethodMetric); err != nil {\n\t\tt.Error(err)\n\t}\n\n\tif helper.api.ClientErrorCount == 0 {\n\t\tt.Errorf(\"We should have some client error, had %d\", helper.api.ClientErrorCount)\n\t}\n\n\t// list active metrics + 2x metrics to register\n\thelper.api.AssertCallPerResource(t, mockAPIResourceMetric, 5)\n\n\tmetrics = helper.MetricsFromAPI()\n\tif len(metrics) != 3 { // 2 + agent_status\n\t\tt.Errorf(\"len(metrics) = %d, want 3\", len(metrics))\n\t}\n\n\thelper.AddTime(5 * time.Minute)\n\n\tif err := helper.runOnceWithResult(t).CheckMethodNotRun(syncMethodMetric); err != nil {\n\t\tt.Error(err)\n\t}\n\n\thelper.SetTimeToNextFullSync()\n\t// drop all because normally store drop inactive metrics and\n\t// metric1 don't emitted for 70 minutes\n\thelper.store.DropAllMetrics()\n\thelper.pushPoints(t, []labels.Labels{\n\t\tlabels.New(\n\t\t\tlabels.Label{Name: types.LabelName, Value: \"metric2\"},\n\t\t),\n\t\tlabels.New(\n\t\t\tlabels.Label{Name: types.LabelName, Value: \"metric3\"},\n\t\t),\n\t\tlabels.New(\n\t\t\tlabels.Label{Name: types.LabelName, Value: \"metric4\"},\n\t\t),\n\t})\n\n\tif err := helper.runOnceWithResult(t).CheckMethodWithFull(syncMethodMetric); err != nil {\n\t\tt.Error(err)\n\t}\n\n\t// We need two sync: one to deactivate the metric, one to regsiter another one\n\thelper.AddTime(15 * time.Second)\n\n\tif err := helper.runOnceWithResult(t).CheckMethodWithoutFull(syncMethodMetric); err != nil {\n\t\tt.Error(err)\n\t}\n\n\tmetrics = helper.MetricsFromAPI()\n\tif len(metrics) != 4 { // metric1 is now disabled, another get registered\n\t\tt.Errorf(\"len(metrics) = %d, want 4\", len(metrics))\n\t}\n\n\tfor _, m := range metrics {\n\t\tif !m.DeactivatedAt.IsZero() && m.Name != \"metric1\" {\n\t\t\tt.Errorf(\"metric %s is deactivated, want active\", m.Name)\n\t\t}\n\n\t\tif m.DeactivatedAt.IsZero() && m.Name == \"metric1\" {\n\t\t\tt.Errorf(\"metric %s is active, want deactivated\", m.Name)\n\t\t}\n\t}\n\n\thelper.AddTime(5 * time.Minute)\n\thelper.pushPoints(t, []labels.Labels{\n\t\tlabels.New(\n\t\t\tlabels.Label{Name: types.LabelName, Value: \"metric1\"},\n\t\t),\n\t})\n\n\tif err := helper.runOnceWithResult(t).CheckMethodWithoutFull(syncMethodMetric); err != nil {\n\t\tt.Error(err)\n\t}\n\n\tif helper.api.ClientErrorCount == 0 {\n\t\tt.Errorf(\"We should have some client error, had %d\", helper.api.ClientErrorCount)\n\t}\n\n\tmetrics = helper.MetricsFromAPI()\n\tif len(metrics) != 4 { // metric1 is still disabled and no newly registered\n\t\tt.Errorf(\"len(metrics) = %d, want 4\", len(metrics))\n\t}\n\n\tfor _, m := range metrics {\n\t\tif !m.DeactivatedAt.IsZero() && m.Name != \"metric1\" {\n\t\t\tt.Errorf(\"metric %s is deactivated, want active\", m.Name)\n\t\t}\n\n\t\tif m.DeactivatedAt.IsZero() && m.Name == \"metric1\" {\n\t\t\tt.Errorf(\"metric %s is active, want deactivated\", m.Name)\n\t\t}\n\t}\n\n\t// We do not retry to register them\n\thelper.AddTime(5 * time.Minute)\n\n\tif err := helper.runOnceWithResult(t).CheckMethodNotRun(syncMethodMetric); err != nil {\n\t\tt.Error(err)\n\t}\n\n\t// Excepted ONE per full-sync\n\thelper.SetTimeToNextFullSync()\n\thelper.pushPoints(t, []labels.Labels{\n\t\tlabels.New(\n\t\t\tlabels.Label{Name: types.LabelName, Value: \"metric2\"},\n\t\t),\n\t\tlabels.New(\n\t\t\tlabels.Label{Name: types.LabelName, Value: \"metric3\"},\n\t\t),\n\t\tlabels.New(\n\t\t\tlabels.Label{Name: types.LabelName, Value: \"metric4\"},\n\t\t),\n\t})\n\n\tif err := helper.runOnceWithResult(t).CheckMethodWithFull(syncMethodMetric); err != nil {\n\t\tt.Error(err)\n\t}\n\n\tif helper.api.ClientErrorCount != 1 {\n\t\tt.Errorf(\"had %d client error, want 1\", helper.api.ClientErrorCount)\n\t}\n\n\tmetrics = helper.MetricsFromAPI()\n\tif len(metrics) != 4 {\n\t\tt.Errorf(\"len(metrics) = %d, want 4\", len(metrics))\n\t}\n\n\tfor _, m := range metrics {\n\t\tif !m.DeactivatedAt.IsZero() && m.Name != \"metric1\" {\n\t\t\tt.Errorf(\"metric %s is deactivated, want active\", m.Name)\n\t\t}\n\n\t\tif m.DeactivatedAt.IsZero() && m.Name == \"metric1\" {\n\t\t\tt.Errorf(\"metric %s is active, want deactivated\", m.Name)\n\t\t}\n\t}\n\n\t// list active metrics + check existence of the metric we want to reg +\n\t// retry to register\n\thelper.api.AssertCallPerResource(t, mockAPIResourceMetric, 3)\n}", "func TestGetOHLCVAsyncLimit(t *testing.T) {\n\t// to be sure that, tests will pass\n\ttime.Sleep(time.Minute)\n\n\tparams := url.Values{}\n\tparams.Set(av.QueryFunction, \"TIME_SERIES_DAILY_ADJUSTED\")\n\tparams.Set(av.QuerySymbol, \"amzn\")\n\tu, _ := url.ParseRequestURI(proxyAdd)\n\tu.Path = \"/async/\"\n\tu.RawQuery = params.Encode()\n\n\treq, err := http.NewRequest(\"GET\", u.String(), nil)\n\tif err != nil {\n\t\tt.Errorf(\"error sending request: %s\", err)\n\t}\n\n\t// First 5 requests must be ok\n\tfor i := 0; i < 5; i++ {\n\t\tw := httptest.NewRecorder()\n\t\thandler.GetOHLCVAsync(w, req)\n\n\t\tif w.Code != http.StatusOK {\n\t\t\tt.Errorf(\"[%d] wrong StatusCode: got %d, expected %d\",\n\t\t\t\ti, w.Code, http.StatusOK)\n\t\t}\n\t}\n\n\t// After 5 request, exceed limit\n\tw := httptest.NewRecorder()\n\thandler.GetOHLCVAsync(w, req)\n\n\tif w.Code != http.StatusTooManyRequests {\n\t\tt.Errorf(\"[5] wrong StatusCode: got %d, expected %d\",\n\t\t\tw.Code, http.StatusTooManyRequests)\n\t}\n\n\t// after 1 minute, must be ok again\n\ttime.Sleep(time.Minute)\n\tfor i := 6; i < 8; i++ {\n\t\tw := httptest.NewRecorder()\n\t\thandler.GetOHLCVSync(w, req)\n\n\t\tif w.Code != http.StatusOK {\n\t\t\tt.Errorf(\"[%d] wrong StatusCode: got %d, expected %d\",\n\t\t\t\ti, w.Code, http.StatusOK)\n\t\t}\n\t}\n}", "func (m *RateLimitedMux) rateLimit(c web.C, w http.ResponseWriter, r *http.Request, limits []int, handler web.Handler) {\n\tif m.limiter == nil || r.Header.Get(IsAdminHeader) == IsAdminHeaderValue {\n\t\thandler.ServeHTTPC(c, w, r)\n\t\treturn\n\t}\n\n\tlimit := 0\n\tfor _, v := range limits {\n\t\tlimit += v\n\t}\n\n\tif limit == 0 {\n\t\thandler.ServeHTTPC(c, w, r)\n\t\treturn\n\t}\n\n\tkey := r.Header.Get(signcontrol.PublicKeyHeader)\n\n\tlimited, context, err := m.limiter.RateLimit(key, limit)\n\n\tif err != nil {\n\t\tlog.WithField(\"service\", \"rate-limiter\").WithError(err).Error(\"failed to rate limit\")\n\t\thandler.ServeHTTPC(c, w, r)\n\t\treturn\n\t}\n\n\tif v := context.Limit; v >= 0 {\n\t\tw.Header().Add(\"X-RateLimit-Limit\", strconv.Itoa(v))\n\t}\n\n\tif v := context.Remaining; v >= 0 {\n\t\tw.Header().Add(\"X-RateLimit-Remaining\", strconv.Itoa(v))\n\t}\n\n\tif v := context.ResetAfter; v >= 0 {\n\t\tvi := int(math.Ceil(v.Seconds()))\n\t\tw.Header().Add(\"X-RateLimit-Reset\", strconv.Itoa(vi))\n\t}\n\n\tif v := context.RetryAfter; v >= 0 {\n\t\tvi := int(math.Ceil(v.Seconds()))\n\t\tw.Header().Add(\"Retry-After\", strconv.Itoa(vi))\n\t}\n\n\tif !limited {\n\t\thandler.ServeHTTPC(c, w, r)\n\t} else {\n\t\tproblem.Render(nil, w, &problem.RateLimitExceeded)\n\t\treturn\n\t}\n\n}", "func (h *HandleHelper) RateLimitExceede() {\n\terrResponse(http.StatusTooManyRequests,\n\t\t\"rate limit exceeded\",\n\t)(h.w, h.r)\n}", "func newSeriesLimiter(maxSeries int) queryrange.Middleware {\n\treturn seriesLimiterMiddleware(maxSeries)\n}", "func (r *Responder) RequestedRangeNotSatisfiable() { r.write(http.StatusRequestedRangeNotSatisfiable) }", "func (_obj *Apichannels) Channels_readHistory(params *TLchannels_readHistory, _opt ...map[string]string) (ret Bool, err error) {\n\n\tvar length int32\n\tvar have bool\n\tvar ty byte\n\t_os := codec.NewBuffer()\n\terr = params.WriteBlock(_os, 1)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tvar _status map[string]string\n\tvar _context map[string]string\n\tif len(_opt) == 1 {\n\t\t_context = _opt[0]\n\t} else if len(_opt) == 2 {\n\t\t_context = _opt[0]\n\t\t_status = _opt[1]\n\t}\n\t_resp := new(requestf.ResponsePacket)\n\ttarsCtx := context.Background()\n\n\terr = _obj.s.Tars_invoke(tarsCtx, 0, \"channels_readHistory\", _os.ToBytes(), _status, _context, _resp)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\t_is := codec.NewReader(tools.Int8ToByte(_resp.SBuffer))\n\terr = ret.ReadBlock(_is, 0, true)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tif len(_opt) == 1 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t} else if len(_opt) == 2 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t\tfor k := range _status {\n\t\t\tdelete(_status, k)\n\t\t}\n\t\tfor k, v := range _resp.Status {\n\t\t\t_status[k] = v\n\t\t}\n\n\t}\n\t_ = length\n\t_ = have\n\t_ = ty\n\treturn ret, nil\n}", "func httpGetRecents(store *ForwardStore) func(w http.ResponseWriter, r *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tjson.NewEncoder(w).Encode(store.Recents)\n\t}\n}", "func NewGetVulnerabilitiesTooManyRequests() *GetVulnerabilitiesTooManyRequests {\n\treturn &GetVulnerabilitiesTooManyRequests{}\n}", "func Test_Limiter_Fixed_Window_No_Skip_Choices(t *testing.T) {\n\tt.Parallel()\n\tapp := fiber.New()\n\n\tapp.Use(New(Config{\n\t\tMax: 2,\n\t\tExpiration: 2 * time.Second,\n\t\tSkipFailedRequests: false,\n\t\tSkipSuccessfulRequests: false,\n\t\tLimiterMiddleware: FixedWindow{},\n\t}))\n\n\tapp.Get(\"/:status\", func(c *fiber.Ctx) error {\n\t\tif c.Params(\"status\") == \"fail\" { //nolint:goconst // False positive\n\t\t\treturn c.SendStatus(400)\n\t\t}\n\t\treturn c.SendStatus(200)\n\t})\n\n\tresp, err := app.Test(httptest.NewRequest(fiber.MethodGet, \"/fail\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 400, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 429, resp.StatusCode)\n\n\ttime.Sleep(3 * time.Second)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n}", "func newWriter(w http.ResponseWriter) *responseWriter {\n\trw := writerPool.Get().(*responseWriter)\n\trw.status = http.StatusOK\n\trw.ResponseWriter = w\n\trw.wroteHeader = false\n\trw.n = 0\n\n\treturn rw\n}", "func NewGetLimitsTooManyRequests() *GetLimitsTooManyRequests {\n\treturn &GetLimitsTooManyRequests{}\n}", "func (nsc *NilConsumerStatsCollector) AddGetRecordsTimeout(int) {}", "func NewVoiceHistoryExportGetUnauthorized() *VoiceHistoryExportGetUnauthorized {\n\treturn &VoiceHistoryExportGetUnauthorized{}\n}", "func (s *Server) Limit(limiter Limiter) grpc.UnaryServerInterceptor {\n\treturn func(ctx context.Context, req interface{}, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (interface{}, error) {\n\t\tif limiter.Allow(info.FullMethod) {\n\t\t\tif s.Proba.TrueOrNot() {\n\t\t\t\ts.Logger.Error(\"Limit exceed\", zap.String(\"method\", info.FullMethod))\n\t\t\t}\n\t\t\t//在触发RPC调用前就return了,所以其他需要捕获错误的中间件需要设置在limiter之前\n\t\t\t//return nil, status.Errorf(codes.ResourceExhausted, \"%s is rejected by ratelimit middleware\", info.FullMethod)\n\t\t\t//for short metrics:atreusns_atreusss_server_counter_total{code=\"ErrRatelimit\",method=\"/proto.GreeterService/SayHello\",type=\"unary\"} 2\n\t\t\treturn nil, status.Error(codes.ResourceExhausted, pyerrors.RatelimiterServiceReject)\n\t\t}\n\n\t\treturn handler(ctx, req)\n\t}\n}", "func OutOfRange(w http.ResponseWriter, err error) {\n\t(Response{Error: err.Error()}).json(w,\n\t\thttp.StatusRequestedRangeNotSatisfiable)\n}", "func WithLimit(l int) Opts {\n\treturn func(r *retryable) {\n\t\tif l > 0 {\n\t\t\tr.limit = l\n\t\t}\n\t}\n}", "func NewGetRuleTypesTooManyRequests() *GetRuleTypesTooManyRequests {\n\treturn &GetRuleTypesTooManyRequests{}\n}", "func getLiftHistory(c *echo.Context) error {\n\tid, err := strconv.ParseUint(c.Param(\"ID\"), 10, 64)\n\tif err != nil {\n\t\treturn jsonResp(c, err.Error())\n\t}\n\tlift := LiftHistory{DeviceID: c.Param(\"DeviceID\"), ID: id}\n\n\thas, err := g_engine.Get(&lift)\n\tif err != nil {\n\t\treturn jsonResp(c, err.Error())\n\t}\n\tif !has {\n\t\treturn jsonResp(c, \"not exists\")\n\t}\n\n\treturn c.JSON(http.StatusOK, lift)\n}", "func NewGetBicsIDTooManyRequests() *GetBicsIDTooManyRequests {\n\treturn &GetBicsIDTooManyRequests{}\n}", "func NewGetKeysTooManyRequests() *GetKeysTooManyRequests {\n\treturn &GetKeysTooManyRequests{}\n}", "func New(limits *Limits, header interface{}, c *redis.Client) *Limiter {\n\tlMap := make(limitsMap)\n\n\tif c == nil {\n\t\tvar err error\n\t\tclient, err = goredisify.Conn(os.Getenv(\"REDIS_URL\"))\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t} else {\n\t\tclient = c\n\t}\n\n\tfor _, limit := range *limits {\n\t\tkey := limit.Method + \":\" + limit.Path\n\t\tlMap[key] = limit\n\t}\n\n\treturn &Limiter{header, lMap}\n}", "func (Service) TooManyArguments(a, b string) {\n}", "func NewVoiceHistoryExportGetDefault(code int) *VoiceHistoryExportGetDefault {\n\treturn &VoiceHistoryExportGetDefault{\n\t\t_statusCode: code,\n\t}\n}", "func RateLimitRemaining(r *http.Response) int {\n\treturn intResponseHeaderOrNegOne(r, \"X-RateLimit-Remaining\")\n}", "func Test_Limiter_Sliding_Window_No_Skip_Choices(t *testing.T) {\n\tt.Parallel()\n\tapp := fiber.New()\n\n\tapp.Use(New(Config{\n\t\tMax: 2,\n\t\tExpiration: 2 * time.Second,\n\t\tSkipFailedRequests: false,\n\t\tSkipSuccessfulRequests: false,\n\t\tLimiterMiddleware: SlidingWindow{},\n\t}))\n\n\tapp.Get(\"/:status\", func(c *fiber.Ctx) error {\n\t\tif c.Params(\"status\") == \"fail\" {\n\t\t\treturn c.SendStatus(400)\n\t\t}\n\t\treturn c.SendStatus(200)\n\t})\n\n\tresp, err := app.Test(httptest.NewRequest(fiber.MethodGet, \"/fail\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 400, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 429, resp.StatusCode)\n\n\ttime.Sleep(4 * time.Second)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n}", "func (s *InMemorySuite) newLimitedTimeline(capacity int) *Timeline {\n\treturn NewTimeline(s.clock, capacity)\n}", "func (s *InMemorySuite) newLimitedTimeline(capacity int) *Timeline {\n\treturn NewTimeline(s.clock, capacity)\n}", "func Test_Limiter_Fixed_Window_Skip_Failed_Requests(t *testing.T) {\n\tt.Parallel()\n\tapp := fiber.New()\n\n\tapp.Use(New(Config{\n\t\tMax: 1,\n\t\tExpiration: 2 * time.Second,\n\t\tSkipFailedRequests: true,\n\t\tLimiterMiddleware: FixedWindow{},\n\t}))\n\n\tapp.Get(\"/:status\", func(c *fiber.Ctx) error {\n\t\tif c.Params(\"status\") == \"fail\" {\n\t\t\treturn c.SendStatus(400)\n\t\t}\n\t\treturn c.SendStatus(200)\n\t})\n\n\tresp, err := app.Test(httptest.NewRequest(fiber.MethodGet, \"/fail\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 400, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 429, resp.StatusCode)\n\n\ttime.Sleep(3 * time.Second)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n}", "func Getv40(w http.ResponseWriter, r *http.Request) {\n\tinf, userErr, sysErr, errCode := api.NewInfo(r, nil, []string{\"days\", \"limit\"})\n\tif userErr != nil || sysErr != nil {\n\t\tapi.HandleErr(w, r, inf.Tx.Tx, errCode, userErr, sysErr)\n\t\treturn\n\t}\n\tdefer inf.Close()\n\tdays := DefaultLogDays\n\tif pDays, ok := inf.IntParams[\"days\"]; ok {\n\t\tdays = pDays\n\t}\n\n\ta := tc.Alerts{}\n\tsetLastSeenCookie(w)\n\tlogs, count, err := getLogV40(inf, days)\n\n\tif err != nil {\n\t\ta.AddNewAlert(tc.ErrorLevel, err.Error())\n\t\tapi.WriteAlerts(w, r, http.StatusInternalServerError, a)\n\t\treturn\n\t}\n\tvar result interface{}\n\tvar logsV5 []tc.LogV5\n\tif inf.Version.GreaterThanOrEqualTo(&api.Version{\n\t\tMajor: 5,\n\t\tMinor: 0,\n\t}) {\n\t\tfor _, l := range logs {\n\t\t\tlogV5 := l.Upgrade()\n\t\t\tlogsV5 = append(logsV5, logV5)\n\t\t}\n\t\tresult = logsV5\n\t} else {\n\t\tresult = logs\n\t}\n\tif a.HasAlerts() {\n\t\tapi.WriteAlertsObj(w, r, 200, a, result)\n\t} else {\n\t\tapi.WriteRespWithSummary(w, r, result, count)\n\t}\n}", "func newRateLimiter() *middlewares.Limiter {\n\treturn middlewares.NewLimiter(newRedis())\n}", "func (client *RecommendationsClient) listHistoryForHostingEnvironmentCreateRequest(ctx context.Context, resourceGroupName string, hostingEnvironmentName string, options *RecommendationsClientListHistoryForHostingEnvironmentOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/hostingEnvironments/{hostingEnvironmentName}/recommendationHistory\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif hostingEnvironmentName == \"\" {\n\t\treturn nil, errors.New(\"parameter hostingEnvironmentName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{hostingEnvironmentName}\", url.PathEscape(hostingEnvironmentName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.ExpiredOnly != nil {\n\t\treqQP.Set(\"expiredOnly\", strconv.FormatBool(*options.ExpiredOnly))\n\t}\n\treqQP.Set(\"api-version\", \"2021-03-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tunencodedParams := []string{req.Raw().URL.RawQuery}\n\tif options != nil && options.Filter != nil {\n\t\tunencodedParams = append(unencodedParams, \"$filter=\"+*options.Filter)\n\t}\n\treq.Raw().URL.RawQuery = strings.Join(unencodedParams, \"&\")\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewErrTooManyHops(ctx *context.T, Limit int32) error {\n\treturn verror.New(ErrTooManyHops, ctx, Limit)\n}", "func NewListTeamsTooManyRequests() *ListTeamsTooManyRequests {\n\treturn &ListTeamsTooManyRequests{}\n}", "func (m *MemLimiter) Limit(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"X-RateLimit-Limit\", strconv.Itoa(int(m.cfg.IpLimit)))\n\n\t\tip, _, _ := net.SplitHostPort(r.RemoteAddr)\n\t\turl := r.RequestURI\n\t\tipl := m.getLimiter(IpAddress, ip)\n\t\tpathl := m.getLimiter(URL, url)\n\n\t\tif ipl.Allow() == false || pathl.Allow() == false {\n\t\t\tw.Header().Set(\"X-RateLimit-Limit\", strconv.Itoa(int(m.cfg.IpLimit)))\n\t\t\thttp.Error(w, \"API rate limit exceeded\", http.StatusTooManyRequests)\n\t\t\treturn\n\t\t}\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "func (this *MainController) AppMyHistory(w http.ResponseWriter, r *http.Request) {\n\tsess := session.Start(w, r)\n\tusername_session := sess.GetString(\"user_fullname\")\n\n\tif len(username_session) == 0 {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tsession_timeout := struct{\n\t\t\tRedirect bool `json:\"Redirect\"`\n\t\t}{}\n\t\tsession_timeout.Redirect = true\n\t\tjson_val, err := json.Marshal(session_timeout)\n\t\tif err != nil {\n\t\t\tlog.Println(\"[!] ERROR:\", err)\n\t\t}\n\t\tfmt.Fprintf(w, string(json_val))\n\t} else {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thistory, err := models.ModelsGetMyHistory(username_session)\n\t\tif err != nil {\n\t\t\terrMsg := \"[!] ERROR: in ModelsGetMyHistory, Database Server: \" + err.Error() + \" Please contact the Administrator: [email protected] a.k.a AQX Tamvan :)\"\n\t\t\thttp.Error(w, errMsg, http.StatusInternalServerError)\n\t\t}\n\n\t\thistory_values := make([]History, len(history))\n\t\tfor i:=0; i<len(history); i++ {\n\t\t\thistory_values[i].History_id = history[i].History_id\n\t\t\thistory_values[i].History_date = history[i].History_date\n\t\t\thistory_values[i].History_code = history[i].History_code\n\t\t\thistory_values[i].History_by = history[i].History_by\n\t\t\thistory_values[i].History_content = history[i].History_content\n\t\t\thistory_values[i].History_notes = history[i].History_notes\n\t\t\thistory_values[i].Picked_item = history[i].Picked_item\n\t\t\thistory_values[i].Item_id = history[i].Item_id\n\t\t\thistory_values[i].History_status = history[i].History_status\n\t\t}\n\n\t\tjson_val, err := json.Marshal(history_values)\n\t\tif err != nil {\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t}\n\t\tfmt.Fprintf(w, string(json_val))\n\t}\n}", "func checkResponseRateLimit(resp *http.Response, logger log.Logger, defaultAbuseSleep time.Duration) whener {\n\tif err := asErrRateLimit(resp); err != nil {\n\t\treturn err\n\t}\n\n\tif err := asErrAbuseRateLimit(resp, logger, defaultAbuseSleep); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func NewQuerySampleV1TooManyRequests() *QuerySampleV1TooManyRequests {\n\treturn &QuerySampleV1TooManyRequests{}\n}", "func (client MultipleResponsesClient) Get202None204NoneDefaultNone400InvalidSender(req *http.Request) (*http.Response, error) {\n return autorest.SendWithSender(client, req)\n}", "func NewGetStockReceiptItemTooManyRequests() *GetStockReceiptItemTooManyRequests {\n\treturn &GetStockReceiptItemTooManyRequests{}\n}", "func NewGetEntriesTooManyRequests() *GetEntriesTooManyRequests {\n\treturn &GetEntriesTooManyRequests{}\n}", "func (o *GetStatisticsHistoryParams) WithRequestTimeout(timeout time.Duration) *GetStatisticsHistoryParams {\n\to.SetRequestTimeout(timeout)\n\treturn o\n}", "func newResponse(r *http.Response) *Response {\n\tresp := &Response{\n\t\tResponse: r,\n\t}\n\tif v := r.Header.Get(headerXRemaining); v != \"\" {\n\t\tresp.Remaining, _ = strconv.Atoi(v)\n\t}\n\tif v := r.Header.Get(headerXReset); v != \"\" {\n\t\tresp.Reset, _ = strconv.Atoi(v)\n\t}\n\tif v := r.Header.Get(headerXTotal); v != \"\" {\n\t\tresp.Total, _ = strconv.Atoi(v)\n\t}\n\treturn resp\n}", "func youTubeMoreVideo(a *chan []byte,c *string,e *int64){\n\n\n client := &http.Client{\n Transport: &transport.APIKey{Key: developerKey},\n }\n\n service, err := youtube.New(client)\n if err != nil {\n panic(err)\n }\n\n // Make the API call to YouTube.\n call := service.Search.List(\"id,snippet\").\n Q(*c).\n MaxResults(*e)\n response, err := call.Do()\n if err != nil {\n panic(err)\n }\n\n // Group video, channel, and playlist results in separate lists.\n videos := make(map[string]string)\n channels := make(map[string]string)\n playlists := make(map[string]string)\n sArr:=make([]YouTube,0)\n // Iterate through each item and add it to the correct list.\n for _, item := range response.Items {\n switch item.Id.Kind {\n case \"youtube#video\":\n c:=YouTube{Id:item.Id.VideoId,Title:item.Snippet.Title}\n sArr=append(sArr,c)\n //jsonString, _ := json.Marshal(datas)\n //fmt.Println(jsonString)\n //videos[item.Id.VideoId] = item.Snippet.Title\n case \"youtube#channel\":\n channels[item.Id.ChannelId] = item.Snippet.Title\n case \"youtube#playlist\":\n playlists[item.Id.PlaylistId] = item.Snippet.Title\n }\n }\n //*a<-videos\n datas:=AllYoutube{All:sArr}\n jsonString, _ := json.Marshal(datas)\n\n\n *a <- jsonString\n //fmt.Println(videos)\n printIDs(\"Videos\", videos)\n\n}", "func Test_Limiter_Fixed_Window_Custom_Storage_Skip_Successful_Requests(t *testing.T) {\n\tt.Parallel()\n\t// Test concurrency using a default store\n\n\tapp := fiber.New()\n\n\tapp.Use(New(Config{\n\t\tMax: 1,\n\t\tExpiration: 2 * time.Second,\n\t\tStorage: memory.New(),\n\t\tSkipSuccessfulRequests: true,\n\t\tLimiterMiddleware: FixedWindow{},\n\t}))\n\n\tapp.Get(\"/:status\", func(c *fiber.Ctx) error {\n\t\tif c.Params(\"status\") == \"fail\" {\n\t\t\treturn c.SendStatus(400)\n\t\t}\n\t\treturn c.SendStatus(200)\n\t})\n\n\tresp, err := app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/fail\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 400, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/fail\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 429, resp.StatusCode)\n\n\ttime.Sleep(3 * time.Second)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/fail\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 400, resp.StatusCode)\n}", "func GetHistory(store Store, datatype, realm, user, id string, r *http.Request) (*cpb.History, int, error) {\n\thlist := make([]proto.Message, 0)\n\tif err := store.ReadHistory(datatype, realm, user, id, &hlist); err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\t// TODO: perhaps this should be the empty list?\n\t\t\treturn nil, http.StatusBadRequest, fmt.Errorf(\"no config history available\")\n\t\t}\n\t\treturn nil, http.StatusBadRequest, fmt.Errorf(\"service storage unavailable: %v, retry later\", err)\n\t}\n\the := make([]*cpb.HistoryEntry, len(hlist))\n\tvar ok bool\n\tfor i, e := range hlist {\n\t\the[i], ok = e.(*cpb.HistoryEntry)\n\t\tif !ok {\n\t\t\treturn nil, http.StatusInternalServerError, fmt.Errorf(\"cannot load history entry %d\", i)\n\t\t}\n\t}\n\thistory := &cpb.History{\n\t\tHistory: he,\n\t}\n\tpageToken := r.URL.Query().Get(\"pageToken\")\n\tstart, err := strconv.ParseInt(pageToken, 10, 64)\n\tif err != nil {\n\t\tstart = 0\n\t}\n\n\tpageSize := r.URL.Query().Get(\"pageSize\")\n\tsize, err := strconv.ParseInt(pageSize, 10, 64)\n\tif err != nil || size < 1 {\n\t\tsize = 50\n\t}\n\tif size > 1000 {\n\t\tsize = 1000\n\t}\n\t// Reverse order\n\ta := history.History\n\tfor i := len(a)/2 - 1; i >= 0; i-- {\n\t\topp := len(a) - 1 - i\n\t\ta[i], a[opp] = a[opp], a[i]\n\t}\n\n\tfor i, entry := range history.History {\n\t\tif entry.Revision <= start {\n\t\t\thistory.History = history.History[i:]\n\t\t\tbreak\n\t\t}\n\t}\n\tif len(history.History) > int(size) {\n\t\thistory.NextPageToken = fmt.Sprintf(\"%d\", history.History[size].Revision)\n\t\thistory.History = history.History[:size]\n\t}\n\treturn history, http.StatusOK, nil\n}", "func (w *Whisper) RequestHistoricMessages(peerID []byte, envelope *Envelope) error {\n\tp, err := w.getPeer(peerID)\n\tif err != nil {\n\t\treturn err\n\t}\n\tp.trusted = true\n\treturn p2p.Send(p.ws, p2pRequestCode, envelope)\n}", "func MaxInFlightLimit(c chan bool, longRunningRequestCheck LongRunningRequestCheck, handler http.Handler) http.Handler {\n\tif c == nil {\n\t\treturn handler\n\t}\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tif longRunningRequestCheck(r) {\n\t\t\t// Skip tracking long running events.\n\t\t\thandler.ServeHTTP(w, r)\n\t\t\treturn\n\t\t}\n\t\tselect {\n\t\tcase c <- true:\n\t\t\tdefer func() { <-c }()\n\t\t\thandler.ServeHTTP(w, r)\n\t\tdefault:\n\t\t\ttooManyRequests(w)\n\t\t}\n\t})\n}", "func (client *WebAppsClient) listTriggeredWebJobHistorySlotCreateRequest(ctx context.Context, resourceGroupName string, name string, webJobName string, slot string, options *WebAppsListTriggeredWebJobHistorySlotOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/slots/{slot}/triggeredwebjobs/{webJobName}/history\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif webJobName == \"\" {\n\t\treturn nil, errors.New(\"parameter webJobName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{webJobName}\", url.PathEscape(webJobName))\n\tif slot == \"\" {\n\t\treturn nil, errors.New(\"parameter slot cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{slot}\", url.PathEscape(slot))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewGetUserBanHistoryForbidden() *GetUserBanHistoryForbidden {\n\treturn &GetUserBanHistoryForbidden{}\n}", "func Test_Limiter_Sliding_Window_Custom_Storage_Skip_Successful_Requests(t *testing.T) {\n\tt.Parallel()\n\t// Test concurrency using a default store\n\n\tapp := fiber.New()\n\n\tapp.Use(New(Config{\n\t\tMax: 1,\n\t\tExpiration: 2 * time.Second,\n\t\tStorage: memory.New(),\n\t\tSkipSuccessfulRequests: true,\n\t\tLimiterMiddleware: SlidingWindow{},\n\t}))\n\n\tapp.Get(\"/:status\", func(c *fiber.Ctx) error {\n\t\tif c.Params(\"status\") == \"fail\" {\n\t\t\treturn c.SendStatus(400)\n\t\t}\n\t\treturn c.SendStatus(200)\n\t})\n\n\tresp, err := app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/fail\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 400, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/fail\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 429, resp.StatusCode)\n\n\ttime.Sleep(4 * time.Second)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/fail\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 400, resp.StatusCode)\n}", "func (f *lightFetcher) newHeaders(headers []*types.Header, tds []*big.Int) {\n\tvar maxTd *big.Int\n\n\tfor p, fp := range f.peers {\n\t\tif !f.checkAnnouncedHeaders(fp, headers, tds) {\n\t\t\tp.Log().Debug(\"Inconsistent announcement\")\n\t\t\tgo f.handler.removePeer(p.id)\n\t\t}\n\t\tif fp.confirmedTd != nil && (maxTd == nil || maxTd.Cmp(fp.confirmedTd) > 0) {\n\t\t\tmaxTd = fp.confirmedTd\n\t\t}\n\t}\n\n\tif maxTd != nil {\n\t\tf.updateMaxConfirmedTd(maxTd)\n\t}\n}", "func NewListSmsSendOverviewUsingGETRequestWithoutParam() *ListSmsSendOverviewUsingGETRequest {\n\n return &ListSmsSendOverviewUsingGETRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/smsApps/{appId}:overview\",\n Method: \"GET\",\n Header: nil,\n Version: \"v1\",\n },\n }\n}", "func echoResponseHeader(r request.Request, body []byte) header.Headers {\n\theaders := header.Headers{}\n\theaders = append(headers, &header.Header{FieldName: \"Date\", FieldValue: time.Now().UTC().Format(\"Mon, 02 Jan 2006 15:04:05 GMT\")})\n\theaders = append(headers, &header.Header{FieldName: \"Vary\", FieldValue: \"accept-encoding, accept\"})\n\theaders = append(headers, &header.Header{FieldName: \"Accept-Range\", FieldValue: \"bytes\"})\n\n\tfor _, ae := range r.Headers.GetAcceptEncodings() {\n\t\tif ae.Coding == header.CONTENT_CODING_GZIP {\n\t\t\theaders = append(headers, &header.Header{FieldName: \"Content-Encoding\", FieldValue: \"gzip\"})\n\t\t\tbreak\n\t\t} else if ae.Coding == header.CONTENT_CODING_IDENTITY {\n\t\t\tbreak\n\t\t}\n\t}\n\n\tranges, _ := r.Headers.GetRanges()\n\tif len(ranges) >= 1 { // multiple ranges is unsuppored yet\n\t\ts, e := getRange(ranges[0].Start, ranges[0].End, body)\n\t\tif len(body) < e {\n\t\t\t// Range header specify bigger end value than body length\n\t\t\theaders = append(headers, &header.Header{FieldName: \"Content-Range\",\n\t\t\t\tFieldValue: fmt.Sprintf(\"bytes */%v\", len(body))})\n\t\t\theaders = append(headers, &header.Header{FieldName: \"Content-Length\", FieldValue: \"0\"})\n\t\t} else {\n\t\t\theaders = append(headers, &header.Header{FieldName: \"Content-Range\",\n\t\t\t\tFieldValue: fmt.Sprintf(\"bytes %v-%v/%v\", s, e, len(body))})\n\t\t\theaders = append(headers, &header.Header{FieldName: \"Content-Length\", FieldValue: strconv.Itoa(e - s)})\n\t\t}\n\t} else {\n\t\theaders = append(headers, &header.Header{FieldName: \"Content-Length\", FieldValue: strconv.Itoa(len(body))})\n\t}\n\treturn headers\n}", "func Test_Limiter_Sliding_Window_Skip_Failed_Requests(t *testing.T) {\n\tt.Parallel()\n\tapp := fiber.New()\n\n\tapp.Use(New(Config{\n\t\tMax: 1,\n\t\tExpiration: 2 * time.Second,\n\t\tSkipFailedRequests: true,\n\t\tLimiterMiddleware: SlidingWindow{},\n\t}))\n\n\tapp.Get(\"/:status\", func(c *fiber.Ctx) error {\n\t\tif c.Params(\"status\") == \"fail\" {\n\t\t\treturn c.SendStatus(400)\n\t\t}\n\t\treturn c.SendStatus(200)\n\t})\n\n\tresp, err := app.Test(httptest.NewRequest(fiber.MethodGet, \"/fail\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 400, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 429, resp.StatusCode)\n\n\ttime.Sleep(4 * time.Second)\n\n\tresp, err = app.Test(httptest.NewRequest(fiber.MethodGet, \"/success\", nil))\n\tutils.AssertEqual(t, nil, err)\n\tutils.AssertEqual(t, 200, resp.StatusCode)\n}", "func NewHistory(capacity int) History {\n history := History{}\n history.results = list.New()\n history.results.Init()\n return history\n}", "func WithMaxSize(maxMB int) Option {\n\treturn WithDialOpts(grpc.WithDefaultCallOptions(\n\t\tgrpc.MaxCallRecvMsgSize(maxMB*MB),\n\t\tgrpc.MaxCallSendMsgSize(maxMB*MB),\n\t))\n}" ]
[ "0.578021", "0.57442033", "0.54587036", "0.52952915", "0.5283396", "0.5216562", "0.5061647", "0.49910998", "0.49557954", "0.4950256", "0.4902139", "0.4815635", "0.4807073", "0.47867915", "0.47658095", "0.4725907", "0.4714182", "0.4628569", "0.46211502", "0.44979846", "0.44923946", "0.44875938", "0.4480922", "0.447749", "0.44737998", "0.4471124", "0.44500723", "0.44474447", "0.44387054", "0.44088492", "0.4406928", "0.44001678", "0.43885803", "0.4385076", "0.43711603", "0.4361437", "0.4355209", "0.4353242", "0.43521246", "0.43368563", "0.43311957", "0.43196592", "0.4310057", "0.42972937", "0.42926154", "0.4272222", "0.42669353", "0.42588794", "0.42588267", "0.4254386", "0.42448866", "0.424319", "0.4236952", "0.42253897", "0.42247003", "0.4215939", "0.42095202", "0.42074856", "0.42054954", "0.420299", "0.41922736", "0.41717377", "0.41711384", "0.41662735", "0.41590765", "0.41526073", "0.41491407", "0.41414753", "0.4125522", "0.41253695", "0.41253695", "0.41242528", "0.41225356", "0.4122496", "0.41205573", "0.41167185", "0.41067976", "0.41058174", "0.4099745", "0.40995097", "0.40984082", "0.40949136", "0.40877637", "0.40875146", "0.4084294", "0.408104", "0.4080906", "0.40780374", "0.40756795", "0.4074331", "0.40693054", "0.40681952", "0.40679327", "0.4066379", "0.40647757", "0.40630278", "0.40618995", "0.406064", "0.40585282", "0.40549743" ]
0.69418365
0
NewVoiceHistoryExportGetDefault creates a VoiceHistoryExportGetDefault with default headers values
func NewVoiceHistoryExportGetDefault(code int) *VoiceHistoryExportGetDefault { return &VoiceHistoryExportGetDefault{ _statusCode: code, } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewVoiceHistoryExportGetOK() *VoiceHistoryExportGetOK {\n\treturn &VoiceHistoryExportGetOK{}\n}", "func CreateDefaultExportStruct(project *Project) *Export {\n\treturn &Export{\n\t\tExportType: exportType,\n\t\tVideoFormat: videoFormat,\n\t\tVideoCodec: videoCodec,\n\t\tVideoBitrate: 8000000,\n\t\tAudioCodec: audioCodec,\n\t\tAudioBitrate: audioBitrate,\n\t\tStartFrame: startFrame,\n\t\tProjectURL: project.URL,\n\t\tJSON: map[string]interface{}{},\n\t\tStatus: status,\n\t}\n}", "func (toneAnalyzer *ToneAnalyzerV3) SetDefaultHeaders(headers http.Header) {\n\ttoneAnalyzer.Service.SetDefaultHeaders(headers)\n}", "func NewVoiceHistoryExportGetUnauthorized() *VoiceHistoryExportGetUnauthorized {\n\treturn &VoiceHistoryExportGetUnauthorized{}\n}", "func GetDefaultHeaders() map[string]string {\n\treturn map[string]string{\n\t\t\"content-type\": \"application/json\",\n\t}\n}", "func DefaultHeadersEnforcer() *HeadersEnforcer {\n\treturn &HeadersEnforcer{\n\t\tCheckers: []*HeaderChecker{XGoogClientHeaderChecker},\n\t}\n}", "func (me XsdGoPkgHasElem_Heading) HeadingDefault() Tangle360Type {\r\n\tvar x = new(Tangle360Type)\r\n\tx.Set(\"0.0\")\r\n\treturn *x\r\n}", "func (o *GetTagAuditLogsWithHistoryParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (by *Bybit) GenerateDefaultSubscriptions() ([]stream.ChannelSubscription, error) {\n\tvar subscriptions []stream.ChannelSubscription\n\tvar channels = []string{wsTicker, wsTrades, wsOrderbook, wsKlines}\n\tpairs, err := by.GetEnabledPairs(asset.Spot)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor z := range pairs {\n\t\tfor x := range channels {\n\t\t\tsubscriptions = append(subscriptions,\n\t\t\t\tstream.ChannelSubscription{\n\t\t\t\t\tChannel: channels[x],\n\t\t\t\t\tCurrency: pairs[z],\n\t\t\t\t\tAsset: asset.Spot,\n\t\t\t\t})\n\t\t}\n\t}\n\treturn subscriptions, nil\n}", "func (me XsdGoPkgHasElems_Heading) HeadingDefault() Tangle360Type {\r\n\tvar x = new(Tangle360Type)\r\n\tx.Set(\"0.0\")\r\n\treturn *x\r\n}", "func (edgeFunctionsApi *EdgeFunctionsApiV1) SetDefaultHeaders(headers http.Header) {\n\tedgeFunctionsApi.Service.SetDefaultHeaders(headers)\n}", "func DefaultExporter() Exporter {\n\treturn Exporter{now: defaultNow}\n}", "func (botManagement *BotManagementV1) SetDefaultHeaders(headers http.Header) {\n\tbotManagement.Service.SetDefaultHeaders(headers)\n}", "func (o ApiOperationResponseHeaderOutput) DefaultValue() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ApiOperationResponseHeader) *string { return v.DefaultValue }).(pulumi.StringPtrOutput)\n}", "func NewVoiceHistoryExportGetNotFound() *VoiceHistoryExportGetNotFound {\n\treturn &VoiceHistoryExportGetNotFound{}\n}", "func (directLinkProvider *DirectLinkProviderV2) SetDefaultHeaders(headers http.Header) {\n\tdirectLinkProvider.Service.SetDefaultHeaders(headers)\n}", "func exportDefaults() *exportRawConfig {\n\treturn &exportRawConfig{\n\t\tFormat: \"jpeg\",\n\t\tExtend: \"black\",\n\t\tQuality: 85,\n\t\tCompression: 6,\n\t\tStripMetadata: true,\n\t}\n}", "func (h *HUOBIHADAX) SetDefaults() {\n\th.Name = \"HuobiHadax\"\n\th.Enabled = false\n\th.Fee = 0\n\th.Verbose = false\n\th.RESTPollingDelay = 10\n\th.APIWithdrawPermissions = exchange.AutoWithdrawCryptoWithSetup |\n\t\texchange.NoFiatWithdrawals\n\th.RequestCurrencyPairFormat.Delimiter = \"\"\n\th.RequestCurrencyPairFormat.Uppercase = false\n\th.ConfigCurrencyPairFormat.Delimiter = \"-\"\n\th.ConfigCurrencyPairFormat.Uppercase = true\n\th.AssetTypes = []string{ticker.Spot}\n\th.SupportsAutoPairUpdating = true\n\th.SupportsRESTTickerBatching = false\n\th.Requester = request.New(h.Name,\n\t\trequest.NewRateLimit(time.Second*10, huobihadaxAuthRate),\n\t\trequest.NewRateLimit(time.Second*10, huobihadaxUnauthRate),\n\t\tcommon.NewHTTPClientWithTimeout(exchange.DefaultHTTPTimeout))\n\th.APIUrlDefault = huobihadaxAPIURL\n\th.APIUrl = h.APIUrlDefault\n\th.Websocket = wshandler.New()\n\th.Websocket.Functionality = wshandler.WebsocketKlineSupported |\n\t\twshandler.WebsocketTradeDataSupported |\n\t\twshandler.WebsocketOrderbookSupported |\n\t\twshandler.WebsocketSubscribeSupported |\n\t\twshandler.WebsocketUnsubscribeSupported |\n\t\twshandler.WebsocketAuthenticatedEndpointsSupported |\n\t\twshandler.WebsocketAccountDataSupported |\n\t\twshandler.WebsocketMessageCorrelationSupported\n\th.WebsocketResponseMaxLimit = exchange.DefaultWebsocketResponseMaxLimit\n\th.WebsocketResponseCheckTimeout = exchange.DefaultWebsocketResponseCheckTimeout\n\n}", "func (eventNotifications *EventNotificationsV1) SetDefaultHeaders(headers http.Header) {\n\teventNotifications.Service.SetDefaultHeaders(headers)\n}", "func (enterpriseManagement *EnterpriseManagementV1) SetDefaultHeaders(headers http.Header) {\n\tenterpriseManagement.Service.SetDefaultHeaders(headers)\n}", "func (subscription *NamespacesTopicsSubscription) defaultImpl() { subscription.defaultAzureName() }", "func SetDefaultHeaders(w http.ResponseWriter) {\n\tfor k, v := range defaultHeaders {\n\t\tw.Header().Set(k, v)\n\t}\n}", "func NewPrinterDefaults()(*PrinterDefaults) {\n m := &PrinterDefaults{\n }\n m.backingStore = ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStoreFactoryInstance();\n m.SetAdditionalData(make(map[string]any))\n return m\n}", "func (filters *FiltersV1) SetDefaultHeaders(headers http.Header) {\n\tfilters.Service.SetDefaultHeaders(headers)\n}", "func DefaultHeader(k, v string) Opt {\n\treturn func(c *Client) Opt {\n\t\told, found := c.header[k]\n\t\told = append([]string{}, old...) // clone\n\t\tc.header.Add(k, v)\n\t\treturn func(c *Client) Opt {\n\t\t\tif found {\n\t\t\t\tc.header[k] = old\n\t\t\t} else {\n\t\t\t\tc.header.Del(k)\n\t\t\t}\n\t\t\treturn DefaultHeader(k, v)\n\t\t}\n\t}\n}", "func (g *Gemini) GenerateDefaultSubscriptions() ([]stream.ChannelSubscription, error) {\n\t// See gemini_types.go for more subscription/candle vars\n\tvar channels = []string{\n\t\tmarketDataLevel2,\n\t\tcandles1d,\n\t}\n\n\tpairs, err := g.GetEnabledPairs(asset.Spot)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar subscriptions []stream.ChannelSubscription\n\tfor x := range channels {\n\t\tfor y := range pairs {\n\t\t\tsubscriptions = append(subscriptions, stream.ChannelSubscription{\n\t\t\t\tChannel: channels[x],\n\t\t\t\tCurrency: pairs[y],\n\t\t\t\tAsset: asset.Spot,\n\t\t\t})\n\t\t}\n\t}\n\treturn subscriptions, nil\n}", "func MakeDefaultWebhookSubscription(db *pop.Connection) models.WebhookSubscription {\n\treturn MakeWebhookSubscription(db, Assertions{})\n}", "func NewVoiceHistoryExportGetTooManyRequests() *VoiceHistoryExportGetTooManyRequests {\n\treturn &VoiceHistoryExportGetTooManyRequests{}\n}", "func (me XsdGoPkgHasElem_Roll) RollDefault() Tangle180Type {\r\n\tvar x = new(Tangle180Type)\r\n\tx.Set(\"0.0\")\r\n\treturn *x\r\n}", "func NewHistory() *History {\n\treturn &History{\n\t\thistories: []string{},\n\t\ttmp: []string{\"\"},\n\t\tselected: 0,\n\t}\n}", "func (me XsdGoPkgHasElems_Roll) RollDefault() Tangle180Type {\r\n\tvar x = new(Tangle180Type)\r\n\tx.Set(\"0.0\")\r\n\treturn *x\r\n}", "func NewGetHardwareFcportsDefault(code int) *GetHardwareFcportsDefault {\n\treturn &GetHardwareFcportsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func setDefaultHeader(w http.ResponseWriter) {\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=utf-8\")\n\tw.Header().Set(\"Date\", time.Now().String())\n}", "func (schematics *SchematicsV1) SetDefaultHeaders(headers http.Header) {\n\tschematics.Service.SetDefaultHeaders(headers)\n}", "func NewDefaultExportParams() *ExportParams {\n\treturn &ExportParams{\n\t\tFormat: ImageTypeUnknown, // defaults to the starting encoder\n\t\tQuality: 80,\n\t\tCompression: 6,\n\t\tInterlaced: true,\n\t\tLossless: false,\n\t\tEffort: 4,\n\t}\n}", "func (p *RestPresence) History(params *PaginateParams) (*PaginatedResult, error) {\n\tpath := \"/channels/\" + p.channel.uriName + \"/presence/history\"\n\treturn newPaginatedResult(presMsgType, path, params, query(p.client.get), p.logger())\n}", "func (etc *ExportTaskCreate) defaults() {\n\tif _, ok := etc.mutation.Progress(); !ok {\n\t\tv := exporttask.DefaultProgress\n\t\tetc.mutation.SetProgress(v)\n\t}\n\tif _, ok := etc.mutation.Filters(); !ok {\n\t\tv := exporttask.DefaultFilters\n\t\tetc.mutation.SetFilters(v)\n\t}\n}", "func (fhc *historyConfig) NewHistory(tag string, index, maxHistories int) (bot.HistoryLogger, error) {\n\tdirPath := path.Join(fhc.Directory, tag)\n\tfilePath := path.Join(dirPath, fmt.Sprintf(\"%s-%d.log\", tag, index))\n\tif err := os.MkdirAll(dirPath, 0755); err != nil {\n\t\treturn nil, fmt.Errorf(\"Error creating history directory '%s': %v\", dirPath, err)\n\t}\n\tif file, err := os.Create(filePath); err != nil {\n\t\treturn nil, fmt.Errorf(\"Error creating history file '%s': %v\", filePath, err)\n\t} else {\n\t\thl := log.New(file, \"\", logFlags)\n\t\thf := &historyFile{\n\t\t\thl,\n\t\t\tfile,\n\t\t}\n\t\tif index-maxHistories >= 0 {\n\t\t\tfor i := index - maxHistories; i >= 0; i-- {\n\t\t\t\trmPath := path.Join(dirPath, fmt.Sprintf(\"%s-%d.log\", tag, i))\n\t\t\t\t_, err := os.Stat(rmPath)\n\t\t\t\tif err != nil {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\trerr := os.Remove(rmPath)\n\t\t\t\tif rerr != nil {\n\t\t\t\t\trobot.Log(bot.Error, fmt.Sprint(\"Error removing old log file '%s': %v\", rmPath, rerr))\n\t\t\t\t\t// assume it's pointless to keep trying to delete files\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\treturn hf, nil\n\t}\n}", "func Default() *Hodor {\n\th := NewHodor(NewRouter())\n\tlogger := log.New(os.Stdout, \"[Hodor] \", log.LstdFlags)\n\th.AddFilters(\n\t\tLogFilter(logger),\n\t\tRecoveryFilter(logger),\n\t)\n\treturn h\n}", "func MakeDefaultInvoice(db *pop.Connection) models.Invoice {\n\treturn MakeInvoice(db, Assertions{})\n}", "func (ec *ExperienceCreate) defaults() {\n\tif _, ok := ec.mutation.UUID(); !ok {\n\t\tv := experience.DefaultUUID()\n\t\tec.mutation.SetUUID(v)\n\t}\n\tif _, ok := ec.mutation.CreatedAt(); !ok {\n\t\tv := experience.DefaultCreatedAt()\n\t\tec.mutation.SetCreatedAt(v)\n\t}\n}", "func (cachingApi *CachingApiV1) SetDefaultHeaders(headers http.Header) {\n\tcachingApi.Service.SetDefaultHeaders(headers)\n}", "func (rule *NamespacesTopicsSubscriptionsRule) defaultImpl() { rule.defaultAzureName() }", "func DefaultEncode(v interface{}) (http.Header, error) {\n\tenc := NewEncoder(&http.Header{})\n\tif err := enc.Encode(v); err != nil {\n\t\treturn nil, err\n\t}\n\treturn enc.Header(), nil\n}", "func NewHeaders()(*Headers) {\n m := &Headers{\n }\n m.backingStore = ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStoreFactoryInstance();\n m.SetAdditionalData(make(map[string]any))\n return m\n}", "func (htype *HType) MakeDefault(data interface{}) error {\n\tbtptrs, ok := data.([]*byte)\n\tif !ok {\n\t\treturn errors.New(\"data could not be interpreted\")\n\t}\n\thtype.defaultVal = make([]byte, 0)\n\tfor _, bptr := range btptrs {\n\t\thtype.defaultVal = append(htype.defaultVal, *bptr)\n\t}\n\treturn nil\n}", "func NewHistory(capacity int) History {\n history := History{}\n history.results = list.New()\n history.results.Init()\n return history\n}", "func (o *Okcoin) GenerateDefaultSubscriptions() ([]stream.ChannelSubscription, error) {\n\tvar subscriptions []stream.ChannelSubscription\n\tpairs, err := o.GetEnabledPairs(asset.Spot)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tspotFormat, err := o.GetPairFormat(asset.Spot, true)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tpairs = pairs.Format(spotFormat)\n\tchannels := defaultSubscriptions\n\tif o.Websocket.CanUseAuthenticatedEndpoints() {\n\t\tchannels = append(\n\t\t\tchannels,\n\t\t\twsAccount,\n\t\t\twsOrder,\n\t\t\twsOrdersAlgo,\n\t\t\twsAlgoAdvance,\n\t\t)\n\t}\n\tfor s := range channels {\n\t\tswitch channels[s] {\n\t\tcase wsInstruments:\n\t\t\tsubscriptions = append(subscriptions, stream.ChannelSubscription{\n\t\t\t\tChannel: channels[s],\n\t\t\t\tAsset: asset.Spot,\n\t\t\t})\n\t\tcase wsTickers, wsTrades, wsOrderbooks, wsOrderbooksL5, wsOrderbookL1, wsOrderbookTickByTickL50,\n\t\t\twsOrderbookTickByTickL400, wsCandle3M, wsCandle1M, wsCandle1W, wsCandle1D,\n\t\t\twsCandle2D, wsCandle3D, wsCandle5D,\n\t\t\twsCandle12H, wsCandle6H, wsCandle4H, wsCandle2H, wsCandle1H, wsCandle30m, wsCandle15m,\n\t\t\twsCandle5m, wsCandle3m, wsCandle1m, wsCandle3Mutc, wsCandle1Mutc, wsCandle1Wutc, wsCandle1Dutc,\n\t\t\twsCandle2Dutc, wsCandle3Dutc, wsCandle5Dutc, wsCandle12Hutc, wsCandle6Hutc:\n\t\t\tfor p := range pairs {\n\t\t\t\tsubscriptions = append(subscriptions, stream.ChannelSubscription{\n\t\t\t\t\tChannel: channels[s],\n\t\t\t\t\tCurrency: pairs[p],\n\t\t\t\t})\n\t\t\t}\n\t\tcase wsStatus:\n\t\t\tsubscriptions = append(subscriptions, stream.ChannelSubscription{\n\t\t\t\tChannel: channels[s],\n\t\t\t})\n\t\tcase wsAccount:\n\t\t\tcurrenciesMap := map[currency.Code]bool{}\n\t\t\tfor p := range pairs {\n\t\t\t\tif reserved, okay := currenciesMap[pairs[p].Base]; !okay && !reserved {\n\t\t\t\t\tsubscriptions = append(subscriptions, stream.ChannelSubscription{\n\t\t\t\t\t\tChannel: channels[s],\n\t\t\t\t\t\tParams: map[string]interface{}{\n\t\t\t\t\t\t\t\"ccy\": pairs[p].Base,\n\t\t\t\t\t\t},\n\t\t\t\t\t})\n\t\t\t\t\tcurrenciesMap[pairs[p].Base] = true\n\t\t\t\t}\n\t\t\t}\n\t\t\tfor p := range pairs {\n\t\t\t\tif reserved, okay := currenciesMap[pairs[p].Quote]; !okay && !reserved {\n\t\t\t\t\tsubscriptions = append(subscriptions, stream.ChannelSubscription{\n\t\t\t\t\t\tChannel: channels[s],\n\t\t\t\t\t\tParams: map[string]interface{}{\n\t\t\t\t\t\t\t\"ccy\": pairs[p].Quote,\n\t\t\t\t\t\t},\n\t\t\t\t\t})\n\t\t\t\t\tcurrenciesMap[pairs[p].Quote] = true\n\t\t\t\t}\n\t\t\t}\n\t\tcase wsOrder, wsOrdersAlgo, wsAlgoAdvance:\n\t\t\tfor p := range pairs {\n\t\t\t\tsubscriptions = append(subscriptions, stream.ChannelSubscription{\n\t\t\t\t\tChannel: channels[s],\n\t\t\t\t\tCurrency: pairs[p],\n\t\t\t\t\tAsset: asset.Spot,\n\t\t\t\t})\n\t\t\t}\n\t\tdefault:\n\t\t\treturn nil, fmt.Errorf(\"unsupported websocket channel %v\", channels[s])\n\t\t}\n\t}\n\treturn subscriptions, nil\n}", "func (o *GetTagAuditLogsWithHistoryParams) WithDefaults() *GetTagAuditLogsWithHistoryParams {\n\to.SetDefaults()\n\treturn o\n}", "func (b *Bitmex) SetDefaults() {\n\tb.Name = \"Bitmex\"\n\tb.Enabled = true\n\tb.Verbose = true\n\tb.API.CredentialsValidator.RequiresKey = true\n\tb.API.CredentialsValidator.RequiresSecret = true\n\n\tconfigFmt := &currency.PairFormat{Uppercase: true, Delimiter: currency.DashDelimiter}\n\tstandardRequestFmt := &currency.PairFormat{Uppercase: true}\n\tspotRequestFormat := &currency.PairFormat{Uppercase: true, Delimiter: currency.UnderscoreDelimiter}\n\n\tspot := currency.PairStore{RequestFormat: spotRequestFormat, ConfigFormat: configFmt}\n\terr := b.StoreAssetPairFormat(asset.Spot, spot)\n\tif err != nil {\n\t\tlog.Errorln(log.ExchangeSys, err)\n\t}\n\n\tperp := currency.PairStore{RequestFormat: standardRequestFmt, ConfigFormat: configFmt}\n\terr = b.StoreAssetPairFormat(asset.PerpetualContract, perp)\n\tif err != nil {\n\t\tlog.Errorln(log.ExchangeSys, err)\n\t}\n\n\tfutures := currency.PairStore{RequestFormat: standardRequestFmt, ConfigFormat: configFmt}\n\terr = b.StoreAssetPairFormat(asset.Futures, futures)\n\tif err != nil {\n\t\tlog.Errorln(log.ExchangeSys, err)\n\t}\n\n\tindex := currency.PairStore{RequestFormat: standardRequestFmt, ConfigFormat: configFmt}\n\terr = b.StoreAssetPairFormat(asset.Index, index)\n\tif err != nil {\n\t\tlog.Errorln(log.ExchangeSys, err)\n\t}\n\n\terr = b.DisableAssetWebsocketSupport(asset.Index)\n\tif err != nil {\n\t\tlog.Errorln(log.ExchangeSys, err)\n\t}\n\n\tb.Features = exchange.Features{\n\t\tSupports: exchange.FeaturesSupported{\n\t\t\tREST: true,\n\t\t\tWebsocket: true,\n\t\t\tRESTCapabilities: protocol.Features{\n\t\t\t\tTickerBatching: true,\n\t\t\t\tTickerFetching: true,\n\t\t\t\tTradeFetching: true,\n\t\t\t\tOrderbookFetching: true,\n\t\t\t\tAutoPairUpdates: true,\n\t\t\t\tAccountInfo: true,\n\t\t\t\tGetOrder: true,\n\t\t\t\tGetOrders: true,\n\t\t\t\tCancelOrders: true,\n\t\t\t\tCancelOrder: true,\n\t\t\t\tSubmitOrder: true,\n\t\t\t\tSubmitOrders: true,\n\t\t\t\tModifyOrder: true,\n\t\t\t\tDepositHistory: true,\n\t\t\t\tWithdrawalHistory: true,\n\t\t\t\tUserTradeHistory: true,\n\t\t\t\tCryptoDeposit: true,\n\t\t\t\tCryptoWithdrawal: true,\n\t\t\t\tTradeFee: true,\n\t\t\t\tCryptoWithdrawalFee: true,\n\t\t\t},\n\t\t\tWebsocketCapabilities: protocol.Features{\n\t\t\t\tTradeFetching: true,\n\t\t\t\tOrderbookFetching: true,\n\t\t\t\tSubscribe: true,\n\t\t\t\tUnsubscribe: true,\n\t\t\t\tAuthenticatedEndpoints: true,\n\t\t\t\tAccountInfo: true,\n\t\t\t\tDeadMansSwitch: true,\n\t\t\t\tGetOrders: true,\n\t\t\t\tGetOrder: true,\n\t\t\t},\n\t\t\tWithdrawPermissions: exchange.AutoWithdrawCryptoWithAPIPermission |\n\t\t\t\texchange.WithdrawCryptoWithEmail |\n\t\t\t\texchange.WithdrawCryptoWith2FA |\n\t\t\t\texchange.NoFiatWithdrawals,\n\t\t},\n\t\tEnabled: exchange.FeaturesEnabled{\n\t\t\tAutoPairUpdates: true,\n\t\t},\n\t}\n\n\tb.Requester, err = request.New(b.Name,\n\t\tcommon.NewHTTPClientWithTimeout(exchange.DefaultHTTPTimeout),\n\t\trequest.WithLimiter(SetRateLimit()))\n\tif err != nil {\n\t\tlog.Errorln(log.ExchangeSys, err)\n\t}\n\tb.API.Endpoints = b.NewEndpoints()\n\terr = b.API.Endpoints.SetDefaultEndpoints(map[exchange.URL]string{\n\t\texchange.RestSpot: bitmexAPIURL,\n\t\texchange.WebsocketSpot: bitmexWSURL,\n\t})\n\tif err != nil {\n\t\tlog.Errorln(log.ExchangeSys, err)\n\t}\n\tb.Websocket = stream.New()\n\tb.WebsocketResponseMaxLimit = exchange.DefaultWebsocketResponseMaxLimit\n\tb.WebsocketResponseCheckTimeout = exchange.DefaultWebsocketResponseCheckTimeout\n\tb.WebsocketOrderbookBufferLimit = exchange.DefaultWebsocketOrderbookBufferLimit\n}", "func getHistory(ctx context.Context, args *map[string]interface{}) error {\n\tvar resultRows []Operation\n\n\tha, ok := (*args)[\"historyArgs\"].(historyArgs)\n\tif !ok {\n\t\treturn fmt.Errorf(\"unable to cast arguments to type historyArgs\")\n\t}\n\n\texportType := ha.exportType\n\n\t// Get everything from the fhir_endpoints_info_history table for the given URL\n\n\tvar selectHistory string\n\tif exportType == \"month\" {\n\t\tselectHistory = `\n\t\tSELECT fhir_endpoints_info_history.url, fhir_endpoints_metadata.http_response, fhir_endpoints_metadata.response_time_seconds, fhir_endpoints_metadata.errors,\n\t\tcapability_statement, tls_version, mime_types, operation_resource,\n\t\tfhir_endpoints_metadata.smart_http_response, smart_response, fhir_endpoints_info_history.updated_at, capability_fhir_version\n\t\tFROM fhir_endpoints_info_history, fhir_endpoints_metadata\n\t\tWHERE fhir_endpoints_info_history.metadata_id = fhir_endpoints_metadata.id AND fhir_endpoints_info_history.url=$1 AND (date_trunc('month', fhir_endpoints_info_history.updated_at) = date_trunc('month', current_date - INTERVAL '1 month'))\n\t\tORDER BY fhir_endpoints_info_history.updated_at DESC;`\n\t} else if exportType == \"30days\" {\n\t\tselectHistory = `\n\t\tSELECT fhir_endpoints_info_history.url, fhir_endpoints_metadata.http_response, fhir_endpoints_metadata.response_time_seconds, fhir_endpoints_metadata.errors,\n\t\tcapability_statement, tls_version, mime_types, operation_resource,\n\t\tfhir_endpoints_metadata.smart_http_response, smart_response, fhir_endpoints_info_history.updated_at, capability_fhir_version\n\t\tFROM fhir_endpoints_info_history, fhir_endpoints_metadata\n\t\tWHERE fhir_endpoints_info_history.metadata_id = fhir_endpoints_metadata.id AND fhir_endpoints_info_history.url=$1 AND (date_trunc('day', fhir_endpoints_info_history.updated_at) >= date_trunc('day', current_date - INTERVAL '30 day'))\n\t\tORDER BY fhir_endpoints_info_history.updated_at DESC;`\n\t} else if exportType == \"all\" {\n\t\tselectHistory = `\n\t\tSELECT fhir_endpoints_info_history.url, fhir_endpoints_metadata.http_response, fhir_endpoints_metadata.response_time_seconds, fhir_endpoints_metadata.errors,\n\t\tcapability_statement, tls_version, mime_types, operation_resource,\n\t\tfhir_endpoints_metadata.smart_http_response, smart_response, fhir_endpoints_info_history.updated_at, capability_fhir_version\n\t\tFROM fhir_endpoints_info_history, fhir_endpoints_metadata\n\t\tWHERE fhir_endpoints_info_history.metadata_id = fhir_endpoints_metadata.id AND fhir_endpoints_info_history.url=$1\n\t\tORDER BY fhir_endpoints_info_history.updated_at DESC;`\n\t}\n\n\thistoryRows, err := ha.store.DB.QueryContext(ctx, selectHistory, ha.fhirURL)\n\tif err != nil {\n\t\tlog.Warnf(\"Failed getting the history rows for URL %s. Error: %s\", ha.fhirURL, err)\n\t\tresult := Result{\n\t\t\tURL: ha.fhirURL,\n\t\t\tRows: resultRows,\n\t\t}\n\t\tha.result <- result\n\t\treturn nil\n\t}\n\n\t// Puts the rows in an array and sends it back on the channel to be processed\n\tdefer historyRows.Close()\n\tfor historyRows.Next() {\n\t\tvar op Operation\n\t\tvar url string\n\t\tvar capStat []byte\n\t\tvar smartRsp []byte\n\t\tvar opRes []byte\n\t\terr = historyRows.Scan(\n\t\t\t&url,\n\t\t\t&op.HTTPResponse,\n\t\t\t&op.HTTPResponseTimeSecond,\n\t\t\t&op.Errors,\n\t\t\t&capStat,\n\t\t\t&op.TLSVersion,\n\t\t\tpq.Array(&op.MIMETypes),\n\t\t\t&opRes,\n\t\t\t&op.SMARTHTTPResponse,\n\t\t\t&smartRsp,\n\t\t\t&op.UpdatedAt,\n\t\t\t&op.FHIRVersion)\n\t\tif err != nil {\n\t\t\tlog.Warnf(\"Error while scanning the rows of the history table for URL %s. Error: %s\", ha.fhirURL, err)\n\t\t\tresult := Result{\n\t\t\t\tURL: ha.fhirURL,\n\t\t\t\tRows: resultRows,\n\t\t\t}\n\t\t\tha.result <- result\n\t\t\treturn nil\n\t\t}\n\n\t\top.SMARTResponse = getSMARTResponse(smartRsp)\n\t\top.SupportedResources = getSupportedResources(opRes)\n\n\t\tresultRows = append(resultRows, op)\n\t}\n\tresult := Result{\n\t\tURL: ha.fhirURL,\n\t\tRows: resultRows,\n\t}\n\tha.result <- result\n\treturn nil\n}", "func (project *ProjectV1) SetDefaultHeaders(headers http.Header) {\n\tproject.Service.SetDefaultHeaders(headers)\n}", "func (lc *LoggerCreate) defaults() {\n\tif _, ok := lc.mutation.Log(); !ok {\n\t\tv := logger.DefaultLog\n\t\tlc.mutation.SetLog(v)\n\t}\n\tif _, ok := lc.mutation.Operator(); !ok {\n\t\tv := logger.DefaultOperator\n\t\tlc.mutation.SetOperator(v)\n\t}\n}", "func NewLogHeader() filters.Spec { return logHeader{} }", "func (xdc *XxxDemoCreate) defaults() {\n\tif _, ok := xdc.mutation.IsDel(); !ok {\n\t\tv := xxxdemo.DefaultIsDel\n\t\txdc.mutation.SetIsDel(v)\n\t}\n\tif _, ok := xdc.mutation.Memo(); !ok {\n\t\tv := xxxdemo.DefaultMemo\n\t\txdc.mutation.SetMemo(v)\n\t}\n\tif _, ok := xdc.mutation.Sort(); !ok {\n\t\tv := xxxdemo.DefaultSort\n\t\txdc.mutation.SetSort(v)\n\t}\n\tif _, ok := xdc.mutation.CreatedAt(); !ok {\n\t\tv := xxxdemo.DefaultCreatedAt()\n\t\txdc.mutation.SetCreatedAt(v)\n\t}\n\tif _, ok := xdc.mutation.UpdatedAt(); !ok {\n\t\tv := xxxdemo.DefaultUpdatedAt()\n\t\txdc.mutation.SetUpdatedAt(v)\n\t}\n\tif _, ok := xdc.mutation.Status(); !ok {\n\t\tv := xxxdemo.DefaultStatus\n\t\txdc.mutation.SetStatus(v)\n\t}\n\tif _, ok := xdc.mutation.ID(); !ok {\n\t\tv := xxxdemo.DefaultID()\n\t\txdc.mutation.SetID(v)\n\t}\n}", "func (x *fastReflection_ValidatorHistoricalRewardsRecord) New() protoreflect.Message {\n\treturn new(fastReflection_ValidatorHistoricalRewardsRecord)\n}", "func SetupDefaultAuditor(c *Config, stopCh <-chan struct{}) {\n\tDefault = NewAuditor(c)\n\tgo Default.Run(stopCh)\n}", "func (req *Request) DefaultHeaders(mKey string) (err error) {\n\treq.Header.Add(HeaderXDate, time.Now().UTC().Format(\"Mon, 02 Jan 2006 15:04:05 GMT\"))\n\treq.Header.Add(HeaderVersion, SupportedAPIVersion)\n\treq.Header.Add(HeaderUserAgent, UserAgent)\n\n\t// Auth\n\tparts := req.Method + \"\\n\" +\n\t\treq.rType + \"\\n\" +\n\t\treq.rLink + \"\\n\" +\n\t\treq.Header.Get(HeaderXDate) + \"\\n\" +\n\t\treq.Header.Get(\"Date\") + \"\\n\"\n\n\tpartsLower := strings.ToLower(parts)\n\n\tsign, err := authorize(partsLower, mKey)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tmasterToken := \"master\"\n\ttokenVersion := \"1.0\"\n\treq.Header.Add(HeaderAuth, url.QueryEscape(\"type=\"+masterToken+\"&ver=\"+tokenVersion+\"&sig=\"+sign))\n\treturn\n}", "func (service *BaseService) SetDefaultHeaders(headers http.Header) {\n\tservice.DefaultHeaders = headers\n}", "func NewDescribeAlarmHistoryRequestWithoutParam() *DescribeAlarmHistoryRequest {\n\n return &DescribeAlarmHistoryRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/regions/{regionId}/describeAlarmHistory\",\n Method: \"GET\",\n Header: nil,\n Version: \"v2\",\n },\n }\n}", "func Default() *API {\n\tapi := New()\n\tapi.Use(\n\t\ttimeout.Default(\"12s\"),\n\t\tlogging.Default(\"TONIC\"))\n\n\t// adding default encoders..\n\tapi.Encoder(\n\t\tencoding.JSON,\n\t\tencoding.XML,\n\t\tencoding.YAML,\n\t\tencoding.FORM)\n\n\treturn api\n}", "func (subscription *NamespacesTopicsSubscription) Default() {\n\tsubscription.defaultImpl()\n\tvar temp any = subscription\n\tif runtimeDefaulter, ok := temp.(genruntime.Defaulter); ok {\n\t\truntimeDefaulter.CustomDefault()\n\t}\n}", "func NewStorageProxyMetricsRangeMovingAverageHistogramGetDefault(code int) *StorageProxyMetricsRangeMovingAverageHistogramGetDefault {\n\treturn &StorageProxyMetricsRangeMovingAverageHistogramGetDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (f *FileV1) toHistory() History {\n\tm := make(map[string]Record)\n\tfor k, v := range f.Records {\n\t\tr := v.toRecord()\n\t\tm[k] = r\n\t}\n\treturn History{\n\t\trecords: m,\n\t}\n}", "func GetDefaultElkTimeSeries(URL string, index func() string, interval time.Duration) *ElkTimeseriesForwarder {\n\ttoReturn := &ElkTimeseriesForwarder{\n\t\tincomingChannel: make(chan events.Event, 1000),\n\t\tElkStaticForwarder: ElkStaticForwarder{\n\t\t\tinterval: interval,\n\t\t\turl: URL,\n\t\t\tindex: index,\n\t\t},\n\t}\n\n\t//start the manager\n\tgo toReturn.start()\n\n\treturn toReturn\n}", "func (cc *CompanyCreate) defaults() {\n\tif _, ok := cc.mutation.CreatedAt(); !ok {\n\t\tv := company.DefaultCreatedAt()\n\t\tcc.mutation.SetCreatedAt(v)\n\t}\n\tif _, ok := cc.mutation.UpdatedAt(); !ok {\n\t\tv := company.DefaultUpdatedAt()\n\t\tcc.mutation.SetUpdatedAt(v)\n\t}\n\tif _, ok := cc.mutation.Size(); !ok {\n\t\tv := company.DefaultSize\n\t\tcc.mutation.SetSize(v)\n\t}\n}", "func (globalLoadBalancerMonitor *GlobalLoadBalancerMonitorV1) SetDefaultHeaders(headers http.Header) {\n\tglobalLoadBalancerMonitor.Service.SetDefaultHeaders(headers)\n}", "func MakeDefaultReContract(db *pop.Connection) models.ReContract {\n\treturn MakeReContract(db, Assertions{})\n}", "func (bbc *BasicBannerCreate) defaults() {\n\tif _, ok := bbc.mutation.CreatedAt(); !ok {\n\t\tv := basicbanner.DefaultCreatedAt()\n\t\tbbc.mutation.SetCreatedAt(v)\n\t}\n\tif _, ok := bbc.mutation.Order(); !ok {\n\t\tv := basicbanner.DefaultOrder\n\t\tbbc.mutation.SetOrder(v)\n\t}\n\tif _, ok := bbc.mutation.Status(); !ok {\n\t\tv := basicbanner.DefaultStatus\n\t\tbbc.mutation.SetStatus(v)\n\t}\n}", "func (me XsdGoPkgHasElem_TopFov) TopFovDefault() Tangle90Type {\r\n\tvar x = new(Tangle90Type)\r\n\tx.Set(\"0.0\")\r\n\treturn *x\r\n}", "func NewUserExperienceAnalyticsDeviceStartupHistory()(*UserExperienceAnalyticsDeviceStartupHistory) {\n m := &UserExperienceAnalyticsDeviceStartupHistory{\n Entity: *NewEntity(),\n }\n return m\n}", "func (me XsdGoPkgHasElems_TopFov) TopFovDefault() Tangle90Type {\r\n\tvar x = new(Tangle90Type)\r\n\tx.Set(\"0.0\")\r\n\treturn *x\r\n}", "func (p *volumeGetFormatter) DefaultFormat() (string, error) {\n\treturn p.toTabbed()\n}", "func (asc *AlarmStatusCreate) defaults() {\n\tif _, ok := asc.mutation.CreateTime(); !ok {\n\t\tv := alarmstatus.DefaultCreateTime()\n\t\tasc.mutation.SetCreateTime(v)\n\t}\n\tif _, ok := asc.mutation.UpdateTime(); !ok {\n\t\tv := alarmstatus.DefaultUpdateTime()\n\t\tasc.mutation.SetUpdateTime(v)\n\t}\n}", "func (o ApiOperationRequestHeaderOutput) DefaultValue() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ApiOperationRequestHeader) *string { return v.DefaultValue }).(pulumi.StringPtrOutput)\n}", "func (ac *AlertCreate) defaults() {\n\tif _, ok := ac.mutation.CreatedAt(); !ok {\n\t\tv := alert.DefaultCreatedAt()\n\t\tac.mutation.SetCreatedAt(v)\n\t}\n\tif _, ok := ac.mutation.UpdatedAt(); !ok {\n\t\tv := alert.DefaultUpdatedAt()\n\t\tac.mutation.SetUpdatedAt(v)\n\t}\n}", "func (pc *PhoneCreate) defaults() {\n\tif _, ok := pc.mutation.CreatedAt(); !ok {\n\t\tv := phone.DefaultCreatedAt()\n\t\tpc.mutation.SetCreatedAt(v)\n\t}\n\tif _, ok := pc.mutation.ModifiedAt(); !ok {\n\t\tv := phone.DefaultModifiedAt()\n\t\tpc.mutation.SetModifiedAt(v)\n\t}\n}", "func (pageRuleApi *PageRuleApiV1) SetDefaultHeaders(headers http.Header) {\n\tpageRuleApi.Service.SetDefaultHeaders(headers)\n}", "func (obj *Response) Default() {\n\tobj.Program = \"Beq\"\n\tobj.Version = \"0.01\"\n}", "func (h *Headers) SensibleDefaults(header http.Header, status int) string {\n\tif h.IsEmpty() {\n\t\tif status == http.StatusMovedPermanently {\n\t\t\th.SetPublic().SetSharedMaxAge(60)\n\t\t\treturn h.String()\n\t\t}\n\n\t\tif header.Get(\"Expires\") == \"\" && header.Get(\"ETag\") == \"\" && header.Get(\"Last-Modified\") == \"\" {\n\t\t\th.NoCache()\n\t\t} else if header.Get(\"Expires\") != \"\" || header.Get(\"ETag\") != \"\" || header.Get(\"Last-Modified\") != \"\" {\n\t\t\th.SetPrivate().MustRevalidate()\n\t\t}\n\t}\n\n\tif !h.public && !h.private && !h.sharedMaxAge.Valid {\n\t\th.SetPrivate()\n\t}\n\treturn h.String()\n}", "func NewDefault() *instance {\n\treturn New(\n\t\t[]factory.Contract{\n\t\t\texampleMetadataFactory.New(),\n\t\t\tiotaMetadataFactory.New(),\n\t\t\tipfsMetadataFactory.New(),\n\t\t},\n\t)\n}", "func (record *PrivateDnsZonesSRVRecord) defaultImpl() { record.defaultAzureName() }", "func (o *ExportUsingGETParams) SetDefaults() {\n\tvar (\n\t\tendpointsDefault = string(\"Jenkins, Jira\")\n\n\t\tpipelineDefault = string(\"Deploy Production\")\n\n\t\tpipelinesDefault = string(\"Deploy Production, Dev\")\n\n\t\tprojectDefault = string(\"Project-1\")\n\t)\n\n\tval := ExportUsingGETParams{\n\t\tEndpoints: &endpointsDefault,\n\t\tPipeline: &pipelineDefault,\n\t\tPipelines: &pipelinesDefault,\n\t\tProject: &projectDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "func NewDefaultActionConfig() ActionConfig {\n\theaders := make(map[string]string)\n\tac := ActionConfig{\n\t\tErrorMessage: \"Sorry, I am unable to process your request.\",\n\t\tConversationAPIVersion: \"v1\",\n\t\tConversationAPIVersionHeader: \"Google-Assistant-API-Version\",\n\t}\n\theaders[ac.ConversationAPIVersionHeader] = ac.ConversationAPIVersion\n\tac.ResponseHeaders = headers\n\treturn ac\n}", "func NewVoiceHistoryExportGetForbidden() *VoiceHistoryExportGetForbidden {\n\treturn &VoiceHistoryExportGetForbidden{}\n}", "func (suite *TestHarnessAPISuite) TestNewDefaultBuilderNoAcceptHeader() {\n\treq := httptest.NewRequest(\"POST\", \"/build/DefaultMove\", nil)\n\tchiRouteCtx := chi.NewRouteContext()\n\tchiRouteCtx.URLParams.Add(\"action\", \"DefaultMove\")\n\treq = req.WithContext(context.WithValue(req.Context(), chi.RouteCtxKey, chiRouteCtx))\n\trr := httptest.NewRecorder()\n\thandler := NewDefaultBuilder(suite.HandlerConfig())\n\thandler.ServeHTTP(rr, req)\n\n\tsuite.Equal(http.StatusOK, rr.Code)\n\tsuite.Equal(\"application/json\", rr.Header().Get(\"Content-type\"))\n}", "func NewHeaders(titles []string) Headers {\n\ths := make(Headers)\n\tfor i, title := range titles {\n\t\tif title != \"\" {\n\t\t\ths[title] = i + 1\n\t\t\ths[fmt.Sprintf(\"-%s\", title)] = -hs[title]\n\t\t}\n\t}\n\treturn hs\n}", "func (wec *WorkExperienceCreate) defaults() {\n\tif _, ok := wec.mutation.CreatedAt(); !ok {\n\t\tv := workexperience.DefaultCreatedAt()\n\t\twec.mutation.SetCreatedAt(v)\n\t}\n\tif _, ok := wec.mutation.UpdatedAt(); !ok {\n\t\tv := workexperience.DefaultUpdatedAt()\n\t\twec.mutation.SetUpdatedAt(v)\n\t}\n}", "func CreateDefaultZapLogger(level zapcore.Level) (*zap.Logger, error) {\n\tlcfg := DefaultZapLoggerConfig\n\tlcfg.Level = zap.NewAtomicLevelAt(level)\n\tc, err := lcfg.Build()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn c, nil\n}", "func NewWithDefaultValues() Fizzbuzzer {\n\treturn New(3, 5, 15, \"Fizz\", \"Buzz\")\n}", "func defaultOptions() *options {\n\treturn &options{\n\t\tDial: client.DefaultDialFunc,\n\t\tDriverName: \"dqlite\",\n\t\tFormat: formatTabular,\n\t}\n}", "func flipDefaults() *flipRawConfig {\n\treturn &flipRawConfig{\n\t\tDirection: \"\",\n\t}\n}", "func (arc *AppointmentResultsCreate) defaults() {\n\tif _, ok := arc.mutation.AddtimeSave(); !ok {\n\t\tv := appointmentresults.DefaultAddtimeSave()\n\t\tarc.mutation.SetAddtimeSave(v)\n\t}\n\tif _, ok := arc.mutation.HourBeforeAppoint(); !ok {\n\t\tv := appointmentresults.DefaultHourBeforeAppoint\n\t\tarc.mutation.SetHourBeforeAppoint(v)\n\t}\n\tif _, ok := arc.mutation.MinuteBeforeAppoint(); !ok {\n\t\tv := appointmentresults.DefaultMinuteBeforeAppoint\n\t\tarc.mutation.SetMinuteBeforeAppoint(v)\n\t}\n}", "func (r *Release) inheritMaxHistory(s *State) {\n\tif s.Settings.GlobalMaxHistory != 0 {\n\t\tif r.MaxHistory == 0 {\n\t\t\tr.MaxHistory = s.Settings.GlobalMaxHistory\n\t\t}\n\t}\n}", "func (rule *NamespacesEventhubsAuthorizationRule) defaultImpl() { rule.defaultAzureName() }", "func DefaultDeclareKeys(\n\tdesc roachpb.RangeDescriptor, header roachpb.Header, req roachpb.Request, spans *spanset.SpanSet,\n) {\n\tif roachpb.IsReadOnly(req) {\n\t\tspans.Add(spanset.SpanReadOnly, req.Header())\n\t} else {\n\t\tspans.Add(spanset.SpanReadWrite, req.Header())\n\t}\n\tif header.Txn != nil {\n\t\theader.Txn.AssertInitialized(context.TODO())\n\t\tspans.Add(spanset.SpanReadOnly, roachpb.Span{\n\t\t\tKey: keys.AbortSpanKey(header.RangeID, header.Txn.ID),\n\t\t})\n\t}\n\tif header.ReturnRangeInfo {\n\t\tspans.Add(spanset.SpanReadOnly, roachpb.Span{Key: keys.RangeLeaseKey(header.RangeID)})\n\t\tspans.Add(spanset.SpanReadOnly, roachpb.Span{Key: keys.RangeDescriptorKey(desc.StartKey)})\n\t}\n}", "func init() {\n\tdefaultTablePrinter = New()\n}", "func NewVoiceHistoryExportGetBadRequest() *VoiceHistoryExportGetBadRequest {\n\treturn &VoiceHistoryExportGetBadRequest{}\n}", "func (o *GetEventLogsUsingGETParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func uxHistory(cmd cli.Command) cli.Command {\n\thistoryFlags := []cli.Flag{\n\t\tcli.BoolFlag{\n\t\t\tName: \"no-history\",\n\t\t\tUsage: \"do not create a history entry\",\n\t\t},\n\t\tcli.StringFlag{\n\t\t\tName: \"history.author\",\n\t\t\tUsage: \"author value for the history entry\",\n\t\t},\n\t\tcli.StringFlag{\n\t\t\tName: \"history.comment\",\n\t\t\tUsage: \"comment for the history entry\",\n\t\t},\n\t\tcli.StringFlag{\n\t\t\tName: \"history.created\",\n\t\t\tUsage: \"created value for the history entry\",\n\t\t},\n\t\tcli.StringFlag{\n\t\t\tName: \"history.created_by\",\n\t\t\tUsage: \"created_by value for the history entry\",\n\t\t},\n\t}\n\tcmd.Flags = append(cmd.Flags, historyFlags...)\n\n\toldBefore := cmd.Before\n\tcmd.Before = func(ctx *cli.Context) error {\n\t\t// --no-history is incompatible with other --history.* options.\n\t\tif ctx.Bool(\"no-history\") {\n\t\t\tfor _, flag := range historyFlags {\n\t\t\t\tif name := flag.GetName(); name == \"no-history\" {\n\t\t\t\t\tcontinue\n\t\t\t\t} else if ctx.IsSet(name) {\n\t\t\t\t\treturn errors.Errorf(\"--no-history and --%s may not be specified together\", name)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t// Include any old befores set.\n\t\tif oldBefore != nil {\n\t\t\treturn oldBefore(ctx)\n\t\t}\n\t\treturn nil\n\t}\n\n\treturn cmd\n}" ]
[ "0.53699", "0.47061056", "0.46976998", "0.4586604", "0.45729527", "0.4521324", "0.45175835", "0.4513445", "0.44804534", "0.44731224", "0.4471029", "0.44423386", "0.44399828", "0.44320828", "0.44135085", "0.44066495", "0.43980286", "0.43812734", "0.43722022", "0.43682012", "0.43568063", "0.43530354", "0.43344182", "0.42978096", "0.42956293", "0.42849246", "0.42727745", "0.4255144", "0.4237826", "0.42348933", "0.42190942", "0.42151183", "0.4211037", "0.41818586", "0.41756392", "0.41702414", "0.41502032", "0.41437268", "0.4132356", "0.4125595", "0.41155985", "0.40948838", "0.4093087", "0.40929", "0.40898094", "0.40886337", "0.40634814", "0.4060215", "0.40597183", "0.40553096", "0.40548068", "0.4054326", "0.4054229", "0.40533242", "0.40476403", "0.40466052", "0.40390137", "0.40381813", "0.40358874", "0.4024311", "0.4021817", "0.40207332", "0.40174007", "0.4005065", "0.40046436", "0.3997246", "0.3994583", "0.39931378", "0.39872602", "0.39848062", "0.39823547", "0.3974882", "0.39746812", "0.396961", "0.39690918", "0.39652595", "0.39575925", "0.39434475", "0.39424878", "0.3938059", "0.39368698", "0.39366618", "0.39325666", "0.39321363", "0.39319903", "0.39250267", "0.39202943", "0.39199278", "0.39171532", "0.39091125", "0.3900817", "0.38984013", "0.38976628", "0.38890144", "0.38799632", "0.38733774", "0.38695782", "0.38642588", "0.3861226", "0.38604173" ]
0.72032666
0
Code gets the status code for the voice history export get default response
func (o *VoiceHistoryExportGetDefault) Code() int { return o._statusCode }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *GetPresetChatSessionIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetPresetChatSessionIDOK) Code() int {\n\treturn 200\n}", "func (o *GetRunDownstreamLineageOK) Code() int {\n\treturn 200\n}", "func (o *GetTimestampResponseDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *DeleteCallsCallLogDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *IngestFromURIDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *VoiceDeliveryReceiptAutomationsGetDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *AddAPIDefault) Code() int {\n\treturn o._statusCode\n}", "func (r *Response) Code() int {\n\treturn r.recorder.Code\n}", "func (o *SMSInboundAutomationPostDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *CreateAddonV2Default) Code() int {\n\treturn o._statusCode\n}", "func (o *KnoxCallbackDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *QuerySampleV1Default) Code() int {\n\treturn o._statusCode\n}", "func (o *GetInteractionsInteractionFidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetRunDownstreamLineageDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetMeDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetAvailableExtensionsUUIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetVersionDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetFegLTENetworkIDSubscriberConfigBaseNamesDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetAdmissionPluginDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetHardwareFcportsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetRenterDownloadsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *CompactionManagerCompactionHistoryGetDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *AddExternalDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *SecurityLogForwardingCreateDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetDomainDataExtensionDefault) Code() int {\n\treturn o._statusCode\n}", "func (res *ResponseRecorder) StatusCode() int {\n\tif res.statusCode == 0 {\n\t\treturn 200\n\t}\n\treturn res.statusCode\n}", "func (o *GetTerminalAuditLogsMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PostHyperflexHxdpVersionsMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetEventAlertConditionDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetLeaderboardDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetAPIFeaturesNameDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetVersionOK) Code() int {\n\treturn 200\n}", "func (o *GetProductsOffersDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetResultTopFileDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetCatalogItemsUUIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ImportEventSourceDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *DeleteAppsAppCallsCallLogDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetEquipmentIoCardsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PostSimulationActivityDefault) Code() int {\n\treturn o._statusCode\n}", "func (o StatusResponseOutput) Code() pulumi.IntOutput {\n\treturn o.ApplyT(func(v StatusResponse) int { return v.Code }).(pulumi.IntOutput)\n}", "func (o *GetPollersDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GameServiceViewDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PollersDataGetDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetAgentTokenDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *FindVmsByFiltersDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetRestapiV10DictionaryLanguageDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *SearchLogQueryOK) Code() int {\n\treturn 200\n}", "func (o *UnclaimTrafficFilterLinkIDOK) Code() int {\n\treturn 200\n}", "func (o *GetPassesDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetAdapterHostFcInterfacesMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetDedupeReportDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *SaveSubscriptionDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetObmsLibraryIdentifierDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetMeOK) Code() int {\n\treturn 200\n}", "func (o *GetInteractionsInteractionFidOK) Code() int {\n\treturn 200\n}", "func (o *GetLibcVersionDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *StorageProxyMetricsRangeMovingAverageHistogramGetDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetMalQueryMetadataV1Default) Code() int {\n\treturn o._statusCode\n}", "func (o *GetSiteScriptDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetInteractionsInviteInviteCodeStatusDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *DeleteSpoeAgentDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *BounceDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetStorageFlexUtilControllersDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *FormatScoreServiceUpdateDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *DeleteReportsScanDefault) Code() int {\n\treturn o._statusCode\n}", "func (abcr AppendBlobsCreateResponse) StatusCode() int {\n\treturn abcr.rawResponse.StatusCode\n}", "func (o *GetPolicyUUIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o GoogleRpcStatusResponseOutput) Code() pulumi.IntOutput {\n\treturn o.ApplyT(func(v GoogleRpcStatusResponse) int { return v.Code }).(pulumi.IntOutput)\n}", "func (o *QueryScansOK) Code() int {\n\treturn 200\n}", "func (o *GetQuotaQuotaDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ImportArchiveDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetWebsiteGraphDataDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetResultTopFilesDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetPollersIdentifierDefault) Code() int {\n\treturn o._statusCode\n}", "func (bscfur BlobsStartCopyFromURLResponse) StatusCode() int {\n\treturn bscfur.rawResponse.StatusCode\n}", "func (o *SearchLogQueryDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetNiaapiDcnmHweolsMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ParametersDataDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PollersDeleteDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PostEntitiesEntityFidEventsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetNiaapiApicSweolsMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetTeamDetailDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *QueryDetectionIdsByFilterOK) Code() int {\n\treturn 200\n}", "func (o *GetAdapterHostEthInterfacesMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *DeleteFirmwareUpgradesMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PostHostAnnounceDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetHardwareDefault) Code() int {\n\treturn o._statusCode\n}", "func (bacfur BlobsAbortCopyFromURLResponse) StatusCode() int {\n\treturn bacfur.rawResponse.StatusCode\n}", "func (o *StartMySQLShowIndexActionDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetKeyPairsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PostInventoryGenericInventoryHoldersMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PostHclCompatibilityStatusesDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListDashboardsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetSearchSearchItemsMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *QueryScheduledScansOK) Code() int {\n\treturn 200\n}", "func (o *UtilityServiceReadyDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *TransferRunsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *WebModifyDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *UpdateHookDefault) Code() int {\n\treturn o._statusCode\n}" ]
[ "0.68350095", "0.6735041", "0.6682022", "0.6545765", "0.65426517", "0.6539515", "0.65327543", "0.65297025", "0.65208584", "0.65076256", "0.6482749", "0.6479563", "0.6476244", "0.6466792", "0.6441308", "0.6427225", "0.64193624", "0.64128894", "0.64086366", "0.64016336", "0.6398735", "0.6391827", "0.6376843", "0.6364769", "0.6356654", "0.6348731", "0.6346266", "0.63453245", "0.6341477", "0.63311595", "0.6328635", "0.63285244", "0.6325334", "0.63205504", "0.63176894", "0.6311613", "0.6308184", "0.62988317", "0.62944925", "0.6289323", "0.6286085", "0.6269552", "0.6265146", "0.6264038", "0.6260563", "0.6254554", "0.6253086", "0.62471664", "0.62439996", "0.6243465", "0.62378335", "0.6234634", "0.62341934", "0.6229709", "0.62253135", "0.62252736", "0.62145233", "0.620995", "0.6203927", "0.620071", "0.6199996", "0.61977243", "0.6196428", "0.6190412", "0.61869293", "0.6186143", "0.61845773", "0.6184063", "0.6183476", "0.61816937", "0.618045", "0.6175286", "0.6173144", "0.61724603", "0.6172206", "0.617208", "0.61688226", "0.61685205", "0.616595", "0.61643416", "0.6164294", "0.6160562", "0.616042", "0.61594653", "0.615781", "0.61520064", "0.61508614", "0.6148629", "0.6144084", "0.61430085", "0.6142568", "0.61415035", "0.6139561", "0.6133834", "0.61337507", "0.6131651", "0.6131114", "0.6127373", "0.612611", "0.6125984" ]
0.8039826
0
List prints containers according to `options`.
func List(ctx context.Context, client *containerd.Client, options types.ContainerListOptions) ([]ListItem, error) { containers, err := filterContainers(ctx, client, options.Filters, options.LastN, options.All) if err != nil { return nil, err } return prepareContainers(ctx, client, containers, options) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func printContainers(container *Container) {\n\tc := container\n\tfor c != nil {\n\t\tprintContainersRek(c, 0)\n\t\tc = c.Next\n\t}\n}", "func Print(dockerCli *command.DockerCli, ctx context.Context, tasks []swarm.Task, resolver *idresolver.IDResolver, noTrunc bool) error {\n\tsort.Stable(tasksBySlot(tasks))\n\n\twriter := tabwriter.NewWriter(dockerCli.Out(), 0, 4, 2, ' ', 0)\n\n\t// Ignore flushing errors\n\tdefer writer.Flush()\n\tfmt.Fprintln(writer, strings.Join([]string{\"ID\", \"NAME\", \"IMAGE\", \"NODE\", \"DESIRED STATE\", \"CURRENT STATE\", \"ERROR\", \"PORTS\"}, \"\\t\"))\n\n\tif err := print(writer, ctx, tasks, resolver, noTrunc); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func PrintContainer(traverse TraverseFn) string {\n\tvar sb strings.Builder\n\tsb.WriteRune('[')\n\ttraverse(func(v int) {\n\t\tif sb.Len() != 1 {\n\t\t\tsb.WriteRune(' ')\n\t\t}\n\t\tsb.WriteString(strconv.Itoa(v))\n\t})\n\tsb.WriteRune(']')\n\treturn sb.String()\n}", "func ListContainers() {\n\t// find path for /var/run/mydocker/\"\"/ -> /var/run/mydocker\n\tdirURL := fmt.Sprintf(container.DefaultInfoLocation, \"\")\n\tdirURL = dirURL[:len(dirURL)-1]\n\t// read all files under this directory\n\tfiles, err := ioutil.ReadDir(dirURL)\n\tif err != nil {\n\t\tlog.Errorf(\"read dir %s error %v\", dirURL, err)\n\t\treturn\n\t}\n\n\tvar containerInfos []*container.Info\n\t// loop through all files\n\tfor _, file := range files {\n\t\tcurContainerInfo, err := getContainerInfo(file)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"get container info error %v\", err)\n\t\t\tcontinue\n\t\t}\n\t\tcontainerInfos = append(containerInfos, curContainerInfo)\n\t}\n\n\t// use tabwrite.NewWriter to print container infos in the console\n\t// tabwriter calls the text/tabwriter library to print space aligned tables\n\tw := tabwriter.NewWriter(os.Stdout, 12, 1, 3, ' ', 0)\n\t// tab columns in the console\n\tfmt.Fprint(w, \"ID\\tNAME\\tPID\\tSTATUS\\tCOMMAND\\tCREATED\\n\")\n\tfor _, item := range containerInfos {\n\t\tfmt.Fprintf(w, \"%s\\t%s\\t%s\\t%s\\t%s\\t%s\\t\\n\",\n\t\t\titem.Id,\n\t\t\titem.Name,\n\t\t\titem.Pid,\n\t\t\titem.Status,\n\t\t\titem.Command,\n\t\t\titem.CreationTime)\n\t}\n\t// flush the stdout buffer zone and print the container list\n\tif err := w.Flush(); err != nil {\n\t\tlog.Errorf(\"flush error %v\", err)\n\t\treturn\n\t}\n}", "func (r *Runsc) List(context context.Context) ([]*runc.Container, error) {\n\tdata, stderr, err := cmdOutput(r.command(context, \"list\", \"--format=json\"), false)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"%w: %s\", err, stderr)\n\t}\n\tvar out []*runc.Container\n\tif err := json.Unmarshal(data, &out); err != nil {\n\t\treturn nil, err\n\t}\n\treturn out, nil\n}", "func List(client *gophercloud.ServiceClient, opts ListOptsBuilder) pagination.Pager {\n\turl := listURL(client)\n\tif opts != nil {\n\t\tquery, err := opts.ToContainerListQuery()\n\t\tif err != nil {\n\t\t\treturn pagination.Pager{Err: err}\n\t\t}\n\t\turl += query\n\t}\n\treturn pagination.NewPager(client, url, func(r pagination.PageResult) pagination.Page {\n\t\treturn ContainerPage{pagination.LinkedPageBase{PageResult: r}}\n\t})\n}", "func (ps PlanSlice) Print() {\n\tfor _, p := range ps {\n\t\tconsole.Println(p.NameVersion(), human.ByteSize(p.Size))\n\t}\n\tconsole.Flush()\n}", "func List(c *gophercloud.ServiceClient, containerName string, opts ListOptsBuilder) pagination.Pager {\n\theaders := map[string]string{\"Accept\": \"text/plain\", \"Content-Type\": \"text/plain\"}\n\n\turl := listURL(c, containerName)\n\tif opts != nil {\n\t\tfull, query, err := opts.ToObjectListParams()\n\t\tif err != nil {\n\t\t\treturn pagination.Pager{Err: err}\n\t\t}\n\t\turl += query\n\n\t\tif full {\n\t\t\theaders = map[string]string{\"Accept\": \"application/json\", \"Content-Type\": \"application/json\"}\n\t\t}\n\t}\n\n\tcreatePage := func(r pagination.PageResult) pagination.Page {\n\t\tp := ObjectPage{pagination.MarkerPageBase{PageResult: r}}\n\t\tp.MarkerPageBase.Owner = p\n\t\treturn p\n\t}\n\n\tpager := pagination.NewPager(c, url, createPage)\n\tpager.Headers = headers\n\treturn pager\n}", "func (s *Service) List() error {\n\tcontainers, err := s.MyClient.ContainerList(context.TODO(), types.ContainerListOptions{})\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"ContainerList failed with error\")\n\t}\n\n\tlog.Println(\"List of containers that are running: \")\n\n\tfor _, thisContainer := range containers {\n\t\tlog.Println(\"container ID:\", thisContainer.ID, \"with container Name:\", thisContainer.Names[0])\n\t}\n\n\treturn nil\n}", "func (r *Rkt) ListContainers(filter string) ([]string, error) {\n\treturn listCRIContainers(r.Runner, filter)\n}", "func PrettyPrint(channel chan tor.ObjectSet, params *CmdLineParams, group *sync.WaitGroup) {\n\n\tdefer group.Done()\n\n\tcounter := 0\n\tfor objects := range channel {\n\t\tfor object := range objects.Iterate(params.Filter) {\n\t\t\tcounter += 1\n\n\t\t\tswitch obj := object.(type) {\n\t\t\tcase *tor.RouterStatus:\n\t\t\t\tPrintInfo(params.DescriptorDir, obj)\n\t\t\tcase *tor.RouterDescriptor:\n\t\t\t\tfmt.Println(obj)\n\t\t\t}\n\t\t}\n\t}\n\tlog.Printf(\"Printed %d objects.\\n\", counter)\n}", "func logContainer(c *cli.Context) {\n\tflAppend := c.Bool(\"append\")\n\tflSize := c.Bool(\"size\")\n\n\tif flAppend && flSize {\n\t\tlog.Fatal(\"Could not specify both --append and --size flags.\")\n\t}\n\n\tif flAppend {\n\t\tappendContainerLog(c)\n\t\tos.Exit(0)\n\t}\n\n\tif flSize {\n\t\tgetContainerLogSize(c)\n\t\tos.Exit(0)\n\t}\n\n\t// no flag specified, output logs\n}", "func DisplayServices(services []occlient.Service) {\n\tw := tabwriter.NewWriter(os.Stdout, 5, 2, 3, ' ', tabwriter.TabIndent)\n\tfmt.Fprintln(w, \"NAME\", \"\\t\", \"PLANS\")\n\tfor _, service := range services {\n\t\tfmt.Fprintln(w, service.Name, \"\\t\", strings.Join(service.PlanList, \",\"))\n\t}\n\tw.Flush()\n}", "func (o *RecoverOptions) List(client *ctrlclient.CtrlClient) ([]string, cobra.ShellCompDirective) {\n\tpods, err := o.selectPods(client, []string{})\n\tif err != nil {\n\t\tcommon.PrettyPrint(errors.Wrap(err, \"select pods\").Error(), 0, common.Red)\n\t\treturn nil, cobra.ShellCompDirectiveNoFileComp\n\t}\n\n\tvar names []string\n\tfor _, pod := range pods {\n\t\tnames = append(names, pod.Name)\n\t}\n\n\treturn names, cobra.ShellCompDirectiveNoFileComp\n}", "func (c ContainerListResult) String() (out string) {\n\tfor k, v := range c {\n\t\tout += fmt.Sprintf(\"%s => %s\\n\", k, v)\n\t}\n\treturn out\n}", "func (c *Cli) PrintOpts() {\n\tfmt.Printf(\n\t\t`\n========================================================================\nREADING RAILWAYS SCHEDULER\n========================================================================\nOptions - (Enter the number of your selected option)\n(1) - Print full schedule\n(2) - Print station schedule\n(3) - Look up stationd id\n(4) - Look up station name\n(5) - Servie available\n(6) - Nonstop service available\n(7) - Find route (Shortest riding time)\n(8) - Find route (Shortest overall travel time)\n(9) - Exit\n`)\n}", "func List(client *eclcloud.ServiceClient, opts ListOptsBuilder) pagination.Pager {\n\turl := listURL(client)\n\tif opts != nil {\n\t\tquery, err := opts.ToQosOptionsListQuery()\n\t\tif err != nil {\n\t\t\treturn pagination.Pager{Err: err}\n\t\t}\n\t\turl += query\n\t}\n\treturn pagination.NewPager(client, url, func(r pagination.PageResult) pagination.Page {\n\t\treturn QosOptionPage{pagination.LinkedPageBase{PageResult: r}}\n\t})\n}", "func (d deck) print() {\n\t// loop declaration to iterate over slice till its range\n\tfor index, cards := range d {\n\t\tfmt.Println(index, cards)\n\t}\n}", "func PrintList(t Outformatter) {\n\tprintout(t, \"list\", \"print\")\n}", "func ListContainer(c *gin.Context) {\n\theader := \"container.List\"\n\t// get list options\n\tfilter, err := filters.FromParam(c.Query(\"filters\"))\n\tif err != nil {\n\t\tlogrus.Panic(err)\n\t}\n\n\tlistOpts := types.ContainerListOptions{\n\t\tAll: httputils.BoolValue(c.Query(\"all\")),\n\t\tSize: httputils.BoolValue(c.Query(\"size\")),\n\t\tSince: c.Query(\"since\"),\n\t\tBefore: c.Query(\"before\"),\n\t\tFilters: filter,\n\t}\n\n\tif tmpLimit := c.Query(\"limit\"); tmpLimit != \"\" {\n\t\tlimit, err := strconv.Atoi(tmpLimit)\n\t\tif err != nil {\n\t\t\tlogrus.Panic(err)\n\t\t}\n\t\tlistOpts.Limit = limit\n\t}\n\t// get target address\n\ttargetAddr, err := utils.ParseAddress(c.Query(\"Address\"))\n\n\tlistReqOpts := container.ListReqOpts{\n\t\tAddress: targetAddr,\n\t\tContainerListOptions: listOpts,\n\t}\n\n\tcontainers, err := container.ListContainers(listReqOpts)\n\tif err != nil {\n\t\tutils.ReportErr(c, http.StatusInternalServerError, err)\n\t\tlogrus.Panic(err)\n\t}\n\n\t// return the result\n\tlist := make(gin.H)\n\tfor _, Container := range containers {\n\t\tlogrus.WithFields(logrus.Fields{\n\t\t\t\"ContainerID\": Container.ID[:10],\n\t\t\t\"Image\": Container.Image,\n\t\t}).Infof(\"%s, List infos\", header)\n\t\tlist[Container.ID[:10]] = Container.Image\n\t}\n\tc.JSON(http.StatusOK, list)\n}", "func (c *Firewall) ShowList() ([]string, error) {\n\tans := c.container()\n\treturn c.ns.Listing(util.Show, c.pather(), ans)\n}", "func ListContainerOK(t goatest.TInterface, ctx context.Context, service *goa.Service, ctrl app.ContainerController) (http.ResponseWriter, app.GoaContainerListEachCollection) {\n\t// Setup service\n\tvar (\n\t\tlogBuf bytes.Buffer\n\t\tresp interface{}\n\n\t\trespSetter goatest.ResponseSetterFunc = func(r interface{}) { resp = r }\n\t)\n\tif service == nil {\n\t\tservice = goatest.Service(&logBuf, respSetter)\n\t} else {\n\t\tlogger := log.New(&logBuf, \"\", log.Ltime)\n\t\tservice.WithLogger(goa.NewLogger(logger))\n\t\tnewEncoder := func(io.Writer) goa.Encoder { return respSetter }\n\t\tservice.Encoder = goa.NewHTTPEncoder() // Make sure the code ends up using this decoder\n\t\tservice.Encoder.Register(newEncoder, \"*/*\")\n\t}\n\n\t// Setup request context\n\trw := httptest.NewRecorder()\n\tu := &url.URL{\n\t\tPath: fmt.Sprintf(\"/api/v2/container/list\"),\n\t}\n\treq, err := http.NewRequest(\"GET\", u.String(), nil)\n\tif err != nil {\n\t\tpanic(\"invalid test \" + err.Error()) // bug\n\t}\n\tprms := url.Values{}\n\tif ctx == nil {\n\t\tctx = context.Background()\n\t}\n\tgoaCtx := goa.NewContext(goa.WithAction(ctx, \"ContainerTest\"), rw, req, prms)\n\tlistCtx, _err := app.NewListContainerContext(goaCtx, req, service)\n\tif _err != nil {\n\t\te, ok := _err.(goa.ServiceError)\n\t\tif !ok {\n\t\t\tpanic(\"invalid test data \" + _err.Error()) // bug\n\t\t}\n\t\tt.Errorf(\"unexpected parameter validation error: %+v\", e)\n\t\treturn nil, nil\n\t}\n\n\t// Perform action\n\t_err = ctrl.List(listCtx)\n\n\t// Validate response\n\tif _err != nil {\n\t\tt.Fatalf(\"controller returned %+v, logs:\\n%s\", _err, logBuf.String())\n\t}\n\tif rw.Code != 200 {\n\t\tt.Errorf(\"invalid response status code: got %+v, expected 200\", rw.Code)\n\t}\n\tvar mt app.GoaContainerListEachCollection\n\tif resp != nil {\n\t\tvar _ok bool\n\t\tmt, _ok = resp.(app.GoaContainerListEachCollection)\n\t\tif !_ok {\n\t\t\tt.Fatalf(\"invalid response media: got variable of type %T, value %+v, expected instance of app.GoaContainerListEachCollection\", resp, resp)\n\t\t}\n\t\t_err = mt.Validate()\n\t\tif _err != nil {\n\t\t\tt.Errorf(\"invalid response media type: %s\", _err)\n\t\t}\n\t}\n\n\t// Return results\n\treturn rw, mt\n}", "func printBlobList(blobClient *storage.BlobStorageClient, containerName string) error {\n\tfmt.Printf(\"Get blob list from container '%v'...\\n\", containerName)\n\tlist, err := blobClient.ListBlobs(containerName, storage.ListBlobsParameters{})\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Printf(\"Blobs inside '%v' container:\\n\", containerName)\n\tfor _, b := range list.Blobs {\n\t\tfmt.Printf(\"\\t%v\\n\", b.Name)\n\t}\n\treturn nil\n}", "func (c ECSContainer) Print() {\n\tfmt.Println(\"docker container id: \", c.DockerCID)\n\tfmt.Println(\"docker container name: \", c.DockerCName)\n\tfmt.Println(\"name: \", c.Name)\n\tfmt.Println(\"privateIP of running container: \", c.PrivateIP)\n}", "func (c *Collection) writeStdout() {\n\tfor _, s := range c.Services {\n\t\tfmt.Println(s.Name)\n\t\tfor _, h := range s.Endpoint.Host {\n\t\t\tfmt.Println(h)\n\t\t}\n\t\tfmt.Println(\"\")\n\t}\n}", "func PrintCommands() {\n logger.Log(fmt.Sprintln(\"** Daemonized Commands **\"))\n for cmd, desc := range DaemonizedCommands() {\n logger.Log(fmt.Sprintf(\"%15s: %s\\n\", cmd, desc.description))\n }\n\n logger.Log(fmt.Sprintln(\"** Information Commands **\"))\n for cmd, desc := range InfoCommands() {\n logger.Log(fmt.Sprintf(\"%15s: %s\\n\", cmd, desc.description))\n }\n\n logger.Log(fmt.Sprintln(\"** Interactive Commands **\"))\n for cmd, desc := range InteractiveCommands() {\n logger.Log(fmt.Sprintf(\"%15s: %s\\n\", cmd, desc.description))\n }\n}", "func Print(xc *app.ExecutionContext, cmdNameParam string, logger *log.Entry, client *docker.Client, checkVersion, inContainer, isDSImage bool) {\n\n\tovApp := ovars{\n\t\t\"cmd\": cmdNameParam,\n\t\t\"version\": v.Current(),\n\t\t\"container\": inContainer,\n\t\t\"dsimage\": isDSImage,\n\t\t\"location\": fsutil.ExeDir(),\n\t}\n\n\tif checkVersion {\n\t\tvinfo := Check(inContainer, isDSImage)\n\t\toutdated := \"unknown\"\n\t\tcurrent := \"unknown\"\n\t\tif vinfo != nil && vinfo.Status == \"success\" {\n\t\t\toutdated = fmt.Sprintf(\"%v\", vinfo.Outdated)\n\t\t\tcurrent = vinfo.Current\n\t\t}\n\t\tovApp[\"outdated\"] = outdated\n\t\tovApp[\"current\"] = current\n\t\tovApp[\"verdict\"] = GetCheckVersionVerdict(vinfo)\n\t}\n\txc.Out.Info(\"app\", ovApp)\n\n\thostInfo := system.GetSystemInfo()\n\tovHost := ovars{\n\t\t\"cmd\": cmdNameParam,\n\t\t\"osname\": hostInfo.Distro.DisplayName,\n\t\t\"osbuild\": hostInfo.OsBuild,\n\t\t\"version\": hostInfo.Version,\n\t\t\"release\": hostInfo.Release,\n\t\t\"sysname\": hostInfo.Sysname,\n\t}\n\txc.Out.Info(\"host\", ovHost)\n\n\tif client != nil {\n\t\tinfo, err := client.Info()\n\t\tif err != nil {\n\t\t\txc.Out.Error(\"error getting docker info\", err.Error())\n\t\t\txc.Out.State(\"exited\",\n\t\t\t\tovars{\n\t\t\t\t\t\"exit.code\": -1,\n\t\t\t\t})\n\t\t\txc.Exit(-1)\n\t\t}\n\n\t\tovDocker := ovars{\n\t\t\t\"cmd\": cmdNameParam,\n\t\t\t\"name\": info.Name,\n\t\t\t\"kernel.version\": info.KernelVersion,\n\t\t\t\"operating.system\": info.OperatingSystem,\n\t\t\t\"ostype\": info.OSType,\n\t\t\t\"server.version\": info.ServerVersion,\n\t\t\t\"architecture\": info.Architecture,\n\t\t}\n\t\txc.Out.Info(\"docker\", ovDocker)\n\n\t\tver, err := client.Version()\n\t\tif err != nil {\n\t\t\txc.Out.Error(\"error getting docker client version\", err.Error())\n\t\t\txc.Out.State(\"exited\",\n\t\t\t\tovars{\n\t\t\t\t\t\"exit.code\": -1,\n\t\t\t\t})\n\t\t\txc.Exit(-1)\n\t\t}\n\t\tovDockerClient := ovars{\n\t\t\t\"cmd\": cmdNameParam,\n\t\t\t\"api.version\": ver.Get(\"ApiVersion\"),\n\t\t\t\"mini.api.version\": ver.Get(\"MinAPIVersion\"),\n\t\t\t\"build.time\": ver.Get(\"BuildTime\"),\n\t\t\t\"git.commit\": ver.Get(\"GitCommit\"),\n\t\t}\n\t\txc.Out.Info(\"dclient\", ovDockerClient)\n\t} else {\n\t\txc.Out.Info(\"no.docker.client\", ovars{})\n\t}\n\n}", "func (p *Provider) ContainerList(forAll bool, withIds bool, nameFilter string) (err error) {\n\tvar (\n\t\tcli *client.Client\n\t\tcontainers []types.Container\n\t)\n\tcli, err = client.NewClientWithOpts(client.FromEnv)\n\tif err != nil {\n\t\treturn err\n\t}\n\tcontainers, err = cli.ContainerList(p.getConListCondition(forAll))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn p.queryConByName(containers, withIds, nameFilter)\n}", "func (c *Module) List(ns string) ([]pkg.ContainerID, error) {\n\tlog.Debug().Str(\"ns\", ns).Msg(\"list containers\")\n\n\tclient, err := containerd.New(c.containerd)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer client.Close()\n\n\tctx := namespaces.WithNamespace(context.Background(), ns)\n\n\tcontainers, err := client.Containers(ctx, \"\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tids := make([]pkg.ContainerID, 0, len(containers))\n\n\tfor _, c := range containers {\n\t\tids = append(ids, pkg.ContainerID(c.ID()))\n\t}\n\n\tlog.Debug().Str(\"ns\", ns).Msg(\"containers list generated\")\n\treturn ids, nil\n}", "func (e *ContainerService) List() (data ContainerListResult, err error) {\n\terr = e.client.magicRequestDecoder(\"GET\", \"containers\", nil, &data)\n\treturn\n}", "func (list *List) PrintOption(option string) int {\n\tlist.colors.Option.Set()\n\tbytes, _ := list.Print(list.indent + option)\n\tcolor.Unset()\n\n\treturn bytes\n}", "func (c *Clusters) Print() {\n\tmsg.Info(\"Clusters Config\")\n\tmsg.IndentInc()\n\tfor _, cluster := range *c {\n\t\tcluster.Print()\n\t}\n\tmsg.IndentDec()\n}", "func main() {\n\tflag.Parse()\n\tflag.Set(\"logtostderr\", \"true\")\n\n\tif flag.NArg() == 2 {\n\t\tif err := containersvc.Start(flag.Arg(0), flag.Arg(1),\n\t\t\t&containersvc.Config{}); err != nil {\n\n\t\t\tglog.Fatal(err)\n\t\t}\n\n\t\treturn\n\t}\n\n\tif flag.NArg() == 3 {\n\t\tvols := flag.Args()[2:]\n\t\tif err := containersvc.Start(flag.Arg(0), flag.Arg(1),\n\t\t\t&containersvc.Config{Volumes: vols}); err != nil {\n\n\t\t\tglog.Fatal(err)\n\t\t}\n\n\t\treturn\n\t}\n\n\tif flag.NArg() == 1 {\n\t\timg := flag.Arg(0)\n\t\tif err := containersvc.Status(img, \"\"); err != nil {\n\t\t\tglog.Fatal(err)\n\t\t}\n\t\tif err := containersvc.Stop(img, \"\", false); err != nil {\n\t\t\tglog.Fatal(err)\n\t\t}\n\t\tif err := containersvc.Status(img, \"\"); err != nil {\n\t\t\tglog.Fatal(err)\n\t\t}\n\n\t\treturn\n\t}\n}", "func List(g *types.Cmd) {\n\tg.AddOptions(\"list\")\n}", "func PrintIOCs(iocs []*IOC, format string) string {\n\tswitch format {\n\tcase \"csv\":\n\t\treturn PrintIOCsCSV(iocs)\n\tcase \"table\":\n\t\treturn PrintIOCsTable(iocs)\n\tdefault:\n\t\treturn PrintIOCsCSV(iocs)\n\t}\n}", "func (d deck) print() {\n\tfor index, card := range d {\n\t\tfmt.Println(index, card)\n\t}\n}", "func List(c *gophercloud.ServiceClient, opts ListOpts) pagination.Pager {\n\tq, err := gophercloud.BuildQueryString(&opts)\n\tif err != nil {\n\t\treturn pagination.Pager{Err: err}\n\t}\n\tu := rootURL(c) + q.String()\n\treturn pagination.NewPager(c, u, func(r pagination.PageResult) pagination.Page {\n\t\treturn PoolPage{pagination.LinkedPageBase{PageResult: r}}\n\t})\n}", "func (d *Docker) List(r *kite.Request) (interface{}, error) {\n\tfilter := dockerclient.ListContainersOptions{\n\t\tAll: true,\n\t}\n\n\treturn d.client.ListContainers(filter)\n}", "func listOpts(w io.Writer, opts []string) {\n\tsort.Strings(opts)\n\n\tfieldWidth := 0\n\tfor _, opt := range opts {\n\t\tdef, ok := optDefs[opt]\n\t\tif !ok {\n\t\t\tpanic(fmt.Sprintf(\"undefined option: %s\", opt))\n\t\t}\n\n\t\tn := len(opt)\n\t\tif def.argFmt != \"\" {\n\t\t\tn += len(def.argFmt) + 1\n\t\t}\n\n\t\tif n+4 > fieldWidth {\n\t\t\tfieldWidth = n + 4\n\t\t}\n\t}\n\n\tfor _, opt := range opts {\n\t\tvar builder strings.Builder\n\t\tdef, _ := optDefs[opt]\n\t\targFmt := \"\"\n\t\tif def.argFmt != \"\" {\n\t\t\targFmt = \" \" + def.argFmt\n\t\t}\n\t\tbuilder.WriteString(fmt.Sprintf(\"-%-*s%s\", fieldWidth, opt+argFmt, def.desc))\n\t\tif def.defaultLabel != nil {\n\t\t\tbuilder.WriteString(fmt.Sprintf(\" (default: %v)\", def.defaultLabel))\n\t\t}\n\n\t\tfmt.Fprintf(w, \" %s\\n\", builder.String())\n\t}\n}", "func (d deck) print() {\n\tfor _, card := range d {\n\t\tfmt.Println(card)\n\t}\n}", "func PrintQuiet(dockerCli *command.DockerCli, tasks []swarm.Task) error {\n\tsort.Stable(tasksBySlot(tasks))\n\n\tout := dockerCli.Out()\n\n\tfor _, task := range tasks {\n\t\tfmt.Fprintln(out, task.ID)\n\t}\n\n\treturn nil\n}", "func listContainers(ctx context.Context, filters container.FilterBuilder) ([]*types.Node, error) {\n\tn, err := List(ctx, filters)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"failed to list containers\")\n\t}\n\treturn n, nil\n}", "func (r *remoteRuntimeService) ListContainers(ctx context.Context, filter *runtimeapi.ContainerFilter) ([]*runtimeapi.Container, error) {\n\tklog.V(10).InfoS(\"[RemoteRuntimeService] ListContainers\", \"filter\", filter, \"timeout\", r.timeout)\n\tctx, cancel := context.WithTimeout(ctx, r.timeout)\n\tdefer cancel()\n\n\treturn r.listContainersV1(ctx, filter)\n}", "func listContainer(token string, urlStr string, containerName string, marker string) ([]ObjectInfo, error) {\n\tfullUrl := urlStr\n\tif !strings.HasSuffix(urlStr, \"/\") {\n\t\tfullUrl += \"/\"\n\t}\n\tdaUrl, err := url.Parse(fullUrl)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdaUrl.Path += containerName\n\tdaUrl.RawQuery = fmt.Sprintf(\"limit=%d\", MAX_OBJECTS_PER_LISTING)\n\tif \"\" != \"marker\" {\n\t\tdaUrl.RawQuery += \"&marker=\" + url.QueryEscape(marker)\n\t}\n\n\treq, err := http.NewRequest(\"GET\", daUrl.String(), nil)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n req.Header.Set(\"User-Agent\", USER_AGENT)\n\treq.Header.Set(\"X-Auth-Token\", token)\n\treq.Header.Set(\"Accept\", \"application/json\")\n\n\tclient := &http.Client{}\n\tresp, err := client.Do(req)\n\n\t//if (resp.\n\n\tif err != nil {\n\t\tif resp != nil {\n\t\t\tresp.Body.Close()\n\t\t}\n\t\treturn nil, err\n\t}\n\n\t// read json http response\n\tjsonDataFromHttp, err := ioutil.ReadAll(resp.Body)\n\tresp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar listing []ObjectInfo\n\terr = json.Unmarshal(jsonDataFromHttp, &listing)\n\n\treturn listing, err\n}", "func (cli *CLI) PrintCommands() {\n\tfor _, command := range cli.commands {\n\t\tfmt.Printf(\" slackcli %s\", command.Name)\n\t\tfor _, param := range command.Params {\n\t\t\tfmt.Printf(\" [%s]\", param)\n\t\t}\n\t\tfmt.Println(\" \" + command.Help)\n\t}\n}", "func (c *ClientSetClient) ListPodsByOptions(namespace string, opts metav1.ListOptions) (*v1.PodList, error) {\n\tctx := context.TODO()\n\treturn c.clientset.CoreV1().Pods(namespace).List(ctx, opts)\n}", "func (o *Options) Print(v interface{}) {\n\trows, err := getFormattedOutput(o.Log, v, *o.FO, getFormatter(o.Log, v))\n\tif err != nil {\n\t\to.out.Write([]byte(fmt.Sprintf(\"%v\\n\", err)))\n\t\treturn\n\t}\n\to.out.Write([]byte(fmt.Sprintf(\"%s\\n\", strings.Join(rows, \"\\n\"))))\n}", "func PrintCards(stack []Card) string {\n\tvar s string\n\n\tfor _, c := range stack {\n\t\tif s != \"\" {\n\t\t\ts = s + \" \" + c.String()\n\t\t} else {\n\t\t\ts = c.String()\n\t\t}\n\t}\n\treturn s\n}", "func (d deck) print() {\n\tfor i, card := range d {\n\t\tfmt.Println(i+1, card)\n\t}\n\tfmt.Println(\"----------------\")\n}", "func Print(args ...string) error {\n\tfmt.Printf(\n\t\t`HELP\nREGISTER <username>\nCREATE_LISTING <username> <title> <description> <price> <category>\nDELETE_LISTING <username> <listing_id>\nGET_LISTING <username> <listing_id>\nGET_CATEGORY <username> <category> {sort_price|sort_time} {asc|dsc}\nGET_TOP_CATEGORY <username>\nEXIT\n`)\n\treturn nil\n}", "func printCommands(cmds []Commander) {\n\tconst format = \"%v\\t%v\\t%v\\n\"\n\ttw := new(tabwriter.Writer).Init(os.Stdout, 0, 8, 2, ' ', 0)\n\tfmt.Fprintf(tw, format, \"Alias\", \"Command\", \"Args\")\n\tfmt.Fprintf(tw, format, \"-----\", \"-------\", \"----\")\n\tfor _, t := range cmds {\n\t\tfmt.Fprintf(tw, format, t.Alias, t.Command, strings.Join(t.Args, \" \"))\n\t}\n\ttw.Flush() // calculate column widths and print table\n}", "func (d deck) print() {\n\tfor i, v := range d {\n\t\tfmt.Println(i, v)\n\t}\n}", "func (d deck) print() {\n\tfor i, card := range d {\n\t\tfmt.Println(i, card)\n\t}\n}", "func (d deck) print() {\n\tfor i, card := range d {\n\t\tfmt.Println(i, card)\n\t}\n}", "func (d deck) print() {\n\tfor i, card := range d {\n\t\tfmt.Println(i, card)\n\t}\n}", "func (d deck) print() {\n\tfor i, card := range d {\n\t\tfmt.Println(i, card)\n\t}\n}", "func (d deck) print() {\n\tfor i, card := range d {\n\t\tfmt.Println(i, card)\n\t}\n}", "func (d deck) print() {\n\tfor i, card := range d {\n\t\tfmt.Println(i, card)\n\t}\n}", "func (d deck) print() {\n\tfor i, card := range d {\n\t\tfmt.Println(i, card)\n\t}\n}", "func (d deck) print() {\n\tfor i, card := range d {\n\t\tfmt.Println(i, card)\n\t}\n}", "func (d deck) print() {\n\tfor i, card := range d {\n\t\tfmt.Println(i, card)\n\t}\n}", "func (d deck) print() {\n\tfor i, card := range d {\n\t\tfmt.Println(i, card)\n\t}\n}", "func (p *InteractiveMultiselectPrinter) Show(text ...string) ([]string, error) {\n\t// should be the first defer statement to make sure it is executed last\n\t// and all the needed cleanup can be done before\n\tcancel, exit := internal.NewCancelationSignal(p.OnInterruptFunc)\n\tdefer exit()\n\n\tif len(text) == 0 || Sprint(text[0]) == \"\" {\n\t\ttext = []string{p.DefaultText}\n\t}\n\n\tp.text = p.TextStyle.Sprint(text[0])\n\tp.fuzzySearchMatches = append([]string{}, p.Options...)\n\n\tif p.MaxHeight == 0 {\n\t\tp.MaxHeight = DefaultInteractiveMultiselect.MaxHeight\n\t}\n\n\tmaxHeight := p.MaxHeight\n\tif maxHeight > len(p.fuzzySearchMatches) {\n\t\tmaxHeight = len(p.fuzzySearchMatches)\n\t}\n\n\tif len(p.Options) == 0 {\n\t\treturn nil, fmt.Errorf(\"no options provided\")\n\t}\n\n\tp.displayedOptions = append([]string{}, p.fuzzySearchMatches[:maxHeight]...)\n\tp.displayedOptionsStart = 0\n\tp.displayedOptionsEnd = maxHeight\n\n\tfor _, option := range p.DefaultOptions {\n\t\tp.selectOption(option)\n\t}\n\n\tarea, err := DefaultArea.Start(p.renderSelectMenu())\n\tdefer area.Stop()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not start area: %w\", err)\n\t}\n\n\tif p.Filter && (p.KeyConfirm == keys.Space || p.KeySelect == keys.Space) {\n\t\treturn nil, fmt.Errorf(\"if filter/search is active, keys.Space can not be used for KeySelect or KeyConfirm\")\n\t}\n\n\tarea.Update(p.renderSelectMenu())\n\n\tcursor.Hide()\n\tdefer cursor.Show()\n\terr = keyboard.Listen(func(keyInfo keys.Key) (stop bool, err error) {\n\t\tkey := keyInfo.Code\n\n\t\tif p.MaxHeight > len(p.fuzzySearchMatches) {\n\t\t\tmaxHeight = len(p.fuzzySearchMatches)\n\t\t} else {\n\t\t\tmaxHeight = p.MaxHeight\n\t\t}\n\n\t\tswitch key {\n\t\tcase p.KeyConfirm:\n\t\t\tif len(p.fuzzySearchMatches) == 0 {\n\t\t\t\treturn false, nil\n\t\t\t}\n\t\t\tarea.Update(p.renderFinishedMenu())\n\t\t\treturn true, nil\n\t\tcase p.KeySelect:\n\t\t\tif len(p.fuzzySearchMatches) > 0 {\n\t\t\t\t// Select option if not already selected\n\t\t\t\tp.selectOption(p.fuzzySearchMatches[p.selectedOption])\n\t\t\t}\n\t\t\tarea.Update(p.renderSelectMenu())\n\t\tcase keys.RuneKey:\n\t\t\tif p.Filter {\n\t\t\t\t// Fuzzy search for options\n\t\t\t\t// append to fuzzy search string\n\t\t\t\tp.fuzzySearchString += keyInfo.String()\n\t\t\t\tp.selectedOption = 0\n\t\t\t\tp.displayedOptionsStart = 0\n\t\t\t\tp.displayedOptionsEnd = maxHeight\n\t\t\t\tp.displayedOptions = append([]string{}, p.fuzzySearchMatches[:maxHeight]...)\n\t\t\t}\n\t\t\tarea.Update(p.renderSelectMenu())\n\t\tcase keys.Space:\n\t\t\tif p.Filter {\n\t\t\t\tp.fuzzySearchString += \" \"\n\t\t\t\tp.selectedOption = 0\n\t\t\t\tarea.Update(p.renderSelectMenu())\n\t\t\t}\n\t\tcase keys.Backspace:\n\t\t\t// Remove last character from fuzzy search string\n\t\t\tif len(p.fuzzySearchString) > 0 {\n\t\t\t\t// Handle UTF-8 characters\n\t\t\t\tp.fuzzySearchString = string([]rune(p.fuzzySearchString)[:len([]rune(p.fuzzySearchString))-1])\n\t\t\t}\n\n\t\t\tif p.fuzzySearchString == \"\" {\n\t\t\t\tp.fuzzySearchMatches = append([]string{}, p.Options...)\n\t\t\t}\n\n\t\t\tp.renderSelectMenu()\n\n\t\t\tif len(p.fuzzySearchMatches) > p.MaxHeight {\n\t\t\t\tmaxHeight = p.MaxHeight\n\t\t\t} else {\n\t\t\t\tmaxHeight = len(p.fuzzySearchMatches)\n\t\t\t}\n\n\t\t\tp.selectedOption = 0\n\t\t\tp.displayedOptionsStart = 0\n\t\t\tp.displayedOptionsEnd = maxHeight\n\t\t\tp.displayedOptions = append([]string{}, p.fuzzySearchMatches[p.displayedOptionsStart:p.displayedOptionsEnd]...)\n\n\t\t\tarea.Update(p.renderSelectMenu())\n\t\tcase keys.Left:\n\t\t\t// Unselect all options\n\t\t\tp.selectedOptions = []int{}\n\t\t\tarea.Update(p.renderSelectMenu())\n\t\tcase keys.Right:\n\t\t\t// Select all options\n\t\t\tp.selectedOptions = []int{}\n\t\t\tfor i := 0; i < len(p.Options); i++ {\n\t\t\t\tp.selectedOptions = append(p.selectedOptions, i)\n\t\t\t}\n\t\t\tarea.Update(p.renderSelectMenu())\n\t\tcase keys.Up:\n\t\t\tif len(p.fuzzySearchMatches) == 0 {\n\t\t\t\treturn false, nil\n\t\t\t}\n\t\t\tif p.selectedOption > 0 {\n\t\t\t\tp.selectedOption--\n\t\t\t\tif p.selectedOption < p.displayedOptionsStart {\n\t\t\t\t\tp.displayedOptionsStart--\n\t\t\t\t\tp.displayedOptionsEnd--\n\t\t\t\t\tif p.displayedOptionsStart < 0 {\n\t\t\t\t\t\tp.displayedOptionsStart = 0\n\t\t\t\t\t\tp.displayedOptionsEnd = maxHeight\n\t\t\t\t\t}\n\t\t\t\t\tp.displayedOptions = append([]string{}, p.fuzzySearchMatches[p.displayedOptionsStart:p.displayedOptionsEnd]...)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tp.selectedOption = len(p.fuzzySearchMatches) - 1\n\t\t\t\tp.displayedOptionsStart = len(p.fuzzySearchMatches) - maxHeight\n\t\t\t\tp.displayedOptionsEnd = len(p.fuzzySearchMatches)\n\t\t\t\tp.displayedOptions = append([]string{}, p.fuzzySearchMatches[p.displayedOptionsStart:p.displayedOptionsEnd]...)\n\t\t\t}\n\n\t\t\tarea.Update(p.renderSelectMenu())\n\t\tcase keys.Down:\n\t\t\tif len(p.fuzzySearchMatches) == 0 {\n\t\t\t\treturn false, nil\n\t\t\t}\n\t\t\tp.displayedOptions = p.fuzzySearchMatches[:maxHeight]\n\t\t\tif p.selectedOption < len(p.fuzzySearchMatches)-1 {\n\t\t\t\tp.selectedOption++\n\t\t\t\tif p.selectedOption >= p.displayedOptionsEnd {\n\t\t\t\t\tp.displayedOptionsStart++\n\t\t\t\t\tp.displayedOptionsEnd++\n\t\t\t\t\tp.displayedOptions = append([]string{}, p.fuzzySearchMatches[p.displayedOptionsStart:p.displayedOptionsEnd]...)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tp.selectedOption = 0\n\t\t\t\tp.displayedOptionsStart = 0\n\t\t\t\tp.displayedOptionsEnd = maxHeight\n\t\t\t\tp.displayedOptions = append([]string{}, p.fuzzySearchMatches[p.displayedOptionsStart:p.displayedOptionsEnd]...)\n\t\t\t}\n\n\t\t\tarea.Update(p.renderSelectMenu())\n\t\tcase keys.CtrlC:\n\t\t\tcancel()\n\t\t\treturn true, nil\n\t\t}\n\n\t\treturn false, nil\n\t})\n\tif err != nil {\n\t\tError.Println(err)\n\t\treturn nil, fmt.Errorf(\"failed to start keyboard listener: %w\", err)\n\t}\n\n\tvar result []string\n\tfor _, selectedOption := range p.selectedOptions {\n\t\tresult = append(result, p.Options[selectedOption])\n\t}\n\n\treturn result, nil\n}", "func list(args []string, v *blob.InfluxVolume) error {\n\tif l := len(args); l != 2 && l != 3 {\n\t\treturn fmt.Errorf(\"Usage: %s inspect [/path/prefix]\", args[0])\n\t}\n\n\tpattern := \"/\"\n\tif len(args) == 3 {\n\t\tpattern = args[2]\n\t}\n\tfiles, err := v.ListFiles(pattern, blob.ListOptions{\n\t\tListMatch: blob.ByPrefix,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, f := range files {\n\t\tfmt.Println(f)\n\t}\n\n\treturn nil\n}", "func (d deck) print () {\n\tfor i, card := range d {\n\t\tfmt.Println(i, \"card:\", card)\n\t}\n}", "func showPodLogs(ctx context.Context, t *testing.T, profile string, ns string, names []string) {\n\tt.Helper()\n\tst := Status(context.Background(), t, Target(), profile, \"APIServer\", profile)\n\tif st != state.Running.String() {\n\t\tt.Logf(\"%q apiserver is not running, skipping kubectl commands (state=%q)\", profile, st)\n\t\treturn\n\t}\n\n\tt.Logf(\"%s: showing logs for failed pods as of %s\", t.Name(), time.Now())\n\n\tfor _, name := range names {\n\t\trr, err := Run(t, exec.CommandContext(ctx, \"kubectl\", \"--context\", profile, \"describe\", \"po\", name, \"-n\", ns))\n\t\tif err != nil {\n\t\t\tt.Logf(\"%s: %v\", rr.Command(), err)\n\t\t} else {\n\t\t\tt.Logf(\"(dbg) %s:\\n%s\", rr.Command(), rr.Stdout)\n\t\t}\n\n\t\trr, err = Run(t, exec.CommandContext(ctx, \"kubectl\", \"--context\", profile, \"logs\", name, \"-n\", ns))\n\t\tif err != nil {\n\t\t\tt.Logf(\"%s: %v\", rr.Command(), err)\n\t\t} else {\n\t\t\tt.Logf(\"(dbg) %s:\\n%s\", rr.Command(), rr.Stdout)\n\t\t}\n\t}\n}", "func (o *ListOptions) Run() error {\n\trepo, err := o.Repository(o.RepoNames...)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tskeletons, err := repo.ListSkeletons()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tswitch o.Output {\n\tcase \"name\":\n\t\tfor _, skeleton := range skeletons {\n\t\t\tfmt.Fprintln(o.Out, skeleton.String())\n\t\t}\n\tcase \"wide\":\n\t\ttw := cli.NewTableWriter(o.Out)\n\t\ttw.SetHeader(\"Repository\", \"Name\", \"Path\")\n\n\t\tfor _, skeleton := range skeletons {\n\t\t\tpath := homedir.Collapse(skeleton.Path)\n\n\t\t\ttw.Append(skeleton.Repo.Name, skeleton.Name, path)\n\t\t}\n\n\t\ttw.Render()\n\tdefault:\n\t\ttw := cli.NewTableWriter(o.Out)\n\t\ttw.SetHeader(\"Repository\", \"Name\")\n\n\t\tfor _, skeleton := range skeletons {\n\t\t\ttw.Append(skeleton.Repo.Name, skeleton.Name)\n\t\t}\n\n\t\ttw.Render()\n\t}\n\n\treturn nil\n}", "func (d deck) print() {\n\n\t// assign index and value of every element in cards slice to the variables, idx and card.\n\tfor idx, card := range d {\n\t\tfmt.Println(idx, card)\n\t}\n}", "func (l Slist) Print() {\n\ts := l.listToSlice()\n\tfmt.Printf(\"%v\\n\", s)\n}", "func listWrapper(\n\tc *client.Client,\n\tctx context.Context,\n\toptions types.ContainerListOptions,\n) ([]types.Container, error) {\n\tif c != nil {\n\t\treturn c.ContainerList(ctx, options)\n\t}\n\tfc := FakeDockerClient{}\n\treturn fc.ContainerList(ctx, options)\n}", "func (d deck) print() {\n\t// iterate over cards\n\tfor i, card := range d {\n\t\tfmt.Println(i, card)\n\t}\n}", "func FormatContainers(containers []corev1.Container, indent int) string {\n\tif len(containers) == 0 {\n\t\treturn \"none\"\n\t}\n\tlist := make([]string, 0)\n\tcontainerFmt := `\nName: %s\nImage: %s\n`\n\tfor _, container := range containers {\n\t\tlist = append(list, fmt.Sprintf(containerFmt, container.Name, container.Image))\n\t}\n\treturn FormatList(list, indent)\n}", "func printSlice(slice []string) error {\n\tfor index, val := range slice {\n\t\tfmt.Println(index, \": \", val)\n\t}\n\treturn nil\n}", "func (results *Results) Print() {\n\tif verbose {\n\t\tfor _, result := range results.List {\n\t\t\tresult.Print()\n\t\t}\n\t}\n\n\tvar state string\n\tif results.Passed {\n\t\tstate = \"OK\"\n\t} else {\n\t\tstate = \"FAIL\"\n\t}\n\n\tif !verbose {\n\t\tfmt.Println(state)\n\t} else {\n\t\tfmt.Printf(\"--- %s %v\", state, results.Duration)\n\t}\n}", "func printLs(resp *etcd.Response, format string) {\n\tif !resp.Node.Dir {\n\t\tfmt.Println(resp.Node.Key)\n\t}\n\tfor _, node := range resp.Node.Nodes {\n\t\trPrint(node)\n\t}\n}", "func (opt *Options) PrintUsage() {\n\tvar banner = ` _ __ ___ ___ _ __ ___ ___\n| '_ ' _ \\ / _ \\ '_ ' _ \\ / _ \\\n| | | | | | __/ | | | | | __/\n|_| |_| |_|\\___|_| |_| |_|\\___|\n\n`\n\tcolor.Green(banner)\n\tfmt.Println(\"\")\n\tflag.Usage()\n\tfmt.Println(\"\")\n\n\tfmt.Println(\" Templates\")\n\tfmt.Println(\"\")\n\tfor x, name := range ImageIds {\n\t\tif ((x + 1) % 2) == 0 {\n\t\t\tfmt.Fprintln(output.Stdout, color.CyanString(\"%s\", name))\n\t\t} else {\n\t\t\tfmt.Fprint(output.Stdout, color.CyanString(\" %-30s\", name))\n\t\t}\n\t}\n\n\tif len(ImageIds)%3 != 0 {\n\t\tfmt.Println(\"\")\n\t}\n\n\tfmt.Println(\"\")\n\n\tfmt.Println(\" Examples\")\n\tfmt.Println(\"\")\n\tcolor.Cyan(\" meme -i kirk-khan -t \\\"|khaaaan\\\"\")\n\tcolor.Cyan(\" meme -i brace-yourselves -t \\\"Brace yourselves|The memes are coming!\\\"\")\n\tcolor.Cyan(\" meme -i http://i.imgur.com/FsWetC0.jpg -t \\\"|China\\\"\")\n\tcolor.Cyan(\" meme -i ~/Pictures/face.png -t \\\"Hello\\\"\")\n\tfmt.Println(\"\")\n}", "func (c MockDockerClient) ContainerList(ctx context.Context) ([]string, error) {\n\tif c.ContainerLogsFn != nil {\n\t\tfmt.Println(\"[MockDockerClient] In \", utils.CurrentFunctionName())\n\t\tfmt.Println(\"[MockDockerClient] - ctx: \", ctx)\n\t\treturn c.ContainerListFn(ctx)\n\t}\n\tpanic(fmt.Sprintf(\"No function defined for: %s\", utils.CurrentFunctionName()))\n}", "func (d *Dry) ShowContainers() {\n\td.changeViewMode(Main)\n}", "func PrintSlice(slice []string) error {\n\tfor index, val := range slice {\n\t\tfmt.Println(index, \": \", val)\n\t}\n\treturn nil\n}", "func (d *Dumper) FormatPodsWithSelector(ctx context.Context, indent int, opts ...client.ListOption) string {\n\tpods := &corev1.PodList{}\n\tif err := d.kubeClient.List(ctx, pods, opts...); err != nil {\n\t\treturn fmt.Sprintf(\"error: unable to list pods for namespace %q: %s\", d.lsNamespace, err.Error())\n\t}\n\tpodList := make([]string, len(pods.Items))\n\tfor i, pod := range pods.Items {\n\t\tpodList[i] = FormatPod(ctx, &pod, d.kubeClientSet, 0, d.startTime, d.endTime)\n\t}\n\treturn FormatList(podList, indent)\n}", "func main() {\n opts := gophercloud.AuthOptions{\n\t\tIdentityEndpoint: \"http://10.169.41.188/identity\",\n\t\tUsername: \"admin\",\n\t\tPassword: \"password\",\n\t\tTenantID: \"01821bd38f2f474489491adb0da7efaf\",\n\t\tDomainID: \"default\",\n\t}\n\tprovider, err := openstack.AuthenticatedClient(opts)\n\tfmt.Println(err)\n\tif err != nil {\n\t\tfmt.Errorf(\"Sending get container group request failed: %v\", err)\n\t\treturn\n\t}\n client, err := openstack.NewNetworkV2(provider, gophercloud.EndpointOpts{\n\t\tRegion: \"RegionOne\",\n\t})\n\tif err != nil {\n\t\tfmt.Errorf(\"Unable to create a network client: %v\", err)\n\t}\n\tallPages, err := subnets.List(client, nil).AllPages()\n\tif err != nil {\n\t\tfmt.Errorf(\"Unable to list subnets: %v\", err)\n\t}\n\n\tallSubnets, err := subnets.ExtractSubnets(allPages)\n\tif err != nil {\n\t\tfmt.Errorf(\"Unable to extract subnets: %v\", err)\n\t}\n\n\tfor _, subnet := range allSubnets {\n\t b, _ := json.MarshalIndent(subnet, \"\", \" \")\n fmt.Printf(\"%s\", string(b))\n }\n\n}", "func (i *FargateInspector) ContainerList(_ context.Context, _ types.ContainerListOptions) ([]types.Container, error) {\n\tvar taskResponse TaskResponse\n\terr := i.taskResponseFromCacheOrNew(&taskResponse)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcontainers := make([]types.Container, len(taskResponse.Containers))\n\tfor index, container := range taskResponse.Containers {\n\t\tconverted := containerResponseToDocker(container)\n\t\tcontainers[index] = converted\n\t}\n\treturn containers, nil\n}", "func List(client *gophercloud.ServiceClient, opts ListOptsBuilder) pagination.Pager {\n\turl := baseURL(client)\n\tif opts != nil {\n\t\tquery, err := opts.ToZoneListQuery()\n\t\tif err != nil {\n\t\t\treturn pagination.Pager{Err: err}\n\t\t}\n\t\turl += query\n\t}\n\treturn pagination.NewPager(client, url, func(r pagination.PageResult) pagination.Page {\n\t\treturn ZonePage{pagination.LinkedPageBase{PageResult: r}}\n\t})\n}", "func PrintAllPods() {\n\tcfg := &etcd.ClientConfig{\n\t\tConfig: &clientv3.Config{\n\t\t\tEndpoints: []string{\"127.0.0.1:32379\"},\n\t\t},\n\t\tOpTimeout: 1 * time.Second,\n\t}\n\t// Create connection to etcd.\n\tdb, err := etcd.NewEtcdConnectionWithBytes(*cfg, logrus.DefaultLogger())\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(1)\n\t}\n\titr, err := db.ListValues(\"/vnf-agent/contiv-ksr/allocatedIDs/\")\n\tif err != nil {\n\t\tfmt.Printf(\"Error getting values\")\n\t\treturn\n\t}\n\tfor {\n\t\tkv, stop := itr.GetNext()\n\t\tif stop {\n\t\t\tfmt.Println()\n\t\t\tbreak\n\t\t}\n\t\tbuf := kv.GetValue()\n\t\tnodeInfo := &nodeinfomodel.NodeInfo{}\n\t\terr = json.Unmarshal(buf, nodeInfo)\n\t\tfmt.Println(\"\\n\" + nodeInfo.Name + \":\")\n\t\tfmt.Println(\"--------------\")\n\n\t\tPrintPodsPerNode(nodeInfo.ManagementIpAddress)\n\t}\n\tdb.Close()\n}", "func List(args []string) {\n\tvar filesOrDirs []string\n\tvar recursive, hidden, longListing bool\n\tfor _, s := range args {\n\t\tif s == \"-R\" {\n\t\t\trecursive = true\n\t\t}\n\t\tif s == \"-a\" {\n\t\t\thidden = true\n\t\t}\n\t\tif s == \"-al\" || s == \"-la\" {\n\t\t\t// TODO: Still implement long listing\n\t\t\tlongListing = true\n\t\t\thidden = true\n\t\t}\n\t\tif !strings.HasPrefix(s, \"-\") {\n\t\t\tfilesOrDirs = append(filesOrDirs, s)\n\t\t}\n\t}\n\n\tfor _, s := range filesOrDirs {\n\t\tfi, err := os.Stat(s)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t\treturn\n\t\t}\n\t\tswitch mode := fi.Mode(); {\n\t\tcase mode.IsDir():\n\t\t\tprintDirContents(s, hidden, recursive, longListing)\n\t\tcase mode.IsRegular():\n\t\t\tprintFile(s)\n\n\t\t}\n\t}\n\n}", "func List(repo name.Repository, options ...Option) ([]string, error) {\n\to, err := makeOptions(options...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn newPuller(o).List(o.context, repo)\n}", "func (o *FactoryContainer) ListFactory() {\n\tfor i, _ := range o.Factories {\n\t\tfmt.Printf(\"____________________________________\\n\")\n\t\tfmt.Printf(\"Factoryname: %s\\nProduction: %f\\nModifier:%f\\n\", o.Factories[i].Name, o.Factories[i].Production, o.Factories[i].ProductionModifier)\n\t\tfmt.Printf(\"____________________________________\\n\")\n\t}\n\toutput := o.CountOutput()\n\tfmt.Printf(\"Total Output from factories: %f\\n\", output)\n\tfmt.Printf(\"____________________________________\\n\")\n}", "func (c *Console) List(group string) (err error) {\n\t_, err = fmt.Fprintf(c.conn, \"%v\\n\", toJSON([]string{\"list\", group}))\n\tif err == nil {\n\t\terr = <-c.Waiter\n\t}\n\treturn\n}", "func printResources(d *DryccCmd, appID string, resources api.Resources) {\n\tfmt.Fprintf(d.WOut, \"=== %s resources\\n\", appID)\n\tresourceNames := make([]string, len(resources))\n\n\tfor _, resource := range resources {\n\t\tresourceNames = append(resourceNames, resource.Name)\n\t}\n\tlenResourceNames := sliceMaxLen(resourceNames) + 5\n\n\tfor _, resource := range resources {\n\t\tspaces := strings.Repeat(\" \", lenResourceNames-len(resource.Name))\n\t\tfmt.Fprintf(d.WOut, \"%s%s%s\\n\", resource.Name, spaces, resource.Plan)\n\n\t}\n}", "func main() {\n opts := gophercloud.AuthOptions{\n\t\tIdentityEndpoint: \"http://10.169.41.188/identity\",\n\t\tUsername: \"admin\",\n\t\tPassword: \"password\",\n\t\tTenantID: \"01821bd38f2f474489491adb0da7efaf\",\n\t\tDomainID: \"default\",\n\t}\n\tprovider, err := openstack.AuthenticatedClient(opts)\n\tif err != nil {\n\t\tfmt.Errorf(\"Sending get container group request failed: %v\", err)\n\t\treturn\n\t}\n\tclient, err := openstack.NewContainerV1(provider, gophercloud.EndpointOpts{\n\t\tRegion: \"RegionOne\",\n\t})\n if err != nil {\n\t\tfmt.Errorf(\"Get zun client failed: %v\", err)\n\t\treturn\n\t}\n\tpager := capsules.List(client, nil)\n fmt.Printf(\"======Pager========: %s\", pager)\n\terr = pager.EachPage(func(page pagination.Page) (bool, error) {\n fmt.Printf(\"======Page========\")\n\t\tCapsuleList, err := capsules.ExtractCapsules(page)\n if err != nil {\n\t\t fmt.Printf(\"======get capsule list failed========\")\n\t\t return false, err\n\t }\n\n\t\tfor _, m := range CapsuleList {\n\t\t fmt.Printf(\"====%s=====\", m.UUID)\n }\n return true, nil\n })\n\n if err != nil {\n fmt.Printf(\"======Error: %s=======\\r\\n\", err)\n return\n }\n}", "func (o *listOptions) Run() error {\n\n\tids, err := backend.List(o.accessToken, o.pipelinesFolderPath, o.getAppServiceNames(), o.isCICD)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Unable to a get list of webhook IDs: %v\", err)\n\t}\n\n\tif ids != nil {\n\t\tif log.IsJSON() {\n\t\t\tmachineoutput.OutputSuccess(ids)\n\t\t} else {\n\t\t\tw := tabwriter.NewWriter(os.Stdout, 5, 2, 3, ' ', tabwriter.TabIndent)\n\t\t\tfmt.Fprintln(w, \"ID\")\n\t\t\tfmt.Fprintln(w, \"==\")\n\t\t\tfor _, id := range ids {\n\t\t\t\tfmt.Fprintln(w, id)\n\t\t\t}\n\t\t\tw.Flush()\n\t\t}\n\t}\n\n\treturn nil\n}", "func PrintResults(i []ResultsGet) {\n\tvar isslice bool\n\tif len(i) != 0 {\n\t\tisslice = true\n\t} else {\n\t\tfmt.Printf(\"%v\\n\", i)\n\t}\n\n\tif isslice == true {\n\t\tfor _, b := range i {\n\t\t\tfmt.Printf(\"\\tID: %v\\n\", b.ID)\n\t\t\tif b.Name != \"\" {\n\t\t\t\tfmt.Printf(\"\\tName: %v\\n\", b.Name)\n\t\t\t}\n\t\t\tif b.Status != \"\" {\n\t\t\t\tfmt.Printf(\"\\tStatus: %v\\n\", b.Status)\n\t\t\t}\n\t\t\tif b.ExpiresAt != \"\" {\n\t\t\t\tfmt.Printf(\"\\tExpires at: %v\\n\", b.ExpiresAt)\n\t\t\t}\n\t\t\tif b.Regcode != \"\" {\n\t\t\t\tfmt.Printf(\"\\tRegistration Code: %v\\n\", b.Regcode)\n\t\t\t}\n\t\t\tif len(b.Productclasses) != 0 {\n\t\t\t\tfmt.Printf(\"\\tProduct Class: %#v\\n\", b.Productclasses)\n\t\t\t}\n\t\t\tif b.SystemsCount != 0 {\n\t\t\t\tfmt.Printf(\"\\tSystem Count: %v\\n\", b.SystemsCount)\n\t\t\t}\n\t\t\tif b.VirtualSystemsCount != 0 {\n\t\t\t\tfmt.Printf(\"\\tVirtual Count: %v\\n\", b.VirtualSystemsCount)\n\t\t\t}\n\t\t\tif b.Identifier != \"\" {\n\t\t\t\tfmt.Printf(\"\\tIdentifier: %v\\n\", b.Identifier)\n\t\t\t}\n\t\t\tif b.Version != \"\" {\n\t\t\t\tfmt.Printf(\"\\tVersion: %v\\n\", b.Version)\n\t\t\t}\n\t\t\tif b.Login != \"\" {\n\t\t\t\tfmt.Printf(\"\\tLogin: %v\\n\", b.Login)\n\t\t\t}\n\t\t\tif b.Password != \"\" {\n\t\t\t\tfmt.Printf(\"\\tPassword: %v\\n\", b.Password)\n\t\t\t}\n\t\t\tif b.LastSeenAt != \"\" {\n\t\t\t\tfmt.Printf(\"\\tLast see at: %v\\n\", b.LastSeenAt)\n\t\t\t}\n\n\t\t\tif b.DistroTarget != \"\" {\n\t\t\t\tfmt.Printf(\"\\tDistro Target: %v\\n\", b.DistroTarget)\n\t\t\t}\n\t\t\tif b.URL != \"\" {\n\t\t\t\tfmt.Printf(\"\\tUrl: %v\\n\", b.URL)\n\t\t\t}\n\t\t\tif b.InstallerUpdates {\n\t\t\t\tfmt.Printf(\"\\tInstaller Updates: %v\\n\", b.InstallerUpdates)\n\t\t\t}\n\n\t\t\tfmt.Println()\n\t\t}\n\t}\n}", "func (d deck) printDeck() {\n\tfor i, card := range d {\n\t\tfmt.Println(i, card)\n\t}\n}", "func Show(out io.Writer, category ...string) {\n\tw, ok := out.(*tabwriter.Writer)\n\tif !ok {\n\t\tw = new(tabwriter.Writer)\n\t\tw.Init(out, 4, 0, 2, ' ', 0)\n\t}\n\tfor _, opt := range Options {\n\t\tif opt.Relevant(category...) {\n\t\t\t// -name <prototype> help\n\t\t\t// (default is <default>)\n\t\t\tfmt.Fprintf(w, \" -%s %s\\t %s\\n\", opt.Name, opt.Prototype, opt.Help)\n\t\t\tif opt.Default != \"\" && opt.Default != false && opt.Default != nil {\n\t\t\t\tfmt.Fprintf(w, \" \\t (default is %v)\\n\", opt.Default)\n\t\t\t}\n\t\t}\n\t}\n\tif !ok {\n\t\tw.Flush()\n\t}\n}", "func (c *ClientSetClient) ListNodesByOptions(opts metav1.ListOptions) (*v1.NodeList, error) {\n\tctx := context.TODO()\n\treturn c.clientset.CoreV1().Nodes().List(ctx, opts)\n}", "func cliOpts(cc handlers.CreateContainerConfig, rtc *config.Config) (*entities.ContainerCreateOptions, []string, error) {\n\tvar (\n\t\tcapAdd []string\n\t\tcappDrop []string\n\t\tentrypoint *string\n\t\tinit bool\n\t\tspecPorts []types.PortMapping\n\t)\n\n\tif cc.HostConfig.Init != nil {\n\t\tinit = *cc.HostConfig.Init\n\t}\n\n\t// Iterate devices and convert to CLI expected string\n\tdevices := make([]string, 0, len(cc.HostConfig.Devices))\n\tfor _, dev := range cc.HostConfig.Devices {\n\t\tdevices = append(devices, fmt.Sprintf(\"%s:%s:%s\", dev.PathOnHost, dev.PathInContainer, dev.CgroupPermissions))\n\t}\n\n\t// iterate blkreaddevicebps\n\treadBps := make([]string, 0, len(cc.HostConfig.BlkioDeviceReadBps))\n\tfor _, dev := range cc.HostConfig.BlkioDeviceReadBps {\n\t\treadBps = append(readBps, dev.String())\n\t}\n\n\t// iterate blkreaddeviceiops\n\treadIops := make([]string, 0, len(cc.HostConfig.BlkioDeviceReadIOps))\n\tfor _, dev := range cc.HostConfig.BlkioDeviceReadIOps {\n\t\treadIops = append(readIops, dev.String())\n\t}\n\n\t// iterate blkwritedevicebps\n\twriteBps := make([]string, 0, len(cc.HostConfig.BlkioDeviceWriteBps))\n\tfor _, dev := range cc.HostConfig.BlkioDeviceWriteBps {\n\t\twriteBps = append(writeBps, dev.String())\n\t}\n\n\t// iterate blkwritedeviceiops\n\twriteIops := make([]string, 0, len(cc.HostConfig.BlkioDeviceWriteIOps))\n\tfor _, dev := range cc.HostConfig.BlkioDeviceWriteIOps {\n\t\twriteIops = append(writeIops, dev.String())\n\t}\n\n\t// entrypoint\n\t// can be a string or slice. if it is a slice, we need to\n\t// marshall it to json; otherwise it should just be the string\n\t// value\n\tif len(cc.Config.Entrypoint) > 0 {\n\t\tentrypoint = &cc.Config.Entrypoint[0]\n\t\tif len(cc.Config.Entrypoint) > 1 {\n\t\t\tb, err := json.Marshal(cc.Config.Entrypoint)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, nil, err\n\t\t\t}\n\t\t\tjsonString := string(b)\n\t\t\tentrypoint = &jsonString\n\t\t}\n\t}\n\n\t// expose ports\n\texpose := make([]string, 0, len(cc.Config.ExposedPorts))\n\tfor p := range cc.Config.ExposedPorts {\n\t\texpose = append(expose, fmt.Sprintf(\"%s/%s\", p.Port(), p.Proto()))\n\t}\n\n\t// mounts type=tmpfs/bind,source=...,target=...=,opt=val\n\tvolSources := make(map[string]bool)\n\tvolDestinations := make(map[string]bool)\n\tmounts := make([]string, 0, len(cc.HostConfig.Mounts))\n\tvar builder strings.Builder\n\tfor _, m := range cc.HostConfig.Mounts {\n\t\taddField(&builder, \"type\", string(m.Type))\n\t\taddField(&builder, \"source\", m.Source)\n\t\taddField(&builder, \"target\", m.Target)\n\n\t\t// Store source/dest so we don't add duplicates if a volume is\n\t\t// also mentioned in cc.Volumes.\n\t\t// Which Docker Compose v2.0 does, for unclear reasons...\n\t\tvolSources[m.Source] = true\n\t\tvolDestinations[m.Target] = true\n\n\t\tif m.ReadOnly {\n\t\t\taddField(&builder, \"ro\", \"true\")\n\t\t}\n\t\taddField(&builder, \"consistency\", string(m.Consistency))\n\t\t// Map any specialized mount options that intersect between *Options and cli options\n\t\tswitch m.Type {\n\t\tcase mount.TypeBind:\n\t\t\tif m.BindOptions != nil {\n\t\t\t\taddField(&builder, \"bind-propagation\", string(m.BindOptions.Propagation))\n\t\t\t\taddField(&builder, \"bind-nonrecursive\", strconv.FormatBool(m.BindOptions.NonRecursive))\n\t\t\t}\n\t\tcase mount.TypeTmpfs:\n\t\t\tif m.TmpfsOptions != nil {\n\t\t\t\taddField(&builder, \"tmpfs-size\", strconv.FormatInt(m.TmpfsOptions.SizeBytes, 10))\n\t\t\t\taddField(&builder, \"tmpfs-mode\", strconv.FormatUint(uint64(m.TmpfsOptions.Mode), 8))\n\t\t\t}\n\t\tcase mount.TypeVolume:\n\t\t\t// All current VolumeOpts are handled above\n\t\t\t// See vendor/github.com/containers/common/pkg/parse/parse.go:ValidateVolumeOpts()\n\t\t}\n\t\tmounts = append(mounts, builder.String())\n\t\tbuilder.Reset()\n\t}\n\n\t// dns\n\tdns := make([]net.IP, 0, len(cc.HostConfig.DNS))\n\tfor _, d := range cc.HostConfig.DNS {\n\t\tdns = append(dns, net.ParseIP(d))\n\t}\n\n\t// publish\n\tfor port, pbs := range cc.HostConfig.PortBindings {\n\t\tfor _, pb := range pbs {\n\t\t\tvar hostport int\n\t\t\tvar err error\n\t\t\tif pb.HostPort != \"\" {\n\t\t\t\thostport, err = strconv.Atoi(pb.HostPort)\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\treturn nil, nil, err\n\t\t\t}\n\t\t\ttmpPort := types.PortMapping{\n\t\t\t\tHostIP: pb.HostIP,\n\t\t\t\tContainerPort: uint16(port.Int()),\n\t\t\t\tHostPort: uint16(hostport),\n\t\t\t\tRange: 0,\n\t\t\t\tProtocol: port.Proto(),\n\t\t\t}\n\t\t\tspecPorts = append(specPorts, tmpPort)\n\t\t}\n\t}\n\n\t// special case for NetworkMode, the podman default is slirp4netns for\n\t// rootless but for better docker compat we want bridge. Do this only if\n\t// the default config in containers.conf wasn't overridden to use another\n\t// value than the default \"private\" one.\n\tnetmode := string(cc.HostConfig.NetworkMode)\n\tconfigDefaultNetNS := rtc.Containers.NetNS\n\tif netmode == \"\" || netmode == \"default\" {\n\t\tif configDefaultNetNS == \"\" || configDefaultNetNS == string(specgen.Default) || configDefaultNetNS == string(specgen.Private) {\n\t\t\tnetmode = \"bridge\"\n\t\t} else {\n\t\t\tnetmode = configDefaultNetNS\n\t\t}\n\t}\n\n\tnsmode, networks, netOpts, err := specgen.ParseNetworkFlag([]string{netmode}, false)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\t// network\n\t// Note: we cannot emulate compat exactly here. we only allow specifics of networks to be\n\t// defined when there is only one network.\n\tnetInfo := entities.NetOptions{\n\t\tAddHosts: cc.HostConfig.ExtraHosts,\n\t\tDNSOptions: cc.HostConfig.DNSOptions,\n\t\tDNSSearch: cc.HostConfig.DNSSearch,\n\t\tDNSServers: dns,\n\t\tNetwork: nsmode,\n\t\tPublishPorts: specPorts,\n\t\tNetworkOptions: netOpts,\n\t\tNoHosts: rtc.Containers.NoHosts,\n\t}\n\n\t// sigh docker-compose sets the mac address on the container config instead on the per network endpoint config\n\tcontainerMacAddress := cc.MacAddress\n\n\t// network names\n\tswitch {\n\tcase len(cc.NetworkingConfig.EndpointsConfig) > 0:\n\t\tendpointsConfig := cc.NetworkingConfig.EndpointsConfig\n\t\tnetworks := make(map[string]types.PerNetworkOptions, len(endpointsConfig))\n\t\tfor netName, endpoint := range endpointsConfig {\n\t\t\tnetOpts := types.PerNetworkOptions{}\n\t\t\tif endpoint != nil {\n\t\t\t\tnetOpts.Aliases = endpoint.Aliases\n\n\t\t\t\t// if IP address is provided\n\t\t\t\tif len(endpoint.IPAddress) > 0 {\n\t\t\t\t\tstaticIP := net.ParseIP(endpoint.IPAddress)\n\t\t\t\t\tif staticIP == nil {\n\t\t\t\t\t\treturn nil, nil, fmt.Errorf(\"failed to parse the ip address %q\", endpoint.IPAddress)\n\t\t\t\t\t}\n\t\t\t\t\tnetOpts.StaticIPs = append(netOpts.StaticIPs, staticIP)\n\t\t\t\t}\n\n\t\t\t\tif endpoint.IPAMConfig != nil {\n\t\t\t\t\t// if IPAMConfig.IPv4Address is provided\n\t\t\t\t\tif len(endpoint.IPAMConfig.IPv4Address) > 0 {\n\t\t\t\t\t\tstaticIP := net.ParseIP(endpoint.IPAMConfig.IPv4Address)\n\t\t\t\t\t\tif staticIP == nil {\n\t\t\t\t\t\t\treturn nil, nil, fmt.Errorf(\"failed to parse the ipv4 address %q\", endpoint.IPAMConfig.IPv4Address)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tnetOpts.StaticIPs = append(netOpts.StaticIPs, staticIP)\n\t\t\t\t\t}\n\t\t\t\t\t// if IPAMConfig.IPv6Address is provided\n\t\t\t\t\tif len(endpoint.IPAMConfig.IPv6Address) > 0 {\n\t\t\t\t\t\tstaticIP := net.ParseIP(endpoint.IPAMConfig.IPv6Address)\n\t\t\t\t\t\tif staticIP == nil {\n\t\t\t\t\t\t\treturn nil, nil, fmt.Errorf(\"failed to parse the ipv6 address %q\", endpoint.IPAMConfig.IPv6Address)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tnetOpts.StaticIPs = append(netOpts.StaticIPs, staticIP)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\t// If MAC address is provided\n\t\t\t\tif len(endpoint.MacAddress) > 0 {\n\t\t\t\t\tstaticMac, err := net.ParseMAC(endpoint.MacAddress)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn nil, nil, fmt.Errorf(\"failed to parse the mac address %q\", endpoint.MacAddress)\n\t\t\t\t\t}\n\t\t\t\t\tnetOpts.StaticMAC = types.HardwareAddr(staticMac)\n\t\t\t\t} else if len(containerMacAddress) > 0 {\n\t\t\t\t\t// docker-compose only sets one mac address for the container on the container config\n\t\t\t\t\t// If there are more than one network attached it will end up on the first one,\n\t\t\t\t\t// which is not deterministic since we iterate a map. Not nice but this matches docker.\n\t\t\t\t\tstaticMac, err := net.ParseMAC(containerMacAddress)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn nil, nil, fmt.Errorf(\"failed to parse the mac address %q\", containerMacAddress)\n\t\t\t\t\t}\n\t\t\t\t\tnetOpts.StaticMAC = types.HardwareAddr(staticMac)\n\t\t\t\t\tcontainerMacAddress = \"\"\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tnetworks[netName] = netOpts\n\t\t}\n\n\t\tnetInfo.Networks = networks\n\tcase len(cc.HostConfig.NetworkMode) > 0:\n\t\tnetInfo.Networks = networks\n\t}\n\n\tparsedTmp := make([]string, 0, len(cc.HostConfig.Tmpfs))\n\tfor path, options := range cc.HostConfig.Tmpfs {\n\t\tfinalString := path\n\t\tif options != \"\" {\n\t\t\tfinalString += \":\" + options\n\t\t}\n\t\tparsedTmp = append(parsedTmp, finalString)\n\t}\n\n\t// Note: several options here are marked as \"don't need\". this is based\n\t// on speculation by Matt and I. We think that these come into play later\n\t// like with start. We believe this is just a difference in podman/compat\n\tcliOpts := entities.ContainerCreateOptions{\n\t\t// Attach: nil, // don't need?\n\t\tAuthfile: \"\",\n\t\tCapAdd: append(capAdd, cc.HostConfig.CapAdd...),\n\t\tCapDrop: append(cappDrop, cc.HostConfig.CapDrop...),\n\t\tCgroupParent: cc.HostConfig.CgroupParent,\n\t\tCIDFile: cc.HostConfig.ContainerIDFile,\n\t\tCPUPeriod: uint64(cc.HostConfig.CPUPeriod),\n\t\tCPUQuota: cc.HostConfig.CPUQuota,\n\t\tCPURTPeriod: uint64(cc.HostConfig.CPURealtimePeriod),\n\t\tCPURTRuntime: cc.HostConfig.CPURealtimeRuntime,\n\t\tCPUShares: uint64(cc.HostConfig.CPUShares),\n\t\t// CPUS: 0, // don't need?\n\t\tCPUSetCPUs: cc.HostConfig.CpusetCpus,\n\t\tCPUSetMems: cc.HostConfig.CpusetMems,\n\t\t// Detach: false, // don't need\n\t\t// DetachKeys: \"\", // don't need\n\t\tDevices: devices,\n\t\tDeviceCgroupRule: cc.HostConfig.DeviceCgroupRules,\n\t\tDeviceReadBPs: readBps,\n\t\tDeviceReadIOPs: readIops,\n\t\tDeviceWriteBPs: writeBps,\n\t\tDeviceWriteIOPs: writeIops,\n\t\tEntrypoint: entrypoint,\n\t\tEnv: cc.Config.Env,\n\t\tExpose: expose,\n\t\tGroupAdd: cc.HostConfig.GroupAdd,\n\t\tHostname: cc.Config.Hostname,\n\t\tImageVolume: define.TypeBind,\n\t\tInit: init,\n\t\tInteractive: cc.Config.OpenStdin,\n\t\tIPC: string(cc.HostConfig.IpcMode),\n\t\tLabel: stringMaptoArray(cc.Config.Labels),\n\t\tLogDriver: cc.HostConfig.LogConfig.Type,\n\t\tLogOptions: stringMaptoArray(cc.HostConfig.LogConfig.Config),\n\t\tName: cc.Name,\n\t\tOOMScoreAdj: &cc.HostConfig.OomScoreAdj,\n\t\tArch: \"\",\n\t\tOS: \"\",\n\t\tVariant: \"\",\n\t\tPID: string(cc.HostConfig.PidMode),\n\t\tPIDsLimit: cc.HostConfig.PidsLimit,\n\t\tPrivileged: cc.HostConfig.Privileged,\n\t\tPublishAll: cc.HostConfig.PublishAllPorts,\n\t\tQuiet: false,\n\t\tReadOnly: cc.HostConfig.ReadonlyRootfs,\n\t\tReadWriteTmpFS: true, // podman default\n\t\tRm: cc.HostConfig.AutoRemove,\n\t\tSecurityOpt: cc.HostConfig.SecurityOpt,\n\t\tStopSignal: cc.Config.StopSignal,\n\t\tStopTimeout: rtc.Engine.StopTimeout, // podman default\n\t\tStorageOpts: stringMaptoArray(cc.HostConfig.StorageOpt),\n\t\tSysctl: stringMaptoArray(cc.HostConfig.Sysctls),\n\t\tSystemd: \"true\", // podman default\n\t\tTmpFS: parsedTmp,\n\t\tTTY: cc.Config.Tty,\n\t\tEnvMerge: cc.EnvMerge,\n\t\tUnsetEnv: cc.UnsetEnv,\n\t\tUnsetEnvAll: cc.UnsetEnvAll,\n\t\tUser: cc.Config.User,\n\t\tUserNS: string(cc.HostConfig.UsernsMode),\n\t\tUTS: string(cc.HostConfig.UTSMode),\n\t\tMount: mounts,\n\t\tVolumesFrom: cc.HostConfig.VolumesFrom,\n\t\tWorkdir: cc.Config.WorkingDir,\n\t\tNet: &netInfo,\n\t\tHealthInterval: define.DefaultHealthCheckInterval,\n\t\tHealthRetries: define.DefaultHealthCheckRetries,\n\t\tHealthTimeout: define.DefaultHealthCheckTimeout,\n\t\tHealthStartPeriod: define.DefaultHealthCheckStartPeriod,\n\t}\n\tif !rootless.IsRootless() {\n\t\tvar ulimits []string\n\t\tif len(cc.HostConfig.Ulimits) > 0 {\n\t\t\tfor _, ul := range cc.HostConfig.Ulimits {\n\t\t\t\tulimits = append(ulimits, ul.String())\n\t\t\t}\n\t\t\tcliOpts.Ulimit = ulimits\n\t\t}\n\t}\n\tif cc.HostConfig.Resources.NanoCPUs > 0 {\n\t\tif cliOpts.CPUPeriod != 0 || cliOpts.CPUQuota != 0 {\n\t\t\treturn nil, nil, fmt.Errorf(\"NanoCpus conflicts with CpuPeriod and CpuQuota\")\n\t\t}\n\t\tcliOpts.CPUPeriod = 100000\n\t\tcliOpts.CPUQuota = cc.HostConfig.Resources.NanoCPUs / 10000\n\t}\n\n\t// volumes\n\tfor _, vol := range cc.HostConfig.Binds {\n\t\tcliOpts.Volume = append(cliOpts.Volume, vol)\n\t\t// Extract the destination so we don't add duplicate mounts in\n\t\t// the volumes phase.\n\t\tsplitVol := specgen.SplitVolumeString(vol)\n\t\tswitch len(splitVol) {\n\t\tcase 1:\n\t\t\tvolDestinations[vol] = true\n\t\tdefault:\n\t\t\tvolSources[splitVol[0]] = true\n\t\t\tvolDestinations[splitVol[1]] = true\n\t\t}\n\t}\n\t// Anonymous volumes are added differently from other volumes, in their\n\t// own special field, for reasons known only to Docker. Still use the\n\t// format of `-v` so we can just append them in there.\n\t// Unfortunately, these may be duplicates of existing mounts in Binds.\n\t// So... We need to catch that.\n\t// This also handles volumes duplicated between cc.HostConfig.Mounts and\n\t// cc.Volumes, as seen in compose v2.0.\n\tfor vol := range cc.Volumes {\n\t\tif _, ok := volDestinations[vol]; ok {\n\t\t\tcontinue\n\t\t}\n\t\tcliOpts.Volume = append(cliOpts.Volume, vol)\n\t}\n\t// Make mount points for compat volumes\n\tfor vol := range volSources {\n\t\t// This might be a named volume.\n\t\t// Assume it is if it's not an absolute path.\n\t\tif !filepath.IsAbs(vol) {\n\t\t\tcontinue\n\t\t}\n\t\t// If volume already exists, there is nothing to do\n\t\tif _, err := os.Stat(vol); err == nil {\n\t\t\tcontinue\n\t\t}\n\t\tif err := os.MkdirAll(vol, 0o755); err != nil {\n\t\t\tif !os.IsExist(err) {\n\t\t\t\treturn nil, nil, fmt.Errorf(\"making volume mountpoint for volume %s: %w\", vol, err)\n\t\t\t}\n\t\t}\n\t}\n\tif len(cc.HostConfig.BlkioWeightDevice) > 0 {\n\t\tdevices := make([]string, 0, len(cc.HostConfig.BlkioWeightDevice))\n\t\tfor _, d := range cc.HostConfig.BlkioWeightDevice {\n\t\t\tdevices = append(devices, d.String())\n\t\t}\n\t\tcliOpts.BlkIOWeightDevice = devices\n\t}\n\tif cc.HostConfig.BlkioWeight > 0 {\n\t\tcliOpts.BlkIOWeight = strconv.Itoa(int(cc.HostConfig.BlkioWeight))\n\t}\n\n\tif cc.HostConfig.Memory > 0 {\n\t\tcliOpts.Memory = strconv.Itoa(int(cc.HostConfig.Memory))\n\t}\n\n\tif cc.HostConfig.MemoryReservation > 0 {\n\t\tcliOpts.MemoryReservation = strconv.Itoa(int(cc.HostConfig.MemoryReservation))\n\t}\n\n\tcgroupsv2, err := cgroups.IsCgroup2UnifiedMode()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tif cc.HostConfig.MemorySwap > 0 && (!rootless.IsRootless() || (rootless.IsRootless() && cgroupsv2)) {\n\t\tcliOpts.MemorySwap = strconv.Itoa(int(cc.HostConfig.MemorySwap))\n\t}\n\n\tif cc.Config.StopTimeout != nil {\n\t\tcliOpts.StopTimeout = uint(*cc.Config.StopTimeout)\n\t}\n\n\tif cc.HostConfig.ShmSize > 0 {\n\t\tcliOpts.ShmSize = strconv.Itoa(int(cc.HostConfig.ShmSize))\n\t}\n\n\tif len(cc.HostConfig.RestartPolicy.Name) > 0 {\n\t\tpolicy := cc.HostConfig.RestartPolicy.Name\n\t\t// only add restart count on failure\n\t\tif cc.HostConfig.RestartPolicy.IsOnFailure() {\n\t\t\tpolicy += fmt.Sprintf(\":%d\", cc.HostConfig.RestartPolicy.MaximumRetryCount)\n\t\t}\n\t\tcliOpts.Restart = policy\n\t}\n\n\tif cc.HostConfig.MemorySwappiness != nil && (!rootless.IsRootless() || rootless.IsRootless() && cgroupsv2 && rtc.Engine.CgroupManager == \"systemd\") {\n\t\tcliOpts.MemorySwappiness = *cc.HostConfig.MemorySwappiness\n\t} else {\n\t\tcliOpts.MemorySwappiness = -1\n\t}\n\tif cc.HostConfig.OomKillDisable != nil {\n\t\tcliOpts.OOMKillDisable = *cc.HostConfig.OomKillDisable\n\t}\n\tif cc.Config.Healthcheck != nil {\n\t\tfinCmd := \"\"\n\t\tfor _, str := range cc.Config.Healthcheck.Test {\n\t\t\tfinCmd = finCmd + str + \" \"\n\t\t}\n\t\tif len(finCmd) > 1 {\n\t\t\tfinCmd = finCmd[:len(finCmd)-1]\n\t\t}\n\t\tcliOpts.HealthCmd = finCmd\n\t\tif cc.Config.Healthcheck.Interval > 0 {\n\t\t\tcliOpts.HealthInterval = cc.Config.Healthcheck.Interval.String()\n\t\t}\n\t\tif cc.Config.Healthcheck.Retries > 0 {\n\t\t\tcliOpts.HealthRetries = uint(cc.Config.Healthcheck.Retries)\n\t\t}\n\t\tif cc.Config.Healthcheck.StartPeriod > 0 {\n\t\t\tcliOpts.HealthStartPeriod = cc.Config.Healthcheck.StartPeriod.String()\n\t\t}\n\t\tif cc.Config.Healthcheck.Timeout > 0 {\n\t\t\tcliOpts.HealthTimeout = cc.Config.Healthcheck.Timeout.String()\n\t\t}\n\t}\n\n\t// specgen assumes the image name is arg[0]\n\tcmd := []string{cc.Config.Image}\n\tcmd = append(cmd, cc.Config.Cmd...)\n\treturn &cliOpts, cmd, nil\n}", "func StartPrint(numParallels int, totalCalls int, clients []Client) {\n\tresult := Start(numParallels, totalCalls, clients)\n\tfmt.Println(result.Format())\n}", "func (s *VarlinkInterface) ListContainers(ctx context.Context, c VarlinkCall) error {\n\treturn c.ReplyMethodNotImplemented(ctx, \"io.podman.ListContainers\")\n}", "func (p *ObjectPrinter) PrintObjects(objs []*vt.Object) error {\n\n\tlist := make([]map[string]interface{}, 0)\n\n\tfor _, obj := range objs {\n\t\tm := obj.Attributes\n\t\tif viper.IsSet(\"include\") && viper.IsSet(\"exclude\") {\n\t\t\tm = utils.FilterMap(\n\t\t\t\tm, viper.GetStringSlice(\"include\"), viper.GetStringSlice(\"exclude\"))\n\t\t}\n\t\tfor name, r := range obj.Relationships {\n\t\t\tif r.IsOneToOne {\n\t\t\t\tif len(r.RelatedObjects) > 0 {\n\t\t\t\t\tm[name] = r.RelatedObjects[0].ID\n\t\t\t\t} else {\n\t\t\t\t\tm[name] = nil\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tl := make([]string, 0)\n\t\t\t\tfor _, obj := range r.RelatedObjects {\n\t\t\t\t\tl = append(l, obj.ID)\n\t\t\t\t}\n\t\t\t\tm[name] = l\n\t\t\t}\n\t\t}\n\t\tkey := fmt.Sprintf(\"%s <%s>\", obj.Type, obj.ID)\n\t\tlist = append(list, map[string]interface{}{key: m})\n\t}\n\n\treturn yaml.NewEncoder(\n\t\tansi.NewAnsiStdout(),\n\t\tyaml.EncoderColors(&colorScheme),\n\t\tyaml.EncoderDateKeys([]glob.Glob{\n\t\t\tglob.MustCompile(\"last_login\"),\n\t\t\tglob.MustCompile(\"user_since\"),\n\t\t\tglob.MustCompile(\"*date\"),\n\t\t})).Encode(list)\n}", "func (z *zpoolctl) List(ctx context.Context, name, options string, properties []string, t string) *execute {\n\targs := []string{\"list\"}\n\tif len(options) > 0 {\n\t\targs = append(args, options)\n\t}\n\tif properties != nil {\n\t\tkv := \"-o \"\n\t\tfor _, v := range properties {\n\t\t\tkv += v + \",\"\n\t\t}\n\t\tkv = strings.TrimSuffix(kv, \",\")\n\t\targs = append(args, kv)\n\t}\n\tif len(t) > 0 {\n\t\targs = append(args, \"-T \"+t)\n\t}\n\targs = append(args, name)\n\treturn &execute{ctx: ctx, name: z.cmd, args: args}\n}" ]
[ "0.6218503", "0.5936328", "0.57408404", "0.5731149", "0.5574454", "0.556456", "0.55443484", "0.55239147", "0.5520516", "0.5473072", "0.52725697", "0.52689254", "0.52341163", "0.5222199", "0.52141553", "0.5188561", "0.51831543", "0.5168949", "0.5150855", "0.51201206", "0.51199156", "0.50810176", "0.5078679", "0.5033983", "0.50332093", "0.502669", "0.50210315", "0.5012113", "0.49929452", "0.49881065", "0.49831307", "0.49816823", "0.49756274", "0.4968247", "0.49617946", "0.49491164", "0.49472746", "0.49330285", "0.4929565", "0.4926904", "0.49200326", "0.49170607", "0.49116027", "0.49103537", "0.48952195", "0.4892125", "0.48852757", "0.48830092", "0.48757923", "0.48672447", "0.48619458", "0.48618865", "0.48606086", "0.48606086", "0.48606086", "0.48606086", "0.48606086", "0.48606086", "0.48606086", "0.48606086", "0.48606086", "0.48606086", "0.48495474", "0.4844832", "0.4842527", "0.48328665", "0.4818135", "0.48143193", "0.48100233", "0.4804534", "0.47916508", "0.47735313", "0.4768483", "0.47614068", "0.47579876", "0.4755013", "0.4752703", "0.47488186", "0.47431642", "0.47355786", "0.47349828", "0.47325295", "0.47315454", "0.47298014", "0.4722894", "0.4710585", "0.4710443", "0.47089526", "0.47071707", "0.47047052", "0.46932763", "0.46876082", "0.46868032", "0.46748233", "0.4669247", "0.4666749", "0.46639064", "0.46587124", "0.46538615", "0.46482876" ]
0.5109122
21
filterContainers returns containers matching the filters. Supported filters: all means showing all containers (default shows just running). lastN means only showing n last created containers (includes all states). Nonpositive values are ignored. In other words, if lastN is positive, all will be set to true.
func filterContainers(ctx context.Context, client *containerd.Client, filters []string, lastN int, all bool) ([]containerd.Container, error) { containers, err := client.Containers(ctx) if err != nil { return nil, err } filterCtx, err := foldContainerFilters(ctx, containers, filters) if err != nil { return nil, err } containers = filterCtx.MatchesFilters(ctx) if lastN > 0 { all = true sort.Slice(containers, func(i, j int) bool { infoI, _ := containers[i].Info(ctx, containerd.WithoutRefreshedMetadata) infoJ, _ := containers[j].Info(ctx, containerd.WithoutRefreshedMetadata) return infoI.CreatedAt.After(infoJ.CreatedAt) }) if lastN < len(containers) { containers = containers[:lastN] } } if all { return containers, nil } var upContainers []containerd.Container for _, c := range containers { cStatus := formatter.ContainerStatus(ctx, c) if strings.HasPrefix(cStatus, "Up") { upContainers = append(upContainers, c) } } return upContainers, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func AllContainersFilter(c Container) bool {\n\tif c.IsPumba() || c.IsPumbaSkip() {\n\t\treturn false\n\t}\n\treturn true\n}", "func allContainersFilter(c container.Container) bool {\n\tif c.IsPumba() || c.IsPumbaSkip() {\n\t\treturn false\n\t}\n\treturn true\n}", "func (d *DockerClient) GetContainers(all bool, filters map[string][]string) ([]DockerContainer, error) {\n\tresp, err := d.makeRequest(\"GET\", fmt.Sprintf(\"%s/containers/json?all=%s\", d.pathPrefix, strconv.FormatBool(all)), nil)\n\tdefer resp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t} else if resp.StatusCode != 200 {\n\t\treturn nil, fmt.Errorf(\"GetContainers: error status code %d\", resp.StatusCode)\n\t}\n\tvar containers []DockerContainer\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr = json.Unmarshal(body, &containers)\n\treturn containers, err\n}", "func (s *Store) ListContainersWithFilter(filter workloadmeta.ContainerFilterFunc) []*workloadmeta.Container {\n\tvar res []*workloadmeta.Container\n\n\tfor _, container := range s.ListContainers() {\n\t\tif filter(container) {\n\t\t\tres = append(res, container)\n\t\t}\n\t}\n\n\treturn res\n}", "func FilterContainers(collection []entities.ListContainer, callback func(entities.ListContainer) bool) (ret []entities.ListContainer) {\n\tfor _, item := range collection {\n\t\tif callback(item) {\n\t\t\tret = append(ret, item)\n\t\t}\n\t}\n\treturn\n}", "func filterContainers(filterMap map[string]string, conts []types.Container) []types.Container {\n\tvar res []types.Container\n\n\tfor _, cont := range conts {\n\t\tmatchesAll := true\n\t\tfor k, v := range filterMap {\n\t\t\tif iv, ok := cont.Labels[k]; !ok || v != iv {\n\t\t\t\tmatchesAll = false\n\t\t\t}\n\t\t}\n\t\tif matchesAll {\n\t\t\tres = append(res, cont)\n\t\t}\n\t}\n\n\treturn res\n}", "func (r *Rkt) ListContainers(filter string) ([]string, error) {\n\treturn listCRIContainers(r.Runner, filter)\n}", "func (t *Translator) filterForAnyContainer() string {\n\treturn \"resource.type = \\\"k8s_container\\\"\"\n}", "func (containers Containers) filter(predicate containerPredicate) Containers {\n\tvar filtered Containers\n\tfor _, c := range containers {\n\t\tif predicate(c) {\n\t\t\tfiltered = append(filtered, c)\n\t\t}\n\t}\n\treturn filtered\n}", "func (r *remoteRuntimeService) ListContainers(ctx context.Context, filter *runtimeapi.ContainerFilter) ([]*runtimeapi.Container, error) {\n\tklog.V(10).InfoS(\"[RemoteRuntimeService] ListContainers\", \"filter\", filter, \"timeout\", r.timeout)\n\tctx, cancel := context.WithTimeout(ctx, r.timeout)\n\tdefer cancel()\n\n\treturn r.listContainersV1(ctx, filter)\n}", "func FindContainerVolumes(db *bolt.DB, filters []ContainerVolumeFilter) ([]ContainerVolume, error) {\n\tcvs := make([]ContainerVolume, 0)\n\n\t// fetch container volumes\n\treadErr := db.View(func(tx *bolt.Tx) error {\n\n\t\tif b := tx.Bucket([]byte(CONTAINER_VOLUMES)); b != nil {\n\t\t\tb.ForEach(func(k, v []byte) error {\n\n\t\t\t\tvar cv ContainerVolume\n\n\t\t\t\tif err := json.Unmarshal(v, &cv); err != nil {\n\t\t\t\t\tglog.Errorf(\"Unable to deserialize ContainerVolume db record: %v. Error: %v\", v, err)\n\t\t\t\t} else {\n\t\t\t\t\texclude := false\n\t\t\t\t\tfor _, filterFn := range filters {\n\t\t\t\t\t\tif !filterFn(cv) {\n\t\t\t\t\t\t\texclude = true\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tif !exclude {\n\t\t\t\t\t\tcvs = append(cvs, cv)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t})\n\t\t}\n\n\t\treturn nil // end the transaction\n\t})\n\n\tif readErr != nil {\n\t\treturn nil, readErr\n\t} else {\n\t\treturn cvs, nil\n\t}\n}", "func (cm *Runc) All() (containers container.Containers) {\n\tcm.lock.Lock()\n\tfor _, c := range cm.containers {\n\t\tcontainers = append(containers, c)\n\t}\n\tcontainers.Sort()\n\tcontainers.Filter()\n\tcm.lock.Unlock()\n\treturn containers\n}", "func (m mysqlRepo) PagingContainers(filter *persistence.PagingContainersFilter) ([]interface{}, int, error) {\n\tif filter == nil || filter.Limit <= 0 || filter.Offset < 0 {\n\t\tfilter = &persistence.PagingContainersFilter{\n\t\t\tLimit: 10,\n\t\t\tOffset: 0,\n\t\t\tNamespace: \"\",\n\t\t\tKeyPattern: \"\",\n\t\t}\n\t}\n\n\tcontainerDOs := make([]*ContainerDO, 0, filter.Limit)\n\ttx := m.db.Model(_containerTbl).Preload(\"Fields\")\n\tif filter.KeyPattern != \"\" {\n\t\ttx = tx.Where(\"`key` LIKE ?\", fmt.Sprintf(\"%%%s%%\", filter.KeyPattern))\n\t}\n\tif filter.Namespace != \"\" {\n\t\ttx = tx.Where(\"namespace = ?\", filter.Namespace)\n\t}\n\n\tcount := int64(0)\n\terr := tx.Order(\"created_at DESC\").\n\t\tCount(&count).\n\t\tOffset(filter.Offset).\n\t\tLimit(filter.Limit).\n\t\tFind(&containerDOs).Error\n\n\tout := make([]interface{}, len(containerDOs))\n\tfor idx := range containerDOs {\n\t\tout[idx] = &toContainerWithPairs{\n\t\t\torigin: toOriginPaging,\n\t\t\tc: containerDOs[idx],\n\t\t}\n\t}\n\n\treturn out, int(count), err\n}", "func Filter(filters ...FilterOption) Option {\n\treturn func(stackdriver *Stackdriver) {\n\t\tfor i, filterOpt := range filters {\n\t\t\tf := &filter{}\n\t\t\tfilterOpt(f)\n\n\t\t\tif i != 0 || len(stackdriver.Builder.Model.MetricQuery.Filters) != 0 {\n\t\t\t\tstackdriver.Builder.Model.MetricQuery.Filters = append(stackdriver.Builder.Model.MetricQuery.Filters, \"AND\")\n\t\t\t}\n\n\t\t\tstackdriver.Builder.Model.MetricQuery.Filters = append(stackdriver.Builder.Model.MetricQuery.Filters, f.leftOperand, f.operator, f.rightOperand)\n\t\t}\n\t}\n}", "func (o *ContainerListParams) SetFilters(filters *string) {\n\to.Filters = filters\n}", "func (s *SQLState) AllContainers() ([]*Container, error) {\n\t// TODO maybe do an ORDER BY here?\n\tconst query = `SELECT containers.*,\n containerState.State,\n containerState.ConfigPath,\n containerState.RunDir,\n containerState.MountPoint,\n containerState.StartedTime,\n containerState.FinishedTime,\n containerState.ExitCode,\n containerState.OomKilled,\n containerState.Pid,\n containerState.NetNSPath,\n containerState.IPAddress,\n containerState.SubnetMask\n FROM containers\n INNER JOIN\n containerState ON containers.Id = containerState.Id\n ORDER BY containers.CreatedTime DESC;`\n\n\tif !s.valid {\n\t\treturn nil, ErrDBClosed\n\t}\n\n\trows, err := s.db.Query(query)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"error retrieving containers from database\")\n\t}\n\tdefer rows.Close()\n\n\tcontainers := []*Container{}\n\n\tfor rows.Next() {\n\t\tctr, err := s.ctrFromScannable(rows)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tcontainers = append(containers, ctr)\n\t}\n\tif err := rows.Err(); err != nil {\n\t\treturn nil, errors.Wrapf(err, \"error retrieving container rows\")\n\t}\n\n\treturn containers, nil\n}", "func AllContainers(endpoint, authToken string) (*[]Container, error) {\n\tvar containers *[]Container\n\n\treq, err := http.NewRequest(\"GET\", endpoint+\"?format=json\", nil)\n\tif err != nil {\n\t\treturn containers, err\n\t}\n\treq.Header.Add(\"X-Auth-Token\", authToken)\n\treq.Header.Add(\"Content-Type\", \"application/json\")\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn containers, err\n\t}\n\tdefer resp.Body.Close()\n\n\t// Decode the json response.\n\tdec := json.NewDecoder(resp.Body)\n\tfor {\n\t\tif err := dec.Decode(&containers); err == io.EOF {\n\t\t\tbreak\n\t\t} else if err != nil {\n\t\t\treturn containers, err\n\t\t}\n\t}\n\n\treturn containers, nil\n}", "func (o NetworkPacketCaptureOutput) Filters() NetworkPacketCaptureFilterArrayOutput {\n\treturn o.ApplyT(func(v *NetworkPacketCapture) NetworkPacketCaptureFilterArrayOutput { return v.Filters }).(NetworkPacketCaptureFilterArrayOutput)\n}", "func (cf ContainerFilter) Apply(c []*Container) []*Container {\n\tvar containers []*Container\n\tfor _, cont := range c {\n\t\tif cf(cont) {\n\t\t\tcontainers = append(containers, cont)\n\t\t}\n\t}\n\treturn containers\n}", "func FiltersWithNamespaces(filters []string) []string {\n\tnamespaces := config.Datadog.GetStringSlice(\"containerd_namespaces\")\n\texcludeNamespaces := config.Datadog.GetStringSlice(\"containerd_exclude_namespaces\")\n\n\tif len(namespaces) == 0 && len(excludeNamespaces) == 0 {\n\t\t// Watch all namespaces. No need to add them to the filters.\n\t\treturn filters\n\t}\n\n\tvar res []string\n\n\tfor _, filter := range filters {\n\t\tif len(namespaces) > 0 {\n\t\t\tfor _, namespace := range namespaces {\n\t\t\t\tres = append(res, fmt.Sprintf(`%s,namespace==%q`, filter, namespace))\n\t\t\t}\n\t\t} else if len(excludeNamespaces) > 0 {\n\t\t\tfor _, namespace := range excludeNamespaces {\n\t\t\t\tres = append(res, fmt.Sprintf(`%s,namespace!=%q`, filter, namespace))\n\t\t\t}\n\t\t}\n\t}\n\n\treturn res\n}", "func (r *namespaceImpl) EventFilters(p schema.NamespaceEventFiltersFieldResolverParams) (interface{}, error) {\n\tres := newOffsetContainer(p.Args.Offset, p.Args.Limit)\n\tnsp := p.Source.(*corev3.Namespace)\n\n\t// find all records\n\tresults, err := loadEventFilters(p.Context, nsp.Metadata.Name)\n\tif err != nil {\n\t\treturn res, err\n\t}\n\n\t// filter\n\tmatches, err := filter.Compile(p.Args.Filters, EventFilterFilters(), corev3.EventFilterFields)\n\tif err != nil {\n\t\treturn res, err\n\t}\n\tfilteredResults := make([]*corev2.EventFilter, 0, len(results))\n\tfor i := range results {\n\t\tif matches(results[i]) {\n\t\t\tfilteredResults = append(filteredResults, results[i])\n\t\t}\n\t}\n\n\t// sort records\n\tsort.Sort(corev2.SortEventFiltersByName(\n\t\tfilteredResults,\n\t\tp.Args.OrderBy == schema.EventFilterListOrders.NAME,\n\t))\n\n\t// paginate\n\tl, h := clampSlice(p.Args.Offset, p.Args.Offset+p.Args.Limit, len(filteredResults))\n\tres.Nodes = filteredResults[l:h]\n\tres.PageInfo.totalCount = len(filteredResults)\n\treturn res, nil\n}", "func TestComposeService_Logs_ServiceFiltering(t *testing.T) {\n\tmockCtrl := gomock.NewController(t)\n\tdefer mockCtrl.Finish()\n\n\tapi, cli := prepareMocks(mockCtrl)\n\ttested := composeService{\n\t\tdockerCli: cli,\n\t}\n\n\tname := strings.ToLower(testProject)\n\n\tctx := context.Background()\n\tapi.EXPECT().ContainerList(ctx, moby.ContainerListOptions{\n\t\tAll: true,\n\t\tFilters: filters.NewArgs(oneOffFilter(false), projectFilter(name), hasConfigHashLabel()),\n\t}).Return(\n\t\t[]moby.Container{\n\t\t\ttestContainer(\"serviceA\", \"c1\", false),\n\t\t\ttestContainer(\"serviceA\", \"c2\", false),\n\t\t\t// serviceB will be filtered out by the project definition to\n\t\t\t// ensure we ignore \"orphan\" containers\n\t\t\ttestContainer(\"serviceB\", \"c3\", false),\n\t\t\ttestContainer(\"serviceC\", \"c4\", false),\n\t\t},\n\t\tnil,\n\t)\n\n\tfor _, id := range []string{\"c1\", \"c2\", \"c4\"} {\n\t\tid := id\n\t\tapi.EXPECT().\n\t\t\tContainerInspect(anyCancellableContext(), id).\n\t\t\tReturn(\n\t\t\t\tmoby.ContainerJSON{\n\t\t\t\t\tContainerJSONBase: &moby.ContainerJSONBase{ID: id},\n\t\t\t\t\tConfig: &container.Config{Tty: true},\n\t\t\t\t},\n\t\t\t\tnil,\n\t\t\t)\n\t\tapi.EXPECT().ContainerLogs(anyCancellableContext(), id, gomock.Any()).\n\t\t\tReturn(io.NopCloser(strings.NewReader(\"hello \"+id+\"\\n\")), nil).\n\t\t\tTimes(1)\n\t}\n\n\t// this simulates passing `--filename` with a Compose file that does NOT\n\t// reference `serviceB` even though it has running services for this proj\n\tproj := &types.Project{\n\t\tServices: types.Services{\n\t\t\t{Name: \"serviceA\"},\n\t\t\t{Name: \"serviceC\"},\n\t\t},\n\t}\n\tconsumer := &testLogConsumer{}\n\topts := compose.LogOptions{\n\t\tProject: proj,\n\t}\n\terr := tested.Logs(ctx, name, consumer, opts)\n\trequire.NoError(t, err)\n\n\trequire.Equal(t, []string{\"hello c1\"}, consumer.LogsForContainer(\"c1\"))\n\trequire.Equal(t, []string{\"hello c2\"}, consumer.LogsForContainer(\"c2\"))\n\trequire.Empty(t, consumer.LogsForContainer(\"c3\"))\n\trequire.Equal(t, []string{\"hello c4\"}, consumer.LogsForContainer(\"c4\"))\n}", "func (f Filter) Filter(nodes []*yaml.RNode) ([]*yaml.RNode, error) {\n\treturn kio.FilterAll(yaml.FilterFunc(f.run)).Filter(nodes)\n}", "func MultiFilter(filters ...Filter) Filter {\n\treturn &multiFilter{filters}\n}", "func (cm *Docker) AllContainers() (containers entity.Containers) {\n\tcm.lock.Lock()\n\tfor _, container := range cm.containers {\n\t\tcontainers = append(containers, container)\n\t}\n\n\tcontainers.Sort()\n\tcontainers.Filter()\n\tcm.lock.Unlock()\n\treturn containers\n}", "func (d *Dry) ToggleShowAllContainers() {\n\td.state.showingAllContainers = !d.state.showingAllContainers\n\td.Refresh()\n\tif d.state.showingAllContainers {\n\t\td.appmessage(\"<white>Showing all containers</>\")\n\t} else {\n\t\td.appmessage(\"<white>Showing running containers</>\")\n\t}\n}", "func (client *CraneDockerClient) filterStackServices(namespace string) ([]swarm.Service, error) {\n\treturn client.ListServiceSpec(types.ServiceListOptions{Filter: client.getStackFilter(namespace)})\n}", "func (c *DockerCommand) filterOutExited(containers []*Container) []*Container {\n\tif c.ShowExited {\n\t\treturn containers\n\t}\n\ttoReturn := []*Container{}\n\tfor _, container := range containers {\n\t\tif container.Container.State != \"exited\" {\n\t\t\ttoReturn = append(toReturn, container)\n\t\t}\n\t}\n\treturn toReturn\n}", "func filterAll(args []sexp) (Filter, error) {\n\tfilters, err := checkFilterArgs(\"all\", args)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn func(msg *layers.SIP) bool {\n\t\tfor _, f := range filters {\n\t\t\tif !f(msg) {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\t\treturn true\n\t}, nil\n}", "func (c *PlanClient) AllWithFilters(filters Filters) (*PlanListResponse, error) {\n\tresponse := PlanListResponse{}\n\tvalues := url.Values{}\n\taddFiltersToValues([]string{\"count\", \"offset\"}, filters, &values)\n\terr := c.client.get(\"/plans\", values, &response)\n\treturn &response, err\n}", "func (pool *ComplexPool) Filter(filters ...Filter) {\n\tall := ApplyFilters(pool.All.List(), filters)\n\tunused := ApplyFilters(pool.Unused.List(), filters)\n\n\tpool.All = providers.NewSet()\n\tpool.Unused = providers.NewSet()\n\n\tfor _, p := range all {\n\t\tpool.All.Add(p)\n\t}\n\n\tfor _, p := range unused {\n\t\tpool.Unused.Add(p)\n\t}\n}", "func listContainers(ctx context.Context, filters container.FilterBuilder) ([]*types.Node, error) {\n\tn, err := List(ctx, filters)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"failed to list containers\")\n\t}\n\treturn n, nil\n}", "func (s *BoltState) AllContainers(loadState bool) ([]*Container, error) {\n\tif !s.valid {\n\t\treturn nil, define.ErrDBClosed\n\t}\n\n\tctrs := []*Container{}\n\n\tdb, err := s.getDBCon()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer s.deferredCloseDBCon(db)\n\n\terr = db.View(func(tx *bolt.Tx) error {\n\t\tallCtrsBucket, err := getAllCtrsBucket(tx)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tctrBucket, err := getCtrBucket(tx)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn allCtrsBucket.ForEach(func(id, name []byte) error {\n\t\t\t// If performance becomes an issue, this check can be\n\t\t\t// removed. But the error messages that come back will\n\t\t\t// be much less helpful.\n\t\t\tctrExists := ctrBucket.Bucket(id)\n\t\t\tif ctrExists == nil {\n\t\t\t\treturn fmt.Errorf(\"state is inconsistent - container ID %s in all containers, but container not found: %w\", string(id), define.ErrInternal)\n\t\t\t}\n\n\t\t\tctr := new(Container)\n\t\t\tctr.config = new(ContainerConfig)\n\t\t\tctr.state = new(ContainerState)\n\n\t\t\tif err := s.getContainerFromDB(id, ctr, ctrBucket, loadState); err != nil {\n\t\t\t\tlogrus.Errorf(\"Error retrieving container from database: %v\", err)\n\t\t\t} else {\n\t\t\t\tctrs = append(ctrs, ctr)\n\t\t\t}\n\n\t\t\treturn nil\n\t\t})\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ctrs, nil\n}", "func (o *ImagePruneParams) SetFilters(filters *string) {\n\to.Filters = filters\n}", "func ChainFilters(endorser peer.EndorserServer, filters ...Filter) peer.EndorserServer {\n\tif len(filters) == 0 {\n\t\treturn endorser\n\t}\n\n\t// Each filter forwards to the next\n\tfor i := 0; i < len(filters)-1; i++ {\n\t\tfilters[i].Init(filters[i+1])\n\t}\n\n\t// Last filter forwards to the endorser\n\tfilters[len(filters)-1].Init(endorser)\n\n\treturn filters[0]\n}", "func (cch *cache) FilterScope(scope *resmgr.Expression) []Container {\n\tcch.Debug(\"calculating scope %s\", scope.String())\n\tresult := []Container{}\n\tfor _, c := range cch.GetContainers() {\n\t\tif scope.Evaluate(c) {\n\t\t\tcch.Debug(\" + container %s: IN scope\", c.PrettyName())\n\t\t\tresult = append(result, c)\n\t\t} else {\n\t\t\tcch.Debug(\" - container %s: NOT IN scope\", c.PrettyName())\n\t\t}\n\t}\n\treturn result\n}", "func (d *Docker) List(r *kite.Request) (interface{}, error) {\n\tfilter := dockerclient.ListContainersOptions{\n\t\tAll: true,\n\t}\n\n\treturn d.client.ListContainers(filter)\n}", "func (o *NetworkPruneParams) SetFilters(filters *string) {\n\to.Filters = filters\n}", "func collectContainers(entity ProjectEntity, filterLocal bool) ([]composecontainer.Container, error) {\n\tecsTasks, err := collectTasks(entity, filterLocal)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn getContainersForTasks(entity, ecsTasks)\n}", "func (q *ParsedRawQuery) NumFilters() int {\n\tnumFilters := 0\n\tfor _, f := range q.Filters {\n\t\tnumFilters += len(f.Filters)\n\t}\n\treturn numFilters\n}", "func (pl *NoMaxResourceCount) Filter(ctx context.Context, args interface{}, states *state.State, key types.NamespacedName, podID int32) *state.Status {\n\tlogger := logging.FromContext(ctx).With(\"Filter\", pl.Name())\n\n\tresourceCountArgs, ok := args.(string)\n\tif !ok {\n\t\tlogger.Errorf(\"Filter args %v for predicate %q are not valid\", args, pl.Name())\n\t\treturn state.NewStatus(state.Unschedulable, ErrReasonInvalidArg)\n\t}\n\n\tresVal := state.NoMaxResourceCountArgs{}\n\tdecoder := json.NewDecoder(strings.NewReader(resourceCountArgs))\n\tdecoder.DisallowUnknownFields()\n\tif err := decoder.Decode(&resVal); err != nil {\n\t\treturn state.NewStatus(state.Unschedulable, ErrReasonInvalidArg)\n\t}\n\n\tpodName := state.PodNameFromOrdinal(states.StatefulSetName, podID)\n\tif _, ok := states.PodSpread[key][podName]; !ok && ((len(states.PodSpread[key]) + 1) > resVal.NumPartitions) { //pod not in vrep's partition map and counting this new pod towards total pod count\n\t\tlogger.Infof(\"Unschedulable! Pod %d filtered due to total pod count %v exceeding partition count\", podID, len(states.PodSpread[key])+1)\n\t\treturn state.NewStatus(state.Unschedulable, ErrReasonUnschedulable)\n\t}\n\n\treturn state.NewStatus(state.Success)\n}", "func (o OceanOutput) Filters() OceanFiltersPtrOutput {\n\treturn o.ApplyT(func(v *Ocean) OceanFiltersPtrOutput { return v.Filters }).(OceanFiltersPtrOutput)\n}", "func TestListContainers(t *testing.T) {\n\tds, _, fakeClock := newTestDockerService()\n\tpodName, namespace := \"foo\", \"bar\"\n\tcontainerName, image := \"sidecar\", \"logger\"\n\n\tconfigs := []*runtimeapi.ContainerConfig{}\n\tsConfigs := []*runtimeapi.PodSandboxConfig{}\n\tfor i := 0; i < 3; i++ {\n\t\ts := makeSandboxConfig(fmt.Sprintf(\"%s%d\", podName, i),\n\t\t\tfmt.Sprintf(\"%s%d\", namespace, i), fmt.Sprintf(\"%d\", i), 0)\n\t\tlabels := map[string]string{\"abc.xyz\": fmt.Sprintf(\"label%d\", i)}\n\t\tannotations := map[string]string{\"foo.bar.baz\": fmt.Sprintf(\"annotation%d\", i)}\n\t\tc := makeContainerConfig(s, fmt.Sprintf(\"%s%d\", containerName, i),\n\t\t\tfmt.Sprintf(\"%s:v%d\", image, i), uint32(i), labels, annotations)\n\t\tsConfigs = append(sConfigs, s)\n\t\tconfigs = append(configs, c)\n\t}\n\n\texpected := []*runtimeapi.Container{}\n\tstate := runtimeapi.ContainerState_CONTAINER_RUNNING\n\tvar createdAt int64 = fakeClock.Now().UnixNano()\n\tfor i := range configs {\n\t\t// We don't care about the sandbox id; pass a bogus one.\n\t\tsandboxID := fmt.Sprintf(\"sandboxid%d\", i)\n\t\tid, err := ds.CreateContainer(sandboxID, configs[i], sConfigs[i])\n\t\tassert.NoError(t, err)\n\t\terr = ds.StartContainer(id)\n\t\tassert.NoError(t, err)\n\n\t\timageRef := \"\" // FakeDockerClient doesn't populate ImageRef yet.\n\t\t// Prepend to the expected list because ListContainers returns\n\t\t// the most recent containers first.\n\t\texpected = append([]*runtimeapi.Container{{\n\t\t\tMetadata: configs[i].Metadata,\n\t\t\tId: id,\n\t\t\tPodSandboxId: sandboxID,\n\t\t\tState: state,\n\t\t\tCreatedAt: createdAt,\n\t\t\tImage: configs[i].Image,\n\t\t\tImageRef: imageRef,\n\t\t\tLabels: configs[i].Labels,\n\t\t\tAnnotations: configs[i].Annotations,\n\t\t}}, expected...)\n\t}\n\tcontainers, err := ds.ListContainers(nil)\n\tassert.NoError(t, err)\n\tassert.Len(t, containers, len(expected))\n\tassert.Equal(t, expected, containers)\n}", "func (t *StringSlice) Filter(filters ...func(string) bool) *StringSlice {\n\tret := NewStringSlice()\n\tfor _, i := range t.items {\n\t\tok := true\n\t\tfor _, f := range filters {\n\t\t\tok = ok && f(i)\n\t\t\tif !ok {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif ok {\n\t\t\tret.Push(i)\n\t\t}\n\t}\n\treturn ret\n}", "func filterVolume(all []lepton.NanosVolume, query map[string]string) ([]lepton.NanosVolume, error) {\n\tif len(query) == 0 {\n\t\treturn all, nil\n\t}\n\n\tvar vols []lepton.NanosVolume\n\tfor _, vol := range all {\n\t\tif vol.MatchedByQueries(query) {\n\t\t\tvols = append(vols, vol)\n\t\t}\n\t}\n\treturn vols, nil\n}", "func (m *Machine) WatchAllContainers() (watcher.StringsWatcher, error) {\n\tvar results params.StringsWatchResults\n\targs := params.WatchContainers{\n\t\tParams: []params.WatchContainer{\n\t\t\t{MachineTag: m.tag.String()},\n\t\t},\n\t}\n\terr := m.st.call(\"WatchContainers\", args, &results)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(results.Results) != 1 {\n\t\treturn nil, fmt.Errorf(\"expected 1 result, got %d\", len(results.Results))\n\t}\n\tresult := results.Results[0]\n\tif result.Error != nil {\n\t\treturn nil, result.Error\n\t}\n\tw := watcher.NewStringsWatcher(m.st.caller, result)\n\treturn w, nil\n}", "func (p *Provider) ContainerList(forAll bool, withIds bool, nameFilter string) (err error) {\n\tvar (\n\t\tcli *client.Client\n\t\tcontainers []types.Container\n\t)\n\tcli, err = client.NewClientWithOpts(client.FromEnv)\n\tif err != nil {\n\t\treturn err\n\t}\n\tcontainers, err = cli.ContainerList(p.getConListCondition(forAll))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn p.queryConByName(containers, withIds, nameFilter)\n}", "func (cf ContainerFilter) Running() ContainerFilter {\n\treturn cf.ByRunningState(true)\n}", "func (o *PcloudNetworksGetallParams) WithFilter(filter *string) *PcloudNetworksGetallParams {\n\to.SetFilter(filter)\n\treturn o\n}", "func Filters(f ...Filter) Modifier {\n\treturn func(r *http.Request) error {\n\t\tfor _, filter := range f {\n\t\t\tfilter(r)\n\t\t}\n\t\treturn nil // Or should filter return err?\n\t}\n}", "func (client *CraneDockerClient) filterStackNetwork(namespace string) ([]docker.Network, error) {\n\tfilter := docker.NetworkFilterOpts{\"label\": map[string]bool{LabelNamespace: true}}\n\tnetworks, err := client.ListNetworks(filter)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar stackNetwork []docker.Network\n\tfor _, network := range networks {\n\t\tif network.Labels == nil {\n\t\t\tcontinue\n\t\t}\n\n\t\tif name, ok := network.Labels[LabelNamespace]; !ok || name != namespace {\n\t\t\tcontinue\n\t\t}\n\n\t\tstackNetwork = append(stackNetwork, network)\n\t}\n\n\treturn stackNetwork, nil\n}", "func (o *ContainerListParams) WithFilters(filters *string) *ContainerListParams {\n\to.SetFilters(filters)\n\treturn o\n}", "func (s *VolumeStore) filter(vols []volume.Volume, f filterFunc) []volume.Volume {\n\tvar ls []volume.Volume\n\tfor _, v := range vols {\n\t\tif f(v) {\n\t\t\tls = append(ls, v)\n\t\t}\n\t}\n\treturn ls\n}", "func NewPodFilters(filters ...PodFilterFunc) PodFilterFunc {\n\treturn func(p core.Pod) (bool, error) {\n\t\tfor _, fn := range filters {\n\t\t\tpasses, err := fn(p)\n\t\t\tif err != nil {\n\t\t\t\treturn false, errors.Wrap(err, \"cannot apply filters\")\n\t\t\t}\n\t\t\tif !passes {\n\t\t\t\treturn false, nil\n\t\t\t}\n\t\t}\n\t\treturn true, nil\n\t}\n}", "func getCBBuildsWithFilter(projectID string, filter string, cFilters []clientBuildFilter) ([]*cloudbuild.Build, error) {\n\tctx := context.Background()\n\tcloudbuildService, err := cloudbuild.NewService(ctx)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error creating cloudbuild service: %v\", err)\n\t}\n\n\tc, err := cloudbuildService.Projects.Builds.List(projectID).Filter(filter).Do()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error listing builds with filter %s in project %s: %v\", filter, projectID, err)\n\t}\n\n\tcbBuilds := []*cloudbuild.Build{}\n\tappendClientFilteredBuilds := func(builds []*cloudbuild.Build) {\n\t\tfor _, b := range builds {\n\t\t\tappendBuild := true\n\t\t\tfor _, cFilter := range cFilters {\n\t\t\t\t// skip if any client side filter evaluates to false\n\t\t\t\tif !cFilter(b) {\n\t\t\t\t\tappendBuild = false\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif appendBuild {\n\t\t\t\tcbBuilds = append(cbBuilds, b)\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(c.Builds) < 1 {\n\t\treturn nil, fmt.Errorf(\"no builds found with filter %s in project %s\", filter, projectID)\n\t}\n\tappendClientFilteredBuilds(c.Builds)\n\n\t// pagination\n\tfor {\n\t\tc, err = cloudbuildService.Projects.Builds.List(projectID).Filter(filter).PageToken(c.NextPageToken).Do()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"error retriving next page with token %s: %v\", c.NextPageToken, err)\n\t\t}\n\t\tappendClientFilteredBuilds(c.Builds)\n\t\tif c.NextPageToken == \"\" {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn cbBuilds, nil\n}", "func FilterDockerStream(reader io.Reader, streamType int) ([]string, error) {\n\tlogging.Debug(\"[FilterDockerstream] filtering reader for stream type: %d\", streamType)\n\tdefer logging.Debug(\"[FilterDockerstream] leaving\")\n\tresult := []string{}\n\th, err := readFrameHeader(reader)\n\tif err != nil && err != io.EOF {\n\t\tlogging.Debug(\"[FilterDockerstream] stream contains no initial header: %s\", err)\n\t\treturn nil, err\n\t}\n\tfor err == nil {\n\t\tpayload, err := readFramePayload(reader, h)\n\t\tif err != nil {\n\t\t\tlogging.Debug(\"[FilterDockerstream] error reading payload: %s\", err)\n\t\t\treturn result, err\n\t\t}\n\t\t// Discard payload if streamType doesn't match requested\n\t\tif h.streamType == streamType {\n\t\t\tlines := bytes.Split(payload, []byte(\"\\n\"))\n\t\t\tfor _, line := range lines {\n\t\t\t\tif len(line) != 0 {\n\t\t\t\t\tlogging.Debug(\"[FilterDockerstream] extracted line: %s\", string(line))\n\t\t\t\t\tresult = append(result, string(line))\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\th, err = readFrameHeader(reader)\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn result, nil\n}", "func (stream *TokenStream) Filter(filters ...Filter) *TokenStream {\n\toutgoing := stream\n\tfor _, f := range filters {\n\t\toutgoing = f(outgoing)\n\t}\n\treturn outgoing\n}", "func listChartsWithFilters(w http.ResponseWriter, req *http.Request, params Params) {\n\tdb, closer := dbSession.DB()\n\tdefer closer()\n\n\tvar charts []*models.Chart\n\tif err := db.C(chartCollection).Find(bson.M{\n\t\t\"name\": params[\"chartName\"],\n\t\t\"chartversions\": bson.M{\n\t\t\t\"$elemMatch\": bson.M{\"version\": req.FormValue(\"version\"), \"appversion\": req.FormValue(\"appversion\")},\n\t\t}}).Select(bson.M{\n\t\t\"name\": 1, \"repo\": 1,\n\t\t\"chartversions\": bson.M{\"$slice\": 1},\n\t}).All(&charts); err != nil {\n\t\tlog.WithError(err).Errorf(\n\t\t\t\"could not find charts with the given name %s, version %s and appversion %s\",\n\t\t\tparams[\"chartName\"], req.FormValue(\"version\"), req.FormValue(\"appversion\"),\n\t\t)\n\t\t// continue to return empty list\n\t}\n\n\tchartResponse := charts\n\tif !showDuplicates(req) {\n\t\tchartResponse = uniqChartList(charts)\n\t}\n\tcl := newChartListResponse(chartResponse)\n\tresponse.NewDataResponse(cl).Write(w)\n}", "func (c *client) FilterLogs(query ethereum.FilterQuery) ([]types.Log, error) {\n\tctxwt, cancel := context.WithTimeout(context.Background(), defaultRequestTimeout)\n\tdefer cancel()\n\n\tvar result []types.Log\n\targ, err := toFilterArg(query)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = c.rpc.CallContext(ctxwt, &result, \"eth_getLogs\", arg)\n\treturn result, err\n}", "func ListContainers() {\n\tcli, err := client.NewClientWithOpts(client.FromEnv)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tcontainers, err := cli.ContainerList(context.Background(), types.ContainerListOptions{})\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tfor _, container := range containers {\n\t\tfmt.Printf(\"%s %s\\n\", container.ID[:10], container.Image)\n\t}\n\n\timages, err := cli.ImageList(context.Background(), types.ImageListOptions{})\n\tfor _, imageSummary := range images {\n\t\tfmt.Printf(\"%s %s\\n\", imageSummary.ID, imageSummary.RepoTags[0])\n\n\t\timageSpec, _, err := cli.ImageInspectWithRaw(context.Background(), imageSummary.ID)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\n\t\tvar chainID layer.ChainID\n\t\tvar parent digest.Digest\n\t\tfor i, layerID := range imageSpec.RootFS.Layers {\n\t\t\tif chainID == \"\" {\n\t\t\t\tchainID = layer.ChainID(layerID)\n\t\t\t} else {\n\t\t\t\tchainID = layer.ChainID(digest.FromString(chainID.String() + \" \" + layerID))\n\t\t\t}\n\n\t\t\timg := image.V1Image{\n\t\t\t\tCreated: time.Unix(0, 0),\n\t\t\t}\n\t\t\tif i == len(imageSpec.RootFS.Layers)-1 {\n\t\t\t\tfmt.Println(\"=====================================================\", i)\n\t\t\t\timg = sepc2V1Image(imageSpec)\n\t\t\t}\n\t\t\t// var cstSh, _ = time.LoadLocation(\"Asia/Shanghai\") //上海\n\t\t\t// img.Created, _ = time.ParseInLocation(\"1/2/2006 15:04:05\", \"1/1/1970 00:00:00\", cstSh)\n\n\t\t\t//fmt.Println(\"SH : \", time.Now().In(cstSh).Format(\"2006-01-02 15:04:05\"))\n\n\t\t\tv1Id, _ := v1.CreateID(img, chainID, parent)\n\t\t\t// v1Id, _ := CreateID(V1Image{}, chainID, parent)\n\t\t\t// v1Id := CreateID(chainID, parent)\n\t\t\tfmt.Printf(\">>> ChainID: %s -> saveID: %s\\n\", chainID, v1Id)\n\n\t\t\tparent = v1Id\n\t\t}\n\n\t}\n\n}", "func ListContainers() []Container {\n\t// Connect to docker\n\tclient, err := dockerClient.NewClient(dockerEndpoint)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tcontainers, err := client.ListContainers(dockerClient.ListContainersOptions{All: false})\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tvar validContainers []Container\n\tfor _, container := range containers {\n\t\t// check for a valid port to map\n\t\tvar portNumber int64\n\t\tvalidPortFound := false\n\t\tfor _, port := range container.Ports {\n\t\t\tif port.Type == \"tcp\" {\n\t\t\t\tportNumber = port.PublicPort\n\t\t\t\tvalidPortFound = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\t// If no valid port, skip this container\n\t\tif !validPortFound {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Check that container has at least one name\n\t\t// TODO: do I even need to check for container name existence?\n\t\tif len(container.Names) == 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Strip the initial slash to set our name\n\t\tname := strings.Replace(container.Names[0], \"/\", \"\", 1)\n\n\t\tvalidContainers = append(validContainers, Container{name, portNumber})\n\t}\n\n\treturn validContainers\n}", "func GetWorkloadContainers(dockerEndpoint string) ([]dockerclient.APIContainers, error) {\n\tif client, err := dockerclient.NewClient(dockerEndpoint); err != nil {\n\t\treturn nil, errors.New(fmt.Sprintf(\"unable to create docker client from %v, error %v\", dockerEndpoint, err))\n\t} else {\n\t\topts := dockerclient.ListContainersOptions{\n\t\t\tAll: true,\n\t\t}\n\n\t\tif containers, err := client.ListContainers(opts); err != nil {\n\t\t\treturn nil, errors.New(fmt.Sprintf(\"unable to list docker containers from %v, error %v\", dockerEndpoint, err))\n\t\t} else {\n\t\t\tret := make([]dockerclient.APIContainers, 0, 10)\n\n\t\t\tfor _, c := range containers {\n\t\t\t\tif _, exists := c.Labels[\"network.bluehorizon.colonus.service_name\"]; exists {\n\t\t\t\t\tif _, exists := c.Labels[\"network.bluehorizon.colonus.infrastructure\"]; !exists {\n\t\t\t\t\t\tret = append(ret, c)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn ret, nil\n\t\t}\n\t}\n}", "func (a *Client) GetFilters(params *GetFiltersParams, authInfo runtime.ClientAuthInfoWriter) (*GetFiltersOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewGetFiltersParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"getFilters\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/services/haproxy/configuration/filters\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &GetFiltersReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*GetFiltersOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*GetFiltersDefault)\n\treturn nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "func ExampleAssetFiltersClient_NewListPager() {\n\tcred, err := azidentity.NewDefaultAzureCredential(nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to obtain a credential: %v\", err)\n\t}\n\tctx := context.Background()\n\tclientFactory, err := armmediaservices.NewClientFactory(\"<subscription-id>\", cred, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create client: %v\", err)\n\t}\n\tpager := clientFactory.NewAssetFiltersClient().NewListPager(\"contoso\", \"contosomedia\", \"ClimbingMountRainer\", nil)\n\tfor pager.More() {\n\t\tpage, err := pager.NextPage(ctx)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"failed to advance page: %v\", err)\n\t\t}\n\t\tfor _, v := range page.Value {\n\t\t\t// You could use page here. We use blank identifier for just demo purposes.\n\t\t\t_ = v\n\t\t}\n\t\t// If the HTTP response code is 200 as defined in example definition, your page structure would look as follows. Please pay attention that all the values in the output are fake values for just demo purposes.\n\t\t// page.AssetFilterCollection = armmediaservices.AssetFilterCollection{\n\t\t// \tValue: []*armmediaservices.AssetFilter{\n\t\t// \t\t{\n\t\t// \t\t\tName: to.Ptr(\"assetFilterWithTimeWindowAndTrack\"),\n\t\t// \t\t\tType: to.Ptr(\"Microsoft.Media/mediaservices/assets/assetFilters\"),\n\t\t// \t\t\tID: to.Ptr(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.Media/mediaservices/contosomedia/assets/ClimbingMountRainer/assetFilters/assetFilterWithTimeWindowAndTrack\"),\n\t\t// \t\t\tProperties: &armmediaservices.MediaFilterProperties{\n\t\t// \t\t\t\tFirstQuality: &armmediaservices.FirstQuality{\n\t\t// \t\t\t\t\tBitrate: to.Ptr[int32](128000),\n\t\t// \t\t\t\t},\n\t\t// \t\t\t\tPresentationTimeRange: &armmediaservices.PresentationTimeRange{\n\t\t// \t\t\t\t\tEndTimestamp: to.Ptr[int64](170000000),\n\t\t// \t\t\t\t\tForceEndTimestamp: to.Ptr(false),\n\t\t// \t\t\t\t\tLiveBackoffDuration: to.Ptr[int64](0),\n\t\t// \t\t\t\t\tPresentationWindowDuration: to.Ptr[int64](9223372036854775000),\n\t\t// \t\t\t\t\tStartTimestamp: to.Ptr[int64](0),\n\t\t// \t\t\t\t\tTimescale: to.Ptr[int64](10000000),\n\t\t// \t\t\t\t},\n\t\t// \t\t\t\tTracks: []*armmediaservices.FilterTrackSelection{\n\t\t// \t\t\t\t\t{\n\t\t// \t\t\t\t\t\tTrackSelections: []*armmediaservices.FilterTrackPropertyCondition{\n\t\t// \t\t\t\t\t\t\t{\n\t\t// \t\t\t\t\t\t\t\tOperation: to.Ptr(armmediaservices.FilterTrackPropertyCompareOperationEqual),\n\t\t// \t\t\t\t\t\t\t\tProperty: to.Ptr(armmediaservices.FilterTrackPropertyTypeType),\n\t\t// \t\t\t\t\t\t\t\tValue: to.Ptr(\"Audio\"),\n\t\t// \t\t\t\t\t\t\t},\n\t\t// \t\t\t\t\t\t\t{\n\t\t// \t\t\t\t\t\t\t\tOperation: to.Ptr(armmediaservices.FilterTrackPropertyCompareOperationNotEqual),\n\t\t// \t\t\t\t\t\t\t\tProperty: to.Ptr(armmediaservices.FilterTrackPropertyTypeLanguage),\n\t\t// \t\t\t\t\t\t\t\tValue: to.Ptr(\"en\"),\n\t\t// \t\t\t\t\t\t\t},\n\t\t// \t\t\t\t\t\t\t{\n\t\t// \t\t\t\t\t\t\t\tOperation: to.Ptr(armmediaservices.FilterTrackPropertyCompareOperationNotEqual),\n\t\t// \t\t\t\t\t\t\t\tProperty: to.Ptr(armmediaservices.FilterTrackPropertyTypeFourCC),\n\t\t// \t\t\t\t\t\t\t\tValue: to.Ptr(\"EC-3\"),\n\t\t// \t\t\t\t\t\t}},\n\t\t// \t\t\t\t\t},\n\t\t// \t\t\t\t\t{\n\t\t// \t\t\t\t\t\tTrackSelections: []*armmediaservices.FilterTrackPropertyCondition{\n\t\t// \t\t\t\t\t\t\t{\n\t\t// \t\t\t\t\t\t\t\tOperation: to.Ptr(armmediaservices.FilterTrackPropertyCompareOperationEqual),\n\t\t// \t\t\t\t\t\t\t\tProperty: to.Ptr(armmediaservices.FilterTrackPropertyTypeType),\n\t\t// \t\t\t\t\t\t\t\tValue: to.Ptr(\"Video\"),\n\t\t// \t\t\t\t\t\t\t},\n\t\t// \t\t\t\t\t\t\t{\n\t\t// \t\t\t\t\t\t\t\tOperation: to.Ptr(armmediaservices.FilterTrackPropertyCompareOperationEqual),\n\t\t// \t\t\t\t\t\t\t\tProperty: to.Ptr(armmediaservices.FilterTrackPropertyTypeBitrate),\n\t\t// \t\t\t\t\t\t\t\tValue: to.Ptr(\"3000000-5000000\"),\n\t\t// \t\t\t\t\t\t}},\n\t\t// \t\t\t\t}},\n\t\t// \t\t\t},\n\t\t// \t\t},\n\t\t// \t\t{\n\t\t// \t\t\tName: to.Ptr(\"assetFilterWithTimeWindow\"),\n\t\t// \t\t\tType: to.Ptr(\"Microsoft.Media/mediaservices/assets/assetFilters\"),\n\t\t// \t\t\tID: to.Ptr(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.Media/mediaservices/contosomedia/assets/ClimbingMountRainer/assetFilters/assetFilterWithTimeWindow\"),\n\t\t// \t\t\tProperties: &armmediaservices.MediaFilterProperties{\n\t\t// \t\t\t\tFirstQuality: &armmediaservices.FirstQuality{\n\t\t// \t\t\t\t\tBitrate: to.Ptr[int32](128000),\n\t\t// \t\t\t\t},\n\t\t// \t\t\t\tPresentationTimeRange: &armmediaservices.PresentationTimeRange{\n\t\t// \t\t\t\t\tEndTimestamp: to.Ptr[int64](170000000),\n\t\t// \t\t\t\t\tForceEndTimestamp: to.Ptr(false),\n\t\t// \t\t\t\t\tLiveBackoffDuration: to.Ptr[int64](0),\n\t\t// \t\t\t\t\tPresentationWindowDuration: to.Ptr[int64](9223372036854775000),\n\t\t// \t\t\t\t\tStartTimestamp: to.Ptr[int64](0),\n\t\t// \t\t\t\t\tTimescale: to.Ptr[int64](10000000),\n\t\t// \t\t\t\t},\n\t\t// \t\t\t\tTracks: []*armmediaservices.FilterTrackSelection{\n\t\t// \t\t\t\t},\n\t\t// \t\t\t},\n\t\t// \t\t},\n\t\t// \t\t{\n\t\t// \t\t\tName: to.Ptr(\"assetFilterWithTrack\"),\n\t\t// \t\t\tType: to.Ptr(\"Microsoft.Media/mediaservices/assets/assetFilters\"),\n\t\t// \t\t\tID: to.Ptr(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.Media/mediaservices/contosomedia/assets/ClimbingMountRainer/assetFilters/assetFilterWithTrack\"),\n\t\t// \t\t\tProperties: &armmediaservices.MediaFilterProperties{\n\t\t// \t\t\t\tTracks: []*armmediaservices.FilterTrackSelection{\n\t\t// \t\t\t\t\t{\n\t\t// \t\t\t\t\t\tTrackSelections: []*armmediaservices.FilterTrackPropertyCondition{\n\t\t// \t\t\t\t\t\t\t{\n\t\t// \t\t\t\t\t\t\t\tOperation: to.Ptr(armmediaservices.FilterTrackPropertyCompareOperationEqual),\n\t\t// \t\t\t\t\t\t\t\tProperty: to.Ptr(armmediaservices.FilterTrackPropertyTypeType),\n\t\t// \t\t\t\t\t\t\t\tValue: to.Ptr(\"Audio\"),\n\t\t// \t\t\t\t\t\t\t},\n\t\t// \t\t\t\t\t\t\t{\n\t\t// \t\t\t\t\t\t\t\tOperation: to.Ptr(armmediaservices.FilterTrackPropertyCompareOperationNotEqual),\n\t\t// \t\t\t\t\t\t\t\tProperty: to.Ptr(armmediaservices.FilterTrackPropertyTypeLanguage),\n\t\t// \t\t\t\t\t\t\t\tValue: to.Ptr(\"en\"),\n\t\t// \t\t\t\t\t\t\t},\n\t\t// \t\t\t\t\t\t\t{\n\t\t// \t\t\t\t\t\t\t\tOperation: to.Ptr(armmediaservices.FilterTrackPropertyCompareOperationNotEqual),\n\t\t// \t\t\t\t\t\t\t\tProperty: to.Ptr(armmediaservices.FilterTrackPropertyTypeFourCC),\n\t\t// \t\t\t\t\t\t\t\tValue: to.Ptr(\"EC-3\"),\n\t\t// \t\t\t\t\t\t}},\n\t\t// \t\t\t\t\t},\n\t\t// \t\t\t\t\t{\n\t\t// \t\t\t\t\t\tTrackSelections: []*armmediaservices.FilterTrackPropertyCondition{\n\t\t// \t\t\t\t\t\t\t{\n\t\t// \t\t\t\t\t\t\t\tOperation: to.Ptr(armmediaservices.FilterTrackPropertyCompareOperationEqual),\n\t\t// \t\t\t\t\t\t\t\tProperty: to.Ptr(armmediaservices.FilterTrackPropertyTypeType),\n\t\t// \t\t\t\t\t\t\t\tValue: to.Ptr(\"Video\"),\n\t\t// \t\t\t\t\t\t\t},\n\t\t// \t\t\t\t\t\t\t{\n\t\t// \t\t\t\t\t\t\t\tOperation: to.Ptr(armmediaservices.FilterTrackPropertyCompareOperationEqual),\n\t\t// \t\t\t\t\t\t\t\tProperty: to.Ptr(armmediaservices.FilterTrackPropertyTypeBitrate),\n\t\t// \t\t\t\t\t\t\t\tValue: to.Ptr(\"3000000-5000000\"),\n\t\t// \t\t\t\t\t\t}},\n\t\t// \t\t\t\t}},\n\t\t// \t\t\t},\n\t\t// \t}},\n\t\t// }\n\t}\n}", "func (s *ListSessionAnalyticsDataInput) SetFilters(v []*AnalyticsSessionFilter) *ListSessionAnalyticsDataInput {\n\ts.Filters = v\n\treturn s\n}", "func buildChannelFilterQuery(channels []string) []elastic.Query {\n\tfilters := make([]elastic.Query, len(channels))\n\tfor i := range channels {\n\t\tfilters[i] = elastic.NewMatchQuery(\"channel\", channels[i])\n\t}\n\treturn filters\n}", "func (filters *FiltersV1) ListAllFiltersWithContext(ctx context.Context, listAllFiltersOptions *ListAllFiltersOptions) (result *ListFiltersResp, response *core.DetailedResponse, err error) {\n\terr = core.ValidateNotNil(listAllFiltersOptions, \"listAllFiltersOptions cannot be nil\")\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.ValidateStruct(listAllFiltersOptions, \"listAllFiltersOptions\")\n\tif err != nil {\n\t\treturn\n\t}\n\n\tpathParamsMap := map[string]string{\n\t\t\"crn\": *listAllFiltersOptions.Crn,\n\t\t\"zone_identifier\": *listAllFiltersOptions.ZoneIdentifier,\n\t}\n\n\tbuilder := core.NewRequestBuilder(core.GET)\n\tbuilder = builder.WithContext(ctx)\n\tbuilder.EnableGzipCompression = filters.GetEnableGzipCompression()\n\t_, err = builder.ResolveRequestURL(filters.Service.Options.URL, `/v1/{crn}/zones/{zone_identifier}/filters`, pathParamsMap)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor headerName, headerValue := range listAllFiltersOptions.Headers {\n\t\tbuilder.AddHeader(headerName, headerValue)\n\t}\n\n\tsdkHeaders := common.GetSdkHeaders(\"filters\", \"V1\", \"ListAllFilters\")\n\tfor headerName, headerValue := range sdkHeaders {\n\t\tbuilder.AddHeader(headerName, headerValue)\n\t}\n\tbuilder.AddHeader(\"Accept\", \"application/json\")\n\tif listAllFiltersOptions.XAuthUserToken != nil {\n\t\tbuilder.AddHeader(\"X-Auth-User-Token\", fmt.Sprint(*listAllFiltersOptions.XAuthUserToken))\n\t}\n\n\trequest, err := builder.Build()\n\tif err != nil {\n\t\treturn\n\t}\n\n\tvar rawResponse map[string]json.RawMessage\n\tresponse, err = filters.Service.Request(request, &rawResponse)\n\tif err != nil {\n\t\treturn\n\t}\n\tif rawResponse != nil {\n\t\terr = core.UnmarshalModel(rawResponse, \"\", &result, UnmarshalListFiltersResp)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tresponse.Result = result\n\t}\n\n\treturn\n}", "func filterLayerBlobs(metadata map[digest.Digest]ocispecs.Descriptor, mu sync.Locker) images.HandlerFunc {\n\treturn func(ctx context.Context, desc ocispecs.Descriptor) ([]ocispecs.Descriptor, error) {\n\t\tswitch desc.MediaType {\n\t\tcase\n\t\t\tocispecs.MediaTypeImageLayer,\n\t\t\tocispecs.MediaTypeImageLayerNonDistributable,\n\t\t\timages.MediaTypeDockerSchema2Layer,\n\t\t\timages.MediaTypeDockerSchema2LayerForeign,\n\t\t\tocispecs.MediaTypeImageLayerGzip,\n\t\t\timages.MediaTypeDockerSchema2LayerGzip,\n\t\t\tocispecs.MediaTypeImageLayerNonDistributableGzip,\n\t\t\timages.MediaTypeDockerSchema2LayerForeignGzip,\n\t\t\tocispecs.MediaTypeImageLayerZstd,\n\t\t\tocispecs.MediaTypeImageLayerNonDistributableZstd:\n\t\t\treturn nil, images.ErrSkipDesc\n\t\tdefault:\n\t\t\tif metadata != nil {\n\t\t\t\tmu.Lock()\n\t\t\t\tmetadata[desc.Digest] = desc\n\t\t\t\tmu.Unlock()\n\t\t\t}\n\t\t}\n\t\treturn nil, nil\n\t}\n}", "func (cf ContainerFilter) ByRunningState(running bool) ContainerFilter {\n\treturn func(c *Container) bool {\n\t\treturn IsContainerRunning(c) == running\n\t}\n}", "func Filters(filters ...Filter) retry.Option {\n\tretryIf := fallback\n\tfor i := len(filters) - 1; i >= 0; i-- {\n\t\tretryIf = chain(filters[i], retryIf)\n\t}\n\treturn retry.RetryIf(retryIf)\n}", "func FilterProjects(db *sql.DB, collabSpace string) []Project {\n\tprojects := []Project{}\n\tfmt.Println(collabSpace)\n\tsqlQuery := `SELECT * FROM projects WHERE tags[1]=$1;`\n\trows, err := db.Query(sqlQuery, collabSpace)\n\n\tdefer rows.Close()\n\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t}\n\n\tfor rows.Next() {\n\t\tproject := Project{}\n\t\trows.Scan(&project.Name, pq.Array(&project.ProjectImgs),\n\t\t\t&project.DefaultImageIndex, pq.Array(&project.Tags),\n\t\t\t&project.Description, &project.Followers)\n\n\t\tprojects = append(projects, project)\n\t}\n\n\treturn projects\n}", "func (s Workflows) Filter(query string, max int) Workflows {\n\tstart := time.Now()\n\tsorter := fuzzy.New(s, sopts...)\n\n\tres := sorter.Sort(query)\n\n\tvar n int\n\thits := s[:0]\n\tfor i, w := range s {\n\t\tr := res[i]\n\t\t// Ignore workflows that don't match (i.e. not all characters in query\n\t\t// are in the workflow)\n\t\tif r.Match {\n\t\t\tn++\n\t\t\thits = append(hits, w)\n\t\t\tlog.Printf(\"[fuzzy] %3d. score=%5.2f, owner=%s, name=%s\", n, r.Score, w.Owner, w.Name)\n\t\t\tif max > 0 && n == max {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\tlog.Printf(\"[fuzzy] sorted %d workflows in %v\", s.Len(), util.ReadableDuration(time.Now().Sub(start)))\n\treturn hits\n}", "func NewMultiFilter(filter ...Filter) *MultiFilter {\n\treturn &MultiFilter{filters: filter}\n}", "func (o *View) SetFilters(v []ViewFilter) {\n\to.Filters = v\n}", "func GetContainers() ([]Container, error) {\n\tdb := conf.ConnectDB()\n\trows, err := db.Query(\"SELECT * FROM containers\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefer rows.Close()\n\n\tcontaienrs := []Container{}\n\tvar c Container\n\n\tfor rows.Next() {\n\t\terr := rows.Scan(&c.ID, &c.Name, &c.Network, &c.AdbPort, &c.SerialPort, &c.VNCPort, &c.IsServer, &c.State)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tcontaienrs = append(contaienrs, c)\n\t}\n\n\tdefer db.Close()\n\treturn contaienrs, nil\n}", "func NewFilter(filters ...Filter) Filter {\n\tvar filter Filter\n\tfor _, f := range filters {\n\t\tfilter = filter | f\n\t}\n\treturn filter\n}", "func (c *DockerCommand) sortedContainers(containers []*Container) []*Container {\n\tif !c.Config.UserConfig.Gui.LegacySortContainers {\n\t\tstates := map[string]int{\n\t\t\t\"running\": 1,\n\t\t\t\"exited\": 2,\n\t\t\t\"created\": 3,\n\t\t}\n\t\tsort.Slice(containers, func(i, j int) bool {\n\t\t\tstateLeft := states[containers[i].Container.State]\n\t\t\tstateRight := states[containers[j].Container.State]\n\t\t\tif stateLeft == stateRight {\n\t\t\t\treturn containers[i].Name < containers[j].Name\n\t\t\t}\n\t\t\treturn states[containers[i].Container.State] < states[containers[j].Container.State]\n\t\t})\n\t}\n\treturn containers\n}", "func (o *KanbanViewView) SetFilters(v []ViewFilter) {\n\to.Filters = v\n}", "func Filters(values Values) func(*orm.Query) (*orm.Query, error) {\n\treturn NewFilter(values).Filters\n}", "func LoadRunningContainers() []types.Container {\n\tcli, err := client.NewClientWithOpts(client.WithVersion(\"1.38\"))\n\tif err != nil {\n\t\tfmt.Println(\"Cloud not get docker cli. \" + err.Error())\n\t\tos.Exit(4)\n\t}\n\n\tcontainers, err := cli.ContainerList(context.Background(), types.ContainerListOptions{})\n\tif err != nil {\n\t\tfmt.Println(\"Cloud not get all containers. \" + err.Error())\n\t\tos.Exit(5)\n\t}\n\n\treturn containers\n}", "func List(auth api.AuthStruct, all bool) ([]Container, error) {\n\tu, err := api.GetUser(auth)\n\tif err != nil {\n\t\treturn nil, nil\n\t}\n\n\tdContainers, err := docker.ListContainers(all)\n\tif err != nil {\n\t\treturn nil, nil\n\t}\n\n\tcontainers := make([]Container, 0)\nOUTER:\n\tfor _, j := range u.Running {\n\t\tfor _, c := range dContainers {\n\t\t\tif c.Names[0] == \"/\"+j.Title {\n\t\t\t\tnewCont := Container{c, j.User, j.Title}\n\t\t\t\tcontainers = append(containers, newCont)\n\t\t\t\tcontinue OUTER\n\t\t\t}\n\t\t}\n\t\tif !all {\n\t\t\tcontinue\n\t\t}\n\t\t// not found running? Update\n\t\terr := api.ReturnJob(j, api.JobReturnStruct{}, auth)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Host list out of sync with Hub -- failed to correct containers: %v\", err)\n\t\t}\n\t}\n\n\treturn containers, nil\n}", "func (b BladeStorage) GetAllByFilters(offset string, limit string, filters *filter.Filters) (count int, blades []model.Blade, err error) {\n\tq, err := filters.BuildQuery(model.Blade{}, b.db)\n\tif err != nil {\n\t\treturn count, blades, err\n\t}\n\n\tif offset != \"\" && limit != \"\" {\n\t\tif err = q.Limit(limit).Offset(offset).Find(&blades).Error; err != nil {\n\t\t\treturn count, blades, err\n\t\t}\n\t\tq.Model(&model.Blade{}).Count(&count)\n\t} else {\n\t\tif err = q.Find(&blades).Error; err != nil {\n\t\t\treturn count, blades, err\n\t\t}\n\t}\n\n\treturn count, blades, nil\n}", "func TestContainerListStatsWithIdFilter(t *testing.T) {\n\tvar (\n\t\tstats []*runtime.ContainerStats\n\t\terr error\n\t)\n\tt.Logf(\"Create a pod config and run sandbox container\")\n\tsb, sbConfig := PodSandboxConfigWithCleanup(t, \"running-pod\", \"statsls\")\n\n\tpauseImage := images.Get(images.Pause)\n\tEnsureImageExists(t, pauseImage)\n\n\tt.Logf(\"Create a container config and run containers in a pod\")\n\tcontainerConfigMap := make(map[string]*runtime.ContainerConfig)\n\tfor i := 0; i < 3; i++ {\n\t\tcName := fmt.Sprintf(\"container%d\", i)\n\t\tcontainerConfig := ContainerConfig(\n\t\t\tcName,\n\t\t\tpauseImage,\n\t\t\tWithTestLabels(),\n\t\t\tWithTestAnnotations(),\n\t\t)\n\t\tcn, err := runtimeService.CreateContainer(sb, containerConfig, sbConfig)\n\t\tcontainerConfigMap[cn] = containerConfig\n\t\trequire.NoError(t, err)\n\t\tdefer func() {\n\t\t\tassert.NoError(t, runtimeService.RemoveContainer(cn))\n\t\t}()\n\t\trequire.NoError(t, runtimeService.StartContainer(cn))\n\t\tdefer func() {\n\t\t\tassert.NoError(t, runtimeService.StopContainer(cn, 10))\n\t\t}()\n\t}\n\n\tt.Logf(\"Fetch container stats for each container with Filter\")\n\tfor id := range containerConfigMap {\n\t\trequire.NoError(t, Eventually(func() (bool, error) {\n\t\t\tstats, err = runtimeService.ListContainerStats(\n\t\t\t\t&runtime.ContainerStatsFilter{Id: id})\n\t\t\tif err != nil {\n\t\t\t\treturn false, err\n\t\t\t}\n\t\t\tif len(stats) != 1 {\n\t\t\t\treturn false, errors.New(\"unexpected stats length\")\n\t\t\t}\n\t\t\tif stats[0].GetWritableLayer().GetTimestamp() != 0 {\n\t\t\t\treturn true, nil\n\t\t\t}\n\t\t\treturn false, nil\n\t\t}, time.Second, 30*time.Second))\n\n\t\tt.Logf(\"Verify container stats for %s\", id)\n\t\tfor _, s := range stats {\n\t\t\trequire.Equal(t, s.GetAttributes().GetId(), id)\n\t\t\ttestStats(t, s, containerConfigMap[id])\n\t\t}\n\t}\n}", "func (q *Query) ToFilter() string {\n\treturn fmt.Sprintf(`\nresource.type=k8s_container\nAND (\n\tlogName=projects/%s/logs/stderr\n\tOR logName=projects/%s/logs/stdout\n)\nAND resource.labels.cluster_name=%q\nAND resource.labels.namespace_name=%q\nAND labels.%q=%q\n`,\n\t\tq.Project,\n\t\tq.Project,\n\t\tq.Cluster,\n\t\tq.Namespace,\n\t\tStackdriverBuildIDLabel,\n\t\tq.BuildID,\n\t)\n}", "func (o *SystemEventsParams) SetFilters(filters *string) {\n\to.Filters = filters\n}", "func (s *ListSessionMetricsInput) SetFilters(v []*AnalyticsSessionFilter) *ListSessionMetricsInput {\n\ts.Filters = v\n\treturn s\n}", "func TestContainerListStatsWithSandboxIdFilter(t *testing.T) {\n\tvar (\n\t\tstats []*runtime.ContainerStats\n\t\terr error\n\t)\n\tt.Logf(\"Create a pod config and run sandbox container\")\n\tsb, sbConfig := PodSandboxConfigWithCleanup(t, \"running-pod\", \"statsls\")\n\n\tpauseImage := images.Get(images.Pause)\n\tEnsureImageExists(t, pauseImage)\n\n\tt.Logf(\"Create a container config and run containers in a pod\")\n\tcontainerConfigMap := make(map[string]*runtime.ContainerConfig)\n\tfor i := 0; i < 3; i++ {\n\t\tcName := fmt.Sprintf(\"container%d\", i)\n\t\tcontainerConfig := ContainerConfig(\n\t\t\tcName,\n\t\t\tpauseImage,\n\t\t\tWithTestLabels(),\n\t\t\tWithTestAnnotations(),\n\t\t)\n\t\tcn, err := runtimeService.CreateContainer(sb, containerConfig, sbConfig)\n\t\tcontainerConfigMap[cn] = containerConfig\n\t\trequire.NoError(t, err)\n\t\tdefer func() {\n\t\t\tassert.NoError(t, runtimeService.RemoveContainer(cn))\n\t\t}()\n\t\trequire.NoError(t, runtimeService.StartContainer(cn))\n\t\tdefer func() {\n\t\t\tassert.NoError(t, runtimeService.StopContainer(cn, 10))\n\t\t}()\n\t}\n\n\tt.Logf(\"Fetch container stats for each container with Filter\")\n\trequire.NoError(t, Eventually(func() (bool, error) {\n\t\tstats, err = runtimeService.ListContainerStats(\n\t\t\t&runtime.ContainerStatsFilter{PodSandboxId: sb})\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\t\tif len(stats) != 3 {\n\t\t\treturn false, errors.New(\"unexpected stats length\")\n\t\t}\n\n\t\tfor _, containerStats := range stats {\n\t\t\t// Wait for stats on all containers, not just the first one in the list.\n\t\t\tif containerStats.GetWritableLayer().GetTimestamp() == 0 {\n\t\t\t\treturn false, nil\n\t\t\t}\n\t\t}\n\t\treturn true, nil\n\t}, time.Second, 45*time.Second))\n\t// TODO(claudiub): Reduce the timer above to 30 seconds once Windows flakiness has been addressed.\n\tt.Logf(\"Verify container stats for sandbox %q\", sb)\n\tfor _, s := range stats {\n\t\ttestStats(t, s, containerConfigMap[s.GetAttributes().GetId()])\n\t}\n}", "func initFilters() int {\n\trows, err := db.Query(\"SELECT idFILTER, idFI, conditions, tests, isDefault FROM TXFILTER\")\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\t// defer rows.Close()\n\n\ti := 0\n\tvar teststr *string\n\n\tfor rows.Next() {\n\t\tfil := new(TxFilter)\n\t\terr := rows.Scan(&fil.FName, &fil.FIID, &fil.Conditions, &teststr, &fil.IsDef)\n\t\tif err != nil {\n\t\t\trows.Close()\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\ttststr := strings.Split(*teststr, \",\") // parse categories\n\t\tfil.CustTests = make([]string, 0)\n\t\tfil.AcctTests = make([]string, 0)\n\n\t\tfor _, test := range tststr {\n\t\t\tif txTestCache[test].CustOrAcct == \"c\" {\n\t\t\t\tfil.CustTests = append(fil.CustTests, strings.TrimSpace(test))\n\t\t\t} else if txTestCache[test].CustOrAcct == \"a\" {\n\t\t\t\tfil.AcctTests = append(fil.AcctTests, strings.TrimSpace(test))\n\t\t\t} else {\n\t\t\t\tpanic(\"Error Parsing Filter on tests: \" + txTestCache[test].CustOrAcct + test)\n\t\t\t}\n\t\t}\n\n\t\ttxFilterCache[fil.FName] = fil\n\t\tif fil.IsDef == 1 {\n\t\t\ttxDefFilters = append(txDefFilters, fil.FName)\n\t\t}\n\t\ti++\n\t}\n\n\trows.Close()\n\t// build global default filter\n\ttxDefFilterGrp = *new(TxFilterGrp)\n\n\ttxDefFilterGrp.CustTestGrp.Tests = make(map[string]int)\n\ttxDefFilterGrp.CustTestGrp.GrpParamIdx = make(map[string]int)\n\ttxDefFilterGrp.CustTestGrp.TestParamValue = make(map[string][]interface{})\n\ttxDefFilterGrp.CustTestGrp.SQLPeriodIdx = make(map[string]*PeriodIdx)\n\n\ttxDefFilterGrp.AcctTestGrp.Tests = make(map[string]int)\n\ttxDefFilterGrp.AcctTestGrp.GrpParamIdx = make(map[string]int)\n\ttxDefFilterGrp.AcctTestGrp.TestParamValue = make(map[string][]interface{})\n\ttxDefFilterGrp.AcctTestGrp.SQLPeriodIdx = make(map[string]*PeriodIdx)\n\n\tfor _, filstr := range txDefFilters {\n\t\tif len(txDefFilterGrp.Filters) == 0 {\n\t\t\ttxDefFilterGrp.Filters += txFilterCache[filstr].FName\n\t\t} else {\n\t\t\ttxDefFilterGrp.Filters += \",\" + txFilterCache[filstr].FName\n\t\t}\n\t\tif len(txDefFilterGrp.ActiveFilters) == 0 {\n\t\t\ttxDefFilterGrp.ActiveFilters += txFilterCache[filstr].FName\n\t\t} else {\n\t\t\ttxDefFilterGrp.ActiveFilters += \",\" + txFilterCache[filstr].FName\n\t\t}\n\n\t\tbuildTestGrp(&txDefFilterGrp.CustTestGrp, txFilterCache[filstr].CustTests)\n\t\tbuildTestGrp(&txDefFilterGrp.AcctTestGrp, txFilterCache[filstr].AcctTests)\n\n\t}\n\n\tfmt.Printf(\"\\nDefault Filters:%+v\", txDefFilters)\n\tfmt.Printf(\"\\nDefault Filter group:%+v\", txDefFilterGrp)\n\n\t//\treturn custs, err\n\treturn i\n}", "func getContainers(dockerClient *client.Client) ([]types.Container, error) {\n\n\tcontainers, err := dockerClient.ContainerList(context.Background(), types.ContainerListOptions{})\n\tif err != nil {\n\t\tlog.Printf(\"Unable to list containers: %v\", err)\n\t\treturn nil, err\n\t}\n\n\treturn containers, nil\n}", "func (qb QueryBuilder) composeFilter() string {\n\tfilterBuilder := qb.getFilterBuilder().\n\t\tWithMetricType(qb.metricName).\n\t\tWithProject(qb.translator.config.Project).\n\t\tWithCluster(qb.translator.config.Cluster)\n\n\tresourceNames := qb.getResourceNames()\n\tif qb.translator.useNewResourceModel {\n\t\t// new resource model specific filters\n\t\tfilterBuilder = filterBuilder.WithLocation(qb.translator.config.Location)\n\t\tif !qb.nodes.isNodeValuesEmpty() {\n\t\t\t// node metrics\n\t\t\treturn filterBuilder.WithNodes(resourceNames).Build()\n\t\t}\n\t\t// pod metrics\n\t\treturn filterBuilder.\n\t\t\tWithNamespace(qb.namespace).\n\t\t\tWithPods(resourceNames).\n\t\t\tBuild()\n\n\t}\n\t// legacy resource model specific filters\n\treturn filterBuilder.\n\t\tWithContainer().\n\t\tWithPods(resourceNames).\n\t\tBuild()\n}", "func Filter(result []Expression, input []Expression, filter func(Expression) bool) []Expression {\n\ttrace_util_0.Count(_util_00000, 0)\n\tfor _, e := range input {\n\t\ttrace_util_0.Count(_util_00000, 2)\n\t\tif filter(e) {\n\t\t\ttrace_util_0.Count(_util_00000, 3)\n\t\t\tresult = append(result, e)\n\t\t}\n\t}\n\ttrace_util_0.Count(_util_00000, 1)\n\treturn result\n}", "func findContainers(managedResource *hclConfigs.Resource, jsonBody jsonObj, hclBody *hclsyntax.Body) (containers []output.ContainerDetails, initContainers []output.ContainerDetails) {\n\tif isKuberneteResource(managedResource) {\n\t\tcontainers, initContainers = extractContainerImagesFromk8sResources(managedResource, hclBody)\n\t} else if isAzureConatinerResource(managedResource) {\n\t\tcontainers = fetchContainersFromAzureResource(jsonBody)\n\t} else if isAwsConatinerResource(managedResource) {\n\t\tcontainers = fetchContainersFromAwsResource(jsonBody, hclBody, managedResource.DeclRange.Filename)\n\t}\n\treturn\n}", "func (c *CommandFilters) RunFilters(args kvserverbase.FilterArgs) *roachpb.Error {\n\tc.RLock()\n\tdefer c.RUnlock()\n\n\tif c.replayProtection != nil {\n\t\treturn c.replayProtection(args)\n\t}\n\treturn c.runFiltersInternal(args)\n}", "func GetStatefulSetContainers(item interface{}) []corev1.Container {\n\treturn item.(appsv1.StatefulSet).Spec.Template.Spec.Containers\n}", "func (ec *client) FilterLogs(ctx context.Context, q ethereum.FilterQuery) ([]types.Log, error) {\n\terr := ec.rateLimiter.Wait(ctx)\n\tif err != nil {\n\t\tatomic.AddInt64(&ec.rateLimitDroppedRequests, 1)\n\t\t// Context cancelled or deadline exceeded\n\t\treturn nil, err\n\t}\n\n\tctx, cancel := context.WithTimeout(ctx, ec.requestTimeout)\n\tdefer cancel()\n\tlogs, err := ec.client.FilterLogs(ctx, q)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn logs, nil\n}", "func (r ApiGetHyperflexStorageContainerListRequest) Filter(filter string) ApiGetHyperflexStorageContainerListRequest {\n\tr.filter = &filter\n\treturn r\n}", "func (client *CraneDockerClient) FilterServiceByStack(namespace string, opts types.ServiceListOptions) ([]swarm.Service, error) {\n\tif opts.Filter.Len() == 0 {\n\t\topts.Filter = filters.NewArgs()\n\t}\n\topts.Filter.Add(\"label\", LabelNamespace)\n\tservices, err := client.ListServiceSpec(opts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar stackServices []swarm.Service\n\tfor _, service := range services {\n\t\tlabels := service.Spec.Labels\n\t\tname, ok := labels[LabelNamespace]\n\t\tif !ok {\n\t\t\tlog.Warnf(\"Cannot get label %s for service %s\", LabelNamespace, service.ID)\n\t\t\tcontinue\n\t\t}\n\n\t\tif name != namespace {\n\t\t\tcontinue\n\t\t}\n\n\t\tstackServices = append(stackServices, service)\n\t}\n\n\treturn stackServices, nil\n}", "func (f kubevalFilter) Filter(in []*yaml.RNode) ([]*yaml.RNode, error) {\n\tcfg, err := f.parseConfig()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tkubevalConfig := kubeval.NewDefaultConfig()\n\tkubevalConfig.Strict = cfg.Spec.Strict\n\tkubevalConfig.IgnoreMissingSchemas = cfg.Spec.IgnoreMissingSchemas\n\tkubevalConfig.KubernetesVersion = cfg.Spec.KubernetesVersion\n\tkubevalConfig.AdditionalSchemaLocations = []string{fileScheme + \"://\" + schemaLocationDir}\n\tkubevalConfig.KindsToSkip = []string{crdKind, kubevalOptsKind}\n\tvar crdList []string\n\n\tif _, plan := os.LookupEnv(planEnv); plan {\n\t\t// Setup plan specific options\n\t\tif _, exists := cfg.PlanConfigs[cfg.PlanName]; exists {\n\t\t\tkubevalConfig.KindsToSkip = append(kubevalConfig.KindsToSkip, cfg.PlanConfigs[cfg.PlanName].KindsToSkip...)\n\t\t\tcrdList = cfg.PlanConfigs[cfg.PlanName].CRDList\n\t\t}\n\t} else {\n\t\t// Setup phase specific options\n\t\tif _, exists := cfg.PhaseConfigs[cfg.PhaseName]; exists {\n\t\t\tkubevalConfig.KindsToSkip = append(kubevalConfig.KindsToSkip, cfg.PhaseConfigs[cfg.PhaseName].KindsToSkip...)\n\t\t\tcrdList = cfg.PhaseConfigs[cfg.PhaseName].CRDList\n\t\t}\n\t}\n\n\t// Calculate schema location directory for kubeval and openapi2jsonschema based on options\n\tschemasLocation := filepath.Join(schemaLocationDir,\n\t\tfmt.Sprintf(\"v%s-%s\", kubevalConfig.KubernetesVersion, \"standalone\"))\n\tif kubevalConfig.Strict {\n\t\tschemasLocation += \"-strict\"\n\t}\n\t// Create it if doesn't exist\n\tif _, err := os.Stat(schemasLocation); os.IsNotExist(err) {\n\t\tif err = os.MkdirAll(schemasLocation, 0755); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t// Filter CRDs from input\n\tcrdRNodes, err := filterCRD(in)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(crdRNodes) > 0 {\n\t\t// Save filtered CRDs in file to future processing\n\t\trenderedCRDFile := filepath.Join(schemaLocationDir, phaseRenderedFile)\n\t\tbuf := bytes.Buffer{}\n\t\tfor _, rNode := range crdRNodes {\n\t\t\tbuf.Write([]byte(\"---\\n\" + rNode.MustString()))\n\t\t}\n\t\tif err = ioutil.WriteFile(renderedCRDFile, buf.Bytes(), 0600); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\t// Prepend rendered CRD to give them priority for processing\n\t\tcrdList = append([]string{renderedCRDFile}, crdList...)\n\t}\n\n\tif len(crdList) > 0 {\n\t\t// Process each additional CRD in the list (CRD -> OpenAPIV3 Schema -> Json Schema)\n\t\tif err := processCRDList(crdList, schemasLocation); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t// Validate each Resource\n\tfor _, r := range in {\n\t\tmeta, err := r.GetMeta()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tif err := validate(r.MustString(), kubevalConfig); err != nil {\n\t\t\t// if there's an issue found with document - it will be printed as well\n\t\t\tprintMsg(\"Resource invalid: (Kind: %s, Name: %s)\\n---\\n%s---\\n\", meta.Kind, meta.Name, r.MustString())\n\t\t\treturn nil, err\n\t\t}\n\t\t// inform document is ok\n\t\tprintMsg(\"Resource valid: (Kind: %s, Name: %s)\\n\", meta.Kind, meta.Name)\n\t}\n\n\t// if prevent cleanup variable is not set then cleanup working directory\n\tif _, cleanup := os.LookupEnv(cleanupEnv); !cleanup {\n\t\tif err := os.RemoveAll(schemaLocationDir); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\t// Don't return output list, we satisfied with exit code and stdout/stderr\n\treturn nil, nil\n}", "func (h *httpCloud) Filter(pod *api.Pod, nodes *api.NodeList) (*api.NodeList, error) {\n\tvar resp api.NodeList\n\n\targs := &FilterArgs{\n\t\tPod: *pod,\n\t\tNodes: *nodes,\n\t}\n\n\tif out, err := json.Marshal(args); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tif err := h.post(h.schedulerExtensionURL+path.Join(SchedulerExtensionPath, SchedulerExtensionFilter), bytes.NewReader(out), &resp); err != nil {\n\t\t\treturn nil, err\n\t\t} else {\n\t\t\treturn &resp, nil\n\t\t}\n\t}\n}", "func (p *containerProvider) GetContainers(cacheValidity time.Duration, previousContainers map[string]*ContainerRateMetrics) ([]*model.Container, map[string]*ContainerRateMetrics, map[int]string, error) {\n\tcontainersMetadata := p.metadataStore.ListContainersWithFilter(workloadmeta.GetRunningContainers)\n\n\thostCPUCount := float64(system.HostCPUCount())\n\tprocessContainers := make([]*model.Container, 0)\n\trateStats := make(map[string]*ContainerRateMetrics)\n\tpidToCid := make(map[int]string)\n\tfor _, container := range containersMetadata {\n\t\tvar annotations map[string]string\n\t\tif pod, err := p.metadataStore.GetKubernetesPodForContainer(container.ID); err == nil {\n\t\t\tannotations = pod.Annotations\n\t\t}\n\n\t\tif p.filter != nil && p.filter.IsExcluded(annotations, container.Name, container.Image.Name, container.Labels[kubernetes.CriContainerNamespaceLabel]) {\n\t\t\tcontinue\n\t\t}\n\n\t\tif container.Runtime == workloadmeta.ContainerRuntimeGarden && len(container.CollectorTags) == 0 {\n\t\t\tlog.Debugf(\"No tags found for garden container: %s, skipping\", container.ID)\n\t\t\tcontinue\n\t\t}\n\n\t\tentityID := containers.BuildTaggerEntityName(container.ID)\n\t\ttags, err := tagger.Tag(entityID, collectors.HighCardinality)\n\t\tif err != nil {\n\t\t\tlog.Debugf(\"Could not collect tags for container %q, err: %v\", container.ID[:12], err)\n\t\t}\n\t\ttags = append(tags, container.CollectorTags...)\n\n\t\toutPreviousStats := NullContainerRates\n\t\t// Name and Image fields exist but are never filled\n\t\tprocessContainer := &model.Container{\n\t\t\tType: convertContainerRuntime(container.Runtime),\n\t\t\tId: container.ID,\n\t\t\tStarted: container.State.StartedAt.Unix(),\n\t\t\tCreated: container.State.CreatedAt.Unix(),\n\t\t\tTags: tags,\n\t\t\tState: convertContainerStatus(container.State.Status),\n\t\t\tHealth: convertHealthStatus(container.State.Health),\n\t\t\tAddresses: computeContainerAddrs(container),\n\t\t}\n\t\t// Always adding container if we have metadata as we do want to report containers without stats\n\t\tprocessContainers = append(processContainers, processContainer)\n\n\t\t// Gathering container & network statistics\n\t\tpreviousContainerRates := previousContainers[container.ID]\n\t\tif previousContainerRates == nil {\n\t\t\tpreviousContainerRates = &NullContainerRates\n\t\t}\n\n\t\tcollector := p.metricsProvider.GetCollector(string(container.Runtime))\n\t\tif collector == nil {\n\t\t\tlog.Infof(\"No metrics collector available for runtime: %s, skipping container: %s\", container.Runtime, container.ID)\n\t\t\tcontinue\n\t\t}\n\n\t\tcontainerStats, err := collector.GetContainerStats(container.Namespace, container.ID, cacheValidity)\n\t\tif err != nil || containerStats == nil {\n\t\t\tlog.Debugf(\"Container stats for: %+v not available through collector %q, err: %v\", container, collector.ID(), err)\n\t\t\t// If main container stats are missing, we skip the container\n\t\t\tcontinue\n\t\t}\n\t\tcomputeContainerStats(hostCPUCount, containerStats, previousContainerRates, &outPreviousStats, processContainer)\n\n\t\t// Building PID to CID mapping for NPM\n\t\tif containerStats.PID != nil {\n\t\t\tfor _, pid := range containerStats.PID.PIDs {\n\t\t\t\tpidToCid[pid] = container.ID\n\t\t\t}\n\t\t}\n\n\t\tcontainerNetworkStats, err := collector.GetContainerNetworkStats(container.Namespace, container.ID, cacheValidity)\n\t\tif err != nil {\n\t\t\tlog.Debugf(\"Container network stats for: %+v not available through collector %q, err: %v\", container, collector.ID(), err)\n\t\t}\n\t\tcomputeContainerNetworkStats(containerNetworkStats, previousContainerRates, &outPreviousStats, processContainer)\n\n\t\t// Storing previous stats\n\t\trateStats[processContainer.Id] = &outPreviousStats\n\t}\n\n\treturn processContainers, rateStats, pidToCid, nil\n}" ]
[ "0.6550355", "0.6287682", "0.61121625", "0.6049082", "0.58675325", "0.5766531", "0.54751503", "0.54121846", "0.5361544", "0.5295205", "0.52660453", "0.5237646", "0.51495063", "0.5098193", "0.5064344", "0.50582963", "0.50199795", "0.49737746", "0.4964169", "0.49547428", "0.49369243", "0.49180114", "0.48911047", "0.48512", "0.48501045", "0.48440927", "0.48384362", "0.48170447", "0.48158506", "0.48086914", "0.47941378", "0.47347626", "0.47084075", "0.4703052", "0.46845594", "0.4646686", "0.4638633", "0.46335846", "0.4614507", "0.45986935", "0.45900285", "0.45870268", "0.457969", "0.4570566", "0.45641333", "0.4550078", "0.4544043", "0.45219043", "0.45203957", "0.45140767", "0.4513533", "0.45084333", "0.45072186", "0.45034528", "0.44990376", "0.44968045", "0.44863048", "0.44685057", "0.44676298", "0.44634652", "0.44490156", "0.44246298", "0.4424569", "0.44188952", "0.44145033", "0.44131413", "0.4409818", "0.4409465", "0.44093496", "0.440807", "0.4396674", "0.43963927", "0.43962806", "0.43896818", "0.43882266", "0.4387447", "0.4384967", "0.4382439", "0.4381509", "0.43800288", "0.437826", "0.43778777", "0.4377266", "0.43763873", "0.43719867", "0.43699685", "0.4362353", "0.43594974", "0.4354367", "0.4354078", "0.4347819", "0.43453556", "0.43395618", "0.433837", "0.43326694", "0.43248394", "0.4323562", "0.4313135", "0.43130338", "0.43078837" ]
0.7422558
0
Validate validates this order type
func (m OrderType) Validate(formats strfmt.Registry) error { var res []error // value enum if err := m.validateOrderTypeEnum("", "body", m); err != nil { return err } if len(res) > 0 { return errors.CompositeValidationError(res...) } return nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (m OrdersType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateOrdersTypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m *Order) Validate() error {\n\treturn m.validate(false)\n}", "func (m *Order) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func OrderTypeValid(fl validator.FieldLevel) bool {\n\tif fl.Field().IsZero() {\n\t\treturn true\n\t}\n\n\torderTypes := []string{\n\t\t\"asc\", \"desc\",\n\t}\n\treturn helper.IsContain(fl.Field().String(), orderTypes, true)\n}", "func (p *Order) Validate(act coract.Action) (err error) {\n\n\tswitch act {\n\tcase coract.Save:\n\n\t\t// if len(p.Name) > 255 {\n\t\t// \terr = limberr.AddInvalidParam(err, \"name\",\n\t\t// \t\tcorerr.MaximumAcceptedCharacterForVisV,\n\t\t// \t\tdict.R(corterm.Name), 255)\n\t\t// }\n\n\t\t// if p.Price == 0 {\n\t\t// \terr = limberr.AddInvalidParam(err, \"price\",\n\t\t// \t\tcorerr.VisRequired, dict.R(\"price\"))\n\t\t// }\n\n\t\tif len(p.Description) > 255 {\n\t\t\terr = limberr.AddInvalidParam(err, \"description\",\n\t\t\t\tcorerr.MaximumAcceptedCharacterForVisV,\n\t\t\t\tdict.R(corterm.Description), 255)\n\t\t}\n\t}\n\n\treturn err\n}", "func (o *OrderItem) Validate(tx *pop.Connection) (*validate.Errors, error) {\n\treturn validate.NewErrors(), nil\n}", "func (m *ModifyOrder) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "func (o Order) Valid() error {\n\t_, ok := orderOptions[o]\n\tif !ok {\n\t\tlog.Println(\"error while validating query param: order\")\n\t\tlog.Printf(\"value: %s\", string(o))\n\t\treturn errors.New(\"invalid query param: order\")\n\t}\n\treturn nil\n}", "func (m OrderLineItemDiscountType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateOrderLineItemDiscountTypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m *OrderEntry) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "func (m EveroutePackageOrderByInput) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateEveroutePackageOrderByInputEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (order *Order) Valid() bool {\n\tif order.ID == 0 {\n\t\treturn false\n\t}\n\tswitch order.EventType {\n\tcase CommandType_NewOrder:\n\t\t{\n\t\t\tif order.Stop != StopLoss_None {\n\t\t\t\tif order.StopPrice == 0 {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t}\n\t\t\tswitch order.Type {\n\t\t\tcase OrderType_Limit:\n\t\t\t\treturn order.Price != 0 && order.Amount != 0\n\t\t\tcase OrderType_Market:\n\t\t\t\treturn order.Funds != 0 && order.Amount != 0\n\t\t\t}\n\t\t}\n\tcase CommandType_CancelOrder:\n\t\t{\n\t\t\tif order.Stop != StopLoss_None {\n\t\t\t\tif order.StopPrice == 0 {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t}\n\t\t\tif order.Type == OrderType_Limit {\n\t\t\t\treturn order.Price != 0\n\t\t\t}\n\t\t}\n\t}\n\treturn true\n}", "func (m *OrderTaxesBase) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateLineItemType(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (t Type) Validate() error {\n\tswitch t {\n\tcase git:\n\t\treturn nil\n\tcase nop:\n\t\treturn nil\n\tdefault:\n\t\treturn ErrInvalidType\n\t}\n}", "func (v ExemptionType) Validate() error {\n\tif !(v == \"dynamic\" || v == \"greater_or_equal\" || v == \"less_or_equal\") {\n\t\treturn fmt.Errorf(\"api: invalid ExemptionType value: %q\", v)\n\t}\n\treturn nil\n}", "func (m CustomerSortField) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateCustomerSortFieldEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (fm *FieldModelOrder) Verify() bool { return fm.VerifyType(true) }", "func (o *CancelOrderBody) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := o.validateBaseReq(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := o.validateOrderID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m ZoneOrderByInput) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateZoneOrderByInputEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m DeployOrderByInput) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateDeployOrderByInputEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m OrdersType) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\treturn nil\n}", "func (m *MarketIfTouchedOrderRequest) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateClientExtensions(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validatePositionFill(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateStopLossOnFill(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTakeProfitOnFill(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTimeInForce(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTradeClientExtensions(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTrailingStopLossOnFill(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTriggerCondition(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateType(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (o *GetV1LoansParams) validateOrder(formats strfmt.Registry) error {\n\n\tif err := validate.Enum(\"order\", \"query\", *o.Order, []interface{}{\"amount\", \"end_at\", \"score\"}); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (cro CreateOrderRequest) Validate() (int, *Error) {\n\tif (cro.Origin == routes.Location{}) ||\n\t\t(cro.Destination == routes.Location{}) {\n\t\treturn ErrBadRequestParametersMissing(\"origin and destination are mandatory\")\n\t}\n\n\tif !cro.Origin.IsValid() || !cro.Destination.IsValid() {\n\t\treturn ErrBadRequestInvalidBody(\"Origin or destination not in proper format\")\n\t}\n\treturn 0, nil\n}", "func (p PaymentType) Validate() bool {\n\tswitch p {\n\tcase CashPaymentType:\n\t\treturn true\n\tcase CheckPaymentType:\n\t\treturn true\n\tcase CreditCardPaymentType:\n\t\treturn true\n\tcase DebitCardPaymentType:\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m OrganizationOrderByInput) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateOrganizationOrderByInputEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m GlobalSettingsOrderByInput) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateGlobalSettingsOrderByInputEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (_WyvernExchange *WyvernExchangeCaller) ValidateOrder(opts *bind.CallOpts, addrs [7]common.Address, uints [9]*big.Int, feeMethod uint8, side uint8, saleKind uint8, howToCall uint8, calldata []byte, replacementPattern []byte, staticExtradata []byte, v uint8, r [32]byte, s [32]byte) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _WyvernExchange.contract.Call(opts, out, \"validateOrder_\", addrs, uints, feeMethod, side, saleKind, howToCall, calldata, replacementPattern, staticExtradata, v, r, s)\n\treturn *ret0, err\n}", "func (m IsolationPolicyOrderByInput) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateIsolationPolicyOrderByInputEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m VMEntityFilterResultOrderByInput) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateVMEntityFilterResultOrderByInputEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m Type) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "func (m *DynamicOrderState) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (vt VolumeType) Validate() error {\n\tswitch string(vt) {\n\tcase \"local\", \"instance\", \"\":\n\t\treturn nil\n\tdefault:\n\t\treturn maskAny(errgo.WithCausef(nil, ValidationError, \"invalid volume type '%s'\", string(vt)))\n\t}\n}", "func (m *SalesDataOrderExtensionInterface) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateAppliedTaxes(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateCompanyOrderAttributes(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateGiftCards(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateGiftMessage(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateItemAppliedTaxes(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateShippingAssignments(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m APIStepType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateAPIStepTypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m *AgreeFinishOrderRequest) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for AccessToken\n\n\t// no validation rules for AgreeementToken\n\n\t// no validation rules for OrderId\n\n\treturn nil\n}", "func (v CurveType) Validate() error {\n\tif !(v == \"edwards25519\" || v == \"secp256k1\" || v == \"secp256r1\" || v == \"tweedle\") {\n\t\treturn fmt.Errorf(\"api: invalid CurveType value: %q\", v)\n\t}\n\treturn nil\n}", "func (_WyvernExchange *WyvernExchangeSession) ValidateOrder(addrs [7]common.Address, uints [9]*big.Int, feeMethod uint8, side uint8, saleKind uint8, howToCall uint8, calldata []byte, replacementPattern []byte, staticExtradata []byte, v uint8, r [32]byte, s [32]byte) (bool, error) {\n\treturn _WyvernExchange.Contract.ValidateOrder(&_WyvernExchange.CallOpts, addrs, uints, feeMethod, side, saleKind, howToCall, calldata, replacementPattern, staticExtradata, v, r, s)\n}", "func (m *BreakType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateBreakName(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateExpectedDuration(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateIsPaid(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateLocationID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m *Type1) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m *RetrieveOrderRequest) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for AccessToken\n\n\t// no validation rules for OrderId\n\n\treturn nil\n}", "func (m *RemunerationType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateChanges(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateCode(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateNameNO(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateRemunerationType(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m OrderFillReason) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateOrderFillReasonEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (_WyvernExchange *WyvernExchangeCallerSession) ValidateOrder(addrs [7]common.Address, uints [9]*big.Int, feeMethod uint8, side uint8, saleKind uint8, howToCall uint8, calldata []byte, replacementPattern []byte, staticExtradata []byte, v uint8, r [32]byte, s [32]byte) (bool, error) {\n\treturn _WyvernExchange.Contract.ValidateOrder(&_WyvernExchange.CallOpts, addrs, uints, feeMethod, side, saleKind, howToCall, calldata, replacementPattern, staticExtradata, v, r, s)\n}", "func (t *UseCase_UseCase) Validate(opts ...ygot.ValidationOption) error {\n\tif err := ytypes.Validate(SchemaTree[\"UseCase_UseCase\"], t, opts...); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (o *OrderItem) ValidateCreate(tx *pop.Connection) (*validate.Errors, error) {\n\treturn validate.NewErrors(), nil\n}", "func (mt *EasypostCarrierTypes) Validate() (err error) {\n\tif mt.Type == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"type\"))\n\t}\n\tif mt.Object == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"object\"))\n\t}\n\tif mt.Fields == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"fields\"))\n\t}\n\n\tif ok := goa.ValidatePattern(`^CarrierType$`, mt.Object); !ok {\n\t\terr = goa.MergeErrors(err, goa.InvalidPatternError(`response.object`, mt.Object, `^CarrierType$`))\n\t}\n\treturn\n}", "func (m FilledQuantity) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "func (m CatalogCustomAttributeDefinitionType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateCatalogCustomAttributeDefinitionTypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m CustomerAccountType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateCustomerAccountTypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (h *HazardType) Validate(tx *pop.Connection) (*validate.Errors, error) {\n\terrors := validate.Validate(\n\t\t&validators.StringIsPresent{Name: \"Label\", Field: h.Label, Message: \"A label is required.\"},\n\t\t&validators.StringIsPresent{Name: \"Description\", Field: h.Description, Message: \"Please provide a brief description.\"},\n\t)\n\n\treturn errors, nil\n}", "func ValidateType(value Value, required ...Type) error {\n\tvar valid bool\n\ttid := value.Type().ID()\n\n\tfor _, t := range required {\n\t\tif tid == t.ID() {\n\t\t\tvalid = true\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif !valid {\n\t\treturn TypeError(value.Type(), required...)\n\t}\n\n\treturn nil\n}", "func (m ModelErrorDatumType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateModelErrorDatumTypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m VMVolumeOrderByInput) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateVMVolumeOrderByInputEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (sm *SpaceManager) Validate(ctx context.Context, vType storage.ValidationType, value interface{}) bool {\n\tstr, ok := value.(string)\n\tif !ok {\n\t\treturn false\n\t}\n\tswitch vType {\n\tcase storage.ValidationTypeSpaceName, storage.ValidationTypeChartName:\n\t\treturn validateName(str)\n\tcase storage.ValidationTypeVersionNumber:\n\t\treturn validateVersion(str)\n\t}\n\treturn false\n}", "func (r *Terminates) Validate() error {\n\n\tR := *r\n\tif len(R) > 0 {\n\t\treturn errors.New(\"Terminates type may not contain anything\")\n\t}\n\treturn nil\n}", "func (t *UseCase_UseCase_UseCase) Validate(opts ...ygot.ValidationOption) error {\n\tif err := ytypes.Validate(SchemaTree[\"UseCase_UseCase_UseCase\"], t, opts...); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (m VipType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateVipTypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m BandSelectionType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateBandSelectionTypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m *MeasurementType) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "func (m LocationType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateLocationTypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (t *dataType) Valid(val interface{}) error {\n\t// doing this here because this error should come from Valid instead of Format\n\t// which is easier for testing\n\tif t.cost != nil && *t.cost > bcrypt.MaxCost {\n\t\treturn bcrypt.InvalidCostError(*t.cost)\n\t}\n\n\t// convert to string and use the string datatype to validate any validators that hae been added\n\ts := val.(string)\n\treturn t.str.Valid(s)\n}", "func (_WyvernExchange *WyvernExchangeCaller) ValidateOrderParameters(opts *bind.CallOpts, addrs [7]common.Address, uints [9]*big.Int, feeMethod uint8, side uint8, saleKind uint8, howToCall uint8, calldata []byte, replacementPattern []byte, staticExtradata []byte) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _WyvernExchange.contract.Call(opts, out, \"validateOrderParameters_\", addrs, uints, feeMethod, side, saleKind, howToCall, calldata, replacementPattern, staticExtradata)\n\treturn *ret0, err\n}", "func (m ConsistentType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateConsistentTypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func assertOrderValid(t *testing.T, actual *Order, expected *Order) {\n\tassert.Equal(t, actual.Location.Lon, expected.Location.Lon)\n\tassert.Equal(t, actual.Location.Lat, expected.Location.Lat)\n\tassert.NotEmpty(t, expected.Id)\n\tassert.Equal(t, actual.Desc, expected.Desc)\n\tassert.NotEmpty(t, expected.TimeRequested)\n\tassert.Equal(t, actual.ConsumerId, expected.ConsumerId)\n\tassert.Equal(t, actual.BidPrice, expected.BidPrice)\n}", "func (o *GetPostListParams) validateOrder(formats strfmt.Registry) error {\n\n\tif err := validate.EnumCase(\"order\", \"query\", *o.Order, []interface{}{\"asc\", \"desc\"}, true); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (m ChannelType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateChannelTypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m *Transaction) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateCONTAINER(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateAmount(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateBaseType(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateCategorySource(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateCategoryType(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateCommission(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateDescription(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateInterest(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateMerchant(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validatePrice(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validatePrincipal(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateRunningBalance(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateSourceType(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateStatus(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateSubType(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m TapiEthEtyPhyType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateTapiEthEtyPhyTypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (self *NumberTypeDef) Validate() error {\n\tif self.Type == \"\" {\n\t\treturn fmt.Errorf(\"NumberTypeDef.type is missing but is a required field\")\n\t} else {\n\t\tval := Validate(RdlSchema(), \"TypeRef\", self.Type)\n\t\tif !val.Valid {\n\t\t\treturn fmt.Errorf(\"NumberTypeDef.type does not contain a valid TypeRef (%v)\", val.Error)\n\t\t}\n\t}\n\tif self.Name == \"\" {\n\t\treturn fmt.Errorf(\"NumberTypeDef.name is missing but is a required field\")\n\t} else {\n\t\tval := Validate(RdlSchema(), \"TypeName\", self.Name)\n\t\tif !val.Valid {\n\t\t\treturn fmt.Errorf(\"NumberTypeDef.name does not contain a valid TypeName (%v)\", val.Error)\n\t\t}\n\t}\n\tif self.Comment != \"\" {\n\t\tval := Validate(RdlSchema(), \"String\", self.Comment)\n\t\tif !val.Valid {\n\t\t\treturn fmt.Errorf(\"NumberTypeDef.comment does not contain a valid String (%v)\", val.Error)\n\t\t}\n\t}\n\treturn nil\n}", "func (p paymentJson) Validate() error {\n\tif p.AccountId == \"\" {\n\t\treturn errors.New(\"missing customer id\")\n\t}\n\tif p.Amount == 0 {\n\t\treturn errors.New(\"missing amount\")\n\t}\n\treturn nil\n}", "func (m ClusterSettingsOrderByInput) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateClusterSettingsOrderByInputEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m *OrderPaymentInstrument) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateAuthorizationStatus(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateBankRoutingNumber(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validatePaymentBankAccount(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validatePaymentCard(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validatePaymentMethodID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (s OptionBlockObject) validateType() MessageObjectType {\n\treturn motOption\n}", "func (m Resolution1) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateResolution1Enum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m *EngineType) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "func (m OrderLineItemTaxScope) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateOrderLineItemTaxScopeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m DiskType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateDiskTypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func validatePayment(order *model.Order) bool {\n\tvar total int\n\n\t// Calculate the order total.\n\tfor _, ol := range order.Lines {\n\t\ttotal += ol.Price * ol.Quantity\n\t}\n\t// If this is a free order, it's OK if there is no payment.\n\tif total == 0 && len(order.Payments) == 0 {\n\t\treturn true\n\t}\n\t// Otherwise, there should be exactly one payment.\n\tif len(order.Payments) != 1 {\n\t\treturn false\n\t}\n\t// And it should have the correct amount.\n\tvar pmt = order.Payments[0]\n\tif pmt.Amount != total {\n\t\treturn false\n\t}\n\t// If this is a free order and has a payment, its type must be \"cash\".\n\t// We remove it; no point in storing a zero payment.\n\tif pmt.Amount == 0 {\n\t\tif pmt.Type != model.PaymentCash {\n\t\t\treturn false\n\t\t}\n\t\torder.Payments = order.Payments[:0]\n\t\treturn true\n\t}\n\tpmt.Created = order.Created\n\treturn true\n}", "func (v SignatureType) Validate() error {\n\tif !(v == \"ecdsa\" || v == \"ecdsa_recovery\" || v == \"ed25519\" || v == \"schnorr_1\" || v == \"schnorr_poseidon\") {\n\t\treturn fmt.Errorf(\"api: invalid SignatureType value: %q\", v)\n\t}\n\treturn nil\n}", "func (cha *ChainAttributes) Validate() error {\n\tif cha.Type == \"\" {\n\t\treturn fmt.Errorf(\"base chain must have type set\")\n\t}\n\t// TODO Add additional attributes validation\n\n\treturn nil\n}", "func (t *Tax) Validate(tx *pop.Connection) (*validate.Errors, error) {\n\treturn validate.Validate(\n\t\t&validators.StringIsPresent{Field: t.Name, Name: \"Name\"},\n\t\t&validators.StringIsPresent{Field: t.TaxCode, Name: \"TaxCode\"},\n\t), nil\n}", "func (r *Sub1099A) Validate() error {\n\treturn utils.Validate(r, config.Sub1099ALayout, config.Sub1099AType)\n}", "func validateOrderDetails(tx db.Tx, order *model.Order, privs model.Privilege) bool {\n\n\torder.Created = time.Now()\n\n\t// Office notes are allowed only by office staff.\n\tif order.ONote != \"\" && privs&model.PrivManageOrders == 0 {\n\t\treturn false\n\t}\n\n\t// Remove any lines with zero quantity. Make sure there's at least one\n\t// line left.\n\tvar j = 0\n\tfor i := range order.Lines {\n\t\tif order.Lines[i].Quantity < 0 {\n\t\t\treturn false\n\t\t}\n\t\tif order.Lines[i].Quantity != 0 {\n\t\t\torder.Lines[j] = order.Lines[i]\n\t\t\tj++\n\t\t}\n\t}\n\torder.Lines = order.Lines[:j]\n\tif len(order.Lines) == 0 {\n\t\treturn false\n\t}\n\n\t// Check the validity of each order line.\n\tfor _, line := range order.Lines {\n\n\t\t// Additional constraints by product type:\n\t\tswitch line.Product.Type {\n\t\tcase model.ProdDonation, model.ProdRecording, model.ProdSheetMusic, model.ProdRegistration, model.ProdAuctionItem:\n\t\t\t// Donations, concert recordings, sheet music, auction\n\t\t\t// items, and event registrations must have a quantity\n\t\t\t// of 1.\n\t\t\tif line.Quantity != 1 || line.Used != 0 || line.UsedAt != \"\" {\n\t\t\t\treturn false\n\t\t\t}\n\t\tcase model.ProdWardrobe:\n\t\t\tif line.Quantity < 1 || line.Used != 0 || line.UsedAt != \"\" {\n\t\t\t\treturn false\n\t\t\t}\n\t\tcase model.ProdTicket:\n\t\t\tif line.Used < 0 || line.Used > line.Quantity*line.Product.TicketCount {\n\t\t\t\treturn false\n\t\t\t}\n\t\t\tif line.Used != 0 {\n\t\t\t\tvar found bool\n\t\t\t\tfor _, e := range line.Product.Events {\n\t\t\t\t\tif e.Event.ID == line.UsedAt {\n\t\t\t\t\t\tfound = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tif !found {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn true\n}", "func (t *Qos_Qos) Validate(opts ...ygot.ValidationOption) error {\n\tif err := ytypes.Validate(SchemaTree[\"Qos_Qos\"], t, opts...); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (c *Create) Validate(dtInv *data.Inventory) error {\n\treturn dtInv.Validate()\n}", "func (m *PublicPhaseSubDTO) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "func (m *HashType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateFunction(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateMethod(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateModifier(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (t *Qos_Qos_Qos) Validate(opts ...ygot.ValidationOption) error {\n\tif err := ytypes.Validate(SchemaTree[\"Qos_Qos_Qos\"], t, opts...); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (c ECommandType) Validate() error {\n switch c {\n case CMD_NONE,CMD_STATS,CMD_RESET_STATS,CMD_REOPEN_LOG,CMD_REREAD_CONF,CMD_EXIT_WHEN_DONE,CMD_SEND_UDP_PACKET,CMD_TIMER_SIGNAL,CMD_CHILD_SIGNAL,CMD_APP,CMD_SHUTDOWN,CMD_NUCLEUS_CONF,CMD_DUMP_STATE,CMD_NETWORKIF_CONF,CMD_END_OF_QUEUE,CMD_MAIN_CONF,CMD_PERSISTENT_APP,CMD_EVENT,CMD_WORKER_CONF:\n return nil\n default:\n return c // error condition - Error() can be invoked on it\n } // switch\n}", "func (m BrowserType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateBrowserTypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m OrderLineItemDiscountType) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\treturn nil\n}", "func (v *VendorItem) Validate(tx *pop.Connection) (*validate.Errors, error) {\n\treturn validate.Validate(\n\t\t&validators.StringIsPresent{Field: \"PurchasedUnit\", Name: \"PurchasedUnit\"},\n\t\t&validators.FuncValidator{\n\t\t\tField: \"Conversion\",\n\t\t\tName: \"Conversion\",\n\t\t\tMessage: \"Must have conversion greater than 0\",\n\t\t\tFn: func() bool {\n\t\t\t\treturn v.Conversion > 0\n\t\t\t},\n\t\t},\n\t), nil\n}", "func (m *TransactionInstance) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateAmount(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateCreatedAt(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateCurrencyCode(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateGatewaySpecificFields(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateGatewaySpecificResponseFields(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateGatewayTransactionID(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateMessage(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateOnTestGateway(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validatePaymentMethod(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateResponse(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateStatus(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateSucceeded(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTransactionID(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTransactionType(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (o *UpdateMoveTaskOrderActualWeightBody) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "func (o *GetOrderShipmentOKBody) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := o.validateBillingAddress(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := o.validateItems(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := o.validateShippingAddress(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := o.validateShippingProvider(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (s OptionGroupBlockObject) validateType() MessageObjectType {\n\treturn motOptionGroup\n}", "func (t *UseCase_UseCase_UseCase_Qos) Validate(opts ...ygot.ValidationOption) error {\n\tif err := ytypes.Validate(SchemaTree[\"UseCase_UseCase_UseCase_Qos\"], t, opts...); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (e OrderValidationError) Cause() error { return e.cause }", "func (a DebtAuction) Validate() error {\n\tif !a.CorrespondingDebt.IsValid() {\n\t\treturn fmt.Errorf(\"invalid corresponding debt: %s\", a.CorrespondingDebt)\n\t}\n\treturn ValidateAuction(&a)\n}" ]
[ "0.7131496", "0.6865671", "0.6823478", "0.66865146", "0.6515652", "0.63761455", "0.6325291", "0.6265264", "0.62596166", "0.6214032", "0.62092465", "0.61877", "0.61796695", "0.6065475", "0.6027428", "0.59906805", "0.5970147", "0.59227645", "0.5913089", "0.5880337", "0.5867027", "0.5861709", "0.5854548", "0.5838979", "0.57956266", "0.5782804", "0.5774155", "0.57633024", "0.5761093", "0.5760968", "0.5742934", "0.5740049", "0.5738251", "0.5737877", "0.5729973", "0.57270354", "0.5699337", "0.5695435", "0.5690791", "0.5685574", "0.56828254", "0.5666005", "0.5635802", "0.56130356", "0.55929226", "0.558591", "0.55838114", "0.55610514", "0.55225456", "0.5521397", "0.55005294", "0.5499201", "0.54883647", "0.5484349", "0.5479934", "0.5468017", "0.54649425", "0.5454913", "0.544584", "0.544164", "0.5440801", "0.54361296", "0.5428455", "0.54194057", "0.54190046", "0.54091555", "0.54058665", "0.54019046", "0.54002225", "0.5396965", "0.5394697", "0.53931284", "0.53923106", "0.53916943", "0.53905934", "0.538905", "0.5386071", "0.5381274", "0.5375936", "0.53750837", "0.5365377", "0.53561705", "0.5356117", "0.5353976", "0.5318991", "0.53109455", "0.5302808", "0.5293124", "0.5288014", "0.5287506", "0.52850956", "0.5274505", "0.5264803", "0.526222", "0.5258009", "0.52551824", "0.525288", "0.5252819", "0.52404606", "0.523949" ]
0.73945755
0
You should always use this function to get a new CreatePrivateGatewayParams instance, as then you are sure you have configured all required params
func (s *VPCService) NewCreatePrivateGatewayParams(gateway string, ipaddress string, netmask string, vlan string, vpcid string) *CreatePrivateGatewayParams { p := &CreatePrivateGatewayParams{} p.p = make(map[string]interface{}) p.p["gateway"] = gateway p.p["ipaddress"] = ipaddress p.p["netmask"] = netmask p.p["vlan"] = vlan p.p["vpcid"] = vpcid return p }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewCreatePrivateNetworkRequest(server string, body CreatePrivateNetworkJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewCreatePrivateNetworkRequestWithBody(server, \"application/json\", bodyReader)\n}", "func (s *VPCService) NewDeletePrivateGatewayParams(id string) *DeletePrivateGatewayParams {\n\tp := &DeletePrivateGatewayParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewParams(defaultSendEnabled bool) Params {\n\treturn Params{\n\t\tSendEnabled: nil,\n\t\tDefaultSendEnabled: defaultSendEnabled,\n\t}\n}", "func (s RealmGateway_export_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_export_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s *VPCService) NewListPrivateGatewaysParams() *ListPrivateGatewaysParams {\n\tp := &ListPrivateGatewaysParams{}\n\tp.p = make(map[string]interface{})\n\treturn p\n}", "func NewCreatePrivateNetworkRequestWithBody(server string, contentType string, body io.Reader) (*http.Request, error) {\n\tvar err error\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/private-network\")\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"POST\", queryUrl.String(), body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Add(\"Content-Type\", contentType)\n\treturn req, nil\n}", "func (s *VPCService) CreatePrivateGateway(p *CreatePrivateGatewayParams) (*CreatePrivateGatewayResponse, error) {\n\tresp, err := s.cs.newRequest(\"createPrivateGateway\", p.toURLValues())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar r CreatePrivateGatewayResponse\n\tif err := json.Unmarshal(resp, &r); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// If we have a async client, we need to wait for the async result\n\tif s.cs.async {\n\t\tb, err := s.cs.GetAsyncJobResult(r.JobID, s.cs.timeout)\n\t\tif err != nil {\n\t\t\tif err == AsyncTimeoutErr {\n\t\t\t\treturn &r, err\n\t\t\t}\n\t\t\treturn nil, err\n\t\t}\n\n\t\tb, err = getRawValue(b)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tif err := json.Unmarshal(b, &r); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn &r, nil\n}", "func NewParams(pricePerByte abi.TokenAmount, paymentInterval uint64, paymentIntervalIncrease uint64) (Params, error) {\n\treturn Params{\n\t\tPricePerByte: pricePerByte,\n\t\tPaymentInterval: paymentInterval,\n\t\tPaymentIntervalIncrease: paymentIntervalIncrease,\n\t}, nil\n}", "func NewParams() *Parameters {\n\treturn &Parameters{\n\t\tTokenType: \"transit\",\n\t\tTLSMode: 1,\n\t\tLeaderOnly: true,\n\t\tConnectTimeout: defaultConnectTimeout,\n\t\tReadTimeout: defaultReadTimeout,\n\t\tRetryCount: defaultRetries,\n\t\tRequireType: \"master\",\n\t}\n}", "func NewParams(communityTax sdk.Dec, withdrawAddrEnabled bool) Params {\n\treturn Params{\n\t\tCommunityTax: communityTax,\n\t\tWithdrawAddrEnabled: withdrawAddrEnabled,\n\t}\n}", "func New() (*Payway, error) {\n\n\t// get default gateway from configuration file\n\tprovider := conf.GetString(\"gateways.payments.default\")\n\n\tif provider == \"\" {\n\t\treturn nil, fmt.Errorf(\"No default payment gateway provided\")\n\t}\n\n\t// acquare read mutex\n\tmu.RLock()\n\n\tdefer mu.RUnlock()\n\n\t// fetch gateway from cache\n\tgateway, ok := gateways[provider]\n\n\tif !ok {\n\n\t\treturn nil, fmt.Errorf(\"Gateway not registered\")\n\t}\n\n\t// Init gateway\n\tif err := gateway.New(); err != nil {\n\n\t\treturn nil, err\n\t}\n\n\treturn &Payway{PayGateway: gateway}, nil\n}", "func NewTransferParams(toWalletableId int32, toWalletableType string, fromWalletableId int32, fromWalletableType string, amount int32, date string, companyId int32, ) *TransferParams {\n\tthis := TransferParams{}\n\tthis.ToWalletableId = toWalletableId\n\tthis.ToWalletableType = toWalletableType\n\tthis.FromWalletableId = fromWalletableId\n\tthis.FromWalletableType = fromWalletableType\n\tthis.Amount = amount\n\tthis.Date = date\n\tthis.CompanyId = companyId\n\treturn &this\n}", "func newCreateParam4Create(req *http.Request) (*CreateParam, error) {\n\tparam := &CreateParam{}\n\terr := xreq.BindJSON(req, param)\n\treturn param, err\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t}\n}", "func NewParams(tokenCourse, subscriptionPrice, VPNGBPrice,\n\tstorageGBPrice, baseVPNGb, baseStorageGb uint32, courseSigners []sdk.AccAddress) Params {\n\treturn Params{\n\t\tTokenCourse: tokenCourse,\n\t\tSubscriptionPrice: subscriptionPrice,\n\t\tVPNGBPrice: VPNGBPrice,\n\t\tStorageGBPrice: storageGBPrice,\n\t\tBaseVPNGb: baseVPNGb,\n\t\tBaseStorageGb: baseStorageGb,\n\t\tCourseChangeSigners: courseSigners[:],\n\t}\n}", "func (x *fastReflection_Params) New() protoreflect.Message {\n\treturn new(fastReflection_Params)\n}", "func NewParams(n, m int, prf, msg hasher.Hasher) *Params {\n\t// Don't allow creation of params if m == 0 or m > MaxMsgSize\n\tif m < 1 || m > MaxMsgSize {\n\t\treturn nil\n\t}\n\t// Don't allow creation of params if hash functions sizes are smaller than specified N and M\n\tif prf.Size() < n || msg.Size() < m {\n\t\treturn nil\n\t}\n\tchecksumLadders := 2\n\t// The only case that we need just 1 checksum ladder is for m=1\n\tif m == 1 {\n\t\tchecksumLadders = 1\n\t}\n\treturn &Params{\n\t\tn: n,\n\t\tm: m,\n\t\tprfHash: prf,\n\t\tmsgHash: msg,\n\t\ttotal: m + checksumLadders,\n\t}\n}", "func (tc *testContext) createNetParams(genesisHashStr string) (*chaincfg.Params, error) {\n\tparams := chaincfg.RegressionNetParams\n\n\t// Ensure regression net genesis block matches the one listed in BOLT spec.\n\texpectedGenesisHash, err := chainhash.NewHashFromStr(genesisHashStr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !params.GenesisHash.IsEqual(expectedGenesisHash) {\n\t\terr = fmt.Errorf(\"Expected regression net genesis hash to be %s, \"+\n\t\t\t\"got %s\", expectedGenesisHash, params.GenesisHash)\n\t\treturn nil, err\n\t}\n\n\treturn &params, nil\n}", "func NewParams(acl ACL, daoOwner sdk.Address) Params {\n\treturn Params{\n\t\tACL: acl,\n\t\tDAOOwner: daoOwner,\n\t}\n}", "func NewParams(\n\ttaxPolicy, rewardPolicy PolicyConstraints,\n\tseigniorageBurden sdk.Dec,\n\tminingIncrement sdk.Dec,\n\twindowShort, windowLong, windowProbation sdk.Int,\n) Params {\n\treturn Params{\n\t\tTaxPolicy: taxPolicy,\n\t\tRewardPolicy: rewardPolicy,\n\t\tSeigniorageBurdenTarget: seigniorageBurden,\n\t\tMiningIncrement: miningIncrement,\n\t\tWindowShort: windowShort,\n\t\tWindowLong: windowLong,\n\t\tWindowProbation: windowProbation,\n\t}\n}", "func NewParams(createWhoisPrice string, updateWhoisPrice string, deleteWhoisPrice string) Params {\n\treturn Params{\n\t\tCreateWhoisPrice: createWhoisPrice,\n\t\tUpdateWhoisPrice: updateWhoisPrice,\n\t\tDeleteWhoisPrice: deleteWhoisPrice,\n\t}\n}", "func NewParams(nickname NicknameParams, dTag DTagParams, bio BioParams, oracle OracleParams) Params {\n\treturn Params{\n\t\tNickname: nickname,\n\t\tDTag: dTag,\n\t\tBio: bio,\n\t\tOracle: oracle,\n\t}\n}", "func New(c *drycc.Client, appID string, name string, port int, protocol string) error {\n\tu := fmt.Sprintf(\"/v2/apps/%s/gateways/\", appID)\n\n\treq := api.GatewayCreateRequest{Name: name, Port: port, Protocol: protocol}\n\n\tbody, err := json.Marshal(req)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tres, reqErr := c.Request(\"POST\", u, body)\n\tif reqErr != nil && !drycc.IsErrAPIMismatch(reqErr) {\n\t\treturn reqErr\n\t}\n\tdefer res.Body.Close()\n\n\treturn reqErr\n}", "func NewParams() *Params {\n\treturn new(Params)\n}", "func newGateway(ctx context.Context, cl client.Client, ns, name, gc, k, v string) error {\n\troutes := &metav1.LabelSelector{\n\t\tMatchLabels: map[string]string{k: v},\n\t}\n\thttp := gatewayv1alpha1.Listener{\n\t\tPort: gatewayv1alpha1.PortNumber(int32(80)),\n\t\tProtocol: gatewayv1alpha1.HTTPProtocolType,\n\t\tRoutes: gatewayv1alpha1.RouteBindingSelector{\n\t\t\tKind: \"HTTPRoute\",\n\t\t\tSelector: routes,\n\t\t},\n\t}\n\tgw := &gatewayv1alpha1.Gateway{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tNamespace: ns,\n\t\t\tName: name,\n\t\t},\n\t\tSpec: gatewayv1alpha1.GatewaySpec{\n\t\t\tGatewayClassName: gc,\n\t\t\tListeners: []gatewayv1alpha1.Listener{http},\n\t\t},\n\t}\n\tif err := cl.Create(ctx, gw); err != nil {\n\t\treturn fmt.Errorf(\"failed to create gateway %s/%s: %v\", ns, name, err)\n\t}\n\treturn nil\n}", "func CreateGetLniPrivateIpAddressRequest() (request *GetLniPrivateIpAddressRequest) {\n\trequest = &GetLniPrivateIpAddressRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"eflo\", \"2022-05-30\", \"GetLniPrivateIpAddress\", \"eflo\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func (m *modelThree) NewGateway(i int) NodeRunnerInterface {\n\tgwy := &gatewayThree{\n\t\tNodeRunnerBase: NodeRunnerBase{RunnerBase: RunnerBase{id: i}, strtype: GWY},\n\t\twaitingResponse: nil,\n\t}\n\tgwy.init(config.numServers)\n\tl := cap(gwy.eps)\n\tgwy.waitingResponse = make([]int64, l)\n\treturn gwy\n}", "func NewCreatePostRequestBody()(*CreatePostRequestBody) {\n m := &CreatePostRequestBody{\n }\n m.SetAdditionalData(make(map[string]interface{}));\n return m\n}", "func NewProviderParams() ProviderParams {\n\n\treturn ProviderParams{}\n}", "func (params *QueueParams) CreateParams() []*cloudformation.Parameter {\n\tstackParams := []*cloudformation.Parameter{}\n\tif params.DelaySeconds != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamDelaySeconds, *params.DelaySeconds))\n\t}\n\tif params.MaximumMessageSize != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamMaximumMessageSize, *params.MaximumMessageSize))\n\t}\n\tif params.MessageRetentionPeriod != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamMessageRetentionPeriod, *params.MessageRetentionPeriod))\n\t}\n\tif params.ReceiveMessageWaitTimeSeconds != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamReceiveMessageWaitTimeSeconds, *params.ReceiveMessageWaitTimeSeconds))\n\t}\n\tif params.RedriveMaxReceiveCount != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamRedriveMaxReceiveCount, *params.RedriveMaxReceiveCount))\n\t}\n\tif params.VisibilityTimeout != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamVisibilityTimeout, *params.VisibilityTimeout))\n\t}\n\treturn stackParams\n}", "func (c *APIGateway) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\t// Run custom request initialization if present\n\tif initRequest != nil {\n\t\tinitRequest(req)\n\t}\n\n\treturn req\n}", "func NewCreateInstanceRequest(server string, params *CreateInstanceParams, body CreateInstanceJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewCreateInstanceRequestWithBody(server, params, \"application/json\", bodyReader)\n}", "func (client *WebAppsClient) getPrivateAccessCreateRequest(ctx context.Context, resourceGroupName string, name string, options *WebAppsGetPrivateAccessOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/privateAccess/virtualNetworks\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewGetPrivateToggleDepositAddressCreationParamsWithTimeout(timeout time.Duration) *GetPrivateToggleDepositAddressCreationParams {\n\tvar ()\n\treturn &GetPrivateToggleDepositAddressCreationParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "func New(c *client.Client, u *client.UserConfig) Gateway {\n\treturn &gateway{\n\t\t*gw.NewHTTPGateway(c, u),\n\t}\n}", "func (network Network) CreatePrivateKey() (*btcutil.WIF, error) {\n\tsecret, err := btcec.NewPrivateKey(btcec.S256())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn btcutil.NewWIF(secret, network.GetNetworkParams(), true)\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules,\n\tmoneyMarkets MoneyMarkets, checkLtvIndexCount int) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t\tMoneyMarkets: moneyMarkets,\n\t\tCheckLtvIndexCount: checkLtvIndexCount,\n\t}\n}", "func (service *Service) CreateRequest(parameters map[string]string) (*Request, error) {\n\tvar int1, int2, limit int64\n\tvar err error\n\n\t// Convert string parameters to int64\n\tif int1, err = strconv.ParseInt(parameters[\"int1\"], 10, 64); err != nil {\n\t\treturn nil, err\n\t}\n\tif int2, err = strconv.ParseInt(parameters[\"int2\"], 10, 64); err != nil {\n\t\treturn nil, err\n\t}\n\tif limit, err = strconv.ParseInt(parameters[\"limit\"], 10, 64); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Request{\n\t\tInt1: int1,\n\t\tInt2: int2,\n\t\tLimit: limit,\n\t\tStr1: parameters[\"str1\"],\n\t\tStr2: parameters[\"str2\"],\n\t}, nil\n}", "func NewShiftPreferencesRequestBuilderInternal(pathParameters map[string]string, requestAdapter i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestAdapter)(*ShiftPreferencesRequestBuilder) {\n m := &ShiftPreferencesRequestBuilder{\n }\n m.urlTemplate = \"{+baseurl}/users/{user%2Did}/settings/shiftPreferences{?%24select,%24expand}\";\n urlTplParams := make(map[string]string)\n for idx, item := range pathParameters {\n urlTplParams[idx] = item\n }\n m.pathParameters = urlTplParams;\n m.requestAdapter = requestAdapter;\n return m\n}", "func (client *PeeringPoliciesClient) getCreateRequest(ctx context.Context, resourceGroupName string, managedNetworkName string, managedNetworkPeeringPolicyName string, options *PeeringPoliciesClientGetOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedNetwork/managedNetworks/{managedNetworkName}/managedNetworkPeeringPolicies/{managedNetworkPeeringPolicyName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif managedNetworkName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedNetworkName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedNetworkName}\", url.PathEscape(managedNetworkName))\n\tif managedNetworkPeeringPolicyName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedNetworkPeeringPolicyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedNetworkPeeringPolicyName}\", url.PathEscape(managedNetworkPeeringPolicyName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-06-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewPoliciesRequestBuilderInternal(pathParameters map[string]string, requestAdapter i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestAdapter)(*PoliciesRequestBuilder) {\n m := &PoliciesRequestBuilder{\n }\n m.urlTemplate = \"{+baseurl}/policies{?%24select,%24expand}\";\n urlTplParams := make(map[string]string)\n for idx, item := range pathParameters {\n urlTplParams[idx] = item\n }\n m.pathParameters = urlTplParams\n m.requestAdapter = requestAdapter\n return m\n}", "func NewParams() (Params, error) {\n\treturn Params{\n\t\tBaseParams: codec.BaseParams{\n\t\t\tKeyFrameInterval: 60,\n\t\t},\n\t}, nil\n}", "func NewIgroupInitiatorCreateParams() *IgroupInitiatorCreateParams {\n\treturn &IgroupInitiatorCreateParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewGetPrivateOrderstateParams() *GetPrivateOrderstateParams {\n\tvar ()\n\treturn &GetPrivateOrderstateParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (m *modelB) NewGateway(i int) NodeRunnerInterface {\n\tgwy := NewGatewayCommon(i, mB.putpipeline)\n\tmaxval := int64(configNetwork.sizeFrame*8) + int64(configNetwork.sizeControlPDU*8)\n\tgwy.rb = NewRateBucket(maxval, configNetwork.linkbps, maxval)\n\trgwy := &gatewayB{GatewayCommon: *gwy}\n\trgwy.rptr = rgwy\n\n\treturn rgwy\n}", "func NewGetGatewaysParams() *GetGatewaysParams {\n\treturn &GetGatewaysParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func TestNewGateway(t *testing.T) {\n\tcfg := defaultConfig()\n\n\tgateway := NewGateway(clientApi)\n\tassert.Equal(t, gateway.address, cfg.Address)\n\tassert.Equal(t, gateway.server.Name, cfg.Name)\n\tassert.Equal(t, gateway.server.GetOnly, cfg.GetOnly)\n\tassert.Equal(t, gateway.server.LogAllErrors, cfg.LogAllError)\n\tassert.Equal(t, gateway.cors.Enable, cfg.CORs.Enable)\n\n\tgo func() {\n\t\terr := gateway.Start()\n\t\tassert.Nil(t, err, err)\n\t}()\n\n\ttime.Sleep(5 * time.Second)\n\terr := gateway.Stop()\n\tassert.Nil(t, err, err)\n}", "func NewAuthPrivilegeRequestWithoutParam() *AuthPrivilegeRequest {\n\n return &AuthPrivilegeRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/management:authPrivilege\",\n Method: \"POST\",\n Header: nil,\n Version: \"v1\",\n },\n }\n}", "func NewBgpConfiguration()(*BgpConfiguration) {\n m := &BgpConfiguration{\n }\n m.backingStore = ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStoreFactoryInstance();\n m.SetAdditionalData(make(map[string]any))\n return m\n}", "func preparecreateServiceparams(params map[string]string, createservice Createservice, Region string) {\n\tif Region != \"\" {\n\t\tparams[\"Region\"] = Region\n\t}\n\tparams[\"amztarget\"] = \"AmazonEC2ContainerServiceV20141113.CreateService\"\n}", "func newPrivateKey(size int) (*rsa.PrivateKey, error) {\n\t// TODO: support more key types\n\tprivateKey, err := rsa.GenerateKey(rand.Reader, size)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn privateKey, nil\n}", "func mustMakePubliclyViewableParams(fsc *frontendServerConfig) publicparams.Matcher {\n\tvar publiclyViewableParams publicparams.Matcher\n\tvar err error\n\n\t// Load the publiclyViewable params if configured and disable querying for issues.\n\tif len(fsc.PubliclyAllowableParams) > 0 {\n\t\tif publiclyViewableParams, err = publicparams.MatcherFromRules(fsc.PubliclyAllowableParams); err != nil {\n\t\t\tsklog.Fatalf(\"Could not load list of public params: %s\", err)\n\t\t}\n\t}\n\n\t// Check if this is public instance. If so, make sure we have a non-nil Matcher.\n\tif fsc.IsPublicView && publiclyViewableParams == nil {\n\t\tsklog.Fatal(\"A non-empty map of publiclyViewableParams must be provided if is public view.\")\n\t}\n\n\treturn publiclyViewableParams\n}", "func NewGateway(session *discordgo.Session) *Gateway {\n\treturn &Gateway{\n\t\tSession: session,\n\t\tgroup: &singleflight.Group{},\n\t}\n}", "func (c *ChargeClient) New(ctx context.Context, idempotencyKey string, paymentID string, params *ChargeParams, clientInfo *ClientInfo) (*Charge, error) {\n\tcharge := &Charge{}\n\n\theaders := map[string]string{headerIdempotencyKey: idempotencyKey}\n\n\tif clientInfo != nil {\n\t\theaders[headerClientIPAddress] = clientInfo.IPAddress\n\t\theaders[headerClientUserAgent] = clientInfo.UserAgent\n\t}\n\n\tif err := c.Caller.Call(ctx, \"POST\", c.chargesPath(paymentID), headers, params, charge); err != nil {\n\t\treturn nil, err\n\t}\n\treturn charge, nil\n}", "func NewParams(opts []copts.Opt) *Params {\n\tparams := &Params{}\n\tcopts.Apply(params, opts)\n\treturn params\n}", "func NewGateway(\n\tcf *HTTPConfig, ct *store.CXO,\n\tbs *store.BoardSaver, us *store.UserSaver, qs *msg.QueueSaver,\n\tq chan int,\n) *Gateway {\n\tg := &Gateway{config: cf, container: ct, boardSaver: bs, userSaver: us, queueSaver: qs, quitChan: q}\n\tg.Stats.Gateway = g\n\tg.Connections.Gateway = g\n\tg.Subscriptions.Gateway = g\n\tg.Users.Gateway = g\n\tg.Users.Masters.Gateway = g\n\tg.Users.Masters.Current.Gateway = g\n\tg.Users.Votes.Gateway = g\n\tg.Boards.Gateway = g\n\tg.Boards.Meta.Gateway = g\n\tg.Boards.Meta.SubmissionAddresses.Gateway = g\n\tg.Boards.Page.Gateway = g\n\tg.Threads.Gateway = g\n\tg.Threads.Page.Gateway = g\n\tg.Threads.Votes.Gateway = g\n\tg.Posts.Gateway = g\n\tg.Posts.Votes.Gateway = g\n\tg.Tests.Gateway = g\n\treturn g\n}", "func New(ctx context.Context, m map[string]interface{}) (auth.Manager, error) {\n\tvar mgr manager\n\tif err := mgr.Configure(m); err != nil {\n\t\treturn nil, err\n\t}\n\tgw, err := pool.GetGatewayServiceClient(pool.Endpoint(mgr.c.GatewayAddr))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tmgr.gw = gw\n\n\treturn &mgr, nil\n}", "func CreateGetMultiRateConfigRequest() (request *GetMultiRateConfigRequest) {\n\trequest = &GetMultiRateConfigRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"live\", \"2016-11-01\", \"GetMultiRateConfig\", \"live\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func CreateReleaseDirectConnectionRequest() (request *ReleaseDirectConnectionRequest) {\n\trequest = &ReleaseDirectConnectionRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"R-kvstore\", \"2015-01-01\", \"ReleaseDirectConnection\", \"redisa\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func (s ServerDHParamsOk) construct() ServerDHParamsClass { return &s }", "func NewGetPrivateNetworkRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/private-network/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"GET\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func NewParams(opts []copts.Opt) *Params {\r\n\tparams := &Params{}\r\n\tcopts.Apply(params, opts)\r\n\treturn params\r\n}", "func NewCreateanewPeeringGroupRequest(server string, body CreateanewPeeringGroupJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewCreateanewPeeringGroupRequestWithBody(server, \"application/json\", bodyReader)\n}", "func NewInboundRequest(\n baseRequest *http.Request,\n pathParams PathParams,\n) *InboundRequest {\n req := &InboundRequest{\n Request: *baseRequest,\n PathParams: pathParams,\n }\n return req\n}", "func (m *MockFirewallServiceIface) NewCreatePortForwardingRuleParams(ipaddressid string, privateport int, protocol string, publicport int, virtualmachineid string) *CreatePortForwardingRuleParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewCreatePortForwardingRuleParams\", ipaddressid, privateport, protocol, publicport, virtualmachineid)\n\tret0, _ := ret[0].(*CreatePortForwardingRuleParams)\n\treturn ret0\n}", "func NewGetPrivateToggleDepositAddressCreationParamsWithHTTPClient(client *http.Client) *GetPrivateToggleDepositAddressCreationParams {\n\tvar ()\n\treturn &GetPrivateToggleDepositAddressCreationParams{\n\t\tHTTPClient: client,\n\t}\n}", "func New() (*KeyPair, error) {\n\tp, v, err := p2pCrypto.GenerateKeyPairWithReader(p2pCrypto.Ed25519, 256, rand.Reader)\n\tif err == nil {\n\t\treturn &KeyPair{privKey: p, pubKey: v}, nil\n\t}\n\treturn nil, err\n}", "func (c Client) createRequest(method string, endpoint string, params url.Values) (req *http.Request, err error) {\n\tendpoint = APIBaseURL + endpoint\n\t// get current unix time in MS\n\tts := time.Now().UnixNano() / int64(time.Millisecond)\n\t// add required timestamp value\n\tparams.Add(\"timestamp\", fmt.Sprint(ts))\n\tif method == \"GET\" || method == \"DELETE\" {\n\t\treq, err = http.NewRequest(method, fmt.Sprintf(\"%s?%s\", endpoint, params.Encode()), nil)\n\t} else {\n\t\treq, err = http.NewRequest(method, endpoint, strings.NewReader(params.Encode()))\n\t\treq.Header.Add(\"Content-Length\", strconv.Itoa(len(params.Encode())))\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif strings.Contains(endpoint, \"/private\") {\n\t\tc.authenticate(req, params)\n\t}\n\treq.Header.Set(\"User-Agent\", APIUserAgent)\n\treq.Header.Set(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\n\treturn req, nil\n}", "func NewGetPrivateToggleDepositAddressCreationParams() *GetPrivateToggleDepositAddressCreationParams {\n\tvar ()\n\treturn &GetPrivateToggleDepositAddressCreationParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func newInstance(moduleName, name string, priv interface{}) (*BaseInstance, error) {\n\tfactory, found := instanceFactories[moduleName]\n\tif !found {\n\t\treturn nil, fmt.Errorf(\"Module '%s' doesn't exist.\\n\", moduleName)\n\t}\n\n\trp, ok := ringParams[moduleName]\n\tif !ok {\n\t\trp = defaultRingParam\n\t}\n\n\tbi := &BaseInstance{name: name}\n\n\tringName := fmt.Sprintf(\"input-%s\", name)\n\tbi.input = dpdk.RingCreate(ringName, rp.Count, rp.SocketId, dpdk.RING_F_SC_DEQ)\n\tif bi.input == nil {\n\t\treturn nil, fmt.Errorf(\"Input ring creation faild for %s.\\n\", name)\n\t}\n\n\tif rp.SecondaryInput {\n\t\tringName := fmt.Sprintf(\"input2-%s\", name)\n\t\tbi.input2 = dpdk.RingCreate(ringName, rp.Count, rp.SocketId, dpdk.RING_F_SC_DEQ)\n\t\tif bi.input2 == nil {\n\t\t\treturn nil, fmt.Errorf(\"Second input ring creation failed for %s\", name)\n\t\t}\n\t}\n\n\tbi.rules = newRules()\n\n\tinstance, err := factory(bi, priv)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Creating module '%s' with name '%s' failed: %v\\n\", moduleName, name, err)\n\t}\n\tbi.instance = instance\n\n\treturn bi, nil\n}", "func (client *WebAppsClient) getVnetConnectionGatewayCreateRequest(ctx context.Context, resourceGroupName string, name string, vnetName string, gatewayName string, options *WebAppsGetVnetConnectionGatewayOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/virtualNetworkConnections/{vnetName}/gateways/{gatewayName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif vnetName == \"\" {\n\t\treturn nil, errors.New(\"parameter vnetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vnetName}\", url.PathEscape(vnetName))\n\tif gatewayName == \"\" {\n\t\treturn nil, errors.New(\"parameter gatewayName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{gatewayName}\", url.PathEscape(gatewayName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (rm *resourceManager) newCreateRequestPayload(\n\tctx context.Context,\n\tr *resource,\n) (*svcsdk.CreateVpnConnectionInput, error) {\n\tres := &svcsdk.CreateVpnConnectionInput{}\n\n\tif r.ko.Spec.CustomerGatewayID != nil {\n\t\tres.SetCustomerGatewayId(*r.ko.Spec.CustomerGatewayID)\n\t}\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Spec.Options != nil {\n\t\tf2 := &svcsdk.VpnConnectionOptionsSpecification{}\n\t\tif r.ko.Spec.Options.EnableAcceleration != nil {\n\t\t\tf2.SetEnableAcceleration(*r.ko.Spec.Options.EnableAcceleration)\n\t\t}\n\t\tif r.ko.Spec.Options.LocalIPv4NetworkCIDR != nil {\n\t\t\tf2.SetLocalIpv4NetworkCidr(*r.ko.Spec.Options.LocalIPv4NetworkCIDR)\n\t\t}\n\t\tif r.ko.Spec.Options.LocalIPv6NetworkCIDR != nil {\n\t\t\tf2.SetLocalIpv6NetworkCidr(*r.ko.Spec.Options.LocalIPv6NetworkCIDR)\n\t\t}\n\t\tif r.ko.Spec.Options.RemoteIPv4NetworkCIDR != nil {\n\t\t\tf2.SetRemoteIpv4NetworkCidr(*r.ko.Spec.Options.RemoteIPv4NetworkCIDR)\n\t\t}\n\t\tif r.ko.Spec.Options.RemoteIPv6NetworkCIDR != nil {\n\t\t\tf2.SetRemoteIpv6NetworkCidr(*r.ko.Spec.Options.RemoteIPv6NetworkCIDR)\n\t\t}\n\t\tif r.ko.Spec.Options.StaticRoutesOnly != nil {\n\t\t\tf2.SetStaticRoutesOnly(*r.ko.Spec.Options.StaticRoutesOnly)\n\t\t}\n\t\tif r.ko.Spec.Options.TunnelInsideIPVersion != nil {\n\t\t\tf2.SetTunnelInsideIpVersion(*r.ko.Spec.Options.TunnelInsideIPVersion)\n\t\t}\n\t\tif r.ko.Spec.Options.TunnelOptions != nil {\n\t\t\tf2f7 := []*svcsdk.VpnTunnelOptionsSpecification{}\n\t\t\tfor _, f2f7iter := range r.ko.Spec.Options.TunnelOptions {\n\t\t\t\tf2f7elem := &svcsdk.VpnTunnelOptionsSpecification{}\n\t\t\t\tif f2f7iter.DPDTimeoutAction != nil {\n\t\t\t\t\tf2f7elem.SetDPDTimeoutAction(*f2f7iter.DPDTimeoutAction)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.DPDTimeoutSeconds != nil {\n\t\t\t\t\tf2f7elem.SetDPDTimeoutSeconds(*f2f7iter.DPDTimeoutSeconds)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.IKEVersions != nil {\n\t\t\t\t\tf2f7elemf2 := []*svcsdk.IKEVersionsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf2iter := range f2f7iter.IKEVersions {\n\t\t\t\t\t\tf2f7elemf2elem := &svcsdk.IKEVersionsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf2iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf2elem.SetValue(*f2f7elemf2iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf2 = append(f2f7elemf2, f2f7elemf2elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetIKEVersions(f2f7elemf2)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase1DHGroupNumbers != nil {\n\t\t\t\t\tf2f7elemf3 := []*svcsdk.Phase1DHGroupNumbersRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf3iter := range f2f7iter.Phase1DHGroupNumbers {\n\t\t\t\t\t\tf2f7elemf3elem := &svcsdk.Phase1DHGroupNumbersRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf3iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf3elem.SetValue(*f2f7elemf3iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf3 = append(f2f7elemf3, f2f7elemf3elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase1DHGroupNumbers(f2f7elemf3)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase1EncryptionAlgorithms != nil {\n\t\t\t\t\tf2f7elemf4 := []*svcsdk.Phase1EncryptionAlgorithmsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf4iter := range f2f7iter.Phase1EncryptionAlgorithms {\n\t\t\t\t\t\tf2f7elemf4elem := &svcsdk.Phase1EncryptionAlgorithmsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf4iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf4elem.SetValue(*f2f7elemf4iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf4 = append(f2f7elemf4, f2f7elemf4elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase1EncryptionAlgorithms(f2f7elemf4)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase1IntegrityAlgorithms != nil {\n\t\t\t\t\tf2f7elemf5 := []*svcsdk.Phase1IntegrityAlgorithmsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf5iter := range f2f7iter.Phase1IntegrityAlgorithms {\n\t\t\t\t\t\tf2f7elemf5elem := &svcsdk.Phase1IntegrityAlgorithmsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf5iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf5elem.SetValue(*f2f7elemf5iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf5 = append(f2f7elemf5, f2f7elemf5elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase1IntegrityAlgorithms(f2f7elemf5)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase1LifetimeSeconds != nil {\n\t\t\t\t\tf2f7elem.SetPhase1LifetimeSeconds(*f2f7iter.Phase1LifetimeSeconds)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase2DHGroupNumbers != nil {\n\t\t\t\t\tf2f7elemf7 := []*svcsdk.Phase2DHGroupNumbersRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf7iter := range f2f7iter.Phase2DHGroupNumbers {\n\t\t\t\t\t\tf2f7elemf7elem := &svcsdk.Phase2DHGroupNumbersRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf7iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf7elem.SetValue(*f2f7elemf7iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf7 = append(f2f7elemf7, f2f7elemf7elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase2DHGroupNumbers(f2f7elemf7)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase2EncryptionAlgorithms != nil {\n\t\t\t\t\tf2f7elemf8 := []*svcsdk.Phase2EncryptionAlgorithmsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf8iter := range f2f7iter.Phase2EncryptionAlgorithms {\n\t\t\t\t\t\tf2f7elemf8elem := &svcsdk.Phase2EncryptionAlgorithmsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf8iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf8elem.SetValue(*f2f7elemf8iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf8 = append(f2f7elemf8, f2f7elemf8elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase2EncryptionAlgorithms(f2f7elemf8)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase2IntegrityAlgorithms != nil {\n\t\t\t\t\tf2f7elemf9 := []*svcsdk.Phase2IntegrityAlgorithmsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf9iter := range f2f7iter.Phase2IntegrityAlgorithms {\n\t\t\t\t\t\tf2f7elemf9elem := &svcsdk.Phase2IntegrityAlgorithmsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf9iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf9elem.SetValue(*f2f7elemf9iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf9 = append(f2f7elemf9, f2f7elemf9elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase2IntegrityAlgorithms(f2f7elemf9)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase2LifetimeSeconds != nil {\n\t\t\t\t\tf2f7elem.SetPhase2LifetimeSeconds(*f2f7iter.Phase2LifetimeSeconds)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.PreSharedKey != nil {\n\t\t\t\t\tf2f7elem.SetPreSharedKey(*f2f7iter.PreSharedKey)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.RekeyFuzzPercentage != nil {\n\t\t\t\t\tf2f7elem.SetRekeyFuzzPercentage(*f2f7iter.RekeyFuzzPercentage)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.RekeyMarginTimeSeconds != nil {\n\t\t\t\t\tf2f7elem.SetRekeyMarginTimeSeconds(*f2f7iter.RekeyMarginTimeSeconds)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.ReplayWindowSize != nil {\n\t\t\t\t\tf2f7elem.SetReplayWindowSize(*f2f7iter.ReplayWindowSize)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.StartupAction != nil {\n\t\t\t\t\tf2f7elem.SetStartupAction(*f2f7iter.StartupAction)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.TunnelInsideCIDR != nil {\n\t\t\t\t\tf2f7elem.SetTunnelInsideCidr(*f2f7iter.TunnelInsideCIDR)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.TunnelInsideIPv6CIDR != nil {\n\t\t\t\t\tf2f7elem.SetTunnelInsideIpv6Cidr(*f2f7iter.TunnelInsideIPv6CIDR)\n\t\t\t\t}\n\t\t\t\tf2f7 = append(f2f7, f2f7elem)\n\t\t\t}\n\t\t\tf2.SetTunnelOptions(f2f7)\n\t\t}\n\t\tres.SetOptions(f2)\n\t}\n\tif r.ko.Spec.TagSpecifications != nil {\n\t\tf3 := []*svcsdk.TagSpecification{}\n\t\tfor _, f3iter := range r.ko.Spec.TagSpecifications {\n\t\t\tf3elem := &svcsdk.TagSpecification{}\n\t\t\tif f3iter.ResourceType != nil {\n\t\t\t\tf3elem.SetResourceType(*f3iter.ResourceType)\n\t\t\t}\n\t\t\tif f3iter.Tags != nil {\n\t\t\t\tf3elemf1 := []*svcsdk.Tag{}\n\t\t\t\tfor _, f3elemf1iter := range f3iter.Tags {\n\t\t\t\t\tf3elemf1elem := &svcsdk.Tag{}\n\t\t\t\t\tif f3elemf1iter.Key != nil {\n\t\t\t\t\t\tf3elemf1elem.SetKey(*f3elemf1iter.Key)\n\t\t\t\t\t}\n\t\t\t\t\tif f3elemf1iter.Value != nil {\n\t\t\t\t\t\tf3elemf1elem.SetValue(*f3elemf1iter.Value)\n\t\t\t\t\t}\n\t\t\t\t\tf3elemf1 = append(f3elemf1, f3elemf1elem)\n\t\t\t\t}\n\t\t\t\tf3elem.SetTags(f3elemf1)\n\t\t\t}\n\t\t\tf3 = append(f3, f3elem)\n\t\t}\n\t\tres.SetTagSpecifications(f3)\n\t}\n\tif r.ko.Spec.TransitGatewayID != nil {\n\t\tres.SetTransitGatewayId(*r.ko.Spec.TransitGatewayID)\n\t}\n\tif r.ko.Spec.Type != nil {\n\t\tres.SetType(*r.ko.Spec.Type)\n\t}\n\tif r.ko.Spec.VPNGatewayID != nil {\n\t\tres.SetVpnGatewayId(*r.ko.Spec.VPNGatewayID)\n\t}\n\n\treturn res, nil\n}", "func NewGateway(\n\taddr ma.Multiaddr,\n\tapiAddr ma.Multiaddr,\n\tapiToken string,\n\tbucketDomain string,\n\tcollections *collections.Collections,\n\tsessionBus *broadcast.Broadcaster,\n\tdebug bool,\n) (*Gateway, error) {\n\tif debug {\n\t\tif err := util.SetLogLevels(map[string]logging.LogLevel{\n\t\t\t\"gateway\": logging.LevelDebug,\n\t\t}); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tapiTarget, err := util.TCPAddrFromMultiAddr(apiAddr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc, err := client.NewClient(apiTarget, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Gateway{\n\t\taddr: addr,\n\t\tbucketDomain: bucketDomain,\n\t\tcollections: collections,\n\t\tclient: c,\n\t\tclientAuth: client.Auth{Token: apiToken},\n\t\tsessionBus: sessionBus,\n\t}, nil\n}", "func New(params Params) (*presignerT, error) {\n\treturn newPresigner(params)\n}", "func newP(method, url, token string, body interface{}) (*http.Request, error) {\n\treader, err := encode(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\trequest, err := NewRequest(method, url, reader)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbearer := fmt.Sprintf(\"Bearer %s\", token)\n\trequest.Header.Add(\"Authorization\", bearer)\n\trequest.Header.Add(\"Accept\", \"application/json\")\n\trequest.Header.Add(\"Content-Type\", \"application/json\")\n\treturn request, nil\n}", "func createNewPrivateMessage(origin string, msg string, dest *string) *core.PrivateMessage {\n\tdefaultID := uint32(0) // to enforce NOT sequencing\n\tdefaultHopLimit := uint32(10)\n\tprivateMsg := core.PrivateMessage{Origin: origin, ID: defaultID, Text: msg, Destination: *dest, HopLimit: defaultHopLimit}\n\treturn &privateMsg\n}", "func (m *modelOneDotOne) NewGateway(i int) NodeRunnerInterface {\n\tgwy := &gatewayOneDotOne{NodeRunnerBase{RunnerBase: RunnerBase{id: i}, strtype: GWY}}\n\tgwy.init(config.numServers)\n\treturn gwy\n}", "func NewIdentityGovernanceRequestBuilderInternal(pathParameters map[string]string, requestAdapter i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestAdapter)(*IdentityGovernanceRequestBuilder) {\n m := &IdentityGovernanceRequestBuilder{\n }\n m.urlTemplate = \"{+baseurl}/identityGovernance{?%24select,%24expand}\";\n urlTplParams := make(map[string]string)\n for idx, item := range pathParameters {\n urlTplParams[idx] = item\n }\n m.pathParameters = urlTplParams;\n m.requestAdapter = requestAdapter;\n return m\n}", "func NewKeyFromParams(g *big.Int, p *big.Int, q *big.Int) (*Key, *big.Int, error) {\n\tsecret, err := rand.Int(rand.Reader, q)\n\tif err != nil {\n\t\t// glog.Error(\"Couldn't generate a secret for the key\")\n\t\treturn nil, nil, err\n\t}\n\n\treturn &Key{g, p, q, new(big.Int).Exp(g, secret, p)}, secret, nil\n\n}", "func CreateDescribeSmartAccessGatewayAttributeRequest() (request *DescribeSmartAccessGatewayAttributeRequest) {\n\trequest = &DescribeSmartAccessGatewayAttributeRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Smartag\", \"2018-03-13\", \"DescribeSmartAccessGatewayAttribute\", \"smartag\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func (client *WebAppsClient) getPrivateEndpointConnectionCreateRequest(ctx context.Context, resourceGroupName string, name string, privateEndpointConnectionName string, options *WebAppsGetPrivateEndpointConnectionOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/privateEndpointConnections/{privateEndpointConnectionName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif privateEndpointConnectionName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateEndpointConnectionName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateEndpointConnectionName}\", url.PathEscape(privateEndpointConnectionName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewThreatIntelligenceHostPairsRequestBuilderInternal(pathParameters map[string]string, requestAdapter i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestAdapter)(*ThreatIntelligenceHostPairsRequestBuilder) {\n m := &ThreatIntelligenceHostPairsRequestBuilder{\n BaseRequestBuilder: *i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewBaseRequestBuilder(requestAdapter, \"{+baseurl}/security/threatIntelligence/hostPairs{?%24top,%24skip,%24search,%24filter,%24count,%24orderby,%24select,%24expand}\", pathParameters),\n }\n return m\n}", "func NewParams(\n\tmintDenom string, inflationRateChange, inflationMax, inflationMin, goalBonded sdk.Dec, blocksPerYear uint64,\n) Params {\n\n\treturn Params{\n\t\tMintDenom: mintDenom,\n\t\tInflationRateChange: inflationRateChange,\n\t\tInflationMax: inflationMax,\n\t\tInflationMin: inflationMin,\n\t\tGoalBonded: goalBonded,\n\t\tBlocksPerYear: blocksPerYear,\n\t}\n}", "func CreateDescribeGtmInstanceRequest() (request *DescribeGtmInstanceRequest) {\n\trequest = &DescribeGtmInstanceRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Alidns\", \"2015-01-09\", \"DescribeGtmInstance\", \"alidns\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func (client *NetworkToNetworkInterconnectsClient) createCreateRequest(ctx context.Context, resourceGroupName string, networkFabricName string, networkToNetworkInterconnectName string, body NetworkToNetworkInterconnect, options *NetworkToNetworkInterconnectsClientBeginCreateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedNetworkFabric/networkFabrics/{networkFabricName}/networkToNetworkInterconnects/{networkToNetworkInterconnectName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif networkFabricName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkFabricName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkFabricName}\", url.PathEscape(networkFabricName))\n\tif networkToNetworkInterconnectName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkToNetworkInterconnectName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkToNetworkInterconnectName}\", url.PathEscape(networkToNetworkInterconnectName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPut, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-06-15\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, body)\n}", "func NewPrivateKey(keyType string) (interface{}, error) {\n\tswitch keyType {\n\tcase \"ecdsa256\":\n\t\treturn ecdsa.GenerateKey(elliptic.P256(), rand.Reader)\n\tcase \"ecdsa384\":\n\t\treturn ecdsa.GenerateKey(elliptic.P384(), rand.Reader)\n\tcase \"ecdsa521\":\n\t\treturn ecdsa.GenerateKey(elliptic.P521(), rand.Reader)\n\tcase \"ed25519\":\n\t\t_, privateKey, err := ed25519.GenerateKey(rand.Reader)\n\t\treturn privateKey, err\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"unsupported key type: %v\", keyType)\n\t}\n}", "func NewCreateWithdrawalRequest(server string, body CreateWithdrawalJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewCreateWithdrawalRequestWithBody(server, \"application/json\", bodyReader)\n}", "func NewGateway(opts ...GatewayOption) *Gateway {\n\tif len(opts) == 0 {\n\t\topts = append(opts, WithDefault())\n\t}\n\n\tgateway := &Gateway{\n\t\tOptions: []grpc.ServerOption{\n\t\t\tKeepaliveOption,\n\t\t},\n\t}\n\n\tfor _, op := range opts {\n\t\top.Apply(gateway)\n\t}\n\n\tgateway.Server = grpc.NewServer(gateway.Options...)\n\treturn gateway\n}", "func NewGetPrivateOrderstateParamsWithTimeout(timeout time.Duration) *GetPrivateOrderstateParams {\n\tvar ()\n\treturn &GetPrivateOrderstateParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "func NewTemplateParameter()(*TemplateParameter) {\n m := &TemplateParameter{\n }\n m.backingStore = ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStoreFactoryInstance();\n m.SetAdditionalData(make(map[string]any))\n return m\n}", "func NewGetParams() *GetParams {\n\tvar (\n\t\tdeviceOSDefault = string(\"Android 9\")\n\t\tsendToEmailDefault = string(\"no\")\n\t)\n\treturn &GetParams{\n\t\tDeviceOS: &deviceOSDefault,\n\t\tSendToEmail: &sendToEmailDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (c *client) newRequest(ctx context.Context, method string, svc service, input Marshaler) (*http.Request, error) {\n\tparamsMap, err := input.MarshalMap()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar svcPath string\n\tswitch svc {\n\tcase servicePayByPrime:\n\t\tsvcPath = payByPrimePath\n\tcase serviceRecord:\n\t\tsvcPath = recordPath\n\tcase serviceRefund:\n\t\tsvcPath = refundPath\n\t}\n\n\tu, _ := url.Parse(svcPath)\n\tbase, _ := url.Parse(c.url)\n\tpath := base.ResolveReference(u).String()\n\n\tparamsMap[\"partner_key\"] = c.partnerKey\n\tbody, _ := json.Marshal(paramsMap)\n\treq, err := http.NewRequestWithContext(ctx, method, path, bytes.NewBuffer(body))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot create a TapPay request: %v\", err)\n\t}\n\treq.Header.Add(\"x-api-key\", c.partnerKey)\n\treq.Header.Add(\"Content-Type\", \"application/json\")\n\treturn req, nil\n}", "func FromParameters(parameters map[string]interface{}) (*Driver, error) {\n\taccessKey := parameters[\"accesskey\"]\n\tif accessKey == nil {\n\t\taccessKey = \"\"\n\t}\n\tsecretKey := parameters[\"secretkey\"]\n\tif secretKey == nil {\n\t\tsecretKey = \"\"\n\t}\n\n\tbucket := parameters[\"bucket\"]\n\tif bucket == nil || fmt.Sprint(bucket) == \"\" {\n\t\treturn nil, fmt.Errorf(\"No bucket parameter provided\")\n\t}\n\n\tendpoint := parameters[\"endpoint\"]\n\tif endpoint == nil || fmt.Sprint(endpoint) == \"\" {\n\t\treturn nil, fmt.Errorf(\"No endpoint parameter provided\")\n\t}\n\n\tregion := \"\"\n\tregionName := parameters[\"region\"]\n\tif regionName == nil || fmt.Sprint(regionName) == \"\" {\n\t\treturn nil, fmt.Errorf(\"No region parameter provided\")\n\t} else {\n\t\tregionString, ok := regionName.(string)\n\t\tif !ok {\n\t\t\treturn nil, fmt.Errorf(\"Invalid value for region parameter: %v\", regionName)\n\t\t}\n\n\t\tif _, ok = validRegions[regionString]; !ok {\n\t\t\treturn nil, fmt.Errorf(\"Invalid value for region parameter: %v\", regionName)\n\t\t}\n\t\tregion = regionString\n\t}\n\n\tsecureBool := false\n\tsecure, ok := parameters[\"secure\"]\n\tswitch secure := secure.(type) {\n\tcase string:\n\t\tb, err := strconv.ParseBool(secure)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"The secure parameter should be a boolean\")\n\t\t}\n\t\tsecureBool = b\n\tcase bool:\n\t\tsecureBool = secure\n\tcase nil:\n\t\t// do nothing\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"The secure parameter should be a boolean\")\n\t}\n\n\tv2 := obs.SignatureV2\n\tv2auth := parameters[\"v2auth\"]\n\tswitch v2auth := v2auth.(type) {\n\tcase string:\n\t\tv2 = obs.SignatureType(v2auth)\n\t\tif !(v2 == obs.SignatureV2 || v2 == obs.SignatureV4) {\n\t\t\treturn nil, fmt.Errorf(\"The v2auth parameter should be a SignatureType\")\n\t\t}\n\tcase obs.SignatureType:\n\t\tv2 = v2auth\n\tcase nil:\n\t\t// do nothing\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"The v2auth parameter should be a SignatureType\")\n\t}\n\n\tchunkSize, err := getParameterAsInt64(parameters, \"chunksize\", defaultChunkSize, minChunkSize, maxChunkSize)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tmultipartCopyChunkSize, err := getParameterAsInt64(parameters, \"multipartcopychunksize\", defaultMultipartCopyChunkSize, minChunkSize, maxChunkSize)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tmultipartCopyMaxConcurrency, err := getParameterAsInt64(parameters, \"multipartcopymaxconcurrency\", defaultMultipartCopyMaxConcurrency, 1, math.MaxInt64)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tmultipartCopyThresholdSize, err := getParameterAsInt64(parameters, \"multipartcopythresholdsize\", defaultMultipartCopyThresholdSize, 0, maxChunkSize)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\trootDirectory, ok := parameters[\"rootdirectory\"]\n\tif !ok {\n\t\trootDirectory = \"\"\n\t}\n\n\tstorageClass := obs.StorageClassStandard\n\tstorageClassParam := parameters[\"storageclass\"]\n\tif storageClassParam != nil {\n\t\tstorageClassValue, ok := storageClassParam.(obs.StorageClassType)\n\t\tif !ok {\n\t\t\treturn nil, fmt.Errorf(\"The storageclass parameter must be one of %v, %v invalid\",\n\t\t\t\t[]string{string(obs.StorageClassStandard), string(obs.StorageClassWarm)}, storageClassParam)\n\t\t}\n\t\t// All valid storage class parameters are UPPERCASE, so be a bit more flexible here\n\t\tstorageClassValue = storageClassValue\n\t\tif storageClassValue != noStorageClass &&\n\t\t\tstorageClassValue != obs.StorageClassStandard &&\n\t\t\tstorageClassValue != obs.StorageClassWarm {\n\t\t\treturn nil, fmt.Errorf(\"The storageclass parameter must be one of %v, %v invalid\",\n\t\t\t\t[]string{string(noStorageClass), string(obs.StorageClassStandard), string(obs.StorageClassWarm)}, storageClassParam)\n\t\t}\n\t\tstorageClass = obs.StorageClassType(storageClassValue)\n\t}\n\n\tobjectACL := obs.AclPrivate\n\tobjectACLParam := parameters[\"objectacl\"]\n\tif objectACLParam != nil {\n\t\tobjectACLValue, ok := objectACLParam.(obs.AclType)\n\t\tif !ok {\n\t\t\treturn nil, fmt.Errorf(\"Invalid value for objectacl parameter: %v\", objectACLParam)\n\t\t}\n\t\tif _, ok = validObjectACLs[objectACLValue]; !ok {\n\t\t\treturn nil, fmt.Errorf(\"Invalid value for objectacl parameter: %v\", objectACLParam)\n\t\t}\n\t\tobjectACL = objectACLValue\n\t}\n\n\t//encryptBool := false\n\t//encrypt := parameters[\"encrypt\"]\n\t//switch encrypt := encrypt.(type) {\n\t//case string:\n\t//\tb, err := strconv.ParseBool(encrypt)\n\t//\tif err != nil {\n\t//\t\treturn nil, fmt.Errorf(\"The encrypt parameter should be a boolean\")\n\t//\t}\n\t//\tencryptBool = b\n\t//case bool:\n\t//\tencryptBool = encrypt\n\t//case nil:\n\t//\t// do nothing\n\t//default:\n\t//\treturn nil, fmt.Errorf(\"The encrypt parameter should be a boolean\")\n\t//}\n\t//\n\t//keyID := parameters[\"keyid\"]\n\t//if keyID == nil {\n\t//\tkeyID = \"\"\n\t//}\n\t//\n\t//securityToken := \"\"\n\n\tpathStyleBool := false\n\tpathStyle := parameters[\"pathstyle\"]\n\tswitch pathStyle := pathStyle.(type) {\n\tcase string:\n\t\tb, err := strconv.ParseBool(pathStyle)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"The pathStyle parameter should be a boolean\")\n\t\t}\n\t\tpathStyleBool = b\n\tcase bool:\n\t\tpathStyleBool = pathStyle\n\tcase nil:\n\t\t// do nothing\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"The pathStyle parameter should be a boolean\")\n\t}\n\n\tparams := DriverParameters{\n\t\tfmt.Sprint(accessKey),\n\t\tfmt.Sprint(secretKey),\n\t\tfmt.Sprint(bucket),\n\t\tregion,\n\t\tfmt.Sprint(endpoint),\n\t\tsecureBool,\n\t\tv2,\n\t\tchunkSize,\n\t\tmultipartCopyChunkSize,\n\t\tmultipartCopyMaxConcurrency,\n\t\tmultipartCopyThresholdSize,\n\t\tfmt.Sprint(rootDirectory),\n\t\tstorageClass,\n\t\tobjectACL,\n\t\t//encryptBool,\n\t\t//fmt.Sprint(keyID),\n\t\t//fmt.Sprint(securityToken),\n\t\tpathStyleBool,\n\t}\n\n\treturn New(params)\n}", "func NewGateway(shutdownCtx context.Context, db *db.Node, networkCert *shared.CertInfo, stateFunc func() *state.State, options ...Option) (*Gateway, error) {\n\tctx, cancel := context.WithCancel(context.Background())\n\n\to := newOptions()\n\tfor _, option := range options {\n\t\toption(o)\n\t}\n\n\tgateway := &Gateway{\n\t\tshutdownCtx: shutdownCtx,\n\t\tdb: db,\n\t\tnetworkCert: networkCert,\n\t\toptions: o,\n\t\tctx: ctx,\n\t\tcancel: cancel,\n\t\tupgradeCh: make(chan struct{}),\n\t\tacceptCh: make(chan net.Conn),\n\t\tstore: &dqliteNodeStore{},\n\t\tstate: stateFunc,\n\t}\n\n\terr := gateway.init(false)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn gateway, nil\n}", "func NewSendMessagesByPinUsingPOSTRequestWithoutParam() *SendMessagesByPinUsingPOSTRequest {\n\n return &SendMessagesByPinUsingPOSTRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/sendMessagesByPin\",\n Method: \"POST\",\n Header: nil,\n Version: \"v1\",\n },\n }\n}", "func newProvisioner(baseCtx context.Context, cl *restClient, callTimeout time.Duration) mode.Provisioner {\n\treturn provisioner{cl: cl, baseCtx: baseCtx, callTimeout: callTimeout}\n}", "func NewCreateInstancePoolRequest(server string, body CreateInstancePoolJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewCreateInstancePoolRequestWithBody(server, \"application/json\", bodyReader)\n}" ]
[ "0.60475206", "0.58548564", "0.582884", "0.582884", "0.575915", "0.56914914", "0.56914914", "0.56657785", "0.5643633", "0.5585812", "0.5578164", "0.5560623", "0.5552979", "0.5519373", "0.5506753", "0.5499604", "0.54799944", "0.544261", "0.5390589", "0.5367524", "0.5346719", "0.53222656", "0.5252843", "0.52316034", "0.52315325", "0.52285606", "0.5212244", "0.5198763", "0.5144032", "0.51335144", "0.51331687", "0.51303965", "0.51144075", "0.51041406", "0.5082801", "0.50781053", "0.5076139", "0.50721157", "0.50681067", "0.50673395", "0.50429344", "0.50387645", "0.5033254", "0.5028486", "0.5028244", "0.50204563", "0.50171673", "0.5012654", "0.5008373", "0.5004761", "0.49757493", "0.4972296", "0.49705198", "0.49629754", "0.49542972", "0.49539012", "0.49533486", "0.4950461", "0.4942744", "0.49417955", "0.49396822", "0.4908809", "0.49075502", "0.49038824", "0.49022195", "0.49011043", "0.489462", "0.4892074", "0.48840582", "0.4881559", "0.48774055", "0.4877216", "0.48650327", "0.4862632", "0.48573428", "0.48572683", "0.48534852", "0.48507005", "0.48374942", "0.4833533", "0.48334998", "0.48289257", "0.48241624", "0.48160145", "0.4810193", "0.4808648", "0.48062837", "0.4800991", "0.48005238", "0.47975516", "0.47914562", "0.4790982", "0.47889256", "0.4783445", "0.47788915", "0.47734994", "0.4768838", "0.47601575", "0.47599664", "0.47595444" ]
0.74867165
0
Creates a private gateway
func (s *VPCService) CreatePrivateGateway(p *CreatePrivateGatewayParams) (*CreatePrivateGatewayResponse, error) { resp, err := s.cs.newRequest("createPrivateGateway", p.toURLValues()) if err != nil { return nil, err } var r CreatePrivateGatewayResponse if err := json.Unmarshal(resp, &r); err != nil { return nil, err } // If we have a async client, we need to wait for the async result if s.cs.async { b, err := s.cs.GetAsyncJobResult(r.JobID, s.cs.timeout) if err != nil { if err == AsyncTimeoutErr { return &r, err } return nil, err } b, err = getRawValue(b) if err != nil { return nil, err } if err := json.Unmarshal(b, &r); err != nil { return nil, err } } return &r, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func newGateway(ctx context.Context, cl client.Client, ns, name, gc, k, v string) error {\n\troutes := &metav1.LabelSelector{\n\t\tMatchLabels: map[string]string{k: v},\n\t}\n\thttp := gatewayv1alpha1.Listener{\n\t\tPort: gatewayv1alpha1.PortNumber(int32(80)),\n\t\tProtocol: gatewayv1alpha1.HTTPProtocolType,\n\t\tRoutes: gatewayv1alpha1.RouteBindingSelector{\n\t\t\tKind: \"HTTPRoute\",\n\t\t\tSelector: routes,\n\t\t},\n\t}\n\tgw := &gatewayv1alpha1.Gateway{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tNamespace: ns,\n\t\t\tName: name,\n\t\t},\n\t\tSpec: gatewayv1alpha1.GatewaySpec{\n\t\t\tGatewayClassName: gc,\n\t\t\tListeners: []gatewayv1alpha1.Listener{http},\n\t\t},\n\t}\n\tif err := cl.Create(ctx, gw); err != nil {\n\t\treturn fmt.Errorf(\"failed to create gateway %s/%s: %v\", ns, name, err)\n\t}\n\treturn nil\n}", "func New(c *drycc.Client, appID string, name string, port int, protocol string) error {\n\tu := fmt.Sprintf(\"/v2/apps/%s/gateways/\", appID)\n\n\treq := api.GatewayCreateRequest{Name: name, Port: port, Protocol: protocol}\n\n\tbody, err := json.Marshal(req)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tres, reqErr := c.Request(\"POST\", u, body)\n\tif reqErr != nil && !drycc.IsErrAPIMismatch(reqErr) {\n\t\treturn reqErr\n\t}\n\tdefer res.Body.Close()\n\n\treturn reqErr\n}", "func NewGateway(session *discordgo.Session) *Gateway {\n\treturn &Gateway{\n\t\tSession: session,\n\t\tgroup: &singleflight.Group{},\n\t}\n}", "func createGatewayDevice(hwID *protos.AccessGatewayID, challengeKey *protos.ChallengeKey) (*models.GatewayDevice, error) {\n\tdecodedKey, err := base64.StdEncoding.DecodeString(string(challengeKey.Key))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tchallengeKeyBase64 := strfmt.Base64(decodedKey)\n\tgatewayDevice := &models.GatewayDevice{\n\t\tHardwareID: hwID.Id,\n\t\tKey: &models.ChallengeKey{KeyType: challengeKey.KeyType.String(), Key: &challengeKeyBase64},\n\t}\n\treturn gatewayDevice, nil\n}", "func TestNewGateway(t *testing.T) {\n\tcfg := defaultConfig()\n\n\tgateway := NewGateway(clientApi)\n\tassert.Equal(t, gateway.address, cfg.Address)\n\tassert.Equal(t, gateway.server.Name, cfg.Name)\n\tassert.Equal(t, gateway.server.GetOnly, cfg.GetOnly)\n\tassert.Equal(t, gateway.server.LogAllErrors, cfg.LogAllError)\n\tassert.Equal(t, gateway.cors.Enable, cfg.CORs.Enable)\n\n\tgo func() {\n\t\terr := gateway.Start()\n\t\tassert.Nil(t, err, err)\n\t}()\n\n\ttime.Sleep(5 * time.Second)\n\terr := gateway.Stop()\n\tassert.Nil(t, err, err)\n}", "func NewGateway(\n\taddr ma.Multiaddr,\n\tapiAddr ma.Multiaddr,\n\tapiToken string,\n\tbucketDomain string,\n\tcollections *collections.Collections,\n\tsessionBus *broadcast.Broadcaster,\n\tdebug bool,\n) (*Gateway, error) {\n\tif debug {\n\t\tif err := util.SetLogLevels(map[string]logging.LogLevel{\n\t\t\t\"gateway\": logging.LevelDebug,\n\t\t}); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tapiTarget, err := util.TCPAddrFromMultiAddr(apiAddr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc, err := client.NewClient(apiTarget, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Gateway{\n\t\taddr: addr,\n\t\tbucketDomain: bucketDomain,\n\t\tcollections: collections,\n\t\tclient: c,\n\t\tclientAuth: client.Auth{Token: apiToken},\n\t\tsessionBus: sessionBus,\n\t}, nil\n}", "func (s *Stack) CreateGateway(req abstract.GatewayRequest, sizing *abstract.SizingRequirements) (*abstract.Host, *userdata.Content, fail.Error) {\n\tgwname := strings.Split(req.Name, \".\")[0] // req.Name may contain a FQDN...\n\tif gwname == \"\" {\n\t\tgwname = \"gw-\" + req.Network.Name\n\t}\n\n\thostReq := abstract.HostRequest{\n\t\tImageID: req.ImageID,\n\t\tKeyPair: req.KeyPair,\n\t\tHostName: req.Name,\n\t\tResourceName: gwname,\n\t\tTemplateID: req.TemplateID,\n\t\tNetworks: []*abstract.Network{req.Network},\n\t\tPublicIP: true,\n\t}\n\n\tif sizing != nil && sizing.MinDiskSize > 0 {\n\t\thostReq.DiskSize = sizing.MinDiskSize\n\t}\n\n\thost, userData, err := s.CreateHost(hostReq)\n\tif err != nil {\n\t\tswitch err.(type) {\n\t\tcase fail.ErrInvalidRequest:\n\t\t\treturn nil, userData, err\n\t\tdefault:\n\t\t\treturn nil, userData, fail.Errorf(fmt.Sprintf(\"error creating gateway : %s\", err), err)\n\t\t}\n\t}\n\n\t// Updates Host Property propsv1.HostSizing\n\terr = host.Properties.LockForWrite(hostproperty.SizingV1).ThenUse(\n\t\tfunc(clonable data.Clonable) error {\n\t\t\thostSizingV1 := clonable.(*propsv1.HostSizing)\n\t\t\thostSizingV1.Template = req.TemplateID\n\t\t\treturn nil\n\t\t},\n\t)\n\tif err != nil {\n\t\treturn nil, userData, err\n\t}\n\n\treturn host, userData, err\n}", "func (m *modelOneDotOne) NewGateway(i int) NodeRunnerInterface {\n\tgwy := &gatewayOneDotOne{NodeRunnerBase{RunnerBase: RunnerBase{id: i}, strtype: GWY}}\n\tgwy.init(config.numServers)\n\treturn gwy\n}", "func NewGateway(shutdownCtx context.Context, db *db.Node, networkCert *shared.CertInfo, stateFunc func() *state.State, options ...Option) (*Gateway, error) {\n\tctx, cancel := context.WithCancel(context.Background())\n\n\to := newOptions()\n\tfor _, option := range options {\n\t\toption(o)\n\t}\n\n\tgateway := &Gateway{\n\t\tshutdownCtx: shutdownCtx,\n\t\tdb: db,\n\t\tnetworkCert: networkCert,\n\t\toptions: o,\n\t\tctx: ctx,\n\t\tcancel: cancel,\n\t\tupgradeCh: make(chan struct{}),\n\t\tacceptCh: make(chan net.Conn),\n\t\tstore: &dqliteNodeStore{},\n\t\tstate: stateFunc,\n\t}\n\n\terr := gateway.init(false)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn gateway, nil\n}", "func newGateway(addr Address, tlsConfig *TLSConfig, sslCerts *SSLCertificate) (*RESTGateway, error) {\n\tgRPCSrvAddr := fmt.Sprintf(\":%d\", addr.GRPCPort)\n\tgwAddr := fmt.Sprintf(\":%d\", addr.HTTPPort)\n\n\tlog.Printf(\"creating gateway on %s (http), forwarding to %s (grpc)\", gwAddr, gRPCSrvAddr)\n\n\tmux := http.NewServeMux()\n\t// gwmux := runtime.NewServeMux(runtime.WithMarshalerOption(runtime.MIMEWildcard, &runtime.JSONPb{OrigName:false}))\n\tgwmux := runtime.NewServeMux(runtime.WithIncomingHeaderMatcher(CustomMatcher), runtime.WithOutgoingHeaderMatcher(CustomOutMatcher))\n\n\tmux.Handle(\"/\", gwmux)\n\n\tdialOpts := []grpc.DialOption{grpc.WithInsecure()}\n\thttpSrv := &http.Server{Addr: gwAddr, Handler: mux}\n\n\tlistener, err := net.Listen(\"tcp\", gwAddr)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to listen %s: %v\", gwAddr, err)\n\t}\n\n\tif tlsConfig != nil {\n\t\tlog.Printf(\"enabling TLS/SSL for HTTP gateway\")\n\n\t\tdialOpts = sslDial(tlsConfig.ServerName, sslCerts)\n\t\thttpSrv.TLSConfig = &tls.Config{\n\t\t\tCertificates: []tls.Certificate{sslCerts.Certificate},\n\t\t\tNextProtos: []string{\"h2\"},\n\t\t\tRootCAs: sslCerts.CertPool,\n\t\t}\n\n\t\t// create listener with TLS credentials.\n\t\tlistener = tls.NewListener(listener, httpSrv.TLSConfig)\n\t}\n\n\treturn &RESTGateway{\n\t\tHTTPServer: httpSrv,\n\t\tListener: listener,\n\t\tServeMux: gwmux,\n\t\tHTTPMux: mux,\n\t\tDialOptions: dialOpts,\n\t\tEndpoint: gRPCSrvAddr,\n\t}, nil\n}", "func NewGateway(n *core.OpenBazaarNode, authCookie http.Cookie, l net.Listener, config schema.APIConfig, logger logging.Backend, options ...corehttp.ServeOption) (*Gateway, error) {\n\n\tlog.SetBackend(logging.AddModuleLevel(logger))\n\ttopMux := http.NewServeMux()\n\n\tjsonAPI := newJSONAPIHandler(n, authCookie, config)\n\twsAPI := newWSAPIHandler(n, authCookie, config)\n\tn.Broadcast = manageNotifications(n, wsAPI.h.Broadcast)\n\n\ttopMux.Handle(\"/ob/\", jsonAPI)\n\ttopMux.Handle(\"/wallet/\", jsonAPI)\n\ttopMux.Handle(\"/ws\", wsAPI)\n\n\tvar (\n\t\terr error\n\t\tmux = topMux\n\t)\n\tfor _, option := range options {\n\t\tmux, err = option(n.IpfsNode, l, mux)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn &Gateway{\n\t\tlistener: l,\n\t\thandler: topMux,\n\t\tconfig: config,\n\t}, nil\n}", "func (m *modelThree) NewGateway(i int) NodeRunnerInterface {\n\tgwy := &gatewayThree{\n\t\tNodeRunnerBase: NodeRunnerBase{RunnerBase: RunnerBase{id: i}, strtype: GWY},\n\t\twaitingResponse: nil,\n\t}\n\tgwy.init(config.numServers)\n\tl := cap(gwy.eps)\n\tgwy.waitingResponse = make([]int64, l)\n\treturn gwy\n}", "func New(c *client.Client, u *client.UserConfig) Gateway {\n\treturn &gateway{\n\t\t*gw.NewHTTPGateway(c, u),\n\t}\n}", "func (s *Handler) CreateGateway(ctx context.Context, req *api.CreateGatewayRequest) (*api.Gateway, error) {\n\tparams := daemon.CreateGatewayParams{\n\t\tTargetURI: req.TargetUri,\n\t\tTargetUser: req.TargetUser,\n\t\tTargetSubresourceName: req.TargetSubresourceName,\n\t\tLocalPort: req.LocalPort,\n\t}\n\n\tgateway, err := s.DaemonService.CreateGateway(ctx, params)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\tapiGateway, err := s.newAPIGateway(gateway)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\treturn apiGateway, nil\n}", "func (m *modelFour) NewGateway(i int) NodeRunnerInterface {\n\tgwy := &gatewayFour{NodeRunnerBase{RunnerBase: RunnerBase{id: i}, strtype: GWY}, 0}\n\tgwy.init(config.numServers)\n\tgwy.initios()\n\treturn gwy\n}", "func (ps *PgStore) CreateGateway(ctx context.Context, gw *Gateway) error {\n\tif err := gw.Validate(); err != nil {\n\t\treturn errors.Wrap(err, \"validate error\")\n\t}\n\n\tgw.CreatedAt = time.Now()\n\n\tgw.UpdatedAt = time.Now()\n\n\t_, err := ps.db.ExecContext(ctx, `\n\t\tinsert into gateway (\n\t\t\tmac,\n\t\t\tcreated_at,\n\t\t\tupdated_at,\n\t\t\tname,\n\t\t\tdescription,\n\t\t\torganization_id,\n\t\t\tping,\n\t\t\tlast_ping_id,\n\t\t\tlast_ping_sent_at,\n\t\t\tnetwork_server_id,\n\t\t\tgateway_profile_id,\n\t\t\tfirst_seen_at,\n\t\t\tlast_seen_at,\n\t\t\tlatitude,\n\t\t\tlongitude,\n\t\t\taltitude,\n\t\t\ttags,\n\t\t\tmetadata,\n\t\t model,\n\t\t first_heartbeat,\n\t\t last_heartbeat,\n\t\t config,\n\t\t os_version,\n\t\t\tsn\n\t\t) values ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19,\n\t\t $20, $21, $22, $23, $24)`,\n\t\tgw.MAC[:],\n\t\tgw.CreatedAt,\n\t\tgw.UpdatedAt,\n\t\tgw.Name,\n\t\tgw.Description,\n\t\tgw.OrganizationID,\n\t\tgw.Ping,\n\t\tgw.LastPingID,\n\t\tgw.LastPingSentAt,\n\t\tgw.NetworkServerID,\n\t\tgw.GatewayProfileID,\n\t\tgw.FirstSeenAt,\n\t\tgw.LastSeenAt,\n\t\tgw.Latitude,\n\t\tgw.Longitude,\n\t\tgw.Altitude,\n\t\tgw.Tags,\n\t\tgw.Metadata,\n\t\tgw.Model,\n\t\tgw.FirstHeartbeat,\n\t\tgw.LastHeartbeat,\n\t\tgw.Config,\n\t\tgw.OsVersion,\n\t\tgw.SerialNumber)\n\tif err != nil {\n\t\treturn handlePSQLError(Insert, err, \"insert error\")\n\t}\n\n\tlog.WithFields(log.Fields{\n\t\t\"id\": gw.MAC,\n\t\t\"name\": gw.Name,\n\t\t\"ctx_id\": ctx.Value(logging.ContextIDKey),\n\t}).Info(\"gateway created\")\n\treturn nil\n}", "func NewGateway(nbNode int, init model.Init) *LorhammerGateway {\n\tparsedTime, _ := time.ParseDuration(init.ReceiveTimeoutTime)\n\tgateway := &LorhammerGateway{\n\t\tNsAddress: init.NsAddress,\n\t\tMacAddress: tools.Random8Bytes(),\n\t\tReceiveTimeoutTime: parsedTime,\n\t\tPayloadsReplayMaxLaps: init.NbScenarioReplayLaps,\n\t}\n\n\tif init.RxpkDate > 0 {\n\t\tgateway.RxpkDate = init.RxpkDate\n\t}\n\tfor i := 0; i < nbNode; i++ {\n\t\tgateway.Nodes = append(gateway.Nodes, newNode(init.Nwskey, init.AppsKey, init.Description, init.Payloads, init.RandomPayloads))\n\t}\n\n\treturn gateway\n}", "func NewGateway(options ...Option) (*http.ServeMux, error) {\n\t// configure gateway defaults\n\tg := gateway{\n\t\tserverAddress: DefaultServerAddress,\n\t\tendpoints: make(map[string][]registerFunc),\n\t\tserverDialOptions: []grpc.DialOption{grpc.WithInsecure(), grpc.WithUnaryInterceptor(ClientUnaryInterceptor)},\n\t\tmux: http.NewServeMux(),\n\t}\n\t// apply functional options\n\tfor _, opt := range options {\n\t\topt(&g)\n\t}\n\treturn g.registerEndpoints()\n}", "func NewGateway(\n\tcf *HTTPConfig, ct *store.CXO,\n\tbs *store.BoardSaver, us *store.UserSaver, qs *msg.QueueSaver,\n\tq chan int,\n) *Gateway {\n\tg := &Gateway{config: cf, container: ct, boardSaver: bs, userSaver: us, queueSaver: qs, quitChan: q}\n\tg.Stats.Gateway = g\n\tg.Connections.Gateway = g\n\tg.Subscriptions.Gateway = g\n\tg.Users.Gateway = g\n\tg.Users.Masters.Gateway = g\n\tg.Users.Masters.Current.Gateway = g\n\tg.Users.Votes.Gateway = g\n\tg.Boards.Gateway = g\n\tg.Boards.Meta.Gateway = g\n\tg.Boards.Meta.SubmissionAddresses.Gateway = g\n\tg.Boards.Page.Gateway = g\n\tg.Threads.Gateway = g\n\tg.Threads.Page.Gateway = g\n\tg.Threads.Votes.Gateway = g\n\tg.Posts.Gateway = g\n\tg.Posts.Votes.Gateway = g\n\tg.Tests.Gateway = g\n\treturn g\n}", "func NewGateway(c GatewayConfig, d *Daemon) *Gateway {\n\treturn &Gateway{\n\t\tConfig: c,\n\t\td: d,\n\t\tv: d.visor,\n\t\trequests: make(chan strand.Request, c.BufferSize),\n\t\tquit: make(chan struct{}),\n\t}\n}", "func createTestGatewayCreateCourse() http.Handler {\n\tr := mux.NewRouter()\n\tr.HandleFunc(\"/didattica-mobile/api/v1.0/courses\", microservice.CreateCourse).Methods(http.MethodPost)\n\treturn r\n}", "func (k Keeper) CreateGateway(ctx sdk.Context, msg types.MsgCreateGateway) (sdk.Tags, sdk.Error) {\n\t// check if the moniker already exists\n\tif k.HasGateway(ctx, msg.Moniker) {\n\t\treturn nil, types.ErrGatewayAlreadyExists(k.codespace, fmt.Sprintf(\"the moniker already exists:%s\", msg.Moniker))\n\t}\n\n\tvar gateway = types.Gateway{\n\t\tOwner: msg.Owner,\n\t\tMoniker: msg.Moniker,\n\t\tIdentity: msg.Identity,\n\t\tDetails: msg.Details,\n\t\tWebsite: msg.Website,\n\t}\n\n\t// set the gateway and related keys\n\tk.SetGateway(ctx, gateway)\n\tk.SetOwnerGateway(ctx, msg.Owner, msg.Moniker)\n\n\t// TODO\n\tcreateTags := sdk.NewTags(\n\t\t\"moniker\", []byte(msg.Moniker),\n\t)\n\n\treturn createTags, nil\n}", "func NewGateway(ctx *pulumi.Context,\n\tname string, args *GatewayArgs, opts ...pulumi.ResourceOption) (*Gateway, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.ResourceGroupName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ResourceGroupName'\")\n\t}\n\tif args.ServiceName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ServiceName'\")\n\t}\n\taliases := pulumi.Aliases([]pulumi.Alias{\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:apimanagement/v20191201:Gateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:apimanagement:Gateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:apimanagement:Gateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:apimanagement/v20191201preview:Gateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:apimanagement/v20191201preview:Gateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:apimanagement/v20200601preview:Gateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:apimanagement/v20200601preview:Gateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:apimanagement/v20201201:Gateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:apimanagement/v20201201:Gateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:apimanagement/v20210101preview:Gateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:apimanagement/v20210101preview:Gateway\"),\n\t\t},\n\t})\n\topts = append(opts, aliases)\n\tvar resource Gateway\n\terr := ctx.RegisterResource(\"azure-native:apimanagement/v20191201:Gateway\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func NewGateway(opts ...GatewayOption) *Gateway {\n\tif len(opts) == 0 {\n\t\topts = append(opts, WithDefault())\n\t}\n\n\tgateway := &Gateway{\n\t\tOptions: []grpc.ServerOption{\n\t\t\tKeepaliveOption,\n\t\t},\n\t}\n\n\tfor _, op := range opts {\n\t\top.Apply(gateway)\n\t}\n\n\tgateway.Server = grpc.NewServer(gateway.Options...)\n\treturn gateway\n}", "func (m *modelB) NewGateway(i int) NodeRunnerInterface {\n\tgwy := NewGatewayCommon(i, mB.putpipeline)\n\tmaxval := int64(configNetwork.sizeFrame*8) + int64(configNetwork.sizeControlPDU*8)\n\tgwy.rb = NewRateBucket(maxval, configNetwork.linkbps, maxval)\n\trgwy := &gatewayB{GatewayCommon: *gwy}\n\trgwy.rptr = rgwy\n\n\treturn rgwy\n}", "func (network Network) CreatePrivateKey() (*btcutil.WIF, error) {\n\tsecret, err := btcec.NewPrivateKey(btcec.S256())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn btcutil.NewWIF(secret, network.GetNetworkParams(), true)\n}", "func NewGateway() Gateway {\n\treturn &client{}\n}", "func (a Gateways) AddGateway(processId string, gatewayCreateItem GatewayCreateItem) (*GatewayItem, *APIResponse, error) {\n\n\tvar httpMethod = \"Post\"\n\t// create path and map variables\n\tpath := a.Configuration.BasePath + \"/processes/{process_id}/gateways\"\n\tpath = strings.Replace(path, \"{\"+\"process_id\"+\"}\", fmt.Sprintf(\"%v\", processId), -1)\n\n\n\theaderParams := make(map[string]string)\n\tqueryParams := url.Values{}\n\tformParams := make(map[string]string)\n\tvar postBody interface{}\n\tvar fileName string\n\tvar fileBytes []byte\n\t// authentication '(PasswordGrant)' required\n\t// oauth required\n\tif a.Configuration.AccessToken != \"\"{\n\t\theaderParams[\"Authorization\"] = \"Bearer \" + a.Configuration.AccessToken\n\t}\n\t// add default headers if any\n\tfor key := range a.Configuration.DefaultHeader {\n\t\theaderParams[key] = a.Configuration.DefaultHeader[key]\n\t}\n\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{ \"application/vnd.api+json\", }\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := a.Configuration.APIClient.SelectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\theaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"application/vnd.api+json\",\n\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := a.Configuration.APIClient.SelectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\theaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\t// body params\n\tpostBody = &gatewayCreateItem\n\n\tvar successPayload = new(GatewayItem)\n\thttpResponse, err := a.Configuration.APIClient.CallAPI(path, httpMethod, postBody, headerParams, queryParams, formParams, fileName, fileBytes)\n\tif err != nil {\n\t\treturn successPayload, NewAPIResponse(httpResponse.RawResponse), err\n\t}\n\terr = json.Unmarshal(httpResponse.Body(), &successPayload)\n\treturn successPayload, NewAPIResponse(httpResponse.RawResponse), err\n}", "func NewGateway(ctx *pulumi.Context,\n\tname string, args *GatewayArgs, opts ...pulumi.ResourceOption) (*Gateway, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.GatewayName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'GatewayName'\")\n\t}\n\tif args.Location == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Location'\")\n\t}\n\tif args.StorageBundleId == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'StorageBundleId'\")\n\t}\n\tif args.Type == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Type'\")\n\t}\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource Gateway\n\terr := ctx.RegisterResource(\"alicloud:cloudstoragegateway/gateway:Gateway\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (tester *ServiceTester) CreateGW(t *testing.T, subnet *abstract.Subnet) fail.Error {\n\tctx := context.Background()\n\ttpls, xerr := tester.Service.ListTemplatesBySizing(ctx, abstract.HostSizingRequirements{\n\t\tMinCores: 1,\n\t\tMinRAMSize: 1,\n\t\tMinDiskSize: 10,\n\t}, false)\n\tassert.Nil(t, xerr)\n\timg, xerr := tester.Service.SearchImage(ctx, \"Ubuntu 20.04\")\n\tassert.Nil(t, xerr)\n\tgwRequest := abstract.HostRequest{\n\t\tImageID: img.ID,\n\t\tTemplateID: tpls[0].ID,\n\t\tSubnets: []*abstract.Subnet{subnet},\n\t\tResourceName: \"gw-\" + subnet.Name,\n\t\tIsGateway: true,\n\t}\n\tgw, _, xerr := tester.Service.CreateHost(context.Background(), gwRequest, nil)\n\tif xerr != nil {\n\t\treturn xerr\n\t}\n\tsubnet.GatewayIDs = []string{gw.Core.ID}\n\treturn nil\n}", "func (c *ovnClient) CreateGatewayAcl(pgName, gateway string) error {\n\tacls := make([]*ovnnb.ACL, 0)\n\n\tfor _, gw := range strings.Split(gateway, \",\") {\n\t\tprotocol := util.CheckProtocol(gw)\n\t\tipSuffix := \"ip4\"\n\t\tif protocol == kubeovnv1.ProtocolIPv6 {\n\t\t\tipSuffix = \"ip6\"\n\t\t}\n\n\t\tallowIngressAcl, err := c.newAcl(pgName, ovnnb.ACLDirectionToLport, util.IngressAllowPriority, fmt.Sprintf(\"%s.src == %s\", ipSuffix, gw), ovnnb.ACLActionAllowRelated)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"new allow ingress acl for port group %s: %v\", pgName, err)\n\t\t}\n\n\t\tallowEgressAcl, err := c.newAcl(pgName, ovnnb.ACLDirectionFromLport, util.EgressAllowPriority, fmt.Sprintf(\"%s.dst == %s\", ipSuffix, gw), ovnnb.ACLActionAllowRelated)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"new allow egress acl for port group %s: %v\", pgName, err)\n\t\t}\n\n\t\tacls = append(acls, allowIngressAcl, allowEgressAcl)\n\t}\n\n\tif err := c.CreateAcls(pgName, portGroupKey, acls...); err != nil {\n\t\treturn fmt.Errorf(\"add gateway acls to port group %s: %v\", pgName, err)\n\t}\n\n\treturn nil\n}", "func New() (*Payway, error) {\n\n\t// get default gateway from configuration file\n\tprovider := conf.GetString(\"gateways.payments.default\")\n\n\tif provider == \"\" {\n\t\treturn nil, fmt.Errorf(\"No default payment gateway provided\")\n\t}\n\n\t// acquare read mutex\n\tmu.RLock()\n\n\tdefer mu.RUnlock()\n\n\t// fetch gateway from cache\n\tgateway, ok := gateways[provider]\n\n\tif !ok {\n\n\t\treturn nil, fmt.Errorf(\"Gateway not registered\")\n\t}\n\n\t// Init gateway\n\tif err := gateway.New(); err != nil {\n\n\t\treturn nil, err\n\t}\n\n\treturn &Payway{PayGateway: gateway}, nil\n}", "func (client StorageGatewayClient) createStorageGateway(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodPost, \"/storageGateways\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response CreateStorageGatewayResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "func newGatewayClass(ctx context.Context, cl client.Client, name string) error {\n\tgc := &gatewayv1alpha1.GatewayClass{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t},\n\t\tSpec: gatewayv1alpha1.GatewayClassSpec{\n\t\t\tController: name,\n\t\t},\n\t}\n\tif err := cl.Create(ctx, gc); err != nil {\n\t\treturn fmt.Errorf(\"failed to create gatewayclass %s: %v\", name, err)\n\t}\n\treturn nil\n}", "func (p *Pydio) NewGatewayLayer(creds auth.Credentials) (minio.ObjectLayer, error) {\n\to := &pydioObjects{}\n\to.Router = views.NewStandardRouter(views.RouterOptions{WatchRegistry: true, LogReadEvents: true, AuditEvent: true})\n\treturn o, nil\n}", "func createTunnel(cfg *SSHConfig) (*SSHTunnel, error) {\n\tf, err := CreateTempFileFromString(cfg.GatewayConfig.PrivateKey, 0400)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tlocalPort := cfg.LocalPort\n\tif localPort == 0 {\n\t\tlocalPort, err = getFreePort()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\toptions := \"-q -oServerAliveInterval=60 -oStrictHostKeyChecking=no -oUserKnownHostsFile=/dev/null -oPubkeyAuthentication=yes -oPasswordAuthentication=no\"\n\tcmdString := fmt.Sprintf(\"ssh -i %s -NL %d:%s:%d %s@%s %s -p %d\",\n\t\tf.Name(),\n\t\tlocalPort,\n\t\tcfg.Host,\n\t\tcfg.Port,\n\t\tcfg.GatewayConfig.User,\n\t\tcfg.GatewayConfig.Host,\n\t\toptions,\n\t\tcfg.GatewayConfig.Port,\n\t)\n\tcmd := exec.Command(\"sh\", \"-c\", cmdString)\n\terr = cmd.Start()\n\t//\terr = cmd.Wait()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor nbiter := 0; !isTunnelReady(localPort) && nbiter < 100; nbiter++ {\n\t\ttime.Sleep(10 * time.Millisecond)\n\t}\n\treturn &SSHTunnel{\n\t\tport: localPort,\n\t\tcmd: cmd,\n\t\tcmdString: cmdString,\n\t\tkeyFile: f,\n\t}, nil\n}", "func makeAutoNATServicePrivate(ctx context.Context, t *testing.T) host.Host {\n\th := bhost.NewBlankHost(swarmt.GenSwarm(t, ctx))\n\th.SetStreamHandler(AutoNATProto, sayAutoNATPrivate)\n\treturn h\n}", "func (d *Driver) createNetwork() error {\n\tconn, err := getConnection()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"getting libvirt connection\")\n\t}\n\tdefer conn.Close()\n\n\t// network: default\n\t// It is assumed that the libvirt/kvm installation has already created this network\n\n\t// network: private\n\n\t// Only create the private network if it does not already exist\n\tif _, err := conn.LookupNetworkByName(d.PrivateNetwork); err != nil {\n\t\t// create the XML for the private network from our networkTmpl\n\t\ttmpl := template.Must(template.New(\"network\").Parse(networkTmpl))\n\t\tvar networkXML bytes.Buffer\n\t\tif err := tmpl.Execute(&networkXML, d); err != nil {\n\t\t\treturn errors.Wrap(err, \"executing network template\")\n\t\t}\n\n\t\t// define the network using our template\n\t\tnetwork, err := conn.NetworkDefineXML(networkXML.String())\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"defining network from xml: %s\", networkXML.String())\n\t\t}\n\n\t\t// and finally create it\n\t\tif err := network.Create(); err != nil {\n\t\t\treturn errors.Wrapf(err, \"creating network %s\", d.PrivateNetwork)\n\t\t}\n\t}\n\n\treturn nil\n}", "func NewRouter(host, username, password string) *Netgear {\n router := &Netgear{\n host: host,\n username: username,\n password: password,\n regex : regexp.MustCompile(\"<NewAttachDevice>(.*)</NewAttachDevice>\"),\n }\n return router\n}", "func createPrivateKey() {\n\tnewPrivateKey, err := rsa.GenerateKey(rand.Reader, KEY_BITS)\n\tif err != nil {\n\t\tlog.Fatalf(\"Failed to generate private key: %s\", err)\n\t}\n\n\tprivateKey = newPrivateKey\n\tkeyOut, err := os.OpenFile(PrivateKeyFile, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600)\n\tif err != nil {\n\t\tlog.Fatalf(\"Failed to open %s for writing: %s\", PrivateKeyFile, err)\n\t}\n\tif err := pem.Encode(keyOut, &pem.Block{Type: PEM_HEADER_PRIVATE_KEY, Bytes: x509.MarshalPKCS1PrivateKey(privateKey)}); err != nil {\n\t\tlog.Fatalf(\"Unable to PEM encode private key: %s\", err)\n\t}\n\tkeyOut.Close()\n\tlog.Printf(\"Wrote private key to %s\", PrivateKeyFile)\n}", "func NewGatewayMock(t minimock.Tester) *GatewayMock {\n\tm := &GatewayMock{t: t}\n\tif controller, ok := t.(minimock.MockController); ok {\n\t\tcontroller.RegisterMocker(m)\n\t}\n\n\tm.AutherMock = mGatewayMockAuther{mock: m}\n\n\tm.BeforeRunMock = mGatewayMockBeforeRun{mock: m}\n\tm.BeforeRunMock.callArgs = []*GatewayMockBeforeRunParams{}\n\n\tm.BootstrapperMock = mGatewayMockBootstrapper{mock: m}\n\n\tm.EphemeralModeMock = mGatewayMockEphemeralMode{mock: m}\n\tm.EphemeralModeMock.callArgs = []*GatewayMockEphemeralModeParams{}\n\n\tm.GetStateMock = mGatewayMockGetState{mock: m}\n\n\tm.NewGatewayMock = mGatewayMockNewGateway{mock: m}\n\tm.NewGatewayMock.callArgs = []*GatewayMockNewGatewayParams{}\n\n\tm.OnConsensusFinishedMock = mGatewayMockOnConsensusFinished{mock: m}\n\tm.OnConsensusFinishedMock.callArgs = []*GatewayMockOnConsensusFinishedParams{}\n\n\tm.OnPulseFromConsensusMock = mGatewayMockOnPulseFromConsensus{mock: m}\n\tm.OnPulseFromConsensusMock.callArgs = []*GatewayMockOnPulseFromConsensusParams{}\n\n\tm.OnPulseFromPulsarMock = mGatewayMockOnPulseFromPulsar{mock: m}\n\tm.OnPulseFromPulsarMock.callArgs = []*GatewayMockOnPulseFromPulsarParams{}\n\n\tm.RunMock = mGatewayMockRun{mock: m}\n\tm.RunMock.callArgs = []*GatewayMockRunParams{}\n\n\tm.UpdateStateMock = mGatewayMockUpdateState{mock: m}\n\tm.UpdateStateMock.callArgs = []*GatewayMockUpdateStateParams{}\n\n\treturn m\n}", "func (s *VPCService) NewCreatePrivateGatewayParams(gateway string, ipaddress string, netmask string, vlan string, vpcid string) *CreatePrivateGatewayParams {\n\tp := &CreatePrivateGatewayParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"gateway\"] = gateway\n\tp.p[\"ipaddress\"] = ipaddress\n\tp.p[\"netmask\"] = netmask\n\tp.p[\"vlan\"] = vlan\n\tp.p[\"vpcid\"] = vpcid\n\treturn p\n}", "func Connect(addr, identifier, psk string) (*Gateway, error) {\n\t// Establish a new connection to the gateway.\n\tdc, err := newDTLSClient(addr, identifier, psk)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Gateway{\n\t\taddr: addr,\n\t\tidentifier: identifier,\n\t\tpsk: psk,\n\t\tclient: dc,\n\t}, nil\n}", "func NewCreatePrivateNetworkRequest(server string, body CreatePrivateNetworkJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewCreatePrivateNetworkRequestWithBody(server, \"application/json\", bodyReader)\n}", "func NewGateway(serviceName, aggrAddr string) (*Gateway, error) {\n\ttracerOpt := grpc.WithUnaryInterceptor(\n\t\totgrpc.OpenTracingClientInterceptor(tracer.MustGetTracer(serviceName)),\n\t)\n\n\tconn, err := grpc.Dial(aggrAddr, grpc.WithInsecure(), tracerOpt)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Gateway{\n\t\tconn: conn,\n\t\tclient: proto.NewQuoteServiceClient(conn),\n\t}, nil\n}", "func NewCreatePrivateNetworkRequestWithBody(server string, contentType string, body io.Reader) (*http.Request, error) {\n\tvar err error\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/private-network\")\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"POST\", queryUrl.String(), body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Add(\"Content-Type\", contentType)\n\treturn req, nil\n}", "func (c *Client) CreateDirectConnectTunnel(request *CreateDirectConnectTunnelRequest) (response *CreateDirectConnectTunnelResponse, err error) {\n if request == nil {\n request = NewCreateDirectConnectTunnelRequest()\n }\n response = NewCreateDirectConnectTunnelResponse()\n err = c.Send(request, response)\n return\n}", "func CreateIstioIngressGateway(name string, namespace string, host string, serviceHost string, servicePort int) (string, error) {\n\n\ttmpFile, err := ioutil.TempFile(\"\", \"fuseml\")\n\tif err != nil {\n\t\treturn tmpFile.Name(), err\n\t}\n\tdefer os.Remove(tmpFile.Name())\n\n\tistioGatewayTmpl, err := template.New(\"istiogw\").Parse(`\n---\napiVersion: networking.istio.io/v1alpha3\nkind: Gateway\nmetadata:\n name: {{ .Name }}-gateway\n namespace: {{ .Namespace }}\n labels:\n \"app.kubernetes.io/name\": {{ .Name }}\nspec:\n selector:\n istio: ingressgateway # use Istio default gateway implementation\n servers:\n - port:\n number: 80\n name: http\n protocol: HTTP\n hosts:\n - \"{{ .Host }}\"\n\n---\napiVersion: networking.istio.io/v1alpha3\nkind: VirtualService\nmetadata:\n name: {{ .Name }}\n namespace: {{ .Namespace }}\nspec:\n hosts:\n - \"{{ .Host }}\"\n gateways:\n - {{ .Name }}-gateway\n http:\n - match:\n - uri:\n prefix: /\n route:\n - destination:\n port:\n number: {{ .ServicePort }}\n host: {{ .ServiceHost }}\n`)\n\tif err != nil {\n\t\treturn tmpFile.Name(), err\n\t}\n\n\terr = istioGatewayTmpl.Execute(tmpFile, struct {\n\t\tName string\n\t\tNamespace string\n\t\tHost string\n\t\tServiceHost string\n\t\tServicePort int\n\t}{\n\t\tName: name,\n\t\tNamespace: namespace,\n\t\tHost: host,\n\t\tServiceHost: serviceHost,\n\t\tServicePort: servicePort,\n\t})\n\tif err != nil {\n\t\treturn tmpFile.Name(), err\n\t}\n\n\treturn Kubectl(fmt.Sprintf(\"apply --filename %s\", tmpFile.Name()))\n}", "func NewVpnGateway(ctx *pulumi.Context,\n\tname string, args *VpnGatewayArgs, opts ...pulumi.ResourceOption) (*VpnGateway, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.ResourceGroupName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ResourceGroupName'\")\n\t}\n\taliases := pulumi.Aliases([]pulumi.Alias{\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20191201:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20180401:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20180401:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20180601:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20180601:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20180701:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20180701:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20180801:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20180801:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20181001:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20181001:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20181101:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20181101:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20181201:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20181201:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20190201:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20190201:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20190401:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20190401:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20190601:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20190601:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20190701:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20190701:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20190801:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20190801:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20190901:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20190901:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20191101:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20191101:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20200301:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20200301:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20200401:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20200401:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20200501:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20200501:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20200601:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20200601:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20200701:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20200701:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20200801:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20200801:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20201101:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20201101:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:network/v20210201:VpnGateway\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:network/v20210201:VpnGateway\"),\n\t\t},\n\t})\n\topts = append(opts, aliases)\n\tvar resource VpnGateway\n\terr := ctx.RegisterResource(\"azure-native:network/v20191201:VpnGateway\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func GatewayCreate(ctx context.Context, db *mongo.Database, gw Gateway) (schema.ID, error) {\n\tif err := gw.Validate(); err != nil {\n\t\treturn 0, err\n\t}\n\n\tvar filter GatewayFilter\n\tfilter = filter.WithGWID(gw.NodeId)\n\n\tvar id schema.ID\n\tcurrent, err := filter.Get(ctx, db)\n\tif err != nil {\n\t\t//TODO: check that this is a NOT FOUND error\n\t\tid, err = models.NextID(ctx, db, GatewayCollection)\n\t\tif err != nil {\n\t\t\treturn id, err\n\t\t}\n\t\tgw.Created = schema.Date{Time: time.Now()}\n\t} else {\n\t\tid = current.ID\n\t\t// make sure we do NOT overwrite these field\n\t\tgw.Created = current.Created\n\t\t// gw.FreeToUse = current.FreeToUse\n\t}\n\n\tgw.ID = id\n\tgw.Updated = schema.Date{Time: time.Now()}\n\n\tcol := db.Collection(GatewayCollection)\n\t_, err = col.UpdateOne(ctx, filter, bson.M{\"$set\": gw}, options.Update().SetUpsert(true))\n\treturn id, err\n}", "func newOperatorGatewayClass(ctx context.Context, cl client.Client, name, contourNs, contourName string) error {\n\tgc := &gatewayv1alpha1.GatewayClass{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t},\n\t\tSpec: gatewayv1alpha1.GatewayClassSpec{\n\t\t\tController: operatorv1alpha1.GatewayClassControllerRef,\n\t\t\tParametersRef: &gatewayv1alpha1.ParametersReference{\n\t\t\t\tGroup: operatorv1alpha1.GatewayClassParamsRefGroup,\n\t\t\t\tKind: operatorv1alpha1.GatewayClassParamsRefKind,\n\t\t\t\tName: contourName,\n\t\t\t\tScope: pointer.StringPtr(\"Namespace\"),\n\t\t\t\tNamespace: pointer.StringPtr(contourNs),\n\t\t\t},\n\t\t},\n\t}\n\tif err := cl.Create(ctx, gc); err != nil {\n\t\treturn fmt.Errorf(\"failed to create gatewayclass %s: %v\", name, err)\n\t}\n\treturn nil\n}", "func (hd *Datapath) CreateRoute(rt *netproto.Route, vrf *netproto.Vrf) error {\n\t// This will ensure that only one datapath config will be active at a time. This is a temporary restriction\n\t// to ensure that HAL will use a single config thread , this will be removed prior to FCS to allow parallel configs to go through.\n\t// TODO Remove Global Locking\n\thd.Lock()\n\tdefer hd.Unlock()\n\tvrfKey := &halproto.VrfKeyHandle{\n\t\tKeyOrHandle: &halproto.VrfKeyHandle_VrfId{\n\t\t\tVrfId: vrf.Status.VrfID,\n\t\t},\n\t}\n\n\t// Build next hop object\n\tnextHopKey := &halproto.NexthopKeyHandle{\n\t\tKeyOrHandle: &halproto.NexthopKeyHandle_NexthopId{\n\t\t\tNexthopId: rt.Status.RouteID,\n\t\t},\n\t}\n\n\tepIP := net.ParseIP(rt.Spec.GatewayIP)\n\tif len(epIP) == 0 {\n\t\treturn fmt.Errorf(\"could not parse IP from %v\", rt.Spec.GatewayIP)\n\t}\n\n\tgwIPAddr := &halproto.IPAddress{\n\t\tIpAf: halproto.IPAddressFamily_IP_AF_INET,\n\t\tV4OrV6: &halproto.IPAddress_V4Addr{\n\t\t\tV4Addr: ipv4Touint32(epIP),\n\t\t},\n\t}\n\n\tepKey := &halproto.EndpointKeyHandle{\n\t\tKeyOrHandle: &halproto.EndpointKeyHandle_EndpointKey{\n\t\t\tEndpointKey: &halproto.EndpointKey{\n\t\t\t\tEndpointL2L3Key: &halproto.EndpointKey_L3Key{\n\t\t\t\t\tL3Key: &halproto.EndpointL3Key{\n\t\t\t\t\t\tVrfKeyHandle: vrfKey,\n\t\t\t\t\t\tIpAddress: gwIPAddr,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\tnextHopReqMsg := &halproto.NexthopRequestMsg{\n\t\tRequest: []*halproto.NexthopSpec{\n\t\t\t{\n\t\t\t\tKeyOrHandle: nextHopKey,\n\t\t\t\tIfOrEp: &halproto.NexthopSpec_EpKeyOrHandle{\n\t\t\t\t\tEpKeyOrHandle: epKey,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\t// create nexthop object\n\tif hd.Kind == \"hal\" {\n\t\tresp, err := hd.Hal.Netclient.NexthopCreate(context.Background(), nextHopReqMsg)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error creating next hop. Err: %v\", err)\n\t\t\treturn err\n\t\t}\n\t\tif !(resp.Response[0].ApiStatus == halproto.ApiStatus_API_STATUS_OK || resp.Response[0].ApiStatus == halproto.ApiStatus_API_STATUS_EXISTS_ALREADY) {\n\t\t\tlog.Errorf(\"HAL returned non OK status. %v\", resp.Response[0].ApiStatus.String())\n\t\t\treturn fmt.Errorf(\"HAL returned non OK status. %v\", resp.Response[0].ApiStatus.String())\n\t\t}\n\t} else {\n\t\t_, err := hd.Hal.Netclient.NexthopCreate(context.Background(), nextHopReqMsg)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error creating next Hop Err: %v\", err)\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// build route object\n\tip, net, err := net.ParseCIDR(rt.Spec.IPPrefix)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error parsing the IP Prefix mask from %v. Err: %v\", rt.Spec.IPPrefix, err)\n\n\t}\n\tprefixLen, _ := net.Mask.Size()\n\tipPrefix := &halproto.IPPrefix{\n\t\tAddress: &halproto.IPAddress{\n\t\t\tIpAf: halproto.IPAddressFamily_IP_AF_INET,\n\t\t\tV4OrV6: &halproto.IPAddress_V4Addr{\n\t\t\t\tV4Addr: ipv4Touint32(ip),\n\t\t\t},\n\t\t},\n\t\tPrefixLen: uint32(prefixLen),\n\t}\n\n\trouteReqMsg := &halproto.RouteRequestMsg{\n\t\tRequest: []*halproto.RouteSpec{\n\t\t\t{\n\t\t\t\tKeyOrHandle: &halproto.RouteKeyHandle{\n\t\t\t\t\tKeyOrHandle: &halproto.RouteKeyHandle_RouteKey{\n\t\t\t\t\t\tRouteKey: &halproto.RouteKey{\n\t\t\t\t\t\t\tVrfKeyHandle: vrfKey,\n\t\t\t\t\t\t\tIpPrefix: ipPrefix,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tNhKeyOrHandle: nextHopKey,\n\t\t\t},\n\t\t},\n\t}\n\n\t// create route object\n\tif hd.Kind == \"hal\" {\n\t\tresp, err := hd.Hal.Netclient.RouteCreate(context.Background(), routeReqMsg)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error creating route. Err: %v\", err)\n\t\t\treturn err\n\t\t}\n\t\tif !(resp.Response[0].ApiStatus == halproto.ApiStatus_API_STATUS_OK || resp.Response[0].ApiStatus == halproto.ApiStatus_API_STATUS_EXISTS_ALREADY) {\n\t\t\tlog.Errorf(\"HAL returned non OK status. %v\", resp.Response[0].ApiStatus.String())\n\t\t\treturn fmt.Errorf(\"HAL returned non OK status. %v\", resp.Response[0].ApiStatus.String())\n\t\t}\n\t} else {\n\t\t_, err := hd.Hal.Netclient.RouteCreate(context.Background(), routeReqMsg)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error creating route. Err: %v\", err)\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func SetGateway(gateway string) error {\n\tcmd := exec.Command(\"ip\", \"route\", \"add\", \"default\", \"via\", gateway)\n\tout, err := cmd.Output()\n\tif err != nil {\n\t\tlog.Println(out)\n\t\treturn errors.New(\"Error in SetGateway:\" + err.Error())\n\t}\n\treturn nil\n}", "func (d *Driver) CreateNetwork(r *sdk.CreateNetworkRequest) error {\n\tvar netCidr *net.IPNet\n\tvar netGw string\n\tvar err error\n\tlog.Debugf(\"Network Create Called: [ %+v ]\", r)\n\tfor _, v4 := range r.IPv4Data {\n\t\tnetGw = v4.Gateway\n\t\t_, netCidr, err = net.ParseCIDR(v4.Pool)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Parse and validate the config. It should not be conflict with existing networks' config\n\tconfig, err := parseNetworkOptions(r.NetworkID, r.Options)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Generate a name for what will be the sandbox side pipe interface\n\tcontainerIfName, err := d.getContainerIfName(r)\n\tif err != nil {\n\t\treturn err\n\t}\n\tlog.Debugf(\"containerIfName:%v\", containerIfName)\n\tconfig.ContainerIfName = containerIfName\n\n\tn := &network{\n\t\tid: r.NetworkID,\n\t\tconfig: config,\n\t\tendpoints: endpointTable{},\n\t\tcidr: netCidr,\n\t\tgateway: netGw,\n\t}\n\n\tbName, err := getBridgeName(r)\n\tconfig.BridgeName = bName\n\tlog.Debugf(\"bridgeName:%v\", bName)\n\n\t// Initialize handle when needed\n\td.Lock()\n\tif d.nlh == nil {\n\t\td.nlh = NlHandle()\n\t}\n\td.Unlock()\n\n\t// Create or retrieve the bridge L3 interface\n\tbridgeIface, err := newInterface(d.nlh, bName)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tn.bridge = bridgeIface\n\tsetupDevice(bridgeIface)\n\tsetupDeviceUp(config, bridgeIface)\n\n\td.addNetwork(n)\n\treturn nil\n}", "func (c *Client) CreateDirectConnect(request *CreateDirectConnectRequest) (response *CreateDirectConnectResponse, err error) {\n if request == nil {\n request = NewCreateDirectConnectRequest()\n }\n response = NewCreateDirectConnectResponse()\n err = c.Send(request, response)\n return\n}", "func newCreateClientTunnelReply(cidr *net.IPNet, tid int64) (f linkFrame) {\n f.method = CLIENT_TUN_NEW\n f.param = map[string]interface{} { K_CIDR : cidr.String() }\n f.response = tid\n return\n}", "func (client *Client) CreateGatewayFileShare(request *CreateGatewayFileShareRequest) (response *CreateGatewayFileShareResponse, err error) {\n\tresponse = CreateCreateGatewayFileShareResponse()\n\terr = client.DoAction(request, response)\n\treturn\n}", "func (r NiftyCreatePrivateLanRequest) Send(ctx context.Context) (*NiftyCreatePrivateLanResponse, error) {\n\tr.Request.SetContext(ctx)\n\terr := r.Request.Send()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp := &NiftyCreatePrivateLanResponse{\n\t\tNiftyCreatePrivateLanOutput: r.Request.Data.(*NiftyCreatePrivateLanOutput),\n\t\tresponse: &aws.Response{Request: r.Request},\n\t}\n\n\treturn resp, nil\n}", "func createHost() (context.Context, host.Host, error) {\n\tctx, _ /* cancel */ := context.WithCancel(context.Background())\n\t// defer cancel()\n\n\tprvKey, _, err := crypto.GenerateKeyPairWithReader(crypto.RSA, 2048, rand.Reader)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tport, err := freeport.GetFreePort()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\thost, err := libp2p.New(\n\t\tctx,\n\t\tlibp2p.Identity(prvKey),\n\t\tlibp2p.ListenAddrStrings(fmt.Sprintf(\"/ip4/0.0.0.0/tcp/%v\", port)),\n\t)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\treturn ctx, host, nil\n}", "func createSigner() (ssh.Signer, error) {\n\tprivateKeySecret := &core.Secret{}\n\terr := framework.Global.Client.Get(context.TODO(), kubeTypes.NamespacedName{Name: \"cloud-private-key\", Namespace: \"openshift-windows-machine-config-operator\"}, privateKeySecret)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"failed to retrieve cloud private key secret\")\n\t}\n\n\tprivateKeyBytes := privateKeySecret.Data[secrets.PrivateKeySecretKey][:]\n\tif privateKeyBytes == nil {\n\t\treturn nil, errors.New(\"failed to retrieve private key using cloud private key secret\")\n\t}\n\n\tsigner, err := ssh.ParsePrivateKey(privateKeyBytes)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"unable to parse private key\")\n\t}\n\treturn signer, nil\n}", "func RegisterGateway(tp Type, gw Gateway) {\n\tif _, ok := gateways[tp]; ok {\n\t\tpanic(fmt.Errorf(\"%s gateway already registered\", tp))\n\t}\n\tgateways[tp] = gw\n}", "func createHost(port int) (core.Host, error) {\n\t// Producing private key\n\tprvKey, _ := ecdsa.GenerateKey(btcec.S256(), rand.Reader)\n\tsk := (*crypto.Secp256k1PrivateKey)(prvKey)\n\n\t// Starting a peer with default configs\n\topts := []libp2p.Option{\n\t\tlibp2p.ListenAddrStrings(fmt.Sprintf(\"/ip4/0.0.0.0/tcp/%d\", port)),\n\t\tlibp2p.Identity(sk),\n\t\tlibp2p.DefaultTransports,\n\t\tlibp2p.DefaultMuxers,\n\t\tlibp2p.DefaultSecurity,\n\t}\n\n\th, err := libp2p.New(context.Background(), opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn h, nil\n}", "func (agr *apiGatewayResource) createAPIGateway(request *http.Request,\n\tapiGatewayInfoInstance *apiGatewayInfo) (string, restful.Attributes, error) {\n\n\tctx, cancelCtx := context.WithCancel(nucliocontext.NewDetached(request.Context()))\n\tdefer cancelCtx()\n\n\t// inject auth session to new context\n\tctx = context.WithValue(ctx, auth.AuthSessionContextKey, agr.getCtxSession(ctx))\n\n\t// create an api gateway config\n\tapiGatewayConfig := platform.APIGatewayConfig{\n\t\tMeta: *apiGatewayInfoInstance.Meta,\n\t\tSpec: *apiGatewayInfoInstance.Spec,\n\t}\n\n\tif apiGatewayInfoInstance.Status != nil {\n\t\tapiGatewayConfig.Status = *apiGatewayInfoInstance.Status\n\t}\n\n\t// create an api gateway\n\tnewAPIGateway, err := platform.NewAbstractAPIGateway(agr.Logger, agr.getPlatform(), apiGatewayConfig)\n\tif err != nil {\n\t\treturn \"\", nil, nuclio.WrapErrInternalServerError(err)\n\t}\n\n\t// just deploy. the status is async through polling\n\tagr.Logger.DebugWithCtx(ctx, \"Creating api gateway\", \"newAPIGateway\", newAPIGateway)\n\tif err = agr.getPlatform().CreateAPIGateway(ctx, &platform.CreateAPIGatewayOptions{\n\t\tAuthSession: ctx.Value(auth.AuthSessionContextKey).(auth.Session),\n\t\tAPIGatewayConfig: newAPIGateway.GetConfig(),\n\t\tValidateFunctionsExistence: agr.headerValueIsTrue(request, headers.ApiGatewayValidateFunctionExistence),\n\t}); err != nil {\n\t\tif strings.Contains(errors.Cause(err).Error(), \"already exists\") {\n\t\t\terr = nuclio.WrapErrConflict(err)\n\t\t}\n\n\t\treturn \"\", nil, err\n\t}\n\n\t// set attributes\n\tattributes := agr.apiGatewayToAttributes(newAPIGateway)\n\tagr.Logger.DebugWithCtx(ctx, \"Successfully created api gateway\", \"attributes\", attributes)\n\n\treturn apiGatewayConfig.Meta.Name, attributes, nil\n}", "func makeAccount(){\n\toperatorSecret, err := hedera.SecretKeyFromString(secret)\n\tif err != nil{\n\t\tpanic(err)\n\t}\n\n\tsecretKey, _ := hedera.GenerateSecretKey()\n\tpublic := secretKey.Public()\n\n\tfmt.Printf(\"secret = %v\\n\", secretKey)\n\tfmt.Printf(\"public = %v\\n\", public)\n\n\tclient, err := hedera.Dial(server)\n\tif err !=nil{\n\t\tpanic(err)\n\t}\n\tdefer client.Close()\n\n\tnodeAccountID := hedera.AccountID{Account: 3}\n\toperatorAccountID := hedera.AccountID{Account: 1001}\n\ttime.Sleep(2* time.Second)\n\tresponse, err := client.CreateAccount().Key(public).InitialBalance(0).Operator(operatorAccountID).Node(nodeAccountID).Memo(\"Test make Account\").Sign(operatorSecret).Execute()\n\tif err != nil{\n\t\tpanic(err)\n\t}\n\n\ttransactionID := response.ID\n\tfmt.Printf(\"Created account; transaction = %v\\n\", transactionID)\n\ttime.Sleep(2* time.Second)\n \n\treceipt,err := client.Transaction(*transactionID).Receipt().Get()\n\tif err != nil{\n\t\tpanic(err)\n\t}\n\tfmt.Printf(\"Account = %v\\n\", *receipt.AccountID)\n\n}", "func (api *API) CreatePayFwd(payment PayFwd) (result PayFwd, err error) {\n\tu, err := api.buildURL(\"/payments\", nil)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = postResponse(u, &payment, &result)\n\treturn\n}", "func NewMockGateway(ctrl *gomock.Controller) *MockGateway {\n\tmock := &MockGateway{ctrl: ctrl}\n\tmock.recorder = &MockGatewayMockRecorder{mock}\n\treturn mock\n}", "func createNewPrivateMessage(origin string, msg string, dest *string) *core.PrivateMessage {\n\tdefaultID := uint32(0) // to enforce NOT sequencing\n\tdefaultHopLimit := uint32(10)\n\tprivateMsg := core.PrivateMessage{Origin: origin, ID: defaultID, Text: msg, Destination: *dest, HopLimit: defaultHopLimit}\n\treturn &privateMsg\n}", "func makeRoute(netProto tcpip.NetworkProtocolNumber, gateway, localAddr, remoteAddr tcpip.Address, outgoingNIC, localAddressNIC *nic, localAddressEndpoint AssignableAddressEndpoint, handleLocal, multicastLoop bool) *Route {\n\tif localAddressNIC.stack != outgoingNIC.stack {\n\t\tpanic(fmt.Sprintf(\"cannot create a route with NICs from different stacks\"))\n\t}\n\n\tif localAddr.BitLen() == 0 {\n\t\tlocalAddr = localAddressEndpoint.AddressWithPrefix().Address\n\t}\n\n\tloop := PacketOut\n\n\t// TODO(gvisor.dev/issue/4689): Loopback interface loops back packets at the\n\t// link endpoint level. We can remove this check once loopback interfaces\n\t// loop back packets at the network layer.\n\tif !outgoingNIC.IsLoopback() {\n\t\tif handleLocal && localAddr != (tcpip.Address{}) && remoteAddr == localAddr {\n\t\t\tloop = PacketLoop\n\t\t} else if multicastLoop && (header.IsV4MulticastAddress(remoteAddr) || header.IsV6MulticastAddress(remoteAddr)) {\n\t\t\tloop |= PacketLoop\n\t\t} else if remoteAddr == header.IPv4Broadcast {\n\t\t\tloop |= PacketLoop\n\t\t} else if subnet := localAddressEndpoint.AddressWithPrefix().Subnet(); subnet.IsBroadcast(remoteAddr) {\n\t\t\tloop |= PacketLoop\n\t\t}\n\t}\n\n\tr := makeRouteInner(netProto, localAddr, remoteAddr, outgoingNIC, localAddressNIC, localAddressEndpoint, loop)\n\tif r.Loop()&PacketOut == 0 {\n\t\t// Packet will not leave the stack, no need for a gateway or a remote link\n\t\t// address.\n\t\treturn r\n\t}\n\n\tif r.outgoingNIC.NetworkLinkEndpoint.Capabilities()&CapabilityResolutionRequired != 0 {\n\t\tif linkRes, ok := r.outgoingNIC.linkAddrResolvers[r.NetProto()]; ok {\n\t\t\tr.linkRes = linkRes\n\t\t}\n\t}\n\n\tif gateway.BitLen() > 0 {\n\t\tr.routeInfo.NextHop = gateway\n\t\treturn r\n\t}\n\n\tif r.linkRes == nil {\n\t\treturn r\n\t}\n\n\tif linkAddr, ok := r.linkRes.resolver.ResolveStaticAddress(r.RemoteAddress()); ok {\n\t\tr.ResolveWith(linkAddr)\n\t\treturn r\n\t}\n\n\tif subnet := localAddressEndpoint.Subnet(); subnet.IsBroadcast(remoteAddr) {\n\t\tr.ResolveWith(header.EthernetBroadcastAddress)\n\t\treturn r\n\t}\n\n\tif r.RemoteAddress() == r.LocalAddress() {\n\t\t// Local link address is already known.\n\t\tr.ResolveWith(r.LocalLinkAddress())\n\t}\n\n\treturn r\n}", "func CreateCreateGatewayFileShareRequest() (request *CreateGatewayFileShareRequest) {\n\trequest = &CreateGatewayFileShareRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"sgw\", \"2018-05-11\", \"CreateGatewayFileShare\", \"hcs_sgw\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func (rcsw *RemoteClusterServiceWatcher) createGatewayMirrorService(spec *GatewaySpec) error {\n\tlocalServiceName := rcsw.mirroredResourceName(spec.gatewayName)\n\tif spec.ProbeConfig == nil {\n\t\trcsw.log.Debugf(\"Skipping creation of gateway mirror as gateway does not specify probe config\")\n\t\treturn nil\n\t}\n\n\t_, err := rcsw.localAPIClient.Svc().Lister().Services(rcsw.serviceMirrorNamespace).Get(localServiceName)\n\tif err != nil {\n\t\tif kerrors.IsNotFound(err) {\n\t\t\tserviceToCreate := &corev1.Service{\n\t\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\t\tName: localServiceName,\n\t\t\t\t\tNamespace: rcsw.serviceMirrorNamespace,\n\t\t\t\t\tAnnotations: map[string]string{\n\t\t\t\t\t\tconsts.RemoteGatewayResourceVersionAnnotation: spec.resourceVersion,\n\t\t\t\t\t},\n\t\t\t\t\tLabels: map[string]string{\n\t\t\t\t\t\tconsts.MirroredResourceLabel: \"true\",\n\t\t\t\t\t\tconsts.RemoteClusterNameLabel: rcsw.clusterName,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tSpec: corev1.ServiceSpec{\n\t\t\t\t\tPorts: []corev1.ServicePort{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tProtocol: \"TCP\",\n\t\t\t\t\t\t\tPort: int32(spec.ProbeConfig.port),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t}\n\n\t\t\tendpointsToCreate := &corev1.Endpoints{\n\t\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\t\tName: localServiceName,\n\t\t\t\t\tNamespace: rcsw.serviceMirrorNamespace,\n\t\t\t\t\tLabels: map[string]string{\n\t\t\t\t\t\tconsts.MirroredResourceLabel: \"true\",\n\t\t\t\t\t\tconsts.RemoteClusterNameLabel: rcsw.clusterName,\n\t\t\t\t\t},\n\t\t\t\t\tAnnotations: map[string]string{\n\t\t\t\t\t\tconsts.RemoteGatewayIdentity: spec.identity,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tSubsets: []corev1.EndpointSubset{\n\t\t\t\t\t{\n\t\t\t\t\t\tAddresses: spec.addresses,\n\t\t\t\t\t\tPorts: []corev1.EndpointPort{\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tProtocol: \"TCP\",\n\t\t\t\t\t\t\t\tPort: int32(spec.ProbeConfig.port),\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t}\n\n\t\t\trcsw.log.Debugf(\"Creating a new gateway mirror Service for %s\", localServiceName)\n\t\t\tif _, err := rcsw.localAPIClient.Client.CoreV1().Services(rcsw.serviceMirrorNamespace).Create(serviceToCreate); err != nil {\n\t\t\t\tif !kerrors.IsAlreadyExists(err) {\n\t\t\t\t\t// we might have created it during earlier attempt, if that is not the case, we retry\n\t\t\t\t\treturn RetryableError{[]error{err}}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\trcsw.log.Debugf(\"Creating a new gateway mirror Endpoints for %s\", localServiceName)\n\t\t\tif _, err := rcsw.localAPIClient.Client.CoreV1().Endpoints(rcsw.serviceMirrorNamespace).Create(endpointsToCreate); err != nil {\n\t\t\t\t// we clean up after ourselves\n\t\t\t\trcsw.localAPIClient.Client.CoreV1().Services(rcsw.serviceMirrorNamespace).Delete(spec.gatewayName, &metav1.DeleteOptions{})\n\t\t\t\t// and retry\n\t\t\t\treturn RetryableError{[]error{err}}\n\t\t\t}\n\n\t\t\treturn nil\n\t\t}\n\t\treturn err\n\t}\n\trcsw.log.Debugf(\"Skipping creation of gateway mirror as it already exists\")\n\treturn nil\n}", "func Create() http.Handler {\r\n\r\n\tmux := http.NewServeMux()\r\n\tdb, err := config.NewDB(\"postgres://postgres:postgres@localhost/powerdata\")\r\n\tif err != nil {\r\n\t\tlog.Panic(err)\r\n\t}\r\n\toauthConfig := config.GetStripeOauthConfig()\r\n\r\n\tenv := &config.Env{DB: db, OauthConfig: oauthConfig}\r\n\r\n\tmux.Handle(\"/\", oauth.MainPageHandler(`<html><body>\r\n\t\t<a href=\"/oauth/stripeLogin\">ConnectWithStripe</a>\r\n\t\t</body></html>`))\r\n\tmux.Handle(\"/oauth/stripeLogin\", oauth.LoginHandler(env))\r\n\tmux.Handle(\"/oauth/stripe_callback\", oauth.CallbackHandler(env))\r\n\tmux.Handle(\"/oauth/deauthorize\", oauth.DeauthorizeHandler(env))\r\n\tmux.Handle(\"/account/\", account.Handler(env))\r\n\r\n\treturn mux\r\n}", "func (_IUniswapV2Factory *IUniswapV2FactoryTransactor) CreatePair(opts *bind.TransactOpts, tokenA common.Address, tokenB common.Address) (*types.Transaction, error) {\r\n\treturn _IUniswapV2Factory.contract.Transact(opts, \"createPair\", tokenA, tokenB)\r\n}", "func createTestGatewayAddCourseToStudent() http.Handler {\n\tr := mux.NewRouter()\n\tr.HandleFunc(\"/didattica-mobile/api/v1.0/students/{username}\",\n\t\tmicroservice.AddCourseToStudent).Methods(http.MethodPut)\n\treturn r\n}", "func NewTunnel(\n\tgatewayAddr string,\n\tlayer knxnet.TunnelLayer,\n\tconfig TunnelConfig,\n) (tunnel *Tunnel, err error) {\n\tvar sock knxnet.Socket\n\n\t// Create socket which will be used for communication.\n\tif config.UseTCP {\n\t\tsock, err = knxnet.DialTunnelTCP(gatewayAddr)\n\t} else {\n\t\tsock, err = knxnet.DialTunnelUDP(gatewayAddr)\n\t}\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Initialize the Client structure.\n\tclient := &Tunnel{\n\t\tsock: sock,\n\t\tconfig: checkTunnelConfig(config),\n\t\tlayer: layer,\n\t\tack: make(chan *knxnet.TunnelRes),\n\t\tinbound: make(chan cemi.Message),\n\t\tdone: make(chan struct{}),\n\t}\n\n\t// Connect to the gateway.\n\terr = client.requestConn()\n\tif err != nil {\n\t\tsock.Close()\n\t\treturn nil, err\n\t}\n\n\tclient.wait.Add(1)\n\tgo client.serve()\n\n\treturn client, nil\n}", "func (h Hostingv4) CreatePrivateIP(vlan hosting.Vlan, ip string) (hosting.IPAddress, error) {\n\tvar fn = \"CreatePrivateIP\"\n\tif vlan.RegionID == \"\" || vlan.ID == \"\" {\n\t\treturn hosting.IPAddress{}, &HostingError{fn, \"Vlan\", \"ID/RegionID\", ErrNotProvided}\n\t}\n\tregionid, err := strconv.Atoi(vlan.RegionID)\n\tif err != nil {\n\t\treturn hosting.IPAddress{}, &HostingError{fn, \"Vlan\", \"RegionID\", ErrParse}\n\t}\n\tvlanid, err := strconv.Atoi(vlan.ID)\n\tif err != nil {\n\t\treturn hosting.IPAddress{}, &HostingError{fn, \"Vlan\", \"ID\", ErrParse}\n\t}\n\n\tvar ipv4 iPAddressv4\n\tvar response = Operation{}\n\terr = h.Send(\"hosting.iface.create\", []interface{}{\n\t\tmap[string]interface{}{\n\t\t\t\"datacenter_id\": regionid,\n\t\t\t\"bandwidth\": hosting.DefaultBandwidth,\n\t\t\t\"ip\": ip,\n\t\t\t\"vlan\": vlanid,\n\t\t}}, &response)\n\tif err != nil {\n\t\treturn hosting.IPAddress{}, err\n\t}\n\tif err = h.waitForOp(response); err != nil {\n\t\treturn hosting.IPAddress{}, err\n\t}\n\n\tif err = h.Send(\"hosting.ip.info\", []interface{}{response.IPID}, &ipv4); err != nil {\n\t\treturn hosting.IPAddress{}, err\n\t}\n\n\treturn toIPAddress(ipv4), nil\n}", "func (agr *apiGatewayResource) Create(request *http.Request) (string, restful.Attributes, error) {\n\tctx := request.Context()\n\tapiGatewayInfo, err := agr.getAPIGatewayInfoFromRequest(request)\n\tif err != nil {\n\t\tagr.Logger.WarnWithCtx(ctx, \"Failed to get api gateway config and status from body\", \"err\", err)\n\t\treturn \"\", nil, err\n\t}\n\n\treturn agr.createAPIGateway(request, apiGatewayInfo)\n}", "func Create (w http.ResponseWriter, r *http.Request) {\n\t/* This is an SBC */\n\tif CREATED == false {\n\t\t/* Move the checking of ID up first to confirm this is allowed */\n\t\t/* Do most of start. Just don't download because that would be downloading from self */\n\t\t/* Get address and ID */\n\t\t/* Get port number and set that to ID */\n\t\t/* Save localhost as Addr */\n\t\tsplitHostPort := strings.Split(r.Host, \":\")\n\t\ti, err := strconv.ParseInt(splitHostPort[1], 10, 32)\n\t\tif err != nil {\n\t\t\tw.WriteHeader(500)\n\t\t\tpanic(err)\n\t\t}\n\t\t/* ID is now port number. Address is now correct Address */\n\t\tID = int32(i)\n\t\tSELF_ADDR = r.Host\n\t\t/* Check if ID is allowed in ALLOWED_IDs */\n\t\tif _, ok := ALLOWED_IDS[ID]; ok {\n\t\t\tnewBlockChain := data.NewBlockChain()\n\n\t\t\tmpt1 := p1.MerklePatriciaTrie{}\n\t\t\tmpt1.Initial()\n\t\t\tmpt1.Insert(\"1\", \"Origin\")\n\n\t\t\tmpt2 := p1.MerklePatriciaTrie{}\n\t\t\tmpt2.Initial()\n\t\t\tmpt2.Insert(\"1\", \"Decoy1\")\n\n\t\t\tmpt3 := p1.MerklePatriciaTrie{}\n\t\t\tmpt3.Initial()\n\t\t\tmpt3.Insert(\"1\", \"Decoy2\")\n\n\t\t\tmpt4 := p1.MerklePatriciaTrie{}\n\t\t\tmpt4.Initial()\n\t\t\tmpt4.Insert(\"1\", \"Decoy3\")\n\n\t\t\thexPubKey := hexutil.Encode(signature_p.PUBLIC_KEY)\n\t\t\tnewBlockChain.GenBlock(mpt1, hexPubKey)\n\t\t\tnewBlockChain.GenBlock(mpt2, hexPubKey)\n\t\t\tnewBlockChain.GenBlock(mpt3, hexPubKey)\n\t\t\tnewBlockChain.GenBlock(mpt4, hexPubKey)\n\t\t\t/* Set Global variable SBC to be this new blockchain */\n\t\t\tSBC = newBlockChain\n\t\t\t/* Generate Multiple Blocks Initially */\n\t\t\t\t\n\t\t\tblockChainJson, _ := SBC.BlockChainToJson()\n\t\t\t/* Write this to the server */\n\t\t\tw.Write([]byte(blockChainJson))\n\n\t\t\t/* Need to instantiate the peer list */\n\t\t\tPeers = data.NewPeerList(ID, 32)\n\t\t\tBALLOT = ReadDataFromBallot()\n\t\t\tCREATED = true\n\t\t}\n\t}\n}", "func createWallet(userID string) Wallet {\n\t//connect to eth provider, and create wallet return the public address.\n\n\tvar ethAddress common.Address\n\tvar privateKey *ecdsa.PrivateKey\n\tvar pubkey *ecdsa.PublicKey\n\n\tprivateKey, err := crypto.GenerateKey()\n\n\tif err != nil {\n\t\tlog.Fatalf(\"Failed to create privtate key for user: %s. Error: %s\\n\", userID, err)\n\t}\n\n\tpublicKey := privateKey.Public()\n\tpubkey = publicKey.(*ecdsa.PublicKey)\n\n\tethAddress = crypto.PubkeyToAddress(*pubkey)\n\n\twallet := Wallet{\n\t\tUserID: userID,\n\t\tPublicKey: *pubkey,\n\t\tPrivateKey: *privateKey,\n\t\tAddress: ethAddress,\n\t}\n\treturn wallet\n}", "func CreateAssociateRouteTableWithGatewayRequest() (request *AssociateRouteTableWithGatewayRequest) {\n\trequest = &AssociateRouteTableWithGatewayRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Vpc\", \"2016-04-28\", \"AssociateRouteTableWithGateway\", \"vpc\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func NewNatGateway(c *cms.Client) *NatGateway {\n\treturn &NatGateway{\n\t\tproject: Project{\n\t\t\tclient: c,\n\t\t\tNamespace: \"acs_nat_gateway\",\n\t\t},\n\t}\n}", "func (n *NetworkServiceHandler) Create(ctx context.Context, regionID, description, cidrBlock string) (*Network, error) {\n\n\turi := \"/v1/network/create\"\n\n\tvalues := url.Values{\n\t\t\"DCID\": {regionID},\n\t}\n\n\t// Optional\n\tif cidrBlock != \"\" {\n\t\t_, ipNet, err := net.ParseCIDR(cidrBlock)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif v4Subnet := ipNet.IP.To4(); v4Subnet != nil {\n\t\t\tvalues.Add(\"v4_subnet\", v4Subnet.String())\n\t\t}\n\t\tmask, _ := ipNet.Mask.Size()\n\t\tvalues.Add(\"v4_subnet_mask\", strconv.Itoa(mask))\n\t}\n\n\tif description != \"\" {\n\t\tvalues.Add(\"description\", description)\n\t}\n\n\treq, err := n.client.NewRequest(ctx, http.MethodPost, uri, values)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tnetwork := new(Network)\n\terr = n.client.DoWithContext(ctx, req, network)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn network, nil\n}", "func GenerateFromPrivateKey(privateKey string) (*Wallet, error) {\n\tpb := hex2bytes(privateKey)\n\tvar priv btckey.PrivateKey\n\terr := priv.FromBytes(pb)\n\tif err != nil {\n\t\treturn &Wallet{}, err\n\t}\n\twallet := &Wallet{\n\t\tPublicKey: priv.PublicKey.ToBytes(),\n\t\tPrivateKey: priv.ToBytes(),\n\t\tAddress: priv.ToNeoAddress(),\n\t\tWIF: priv.ToWIFC(),\n\t\tHashedSignature: priv.ToNeoSignature(),\n\t}\n\treturn wallet, nil\n}", "func ConnectGateway() {\n\tglobal.ConnectGateway()\n}", "func (_IUniswapV2Factory *IUniswapV2FactorySession) CreatePair(tokenA common.Address, tokenB common.Address) (*types.Transaction, error) {\r\n\treturn _IUniswapV2Factory.Contract.CreatePair(&_IUniswapV2Factory.TransactOpts, tokenA, tokenB)\r\n}", "func (d *Driver) CreateEndpoint(r *sdk.CreateEndpointRequest) (*sdk.CreateEndpointResponse, error) {\n\tendID := r.EndpointID\n\tnetID := r.NetworkID\n\teInfo := r.Interface\n\tlog.Debugf(\"CreateEndpoint called :%v\", r)\n\t// Get the network handler and make sure it exists\n\td.Lock()\n\tnetwork, ok := d.networks[r.NetworkID]\n\td.Unlock()\n\n\tif !ok {\n\t\treturn nil, types.NotFoundErrorf(\"network %s does not exist\", netID)\n\t}\n\n\t// Try to convert the options to endpoint configuration\n\tepConfig, err := parseEndpointOptions(r.Options)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Create and add the endpoint\n\tnetwork.Lock()\n\tendpoint := &bridgeEndpoint{id: endID, nid: netID, config: epConfig}\n\tnetwork.endpoints[endID] = endpoint\n\tnetwork.Unlock()\n\n\t// On failure make sure to remove the endpoint\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tnetwork.Lock()\n\t\t\tdelete(network.endpoints, endID)\n\t\t\tnetwork.Unlock()\n\t\t}\n\t}()\n\n\t// Generate a name for what will be the host side pipe interface\n\thostIfName, err := netutils.GenerateIfaceName(d.nlh, vethPrefix, vethLen)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Generate a name for what will be the sandbox side pipe interface\n\tcontainerIfName := network.config.ContainerIfName\n\n\t// Generate and add the interface pipe host <-> sandbox\n\tveth := &netlink.Veth{\n\t\tLinkAttrs: netlink.LinkAttrs{Name: hostIfName, TxQLen: 0},\n\t\tPeerName: containerIfName}\n\tif err = d.nlh.LinkAdd(veth); err != nil {\n\t\treturn nil, types.InternalErrorf(\"failed to add the host (%s) <=> sandbox (%s) pair interfaces: %v\", hostIfName, containerIfName, err)\n\t}\n\n\t// Get the host side pipe interface handler\n\thost, err := d.nlh.LinkByName(hostIfName)\n\tif err != nil {\n\t\treturn nil, types.InternalErrorf(\"failed to find host side interface %s: %v\", hostIfName, err)\n\t}\n\tdefer func() {\n\t\tif err != nil {\n\t\t\td.nlh.LinkDel(host)\n\t\t}\n\t}()\n\n\t// Get the sandbox side pipe interface handler\n\tsbox, err := d.nlh.LinkByName(containerIfName)\n\tif err != nil {\n\t\treturn nil, types.InternalErrorf(\"failed to find sandbox side interface %s: %v\", containerIfName, err)\n\t}\n\tdefer func() {\n\t\tif err != nil {\n\t\t\td.nlh.LinkDel(sbox)\n\t\t}\n\t}()\n\n\tnetwork.Lock()\n\tconfig := network.config\n\tnetwork.Unlock()\n\n\t// Add bridge inherited attributes to pipe interfaces\n\tif config.Mtu != 0 {\n\t\terr = d.nlh.LinkSetMTU(host, config.Mtu)\n\t\tif err != nil {\n\t\t\treturn nil, types.InternalErrorf(\"failed to set MTU on host interface %s: %v\", hostIfName, err)\n\t\t}\n\t\terr = d.nlh.LinkSetMTU(sbox, config.Mtu)\n\t\tif err != nil {\n\t\t\treturn nil, types.InternalErrorf(\"failed to set MTU on sandbox interface %s: %v\", containerIfName, err)\n\t\t}\n\t}\n\n\t// Attach host side pipe interface into the bridge\n\tif err = addToBridge(d.nlh, hostIfName, config.BridgeName); err != nil {\n\t\treturn nil, fmt.Errorf(\"adding interface %s to bridge %s failed: %v\", hostIfName, config.BridgeName, err)\n\t}\n\n\t// Store the sandbox side pipe interface parameters\n\tendpoint.srcName = containerIfName\n\tendpoint.macAddress = eInfo.MacAddress\n\tendpoint.addr = eInfo.Address\n\tendpoint.addrv6 = eInfo.AddressIPv6\n\n\t// Up the host interface after finishing all netlink configuration\n\tif err = d.nlh.LinkSetUp(host); err != nil {\n\t\treturn nil, fmt.Errorf(\"could not set link up for host interface %s: %v\", hostIfName, err)\n\t}\n\n\tres := &sdk.CreateEndpointResponse{\n\t\tInterface: &sdk.EndpointInterface{\n\t\t\tAddress: endpoint.addr,\n\t\t\tMacAddress: endpoint.macAddress,\n\t\t},\n\t}\n\n\tlog.Debugf(\"Create endpoint response: %+v\", res)\n\tlog.Debugf(\"Create endpoint %s %+v\", endID, res)\n\treturn res, nil\n}", "func networkCreateExample() string {\n\treturn `$ pouch network create -n pouchnet -d bridge --gateway 192.168.1.1 --subnet 192.168.1.0/24\npouchnet: e1d541722d68dc5d133cca9e7bd8fd9338603e1763096c8e853522b60d11f7b9`\n}", "func (_MainnetCryptoCardsContract *MainnetCryptoCardsContractCaller) Gateway(opts *bind.CallOpts) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _MainnetCryptoCardsContract.contract.Call(opts, out, \"gateway\")\n\treturn *ret0, err\n}", "func (sb *Sandbox) setupDefaultGW() error {\n\t// check if the container already has a GW endpoint\n\tif ep := sb.getEndpointInGWNetwork(); ep != nil {\n\t\treturn nil\n\t}\n\n\tc := sb.controller\n\n\t// Look for default gw network. In case of error (includes not found),\n\t// retry and create it if needed in a serialized execution.\n\tn, err := c.NetworkByName(libnGWNetwork)\n\tif err != nil {\n\t\tif n, err = c.defaultGwNetwork(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tcreateOptions := []EndpointOption{CreateOptionAnonymous()}\n\n\tvar gwName string\n\tif len(sb.containerID) <= gwEPlen {\n\t\tgwName = \"gateway_\" + sb.containerID\n\t} else {\n\t\tgwName = \"gateway_\" + sb.id[:gwEPlen]\n\t}\n\n\tsbLabels := sb.Labels()\n\n\tif sbLabels[netlabel.PortMap] != nil {\n\t\tcreateOptions = append(createOptions, CreateOptionPortMapping(sbLabels[netlabel.PortMap].([]types.PortBinding)))\n\t}\n\n\tif sbLabels[netlabel.ExposedPorts] != nil {\n\t\tcreateOptions = append(createOptions, CreateOptionExposedPorts(sbLabels[netlabel.ExposedPorts].([]types.TransportPort)))\n\t}\n\n\tepOption := getPlatformOption()\n\tif epOption != nil {\n\t\tcreateOptions = append(createOptions, epOption)\n\t}\n\n\tnewEp, err := n.CreateEndpoint(gwName, createOptions...)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"container %s: endpoint create on GW Network failed: %v\", sb.containerID, err)\n\t}\n\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tif err2 := newEp.Delete(true); err2 != nil {\n\t\t\t\tlog.G(context.TODO()).Warnf(\"Failed to remove gw endpoint for container %s after failing to join the gateway network: %v\",\n\t\t\t\t\tsb.containerID, err2)\n\t\t\t}\n\t\t}\n\t}()\n\n\tif err = newEp.sbJoin(sb); err != nil {\n\t\treturn fmt.Errorf(\"container %s: endpoint join on GW Network failed: %v\", sb.containerID, err)\n\t}\n\n\treturn nil\n}", "func CreateManet() *ManetConnection {\n\n\taddr := ToUDPAddr(GetMyAddress())\n\tconn, err := net.ListenUDP(\"udp\", addr)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn BindManet(conn)\n}", "func (__receiver_OService *OutgoingCallerIDService) Create() *OutgoingCallerIDService {\n\t__receiver_OService.action = types.CREATE\n\t__receiver_OService.data = resources.OutgoingCallerIDDetails{}\n\t__receiver_OService.url = resources.OutgoingCallerIDURLS[types.CREATE]\n\treturn __receiver_OService\n}", "func CreateProspectNetwork(prospectID int64, ec2InstanceID string) (*Network, bool) {\n\tbase10Bits, ok := NextNetwork(ec2InstanceID)\n\tif !ok {\n\t\tlog.Printf(\"error: failed to get next network\")\n\t\treturn nil, false\n\t}\n\tsshPort, ok := NextPort(ec2InstanceID)\n\tif !ok {\n\t\tlog.Printf(\"error: failed to get next SSH port\")\n\t\treturn nil, false\n\t}\n\tipv4Network := calculateNetwork(base10Bits, 0)\n\trand.Seed(time.Now().Unix())\n\tnetwork := &Network{\n\t\tEC2InstanceID: ec2InstanceID,\n\t\tNetwork: ipv4Network,\n\t\tMask: defaultNetworkMask,\n\t\tProspectID: prospectID,\n\t\tExamContainerIP: calculateNetwork(base10Bits, 2),\n\t\tGatewayIP: calculateNetwork(base10Bits, 1),\n\t\tProctorContainerIP: calculateNetwork(\n\t\t\tbase10Bits,\n\t\t\trand.Int63n(24)+230),\n\t\tSSHPort: sshPort,\n\t}\n\terr := connection.QueryRow(`\n\tINSERT INTO prospect_network\n\t(ec2_instance_id, network, mask, prospect_id, exam_container_ip, proctor_container_ip, gateway_ip, ssh_port)\n\tVALUES\n\t($1, $2, $3, $4, $5, $6, $7, $8)\n\tRETURNING id, created, modified\n\t`,\n\t\tnetwork.EC2InstanceID,\n\t\tnetwork.Network,\n\t\tnetwork.Mask,\n\t\tnetwork.ProspectID,\n\t\tnetwork.ExamContainerIP,\n\t\tnetwork.ProctorContainerIP,\n\t\tnetwork.GatewayIP,\n\t\tnetwork.SSHPort,\n\t).Scan(&network.ID, &network.Created, &network.Modified)\n\tif err != nil {\n\t\tlog.Printf(\"error: failed to create network for %d on %s: %s\", prospectID, ec2InstanceID, err)\n\t\treturn nil, false\n\t}\n\treturn network, true\n}", "func Connect(config ConfigOption, identity IdentityOption, options ...Option) (*Gateway, error) {\n\n\tg := &Gateway{\n\t\toptions: &gatewayOptions{\n\t\t\tCommitHandler: DefaultCommitHandlers.OrgAll,\n\t\t\tDiscovery: true,\n\t\t},\n\t}\n\n\terr := config(g)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Failed to apply config option\")\n\t}\n\n\terr = identity(g)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Failed to apply identity option\")\n\t}\n\n\tfor _, option := range options {\n\t\terr = option(g)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"Failed to apply gateway option\")\n\t\t}\n\t}\n\n\treturn g, nil\n}", "func createRemoteProxy(proxy *NTLMProxy, pURL, protocol, origin string) http.Handler {\r\n\tgenConn := func() (net.Conn, error) {\r\n\t\t//conn, err := ProxyDial(pURL, \"\", origin)\r\n\t\tconn, err := proxy.Websocket(pURL, \"\", origin)\r\n\t\tif err != nil {\r\n\t\t\treturn nil, err\r\n\t\t}\r\n\r\n\t\treturn fetch.NewClientConn(conn.UnderlyingConn(), 0x56), nil\r\n\t}\r\n\tgenConn = logConnect(genConn)\r\n\treturn Tunnel(genConn)\r\n}", "func TestGatewayOwnership(t *testing.T) {\n\ttestName := \"test-gateway-owned\"\n\tcontourName := fmt.Sprintf(\"%s-contour\", testName)\n\tgcName := \"test-gatewayclass-owned\"\n\tcfg := objcontour.Config{\n\t\tName: contourName,\n\t\tNamespace: operatorNs,\n\t\tSpecNs: specNs,\n\t\tNetworkType: operatorv1alpha1.NodePortServicePublishingType,\n\t\tGatewayClass: &gcName,\n\t}\n\n\tnonOwnedClass := \"test-gatewayclass-not-owned\"\n\t// Create Gateway API resources that should not be managed by the operator.\n\tif err := newGatewayClass(ctx, kclient, nonOwnedClass); err != nil {\n\t\tt.Fatalf(\"failed to create gatewayclass %s: %v\", nonOwnedClass, err)\n\t}\n\tt.Logf(\"created gatewayclass %s\", nonOwnedClass)\n\n\t// The gatewayclass should not report admitted.\n\tif err := waitForGatewayClassStatusConditions(ctx, kclient, 5*time.Second, nonOwnedClass, expectedNonOwnedGatewayClassConditions...); err != nil {\n\t\tt.Fatalf(\"failed to observe expected status conditions for gatewayclass %s: %v\", nonOwnedClass, err)\n\t}\n\n\t// Create the namespace used by the non-owned gateway\n\tif err := newNs(ctx, kclient, cfg.SpecNs); err != nil {\n\t\tt.Fatalf(\"failed to create namespace %s: %v\", cfg.SpecNs, err)\n\t}\n\n\tnonOwnedGateway := \"other-vendor\"\n\tappName := fmt.Sprintf(\"%s-%s\", testAppName, testName)\n\tif err := newGateway(ctx, kclient, cfg.SpecNs, nonOwnedGateway, nonOwnedClass, \"app\", appName); err != nil {\n\t\tt.Fatalf(\"failed to create gateway %s/%s: %v\", cfg.SpecNs, nonOwnedGateway, err)\n\t}\n\tt.Logf(\"created gateway %s/%s\", cfg.SpecNs, nonOwnedGateway)\n\n\t// The gateway should not report scheduled.\n\tif err := waitForGatewayStatusConditions(ctx, kclient, 5*time.Second, nonOwnedGateway, cfg.SpecNs, expectedNonOwnedGatewayConditions...); err != nil {\n\t\tt.Fatalf(\"failed to observe expected status conditions for gateway %s/%s: %v\", cfg.SpecNs, nonOwnedGateway, err)\n\t}\n\n\t// Create the Contour and Gateway API resources that should be managed by the operator.\n\tcntr, err := newContour(ctx, kclient, cfg)\n\tif err != nil {\n\t\tt.Fatalf(\"failed to create contour %s/%s: %v\", operatorNs, contourName, err)\n\t}\n\tt.Logf(\"created contour %s/%s\", cntr.Namespace, cntr.Name)\n\n\tif err := newOperatorGatewayClass(ctx, kclient, gcName, operatorNs, contourName); err != nil {\n\t\tt.Fatalf(\"failed to create gatewayclass %s: %v\", gcName, err)\n\t}\n\tt.Logf(\"created gatewayclass %s\", gcName)\n\n\t// The gatewayclass should now report admitted.\n\tif err := waitForGatewayClassStatusConditions(ctx, kclient, 1*time.Minute, gcName, expectedGatewayClassConditions...); err != nil {\n\t\tt.Fatalf(\"failed to observe expected status conditions for gatewayclass %s: %v\", gcName, err)\n\t}\n\n\t// The contour should now report available.\n\tif err := waitForContourStatusConditions(ctx, kclient, 1*time.Minute, contourName, operatorNs, expectedContourConditions...); err != nil {\n\t\tt.Fatalf(\"failed to observe expected status conditions for contour %s/%s: %v\", operatorNs, testName, err)\n\t}\n\tt.Logf(\"observed expected status conditions for contour %s/%s\", testName, operatorNs)\n\n\t// Create the gateway. The gateway must be projectcontour/contour until the following issue is fixed:\n\t// https://github.com/projectcontour/contour-operator/issues/241\n\tgwName := \"contour\"\n\tif err := newGateway(ctx, kclient, cfg.SpecNs, gwName, gcName, \"app\", appName); err != nil {\n\t\tt.Fatalf(\"failed to create gateway %s/%s: %v\", cfg.SpecNs, gwName, err)\n\t}\n\tt.Logf(\"created gateway %s/%s\", cfg.SpecNs, gwName)\n\n\t// The gateway should report admitted.\n\tif err := waitForGatewayStatusConditions(ctx, kclient, 3*time.Minute, gwName, cfg.SpecNs, expectedGatewayConditions...); err != nil {\n\t\tt.Fatalf(\"failed to observe expected status conditions for gateway %s/%s: %v\", cfg.SpecNs, gwName, err)\n\t}\n\n\tgateways := []string{nonOwnedGateway, gwName}\n\tfor _, gw := range gateways {\n\t\t// Ensure the gateway can be deleted and clean-up.\n\t\tif err := deleteGateway(ctx, kclient, 3*time.Minute, gw, cfg.SpecNs); err != nil {\n\t\t\tt.Fatalf(\"failed to delete gateway %s/%s: %v\", cfg.SpecNs, gw, err)\n\t\t}\n\t}\n\n\tclasses := []string{nonOwnedClass, gcName}\n\tfor _, class := range classes {\n\t\t// Ensure the gatewayclass can be deleted and clean-up.\n\t\tif err := deleteGatewayClass(ctx, kclient, 3*time.Minute, class); err != nil {\n\t\t\tt.Fatalf(\"failed to delete gatewayclass %s: %v\", class, err)\n\t\t}\n\t}\n\n\t// Ensure the contour can be deleted and clean-up.\n\tif err := deleteContour(ctx, kclient, 3*time.Minute, contourName, operatorNs); err != nil {\n\t\tt.Fatalf(\"failed to delete contour %s/%s: %v\", operatorNs, contourName, err)\n\t}\n\n\t// Ensure the envoy service is cleaned up automatically.\n\tif err := waitForServiceDeletion(ctx, kclient, 3*time.Minute, specNs, \"envoy\"); err != nil {\n\t\tt.Fatalf(\"failed to delete contour %s/envoy: %v\", specNs, err)\n\t}\n\tt.Logf(\"cleaned up envoy service %s/envoy\", specNs)\n\n\t// Delete the operand namespace since contour.spec.namespace.removeOnDeletion\n\t// defaults to false.\n\tif err := deleteNamespace(ctx, kclient, 5*time.Minute, cfg.SpecNs); err != nil {\n\t\tt.Fatalf(\"failed to delete namespace %s: %v\", cfg.SpecNs, err)\n\t}\n\tt.Logf(\"observed the deletion of namespace %s\", cfg.SpecNs)\n}", "func (na *Nagent) CreateTunnel(tun *netproto.Tunnel) error {\n\terr := na.validateMeta(tun.Kind, tun.ObjectMeta)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// check if tunnel already exists\n\toldTun, err := na.FindTunnel(tun.ObjectMeta)\n\tif err == nil {\n\t\t// check if tunnel contents are same\n\t\tif !proto.Equal(&oldTun.Spec, &tun.Spec) {\n\t\t\tlog.Errorf(\"Tunnel %+v already exists\", oldTun)\n\t\t\treturn errors.New(\"tunnel already exists\")\n\t\t}\n\n\t\tlog.Infof(\"Received duplicate tunnel create for {%+v}\", tun)\n\t\treturn nil\n\t}\n\t// find the corresponding namespace\n\tns, err := na.FindNamespace(tun.ObjectMeta)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// find the corresponding vrf for the route\n\tvrf, err := na.ValidateVrf(tun.Tenant, tun.Namespace, tun.Spec.VrfName)\n\tif err != nil {\n\t\tlog.Errorf(\"Failed to find the vrf %v\", tun.Spec.VrfName)\n\t\treturn err\n\t}\n\t// Allocate ID only on first object creates and use existing ones during config replay\n\tif tun.Status.TunnelID == 0 {\n\t\t// Tunnel IDs and Interface IDs must be unique in the datapath as tunnel is modeled as an interface in HAL.\n\t\ttunnelID, err := na.Store.GetNextID(types.InterfaceID, 0)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Could not allocate tunnel id. {%+v}\", err)\n\t\t\treturn err\n\t\t}\n\t\ttun.Status.TunnelID = tunnelID + types.UplinkOffset + types.TunnelOffset\n\t}\n\n\t// create it in datapath\n\terr = na.Datapath.CreateTunnel(tun, vrf)\n\tif err != nil {\n\t\tlog.Errorf(\"Error creating tunnel in datapath. Nw {%+v}. Err: %v\", tun, err)\n\t\treturn err\n\t}\n\n\t// Add the current tunnel as a dependency to the namespace.\n\terr = na.Solver.Add(ns, tun)\n\tif err != nil {\n\t\tlog.Errorf(\"Could not add dependency. Parent: %v. Child: %v\", ns, tun)\n\t\treturn err\n\t}\n\n\t// Add the current tunnel as a dependency to the vrf.\n\terr = na.Solver.Add(vrf, tun)\n\tif err != nil {\n\t\tlog.Errorf(\"Could not add dependency. Parent: %v. Child: %v\", vrf, tun)\n\t\treturn err\n\t}\n\n\t// save it in db\n\tkey := na.Solver.ObjectKey(tun.ObjectMeta, tun.TypeMeta)\n\tna.Lock()\n\tna.TunnelDB[key] = tun\n\tna.Unlock()\n\tdat, _ := tun.Marshal()\n\terr = na.Store.RawWrite(tun.GetKind(), tun.GetKey(), dat)\n\n\treturn err\n}", "func Create(client *occlient.Client, kClient *kclient.Client, parameters CreateParameters, isRouteSupported bool, isS2I bool) (string, error) {\n\n\tif parameters.urlKind != localConfigProvider.INGRESS && parameters.urlKind != localConfigProvider.ROUTE {\n\t\treturn \"\", fmt.Errorf(\"urlKind %s is not supported for URL creation\", parameters.urlKind)\n\t}\n\n\tif !parameters.secureURL && parameters.secretName != \"\" {\n\t\treturn \"\", fmt.Errorf(\"secret name can only be used for secure URLs\")\n\t}\n\n\tlabels := urlLabels.GetLabels(parameters.urlName, parameters.componentName, parameters.applicationName, true)\n\n\tserviceName := \"\"\n\n\tif !isS2I && parameters.urlKind == localConfigProvider.INGRESS && kClient != nil {\n\t\tif parameters.host == \"\" {\n\t\t\treturn \"\", errors.Errorf(\"the host cannot be empty\")\n\t\t}\n\t\tserviceName := parameters.componentName\n\t\tingressDomain := fmt.Sprintf(\"%v.%v\", parameters.urlName, parameters.host)\n\n\t\tdeployment, err := kClient.GetOneDeployment(parameters.componentName, parameters.applicationName)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\townerReference := generator.GetOwnerReference(deployment)\n\t\tif parameters.secureURL {\n\t\t\tif len(parameters.secretName) != 0 {\n\t\t\t\t_, err := kClient.KubeClient.CoreV1().Secrets(kClient.Namespace).Get(context.TODO(), parameters.secretName, metav1.GetOptions{})\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn \"\", errors.Wrap(err, \"unable to get the provided secret: \"+parameters.secretName)\n\t\t\t\t}\n\t\t\t}\n\t\t\tif len(parameters.secretName) == 0 {\n\t\t\t\tdefaultTLSSecretName := parameters.componentName + \"-tlssecret\"\n\t\t\t\t_, err := kClient.KubeClient.CoreV1().Secrets(kClient.Namespace).Get(context.TODO(), defaultTLSSecretName, metav1.GetOptions{})\n\t\t\t\t// create tls secret if it does not exist\n\t\t\t\tif kerrors.IsNotFound(err) {\n\t\t\t\t\tselfsignedcert, err := kclient.GenerateSelfSignedCertificate(parameters.host)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn \"\", errors.Wrap(err, \"unable to generate self-signed certificate for clutser: \"+parameters.host)\n\t\t\t\t\t}\n\t\t\t\t\t// create tls secret\n\t\t\t\t\tsecretlabels := componentlabels.GetLabels(parameters.componentName, parameters.applicationName, true)\n\t\t\t\t\tobjectMeta := metav1.ObjectMeta{\n\t\t\t\t\t\tName: defaultTLSSecretName,\n\t\t\t\t\t\tLabels: secretlabels,\n\t\t\t\t\t\tOwnerReferences: []v1.OwnerReference{\n\t\t\t\t\t\t\townerReference,\n\t\t\t\t\t\t},\n\t\t\t\t\t}\n\t\t\t\t\tsecret, err := kClient.CreateTLSSecret(selfsignedcert.CertPem, selfsignedcert.KeyPem, objectMeta)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn \"\", errors.Wrap(err, \"unable to create tls secret\")\n\t\t\t\t\t}\n\t\t\t\t\tparameters.secretName = secret.Name\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn \"\", err\n\t\t\t\t} else {\n\t\t\t\t\t// tls secret found for this component\n\t\t\t\t\tparameters.secretName = defaultTLSSecretName\n\t\t\t\t}\n\n\t\t\t}\n\n\t\t}\n\n\t\tobjectMeta := generator.GetObjectMeta(parameters.componentName, kClient.Namespace, labels, nil)\n\t\t// to avoid error due to duplicate ingress name defined in different devfile components\n\t\tobjectMeta.Name = fmt.Sprintf(\"%s-%s\", parameters.urlName, parameters.componentName)\n\t\tobjectMeta.OwnerReferences = append(objectMeta.OwnerReferences, ownerReference)\n\n\t\tingressParam := generator.IngressParams{\n\t\t\tObjectMeta: objectMeta,\n\t\t\tIngressSpecParams: generator.IngressSpecParams{\n\t\t\t\tServiceName: serviceName,\n\t\t\t\tIngressDomain: ingressDomain,\n\t\t\t\tPortNumber: intstr.FromInt(parameters.portNumber),\n\t\t\t\tTLSSecretName: parameters.secretName,\n\t\t\t\tPath: parameters.path,\n\t\t\t},\n\t\t}\n\t\tingress := generator.GetIngress(ingressParam)\n\t\t// Pass in the namespace name, link to the service (componentName) and labels to create a ingress\n\t\ti, err := kClient.CreateIngress(*ingress)\n\t\tif err != nil {\n\t\t\treturn \"\", errors.Wrap(err, \"unable to create ingress\")\n\t\t}\n\t\treturn GetURLString(GetProtocol(routev1.Route{}, *i), \"\", ingressDomain, false), nil\n\t} else {\n\t\tif !isRouteSupported {\n\t\t\treturn \"\", errors.Errorf(\"routes are not available on non OpenShift clusters\")\n\t\t}\n\n\t\tvar ownerReference metav1.OwnerReference\n\t\tif isS2I || kClient == nil {\n\t\t\tvar err error\n\t\t\tparameters.urlName, err = util.NamespaceOpenShiftObject(parameters.urlName, parameters.applicationName)\n\t\t\tif err != nil {\n\t\t\t\treturn \"\", errors.Wrapf(err, \"unable to create namespaced name\")\n\t\t\t}\n\t\t\tserviceName, err = util.NamespaceOpenShiftObject(parameters.componentName, parameters.applicationName)\n\t\t\tif err != nil {\n\t\t\t\treturn \"\", errors.Wrapf(err, \"unable to create namespaced name\")\n\t\t\t}\n\n\t\t\t// since the serviceName is same as the DC name, we use that to get the DC\n\t\t\t// to which this route belongs. A better way could be to get service from\n\t\t\t// the name and set it as owner of the route\n\t\t\tdc, err := client.GetDeploymentConfigFromName(serviceName)\n\t\t\tif err != nil {\n\t\t\t\treturn \"\", errors.Wrapf(err, \"unable to get DeploymentConfig %s\", serviceName)\n\t\t\t}\n\n\t\t\townerReference = occlient.GenerateOwnerReference(dc)\n\t\t} else {\n\t\t\t// to avoid error due to duplicate ingress name defined in different devfile components\n\t\t\tparameters.urlName = fmt.Sprintf(\"%s-%s\", parameters.urlName, parameters.componentName)\n\t\t\tserviceName = parameters.componentName\n\n\t\t\tdeployment, err := kClient.GetOneDeployment(parameters.componentName, parameters.applicationName)\n\t\t\tif err != nil {\n\t\t\t\treturn \"\", err\n\t\t\t}\n\t\t\townerReference = generator.GetOwnerReference(deployment)\n\t\t}\n\n\t\t// Pass in the namespace name, link to the service (componentName) and labels to create a route\n\t\troute, err := client.CreateRoute(parameters.urlName, serviceName, intstr.FromInt(parameters.portNumber), labels, parameters.secureURL, parameters.path, ownerReference)\n\t\tif err != nil {\n\t\t\treturn \"\", errors.Wrap(err, \"unable to create route\")\n\t\t}\n\t\treturn GetURLString(GetProtocol(*route, iextensionsv1.Ingress{}), route.Spec.Host, \"\", true), nil\n\t}\n\n}", "func NewHTTPGateway(c *client.Client, p *entity.Profile) (*HTTPGateway, error) {\n\n\tif p.Certificate != nil {\n\t\ttlsConfig, err := GetTLSConfig(p.Certificate)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tc.HTTPClient.HTTPClient.Transport = &http.Transport{\n\t\t\tTLSClientConfig: tlsConfig,\n\t\t}\n\t}\n\n\t// set max retry if provided by command\n\tif p.MaxRetry != nil {\n\t\tc.HTTPClient.RetryMax = *p.MaxRetry\n\t}\n\t//override with environment variable if exists\n\tif val, ok := overrideValue(p, environment.OPENSEARCH_MAX_RETRY); ok {\n\t\tc.HTTPClient.RetryMax = *val\n\t}\n\n\t// set connection timeout if provided by command\n\tif p.Timeout != nil {\n\t\tc.HTTPClient.HTTPClient.Timeout = time.Duration(*p.Timeout) * time.Second\n\t}\n\t//override with environment variable if exists\n\tif duration, ok := overrideValue(p, environment.OPENSEARCH_TIMEOUT); ok {\n\t\tc.HTTPClient.HTTPClient.Timeout = time.Duration(*duration) * time.Second\n\t}\n\n\treturn &HTTPGateway{\n\t\tClient: c,\n\t\tProfile: p,\n\t}, nil\n}", "func NewDBGatewayStorage(db *sql.DB, userManagement storage.UserManagement) (storage.GatewayStorage, error) {\n\tret := dbGatewayStorage{dbStore{db: db, userManagement: userManagement}, nil, nil, nil, nil, nil, nil, nil}\n\n\tvar err error\n\tsqlSelect := `\n\t\tSELECT\n\t\t\tgw.gateway_eui,\n\t\t\tgw.latitude,\n\t\t\tgw.longitude,\n\t\t\tgw.altitude,\n\t\t\tgw.ip,\n\t\t\tgw.strict_ip,\n\t\t\tgw.tags\n\t\tFROM\n\t\t\tlora_gateway gw,\n\t\t\tlora_owner o\n\t\tWHERE\n\t\t\tgw.owner_id = o.owner_id AND o.user_id = $1`\n\n\tif ret.listStatement, err = db.Prepare(sqlSelect); err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to prepare select statement: %v\", err)\n\t}\n\n\tsqlInsert := `\n\t\tINSERT INTO lora_gateway (\n\t\t\tgateway_eui,\n\t\t\tlatitude,\n\t\t\tlongitude,\n\t\t\taltitude,\n\t\t\tip,\n\t\t\tstrict_ip,\n\t\t\towner_id,\n\t\t\ttags)\n\t\tVALUES ($1, $2, $3, $4, $5, $6, $7, $8)`\n\tif ret.putStatement, err = db.Prepare(sqlInsert); err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to prepare insert statement: %v\", err)\n\t}\n\n\tsqlDelete := `\n\t\tDELETE FROM\n\t\t\tlora_gateway gw\n\t\tUSING\n\t\t\tlora_owner o\n\t\tWHERE\n\t\t\tgw.gateway_eui = $1 AND gw.owner_id = o.owner_id AND o.user_id = $2`\n\tif ret.deleteStatement, err = db.Prepare(sqlDelete); err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to prepare delete statement: %v\", err)\n\t}\n\n\tsqlSelectOne := `\n\t\tSELECT\n\t\t\tgw.gateway_eui,\n\t\t\tgw.latitude,\n\t\t\tgw.longitude,\n\t\t\tgw.altitude,\n\t\t\tgw.ip,\n\t\t\tgw.strict_ip,\n\t\t\tgw.tags\n\t\tFROM\n\t\t\tlora_gateway gw,\n\t\t\tlora_owner o\n\t\tWHERE\n\t\t\tgw.gateway_eui = $1 AND gw.owner_id = o.owner_id AND o.user_id = $2`\n\tif ret.getStatement, err = db.Prepare(sqlSelectOne); err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to prepare select statement: %v\", err)\n\t}\n\n\tsysGetStatement := `\n\t\tSELECT\n\t\t\tgw.gateway_eui,\n\t\t\tgw.latitude,\n\t\t\tgw.longitude,\n\t\t\tgw.altitude,\n\t\t\tgw.ip,\n\t\t\tgw.strict_ip,\n\t\t\tgw.tags\n\t\tFROM\n\t\t\tlora_gateway gw\n\t\tWHERE\n\t\t\tgw.gateway_eui = $1`\n\tif ret.getSysStatement, err = db.Prepare(sysGetStatement); err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to prepare system get statement: %v\", err)\n\t}\n\n\tupdateStatement := `\n\t\tUPDATE\n\t\t\tlora_gateway gw\n\t\tSET\n\t\t\tlatitude = $1, longitude = $2, altitude = $3, ip = $4, strict_ip = $5, tags = $6\n\t\tFROM\n\t\t\tlora_owner o\n\t\tWHERE\n\t\t\tgw.gateway_eui = $7 AND gw.owner_id = o.owner_id AND o.user_id = $8\n\t`\n\tif ret.updateStatement, err = db.Prepare(updateStatement); err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to prepare update statement: %v\", err)\n\t}\n\n\tpublicListStatement := `SELECT gateway_eui, latitude, longitude, altitude FROM lora_gateway`\n\tif ret.publicListStatement, err = db.Prepare(publicListStatement); err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to prepare public gateway statement: %v\", err)\n\t}\n\treturn &ret, nil\n}", "func (tester *ServiceTester) CreateSubnet(t *testing.T, networkID, name string, withGW bool, cidr string) (*abstract.Subnet, *abstract.HostFull) {\n\tctx := context.Background()\n\tsubnet, err := tester.Service.CreateSubnet(context.Background(), abstract.SubnetRequest{\n\t\tName: name,\n\t\tIPVersion: ipversion.IPv4,\n\t\tNetworkID: networkID,\n\t\tCIDR: cidr,\n\t})\n\trequire.NoError(t, err)\n\n\tvar gateway *abstract.HostFull\n\tif withGW {\n\t\ttpls, err := tester.Service.ListTemplatesBySizing(ctx, abstract.HostSizingRequirements{\n\t\t\tMinCores: 1,\n\t\t\tMinRAMSize: 1,\n\t\t\tMinDiskSize: 0,\n\t\t}, false)\n\t\trequire.Nil(t, err)\n\t\timg, err := tester.Service.SearchImage(ctx, \"Ubuntu 20.04\")\n\t\trequire.Nil(t, err)\n\t\tkeypair, err := tester.Service.CreateKeyPair(ctx, \"kp_\"+subnet.Name)\n\t\trequire.Nil(t, err)\n\n\t\tgwRequest := abstract.HostRequest{\n\t\t\tImageID: img.ID,\n\t\t\tSubnets: []*abstract.Subnet{subnet},\n\t\t\tKeyPair: keypair,\n\t\t\tTemplateID: tpls[0].ID,\n\t\t\tResourceName: \"gw-\" + name,\n\t\t\tIsGateway: true,\n\t\t}\n\n\t\tgateway, _, err = tester.Service.CreateHost(context.Background(), gwRequest, nil)\n\t\trequire.Nil(t, err)\n\t\tsubnet.GatewayIDs = []string{gateway.Core.ID}\n\t}\n\n\treturn subnet, gateway\n}", "func NewServer(gateway tornet.Gateway, self tornet.RemoteKeyRing, logger log.Logger) (*Pairing, tornet.SecretIdentity, tornet.PublicAddress, error) {\n\t// Pairing will be done on an ephemeral channel, create a temporary identity\n\t// for it, reusing the same for both directions.\n\tidentity, err := tornet.GenerateIdentity()\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\taddress, err := tornet.GenerateAddress()\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\t// Create a temporary tornet server to accept the pairing connection on\n\tp := &Pairing{\n\t\tself: self,\n\t\tsingleton: make(chan struct{}, 1),\n\t\tfinished: make(chan struct{}),\n\t}\n\tp.peerset = tornet.NewPeerSet(tornet.PeerSetConfig{\n\t\tTrusted: []tornet.PublicIdentity{identity.Public()},\n\t\tHandler: protocols.MakeHandler(protocols.HandlerConfig{\n\t\t\tProtocol: Protocol,\n\t\t\tHandlers: map[uint]protocols.Handler{\n\t\t\t\t1: p.handleV1,\n\t\t\t},\n\t\t}),\n\t\tLogger: logger,\n\t})\n\tp.server, err = tornet.NewServer(tornet.ServerConfig{\n\t\tGateway: gateway,\n\t\tAddress: address,\n\t\tIdentity: identity,\n\t\tPeerSet: p.peerset,\n\t\tLogger: logger,\n\t})\n\tif err != nil {\n\t\tp.peerset.Close()\n\t\treturn nil, nil, nil, err\n\t}\n\treturn p, identity, address.Public(), nil\n}" ]
[ "0.7119966", "0.6591414", "0.6550007", "0.6460487", "0.6374037", "0.6263161", "0.6242896", "0.6193543", "0.61650044", "0.61519444", "0.6120445", "0.60989434", "0.6088052", "0.60854757", "0.6075359", "0.6066753", "0.60618615", "0.6058208", "0.6044567", "0.6017449", "0.59948236", "0.59871644", "0.5966109", "0.5951621", "0.5946494", "0.5945984", "0.58785295", "0.5852801", "0.58462363", "0.5821727", "0.58124435", "0.5801657", "0.5767732", "0.57560086", "0.57161605", "0.5709045", "0.5600124", "0.55272573", "0.55148697", "0.5512304", "0.5452149", "0.5449706", "0.5449464", "0.5448923", "0.54245985", "0.542426", "0.54038566", "0.53949976", "0.5394145", "0.5383435", "0.5372099", "0.53536415", "0.53069156", "0.53005147", "0.5296351", "0.5249737", "0.52491295", "0.52383846", "0.5220039", "0.52161074", "0.5215889", "0.5201088", "0.5199858", "0.5198158", "0.5187257", "0.51838905", "0.5159376", "0.5156327", "0.51529616", "0.5140078", "0.5135939", "0.51245534", "0.51168436", "0.51148564", "0.50999784", "0.50983554", "0.5094862", "0.5082032", "0.5075767", "0.50643957", "0.50625354", "0.50504416", "0.5044008", "0.50246865", "0.50224966", "0.50207466", "0.5018623", "0.501326", "0.50069463", "0.5001201", "0.5000347", "0.49971277", "0.49951273", "0.49912697", "0.4979493", "0.49791545", "0.49744138", "0.49714306", "0.49696362", "0.49689817" ]
0.6945442
1
You should always use this function to get a new CreateStaticRouteParams instance, as then you are sure you have configured all required params
func (s *VPCService) NewCreateStaticRouteParams(cidr string, gatewayid string) *CreateStaticRouteParams { p := &CreateStaticRouteParams{} p.p = make(map[string]interface{}) p.p["cidr"] = cidr p.p["gatewayid"] = gatewayid return p }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewStaticRouter() *StaticRouter {\n router := new(StaticRouter)\n\n return router\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t}\n}", "func NewStatic() filters.Spec { return &static{} }", "func NewStatic() filters.Spec { return &static{} }", "func (s *VPCService) NewListStaticRoutesParams() *ListStaticRoutesParams {\n\tp := &ListStaticRoutesParams{}\n\tp.p = make(map[string]interface{})\n\treturn p\n}", "func (s *VPCService) NewDeleteStaticRouteParams(id string) *DeleteStaticRouteParams {\n\tp := &DeleteStaticRouteParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewParams(acl ACL, daoOwner sdk.Address) Params {\n\treturn Params{\n\t\tACL: acl,\n\t\tDAOOwner: daoOwner,\n\t}\n}", "func NewParams() *Params {\n\treturn new(Params)\n}", "func GetParams(c context.Context, r *http.Request) RouteParams {\n\tif val, ok := c.Get(r, context.BaseCtxKey(\"params\")); ok {\n\t\treturn val.(RouteParams)\n\t}\n\n\treturn RouteParams{}\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules,\n\tmoneyMarkets MoneyMarkets, checkLtvIndexCount int) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t\tMoneyMarkets: moneyMarkets,\n\t\tCheckLtvIndexCount: checkLtvIndexCount,\n\t}\n}", "func NewParams() (Params, error) {\n\treturn Params{\n\t\tBaseParams: codec.BaseParams{\n\t\t\tKeyFrameInterval: 60,\n\t\t},\n\t}, nil\n}", "func NewParams() Params {\n\treturn &headerParams{\n\t\tparams: make(map[string]MaybeString),\n\t\tparamOrder: []string{},\n\t}\n}", "func NewParams(defaultSendEnabled bool) Params {\n\treturn Params{\n\t\tSendEnabled: nil,\n\t\tDefaultSendEnabled: defaultSendEnabled,\n\t}\n}", "func NewStatic() *Static {\n\treturn &Static{\n\t\tHome: views.NewView(\"bootstrap\", \"static/home\"),\n\t\tContact: views.NewView(\"bootstrap\", \"static/contact\"),\n\t\tPageNotFound: views.NewView(\"bootstrap\", \"static/pagenotfound\"),\n\t}\n\n}", "func NewParams(createWhoisPrice string, updateWhoisPrice string, deleteWhoisPrice string) Params {\n\treturn Params{\n\t\tCreateWhoisPrice: createWhoisPrice,\n\t\tUpdateWhoisPrice: updateWhoisPrice,\n\t\tDeleteWhoisPrice: deleteWhoisPrice,\n\t}\n}", "func mustMakePubliclyViewableParams(fsc *frontendServerConfig) publicparams.Matcher {\n\tvar publiclyViewableParams publicparams.Matcher\n\tvar err error\n\n\t// Load the publiclyViewable params if configured and disable querying for issues.\n\tif len(fsc.PubliclyAllowableParams) > 0 {\n\t\tif publiclyViewableParams, err = publicparams.MatcherFromRules(fsc.PubliclyAllowableParams); err != nil {\n\t\t\tsklog.Fatalf(\"Could not load list of public params: %s\", err)\n\t\t}\n\t}\n\n\t// Check if this is public instance. If so, make sure we have a non-nil Matcher.\n\tif fsc.IsPublicView && publiclyViewableParams == nil {\n\t\tsklog.Fatal(\"A non-empty map of publiclyViewableParams must be provided if is public view.\")\n\t}\n\n\treturn publiclyViewableParams\n}", "func NewStatic() *Static {\n\treturn &Static{\n\t\tHome: views.NewView(\"bootstrap\", \"static/home\"),\n\t\tContact: views.NewView(\"bootstrap\", \"static/contact\"),\n\t}\n}", "func NewStatic() *Static {\n\treturn &Static{\n\t\tHome: views.NewView(\"bootstrap\", \"static/home\"),\n\t\tContact: views.NewView(\"bootstrap\", \"static/contact\"),\n\t}\n}", "func NewParams() *Parameters {\n\treturn &Parameters{\n\t\tTokenType: \"transit\",\n\t\tTLSMode: 1,\n\t\tLeaderOnly: true,\n\t\tConnectTimeout: defaultConnectTimeout,\n\t\tReadTimeout: defaultReadTimeout,\n\t\tRetryCount: defaultRetries,\n\t\tRequireType: \"master\",\n\t}\n}", "func NewStatic() *Static {\n\treturn &Static{\n\t\tHomeView: views.NewView(\"bootstrap\", \"static/home\"),\n\t\tContactView: views.NewView(\"bootstrap\", \"static/contact\"),\n\t\tFaqView: views.NewView(\"bootstrap\", \"static/faq\"),\n\t}\n}", "func newTemplateParams(r *http.Request) templateParams {\n\tuser := ctx.Get(r, \"user\").(models.User)\n\tsession := ctx.Get(r, \"session\").(*sessions.Session)\n\tmodifySystem, _ := user.HasPermission(models.PermissionModifySystem)\n\treturn templateParams{\n\t\tToken: csrf.Token(r),\n\t\tUser: user,\n\t\tModifySystem: modifySystem,\n\t\tVersion: config.Version,\n\t\tFlashes: session.Flashes(),\n\t}\n}", "func newCreateParam4Create(req *http.Request) (*CreateParam, error) {\n\tparam := &CreateParam{}\n\terr := xreq.BindJSON(req, param)\n\treturn param, err\n}", "func NewStaticRoute(ctx *pulumi.Context,\n\tname string, args *StaticRouteArgs, opts ...pulumi.ResourceOption) (*StaticRoute, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.Nexthop == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Nexthop'\")\n\t}\n\tif args.Prefix == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Prefix'\")\n\t}\n\tif args.Priority == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Priority'\")\n\t}\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource StaticRoute\n\terr := ctx.RegisterResource(\"cloudflare:index/staticRoute:StaticRoute\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func GetOrCreate(client routeclient.RoutesGetter, required *routev1.Route) (*routev1.Route, bool, error) {\n\tisNew := false\n\troute, err := client.Routes(required.Namespace).Get(required.Name, metav1.GetOptions{})\n\tif apierrors.IsNotFound(err) {\n\t\tisNew = true\n\t\troute, err = client.Routes(required.Namespace).Create(required)\n\t}\n\tif err != nil {\n\t\treturn nil, isNew, err\n\t}\n\treturn route, isNew, nil\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewGetParams() *GetParams {\n\tvar (\n\t\tdeviceOSDefault = string(\"Android 9\")\n\t\tsendToEmailDefault = string(\"no\")\n\t)\n\treturn &GetParams{\n\t\tDeviceOS: &deviceOSDefault,\n\t\tSendToEmail: &sendToEmailDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewRoutingAppCoveragesCreateInstanceRequest(server string, body RoutingAppCoveragesCreateInstanceJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewRoutingAppCoveragesCreateInstanceRequestWithBody(server, \"application/json\", bodyReader)\n}", "func (s RealmGateway_export_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_export_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewParams(opts []copts.Opt) *Params {\r\n\tparams := &Params{}\r\n\tcopts.Apply(params, opts)\r\n\treturn params\r\n}", "func NewParams(opts []copts.Opt) *Params {\n\tparams := &Params{}\n\tcopts.Apply(params, opts)\n\treturn params\n}", "func Params(r *http.Request) map[string]string {\n\tpreviousPathOffset, ok :=\n\t\tr.Context().Value(previousPathOffsetContextKey).(int)\n\tif !ok {\n\t\tpreviousPathOffset = 0\n\t}\n\troutePath, ok := r.Context().Value(pathContextKey).(string)\n\tif !ok {\n\t\troutePath = \"/\"\n\t}\n\trequestPathComponents :=\n\t\tstrings.Split(r.URL.Path[1:], \"/\")[previousPathOffset:]\n\troutePathComponents := strings.Split(routePath[1:], \"/\")\n\n\tresult := make(map[string]string)\n\tfor i := 0; i < len(routePathComponents); i++ {\n\t\tif routePathComponents[i][0] == ':' {\n\t\t\tresult[routePathComponents[i][1:]] = requestPathComponents[i]\n\t\t}\n\t}\n\n\treturn result\n}", "func GetParams(r *http.Request) *Params {\n\tvar params *Params\n\tp := r.Context().Value(ContextNameRouterParams)\n\tif p != nil {\n\t\tparams = (p).(*Params)\n\t}\n\tif params == nil {\n\t\tparams = &Params{}\n\t\tctx := context.WithValue(r.Context(), ContextNameRouterParams, params)\n\t\t*r = *r.WithContext(ctx)\n\t}\n\treturn params\n}", "func New() provider.IPAMProvider {\n\treturn &staticProvider{\n\t\tlog: logf.Log.WithName(\"ipam-provider-static\"),\n\t}\n}", "func NewParams(communityTax sdk.Dec, withdrawAddrEnabled bool) Params {\n\treturn Params{\n\t\tCommunityTax: communityTax,\n\t\tWithdrawAddrEnabled: withdrawAddrEnabled,\n\t}\n}", "func (o *AggregatedDomain) CreateStaticRoute(child *StaticRoute) *bambou.Error {\n\n\treturn bambou.CurrentSession().CreateChild(o, child)\n}", "func NewParams(n, m int, prf, msg hasher.Hasher) *Params {\n\t// Don't allow creation of params if m == 0 or m > MaxMsgSize\n\tif m < 1 || m > MaxMsgSize {\n\t\treturn nil\n\t}\n\t// Don't allow creation of params if hash functions sizes are smaller than specified N and M\n\tif prf.Size() < n || msg.Size() < m {\n\t\treturn nil\n\t}\n\tchecksumLadders := 2\n\t// The only case that we need just 1 checksum ladder is for m=1\n\tif m == 1 {\n\t\tchecksumLadders = 1\n\t}\n\treturn &Params{\n\t\tn: n,\n\t\tm: m,\n\t\tprfHash: prf,\n\t\tmsgHash: msg,\n\t\ttotal: m + checksumLadders,\n\t}\n}", "func NewStatic(width int, zeitpunkt time.Time) (slm sunlightmap) {\n\treturn New(width, \"static\", []time.Time{zeitpunkt})\n}", "func NewStatic() *Static {\n\treturn &Static{\n\t\tHomeView: views.NewFiles(\"bootstrap\", \"static/home\"),\n\t\tContactView: views.NewFiles(\"bootstrap\", \"static/contact\"),\n\t\tFAQView: views.NewFiles(\"bootstrap\", \"static/faq\"),\n\t\tNotFoundView: views.NewFiles(\"bootstrap\", \"static/notfound\"),\n\t}\n}", "func (routeObj *Routes)NewRouter() *mux.Router {\n log := logger.GetLoggerInstance()\n router := mux.NewRouter().StrictSlash(true)\n routeObj.CreateAllRoutes()\n for _, route := range routeObj.entries {\n var handler http.Handler\n handler = route.HandlerFunc\n router.\n Methods(route.Method).\n Path(route.Pattern).\n Name(route.Name).\n Handler(handler)\n log.Trace(\"Created route for %s\", route.Name)\n }\n routeObj.controller = new(controller)\n return router\n}", "func NewParams() *Params {\n\tp := Params{}\n\tp.names = []string{}\n\tp.values = map[string]interface{}{}\n\n\treturn &p\n}", "func NewParams(nickname NicknameParams, dTag DTagParams, bio BioParams, oracle OracleParams) Params {\n\treturn Params{\n\t\tNickname: nickname,\n\t\tDTag: dTag,\n\t\tBio: bio,\n\t\tOracle: oracle,\n\t}\n}", "func NewGetRouteByIDParams() *GetRouteByIDParams {\n\treturn &GetRouteByIDParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewProviderParams() ProviderParams {\n\n\treturn ProviderParams{}\n}", "func NewParams(\n\ttaxPolicy, rewardPolicy PolicyConstraints,\n\tseigniorageBurden sdk.Dec,\n\tminingIncrement sdk.Dec,\n\twindowShort, windowLong, windowProbation sdk.Int,\n) Params {\n\treturn Params{\n\t\tTaxPolicy: taxPolicy,\n\t\tRewardPolicy: rewardPolicy,\n\t\tSeigniorageBurdenTarget: seigniorageBurden,\n\t\tMiningIncrement: miningIncrement,\n\t\tWindowShort: windowShort,\n\t\tWindowLong: windowLong,\n\t\tWindowProbation: windowProbation,\n\t}\n}", "func (t *Role) CreateParams() []interface{} {\n\treturn []interface{}{\n\t\t&t.Name,\n\t}\n}", "func createNodeRoute(w http.ResponseWriter, r *http.Request) {\n\troute := \"CreateNode\"\n\n\tquery := r.URL.Query()\n\tnodeID, initAmount := query.Get(\"nodeID\"), query.Get(\"initAmount\")\n\n\thandleRoute(route, nodeID, initAmount)\n}", "func (r PatternedRoute) Params() map[string]interface{} {\n\tpv := make(map[string]interface{})\n\n\tparamNames := r.ParamNames()\n\tfor i, v := range r.ParamValues() {\n\t\tpv[paramNames[i]] = v\n\t\tif n, err := strconv.Atoi(v.(string)); err == nil {\n\t\t\tpv[paramNames[i]] = n\n\t\t}\n\t}\n\treturn pv\n}", "func GetParamsObj(req *http.Request) httprouter.Params {\n\tps, ok := context.Get(req, Params).(httprouter.Params)\n\tif !ok {\n\t\treturn httprouter.Params{}\n\t}\n\treturn ps\n}", "func NewParamMiddleware(f func() interface{}) *ParamMiddleware {\n\tm := &ParamMiddleware{GetParams: f}\n\treturn m\n}", "func createRouter() *httprouter.Router {\n\n\trouter := httprouter.New()\n\trouter.GET(\"/\", index)\n\trouter.GET(\"/block/:block\", showBlock)\n\trouter.GET(\"/api/\"+network+\"/getdifficulty\", getDifficulty)\n\trouter.GET(\"/api/\"+network+\"/blocks\", getLatestBlocks)\n\trouter.GET(\"/api/\"+network+\"/block/:hash\", getBlock)\n\trouter.GET(\"/api/\"+network+\"/block-index/:height\", getBlockIndex)\n\trouter.GET(\"/api/\"+network+\"/tx/:txid\", getTransaction)\n\trouter.GET(\"/api/\"+network+\"/addr/:addr\", getAddressInfo)\n\trouter.GET(\"/api/\"+network+\"/addr/:addr/utxo\", getAddressUtxo)\n\n\tfileServer := http.FileServer(http.Dir(\"static\"))\n\n\trouter.GET(\"/static/*filepath\", func(w http.ResponseWriter, r *http.Request, p httprouter.Params) {\n\t\tw.Header().Set(\"Vary\", \"Accept-Encoding\")\n\t\tw.Header().Set(\"Cache-Control\", \"public, max-age=7776000\")\n\t\tr.URL.Path = p.ByName(\"filepath\")\n\t\tfileServer.ServeHTTP(w, r)\n\t})\n\n\treturn router\n}", "func NewStaticProvider(data map[string]interface{}) Provider {\n\treturn &staticProvider{\n\t\tdata: data,\n\t}\n}", "func (cfg *Static) New() (err error) {\n\treturn\n}", "func GetParamsViewHandler(w http.ResponseWriter, r *http.Request) {\n\ttitle, err := r.URL.Query()[\"title\"]\n\tif !err || len(title[0]) < 1 {\n\t\ttemplates.BasicHTTPRender(w, \"Error: Title is not supplied\")\n\t\treturn\n\t}\n\n\tbody, err := r.URL.Query()[\"body\"]\n\tif !err || len(body[0]) < 1 {\n\t\ttemplates.BasicHTTPRender(w, \"Error: Body is not supplied\")\n\t\treturn\n\t}\n\n\tp := &templates.Page{Title: strings.Join(title, \" \"), Body: strings.Join(body, \" \")}\n\ttemplates.RenderTemplate(w, \"templates/dynamic\", p)\n\n}", "func NewInboundRequest(\n baseRequest *http.Request,\n pathParams PathParams,\n) *InboundRequest {\n req := &InboundRequest{\n Request: *baseRequest,\n PathParams: pathParams,\n }\n return req\n}", "func NewRoutes(p RoutesParams) *Routes {\n\treturn &Routes{\n\t\tlogger: p.Logger,\n\t\tcontroller: p.UserController,\n\t}\n}", "func NewStatic(id, secret, token string, signerType SignatureType) *Credentials {\n\treturn New(&Static{\n\t\tValue: Value{\n\t\t\tAccessKeyID: id,\n\t\t\tSecretAccessKey: secret,\n\t\t\tSessionToken: token,\n\t\t\tSignerType: signerType,\n\t\t},\n\t})\n}", "func (s *VPCService) CreateStaticRoute(p *CreateStaticRouteParams) (*CreateStaticRouteResponse, error) {\n\tresp, err := s.cs.newRequest(\"createStaticRoute\", p.toURLValues())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar r CreateStaticRouteResponse\n\tif err := json.Unmarshal(resp, &r); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// If we have a async client, we need to wait for the async result\n\tif s.cs.async {\n\t\tb, err := s.cs.GetAsyncJobResult(r.JobID, s.cs.timeout)\n\t\tif err != nil {\n\t\t\tif err == AsyncTimeoutErr {\n\t\t\t\treturn &r, err\n\t\t\t}\n\t\t\treturn nil, err\n\t\t}\n\n\t\tb, err = getRawValue(b)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tif err := json.Unmarshal(b, &r); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn &r, nil\n}", "func NewStatic(peers ...*memberlist.Node) Static {\n\treturn Static{\n\t\tpeers: peers,\n\t}\n}", "func NewHTTPParams(path string, reg *regexp.Regexp) HTTPParams {\n\tparams := make(HTTPParams)\n\n\tmatch := reg.FindStringSubmatch(path)\n\n\tfor index, name := range reg.SubexpNames() {\n\t\tif index != 0 {\n\t\t\tparams[name] = match[index]\n\t\t}\n\t}\n\n\treturn params\n}", "func Create(scheduler types.Scheduler) *mux.Router {\n\troutes := types.Routes{\n\t\ttypes.Route{\n\t\t\tName: \"AddTask\",\n\t\t\tMethod: \"POST\",\n\t\t\tPattern: \"/task\",\n\t\t\tHandlerFunc: handler.AddTask(scheduler),\n\t\t},\n\t\ttypes.Route{\n\t\t\tName: \"Status\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/task/{taskId}\",\n\t\t\tHandlerFunc: handler.GetTaskInfo(scheduler),\n\t\t},\n\t}\n\n\trouter := mux.NewRouter().StrictSlash(true)\n\tfor _, route := range routes {\n\t\trouter.\n\t\t\tMethods(route.Method).\n\t\t\tPath(route.Pattern).\n\t\t\tName(route.Name).\n\t\t\tHandler(route.HandlerFunc)\n\t}\n\n\trouter.PathPrefix(\"/static/\").\n\t\tHandler(\n\t\thttp.StripPrefix(\n\t\t\t\"/static/\", http.FileServer(\n\t\t\t\t&assetfs.AssetFS{Asset: assets.Asset, AssetDir: assets.AssetDir, Prefix: \"static\"})))\n\n\trouter.NotFoundHandler = http.HandlerFunc(notFound)\n\n\treturn router\n}", "func (r *route) Create(req RouteRequest, opts ...bool) (*RouteFields, error) {\n\tasync := true\n\tif len(opts) > 0 {\n\t\tasync = opts[0]\n\t}\n\trawURL := fmt.Sprintf(\"/v2/routes?async=%t&inline-relations-depth=1\", async)\n\trouteFields := RouteFields{}\n\t_, err := r.client.Post(rawURL, req, &routeFields)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &routeFields, nil\n}", "func NewLineRouteParams() *LineRouteParams {\n\tvar ()\n\treturn &LineRouteParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func newRouter() *mux.Router {\n\troutes := []route{\n\t\tnewPage(\"/\", indexTmpls, getIndexData),\n\t\tsimpleRoute{\"/connect\", \"GET\", googleauth.ConnectHandler},\n\t}\n\n\trouter := mux.NewRouter().StrictSlash(true)\n\tfor _, r := range routes {\n\t\tglog.V(1).Infof(\"Registering route for %q on %q\\n\", r.Method(), r.Pattern())\n\t\trouter.\n\t\t\tMethods(r.Method()).\n\t\t\tPath(r.Pattern()).\n\t\t\tHandlerFunc(r.HandlerFunc())\n\t}\n\treturn router\n}", "func newRoute(pattern string, handles []HandlerFunc, router *Router) *Route {\n\tr := new(Route)\n\tr.pattern = pattern\n\tr.handlers = handles\n\tr.router = router\n\tr.children = make(map[string]*Route)\n\treturn r\n}", "func GetParams() map[string]interface{} {\n\treturn map[string]interface{}{\n\t\t\"app_name\": Params.AppName,\n\t\t\"selfreg\": Params.Selfreg,\n\t\t\"use_captcha\": Params.UseCaptcha,\n\t\t\"use_pin\": Params.UsePin,\n\t\t\"login_not_confirmed_email\": Params.LoginNotConfirmedEmail,\n\t\t\"max_attempts\": Params.MaxAttempts,\n\t\t\"reset_time\": Params.ResetTime,\n\t\t\"no_schema\": Params.NoSchema,\n\t}\n}", "func (elem *Composite) getConstructorParams(from IMediaObject, options map[string]interface{}) map[string]interface{} {\n\n\t// Create basic constructor params\n\tret := map[string]interface{}{\n\t\t\"mediaPipeline\": fmt.Sprintf(\"%s\", from),\n\t}\n\n\t// then merge options\n\tmergeOptions(ret, options)\n\n\treturn ret\n\n}", "func NewCreateRoutingInstanceUsingPOSTParamsWithHTTPClient(client *http.Client) *CreateRoutingInstanceUsingPOSTParams {\n\tvar ()\n\treturn &CreateRoutingInstanceUsingPOSTParams{\n\t\tHTTPClient: client,\n\t}\n}", "func (m *ScheduleRequestBuilder) CreateGetRequestInformation(ctx context.Context, requestConfiguration *ScheduleRequestBuilderGetRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.urlTemplate\n requestInfo.PathParameters = m.pathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.GET\n requestInfo.Headers[\"Accept\"] = \"application/json\"\n if requestConfiguration != nil {\n if requestConfiguration.QueryParameters != nil {\n requestInfo.AddQueryParameters(*(requestConfiguration.QueryParameters))\n }\n requestInfo.AddRequestHeaders(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "func NewRoutes(cfg *config.Config, db *gorm.DB) *Routes {\n\tvar (\n\t\tuserService = userservices.NewService(db)\n\t\tauthService = authservices.NewService(db, userService)\n\t\tstudentService = studentservices.NewService(db)\n\n\t\tstaticHandler = static.NewHandler(cfg)\n\t\tauthHandler = auth.NewHandler(cfg, authService)\n\t\tuserHandler = user.NewHandler(cfg, userService)\n\t\tstudentHandler = student.NewHandler(cfg, studentService)\n\n\t\tr = &Routes{\n\t\t\tTemplateRoutes: []Route{\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"/\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: staticHandler.Index,\n\t\t\t\t\trequiresAuth: false,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAPIRoutes: []Route{\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"auth/checkAuthentication/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: authHandler.CheckAuth,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"auth/login/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: authHandler.Login,\n\t\t\t\t\trequiresAuth: false,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"auth/logout/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: authHandler.Logout,\n\t\t\t\t\trequiresAuth: false,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/findAll/\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: userHandler.FindAllAvailable,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/findById/{id:[0-9]+}\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: userHandler.FindByID,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/findByUsername/{username:[0-9a-zA-Z]+}\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: userHandler.FindByUsername,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/edit/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: userHandler.Edit,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/create/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: userHandler.Create,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/changePassword/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: userHandler.ChangePassword,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/delete/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: userHandler.Delete,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/profile/\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: userHandler.GetProfileForCurrentUser,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/current/changePassword/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: userHandler.ChangePasswordForCurrentUser,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/current/changeEmail/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: userHandler.ChangeEmailForCurrentUser,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/current/changeFullName/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: userHandler.ChangeFullNameForCurrentUser,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/current/privileges/\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: userHandler.GetPrivilegesForCurrentUser,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"student/findAll/\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: studentHandler.FindAllAvailable,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"student/findById/{id:[0-9]+}\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: studentHandler.FindByID,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"student/edit/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: studentHandler.Edit,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"student/create/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: studentHandler.Create,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"student/findByIdNumber/{idNumber:[0-9A-Za-z-]+}\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: studentHandler.FindByIDNumber,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t)\n\n\treturn r\n}", "func NewParams(tokenCourse, subscriptionPrice, VPNGBPrice,\n\tstorageGBPrice, baseVPNGb, baseStorageGb uint32, courseSigners []sdk.AccAddress) Params {\n\treturn Params{\n\t\tTokenCourse: tokenCourse,\n\t\tSubscriptionPrice: subscriptionPrice,\n\t\tVPNGBPrice: VPNGBPrice,\n\t\tStorageGBPrice: storageGBPrice,\n\t\tBaseVPNGb: baseVPNGb,\n\t\tBaseStorageGb: baseStorageGb,\n\t\tCourseChangeSigners: courseSigners[:],\n\t}\n}", "func NewCreateRoutingInstanceUsingPOSTParams() *CreateRoutingInstanceUsingPOSTParams {\n\tvar ()\n\treturn &CreateRoutingInstanceUsingPOSTParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func New(server *http.Server, sc *domain.Config) Router {\n\trouter := &router{\n\t\tsidecarConfig: sc,\n\t\tserver: server,\n\t}\n\n\tmux := http.NewServeMux()\n\tmux.HandleFunc(\"/mutate\", commonhdl.NewLogger(handler.New(sc)).Do)\n\trouter.server.Handler = mux\n\n\treturn router\n}", "func (d *RouteDescriptor) Create(key string, route *l3.Route) (metadata interface{}, err error) {\n\terr = d.routeHandler.VppAddRoute(context.TODO(), route)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn nil, nil\n}", "func New(allowed ...*Route) Filter {\n\treturn &filter{allowed: allowed}\n}", "func NewGetPublicAuthParams() *GetPublicAuthParams {\n\tvar ()\n\treturn &GetPublicAuthParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewRoute(ctrl *Controller, router *gin.Engine) *Route {\n\treturn &Route{\n\t\tctrl: ctrl,\n\t\trouter: router,\n\t}\n}", "func createParamsMap(params []string) *map[string]string {\n\n\tparamsMap := map[string]string{}\n\n\tfor _, param := range params {\n\t\tkeyval := strings.Split(param, \"=\")\n\t\tif len(keyval) == 0 || len(keyval) > 2 {\n\t\t\tcontinue // weird but skip\n\t\t}\n\t\tif len(keyval) == 1 {\n\t\t\tparamsMap[strings.TrimSpace(keyval[0])] = \"\" // no value\n\t\t\tcontinue\n\t\t}\n\t\tparamsMap[strings.TrimSpace(keyval[0])] = strings.TrimSpace(keyval[1])\n\t}\n\tif len(paramsMap) < 1 {\n\t\treturn nil\n\t}\n\treturn &paramsMap\n\n}", "func PathParams(req *http.Request) (params map[string]string) {\n\tparams = req.Context().Value(paramsKey).(map[string]string)\n\n\treturn\n}", "func (group *RouterGroup) Static(relativePath string, root string) {\n\tpattern := path.Join(relativePath, \"/*filepath\") // custom parameter name\n\thandler := group.createStaticHandler(relativePath, http.Dir(root))\n\tgroup.GET(pattern, handler)\n}", "func newRoute() *Route {\n\treturn &Route{\n\t\thandlers: make(map[string]http.Handler),\n\t\tmiddleware: make([]*middlewareForVerb, 0),\n\t\tchildren: make([]*Route, 0),\n\t}\n}", "func newRouter() *mux.Router {\n\tr := mux.NewRouter()\n\tstaticFileDirectory := http.Dir(\"./assets/\")\n\tstaticFileHandler := http.StripPrefix(\"/assets/\", http.FileServer(staticFileDirectory))\n\tr.PathPrefix(\"/assets/\").Handler(staticFileHandler).Methods(\"GET\")\n\n\t// r.HandleFunc(\"/bird\", getBirdHandler).Methods(\"GET\")\n\tr.HandleFunc(\"/register\", apis.CreateUser).Methods(\"POST\")\n\tr.HandleFunc(\"/login\", apis.LoginUser).Methods(\"POST\")\n\tr.HandleFunc(\"/logout\", apis.LogoutUser).Methods(\"GET\")\n\tr.HandleFunc(\"/\", middlewares.UserLogged(homePage)).Methods(\"GET\")\n\tr.HandleFunc(\"/blog\", middlewares.UserLogged(apis.CreateBlog)).Methods(\"POST\")\n\tr.HandleFunc(\"/blogs\", middlewares.UserLogged(apis.GetBlogs)).Methods(\"GET\")\n\tr.HandleFunc(\"/blog/{id:[0-9]+}\", middlewares.UserLogged(apis.GetBlog)).Methods(\"GET\")\n\tr.HandleFunc(\"/tag/\", middlewares.UserLogged(apis.GetBlogsWithTag)).Methods(\"GET\")\n\treturn r\n}", "func New(staff repository.IStaffRepo, security security.ISecurity) *router {\n\treturn &router{\n\t\tstaff: staff,\n\t\tsecurity: security,\n\t}\n}", "func getDynamicRouteTester(path string, params []string) *regexp.Regexp {\n\tfor _, param := range params {\n\t\tpath = strings.Replace(path, \"{\"+param+\"}\", \"(\\\\w+)\", 1)\n\t}\n\n\treturn regexp.MustCompile(path)\n}", "func NewParams(pricePerByte abi.TokenAmount, paymentInterval uint64, paymentIntervalIncrease uint64) (Params, error) {\n\treturn Params{\n\t\tPricePerByte: pricePerByte,\n\t\tPaymentInterval: paymentInterval,\n\t\tPaymentIntervalIncrease: paymentIntervalIncrease,\n\t}, nil\n}", "func NewGetParams() *GetParams {\n\treturn &GetParams{}\n}", "func Params(r *http.Request) httprouter.Params {\n\treturn context.Get(r, params).(httprouter.Params)\n}", "func newRoute(registedPath string, handler Handler) *Route {\n\tr := &Route{handler: handler, fullpath: registedPath}\n\tr.processPath()\n\treturn r\n}", "func NewIndexSiteRoutesParams() *IndexSiteRoutesParams {\n\tvar ()\n\treturn &IndexSiteRoutesParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (c Consul) makeParams(opts KeyOptions) url.Values {\n\tv := url.Values{}\n\t// TODO(ashcrow): This is a hack to avoid colliding with int:0. Fix it.\n\tif opts.CASet != \"\" {\n\t\tv.Set(\"cas\", opts.CASet)\n\t}\n\treturn v\n}", "func createTestRouteAndContext(request_path, route_path string) (*Route, *RequestContext) {\n\troute := new(Route)\n\troute.pathRE = regexp.MustCompile(getPathPattern(route_path))\n\troute.Path = route_path\n\troute.Methods = HTTP_GET\n\n\tcontext := new(RequestContext)\n\tcontext.Request = new(http.Request)\n\tcontext.Request.Method = \"GET\"\n\tcontext.Request.URL, _ = url.Parse(\"http://localhost\" + request_path)\n\n\treturn route, context\n}", "func (s *HyperParameterTrainingJobDefinition) SetStaticHyperParameters(v map[string]*string) *HyperParameterTrainingJobDefinition {\n\ts.StaticHyperParameters = v\n\treturn s\n}", "func New(h handlers.Handler, l *zap.SugaredLogger) Router {\n\tr := chi.NewRouter()\n\n\tr.Mount(\"/\", newIndexRouter(h))\n\n\tr.NotFound(h.NotFound)\n\tr.MethodNotAllowed(h.MethodNotAllowed)\n\n\trouter := &router{\n\t\tHandler: r,\n\t\tlogger: l,\n\t}\n\n\trouter.Handler = middleware.Log(router.Handler, router.logger)\n\n\treturn router\n}", "func (m *UserFlowLanguagePageItemRequestBuilder) CreateGetRequestInformation(ctx context.Context, requestConfiguration *UserFlowLanguagePageItemRequestBuilderGetRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.urlTemplate\n requestInfo.PathParameters = m.pathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.GET\n requestInfo.Headers[\"Accept\"] = \"application/json\"\n if requestConfiguration != nil {\n if requestConfiguration.QueryParameters != nil {\n requestInfo.AddQueryParameters(*(requestConfiguration.QueryParameters))\n }\n requestInfo.AddRequestHeaders(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "func NewGetPublicsRecipeParams() *GetPublicsRecipeParams {\n\n\treturn &GetPublicsRecipeParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func RequestWithURLParams(body []byte, params map[string]string) *http.Request {\n\trctx := chi.NewRouteContext()\n\tfor key, value := range params {\n\t\trctx.URLParams.Add(key, value)\n\t}\n\tr, _ := http.NewRequest(\"GET\", \"/\", bytes.NewReader(body))\n\tr = r.WithContext(context.WithValue(r.Context(), chi.RouteCtxKey, rctx))\n\treturn r\n}", "func (c Etcd) makeParams(opts KeyOptions) url.Values {\n\tv := url.Values{}\n\t// TODO(ashcrow): This is a hack to avoid colliding with int:0. Fix it.\n\tif opts.CASet != \"\" {\n\t\tv.Set(\"prevIndex\", opts.CASet)\n\t}\n\tif opts.TTL != 0 {\n\t\tv.Set(\"ttl\", strconv.Itoa(opts.TTL))\n\t}\n\treturn v\n}", "func (opts CreateOptions) Params() map[string]interface{} {\n\treturn opts.toConfig().Params\n}", "func createRoute(method string, pattern string, handler http.Handler) (*route, error) {\n\n if pattern[len(pattern)-1] != '/' {\n pattern += \"/\"\n }\n\n err := validatePattern(pattern)\n if err != nil {\n return nil, err\n }\n\n regexpPattern := strings.ToLower(pattern)\n regexpPattern = slashEscaper.ReplaceAllString(regexpPattern, \"\\\\/\")\n regexpPattern = varReplacer.ReplaceAllString(regexpPattern, \"\\\\/[\\\\w\\\\d-]+\\\\/\")\n regexpPattern = wildcardReplacer.ReplaceAllString(regexpPattern, \"\\\\/[\\\\w\\\\d-\\\\/\\\\.]+\\\\/\")\n regexpPattern = \"^\" + regexpPattern + \"?$\"\n\n r := &route{ method: method,\n pattern: pattern,\n handler: handler,\n patternMatcher: regexp.MustCompile(regexpPattern) }\n\n return r, nil\n}" ]
[ "0.6108159", "0.5753654", "0.56675255", "0.56675255", "0.55446655", "0.5521516", "0.5397808", "0.52849674", "0.5225224", "0.522206", "0.5125927", "0.5090827", "0.50883347", "0.50555795", "0.5055149", "0.503233", "0.5026227", "0.5026227", "0.49866995", "0.49780178", "0.49457008", "0.49221137", "0.4913642", "0.4906355", "0.49039188", "0.49039188", "0.4903511", "0.48914334", "0.48694956", "0.48694956", "0.4865652", "0.48613596", "0.48609206", "0.4842899", "0.4842736", "0.48148912", "0.47755197", "0.47271365", "0.4703416", "0.47019884", "0.4678524", "0.46732917", "0.46729487", "0.46613035", "0.4658653", "0.46222824", "0.46211895", "0.4615618", "0.46080533", "0.46046525", "0.46017402", "0.45968848", "0.45905635", "0.4571998", "0.45691708", "0.45554197", "0.45481142", "0.4535104", "0.45303485", "0.45272902", "0.451393", "0.45135543", "0.45096907", "0.45078945", "0.45063162", "0.45037052", "0.44970447", "0.44954905", "0.44913357", "0.44831473", "0.44769183", "0.44722983", "0.44702008", "0.4465705", "0.44651058", "0.4461294", "0.4458951", "0.44584957", "0.44499475", "0.4445758", "0.44342127", "0.4427629", "0.44255584", "0.4425204", "0.44236872", "0.442362", "0.44203994", "0.44149944", "0.44074598", "0.44007608", "0.4391631", "0.43874836", "0.4381364", "0.43798134", "0.43760884", "0.43740442", "0.4371443", "0.43551236", "0.43521467", "0.4349698" ]
0.6369615
0
Creates a static route
func (s *VPCService) CreateStaticRoute(p *CreateStaticRouteParams) (*CreateStaticRouteResponse, error) { resp, err := s.cs.newRequest("createStaticRoute", p.toURLValues()) if err != nil { return nil, err } var r CreateStaticRouteResponse if err := json.Unmarshal(resp, &r); err != nil { return nil, err } // If we have a async client, we need to wait for the async result if s.cs.async { b, err := s.cs.GetAsyncJobResult(r.JobID, s.cs.timeout) if err != nil { if err == AsyncTimeoutErr { return &r, err } return nil, err } b, err = getRawValue(b) if err != nil { return nil, err } if err := json.Unmarshal(b, &r); err != nil { return nil, err } } return &r, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (sh ServerHandler) DefineStaticRoute(r *mux.Router) {\n\tr.Methods(\"GET\").PathPrefix(\"/static/\").HandlerFunc(sh.serveStatic)\n}", "func (r *Router) Static(url, rootPath string) *Path {\n\treturn r.StaticCustom(url, &StaticFS{\n\t\tRoot: rootPath,\n\t\tIndexNames: []string{\"index.html\"},\n\t\tGenerateIndexPages: true,\n\t\tAcceptByteRange: true,\n\t})\n}", "func (m *RouteMux) Static(pattern string, dir string) {\n\t//append a regex to the param to match everything\n\t// that comes after the prefix\n\tpattern = pattern + \"(.+)\"\n\tm.AddRoute(GET, pattern, func(w http.ResponseWriter, r *http.Request) {\n\t\tpath := filepath.Clean(r.URL.Path)\n\t\tpath = filepath.Join(dir, path)\n\t\thttp.ServeFile(w, r, path)\n\t})\n}", "func (group *RouterGroup) Static(relativePath, root string) IRoutes {\n\treturn group.StaticFS(relativePath, Dir(root, false))\n}", "func NewStaticRouter() *StaticRouter {\n router := new(StaticRouter)\n\n return router\n}", "func (group *RouterGroup) Static(relativePath string, root string) {\n\tpattern := path.Join(relativePath, \"/*filepath\") // custom parameter name\n\thandler := group.createStaticHandler(relativePath, http.Dir(root))\n\tgroup.GET(pattern, handler)\n}", "func (dsl *PutDSL) StaticRoute(val *vpp_l3.StaticRoutes_Route) linux.PutDSL {\n\tdsl.vppPut.StaticRoute(val)\n\treturn dsl\n}", "func (dsl *PutDSL) StaticRoute(val *vpp_l3.StaticRoutes_Route) linux.PutDSL {\n\tdsl.vppPut.StaticRoute(val)\n\treturn dsl\n}", "func Static(w http.ResponseWriter, r *http.Request) {\n http.ServeFile(w, r, r.URL.Path[1:])\n}", "func (group *RouterGroup) Static(staticpath string) {\n\tgroup.engine.AddStaticPath(group.pathNoLeadingSlash(staticpath))\n\tstaticpath = filepath.Join(staticpath, \"/*filepath\")\n\tgroup.Handle(&Route{\"GET\", staticpath, []HandlerFunc{group.handleStatic}})\n\tgroup.Handle(&Route{\"HEAD\", staticpath, []HandlerFunc{group.handleStatic}})\n}", "func (rg *RouteGroup) Static(path string, dir string) *Route {\n\treturn rg.Any(path, func(c *Context) error {\n\t\tif c.Request.Method != \"GET\" && c.Request.Method != \"HEAD\" {\n\t\t\treturn NewHTTPError(http.StatusMethodNotAllowed)\n\t\t}\n\t\tfilePath := \"\"\n\t\turlPath := c.Request.URL.Path\n\t\tprefix := strings.TrimSuffix(path, \"/*\")\n\t\tif strings.HasPrefix(urlPath, prefix) {\n\t\t\tfilePath = filepath.Join(dir, urlPath[len(prefix):])\n\t\t}else{\n\t\t\treturn NewHTTPError(http.StatusNotFound)\n\t\t}\n\t\tfile, err := os.Open(filePath)\n\t\tif err != nil {\n\t\t\treturn NewHTTPError(http.StatusNotFound, err.Error())\n\t\t}\n\t\tdefer file.Close()\n\t\tfstat, err := file.Stat()\n\t\tif err != nil {\n\t\t\treturn NewHTTPError(http.StatusNotFound, err.Error())\n\t\t} else if fstat.IsDir() {\n\t\t\treturn NewHTTPError(http.StatusNotFound)\n\t\t}\n\t\thttp.ServeContent(c.Response, c.Request, filePath, fstat.ModTime(), file)\n\t\treturn nil\n\t})\n}", "func (g *RouterGroup) Static(relativePath string, root string) {\n\thandler := g.CreateStaticHandler(relativePath, http.Dir(root))\n\turlPattern := path.Join(relativePath, \"/*filepath\")\n\tg.GET(urlPattern, handler)\n}", "func (d *Dispatcher) Static(w http.ResponseWriter, r *http.Request) {\n\tfor prefix, staticDir := range d.Router.StaticRoutes {\n\t\tif strings.HasPrefix(r.URL.Path, prefix) {\n\t\t\tfile := staticDir + r.URL.Path[len(prefix):]\n\t\t\thttp.ServeFile(w, r, file)\n\t\t\td.found = true\n\t\t}\n\t}\n}", "func staticHandler(w http.ResponseWriter, r *http.Request) {\n var path string\n if strings.HasSuffix(r.URL.Path, \"/\") {\n path = r.URL.Path + \"index.html\"\n } else {\n path = r.URL.Path\n }\n http.ServeFile(w, r, \"static/\"+path)\n}", "func (d *MockDataResyncDSL) StaticRoute(val *l3.StaticRoutes_Route) vppclient.DataResyncDSL {\n\tkey := l3.RouteKey(val.VrfId, val.DstIpAddr, val.NextHopAddr)\n\top := dsl.TxnOp{Key: key, Value: val}\n\td.Ops = append(d.Ops, op)\n\treturn d\n}", "func (c *RBController) Static(w http.ResponseWriter, r *http.Request) (err error) {\n\tvars := mux.Vars(r)\n\tpath := \"./webroot/\" + vars[\"path\"]\n\n\tif PathExists(path) {\n\t\thttp.ServeFile(w, r, path)\n\t} else {\n\t\tc.RenderError(w, 404, \"Sorry, this page was not found.\")\n\t}\n\treturn nil\n}", "func Static(opts *Options) macaron.Handler {\n\topts.FileSystem = Assets\n\t// we don't need to pass the directory, because the directory var is only\n\t// used when in the options there is no FileSystem.\n\treturn opts.staticHandler(\"\")\n}", "func (dsl *DeleteDSL) StaticRoute(vrf uint32, dstAddr string, nextHopAddr string) linux.DeleteDSL {\n\tdsl.vppDelete.StaticRoute(vrf, dstAddr, nextHopAddr)\n\treturn dsl\n}", "func NewStaticRoute(ctx *pulumi.Context,\n\tname string, args *StaticRouteArgs, opts ...pulumi.ResourceOption) (*StaticRoute, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.Nexthop == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Nexthop'\")\n\t}\n\tif args.Prefix == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Prefix'\")\n\t}\n\tif args.Priority == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Priority'\")\n\t}\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource StaticRoute\n\terr := ctx.RegisterResource(\"cloudflare:index/staticRoute:StaticRoute\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (b *Baa) Static(prefix string, dir string, index bool, h HandlerFunc) {\n\tif prefix == \"\" {\n\t\tpanic(\"baa.Static prefix can not be empty\")\n\t}\n\tif dir == \"\" {\n\t\tpanic(\"baa.Static dir can not be empty\")\n\t}\n\tb.Get(prefix+\"*\", newStatic(prefix, dir, index, h))\n}", "func (group *RouterGroup) createStaticHandler(relativePath string, fs http.FileSystem) HandlerFunc {\n\tabsolutePath := path.Join(group.prefix, relativePath) // client path\n\tfileServer := http.StripPrefix(absolutePath, http.FileServer(fs)) // server path\n\n\treturn func(ctx *Context) {\n\t\t// Check whether the file exists\n\t\tfile := ctx.Param(\"filepath\") // custom parameter name\n\t\tif _, err := fs.Open(file); err != nil {\n\t\t\tctx.Fail(http.StatusNotFound, \"Status Not Found: \"+ctx.Pattern)\n\t\t\treturn\n\t\t}\n\n\t\t// Serve file content\n\t\tfileServer.ServeHTTP(ctx.RespWriter, ctx.Req)\n\t}\n}", "func staticHandler(w http.ResponseWriter, r *http.Request) {\n\tvar path string\n\tif strings.HasSuffix(r.URL.Path, \"/\") {\n\t\tpath = r.URL.Path + \"index.html\"\n\t} else {\n\t\tpath = r.URL.Path\n\t}\n\thttp.ServeFile(w, r, \"static/\"+path)\n}", "func (r *Router) StaticCustom(url string, fs *StaticFS) *Path {\n\turl = strings.TrimSuffix(url, \"/\")\n\n\tffs := &fasthttp.FS{\n\t\tRoot: fs.Root,\n\t\tAllowEmptyRoot: fs.AllowEmptyRoot,\n\t\tIndexNames: fs.IndexNames,\n\t\tGenerateIndexPages: fs.GenerateIndexPages,\n\t\tCompress: fs.Compress,\n\t\tCompressBrotli: fs.CompressBrotli,\n\t\tCompressRoot: fs.CompressRoot,\n\t\tAcceptByteRange: fs.AcceptByteRange,\n\t\tCacheDuration: fs.CacheDuration,\n\t\tCompressedFileSuffix: fs.CompressedFileSuffix,\n\t\tCompressedFileSuffixes: fs.CompressedFileSuffixes,\n\t\tCleanStop: fs.CleanStop,\n\t}\n\n\tif fs.PathRewrite != nil {\n\t\tffs.PathRewrite = func(ctx *fasthttp.RequestCtx) []byte {\n\t\t\tactx := AcquireRequestCtx(ctx)\n\t\t\tresult := fs.PathRewrite(actx)\n\t\t\tReleaseRequestCtx(actx)\n\n\t\t\treturn result\n\t\t}\n\t}\n\n\tif fs.PathNotFound != nil {\n\t\tffs.PathNotFound = viewToHandler(fs.PathNotFound, r.errorView)\n\t}\n\n\tstripSlashes := strings.Count(r.getGroupFullPath(url), \"/\")\n\n\tif ffs.PathRewrite == nil && stripSlashes > 0 {\n\t\tffs.PathRewrite = fasthttp.NewPathSlashesStripper(stripSlashes)\n\t}\n\n\treturn r.RequestHandlerPath(fasthttp.MethodGet, url+\"/{filepath:*}\", ffs.NewRequestHandler())\n}", "func (m *Macross) Static(prefix, root string) {\n\tif prefix == \"/\" {\n\t\tprefix = prefix + \"*\"\n\t} else if len(prefix) > 1 {\n\t\tif prefix[:1] != \"/\" {\n\t\t\tprefix = prefix + \"/*\"\n\t\t} else {\n\t\t\tprefix = prefix + \"*\"\n\t\t}\n\t}\n\tm.Get(prefix, func(c *Context) error {\n\t\treturn c.ServeFile(path.Join(root, c.Parameter(0)))\n\t})\n}", "func (b *Baa) StaticFile(pattern string, path string) RouteNode {\n\treturn b.Get(pattern, func(c *Context) {\n\t\tif err := serveFile(path, c); err != nil {\n\t\t\tc.Error(err)\n\t\t}\n\t})\n}", "func (group *RouterGroup) Static(p, root string) {\n\tp = path.Join(p, \"/*filepath\")\n\tfileServer := http.FileServer(http.Dir(root))\n\n\tgroup.GET(p, func(c *Context) {\n\t\toriginal := c.Request.URL.Path\n\t\tc.Request.URL.Path = c.Params.ByName(\"filepath\")\n\n\t\twriter := c.Writer\n\n\t\theaders := writer.Header()\n\n\t\t// in production environment static content needs to be cached by browsers & proxies\n\t\tif Env == Prod {\n\t\t\t// cache for 3 months\n\t\t\theaders.Set(\"Expires\", time.Now().AddDate(0, 3, 0).Format(http.TimeFormat))\n\n\t\t\theaders.Add(\"Cache-Control\", \"public\")\n\t\t\theaders.Add(\"Cache-Control\", \"max-age=28771200\")\n\t\t}\n\n\t\tfileServer.ServeHTTP(writer, c.Request)\n\t\tc.Request.URL.Path = original\n\t})\n}", "func static(w http.ResponseWriter, r *http.Request) {\n\thttp.ServeFile(w, r, r.URL.Path[1:])\n\treturn\n}", "func (serv *Server) Static(urlPrefix, root string) {\n\tif strings.Contains(urlPrefix, \":\") || strings.Contains(urlPrefix, \"*\") {\n\t\tpanic(\"URL parameters can not be used when serving a static folder\")\n\t}\n\thandler := func(c *Context) {\n\t\t// Open file\n\t\tfpath := strings.TrimPrefix(c.Request.URL.Path, urlPrefix)\n\t\tf, fi, err := openFile(filepath.Join(root, fpath))\n\n\t\tif err != nil {\n\t\t\tif os.IsNotExist(err) {\n\t\t\t\tdefault404Handler(c)\n\t\t\t} else {\n\t\t\t\tc.Error(err)\n\t\t\t\tc.Writer.WriteHeader(http.StatusInternalServerError)\n\t\t\t\tc.Writer.WriteString(\"500 internal server error\")\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t\tdefer f.Close()\n\t\thttp.ServeContent(c.Writer, c.Request, fi.Name(), fi.ModTime(), f)\n\t\treturn\n\t}\n\n\turl := path.Join(urlPrefix, \"/*filepath\")\n\t// Register GET and HEAD handlers\n\tserv.GET(url, handler)\n\tserv.HEAD(url, handler)\n\treturn\n}", "func (o *AggregatedDomain) CreateStaticRoute(child *StaticRoute) *bambou.Error {\n\n\treturn bambou.CurrentSession().CreateChild(o, child)\n}", "func Static(opts *Options) macaron.Handler {\n\treturn macaron.Static(\n\t\topts.Directory,\n\t\tmacaron.StaticOptions{\n\t\t\tSkipLogging: opts.SkipLogging,\n\t\t\tFileSystem: bindata.Static(bindata.Options{\n\t\t\t\tAsset: Asset,\n\t\t\t\tAssetDir: AssetDir,\n\t\t\t\tAssetInfo: AssetInfo,\n\t\t\t\tAssetNames: AssetNames,\n\t\t\t\tPrefix: \"\",\n\t\t\t}),\n\t\t},\n\t)\n}", "func (dsl *DeleteDSL) StaticRoute(vrf uint32, dstAddrInput *net.IPNet, nextHopAddrInput net.IP) linux.DeleteDSL {\n\tdsl.vppDelete.StaticRoute(vrf, dstAddrInput, nextHopAddrInput)\n\treturn dsl\n}", "func (app *App) Static(url string) {\n\tapp.craterRequestHandler.handleStatic(regexp.MustCompile(\"^\"+url), url, http.Dir(app.settings.StaticPath))\n}", "func (group *RouterGroup) StaticFS(relativePath string, fs http.FileSystem) IRoutes {\n\tif strings.Contains(relativePath, \":\") || strings.Contains(relativePath, \"*\") {\n\t\tpanic(\"URL parameters can not be used when serving a static folder\")\n\t}\n\thandler := group.createStaticHandler(relativePath, fs)\n\turlPattern := path.Join(relativePath, \"/*filepath\")\n\n\t// Register GET and HEAD handlers\n\tgroup.GET(urlPattern, handler)\n\tgroup.HEAD(urlPattern, handler)\n\treturn group.returnObj()\n}", "func (m *Mux) staticRoute(rw http.ResponseWriter, req *http.Request) bool {\n\tfor _, s := range m.Routes[static] {\n\t\tif len(req.URL.Path) >= s.Size {\n\t\t\tif req.URL.Path[:s.Size] == s.Path {\n\t\t\t\ts.Handler.ServeHTTP(rw, req)\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t}\n\treturn false\n}", "func NewStatic() filters.Spec { return &static{} }", "func NewStatic() filters.Spec { return &static{} }", "func Static(w http.ResponseWriter, r *http.Request) {\n\tpath, _ := os.Getwd()\n\tpath = filepath.Join(path, \"web/static\")\n\n\thttp.StripPrefix(\n\t\t\"/static/\",\n\t\thttp.FileServer(http.Dir(path)),\n\t).ServeHTTP(w, r)\n}", "func OptClasslessStaticRoute(routes ...*Route) Option {\n\treturn Option{\n\t\tCode: OptionClasslessStaticRoute,\n\t\tValue: Routes(routes),\n\t}\n}", "func (h *StaticHandler) AddRoutes(apply func(m, p string, h http.Handler, mws ...func(http.Handler) http.Handler)) {\n\tfileServer := http.FileServer(h.fs)\n\tapply(http.MethodGet, \"/*filepath\", http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tr.URL.Path = routegroup.PathParam(r.Context(), \"filepath\")\n\t\tfileServer.ServeHTTP(w, r)\n\t}))\n}", "func staticHandler(w http.ResponseWriter, r *http.Request) {\n\tfs := http.FileServer(http.Dir(\"webapp/build\"))\n\tfs.ServeHTTP(w, r)\n}", "func StaticFileServer(r chi.Router, public string, static string) {\n\n\t// everything up to the r.Get call is executed the first time the function is called\n\tif strings.ContainsAny(public, \"{}*\") {\n\t\tpanic(\"FileServer does not permit URL parameters.\")\n\t}\n\n\troot, _ := filepath.Abs(static)\n\tif _, err := os.Stat(root); os.IsNotExist(err) {\n\t\tpanic(\"Static Documents Directory Not Found\")\n\t}\n\n\tfs := http.StripPrefix(public, http.FileServer(http.Dir(root)))\n\n\tif public != \"/\" && public[len(public)-1] != '/' {\n\t\tr.Get(public, http.RedirectHandler(public+\"/\", 301).ServeHTTP)\n\t\tpublic += \"/\"\n\t}\n\n\tlog.Printf(\"Serving spa index.html from: %s\", http.Dir(root))\n\n\t// Register the Get request for the specified path, most likely /*\n\tr.Get(public+\"*\", func(w http.ResponseWriter, r *http.Request) {\n\t\tfile := strings.Replace(r.RequestURI, public, \"/\", 1)\n\t\t// if the requested resource was not found, pass the request to the client\n\t\tif _, err := os.Stat(root + file); os.IsNotExist(err) {\n\t\t\thttp.ServeFile(w, r, path.Join(root, \"index.html\"))\n\t\t\treturn\n\t\t}\n\t\t// if the requested resource was found, serve it\n\t\tfs.ServeHTTP(w, r)\n\t})\n}", "func createRoute(method string, pattern string, handler http.Handler) (*route, error) {\n\n if pattern[len(pattern)-1] != '/' {\n pattern += \"/\"\n }\n\n err := validatePattern(pattern)\n if err != nil {\n return nil, err\n }\n\n regexpPattern := strings.ToLower(pattern)\n regexpPattern = slashEscaper.ReplaceAllString(regexpPattern, \"\\\\/\")\n regexpPattern = varReplacer.ReplaceAllString(regexpPattern, \"\\\\/[\\\\w\\\\d-]+\\\\/\")\n regexpPattern = wildcardReplacer.ReplaceAllString(regexpPattern, \"\\\\/[\\\\w\\\\d-\\\\/\\\\.]+\\\\/\")\n regexpPattern = \"^\" + regexpPattern + \"?$\"\n\n r := &route{ method: method,\n pattern: pattern,\n handler: handler,\n patternMatcher: regexp.MustCompile(regexpPattern) }\n\n return r, nil\n}", "func Static(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t// Serves any requested file from dist/. These are immutable & cached.\n\t\t// Served with the dist prefix, e.g. GET /dist/js/foo-HASH.js.\n\t\tif file := r.URL.Path[1:]; dist[file] {\n\t\t\tw.Header().Set(\"Cache-Control\", \"max-age=31536000, public, immutable\")\n\t\t\tw.Header().Set(\"Vary\", \"Accept-Encoding\")\n\n\t\t\t// Identify with original filename, not pre-compressed filename.\n\t\t\tif ctype := mime.TypeByExtension(filepath.Ext(file)); ctype != \"\" {\n\t\t\t\tw.Header().Set(\"Content-Type\", ctype)\n\t\t\t}\n\n\t\t\t// TODO Content negotiation github.com/golang/go/issues/19307.\n\t\t\taccept := r.Header.Get(\"Accept-Encoding\")\n\t\t\tif strings.Contains(accept, \"br\") && dist[file+\".br\"] {\n\t\t\t\tw.Header().Set(\"Content-Encoding\", \"br\")\n\t\t\t\tfile += \".br\"\n\t\t\t} else if strings.Contains(accept, \"gzip\") && dist[file+\".gz\"] {\n\t\t\t\tw.Header().Set(\"Content-Encoding\", \"gzip\")\n\t\t\t\tfile += \".gz\"\n\t\t\t}\n\n\t\t\thttp.ServeFile(w, r, file)\n\t\t\treturn\n\t\t}\n\n\t\t// Serves any requested file from public/. These aren't cached.\n\t\t// Served without a prefix, e.g. GET /robots.txt.\n\t\tif file := path.Join(\"public\", r.URL.Path); public[file] {\n\t\t\thttp.ServeFile(w, r, file)\n\t\t\treturn\n\t\t}\n\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "func createRouter() *httprouter.Router {\n\n\trouter := httprouter.New()\n\trouter.GET(\"/\", index)\n\trouter.GET(\"/block/:block\", showBlock)\n\trouter.GET(\"/api/\"+network+\"/getdifficulty\", getDifficulty)\n\trouter.GET(\"/api/\"+network+\"/blocks\", getLatestBlocks)\n\trouter.GET(\"/api/\"+network+\"/block/:hash\", getBlock)\n\trouter.GET(\"/api/\"+network+\"/block-index/:height\", getBlockIndex)\n\trouter.GET(\"/api/\"+network+\"/tx/:txid\", getTransaction)\n\trouter.GET(\"/api/\"+network+\"/addr/:addr\", getAddressInfo)\n\trouter.GET(\"/api/\"+network+\"/addr/:addr/utxo\", getAddressUtxo)\n\n\tfileServer := http.FileServer(http.Dir(\"static\"))\n\n\trouter.GET(\"/static/*filepath\", func(w http.ResponseWriter, r *http.Request, p httprouter.Params) {\n\t\tw.Header().Set(\"Vary\", \"Accept-Encoding\")\n\t\tw.Header().Set(\"Cache-Control\", \"public, max-age=7776000\")\n\t\tr.URL.Path = p.ByName(\"filepath\")\n\t\tfileServer.ServeHTTP(w, r)\n\t})\n\n\treturn router\n}", "func (d *DHCPv4) ClasslessStaticRoute() []*Route {\n\tv := d.Options.Get(OptionClasslessStaticRoute)\n\tif v == nil {\n\t\treturn nil\n\t}\n\tvar routes Routes\n\tif err := routes.FromBytes(v); err != nil {\n\t\treturn nil\n\t}\n\treturn routes\n}", "func (r *Router) HandleStatic(prefix, path string) *mux.Route {\n\tfs := http.FileServer(http.Dir(path))\n\treturn r.Router.PathPrefix(prefix).Handler(http.StripPrefix(prefix, fs))\n}", "func DefaultRoute(w http.ResponseWriter, r *http.Request) {\n\tmenu.ClearScreen()\n\tfmt.Printf(\"Request for resource recieived: %s\\n\\n\", r.URL.Path[1:])\n\tvar path string\n\n\tif r.URL.Path[1:] != \"\" {\n\t\tpath = r.URL.Path[1:]\n\t} else {\n\t\tpath = \"index.html\"\n\t}\n\n\tjoin := []string{\"static/\", path}\n\tstg := strings.Join(join, \"\")\n\thttp.ServeFile(w, r, stg)\n\tfmt.Printf(\"Response sent.\\n\\n\")\n}", "func Create(scheduler types.Scheduler) *mux.Router {\n\troutes := types.Routes{\n\t\ttypes.Route{\n\t\t\tName: \"AddTask\",\n\t\t\tMethod: \"POST\",\n\t\t\tPattern: \"/task\",\n\t\t\tHandlerFunc: handler.AddTask(scheduler),\n\t\t},\n\t\ttypes.Route{\n\t\t\tName: \"Status\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/task/{taskId}\",\n\t\t\tHandlerFunc: handler.GetTaskInfo(scheduler),\n\t\t},\n\t}\n\n\trouter := mux.NewRouter().StrictSlash(true)\n\tfor _, route := range routes {\n\t\trouter.\n\t\t\tMethods(route.Method).\n\t\t\tPath(route.Pattern).\n\t\t\tName(route.Name).\n\t\t\tHandler(route.HandlerFunc)\n\t}\n\n\trouter.PathPrefix(\"/static/\").\n\t\tHandler(\n\t\thttp.StripPrefix(\n\t\t\t\"/static/\", http.FileServer(\n\t\t\t\t&assetfs.AssetFS{Asset: assets.Asset, AssetDir: assets.AssetDir, Prefix: \"static\"})))\n\n\trouter.NotFoundHandler = http.HandlerFunc(notFound)\n\n\treturn router\n}", "func (group *RouterGroup) StaticFile(relativePath, filepath string) IRoutes {\n\treturn group.staticFileHandler(relativePath, func(c *Context) {\n\t\tc.File(filepath)\n\t})\n}", "func staticHandler(c *RequestContext, w http.ResponseWriter, r *http.Request) (int, error) {\n\tif r.URL.Path != \"/static/manifest.json\" {\n\t\thttp.FileServer(c.FM.assets.HTTPBox()).ServeHTTP(w, r)\n\t\treturn 0, nil\n\t}\n\n\treturn renderFile(\n\t\tw,\n\t\tc.FM.assets.MustString(\"static/manifest.json\"),\n\t\t\"application/json\",\n\t\tc,\n\t)\n}", "func (routing *DemoDeviceStreamRouting) RegisterGinRouting(r *gin.Engine) {\n\tr.Static(\"/demo/images\", \"templates/demo/images\")\n}", "func (e *Engine) Static(path, location string) {\n\te.gin.Static(path, location)\n}", "func staticFile(mux *http.ServeMux, name string) {\n\tabs := filepath.Join(service.Static.DiskPath, name)\n\tmux.HandleFunc(name, func(w http.ResponseWriter, r *http.Request) {\n\t\thttp.ServeFile(w, r, abs)\n\t})\n}", "func (a *Api) serveStatic(res http.ResponseWriter, req *http.Request) {\n\tdata, err := ioutil.ReadFile(\"index.html\")\n\tif err != nil {\n\t\tlog.Printf(\"templates - failure to read index.html\")\n\t}\n\tres.Header().Set(\"content-type\", \"text/html\")\n\tres.WriteHeader(200)\n\tres.Write(data)\n\treturn\n}", "func NewStaticHandler(cnf Config) *StaticHandler {\n\tfs := intStaticFS\n\tif cnf.Dir != \"\" {\n\t\tfs = http.Dir(path.Join(cnf.Dir, \"static\"))\n\t}\n\treturn &StaticHandler{fs: fs}\n}", "func MakeStaticHandler(staticPath string) http.Handler {\n\treturn http.StripPrefix(\n\t\tfmt.Sprintf(\"/%s/\", staticPath),\n\t\thttp.FileServer(http.Dir(staticPath)))\n}", "func Static(w http.ResponseWriter, r *http.Request, params httprouter.Params) {\n var mime_type string\n\n static_path := \"/src/github.com/mrgirlyman/watcher/frontman/build\" + params.ByName(\"filepath\")\n p, _ := loadPage(static_path)\n\n // Determining the MIME type of the file based on file extension\n switch slice := strings.Split(static_path, \".\"); slice[len(slice) - 1] {\n case \"css\":\n mime_type = \"text/css\"\n case \"js\":\n mime_type = \"application/javascript\"\n default:\n mime_type = \"text/plain\"\n }\n \n w.Header().Set(\"Content-Type\", mime_type)\n\n // Writing content to the http.ResponseWriter\n fmt.Fprintf(w, string(p.Body))\n}", "func registerStatic(mux *http.ServeMux, staticDir string) {\n\tif mux == nil {\n\t\tmux = http.DefaultServeMux\n\t}\n\tmux.Handle(\"/\", hostRedirectHandler(wrappedHandler(http.FileServer(http.Dir(staticDir)))))\n}", "func newRouter() *mux.Router {\n\tr := mux.NewRouter()\n\tr.HandleFunc(\"/hello\", handler).Methods(\"GET\")\n\tstaticFileDirectory := http.Dir(\"./assets/\")\n\t//Strip prefix\n\tstaticFileHandler := http.StripPrefix(\"/assets/\", http.FileServer(staticFileDirectory))\n\tr.PathPrefix(\"/assets/\").Handler(staticFileHandler).Methods(\"GET\")\n\tr.HandleFunc(\"/bird\", getBirdHandler).Methods(\"GET\")\n\tr.HandleFunc(\"/bird\", createBirdHandler).Methods(\"POST\")\n\treturn r\n}", "func NewStatic(dir http.FileSystem) *Static {\n\treturn &Static{\n\t\tPrefix: \"\",\n\t\tIndexFile: \"index.html\",\n\t\tDir: dir,\n\t}\n}", "func (s *Server) createRoutes() {\n\tvar routes = util.Routes{\n\t\tutil.Route{\n\t\t\tName: \"pong\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/\",\n\t\t\tHandlerFunc: s.pong(),\n\t\t},\n\t\tutil.Route{\n\t\t\tName: \"healthz\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/healthz\",\n\t\t\tHandlerFunc: util.Healthz(),\n\t\t},\n\t\tutil.Route{\n\t\t\tName: \"getAllItems\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/items\",\n\t\t\tHandlerFunc: s.getAllItems(),\n\t\t},\n\t\tutil.Route{\n\t\t\tName: \"setItemsPOST\",\n\t\t\tMethod: \"POST\",\n\t\t\tPattern: \"/items\",\n\t\t\tHandlerFunc: s.setItem(false),\n\t\t},\n\t\tutil.Route{\n\t\t\tName: \"setItemsPUT\",\n\t\t\tMethod: \"PUT\",\n\t\t\tPattern: \"/items\",\n\t\t\tHandlerFunc: s.setItem(true),\n\t\t},\n\t\tutil.Route{\n\t\t\tName: \"getItem\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/items/{id:[a-zA-Z0-9]+}\",\n\t\t\tHandlerFunc: s.getItem(),\n\t\t},\n\t\tutil.Route{\n\t\t\tName: \"delItem\",\n\t\t\tMethod: \"DELETE\",\n\t\t\tPattern: \"/items/{id:[a-zA-Z0-9]+}\",\n\t\t\tHandlerFunc: s.delItem(),\n\t\t},\n\t\tutil.Route{\n\t\t\tName: \"delay\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/delay\",\n\t\t\tHandlerFunc: s.delay(),\n\t\t},\n\t\tutil.Route{\n\t\t\tName: \"simulateError\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/error\",\n\t\t\tHandlerFunc: s.simulateError(),\n\t\t},\n\t}\n\n\tfor _, route := range routes {\n\t\th := route.HandlerFunc\n\n\t\t// Tracing each request\n\t\th = util.TracerMiddleware(h, route)\n\n\t\t// Logging each request\n\t\th = util.LoggerMiddleware(h, s.logger)\n\n\t\t// Assign requestID to each request\n\t\th = util.AssignRequestID(h, s.logger)\n\n\t\t// Monitoring each request\n\t\t// TODO: pass proper handler\n\t\tpromHandler := util.PrometheusMiddleware(h, route.Pattern, rm)\n\n\t\ts.router.\n\t\t\tMethods(route.Method).\n\t\t\tPath(route.Pattern).\n\t\t\tName(route.Name).\n\t\t\tHandler(promHandler)\n\t}\n\n\t// Prometheus endpoint\n\troute := util.Route{\n\t\tName: \"metrics\",\n\t\tMethod: \"GET\",\n\t\tPattern: \"/metrics\",\n\t\tHandlerFunc: nil,\n\t}\n\n\tpromHandler := promhttp.HandlerFor(s.promReg, promhttp.HandlerOpts{})\n\tpromHandler = promhttp.InstrumentMetricHandler(s.promReg, promHandler)\n\ts.router.\n\t\tMethods(route.Method).\n\t\tPath(route.Pattern).\n\t\tName(route.Name).\n\t\tHandler(promHandler)\n\n\t// 404 handler\n\tnotFound := util.PrometheusMiddleware(s.notFound(), \"metrics\", rm)\n\ts.router.NotFoundHandler = notFound\n}", "func NewStatic() *Static {\n\treturn &Static{\n\t\tHome: views.NewView(\"bootstrap\", \"static/home\"),\n\t\tContact: views.NewView(\"bootstrap\", \"static/contact\"),\n\t}\n}", "func NewStatic() *Static {\n\treturn &Static{\n\t\tHome: views.NewView(\"bootstrap\", \"static/home\"),\n\t\tContact: views.NewView(\"bootstrap\", \"static/contact\"),\n\t}\n}", "func (s *BaseSyslParserListener) EnterHttp_path_static(ctx *Http_path_staticContext) {}", "func Create(client *occlient.Client, cmp string) (*URL, error) {\n\n\tapp, err := application.GetCurrentOrDefault(client)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"unable to get current application\")\n\t}\n\n\tlabels, err := component.GetLabels(cmp, app, false)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"unable to get labels\")\n\t}\n\n\troute, err := client.CreateRoute(cmp, labels)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"unable to create route\")\n\t}\n\n\treturn &URL{\n\t\tName: route.Name,\n\t\tURL: route.Spec.Host,\n\t}, nil\n}", "func Static(fs embed.FS) echo.MiddlewareFunc {\n\treturn func(next echo.HandlerFunc) echo.HandlerFunc {\n\t\treturn func(c echo.Context) (err error) {\n\t\t\turi := c.Request().RequestURI\n\n\t\t\tif strings.HasPrefix(uri, \"/api\") {\n\t\t\t\treturn next(c)\n\t\t\t}\n\n\t\t\tif uri == \"/\" {\n\t\t\t\turi = \"index.html\"\n\t\t\t}\n\n\t\t\turi = filepath.Join(\"assets\", uri)\n\n\t\t\tdata, err := fs.ReadFile(uri)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Fprintf(os.Stderr, \"ERROR: reading file from embeded FS: %s\\n\", err.Error())\n\t\t\t\treturn next(c)\n\t\t\t}\n\n\t\t\tmime := mimetype.Detect(data).String()\n\t\t\tif strings.HasSuffix(uri, \"wasm\") {\n\t\t\t\tmime = \"application/wasm\"\n\t\t\t}\n\t\t\tif strings.HasSuffix(uri, \"html\") {\n\t\t\t\tmime = \"text/html; charset=utf-8\"\n\t\t\t}\n\t\t\tif strings.HasSuffix(uri, \"js\") {\n\t\t\t\tmime = \"application/js; charset=utf-8\"\n\t\t\t}\n\t\t\tif strings.HasSuffix(uri, \"png\") {\n\t\t\t\tmime = \"image/png\"\n\t\t\t}\n\n\t\t\treturn c.Blob(http.StatusOK, mime, data)\n\t\t}\n\t}\n}", "func LoadRoutes() {\n\tchat.Load()\n\tstatic.Load()\n\n\t//fs := http.FileServer(http.Dir(\"asset/static\"))\n\t//http.Handle(\"/static/\", http.StripPrefix(\"/static/\", fs))\n}", "func main() {\n\trouter := route.InitRouter(&service.Client{\n\t\tOpenViDuURL: \"https://openvidu-server-kms:8443\",\n\t\tLogin: \"OPENVIDUAPP\",\n\t\tPassword: \"MY_SECRET\",\n\t})\n\trouter.LoadHTMLGlob(\"/resources/templates/*.tmpl\")\n\trouter.Static(\"/images\", \"resources/static/images\")\n\trouter.StaticFile(\"/style.css\", \"resources/static//style.css\")\n\trouter.StaticFile(\"/openvidu-browser-1.1.0.js\",\n\t\t\"resources/static/openvidu-browser-1.1.0.js\")\n\trouter.Run()\n}", "func AddStatic(mux Mux, path, content string) {\n\tAddStaticBinary(mux, path, []byte(content))\n}", "func setupStatic(mux *goji.Mux) {\n\tif len(opts.DevServerUri) > 0 {\n\t\tlog.Printf(\"Proxying static files to development server %v.\",\n\t\t\topts.DevServerUri)\n\t\tdevServerProxyUrl, err := url.Parse(opts.DevServerUri)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tdevServerProxy :=\n\t\t\thttputil.NewSingleHostReverseProxy(devServerProxyUrl)\n\t\tmux.Handle(pat.Get(\"/*\"), devServerProxy)\n\t} else {\n\t\tpublic := http.FileServer(\n\t\t\trice.MustFindBox(\"./public\").HTTPBox())\n\t\tmux.Handle(pat.Get(\"/*\"), public)\n\t}\n}", "func AddRoutes(app *fiber.App) {\n\tapp.Static(\"/\", \"./public\")\n\tapp.Get(\"/ws/status\", websocket.New(StatusWSView))\n\n\tapp.Put(\"/flight\", CreateFlightView)\n\tapp.Delete(\"/flight/:route\", DeleteFlightView)\n\tapp.Put(\"/flights/import/csv\", ImportFlightsView)\n\tapp.Get(\"/flights/search/:route\", CheapestRouteView)\n\n\tapp.Use(NotFoundView)\n}", "func (a *Application) Serve(url string, path string) {\n\tif a.static == nil {\n\t\tlog.Debug(\"creating `Static` instance\")\n\n\t\ta.static = &Static{}\n\t\ta.static.init()\n\t}\n\n\ta.static.Serve(url, path)\n}", "func (o *AggregatedDomain) StaticRoutes(info *bambou.FetchingInfo) (StaticRoutesList, *bambou.Error) {\n\n\tvar list StaticRoutesList\n\terr := bambou.CurrentSession().FetchChildren(o, StaticRouteIdentity, &list, info)\n\treturn list, err\n}", "func newRoute(registedPath string, handler Handler) *Route {\n\tr := &Route{handler: handler, fullpath: registedPath}\n\tr.processPath()\n\treturn r\n}", "func (s *Server) Routes() http.Handler {\n\trouter := mux.NewRouter()\n\trouter.HandleFunc(\"/\", s.IndexHandler).Methods(\"GET\")\n\trouter.PathPrefix(\"/static/\").Handler(http.StripPrefix(\"/static/\", CacheControl(http.FileServer(http.Dir(\"static\")))))\n\treturn Logging(router)\n}", "func SetupRouting() {\n\tfs := http.FileServer(http.Dir(\"./public\"))\n\thttp.Handle(\"/\", fs)\n\n\t// http.HandleFunc(\"/ws\", HandleConnections)\n\n\t//sends user info to front end\n\thttp.HandleFunc(\"/user\", ShowUser)\n\n\t// group routing, shows history\n\thttp.HandleFunc(\"/history\", GroupHistory)\n\n\thttp.HandleFunc(\"/message\", CreateNewMessage)\n\n\t// message routing\n\thttp.HandleFunc(\"/messages\", MessageHandler)\n\n\t//JWT endpoints\n\thttp.HandleFunc(\"/signin\", Signin)\n\thttp.HandleFunc(\"/welcome\", Welcome)\n\thttp.HandleFunc(\"/refresh\", Refresh)\n\n\t//registration\n\thttp.HandleFunc(\"/register\", Register)\n}", "func (ws *Server) AddStaticDirectory(endpoint string, path string) {\n\tws.staticFiles[endpoint] = path\n}", "func NewStatic() *Static {\n\treturn &Static{\n\t\tHome: views.NewView(\"bootstrap\", \"static/home\"),\n\t\tContact: views.NewView(\"bootstrap\", \"static/contact\"),\n\t\tPageNotFound: views.NewView(\"bootstrap\", \"static/pagenotfound\"),\n\t}\n\n}", "func CreateResourceRoute(resource Resource, name string, pattern string) Route {\n\n\tvar handler HandlerFunc\n\thandler = func(app *App) http.HandlerFunc {\n\t\treturn func(w http.ResponseWriter, request *http.Request) {\n\t\t\tvar data interface{}\n\t\t\tvar code int\n\t\t\tvar err error\n\n\t\t\tswitch request.Method {\n\t\t\tcase GET:\n\t\t\t\tcode, data, err = resource.Get(app, request)\n\t\t\tcase POST:\n\t\t\t\tcode, data, err = resource.Post(app, request)\n\t\t\tcase PUT:\n\t\t\t\tcode, data, err = resource.Put(app, request)\n\t\t\tcase DELETE:\n\t\t\t\tcode, data, err = resource.Delete(app, request)\n\t\t\tdefault:\n\t\t\t\tapp.Abort(w, http.StatusNotImplemented)\n\t\t\t}\n\n\t\t\t// Handle errors from the resource\n\t\t\tif err != nil {\n\t\t\t\tif code == 0 {\n\t\t\t\t\tcode = http.StatusInternalServerError\n\t\t\t\t}\n\n\t\t\t\tapp.JSONError(w, err, code)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// Write the content type and the status code\n\t\t\tw.Header().Set(CTKEY, CTJSON)\n\t\t\tw.WriteHeader(code)\n\n\t\t\t// Write the response data as JSON to the stream.\n\t\t\tif err := json.NewEncoder(w).Encode(data); err != nil {\n\t\t\t\tapp.Error(w, err, http.StatusInternalServerError)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\n\treturn Route{name, []string{GET, POST, PUT, DELETE}, pattern, handler, true}\n}", "func NewStatic() *Static {\n\treturn &Static{\n\t\tHomeView: views.NewView(\"bootstrap\", \"static/home\"),\n\t\tContactView: views.NewView(\"bootstrap\", \"static/contact\"),\n\t\tFaqView: views.NewView(\"bootstrap\", \"static/faq\"),\n\t}\n}", "func GetStaticRoute(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *StaticRouteState, opts ...pulumi.ResourceOption) (*StaticRoute, error) {\n\tvar resource StaticRoute\n\terr := ctx.ReadResource(\"cloudflare:index/staticRoute:StaticRoute\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (rout *RoutServeMux) ServeStaticFiles(folderName string) {\n\trout.assign(\"GET\", `/`+folderName+`/`,\n\t\trout.HFM(http.StripPrefix(`/`+folderName+`/`,\n\t\t\thttp.FileServer(http.Dir(`./`+folderName+`/`)))))\n}", "func (c *Core) Static(prefix, root string, config ...Static) *Core {\n\tc.pushStatic(prefix, root, config...)\n\treturn c\n}", "func InitializeRoutes() {\n\thttp.HandleFunc(\"/webrtc/offer\", createWebRTCOffer)\n}", "func (sH *StaticAssetsHandler) RegisterRoutes(router *mux.Router) {\n\tfileServer := http.FileServer(sH.assetsFS)\n\tif sH.options.BasePath != \"/\" {\n\t\tfileServer = http.StripPrefix(sH.options.BasePath+\"/\", fileServer)\n\t}\n\trouter.PathPrefix(\"/static/\").Handler(sH.loggingHandler(fileServer))\n\t// index.html is served by notFound handler\n\trouter.NotFoundHandler = sH.loggingHandler(http.HandlerFunc(sH.notFound))\n}", "func staticFile(name string) string {\n\treturn filepath.Join(Config.StaticPath, name)\n}", "func NewRoute(name, namespace, serviceName, routeHost string, cert, key, caCert, destinationCAcert []byte) *route.Route {\n\n\tlabels := GetCommonLabels()\n\tweight := int32(100)\n\n\tr := &route.Route{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"Route\",\n\t\t\tAPIVersion: route.SchemeGroupVersion.String(),\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tNamespace: namespace,\n\t\t\tLabels: labels,\n\t\t},\n\t\tSpec: route.RouteSpec{\n\t\t\tHost: routeHost,\n\t\t\tPort: &route.RoutePort{\n\t\t\t\tTargetPort: intstr.IntOrString{\n\t\t\t\t\tType: intstr.String,\n\t\t\t\t\tStrVal: \"https\",\n\t\t\t\t},\n\t\t\t},\n\t\t\tTo: route.RouteTargetReference{\n\t\t\t\tName: serviceName,\n\t\t\t\tKind: \"Service\",\n\t\t\t\tWeight: &weight,\n\t\t\t},\n\t\t\tWildcardPolicy: route.WildcardPolicyNone,\n\t\t},\n\t}\n\n\tif len(cert) > 0 && len(key) > 0 && len(caCert) > 0 && len(destinationCAcert) > 0 {\n\t\t// SSL termination is reencrypt\n\t\tr.Spec.TLS = &route.TLSConfig{\n\t\t\tTermination: route.TLSTerminationReencrypt,\n\t\t\tInsecureEdgeTerminationPolicy: route.InsecureEdgeTerminationPolicyRedirect,\n\t\t\tCertificate: string(cert),\n\t\t\tKey: string(key),\n\t\t\tCACertificate: string(caCert),\n\t\t\tDestinationCACertificate: string(destinationCAcert),\n\t\t}\n\t} else {\n\t\t// SSL termination is passthrough\n\t\tr.Spec.TLS = &route.TLSConfig{\n\t\t\tTermination: route.TLSTerminationPassthrough,\n\t\t\tInsecureEdgeTerminationPolicy: route.InsecureEdgeTerminationPolicyRedirect,\n\t\t}\n\t}\n\n\treturn r\n}", "func handleStatic(writer http.ResponseWriter, request *http.Request) {\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\twriter.WriteHeader(500)\n\t\t\t_, err := writer.Write([]byte(fmt.Sprint(r)))\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(\"Error writing response: \", err)\n\t\t\t}\n\t\t}\n\t}()\n\n\t// First, check if the path matches any in handlerMap, otherwise serve from static.\n\tpath := request.URL.Path\n\tfor k, v := range handlerMap {\n\t\tif strings.Index(path, k) == 0 {\n\t\t\tv(writer, request)\n\t\t\treturn\n\t\t}\n\t}\n\n\tfmt.Printf(\"%s %s\\n\", request.Method, request.URL.String())\n\n\t// Only supports get requests\n\tif strings.ToUpper(request.Method) != \"GET\" {\n\t\tpanic(\"Unsupported HTTP Method\")\n\t}\n\n\twd, err := os.Getwd()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tfilePath := filepath.Join(wd, \"client\", path)\n\n\t// If the file does not exist, return 404\n\tif _, err := os.Stat(filePath); err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\twriter.WriteHeader(404)\n\t\t\treturn\n\t\t} else {\n\t\t\tpanic(err)\n\t\t}\n\t}\n\n\t// Otherwise, return the file\n\tb, err := ioutil.ReadFile(filePath)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// Get the mime type from the filename\n\tvar mimeType string\n\text := filepath.Ext(filePath)\n\tif mt, ok := mimeMap[ext]; ok {\n\t\tmimeType = mt\n\t} else {\n\t\tmimeType = \"text/plain\"\n\t}\n\n\twriter.Header().Set(\"Content-Type\", mimeType)\n\n\twriter.WriteHeader(200)\n\n\t_, err = writer.Write(b)\n\tif err != nil {\n\t\tfmt.Println(\"ERROR: Failed to write to response: \", err)\n\t\treturn\n\t}\n\n\treturn\n}", "func InitRouter(r *gin.Engine) *gin.Engine {\n\t// assets file\n\tr.StaticFS(StaticPrefix, FileSystem(FS, StaticRoot))\n\n\t// fe, err := fs.Sub(FS, \"dist\")\n\t// if err != nil {\n\t// \tpanic(err)\n\t// }\n\t// tmpl := template.Must(template.New(\"\").ParseFS(fe, \"*.html\"))\n\n\ttmpl := template.Must(template.New(\"\").ParseFS(FS, Patterns))\n\tr.SetHTMLTemplate(tmpl)\n\tr.GET(\"/\", func(ctx *gin.Context) {\n\t\tctx.HTML(200, IndexHtml, gin.H{\"title\": \"Index\"})\n\t})\n\treturn r\n}", "func RegisterStaticHandler(r *mux.Router, logger *zap.Logger, qOpts *QueryOptions) {\n\tstaticHandler, err := NewStaticAssetsHandler(qOpts.StaticAssets, StaticAssetsHandlerOptions{\n\t\tBasePath: qOpts.BasePath,\n\t\tUIConfigPath: qOpts.UIConfig,\n\t\tLogger: logger,\n\t\tLogAccess: qOpts.LogStaticAssetsAccess,\n\t})\n\tif err != nil {\n\t\tlogger.Panic(\"Could not create static assets handler\", zap.Error(err))\n\t}\n\n\tstaticHandler.RegisterRoutes(r)\n}", "func NewStatic() *Static {\n\treturn &Static{\n\t\tHomeView: views.NewFiles(\"bootstrap\", \"static/home\"),\n\t\tContactView: views.NewFiles(\"bootstrap\", \"static/contact\"),\n\t\tFAQView: views.NewFiles(\"bootstrap\", \"static/faq\"),\n\t\tNotFoundView: views.NewFiles(\"bootstrap\", \"static/notfound\"),\n\t}\n}", "func (msg MsgCreateIndex) Route() string { return RouterKey }", "func StaticIPAMRoutes() *StaticIPAMRoutesApplyConfiguration {\n\treturn &StaticIPAMRoutesApplyConfiguration{}\n}", "func InitializeRoutes() *mux.Router {\n\n\tmyServer := mux.NewRouter()\n\tmyServer.HandleFunc(\"/api/\", handleAPI())\n\tmyServer.HandleFunc(\"/about/\", handleAbout())\n\tmyServer.HandleFunc(\"/\", handleIndex())\n\tmyServer.HandleFunc(\"/index/\", serveTemplate())\n\tmyServer.PathPrefix(\"/static\").Handler(http.StripPrefix(\"/static/\", http.FileServer(http.Dir(\"./static\"))))\n\thttp.Handle(\"/\", myServer)\n\treturn myServer\n}", "func newRouter() *mux.Router {\n\t// Declare a new router\n\tr := mux.NewRouter()\n\n\t// This is where the router is useful, it allows us to declare methods that\n\t// this path will be valid for\n\t// Define Route: `GET /hello`\n\tr.HandleFunc(\"/hello\", handler).Methods(\"GET\")\n\n\t// Declare the static file directory and point it to the\n\t// directory we just made\n\tstaticFileDirectory := http.Dir(\"./assets/\")\n\t// Declare the handler, that routes requests to their respective filename.\n\t// The fileserver is wrapped in the `stripPrefix` method, because we want to\n\t// remove the \"/assets/\" prefix when looking for files.\n\t// For example, if we type \"/assets/index.html\" in our browser, the file server\n\t// will look for only \"index.html\" inside the directory declared above.\n\t// If we did not strip the prefix, the file server would look for\n\t// \"./assets/assets/index.html\", and yield an error\n\tstaticFileHandler := http.StripPrefix(\"/assets/\", http.FileServer(staticFileDirectory))\n\t// The \"PathPrefix\" method acts as a matcher, and matches all routes starting\n\t// with \"/assets/\", instead of the absolute route itself\n\tr.PathPrefix(\"/assets/\").Handler(staticFileHandler).Methods(\"GET\")\n\n\t// These lines are added inside the newRouter() function before returning r\n\tr.HandleFunc(\"/bird\", getBirdHandler).Methods(\"GET\")\n\tr.HandleFunc(\"/bird\", createBirdHandler).Methods(\"POST\")\n\treturn r\n}", "func Static(name, contentType string) gin.HandlerFunc {\n\tdata := Assets.Files[name].Data\n\treturn func(c *gin.Context) {\n\t\tc.Data(http.StatusOK, contentType, data)\n\t}\n}", "func NewCalc() controller.Controller {\n return &Calc{\n Routes: []string{\n \"get;/calculator;CalcGet\",\n \"post;/calculator;CalcPost\",\n \"get;/save;ResultSave\",\n \"get;/result/{id};ResultGet\",\n //\"get;/;CalcPost\",\n },\n }\n}", "func newRouter() *mux.Router {\n\tr := mux.NewRouter()\n\tfileServer := http.StripPrefix(\"/assets/\", http.FileServer(http.Dir(\"./assets/\")))\n\n\t// define routes\n\tr.HandleFunc(\"/hello\", handler).Methods(\"GET\")\n\tr.HandleFunc(\"/workorders\", getWorkordersHandler).Methods(\"GET\")\n\tr.HandleFunc(\"/workorders\", createWorkorderHandler).Methods(\"POST\")\n\tr.PathPrefix(\"/assets/\").Handler(fileServer).Methods(\"GET\")\n\treturn r\n}", "func (rc *Ctx) Static(filePath string) *StaticResult {\n\treturn NewStaticResultForFile(filePath)\n}", "func RegisterStaticHandlers(cfg *Config, db *gorm.DB, logger *logrus.Logger) {\n\thttp.HandleFunc(\"/\", handleDynamicContent(cfg, db, logger))\n}" ]
[ "0.73917", "0.7025351", "0.70049614", "0.69235927", "0.68539876", "0.6782272", "0.6659279", "0.6659279", "0.6613833", "0.6613306", "0.6601612", "0.6599361", "0.6537414", "0.653484", "0.65214574", "0.6487577", "0.64786226", "0.6423604", "0.64110416", "0.6402803", "0.63785976", "0.6367057", "0.63514256", "0.6331377", "0.6308788", "0.6298926", "0.62937266", "0.62786114", "0.62746215", "0.6259879", "0.624715", "0.6236705", "0.61822563", "0.60976756", "0.6076341", "0.6076341", "0.6052622", "0.60292256", "0.6016691", "0.59536713", "0.5917393", "0.5905129", "0.58967954", "0.5884639", "0.5845114", "0.5824105", "0.57462966", "0.5731391", "0.5715379", "0.57078284", "0.56929886", "0.5675435", "0.56726706", "0.5661655", "0.56287694", "0.5601909", "0.55996495", "0.55872315", "0.55633783", "0.5559127", "0.5557166", "0.5550499", "0.5550499", "0.55441576", "0.5530688", "0.55084157", "0.5502081", "0.54906774", "0.5478505", "0.54727817", "0.5468042", "0.54610217", "0.545622", "0.5453052", "0.5449603", "0.54318875", "0.5408314", "0.54078007", "0.5393271", "0.53899604", "0.5381774", "0.537804", "0.5376639", "0.53725976", "0.53337675", "0.533146", "0.5325745", "0.5308341", "0.5282955", "0.52806574", "0.527817", "0.5274616", "0.5271779", "0.527084", "0.5270083", "0.5256658", "0.52563167", "0.5254022", "0.5239459", "0.5238172" ]
0.6056679
36
You should always use this function to get a new CreateVPCParams instance, as then you are sure you have configured all required params
func (s *VPCService) NewCreateVPCParams(cidr string, displaytext string, name string, vpcofferingid string, zoneid string) *CreateVPCParams { p := &CreateVPCParams{} p.p = make(map[string]interface{}) p.p["cidr"] = cidr p.p["displaytext"] = displaytext p.p["name"] = name p.p["vpcofferingid"] = vpcofferingid p.p["zoneid"] = zoneid return p }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func CreateVPCMocked(t *testing.T, vpcIn *types.Vpc) *types.Vpc {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewVPCService(cs)\n\tassert.Nil(err, \"Couldn't load VPC service\")\n\tassert.NotNil(ds, \"VPC service not instanced\")\n\n\t// convertMap\n\tmapIn, err := utils.ItemConvertParams(*vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// to json\n\tdOut, err := json.Marshal(vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// call service\n\tcs.On(\"Post\", \"/network/vpcs/\", mapIn).Return(dOut, 200, nil)\n\tvpcOut, err := ds.CreateVPC(mapIn)\n\tassert.Nil(err, \"Error creating VPC list\")\n\tassert.Equal(vpcIn, vpcOut, \"CreateVPC returned different VPCs\")\n\n\treturn vpcOut\n}", "func (s *VPCService) NewCreateVPCOfferingParams(displaytext string, name string, supportedservices []string) *CreateVPCOfferingParams {\n\tp := &CreateVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"displaytext\"] = displaytext\n\tp.p[\"name\"] = name\n\tp.p[\"supportedservices\"] = supportedservices\n\treturn p\n}", "func (s *VPCService) NewCreatePrivateGatewayParams(gateway string, ipaddress string, netmask string, vlan string, vpcid string) *CreatePrivateGatewayParams {\n\tp := &CreatePrivateGatewayParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"gateway\"] = gateway\n\tp.p[\"ipaddress\"] = ipaddress\n\tp.p[\"netmask\"] = netmask\n\tp.p[\"vlan\"] = vlan\n\tp.p[\"vpcid\"] = vpcid\n\treturn p\n}", "func NewParams(communityTax sdk.Dec, withdrawAddrEnabled bool) Params {\n\treturn Params{\n\t\tCommunityTax: communityTax,\n\t\tWithdrawAddrEnabled: withdrawAddrEnabled,\n\t}\n}", "func CreateVpc(ec2Svc *ec2.EC2) {\n\tlogrus.Info(\"Creating VPC\")\n\tvpcResponse, err := ec2Svc.CreateDefaultVpc(&ec2.CreateDefaultVpcInput{})\n\tif err != nil {\n\t\tlogrus.Fatalf(\"Couldn't create a VPC: %s\", err)\n\t}\n\tlogrus.Info(\"Waiting for VPC to be created\")\n\tec2Svc.WaitUntilVpcExists(vpcInput)\n\tlogrus.Infof(\"VPC: %s has been created\", *vpcResponse.Vpc.VpcId)\n\t_, err = ec2Svc.CreateTags(&ec2.CreateTagsInput{\n\t\tResources: []*string{vpcResponse.Vpc.VpcId},\n\t\tTags: []*ec2.Tag{\n\t\t\t{\n\t\t\t\tKey: aws.String(\"Name\"),\n\t\t\t\tValue: aws.String(vpcName),\n\t\t\t},\n\t\t},\n\t})\n\tif err != nil {\n\t\tlogrus.Fatalf(\"Unable to tag VPC: %s\", err)\n\t}\n}", "func (s *Stack) initVPC() error {\n\t// Tries to get VPC information\n\tvpcID, err := s.findVPCID()\n\tif err != nil {\n\t\treturn err\n\t}\n\tif vpcID != nil {\n\t\ts.vpc, err = s.GetVPC(*vpcID)\n\t\treturn err\n\t}\n\n\tvpc, err := s.CreateVPC(\n\t\tVPCRequest{\n\t\t\tName: s.authOpts.VPCName,\n\t\t\tCIDR: s.authOpts.VPCCIDR,\n\t\t},\n\t)\n\tif err != nil {\n\t\treturn fail.Errorf(\n\t\t\tfmt.Sprintf(\n\t\t\t\t\"failed to initialize VPC '%s': %s\", s.authOpts.VPCName, openstack.ProviderErrorToString(err),\n\t\t\t), err,\n\t\t)\n\t}\n\ts.vpc = vpc\n\treturn nil\n}", "func (ts *Tester) createVPC() error {\n\tif ts.cfg.VPC.ID != \"\" {\n\t\tts.lg.Info(\"querying ELBv2\", zap.String(\"vpc-id\", ts.cfg.VPC.ID))\n\t\tctx, cancel := context.WithTimeout(context.Background(), time.Minute)\n\t\toutput, err := ts.elbv2APIV2.DescribeLoadBalancers(\n\t\t\tctx,\n\t\t\t&aws_elbv2_v2.DescribeLoadBalancersInput{},\n\t\t)\n\t\tcancel()\n\t\tif err != nil {\n\t\t\tts.lg.Warn(\"failed to describe ELBv2\", zap.Error(err))\n\t\t} else {\n\t\t\tfor _, ev := range output.LoadBalancers {\n\t\t\t\tarn := aws_v2.ToString(ev.LoadBalancerArn)\n\t\t\t\tvpcID := aws_v2.ToString(ev.VpcId)\n\t\t\t\tif vpcID == ts.cfg.VPC.ID {\n\t\t\t\t\tts.lg.Warn(\"found ELBv2 for this VPC; may overlap with the other cluster\",\n\t\t\t\t\t\tzap.String(\"vpc-id\", ts.cfg.VPC.ID),\n\t\t\t\t\t\tzap.String(\"elb-arn\", arn),\n\t\t\t\t\t)\n\t\t\t\t} else {\n\t\t\t\t\tts.lg.Info(\"found ELBv2 for other VPCs\", zap.String(\"vpc-id\", vpcID), zap.String(\"elb-arn\", arn))\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tts.lg.Info(\"querying subnet IDs for given VPC\",\n\t\t\tzap.String(\"vpc-id\", ts.cfg.VPC.ID),\n\t\t)\n\t\tctx, cancel = context.WithTimeout(context.Background(), time.Minute)\n\t\tsresp, err := ts.ec2APIV2.DescribeSubnets(\n\t\t\tctx,\n\t\t\t&aws_ec2_v2.DescribeSubnetsInput{\n\t\t\t\tFilters: []aws_ec2_v2_types.Filter{\n\t\t\t\t\t{\n\t\t\t\t\t\tName: aws_v2.String(\"vpc-id\"),\n\t\t\t\t\t\tValues: []string{ts.cfg.VPC.ID},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t})\n\t\tcancel()\n\t\tif err != nil {\n\t\t\tts.lg.Warn(\"failed to subnets\", zap.Error(err))\n\t\t\treturn err\n\t\t}\n\n\t\tts.cfg.VPC.PublicSubnetIDs = make([]string, 0, len(sresp.Subnets))\n\t\tts.cfg.VPC.PrivateSubnetIDs = make([]string, 0, len(sresp.Subnets))\n\t\tfor _, sv := range sresp.Subnets {\n\t\t\tid := aws_v2.ToString(sv.SubnetId)\n\t\t\tnetworkTagValue := \"\"\n\t\t\tfor _, tg := range sv.Tags {\n\t\t\t\tswitch aws_v2.ToString(tg.Key) {\n\t\t\t\tcase \"Network\":\n\t\t\t\t\tnetworkTagValue = aws_v2.ToString(tg.Value)\n\t\t\t\t}\n\t\t\t\tif networkTagValue != \"\" {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tts.lg.Info(\"found subnet\",\n\t\t\t\tzap.String(\"id\", id),\n\t\t\t\tzap.String(\"availability-zone\", aws_v2.ToString(sv.AvailabilityZone)),\n\t\t\t\tzap.String(\"network-tag\", networkTagValue),\n\t\t\t)\n\t\t\tswitch networkTagValue {\n\t\t\tcase \"Public\":\n\t\t\t\tts.cfg.VPC.PublicSubnetIDs = append(ts.cfg.VPC.PublicSubnetIDs, id)\n\t\t\tcase \"Private\":\n\t\t\t\tts.cfg.VPC.PrivateSubnetIDs = append(ts.cfg.VPC.PrivateSubnetIDs, id)\n\t\t\tdefault:\n\t\t\t\treturn fmt.Errorf(\"'Network' tag not found in subnet %q\", id)\n\t\t\t}\n\t\t}\n\t\tif len(ts.cfg.VPC.PublicSubnetIDs) == 0 {\n\t\t\treturn fmt.Errorf(\"no subnet found for VPC ID %q\", ts.cfg.VPC.ID)\n\t\t}\n\n\t\tts.lg.Info(\"querying security IDs\", zap.String(\"vpc-id\", ts.cfg.VPC.ID))\n\t\tctx, cancel = context.WithTimeout(context.Background(), time.Minute)\n\t\tgresp, err := ts.ec2APIV2.DescribeSecurityGroups(\n\t\t\tctx,\n\t\t\t&aws_ec2_v2.DescribeSecurityGroupsInput{\n\t\t\t\tFilters: []aws_ec2_v2_types.Filter{\n\t\t\t\t\t{\n\t\t\t\t\t\tName: aws_v2.String(\"vpc-id\"),\n\t\t\t\t\t\tValues: []string{ts.cfg.VPC.ID},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t})\n\t\tcancel()\n\t\tif err != nil {\n\t\t\tts.lg.Warn(\"failed to security groups\", zap.Error(err))\n\t\t\treturn err\n\t\t}\n\t\tfor _, sg := range gresp.SecurityGroups {\n\t\t\tid, name := aws_v2.ToString(sg.GroupId), aws_v2.ToString(sg.GroupName)\n\t\t\tts.lg.Info(\"found security group\", zap.String(\"id\", id), zap.String(\"name\", name))\n\t\t\tif name != \"default\" {\n\t\t\t\tts.cfg.VPC.SecurityGroupID = id\n\t\t\t}\n\t\t}\n\t\tif ts.cfg.VPC.SecurityGroupID == \"\" {\n\t\t\treturn fmt.Errorf(\"no security group found for VPC ID %q\", ts.cfg.VPC.ID)\n\t\t}\n\n\t\tts.cfg.Sync()\n\t\treturn nil\n\t}\n\tif !ts.cfg.VPC.Create {\n\t\tts.lg.Info(\"VPC.Create false; skipping creation\")\n\t\treturn nil\n\t}\n\tif ts.cfg.VPC.ID != \"\" &&\n\t\tlen(ts.cfg.VPC.PublicSubnetIDs) > 0 &&\n\t\tts.cfg.VPC.SecurityGroupID != \"\" {\n\t\tts.lg.Info(\"VPC already created; no need to create a new one\")\n\t\treturn nil\n\t}\n\n\tif err := ts._createVPC(); err != nil { // AWS::EC2::VPC\n\t\treturn err\n\t}\n\tif err := ts.modifyVPC(); err != nil {\n\t\treturn err\n\t}\n\tif err := ts.createSecurityGroups(); err != nil { // AWS::EC2::SecurityGroup\n\t\treturn err\n\t}\n\tif err := ts.associateVPCCIDRBlocks(); err != nil { // AWS::EC2::VPCCidrBlock\n\t\treturn err\n\t}\n\n\tif err := ts.createInternetGateway(); err != nil { // AWS::EC2::InternetGateway\n\t\treturn err\n\t}\n\tif err := ts.createVPCGatewayAttachment(); err != nil { // AWS::EC2::VPCGatewayAttachment\n\t\treturn err\n\t}\n\n\tif err := ts.createPublicSubnets(); err != nil { // AWS::EC2::Subnet\n\t\treturn err\n\t}\n\tif err := ts.createPublicRouteTable(); err != nil { // AWS::EC2::RouteTable\n\t\treturn err\n\t}\n\tif err := ts.createPublicRoute(); err != nil { // AWS::EC2::Route\n\t\treturn err\n\t}\n\tif err := ts.createPublicSubnetRouteTableAssociation(); err != nil { // AWS::EC2::SubnetRouteTableAssociation\n\t\treturn err\n\t}\n\n\tif err := ts.createPublicEIPs(); err != nil { // AWS::EC2::EIP\n\t\treturn err\n\t}\n\tif err := ts.createPublicNATGateways(); err != nil { // AWS::EC2::NatGateway\n\t\treturn err\n\t}\n\n\tif err := ts.createPrivateSubnets(); err != nil { // AWS::EC2::Subnet\n\t\treturn err\n\t}\n\tif err := ts.createPrivateRouteTables(); err != nil { // AWS::EC2::RouteTable\n\t\treturn err\n\t}\n\tif err := ts.createPrivateRoutes(); err != nil { // AWS::EC2::Route\n\t\treturn err\n\t}\n\tif err := ts.createPrivateSubnetRouteTableAssociation(); err != nil { // AWS::EC2::SubnetRouteTableAssociation\n\t\treturn err\n\t}\n\n\tif err := ts.createDHCPOptions(); err != nil { // AWS::EC2::DHCPOptions, AWS::EC2::VPCDHCPOptionsAssociation\n\t\treturn err\n\t}\n\n\tif err := ts.authorizeSecurityGroup(); err != nil {\n\t\treturn err\n\t}\n\n\tts.lg.Info(\"created a VPC\",\n\t\tzap.String(\"vpc-id\", ts.cfg.VPC.ID),\n\t\tzap.Strings(\"vpc-cidr-blocks\", ts.cfg.VPC.CIDRs),\n\t\tzap.Strings(\"public-subnet-ids\", ts.cfg.VPC.PublicSubnetIDs),\n\t\tzap.Strings(\"private-subnet-ids\", ts.cfg.VPC.PrivateSubnetIDs),\n\t\tzap.String(\"control-plane-security-group-id\", ts.cfg.VPC.SecurityGroupID),\n\t)\n\n\tts.cfg.Sync()\n\treturn nil\n}", "func createHyperShiftVPC() (*HyperShiftVPC, error) {\n\tctx := context.Background()\n\n\tvar vpc HyperShiftVPC\n\tworkingDir := viper.GetString(config.ReportDir)\n\n\ttf, err := terraform.New(workingDir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefer func() {\n\t\t_ = tf.Uninstall(ctx)\n\t}()\n\n\tlog.Println(\"Creating ROSA HyperShift aws vpc\")\n\n\terr = copyFile(\"terraform/setup-vpc.tf\", fmt.Sprintf(\"%s/setup-vpc.tf\", workingDir))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = tf.Init(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = callAndSetAWSSession(func() error {\n\t\terr := tf.Plan(\n\t\t\tctx,\n\t\t\ttfexec.Var(fmt.Sprintf(\"aws_region=%s\", viper.GetString(config.AWSRegion))),\n\t\t\ttfexec.Var(fmt.Sprintf(\"cluster_name=%s\", viper.GetString(config.Cluster.Name))),\n\t\t)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\terr = tf.Apply(ctx)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\toutput, err := tf.Output(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvpc.PrivateSubnet = strings.ReplaceAll(string(output[\"cluster-private-subnet\"].Value), \"\\\"\", \"\")\n\tvpc.PublicSubnet = strings.ReplaceAll(string(output[\"cluster-public-subnet\"].Value), \"\\\"\", \"\")\n\tvpc.NodePrivateSubnet = strings.ReplaceAll(string(output[\"node-private-subnet\"].Value), \"\\\"\", \"\")\n\n\tlog.Println(\"ROSA HyperShift aws vpc created!\")\n\n\treturn &vpc, nil\n}", "func NewCreateVPCAction(creationContext *EksClusterCreateUpdateContext, stackName string) *CreateVPCAction {\n\treturn &CreateVPCAction{\n\t\tcontext: creationContext,\n\t\tstackName: stackName,\n\t\t//describeStacksTimeInterval: 10 * time.Second,\n\t\t//stackCreationTimeout: 3 * time.Minute,\n\t}\n}", "func SetupVPC(mgr ctrl.Manager, l logging.Logger) error {\n\tname := managed.ControllerName(v1alpha3.VPCGroupKind)\n\treturn ctrl.NewControllerManagedBy(mgr).\n\t\tNamed(name).\n\t\tFor(&v1alpha3.VPC{}).\n\t\tComplete(managed.NewReconciler(mgr,\n\t\t\tresource.ManagedKind(v1alpha3.VPCGroupVersionKind),\n\t\t\tmanaged.WithExternalConnecter(&connector{client: mgr.GetClient(), newClientFn: ec2.NewVPCClient, awsConfigFn: utils.RetrieveAwsConfigFromProvider}),\n\t\t\tmanaged.WithReferenceResolver(managed.NewAPISimpleReferenceResolver(mgr.GetClient())),\n\t\t\tmanaged.WithConnectionPublishers(),\n\t\t\tmanaged.WithInitializers(&tagger{kube: mgr.GetClient()}),\n\t\t\tmanaged.WithLogger(l.WithValues(\"controller\", name)),\n\t\t\tmanaged.WithRecorder(event.NewAPIRecorder(mgr.GetEventRecorderFor(name)))))\n}", "func NewClient(config *ucloud.Config, credential *auth.Credential) *VPCClient {\n\tmeta := ucloud.ClientMeta{Product: \"VPC\"}\n\tclient := ucloud.NewClientWithMeta(config, credential, meta)\n\treturn &VPCClient{\n\t\tclient,\n\t}\n}", "func NewParams(defaultSendEnabled bool) Params {\n\treturn Params{\n\t\tSendEnabled: nil,\n\t\tDefaultSendEnabled: defaultSendEnabled,\n\t}\n}", "func NewPetCreateParams() *PetCreateParams {\n\treturn &PetCreateParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func CreateVNICProfileParams() BuildableVNICProfileParameters {\n\treturn &vnicProfileParams{}\n}", "func (params *QueueParams) CreateParams() []*cloudformation.Parameter {\n\tstackParams := []*cloudformation.Parameter{}\n\tif params.DelaySeconds != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamDelaySeconds, *params.DelaySeconds))\n\t}\n\tif params.MaximumMessageSize != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamMaximumMessageSize, *params.MaximumMessageSize))\n\t}\n\tif params.MessageRetentionPeriod != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamMessageRetentionPeriod, *params.MessageRetentionPeriod))\n\t}\n\tif params.ReceiveMessageWaitTimeSeconds != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamReceiveMessageWaitTimeSeconds, *params.ReceiveMessageWaitTimeSeconds))\n\t}\n\tif params.RedriveMaxReceiveCount != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamRedriveMaxReceiveCount, *params.RedriveMaxReceiveCount))\n\t}\n\tif params.VisibilityTimeout != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamVisibilityTimeout, *params.VisibilityTimeout))\n\t}\n\treturn stackParams\n}", "func (h *VPCPeeringConnectionsHandler) Create(\n\tproject string,\n\tvpcID string,\n\treq CreateVPCPeeringConnectionRequest,\n) (*VPCPeeringConnection, error) {\n\tpath := buildPath(\"project\", project, \"vpcs\", vpcID, \"peering-connections\")\n\trsp, err := h.client.doPostRequest(path, req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response *VPCPeeringConnection\n\tif err := json.Unmarshal(rsp, &response); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn response, nil\n}", "func (s *VPCService) NewListVPCsParams() *ListVPCsParams {\n\tp := &ListVPCsParams{}\n\tp.p = make(map[string]interface{})\n\treturn p\n}", "func preparecreateServiceparams(params map[string]string, createservice Createservice, Region string) {\n\tif Region != \"\" {\n\t\tparams[\"Region\"] = Region\n\t}\n\tparams[\"amztarget\"] = \"AmazonEC2ContainerServiceV20141113.CreateService\"\n}", "func (rm *resourceManager) newCreateRequestPayload(\n\tctx context.Context,\n\tr *resource,\n) (*svcsdk.CreateVpcPeeringConnectionInput, error) {\n\tres := &svcsdk.CreateVpcPeeringConnectionInput{}\n\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Spec.PeerOwnerID != nil {\n\t\tres.SetPeerOwnerId(*r.ko.Spec.PeerOwnerID)\n\t}\n\tif r.ko.Spec.PeerRegion != nil {\n\t\tres.SetPeerRegion(*r.ko.Spec.PeerRegion)\n\t}\n\tif r.ko.Spec.PeerVPCID != nil {\n\t\tres.SetPeerVpcId(*r.ko.Spec.PeerVPCID)\n\t}\n\tif r.ko.Spec.TagSpecifications != nil {\n\t\tf4 := []*svcsdk.TagSpecification{}\n\t\tfor _, f4iter := range r.ko.Spec.TagSpecifications {\n\t\t\tf4elem := &svcsdk.TagSpecification{}\n\t\t\tif f4iter.ResourceType != nil {\n\t\t\t\tf4elem.SetResourceType(*f4iter.ResourceType)\n\t\t\t}\n\t\t\tif f4iter.Tags != nil {\n\t\t\t\tf4elemf1 := []*svcsdk.Tag{}\n\t\t\t\tfor _, f4elemf1iter := range f4iter.Tags {\n\t\t\t\t\tf4elemf1elem := &svcsdk.Tag{}\n\t\t\t\t\tif f4elemf1iter.Key != nil {\n\t\t\t\t\t\tf4elemf1elem.SetKey(*f4elemf1iter.Key)\n\t\t\t\t\t}\n\t\t\t\t\tif f4elemf1iter.Value != nil {\n\t\t\t\t\t\tf4elemf1elem.SetValue(*f4elemf1iter.Value)\n\t\t\t\t\t}\n\t\t\t\t\tf4elemf1 = append(f4elemf1, f4elemf1elem)\n\t\t\t\t}\n\t\t\t\tf4elem.SetTags(f4elemf1)\n\t\t\t}\n\t\t\tf4 = append(f4, f4elem)\n\t\t}\n\t\tres.SetTagSpecifications(f4)\n\t}\n\tif r.ko.Spec.VPCID != nil {\n\t\tres.SetVpcId(*r.ko.Spec.VPCID)\n\t}\n\n\treturn res, nil\n}", "func NewParams(acl ACL, daoOwner sdk.Address) Params {\n\treturn Params{\n\t\tACL: acl,\n\t\tDAOOwner: daoOwner,\n\t}\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t}\n}", "func (c *VPCClient) NewAddVPCNetworkRequest() *AddVPCNetworkRequest {\n\tcfg := c.client.GetConfig()\n\n\treturn &AddVPCNetworkRequest{\n\t\tCommonBase: request.CommonBase{\n\t\t\tRegion: cfg.Region,\n\t\t\tProjectId: cfg.ProjectId,\n\t\t},\n\t}\n}", "func NewParams() *Params {\n\treturn new(Params)\n}", "func (d *Driver) Create(params *asset.CreateWalletParams) error {\n\tif params.Type != walletTypeSPV {\n\t\treturn fmt.Errorf(\"SPV is the only seeded wallet type. required = %q, requested = %q\", walletTypeSPV, params.Type)\n\t}\n\tif len(params.Seed) == 0 {\n\t\treturn errors.New(\"wallet seed cannot be empty\")\n\t}\n\tif len(params.DataDir) == 0 {\n\t\treturn errors.New(\"must specify wallet data directory\")\n\t}\n\tchainParams, err := parseChainParams(params.Net)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error parsing chain params: %w\", err)\n\t}\n\n\trecoveryCfg := new(RecoveryCfg)\n\terr = config.Unmapify(params.Settings, recoveryCfg)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn createSPVWallet(params.Pass, params.Seed, params.DataDir, recoveryCfg.NumExternalAddresses,\n\t\trecoveryCfg.NumInternalAddresses, chainParams)\n}", "func NewCreatePublicIPAdressUsingPOSTParams() *CreatePublicIPAdressUsingPOSTParams {\n\tvar ()\n\treturn &CreatePublicIPAdressUsingPOSTParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewParams(opts []copts.Opt) *Params {\n\tparams := &Params{}\n\tcopts.Apply(params, opts)\n\treturn params\n}", "func NewParams() *Parameters {\n\treturn &Parameters{\n\t\tTokenType: \"transit\",\n\t\tTLSMode: 1,\n\t\tLeaderOnly: true,\n\t\tConnectTimeout: defaultConnectTimeout,\n\t\tReadTimeout: defaultReadTimeout,\n\t\tRetryCount: defaultRetries,\n\t\tRequireType: \"master\",\n\t}\n}", "func NewParams(\n\ttaxPolicy, rewardPolicy PolicyConstraints,\n\tseigniorageBurden sdk.Dec,\n\tminingIncrement sdk.Dec,\n\twindowShort, windowLong, windowProbation sdk.Int,\n) Params {\n\treturn Params{\n\t\tTaxPolicy: taxPolicy,\n\t\tRewardPolicy: rewardPolicy,\n\t\tSeigniorageBurdenTarget: seigniorageBurden,\n\t\tMiningIncrement: miningIncrement,\n\t\tWindowShort: windowShort,\n\t\tWindowLong: windowLong,\n\t\tWindowProbation: windowProbation,\n\t}\n}", "func (s *VPCService) NewRestartVPCParams(id string) *RestartVPCParams {\n\tp := &RestartVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewParams(createWhoisPrice string, updateWhoisPrice string, deleteWhoisPrice string) Params {\n\treturn Params{\n\t\tCreateWhoisPrice: createWhoisPrice,\n\t\tUpdateWhoisPrice: updateWhoisPrice,\n\t\tDeleteWhoisPrice: deleteWhoisPrice,\n\t}\n}", "func NewParams(tokenCourse, subscriptionPrice, VPNGBPrice,\n\tstorageGBPrice, baseVPNGb, baseStorageGb uint32, courseSigners []sdk.AccAddress) Params {\n\treturn Params{\n\t\tTokenCourse: tokenCourse,\n\t\tSubscriptionPrice: subscriptionPrice,\n\t\tVPNGBPrice: VPNGBPrice,\n\t\tStorageGBPrice: storageGBPrice,\n\t\tBaseVPNGb: baseVPNGb,\n\t\tBaseStorageGb: baseStorageGb,\n\t\tCourseChangeSigners: courseSigners[:],\n\t}\n}", "func NewParams(opts []copts.Opt) *Params {\r\n\tparams := &Params{}\r\n\tcopts.Apply(params, opts)\r\n\treturn params\r\n}", "func NewParams(nickname NicknameParams, dTag DTagParams, bio BioParams, oracle OracleParams) Params {\n\treturn Params{\n\t\tNickname: nickname,\n\t\tDTag: dTag,\n\t\tBio: bio,\n\t\tOracle: oracle,\n\t}\n}", "func (s *VPCService) NewUpdateVPCParams(id string) *UpdateVPCParams {\n\tp := &UpdateVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (s *VPCService) NewDeleteVPCParams(id string) *DeleteVPCParams {\n\tp := &DeleteVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules,\n\tmoneyMarkets MoneyMarkets, checkLtvIndexCount int) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t\tMoneyMarkets: moneyMarkets,\n\t\tCheckLtvIndexCount: checkLtvIndexCount,\n\t}\n}", "func (c *VPCClient) NewDescribeVPCIntercomRequest() *DescribeVPCIntercomRequest {\n\treq := &DescribeVPCIntercomRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "func CreateListVpcInfoByVpcRequest() (request *ListVpcInfoByVpcRequest) {\n\trequest = &ListVpcInfoByVpcRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Ots\", \"2016-06-20\", \"ListVpcInfoByVpc\", \"ots\", \"openAPI\")\n\treturn\n}", "func CreateGrantInstanceToVbrRequest() (request *GrantInstanceToVbrRequest) {\n\trequest = &GrantInstanceToVbrRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Vpc\", \"2016-04-28\", \"GrantInstanceToVbr\", \"vpc\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func CreateDescribeReservedInstancesRequest() (request *DescribeReservedInstancesRequest) {\n\trequest = &DescribeReservedInstancesRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Ecs\", \"2014-05-26\", \"DescribeReservedInstances\", \"ecs\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func CreateVPCFailJSONMocked(t *testing.T, vpcIn *types.Vpc) *types.Vpc {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewVPCService(cs)\n\tassert.Nil(err, \"Couldn't load VPC service\")\n\tassert.NotNil(ds, \"VPC service not instanced\")\n\n\t// convertMap\n\tmapIn, err := utils.ItemConvertParams(*vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// wrong json\n\tdIn := []byte{10, 20, 30}\n\n\t// call service\n\tcs.On(\"Post\", \"/network/vpcs/\", mapIn).Return(dIn, 200, nil)\n\tvpcOut, err := ds.CreateVPC(mapIn)\n\n\tassert.NotNil(err, \"We are expecting a marshalling error\")\n\tassert.Nil(vpcOut, \"Expecting nil output\")\n\tassert.Contains(err.Error(), \"invalid character\", \"Error message should include the string 'invalid character'\")\n\n\treturn vpcOut\n}", "func (f *FakeInstance) AttachVPC(_ context.Context, _, _ string) error {\n\tpanic(\"implement me\")\n}", "func NewParams(pricePerByte abi.TokenAmount, paymentInterval uint64, paymentIntervalIncrease uint64) (Params, error) {\n\treturn Params{\n\t\tPricePerByte: pricePerByte,\n\t\tPaymentInterval: paymentInterval,\n\t\tPaymentIntervalIncrease: paymentIntervalIncrease,\n\t}, nil\n}", "func (client *PublicIPAddressesClient) getCloudServicePublicIPAddressCreateRequest(ctx context.Context, resourceGroupName string, cloudServiceName string, roleInstanceName string, networkInterfaceName string, ipConfigurationName string, publicIPAddressName string, options *PublicIPAddressesClientGetCloudServicePublicIPAddressOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/roleInstances/{roleInstanceName}/networkInterfaces/{networkInterfaceName}/ipconfigurations/{ipConfigurationName}/publicipaddresses/{publicIpAddressName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif roleInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter roleInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{roleInstanceName}\", url.PathEscape(roleInstanceName))\n\tif networkInterfaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkInterfaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkInterfaceName}\", url.PathEscape(networkInterfaceName))\n\tif ipConfigurationName == \"\" {\n\t\treturn nil, errors.New(\"parameter ipConfigurationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{ipConfigurationName}\", url.PathEscape(ipConfigurationName))\n\tif publicIPAddressName == \"\" {\n\t\treturn nil, errors.New(\"parameter publicIPAddressName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{publicIpAddressName}\", url.PathEscape(publicIPAddressName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\tif options != nil && options.Expand != nil {\n\t\treqQP.Set(\"$expand\", *options.Expand)\n\t}\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (s *VPCService) NewCreateStaticRouteParams(cidr string, gatewayid string) *CreateStaticRouteParams {\n\tp := &CreateStaticRouteParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"cidr\"] = cidr\n\tp.p[\"gatewayid\"] = gatewayid\n\treturn p\n}", "func NewCreateCognitoIDPParams() *CreateCognitoIDPParams {\n\tvar (\n\t\taidDefault = string(\"default\")\n\t\ttidDefault = string(\"default\")\n\t)\n\treturn &CreateCognitoIDPParams{\n\t\tAid: aidDefault,\n\t\tTid: tidDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewCreateCrossConnectParams() *CreateCrossConnectParams {\n\tvar ()\n\treturn &CreateCrossConnectParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (rm *resourceManager) sdkCreate(\n\tctx context.Context,\n\tr *resource,\n) (*resource, error) {\n\tinput, err := rm.newCreateRequestPayload(ctx, r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp, respErr := rm.sdkapi.CreateVpcPeeringConnectionWithContext(ctx, input)\n\trm.metrics.RecordAPICall(\"CREATE\", \"CreateVpcPeeringConnection\", respErr)\n\tif respErr != nil {\n\t\treturn nil, respErr\n\t}\n\t// Merge in the information we read from the API call above to the copy of\n\t// the original Kubernetes object we passed to the function\n\tko := r.ko.DeepCopy()\n\n\tif resp.VpcPeeringConnection.AccepterVpcInfo != nil {\n\t\tf0 := &svcapitypes.VPCPeeringConnectionVPCInfo{}\n\t\tif resp.VpcPeeringConnection.AccepterVpcInfo.CidrBlock != nil {\n\t\t\tf0.CIDRBlock = resp.VpcPeeringConnection.AccepterVpcInfo.CidrBlock\n\t\t}\n\t\tif resp.VpcPeeringConnection.AccepterVpcInfo.CidrBlockSet != nil {\n\t\t\tf0f1 := []*svcapitypes.CIDRBlock{}\n\t\t\tfor _, f0f1iter := range resp.VpcPeeringConnection.AccepterVpcInfo.CidrBlockSet {\n\t\t\t\tf0f1elem := &svcapitypes.CIDRBlock{}\n\t\t\t\tif f0f1iter.CidrBlock != nil {\n\t\t\t\t\tf0f1elem.CIDRBlock = f0f1iter.CidrBlock\n\t\t\t\t}\n\t\t\t\tf0f1 = append(f0f1, f0f1elem)\n\t\t\t}\n\t\t\tf0.CIDRBlockSet = f0f1\n\t\t}\n\t\tif resp.VpcPeeringConnection.AccepterVpcInfo.Ipv6CidrBlockSet != nil {\n\t\t\tf0f2 := []*svcapitypes.IPv6CIDRBlock{}\n\t\t\tfor _, f0f2iter := range resp.VpcPeeringConnection.AccepterVpcInfo.Ipv6CidrBlockSet {\n\t\t\t\tf0f2elem := &svcapitypes.IPv6CIDRBlock{}\n\t\t\t\tif f0f2iter.Ipv6CidrBlock != nil {\n\t\t\t\t\tf0f2elem.IPv6CIDRBlock = f0f2iter.Ipv6CidrBlock\n\t\t\t\t}\n\t\t\t\tf0f2 = append(f0f2, f0f2elem)\n\t\t\t}\n\t\t\tf0.IPv6CIDRBlockSet = f0f2\n\t\t}\n\t\tif resp.VpcPeeringConnection.AccepterVpcInfo.OwnerId != nil {\n\t\t\tf0.OwnerID = resp.VpcPeeringConnection.AccepterVpcInfo.OwnerId\n\t\t}\n\t\tif resp.VpcPeeringConnection.AccepterVpcInfo.PeeringOptions != nil {\n\t\t\tf0f4 := &svcapitypes.VPCPeeringConnectionOptionsDescription{}\n\t\t\tif resp.VpcPeeringConnection.AccepterVpcInfo.PeeringOptions.AllowDnsResolutionFromRemoteVpc != nil {\n\t\t\t\tf0f4.AllowDNSResolutionFromRemoteVPC = resp.VpcPeeringConnection.AccepterVpcInfo.PeeringOptions.AllowDnsResolutionFromRemoteVpc\n\t\t\t}\n\t\t\tif resp.VpcPeeringConnection.AccepterVpcInfo.PeeringOptions.AllowEgressFromLocalClassicLinkToRemoteVpc != nil {\n\t\t\t\tf0f4.AllowEgressFromLocalClassicLinkToRemoteVPC = resp.VpcPeeringConnection.AccepterVpcInfo.PeeringOptions.AllowEgressFromLocalClassicLinkToRemoteVpc\n\t\t\t}\n\t\t\tif resp.VpcPeeringConnection.AccepterVpcInfo.PeeringOptions.AllowEgressFromLocalVpcToRemoteClassicLink != nil {\n\t\t\t\tf0f4.AllowEgressFromLocalVPCToRemoteClassicLink = resp.VpcPeeringConnection.AccepterVpcInfo.PeeringOptions.AllowEgressFromLocalVpcToRemoteClassicLink\n\t\t\t}\n\t\t\tf0.PeeringOptions = f0f4\n\t\t}\n\t\tif resp.VpcPeeringConnection.AccepterVpcInfo.Region != nil {\n\t\t\tf0.Region = resp.VpcPeeringConnection.AccepterVpcInfo.Region\n\t\t}\n\t\tif resp.VpcPeeringConnection.AccepterVpcInfo.VpcId != nil {\n\t\t\tf0.VPCID = resp.VpcPeeringConnection.AccepterVpcInfo.VpcId\n\t\t}\n\t\tko.Status.AccepterVPCInfo = f0\n\t}\n\tif resp.VpcPeeringConnection.ExpirationTime != nil {\n\t\tko.Status.ExpirationTime = &metav1.Time{*resp.VpcPeeringConnection.ExpirationTime}\n\t}\n\tif resp.VpcPeeringConnection.RequesterVpcInfo != nil {\n\t\tf2 := &svcapitypes.VPCPeeringConnectionVPCInfo{}\n\t\tif resp.VpcPeeringConnection.RequesterVpcInfo.CidrBlock != nil {\n\t\t\tf2.CIDRBlock = resp.VpcPeeringConnection.RequesterVpcInfo.CidrBlock\n\t\t}\n\t\tif resp.VpcPeeringConnection.RequesterVpcInfo.CidrBlockSet != nil {\n\t\t\tf2f1 := []*svcapitypes.CIDRBlock{}\n\t\t\tfor _, f2f1iter := range resp.VpcPeeringConnection.RequesterVpcInfo.CidrBlockSet {\n\t\t\t\tf2f1elem := &svcapitypes.CIDRBlock{}\n\t\t\t\tif f2f1iter.CidrBlock != nil {\n\t\t\t\t\tf2f1elem.CIDRBlock = f2f1iter.CidrBlock\n\t\t\t\t}\n\t\t\t\tf2f1 = append(f2f1, f2f1elem)\n\t\t\t}\n\t\t\tf2.CIDRBlockSet = f2f1\n\t\t}\n\t\tif resp.VpcPeeringConnection.RequesterVpcInfo.Ipv6CidrBlockSet != nil {\n\t\t\tf2f2 := []*svcapitypes.IPv6CIDRBlock{}\n\t\t\tfor _, f2f2iter := range resp.VpcPeeringConnection.RequesterVpcInfo.Ipv6CidrBlockSet {\n\t\t\t\tf2f2elem := &svcapitypes.IPv6CIDRBlock{}\n\t\t\t\tif f2f2iter.Ipv6CidrBlock != nil {\n\t\t\t\t\tf2f2elem.IPv6CIDRBlock = f2f2iter.Ipv6CidrBlock\n\t\t\t\t}\n\t\t\t\tf2f2 = append(f2f2, f2f2elem)\n\t\t\t}\n\t\t\tf2.IPv6CIDRBlockSet = f2f2\n\t\t}\n\t\tif resp.VpcPeeringConnection.RequesterVpcInfo.OwnerId != nil {\n\t\t\tf2.OwnerID = resp.VpcPeeringConnection.RequesterVpcInfo.OwnerId\n\t\t}\n\t\tif resp.VpcPeeringConnection.RequesterVpcInfo.PeeringOptions != nil {\n\t\t\tf2f4 := &svcapitypes.VPCPeeringConnectionOptionsDescription{}\n\t\t\tif resp.VpcPeeringConnection.RequesterVpcInfo.PeeringOptions.AllowDnsResolutionFromRemoteVpc != nil {\n\t\t\t\tf2f4.AllowDNSResolutionFromRemoteVPC = resp.VpcPeeringConnection.RequesterVpcInfo.PeeringOptions.AllowDnsResolutionFromRemoteVpc\n\t\t\t}\n\t\t\tif resp.VpcPeeringConnection.RequesterVpcInfo.PeeringOptions.AllowEgressFromLocalClassicLinkToRemoteVpc != nil {\n\t\t\t\tf2f4.AllowEgressFromLocalClassicLinkToRemoteVPC = resp.VpcPeeringConnection.RequesterVpcInfo.PeeringOptions.AllowEgressFromLocalClassicLinkToRemoteVpc\n\t\t\t}\n\t\t\tif resp.VpcPeeringConnection.RequesterVpcInfo.PeeringOptions.AllowEgressFromLocalVpcToRemoteClassicLink != nil {\n\t\t\t\tf2f4.AllowEgressFromLocalVPCToRemoteClassicLink = resp.VpcPeeringConnection.RequesterVpcInfo.PeeringOptions.AllowEgressFromLocalVpcToRemoteClassicLink\n\t\t\t}\n\t\t\tf2.PeeringOptions = f2f4\n\t\t}\n\t\tif resp.VpcPeeringConnection.RequesterVpcInfo.Region != nil {\n\t\t\tf2.Region = resp.VpcPeeringConnection.RequesterVpcInfo.Region\n\t\t}\n\t\tif resp.VpcPeeringConnection.RequesterVpcInfo.VpcId != nil {\n\t\t\tf2.VPCID = resp.VpcPeeringConnection.RequesterVpcInfo.VpcId\n\t\t}\n\t\tko.Status.RequesterVPCInfo = f2\n\t}\n\tif resp.VpcPeeringConnection.Status != nil {\n\t\tf3 := &svcapitypes.VPCPeeringConnectionStateReason{}\n\t\tif resp.VpcPeeringConnection.Status.Code != nil {\n\t\t\tf3.Code = resp.VpcPeeringConnection.Status.Code\n\t\t}\n\t\tif resp.VpcPeeringConnection.Status.Message != nil {\n\t\t\tf3.Message = resp.VpcPeeringConnection.Status.Message\n\t\t}\n\t\tko.Status.Status = f3\n\t}\n\tif resp.VpcPeeringConnection.Tags != nil {\n\t\tf4 := []*svcapitypes.Tag{}\n\t\tfor _, f4iter := range resp.VpcPeeringConnection.Tags {\n\t\t\tf4elem := &svcapitypes.Tag{}\n\t\t\tif f4iter.Key != nil {\n\t\t\t\tf4elem.Key = f4iter.Key\n\t\t\t}\n\t\t\tif f4iter.Value != nil {\n\t\t\t\tf4elem.Value = f4iter.Value\n\t\t\t}\n\t\t\tf4 = append(f4, f4elem)\n\t\t}\n\t\tko.Status.Tags = f4\n\t}\n\tif resp.VpcPeeringConnection.VpcPeeringConnectionId != nil {\n\t\tko.Status.VPCPeeringConnectionID = resp.VpcPeeringConnection.VpcPeeringConnectionId\n\t}\n\n\trm.setStatusDefaults(ko)\n\n\treturn &resource{ko}, nil\n}", "func GetVPC(connectionName string, rsType string, nameID string) (*cres.VPCInfo, error) {\n\tcblog.Info(\"call GetVPC()\")\n\n\t// check empty and trim user inputs\n connectionName, err := EmptyCheckAndTrim(\"connectionName\", connectionName)\n if err != nil {\n\t\tcblog.Error(err)\n return nil, err\n }\n\n nameID, err = EmptyCheckAndTrim(\"nameID\", nameID)\n if err != nil {\n\t\tcblog.Error(err)\n return nil, err\n }\n\n\tcldConn, err := ccm.GetCloudConnection(connectionName)\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\n\thandler, err := cldConn.CreateVPCHandler()\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\n\tvpcSPLock.RLock(connectionName, nameID)\n\tdefer vpcSPLock.RUnlock(connectionName, nameID)\n\t// (1) get spiderIID(NameId)\n\tiidInfo, err := iidRWLock.GetIID(iidm.IIDSGROUP, connectionName, rsType, cres.IID{nameID, \"\"})\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\n\t// (2) get resource(driverIID)\n\tinfo, err := handler.GetVPC(getDriverIID(iidInfo.IId))\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\t// (3) set ResourceInfo(userIID)\n\tinfo.IId = getUserIID(iidInfo.IId)\n\n\t// set NameId for SubnetInfo List\n\t// create new SubnetInfo List\n\tsubnetInfoList := []cres.SubnetInfo{}\n\tfor _, subnetInfo := range info.SubnetInfoList {\t\t\n\t\tsubnetIIDInfo, err := iidRWLock.GetIIDbySystemID(iidm.SUBNETGROUP, connectionName, info.IId.NameId, subnetInfo.IId) // VPC info.IId.NameId => rsType\n\t\tif err != nil {\n\t\t\tcblog.Error(err)\n\t\t\treturn nil, err\n\t\t}\n\t\tif subnetIIDInfo.IId.NameId != \"\" { // insert only this user created.\n\t\t\tsubnetInfo.IId = getUserIID(subnetIIDInfo.IId)\n\t\t\tsubnetInfoList = append(subnetInfoList, subnetInfo)\n\t\t}\n\t}\n\tinfo.SubnetInfoList = subnetInfoList\n\n\treturn &info, nil\n}", "func NewCreateWidgetParams() *CreateWidgetParams {\n\tvar (\n\t\tacceptDefault = string(\"application/json\")\n\t\tcontentTypeDefault = string(\"application/json\")\n\t)\n\treturn &CreateWidgetParams{\n\t\tAccept: &acceptDefault,\n\t\tContentType: &contentTypeDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (x *fastReflection_Params) New() protoreflect.Message {\n\treturn new(fastReflection_Params)\n}", "func CreateVPCFailStatusMocked(t *testing.T, vpcIn *types.Vpc) *types.Vpc {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewVPCService(cs)\n\tassert.Nil(err, \"Couldn't load VPC service\")\n\tassert.NotNil(ds, \"VPC service not instanced\")\n\n\t// convertMap\n\tmapIn, err := utils.ItemConvertParams(*vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// to json\n\tdOut, err := json.Marshal(vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// call service\n\tcs.On(\"Post\", \"/network/vpcs/\", mapIn).Return(dOut, 499, nil)\n\tvpcOut, err := ds.CreateVPC(mapIn)\n\n\tassert.NotNil(err, \"We are expecting an status code error\")\n\tassert.Nil(vpcOut, \"Expecting nil output\")\n\tassert.Contains(err.Error(), \"499\", \"Error should contain http code 499\")\n\n\treturn vpcOut\n}", "func CreateVPCFailErrMocked(t *testing.T, vpcIn *types.Vpc) *types.Vpc {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewVPCService(cs)\n\tassert.Nil(err, \"Couldn't load VPC service\")\n\tassert.NotNil(ds, \"VPC service not instanced\")\n\n\t// convertMap\n\tmapIn, err := utils.ItemConvertParams(*vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// to json\n\tdOut, err := json.Marshal(vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// call service\n\tcs.On(\"Post\", \"/network/vpcs/\", mapIn).Return(dOut, 200, fmt.Errorf(\"mocked error\"))\n\tvpcOut, err := ds.CreateVPC(mapIn)\n\n\tassert.NotNil(err, \"We are expecting an error\")\n\tassert.Nil(vpcOut, \"Expecting nil output\")\n\tassert.Equal(err.Error(), \"mocked error\", \"Error should be 'mocked error'\")\n\n\treturn vpcOut\n}", "func NewParams() *Params {\n\tp := Params{}\n\tp.names = []string{}\n\tp.values = map[string]interface{}{}\n\n\treturn &p\n}", "func (client *ClustersClient) createCreateRequest(ctx context.Context, resourceGroupName string, clusterName string, parameters Cluster, options *ClustersClientBeginCreateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/serverGroupsv2/{clusterName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif clusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterName}\", url.PathEscape(clusterName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPut, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-11-08\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (client *CapacitiesClient) createCreateRequest(ctx context.Context, resourceGroupName string, dedicatedCapacityName string, capacityParameters DedicatedCapacity, options *CapacitiesClientBeginCreateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.PowerBIDedicated/capacities/{dedicatedCapacityName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif dedicatedCapacityName == \"\" {\n\t\treturn nil, errors.New(\"parameter dedicatedCapacityName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{dedicatedCapacityName}\", url.PathEscape(dedicatedCapacityName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPut, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-01-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, capacityParameters)\n}", "func (rm *resourceManager) newCreateRequestPayload(\n\tctx context.Context,\n\tr *resource,\n) (*svcsdk.CreateVpnConnectionInput, error) {\n\tres := &svcsdk.CreateVpnConnectionInput{}\n\n\tif r.ko.Spec.CustomerGatewayID != nil {\n\t\tres.SetCustomerGatewayId(*r.ko.Spec.CustomerGatewayID)\n\t}\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Spec.Options != nil {\n\t\tf2 := &svcsdk.VpnConnectionOptionsSpecification{}\n\t\tif r.ko.Spec.Options.EnableAcceleration != nil {\n\t\t\tf2.SetEnableAcceleration(*r.ko.Spec.Options.EnableAcceleration)\n\t\t}\n\t\tif r.ko.Spec.Options.LocalIPv4NetworkCIDR != nil {\n\t\t\tf2.SetLocalIpv4NetworkCidr(*r.ko.Spec.Options.LocalIPv4NetworkCIDR)\n\t\t}\n\t\tif r.ko.Spec.Options.LocalIPv6NetworkCIDR != nil {\n\t\t\tf2.SetLocalIpv6NetworkCidr(*r.ko.Spec.Options.LocalIPv6NetworkCIDR)\n\t\t}\n\t\tif r.ko.Spec.Options.RemoteIPv4NetworkCIDR != nil {\n\t\t\tf2.SetRemoteIpv4NetworkCidr(*r.ko.Spec.Options.RemoteIPv4NetworkCIDR)\n\t\t}\n\t\tif r.ko.Spec.Options.RemoteIPv6NetworkCIDR != nil {\n\t\t\tf2.SetRemoteIpv6NetworkCidr(*r.ko.Spec.Options.RemoteIPv6NetworkCIDR)\n\t\t}\n\t\tif r.ko.Spec.Options.StaticRoutesOnly != nil {\n\t\t\tf2.SetStaticRoutesOnly(*r.ko.Spec.Options.StaticRoutesOnly)\n\t\t}\n\t\tif r.ko.Spec.Options.TunnelInsideIPVersion != nil {\n\t\t\tf2.SetTunnelInsideIpVersion(*r.ko.Spec.Options.TunnelInsideIPVersion)\n\t\t}\n\t\tif r.ko.Spec.Options.TunnelOptions != nil {\n\t\t\tf2f7 := []*svcsdk.VpnTunnelOptionsSpecification{}\n\t\t\tfor _, f2f7iter := range r.ko.Spec.Options.TunnelOptions {\n\t\t\t\tf2f7elem := &svcsdk.VpnTunnelOptionsSpecification{}\n\t\t\t\tif f2f7iter.DPDTimeoutAction != nil {\n\t\t\t\t\tf2f7elem.SetDPDTimeoutAction(*f2f7iter.DPDTimeoutAction)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.DPDTimeoutSeconds != nil {\n\t\t\t\t\tf2f7elem.SetDPDTimeoutSeconds(*f2f7iter.DPDTimeoutSeconds)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.IKEVersions != nil {\n\t\t\t\t\tf2f7elemf2 := []*svcsdk.IKEVersionsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf2iter := range f2f7iter.IKEVersions {\n\t\t\t\t\t\tf2f7elemf2elem := &svcsdk.IKEVersionsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf2iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf2elem.SetValue(*f2f7elemf2iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf2 = append(f2f7elemf2, f2f7elemf2elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetIKEVersions(f2f7elemf2)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase1DHGroupNumbers != nil {\n\t\t\t\t\tf2f7elemf3 := []*svcsdk.Phase1DHGroupNumbersRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf3iter := range f2f7iter.Phase1DHGroupNumbers {\n\t\t\t\t\t\tf2f7elemf3elem := &svcsdk.Phase1DHGroupNumbersRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf3iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf3elem.SetValue(*f2f7elemf3iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf3 = append(f2f7elemf3, f2f7elemf3elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase1DHGroupNumbers(f2f7elemf3)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase1EncryptionAlgorithms != nil {\n\t\t\t\t\tf2f7elemf4 := []*svcsdk.Phase1EncryptionAlgorithmsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf4iter := range f2f7iter.Phase1EncryptionAlgorithms {\n\t\t\t\t\t\tf2f7elemf4elem := &svcsdk.Phase1EncryptionAlgorithmsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf4iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf4elem.SetValue(*f2f7elemf4iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf4 = append(f2f7elemf4, f2f7elemf4elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase1EncryptionAlgorithms(f2f7elemf4)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase1IntegrityAlgorithms != nil {\n\t\t\t\t\tf2f7elemf5 := []*svcsdk.Phase1IntegrityAlgorithmsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf5iter := range f2f7iter.Phase1IntegrityAlgorithms {\n\t\t\t\t\t\tf2f7elemf5elem := &svcsdk.Phase1IntegrityAlgorithmsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf5iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf5elem.SetValue(*f2f7elemf5iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf5 = append(f2f7elemf5, f2f7elemf5elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase1IntegrityAlgorithms(f2f7elemf5)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase1LifetimeSeconds != nil {\n\t\t\t\t\tf2f7elem.SetPhase1LifetimeSeconds(*f2f7iter.Phase1LifetimeSeconds)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase2DHGroupNumbers != nil {\n\t\t\t\t\tf2f7elemf7 := []*svcsdk.Phase2DHGroupNumbersRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf7iter := range f2f7iter.Phase2DHGroupNumbers {\n\t\t\t\t\t\tf2f7elemf7elem := &svcsdk.Phase2DHGroupNumbersRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf7iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf7elem.SetValue(*f2f7elemf7iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf7 = append(f2f7elemf7, f2f7elemf7elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase2DHGroupNumbers(f2f7elemf7)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase2EncryptionAlgorithms != nil {\n\t\t\t\t\tf2f7elemf8 := []*svcsdk.Phase2EncryptionAlgorithmsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf8iter := range f2f7iter.Phase2EncryptionAlgorithms {\n\t\t\t\t\t\tf2f7elemf8elem := &svcsdk.Phase2EncryptionAlgorithmsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf8iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf8elem.SetValue(*f2f7elemf8iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf8 = append(f2f7elemf8, f2f7elemf8elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase2EncryptionAlgorithms(f2f7elemf8)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase2IntegrityAlgorithms != nil {\n\t\t\t\t\tf2f7elemf9 := []*svcsdk.Phase2IntegrityAlgorithmsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf9iter := range f2f7iter.Phase2IntegrityAlgorithms {\n\t\t\t\t\t\tf2f7elemf9elem := &svcsdk.Phase2IntegrityAlgorithmsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf9iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf9elem.SetValue(*f2f7elemf9iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf9 = append(f2f7elemf9, f2f7elemf9elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase2IntegrityAlgorithms(f2f7elemf9)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase2LifetimeSeconds != nil {\n\t\t\t\t\tf2f7elem.SetPhase2LifetimeSeconds(*f2f7iter.Phase2LifetimeSeconds)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.PreSharedKey != nil {\n\t\t\t\t\tf2f7elem.SetPreSharedKey(*f2f7iter.PreSharedKey)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.RekeyFuzzPercentage != nil {\n\t\t\t\t\tf2f7elem.SetRekeyFuzzPercentage(*f2f7iter.RekeyFuzzPercentage)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.RekeyMarginTimeSeconds != nil {\n\t\t\t\t\tf2f7elem.SetRekeyMarginTimeSeconds(*f2f7iter.RekeyMarginTimeSeconds)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.ReplayWindowSize != nil {\n\t\t\t\t\tf2f7elem.SetReplayWindowSize(*f2f7iter.ReplayWindowSize)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.StartupAction != nil {\n\t\t\t\t\tf2f7elem.SetStartupAction(*f2f7iter.StartupAction)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.TunnelInsideCIDR != nil {\n\t\t\t\t\tf2f7elem.SetTunnelInsideCidr(*f2f7iter.TunnelInsideCIDR)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.TunnelInsideIPv6CIDR != nil {\n\t\t\t\t\tf2f7elem.SetTunnelInsideIpv6Cidr(*f2f7iter.TunnelInsideIPv6CIDR)\n\t\t\t\t}\n\t\t\t\tf2f7 = append(f2f7, f2f7elem)\n\t\t\t}\n\t\t\tf2.SetTunnelOptions(f2f7)\n\t\t}\n\t\tres.SetOptions(f2)\n\t}\n\tif r.ko.Spec.TagSpecifications != nil {\n\t\tf3 := []*svcsdk.TagSpecification{}\n\t\tfor _, f3iter := range r.ko.Spec.TagSpecifications {\n\t\t\tf3elem := &svcsdk.TagSpecification{}\n\t\t\tif f3iter.ResourceType != nil {\n\t\t\t\tf3elem.SetResourceType(*f3iter.ResourceType)\n\t\t\t}\n\t\t\tif f3iter.Tags != nil {\n\t\t\t\tf3elemf1 := []*svcsdk.Tag{}\n\t\t\t\tfor _, f3elemf1iter := range f3iter.Tags {\n\t\t\t\t\tf3elemf1elem := &svcsdk.Tag{}\n\t\t\t\t\tif f3elemf1iter.Key != nil {\n\t\t\t\t\t\tf3elemf1elem.SetKey(*f3elemf1iter.Key)\n\t\t\t\t\t}\n\t\t\t\t\tif f3elemf1iter.Value != nil {\n\t\t\t\t\t\tf3elemf1elem.SetValue(*f3elemf1iter.Value)\n\t\t\t\t\t}\n\t\t\t\t\tf3elemf1 = append(f3elemf1, f3elemf1elem)\n\t\t\t\t}\n\t\t\t\tf3elem.SetTags(f3elemf1)\n\t\t\t}\n\t\t\tf3 = append(f3, f3elem)\n\t\t}\n\t\tres.SetTagSpecifications(f3)\n\t}\n\tif r.ko.Spec.TransitGatewayID != nil {\n\t\tres.SetTransitGatewayId(*r.ko.Spec.TransitGatewayID)\n\t}\n\tif r.ko.Spec.Type != nil {\n\t\tres.SetType(*r.ko.Spec.Type)\n\t}\n\tif r.ko.Spec.VPNGatewayID != nil {\n\t\tres.SetVpnGatewayId(*r.ko.Spec.VPNGatewayID)\n\t}\n\n\treturn res, nil\n}", "func (tc *testContext) createNetParams(genesisHashStr string) (*chaincfg.Params, error) {\n\tparams := chaincfg.RegressionNetParams\n\n\t// Ensure regression net genesis block matches the one listed in BOLT spec.\n\texpectedGenesisHash, err := chainhash.NewHashFromStr(genesisHashStr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !params.GenesisHash.IsEqual(expectedGenesisHash) {\n\t\terr = fmt.Errorf(\"Expected regression net genesis hash to be %s, \"+\n\t\t\t\"got %s\", expectedGenesisHash, params.GenesisHash)\n\t\treturn nil, err\n\t}\n\n\treturn &params, nil\n}", "func NewCreatePolicyParams() *CreatePolicyParams {\n\tvar ()\n\treturn &CreatePolicyParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (t *Role) CreateParams() []interface{} {\n\treturn []interface{}{\n\t\t&t.Name,\n\t}\n}", "func (client *PublicIPAddressesClient) createOrUpdateCreateRequest(ctx context.Context, resourceGroupName string, publicIPAddressName string, parameters PublicIPAddress, options *PublicIPAddressesClientBeginCreateOrUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/publicIPAddresses/{publicIpAddressName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif publicIPAddressName == \"\" {\n\t\treturn nil, errors.New(\"parameter publicIPAddressName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{publicIpAddressName}\", url.PathEscape(publicIPAddressName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPut, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func newNetwork(cfg *config.Network, c *ec2.EC2) (*network, error) {\n\tlog.Debug(\"Initializing AWS Network\")\n\tn := &network{\n\t\tResources: resource.NewResources(),\n\t\tNetwork: cfg,\n\t\tec2: c,\n\t}\n\n\tvpc, err := newVpc(c, n)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tn.vpc = vpc\n\tn.Append(vpc)\n\n\trouteTables, err := newRouteTables(c, n)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tn.routeTables = routeTables\n\tn.Append(routeTables)\n\n\tinternetGateway, err := newInternetGateway(c, n, \"public\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tn.internetGateway = internetGateway\n\tn.Append(internetGateway)\n\n\t// Load the vpc since it is needed for the caches.\n\terr = n.vpc.Load()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tn.subnetCache, err = newSubnetCache(n)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tn.secgroupCache, err = newSecurityGroupCache(n)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn n, nil\n}", "func (s stack) CreateNetwork(req abstract.NetworkRequest) (res *abstract.Network, ferr fail.Error) {\n\tnullAN := abstract.NewNetwork()\n\tif s.IsNull() {\n\t\treturn nullAN, fail.InvalidInstanceError()\n\t}\n\n\tdefer debug.NewTracer(nil, tracing.ShouldTrace(\"stack.aws\") || tracing.ShouldTrace(\"stacks.network\"), \"(%v)\", req).WithStopwatch().Entering().Exiting()\n\n\t// Check if network already there\n\tvar xerr fail.Error\n\tif _, xerr = s.rpcDescribeVpcByName(aws.String(req.Name)); xerr != nil {\n\t\tswitch xerr.(type) {\n\t\tcase *fail.ErrNotFound:\n\t\t\tdebug.IgnoreError(xerr)\n\t\t\t// continue\n\t\tdefault:\n\t\t\treturn nullAN, xerr\n\t\t}\n\t} else {\n\t\treturn nullAN, fail.DuplicateError(\"a Network/VPC named '%s' already exists\")\n\t}\n\n\t// if not, create the network/VPC\n\ttheVpc, xerr := s.rpcCreateVpc(aws.String(req.Name), aws.String(req.CIDR))\n\tif xerr != nil {\n\t\treturn nullAN, fail.Wrap(xerr, \"failed to create VPC\")\n\t}\n\n\t// wait until available status\n\tif IsOperation(theVpc, \"State\", reflect.TypeOf(\"\")) {\n\t\tretryErr := retry.WhileUnsuccessful(\n\t\t\tfunc() error {\n\t\t\t\tvpcTmp, innerXErr := s.rpcDescribeVpcByID(theVpc.VpcId)\n\t\t\t\tif innerXErr != nil {\n\t\t\t\t\treturn innerXErr\n\t\t\t\t}\n\t\t\t\tif aws.StringValue(vpcTmp.State) != \"available\" {\n\t\t\t\t\treturn fail.NewError(\"not ready\")\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t},\n\t\t\ttemporal.GetMinDelay(),\n\t\t\ttemporal.GetDefaultDelay(),\n\t\t)\n\t\tif retryErr != nil {\n\t\t\tswitch retryErr.(type) {\n\t\t\tcase *retry.ErrStopRetry:\n\t\t\t\treturn nullAN, fail.Wrap(fail.Cause(retryErr), \"stopping retries\")\n\t\t\tcase *fail.ErrTimeout:\n\t\t\t\treturn nullAN, fail.Wrap(fail.Cause(retryErr), \"timeout\")\n\t\t\tdefault:\n\t\t\t\treturn nullAN, retryErr\n\t\t\t}\n\t\t}\n\t}\n\n\tdefer func() {\n\t\tif ferr != nil && !req.KeepOnFailure {\n\t\t\tif theVpc != nil {\n\t\t\t\tderr := s.DeleteNetwork(aws.StringValue(theVpc.VpcId))\n\t\t\t\tif derr != nil {\n\t\t\t\t\t_ = ferr.AddConsequence(derr)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}()\n\n\tgw, xerr := s.rpcCreateInternetGateway()\n\tif xerr != nil {\n\t\treturn nullAN, fail.Wrap(xerr, \"failed to create internet gateway\")\n\t}\n\n\tif xerr = s.rpcAttachInternetGateway(theVpc.VpcId, gw.InternetGatewayId); xerr != nil {\n\t\treturn nullAN, fail.Wrap(xerr, \"failed to attach internet gateway to Network\")\n\t}\n\n\tdefer func() {\n\t\tif ferr != nil && !req.KeepOnFailure {\n\t\t\tif derr := s.rpcDetachInternetGateway(theVpc.VpcId, gw.InternetGatewayId); derr != nil {\n\t\t\t\t_ = ferr.AddConsequence(normalizeError(derr))\n\t\t\t}\n\t\t}\n\t}()\n\n\ttables, xerr := s.rpcDescribeRouteTables(aws.String(\"vpc-id\"), []*string{theVpc.VpcId})\n\tif xerr != nil {\n\t\treturn nullAN, xerr\n\t}\n\tif len(tables) < 1 {\n\t\treturn nullAN, fail.InconsistentError(\"no Route Tables\")\n\t}\n\n\tif xerr = s.rpcCreateRoute(gw.InternetGatewayId, tables[0].RouteTableId, aws.String(\"0.0.0.0/0\")); xerr != nil {\n\t\treturn nullAN, fail.Wrap(xerr, \"failed to create route\")\n\t}\n\n\tdefer func() {\n\t\tif ferr != nil && !req.KeepOnFailure {\n\t\t\tif derr := s.rpcDeleteRoute(tables[0].RouteTableId, aws.String(\"0.0.0.0/0\")); derr != nil {\n\t\t\t\t_ = ferr.AddConsequence(normalizeError(derr))\n\t\t\t}\n\t\t}\n\t}()\n\n\tanet := abstract.NewNetwork()\n\tanet.ID = aws.StringValue(theVpc.VpcId)\n\tanet.Name = req.Name\n\tanet.CIDR = req.CIDR\n\tanet.DNSServers = req.DNSServers\n\n\t// Make sure we log warnings\n\t_ = anet.OK()\n\n\treturn anet, nil\n}", "func NewGenerateVPCConfigRequestAction(creationContext *EksClusterCreateUpdateContext, stackName string) *GenerateVPCConfigRequestAction {\n\treturn &GenerateVPCConfigRequestAction{\n\t\tcontext: creationContext,\n\t\tstackName: stackName,\n\t}\n}", "func (client *PublicIPAddressesClient) listCloudServiceRoleInstancePublicIPAddressesCreateRequest(ctx context.Context, resourceGroupName string, cloudServiceName string, roleInstanceName string, networkInterfaceName string, ipConfigurationName string, options *PublicIPAddressesClientListCloudServiceRoleInstancePublicIPAddressesOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/roleInstances/{roleInstanceName}/networkInterfaces/{networkInterfaceName}/ipconfigurations/{ipConfigurationName}/publicipaddresses\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif roleInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter roleInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{roleInstanceName}\", url.PathEscape(roleInstanceName))\n\tif networkInterfaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkInterfaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkInterfaceName}\", url.PathEscape(networkInterfaceName))\n\tif ipConfigurationName == \"\" {\n\t\treturn nil, errors.New(\"parameter ipConfigurationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{ipConfigurationName}\", url.PathEscape(ipConfigurationName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func newCreateParam4Create(req *http.Request) (*CreateParam, error) {\n\tparam := &CreateParam{}\n\terr := xreq.BindJSON(req, param)\n\treturn param, err\n}", "func (m *MockResourcetagsServiceIface) NewCreateTagsParams(resourceids []string, resourcetype string, tags map[string]string) *CreateTagsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewCreateTagsParams\", resourceids, resourcetype, tags)\n\tret0, _ := ret[0].(*CreateTagsParams)\n\treturn ret0\n}", "func NewParams() (Params, error) {\n\treturn Params{\n\t\tBaseParams: codec.BaseParams{\n\t\t\tKeyFrameInterval: 60,\n\t\t},\n\t}, nil\n}", "func WithCreateParams(val map[string]interface{}) CreateOption {\n\treturn func(cfg *createConfig) {\n\t\tcfg.Params = val\n\t}\n}", "func NewCreatePublicIPAdressUsingPOSTParamsWithTimeout(timeout time.Duration) *CreatePublicIPAdressUsingPOSTParams {\n\tvar ()\n\treturn &CreatePublicIPAdressUsingPOSTParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "func NewCreateScriptParams() *CreateScriptParams {\n\tvar (\n\t\tacceptDefault = string(\"application/json\")\n\t\tcontentTypeDefault = string(\"application/json\")\n\t)\n\treturn &CreateScriptParams{\n\t\tAccept: acceptDefault,\n\t\tContentType: contentTypeDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func CreateCreateVpnAttachmentRequest() (request *CreateVpnAttachmentRequest) {\n\trequest = &CreateVpnAttachmentRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Vpc\", \"2016-04-28\", \"CreateVpnAttachment\", \"vpc\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func (s *UserService) NewCreateUserParams(account string, email string, firstname string, lastname string, password string, username string) *CreateUserParams {\n\tp := &CreateUserParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"account\"] = account\n\tp.p[\"email\"] = email\n\tp.p[\"firstname\"] = firstname\n\tp.p[\"lastname\"] = lastname\n\tp.p[\"password\"] = password\n\tp.p[\"username\"] = username\n\treturn p\n}", "func (client *PublicIPAddressesClient) getVirtualMachineScaleSetPublicIPAddressCreateRequest(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string, virtualmachineIndex string, networkInterfaceName string, ipConfigurationName string, publicIPAddressName string, options *PublicIPAddressesClientGetVirtualMachineScaleSetPublicIPAddressOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/virtualMachineScaleSets/{virtualMachineScaleSetName}/virtualMachines/{virtualmachineIndex}/networkInterfaces/{networkInterfaceName}/ipconfigurations/{ipConfigurationName}/publicipaddresses/{publicIpAddressName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif virtualMachineScaleSetName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualMachineScaleSetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualMachineScaleSetName}\", url.PathEscape(virtualMachineScaleSetName))\n\tif virtualmachineIndex == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualmachineIndex cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualmachineIndex}\", url.PathEscape(virtualmachineIndex))\n\tif networkInterfaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkInterfaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkInterfaceName}\", url.PathEscape(networkInterfaceName))\n\tif ipConfigurationName == \"\" {\n\t\treturn nil, errors.New(\"parameter ipConfigurationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{ipConfigurationName}\", url.PathEscape(ipConfigurationName))\n\tif publicIPAddressName == \"\" {\n\t\treturn nil, errors.New(\"parameter publicIPAddressName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{publicIpAddressName}\", url.PathEscape(publicIPAddressName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2018-10-01\")\n\tif options != nil && options.Expand != nil {\n\t\treqQP.Set(\"$expand\", *options.Expand)\n\t}\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (s *ProjectService) NewCreateProjectParams(displaytext string, name string) *CreateProjectParams {\n\tp := &CreateProjectParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"displaytext\"] = displaytext\n\tp.p[\"name\"] = name\n\treturn p\n}", "func prepareRunParams(options RunInstances) map[string]string {\n\tif options.SubnetId != \"\" || len(options.NetworkInterfaces) > 0 {\n\t\treturn makeParamsVPC(\"RunInstances\")\n\t} else {\n\t\treturn makeParams(\"RunInstances\")\n\t}\n}", "func CreateDescribeGtmInstanceRequest() (request *DescribeGtmInstanceRequest) {\n\trequest = &DescribeGtmInstanceRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Alidns\", \"2015-01-09\", \"DescribeGtmInstance\", \"alidns\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func NewCreateInstanceRequest(server string, params *CreateInstanceParams, body CreateInstanceJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewCreateInstanceRequestWithBody(server, params, \"application/json\", bodyReader)\n}", "func (client *NetworkToNetworkInterconnectsClient) createCreateRequest(ctx context.Context, resourceGroupName string, networkFabricName string, networkToNetworkInterconnectName string, body NetworkToNetworkInterconnect, options *NetworkToNetworkInterconnectsClientBeginCreateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedNetworkFabric/networkFabrics/{networkFabricName}/networkToNetworkInterconnects/{networkToNetworkInterconnectName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif networkFabricName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkFabricName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkFabricName}\", url.PathEscape(networkFabricName))\n\tif networkToNetworkInterconnectName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkToNetworkInterconnectName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkToNetworkInterconnectName}\", url.PathEscape(networkToNetworkInterconnectName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPut, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-06-15\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, body)\n}", "func (m *MockSecurityGroupServiceIface) NewCreateSecurityGroupParams(name string) *CreateSecurityGroupParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewCreateSecurityGroupParams\", name)\n\tret0, _ := ret[0].(*CreateSecurityGroupParams)\n\treturn ret0\n}", "func (service *Service) CreateRequest(parameters map[string]string) (*Request, error) {\n\tvar int1, int2, limit int64\n\tvar err error\n\n\t// Convert string parameters to int64\n\tif int1, err = strconv.ParseInt(parameters[\"int1\"], 10, 64); err != nil {\n\t\treturn nil, err\n\t}\n\tif int2, err = strconv.ParseInt(parameters[\"int2\"], 10, 64); err != nil {\n\t\treturn nil, err\n\t}\n\tif limit, err = strconv.ParseInt(parameters[\"limit\"], 10, 64); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Request{\n\t\tInt1: int1,\n\t\tInt2: int2,\n\t\tLimit: limit,\n\t\tStr1: parameters[\"str1\"],\n\t\tStr2: parameters[\"str2\"],\n\t}, nil\n}", "func NewCreateCartUsingPOSTParams() *CreateCartUsingPOSTParams {\n\tvar (\n\t\tfieldsDefault = string(\"DEFAULT\")\n\t)\n\treturn &CreateCartUsingPOSTParams{\n\t\tFields: &fieldsDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func CreateCreateTrafficMirrorFilterRequest() (request *CreateTrafficMirrorFilterRequest) {\n\trequest = &CreateTrafficMirrorFilterRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Vpc\", \"2016-04-28\", \"CreateTrafficMirrorFilter\", \"vpc\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (m *MockClient) CreateVpc(arg0 *ec2.CreateVpcInput) (*ec2.CreateVpcOutput, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"CreateVpc\", arg0)\n\tret0, _ := ret[0].(*ec2.CreateVpcOutput)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "func NewCreateAccessPolicyParams() *CreateAccessPolicyParams {\n\treturn &CreateAccessPolicyParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewCreateClusterRequestWithoutParam() *CreateClusterRequest {\n\n return &CreateClusterRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/regions/{regionId}/clusters\",\n Method: \"POST\",\n Header: nil,\n Version: \"v1\",\n },\n }\n}", "func Create(client *gophercloud.ServiceClient, opts CreateOptsBuilder) (r CreateResult) {\n\tb, err := opts.ToAddressScopeCreateMap()\n\tif err != nil {\n\t\tr.Err = err\n\t\treturn\n\t}\n\tresp, err := client.Post(createURL(client), b, &r.Body, &gophercloud.RequestOpts{\n\t\tOkCodes: []int{201},\n\t})\n\t_, r.Header, r.Err = gophercloud.ParseResponse(resp, err)\n\treturn\n}", "func CreateCreateECSDBInstanceRequest() (request *CreateECSDBInstanceRequest) {\n\trequest = &CreateECSDBInstanceRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"gpdb\", \"2016-05-03\", \"CreateECSDBInstance\", \"\", \"\")\n\trequest.Method = requests.POST\n\treturn\n}", "func NewCreateCognitoIDPParamsWithTimeout(timeout time.Duration) *CreateCognitoIDPParams {\n\tvar (\n\t\taidDefault = string(\"default\")\n\t\ttidDefault = string(\"default\")\n\t)\n\treturn &CreateCognitoIDPParams{\n\t\tAid: aidDefault,\n\t\tTid: tidDefault,\n\n\t\ttimeout: timeout,\n\t}\n}", "func NewCloudTargetCreateParams() *CloudTargetCreateParams {\n\treturn &CloudTargetCreateParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (m *MockRouterServiceIface) NewCreateVirtualRouterElementParams(nspid string) *CreateVirtualRouterElementParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewCreateVirtualRouterElementParams\", nspid)\n\tret0, _ := ret[0].(*CreateVirtualRouterElementParams)\n\treturn ret0\n}", "func NewCreateBackupPlanRequestWithoutParam() *CreateBackupPlanRequest {\n\n return &CreateBackupPlanRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/regions/{regionId}/backupPlans\",\n Method: \"POST\",\n Header: nil,\n Version: \"v2\",\n },\n }\n}", "func createPokemon(n string, d int, c bool, cp villains) pokemon {\n\tnewPokemon := pokemon{n, d, c, cp}\n\treturn newPokemon\n}", "func (client *VirtualMachinesClient) createCreateRequest(ctx context.Context, resourceGroupName string, virtualMachineName string, body VirtualMachine, options *VirtualMachinesClientBeginCreateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ConnectedVMwarevSphere/virtualMachines/{virtualMachineName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif virtualMachineName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualMachineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualMachineName}\", url.PathEscape(virtualMachineName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPut, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-01-10-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, body)\n}", "func (n *NetworkServiceHandler) Create(ctx context.Context, regionID, description, cidrBlock string) (*Network, error) {\n\n\turi := \"/v1/network/create\"\n\n\tvalues := url.Values{\n\t\t\"DCID\": {regionID},\n\t}\n\n\t// Optional\n\tif cidrBlock != \"\" {\n\t\t_, ipNet, err := net.ParseCIDR(cidrBlock)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif v4Subnet := ipNet.IP.To4(); v4Subnet != nil {\n\t\t\tvalues.Add(\"v4_subnet\", v4Subnet.String())\n\t\t}\n\t\tmask, _ := ipNet.Mask.Size()\n\t\tvalues.Add(\"v4_subnet_mask\", strconv.Itoa(mask))\n\t}\n\n\tif description != \"\" {\n\t\tvalues.Add(\"description\", description)\n\t}\n\n\treq, err := n.client.NewRequest(ctx, http.MethodPost, uri, values)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tnetwork := new(Network)\n\terr = n.client.DoWithContext(ctx, req, network)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn network, nil\n}", "func NewCreateServiceInput(config map[string]interface{}) (*ecs.CreateServiceInput, error){\n\t// TODO: may make a struct for this to take... then again, that basically becomes UpdateServiceInput...\n\t// but maybe can simplify it slightly or something.\n\t// TODO: Should this be fargate specific or should this just be NewCreateServiceInput and the fargate or not\n\t// is more dynamic?\n\n\t// TODO: support ClientToken!\n\n\tserviceName := aws.String(config[\"name\"].(string))\n\t// https://docs.aws.amazon.com/sdk-for-go/api/service/ecs/#UpdateServiceInput\n\tinput := &ecs.CreateServiceInput{ServiceName: serviceName}\n\n\tif taskDef, ok := config[\"task_definition\"]; ok {\n\t\tinput = input.SetTaskDefinition(taskDef.(string)) // seems to be not required - perhaps can update things without changing the task def.\n\t}\n\n\tif cluster, ok := config[\"cluster\"]; ok {\n\t\tinput = input.SetCluster(cluster.(string))\n\t}\n\n\tif desiredCount, ok := config[\"desired_count\"]; ok {\n\t\tinput = input.SetDesiredCount(desiredCount.(int64))\n\t}\n\n\tif launchType, ok := config[\"launch_type\"]; ok {\n\t\tinput = input.SetLaunchType(launchType.(string))\n\t}\n\n\tdeploymentController := &ecs.DeploymentController{}\n\tif dc, ok := config[\"deployment_controller\"]; ok {\n\t\tdeploymentController = deploymentController.SetType(dc.(string))\n\t} else {\n\t\tdeploymentController = deploymentController.SetType(\"ECS\")\n\t}\n\tinput = input.SetDeploymentController(deploymentController)\n\n\tawsVpcConfig := &ecs.AwsVpcConfiguration{}\n\t// Supported for fargate, not for ec2 launch type\n\tif assignPublicIp, ok := config[\"assign_public_ip\"]; ok {\n\t\tawsVpcConfig = awsVpcConfig.SetAssignPublicIp(assignPublicIp.(string))\n\t}\n\n\tif securityGroupIds, ok := config[\"security_groups\"]; ok {\n\t\tg := securityGroupIds.([]interface{})\n\t\tsecurityGroups := make([]*string, len(g))\n\t\tfor i := range g {\n\t\t\tgroupId := securityGroupIds.([]interface{})[i].(string)\n\t\t securityGroups[i] = &groupId\n\t\t}\n\t\tawsVpcConfig = awsVpcConfig.SetSecurityGroups(securityGroups)\n\t}\n\n\t// TODO: assumptions made here about vpc config assuming that this is for a Fargate service\n\t// TODO: support non-fargate cleanly?\n\tif subnetIds, ok := config[\"subnets\"]; ok {\n\t\ts := subnetIds.([]interface{})\n\t\tsubnets := make([]*string, len(s))\n\t\tfor i := range s {\n\t\t\tsubnetId := subnetIds.([]interface{})[i].(string)\n\t\t subnets[i] = &subnetId\n\t\t}\n\t\tawsVpcConfig = awsVpcConfig.SetSubnets(subnets)\n\t}\n\n\tnetworkConfig := ecs.NetworkConfiguration{AwsvpcConfiguration: awsVpcConfig}\n\tinput.SetNetworkConfiguration(&networkConfig)\n\n\t// TODO: other otpions\n\t// fmt.Printf(\"\\n\\nINPUT: %v\\n\\n\", input)\n\treturn input, input.Validate()\n}", "func (m *MockLoadBalancerServiceIface) NewCreateLoadBalancerParams(algorithm string, instanceport int, name, networkid, scheme, sourceipaddressnetworkid string, sourceport int) *CreateLoadBalancerParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewCreateLoadBalancerParams\", algorithm, instanceport, name, networkid, scheme, sourceipaddressnetworkid, sourceport)\n\tret0, _ := ret[0].(*CreateLoadBalancerParams)\n\treturn ret0\n}", "func CreateDescribeInstanceAttributeRequest() (request *DescribeInstanceAttributeRequest) {\n\trequest = &DescribeInstanceAttributeRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Ecs\", \"2014-05-26\", \"DescribeInstanceAttribute\", \"ecs\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}" ]
[ "0.65379363", "0.6518244", "0.61788076", "0.60766906", "0.5926291", "0.5892127", "0.5875173", "0.57951814", "0.57893056", "0.5738024", "0.56887174", "0.56384575", "0.56154954", "0.56142384", "0.5596219", "0.555676", "0.55512655", "0.55427814", "0.55287707", "0.55180717", "0.5489092", "0.5473464", "0.54730296", "0.5462342", "0.5431262", "0.542262", "0.5411384", "0.53991586", "0.5395773", "0.539089", "0.53852266", "0.5380348", "0.53751683", "0.53674006", "0.5359375", "0.5337626", "0.53196365", "0.53142416", "0.53112745", "0.53106177", "0.52981204", "0.5293847", "0.52827203", "0.5242448", "0.51834863", "0.5182133", "0.5178132", "0.51554304", "0.51548934", "0.5153941", "0.5146143", "0.5133392", "0.5129422", "0.5106707", "0.5101504", "0.509392", "0.50918967", "0.5086766", "0.50833344", "0.50808764", "0.50791883", "0.5067817", "0.50620466", "0.50509214", "0.502309", "0.50135964", "0.4970634", "0.49683133", "0.496187", "0.49527857", "0.4939327", "0.493889", "0.4937891", "0.49174693", "0.49145338", "0.49073836", "0.48874012", "0.48852792", "0.4876206", "0.48622587", "0.48612332", "0.4860004", "0.4855889", "0.4847654", "0.4847654", "0.48413342", "0.48376912", "0.48342276", "0.4828827", "0.48286662", "0.48262003", "0.48250893", "0.48246104", "0.48243693", "0.48240978", "0.48189092", "0.48132047", "0.48083264", "0.47960588", "0.47913694" ]
0.74197775
0
You should always use this function to get a new CreateVPCOfferingParams instance, as then you are sure you have configured all required params
func (s *VPCService) NewCreateVPCOfferingParams(displaytext string, name string, supportedservices []string) *CreateVPCOfferingParams { p := &CreateVPCOfferingParams{} p.p = make(map[string]interface{}) p.p["displaytext"] = displaytext p.p["name"] = name p.p["supportedservices"] = supportedservices return p }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func newCreateParam4Create(req *http.Request) (*CreateParam, error) {\n\tparam := &CreateParam{}\n\terr := xreq.BindJSON(req, param)\n\treturn param, err\n}", "func (x *fastReflection_Params) New() protoreflect.Message {\n\treturn new(fastReflection_Params)\n}", "func NewParams(nickname NicknameParams, dTag DTagParams, bio BioParams, oracle OracleParams) Params {\n\treturn Params{\n\t\tNickname: nickname,\n\t\tDTag: dTag,\n\t\tBio: bio,\n\t\tOracle: oracle,\n\t}\n}", "func NewParams(opts []copts.Opt) *Params {\r\n\tparams := &Params{}\r\n\tcopts.Apply(params, opts)\r\n\treturn params\r\n}", "func NewParams() *Params {\n\treturn new(Params)\n}", "func (s RealmGateway_export_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_export_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewParams(defaultSendEnabled bool) Params {\n\treturn Params{\n\t\tSendEnabled: nil,\n\t\tDefaultSendEnabled: defaultSendEnabled,\n\t}\n}", "func NewParams(opts []copts.Opt) *Params {\n\tparams := &Params{}\n\tcopts.Apply(params, opts)\n\treturn params\n}", "func NewParams(acl ACL, daoOwner sdk.Address) Params {\n\treturn Params{\n\t\tACL: acl,\n\t\tDAOOwner: daoOwner,\n\t}\n}", "func NewParams(pricePerByte abi.TokenAmount, paymentInterval uint64, paymentIntervalIncrease uint64) (Params, error) {\n\treturn Params{\n\t\tPricePerByte: pricePerByte,\n\t\tPaymentInterval: paymentInterval,\n\t\tPaymentIntervalIncrease: paymentIntervalIncrease,\n\t}, nil\n}", "func NewParams(createWhoisPrice string, updateWhoisPrice string, deleteWhoisPrice string) Params {\n\treturn Params{\n\t\tCreateWhoisPrice: createWhoisPrice,\n\t\tUpdateWhoisPrice: updateWhoisPrice,\n\t\tDeleteWhoisPrice: deleteWhoisPrice,\n\t}\n}", "func (l0 *l0Conn) parametersNew() (p *paramConf) {\n\tp = &paramConf{conf.New(l0.teo, &param{}), l0.teo.ev.subscribe(), l0}\n\tfmt.Printf(\"!!! Subscribed - peer connected !!!\\n\")\n\tgo func() {\n\t\t// TODO: uncomment wg using when normolise close channel during exit\n\t\tl0.teo.wg.Add(1)\n\t\tfor ev := range p.chanEvent {\n\t\t\tp.eventProcess(ev)\n\t\t}\n\t\tfmt.Printf(\"!!! Subscribed channel closed !!!\\n\")\n\t\tl0.teo.wg.Done()\n\t}()\n\treturn\n}", "func NewParams(n, m int, prf, msg hasher.Hasher) *Params {\n\t// Don't allow creation of params if m == 0 or m > MaxMsgSize\n\tif m < 1 || m > MaxMsgSize {\n\t\treturn nil\n\t}\n\t// Don't allow creation of params if hash functions sizes are smaller than specified N and M\n\tif prf.Size() < n || msg.Size() < m {\n\t\treturn nil\n\t}\n\tchecksumLadders := 2\n\t// The only case that we need just 1 checksum ladder is for m=1\n\tif m == 1 {\n\t\tchecksumLadders = 1\n\t}\n\treturn &Params{\n\t\tn: n,\n\t\tm: m,\n\t\tprfHash: prf,\n\t\tmsgHash: msg,\n\t\ttotal: m + checksumLadders,\n\t}\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t}\n}", "func NewParams(communityTax sdk.Dec, withdrawAddrEnabled bool) Params {\n\treturn Params{\n\t\tCommunityTax: communityTax,\n\t\tWithdrawAddrEnabled: withdrawAddrEnabled,\n\t}\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules,\n\tmoneyMarkets MoneyMarkets, checkLtvIndexCount int) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t\tMoneyMarkets: moneyMarkets,\n\t\tCheckLtvIndexCount: checkLtvIndexCount,\n\t}\n}", "func NewParams() (Params, error) {\n\treturn Params{\n\t\tBaseParams: codec.BaseParams{\n\t\t\tKeyFrameInterval: 60,\n\t\t},\n\t}, nil\n}", "func NewParams() *Params {\n\tp := Params{}\n\tp.names = []string{}\n\tp.values = map[string]interface{}{}\n\n\treturn &p\n}", "func NewParams(tokenCourse, subscriptionPrice, VPNGBPrice,\n\tstorageGBPrice, baseVPNGb, baseStorageGb uint32, courseSigners []sdk.AccAddress) Params {\n\treturn Params{\n\t\tTokenCourse: tokenCourse,\n\t\tSubscriptionPrice: subscriptionPrice,\n\t\tVPNGBPrice: VPNGBPrice,\n\t\tStorageGBPrice: storageGBPrice,\n\t\tBaseVPNGb: baseVPNGb,\n\t\tBaseStorageGb: baseStorageGb,\n\t\tCourseChangeSigners: courseSigners[:],\n\t}\n}", "func NewParams(\n\ttaxPolicy, rewardPolicy PolicyConstraints,\n\tseigniorageBurden sdk.Dec,\n\tminingIncrement sdk.Dec,\n\twindowShort, windowLong, windowProbation sdk.Int,\n) Params {\n\treturn Params{\n\t\tTaxPolicy: taxPolicy,\n\t\tRewardPolicy: rewardPolicy,\n\t\tSeigniorageBurdenTarget: seigniorageBurden,\n\t\tMiningIncrement: miningIncrement,\n\t\tWindowShort: windowShort,\n\t\tWindowLong: windowLong,\n\t\tWindowProbation: windowProbation,\n\t}\n}", "func (s *VPCService) NewUpdateVPCOfferingParams(id string) *UpdateVPCOfferingParams {\n\tp := &UpdateVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (s *VPCService) NewListVPCOfferingsParams() *ListVPCOfferingsParams {\n\tp := &ListVPCOfferingsParams{}\n\tp.p = make(map[string]interface{})\n\treturn p\n}", "func NewParams() *Parameters {\n\treturn &Parameters{\n\t\tTokenType: \"transit\",\n\t\tTLSMode: 1,\n\t\tLeaderOnly: true,\n\t\tConnectTimeout: defaultConnectTimeout,\n\t\tReadTimeout: defaultReadTimeout,\n\t\tRetryCount: defaultRetries,\n\t\tRequireType: \"master\",\n\t}\n}", "func NewTemplateParameter()(*TemplateParameter) {\n m := &TemplateParameter{\n }\n m.backingStore = ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStoreFactoryInstance();\n m.SetAdditionalData(make(map[string]any))\n return m\n}", "func (s *VPCService) NewCreateVPCParams(cidr string, displaytext string, name string, vpcofferingid string, zoneid string) *CreateVPCParams {\n\tp := &CreateVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"cidr\"] = cidr\n\tp.p[\"displaytext\"] = displaytext\n\tp.p[\"name\"] = name\n\tp.p[\"vpcofferingid\"] = vpcofferingid\n\tp.p[\"zoneid\"] = zoneid\n\treturn p\n}", "func NewParams() Params {\n\treturn &headerParams{\n\t\tparams: make(map[string]MaybeString),\n\t\tparamOrder: []string{},\n\t}\n}", "func (params *QueueParams) CreateParams() []*cloudformation.Parameter {\n\tstackParams := []*cloudformation.Parameter{}\n\tif params.DelaySeconds != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamDelaySeconds, *params.DelaySeconds))\n\t}\n\tif params.MaximumMessageSize != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamMaximumMessageSize, *params.MaximumMessageSize))\n\t}\n\tif params.MessageRetentionPeriod != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamMessageRetentionPeriod, *params.MessageRetentionPeriod))\n\t}\n\tif params.ReceiveMessageWaitTimeSeconds != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamReceiveMessageWaitTimeSeconds, *params.ReceiveMessageWaitTimeSeconds))\n\t}\n\tif params.RedriveMaxReceiveCount != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamRedriveMaxReceiveCount, *params.RedriveMaxReceiveCount))\n\t}\n\tif params.VisibilityTimeout != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamVisibilityTimeout, *params.VisibilityTimeout))\n\t}\n\treturn stackParams\n}", "func New() *Parameter {\n\tparam := &Parameter{\n\t\tparameters: &sync.Map{},\n\t}\n\n\treturn param\n\n}", "func NewConvertParams() *ConvertParams {\n\tvar ()\n\treturn &ConvertParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewCreatePostRequestBody()(*CreatePostRequestBody) {\n m := &CreatePostRequestBody{\n }\n m.SetAdditionalData(make(map[string]interface{}));\n return m\n}", "func (c *InputService22ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (s Benchmark_send_Params) NewReq() (Message, error) {\n\tss, err := NewMessage(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Message{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewCreateWidgetParams() *CreateWidgetParams {\n\tvar (\n\t\tacceptDefault = string(\"application/json\")\n\t\tcontentTypeDefault = string(\"application/json\")\n\t)\n\treturn &CreateWidgetParams{\n\t\tAccept: &acceptDefault,\n\t\tContentType: &contentTypeDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func CreateVNICProfileParams() BuildableVNICProfileParameters {\n\treturn &vnicProfileParams{}\n}", "func (s *VPCService) NewDeleteVPCOfferingParams(id string) *DeleteVPCOfferingParams {\n\tp := &DeleteVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (opts CreateOptions) Params() map[string]interface{} {\n\treturn opts.toConfig().Params\n}", "func (c *InputService21ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func NewFetchParams(timeout time.Duration, url string) *Params {\n\tparams := &Params{\n\t\tTimeout: timeout,\n\t\tURL: url,\n\t}\n\treturn params\n}", "func (s *VirtualhostsService) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := s.NewRequest(op, params, data)\n\n\treturn req\n}", "func (rm *resourceManager) newCreateRequestPayload(\n\tctx context.Context,\n\tr *resource,\n) (*svcsdk.CreateVpnConnectionInput, error) {\n\tres := &svcsdk.CreateVpnConnectionInput{}\n\n\tif r.ko.Spec.CustomerGatewayID != nil {\n\t\tres.SetCustomerGatewayId(*r.ko.Spec.CustomerGatewayID)\n\t}\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Spec.Options != nil {\n\t\tf2 := &svcsdk.VpnConnectionOptionsSpecification{}\n\t\tif r.ko.Spec.Options.EnableAcceleration != nil {\n\t\t\tf2.SetEnableAcceleration(*r.ko.Spec.Options.EnableAcceleration)\n\t\t}\n\t\tif r.ko.Spec.Options.LocalIPv4NetworkCIDR != nil {\n\t\t\tf2.SetLocalIpv4NetworkCidr(*r.ko.Spec.Options.LocalIPv4NetworkCIDR)\n\t\t}\n\t\tif r.ko.Spec.Options.LocalIPv6NetworkCIDR != nil {\n\t\t\tf2.SetLocalIpv6NetworkCidr(*r.ko.Spec.Options.LocalIPv6NetworkCIDR)\n\t\t}\n\t\tif r.ko.Spec.Options.RemoteIPv4NetworkCIDR != nil {\n\t\t\tf2.SetRemoteIpv4NetworkCidr(*r.ko.Spec.Options.RemoteIPv4NetworkCIDR)\n\t\t}\n\t\tif r.ko.Spec.Options.RemoteIPv6NetworkCIDR != nil {\n\t\t\tf2.SetRemoteIpv6NetworkCidr(*r.ko.Spec.Options.RemoteIPv6NetworkCIDR)\n\t\t}\n\t\tif r.ko.Spec.Options.StaticRoutesOnly != nil {\n\t\t\tf2.SetStaticRoutesOnly(*r.ko.Spec.Options.StaticRoutesOnly)\n\t\t}\n\t\tif r.ko.Spec.Options.TunnelInsideIPVersion != nil {\n\t\t\tf2.SetTunnelInsideIpVersion(*r.ko.Spec.Options.TunnelInsideIPVersion)\n\t\t}\n\t\tif r.ko.Spec.Options.TunnelOptions != nil {\n\t\t\tf2f7 := []*svcsdk.VpnTunnelOptionsSpecification{}\n\t\t\tfor _, f2f7iter := range r.ko.Spec.Options.TunnelOptions {\n\t\t\t\tf2f7elem := &svcsdk.VpnTunnelOptionsSpecification{}\n\t\t\t\tif f2f7iter.DPDTimeoutAction != nil {\n\t\t\t\t\tf2f7elem.SetDPDTimeoutAction(*f2f7iter.DPDTimeoutAction)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.DPDTimeoutSeconds != nil {\n\t\t\t\t\tf2f7elem.SetDPDTimeoutSeconds(*f2f7iter.DPDTimeoutSeconds)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.IKEVersions != nil {\n\t\t\t\t\tf2f7elemf2 := []*svcsdk.IKEVersionsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf2iter := range f2f7iter.IKEVersions {\n\t\t\t\t\t\tf2f7elemf2elem := &svcsdk.IKEVersionsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf2iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf2elem.SetValue(*f2f7elemf2iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf2 = append(f2f7elemf2, f2f7elemf2elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetIKEVersions(f2f7elemf2)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase1DHGroupNumbers != nil {\n\t\t\t\t\tf2f7elemf3 := []*svcsdk.Phase1DHGroupNumbersRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf3iter := range f2f7iter.Phase1DHGroupNumbers {\n\t\t\t\t\t\tf2f7elemf3elem := &svcsdk.Phase1DHGroupNumbersRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf3iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf3elem.SetValue(*f2f7elemf3iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf3 = append(f2f7elemf3, f2f7elemf3elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase1DHGroupNumbers(f2f7elemf3)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase1EncryptionAlgorithms != nil {\n\t\t\t\t\tf2f7elemf4 := []*svcsdk.Phase1EncryptionAlgorithmsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf4iter := range f2f7iter.Phase1EncryptionAlgorithms {\n\t\t\t\t\t\tf2f7elemf4elem := &svcsdk.Phase1EncryptionAlgorithmsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf4iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf4elem.SetValue(*f2f7elemf4iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf4 = append(f2f7elemf4, f2f7elemf4elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase1EncryptionAlgorithms(f2f7elemf4)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase1IntegrityAlgorithms != nil {\n\t\t\t\t\tf2f7elemf5 := []*svcsdk.Phase1IntegrityAlgorithmsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf5iter := range f2f7iter.Phase1IntegrityAlgorithms {\n\t\t\t\t\t\tf2f7elemf5elem := &svcsdk.Phase1IntegrityAlgorithmsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf5iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf5elem.SetValue(*f2f7elemf5iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf5 = append(f2f7elemf5, f2f7elemf5elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase1IntegrityAlgorithms(f2f7elemf5)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase1LifetimeSeconds != nil {\n\t\t\t\t\tf2f7elem.SetPhase1LifetimeSeconds(*f2f7iter.Phase1LifetimeSeconds)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase2DHGroupNumbers != nil {\n\t\t\t\t\tf2f7elemf7 := []*svcsdk.Phase2DHGroupNumbersRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf7iter := range f2f7iter.Phase2DHGroupNumbers {\n\t\t\t\t\t\tf2f7elemf7elem := &svcsdk.Phase2DHGroupNumbersRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf7iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf7elem.SetValue(*f2f7elemf7iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf7 = append(f2f7elemf7, f2f7elemf7elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase2DHGroupNumbers(f2f7elemf7)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase2EncryptionAlgorithms != nil {\n\t\t\t\t\tf2f7elemf8 := []*svcsdk.Phase2EncryptionAlgorithmsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf8iter := range f2f7iter.Phase2EncryptionAlgorithms {\n\t\t\t\t\t\tf2f7elemf8elem := &svcsdk.Phase2EncryptionAlgorithmsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf8iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf8elem.SetValue(*f2f7elemf8iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf8 = append(f2f7elemf8, f2f7elemf8elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase2EncryptionAlgorithms(f2f7elemf8)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase2IntegrityAlgorithms != nil {\n\t\t\t\t\tf2f7elemf9 := []*svcsdk.Phase2IntegrityAlgorithmsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf9iter := range f2f7iter.Phase2IntegrityAlgorithms {\n\t\t\t\t\t\tf2f7elemf9elem := &svcsdk.Phase2IntegrityAlgorithmsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf9iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf9elem.SetValue(*f2f7elemf9iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf9 = append(f2f7elemf9, f2f7elemf9elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase2IntegrityAlgorithms(f2f7elemf9)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase2LifetimeSeconds != nil {\n\t\t\t\t\tf2f7elem.SetPhase2LifetimeSeconds(*f2f7iter.Phase2LifetimeSeconds)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.PreSharedKey != nil {\n\t\t\t\t\tf2f7elem.SetPreSharedKey(*f2f7iter.PreSharedKey)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.RekeyFuzzPercentage != nil {\n\t\t\t\t\tf2f7elem.SetRekeyFuzzPercentage(*f2f7iter.RekeyFuzzPercentage)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.RekeyMarginTimeSeconds != nil {\n\t\t\t\t\tf2f7elem.SetRekeyMarginTimeSeconds(*f2f7iter.RekeyMarginTimeSeconds)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.ReplayWindowSize != nil {\n\t\t\t\t\tf2f7elem.SetReplayWindowSize(*f2f7iter.ReplayWindowSize)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.StartupAction != nil {\n\t\t\t\t\tf2f7elem.SetStartupAction(*f2f7iter.StartupAction)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.TunnelInsideCIDR != nil {\n\t\t\t\t\tf2f7elem.SetTunnelInsideCidr(*f2f7iter.TunnelInsideCIDR)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.TunnelInsideIPv6CIDR != nil {\n\t\t\t\t\tf2f7elem.SetTunnelInsideIpv6Cidr(*f2f7iter.TunnelInsideIPv6CIDR)\n\t\t\t\t}\n\t\t\t\tf2f7 = append(f2f7, f2f7elem)\n\t\t\t}\n\t\t\tf2.SetTunnelOptions(f2f7)\n\t\t}\n\t\tres.SetOptions(f2)\n\t}\n\tif r.ko.Spec.TagSpecifications != nil {\n\t\tf3 := []*svcsdk.TagSpecification{}\n\t\tfor _, f3iter := range r.ko.Spec.TagSpecifications {\n\t\t\tf3elem := &svcsdk.TagSpecification{}\n\t\t\tif f3iter.ResourceType != nil {\n\t\t\t\tf3elem.SetResourceType(*f3iter.ResourceType)\n\t\t\t}\n\t\t\tif f3iter.Tags != nil {\n\t\t\t\tf3elemf1 := []*svcsdk.Tag{}\n\t\t\t\tfor _, f3elemf1iter := range f3iter.Tags {\n\t\t\t\t\tf3elemf1elem := &svcsdk.Tag{}\n\t\t\t\t\tif f3elemf1iter.Key != nil {\n\t\t\t\t\t\tf3elemf1elem.SetKey(*f3elemf1iter.Key)\n\t\t\t\t\t}\n\t\t\t\t\tif f3elemf1iter.Value != nil {\n\t\t\t\t\t\tf3elemf1elem.SetValue(*f3elemf1iter.Value)\n\t\t\t\t\t}\n\t\t\t\t\tf3elemf1 = append(f3elemf1, f3elemf1elem)\n\t\t\t\t}\n\t\t\t\tf3elem.SetTags(f3elemf1)\n\t\t\t}\n\t\t\tf3 = append(f3, f3elem)\n\t\t}\n\t\tres.SetTagSpecifications(f3)\n\t}\n\tif r.ko.Spec.TransitGatewayID != nil {\n\t\tres.SetTransitGatewayId(*r.ko.Spec.TransitGatewayID)\n\t}\n\tif r.ko.Spec.Type != nil {\n\t\tres.SetType(*r.ko.Spec.Type)\n\t}\n\tif r.ko.Spec.VPNGatewayID != nil {\n\t\tres.SetVpnGatewayId(*r.ko.Spec.VPNGatewayID)\n\t}\n\n\treturn res, nil\n}", "func (c *InputService14ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (elem *Composite) getConstructorParams(from IMediaObject, options map[string]interface{}) map[string]interface{} {\n\n\t// Create basic constructor params\n\tret := map[string]interface{}{\n\t\t\"mediaPipeline\": fmt.Sprintf(\"%s\", from),\n\t}\n\n\t// then merge options\n\tmergeOptions(ret, options)\n\n\treturn ret\n\n}", "func (c *InputService17ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService2ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService2ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func newParametizer(z []byte) *parametizer {\n\tp := parametizerPool.Get().(*parametizer)\n\tp.z = z\n\n\treturn p\n}", "func NewParams(\n\tmintDenom string, inflationRateChange, inflationMax, inflationMin, goalBonded sdk.Dec, blocksPerYear uint64,\n) Params {\n\n\treturn Params{\n\t\tMintDenom: mintDenom,\n\t\tInflationRateChange: inflationRateChange,\n\t\tInflationMax: inflationMax,\n\t\tInflationMin: inflationMin,\n\t\tGoalBonded: goalBonded,\n\t\tBlocksPerYear: blocksPerYear,\n\t}\n}", "func (to *Session) CreateParameter(pl tc.Parameter, opts RequestOptions) (tc.Alerts, toclientlib.ReqInf, error) {\n\tvar alerts tc.Alerts\n\treqInf, err := to.post(apiParameters, opts, pl, &alerts)\n\treturn alerts, reqInf, err\n}", "func newProvisioner(baseCtx context.Context, cl *restClient, callTimeout time.Duration) mode.Provisioner {\n\treturn provisioner{cl: cl, baseCtx: baseCtx, callTimeout: callTimeout}\n}", "func NewRequest(params interface{}, atta map[string]interface{}) *DubboRequest {\n\tif atta == nil {\n\t\tatta = make(map[string]interface{})\n\t}\n\treturn &DubboRequest{\n\t\tParams: params,\n\t\tAttachments: atta,\n\t}\n}", "func newConstant(name, paramType string) *Param {\n\treturn &Param{\n\t\tParameterKind: otherConstant,\n\t\tName: name,\n\t\tParameterType: paramType,\n\t}\n}", "func (c *InputService16ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func NewChatNewParams() *ChatNewParams {\n\tvar (\n\t\tchannelIDDefault = float64(1)\n\t)\n\treturn &ChatNewParams{\n\t\tChannelID: &channelIDDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (rm *resourceManager) newCreateRequestPayload(\n\tctx context.Context,\n\tr *resource,\n) (*svcsdk.CreateVpcPeeringConnectionInput, error) {\n\tres := &svcsdk.CreateVpcPeeringConnectionInput{}\n\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Spec.PeerOwnerID != nil {\n\t\tres.SetPeerOwnerId(*r.ko.Spec.PeerOwnerID)\n\t}\n\tif r.ko.Spec.PeerRegion != nil {\n\t\tres.SetPeerRegion(*r.ko.Spec.PeerRegion)\n\t}\n\tif r.ko.Spec.PeerVPCID != nil {\n\t\tres.SetPeerVpcId(*r.ko.Spec.PeerVPCID)\n\t}\n\tif r.ko.Spec.TagSpecifications != nil {\n\t\tf4 := []*svcsdk.TagSpecification{}\n\t\tfor _, f4iter := range r.ko.Spec.TagSpecifications {\n\t\t\tf4elem := &svcsdk.TagSpecification{}\n\t\t\tif f4iter.ResourceType != nil {\n\t\t\t\tf4elem.SetResourceType(*f4iter.ResourceType)\n\t\t\t}\n\t\t\tif f4iter.Tags != nil {\n\t\t\t\tf4elemf1 := []*svcsdk.Tag{}\n\t\t\t\tfor _, f4elemf1iter := range f4iter.Tags {\n\t\t\t\t\tf4elemf1elem := &svcsdk.Tag{}\n\t\t\t\t\tif f4elemf1iter.Key != nil {\n\t\t\t\t\t\tf4elemf1elem.SetKey(*f4elemf1iter.Key)\n\t\t\t\t\t}\n\t\t\t\t\tif f4elemf1iter.Value != nil {\n\t\t\t\t\t\tf4elemf1elem.SetValue(*f4elemf1iter.Value)\n\t\t\t\t\t}\n\t\t\t\t\tf4elemf1 = append(f4elemf1, f4elemf1elem)\n\t\t\t\t}\n\t\t\t\tf4elem.SetTags(f4elemf1)\n\t\t\t}\n\t\t\tf4 = append(f4, f4elem)\n\t\t}\n\t\tres.SetTagSpecifications(f4)\n\t}\n\tif r.ko.Spec.VPCID != nil {\n\t\tres.SetVpcId(*r.ko.Spec.VPCID)\n\t}\n\n\treturn res, nil\n}", "func NewPHCParamInfo(name string) *PHCParamInfo {\n\treturn &PHCParamInfo{\n\t\tName: name,\n\t\tMaxLength: -1,\n\t\tOptional: false,\n\t}\n}", "func (c *client) newRequest(ctx context.Context, method string, svc service, input Marshaler) (*http.Request, error) {\n\tparamsMap, err := input.MarshalMap()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar svcPath string\n\tswitch svc {\n\tcase servicePayByPrime:\n\t\tsvcPath = payByPrimePath\n\tcase serviceRecord:\n\t\tsvcPath = recordPath\n\tcase serviceRefund:\n\t\tsvcPath = refundPath\n\t}\n\n\tu, _ := url.Parse(svcPath)\n\tbase, _ := url.Parse(c.url)\n\tpath := base.ResolveReference(u).String()\n\n\tparamsMap[\"partner_key\"] = c.partnerKey\n\tbody, _ := json.Marshal(paramsMap)\n\treq, err := http.NewRequestWithContext(ctx, method, path, bytes.NewBuffer(body))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot create a TapPay request: %v\", err)\n\t}\n\treq.Header.Add(\"x-api-key\", c.partnerKey)\n\treq.Header.Add(\"Content-Type\", \"application/json\")\n\treturn req, nil\n}", "func (c *InputService3ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService3ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService19ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService4ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService4ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService18ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService1ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService1ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService20ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService15ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService11ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func NewTransferParams(toWalletableId int32, toWalletableType string, fromWalletableId int32, fromWalletableType string, amount int32, date string, companyId int32, ) *TransferParams {\n\tthis := TransferParams{}\n\tthis.ToWalletableId = toWalletableId\n\tthis.ToWalletableType = toWalletableType\n\tthis.FromWalletableId = fromWalletableId\n\tthis.FromWalletableType = fromWalletableType\n\tthis.Amount = amount\n\tthis.Date = date\n\tthis.CompanyId = companyId\n\treturn &this\n}", "func (c *InputService13ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func newFileFromParams(upload *Upload, params *common.File) *File {\n\tfile := &File{}\n\tfile.upload = upload\n\tfile.metadata = params\n\tfile.Name = params.Name\n\tfile.Size = params.Size\n\treturn file\n}", "func (c *InputService9ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService9ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func CreateCreateFaceConfigRequest() (request *CreateFaceConfigRequest) {\n\trequest = &CreateFaceConfigRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Cloudauth\", \"2019-03-07\", \"CreateFaceConfig\", \"cloudauth\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func NewGetParams() *GetParams {\n\tvar (\n\t\tdeviceOSDefault = string(\"Android 9\")\n\t\tsendToEmailDefault = string(\"no\")\n\t)\n\treturn &GetParams{\n\t\tDeviceOS: &deviceOSDefault,\n\t\tSendToEmail: &sendToEmailDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewProviderParams() ProviderParams {\n\n\treturn ProviderParams{}\n}", "func NewSizeParams() *SizeParams {\n\tvar ()\n\treturn &SizeParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *VPCService) NewCreatePrivateGatewayParams(gateway string, ipaddress string, netmask string, vlan string, vpcid string) *CreatePrivateGatewayParams {\n\tp := &CreatePrivateGatewayParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"gateway\"] = gateway\n\tp.p[\"ipaddress\"] = ipaddress\n\tp.p[\"netmask\"] = netmask\n\tp.p[\"vlan\"] = vlan\n\tp.p[\"vpcid\"] = vpcid\n\treturn p\n}", "func (node *Node) Param(vc *validation.Config, keys ...string) *Node {\n\n\tif len(keys) == 0 { panic(\"NO KEYS SUPPLIED FOR NEW PARAMETER\") }\n\n\tnode.RLock()\n\t\tp := node.Parameter\n\tnode.RUnlock()\n\tif p != nil {\n\t\treturn p\n\t}\n\n\tn := node.new(\"{\" + keys[0] + \"}\")\n\n\tvc.Keys = keys\n\n\tn.Lock()\n\t\tn.Validation = vc\n\t\tn.Validations = append(n.Validations, vc)\n\tn.Unlock()\n\n\tnode.Lock()\n\t\tnode.Parameter = n\n\tnode.Unlock()\n\n\treturn n\n}", "func NewParams(\n\tSpotMarketInstantListingFee sdk.Coin,\n\tderivativeMarketInstantListingFee sdk.Coin,\n\tdefaultSpotMakerFee sdk.Dec,\n\tdefaultSpotTakerFee sdk.Dec,\n\tdefaultDerivativeMakerFee sdk.Dec,\n\tdefaultDerivativeTakerFee sdk.Dec,\n\tdefaultInitialMarginRatio sdk.Dec,\n\tdefaultMaintenanceMarginRatio sdk.Dec,\n\tdefaultFundingInterval int64,\n\tfundingMultiple int64,\n\trelayerFeeShare sdk.Dec,\n\tdefaultHourlyFundingRateCap sdk.Dec,\n\tdefaultHourlyInterestRate sdk.Dec,\n\tmaxDerivativeSideOrderCount uint32,\n) Params {\n\treturn Params{\n\t\tSpotMarketInstantListingFee: SpotMarketInstantListingFee,\n\t\tDerivativeMarketInstantListingFee: derivativeMarketInstantListingFee,\n\t\tDefaultSpotMakerFeeRate: defaultSpotMakerFee,\n\t\tDefaultSpotTakerFeeRate: defaultSpotTakerFee,\n\t\tDefaultDerivativeMakerFeeRate: defaultDerivativeMakerFee,\n\t\tDefaultDerivativeTakerFeeRate: defaultDerivativeTakerFee,\n\t\tDefaultInitialMarginRatio: defaultInitialMarginRatio,\n\t\tDefaultMaintenanceMarginRatio: defaultMaintenanceMarginRatio,\n\t\tDefaultFundingInterval: defaultFundingInterval,\n\t\tFundingMultiple: fundingMultiple,\n\t\tRelayerFeeShareRate: relayerFeeShare,\n\t\tDefaultHourlyFundingRateCap: defaultHourlyFundingRateCap,\n\t\tDefaultHourlyInterestRate: defaultHourlyInterestRate,\n\t\tMaxDerivativeOrderSideCount: maxDerivativeSideOrderCount,\n\t}\n}", "func (c *InputService2ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService8ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService8ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService10ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func NewTppCertificateParams(type_ TppCertificateType, publicKey string, privateKey string, label string, ) *TppCertificateParams {\n\tthis := TppCertificateParams{}\n\tthis.Type = type_\n\tthis.PublicKey = publicKey\n\tthis.PrivateKey = privateKey\n\tthis.Label = label\n\treturn &this\n}", "func newTemplateParams(r *http.Request) templateParams {\n\tuser := ctx.Get(r, \"user\").(models.User)\n\tsession := ctx.Get(r, \"session\").(*sessions.Session)\n\tmodifySystem, _ := user.HasPermission(models.PermissionModifySystem)\n\treturn templateParams{\n\t\tToken: csrf.Token(r),\n\t\tUser: user,\n\t\tModifySystem: modifySystem,\n\t\tVersion: config.Version,\n\t\tFlashes: session.Flashes(),\n\t}\n}", "func (c *APIGateway) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\t// Run custom request initialization if present\n\tif initRequest != nil {\n\t\tinitRequest(req)\n\t}\n\n\treturn req\n}", "func (c *InputService12ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (service *Service) CreateRequest(parameters map[string]string) (*Request, error) {\n\tvar int1, int2, limit int64\n\tvar err error\n\n\t// Convert string parameters to int64\n\tif int1, err = strconv.ParseInt(parameters[\"int1\"], 10, 64); err != nil {\n\t\treturn nil, err\n\t}\n\tif int2, err = strconv.ParseInt(parameters[\"int2\"], 10, 64); err != nil {\n\t\treturn nil, err\n\t}\n\tif limit, err = strconv.ParseInt(parameters[\"limit\"], 10, 64); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Request{\n\t\tInt1: int1,\n\t\tInt2: int2,\n\t\tLimit: limit,\n\t\tStr1: parameters[\"str1\"],\n\t\tStr2: parameters[\"str2\"],\n\t}, nil\n}", "func (client *PeeringPoliciesClient) getCreateRequest(ctx context.Context, resourceGroupName string, managedNetworkName string, managedNetworkPeeringPolicyName string, options *PeeringPoliciesClientGetOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedNetwork/managedNetworks/{managedNetworkName}/managedNetworkPeeringPolicies/{managedNetworkPeeringPolicyName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif managedNetworkName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedNetworkName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedNetworkName}\", url.PathEscape(managedNetworkName))\n\tif managedNetworkPeeringPolicyName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedNetworkPeeringPolicyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedNetworkPeeringPolicyName}\", url.PathEscape(managedNetworkPeeringPolicyName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-06-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func execNewParam(_ int, p *gop.Context) {\n\targs := p.GetArgs(4)\n\tret := types.NewParam(token.Pos(args[0].(int)), args[1].(*types.Package), args[2].(string), args[3].(types.Type))\n\tp.Ret(4, ret)\n}", "func NewCreateScriptParams() *CreateScriptParams {\n\tvar (\n\t\tacceptDefault = string(\"application/json\")\n\t\tcontentTypeDefault = string(\"application/json\")\n\t)\n\treturn &CreateScriptParams{\n\t\tAccept: acceptDefault,\n\t\tContentType: contentTypeDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *PipelinesClient) getCreateRequest(ctx context.Context, resourceGroupName string, factoryName string, pipelineName string, options *PipelinesClientGetOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DataFactory/factories/{factoryName}/pipelines/{pipelineName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif factoryName == \"\" {\n\t\treturn nil, errors.New(\"parameter factoryName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{factoryName}\", url.PathEscape(factoryName))\n\tif pipelineName == \"\" {\n\t\treturn nil, errors.New(\"parameter pipelineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{pipelineName}\", url.PathEscape(pipelineName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2018-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tif options != nil && options.IfNoneMatch != nil {\n\t\treq.Raw().Header[\"If-None-Match\"] = []string{*options.IfNoneMatch}\n\t}\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewCreateCrossConnectParams() *CreateCrossConnectParams {\n\tvar ()\n\treturn &CreateCrossConnectParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewCreateVideoUploadTaskRequestWithoutParam() *CreateVideoUploadTaskRequest {\n\n return &CreateVideoUploadTaskRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/videoUploadTask\",\n Method: \"POST\",\n Header: nil,\n Version: \"v1\",\n },\n }\n}", "func (c *InputService1ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (t *Role) CreateParams() []interface{} {\n\treturn []interface{}{\n\t\t&t.Name,\n\t}\n}", "func NewFreezeParams() *FreezeParams {\n\treturn &FreezeParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}" ]
[ "0.64373", "0.64163417", "0.6216983", "0.61947846", "0.6187952", "0.61825186", "0.61825186", "0.6179219", "0.6179219", "0.6171515", "0.6166048", "0.60730267", "0.5983365", "0.5968591", "0.5933077", "0.59155905", "0.5891385", "0.5868773", "0.58472", "0.58454996", "0.5839114", "0.58270925", "0.57742494", "0.57335955", "0.57082784", "0.57065296", "0.562274", "0.5612427", "0.5603113", "0.555507", "0.5472453", "0.5459766", "0.5400367", "0.5398162", "0.5391922", "0.5379165", "0.53776926", "0.53648806", "0.5361802", "0.53505075", "0.53412044", "0.5309781", "0.5295691", "0.52903736", "0.52856797", "0.52645105", "0.52618796", "0.52618796", "0.52617306", "0.5259638", "0.52545834", "0.52403045", "0.5227233", "0.5219405", "0.52179444", "0.52129745", "0.5205624", "0.52028966", "0.5200472", "0.5194023", "0.5194023", "0.5191218", "0.519092", "0.519092", "0.51857877", "0.51818514", "0.51818514", "0.51644623", "0.5161199", "0.51555413", "0.5155198", "0.5152736", "0.51508296", "0.5145758", "0.5145758", "0.51443666", "0.51353765", "0.51351446", "0.51295274", "0.51289946", "0.5117926", "0.51172197", "0.5112422", "0.51057863", "0.51057863", "0.5103896", "0.50991976", "0.5094605", "0.5084399", "0.507171", "0.50707626", "0.5063505", "0.50631106", "0.50618947", "0.50558996", "0.5054202", "0.50538296", "0.50450194", "0.5043155", "0.5041883" ]
0.7766103
0
You should always use this function to get a new DeletePrivateGatewayParams instance, as then you are sure you have configured all required params
func (s *VPCService) NewDeletePrivateGatewayParams(id string) *DeletePrivateGatewayParams { p := &DeletePrivateGatewayParams{} p.p = make(map[string]interface{}) p.p["id"] = id return p }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (s *VPCService) NewCreatePrivateGatewayParams(gateway string, ipaddress string, netmask string, vlan string, vpcid string) *CreatePrivateGatewayParams {\n\tp := &CreatePrivateGatewayParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"gateway\"] = gateway\n\tp.p[\"ipaddress\"] = ipaddress\n\tp.p[\"netmask\"] = netmask\n\tp.p[\"vlan\"] = vlan\n\tp.p[\"vpcid\"] = vpcid\n\treturn p\n}", "func NewDeleteKeyPairsParams() *DeleteKeyPairsParams {\n\tvar ()\n\treturn &DeleteKeyPairsParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteProtectedEntityParams() *DeleteProtectedEntityParams {\n\treturn &DeleteProtectedEntityParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeletePrivateNetworkRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/private-network/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (client *PeeringPoliciesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, managedNetworkName string, managedNetworkPeeringPolicyName string, options *PeeringPoliciesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedNetwork/managedNetworks/{managedNetworkName}/managedNetworkPeeringPolicies/{managedNetworkPeeringPolicyName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif managedNetworkName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedNetworkName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedNetworkName}\", url.PathEscape(managedNetworkName))\n\tif managedNetworkPeeringPolicyName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedNetworkPeeringPolicyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedNetworkPeeringPolicyName}\", url.PathEscape(managedNetworkPeeringPolicyName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-06-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewDeleteConnectionParams() *DeleteConnectionParams {\n\tvar ()\n\treturn &DeleteConnectionParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *WebAppsClient) deletePrivateEndpointConnectionCreateRequest(ctx context.Context, resourceGroupName string, name string, privateEndpointConnectionName string, options *WebAppsBeginDeletePrivateEndpointConnectionOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/privateEndpointConnections/{privateEndpointConnectionName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif privateEndpointConnectionName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateEndpointConnectionName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateEndpointConnectionName}\", url.PathEscape(privateEndpointConnectionName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (s *VPCService) NewDeleteVPCOfferingParams(id string) *DeleteVPCOfferingParams {\n\tp := &DeleteVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewDeleteaspecificManagerSecretaryRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/managersecretary/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func NewDeleteaspecificPeeringGroupRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/peeringgroups/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (s *VPCService) NewListPrivateGatewaysParams() *ListPrivateGatewaysParams {\n\tp := &ListPrivateGatewaysParams{}\n\tp.p = make(map[string]interface{})\n\treturn p\n}", "func (client *NetworkToNetworkInterconnectsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, networkFabricName string, networkToNetworkInterconnectName string, options *NetworkToNetworkInterconnectsClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedNetworkFabric/networkFabrics/{networkFabricName}/networkToNetworkInterconnects/{networkToNetworkInterconnectName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif networkFabricName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkFabricName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkFabricName}\", url.PathEscape(networkFabricName))\n\tif networkToNetworkInterconnectName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkToNetworkInterconnectName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkToNetworkInterconnectName}\", url.PathEscape(networkToNetworkInterconnectName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-06-15\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewDeleteTagParams() *DeleteTagParams {\n\tvar ()\n\treturn &DeleteTagParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteKeyPairsParamsWithHTTPClient(client *http.Client) *DeleteKeyPairsParams {\n\tvar ()\n\treturn &DeleteKeyPairsParams{\n\t\tHTTPClient: client,\n\t}\n}", "func (client *HCRPAssignmentsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, guestConfigurationAssignmentName string, machineName string, options *HCRPAssignmentsClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.HybridCompute/machines/{machineName}/providers/Microsoft.GuestConfiguration/guestConfigurationAssignments/{guestConfigurationAssignmentName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif guestConfigurationAssignmentName == \"\" {\n\t\treturn nil, errors.New(\"parameter guestConfigurationAssignmentName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{guestConfigurationAssignmentName}\", url.PathEscape(guestConfigurationAssignmentName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif machineName == \"\" {\n\t\treturn nil, errors.New(\"parameter machineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{machineName}\", url.PathEscape(machineName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-01-25\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (m *MockProjectServiceIface) NewDeleteProjectInvitationParams(id string) *DeleteProjectInvitationParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeleteProjectInvitationParams\", id)\n\tret0, _ := ret[0].(*DeleteProjectInvitationParams)\n\treturn ret0\n}", "func NewDeleteaspecificPbxDeviceRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/pbxdevices/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (client *KpiClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, hubName string, kpiName string, options *KpiClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.CustomerInsights/hubs/{hubName}/kpi/{kpiName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif hubName == \"\" {\n\t\treturn nil, errors.New(\"parameter hubName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{hubName}\", url.PathEscape(hubName))\n\tif kpiName == \"\" {\n\t\treturn nil, errors.New(\"parameter kpiName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{kpiName}\", url.PathEscape(kpiName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2017-04-26\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treturn req, nil\n}", "func (client *PrivateDNSZoneGroupsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, privateEndpointName string, privateDNSZoneGroupName string, options *PrivateDNSZoneGroupsClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/privateEndpoints/{privateEndpointName}/privateDnsZoneGroups/{privateDnsZoneGroupName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif privateEndpointName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateEndpointName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateEndpointName}\", url.PathEscape(privateEndpointName))\n\tif privateDNSZoneGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateDNSZoneGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateDnsZoneGroupName}\", url.PathEscape(privateDNSZoneGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-04-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (m *MockFirewallServiceIface) NewDeletePaloAltoFirewallParams(fwdeviceid string) *DeletePaloAltoFirewallParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeletePaloAltoFirewallParams\", fwdeviceid)\n\tret0, _ := ret[0].(*DeletePaloAltoFirewallParams)\n\treturn ret0\n}", "func (m *MockLoadBalancerServiceIface) NewDeleteGlobalLoadBalancerRuleParams(id string) *DeleteGlobalLoadBalancerRuleParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeleteGlobalLoadBalancerRuleParams\", id)\n\tret0, _ := ret[0].(*DeleteGlobalLoadBalancerRuleParams)\n\treturn ret0\n}", "func (s *VPCService) NewDeleteVPCParams(id string) *DeleteVPCParams {\n\tp := &DeleteVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewDeleteNtpServerParams() *DeleteNtpServerParams {\n\tvar ()\n\treturn &DeleteNtpServerParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteProtectedEntityParamsWithTimeout(timeout time.Duration) *DeleteProtectedEntityParams {\n\treturn &DeleteProtectedEntityParams{\n\t\ttimeout: timeout,\n\t}\n}", "func NewAuthPrivilegeRequestWithoutParam() *AuthPrivilegeRequest {\n\n return &AuthPrivilegeRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/management:authPrivilege\",\n Method: \"POST\",\n Header: nil,\n Version: \"v1\",\n },\n }\n}", "func (client *VirtualNetworkLinksClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, privateZoneName string, virtualNetworkLinkName string, options *VirtualNetworkLinksBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/privateDnsZones/{privateZoneName}/virtualNetworkLinks/{virtualNetworkLinkName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif privateZoneName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateZoneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateZoneName}\", url.PathEscape(privateZoneName))\n\tif virtualNetworkLinkName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualNetworkLinkName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualNetworkLinkName}\", url.PathEscape(virtualNetworkLinkName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2020-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tif options != nil && options.IfMatch != nil {\n\t\treq.Raw().Header.Set(\"If-Match\", *options.IfMatch)\n\t}\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewDeleteNodeParams() *DeleteNodeParams {\n\tvar ()\n\treturn &DeleteNodeParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteAttributeParams() *DeleteAttributeParams {\n\tvar ()\n\treturn &DeleteAttributeParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *UsageService) NewDeleteTrafficTypeParams(id string) *DeleteTrafficTypeParams {\n\tp := &DeleteTrafficTypeParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewDeleteSupportUserParams() *DeleteSupportUserParams {\n\tvar ()\n\treturn &DeleteSupportUserParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteaspecificPeeringServerRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/peeringservers/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func NewDeleteNetworkGroupPolicyParams() *DeleteNetworkGroupPolicyParams {\n\tvar ()\n\treturn &DeleteNetworkGroupPolicyParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteDebugRequestParams() *DeleteDebugRequestParams {\n\tvar ()\n\treturn &DeleteDebugRequestParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *KeyVaultClient) purgeDeletedSecretCreateRequest(ctx context.Context, vaultBaseURL string, secretName string, options *KeyVaultClientPurgeDeletedSecretOptions) (*policy.Request, error) {\n\thost := \"{vaultBaseUrl}\"\n\thost = strings.ReplaceAll(host, \"{vaultBaseUrl}\", vaultBaseURL)\n\turlPath := \"/deletedsecrets/{secret-name}\"\n\tif secretName == \"\" {\n\t\treturn nil, errors.New(\"parameter secretName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{secret-name}\", url.PathEscape(secretName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.2\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *ManagementAssociationsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, managementAssociationName string, options *ManagementAssociationsDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/{providerName}/{resourceType}/{resourceName}/providers/Microsoft.OperationsManagement/ManagementAssociations/{managementAssociationName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.providerName == \"\" {\n\t\treturn nil, errors.New(\"parameter client.providerName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{providerName}\", url.PathEscape(client.providerName))\n\tif client.resourceType == \"\" {\n\t\treturn nil, errors.New(\"parameter client.resourceType cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceType}\", url.PathEscape(client.resourceType))\n\tif client.resourceName == \"\" {\n\t\treturn nil, errors.New(\"parameter client.resourceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceName}\", url.PathEscape(client.resourceName))\n\tif managementAssociationName == \"\" {\n\t\treturn nil, errors.New(\"parameter managementAssociationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managementAssociationName}\", url.PathEscape(managementAssociationName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2015-11-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (s *UserService) NewDeleteUserParams(id string) *DeleteUserParams {\n\tp := &DeleteUserParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (m *MockFirewallServiceIface) NewDeletePortForwardingRuleParams(id string) *DeletePortForwardingRuleParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeletePortForwardingRuleParams\", id)\n\tret0, _ := ret[0].(*DeletePortForwardingRuleParams)\n\treturn ret0\n}", "func NewDeleteKeyPairsParamsWithTimeout(timeout time.Duration) *DeleteKeyPairsParams {\n\tvar ()\n\treturn &DeleteKeyPairsParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "func SSMDeleteParams(deleted, invalids []string) *SSMAPI {\n\treturn &SSMAPI{\n\t\tdelparamsOutput: &ssm.DeleteParametersOutput{\n\t\t\tDeletedParameters: aws.StringSlice(deleted),\n\t\t\tInvalidParameters: aws.StringSlice(invalids),\n\t\t},\n\t}\n}", "func (rm *resourceManager) newDeleteRequestPayload(\n\tr *resource,\n) (*svcsdk.DeleteVpcPeeringConnectionInput, error) {\n\tres := &svcsdk.DeleteVpcPeeringConnectionInput{}\n\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Status.VPCPeeringConnectionID != nil {\n\t\tres.SetVpcPeeringConnectionId(*r.ko.Status.VPCPeeringConnectionID)\n\t}\n\n\treturn res, nil\n}", "func NewParams(defaultSendEnabled bool) Params {\n\treturn Params{\n\t\tSendEnabled: nil,\n\t\tDefaultSendEnabled: defaultSendEnabled,\n\t}\n}", "func (c *Client) NewDeleteBackupRequest(ctx context.Context, path string) (*http.Request, error) {\n\tscheme := c.Scheme\n\tif scheme == \"\" {\n\t\tscheme = \"http\"\n\t}\n\tu := url.URL{Host: c.Host, Scheme: scheme, Path: path}\n\treq, err := http.NewRequest(\"DELETE\", u.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif c.JWTSigner != nil {\n\t\tif err := c.JWTSigner.Sign(req); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn req, nil\n}", "func (m *MockSecurityGroupServiceIface) NewDeleteSecurityGroupParams() *DeleteSecurityGroupParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeleteSecurityGroupParams\")\n\tret0, _ := ret[0].(*DeleteSecurityGroupParams)\n\treturn ret0\n}", "func (c *UDBClient) NewDeleteUDBParamGroupRequest() *DeleteUDBParamGroupRequest {\n\treq := &DeleteUDBParamGroupRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "func (c *UDBClient) NewDeleteUDBParamGroupRequest() *DeleteUDBParamGroupRequest {\n\treq := &DeleteUDBParamGroupRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "func (client *PublicIPAddressesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, publicIPAddressName string, options *PublicIPAddressesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/publicIPAddresses/{publicIpAddressName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif publicIPAddressName == \"\" {\n\t\treturn nil, errors.New(\"parameter publicIPAddressName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{publicIpAddressName}\", url.PathEscape(publicIPAddressName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *KeyVaultClient) purgeDeletedKeyCreateRequest(ctx context.Context, vaultBaseURL string, keyName string, options *KeyVaultClientPurgeDeletedKeyOptions) (*policy.Request, error) {\n\thost := \"{vaultBaseUrl}\"\n\thost = strings.ReplaceAll(host, \"{vaultBaseUrl}\", vaultBaseURL)\n\turlPath := \"/deletedkeys/{key-name}\"\n\tif keyName == \"\" {\n\t\treturn nil, errors.New(\"parameter keyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{key-name}\", url.PathEscape(keyName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.3\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *KeyVaultClient) purgeDeletedKeyCreateRequest(ctx context.Context, vaultBaseURL string, keyName string, options *KeyVaultClientPurgeDeletedKeyOptions) (*policy.Request, error) {\n\thost := \"{vaultBaseUrl}\"\n\thost = strings.ReplaceAll(host, \"{vaultBaseUrl}\", vaultBaseURL)\n\turlPath := \"/deletedkeys/{key-name}\"\n\tif keyName == \"\" {\n\t\treturn nil, errors.New(\"parameter keyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{key-name}\", url.PathEscape(keyName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.2\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewDeleteaspecificInterceptionRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/interceptions/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func NewDeleteAPI24ProtectionGroupSnapshotsParams() *DeleteAPI24ProtectionGroupSnapshotsParams {\n\tvar ()\n\treturn &DeleteAPI24ProtectionGroupSnapshotsParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteVersionControlRequestParams() *DeleteVersionControlRequestParams {\n\treturn &DeleteVersionControlRequestParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewVolumeDeleteParams() *VolumeDeleteParams {\n\tvar (\n\t\tforceDefault = bool(false)\n\t)\n\treturn &VolumeDeleteParams{\n\t\tForce: &forceDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *WebAppsClient) deleteHostSecretCreateRequest(ctx context.Context, resourceGroupName string, name string, keyType string, keyName string, options *WebAppsDeleteHostSecretOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/host/default/{keyType}/{keyName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif keyType == \"\" {\n\t\treturn nil, errors.New(\"parameter keyType cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{keyType}\", url.PathEscape(keyType))\n\tif keyName == \"\" {\n\t\treturn nil, errors.New(\"parameter keyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{keyName}\", url.PathEscape(keyName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewDeleteVeditProjectRequestWithoutParam() *DeleteVeditProjectRequest {\n\n return &DeleteVeditProjectRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/veditProjects/{projectId}\",\n Method: \"DELETE\",\n Header: nil,\n Version: \"v1\",\n },\n }\n}", "func (m *MockLoadBalancerServiceIface) NewDeleteLBStickinessPolicyParams(id string) *DeleteLBStickinessPolicyParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeleteLBStickinessPolicyParams\", id)\n\tret0, _ := ret[0].(*DeleteLBStickinessPolicyParams)\n\treturn ret0\n}", "func NewGetPrivateOrderstateParams() *GetPrivateOrderstateParams {\n\tvar ()\n\treturn &GetPrivateOrderstateParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteaspecificBillingZoneRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/billingzones/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (client DeviceClient) DeletePreparer(ctx context.Context, serviceID string, userID string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"serviceId\": serviceID,\n\t\t\"userId\": autorest.Encode(\"path\", userID),\n\t}\n\n\ttimestamp := strconv.FormatInt(time.Now().UnixNano()/int64(time.Millisecond), 10)\n\tsec := security.NewSignature(client.Secretkey, crypto.SHA256)\n\tsignature, err := sec.Signature(\"DELETE\", common.GetPathParameters(DefaultBaseURI, \"/push/v2/services/{serviceId}/users/{userId}\", pathParameters), client.AccessKey, timestamp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsDelete(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/push/v2/services/{serviceId}/users/{userId}\", pathParameters),\n\t\tautorest.WithHeader(\"x-ncp-apigw-api-key\", client.APIGatewayAPIKey),\n\t\tautorest.WithHeader(\"x-ncp-apigw-timestamp\", timestamp),\n\t\tautorest.WithHeader(\"x-ncp-iam-access-key\", client.AccessKey),\n\t\tautorest.WithHeader(\"x-ncp-apigw-signature-v2\", signature))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func (client *RecordSetsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, privateZoneName string, recordType RecordType, relativeRecordSetName string, options *RecordSetsDeleteOptions) (*azcore.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/privateDnsZones/{privateZoneName}/{recordType}/{relativeRecordSetName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif privateZoneName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateZoneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateZoneName}\", url.PathEscape(privateZoneName))\n\tif recordType == \"\" {\n\t\treturn nil, errors.New(\"parameter recordType cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{recordType}\", url.PathEscape(string(recordType)))\n\tif relativeRecordSetName == \"\" {\n\t\treturn nil, errors.New(\"parameter relativeRecordSetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{relativeRecordSetName}\", relativeRecordSetName)\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := azcore.NewRequest(ctx, http.MethodDelete, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\treqQP := req.URL.Query()\n\treqQP.Set(\"api-version\", \"2020-06-01\")\n\treq.URL.RawQuery = reqQP.Encode()\n\tif options != nil && options.IfMatch != nil {\n\t\treq.Header.Set(\"If-Match\", *options.IfMatch)\n\t}\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *CapacitiesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, dedicatedCapacityName string, options *CapacitiesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.PowerBIDedicated/capacities/{dedicatedCapacityName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif dedicatedCapacityName == \"\" {\n\t\treturn nil, errors.New(\"parameter dedicatedCapacityName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{dedicatedCapacityName}\", url.PathEscape(dedicatedCapacityName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-01-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *ManagedInstancesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, managedInstanceName string, options *ManagedInstancesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/managedInstances/{managedInstanceName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif managedInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedInstanceName}\", url.PathEscape(managedInstanceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-08-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treturn req, nil\n}", "func (s *ProjectService) NewDeleteProjectInvitationParams(id string) *DeleteProjectInvitationParams {\n\tp := &DeleteProjectInvitationParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewTransferParams(toWalletableId int32, toWalletableType string, fromWalletableId int32, fromWalletableType string, amount int32, date string, companyId int32, ) *TransferParams {\n\tthis := TransferParams{}\n\tthis.ToWalletableId = toWalletableId\n\tthis.ToWalletableType = toWalletableType\n\tthis.FromWalletableId = fromWalletableId\n\tthis.FromWalletableType = fromWalletableType\n\tthis.Amount = amount\n\tthis.Date = date\n\tthis.CompanyId = companyId\n\treturn &this\n}", "func NewParams(createWhoisPrice string, updateWhoisPrice string, deleteWhoisPrice string) Params {\n\treturn Params{\n\t\tCreateWhoisPrice: createWhoisPrice,\n\t\tUpdateWhoisPrice: updateWhoisPrice,\n\t\tDeleteWhoisPrice: deleteWhoisPrice,\n\t}\n}", "func (client *DefenderSettingsClient) deleteCreateRequest(ctx context.Context, options *DefenderSettingsClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/providers/Microsoft.IoTSecurity/defenderSettings/default\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewDelSubDeviceWithCoreRequestWithoutParam() *DelSubDeviceWithCoreRequest {\n\n return &DelSubDeviceWithCoreRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/regions/{regionId}/instances/{instanceId}/products/{productKey}/edges/{edgeName}:delSubDevice\",\n Method: \"POST\",\n Header: nil,\n Version: \"v2\",\n },\n }\n}", "func (rm *resourceManager) newDeleteRequestPayload(\n\tr *resource,\n) (*svcsdk.DeleteVpnConnectionInput, error) {\n\tres := &svcsdk.DeleteVpnConnectionInput{}\n\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Status.VPNConnectionID != nil {\n\t\tres.SetVpnConnectionId(*r.ko.Status.VPNConnectionID)\n\t}\n\n\treturn res, nil\n}", "func preparedeleteserviceparams(params map[string]string, deleteservice Deleteservice, Region string) {\n\tif Region != \"\" {\n\t\tparams[\"Region\"] = Region\n\t}\n\tparams[\"amztarget\"] = \"AmazonEC2ContainerServiceV20141113.DeleteService\"\n}", "func NewDeleteConditionParams() *DeleteConditionParams {\n\tvar ()\n\treturn &DeleteConditionParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewOrderDeleteParams() *OrderDeleteParams {\n\treturn &OrderDeleteParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (connection *Connection) CreateMapDeleteRequest(param ...interface{}) (request *DeleteRequest, err error) {\n\tt := reflect.TypeOf(param[0])\n\tswitch t.Kind() {\n\tcase reflect.Ptr, reflect.Struct:\n\t\tif connection.repository == nil {\n\t\t\tif connection.adabasMap != nil && connection.adabasMap.Name == inmapMapName {\n\t\t\t\t// Lock this Adabas Map for ReadRequest creation process of dynamic part\n\t\t\t\tconnection.adabasMap.lock.Lock()\n\t\t\t\tdefer connection.adabasMap.lock.Unlock()\n\t\t\t\tadatypes.Central.Log.Debugf(\"InMap used: %s\", connection.adabasMap.Name)\n\t\t\t\terr = connection.adabasMap.defineByInterface(param[0])\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\trequest, err = NewMapDeleteRequest(connection.adabasToData, connection.adabasMap)\n\t\t\t} else {\n\t\t\t\tadatypes.Central.Log.Debugf(\"No repository used: %#v\", connection.adabasToMap)\n\t\t\t\trequest, err = NewMapNameDeleteRequest(connection.adabasToMap, evaluateInterface(param[0]))\n\t\t\t}\n\t\t} else {\n\t\t\tadatypes.Central.Log.Debugf(\"With repository used: %#v\", connection.adabasMap)\n\t\t\trequest, err = NewMapNameDeleteRequestRepo(evaluateInterface(param[0]), connection.adabasToMap, connection.repository)\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif len(param) > 1 {\n\t\t\tswitch t := param[1].(type) {\n\t\t\tcase int:\n\t\t\t\tconnection.fnr = Fnr(t)\n\t\t\t\trequest.repository.Fnr = Fnr(t)\n\t\t\tcase Fnr:\n\t\t\t\tconnection.fnr = t\n\t\t\t\trequest.repository.Fnr = t\n\t\t\t}\n\t\t} else {\n\t\t\tconnection.fnr = request.adabasMap.Data.Fnr\n\t\t}\n\t\tconnection.adabasMap = request.adabasMap\n\tcase reflect.String:\n\t\tmapName := param[0].(string)\n\t\terr = connection.prepareMapUsage(mapName)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\t// if connection.repository == nil {\n\t\t// \terr = adatypes.NewGenericError(9)\n\t\t// \treturn\n\t\t// }\n\t\t// connection.repository.SearchMapInRepository(connection.adabasToMap, mapName)\n\t\tif connection.adabasMap == nil {\n\t\t\terr = adatypes.NewGenericError(8, mapName)\n\t\t\treturn\n\t\t}\n\t\tconnection.adabasToData = connection.ID.getAdabas(connection.adabasMap.URL())\n\t\t// NewAdabas(connection.adabasMap.URL(), connection.ID)\n\t\t// if err != nil {\n\t\t// \treturn\n\t\t// }\n\t\tconnection.fnr = connection.adabasMap.Data.Fnr\n\t\tadatypes.Central.Log.Debugf(\"Connection FNR=%d, Map referenced : %#v\", connection.fnr, connection.adabasMap)\n\t\trequest, err = NewMapDeleteRequest(connection.adabasToData, connection.adabasMap)\n\t}\n\treturn\n}", "func (client *DevicesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, deviceName string, options *DevicesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.HybridNetwork/devices/{deviceName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif deviceName == \"\" {\n\t\treturn nil, errors.New(\"parameter deviceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{deviceName}\", url.PathEscape(deviceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func CreateDeleteLiveDelayConfigRequest() (request *DeleteLiveDelayConfigRequest) {\n\trequest = &DeleteLiveDelayConfigRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"live\", \"2016-11-01\", \"DeleteLiveDelayConfig\", \"live\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func NewDeleteRequestBody(p *inventory.DeletePayload) *DeleteRequestBody {\n\tbody := &DeleteRequestBody{}\n\tif p.Ids != nil {\n\t\tbody.Ids = make([]string, len(p.Ids))\n\t\tfor i, val := range p.Ids {\n\t\t\tbody.Ids[i] = val\n\t\t}\n\t}\n\treturn body\n}", "func (m *MockFirewallServiceIface) NewDeleteEgressFirewallRuleParams(id string) *DeleteEgressFirewallRuleParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeleteEgressFirewallRuleParams\", id)\n\tret0, _ := ret[0].(*DeleteEgressFirewallRuleParams)\n\treturn ret0\n}", "func NewDeleteCwfNetworkIDParams() *DeleteCwfNetworkIDParams {\n\tvar ()\n\treturn &DeleteCwfNetworkIDParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *ConfigurationProfilesVersionsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, configurationProfileName string, versionName string, options *ConfigurationProfilesVersionsClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Automanage/configurationProfiles/{configurationProfileName}/versions/{versionName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif configurationProfileName == \"\" {\n\t\treturn nil, errors.New(\"parameter configurationProfileName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{configurationProfileName}\", url.PathEscape(configurationProfileName))\n\tif versionName == \"\" {\n\t\treturn nil, errors.New(\"parameter versionName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{versionName}\", url.PathEscape(versionName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-05-04\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewDeleteSubnetParams() *DeleteSubnetParams {\n\tvar ()\n\treturn &DeleteSubnetParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewRoutingAppCoveragesDeleteInstanceRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParamWithLocation(\"simple\", false, \"id\", runtime.ParamLocationPath, id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tserverURL, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\toperationPath := fmt.Sprintf(\"/v1/routingAppCoverages/%s\", pathParam0)\n\tif operationPath[0] == '/' {\n\t\toperationPath = \".\" + operationPath\n\t}\n\n\tqueryURL, err := serverURL.Parse(operationPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryURL.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (client *KeyVaultClient) deleteSecretCreateRequest(ctx context.Context, vaultBaseURL string, secretName string, options *KeyVaultClientDeleteSecretOptions) (*policy.Request, error) {\n\thost := \"{vaultBaseUrl}\"\n\thost = strings.ReplaceAll(host, \"{vaultBaseUrl}\", vaultBaseURL)\n\turlPath := \"/secrets/{secret-name}\"\n\tif secretName == \"\" {\n\t\treturn nil, errors.New(\"parameter secretName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{secret-name}\", url.PathEscape(secretName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.2\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *ProductPolicyClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, serviceName string, productID string, policyID PolicyIDName, ifMatch string, options *ProductPolicyClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ApiManagement/service/{serviceName}/products/{productId}/policies/{policyId}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif serviceName == \"\" {\n\t\treturn nil, errors.New(\"parameter serviceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{serviceName}\", url.PathEscape(serviceName))\n\tif productID == \"\" {\n\t\treturn nil, errors.New(\"parameter productID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{productId}\", url.PathEscape(productID))\n\tif policyID == \"\" {\n\t\treturn nil, errors.New(\"parameter policyID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{policyId}\", url.PathEscape(string(policyID)))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-08-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"If-Match\"] = []string{ifMatch}\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (r DeleteParametersRequest) Send() (*DeleteParametersOutput, error) {\n\terr := r.Request.Send()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn r.Request.Data.(*DeleteParametersOutput), nil\n}", "func NewParams(communityTax sdk.Dec, withdrawAddrEnabled bool) Params {\n\treturn Params{\n\t\tCommunityTax: communityTax,\n\t\tWithdrawAddrEnabled: withdrawAddrEnabled,\n\t}\n}", "func (client *GroupClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, serviceName string, groupID string, ifMatch string, options *GroupDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ApiManagement/service/{serviceName}/groups/{groupId}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif serviceName == \"\" {\n\t\treturn nil, errors.New(\"parameter serviceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{serviceName}\", url.PathEscape(serviceName))\n\tif groupID == \"\" {\n\t\treturn nil, errors.New(\"parameter groupID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{groupId}\", url.PathEscape(groupID))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-08-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"If-Match\", ifMatch)\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (s *VPCService) NewDeleteStaticRouteParams(id string) *DeleteStaticRouteParams {\n\tp := &DeleteStaticRouteParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewDeleteDataSourceParams() *DeleteDataSourceParams {\n\treturn &DeleteDataSourceParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewAPIDeleteUserParams() *APIDeleteUserParams {\n\tvar ()\n\treturn &APIDeleteUserParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (m *MockRDSAPI) DeleteDBParameterGroupRequest(arg0 *rds.DeleteDBParameterGroupInput) (*request.Request, *rds.DeleteDBParameterGroupOutput) {\n\tret := m.ctrl.Call(m, \"DeleteDBParameterGroupRequest\", arg0)\n\tret0, _ := ret[0].(*request.Request)\n\tret1, _ := ret[1].(*rds.DeleteDBParameterGroupOutput)\n\treturn ret0, ret1\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (c *Client) NewDeleteMemberRequest(ctx context.Context, path string) (*http.Request, error) {\n\tscheme := c.Scheme\n\tif scheme == \"\" {\n\t\tscheme = \"https\"\n\t}\n\tu := url.URL{Host: c.Host, Scheme: scheme, Path: path}\n\treq, err := http.NewRequest(\"DELETE\", u.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif c.JWTSigner != nil {\n\t\tif err := c.JWTSigner.Sign(req); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn req, nil\n}", "func (client *ConnectedEnvironmentsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, connectedEnvironmentName string, options *ConnectedEnvironmentsClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.App/connectedEnvironments/{connectedEnvironmentName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif connectedEnvironmentName == \"\" {\n\t\treturn nil, errors.New(\"parameter connectedEnvironmentName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{connectedEnvironmentName}\", url.PathEscape(connectedEnvironmentName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-06-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewDeleteaspecificLnpCarrierRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/lnpcarriers/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func NewDeletePacketCapturesParams() *DeletePacketCapturesParams {\n\treturn &DeletePacketCapturesParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *VirtualMachinesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, virtualMachineName string, options *VirtualMachinesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ConnectedVMwarevSphere/virtualMachines/{virtualMachineName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif virtualMachineName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualMachineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualMachineName}\", url.PathEscape(virtualMachineName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-01-10-preview\")\n\tif options != nil && options.Force != nil {\n\t\treqQP.Set(\"force\", strconv.FormatBool(*options.Force))\n\t}\n\tif options != nil && options.Retain != nil {\n\t\treqQP.Set(\"retain\", strconv.FormatBool(*options.Retain))\n\t}\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *ClustersClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, clusterName string, options *ClustersClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/serverGroupsv2/{clusterName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif clusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterName}\", url.PathEscape(clusterName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-11-08\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewDeleteaspecificCallForwardRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/callforwards/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (client *APIClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, serviceName string, apiID string, ifMatch string, options *APIClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ApiManagement/service/{serviceName}/apis/{apiId}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif serviceName == \"\" {\n\t\treturn nil, errors.New(\"parameter serviceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{serviceName}\", url.PathEscape(serviceName))\n\tif apiID == \"\" {\n\t\treturn nil, errors.New(\"parameter apiID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{apiId}\", url.PathEscape(apiID))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.DeleteRevisions != nil {\n\t\treqQP.Set(\"deleteRevisions\", strconv.FormatBool(*options.DeleteRevisions))\n\t}\n\treqQP.Set(\"api-version\", \"2022-08-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"If-Match\"] = []string{ifMatch}\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *PipelinesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, factoryName string, pipelineName string, options *PipelinesClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DataFactory/factories/{factoryName}/pipelines/{pipelineName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif factoryName == \"\" {\n\t\treturn nil, errors.New(\"parameter factoryName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{factoryName}\", url.PathEscape(factoryName))\n\tif pipelineName == \"\" {\n\t\treturn nil, errors.New(\"parameter pipelineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{pipelineName}\", url.PathEscape(pipelineName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2018-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewDeleteInstancePoolRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/instance-pool/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}" ]
[ "0.60434943", "0.59296054", "0.5857943", "0.57384163", "0.5485699", "0.5386488", "0.5357782", "0.53390664", "0.53371495", "0.5316032", "0.52751493", "0.5209321", "0.5204366", "0.5186034", "0.5159149", "0.51567405", "0.5152833", "0.51421064", "0.5136129", "0.50960743", "0.5087601", "0.50843257", "0.508345", "0.5081583", "0.5062289", "0.5045139", "0.50403786", "0.50380844", "0.5037319", "0.50356865", "0.5027572", "0.5013485", "0.5001066", "0.49949637", "0.49947757", "0.49926087", "0.4988443", "0.49861068", "0.49785817", "0.49770018", "0.49675533", "0.4957494", "0.49555182", "0.495244", "0.495244", "0.49339944", "0.4932297", "0.49314153", "0.49286887", "0.49228045", "0.49122012", "0.49024555", "0.48933503", "0.48756954", "0.48652083", "0.486372", "0.4858673", "0.48564795", "0.48446766", "0.48437175", "0.48435375", "0.48398894", "0.48352727", "0.4832227", "0.48309213", "0.48287928", "0.48238054", "0.48223457", "0.48138726", "0.48116192", "0.48037854", "0.48025206", "0.48020983", "0.4799699", "0.4792387", "0.47918972", "0.47866124", "0.4786167", "0.47859386", "0.47833723", "0.4783089", "0.47724807", "0.4771083", "0.47704524", "0.4769822", "0.4768261", "0.47639284", "0.47603956", "0.4756982", "0.4756982", "0.47545567", "0.47510543", "0.47500178", "0.4748844", "0.4746867", "0.47446018", "0.47425526", "0.47387934", "0.47371438", "0.47351798" ]
0.765884
0
Deletes a Private gateway
func (s *VPCService) DeletePrivateGateway(p *DeletePrivateGatewayParams) (*DeletePrivateGatewayResponse, error) { resp, err := s.cs.newRequest("deletePrivateGateway", p.toURLValues()) if err != nil { return nil, err } var r DeletePrivateGatewayResponse if err := json.Unmarshal(resp, &r); err != nil { return nil, err } // If we have a async client, we need to wait for the async result if s.cs.async { b, err := s.cs.GetAsyncJobResult(r.JobID, s.cs.timeout) if err != nil { if err == AsyncTimeoutErr { return &r, err } return nil, err } if err := json.Unmarshal(b, &r); err != nil { return nil, err } } return &r, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (ps *PgStore) DeleteGateway(ctx context.Context, mac lorawan.EUI64) error {\n\tres, err := ps.db.ExecContext(ctx, \"delete from gateway where mac = $1\", mac[:])\n\tif err != nil {\n\t\treturn handlePSQLError(Delete, err, \"delete error\")\n\t}\n\tra, err := res.RowsAffected()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"get rows affected error\")\n\t}\n\tif ra == 0 {\n\t\treturn errHandler.ErrDoesNotExist\n\t}\n\n\tlog.WithFields(log.Fields{\n\t\t\"id\": mac,\n\t\t\"ctx_id\": ctx.Value(logging.ContextIDKey),\n\t}).Info(\"gateway deleted\")\n\treturn nil\n}", "func (s *Stack) DeleteGateway(ref string) error {\n\treturn s.DeleteHost(ref)\n}", "func (a Gateways) DeleteGateway(processId string, gatewayId string) (*ResultSuccess, *APIResponse, error) {\n\n\tvar httpMethod = \"Delete\"\n\t// create path and map variables\n\tpath := a.Configuration.BasePath + \"/processes/{process_id}/gateways/{gateway_id}\"\n\tpath = strings.Replace(path, \"{\"+\"process_id\"+\"}\", fmt.Sprintf(\"%v\", processId), -1)\n\tpath = strings.Replace(path, \"{\"+\"gateway_id\"+\"}\", fmt.Sprintf(\"%v\", gatewayId), -1)\n\n\n\theaderParams := make(map[string]string)\n\tqueryParams := url.Values{}\n\tformParams := make(map[string]string)\n\tvar postBody interface{}\n\tvar fileName string\n\tvar fileBytes []byte\n\t// authentication '(PasswordGrant)' required\n\t// oauth required\n\tif a.Configuration.AccessToken != \"\"{\n\t\theaderParams[\"Authorization\"] = \"Bearer \" + a.Configuration.AccessToken\n\t}\n\t// add default headers if any\n\tfor key := range a.Configuration.DefaultHeader {\n\t\theaderParams[key] = a.Configuration.DefaultHeader[key]\n\t}\n\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{ \"application/vnd.api+json\", }\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := a.Configuration.APIClient.SelectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\theaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"application/vnd.api+json\",\n\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := a.Configuration.APIClient.SelectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\theaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tvar successPayload = new(ResultSuccess)\n\thttpResponse, err := a.Configuration.APIClient.CallAPI(path, httpMethod, postBody, headerParams, queryParams, formParams, fileName, fileBytes)\n\tif err != nil {\n\t\treturn successPayload, NewAPIResponse(httpResponse.RawResponse), err\n\t}\n\terr = json.Unmarshal(httpResponse.Body(), &successPayload)\n\treturn successPayload, NewAPIResponse(httpResponse.RawResponse), err\n}", "func Delete(c *drycc.Client, appID string, name string, port int, protocol string) error {\n\tu := fmt.Sprintf(\"/v2/apps/%s/gateways/\", appID)\n\n\treq := api.GatewayRemoveRequest{Name: name, Port: port, Protocol: protocol}\n\n\tbody, err := json.Marshal(req)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tres, err := c.Request(\"DELETE\", u, body)\n\tif err == nil {\n\t\tres.Body.Close()\n\t}\n\treturn err\n}", "func (gt GtwyMgr) Delete(ctx context.Context, appcontext, remoteAddress string) error {\n\tif EnvDebugOn {\n\t\tlblog.LogEvent(\"GtwyMgr\", \"Delete\", \"info\", \"start\")\n\t}\n\n\t//check the approval list\n\tq := datastore.NewQuery(gt.bc.GetConfigValue(ctx, \"EnvGtwayDsKind\")).\n\t\tNamespace(gt.bc.GetConfigValue(ctx, \"EnvGtwayDsNamespace\")).\n\t\tFilter(\"appcontext =\", appcontext).\n\t\tFilter(\"remoteaddress =\", remoteAddress).\n\t\tKeysOnly()\n\n\tvar arr []Gateway\n\tkeys, err := gt.ds.GetAll(ctx, q, &arr)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttx, err := gt.ds.NewTransaction(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err := tx.DeleteMulti(keys); err != nil {\n\t\ttx.Rollback()\n\t\treturn err\n\t}\n\n\tif _, err = tx.Commit(); err != nil {\n\t\treturn err\n\t}\n\n\tif EnvDebugOn {\n\t\tlblog.LogEvent(\"GtwyMgr\", \"Delete\", \"info\", \"end\")\n\t}\n\treturn nil\n}", "func (a *AllApiService) GatewayDeleteGateway(ctx _context.Context, body GatewayDeleteGateway) (GatewayDeleteGatewayResult, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue GatewayDeleteGatewayResult\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/gateway/deleteGateway\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &body\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 200 {\n\t\t\tvar v GatewayDeleteGatewayResult\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 400 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 500 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHttpResponse, nil\n}", "func (client StorageGatewayClient) deleteStorageGateway(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodDelete, \"/storageGateways/{storageGatewayId}\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response DeleteStorageGatewayResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "func DisconnectGateway() {\n\tglobal.DisconnectGateway()\n}", "func (w *ServerInterfaceWrapper) DeleteGatewayById(ctx echo.Context) error {\n\tvar err error\n\t// ------------- Path parameter \"gatewayId\" -------------\n\tvar gatewayId string\n\n\terr = runtime.BindStyledParameter(\"simple\", false, \"gatewayId\", ctx.Param(\"gatewayId\"), &gatewayId)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf(\"Invalid format for parameter gatewayId: %s\", err))\n\t}\n\n\t// Invoke the callback with all the unmarshalled arguments\n\terr = w.Handler.DeleteGatewayById(ctx, gatewayId)\n\treturn err\n}", "func (c *MockNatGatewaysClient) Delete(ctx context.Context, resourceGroupName, ngwName string) error {\n\t// Ignore resourceGroupName for simplicity.\n\tif _, ok := c.NGWs[ngwName]; !ok {\n\t\treturn fmt.Errorf(\"%s does not exist\", ngwName)\n\t}\n\tdelete(c.NGWs, ngwName)\n\treturn nil\n}", "func gatewayCleanup(nodeName string) error {\n\tgatewayRouter := types.GWRouterPrefix + nodeName\n\n\t// Get the gateway router port's IP address (connected to join switch)\n\tvar nextHops []net.IP\n\n\tgwIPAddrs, err := util.GetLRPAddrs(types.GWRouterToJoinSwitchPrefix + gatewayRouter)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, gwIPAddr := range gwIPAddrs {\n\t\tnextHops = append(nextHops, gwIPAddr.IP)\n\t}\n\tstaticRouteCleanup(nextHops)\n\n\t// Remove the patch port that connects join switch to gateway router\n\t_, stderr, err := util.RunOVNNbctl(\"--if-exist\", \"lsp-del\", types.JoinSwitchToGWRouterPrefix+gatewayRouter)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to delete logical switch port %s%s: \"+\n\t\t\t\"stderr: %q, error: %v\", types.JoinSwitchToGWRouterPrefix, gatewayRouter, stderr, err)\n\t}\n\n\t// Remove router to lb associations from the LBCache before removing the router\n\tlbCache, err := ovnlb.GetLBCache()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to get load_balancer cache for router %s: %v\", gatewayRouter, err)\n\t}\n\tlbCache.RemoveRouter(gatewayRouter)\n\n\t// Remove the gateway router associated with nodeName\n\t_, stderr, err = util.RunOVNNbctl(\"--if-exist\", \"lr-del\",\n\t\tgatewayRouter)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to delete gateway router %s, stderr: %q, \"+\n\t\t\t\"error: %v\", gatewayRouter, stderr, err)\n\t}\n\n\t// Remove external switch\n\texternalSwitch := types.ExternalSwitchPrefix + nodeName\n\t_, stderr, err = util.RunOVNNbctl(\"--if-exist\", \"ls-del\",\n\t\texternalSwitch)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to delete external switch %s, stderr: %q, \"+\n\t\t\t\"error: %v\", externalSwitch, stderr, err)\n\t}\n\n\texGWexternalSwitch := types.ExternalSwitchPrefix + types.ExternalSwitchPrefix + nodeName\n\t_, stderr, err = util.RunOVNNbctl(\"--if-exist\", \"ls-del\",\n\t\texGWexternalSwitch)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to delete external switch %s, stderr: %q, \"+\n\t\t\t\"error: %v\", exGWexternalSwitch, stderr, err)\n\t}\n\n\t// We don't know the gateway mode as this is running in the master, try to delete the additional local\n\t// gateway for the shared gateway mode. it will be no op if this is done for other gateway modes.\n\tdelPbrAndNatRules(nodeName, nil)\n\treturn nil\n}", "func (s *VPCService) NewDeletePrivateGatewayParams(id string) *DeletePrivateGatewayParams {\n\tp := &DeletePrivateGatewayParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (client StorageGatewayClient) DeleteStorageGateway(ctx context.Context, request DeleteStorageGatewayRequest) (response DeleteStorageGatewayResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.deleteStorageGateway, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = DeleteStorageGatewayResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = DeleteStorageGatewayResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(DeleteStorageGatewayResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into DeleteStorageGatewayResponse\")\n\t}\n\treturn\n}", "func (g *CreditCardGateway) Delete(ctx context.Context, card *CreditCard) error {\n\tresp, err := g.execute(ctx, \"DELETE\", \"payment_methods/\"+card.Token, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\tswitch resp.StatusCode {\n\tcase 200:\n\t\treturn nil\n\t}\n\treturn &invalidResponseError{resp}\n}", "func deleteRoute(ip *net.IPNet) error {\n\tcmd := exec.Command(\"route\", \"delete\", ip.String())\n\treturn cmd.Run()\n}", "func Delete(c *eclcloud.ServiceClient, commonFunctionGatewayID string) (r DeleteResult) {\n\t_, r.Err = c.Delete(deleteURL(c, commonFunctionGatewayID), nil)\n\treturn\n}", "func (hd *Datapath) DeleteRoute(rt *netproto.Route, vrf *netproto.Vrf) error {\n\t// This will ensure that only one datapath config will be active at a time. This is a temporary restriction\n\t// to ensure that HAL will use a single config thread , this will be removed prior to FCS to allow parallel configs to go through.\n\t// TODO Remove Global Locking\n\thd.Lock()\n\tdefer hd.Unlock()\n\tvrfKey := &halproto.VrfKeyHandle{\n\t\tKeyOrHandle: &halproto.VrfKeyHandle_VrfId{\n\t\t\tVrfId: vrf.Status.VrfID,\n\t\t},\n\t}\n\n\t// Build next hop key\n\tnextHopKey := &halproto.NexthopKeyHandle{\n\t\tKeyOrHandle: &halproto.NexthopKeyHandle_NexthopId{\n\t\t\tNexthopId: rt.Status.RouteID,\n\t\t},\n\t}\n\n\t// Build route key\n\tip, net, err := net.ParseCIDR(rt.Spec.IPPrefix)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error parsing the IP Prefix mask from %v. Err: %v\", rt.Spec.IPPrefix, err)\n\n\t}\n\tprefixLen, _ := net.Mask.Size()\n\tipPrefix := &halproto.IPPrefix{\n\t\tAddress: &halproto.IPAddress{\n\t\t\tIpAf: halproto.IPAddressFamily_IP_AF_INET,\n\t\t\tV4OrV6: &halproto.IPAddress_V4Addr{\n\t\t\t\tV4Addr: ipv4Touint32(ip),\n\t\t\t},\n\t\t},\n\t\tPrefixLen: uint32(prefixLen),\n\t}\n\n\trouteKey := &halproto.RouteKeyHandle{\n\t\tKeyOrHandle: &halproto.RouteKeyHandle_RouteKey{\n\t\t\tRouteKey: &halproto.RouteKey{\n\t\t\t\tVrfKeyHandle: vrfKey,\n\t\t\t\tIpPrefix: ipPrefix,\n\t\t\t},\n\t\t},\n\t}\n\n\tnhDelReq := &halproto.NexthopDeleteRequestMsg{\n\t\tRequest: []*halproto.NexthopDeleteRequest{\n\t\t\t{\n\t\t\t\tKeyOrHandle: nextHopKey,\n\t\t\t},\n\t\t},\n\t}\n\n\trtDelReq := &halproto.RouteDeleteRequestMsg{\n\t\tRequest: []*halproto.RouteDeleteRequest{\n\t\t\t{\n\t\t\t\tKeyOrHandle: routeKey,\n\t\t\t},\n\t\t},\n\t}\n\n\t// delete hal objects\n\tif hd.Kind == \"hal\" {\n\t\t// delete route\n\t\trtResp, err := hd.Hal.Netclient.RouteDelete(context.Background(), rtDelReq)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error deleting route. Err: %v\", err)\n\t\t\treturn err\n\t\t}\n\t\tif rtResp.Response[0].ApiStatus != halproto.ApiStatus_API_STATUS_OK {\n\t\t\tlog.Errorf(\"HAL returned non OK status. %v\", rtResp.Response[0].ApiStatus.String())\n\t\t\treturn fmt.Errorf(\"HAL returned non OK status. %v\", rtResp.Response[0].ApiStatus.String())\n\t\t}\n\n\t\t// delete next hop\n\t\tnhResp, err := hd.Hal.Netclient.NexthopDelete(context.Background(), nhDelReq)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error deleting next hop. Err: %v\", err)\n\t\t\treturn err\n\t\t}\n\t\tif nhResp.Response[0].ApiStatus != halproto.ApiStatus_API_STATUS_OK {\n\t\t\tlog.Errorf(\"HAL returned non OK status. %v\", nhResp.Response[0].ApiStatus.String())\n\t\t\treturn fmt.Errorf(\"HAL returned non OK status. %v\", nhResp.Response[0].ApiStatus.String())\n\t\t}\n\t} else {\n\t\t_, err := hd.Hal.Netclient.RouteDelete(context.Background(), rtDelReq)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error creating route. Err: %v\", err)\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "func (instance *Host) Delete(ctx context.Context) (ferr fail.Error) {\n\tdefer fail.OnPanic(&ferr)\n\n\tdefer func() {\n\t\t// drop the cache when we are done creating the cluster\n\t\tif ka, err := instance.Service().GetCache(context.Background()); err == nil {\n\t\t\tif ka != nil {\n\t\t\t\t_ = ka.Clear(context.Background())\n\t\t\t}\n\t\t}\n\t}()\n\n\tif valid.IsNil(instance) {\n\t\treturn fail.InvalidInstanceError()\n\t}\n\tif ctx == nil {\n\t\treturn fail.InvalidParameterCannotBeNilError(\"ctx\")\n\t}\n\n\txerr := instance.Inspect(ctx, func(clonable data.Clonable, props *serialize.JSONProperties) fail.Error {\n\t\t// Do not remove a Host that is a gateway\n\t\treturn props.Inspect(hostproperty.NetworkV2, func(clonable data.Clonable) fail.Error {\n\t\t\thostNetworkV2, ok := clonable.(*propertiesv2.HostNetworking)\n\t\t\tif !ok {\n\t\t\t\treturn fail.InconsistentError(\"'*propertiesv2.HostNetworking' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t}\n\n\t\t\tif hostNetworkV2.IsGateway {\n\t\t\t\treturn fail.NotAvailableError(\"cannot delete Host, it's a gateway that can only be deleted through its Subnet\")\n\t\t\t}\n\t\t\treturn nil\n\t\t})\n\t})\n\txerr = debug.InjectPlannedFail(xerr)\n\tif xerr != nil {\n\t\treturn xerr\n\t}\n\n\txerr = instance.RelaxedDeleteHost(cleanupContextFrom(ctx))\n\treturn xerr\n}", "func (s *Handler) RemoveGateway(ctx context.Context, req *api.RemoveGatewayRequest) (*api.EmptyResponse, error) {\n\tif err := s.DaemonService.RemoveGateway(req.GatewayUri); err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\treturn &api.EmptyResponse{}, nil\n}", "func (n *NetworkServiceHandler) Delete(ctx context.Context, networkID string) error {\n\turi := \"/v1/network/destroy\"\n\n\tvalues := url.Values{\n\t\t\"NETWORKID\": {networkID},\n\t}\n\n\treq, err := n.client.NewRequest(ctx, http.MethodPost, uri, values)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = n.client.DoWithContext(ctx, req, nil)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (client WorkloadNetworksClient) DeleteDhcpResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusAccepted, http.StatusNoContent),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func (c *client) Delete(ctx context.Context, group, name string) error {\n\tvnet, err := c.Get(ctx, group, name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif len(*vnet) == 0 {\n\t\treturn fmt.Errorf(\"Virtual Network [%s] not found\", name)\n\t}\n\n\trequest, err := getVirtualNetworkRequest(wssdcloudcommon.Operation_DELETE, group, name, &(*vnet)[0])\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, err = c.VirtualNetworkAgentClient.Invoke(ctx, request)\n\n\treturn err\n}", "func (r DeleteGatewayGroupRequest) Send(ctx context.Context) (*DeleteGatewayGroupResponse, error) {\n\tr.Request.SetContext(ctx)\n\terr := r.Request.Send()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp := &DeleteGatewayGroupResponse{\n\t\tDeleteGatewayGroupOutput: r.Request.Data.(*DeleteGatewayGroupOutput),\n\t\tresponse: &aws.Response{Request: r.Request},\n\t}\n\n\treturn resp, nil\n}", "func (g *Group) DELETE(path string, h Handler, gases ...Gas) {\n\tg.Air.DELETE(g.Prefix+path, h, append(g.Gases, gases...)...)\n}", "func (s *FrontendServer) Del(ctx context.Context, req *pb.DeleteRequest) (*pb.DeleteResponse, error) {\n\tvar returnErr error = nil\n\tvar err error\n\tvar returnRes *pb.DeleteResponse\n\t// var res *clientv3.DeleteResponse\n\tkey := req.GetKey()\n\tctx, cancel := context.WithTimeout(context.Background(), time.Second)\n\tdefer cancel()\n\tswitch req.GetType() {\n\tcase utils.LocalData:\n\t\t_, err = s.localSt.Delete(ctx, key)\n\tcase utils.GlobalData:\n\t\tisHashed := req.GetIsHashed()\n\t\tif s.gateway == nil {\n\t\t\treturn returnRes, fmt.Errorf(\"Del request failed: gateway node not initialized at the edge\")\n\t\t}\n\t\tstate, err := s.gateway.GetStateRPC()\n\t\tif err != nil {\n\t\t\treturn returnRes, fmt.Errorf(\"failed to get state of gateway node\")\n\t\t}\n\t\tif state < dht.Ready { // could happen if gateway node was created but didnt join dht\n\t\t\treturn returnRes, fmt.Errorf(\"edge node %s not connected to dht yet or gateway node not ready\", s.print())\n\t\t}\n\t\tif !isHashed {\n\t\t\tkey = s.gateway.Conf.IDFunc(key)\n\t\t}\n\t\tans, er := s.gateway.CanStoreRPC(key)\n\t\tif er != nil {\n\t\t\tlog.Fatalf(\"Delete request failed: communication with gateway node failed\")\n\t\t}\n\t\tif ans {\n\t\t\t_, err = s.globalSt.Delete(ctx, key)\n\t\t} else {\n\t\t\terr = s.gateway.DelKVRPC(key)\n\t\t}\n\t}\n\t// cancel() // as given in etcd docs, wouldnt do harm anyway\n\treturnErr = checkError(err)\n\tif returnErr == nil {\n\t\treturnRes = &pb.DeleteResponse{Status: utils.KVDeleted}\n\t}\n\t// TODO: we can check these keys to decide if the key was not found or actually deleted\n\t// but not really important for now\n\t// Todo: find out this: can the key be not deleted and returnErr still be nil?\n\t// \tif res.Deleted < 1 {\n\t// \t\treturnRes = &pb.DeleteResponse{Status: utils.KeyNotFound}\n\t// \t} else {\n\t// \t\treturnRes = &pb.DeleteResponse{Status: utils.KVDeleted}\n\t// \t}\n\t// } else {\n\t// \treturnRes = &pb.DeleteResponse{Status: utils.UnknownError}\n\t// }\n\treturn returnRes, returnErr\n}", "func (t *TextileNode) StopGateway() error {\n\tcgCtx, cancelCGW := context.WithCancel(context.Background())\n\tif err := t.gateway.Shutdown(cgCtx); err != nil {\n\t\tlog.Errorf(\"error shutting down gateway: %s\", err)\n\t\treturn err\n\t}\n\tcancelCGW()\n\treturn nil\n}", "func (_ERC721 *ERC721Transactor) RemoveGateway(opts *bind.TransactOpts, _gateway common.Address) (*types.Transaction, error) {\n\treturn _ERC721.contract.Transact(opts, \"removeGateway\", _gateway)\n}", "func (h networkHandler) deleteNetworkHandler(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tclusterProvider := vars[\"provider-name\"]\n\tcluster := vars[\"cluster-name\"]\n\tname := vars[\"name\"]\n\n\terr := h.client.DeleteNetwork(name, clusterProvider, cluster)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusNoContent)\n}", "func (r *DOSProfileDOSNetworkResource) Delete(id string) error {\n\tif err := r.c.ModQuery(\"DELETE\", BasePath+DOSProfileDOSNetworkEndpoint+\"/\"+id, nil); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (c *FortiSDKClient) DeleteNetworkingInterfaceDHCP(mkey string) (err error) {\n\tlogPrefix := \"DeleteNetworkingInterfaceDHCP - \"\n\tHTTPMethod := \"DELETE\"\n\tpath := \"/api/v2/cmdb/system.dhcp/server\"\n\tpath += \"/\" + EscapeURLString(mkey)\n\n\treq := c.NewRequest(HTTPMethod, path, nil, nil)\n\terr = req.Send()\n\tif err != nil || req.HTTPResponse == nil {\n\t\terr = fmt.Errorf(\"cannot send request %s\", err)\n\t\treturn\n\t}\n\n\tbody, err := ioutil.ReadAll(req.HTTPResponse.Body)\n\tif err != nil || body == nil {\n\t\terr = fmt.Errorf(\"cannot get response body %s\", err)\n\t\treturn\n\t}\n\n\tvar result map[string]interface{}\n\tjson.Unmarshal([]byte(string(body)), &result)\n\n\treq.HTTPResponse.Body.Close()\n\n\tlog.Printf(logPrefix+\"Path called %s\", path)\n\tlog.Printf(logPrefix+\"FortiOS response: %s\", string(body))\n\n\tif result != nil {\n\t\tif result[\"status\"] == nil {\n\t\t\terr = fmt.Errorf(\"cannot get status from the response\")\n\t\t\treturn\n\t\t}\n\n\t\tif result[\"status\"] != \"success\" {\n\t\t\tif result[\"error\"] != nil {\n\t\t\t\terr = fmt.Errorf(\"status is %s and error no is %.0f\", result[\"status\"], result[\"error\"])\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"status is %s and error no is not found\", result[\"status\"])\n\t\t\t}\n\n\t\t\tif result[\"http_status\"] != nil {\n\t\t\t\terr = fmt.Errorf(\"%s, details: %s\", err, util.HttpStatus2Str(int(result[\"http_status\"].(float64))))\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"%s, and http_status no is not found\", err)\n\t\t\t}\n\n\t\t\treturn\n\t\t}\n\n\t} else {\n\t\terr = fmt.Errorf(\"cannot get the right response\")\n\t\treturn\n\t}\n\n\treturn\n}", "func (c *MockPublicIPAddressesClient) Delete(ctx context.Context, scope, publicIPAddressName string) error {\n\t// Ignore scope for simplicity.\n\tif _, ok := c.PubIPs[publicIPAddressName]; !ok {\n\t\treturn fmt.Errorf(\"%s does not exist\", publicIPAddressName)\n\t}\n\tdelete(c.PubIPs, publicIPAddressName)\n\treturn nil\n}", "func Delete(c *gophercloud.ServiceClient, networkID string) os.DeleteResult {\n\treturn os.Delete(c, networkID)\n}", "func (vdc *Vdc) DeleteOpenApiOrgVdcNetworkDhcp(orgNetworkId string) error {\n\tendpoint := types.OpenApiPathVersion1_0_0 + types.OpenApiEndpointOrgVdcNetworksDhcp\n\tapiVersion, err := vdc.client.getOpenApiHighestElevatedVersion(endpoint)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif orgNetworkId == \"\" {\n\t\treturn fmt.Errorf(\"cannot delete Org VDC network DHCP configuration without ID\")\n\t}\n\n\turlRef, err := vdc.client.OpenApiBuildEndpoint(fmt.Sprintf(endpoint, orgNetworkId))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = vdc.client.OpenApiDeleteItem(apiVersion, urlRef, nil, nil)\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error deleting Org VDC network DHCP configuration: %s\", err)\n\t}\n\n\treturn nil\n}", "func DeleteVirtualNetworkSubnet() {}", "func DeleteVirtualNetworkSubnet() {}", "func DHCPDelete(ifname LinkID) error {\n\tif isUnmanaged(UnmanagedID(ifname), LINKTYPE) {\n\t\treturn NewUnmanagedLinkDHCPCannotBeModifiedError(ifname)\n\t}\n\tout, err := exec.Command(prefixInstallPAth+\"dhcp_stop.sh\", string(ifname)).Output()\n\tif err != nil {\n\t\treturn NewCannotStopDHCPError(ifname, err)\n\t}\n\tif string(out) == \"Service not running\" {\n\t\treturn NewDHCPRunningNotFoundError(ifname)\n\t}\n\treturn nil\n}", "func (o *Address) DeleteG() error {\n\tif o == nil {\n\t\treturn errors.New(\"sqlboiler: no Address provided for deletion\")\n\t}\n\n\treturn o.Delete(boil.GetDB())\n}", "func (pcc *PccClient) DeleteRadosGW(id uint64) (deleted ceph.RadosGateway, err error) {\n\terr = pcc.Delete(fmt.Sprintf(\"pccserver/v2/storage/ceph/rgws/%d\", id), nil, &deleted)\n\treturn\n}", "func (f *Forwarder) Delete(id userid.ID) {\n\tif _, loaded := f.transferAgents.LoadAndDelete(id); loaded {\n\t\tf.connections -= 1\n\t}\n}", "func (o *BlackCard) DeleteG() error {\n\tif o == nil {\n\t\treturn errors.New(\"models: no BlackCard provided for deletion\")\n\t}\n\n\treturn o.Delete(boil.GetDB())\n}", "func (m *MockGatewaySet) Delete(gateway ezkube.ResourceId) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"Delete\", gateway)\n}", "func Delete(c *gophercloud.ServiceClient, floatingIpId string, pfId string) (r DeleteResult) {\n\t_, r.Err = c.Delete(singlePortForwardingUrl(c, floatingIpId, pfId), nil)\n\treturn\n}", "func (ih *InternshipHandler) DeleteInternship(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\tid, err := strconv.Atoi(ps.ByName(\"id\"))\n\n\tif err != nil {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\t_, errs := ih.internshipService.DeleteInternship(uint(id))\n\n\tif len(errs) > 0 {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusNoContent)\n\treturn\n}", "func (*DeleteGatewayRequest) Descriptor() ([]byte, []int) {\n\treturn file_yandex_cloud_vpc_v1_gateway_service_proto_rawDescGZIP(), []int{10}\n}", "func DeleteRecord(request *protos.DeleteRecordRequest) error {\n\tif len(request.GetId()) == 0 {\n\t\treturn fmt.Errorf(\"Empty ID\")\n\t}\n\tclient, err := GetGatewayDirectorydClient()\n\tif err != nil {\n\t\treturn err\n\t}\n\trequest.Id = PrependImsiPrefix(request.GetId())\n\t_, err = client.DeleteRecord(context.Background(), request)\n\tif err != nil {\n\t\tglog.Error(err)\n\t}\n\treturn err\n}", "func (directLinkProvider *DirectLinkProviderV2) DeleteProviderGateway(deleteProviderGatewayOptions *DeleteProviderGatewayOptions) (result *ProviderGateway, response *core.DetailedResponse, err error) {\n\treturn directLinkProvider.DeleteProviderGatewayWithContext(context.Background(), deleteProviderGatewayOptions)\n}", "func (p *Portal) Delete(server *Server) (*http.Response, error) {\n\tendpoint := fmt.Sprintf(\"/api/v1.0/services/iscsi/portal/%d/\", p.ID)\n\tresp, err := server.getSlingConnection().Delete(endpoint).Receive(nil, nil)\n\tif err != nil {\n\t\tglog.Warningln(err)\n\t}\n\treturn resp, err\n}", "func (api *API) DeletePayFwd(id string) (err error) {\n\tu, err := api.buildURL(\"/payments/\"+id, nil)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = deleteResponse(u)\n\treturn\n}", "func DeleteMultiHop(exec executor.Executor, execnet, tonet, routingTable string, ref map[string]NetworkSettings) error {\n\tlocalNetGW, ok := ref[execnet]\n\tif !ok {\n\t\treturn fmt.Errorf(\"network %s not found in %v\", execnet, ref)\n\t}\n\n\texternalNet, ok := ref[tonet]\n\tif !ok {\n\t\treturn fmt.Errorf(\"network %s not found in %v\", tonet, ref)\n\t}\n\n\terr := routes.Delete(exec, fmt.Sprintf(\"%s/%d\", externalNet.IPAddress, externalNet.IPPrefixLen), localNetGW.IPAddress, routingTable)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = routes.Delete(exec, fmt.Sprintf(\"%s/%d\", externalNet.GlobalIPv6Address, externalNet.GlobalIPv6PrefixLen), localNetGW.GlobalIPv6Address, routingTable)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (_ERC721 *ERC721TransactorSession) RemoveGateway(_gateway common.Address) (*types.Transaction, error) {\n\treturn _ERC721.Contract.RemoveGateway(&_ERC721.TransactOpts, _gateway)\n}", "func deleteHyperShiftVPC(workingDir string) error {\n\tctx := context.Background()\n\n\ttf, err := terraform.New(workingDir)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer func() {\n\t\t_ = tf.Uninstall(ctx)\n\t}()\n\n\terr = tf.Init(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.Println(\"Deleting ROSA HyperShift aws vpc\")\n\n\terr = callAndSetAWSSession(func() error {\n\t\treturn tf.Destroy(\n\t\t\tctx,\n\t\t\ttfexec.Var(fmt.Sprintf(\"aws_region=%s\", viper.GetString(config.AWSRegion))),\n\t\t\ttfexec.Var(fmt.Sprintf(\"cluster_name=%s\", viper.GetString(config.Cluster.Name))),\n\t\t)\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.Println(\"ROSA HyperShift aws vpc deleted!\")\n\n\treturn nil\n}", "func (s *Service) Delete(ctx context.Context) error {\n\tctx, _, done := tele.StartSpanWithLogger(ctx, \"privatedns.Service.Delete\")\n\tdefer done()\n\n\tctx, cancel := context.WithTimeout(ctx, reconciler.DefaultAzureServiceReconcileTimeout)\n\tdefer cancel()\n\n\tzoneSpec, links, _ := s.Scope.PrivateDNSSpec()\n\tif zoneSpec == nil {\n\t\treturn nil\n\t}\n\n\tmanaged, err := s.deleteLinks(ctx, links)\n\tif managed {\n\t\ts.Scope.UpdateDeleteStatus(infrav1.PrivateDNSLinkReadyCondition, serviceName, err)\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tmanaged, err = s.deleteZone(ctx, zoneSpec)\n\tif managed {\n\t\ts.Scope.UpdateDeleteStatus(infrav1.PrivateDNSZoneReadyCondition, serviceName, err)\n\t\ts.Scope.UpdateDeleteStatus(infrav1.PrivateDNSRecordReadyCondition, serviceName, err)\n\t}\n\n\treturn err\n}", "func DelNetwork(c *check.C, cname string) (*http.Response, error) {\n\treturn request.Delete(\"/networks/\" + cname)\n}", "func (f GatewayFilter) Delete(ctx context.Context, db *mongo.Database) error {\n\tcol := db.Collection(GatewayCollection)\n\tif f == nil {\n\t\tf = GatewayFilter{}\n\t}\n\t_, err := col.DeleteOne(ctx, f, options.Delete())\n\treturn err\n}", "func (asg *Asg) Delete() error {\n\treturn cloudprovider.ErrNotImplemented\n}", "func (client WorkloadNetworksClient) DeleteDhcpSender(req *http.Request) (future WorkloadNetworksDeleteDhcpFuture, err error) {\n\tvar resp *http.Response\n\tresp, err = client.Send(req, azure.DoRetryWithRegistration(client.Client))\n\tif err != nil {\n\t\treturn\n\t}\n\tvar azf azure.Future\n\tazf, err = azure.NewFutureFromResponse(resp)\n\tfuture.FutureAPI = &azf\n\tfuture.Result = func(client WorkloadNetworksClient) (ar autorest.Response, err error) {\n\t\tvar done bool\n\t\tdone, err = future.DoneWithContext(context.Background(), client)\n\t\tif err != nil {\n\t\t\terr = autorest.NewErrorWithError(err, \"avs.WorkloadNetworksDeleteDhcpFuture\", \"Result\", future.Response(), \"Polling failure\")\n\t\t\treturn\n\t\t}\n\t\tif !done {\n\t\t\terr = azure.NewAsyncOpIncompleteError(\"avs.WorkloadNetworksDeleteDhcpFuture\")\n\t\t\treturn\n\t\t}\n\t\tar.Response = future.Response()\n\t\treturn\n\t}\n\treturn\n}", "func (o *APIKey) DeleteG() error {\n\tif o == nil {\n\t\treturn errors.New(\"models: no APIKey provided for deletion\")\n\t}\n\n\treturn o.Delete(boil.GetDB())\n}", "func (ec2 *EC2) DeleteNetworkInterface(id string) (resp *SimpleResp, err error) {\n\tparams := makeParams(\"DeleteNetworkInterface\")\n\tparams[\"NetworkInterfaceId\"] = id\n\tresp = &SimpleResp{}\n\terr = ec2.query(params, resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn resp, nil\n}", "func (m Manager) DeleteServiceInstanceDetailsG(instanceID string) error {\n\treturn m.db.Delete(&ServiceInstance{ID: instanceID})\n}", "func DeleteGuest(resp http.ResponseWriter, req *http.Request, db *sql.DB) {\n\t// Get the request parameters\n\tparams := mux.Vars(req)\n\n\t// Retrieve name from params. Here, the space in the name will be given as + in the REST API url.\n\t// Hence, we replace \"+\" in guest name with \" \".\n\tguestName := strings.Replace(params[\"name\"], \"+\", \" \", -1)\n\n\t// Deleting guest from the guest list\n\terrDB := databse.DeleteGuestFromList(db, guestName)\n\tif errDB != nil {\n\t\tencodeResponse(resp, map[string]string{\"error\": errDB.Error()}, http.StatusBadRequest)\n\t\treturn\n\t}\n\t// Encode the response\n\tencodeResponse(resp, errDB, http.StatusNoContent)\n}", "func DeleteClient(nbmaster string, httpClient *http.Client, jwt string) {\r\n fmt.Printf(\"\\nSending a DELETE request to delete client %s from policy %s...\\n\", testClientName, testPolicyName)\r\n\r\n uri := \"https://\" + nbmaster + \":\" + port + \"/netbackup/\" + policiesUri + testPolicyName + \"/clients/\" + testClientName\r\n\r\n request, _ := http.NewRequest(http.MethodDelete, uri, nil)\r\n request.Header.Add(\"Authorization\", jwt);\r\n\r\n response, err := httpClient.Do(request)\r\n\r\n if err != nil {\r\n fmt.Printf(\"The HTTP request failed with error: %s\\n\", err)\r\n panic(\"Unable to delete client.\\n\")\r\n } else {\r\n if response.StatusCode != 204 {\r\n printErrorResponse(response)\r\n } else {\r\n fmt.Printf(\"%s deleted successfully.\\n\", testClientName);\r\n }\r\n }\r\n}", "func (endpoint *HNSEndpoint) Delete() (*HNSEndpoint, error) {\n\toperation := \"Delete\"\n\ttitle := \"hcsshim::HNSEndpoint::\" + operation\n\tlogrus.Debugf(title+\" id=%s\", endpoint.Id)\n\n\treturn HNSEndpointRequest(\"DELETE\", endpoint.Id, \"\")\n}", "func (_ERC721 *ERC721Session) RemoveGateway(_gateway common.Address) (*types.Transaction, error) {\n\treturn _ERC721.Contract.RemoveGateway(&_ERC721.TransactOpts, _gateway)\n}", "func (plugin *Plugin) Del(args *cniSkel.CmdArgs) error {\n\t// Parse network configuration.\n\tnetConfig, err := config.New(args)\n\tif err != nil {\n\t\tlog.Errorf(\"Failed to parse netconfig from args: %v.\", err)\n\t\treturn err\n\t}\n\n\tlog.Infof(\"Executing DEL with netconfig: %+v ContainerID:%v Netns:%v IfName:%v Args:%v.\",\n\t\tnetConfig, args.ContainerID, args.Netns, args.IfName, args.Args)\n\n\tvar vpcENI *eni.ENI\n\t// If existing network is to be used then ENI is not required.\n\tif !netConfig.UseExistingNetwork {\n\t\t// Find the ENI.\n\t\tvpcENI, err = eni.NewENI(args.IfName, netConfig.ENIMACAddress)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Failed to find ENI %s: %v.\", netConfig.ENIName, err)\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Call operating system specific handler.\n\tnb := plugin.nb\n\n\tnw := network.Network{\n\t\tName: netConfig.Name,\n\t\tENI: vpcENI,\n\t\tUseExisting: netConfig.UseExistingNetwork,\n\t}\n\n\tep := network.Endpoint{\n\t\tContainerID: args.ContainerID,\n\t\tNetNSName: args.Netns,\n\t\tIPAddresses: netConfig.ENIIPAddresses,\n\t\tMACAddress: netConfig.ENIMACAddress,\n\t}\n\n\terr = nb.DeleteEndpoint(&nw, &ep)\n\tif err != nil {\n\t\t// DEL is best-effort. Log and ignore the failure.\n\t\tlog.Errorf(\"Failed to delete endpoint, ignoring: %v.\", err)\n\t}\n\n\t// Do not delete pre-existing networks.\n\tif !nw.UseExisting {\n\t\terr = nb.DeleteNetwork(&nw)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Failed to delete network: %v.\", err)\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "func deleteStorageProfile(masterIp string, sshClientConfig *ssh.ClientConfig,\n\tstoragePolicyName string, clientIndex int) error {\n\tremoveStoragePolicy := govcLoginCmdForMultiVC(clientIndex) +\n\t\t\"govc storage.policy.rm \" + storagePolicyName\n\tframework.Logf(\"Remove storage policy: %s \", removeStoragePolicy)\n\tremoveStoragePolicytRes, err := sshExec(sshClientConfig, masterIp, removeStoragePolicy)\n\tif err != nil && removeStoragePolicytRes.Code != 0 {\n\t\tfssh.LogResult(removeStoragePolicytRes)\n\t\treturn fmt.Errorf(\"couldn't execute command: %s on host: %v , error: %s\",\n\t\t\tremoveStoragePolicy, masterIp, err)\n\t}\n\treturn nil\n}", "func (bgpNeighbor *EdgeBgpNeighbor) Delete() error {\n\tclient := bgpNeighbor.client\n\tendpoint := types.OpenApiPathVersion1_0_0 + types.OpenApiEndpointEdgeBgpNeighbor\n\tapiVersion, err := client.getOpenApiHighestElevatedVersion(endpoint)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Insert Edge Gateway ID into endpoint path\n\turlRef, err := client.OpenApiBuildEndpoint(fmt.Sprintf(endpoint, bgpNeighbor.edgeGatewayId), bgpNeighbor.EdgeBgpNeighbor.ID)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = client.OpenApiDeleteItem(apiVersion, urlRef, nil, nil)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error deleting NSX-T Edge Gateway BGP Neighbor: %s\", err)\n\t}\n\n\treturn nil\n}", "func (s *ShrikeServer) DeleteRoute(w http.ResponseWriter, req *http.Request) {\n\troute := chi.URLParam(req, \"route\")\n\tif route == \"\" {\n\t\tlog.WithField(\"Route\", route).Info(\"Route must be the name of one of the proxy paths.\")\n\t\tRespondWithError(w, http.StatusBadRequest, JSONError{\n\t\t\tStatus: \"Bad Request\",\n\t\t\tMessage: \"Route must be the name of one of the proxy paths.\",\n\t\t})\n\t\treturn\n\t}\n\n\tproxy, err := s.client.Proxy(route)\n\tif err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"Route\": route,\n\t\t\t\"err\": err,\n\t\t}).Info(\"Error getting proxy to delete\")\n\t\tRespondWithError(w, http.StatusGone, JSONError{\n\t\t\tStatus: \"No Proxy\",\n\t\t\tMessage: \"No proxy by that name to remove.\",\n\t\t})\n\t\treturn\n\t}\n\terr = proxy.Delete()\n\tif err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"Route\": route,\n\t\t\t\"err\": err,\n\t\t}).Error(\"Error deleting a proxy\")\n\t\tRespondWithError(w, http.StatusInternalServerError, JSONError{\n\t\t\tStatus: \"Server Error\",\n\t\t\tMessage: \"Could not delete the proxy.\",\n\t\t})\n\t\treturn\n\t}\n\n\ts.ProxyStore.Delete(proxy)\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusNoContent)\n}", "func (orgVdcNet *OpenApiOrgVdcNetwork) DeletNetworkDhcp() error {\n\tendpoint := types.OpenApiPathVersion1_0_0 + types.OpenApiEndpointOrgVdcNetworksDhcp\n\tapiVersion, err := orgVdcNet.client.getOpenApiHighestElevatedVersion(endpoint)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif orgVdcNet.OpenApiOrgVdcNetwork.ID == \"\" {\n\t\treturn fmt.Errorf(\"cannot delete Org VDC network DHCP configuration without ID\")\n\t}\n\n\turlRef, err := orgVdcNet.client.OpenApiBuildEndpoint(fmt.Sprintf(endpoint, orgVdcNet.OpenApiOrgVdcNetwork.ID))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = orgVdcNet.client.OpenApiDeleteItem(apiVersion, urlRef, nil, nil)\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error deleting Org VDC network DHCP configuration: %s\", err)\n\t}\n\n\treturn nil\n}", "func (hd *Datapath) DeleteNatPool(np *netproto.NatPool, vrf *netproto.Vrf) error {\n\t// This will ensure that only one datapath config will be active at a time. This is a temporary restriction\n\t// to ensure that HAL will use a single config thread , this will be removed prior to FCS to allow parallel configs to go through.\n\t// TODO Remove Global Locking\n\thd.Lock()\n\tdefer hd.Unlock()\n\tvrfKey := &halproto.VrfKeyHandle{\n\t\tKeyOrHandle: &halproto.VrfKeyHandle_VrfId{\n\t\t\tVrfId: vrf.Status.VrfID,\n\t\t},\n\t}\n\n\t// Build Nat Pool Key\n\tnatPoolKey := &halproto.NatPoolKeyHandle{\n\t\tKeyOrHandle: &halproto.NatPoolKeyHandle_PoolKey{\n\t\t\tPoolKey: &halproto.NatPoolKey{\n\t\t\t\tVrfKh: vrfKey,\n\t\t\t\tPoolId: np.Status.NatPoolID,\n\t\t\t},\n\t\t},\n\t}\n\n\tnpDelReq := &halproto.NatPoolDeleteRequestMsg{\n\t\tRequest: []*halproto.NatPoolDeleteRequest{\n\t\t\t{\n\t\t\t\tKeyOrHandle: natPoolKey,\n\t\t\t},\n\t\t},\n\t}\n\n\t// delete hal objects\n\tif hd.Kind == \"hal\" {\n\t\t// delete route\n\t\tresp, err := hd.Hal.Natclient.NatPoolDelete(context.Background(), npDelReq)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error deleting nat pool. Err: %v\", err)\n\t\t\treturn err\n\t\t}\n\t\tif resp.Response[0].ApiStatus != halproto.ApiStatus_API_STATUS_OK {\n\t\t\tlog.Errorf(\"HAL returned non OK status. %v\", resp.Response[0].ApiStatus.String())\n\t\t\treturn fmt.Errorf(\"HAL returned non OK status. %v\", resp.Response[0].ApiStatus.String())\n\t\t}\n\n\t} else {\n\t\t_, err := hd.Hal.Natclient.NatPoolDelete(context.Background(), npDelReq)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error deleting nat pool. Err: %v\", err)\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func (a *NetworkServerAPI) Delete(ctx context.Context, req *pb.DeleteNetworkServerRequest) (*pb.DeleteNetworkServerResponse, error) {\n\tif err := a.validator.Validate(ctx,\n\t\tauth.ValidateNetworkServerAccess(auth.Delete, req.Id),\n\t); err != nil {\n\t\treturn nil, grpc.Errorf(codes.Unauthenticated, \"authentication failed: %s\", err)\n\t}\n\n\terr := storage.Transaction(config.C.PostgreSQL.DB, func(tx sqlx.Ext) error {\n\t\treturn storage.DeleteNetworkServer(tx, req.Id)\n\t})\n\tif err != nil {\n\t\treturn nil, errToRPCError(err)\n\t}\n\n\treturn &pb.DeleteNetworkServerResponse{}, nil\n}", "func DHCPsDelete() error {\n\tdhcps, err := DHCPsGet()\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor _, d := range dhcps {\n\t\tif isUnmanaged(UnmanagedID(d.Ifname), LINKTYPE) {\n\t\t\tlogger.Log.Info(fmt.Sprintf(\"Skipping Unmanaged Link %v DHCP configuration\", d.Ifname))\n\t\t\tcontinue\n\t\t}\n\t\terr = DHCPDelete(d.Ifname)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func (h *Handler) deleteDeveloper(c *gin.Context) handlerResponse {\n\n\tdeveloper, err := h.service.Developer.Delete(c.Param(developerParameter), h.who(c))\n\tif err != nil {\n\t\treturn handleError(err)\n\t}\n\treturn handleOK(developer)\n}", "func (c *ClientWithResponses) DeletePrivateNetworkWithResponse(ctx context.Context, id string) (*DeletePrivateNetworkResponse, error) {\n\trsp, err := c.DeletePrivateNetwork(ctx, id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn ParseDeletePrivateNetworkResponse(rsp)\n}", "func DeleteNetworkSecurityGroupRule() {}", "func (c *Client) DeleteDirectConnectTunnel(request *DeleteDirectConnectTunnelRequest) (response *DeleteDirectConnectTunnelResponse, err error) {\n if request == nil {\n request = NewDeleteDirectConnectTunnelRequest()\n }\n response = NewDeleteDirectConnectTunnelResponse()\n err = c.Send(request, response)\n return\n}", "func DeleteRouterInterface(t *testing.T, client *gophercloud.ServiceClient, portID, routerID string) {\n\tt.Logf(\"Attempting to detach port %s from router %s\", portID, routerID)\n\n\triOpts := routers.RemoveInterfaceOpts{\n\t\tPortID: portID,\n\t}\n\n\t_, err := routers.RemoveInterface(client, routerID, riOpts).Extract()\n\tif err != nil {\n\t\tt.Fatalf(\"Failed to detach port %s from router %s\", portID, routerID)\n\t}\n\n\tif err := WaitForRouterInterfaceToDetach(client, portID); err != nil {\n\t\tt.Fatalf(\"Failed to wait for port %s to detach from router %s\", portID, routerID)\n\t}\n\n\tt.Logf(\"Successfully detached port %s from router %s\", portID, routerID)\n}", "func (o *Offer) DeleteG() (int64, error) {\n\treturn o.Delete(boil.GetDB())\n}", "func DeleteServiceInstanceDestination(serviceURL string, accessToken string, destinationName string) error {\n\tvar err error\n\tvar request *http.Request\n\tvar response *http.Response\n\tvar destinationsURL string\n\tvar payload = []byte{}\n\tvar body []byte\n\n\tdestinationsURL = serviceURL + \"/destination-configuration/v1/instanceDestinations/\" + destinationName\n\tlog.Tracef(\"Making request to: %s\\n\", destinationsURL)\n\trequest, err = http.NewRequest(\"DELETE\", destinationsURL, bytes.NewBuffer(payload))\n\tif err != nil {\n\t\treturn err\n\t}\n\trequest.Header.Set(\"Content-Type\", \"application/json\")\n\trequest.Header.Set(\"Authorization\", \"Bearer \"+accessToken)\n\n\tclient := &http.Client{}\n\tresponse, err = client.Do(request)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer response.Body.Close()\n\n\tif response.StatusCode > 201 {\n\t\tbody, err = ioutil.ReadAll(response.Body)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Could not delete destination: [%s] %+v\", response.Status, body)\n\t\t}\n\t}\n\n\treturn nil\n}", "func NetworkDelete(state *state.State, n network) error {\n\treturn deleteProfile(state, dnsmasqProfileFilename(n))\n}", "func (ifc *Interface) DeleteRoute(destination *net.IPNet, nextHop *net.IP) error {\n\n\trow, err := getWtMibIpforwardRow2Alt(ifc.Luid, destination, nextHop)\n\n\tif err == nil {\n\t\treturn row.delete()\n\t} else {\n\t\treturn err\n\t}\n}", "func Delete(strinput2 string, tc net.Conn) {\n\tnetwork.SendDataMessage(&tc, 4, 6, 1, strinput2)\n}", "func (c *Client) DeleteDirectConnect(request *DeleteDirectConnectRequest) (response *DeleteDirectConnectResponse, err error) {\n if request == nil {\n request = NewDeleteDirectConnectRequest()\n }\n response = NewDeleteDirectConnectResponse()\n err = c.Send(request, response)\n return\n}", "func (f *FakeInstance) DeleteReverseIPv6(_ context.Context, _, _ string) error {\n\tpanic(\"implement me\")\n}", "func AgbotDelete(urlSuffix, credentials string, goodHttpCodes []int) (httpCode int) {\n\t// get message printer\n\tmsgPrinter := i18n.GetMessagePrinter()\n\n\t// check the agbot url\n\tagbot_url := GetAgbotSecureAPIUrlBase()\n\tif agbot_url == \"\" {\n\t\tFatal(HTTP_ERROR, msgPrinter.Sprintf(\"HZN_AGBOT_URL is not defined\"))\n\t}\n\n\t// query the agbot secure api\n\thttpCode = ExchangeDelete(\"Agbot\", agbot_url, urlSuffix, credentials, goodHttpCodes)\n\n\t// ExchangeDelete checks the http code, so we can just directly return\n\treturn httpCode\n}", "func (c *Eth) Delete(vsys string, e ...interface{}) error {\n var err error\n\n if len(e) == 0 {\n return nil\n }\n\n names := make([]string, len(e))\n for i := range e {\n switch v := e[i].(type) {\n case string:\n names[i] = v\n case Entry:\n names[i] = v.Name\n default:\n return fmt.Errorf(\"Unknown type sent to delete: %s\", v)\n }\n }\n c.con.LogAction(\"(delete) ethernet interface(s): %v\", names)\n\n // Unimport interfaces from the given vsys.\n err = c.con.UnimportInterfaces(vsys, names)\n if err != nil {\n return err\n }\n\n // Remove interfaces next.\n path := c.xpath(names)\n _, err = c.con.Delete(path, nil, nil)\n return err\n}", "func (p awsPeeringServiceOp) Delete(ctx context.Context, input *models.DeleteAwsPeeringInput) (*models.Result, *Response, error) {\n\tvar peeringResult models.Result\n\tgraphqlRequest := models.GraphqlRequest{\n\t\tName: \"deleteAwsPeering\",\n\t\tOperation: models.Mutation,\n\t\tInput: nil,\n\t\tArgs: *input,\n\t\tResponse: peeringResult,\n\t}\n\treq, err := p.client.NewRequest(&graphqlRequest)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tresp, err := p.client.Do(ctx, req, &peeringResult)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn &peeringResult, resp, err\n}", "func (a *HouseholdApiService) DeleteHouseholdUsingDelete(ctx context.Context, householdId string) (*http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Delete\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\ta.client = NewAPIClient(&Configuration{\n\t\tBasePath: ctx.Value(\"BasePath\").(string),\n\t\tDefaultHeader: make(map[string]string),\n\t\tUserAgent: \"Swagger-Codegen/1.0.0/go\",\n\t})\n\tlocalVarPath := a.client.cfg.BasePath + \"/nucleus/v1/household/{household_id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"household_id\"+\"}\", fmt.Sprintf(\"%v\", householdId), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"*/*\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\n\t\treturn localVarHttpResponse, newErr\n\t}\n\n\treturn localVarHttpResponse, nil\n}", "func (s *VPCService) CreatePrivateGateway(p *CreatePrivateGatewayParams) (*CreatePrivateGatewayResponse, error) {\n\tresp, err := s.cs.newRequest(\"createPrivateGateway\", p.toURLValues())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar r CreatePrivateGatewayResponse\n\tif err := json.Unmarshal(resp, &r); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// If we have a async client, we need to wait for the async result\n\tif s.cs.async {\n\t\tb, err := s.cs.GetAsyncJobResult(r.JobID, s.cs.timeout)\n\t\tif err != nil {\n\t\t\tif err == AsyncTimeoutErr {\n\t\t\t\treturn &r, err\n\t\t\t}\n\t\t\treturn nil, err\n\t\t}\n\n\t\tb, err = getRawValue(b)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tif err := json.Unmarshal(b, &r); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn &r, nil\n}", "func (pool *PoolHandler) Delete(request *restful.Request, response *restful.Response) {\n\tstarted := time.Now()\n\tnetKey := request.PathParameter(\"net\")\n\tnetCluster := request.PathParameter(\"cluster\")\n\tnetRes := &types.NetResponse{\n\t\tType: types.ResponseType_POOL,\n\t}\n\tif len(netKey) == 0 || len(netCluster) == 0 {\n\t\tnetRes.Code = 1\n\t\tnetRes.Message = \"Lost param needed\"\n\t\tresponse.WriteEntity(netRes)\n\t\treportMetrics(\"deleteIPPool\", \"4xx\", started)\n\t\treturn\n\t}\n\tif err := pool.netSvr.DeletePool(netCluster + \"/\" + netKey); err != nil {\n\t\tblog.Errorf(\"NetPool Delete %s/%s request err: %s\", netCluster, netKey, err.Error())\n\t\tnetRes.Code = 1\n\t\tnetRes.Message = err.Error()\n\t\tresponse.WriteEntity(netRes)\n\t\treportMetrics(\"deleteIPPool\", \"5xx\", started)\n\t\treturn\n\t}\n\tnetRes.Code = 0\n\tnetRes.Message = SUCCESS\n\tif err := response.WriteEntity(netRes); err != nil {\n\t\tblog.Errorf(\"PoolHandler reply client DELETE request Err: %v\", err)\n\t}\n\treportMetrics(\"deleteIPPool\", \"2xx\", started)\n}", "func (s *Stack) DeleteNetwork(ref string) (err error) {\n\ttheNetwork, err := s.GetNetwork(ref)\n\tif err != nil {\n\t\tif gerr, ok := err.(*googleapi.Error); ok {\n\t\t\tif gerr.Code != 404 {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif theNetwork == nil {\n\t\treturn fail.Errorf(\n\t\t\tfmt.Sprintf(\"delete network failed: unexpected nil network when looking for [%s]\", ref), err,\n\t\t)\n\t}\n\n\tif !theNetwork.OK() {\n\t\tlogrus.Warnf(\"Missing data in network: %s\", spew.Sdump(theNetwork))\n\t}\n\n\tcompuService := s.ComputeService\n\tsubnetwork, err := compuService.Subnetworks.Get(s.GcpConfig.ProjectID, s.GcpConfig.Region, theNetwork.Name).Do()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\topp, err := compuService.Subnetworks.Delete(s.GcpConfig.ProjectID, s.GcpConfig.Region, subnetwork.Name).Do()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\toco := OpContext{\n\t\tOperation: opp,\n\t\tProjectID: s.GcpConfig.ProjectID,\n\t\tService: compuService,\n\t\tDesiredState: \"DONE\",\n\t}\n\n\terr = waitUntilOperationIsSuccessfulOrTimeout(oco, temporal.GetMinDelay(), temporal.GetHostCleanupTimeout())\n\tif err != nil {\n\t\tswitch err.(type) {\n\t\tcase fail.ErrTimeout:\n\t\t\tlogrus.Warnf(\"Timeout waiting for subnetwork deletion\")\n\t\t\treturn err\n\t\tdefault:\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Delete routes and firewall\n\tfirewallRuleName := fmt.Sprintf(\"%s-%s-all-in\", s.GcpConfig.NetworkName, subnetwork.Name)\n\tfws, err := compuService.Firewalls.Get(s.GcpConfig.ProjectID, firewallRuleName).Do()\n\tif fws != nil && err == nil {\n\t\topp, operr := compuService.Firewalls.Delete(s.GcpConfig.ProjectID, firewallRuleName).Do()\n\t\tif operr == nil {\n\t\t\toco := OpContext{\n\t\t\t\tOperation: opp,\n\t\t\t\tProjectID: s.GcpConfig.ProjectID,\n\t\t\t\tService: compuService,\n\t\t\t\tDesiredState: \"DONE\",\n\t\t\t}\n\n\t\t\toperr = waitUntilOperationIsSuccessfulOrTimeout(\n\t\t\t\toco, temporal.GetMinDelay(), temporal.GetHostCleanupTimeout(),\n\t\t\t)\n\t\t\tif operr != nil {\n\t\t\t\tlogrus.Warn(operr)\n\t\t\t}\n\t\t}\n\t}\n\tif err != nil {\n\t\tlogrus.Warn(err)\n\t}\n\n\tnatRuleName := fmt.Sprintf(\"%s-%s-nat-allowed\", s.GcpConfig.NetworkName, subnetwork.Name)\n\tnws, err := compuService.Routes.Get(s.GcpConfig.ProjectID, natRuleName).Do()\n\tif nws != nil && err == nil {\n\t\topp, operr := compuService.Routes.Delete(s.GcpConfig.ProjectID, natRuleName).Do()\n\t\tif operr == nil {\n\t\t\toco := OpContext{\n\t\t\t\tOperation: opp,\n\t\t\t\tProjectID: s.GcpConfig.ProjectID,\n\t\t\t\tService: compuService,\n\t\t\t\tDesiredState: \"DONE\",\n\t\t\t}\n\n\t\t\toperr = waitUntilOperationIsSuccessfulOrTimeout(\n\t\t\t\toco, temporal.GetMinDelay(), temporal.GetHostCleanupTimeout(),\n\t\t\t)\n\t\t\tif operr != nil {\n\t\t\t\tlogrus.Warn(operr)\n\t\t\t}\n\t\t}\n\t}\n\tif err != nil {\n\t\tlogrus.Warn(err)\n\t}\n\n\treturn nil\n}", "func (ekc *ETHKeysController) Delete(c *gin.Context) {\n\tvar hardDelete bool\n\tvar err error\n\tif c.Query(\"hard\") != \"\" {\n\t\thardDelete, err = strconv.ParseBool(c.Query(\"hard\"))\n\t\tif err != nil {\n\t\t\tjsonAPIError(c, http.StatusUnprocessableEntity, err)\n\t\t\treturn\n\t\t}\n\t}\n\n\tif !common.IsHexAddress(c.Param(\"keyID\")) {\n\t\tjsonAPIError(c, http.StatusUnprocessableEntity, errors.New(\"invalid address\"))\n\t\treturn\n\t}\n\taddress := common.HexToAddress(c.Param(\"keyID\"))\n\tif exists, err2 := ekc.App.GetStore().KeyExists(address); err2 != nil {\n\t\tjsonAPIError(c, http.StatusInternalServerError, err2)\n\t\treturn\n\t} else if !exists {\n\t\tjsonAPIError(c, http.StatusNotFound, errors.New(\"Key does not exist\"))\n\t\treturn\n\t}\n\n\tkey, err := ekc.App.GetStore().KeyByAddress(address)\n\tif err != nil {\n\t\tjsonAPIError(c, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tif hardDelete {\n\t\terr = ekc.App.GetStore().DeleteKey(address)\n\t} else {\n\t\terr = ekc.App.GetStore().ArchiveKey(address)\n\t}\n\tif err != nil {\n\t\tjsonAPIError(c, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tethBalance, err := ekc.App.GetStore().EthClient.BalanceAt(c.Request.Context(), address, nil)\n\tif err != nil {\n\t\tlogger.Errorf(\"error calling getEthBalance on Ethereum node: %v\", err)\n\t}\n\tlinkAddress := common.HexToAddress(ekc.App.GetStore().Config.LinkContractAddress())\n\tlinkBalance, err := ekc.App.GetStore().EthClient.GetLINKBalance(linkAddress, address)\n\tif err != nil {\n\t\tlogger.Errorf(\"error calling getLINKBalance on Ethereum node: %v\", err)\n\t}\n\n\tpek := presenters.ETHKey{\n\t\tAddress: address.Hex(),\n\t\tEthBalance: (*assets.Eth)(ethBalance),\n\t\tLinkBalance: linkBalance,\n\t\tNextNonce: key.NextNonce,\n\t\tLastUsed: key.LastUsed,\n\t\tIsFunding: key.IsFunding,\n\t\tCreatedAt: key.CreatedAt,\n\t\tUpdatedAt: key.UpdatedAt,\n\t\tDeletedAt: key.DeletedAt,\n\t}\n\tjsonAPIResponse(c, pek, \"account\")\n}", "func deleteVmdk(host string, vmdkPath string) error {\n\tsshCmd := fmt.Sprintf(\"rm -f %s\", vmdkPath)\n\tframework.Logf(\"Invoking command '%v' on ESX host %v\", sshCmd, host)\n\tresult, err := fssh.SSH(sshCmd, host+\":22\", framework.TestContext.Provider)\n\tif err != nil || result.Code != 0 {\n\t\tfssh.LogResult(result)\n\t\treturn fmt.Errorf(\"couldn't execute command: '%s' on ESX host: %v\", sshCmd, err)\n\t}\n\treturn nil\n}", "func (r *RouterGroup) DELETE(path string, fn Controller) {\n\tr.gin.DELETE(path, adapt(fn))\n}", "func (__receiver_OService *OutgoingCallerIDService) Delete() *OutgoingCallerIDService {\n\t__receiver_OService.action = types.DELETE\n\t__receiver_OService.data = struct{}{}\n\t__receiver_OService.url = resources.OutgoingCallerIDURLS[types.DELETE]\n\treturn __receiver_OService\n}", "func (m *DB) DeleteStanduper(id int64) error {\n\t_, err := m.db.Exec(\"DELETE FROM `standupers` WHERE id=?\", id)\n\treturn err\n}", "func (s stack) DeleteHost(ctx context.Context, hostParam stacks.HostParameter) (ferr fail.Error) {\n\tif valid.IsNil(s) {\n\t\treturn fail.InvalidInstanceError()\n\t}\n\treturn fail.NotImplementedError(\"implement me\")\n}", "func deleteHNSEndpoint(ep *hcsshim.HNSEndpoint, containerID string) (string, error) {\n\tdefer func() { _ = recover() }()\n\tif ep == nil {\n\t\treturn \"\", nil\n\t}\n\n\t// detach container from endpoint\n\tif containerID != \"\" {\n\t\t_ = hcsshim.HotDetachEndpoint(containerID, ep.Id)\n\t}\n\n\t// delete endpoint\n\t_ = ep.HostDetach()\n\tif _, err := ep.Delete(); err != nil {\n\t\tif !hcsshim.IsNotExist(err) {\n\t\t\treturn ep.VirtualNetwork, err\n\t\t}\n\t}\n\treturn ep.VirtualNetwork, nil\n}", "func (o *Cvtermsynonym) DeleteG() error {\n\tif o == nil {\n\t\treturn errors.New(\"chado: no Cvtermsynonym provided for deletion\")\n\t}\n\n\treturn o.Delete(boil.GetDB())\n}", "func (client AccessGovernanceCPClient) deleteGovernanceInstance(ctx context.Context, request common.OCIRequest, binaryReqBody *common.OCIReadSeekCloser, extraHeaders map[string]string) (common.OCIResponse, error) {\n\n\thttpRequest, err := request.HTTPRequest(http.MethodDelete, \"/governanceInstances/{governanceInstanceId}\", binaryReqBody, extraHeaders)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response DeleteGovernanceInstanceResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\tapiReferenceLink := \"https://docs.oracle.com/iaas/api/#/en/access-governance-cp/20220518/GovernanceInstance/DeleteGovernanceInstance\"\n\t\terr = common.PostProcessServiceError(err, \"AccessGovernanceCP\", \"DeleteGovernanceInstance\", apiReferenceLink)\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "func (c *client) Delete(ctx context.Context, group, name string) error {\n\tvm, err := c.Get(ctx, group, name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif len(*vm) == 0 {\n\t\treturn fmt.Errorf(\"Virtual Machine [%s] not found\", name)\n\t}\n\n\trequest, err := c.getVirtualMachineRequest(wssdcloudproto.Operation_DELETE, group, name, &(*vm)[0])\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, err = c.VirtualMachineAgentClient.Invoke(ctx, request)\n\n\treturn err\n}" ]
[ "0.73536414", "0.69513005", "0.65424114", "0.6474342", "0.6254773", "0.62340236", "0.6188184", "0.58217347", "0.5722437", "0.5722141", "0.5648572", "0.5632373", "0.5630463", "0.5583372", "0.5580485", "0.5578828", "0.55388343", "0.55331504", "0.55064017", "0.5485571", "0.5475331", "0.54699796", "0.5455669", "0.53706163", "0.5362468", "0.5334552", "0.5300503", "0.5245718", "0.5225752", "0.5224847", "0.5199485", "0.51893145", "0.51819927", "0.51727647", "0.51727647", "0.51590186", "0.5158281", "0.5149099", "0.5134336", "0.5125882", "0.5125003", "0.5124844", "0.5121285", "0.5111008", "0.51044124", "0.51039004", "0.5084361", "0.50756097", "0.5073135", "0.5061431", "0.5055102", "0.5042462", "0.50345725", "0.50342476", "0.5026059", "0.5024928", "0.50173193", "0.5013274", "0.50122356", "0.50071913", "0.5006586", "0.50034785", "0.49874544", "0.49780688", "0.4973314", "0.49696463", "0.49691805", "0.49642637", "0.49636105", "0.49602246", "0.49583817", "0.49568042", "0.4945869", "0.4944646", "0.49420613", "0.49378198", "0.49350584", "0.49327055", "0.49320567", "0.49239498", "0.49211705", "0.4918752", "0.49112704", "0.49076945", "0.49034783", "0.49011898", "0.48968694", "0.48925245", "0.48924193", "0.48835716", "0.4882319", "0.4881784", "0.4879141", "0.4878618", "0.48769367", "0.4875349", "0.48751295", "0.48639202", "0.4858585", "0.48568884" ]
0.69800127
1
You should always use this function to get a new DeleteStaticRouteParams instance, as then you are sure you have configured all required params
func (s *VPCService) NewDeleteStaticRouteParams(id string) *DeleteStaticRouteParams { p := &DeleteStaticRouteParams{} p.p = make(map[string]interface{}) p.p["id"] = id return p }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewDeleteScheduleParams() *DeleteScheduleParams {\n\tvar ()\n\treturn &DeleteScheduleParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (t *Role) DeleteParams() []interface{} {\n\treturn []interface{}{}\n}", "func NewDeleteAttributeParams() *DeleteAttributeParams {\n\tvar ()\n\treturn &DeleteAttributeParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (m *MockLoadBalancerServiceIface) NewDeleteGlobalLoadBalancerRuleParams(id string) *DeleteGlobalLoadBalancerRuleParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeleteGlobalLoadBalancerRuleParams\", id)\n\tret0, _ := ret[0].(*DeleteGlobalLoadBalancerRuleParams)\n\treturn ret0\n}", "func SSMDeleteParams(deleted, invalids []string) *SSMAPI {\n\treturn &SSMAPI{\n\t\tdelparamsOutput: &ssm.DeleteParametersOutput{\n\t\t\tDeletedParameters: aws.StringSlice(deleted),\n\t\t\tInvalidParameters: aws.StringSlice(invalids),\n\t\t},\n\t}\n}", "func NewDeleteKeyPairsParams() *DeleteKeyPairsParams {\n\tvar ()\n\treturn &DeleteKeyPairsParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewStaticRouter() *StaticRouter {\n router := new(StaticRouter)\n\n return router\n}", "func NewComponentDeleteParams() *ComponentDeleteParams {\n\treturn &ComponentDeleteParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteaspecificManagerSecretaryRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/managersecretary/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (router *Router) DELETE(relativePath string, handler Handler, decorators ...Decorator) {\n\trouter.createRouter(http.MethodDelete, relativePath, handler, \"\", decorators...)\n}", "func (s *VPCService) NewListStaticRoutesParams() *ListStaticRoutesParams {\n\tp := &ListStaticRoutesParams{}\n\tp.p = make(map[string]interface{})\n\treturn p\n}", "func (dsl *DeleteDSL) StaticRoute(vrf uint32, dstAddrInput *net.IPNet, nextHopAddrInput net.IP) linux.DeleteDSL {\n\tdsl.vppDelete.StaticRoute(vrf, dstAddrInput, nextHopAddrInput)\n\treturn dsl\n}", "func (h Handler) makeDelete(v Injection) http.HandlerFunc {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tparams := mux.Vars(r)\n\t\tmtx.Lock()\n\t\t_, deleted := v.Share[params[\"id\"]]\n\t\tdelete(v.Share, params[\"id\"])\n\t\tmtx.Unlock()\n\t\tjson.NewEncoder(w).Encode(deleted)\n\t})\n}", "func (b *Baa) Delete(pattern string, h ...HandlerFunc) RouteNode {\n\treturn b.Router().Add(\"DELETE\", pattern, h)\n}", "func UserDelete(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\n}", "func Delete(path string, f func(http.ResponseWriter, *http.Request)) *Route {\n\treturn NewRoute().Path(path).Method(HttpDelete).HandlerFunc(f)\n}", "func NewDeleteNodeParams() *DeleteNodeParams {\n\tvar ()\n\treturn &DeleteNodeParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (r *Router) Delete(pattern string, handlers ...interface{}) *Router {\n\tc := r.pattern(pattern)\n\tc.Method = \"DELETE\"\n\tclone := r.clone(c)\n\tclone.handle(handlers)\n\treturn clone\n}", "func NewDeleteKeyPairsParamsWithHTTPClient(client *http.Client) *DeleteKeyPairsParams {\n\tvar ()\n\treturn &DeleteKeyPairsParams{\n\t\tHTTPClient: client,\n\t}\n}", "func NewDeleteScheduleParamsWithHTTPClient(client *http.Client) *DeleteScheduleParams {\n\tvar ()\n\treturn &DeleteScheduleParams{\n\t\tHTTPClient: client,\n\t}\n}", "func (dsl *DeleteDSL) StaticRoute(vrf uint32, dstAddr string, nextHopAddr string) linux.DeleteDSL {\n\tdsl.vppDelete.StaticRoute(vrf, dstAddr, nextHopAddr)\n\treturn dsl\n}", "func (m *MockRouterServiceIface) NewDestroyRouterParams(id string) *DestroyRouterParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDestroyRouterParams\", id)\n\tret0, _ := ret[0].(*DestroyRouterParams)\n\treturn ret0\n}", "func (s *VPCService) NewDeletePrivateGatewayParams(id string) *DeletePrivateGatewayParams {\n\tp := &DeletePrivateGatewayParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t}\n}", "func NewRoutingAppCoveragesDeleteInstanceRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParamWithLocation(\"simple\", false, \"id\", runtime.ParamLocationPath, id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tserverURL, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\toperationPath := fmt.Sprintf(\"/v1/routingAppCoverages/%s\", pathParam0)\n\tif operationPath[0] == '/' {\n\t\toperationPath = \".\" + operationPath\n\t}\n\n\tqueryURL, err := serverURL.Parse(operationPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryURL.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func NewDeleteConnectionParams() *DeleteConnectionParams {\n\tvar ()\n\treturn &DeleteConnectionParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (k *xyzProvider) Delete(ctx context.Context, req *pulumirpc.DeleteRequest) (*pbempty.Empty, error) {\n\turn := resource.URN(req.GetUrn())\n\tty := urn.Type()\n\tif ty != \"xyz:index:Random\" {\n\t\treturn nil, fmt.Errorf(\"Unknown resource type '%s'\", ty)\n\t}\n\n\t// Note that for our Random resource, we don't have to do anything on Delete.\n\treturn &pbempty.Empty{}, nil\n}", "func NewDeleteRequestBody(p *inventory.DeletePayload) *DeleteRequestBody {\n\tbody := &DeleteRequestBody{}\n\tif p.Ids != nil {\n\t\tbody.Ids = make([]string, len(p.Ids))\n\t\tfor i, val := range p.Ids {\n\t\t\tbody.Ids[i] = val\n\t\t}\n\t}\n\treturn body\n}", "func (m *MockFirewallServiceIface) NewDeletePaloAltoFirewallParams(fwdeviceid string) *DeletePaloAltoFirewallParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeletePaloAltoFirewallParams\", fwdeviceid)\n\tret0, _ := ret[0].(*DeletePaloAltoFirewallParams)\n\treturn ret0\n}", "func Delete(w http.ResponseWriter, r *http.Request){\n\n\t//pegando a url atraves da requisiçãp (.Get = pegar )\n\tidDoProduto := r.URL.Query().Get(\"id\") // pegando o id da url\n\n\tmodels.DeletaProduto(idDoProduto)\n\thttp.Redirect(w, r, \"/\", 301)\n}", "func (s *VPCService) NewCreateStaticRouteParams(cidr string, gatewayid string) *CreateStaticRouteParams {\n\tp := &CreateStaticRouteParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"cidr\"] = cidr\n\tp.p[\"gatewayid\"] = gatewayid\n\treturn p\n}", "func (m *MockFirewallServiceIface) NewDeleteFirewallRuleParams(id string) *DeleteFirewallRuleParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeleteFirewallRuleParams\", id)\n\tret0, _ := ret[0].(*DeleteFirewallRuleParams)\n\treturn ret0\n}", "func GetParams(c context.Context, r *http.Request) RouteParams {\n\tif val, ok := c.Get(r, context.BaseCtxKey(\"params\")); ok {\n\t\treturn val.(RouteParams)\n\t}\n\n\treturn RouteParams{}\n}", "func Delete(route string, do interface{}) *handler {\n\treturn handlerByMethod(&route, do, \"DELETE\")\n}", "func (s *UserService) NewDeleteUserParams(id string) *DeleteUserParams {\n\tp := &DeleteUserParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (client PatternClient) DeletePatternPreparer(ctx context.Context, appID uuid.UUID, versionID string, patternID uuid.UUID) (*http.Request, error) {\n\turlParameters := map[string]interface{}{\n\t\t\"AzureRegion\": client.AzureRegion,\n\t}\n\n\tpathParameters := map[string]interface{}{\n\t\t\"appId\": autorest.Encode(\"path\", appID),\n\t\t\"patternId\": autorest.Encode(\"path\", patternID),\n\t\t\"versionId\": autorest.Encode(\"path\", versionID),\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsDelete(),\n\t\tautorest.WithCustomBaseURL(\"https://{AzureRegion}.api.cognitive.microsoft.com/luis/api/v2.0\", urlParameters),\n\t\tautorest.WithPathParameters(\"/apps/{appId}/versions/{versionId}/patternrules/{patternId}\", pathParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func (m *MockFirewallServiceIface) NewDeletePortForwardingRuleParams(id string) *DeletePortForwardingRuleParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeletePortForwardingRuleParams\", id)\n\tret0, _ := ret[0].(*DeletePortForwardingRuleParams)\n\treturn ret0\n}", "func (a *FrinxOpenconfigNetworkInstanceApiService) DeleteFrinxOpenconfigNetworkInstanceNetworkInstancesNetworkInstanceProtocolsProtocolStaticRoutesStatic(ctx context.Context, name string, identifier string, protocolName string, prefix string, nodeId string) (*http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Delete\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\t\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/config/network-topology:network-topology/network-topology:topology/unified/network-topology:node/{node-id}/yang-ext:mount/frinx-openconfig-network-instance:network-instances/frinx-openconfig-network-instance:network-instance/{name}/frinx-openconfig-network-instance:protocols/frinx-openconfig-network-instance:protocol/{identifier}/{protocol-name}/frinx-openconfig-network-instance:static-routes/frinx-openconfig-network-instance:static/{prefix}/\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"name\"+\"}\", fmt.Sprintf(\"%v\", name), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"identifier\"+\"}\", fmt.Sprintf(\"%v\", identifier), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"protocol-name\"+\"}\", fmt.Sprintf(\"%v\", protocolName), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"prefix\"+\"}\", fmt.Sprintf(\"%v\", prefix), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"node-id\"+\"}\", fmt.Sprintf(\"%v\", nodeId), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{\"application/json\", \"application/xml\"}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\", \"application/xml\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\t\n\t\treturn localVarHttpResponse, newErr\n\t}\n\n\treturn localVarHttpResponse, nil\n}", "func NewDeleteaspecificRewriteRuleRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/rewriterules/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (a *Router) Delete(pattern string, hs ...func(*Context) error) *Router {\n\treturn a.Handle(http.MethodDelete, pattern, hs...)\n}", "func (s *VPCService) NewDeleteVPCOfferingParams(id string) *DeleteVPCOfferingParams {\n\tp := &DeleteVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func deleteurl(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tparams := mux.Vars(r)\n\tinputOrderID := params[\"Id\"]\n\tvar url Myurl\n\tdb.Where(\"id = ? \", inputOrderID).Delete(&url)\n}", "func (m *MockFirewallServiceIface) NewDeleteEgressFirewallRuleParams(id string) *DeleteEgressFirewallRuleParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeleteEgressFirewallRuleParams\", id)\n\tret0, _ := ret[0].(*DeleteEgressFirewallRuleParams)\n\treturn ret0\n}", "func (r *Route) Delete(h http.Handler) *Route {\n\tr.Add(\"DELETE\", h)\n\n\treturn r\n}", "func NewDeleteaspecificNcosPatternRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/ncospatterns/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (client *PipelinesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, factoryName string, pipelineName string, options *PipelinesClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DataFactory/factories/{factoryName}/pipelines/{pipelineName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif factoryName == \"\" {\n\t\treturn nil, errors.New(\"parameter factoryName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{factoryName}\", url.PathEscape(factoryName))\n\tif pipelineName == \"\" {\n\t\treturn nil, errors.New(\"parameter pipelineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{pipelineName}\", url.PathEscape(pipelineName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2018-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewParams(acl ACL, daoOwner sdk.Address) Params {\n\treturn Params{\n\t\tACL: acl,\n\t\tDAOOwner: daoOwner,\n\t}\n}", "func NewParams(createWhoisPrice string, updateWhoisPrice string, deleteWhoisPrice string) Params {\n\treturn Params{\n\t\tCreateWhoisPrice: createWhoisPrice,\n\t\tUpdateWhoisPrice: updateWhoisPrice,\n\t\tDeleteWhoisPrice: deleteWhoisPrice,\n\t}\n}", "func NewDeleteConditionParams() *DeleteConditionParams {\n\tvar ()\n\treturn &DeleteConditionParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client CloudEndpointsClient) DeletePreparer(ctx context.Context, resourceGroupName string, storageSyncServiceName string, syncGroupName string, cloudEndpointName string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"cloudEndpointName\": autorest.Encode(\"path\", cloudEndpointName),\n\t\t\"resourceGroupName\": autorest.Encode(\"path\", resourceGroupName),\n\t\t\"storageSyncServiceName\": autorest.Encode(\"path\", storageSyncServiceName),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t\t\"syncGroupName\": autorest.Encode(\"path\", syncGroupName),\n\t}\n\n\tconst APIVersion = \"2020-03-01\"\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": APIVersion,\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsDelete(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.StorageSync/storageSyncServices/{storageSyncServiceName}/syncGroups/{syncGroupName}/cloudEndpoints/{cloudEndpointName}\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func NewDeleteDataSourceParams() *DeleteDataSourceParams {\n\treturn &DeleteDataSourceParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteProtectedEntityParams() *DeleteProtectedEntityParams {\n\treturn &DeleteProtectedEntityParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (r *Router) Delete(pattern string, handler http.Handler) Route {\n\treturn r.Handle(\"DELETE\", pattern, handler)\n}", "func (rm *resourceManager) newDeleteRequestPayload(\n\tr *resource,\n) (*svcsdk.DeleteStageInput, error) {\n\tres := &svcsdk.DeleteStageInput{}\n\n\tif r.ko.Spec.APIID != nil {\n\t\tres.SetApiId(*r.ko.Spec.APIID)\n\t}\n\tif r.ko.Spec.StageName != nil {\n\t\tres.SetStageName(*r.ko.Spec.StageName)\n\t}\n\n\treturn res, nil\n}", "func NewStatic() filters.Spec { return &static{} }", "func NewStatic() filters.Spec { return &static{} }", "func (group *RouterGroup) DELETE(relativePath string, handlers ...HandlerFunc) IRoutes {\n\treturn group.Handler(\"DELETE\", relativePath, handlers...)\n}", "func (m *MockLoadBalancerServiceIface) NewDeleteLoadBalancerRuleParams(id string) *DeleteLoadBalancerRuleParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeleteLoadBalancerRuleParams\", id)\n\tret0, _ := ret[0].(*DeleteLoadBalancerRuleParams)\n\treturn ret0\n}", "func (m *MockLoadBalancerServiceIface) NewDeleteLBHealthCheckPolicyParams(id string) *DeleteLBHealthCheckPolicyParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeleteLBHealthCheckPolicyParams\", id)\n\tret0, _ := ret[0].(*DeleteLBHealthCheckPolicyParams)\n\treturn ret0\n}", "func (ctrl *RedirCtrl) Delete(c *gin.Context) {\n\tif c.Param(\"redirect\") != \"api\" || c.Param(\"url\") == \"\" {\n\t\tc.JSON(ctrl.Config.STATUS_CODES[\"BAD_REQUEST\"], gin.H{\n\t\t\t\"error\": \"Bad Request\",\n\t\t})\n\t\treturn\n\t}\n\tredir := c.Param(\"url\")\n\t// check if exists\n\tredirect, err := ctrl.RedirService.FindByRedirect(context.TODO(), redir, models.REDIRECTSCOLLECTION)\n\tif err != nil {\n\t\tc.JSON(ctrl.Config.STATUS_CODES[\"INTERNAL_SERVER_ERROR\"], gin.H{\n\t\t\t\"error\": err.Error(),\n\t\t})\n\t\treturn\n\t}\n\tredirect.Deleted = true\n\tredirDeleteForm := models.DeleteRedirectForm{\n\t\tDeleted: redirect.Deleted,\n\t\tUpdatedAt: time.Now(),\n\t}\n\t// updates deleted field to true\n\t_, err = ctrl.RedirService.Update(context.TODO(), redirect.ID, redirDeleteForm, models.REDIRECTSCOLLECTION)\n\tif err != nil {\n\t\tc.JSON(ctrl.Config.STATUS_CODES[\"INTERNAL_SERVER_ERROR\"], gin.H{\n\t\t\t\"error\": err.Error(),\n\t\t})\n\t\treturn\n\t}\n\tc.JSON(ctrl.Config.STATUS_CODES[\"OK\"], redirect)\n}", "func (s *TemplateService) NewDeleteTemplateParams(id string) *DeleteTemplateParams {\n\tp := &DeleteTemplateParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (app *App) Delete(url string, handler handlerFunc) {\n\trequestRegexp := app.craterRouter.normalizeRoute(url)\n\tapp.craterRequestHandler.handleDelete(requestRegexp, func(w http.ResponseWriter, r *http.Request) {\n\t\tapp.serveRequest(w, r, handler, requestRegexp)\n\t})\n}", "func (j *Jsonnet) DeleteParam(path []string) error {\n\t// TODO: make this work at the env level too\n\tparamsData, err := j.readParams(\"\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tupdatedParams, err := params.DeleteFromObject(path, paramsData, j.Name(false), paramsComponentRoot)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err = j.writeParams(updatedParams); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func Delete(path string, handler http.Handler) Route {\n\treturn NewRoute(\"DELETE\", path, handler)\n}", "func (client ScheduleMessageClient) DeletePreparer(ctx context.Context, serviceID string, scheduleCode string, messageID string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"messageId\": autorest.Encode(\"path\", messageID),\n\t\t\"scheduleCode\": autorest.Encode(\"path\", scheduleCode),\n\t\t\"serviceId\": serviceID,\n\t}\n\n\ttimestamp := strconv.FormatInt(time.Now().UnixNano()/int64(time.Millisecond), 10)\n\tsec := security.NewSignature(client.Secretkey, crypto.SHA256)\n\tsignature, err := sec.Signature(\"DELETE\", common.GetPathParameters(DefaultBaseURI, \"/push/v2/services/{serviceId}/schedules/{scheduleCode}/messages/{messageId}\", pathParameters), client.AccessKey, timestamp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsDelete(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/push/v2/services/{serviceId}/schedules/{scheduleCode}/messages/{messageId}\", pathParameters),\n\t\tautorest.WithHeader(\"x-ncp-apigw-api-key\", client.APIGatewayAPIKey),\n\t\tautorest.WithHeader(\"x-ncp-apigw-timestamp\", timestamp),\n\t\tautorest.WithHeader(\"x-ncp-iam-access-key\", client.AccessKey),\n\t\tautorest.WithHeader(\"x-ncp-apigw-signature-v2\", signature))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func Delete(path string, fn http.HandlerFunc, c ...alice.Constructor) {\n\trecord(\"DELETE\", path)\n\n\tinfoMutex.Lock()\n\tr.DELETE(path, Handler(alice.New(c...).ThenFunc(fn)))\n\tinfoMutex.Unlock()\n}", "func NewStreamsDeleteParams() *StreamsDeleteParams {\n\tvar ()\n\treturn &StreamsDeleteParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (a *FrinxOpenconfigNetworkInstanceApiService) DeleteFrinxOpenconfigNetworkInstanceNetworkInstancesNetworkInstanceProtocolsProtocolStaticRoutesStaticConfig(ctx context.Context, name string, identifier string, protocolName string, prefix string, nodeId string) (*http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Delete\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\t\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/config/network-topology:network-topology/network-topology:topology/unified/network-topology:node/{node-id}/yang-ext:mount/frinx-openconfig-network-instance:network-instances/frinx-openconfig-network-instance:network-instance/{name}/frinx-openconfig-network-instance:protocols/frinx-openconfig-network-instance:protocol/{identifier}/{protocol-name}/frinx-openconfig-network-instance:static-routes/frinx-openconfig-network-instance:static/{prefix}/frinx-openconfig-network-instance:config/\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"name\"+\"}\", fmt.Sprintf(\"%v\", name), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"identifier\"+\"}\", fmt.Sprintf(\"%v\", identifier), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"protocol-name\"+\"}\", fmt.Sprintf(\"%v\", protocolName), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"prefix\"+\"}\", fmt.Sprintf(\"%v\", prefix), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"node-id\"+\"}\", fmt.Sprintf(\"%v\", nodeId), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{\"application/json\", \"application/xml\"}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\", \"application/xml\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\t\n\t\treturn localVarHttpResponse, newErr\n\t}\n\n\treturn localVarHttpResponse, nil\n}", "func Delete(r *http.Request, key interface{}) {\n\tmutex.Lock()\n\tif data[r] != nil {\n\t\tdelete(data[r], key)\n\t}\n\tmutex.Unlock()\n}", "func (r *Route) Delete(handler http.Handler) *Route {\n\tr.handlers[http.MethodDelete] = handler\n\treturn r\n}", "func Delete(path string, fn http.HandlerFunc, c ...alice.Constructor) {\n\tinfoMutex.Lock()\n\trecord(\"DELETE\", path)\n\tr.Delete(path, alice.New(c...).ThenFunc(fn).(http.HandlerFunc))\n\tinfoMutex.Unlock()\n}", "func (connection *Connection) CreateMapDeleteRequest(param ...interface{}) (request *DeleteRequest, err error) {\n\tt := reflect.TypeOf(param[0])\n\tswitch t.Kind() {\n\tcase reflect.Ptr, reflect.Struct:\n\t\tif connection.repository == nil {\n\t\t\tif connection.adabasMap != nil && connection.adabasMap.Name == inmapMapName {\n\t\t\t\t// Lock this Adabas Map for ReadRequest creation process of dynamic part\n\t\t\t\tconnection.adabasMap.lock.Lock()\n\t\t\t\tdefer connection.adabasMap.lock.Unlock()\n\t\t\t\tadatypes.Central.Log.Debugf(\"InMap used: %s\", connection.adabasMap.Name)\n\t\t\t\terr = connection.adabasMap.defineByInterface(param[0])\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\trequest, err = NewMapDeleteRequest(connection.adabasToData, connection.adabasMap)\n\t\t\t} else {\n\t\t\t\tadatypes.Central.Log.Debugf(\"No repository used: %#v\", connection.adabasToMap)\n\t\t\t\trequest, err = NewMapNameDeleteRequest(connection.adabasToMap, evaluateInterface(param[0]))\n\t\t\t}\n\t\t} else {\n\t\t\tadatypes.Central.Log.Debugf(\"With repository used: %#v\", connection.adabasMap)\n\t\t\trequest, err = NewMapNameDeleteRequestRepo(evaluateInterface(param[0]), connection.adabasToMap, connection.repository)\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif len(param) > 1 {\n\t\t\tswitch t := param[1].(type) {\n\t\t\tcase int:\n\t\t\t\tconnection.fnr = Fnr(t)\n\t\t\t\trequest.repository.Fnr = Fnr(t)\n\t\t\tcase Fnr:\n\t\t\t\tconnection.fnr = t\n\t\t\t\trequest.repository.Fnr = t\n\t\t\t}\n\t\t} else {\n\t\t\tconnection.fnr = request.adabasMap.Data.Fnr\n\t\t}\n\t\tconnection.adabasMap = request.adabasMap\n\tcase reflect.String:\n\t\tmapName := param[0].(string)\n\t\terr = connection.prepareMapUsage(mapName)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\t// if connection.repository == nil {\n\t\t// \terr = adatypes.NewGenericError(9)\n\t\t// \treturn\n\t\t// }\n\t\t// connection.repository.SearchMapInRepository(connection.adabasToMap, mapName)\n\t\tif connection.adabasMap == nil {\n\t\t\terr = adatypes.NewGenericError(8, mapName)\n\t\t\treturn\n\t\t}\n\t\tconnection.adabasToData = connection.ID.getAdabas(connection.adabasMap.URL())\n\t\t// NewAdabas(connection.adabasMap.URL(), connection.ID)\n\t\t// if err != nil {\n\t\t// \treturn\n\t\t// }\n\t\tconnection.fnr = connection.adabasMap.Data.Fnr\n\t\tadatypes.Central.Log.Debugf(\"Connection FNR=%d, Map referenced : %#v\", connection.fnr, connection.adabasMap)\n\t\trequest, err = NewMapDeleteRequest(connection.adabasToData, connection.adabasMap)\n\t}\n\treturn\n}", "func NewVolumeDeleteParams() *VolumeDeleteParams {\n\tvar (\n\t\tforceDefault = bool(false)\n\t)\n\treturn &VolumeDeleteParams{\n\t\tForce: &forceDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (d *RouteDescriptor) Delete(key string, route *l3.Route, metadata interface{}) error {\n\terr := d.routeHandler.VppDelRoute(context.TODO(), route)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (client *VirtualRoutersClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, virtualRouterName string, options *VirtualRoutersClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/virtualRouters/{virtualRouterName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif virtualRouterName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualRouterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualRouterName}\", url.PathEscape(virtualRouterName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewGetRouteByIDParams() *GetRouteByIDParams {\n\treturn &GetRouteByIDParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *UsageService) NewDeleteTrafficTypeParams(id string) *DeleteTrafficTypeParams {\n\tp := &DeleteTrafficTypeParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewDeleteAttributeParamsWithHTTPClient(client *http.Client) *DeleteAttributeParams {\n\tvar ()\n\treturn &DeleteAttributeParams{\n\t\tHTTPClient: client,\n\t}\n}", "func (client *RouteTablesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, routeTableName string, options *RouteTablesBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/routeTables/{routeTableName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif routeTableName == \"\" {\n\t\treturn nil, errors.New(\"parameter routeTableName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{routeTableName}\", url.PathEscape(routeTableName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewDeleteTagParams() *DeleteTagParams {\n\tvar ()\n\treturn &DeleteTagParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (r Requester) Delete(path string) Requester {\n\treq, err := http.NewRequest(http.MethodDelete, r.url, nil)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tr.httpRequest = req\n\treturn r\n}", "func Delete(client *occlient.Client, kClient *kclient.Client, urlName string, applicationName string, urlType localConfigProvider.URLKind, isS2i bool) error {\n\tif urlType == localConfigProvider.INGRESS {\n\t\treturn kClient.DeleteIngress(urlName)\n\t} else if urlType == localConfigProvider.ROUTE {\n\t\tif isS2i {\n\t\t\t// Namespace the URL name\n\t\t\tvar err error\n\t\t\turlName, err = util.NamespaceOpenShiftObject(urlName, applicationName)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrapf(err, \"unable to create namespaced name\")\n\t\t\t}\n\t\t}\n\n\t\treturn client.DeleteRoute(urlName)\n\t}\n\treturn errors.New(\"url type is not supported\")\n}", "func (m *MockProjectServiceIface) NewDeleteProjectRolePermissionParams(id, projectid string) *DeleteProjectRolePermissionParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeleteProjectRolePermissionParams\", id, projectid)\n\tret0, _ := ret[0].(*DeleteProjectRolePermissionParams)\n\treturn ret0\n}", "func NewDeleteDebugRequestParams() *DeleteDebugRequestParams {\n\tvar ()\n\treturn &DeleteDebugRequestParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteaspecificAdminRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/admins/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (ctl Controller) Delete(ctx *gin.Context) {\n\n\tMethodNotAllowedJSON(ctx)\n}", "func (client BaseClient) DeleteExpectationPreparer(ctx context.Context, pathParameter string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"path\": autorest.Encode(\"path\", pathParameter),\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsDelete(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/api/expectations/{path}\", pathParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func (mr *ManifestResource) Delete(_ http.ResponseWriter, req *http.Request, _ httprouter.Params) restful.Exchanger {\n\treturn &DELETEManifestHandler{\n\t\tState: mr.context.liveState(),\n\t\tQueryValues: mr.ParseQuery(req),\n\t\tStateWriter: sous.StateWriter(mr.context.StateManager),\n\t}\n}", "func NewComponentDeleteParamsWithHTTPClient(client *http.Client) *ComponentDeleteParams {\n\treturn &ComponentDeleteParams{\n\t\tHTTPClient: client,\n\t}\n}", "func DeleteTemplate(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintf(w, \"URL PATH - %s!\", r.URL.Path[1:])\n}", "func (client PatternClient) DeletePatternsPreparer(ctx context.Context, appID uuid.UUID, versionID string, patternIds []uuid.UUID) (*http.Request, error) {\n\turlParameters := map[string]interface{}{\n\t\t\"AzureRegion\": client.AzureRegion,\n\t}\n\n\tpathParameters := map[string]interface{}{\n\t\t\"appId\": autorest.Encode(\"path\", appID),\n\t\t\"versionId\": autorest.Encode(\"path\", versionID),\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsContentType(\"application/json; charset=utf-8\"),\n\t\tautorest.AsDelete(),\n\t\tautorest.WithCustomBaseURL(\"https://{AzureRegion}.api.cognitive.microsoft.com/luis/api/v2.0\", urlParameters),\n\t\tautorest.WithPathParameters(\"/apps/{appId}/versions/{versionId}/patternrules\", pathParameters),\n\t\tautorest.WithJSON(patternIds))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func (h *Handler) Delete(path string, f func(w http.ResponseWriter, r *http.Request)) {\n\tpath = configuration.Instance.Service.Path + path\n\tlog.Println(\"Adding '\" + path + \"' as DELETE path\")\n\th.Router.HandleFunc(path, f).Methods(\"DELETE\")\n}", "func Delete(route Route) error {\n\treturn fmt.Errorf(\"Operation not supported \")\n}", "func (r *Router) Delete(path string, handle requestHandler, config ...RouteConfig) {\n\tr.routers[\"DELETE\"] = append(r.routers[\"DELETE\"], newRouteHandler(path, handle, config...))\n}", "func DeleteRequest(w http.ResponseWriter, r *http.Request, p httprouter.Params) {\n\t a:= p.ByName(\"id\")\n\t ac,_ := strconv.Atoi(a)\n\t sess:=getSession();\n er := sess.DB(\"trip-planner\").C(\"locations\").Remove(bson.M{\"id\": ac})\n if er!=nil {\n \tpanic(er)\n }\n\tw.WriteHeader(200)\n}", "func (client OpenShiftManagedClustersClient) DeletePreparer(ctx context.Context, resourceGroupName string, resourceName string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"resourceGroupName\": autorest.Encode(\"path\", resourceGroupName),\n\t\t\"resourceName\": autorest.Encode(\"path\", resourceName),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t}\n\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": v20180930preview.APIVersion,\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsDelete(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerService/openShiftManagedClusters/{resourceName}\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func (c *Client) NewDeleteLambdaRequest(ctx context.Context, path string) (*http.Request, error) {\n\tscheme := c.Scheme\n\tif scheme == \"\" {\n\t\tscheme = \"http\"\n\t}\n\tu := url.URL{Host: c.Host, Scheme: scheme, Path: path}\n\treq, err := http.NewRequest(\"DELETE\", u.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn req, nil\n}", "func (client VersionsClient) DeletePreparer(ctx context.Context, resourceGroupName string, templateSpecName string, templateSpecVersion string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"resourceGroupName\": autorest.Encode(\"path\", resourceGroupName),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t\t\"templateSpecName\": autorest.Encode(\"path\", templateSpecName),\n\t\t\"templateSpecVersion\": autorest.Encode(\"path\", templateSpecVersion),\n\t}\n\n\tconst APIVersion = \"2019-06-01-preview\"\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": APIVersion,\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsDelete(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Resources/templateSpecs/{templateSpecName}/versions/{templateSpecVersion}\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func (client DatasetClient) DeletePreparer(ctx context.Context, datasetID string) (*http.Request, error) {\n urlParameters := map[string]interface{} {\n \"geography\": autorest.Encode(\"path\",client.Geography),\n }\n\n pathParameters := map[string]interface{} {\n \"datasetId\": autorest.Encode(\"path\",datasetID),\n }\n\n const APIVersion = \"2.0\"\n queryParameters := map[string]interface{} {\n \"api-version\": APIVersion,\n }\n\n preparer := autorest.CreatePreparer(\nautorest.AsDelete(),\nautorest.WithCustomBaseURL(\"https://{geography}.atlas.microsoft.com\", urlParameters),\nautorest.WithPathParameters(\"/datasets/{datasetId}\",pathParameters),\nautorest.WithQueryParameters(queryParameters))\n return preparer.Prepare((&http.Request{}).WithContext(ctx))\n }", "func DeleteMatterHandler(c *gin.Context) {\n\tvar p form.BaseQueryParam\n\tif err := c.ShouldBind(&p); err != nil {\n\t\tutils.Error(c, err)\n\t\treturn\n\t}\n\n\tif err := models.DeleteMatterByUUID(p.UUID); err != nil {\n\t\tutils.Error(c, err)\n\t\treturn\n\t}\n\n\tutils.Ok(c, p.UUID)\n}" ]
[ "0.51636803", "0.5061084", "0.50478274", "0.49678305", "0.49114618", "0.49085727", "0.4899588", "0.48924032", "0.48808542", "0.48727188", "0.4860317", "0.48601234", "0.4849449", "0.48456842", "0.48401704", "0.48174173", "0.4815933", "0.48128834", "0.48122078", "0.4811524", "0.48079658", "0.48071232", "0.48025528", "0.4796067", "0.4789627", "0.47610107", "0.47575632", "0.47534496", "0.4750484", "0.47437075", "0.47355768", "0.47165695", "0.4704788", "0.4699988", "0.46746337", "0.4662933", "0.4662527", "0.46622765", "0.4661142", "0.4659252", "0.4656566", "0.46484774", "0.4643707", "0.46237963", "0.4617109", "0.46120882", "0.46059492", "0.46017173", "0.45972294", "0.45955142", "0.45846915", "0.45808673", "0.45791", "0.45771655", "0.4564926", "0.4564926", "0.45630237", "0.45580167", "0.45503005", "0.45486557", "0.45416698", "0.45312184", "0.45294684", "0.45286795", "0.4528594", "0.45270258", "0.45258775", "0.4523514", "0.4516902", "0.45140976", "0.45100325", "0.45098397", "0.45024934", "0.44995373", "0.44942728", "0.44934455", "0.44894525", "0.44869533", "0.44864556", "0.44830713", "0.44825354", "0.4475169", "0.44669244", "0.44665256", "0.44627514", "0.44618505", "0.4461549", "0.44595358", "0.4452947", "0.44527087", "0.445108", "0.44501022", "0.4445798", "0.44449082", "0.44440085", "0.44429258", "0.44366303", "0.4436088", "0.44356892", "0.44352454" ]
0.72907364
0
Deletes a static route
func (s *VPCService) DeleteStaticRoute(p *DeleteStaticRouteParams) (*DeleteStaticRouteResponse, error) { resp, err := s.cs.newRequest("deleteStaticRoute", p.toURLValues()) if err != nil { return nil, err } var r DeleteStaticRouteResponse if err := json.Unmarshal(resp, &r); err != nil { return nil, err } // If we have a async client, we need to wait for the async result if s.cs.async { b, err := s.cs.GetAsyncJobResult(r.JobID, s.cs.timeout) if err != nil { if err == AsyncTimeoutErr { return &r, err } return nil, err } if err := json.Unmarshal(b, &r); err != nil { return nil, err } } return &r, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (dsl *DeleteDSL) StaticRoute(vrf uint32, dstAddr string, nextHopAddr string) linux.DeleteDSL {\n\tdsl.vppDelete.StaticRoute(vrf, dstAddr, nextHopAddr)\n\treturn dsl\n}", "func (dsl *DeleteDSL) StaticRoute(vrf uint32, dstAddrInput *net.IPNet, nextHopAddrInput net.IP) linux.DeleteDSL {\n\tdsl.vppDelete.StaticRoute(vrf, dstAddrInput, nextHopAddrInput)\n\treturn dsl\n}", "func (r *Router) Delete(path, title string, fn Handle) {\n\tr.addRoute(\"DELETE\", path, title, fn)\n}", "func DelStaticPath(url string) *HttpServer {\n\tif !strings.HasPrefix(url, \"/\") {\n\t\turl = \"/\" + url\n\t}\n\tif url != \"/\" {\n\t\turl = strings.TrimRight(url, \"/\")\n\t}\n\tdelete(BConfig.WebConfig.StaticDir, url)\n\treturn BeeApp\n}", "func (f *Fastglue) DELETE(path string, h FastRequestHandler) {\n\tf.Router.DELETE(path, f.handler(h))\n}", "func (d *RouteDescriptor) Delete(key string, route *l3.Route, metadata interface{}) error {\n\terr := d.routeHandler.VppDelRoute(context.TODO(), route)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func Delete(path string, fn httprouter.Handle) {\n\tr.Router.DELETE(path, fn)\n}", "func deleteRoute(ip *net.IPNet) error {\n\tcmd := exec.Command(\"route\", \"delete\", ip.String())\n\treturn cmd.Run()\n}", "func (r *route) Delete(routeGUID string, opts ...bool) error {\n\tasync := true\n\trecursive := false\n\tif len(opts) > 0 {\n\t\tasync = opts[0]\n\t}\n\tif len(opts) > 1 {\n\t\trecursive = opts[1]\n\t}\n\trawURL := fmt.Sprintf(\"/v2/routes/%s?async=%t&recursive=%t\", routeGUID, async, recursive)\n\t_, err := r.client.Delete(rawURL)\n\treturn err\n}", "func (a *App) Delete(path string, f func(w http.ResponseWriter, r *http.Request)) {\r\n\ta.Router.HandleFunc(path, f).Methods(\"DELETE\")\r\n}", "func (r *Route) Delete(h http.Handler) *Route {\n\tr.Add(\"DELETE\", h)\n\n\treturn r\n}", "func (b *Baa) Delete(pattern string, h ...HandlerFunc) RouteNode {\n\treturn b.Router().Add(\"DELETE\", pattern, h)\n}", "func (s *ShrikeServer) DeleteRoute(w http.ResponseWriter, req *http.Request) {\n\troute := chi.URLParam(req, \"route\")\n\tif route == \"\" {\n\t\tlog.WithField(\"Route\", route).Info(\"Route must be the name of one of the proxy paths.\")\n\t\tRespondWithError(w, http.StatusBadRequest, JSONError{\n\t\t\tStatus: \"Bad Request\",\n\t\t\tMessage: \"Route must be the name of one of the proxy paths.\",\n\t\t})\n\t\treturn\n\t}\n\n\tproxy, err := s.client.Proxy(route)\n\tif err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"Route\": route,\n\t\t\t\"err\": err,\n\t\t}).Info(\"Error getting proxy to delete\")\n\t\tRespondWithError(w, http.StatusGone, JSONError{\n\t\t\tStatus: \"No Proxy\",\n\t\t\tMessage: \"No proxy by that name to remove.\",\n\t\t})\n\t\treturn\n\t}\n\terr = proxy.Delete()\n\tif err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"Route\": route,\n\t\t\t\"err\": err,\n\t\t}).Error(\"Error deleting a proxy\")\n\t\tRespondWithError(w, http.StatusInternalServerError, JSONError{\n\t\t\tStatus: \"Server Error\",\n\t\t\tMessage: \"Could not delete the proxy.\",\n\t\t})\n\t\treturn\n\t}\n\n\ts.ProxyStore.Delete(proxy)\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusNoContent)\n}", "func (a *App) Delete(path string, f func(w http.ResponseWriter, r *http.Request)) {\n\ta.Router.HandleFunc(path, f).Methods(\"DELETE\")\n}", "func DeleteTemplate(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintf(w, \"URL PATH - %s!\", r.URL.Path[1:])\n}", "func (r *RouterGroup) DELETE(path string, fn Controller) {\n\tr.gin.DELETE(path, adapt(fn))\n}", "func Delete(path string, f func(http.ResponseWriter, *http.Request)) *Route {\n\treturn NewRoute().Path(path).Method(HttpDelete).HandlerFunc(f)\n}", "func (router *Router) DELETE(relativePath string, handler Handler, decorators ...Decorator) {\n\trouter.createRouter(http.MethodDelete, relativePath, handler, \"\", decorators...)\n}", "func (h *Handler) Delete(path string, f func(w http.ResponseWriter, r *http.Request)) {\n\tpath = configuration.Instance.Service.Path + path\n\tlog.Println(\"Adding '\" + path + \"' as DELETE path\")\n\th.Router.HandleFunc(path, f).Methods(\"DELETE\")\n}", "func (m *RouteMux) Del(pattern string, handler http.HandlerFunc) {\n\tm.AddRoute(DELETE, pattern, handler)\n}", "func (r *Router) DELETE(path string, h HandlerFunc) {\n\tr.router.DELETE(path, r.handle(h, r.getValidationForPath(path, \"DELETE\")))\n}", "func (plugin *RouteConfigurator) DeleteRoute(route *l3.StaticRoutes_Route, vrfFromKey string) (wasError error) {\n\tplugin.log.Infof(\"Removing route %v -> %v\", route.DstIpAddr, route.NextHopAddr)\n\n\t// Validate VRF index from key and it's value in data.\n\tif err := plugin.validateVrfFromKey(route, vrfFromKey); err != nil {\n\t\treturn err\n\t}\n\n\t// Check if route entry is not just cached\n\trouteID := routeIdentifier(route.VrfId, route.DstIpAddr, route.NextHopAddr)\n\t_, _, found := plugin.rtCachedIndexes.LookupIdx(routeID)\n\tif found {\n\t\tplugin.log.Debugf(\"Route entry %v found in cache, removed\", routeID)\n\t\tplugin.rtCachedIndexes.UnregisterName(routeID)\n\t\t// Cached route is not configured on the VPP, return\n\t\treturn nil\n\t}\n\n\tswIdx, err := resolveInterfaceSwIndex(route.OutgoingInterface, plugin.ifIndexes)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Remove and unregister route.\n\tif err := plugin.rtHandler.VppDelRoute(route, swIdx); err != nil {\n\t\treturn err\n\t}\n\n\trouteIdentifier := routeIdentifier(route.VrfId, route.DstIpAddr, route.NextHopAddr)\n\t_, _, found = plugin.rtIndexes.UnregisterName(routeIdentifier)\n\tif found {\n\t\tplugin.log.Infof(\"Route %v unregistered\", routeIdentifier)\n\t} else {\n\t\tplugin.log.Warnf(\"Unregister failed, route %v not found\", routeIdentifier)\n\t}\n\n\tplugin.log.Infof(\"Route %v -> %v removed\", route.DstIpAddr, route.NextHopAddr)\n\treturn nil\n}", "func (s *Server) DELETE(path string, handle http.HandlerFunc) {\n\ts.router.DELETE(path, s.wrapHandler(handle))\n}", "func (app *App) Delete(path string, f func(w http.ResponseWriter, r *http.Request)) {\n\tapp.Router.HandleFunc(path, f).Methods(\"DELETE\")\n}", "func (s *Server) Delete(path string, f func(w http.ResponseWriter, r *http.Request)) {\n\ts.Router.HandleFunc(path, f).Methods(\"DELETE\")\n}", "func (r *Router) Delete(pattern string, handler http.Handler) Route {\n\treturn r.Handle(\"DELETE\", pattern, handler)\n}", "func Delete(client *occlient.Client, name string) error {\n\treturn client.DeleteRoute(name)\n}", "func (a *App) DELETE(pattern string, handler Handler) {\n\ta.add(\"DELETE\", pattern, handler)\n}", "func (app *App) Delete(url string, handler handlerFunc) {\n\trequestRegexp := app.craterRouter.normalizeRoute(url)\n\tapp.craterRequestHandler.handleDelete(requestRegexp, func(w http.ResponseWriter, r *http.Request) {\n\t\tapp.serveRequest(w, r, handler, requestRegexp)\n\t})\n}", "func (zic *ZoneInterconnectHandler) deleteLocalNodeStaticRoutes(node *corev1.Node, nodeID int, nodeTransitSwitchPortIPs []*net.IPNet) error {\n\tdeleteRoute := func(prefix, nexthop string) error {\n\t\tp := func(lrsr *nbdb.LogicalRouterStaticRoute) bool {\n\t\t\treturn lrsr.IPPrefix == prefix &&\n\t\t\t\tlrsr.Nexthop == nexthop &&\n\t\t\t\tlrsr.ExternalIDs[\"ic-node\"] == node.Name\n\t\t}\n\t\tif err := libovsdbops.DeleteLogicalRouterStaticRoutesWithPredicate(zic.nbClient, zic.networkClusterRouterName, p); err != nil {\n\t\t\treturn fmt.Errorf(\"failed to delete static route: %w\", err)\n\t\t}\n\t\treturn nil\n\t}\n\n\tnodeSubnets, err := util.ParseNodeHostSubnetAnnotation(node, zic.GetNetworkName())\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to parse node %s subnets annotation %w\", node.Name, err)\n\t}\n\n\tnodeSubnetStaticRoutes := zic.getStaticRoutes(nodeSubnets, nodeTransitSwitchPortIPs, false)\n\tfor _, staticRoute := range nodeSubnetStaticRoutes {\n\t\t// Possible optimization: Add all the routes in one transaction\n\t\tif err := deleteRoute(staticRoute.prefix, staticRoute.nexthop); err != nil {\n\t\t\treturn fmt.Errorf(\"error deleting static route %s - %s from the router %s : %w\", staticRoute.prefix, staticRoute.nexthop, zic.networkClusterRouterName, err)\n\t\t}\n\t}\n\n\tif zic.IsSecondary() {\n\t\t// Secondary network cluster router doesn't connect to a join switch\n\t\t// or to a Gateway router.\n\t\treturn nil\n\t}\n\n\t// Clear the routes connecting to the GW Router for the default network\n\tnodeGRPIPs, err := util.ParseNodeGatewayRouterLRPAddrs(node)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to parse node %s Gateway router LRP Addrs annotation %w\", node.Name, err)\n\t}\n\n\tnodenodeGRPIPStaticRoutes := zic.getStaticRoutes(nodeGRPIPs, nodeTransitSwitchPortIPs, true)\n\tfor _, staticRoute := range nodenodeGRPIPStaticRoutes {\n\t\t// Possible optimization: Add all the routes in one transaction\n\t\tif err := deleteRoute(staticRoute.prefix, staticRoute.nexthop); err != nil {\n\t\t\treturn fmt.Errorf(\"error deleting static route %s - %s from the router %s : %w\", staticRoute.prefix, staticRoute.nexthop, zic.networkClusterRouterName, err)\n\t\t}\n\t}\n\n\treturn nil\n}", "func (zic *ZoneInterconnectHandler) deleteLocalNodeStaticRoutes(node *corev1.Node, nodeID int, nodeTransitSwitchPortIPs []*net.IPNet) error {\n\tdeleteRoute := func(prefix, nexthop string) error {\n\t\tp := func(lrsr *nbdb.LogicalRouterStaticRoute) bool {\n\t\t\treturn lrsr.IPPrefix == prefix &&\n\t\t\t\tlrsr.Nexthop == nexthop &&\n\t\t\t\tlrsr.ExternalIDs[\"ic-node\"] == node.Name\n\t\t}\n\t\tif err := libovsdbops.DeleteLogicalRouterStaticRoutesWithPredicate(zic.nbClient, zic.networkClusterRouterName, p); err != nil {\n\t\t\treturn fmt.Errorf(\"failed to delete static route: %w\", err)\n\t\t}\n\t\treturn nil\n\t}\n\n\tnodeSubnets, err := util.ParseNodeHostSubnetAnnotation(node, zic.GetNetworkName())\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to parse node %s subnets annotation %w\", node.Name, err)\n\t}\n\n\tnodeSubnetStaticRoutes := zic.getStaticRoutes(nodeSubnets, nodeTransitSwitchPortIPs, false)\n\tfor _, staticRoute := range nodeSubnetStaticRoutes {\n\t\t// Possible optimization: Add all the routes in one transaction\n\t\tif err := deleteRoute(staticRoute.prefix, staticRoute.nexthop); err != nil {\n\t\t\treturn fmt.Errorf(\"error deleting static route %s - %s from the router %s : %w\", staticRoute.prefix, staticRoute.nexthop, zic.networkClusterRouterName, err)\n\t\t}\n\t}\n\n\tif zic.IsSecondary() {\n\t\t// Secondary network cluster router doesn't connect to a join switch\n\t\t// or to a Gateway router.\n\t\treturn nil\n\t}\n\n\t// Clear the routes connecting to the GW Router for the default network\n\tnodeGRPIPs, err := util.ParseNodeGatewayRouterLRPAddrs(node)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to parse node %s Gateway router LRP Addrs annotation %w\", node.Name, err)\n\t}\n\n\tnodenodeGRPIPStaticRoutes := zic.getStaticRoutes(nodeGRPIPs, nodeTransitSwitchPortIPs, true)\n\tfor _, staticRoute := range nodenodeGRPIPStaticRoutes {\n\t\t// Possible optimization: Add all the routes in one transaction\n\t\tif err := deleteRoute(staticRoute.prefix, staticRoute.nexthop); err != nil {\n\t\t\treturn fmt.Errorf(\"error deleting static route %s - %s from the router %s : %w\", staticRoute.prefix, staticRoute.nexthop, zic.networkClusterRouterName, err)\n\t\t}\n\t}\n\n\treturn nil\n}", "func (r *bitroute) DELETE(path string, f func(router.Control)) {\n\tr.register(\"DELETE\", path, f)\n}", "func (s *WebService) Delete(route string, handler interface{}) {\r\n\ts.addRoute(route, \"DELETE\", handler)\r\n}", "func (r *Router) DELETE(route string, handler interface{}) *Router {\n\tr.Handle(MethodDELETE, route, handler)\n\treturn r\n}", "func (a *ApiServer) Delete(path string, f func(w http.ResponseWriter, r *http.Request)) *ApiServer{\n\ta.Router.HandleFunc(path, f).Methods(\"DELETE\")\n\treturn a\n}", "func Delete(path string, handler http.Handler) Route {\n\treturn NewRoute(\"DELETE\", path, handler)\n}", "func Delete(route string, do interface{}) *handler {\n\treturn handlerByMethod(&route, do, \"DELETE\")\n}", "func (n *NS) Del(url string) *route {\n\treturn &route{context: n.c, method: \"DELETE\", url: n.prefix + url, bCtrl: n.bCtrl, aCtrl: n.aCtrl}\n}", "func (router *Router) Delete(path string, handler http.Handler) {\n\trouter.Handle(\"DELETE\", path, handler)\n}", "func (e *Engine) DELETE(path string, handler Handler) {\n\te.registerRoute(http.MethodDelete, path, handler)\n}", "func (az *Cloud) DeleteRoute(ctx context.Context, clusterName string, kubeRoute *cloudprovider.Route) error {\n\tmc := metrics.NewMetricContext(\"routes\", \"delete_route\", az.ResourceGroup, az.SubscriptionID, \"\")\n\tisOperationSucceeded := false\n\tdefer func() {\n\t\tmc.ObserveOperationWithResult(isOperationSucceeded)\n\t}()\n\n\t// Returns for unmanaged nodes because azure cloud provider couldn't fetch information for them.\n\tnodeName := string(kubeRoute.TargetNode)\n\tunmanaged, err := az.IsNodeUnmanaged(nodeName)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif unmanaged {\n\t\tklog.V(2).Infof(\"DeleteRoute: omitting unmanaged node %q\", kubeRoute.TargetNode)\n\t\taz.routeCIDRsLock.Lock()\n\t\tdefer az.routeCIDRsLock.Unlock()\n\t\tdelete(az.routeCIDRs, nodeName)\n\t\treturn nil\n\t}\n\n\trouteName := mapNodeNameToRouteName(az.ipv6DualStackEnabled, kubeRoute.TargetNode, string(kubeRoute.DestinationCIDR))\n\tklog.V(2).Infof(\"DeleteRoute: deleting route. clusterName=%q instance=%q cidr=%q routeName=%q\", clusterName, kubeRoute.TargetNode, kubeRoute.DestinationCIDR, routeName)\n\troute := network.Route{\n\t\tName: pointer.String(routeName),\n\t\tRoutePropertiesFormat: &network.RoutePropertiesFormat{},\n\t}\n\top, err := az.routeUpdater.addRouteOperation(routeOperationDelete, route)\n\tif err != nil {\n\t\tklog.Errorf(\"DeleteRoute failed for node %q with error: %v\", kubeRoute.TargetNode, err)\n\t\treturn err\n\t}\n\n\t// Wait for operation complete.\n\terr = op.wait()\n\tif err != nil {\n\t\tklog.Errorf(\"DeleteRoute failed for node %q with error: %v\", kubeRoute.TargetNode, err)\n\t\treturn err\n\t}\n\n\t// Remove outdated ipv4 routes as well\n\tif az.ipv6DualStackEnabled {\n\t\trouteNameWithoutIPV6Suffix := strings.Split(routeName, routeNameSeparator)[0]\n\t\tklog.V(2).Infof(\"DeleteRoute: deleting route. clusterName=%q instance=%q cidr=%q routeName=%q\", clusterName, kubeRoute.TargetNode, kubeRoute.DestinationCIDR, routeNameWithoutIPV6Suffix)\n\t\troute := network.Route{\n\t\t\tName: pointer.String(routeNameWithoutIPV6Suffix),\n\t\t\tRoutePropertiesFormat: &network.RoutePropertiesFormat{},\n\t\t}\n\t\top, err := az.routeUpdater.addRouteOperation(routeOperationDelete, route)\n\t\tif err != nil {\n\t\t\tklog.Errorf(\"DeleteRoute failed for node %q with error: %v\", kubeRoute.TargetNode, err)\n\t\t\treturn err\n\t\t}\n\n\t\t// Wait for operation complete.\n\t\terr = op.wait()\n\t\tif err != nil {\n\t\t\tklog.Errorf(\"DeleteRoute failed for node %q with error: %v\", kubeRoute.TargetNode, err)\n\t\t\treturn err\n\t\t}\n\t}\n\n\tklog.V(2).Infof(\"DeleteRoute: route deleted. clusterName=%q instance=%q cidr=%q\", clusterName, kubeRoute.TargetNode, kubeRoute.DestinationCIDR)\n\tisOperationSucceeded = true\n\n\treturn nil\n}", "func (r *Router) DELETE(path string, handle Handle) {\n\tr.Handle(\"DELETE\", path, handle)\n}", "func (r *Route) Delete(h interface{}) *Route {\n\treturn r.Handle(toHandler(h), \"DELETE\")\n}", "func (r *Router) DELETE(url string, viewFn View) *Path {\n\treturn r.Path(fasthttp.MethodDelete, url, viewFn)\n}", "func (r *Router) DELETE(path string, handle HandlerFunc, middleware ...MiddlewareFunc) {\n\tr.Handle(\"DELETE\", path, handle, middleware...)\n}", "func (r *Router) Delete(path string, handle requestHandler, config ...RouteConfig) {\n\tr.routers[\"DELETE\"] = append(r.routers[\"DELETE\"], newRouteHandler(path, handle, config...))\n}", "func (r *RESTClient) DeleteRoute(params DeleteRouteParams) error {\n\tendpoint := r.baseEndpoints.accountRoutes\n\tendpoint.Path = path.Join(endpoint.Path, \"network\", url.PathEscape(params.Network.String()))\n\tsetVnetParam(&endpoint, params.VNetID)\n\n\tresp, err := r.sendRequest(\"DELETE\", endpoint, nil)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"REST request failed\")\n\t}\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode == http.StatusOK {\n\t\t_, err := parseRoute(resp.Body)\n\t\treturn err\n\t}\n\n\treturn r.statusCodeToError(\"delete route\", resp)\n}", "func (to *Session) DeleteStaticDNSEntry(id int, opts RequestOptions) (tc.Alerts, toclientlib.ReqInf, error) {\n\tif opts.QueryParameters == nil {\n\t\topts.QueryParameters = url.Values{}\n\t}\n\topts.QueryParameters.Set(\"id\", strconv.Itoa(id))\n\tvar alerts tc.Alerts\n\treqInf, err := to.del(apiStaticDNSEntries, opts, &alerts)\n\treturn alerts, reqInf, err\n}", "func (r *Router) DELETE(pattern string, handler func(Context)) Route {\n\treturn r.Handle(\"DELETE\", pattern, wrap(handler))\n}", "func (f5 *f5LTM) deleteRoute(policyname, routename string) error {\n\truleUrl := fmt.Sprintf(\"https://%s/mgmt/tm/ltm/policy/%s/rules/%s\",\n\t\tf5.host, f5.iControlUriResourceId(policyname), routename)\n\n\terr := f5.delete(ruleUrl, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdelete(f5.routes[policyname], routename)\n\n\tglog.V(4).Infof(\"Route %s deleted.\", routename)\n\n\treturn nil\n}", "func (a *Router) Delete(pattern string, hs ...func(*Context) error) *Router {\n\treturn a.Handle(http.MethodDelete, pattern, hs...)\n}", "func (h FileHandler) Remove(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\thash := vars[\"filehash\"]\n\n\tfilepath := getHashedFilepath(h.staticDir, hash)\n\n\tif exist := h.fs.Exist(filepath); !exist {\n\t\th.sendBadRequestError(w, \"file with that name doesn`t exist\")\n\t\treturn\n\t}\n\n\tif err := h.fs.RemoveFile(getHashedFilepath(h.staticDir, hash)); err != nil {\n\t\th.sendInternalError(w, \"removing file failed\")\n\t\treturn\n\t}\n\n\tw.Write([]byte(\"ok\"))\n}", "func (r *Route) Delete(handler http.Handler) *Route {\n\tr.handlers[http.MethodDelete] = handler\n\treturn r\n}", "func (hh *HealthCheckHandler) Delete(w http.ResponseWriter, r *http.Request) {\n\tuuid := utils.ExtractUUID(r.URL.String())\n\thh.db.Delete(uuid)\n}", "func (group *RouterGroup) DELETE(relativePath string, handlers ...HandlerFunc) IRoutes {\n\treturn group.Handler(\"DELETE\", relativePath, handlers...)\n}", "func (p *PatternServeMux) Del(pat string, h http.Handler) {\n\tp.Add(\"DELETE\", pat, h)\n}", "func Delete(route Route) error {\n\treturn fmt.Errorf(\"Operation not supported \")\n}", "func (dsl *PutDSL) StaticRoute(val *vpp_l3.StaticRoutes_Route) linux.PutDSL {\n\tdsl.vppPut.StaticRoute(val)\n\treturn dsl\n}", "func (dsl *PutDSL) StaticRoute(val *vpp_l3.StaticRoutes_Route) linux.PutDSL {\n\tdsl.vppPut.StaticRoute(val)\n\treturn dsl\n}", "func (rg *RouteGroup) DELETE(path string, handlers ...Handler) *Route {\n\treturn rg.add(\"DELETE\", path, handlers)\n}", "func (msg MsgDeleteShareHolder) Route() string { return RouterKey }", "func (m *Mux) Delete(pattern string, handler HandlerFunc) {\n\tm.Handle(http.MethodDelete, pattern, handler)\n}", "func (g *RouterGroup) DELETE(url string, handler ...Handler) *RouterGroup {\n\tg.app.routeANY = false\n\tg.AppendReqAndResp(url, \"delete\", handler)\n\treturn g\n}", "func (k *RoutesCollection) Delete(nameOrID string) error {\n\tif nameOrID == \"\" {\n\t\treturn errIDRequired\n\t}\n\n\ttxn := k.db.Txn(true)\n\tdefer txn.Abort()\n\n\terr := deleteRoute(txn, nameOrID)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttxn.Commit()\n\treturn nil\n}", "func (group *RouterGroup) DELETE(path string, handlers ...HandlerFunc) {\n\tgroup.Handle(\"DELETE\", path, handlers)\n}", "func (mx *Mux) Delete(pattern string, handlerFn http.HandlerFunc) {\n\tmx.handle(mDELETE, pattern, handlerFn)\n}", "func (router *Router) DeleteFunc(path string, handler http.HandlerFunc) {\n\trouter.Handle(\"DELETE\", path, handler)\n}", "func (r *Router) DELETE(path string, handler RequestHandler) {\n\tr.setPath(httpDELETE, path, handler)\n}", "func (rg *RouteGroup) Delete(path string, handlers ...Handler) *Route {\n\treturn rg.add(\"DELETE\", path, handlers)\n}", "func (r *Mux) DELETE(path string, handler http.HandlerFunc) {\n\tr.HandleFunc(\"DELETE\", path, handler)\n}", "func (engine *Engine) DELETE(relativePath string, handlers ...HandlerFunc) IRoutes {\n\treturn engine.handle(http.MethodDelete, relativePath, handlers)\n}", "func (f5 *f5LTM) DeleteSecureRoute(routename string) error {\n\treturn f5.deleteRoute(httpsPolicyName, routename)\n}", "func (res *Resource) Delete(storage store.Delete) {\n\tres.HandleFuncC(\n\t\tpat.Delete(patID),\n\t\tfunc(ctx context.Context, w http.ResponseWriter, r *http.Request) {\n\t\t\tres.deleteHandler(ctx, w, r, storage)\n\t\t},\n\t)\n\n\tres.addRoute(delete, patID)\n}", "func (s *RouteStorage) Remove(ctx context.Context, route *types.Route) error {\n\n\tlog.V(logLevel).Debugf(\"storage:etcd:route:> remove route: %#v\", route)\n\n\tif err := s.checkRouteExists(ctx, route); err != nil {\n\t\treturn err\n\t}\n\n\tclient, destroy, err := getClient(ctx)\n\tif err != nil {\n\t\tlog.V(logLevel).Errorf(\"storage:etcd:route:> remove err: %s\", err.Error())\n\t\treturn err\n\t}\n\tdefer destroy()\n\n\tkey := keyCreate(routeStorage, s.keyGet(route))\n\tif err := client.DeleteDir(ctx, key); err != nil {\n\t\tlog.V(logLevel).Errorf(\"storage:etcd:route:> remove route err: %s\", err.Error())\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (sh ServerHandler) DefineStaticRoute(r *mux.Router) {\n\tr.Methods(\"GET\").PathPrefix(\"/static/\").HandlerFunc(sh.serveStatic)\n}", "func (z *Zone) DeleteStaticRecord(n string, t string, c string) (error) {\n\tdeleted := false\n\tmutableMutex.Lock()\n\tdefer mutableMutex.Unlock()\n\tif z.StaticRecordList == nil {\n\t\tz.StaticRecordList = make([]*StaticRecord, 0)\n\t}\n\tnewStaticRecordList := make([]*StaticRecord, 0, len(z.StaticRecordList) - 1)\n\tfor _, sr := range z.StaticRecordList {\n\t\tif sr.Name == n && sr.Type == t && sr.Content == c {\n\t\t\tdeleted = true\n\t\t\tcontinue\n\t\t}\n\t\tnewStaticRecordList = append(newStaticRecordList, sr)\n\t}\n\tif !deleted {\n\t\treturn errors.Errorf(\"can not delete because not exists\")\n\t}\n\tz.StaticRecordList = newStaticRecordList\n\treturn nil\n}", "func Delete(path string, fn http.HandlerFunc, c ...alice.Constructor) {\n\tinfoMutex.Lock()\n\trecord(\"DELETE\", path)\n\tr.Delete(path, alice.New(c...).ThenFunc(fn).(http.HandlerFunc))\n\tinfoMutex.Unlock()\n}", "func (msg MsgDeleteName) Route() string { return RouterKey }", "func (group *RouterGroup) DELETE(relativePath string, handlers ...HandlerFunc) IRoutes {\n\treturn group.handle(http.MethodDelete, relativePath, handlers)\n}", "func (plugin *RouteConfigurator) DeleteRoutes(config *l3.StaticRoutes) (wasError error) {\n\troutes := plugin.protoRoutesToStruct(config)\n\tfor i := range routes {\n\t\terr := plugin.vppDelRoute(routes[i])\n\t\tif err != nil {\n\t\t\twasError = err\n\t\t}\n\t}\n\n\treturn wasError\n}", "func (r *Router) DeleteFunc(pattern string, fn http.HandlerFunc) Route {\n\treturn r.Delete(pattern, http.HandlerFunc(fn))\n}", "func (mm *Middleman) Delete(path string, middleware Middleware) error {\r\n\treturn mm.addMiddleware(path, http.MethodDelete, middleware)\r\n}", "func (f5 *f5LTM) DeleteInsecureRoute(routename string) error {\n\treturn f5.deleteRoute(httpPolicyName, routename)\n}", "func (a *FrinxOpenconfigNetworkInstanceApiService) DeleteFrinxOpenconfigNetworkInstanceNetworkInstancesNetworkInstanceProtocolsProtocolStaticRoutesStatic(ctx context.Context, name string, identifier string, protocolName string, prefix string, nodeId string) (*http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Delete\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\t\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/config/network-topology:network-topology/network-topology:topology/unified/network-topology:node/{node-id}/yang-ext:mount/frinx-openconfig-network-instance:network-instances/frinx-openconfig-network-instance:network-instance/{name}/frinx-openconfig-network-instance:protocols/frinx-openconfig-network-instance:protocol/{identifier}/{protocol-name}/frinx-openconfig-network-instance:static-routes/frinx-openconfig-network-instance:static/{prefix}/\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"name\"+\"}\", fmt.Sprintf(\"%v\", name), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"identifier\"+\"}\", fmt.Sprintf(\"%v\", identifier), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"protocol-name\"+\"}\", fmt.Sprintf(\"%v\", protocolName), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"prefix\"+\"}\", fmt.Sprintf(\"%v\", prefix), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"node-id\"+\"}\", fmt.Sprintf(\"%v\", nodeId), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{\"application/json\", \"application/xml\"}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\", \"application/xml\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\t\n\t\treturn localVarHttpResponse, newErr\n\t}\n\n\treturn localVarHttpResponse, nil\n}", "func (r *Router) Delete(path string, handler httpHandler) {\n\tr.DELETE(path, wrapHandler(handler))\n}", "func (m *Mux) DeleteFunc(path string, handler http.HandlerFunc) *Route {\n\treturn m.register(\"DELETE\", path, handler)\n}", "func (dsl *DeleteDSL) LinuxRoute(routeName string) linux.DeleteDSL {\n\tdsl.parent.txn.Delete(l3.StaticRouteKey(routeName))\n\treturn dsl\n}", "func (hd *Datapath) DeleteRoute(rt *netproto.Route, vrf *netproto.Vrf) error {\n\t// This will ensure that only one datapath config will be active at a time. This is a temporary restriction\n\t// to ensure that HAL will use a single config thread , this will be removed prior to FCS to allow parallel configs to go through.\n\t// TODO Remove Global Locking\n\thd.Lock()\n\tdefer hd.Unlock()\n\tvrfKey := &halproto.VrfKeyHandle{\n\t\tKeyOrHandle: &halproto.VrfKeyHandle_VrfId{\n\t\t\tVrfId: vrf.Status.VrfID,\n\t\t},\n\t}\n\n\t// Build next hop key\n\tnextHopKey := &halproto.NexthopKeyHandle{\n\t\tKeyOrHandle: &halproto.NexthopKeyHandle_NexthopId{\n\t\t\tNexthopId: rt.Status.RouteID,\n\t\t},\n\t}\n\n\t// Build route key\n\tip, net, err := net.ParseCIDR(rt.Spec.IPPrefix)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error parsing the IP Prefix mask from %v. Err: %v\", rt.Spec.IPPrefix, err)\n\n\t}\n\tprefixLen, _ := net.Mask.Size()\n\tipPrefix := &halproto.IPPrefix{\n\t\tAddress: &halproto.IPAddress{\n\t\t\tIpAf: halproto.IPAddressFamily_IP_AF_INET,\n\t\t\tV4OrV6: &halproto.IPAddress_V4Addr{\n\t\t\t\tV4Addr: ipv4Touint32(ip),\n\t\t\t},\n\t\t},\n\t\tPrefixLen: uint32(prefixLen),\n\t}\n\n\trouteKey := &halproto.RouteKeyHandle{\n\t\tKeyOrHandle: &halproto.RouteKeyHandle_RouteKey{\n\t\t\tRouteKey: &halproto.RouteKey{\n\t\t\t\tVrfKeyHandle: vrfKey,\n\t\t\t\tIpPrefix: ipPrefix,\n\t\t\t},\n\t\t},\n\t}\n\n\tnhDelReq := &halproto.NexthopDeleteRequestMsg{\n\t\tRequest: []*halproto.NexthopDeleteRequest{\n\t\t\t{\n\t\t\t\tKeyOrHandle: nextHopKey,\n\t\t\t},\n\t\t},\n\t}\n\n\trtDelReq := &halproto.RouteDeleteRequestMsg{\n\t\tRequest: []*halproto.RouteDeleteRequest{\n\t\t\t{\n\t\t\t\tKeyOrHandle: routeKey,\n\t\t\t},\n\t\t},\n\t}\n\n\t// delete hal objects\n\tif hd.Kind == \"hal\" {\n\t\t// delete route\n\t\trtResp, err := hd.Hal.Netclient.RouteDelete(context.Background(), rtDelReq)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error deleting route. Err: %v\", err)\n\t\t\treturn err\n\t\t}\n\t\tif rtResp.Response[0].ApiStatus != halproto.ApiStatus_API_STATUS_OK {\n\t\t\tlog.Errorf(\"HAL returned non OK status. %v\", rtResp.Response[0].ApiStatus.String())\n\t\t\treturn fmt.Errorf(\"HAL returned non OK status. %v\", rtResp.Response[0].ApiStatus.String())\n\t\t}\n\n\t\t// delete next hop\n\t\tnhResp, err := hd.Hal.Netclient.NexthopDelete(context.Background(), nhDelReq)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error deleting next hop. Err: %v\", err)\n\t\t\treturn err\n\t\t}\n\t\tif nhResp.Response[0].ApiStatus != halproto.ApiStatus_API_STATUS_OK {\n\t\t\tlog.Errorf(\"HAL returned non OK status. %v\", nhResp.Response[0].ApiStatus.String())\n\t\t\treturn fmt.Errorf(\"HAL returned non OK status. %v\", nhResp.Response[0].ApiStatus.String())\n\t\t}\n\t} else {\n\t\t_, err := hd.Hal.Netclient.RouteDelete(context.Background(), rtDelReq)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error creating route. Err: %v\", err)\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "func (m *Middleware) DELETE(path string, handler Handler) {\n\tm.engine.DELETE(path, m.apply(handler))\n}", "func (m *MongoDB) DeleteRoute(routeID string) error {\n\treturn m.routes.Remove(bson.M{\"id\": routeID})\n}", "func (api *Api) Delete(path string, endpoint http.HandlerFunc, queries ...string) {\n\tapi.Router.HandleFunc(path, endpoint).Methods(\"DELETE\").Queries(queries...)\n}", "func Delete(path string, fn http.HandlerFunc, c ...alice.Constructor) {\n\trecord(\"DELETE\", path)\n\n\tinfoMutex.Lock()\n\tr.DELETE(path, Handler(alice.New(c...).ThenFunc(fn)))\n\tinfoMutex.Unlock()\n}", "func Delete(route Route) error {\n\treturn errUnsupportedOp\n}", "func (this *Route) DELETE(handlers ...HTTPHandler) *Route {\n\treturn this.addHandler(\"delete\", handlers...)\n}", "func (ds *MySQLDatastore) RemoveRoute(ctx context.Context, appName, routePath string) error {\n\tres, err := ds.db.Exec(`\n\t\tDELETE FROM routes\n\t\tWHERE path = ? AND app_name = ?\n\t`, routePath, appName)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tn, err := res.RowsAffected()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif n == 0 {\n\t\treturn models.ErrRoutesRemoving\n\t}\n\n\treturn nil\n}", "func (t *table) Delete(router.Route) error {\n\treturn nil\n}", "func (r *Router) Delete(path string, handler http.Handler) {\n\tr.DELETE(path, wrapHandler(handler))\n}", "func (r *Router) Delete(path string, handler http.Handler) {\n\tr.DELETE(path, wrapHandler(handler))\n}", "func (r *RTNL) RouteDel(dst net.IP) error {\n\tif err := r.init(); err != nil {\n\t\treturn err\n\t}\n\tmsg := rtnetlink.RouteMessage{\n\t\tFamily: uint8(getFamily(dst)),\n\t\tTable: unix.RT_TABLE_MAIN,\n\t\t// TODO make this configurable?\n\t\tProtocol: unix.RTPROT_UNSPEC,\n\t\t// TODO make this configurable?\n\t\tScope: unix.RT_SCOPE_NOWHERE,\n\t\tType: unix.RTN_UNSPEC,\n\t\tAttributes: rtnetlink.RouteAttributes{\n\t\t\tDst: dst,\n\t\t},\n\t}\n\tif err := r.conn.Route.Delete(&msg); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (msg MsgDeleteProfile) Route() string { return RouterKey }" ]
[ "0.6992297", "0.6928448", "0.6716439", "0.6636969", "0.66279626", "0.6491174", "0.6484374", "0.6477423", "0.6462206", "0.64605707", "0.64602065", "0.6450006", "0.64153576", "0.63987863", "0.63880146", "0.63634586", "0.6355619", "0.63439953", "0.6343445", "0.63398665", "0.6337195", "0.6330324", "0.6319412", "0.6318447", "0.63177013", "0.63173544", "0.631262", "0.6310754", "0.6295924", "0.62864673", "0.62864673", "0.62641186", "0.62623584", "0.6257626", "0.6218435", "0.6208574", "0.6199139", "0.6197584", "0.61631554", "0.61332095", "0.6130878", "0.61263657", "0.610916", "0.6086334", "0.60836285", "0.60686636", "0.60574687", "0.6039474", "0.60393596", "0.6035863", "0.6029006", "0.60229576", "0.6015037", "0.60048765", "0.6004076", "0.59958154", "0.59638184", "0.595943", "0.595943", "0.5917987", "0.59081817", "0.5906691", "0.59013546", "0.58879745", "0.5887743", "0.5885007", "0.5880479", "0.5880058", "0.5875023", "0.58522505", "0.5850722", "0.5841677", "0.58313847", "0.58305365", "0.58289295", "0.58229774", "0.58194387", "0.58184195", "0.58171165", "0.5800105", "0.5799583", "0.5781323", "0.57618815", "0.576081", "0.5757896", "0.5753514", "0.5734495", "0.5730951", "0.5727282", "0.5720142", "0.5713551", "0.57039684", "0.56968385", "0.5677436", "0.5676475", "0.56714666", "0.56665975", "0.56665975", "0.56651855", "0.56415373" ]
0.7591947
0
You should always use this function to get a new DeleteVPCParams instance, as then you are sure you have configured all required params
func (s *VPCService) NewDeleteVPCParams(id string) *DeleteVPCParams { p := &DeleteVPCParams{} p.p = make(map[string]interface{}) p.p["id"] = id return p }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (s *VPCService) NewDeleteVPCOfferingParams(id string) *DeleteVPCOfferingParams {\n\tp := &DeleteVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (s *VPCService) NewDeletePrivateGatewayParams(id string) *DeletePrivateGatewayParams {\n\tp := &DeletePrivateGatewayParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewDeleteKeyPairsParams() *DeleteKeyPairsParams {\n\tvar ()\n\treturn &DeleteKeyPairsParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteSubnetParams() *DeleteSubnetParams {\n\tvar ()\n\treturn &DeleteSubnetParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func DeleteVPCMocked(t *testing.T, vpcIn *types.Vpc) {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewVPCService(cs)\n\tassert.Nil(err, \"Couldn't load VPC service\")\n\tassert.NotNil(ds, \"VPC service not instanced\")\n\n\t// to json\n\tdIn, err := json.Marshal(vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// call service\n\tcs.On(\"Delete\", fmt.Sprintf(\"/network/vpcs/%s\", vpcIn.ID)).Return(dIn, 200, nil)\n\terr = ds.DeleteVPC(vpcIn.ID)\n\tassert.Nil(err, \"Error deleting VPC\")\n}", "func (ts *Tester) deleteVPC() error {\n\tif !ts.cfg.VPC.Create {\n\t\tts.lg.Info(\"VPC.Create false; skipping deletion\")\n\t\treturn nil\n\t}\n\n\twaitDur := 30 * time.Second\n\tts.lg.Info(\"sleeping before VPC deletion\", zap.Duration(\"wait\", waitDur))\n\ttime.Sleep(waitDur)\n\n\tts.lg.Info(\"deleting VPC\", zap.String(\"vpc-id\", ts.cfg.VPC.ID))\n\n\tvar errs []string\n\n\tif err := ts.revokeSecurityGroups(); err != nil {\n\t\tts.lg.Warn(\"failed to delete ELB v2\", zap.Error(err))\n\t\ttime.Sleep(10 * time.Second) // retry\n\t}\n\tif err := ts.deleteELBv2(); err != nil {\n\t\tts.lg.Warn(\"failed to delete ELB v2\", zap.Error(err))\n\t\ttime.Sleep(10 * time.Second) // retry\n\t}\n\tif err := ts.deleteDHCPOptions(); err != nil {\n\t\tts.lg.Warn(\"failed to delete DHCP options\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\n\tif err := ts.deletePrivateSubnetRouteTableAssociation(); err != nil {\n\t\tts.lg.Warn(\"failed to delete subnet route table association\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\tif err := ts.deletePrivateRouteTables(); err != nil {\n\t\tts.lg.Warn(\"failed to delete private route tables\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\tif err := ts.deletePrivateSubnets(); err != nil {\n\t\tts.lg.Warn(\"failed to delete private subnets\", zap.Error(err))\n\t\ttime.Sleep(10 * time.Second)\n\t}\n\n\tselect {\n\tcase <-time.After(30 * time.Second):\n\tcase <-ts.stopCreationCh:\n\t\treturn errors.New(\"stopped\")\n\t}\n\n\tif err := ts.deleteELBv2(); err != nil {\n\t\tts.lg.Warn(\"failed to delete ELB v2\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\tif err := ts.revokeSecurityGroups(); err != nil {\n\t\tts.lg.Warn(\"failed to revoke security groups\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\n\tselect {\n\tcase <-time.After(10 * time.Second):\n\tcase <-ts.stopCreationCh:\n\t\treturn errors.New(\"stopped\")\n\t}\n\n\tif err := ts.deletePublicNATGateways(); err != nil {\n\t\tts.lg.Warn(\"failed to delete public NAT gateways\", zap.Error(err))\n\t\ttime.Sleep(20 * time.Second)\n\t}\n\tif err := ts.deletePublicEIPs(); err != nil {\n\t\tts.lg.Warn(\"failed to delete public EIPs\", zap.Error(err))\n\t\ttime.Sleep(10 * time.Second)\n\t}\n\n\tselect {\n\tcase <-time.After(10 * time.Second):\n\tcase <-ts.stopCreationCh:\n\t\treturn errors.New(\"stopped\")\n\t}\n\n\t// try again, NAT gateway delete may take some time\n\tif err := ts.deletePublicNATGateways(); err != nil {\n\t\tts.lg.Warn(\"failed to delete public NAT gateways\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\tif err := ts.deletePublicEIPs(); err != nil {\n\t\tts.lg.Warn(\"failed to delete public EIPs\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\n\tselect {\n\tcase <-time.After(10 * time.Second):\n\tcase <-ts.stopCreationCh:\n\t\treturn errors.New(\"stopped\")\n\t}\n\n\tif err := ts.deletePublicSubnetRouteTableAssociation(); err != nil {\n\t\tts.lg.Warn(\"failed to delete public subnet route table association\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\tif err := ts.deletePublicRouteTable(); err != nil {\n\t\tts.lg.Warn(\"failed to delete public route table\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\tif err := ts.deletePrivateSubnets(); err != nil {\n\t\tts.lg.Warn(\"failed to delete private subnets\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\tif err := ts.deletePublicSubnets(); err != nil {\n\t\tts.lg.Warn(\"failed to delete public subnets\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\n\tselect {\n\tcase <-time.After(10 * time.Second):\n\tcase <-ts.stopCreationCh:\n\t\treturn errors.New(\"stopped\")\n\t}\n\n\tif err := ts.deleteVPCGatewayAttachment(); err != nil {\n\t\tts.lg.Warn(\"failed to VPC gateway attachment\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\tif err := ts.deleteInternetGateway(); err != nil {\n\t\tts.lg.Warn(\"failed to delete internet gateway\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\n\tselect {\n\tcase <-time.After(10 * time.Second):\n\tcase <-ts.stopCreationCh:\n\t\treturn errors.New(\"stopped\")\n\t}\n\n\tif err := ts.deleteOtherSecurityGroups(); err != nil {\n\t\tts.lg.Warn(\"failed to delete sg\", zap.Error(err))\n\t\ttime.Sleep(10 * time.Second)\n\t}\n\tif err := ts.deleteSecurityGroups(); err != nil {\n\t\tts.lg.Warn(\"failed to delete ENIs\", zap.Error(err))\n\t\ttime.Sleep(10 * time.Second)\n\t}\n\n\tselect {\n\tcase <-time.After(20 * time.Second):\n\tcase <-ts.stopCreationCh:\n\t\treturn errors.New(\"stopped\")\n\t}\n\n\tif err := ts.deleteSecurityGroups(); err != nil {\n\t\tts.lg.Warn(\"failed to delete ENIs\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\n\tif err := ts._deleteVPC(); err != nil {\n\t\tts.lg.Warn(\"failed to delete VPC\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\n\tif len(errs) > 0 {\n\t\treturn errors.New(strings.Join(errs, \",\"))\n\t}\n\treturn nil\n}", "func NewDeleteTagParams() *DeleteTagParams {\n\tvar ()\n\treturn &DeleteTagParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteVeditProjectRequestWithoutParam() *DeleteVeditProjectRequest {\n\n return &DeleteVeditProjectRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/veditProjects/{projectId}\",\n Method: \"DELETE\",\n Header: nil,\n Version: \"v1\",\n },\n }\n}", "func (s *VPCService) NewCreateVPCParams(cidr string, displaytext string, name string, vpcofferingid string, zoneid string) *CreateVPCParams {\n\tp := &CreateVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"cidr\"] = cidr\n\tp.p[\"displaytext\"] = displaytext\n\tp.p[\"name\"] = name\n\tp.p[\"vpcofferingid\"] = vpcofferingid\n\tp.p[\"zoneid\"] = zoneid\n\treturn p\n}", "func (client *PublicIPAddressesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, publicIPAddressName string, options *PublicIPAddressesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/publicIPAddresses/{publicIpAddressName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif publicIPAddressName == \"\" {\n\t\treturn nil, errors.New(\"parameter publicIPAddressName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{publicIpAddressName}\", url.PathEscape(publicIPAddressName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *PeeringPoliciesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, managedNetworkName string, managedNetworkPeeringPolicyName string, options *PeeringPoliciesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedNetwork/managedNetworks/{managedNetworkName}/managedNetworkPeeringPolicies/{managedNetworkPeeringPolicyName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif managedNetworkName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedNetworkName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedNetworkName}\", url.PathEscape(managedNetworkName))\n\tif managedNetworkPeeringPolicyName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedNetworkPeeringPolicyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedNetworkPeeringPolicyName}\", url.PathEscape(managedNetworkPeeringPolicyName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-06-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewDeleteVersionControlRequestParams() *DeleteVersionControlRequestParams {\n\treturn &DeleteVersionControlRequestParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteDataSourceParams() *DeleteDataSourceParams {\n\treturn &DeleteDataSourceParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *CloudServicesClient) deleteInstancesCreateRequest(ctx context.Context, resourceGroupName string, cloudServiceName string, options *CloudServicesClientBeginDeleteInstancesOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/delete\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-09-04\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\tif options != nil && options.Parameters != nil {\n\t\treturn req, runtime.MarshalAsJSON(req, *options.Parameters)\n\t}\n\treturn req, nil\n}", "func (rm *resourceManager) newDeleteRequestPayload(\n\tr *resource,\n) (*svcsdk.DeleteVpcPeeringConnectionInput, error) {\n\tres := &svcsdk.DeleteVpcPeeringConnectionInput{}\n\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Status.VPCPeeringConnectionID != nil {\n\t\tres.SetVpcPeeringConnectionId(*r.ko.Status.VPCPeeringConnectionID)\n\t}\n\n\treturn res, nil\n}", "func (client *SourceControlConfigurationsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, clusterRp string, clusterResourceName string, clusterName string, sourceControlConfigurationName string, options *SourceControlConfigurationsClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{clusterRp}/{clusterResourceName}/{clusterName}/providers/Microsoft.KubernetesConfiguration/sourceControlConfigurations/{sourceControlConfigurationName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif clusterRp == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterRp cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterRp}\", url.PathEscape(clusterRp))\n\tif clusterResourceName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterResourceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterResourceName}\", url.PathEscape(clusterResourceName))\n\tif clusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterName}\", url.PathEscape(clusterName))\n\tif sourceControlConfigurationName == \"\" {\n\t\treturn nil, errors.New(\"parameter sourceControlConfigurationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{sourceControlConfigurationName}\", url.PathEscape(sourceControlConfigurationName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-11-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *CapacityReservationsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, capacityReservationGroupName string, capacityReservationName string, options *CapacityReservationsBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/capacityReservationGroups/{capacityReservationGroupName}/capacityReservations/{capacityReservationName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif capacityReservationGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter capacityReservationGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{capacityReservationGroupName}\", url.PathEscape(capacityReservationGroupName))\n\tif capacityReservationName == \"\" {\n\t\treturn nil, errors.New(\"parameter capacityReservationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{capacityReservationName}\", url.PathEscape(capacityReservationName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *ClustersClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, clusterName string, options *ClustersClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/serverGroupsv2/{clusterName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif clusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterName}\", url.PathEscape(clusterName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-11-08\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewVolumeDeleteParams() *VolumeDeleteParams {\n\tvar (\n\t\tforceDefault = bool(false)\n\t)\n\treturn &VolumeDeleteParams{\n\t\tForce: &forceDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *CloudServiceRoleInstancesClient) deleteCreateRequest(ctx context.Context, roleInstanceName string, resourceGroupName string, cloudServiceName string, options *CloudServiceRoleInstancesBeginDeleteOptions) (*azcore.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/roleInstances/{roleInstanceName}\"\n\tif roleInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter roleInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{roleInstanceName}\", url.PathEscape(roleInstanceName))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := azcore.NewRequest(ctx, http.MethodDelete, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\treqQP := req.URL.Query()\n\treqQP.Set(\"api-version\", \"2021-03-01\")\n\treq.URL.RawQuery = reqQP.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewDeleteConnectionParams() *DeleteConnectionParams {\n\tvar ()\n\treturn &DeleteConnectionParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeletePoolProjectParams() *DeletePoolProjectParams {\n\tvar ()\n\treturn &DeletePoolProjectParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *UsageService) NewDeleteTrafficTypeParams(id string) *DeleteTrafficTypeParams {\n\tp := &DeleteTrafficTypeParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (s *VPCService) NewDeleteStaticRouteParams(id string) *DeleteStaticRouteParams {\n\tp := &DeleteStaticRouteParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (client *CloudServicesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, cloudServiceName string, options *CloudServicesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-09-04\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *CapacitiesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, dedicatedCapacityName string, options *CapacitiesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.PowerBIDedicated/capacities/{dedicatedCapacityName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif dedicatedCapacityName == \"\" {\n\t\treturn nil, errors.New(\"parameter dedicatedCapacityName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{dedicatedCapacityName}\", url.PathEscape(dedicatedCapacityName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-01-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (s *VPCService) NewUpdateVPCParams(id string) *UpdateVPCParams {\n\tp := &UpdateVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func deleteHyperShiftVPC(workingDir string) error {\n\tctx := context.Background()\n\n\ttf, err := terraform.New(workingDir)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer func() {\n\t\t_ = tf.Uninstall(ctx)\n\t}()\n\n\terr = tf.Init(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.Println(\"Deleting ROSA HyperShift aws vpc\")\n\n\terr = callAndSetAWSSession(func() error {\n\t\treturn tf.Destroy(\n\t\t\tctx,\n\t\t\ttfexec.Var(fmt.Sprintf(\"aws_region=%s\", viper.GetString(config.AWSRegion))),\n\t\t\ttfexec.Var(fmt.Sprintf(\"cluster_name=%s\", viper.GetString(config.Cluster.Name))),\n\t\t)\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.Println(\"ROSA HyperShift aws vpc deleted!\")\n\n\treturn nil\n}", "func NewDeleteProtectedEntityParams() *DeleteProtectedEntityParams {\n\treturn &DeleteProtectedEntityParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *TemplateService) NewDeleteTemplateParams(id string) *DeleteTemplateParams {\n\tp := &DeleteTemplateParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewDeleteScheduleParams() *DeleteScheduleParams {\n\tvar ()\n\treturn &DeleteScheduleParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *ConfigurationProfilesVersionsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, configurationProfileName string, versionName string, options *ConfigurationProfilesVersionsClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Automanage/configurationProfiles/{configurationProfileName}/versions/{versionName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif configurationProfileName == \"\" {\n\t\treturn nil, errors.New(\"parameter configurationProfileName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{configurationProfileName}\", url.PathEscape(configurationProfileName))\n\tif versionName == \"\" {\n\t\treturn nil, errors.New(\"parameter versionName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{versionName}\", url.PathEscape(versionName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-05-04\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *PrivateDNSZoneGroupsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, privateEndpointName string, privateDNSZoneGroupName string, options *PrivateDNSZoneGroupsClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/privateEndpoints/{privateEndpointName}/privateDnsZoneGroups/{privateDnsZoneGroupName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif privateEndpointName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateEndpointName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateEndpointName}\", url.PathEscape(privateEndpointName))\n\tif privateDNSZoneGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateDNSZoneGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateDnsZoneGroupName}\", url.PathEscape(privateDNSZoneGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-04-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *NetworkToNetworkInterconnectsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, networkFabricName string, networkToNetworkInterconnectName string, options *NetworkToNetworkInterconnectsClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedNetworkFabric/networkFabrics/{networkFabricName}/networkToNetworkInterconnects/{networkToNetworkInterconnectName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif networkFabricName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkFabricName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkFabricName}\", url.PathEscape(networkFabricName))\n\tif networkToNetworkInterconnectName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkToNetworkInterconnectName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkToNetworkInterconnectName}\", url.PathEscape(networkToNetworkInterconnectName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-06-15\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (f *FakeInstance) DetachVPC(_ context.Context, _, _ string) error {\n\tpanic(\"implement me\")\n}", "func (s *ProjectService) NewDeleteProjectParams(id string) *DeleteProjectParams {\n\tp := &DeleteProjectParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewDeleteConditionParams() *DeleteConditionParams {\n\tvar ()\n\treturn &DeleteConditionParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteSubnetsSubnetPoolParams() *DeleteSubnetsSubnetPoolParams {\n\tvar ()\n\treturn &DeleteSubnetsSubnetPoolParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *VirtualNetworkLinksClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, privateZoneName string, virtualNetworkLinkName string, options *VirtualNetworkLinksBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/privateDnsZones/{privateZoneName}/virtualNetworkLinks/{virtualNetworkLinkName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif privateZoneName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateZoneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateZoneName}\", url.PathEscape(privateZoneName))\n\tif virtualNetworkLinkName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualNetworkLinkName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualNetworkLinkName}\", url.PathEscape(virtualNetworkLinkName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2020-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tif options != nil && options.IfMatch != nil {\n\t\treq.Raw().Header.Set(\"If-Match\", *options.IfMatch)\n\t}\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *ManagedInstancesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, managedInstanceName string, options *ManagedInstancesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/managedInstances/{managedInstanceName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif managedInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedInstanceName}\", url.PathEscape(managedInstanceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-08-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treturn req, nil\n}", "func preparedeleteserviceparams(params map[string]string, deleteservice Deleteservice, Region string) {\n\tif Region != \"\" {\n\t\tparams[\"Region\"] = Region\n\t}\n\tparams[\"amztarget\"] = \"AmazonEC2ContainerServiceV20141113.DeleteService\"\n}", "func (m *MockSecurityGroupServiceIface) NewDeleteSecurityGroupParams() *DeleteSecurityGroupParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeleteSecurityGroupParams\")\n\tret0, _ := ret[0].(*DeleteSecurityGroupParams)\n\treturn ret0\n}", "func (client *VideosClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, accountName string, videoName string, options *VideosClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Media/videoAnalyzers/{accountName}/videos/{videoName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif accountName == \"\" {\n\t\treturn nil, errors.New(\"parameter accountName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{accountName}\", url.PathEscape(accountName))\n\tif videoName == \"\" {\n\t\treturn nil, errors.New(\"parameter videoName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{videoName}\", url.PathEscape(videoName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-11-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *VirtualRoutersClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, virtualRouterName string, options *VirtualRoutersClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/virtualRouters/{virtualRouterName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif virtualRouterName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualRouterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualRouterName}\", url.PathEscape(virtualRouterName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *SQLVirtualMachinesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, sqlVirtualMachineName string, options *SQLVirtualMachinesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.SqlVirtualMachine/sqlVirtualMachines/{sqlVirtualMachineName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif sqlVirtualMachineName == \"\" {\n\t\treturn nil, errors.New(\"parameter sqlVirtualMachineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{sqlVirtualMachineName}\", url.PathEscape(sqlVirtualMachineName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2017-03-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treturn req, nil\n}", "func NewDeleteNodeParams() *DeleteNodeParams {\n\tvar ()\n\treturn &DeleteNodeParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *VPCService) NewListVPCsParams() *ListVPCsParams {\n\tp := &ListVPCsParams{}\n\tp.p = make(map[string]interface{})\n\treturn p\n}", "func (client *KeyVaultClient) deleteSecretCreateRequest(ctx context.Context, vaultBaseURL string, secretName string, options *KeyVaultClientDeleteSecretOptions) (*policy.Request, error) {\n\thost := \"{vaultBaseUrl}\"\n\thost = strings.ReplaceAll(host, \"{vaultBaseUrl}\", vaultBaseURL)\n\turlPath := \"/secrets/{secret-name}\"\n\tif secretName == \"\" {\n\t\treturn nil, errors.New(\"parameter secretName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{secret-name}\", url.PathEscape(secretName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.2\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *VirtualMachinesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, virtualMachineName string, options *VirtualMachinesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ConnectedVMwarevSphere/virtualMachines/{virtualMachineName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif virtualMachineName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualMachineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualMachineName}\", url.PathEscape(virtualMachineName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-01-10-preview\")\n\tif options != nil && options.Force != nil {\n\t\treqQP.Set(\"force\", strconv.FormatBool(*options.Force))\n\t}\n\tif options != nil && options.Retain != nil {\n\t\treqQP.Set(\"retain\", strconv.FormatBool(*options.Retain))\n\t}\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewDeleteKeyPairsParamsWithHTTPClient(client *http.Client) *DeleteKeyPairsParams {\n\tvar ()\n\treturn &DeleteKeyPairsParams{\n\t\tHTTPClient: client,\n\t}\n}", "func NewParams(communityTax sdk.Dec, withdrawAddrEnabled bool) Params {\n\treturn Params{\n\t\tCommunityTax: communityTax,\n\t\tWithdrawAddrEnabled: withdrawAddrEnabled,\n\t}\n}", "func (client *IscsiTargetsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, diskPoolName string, iscsiTargetName string, options *IscsiTargetsClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.StoragePool/diskPools/{diskPoolName}/iscsiTargets/{iscsiTargetName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif diskPoolName == \"\" {\n\t\treturn nil, errors.New(\"parameter diskPoolName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{diskPoolName}\", url.PathEscape(diskPoolName))\n\tif iscsiTargetName == \"\" {\n\t\treturn nil, errors.New(\"parameter iscsiTargetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{iscsiTargetName}\", url.PathEscape(iscsiTargetName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-08-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func CreateDeleteServiceInstancesRequest() (request *DeleteServiceInstancesRequest) {\n\trequest = &DeleteServiceInstancesRequest{\n\t\tRoaRequest: &requests.RoaRequest{},\n\t}\n\trequest.InitWithApiInfo(\"eas\", \"2021-07-01\", \"DeleteServiceInstances\", \"/api/v2/services/[ClusterId]/[ServiceName]/instances\", \"eas\", \"openAPI\")\n\trequest.Method = requests.DELETE\n\treturn\n}", "func (client *PipelinesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, factoryName string, pipelineName string, options *PipelinesClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DataFactory/factories/{factoryName}/pipelines/{pipelineName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif factoryName == \"\" {\n\t\treturn nil, errors.New(\"parameter factoryName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{factoryName}\", url.PathEscape(factoryName))\n\tif pipelineName == \"\" {\n\t\treturn nil, errors.New(\"parameter pipelineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{pipelineName}\", url.PathEscape(pipelineName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2018-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *ReplicationvCentersClient) deleteCreateRequest(ctx context.Context, fabricName string, vcenterName string, options *ReplicationvCentersClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.RecoveryServices/vaults/{resourceName}/replicationFabrics/{fabricName}/replicationvCenters/{vcenterName}\"\n\tif client.resourceName == \"\" {\n\t\treturn nil, errors.New(\"parameter client.resourceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceName}\", url.PathEscape(client.resourceName))\n\tif client.resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter client.resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(client.resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif fabricName == \"\" {\n\t\treturn nil, errors.New(\"parameter fabricName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{fabricName}\", url.PathEscape(fabricName))\n\tif vcenterName == \"\" {\n\t\treturn nil, errors.New(\"parameter vcenterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vcenterName}\", url.PathEscape(vcenterName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-11-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treturn req, nil\n}", "func NewPcloudPlacementgroupsMembersDeleteParams() *PcloudPlacementgroupsMembersDeleteParams {\n\treturn &PcloudPlacementgroupsMembersDeleteParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *ClustersClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, clusterName string, options *ClustersBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.OperationalInsights/clusters/{clusterName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif clusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterName}\", url.PathEscape(clusterName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (c *UDBClient) NewDeleteUDBParamGroupRequest() *DeleteUDBParamGroupRequest {\n\treq := &DeleteUDBParamGroupRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "func (c *UDBClient) NewDeleteUDBParamGroupRequest() *DeleteUDBParamGroupRequest {\n\treq := &DeleteUDBParamGroupRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "func (client *WebAppsClient) deleteVnetConnectionCreateRequest(ctx context.Context, resourceGroupName string, name string, vnetName string, options *WebAppsDeleteVnetConnectionOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/virtualNetworkConnections/{vnetName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif vnetName == \"\" {\n\t\treturn nil, errors.New(\"parameter vnetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vnetName}\", url.PathEscape(vnetName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *AFDOriginsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, profileName string, originGroupName string, originName string, options *AFDOriginsClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Cdn/profiles/{profileName}/originGroups/{originGroupName}/origins/{originName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif profileName == \"\" {\n\t\treturn nil, errors.New(\"parameter profileName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{profileName}\", url.PathEscape(profileName))\n\tif originGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter originGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{originGroupName}\", url.PathEscape(originGroupName))\n\tif originName == \"\" {\n\t\treturn nil, errors.New(\"parameter originName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{originName}\", url.PathEscape(originName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewDeleteKeyPairsParamsWithTimeout(timeout time.Duration) *DeleteKeyPairsParams {\n\tvar ()\n\treturn &DeleteKeyPairsParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "func (client *KeyVaultClient) purgeDeletedSecretCreateRequest(ctx context.Context, vaultBaseURL string, secretName string, options *KeyVaultClientPurgeDeletedSecretOptions) (*policy.Request, error) {\n\thost := \"{vaultBaseUrl}\"\n\thost = strings.ReplaceAll(host, \"{vaultBaseUrl}\", vaultBaseURL)\n\turlPath := \"/deletedsecrets/{secret-name}\"\n\tif secretName == \"\" {\n\t\treturn nil, errors.New(\"parameter secretName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{secret-name}\", url.PathEscape(secretName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.2\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func SetupVPC(mgr ctrl.Manager, l logging.Logger) error {\n\tname := managed.ControllerName(v1alpha3.VPCGroupKind)\n\treturn ctrl.NewControllerManagedBy(mgr).\n\t\tNamed(name).\n\t\tFor(&v1alpha3.VPC{}).\n\t\tComplete(managed.NewReconciler(mgr,\n\t\t\tresource.ManagedKind(v1alpha3.VPCGroupVersionKind),\n\t\t\tmanaged.WithExternalConnecter(&connector{client: mgr.GetClient(), newClientFn: ec2.NewVPCClient, awsConfigFn: utils.RetrieveAwsConfigFromProvider}),\n\t\t\tmanaged.WithReferenceResolver(managed.NewAPISimpleReferenceResolver(mgr.GetClient())),\n\t\t\tmanaged.WithConnectionPublishers(),\n\t\t\tmanaged.WithInitializers(&tagger{kube: mgr.GetClient()}),\n\t\t\tmanaged.WithLogger(l.WithValues(\"controller\", name)),\n\t\t\tmanaged.WithRecorder(event.NewAPIRecorder(mgr.GetEventRecorderFor(name)))))\n}", "func NewDeleteSubnetParamsWithTimeout(timeout time.Duration) *DeleteSubnetParams {\n\tvar ()\n\treturn &DeleteSubnetParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "func CreateDeleteResourceInstancesRequest() (request *DeleteResourceInstancesRequest) {\n\trequest = &DeleteResourceInstancesRequest{\n\t\tRoaRequest: &requests.RoaRequest{},\n\t}\n\trequest.InitWithApiInfo(\"eas\", \"2021-07-01\", \"DeleteResourceInstances\", \"/api/v2/resources/[ClusterId]/[ResourceId]/instances\", \"eas\", \"openAPI\")\n\trequest.Method = requests.DELETE\n\treturn\n}", "func CreateVPCMocked(t *testing.T, vpcIn *types.Vpc) *types.Vpc {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewVPCService(cs)\n\tassert.Nil(err, \"Couldn't load VPC service\")\n\tassert.NotNil(ds, \"VPC service not instanced\")\n\n\t// convertMap\n\tmapIn, err := utils.ItemConvertParams(*vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// to json\n\tdOut, err := json.Marshal(vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// call service\n\tcs.On(\"Post\", \"/network/vpcs/\", mapIn).Return(dOut, 200, nil)\n\tvpcOut, err := ds.CreateVPC(mapIn)\n\tassert.Nil(err, \"Error creating VPC list\")\n\tassert.Equal(vpcIn, vpcOut, \"CreateVPC returned different VPCs\")\n\n\treturn vpcOut\n}", "func (c *IPSecVPNClient) NewDeleteVPNTunnelRequest() *DeleteVPNTunnelRequest {\n\treq := &DeleteVPNTunnelRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "func NewDeleteVersionControlRequestParamsWithTimeout(timeout time.Duration) *DeleteVersionControlRequestParams {\n\treturn &DeleteVersionControlRequestParams{\n\t\ttimeout: timeout,\n\t}\n}", "func (s *UserService) NewDeleteUserParams(id string) *DeleteUserParams {\n\tp := &DeleteUserParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewRemoveGKECredentialParams() *RemoveGKECredentialParams {\n\tvar ()\n\treturn &RemoveGKECredentialParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *PacketCoreDataPlanesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, packetCoreControlPlaneName string, packetCoreDataPlaneName string, options *PacketCoreDataPlanesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.MobileNetwork/packetCoreControlPlanes/{packetCoreControlPlaneName}/packetCoreDataPlanes/{packetCoreDataPlaneName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif packetCoreControlPlaneName == \"\" {\n\t\treturn nil, errors.New(\"parameter packetCoreControlPlaneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{packetCoreControlPlaneName}\", url.PathEscape(packetCoreControlPlaneName))\n\tif packetCoreDataPlaneName == \"\" {\n\t\treturn nil, errors.New(\"parameter packetCoreDataPlaneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{packetCoreDataPlaneName}\", url.PathEscape(packetCoreDataPlaneName))\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func DiscardVPCMocked(t *testing.T, vpcIn *types.Vpc) {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewVPCService(cs)\n\tassert.Nil(err, \"Couldn't load VPC service\")\n\tassert.NotNil(ds, \"VPC service not instanced\")\n\n\t// to json\n\tdIn, err := json.Marshal(vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// call service\n\tcs.On(\"Delete\", fmt.Sprintf(\"/network/vpcs/%s/discard\", vpcIn.ID)).Return(dIn, 200, nil)\n\terr = ds.DiscardVPC(vpcIn.ID)\n\tassert.Nil(err, \"Error discarding VPC\")\n}", "func (client *CassandraClustersClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, clusterName string, options *CassandraClustersClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DocumentDB/cassandraClusters/{clusterName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif clusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterName}\", url.PathEscape(clusterName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-03-15-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func prepareDeletecluster(params map[string]string, clusterName string, Region string) {\n\tif clusterName != \"\" {\n\t\tparams[\"clusterName\"] = clusterName\n\t}\n\tif Region != \"\" {\n\t\tparams[\"Region\"] = Region\n\t}\n\tparams[\"amztarget\"] = \"AmazonEC2ContainerServiceV20141113.DeleteCluster\"\n}", "func NewDeleteSubnetParamsWithHTTPClient(client *http.Client) *DeleteSubnetParams {\n\tvar ()\n\treturn &DeleteSubnetParams{\n\t\tHTTPClient: client,\n\t}\n}", "func (client *VirtualMachineScaleSetVMRunCommandsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, vmScaleSetName string, instanceID string, runCommandName string, options *VirtualMachineScaleSetVMRunCommandsBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/virtualMachineScaleSets/{vmScaleSetName}/virtualMachines/{instanceId}/runCommands/{runCommandName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif vmScaleSetName == \"\" {\n\t\treturn nil, errors.New(\"parameter vmScaleSetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vmScaleSetName}\", url.PathEscape(vmScaleSetName))\n\tif instanceID == \"\" {\n\t\treturn nil, errors.New(\"parameter instanceID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{instanceId}\", url.PathEscape(instanceID))\n\tif runCommandName == \"\" {\n\t\treturn nil, errors.New(\"parameter runCommandName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{runCommandName}\", url.PathEscape(runCommandName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json, text/json\")\n\treturn req, nil\n}", "func (client *ReplicationProtectionContainersClient) deleteCreateRequest(ctx context.Context, resourceName string, resourceGroupName string, fabricName string, protectionContainerName string, options *ReplicationProtectionContainersClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.RecoveryServices/vaults/{resourceName}/replicationFabrics/{fabricName}/replicationProtectionContainers/{protectionContainerName}/remove\"\n\tif resourceName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceName}\", url.PathEscape(resourceName))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif fabricName == \"\" {\n\t\treturn nil, errors.New(\"parameter fabricName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{fabricName}\", url.PathEscape(fabricName))\n\tif protectionContainerName == \"\" {\n\t\treturn nil, errors.New(\"parameter protectionContainerName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{protectionContainerName}\", url.PathEscape(protectionContainerName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-10-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treturn req, nil\n}", "func NewRoutingAppCoveragesDeleteInstanceRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParamWithLocation(\"simple\", false, \"id\", runtime.ParamLocationPath, id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tserverURL, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\toperationPath := fmt.Sprintf(\"/v1/routingAppCoverages/%s\", pathParam0)\n\tif operationPath[0] == '/' {\n\t\toperationPath = \".\" + operationPath\n\t}\n\n\tqueryURL, err := serverURL.Parse(operationPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryURL.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func SSMDeleteParams(deleted, invalids []string) *SSMAPI {\n\treturn &SSMAPI{\n\t\tdelparamsOutput: &ssm.DeleteParametersOutput{\n\t\t\tDeletedParameters: aws.StringSlice(deleted),\n\t\t\tInvalidParameters: aws.StringSlice(invalids),\n\t\t},\n\t}\n}", "func (client *RecordSetsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, privateZoneName string, recordType RecordType, relativeRecordSetName string, options *RecordSetsDeleteOptions) (*azcore.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/privateDnsZones/{privateZoneName}/{recordType}/{relativeRecordSetName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif privateZoneName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateZoneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateZoneName}\", url.PathEscape(privateZoneName))\n\tif recordType == \"\" {\n\t\treturn nil, errors.New(\"parameter recordType cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{recordType}\", url.PathEscape(string(recordType)))\n\tif relativeRecordSetName == \"\" {\n\t\treturn nil, errors.New(\"parameter relativeRecordSetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{relativeRecordSetName}\", relativeRecordSetName)\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := azcore.NewRequest(ctx, http.MethodDelete, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\treqQP := req.URL.Query()\n\treqQP.Set(\"api-version\", \"2020-06-01\")\n\treq.URL.RawQuery = reqQP.Encode()\n\tif options != nil && options.IfMatch != nil {\n\t\treq.Header.Set(\"If-Match\", *options.IfMatch)\n\t}\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewDeleteAttributeParams() *DeleteAttributeParams {\n\tvar ()\n\treturn &DeleteAttributeParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (m *MockResourcetagsServiceIface) NewDeleteTagsParams(resourceids []string, resourcetype string) *DeleteTagsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeleteTagsParams\", resourceids, resourcetype)\n\tret0, _ := ret[0].(*DeleteTagsParams)\n\treturn ret0\n}", "func (client *ServerVulnerabilityAssessmentClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, resourceNamespace string, resourceType string, resourceName string, options *ServerVulnerabilityAssessmentClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceNamespace}/{resourceType}/{resourceName}/providers/Microsoft.Security/serverVulnerabilityAssessments/{serverVulnerabilityAssessment}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif resourceNamespace == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceNamespace cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceNamespace}\", url.PathEscape(resourceNamespace))\n\tif resourceType == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceType cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceType}\", url.PathEscape(resourceType))\n\tif resourceName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceName}\", url.PathEscape(resourceName))\n\turlPath = strings.ReplaceAll(urlPath, \"{serverVulnerabilityAssessment}\", url.PathEscape(\"default\"))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2020-01-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *DicomServicesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, dicomServiceName string, workspaceName string, options *DicomServicesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.HealthcareApis/workspaces/{workspaceName}/dicomservices/{dicomServiceName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif dicomServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter dicomServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{dicomServiceName}\", url.PathEscape(dicomServiceName))\n\tif workspaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter workspaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{workspaceName}\", url.PathEscape(workspaceName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-06-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (s *VPCService) NewCreateVPCOfferingParams(displaytext string, name string, supportedservices []string) *CreateVPCOfferingParams {\n\tp := &CreateVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"displaytext\"] = displaytext\n\tp.p[\"name\"] = name\n\tp.p[\"supportedservices\"] = supportedservices\n\treturn p\n}", "func (rm *resourceManager) newDeleteRequestPayload(\n\tr *resource,\n) (*svcsdk.DeleteVpnConnectionInput, error) {\n\tres := &svcsdk.DeleteVpnConnectionInput{}\n\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Status.VPNConnectionID != nil {\n\t\tres.SetVpnConnectionId(*r.ko.Status.VPNConnectionID)\n\t}\n\n\treturn res, nil\n}", "func NewDeleteClusterParams() *DeleteClusterParams {\n\tvar ()\n\treturn &DeleteClusterParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *ManagedClustersClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, resourceName string, options *ManagedClustersClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerService/managedClusters/{resourceName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif resourceName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceName}\", url.PathEscape(resourceName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2020-11-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (s *ProjectService) NewDeleteProjectInvitationParams(id string) *DeleteProjectInvitationParams {\n\tp := &DeleteProjectInvitationParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (client *DedicatedHostsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, hostGroupName string, hostName string, options *DedicatedHostsBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/hostGroups/{hostGroupName}/hosts/{hostName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif hostGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter hostGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{hostGroupName}\", url.PathEscape(hostGroupName))\n\tif hostName == \"\" {\n\t\treturn nil, errors.New(\"parameter hostName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{hostName}\", url.PathEscape(hostName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treturn req, nil\n}", "func (pluginSPI *PluginSPIImpl) NewDeleteInstanceRequest(instanceID string, force bool) (*ecs.DeleteInstanceRequest, error) {\n\trequest := ecs.CreateDeleteInstanceRequest()\n\n\trequest.InstanceId = instanceID\n\trequest.Force = requests.NewBoolean(force)\n\n\treturn request, nil\n}", "func (client *GuestAgentsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, virtualMachineName string, name string, options *GuestAgentsClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ConnectedVMwarevSphere/virtualMachines/{virtualMachineName}/guestAgents/{name}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif virtualMachineName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualMachineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualMachineName}\", url.PathEscape(virtualMachineName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-01-10-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *KeyVaultClient) purgeDeletedKeyCreateRequest(ctx context.Context, vaultBaseURL string, keyName string, options *KeyVaultClientPurgeDeletedKeyOptions) (*policy.Request, error) {\n\thost := \"{vaultBaseUrl}\"\n\thost = strings.ReplaceAll(host, \"{vaultBaseUrl}\", vaultBaseURL)\n\turlPath := \"/deletedkeys/{key-name}\"\n\tif keyName == \"\" {\n\t\treturn nil, errors.New(\"parameter keyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{key-name}\", url.PathEscape(keyName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.3\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *KeyVaultClient) purgeDeletedKeyCreateRequest(ctx context.Context, vaultBaseURL string, keyName string, options *KeyVaultClientPurgeDeletedKeyOptions) (*policy.Request, error) {\n\thost := \"{vaultBaseUrl}\"\n\thost = strings.ReplaceAll(host, \"{vaultBaseUrl}\", vaultBaseURL)\n\turlPath := \"/deletedkeys/{key-name}\"\n\tif keyName == \"\" {\n\t\treturn nil, errors.New(\"parameter keyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{key-name}\", url.PathEscape(keyName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.2\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewDeleteNetworkGroupPolicyParams() *DeleteNetworkGroupPolicyParams {\n\tvar ()\n\treturn &DeleteNetworkGroupPolicyParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *ConnectedEnvironmentsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, connectedEnvironmentName string, options *ConnectedEnvironmentsClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.App/connectedEnvironments/{connectedEnvironmentName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif connectedEnvironmentName == \"\" {\n\t\treturn nil, errors.New(\"parameter connectedEnvironmentName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{connectedEnvironmentName}\", url.PathEscape(connectedEnvironmentName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-06-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewParams(createWhoisPrice string, updateWhoisPrice string, deleteWhoisPrice string) Params {\n\treturn Params{\n\t\tCreateWhoisPrice: createWhoisPrice,\n\t\tUpdateWhoisPrice: updateWhoisPrice,\n\t\tDeleteWhoisPrice: deleteWhoisPrice,\n\t}\n}", "func (client *KpiClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, hubName string, kpiName string, options *KpiClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.CustomerInsights/hubs/{hubName}/kpi/{kpiName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif hubName == \"\" {\n\t\treturn nil, errors.New(\"parameter hubName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{hubName}\", url.PathEscape(hubName))\n\tif kpiName == \"\" {\n\t\treturn nil, errors.New(\"parameter kpiName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{kpiName}\", url.PathEscape(kpiName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2017-04-26\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treturn req, nil\n}", "func (client *KeyVaultClient) deleteKeyCreateRequest(ctx context.Context, vaultBaseURL string, keyName string, options *KeyVaultClientDeleteKeyOptions) (*policy.Request, error) {\n\thost := \"{vaultBaseUrl}\"\n\thost = strings.ReplaceAll(host, \"{vaultBaseUrl}\", vaultBaseURL)\n\turlPath := \"/keys/{key-name}\"\n\tif keyName == \"\" {\n\t\treturn nil, errors.New(\"parameter keyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{key-name}\", url.PathEscape(keyName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.3\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}" ]
[ "0.66042364", "0.60429204", "0.6008266", "0.6002398", "0.59617054", "0.5938966", "0.5808236", "0.5779714", "0.5709485", "0.569241", "0.56649685", "0.56309533", "0.55443126", "0.5544169", "0.55392367", "0.5532329", "0.5530153", "0.5529233", "0.55253106", "0.5521254", "0.55093336", "0.5483423", "0.5456083", "0.5448579", "0.54399014", "0.5417949", "0.5407514", "0.54070425", "0.53827876", "0.53600717", "0.5345257", "0.5329333", "0.5325166", "0.5303604", "0.5298216", "0.5294526", "0.5286621", "0.52591425", "0.5255914", "0.5251766", "0.5220358", "0.5219492", "0.5218463", "0.52059025", "0.5204093", "0.51990986", "0.51987106", "0.51976335", "0.5191825", "0.5191659", "0.51868224", "0.51832515", "0.518151", "0.51776254", "0.5167007", "0.51636696", "0.5163402", "0.5154786", "0.5154786", "0.5151259", "0.5147001", "0.5143724", "0.51414436", "0.5130021", "0.51188827", "0.511599", "0.5113754", "0.5112494", "0.5103327", "0.510098", "0.50953436", "0.5092809", "0.5079673", "0.5066112", "0.5063659", "0.5062819", "0.50618935", "0.50616515", "0.50564533", "0.5049687", "0.50471216", "0.50468916", "0.5040474", "0.5038556", "0.50362027", "0.5034917", "0.502648", "0.50207406", "0.5020081", "0.50190604", "0.5016753", "0.50161463", "0.50118554", "0.50054586", "0.49975047", "0.49921063", "0.49844187", "0.49843448", "0.49838033", "0.4976653" ]
0.72979707
0
You should always use this function to get a new DeleteVPCOfferingParams instance, as then you are sure you have configured all required params
func (s *VPCService) NewDeleteVPCOfferingParams(id string) *DeleteVPCOfferingParams { p := &DeleteVPCOfferingParams{} p.p = make(map[string]interface{}) p.p["id"] = id return p }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewDeleteKeyPairsParams() *DeleteKeyPairsParams {\n\tvar ()\n\treturn &DeleteKeyPairsParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteConnectionParams() *DeleteConnectionParams {\n\tvar ()\n\treturn &DeleteConnectionParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (o *VvolBindingDeleteParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.DeleteAllReferences != nil {\n\n\t\t// query param delete_all_references\n\t\tvar qrDeleteAllReferences bool\n\n\t\tif o.DeleteAllReferences != nil {\n\t\t\tqrDeleteAllReferences = *o.DeleteAllReferences\n\t\t}\n\t\tqDeleteAllReferences := swag.FormatBool(qrDeleteAllReferences)\n\t\tif qDeleteAllReferences != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"delete_all_references\", qDeleteAllReferences); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\t// path param protocol_endpoint.uuid\n\tif err := r.SetPathParam(\"protocol_endpoint.uuid\", o.ProtocolEndpointUUID); err != nil {\n\t\treturn err\n\t}\n\n\t// path param vvol.uuid\n\tif err := r.SetPathParam(\"vvol.uuid\", o.VvolUUID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func NewVolumeDeleteParams() *VolumeDeleteParams {\n\tvar (\n\t\tforceDefault = bool(false)\n\t)\n\treturn &VolumeDeleteParams{\n\t\tForce: &forceDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteVeditProjectRequestWithoutParam() *DeleteVeditProjectRequest {\n\n return &DeleteVeditProjectRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/veditProjects/{projectId}\",\n Method: \"DELETE\",\n Header: nil,\n Version: \"v1\",\n },\n }\n}", "func NewVvolBindingDeleteParams() *VvolBindingDeleteParams {\n\treturn &VvolBindingDeleteParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *VPCService) NewCreateVPCOfferingParams(displaytext string, name string, supportedservices []string) *CreateVPCOfferingParams {\n\tp := &CreateVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"displaytext\"] = displaytext\n\tp.p[\"name\"] = name\n\tp.p[\"supportedservices\"] = supportedservices\n\treturn p\n}", "func NewComponentDeleteParams() *ComponentDeleteParams {\n\treturn &ComponentDeleteParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteConditionParams() *DeleteConditionParams {\n\tvar ()\n\treturn &DeleteConditionParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeletePoolProjectParams() *DeletePoolProjectParams {\n\tvar ()\n\treturn &DeletePoolProjectParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *PeeringPoliciesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, managedNetworkName string, managedNetworkPeeringPolicyName string, options *PeeringPoliciesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedNetwork/managedNetworks/{managedNetworkName}/managedNetworkPeeringPolicies/{managedNetworkPeeringPolicyName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif managedNetworkName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedNetworkName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedNetworkName}\", url.PathEscape(managedNetworkName))\n\tif managedNetworkPeeringPolicyName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedNetworkPeeringPolicyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedNetworkPeeringPolicyName}\", url.PathEscape(managedNetworkPeeringPolicyName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-06-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *HCRPAssignmentsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, guestConfigurationAssignmentName string, machineName string, options *HCRPAssignmentsClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.HybridCompute/machines/{machineName}/providers/Microsoft.GuestConfiguration/guestConfigurationAssignments/{guestConfigurationAssignmentName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif guestConfigurationAssignmentName == \"\" {\n\t\treturn nil, errors.New(\"parameter guestConfigurationAssignmentName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{guestConfigurationAssignmentName}\", url.PathEscape(guestConfigurationAssignmentName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif machineName == \"\" {\n\t\treturn nil, errors.New(\"parameter machineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{machineName}\", url.PathEscape(machineName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-01-25\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (c *IPSecVPNClient) NewDeleteVPNTunnelRequest() *DeleteVPNTunnelRequest {\n\treq := &DeleteVPNTunnelRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "func NewDeleteProtocolUsingDELETEParams() *DeleteProtocolUsingDELETEParams {\n\tvar ()\n\treturn &DeleteProtocolUsingDELETEParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteKeyPairsParamsWithHTTPClient(client *http.Client) *DeleteKeyPairsParams {\n\tvar ()\n\treturn &DeleteKeyPairsParams{\n\t\tHTTPClient: client,\n\t}\n}", "func NewDeleteTagParams() *DeleteTagParams {\n\tvar ()\n\treturn &DeleteTagParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (rm *resourceManager) newDeleteRequestPayload(\n\tr *resource,\n) (*svcsdk.DeleteVpcPeeringConnectionInput, error) {\n\tres := &svcsdk.DeleteVpcPeeringConnectionInput{}\n\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Status.VPCPeeringConnectionID != nil {\n\t\tres.SetVpcPeeringConnectionId(*r.ko.Status.VPCPeeringConnectionID)\n\t}\n\n\treturn res, nil\n}", "func NewDeleteVersionControlRequestParams() *DeleteVersionControlRequestParams {\n\treturn &DeleteVersionControlRequestParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *TemplateService) NewDeleteTemplateParams(id string) *DeleteTemplateParams {\n\tp := &DeleteTemplateParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (c *UDBClient) NewDeleteUDBParamGroupRequest() *DeleteUDBParamGroupRequest {\n\treq := &DeleteUDBParamGroupRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "func (c *UDBClient) NewDeleteUDBParamGroupRequest() *DeleteUDBParamGroupRequest {\n\treq := &DeleteUDBParamGroupRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "func (client *PipelinesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, factoryName string, pipelineName string, options *PipelinesClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DataFactory/factories/{factoryName}/pipelines/{pipelineName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif factoryName == \"\" {\n\t\treturn nil, errors.New(\"parameter factoryName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{factoryName}\", url.PathEscape(factoryName))\n\tif pipelineName == \"\" {\n\t\treturn nil, errors.New(\"parameter pipelineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{pipelineName}\", url.PathEscape(pipelineName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2018-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewDeletePackageVersionParams() *DeletePackageVersionParams {\n\tvar ()\n\treturn &DeletePackageVersionParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *VPCService) NewDeleteVPCParams(id string) *DeleteVPCParams {\n\tp := &DeleteVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewDeleteDataSourceParams() *DeleteDataSourceParams {\n\treturn &DeleteDataSourceParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteRequestBody(p *inventory.DeletePayload) *DeleteRequestBody {\n\tbody := &DeleteRequestBody{}\n\tif p.Ids != nil {\n\t\tbody.Ids = make([]string, len(p.Ids))\n\t\tfor i, val := range p.Ids {\n\t\t\tbody.Ids[i] = val\n\t\t}\n\t}\n\treturn body\n}", "func (client *SourceControlConfigurationsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, clusterRp string, clusterResourceName string, clusterName string, sourceControlConfigurationName string, options *SourceControlConfigurationsClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{clusterRp}/{clusterResourceName}/{clusterName}/providers/Microsoft.KubernetesConfiguration/sourceControlConfigurations/{sourceControlConfigurationName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif clusterRp == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterRp cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterRp}\", url.PathEscape(clusterRp))\n\tif clusterResourceName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterResourceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterResourceName}\", url.PathEscape(clusterResourceName))\n\tif clusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterName}\", url.PathEscape(clusterName))\n\tif sourceControlConfigurationName == \"\" {\n\t\treturn nil, errors.New(\"parameter sourceControlConfigurationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{sourceControlConfigurationName}\", url.PathEscape(sourceControlConfigurationName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-11-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewDeleteProtectedEntityParams() *DeleteProtectedEntityParams {\n\treturn &DeleteProtectedEntityParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *VPCService) NewDeletePrivateGatewayParams(id string) *DeletePrivateGatewayParams {\n\tp := &DeletePrivateGatewayParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewDeleteaspecificPbxDeviceRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/pbxdevices/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (j *Jsonnet) DeleteParam(path []string) error {\n\t// TODO: make this work at the env level too\n\tparamsData, err := j.readParams(\"\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tupdatedParams, err := params.DeleteFromObject(path, paramsData, j.Name(false), paramsComponentRoot)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err = j.writeParams(updatedParams); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (s *UsageService) NewDeleteTrafficTypeParams(id string) *DeleteTrafficTypeParams {\n\tp := &DeleteTrafficTypeParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (rm *resourceManager) newDeleteRequestPayload(\n\tr *resource,\n) (*svcsdk.DeleteVpnConnectionInput, error) {\n\tres := &svcsdk.DeleteVpnConnectionInput{}\n\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Status.VPNConnectionID != nil {\n\t\tres.SetVpnConnectionId(*r.ko.Status.VPNConnectionID)\n\t}\n\n\treturn res, nil\n}", "func (client *ConfigurationProfilesVersionsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, configurationProfileName string, versionName string, options *ConfigurationProfilesVersionsClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Automanage/configurationProfiles/{configurationProfileName}/versions/{versionName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif configurationProfileName == \"\" {\n\t\treturn nil, errors.New(\"parameter configurationProfileName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{configurationProfileName}\", url.PathEscape(configurationProfileName))\n\tif versionName == \"\" {\n\t\treturn nil, errors.New(\"parameter versionName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{versionName}\", url.PathEscape(versionName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-05-04\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (s *ProjectService) NewDeleteProjectInvitationParams(id string) *DeleteProjectInvitationParams {\n\tp := &DeleteProjectInvitationParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (client *ConnectedEnvironmentsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, connectedEnvironmentName string, options *ConnectedEnvironmentsClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.App/connectedEnvironments/{connectedEnvironmentName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif connectedEnvironmentName == \"\" {\n\t\treturn nil, errors.New(\"parameter connectedEnvironmentName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{connectedEnvironmentName}\", url.PathEscape(connectedEnvironmentName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-06-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (s *VPCService) NewUpdateVPCOfferingParams(id string) *UpdateVPCOfferingParams {\n\tp := &UpdateVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewDeleteNodeParams() *DeleteNodeParams {\n\tvar ()\n\treturn &DeleteNodeParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *ProjectService) NewDeleteProjectParams(id string) *DeleteProjectParams {\n\tp := &DeleteProjectParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewParams(createWhoisPrice string, updateWhoisPrice string, deleteWhoisPrice string) Params {\n\treturn Params{\n\t\tCreateWhoisPrice: createWhoisPrice,\n\t\tUpdateWhoisPrice: updateWhoisPrice,\n\t\tDeleteWhoisPrice: deleteWhoisPrice,\n\t}\n}", "func NewDeleteaspecificVoicemailGreetingRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/voicemailgreetings/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (client *AgentPoolsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, kubernetesClusterName string, agentPoolName string, options *AgentPoolsClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.NetworkCloud/kubernetesClusters/{kubernetesClusterName}/agentPools/{agentPoolName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif kubernetesClusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter kubernetesClusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{kubernetesClusterName}\", url.PathEscape(kubernetesClusterName))\n\tif agentPoolName == \"\" {\n\t\treturn nil, errors.New(\"parameter agentPoolName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{agentPoolName}\", url.PathEscape(agentPoolName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *VideosClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, accountName string, videoName string, options *VideosClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Media/videoAnalyzers/{accountName}/videos/{videoName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif accountName == \"\" {\n\t\treturn nil, errors.New(\"parameter accountName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{accountName}\", url.PathEscape(accountName))\n\tif videoName == \"\" {\n\t\treturn nil, errors.New(\"parameter videoName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{videoName}\", url.PathEscape(videoName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-11-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewDeleteAttributeParams() *DeleteAttributeParams {\n\tvar ()\n\treturn &DeleteAttributeParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *UserService) NewDeleteUserParams(id string) *DeleteUserParams {\n\tp := &DeleteUserParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewDeleteLoadBalancerPoolParams() *DeleteLoadBalancerPoolParams {\n\tvar ()\n\treturn &DeleteLoadBalancerPoolParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *ClustersClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, clusterName string, options *ClustersClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/serverGroupsv2/{clusterName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif clusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterName}\", url.PathEscape(clusterName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-11-08\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *KpiClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, hubName string, kpiName string, options *KpiClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.CustomerInsights/hubs/{hubName}/kpi/{kpiName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif hubName == \"\" {\n\t\treturn nil, errors.New(\"parameter hubName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{hubName}\", url.PathEscape(hubName))\n\tif kpiName == \"\" {\n\t\treturn nil, errors.New(\"parameter kpiName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{kpiName}\", url.PathEscape(kpiName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2017-04-26\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treturn req, nil\n}", "func NewDeleteaspecificVoucherRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/vouchers/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (client *ProductPolicyClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, serviceName string, productID string, policyID PolicyIDName, ifMatch string, options *ProductPolicyClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ApiManagement/service/{serviceName}/products/{productId}/policies/{policyId}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif serviceName == \"\" {\n\t\treturn nil, errors.New(\"parameter serviceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{serviceName}\", url.PathEscape(serviceName))\n\tif productID == \"\" {\n\t\treturn nil, errors.New(\"parameter productID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{productId}\", url.PathEscape(productID))\n\tif policyID == \"\" {\n\t\treturn nil, errors.New(\"parameter policyID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{policyId}\", url.PathEscape(string(policyID)))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-08-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"If-Match\"] = []string{ifMatch}\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func CreateDeleteLiveDelayConfigRequest() (request *DeleteLiveDelayConfigRequest) {\n\trequest = &DeleteLiveDelayConfigRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"live\", \"2016-11-01\", \"DeleteLiveDelayConfig\", \"live\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func NewDeleteSubscribedEventParams() *DeleteSubscribedEventParams {\n\tvar ()\n\treturn &DeleteSubscribedEventParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (o *PcloudPlacementgroupsMembersDeleteParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\tif o.Body != nil {\n\t\tif err := r.SetBodyParam(o.Body); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param cloud_instance_id\n\tif err := r.SetPathParam(\"cloud_instance_id\", o.CloudInstanceID); err != nil {\n\t\treturn err\n\t}\n\n\t// path param placement_group_id\n\tif err := r.SetPathParam(\"placement_group_id\", o.PlacementGroupID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (connection *Connection) CreateMapDeleteRequest(param ...interface{}) (request *DeleteRequest, err error) {\n\tt := reflect.TypeOf(param[0])\n\tswitch t.Kind() {\n\tcase reflect.Ptr, reflect.Struct:\n\t\tif connection.repository == nil {\n\t\t\tif connection.adabasMap != nil && connection.adabasMap.Name == inmapMapName {\n\t\t\t\t// Lock this Adabas Map for ReadRequest creation process of dynamic part\n\t\t\t\tconnection.adabasMap.lock.Lock()\n\t\t\t\tdefer connection.adabasMap.lock.Unlock()\n\t\t\t\tadatypes.Central.Log.Debugf(\"InMap used: %s\", connection.adabasMap.Name)\n\t\t\t\terr = connection.adabasMap.defineByInterface(param[0])\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\trequest, err = NewMapDeleteRequest(connection.adabasToData, connection.adabasMap)\n\t\t\t} else {\n\t\t\t\tadatypes.Central.Log.Debugf(\"No repository used: %#v\", connection.adabasToMap)\n\t\t\t\trequest, err = NewMapNameDeleteRequest(connection.adabasToMap, evaluateInterface(param[0]))\n\t\t\t}\n\t\t} else {\n\t\t\tadatypes.Central.Log.Debugf(\"With repository used: %#v\", connection.adabasMap)\n\t\t\trequest, err = NewMapNameDeleteRequestRepo(evaluateInterface(param[0]), connection.adabasToMap, connection.repository)\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif len(param) > 1 {\n\t\t\tswitch t := param[1].(type) {\n\t\t\tcase int:\n\t\t\t\tconnection.fnr = Fnr(t)\n\t\t\t\trequest.repository.Fnr = Fnr(t)\n\t\t\tcase Fnr:\n\t\t\t\tconnection.fnr = t\n\t\t\t\trequest.repository.Fnr = t\n\t\t\t}\n\t\t} else {\n\t\t\tconnection.fnr = request.adabasMap.Data.Fnr\n\t\t}\n\t\tconnection.adabasMap = request.adabasMap\n\tcase reflect.String:\n\t\tmapName := param[0].(string)\n\t\terr = connection.prepareMapUsage(mapName)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\t// if connection.repository == nil {\n\t\t// \terr = adatypes.NewGenericError(9)\n\t\t// \treturn\n\t\t// }\n\t\t// connection.repository.SearchMapInRepository(connection.adabasToMap, mapName)\n\t\tif connection.adabasMap == nil {\n\t\t\terr = adatypes.NewGenericError(8, mapName)\n\t\t\treturn\n\t\t}\n\t\tconnection.adabasToData = connection.ID.getAdabas(connection.adabasMap.URL())\n\t\t// NewAdabas(connection.adabasMap.URL(), connection.ID)\n\t\t// if err != nil {\n\t\t// \treturn\n\t\t// }\n\t\tconnection.fnr = connection.adabasMap.Data.Fnr\n\t\tadatypes.Central.Log.Debugf(\"Connection FNR=%d, Map referenced : %#v\", connection.fnr, connection.adabasMap)\n\t\trequest, err = NewMapDeleteRequest(connection.adabasToData, connection.adabasMap)\n\t}\n\treturn\n}", "func (s *VPCService) NewListVPCOfferingsParams() *ListVPCOfferingsParams {\n\tp := &ListVPCOfferingsParams{}\n\tp.p = make(map[string]interface{})\n\treturn p\n}", "func NewDeleteaspecificVoicemailRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/voicemails/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (client *PublicIPAddressesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, publicIPAddressName string, options *PublicIPAddressesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/publicIPAddresses/{publicIpAddressName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif publicIPAddressName == \"\" {\n\t\treturn nil, errors.New(\"parameter publicIPAddressName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{publicIpAddressName}\", url.PathEscape(publicIPAddressName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewDeletePacketCapturesParams() *DeletePacketCapturesParams {\n\treturn &DeletePacketCapturesParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteSupportUserParams() *DeleteSupportUserParams {\n\tvar ()\n\treturn &DeleteSupportUserParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (o *BundleProductOptionRepositoryV1DeleteByIDDeleteParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param optionId\n\tif err := r.SetPathParam(\"optionId\", swag.FormatInt64(o.OptionID)); err != nil {\n\t\treturn err\n\t}\n\n\t// path param sku\n\tif err := r.SetPathParam(\"sku\", o.Sku); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (o *NegotiableQuoteCouponManagementV1RemoveDeleteParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param cartId\n\tif err := r.SetPathParam(\"cartId\", swag.FormatInt64(o.CartID)); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m *MockFirewallServiceIface) NewDeletePaloAltoFirewallParams(fwdeviceid string) *DeletePaloAltoFirewallParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeletePaloAltoFirewallParams\", fwdeviceid)\n\tret0, _ := ret[0].(*DeletePaloAltoFirewallParams)\n\treturn ret0\n}", "func (client *PacketCoreDataPlanesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, packetCoreControlPlaneName string, packetCoreDataPlaneName string, options *PacketCoreDataPlanesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.MobileNetwork/packetCoreControlPlanes/{packetCoreControlPlaneName}/packetCoreDataPlanes/{packetCoreDataPlaneName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif packetCoreControlPlaneName == \"\" {\n\t\treturn nil, errors.New(\"parameter packetCoreControlPlaneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{packetCoreControlPlaneName}\", url.PathEscape(packetCoreControlPlaneName))\n\tif packetCoreDataPlaneName == \"\" {\n\t\treturn nil, errors.New(\"parameter packetCoreDataPlaneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{packetCoreDataPlaneName}\", url.PathEscape(packetCoreDataPlaneName))\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewDeleteSubnetParams() *DeleteSubnetParams {\n\tvar ()\n\treturn &DeleteSubnetParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewDeleteUsingDELETE1Params() *DeleteUsingDELETE1Params {\n\treturn &DeleteUsingDELETE1Params{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewParams(defaultSendEnabled bool) Params {\n\treturn Params{\n\t\tSendEnabled: nil,\n\t\tDefaultSendEnabled: defaultSendEnabled,\n\t}\n}", "func (client *KeyVaultClient) purgeDeletedKeyCreateRequest(ctx context.Context, vaultBaseURL string, keyName string, options *KeyVaultClientPurgeDeletedKeyOptions) (*policy.Request, error) {\n\thost := \"{vaultBaseUrl}\"\n\thost = strings.ReplaceAll(host, \"{vaultBaseUrl}\", vaultBaseURL)\n\turlPath := \"/deletedkeys/{key-name}\"\n\tif keyName == \"\" {\n\t\treturn nil, errors.New(\"parameter keyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{key-name}\", url.PathEscape(keyName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.3\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *KeyVaultClient) purgeDeletedKeyCreateRequest(ctx context.Context, vaultBaseURL string, keyName string, options *KeyVaultClientPurgeDeletedKeyOptions) (*policy.Request, error) {\n\thost := \"{vaultBaseUrl}\"\n\thost = strings.ReplaceAll(host, \"{vaultBaseUrl}\", vaultBaseURL)\n\turlPath := \"/deletedkeys/{key-name}\"\n\tif keyName == \"\" {\n\t\treturn nil, errors.New(\"parameter keyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{key-name}\", url.PathEscape(keyName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.2\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *CapacitiesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, dedicatedCapacityName string, options *CapacitiesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.PowerBIDedicated/capacities/{dedicatedCapacityName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif dedicatedCapacityName == \"\" {\n\t\treturn nil, errors.New(\"parameter dedicatedCapacityName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{dedicatedCapacityName}\", url.PathEscape(dedicatedCapacityName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-01-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *KeyVaultClient) deleteKeyCreateRequest(ctx context.Context, vaultBaseURL string, keyName string, options *KeyVaultClientDeleteKeyOptions) (*policy.Request, error) {\n\thost := \"{vaultBaseUrl}\"\n\thost = strings.ReplaceAll(host, \"{vaultBaseUrl}\", vaultBaseURL)\n\turlPath := \"/keys/{key-name}\"\n\tif keyName == \"\" {\n\t\treturn nil, errors.New(\"parameter keyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{key-name}\", url.PathEscape(keyName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.3\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewDeleteaspecificPeeringGroupRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/peeringgroups/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (m *MockProjectServiceIface) NewDeleteProjectInvitationParams(id string) *DeleteProjectInvitationParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeleteProjectInvitationParams\", id)\n\tret0, _ := ret[0].(*DeleteProjectInvitationParams)\n\treturn ret0\n}", "func (client *KeyVaultClient) deleteKeyCreateRequest(ctx context.Context, vaultBaseURL string, keyName string, options *KeyVaultClientDeleteKeyOptions) (*policy.Request, error) {\n\thost := \"{vaultBaseUrl}\"\n\thost = strings.ReplaceAll(host, \"{vaultBaseUrl}\", vaultBaseURL)\n\turlPath := \"/keys/{key-name}\"\n\tif keyName == \"\" {\n\t\treturn nil, errors.New(\"parameter keyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{key-name}\", url.PathEscape(keyName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.2\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *DefenderSettingsClient) deleteCreateRequest(ctx context.Context, options *DefenderSettingsClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/providers/Microsoft.IoTSecurity/defenderSettings/default\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *ReplicationvCentersClient) deleteCreateRequest(ctx context.Context, fabricName string, vcenterName string, options *ReplicationvCentersClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.RecoveryServices/vaults/{resourceName}/replicationFabrics/{fabricName}/replicationvCenters/{vcenterName}\"\n\tif client.resourceName == \"\" {\n\t\treturn nil, errors.New(\"parameter client.resourceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceName}\", url.PathEscape(client.resourceName))\n\tif client.resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter client.resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(client.resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif fabricName == \"\" {\n\t\treturn nil, errors.New(\"parameter fabricName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{fabricName}\", url.PathEscape(fabricName))\n\tif vcenterName == \"\" {\n\t\treturn nil, errors.New(\"parameter vcenterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vcenterName}\", url.PathEscape(vcenterName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-11-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treturn req, nil\n}", "func (client *CapacityReservationsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, capacityReservationGroupName string, capacityReservationName string, options *CapacityReservationsBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/capacityReservationGroups/{capacityReservationGroupName}/capacityReservations/{capacityReservationName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif capacityReservationGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter capacityReservationGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{capacityReservationGroupName}\", url.PathEscape(capacityReservationGroupName))\n\tif capacityReservationName == \"\" {\n\t\treturn nil, errors.New(\"parameter capacityReservationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{capacityReservationName}\", url.PathEscape(capacityReservationName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (t *Role) DeleteParams() []interface{} {\n\treturn []interface{}{}\n}", "func (client *CloudServicesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, cloudServiceName string, options *CloudServicesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-09-04\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (o *VolumeDeleteParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Force != nil {\n\n\t\t// query param force\n\t\tvar qrForce bool\n\t\tif o.Force != nil {\n\t\t\tqrForce = *o.Force\n\t\t}\n\t\tqForce := swag.FormatBool(qrForce)\n\t\tif qForce != \"\" {\n\t\t\tif err := r.SetQueryParam(\"force\", qForce); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param name\n\tif err := r.SetPathParam(\"name\", o.Name); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func VisualisationDeleteParams(dbOwner, dbFolder, dbName, visName string) (err error) {\n\tvar commandTag pgx.CommandTag\n\tdbQuery := `\n\t\tWITH u AS (\n\t\t\tSELECT user_id\n\t\t\tFROM users\n\t\t\tWHERE lower(user_name) = lower($1)\n\t\t), d AS (\n\t\t\tSELECT db.db_id\n\t\t\tFROM sqlite_databases AS db, u\n\t\t\tWHERE db.user_id = u.user_id\n\t\t\t\tAND folder = $2\n\t\t\t\tAND db_name = $3\n\t\t)\n\t\tDELETE FROM vis_params WHERE user_id = (SELECT user_id FROM u) AND db_id = (SELECT db_id FROM d) AND name = $4`\n\tcommandTag, err = pdb.Exec(dbQuery, dbOwner, dbFolder, dbName, visName)\n\tif err != nil {\n\t\tlog.Printf(\"Deleting visualisation '%s' for database '%s%s%s' failed: %v\\n\", visName, dbOwner, dbFolder, dbName, err)\n\t\treturn err\n\t}\n\tif numRows := commandTag.RowsAffected(); numRows != 1 {\n\t\tlog.Printf(\"Wrong number of rows (%v) affected while deleting visualisation '%s' for database '%s%s%s'\\n\", numRows, visName, dbOwner, dbFolder, dbName)\n\t}\n\treturn\n}", "func NewRevokeDeviceCertificateUsingDELETEParams() *RevokeDeviceCertificateUsingDELETEParams {\n\tvar ()\n\treturn &RevokeDeviceCertificateUsingDELETEParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (o *CompanyCompanyRepositoryV1DeleteByIDDeleteParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param companyId\n\tif err := r.SetPathParam(\"companyId\", swag.FormatInt64(o.CompanyID)); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (s *PoolService) NewDeleteStoragePoolParams(id string) *DeleteStoragePoolParams {\n\tp := &DeleteStoragePoolParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewDeleteKeyPairsParamsWithTimeout(timeout time.Duration) *DeleteKeyPairsParams {\n\tvar ()\n\treturn &DeleteKeyPairsParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "func NewDeleteDeviceUsingDELETEParams() *DeleteDeviceUsingDELETEParams {\n\tvar ()\n\treturn &DeleteDeviceUsingDELETEParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (m *MockFirewallServiceIface) NewDeletePortForwardingRuleParams(id string) *DeletePortForwardingRuleParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeletePortForwardingRuleParams\", id)\n\tret0, _ := ret[0].(*DeletePortForwardingRuleParams)\n\treturn ret0\n}", "func NewOrderDeleteParams() *OrderDeleteParams {\n\treturn &OrderDeleteParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *IPAllocationsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, ipAllocationName string, options *IPAllocationsClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/IpAllocations/{ipAllocationName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif ipAllocationName == \"\" {\n\t\treturn nil, errors.New(\"parameter ipAllocationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{ipAllocationName}\", url.PathEscape(ipAllocationName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-04-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *AssociationsClient) deleteCreateRequest(ctx context.Context, scope string, associationName string, options *AssociationsClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/{scope}/providers/Microsoft.CustomProviders/associations/{associationName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{scope}\", scope)\n\tif associationName == \"\" {\n\t\treturn nil, errors.New(\"parameter associationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{associationName}\", url.PathEscape(associationName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2018-09-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewDeleteFreeIpaByEnvironmentV1Params() *DeleteFreeIpaByEnvironmentV1Params {\n\tvar (\n\t\tforcedDefault = bool(false)\n\t)\n\treturn &DeleteFreeIpaByEnvironmentV1Params{\n\t\tForced: &forcedDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *ManagementAssociationsClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, managementAssociationName string, options *ManagementAssociationsDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/{providerName}/{resourceType}/{resourceName}/providers/Microsoft.OperationsManagement/ManagementAssociations/{managementAssociationName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.providerName == \"\" {\n\t\treturn nil, errors.New(\"parameter client.providerName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{providerName}\", url.PathEscape(client.providerName))\n\tif client.resourceType == \"\" {\n\t\treturn nil, errors.New(\"parameter client.resourceType cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceType}\", url.PathEscape(client.resourceType))\n\tif client.resourceName == \"\" {\n\t\treturn nil, errors.New(\"parameter client.resourceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceName}\", url.PathEscape(client.resourceName))\n\tif managementAssociationName == \"\" {\n\t\treturn nil, errors.New(\"parameter managementAssociationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managementAssociationName}\", url.PathEscape(managementAssociationName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2015-11-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (m *MockLoadBalancerServiceIface) NewDeleteLBStickinessPolicyParams(id string) *DeleteLBStickinessPolicyParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewDeleteLBStickinessPolicyParams\", id)\n\tret0, _ := ret[0].(*DeleteLBStickinessPolicyParams)\n\treturn ret0\n}", "func (o *SalesRuleCouponRepositoryV1DeleteByIDDeleteParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param couponId\n\tif err := r.SetPathParam(\"couponId\", swag.FormatInt64(o.CouponID)); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func NewDeleteScriptDataParams() DeleteScriptDataParams {\n\n\treturn DeleteScriptDataParams{}\n}", "func (client *DicomServicesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, dicomServiceName string, workspaceName string, options *DicomServicesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.HealthcareApis/workspaces/{workspaceName}/dicomservices/{dicomServiceName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif dicomServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter dicomServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{dicomServiceName}\", url.PathEscape(dicomServiceName))\n\tif workspaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter workspaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{workspaceName}\", url.PathEscape(workspaceName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-06-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *CassandraClustersClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, clusterName string, options *CassandraClustersClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DocumentDB/cassandraClusters/{clusterName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif clusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterName}\", url.PathEscape(clusterName))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-03-15-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *APIClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, serviceName string, apiID string, ifMatch string, options *APIClientDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ApiManagement/service/{serviceName}/apis/{apiId}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif serviceName == \"\" {\n\t\treturn nil, errors.New(\"parameter serviceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{serviceName}\", url.PathEscape(serviceName))\n\tif apiID == \"\" {\n\t\treturn nil, errors.New(\"parameter apiID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{apiId}\", url.PathEscape(apiID))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.DeleteRevisions != nil {\n\t\treqQP.Set(\"deleteRevisions\", strconv.FormatBool(*options.DeleteRevisions))\n\t}\n\treqQP.Set(\"api-version\", \"2022-08-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"If-Match\"] = []string{ifMatch}\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (s *ProjectService) NewDeleteUserFromProjectParams(projectid string, userid string) *DeleteUserFromProjectParams {\n\tp := &DeleteUserFromProjectParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"projectid\"] = projectid\n\tp.p[\"userid\"] = userid\n\treturn p\n}", "func (o *DeleteUsingDELETE1Params) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Destroy != nil {\n\n\t\t// query param destroy\n\t\tvar qrDestroy bool\n\n\t\tif o.Destroy != nil {\n\t\t\tqrDestroy = *o.Destroy\n\t\t}\n\t\tqDestroy := swag.FormatBool(qrDestroy)\n\t\tif qDestroy != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"destroy\", qDestroy); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\t// path param id\n\tif err := r.SetPathParam(\"id\", o.ID.String()); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (client *ManagedInstancesClient) deleteCreateRequest(ctx context.Context, resourceGroupName string, managedInstanceName string, options *ManagedInstancesClientBeginDeleteOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/managedInstances/{managedInstanceName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif managedInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedInstanceName}\", url.PathEscape(managedInstanceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodDelete, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-08-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treturn req, nil\n}" ]
[ "0.65547657", "0.6320457", "0.62112486", "0.621041", "0.60951346", "0.6043967", "0.6026327", "0.60258067", "0.6003463", "0.5949062", "0.5939007", "0.58507025", "0.58251846", "0.5823649", "0.58130133", "0.58118564", "0.5806278", "0.5802781", "0.5788914", "0.57836324", "0.57836324", "0.5777944", "0.5770177", "0.571367", "0.5706581", "0.5703395", "0.56774366", "0.56723833", "0.56693965", "0.5665769", "0.5659279", "0.5654458", "0.5645117", "0.5614273", "0.56131476", "0.56017363", "0.5598399", "0.55975544", "0.5587361", "0.5562372", "0.55605346", "0.55517966", "0.5549918", "0.5545569", "0.5536976", "0.55351377", "0.55215394", "0.5488137", "0.54804397", "0.547782", "0.54674673", "0.5465337", "0.5456439", "0.5453753", "0.5445038", "0.5444681", "0.54408854", "0.5435381", "0.54333323", "0.543005", "0.5423098", "0.5419256", "0.5418743", "0.54123527", "0.5412112", "0.5409345", "0.54078966", "0.5404572", "0.5403649", "0.54022235", "0.54013425", "0.5400485", "0.5398804", "0.5397416", "0.5396982", "0.53926307", "0.5387243", "0.53852344", "0.53754264", "0.53655237", "0.5358097", "0.53559256", "0.53524655", "0.5349342", "0.5348495", "0.5340813", "0.53345054", "0.53267634", "0.5324195", "0.53200024", "0.5311703", "0.53077686", "0.5300802", "0.52907354", "0.52894956", "0.5287276", "0.5285052", "0.52845794", "0.52803123", "0.5278306" ]
0.78235686
0
You should always use this function to get a new ListPrivateGatewaysParams instance, as then you are sure you have configured all required params
func (s *VPCService) NewListPrivateGatewaysParams() *ListPrivateGatewaysParams { p := &ListPrivateGatewaysParams{} p.p = make(map[string]interface{}) return p }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewListPrivateNetworksRequest(server string) (*http.Request, error) {\n\tvar err error\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/private-network\")\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"GET\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (client WorkloadNetworksClient) ListGatewaysPreparer(ctx context.Context, resourceGroupName string, privateCloudName string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"privateCloudName\": autorest.Encode(\"path\", privateCloudName),\n\t\t\"resourceGroupName\": autorest.Encode(\"path\", resourceGroupName),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t}\n\n\tconst APIVersion = \"2020-07-17-preview\"\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": APIVersion,\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsGet(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.AVS/privateClouds/{privateCloudName}/workloadNetworks/default/gateways\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func NewGetGatewaysParams() *GetGatewaysParams {\n\treturn &GetGatewaysParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *VPCService) NewCreatePrivateGatewayParams(gateway string, ipaddress string, netmask string, vlan string, vpcid string) *CreatePrivateGatewayParams {\n\tp := &CreatePrivateGatewayParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"gateway\"] = gateway\n\tp.p[\"ipaddress\"] = ipaddress\n\tp.p[\"netmask\"] = netmask\n\tp.p[\"vlan\"] = vlan\n\tp.p[\"vpcid\"] = vpcid\n\treturn p\n}", "func (f *FakeInstance) ListPrivateNetworks(_ context.Context, _ string, _ *govultr.ListOptions) ([]govultr.PrivateNetwork, *govultr.Meta, *http.Response, error) {\n\tpanic(\"implement me\")\n}", "func (client WorkloadNetworksClient) ListGateways(ctx context.Context, resourceGroupName string, privateCloudName string) (result WorkloadNetworkGatewayListPage, err error) {\n\tif tracing.IsEnabled() {\n\t\tctx = tracing.StartSpan(ctx, fqdn+\"/WorkloadNetworksClient.ListGateways\")\n\t\tdefer func() {\n\t\t\tsc := -1\n\t\t\tif result.wngl.Response.Response != nil {\n\t\t\t\tsc = result.wngl.Response.Response.StatusCode\n\t\t\t}\n\t\t\ttracing.EndSpan(ctx, sc, err)\n\t\t}()\n\t}\n\tif err := validation.Validate([]validation.Validation{\n\t\t{TargetValue: client.SubscriptionID,\n\t\t\tConstraints: []validation.Constraint{{Target: \"client.SubscriptionID\", Name: validation.MinLength, Rule: 1, Chain: nil}}},\n\t\t{TargetValue: resourceGroupName,\n\t\t\tConstraints: []validation.Constraint{{Target: \"resourceGroupName\", Name: validation.MaxLength, Rule: 90, Chain: nil},\n\t\t\t\t{Target: \"resourceGroupName\", Name: validation.MinLength, Rule: 1, Chain: nil},\n\t\t\t\t{Target: \"resourceGroupName\", Name: validation.Pattern, Rule: `^[-\\w\\._\\(\\)]+$`, Chain: nil}}}}); err != nil {\n\t\treturn result, validation.NewError(\"avs.WorkloadNetworksClient\", \"ListGateways\", err.Error())\n\t}\n\n\tresult.fn = client.listGatewaysNextResults\n\treq, err := client.ListGatewaysPreparer(ctx, resourceGroupName, privateCloudName)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"avs.WorkloadNetworksClient\", \"ListGateways\", nil, \"Failure preparing request\")\n\t\treturn\n\t}\n\n\tresp, err := client.ListGatewaysSender(req)\n\tif err != nil {\n\t\tresult.wngl.Response = autorest.Response{Response: resp}\n\t\terr = autorest.NewErrorWithError(err, \"avs.WorkloadNetworksClient\", \"ListGateways\", resp, \"Failure sending request\")\n\t\treturn\n\t}\n\n\tresult.wngl, err = client.ListGatewaysResponder(resp)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"avs.WorkloadNetworksClient\", \"ListGateways\", resp, \"Failure responding to request\")\n\t\treturn\n\t}\n\tif result.wngl.hasNextLink() && result.wngl.IsEmpty() {\n\t\terr = result.NextWithContext(ctx)\n\t\treturn\n\t}\n\n\treturn\n}", "func (client *WebAppsClient) getPrivateEndpointConnectionListCreateRequest(ctx context.Context, resourceGroupName string, name string, options *WebAppsGetPrivateEndpointConnectionListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/privateEndpointConnections\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (s *VPCService) NewDeletePrivateGatewayParams(id string) *DeletePrivateGatewayParams {\n\tp := &DeletePrivateGatewayParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (client *WebAppsClient) getPrivateAccessCreateRequest(ctx context.Context, resourceGroupName string, name string, options *WebAppsGetPrivateAccessOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/privateAccess/virtualNetworks\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewListPaymentsParams() ListPaymentsParams {\n\n\tvar (\n\t\t// initialize parameters with default values\n\n\t\toffsetDefault = string(\"0\")\n\t\torderByDefault = string(\"createddate\")\n\t\tpageSizeDefault = string(\"100\")\n\t)\n\n\treturn ListPaymentsParams{\n\t\tOffset: &offsetDefault,\n\n\t\tOrderBy: &orderByDefault,\n\n\t\tPageSize: &pageSizeDefault,\n\t}\n}", "func (client *PrivateDNSZoneGroupsClient) listCreateRequest(ctx context.Context, privateEndpointName string, resourceGroupName string, options *PrivateDNSZoneGroupsClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/privateEndpoints/{privateEndpointName}/privateDnsZoneGroups\"\n\tif privateEndpointName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateEndpointName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateEndpointName}\", url.PathEscape(privateEndpointName))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-04-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewGetGatewaysParamsWithTimeout(timeout time.Duration) *GetGatewaysParams {\n\treturn &GetGatewaysParams{\n\t\ttimeout: timeout,\n\t}\n}", "func NewListParams() *ListParams {\n\tvar ()\n\treturn &ListParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (m *MockLoadBalancerServiceIface) NewListGlobalLoadBalancerRulesParams() *ListGlobalLoadBalancerRulesParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListGlobalLoadBalancerRulesParams\")\n\tret0, _ := ret[0].(*ListGlobalLoadBalancerRulesParams)\n\treturn ret0\n}", "func NewGetPrivateOrderstateParams() *GetPrivateOrderstateParams {\n\tvar ()\n\treturn &GetPrivateOrderstateParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *VirtualNetworkLinksClient) listCreateRequest(ctx context.Context, resourceGroupName string, privateZoneName string, options *VirtualNetworkLinksListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/privateDnsZones/{privateZoneName}/virtualNetworkLinks\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif privateZoneName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateZoneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateZoneName}\", url.PathEscape(privateZoneName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.Top != nil {\n\t\treqQP.Set(\"$top\", strconv.FormatInt(int64(*options.Top), 10))\n\t}\n\treqQP.Set(\"api-version\", \"2020-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewGetPrivateNetworkRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/private-network/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"GET\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (directLinkProvider *DirectLinkProviderV2) ListProviderGatewaysWithContext(ctx context.Context, listProviderGatewaysOptions *ListProviderGatewaysOptions) (result *ProviderGatewayCollection, response *core.DetailedResponse, err error) {\n\terr = core.ValidateStruct(listProviderGatewaysOptions, \"listProviderGatewaysOptions\")\n\tif err != nil {\n\t\treturn\n\t}\n\n\tbuilder := core.NewRequestBuilder(core.GET)\n\tbuilder = builder.WithContext(ctx)\n\tbuilder.EnableGzipCompression = directLinkProvider.GetEnableGzipCompression()\n\t_, err = builder.ResolveRequestURL(directLinkProvider.Service.Options.URL, `/gateways`, nil)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor headerName, headerValue := range listProviderGatewaysOptions.Headers {\n\t\tbuilder.AddHeader(headerName, headerValue)\n\t}\n\n\tsdkHeaders := common.GetSdkHeaders(\"direct_link_provider\", \"V2\", \"ListProviderGateways\")\n\tfor headerName, headerValue := range sdkHeaders {\n\t\tbuilder.AddHeader(headerName, headerValue)\n\t}\n\tbuilder.AddHeader(\"Accept\", \"application/json\")\n\n\tbuilder.AddQuery(\"version\", fmt.Sprint(*directLinkProvider.Version))\n\tif listProviderGatewaysOptions.Start != nil {\n\t\tbuilder.AddQuery(\"start\", fmt.Sprint(*listProviderGatewaysOptions.Start))\n\t}\n\tif listProviderGatewaysOptions.Limit != nil {\n\t\tbuilder.AddQuery(\"limit\", fmt.Sprint(*listProviderGatewaysOptions.Limit))\n\t}\n\n\trequest, err := builder.Build()\n\tif err != nil {\n\t\treturn\n\t}\n\n\tvar rawResponse map[string]json.RawMessage\n\tresponse, err = directLinkProvider.Service.Request(request, &rawResponse)\n\tif err != nil {\n\t\treturn\n\t}\n\tif rawResponse != nil {\n\t\terr = core.UnmarshalModel(rawResponse, \"\", &result, UnmarshalProviderGatewayCollection)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tresponse.Result = result\n\t}\n\n\treturn\n}", "func (m *MockSecurityGroupServiceIface) NewListSecurityGroupsParams() *ListSecurityGroupsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListSecurityGroupsParams\")\n\tret0, _ := ret[0].(*ListSecurityGroupsParams)\n\treturn ret0\n}", "func CreateListManagedPrivateSpacesRequest() (request *ListManagedPrivateSpacesRequest) {\n\trequest = &ListManagedPrivateSpacesRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"SmartHosting\", \"2020-08-01\", \"ListManagedPrivateSpaces\", \"smarthosting\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func (m *MockRouterServiceIface) NewListVirtualRouterElementsParams() *ListVirtualRouterElementsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListVirtualRouterElementsParams\")\n\tret0, _ := ret[0].(*ListVirtualRouterElementsParams)\n\treturn ret0\n}", "func (m *MockRouterServiceIface) NewListRoutersParams() *ListRoutersParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListRoutersParams\")\n\tret0, _ := ret[0].(*ListRoutersParams)\n\treturn ret0\n}", "func NewIpNetwork_getRemoteHost_Params_List(s *capnp.Segment, sz int32) (IpNetwork_getRemoteHost_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn IpNetwork_getRemoteHost_Params_List{l}, err\n}", "func NewParams(defaultSendEnabled bool) Params {\n\treturn Params{\n\t\tSendEnabled: nil,\n\t\tDefaultSendEnabled: defaultSendEnabled,\n\t}\n}", "func (i *InstanceServiceHandler) ListPrivateNetworks(ctx context.Context, instanceID string, options *ListOptions) ([]PrivateNetwork, *Meta, error) {\n\turi := fmt.Sprintf(\"%s/%s/private-networks\", instancePath, instanceID)\n\treq, err := i.client.NewRequest(ctx, http.MethodGet, uri, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tnewValues, err := query.Values(options)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\treq.URL.RawQuery = newValues.Encode()\n\n\tnetworks := new(privateNetworksBase)\n\tif err = i.client.DoWithContext(ctx, req, networks); err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\treturn networks.PrivateNetworks, networks.Meta, nil\n}", "func (m *MockFirewallServiceIface) NewListPortForwardingRulesParams() *ListPortForwardingRulesParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListPortForwardingRulesParams\")\n\tret0, _ := ret[0].(*ListPortForwardingRulesParams)\n\treturn ret0\n}", "func New() (*Payway, error) {\n\n\t// get default gateway from configuration file\n\tprovider := conf.GetString(\"gateways.payments.default\")\n\n\tif provider == \"\" {\n\t\treturn nil, fmt.Errorf(\"No default payment gateway provided\")\n\t}\n\n\t// acquare read mutex\n\tmu.RLock()\n\n\tdefer mu.RUnlock()\n\n\t// fetch gateway from cache\n\tgateway, ok := gateways[provider]\n\n\tif !ok {\n\n\t\treturn nil, fmt.Errorf(\"Gateway not registered\")\n\t}\n\n\t// Init gateway\n\tif err := gateway.New(); err != nil {\n\n\t\treturn nil, err\n\t}\n\n\treturn &Payway{PayGateway: gateway}, nil\n}", "func NewGetGatewaysForbidden() *GetGatewaysForbidden {\n\treturn &GetGatewaysForbidden{}\n}", "func (client *PeeringPoliciesClient) listByManagedNetworkCreateRequest(ctx context.Context, resourceGroupName string, managedNetworkName string, options *PeeringPoliciesClientListByManagedNetworkOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedNetwork/managedNetworks/{managedNetworkName}/managedNetworkPeeringPolicies\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif managedNetworkName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedNetworkName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedNetworkName}\", url.PathEscape(managedNetworkName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-06-01-preview\")\n\tif options != nil && options.Top != nil {\n\t\treqQP.Set(\"$top\", strconv.FormatInt(int64(*options.Top), 10))\n\t}\n\tif options != nil && options.Skiptoken != nil {\n\t\treqQP.Set(\"$skiptoken\", *options.Skiptoken)\n\t}\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewQueryForbiddenInfoListRequestWithoutParam() *QueryForbiddenInfoListRequest {\n\n return &QueryForbiddenInfoListRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/forbiddenInfo:query\",\n Method: \"POST\",\n Header: nil,\n Version: \"v1\",\n },\n }\n}", "func NewCreatePrivateNetworkRequest(server string, body CreatePrivateNetworkJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewCreatePrivateNetworkRequestWithBody(server, \"application/json\", bodyReader)\n}", "func mustMakePubliclyViewableParams(fsc *frontendServerConfig) publicparams.Matcher {\n\tvar publiclyViewableParams publicparams.Matcher\n\tvar err error\n\n\t// Load the publiclyViewable params if configured and disable querying for issues.\n\tif len(fsc.PubliclyAllowableParams) > 0 {\n\t\tif publiclyViewableParams, err = publicparams.MatcherFromRules(fsc.PubliclyAllowableParams); err != nil {\n\t\t\tsklog.Fatalf(\"Could not load list of public params: %s\", err)\n\t\t}\n\t}\n\n\t// Check if this is public instance. If so, make sure we have a non-nil Matcher.\n\tif fsc.IsPublicView && publiclyViewableParams == nil {\n\t\tsklog.Fatal(\"A non-empty map of publiclyViewableParams must be provided if is public view.\")\n\t}\n\n\treturn publiclyViewableParams\n}", "func (rm *resourceManager) newListRequestPayload(\n\tr *resource,\n) (*svcsdk.DescribeVpcPeeringConnectionsInput, error) {\n\tres := &svcsdk.DescribeVpcPeeringConnectionsInput{}\n\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\n\treturn res, nil\n}", "func NewPoliciesRequestBuilderInternal(pathParameters map[string]string, requestAdapter i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestAdapter)(*PoliciesRequestBuilder) {\n m := &PoliciesRequestBuilder{\n }\n m.urlTemplate = \"{+baseurl}/policies{?%24select,%24expand}\";\n urlTplParams := make(map[string]string)\n for idx, item := range pathParameters {\n urlTplParams[idx] = item\n }\n m.pathParameters = urlTplParams\n m.requestAdapter = requestAdapter\n return m\n}", "func (*DirectLinkProviderV2) NewListProviderGatewaysOptions() *ListProviderGatewaysOptions {\n\treturn &ListProviderGatewaysOptions{}\n}", "func (m *MockFirewallServiceIface) NewListFirewallRulesParams() *ListFirewallRulesParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListFirewallRulesParams\")\n\tret0, _ := ret[0].(*ListFirewallRulesParams)\n\treturn ret0\n}", "func NewGetPrivateOrderstateParamsWithTimeout(timeout time.Duration) *GetPrivateOrderstateParams {\n\tvar ()\n\treturn &GetPrivateOrderstateParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "func (m *MockLoadBalancerServiceIface) NewListLoadBalancerRuleInstancesParams(id string) *ListLoadBalancerRuleInstancesParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListLoadBalancerRuleInstancesParams\", id)\n\tret0, _ := ret[0].(*ListLoadBalancerRuleInstancesParams)\n\treturn ret0\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t}\n}", "func newFilterBlocksRequest(batch []wtxmgr.BlockMeta,\n\tscopedMgrs map[waddrmgr.KeyScope]*waddrmgr.ScopedKeyManager,\n\trecoveryState *RecoveryState) *chain.FilterBlocksRequest {\n\n\tfilterReq := &chain.FilterBlocksRequest{\n\t\tBlocks: batch,\n\t\tExternalAddrs: make(map[waddrmgr.ScopedIndex]btcutil.Address),\n\t\tInternalAddrs: make(map[waddrmgr.ScopedIndex]btcutil.Address),\n\t\tImportedAddrs: make([]btcutil.Address, 0),\n\t\tWatchedOutPoints: recoveryState.WatchedOutPoints(),\n\t}\n\n\t// Populate the external and internal addresses by merging the addresses\n\t// sets belong to all currently tracked scopes.\n\tfor scope := range scopedMgrs {\n\t\tscopeState := recoveryState.StateForScope(scope)\n\t\tfor index, addr := range scopeState.ExternalBranch.Addrs() {\n\t\t\tscopedIndex := waddrmgr.ScopedIndex{\n\t\t\t\tScope: scope,\n\t\t\t\tIndex: index,\n\t\t\t}\n\t\t\tfilterReq.ExternalAddrs[scopedIndex] = addr\n\t\t}\n\t\tfor index, addr := range scopeState.InternalBranch.Addrs() {\n\t\t\tscopedIndex := waddrmgr.ScopedIndex{\n\t\t\t\tScope: scope,\n\t\t\t\tIndex: index,\n\t\t\t}\n\t\t\tfilterReq.InternalAddrs[scopedIndex] = addr\n\t\t}\n\t}\n\n\treturn filterReq\n}", "func (m *MockLoadBalancerServiceIface) NewListLoadBalancerRulesParams() *ListLoadBalancerRulesParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListLoadBalancerRulesParams\")\n\tret0, _ := ret[0].(*ListLoadBalancerRulesParams)\n\treturn ret0\n}", "func (client *WebAppsClient) getPrivateEndpointConnectionListSlotCreateRequest(ctx context.Context, resourceGroupName string, name string, slot string, options *WebAppsGetPrivateEndpointConnectionListSlotOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/slots/{slot}/privateEndpointConnections\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif slot == \"\" {\n\t\treturn nil, errors.New(\"parameter slot cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{slot}\", url.PathEscape(slot))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (o *GetGatewaysParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (client *WebAppsClient) getPrivateEndpointConnectionCreateRequest(ctx context.Context, resourceGroupName string, name string, privateEndpointConnectionName string, options *WebAppsGetPrivateEndpointConnectionOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/privateEndpointConnections/{privateEndpointConnectionName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif privateEndpointConnectionName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateEndpointConnectionName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateEndpointConnectionName}\", url.PathEscape(privateEndpointConnectionName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewParams(\n\tSpotMarketInstantListingFee sdk.Coin,\n\tderivativeMarketInstantListingFee sdk.Coin,\n\tdefaultSpotMakerFee sdk.Dec,\n\tdefaultSpotTakerFee sdk.Dec,\n\tdefaultDerivativeMakerFee sdk.Dec,\n\tdefaultDerivativeTakerFee sdk.Dec,\n\tdefaultInitialMarginRatio sdk.Dec,\n\tdefaultMaintenanceMarginRatio sdk.Dec,\n\tdefaultFundingInterval int64,\n\tfundingMultiple int64,\n\trelayerFeeShare sdk.Dec,\n\tdefaultHourlyFundingRateCap sdk.Dec,\n\tdefaultHourlyInterestRate sdk.Dec,\n\tmaxDerivativeSideOrderCount uint32,\n) Params {\n\treturn Params{\n\t\tSpotMarketInstantListingFee: SpotMarketInstantListingFee,\n\t\tDerivativeMarketInstantListingFee: derivativeMarketInstantListingFee,\n\t\tDefaultSpotMakerFeeRate: defaultSpotMakerFee,\n\t\tDefaultSpotTakerFeeRate: defaultSpotTakerFee,\n\t\tDefaultDerivativeMakerFeeRate: defaultDerivativeMakerFee,\n\t\tDefaultDerivativeTakerFeeRate: defaultDerivativeTakerFee,\n\t\tDefaultInitialMarginRatio: defaultInitialMarginRatio,\n\t\tDefaultMaintenanceMarginRatio: defaultMaintenanceMarginRatio,\n\t\tDefaultFundingInterval: defaultFundingInterval,\n\t\tFundingMultiple: fundingMultiple,\n\t\tRelayerFeeShareRate: relayerFeeShare,\n\t\tDefaultHourlyFundingRateCap: defaultHourlyFundingRateCap,\n\t\tDefaultHourlyInterestRate: defaultHourlyInterestRate,\n\t\tMaxDerivativeOrderSideCount: maxDerivativeSideOrderCount,\n\t}\n}", "func NewGetListParams() *GetListParams {\n\tvar ()\n\treturn &GetListParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func newBGPFilterList() *api.BGPFilterList {\n\treturn &api.BGPFilterList{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: api.KindBGPFilterList,\n\t\t\tAPIVersion: api.GroupVersionCurrent,\n\t\t},\n\t}\n}", "func newPrivateZonesClient(subscriptionID string, baseURI string, authorizer autorest.Authorizer) privatedns.PrivateZonesClient {\n\tzonesClient := privatedns.NewPrivateZonesClientWithBaseURI(baseURI, subscriptionID)\n\tazure.SetAutoRestClientDefaults(&zonesClient.Client, authorizer)\n\treturn zonesClient\n}", "func (c *MockNatGatewaysClient) List(ctx context.Context, resourceGroupName string) ([]network.NatGateway, error) {\n\tvar l []network.NatGateway\n\tfor _, ngw := range c.NGWs {\n\t\tl = append(l, ngw)\n\t}\n\treturn l, nil\n}", "func (s *Handler) ListGateways(ctx context.Context, req *api.ListGatewaysRequest) (*api.ListGatewaysResponse, error) {\n\tgws := s.DaemonService.ListGateways()\n\n\tapiGws := make([]*api.Gateway, 0, len(gws))\n\tfor _, gw := range gws {\n\t\tapiGateway, err := s.newAPIGateway(gw)\n\t\tif err != nil {\n\t\t\treturn nil, trace.Wrap(err)\n\t\t}\n\n\t\tapiGws = append(apiGws, apiGateway)\n\t}\n\n\treturn &api.ListGatewaysResponse{\n\t\tGateways: apiGws,\n\t}, nil\n}", "func NewCreatePrivateNetworkRequestWithBody(server string, contentType string, body io.Reader) (*http.Request, error) {\n\tvar err error\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/private-network\")\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"POST\", queryUrl.String(), body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Add(\"Content-Type\", contentType)\n\treturn req, nil\n}", "func NewRealmGateway_import_Params_List(s *capnp.Segment, sz int32) (RealmGateway_import_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn RealmGateway_import_Params_List{l}, err\n}", "func NewRealmGateway_import_Params_List(s *capnp.Segment, sz int32) (RealmGateway_import_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn RealmGateway_import_Params_List{l}, err\n}", "func newPrivateZonesClient(auth azure.Authorizer) *azureZonesClient {\n\tc := privatedns.NewPrivateZonesClientWithBaseURI(auth.BaseURI(), auth.SubscriptionID())\n\tazure.SetAutoRestClientDefaults(&c.Client, auth.Authorizer())\n\treturn &azureZonesClient{\n\t\tprivatezones: c,\n\t}\n}", "func NewGetPrivateGetOpenOrdersByCurrencyParams() *GetPrivateGetOpenOrdersByCurrencyParams {\n\tvar ()\n\treturn &GetPrivateGetOpenOrdersByCurrencyParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *PublicIPAddressesClient) listCreateRequest(ctx context.Context, resourceGroupName string, options *PublicIPAddressesClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/publicIPAddresses\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (in *PrivateEndpointList) DeepCopy() *PrivateEndpointList {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(PrivateEndpointList)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func (m *MockProjectServiceIface) NewListProjectInvitationsParams() *ListProjectInvitationsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListProjectInvitationsParams\")\n\tret0, _ := ret[0].(*ListProjectInvitationsParams)\n\treturn ret0\n}", "func NewGetPrivateGetOpenOrdersByCurrencyParamsWithHTTPClient(client *http.Client) *GetPrivateGetOpenOrdersByCurrencyParams {\n\tvar ()\n\treturn &GetPrivateGetOpenOrdersByCurrencyParams{\n\t\tHTTPClient: client,\n\t}\n}", "func NewGetGatewaysParamsWithHTTPClient(client *http.Client) *GetGatewaysParams {\n\treturn &GetGatewaysParams{\n\t\tHTTPClient: client,\n\t}\n}", "func (m *MockFirewallServiceIface) NewListPaloAltoFirewallsParams() *ListPaloAltoFirewallsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListPaloAltoFirewallsParams\")\n\tret0, _ := ret[0].(*ListPaloAltoFirewallsParams)\n\treturn ret0\n}", "func (m *MockLoadBalancerServiceIface) NewListLoadBalancersParams() *ListLoadBalancersParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListLoadBalancersParams\")\n\tret0, _ := ret[0].(*ListLoadBalancersParams)\n\treturn ret0\n}", "func NewPrivateWalletAPI(b Backend) *PrivateWalletAPI {\n\treturn &PrivateWalletAPI{\n\t\tb: b,\n\t\tdex: b.GetDex(),\n\t\tdexDB: b.GetDexDB(),\n\t}\n}", "func NewBenchmark_send_Params_List(s *capnp.Segment, sz int32) (Benchmark_send_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn Benchmark_send_Params_List{l}, err\n}", "func NewPostPaymentsGatewaysParams() *PostPaymentsGatewaysParams {\n\tvar ()\n\treturn &PostPaymentsGatewaysParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func CreateGetLniPrivateIpAddressRequest() (request *GetLniPrivateIpAddressRequest) {\n\trequest = &GetLniPrivateIpAddressRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"eflo\", \"2022-05-30\", \"GetLniPrivateIpAddress\", \"eflo\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func NewGetGatewaysUnauthorized() *GetGatewaysUnauthorized {\n\treturn &GetGatewaysUnauthorized{}\n}", "func NewGetPrivateGetOpenOrdersByCurrencyParamsWithTimeout(timeout time.Duration) *GetPrivateGetOpenOrdersByCurrencyParams {\n\tvar ()\n\treturn &GetPrivateGetOpenOrdersByCurrencyParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "func newBulletproofParams(m int) *bulletproofParams {\n\tmaxExp := privacy_util.MaxExp\n\tnumCommitValue := privacy_util.NumBase\n\tmaxOutputCoin := privacy_util.MaxOutputCoin\n\tcapacity := maxExp * m // fixed value\n\tparam := new(bulletproofParams)\n\tparam.g = make([]*operation.Point, capacity)\n\tparam.h = make([]*operation.Point, capacity)\n\tcsByte := []byte{}\n\n\tfor i := 0; i < capacity; i++ {\n\t\tparam.g[i] = operation.HashToPointFromIndex(int64(numCommitValue+i), operation.CStringBulletProof)\n\t\tparam.h[i] = operation.HashToPointFromIndex(int64(numCommitValue+i+maxOutputCoin*maxExp), operation.CStringBulletProof)\n\t\tcsByte = append(csByte, param.g[i].ToBytesS()...)\n\t\tcsByte = append(csByte, param.h[i].ToBytesS()...)\n\t}\n\n\tparam.u = new(operation.Point)\n\tparam.u = operation.HashToPointFromIndex(int64(numCommitValue+2*maxOutputCoin*maxExp), operation.CStringBulletProof)\n\tcsByte = append(csByte, param.u.ToBytesS()...)\n\n\tparam.cs = operation.HashToPoint(csByte)\n\treturn param\n}", "func NewUpdatePrivateNetworkRequest(server string, id string, body UpdatePrivateNetworkJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewUpdatePrivateNetworkRequestWithBody(server, id, \"application/json\", bodyReader)\n}", "func NewGetPrivateOrderstateParamsWithHTTPClient(client *http.Client) *GetPrivateOrderstateParams {\n\tvar ()\n\treturn &GetPrivateOrderstateParams{\n\t\tHTTPClient: client,\n\t}\n}", "func (gatewayContext *GatewayContext) newGatewayWatch(name string) *cache.ListWatch {\n\tx := gatewayContext.gatewayClient.ArgoprojV1alpha1().RESTClient()\n\tresource := \"gateways\"\n\tfieldSelector := fields.ParseSelectorOrDie(fmt.Sprintf(\"metadata.name=%s\", name))\n\n\tlistFunc := func(options metav1.ListOptions) (runtime.Object, error) {\n\t\toptions.FieldSelector = fieldSelector.String()\n\t\treq := x.Get().\n\t\t\tNamespace(gatewayContext.namespace).\n\t\t\tResource(resource).\n\t\t\tVersionedParams(&options, metav1.ParameterCodec)\n\t\treturn req.Do().Get()\n\t}\n\twatchFunc := func(options metav1.ListOptions) (watch.Interface, error) {\n\t\toptions.Watch = true\n\t\toptions.FieldSelector = fieldSelector.String()\n\t\treq := x.Get().\n\t\t\tNamespace(gatewayContext.namespace).\n\t\t\tResource(resource).\n\t\t\tVersionedParams(&options, metav1.ParameterCodec)\n\t\treturn req.Watch()\n\t}\n\treturn &cache.ListWatch{ListFunc: listFunc, WatchFunc: watchFunc}\n}", "func NewGetRuleChainParams() *GetRuleChainParams {\n\tvar ()\n\treturn &GetRuleChainParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (c *Client) NewListMemberRequest(ctx context.Context, path string) (*http.Request, error) {\n\tscheme := c.Scheme\n\tif scheme == \"\" {\n\t\tscheme = \"https\"\n\t}\n\tu := url.URL{Host: c.Host, Scheme: scheme, Path: path}\n\treq, err := http.NewRequest(\"GET\", u.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif c.JWTSigner != nil {\n\t\tif err := c.JWTSigner.Sign(req); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn req, nil\n}", "func (rm *resourceManager) newListRequestPayload(\n\tr *resource,\n) (*svcsdk.DescribeVpnConnectionsInput, error) {\n\tres := &svcsdk.DescribeVpnConnectionsInput{}\n\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\n\treturn res, nil\n}", "func (m *MockLoadBalancerServiceIface) NewListLBStickinessPoliciesParams() *ListLBStickinessPoliciesParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListLBStickinessPoliciesParams\")\n\tret0, _ := ret[0].(*ListLBStickinessPoliciesParams)\n\treturn ret0\n}", "func (client *WebAppsClient) getPrivateAccessSlotCreateRequest(ctx context.Context, resourceGroupName string, name string, slot string, options *WebAppsGetPrivateAccessSlotOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/slots/{slot}/privateAccess/virtualNetworks\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif slot == \"\" {\n\t\treturn nil, errors.New(\"parameter slot cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{slot}\", url.PathEscape(slot))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewForwardingProfilesRequestBuilderInternal(pathParameters map[string]string, requestAdapter i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestAdapter)(*ForwardingProfilesRequestBuilder) {\n m := &ForwardingProfilesRequestBuilder{\n BaseRequestBuilder: *i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewBaseRequestBuilder(requestAdapter, \"{+baseurl}/networkAccess/forwardingProfiles{?%24top,%24skip,%24search,%24filter,%24count,%24orderby,%24select,%24expand}\", pathParameters),\n }\n return m\n}", "func NewLinkPrivateIpsRequestWithDefaults() *LinkPrivateIpsRequest {\n\tthis := LinkPrivateIpsRequest{}\n\treturn &this\n}", "func GetNetworkParams(network string) *chaincfg.Params {\n\tnetworkParams := &chaincfg.MainNetParams\n\n\tif network == \"bitcoin\" {\n\t\tnetworkParams.PubKeyHashAddrID = 0x00\n\t\tnetworkParams.PrivateKeyID = 0x80\n\t} else if network == \"litecoin\" {\n\t\tnetworkParams.PubKeyHashAddrID = 0x30\n\t\tnetworkParams.PrivateKeyID = 0xb0\n\t}\n\n\treturn networkParams\n}", "func (client *RecordSetsClient) listCreateRequest(ctx context.Context, resourceGroupName string, privateZoneName string, options *RecordSetsListOptions) (*azcore.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/privateDnsZones/{privateZoneName}/ALL\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif privateZoneName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateZoneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateZoneName}\", url.PathEscape(privateZoneName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := azcore.NewRequest(ctx, http.MethodGet, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\treqQP := req.URL.Query()\n\tif options != nil && options.Top != nil {\n\t\treqQP.Set(\"$top\", strconv.FormatInt(int64(*options.Top), 10))\n\t}\n\tif options != nil && options.Recordsetnamesuffix != nil {\n\t\treqQP.Set(\"$recordsetnamesuffix\", *options.Recordsetnamesuffix)\n\t}\n\treqQP.Set(\"api-version\", \"2020-06-01\")\n\treq.URL.RawQuery = reqQP.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (m *MockLoadBalancerServiceIface) NewListNetscalerLoadBalancersParams() *ListNetscalerLoadBalancersParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListNetscalerLoadBalancersParams\")\n\tret0, _ := ret[0].(*ListNetscalerLoadBalancersParams)\n\treturn ret0\n}", "func (m *MockFirewallServiceIface) NewListEgressFirewallRulesParams() *ListEgressFirewallRulesParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListEgressFirewallRulesParams\")\n\tret0, _ := ret[0].(*ListEgressFirewallRulesParams)\n\treturn ret0\n}", "func (m *MockLoadBalancerServiceIface) NewListLBHealthCheckPoliciesParams() *ListLBHealthCheckPoliciesParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListLBHealthCheckPoliciesParams\")\n\tret0, _ := ret[0].(*ListLBHealthCheckPoliciesParams)\n\treturn ret0\n}", "func NewParams(communityTax sdk.Dec, withdrawAddrEnabled bool) Params {\n\treturn Params{\n\t\tCommunityTax: communityTax,\n\t\tWithdrawAddrEnabled: withdrawAddrEnabled,\n\t}\n}", "func (*IbmAnalyticsEngineApiV2) NewUpdatePrivateEndpointWhitelistOptions(instanceGuid string, ipRanges []string, action string) *UpdatePrivateEndpointWhitelistOptions {\n\treturn &UpdatePrivateEndpointWhitelistOptions{\n\t\tInstanceGuid: core.StringPtr(instanceGuid),\n\t\tIpRanges: ipRanges,\n\t\tAction: core.StringPtr(action),\n\t}\n}", "func NewGetAllPublicIPUsingGETParamsWithTimeout(timeout time.Duration) *GetAllPublicIPUsingGETParams {\n\tvar (\n\t\tpageDefault = int32(0)\n\t\ttotalDefault = int32(20)\n\t)\n\treturn &GetAllPublicIPUsingGETParams{\n\t\tPage: &pageDefault,\n\t\tTotal: &totalDefault,\n\n\t\ttimeout: timeout,\n\t}\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (client WorkloadNetworksClient) ListDhcpPreparer(ctx context.Context, resourceGroupName string, privateCloudName string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"privateCloudName\": autorest.Encode(\"path\", privateCloudName),\n\t\t\"resourceGroupName\": autorest.Encode(\"path\", resourceGroupName),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t}\n\n\tconst APIVersion = \"2020-07-17-preview\"\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": APIVersion,\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsGet(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.AVS/privateClouds/{privateCloudName}/workloadNetworks/default/dhcpConfigurations\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func NewGroupItemRequestBuilderInternal(pathParameters map[string]string, requestAdapter i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestAdapter)(*GroupItemRequestBuilder) {\n m := &GroupItemRequestBuilder{\n }\n m.urlTemplate = \"{+baseurl}/print/shares/{printerShare%2Did}/allowedGroups/{group%2Did}\";\n urlTplParams := make(map[string]string)\n for idx, item := range pathParameters {\n urlTplParams[idx] = item\n }\n m.pathParameters = urlTplParams;\n m.requestAdapter = requestAdapter;\n return m\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules,\n\tmoneyMarkets MoneyMarkets, checkLtvIndexCount int) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t\tMoneyMarkets: moneyMarkets,\n\t\tCheckLtvIndexCount: checkLtvIndexCount,\n\t}\n}", "func NewParams(tokenCourse, subscriptionPrice, VPNGBPrice,\n\tstorageGBPrice, baseVPNGb, baseStorageGb uint32, courseSigners []sdk.AccAddress) Params {\n\treturn Params{\n\t\tTokenCourse: tokenCourse,\n\t\tSubscriptionPrice: subscriptionPrice,\n\t\tVPNGBPrice: VPNGBPrice,\n\t\tStorageGBPrice: storageGBPrice,\n\t\tBaseVPNGb: baseVPNGb,\n\t\tBaseStorageGb: baseStorageGb,\n\t\tCourseChangeSigners: courseSigners[:],\n\t}\n}", "func NewGetCwfNetworkIDGatewaysGatewayIDParams() *GetCwfNetworkIDGatewaysGatewayIDParams {\n\tvar ()\n\treturn &GetCwfNetworkIDGatewaysGatewayIDParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewGetPeersForbidden() *GetPeersForbidden {\n\treturn &GetPeersForbidden{}\n}", "func (client *PeeringPoliciesClient) getCreateRequest(ctx context.Context, resourceGroupName string, managedNetworkName string, managedNetworkPeeringPolicyName string, options *PeeringPoliciesClientGetOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedNetwork/managedNetworks/{managedNetworkName}/managedNetworkPeeringPolicies/{managedNetworkPeeringPolicyName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif managedNetworkName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedNetworkName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedNetworkName}\", url.PathEscape(managedNetworkName))\n\tif managedNetworkPeeringPolicyName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedNetworkPeeringPolicyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedNetworkPeeringPolicyName}\", url.PathEscape(managedNetworkPeeringPolicyName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-06-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewAi_takeTurn_Params_List(s *capnp.Segment, sz int32) (Ai_takeTurn_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\tif err != nil {\n\t\treturn Ai_takeTurn_Params_List{}, err\n\t}\n\treturn Ai_takeTurn_Params_List{l}, nil\n}", "func (client *WebAppsClient) getVnetConnectionGatewayCreateRequest(ctx context.Context, resourceGroupName string, name string, vnetName string, gatewayName string, options *WebAppsGetVnetConnectionGatewayOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/virtualNetworkConnections/{vnetName}/gateways/{gatewayName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif vnetName == \"\" {\n\t\treturn nil, errors.New(\"parameter vnetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vnetName}\", url.PathEscape(vnetName))\n\tif gatewayName == \"\" {\n\t\treturn nil, errors.New(\"parameter gatewayName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{gatewayName}\", url.PathEscape(gatewayName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *PrivateDNSZoneGroupsClient) getCreateRequest(ctx context.Context, resourceGroupName string, privateEndpointName string, privateDNSZoneGroupName string, options *PrivateDNSZoneGroupsClientGetOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/privateEndpoints/{privateEndpointName}/privateDnsZoneGroups/{privateDnsZoneGroupName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif privateEndpointName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateEndpointName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateEndpointName}\", url.PathEscape(privateEndpointName))\n\tif privateDNSZoneGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateDNSZoneGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateDnsZoneGroupName}\", url.PathEscape(privateDNSZoneGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-04-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewParams(pricePerByte abi.TokenAmount, paymentInterval uint64, paymentIntervalIncrease uint64) (Params, error) {\n\treturn Params{\n\t\tPricePerByte: pricePerByte,\n\t\tPaymentInterval: paymentInterval,\n\t\tPaymentIntervalIncrease: paymentIntervalIncrease,\n\t}, nil\n}" ]
[ "0.6246341", "0.62371427", "0.5805685", "0.5746949", "0.56724185", "0.54378635", "0.53815717", "0.51835805", "0.5159789", "0.5151935", "0.50993294", "0.509845", "0.50958824", "0.5092127", "0.500331", "0.4995394", "0.4920365", "0.48815966", "0.48676464", "0.48565692", "0.48426256", "0.48385727", "0.48299015", "0.48173022", "0.48120093", "0.48085406", "0.47955728", "0.47872892", "0.4779716", "0.47692072", "0.47642723", "0.47626105", "0.47600013", "0.47514662", "0.47473502", "0.47325864", "0.4708563", "0.47057858", "0.47007883", "0.46892846", "0.46813694", "0.46787605", "0.46708062", "0.4642398", "0.46340075", "0.46158117", "0.4611062", "0.45953998", "0.45752242", "0.45650268", "0.4561289", "0.45611548", "0.45611548", "0.45560873", "0.45553133", "0.45552632", "0.45442826", "0.45439714", "0.45413938", "0.45395842", "0.45308885", "0.4523626", "0.452178", "0.4521126", "0.4519302", "0.4513283", "0.4512356", "0.4498562", "0.44984818", "0.44935378", "0.44909838", "0.448718", "0.44843623", "0.44835517", "0.44804332", "0.44801205", "0.4477412", "0.4468566", "0.44674057", "0.44655806", "0.44645515", "0.44623843", "0.44581524", "0.44558904", "0.4450795", "0.4449478", "0.44470623", "0.44415852", "0.44415852", "0.44410446", "0.44393227", "0.4437878", "0.44378373", "0.44185382", "0.44111687", "0.44110245", "0.44103926", "0.43888026", "0.43869713", "0.43848583" ]
0.77712244
0
This is a courtesy helper function, which in some cases may not work as expected!
func (s *VPCService) GetPrivateGatewayByID(id string, opts ...OptionFunc) (*PrivateGateway, int, error) { p := &ListPrivateGatewaysParams{} p.p = make(map[string]interface{}) p.p["id"] = id for _, fn := range append(s.cs.options, opts...) { if err := fn(s.cs, p); err != nil { return nil, -1, err } } l, err := s.ListPrivateGateways(p) if err != nil { if strings.Contains(err.Error(), fmt.Sprintf( "Invalid parameter id value=%s due to incorrect long value format, "+ "or entity does not exist", id)) { return nil, 0, fmt.Errorf("No match found for %s: %+v", id, l) } return nil, -1, err } if l.Count == 0 { return nil, l.Count, fmt.Errorf("No match found for %s: %+v", id, l) } if l.Count == 1 { return l.PrivateGateways[0], l.Count, nil } return nil, l.Count, fmt.Errorf("There is more then one result for PrivateGateway UUID: %s!", id) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func getHelperMethodIfNeeded(functionName string, indent string) (string, bool) {\n\tswitch functionName {\n\tcase \"filebase64sha256\":\n\t\treturn `function computeFilebase64sha256(path string) string {\n\tconst fileData = Buffer.from(fs.readFileSync(path), 'binary')\n\treturn crypto.createHash('sha256').update(fileData).digest('hex')\n}`, true\n\tcase \"notImplemented\":\n\t\treturn fmt.Sprintf(\n\t\t\t`%sfunction notImplemented(message: string) {\n%s throw new Error(message);\n%s}`, indent, indent, indent), true\n\tcase \"singleOrNone\":\n\t\treturn fmt.Sprintf(\n\t\t\t`%sfunction singleOrNone<T>(elements: pulumi.Input<T>[]): pulumi.Input<T> {\n%s if (elements.length != 1) {\n%s throw new Error(\"singleOrNone expected input list to have a single element\");\n%s }\n%s return elements[0];\n%s}`, indent, indent, indent, indent, indent, indent), true\n\tdefault:\n\t\treturn \"\", false\n\t}\n}", "func getHelperMethodIfNeeded(functionName string, indent string) (string, bool) {\n\tswitch functionName {\n\tcase \"filebase64\":\n\t\treturn `private static string ReadFileBase64(string path) {\n\t\treturn Convert.ToBase64String(System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path)));\n\t}`, true\n\tcase \"filebase64sha256\":\n\t\treturn `private static string ComputeFileBase64Sha256(string path) {\n\t\tvar fileData = System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path));\n\t\tvar hashData = SHA256.Create().ComputeHash(fileData);\n\t\treturn Convert.ToBase64String(hashData);\n\t}`, true\n\tcase \"sha1\":\n\t\treturn `private static string ComputeSHA1(string input) {\n\t\treturn BitConverter.ToString(\n\t\t\tSHA1.Create().ComputeHash(Encoding.UTF8.GetBytes(input))\n\t\t).Replace(\"-\",\"\").ToLowerInvariant());\n\t}`, true\n\tcase \"notImplemented\":\n\t\treturn fmt.Sprintf(`\n%sstatic object NotImplemented(string errorMessage) \n%s{\n%s throw new System.NotImplementedException(errorMessage);\n%s}`, indent, indent, indent, indent), true\n\tdefault:\n\t\treturn \"\", false\n\t}\n}", "func TestGetNone4A(t *testing.T) {\n}", "func (f *Ifacer) getUniqueImportName(pkgName string, level int) string {\n\tstrs := strings.Split(pkgName, string(filepath.Separator))\n\n\tlenStr := len(strs)\n\n\tif lenStr-1 < level {\n\t\tf.logger.Panicf(\"%d out of range\", level)\n\t}\n\n\tvar importName string\n\tfor _, str := range strs[lenStr-level-1:] {\n\t\tif strings.Contains(str, \".\") {\n\t\t\tstr = strings.Replace(str, \".\", \"\", -1)\n\t\t}\n\t\timportName += str\n\t}\n\n\treturn importName\n}", "func DummyStringGetterFunction(name string) string {\n\treturn name\n}", "func almostOkayFunction() {\n\treturn nil\n}", "func isBadVersion(version int) bool{\n return false\n}", "func trimCaller(funcName string) string {\n\t// ex:\n\t// funcName = \"github.com/ddo/request.(*Client).Request\"\n\t// arrDir = [github.com ddo request.(*Client).Request]\n\t// lastDir = request.(*Client).Request\n\t// arrCaller = [request. (*Client).Request]\n\n\tarrDir := strings.Split(funcName, \"/\")\n\tlastDir := arrDir[len(arrDir)-1]\n\tarrCaller := strings.Split(lastDir, \".\")\n\n\tif len(arrCaller) < 2 {\n\t\treturn \"\"\n\t}\n\n\treturn arrCaller[len(arrCaller)-1]\n}", "func getValidPrefix(s string, base int64) string {\n\ttrace_util_0.Count(_util_00000, 47)\n\tvar (\n\t\tvalidLen int\n\t\tupper rune\n\t)\n\tswitch {\n\tcase base >= 2 && base <= 9:\n\t\ttrace_util_0.Count(_util_00000, 51)\n\t\tupper = rune('0' + base)\n\tcase base <= 36:\n\t\ttrace_util_0.Count(_util_00000, 52)\n\t\tupper = rune('A' + base - 10)\n\tdefault:\n\t\ttrace_util_0.Count(_util_00000, 53)\n\t\treturn \"\"\n\t}\n\ttrace_util_0.Count(_util_00000, 48)\nLoop:\n\tfor i := 0; i < len(s); i++ {\n\t\ttrace_util_0.Count(_util_00000, 54)\n\t\tc := rune(s[i])\n\t\tswitch {\n\t\tcase unicode.IsDigit(c) || unicode.IsLower(c) || unicode.IsUpper(c):\n\t\t\ttrace_util_0.Count(_util_00000, 55)\n\t\t\tc = unicode.ToUpper(c)\n\t\t\tif c < upper {\n\t\t\t\ttrace_util_0.Count(_util_00000, 58)\n\t\t\t\tvalidLen = i + 1\n\t\t\t} else {\n\t\t\t\ttrace_util_0.Count(_util_00000, 59)\n\t\t\t\t{\n\t\t\t\t\tbreak Loop\n\t\t\t\t}\n\t\t\t}\n\t\tcase c == '+' || c == '-':\n\t\t\ttrace_util_0.Count(_util_00000, 56)\n\t\t\tif i != 0 {\n\t\t\t\ttrace_util_0.Count(_util_00000, 60)\n\t\t\t\tbreak Loop\n\t\t\t}\n\t\tdefault:\n\t\t\ttrace_util_0.Count(_util_00000, 57)\n\t\t\tbreak Loop\n\t\t}\n\t}\n\ttrace_util_0.Count(_util_00000, 49)\n\tif validLen > 1 && s[0] == '+' {\n\t\ttrace_util_0.Count(_util_00000, 61)\n\t\treturn s[1:validLen]\n\t}\n\ttrace_util_0.Count(_util_00000, 50)\n\treturn s[:validLen]\n}", "func sanitizePackageName(importPath string) string {\n\talias := path.Base(importPath)\n\n\t// alias should be lower case\n\talias = strings.ToLower(alias)\n\n\t// alias should now only contain alphanumerics\n\timportsRegex := regexp.MustCompile(`[^a-z0-9]`)\n\talias = importsRegex.ReplaceAllString(alias, \"\")\n\n\t// can't have a first digit, per Go identifier rules, so just skip them\n\talias = strings.TrimLeftFunc(alias, unicode.IsDigit)\n\n\t// If path part was all digits, we may be left with an empty string. In this case use \"pkg\" as the alias.\n\tif alias == \"\" {\n\t\talias = \"pkg\"\n\t}\n\n\treturn alias\n}", "func TestPrewriteWrittenNoConflict4A(t *testing.T) {\n}", "func getOID(oid string) (string, error) {\n\tif strings.HasPrefix(oid, \".\") {\n\t\treturn oid, nil\n\t}\n\tmu.Lock()\n\tdefer mu.Unlock()\n\tfixed, ok := lookupOID[oid]\n\tif !ok {\n\t\treturn oid, errors.Errorf(\"no OID found for %s\", oid)\n\t}\n\treturn fixed, nil\n}", "func legacyFileName(prefix, instance, class, id string) string {\n\tvar fileName string\n\tinstance = strings.Replace(instance, \"\\\\\", \"__\", -1)\n\n\t// use it to build the file name\n\tif prefix == \"\" {\n\t\tfileName = fmt.Sprintf(\"%s_%s_%s.status\", instance, class, id)\n\t} else {\n\t\tfileName = fmt.Sprintf(\"%s_%s_%s_%s.status\", prefix, instance, class, id)\n\t}\n\treturn fileName\n}", "func uniquePackageOf(fd *descriptor.FileDescriptorProto) string {\n\ts, ok := uniquePackageName[fd]\n\tif !ok {\n\t\tlog.Fatal(\"internal error: no package name defined for \" + fd.GetName())\n\t}\n\treturn s\n}", "func getForcedGetter(sourceUrl string) (string, string) {\n\tif matches := forcedRegexp.FindStringSubmatch(sourceUrl); matches != nil && len(matches) > 2 {\n\t\treturn matches[1], matches[2]\n\t}\n\n\treturn \"\", sourceUrl\n}", "func getFullyQualifiedFunctionName(fn interface{}) string {\n\treturn runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()\n}", "func internalStartsWith(str string, prefix string, ignoreCase bool) bool {\n\tif str == \"\" || prefix == \"\" {\n\t\treturn (str == \"\" && prefix == \"\")\n\t}\n\tif utf8.RuneCountInString(prefix) > utf8.RuneCountInString(str) {\n\t\treturn false\n\t}\n\tif ignoreCase {\n\t\treturn strings.HasPrefix(strings.ToLower(str), strings.ToLower(prefix))\n\t}\n\treturn strings.HasPrefix(str, prefix)\n}", "func TestEmptyPrewrite4A(t *testing.T) {\n}", "func TestGetEmpty4A(t *testing.T) {\n}", "func ExampleMustSqueezeTrytes() {}", "func getAliasId(name string, mountAccessor string, entityAliasList *map[string]EntityAlias) string {\n\tfor aliasID, alias := range *entityAliasList {\n\t\tif alias.Name == name && alias.MountAccessor == mountAccessor {\n\t\t\treturn aliasID\n\t\t}\n\t}\n\treturn \"\"\n}", "func getInternalParentPrefix(pkgName string) string {\n\tcleanedPath := filepath.Clean(pkgName)\n\texplodedPath := strings.Split(cleanedPath, string(os.PathSeparator))\n\n\ti := len(explodedPath) - 1\n\tfor ; i > 0; i-- {\n\t\tif explodedPath[i] == internal {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn filepath.Join(explodedPath[0:i]...)\n}", "func idFromName(name string) string {\n\ts := strings.Split(strings.ToLower(strings.TrimSpace(name)), \" \")\n\tns := strings.Join(s, \"-\")\n\ts = strings.Split(ns, \".\")\n\treturn strings.Join(s, \"-\")\n}", "func packageName(skip int) (long, short string, ok bool) {\n\t// Full function name looks like path/to/pkg.Func\n\tvar f string\n\t_, _, f, ok = fullCaller(skip + 1)\n\tif !ok {\n\t\treturn\n\t}\n\n\t// Strip down to path/to/pkg\n\tdot := strings.LastIndex(f, \".\")\n\tif dot == -1 {\n\t\treturn\n\t}\n\tlong = f[:dot]\n\n\t// Strip down to pkg\n\tslash := strings.LastIndex(long, \"/\")\n\tif slash == -1 {\n\t\treturn\n\t}\n\tshort = long[slash+1:]\n\treturn\n}", "func smallestGoodBase(n string) string {\n \n}", "func getPathConversionFunction() func(string) string {\n\tif runtime.GOOS != \"windows\" || os.Getenv(\"DOCKER_MACHINE_NAME\") == \"\" {\n\t\treturn func(path string) string { return path }\n\t}\n\n\treturn func(path string) string {\n\t\treturn fmt.Sprintf(\"/%s%s\", strings.ToUpper(path[:1]), path[2:])\n\t}\n}", "func TestSinglePrewrite4A(t *testing.T) {\n}", "func FullNameNakedReturn(f, l string) (full string, length int) {\n full = f + \" \" + l;\n length = len(full)\n return \n}", "func resolveSourcePrefix(source string, sa Source) string {\n\tif sa.Prefix == \"false\" || sa.Prefix == \"\" {\n\t\treturn \"\"\n\t} else if sa.Prefix == \"true\" {\n\t\treturn source + \"_\"\n\t} else {\n\t\treturn sa.Prefix + \"_\"\n\t}\n}", "func TestManifestAPI_Get_UnknownSchema(t *testing.T) {}", "func checkSafeNameChars(nameFragment string) error {\n\tfor i, ch := range nameFragment {\n\t\tswitch {\n\t\tcase 'a' <= ch && ch <= 'z':\n\t\tcase '0' <= ch && ch <= '9':\n\t\tcase ch == '_':\n\t\tdefault:\n\t\t\treturn fmt.Errorf(\"Name fragment is not safe: %x at %d.\", ch, i)\n\t\t}\n\t\t// NO: case ch == '.'\n\t\t// Could also allow at most one dot but not for SQLite.\n\t\t// Maybe would make sense for other SQL DBMS which\n\t\t// use schema names / namespaces.\n\t}\n\treturn nil\n}", "func isCommonRetryableErrorCode(err error) (bool, string) {\n\tgerr, ok := err.(*googleapi.Error)\n\tif !ok {\n\t\treturn false, \"\"\n\t}\n\n\tif gerr.Code == 429 || gerr.Code == 500 || gerr.Code == 502 || gerr.Code == 503 {\n\t\tlog.Printf(\"[DEBUG] Dismissed an error as retryable based on error code: %s\", err)\n\t\treturn true, fmt.Sprintf(\"Retryable error code %d\", gerr.Code)\n\t}\n\treturn false, \"\"\n}", "func goodFunction() {\n\treturn nil\n}", "func getCallerPackage() (string, bool) {\n\tvar pkg string\n\tpc, _, _, ok := runtime.Caller(2)\n\tif !ok {\n\t\treturn pkg, false\n\t}\n\tparts := strings.Split(runtime.FuncForPC(pc).Name(), \".\")\n\tif parts[len(parts)-2][0] == '(' {\n\t\tpkg = strings.Join(parts[0:len(parts)-2], \".\")\n\t} else {\n\t\tpkg = strings.Join(parts[0:len(parts)-1], \".\")\n\t}\n\treturn pkg, true\n}", "func _getFuncName() string {\n var ptrVal = _getFuncPtrVal()\n\n // Look up the function object\n var fun = runtime.FuncForPC(ptrVal)\n\n // returns: _/home/user/src/gohavenet/src.TestProcMgr_False\n var funcNamePath = fun.Name()\n\n // Split on the slash and return just the func name\n var pathElems = strings.Split(funcNamePath, \"/\")\n var index = len(pathElems) - 1\n if index < 0 {\n index = 0\n }\n\n return pathElems[index]\n}", "func getPatchVersionTrimmed(version string) string {\n\tendIndex := strings.LastIndex(version, \".\")\n\tif endIndex != -1 {\n\t\tversion = version[:endIndex]\n\t}\n\treturn version\n}", "func fixLegacyInventoryName(obj *unstructured.Unstructured) error {\n\tif obj.GetName() == legacyInvName {\n\t\tklog.V(4).Infof(\"renaming legacy inventory name\")\n\t\trandomSuffix := common.RandomStr()\n\t\treturn addSuffixToName(obj, randomSuffix)\n\t}\n\treturn nil\n}", "func callerName(skip int) (pkgPath, funcName string, ok bool) {\n\tvar pc [1]uintptr\n\tn := runtime.Callers(skip+1, pc[:])\n\tif n != 1 {\n\t\treturn \"\", \"\", false\n\t}\n\n\tf := runtime.FuncForPC(pc[0]).Name()\n\ts := pkgPathRe.FindStringSubmatch(f)\n\tif len(s) < 3 {\n\t\tpanic(fmt.Errorf(\"failed to extract package path and function name from %q\", f))\n\t}\n\n\treturn s[1], s[2], true\n}", "func getValidContainerName(volumeName, protocol string) string {\n\tcontainerName := strings.ToLower(volumeName)\n\tif len(containerName) > containerNameMaxLength {\n\t\tcontainerName = containerName[0:containerNameMaxLength]\n\t}\n\tif !checkContainerNameBeginAndEnd(containerName) || len(containerName) < containerNameMinLength {\n\t\t// now we set as 63 for maximum container name length\n\t\t// todo: get cluster name\n\t\tcontainerName = k8sutil.GenerateVolumeName(fmt.Sprintf(\"pvc-%s\", protocol), uuid.NewUUID().String(), 63)\n\t\tklog.Warningf(\"the requested volume name (%q) is invalid, so it is regenerated as (%q)\", volumeName, containerName)\n\t}\n\tcontainerName = strings.Replace(containerName, \"--\", \"-\", -1)\n\n\treturn containerName\n}", "func funcName() string {\n\tpc, _, _, _ := runtime.Caller(1)\n\tcompleteFuncname := runtime.FuncForPC(pc).Name()\n\treturn strings.Split(completeFuncname, \".\")[len(strings.Split(completeFuncname, \".\"))-1]\n}", "func ensureValidHelper(name string, funcValue reflect.Value) {\n\tif funcValue.Kind() != reflect.Func {\n\t\tpanic(fmt.Errorf(\"Helper must be a function: %s\", name))\n\t}\n\n\tfuncType := funcValue.Type()\n\n\tif funcType.NumOut() != 1 {\n\t\tpanic(fmt.Errorf(\"Helper function must return a string or a SafeString: %s\", name))\n\t}\n\n\t// @todo Check if first returned value is a string, SafeString or interface{} ?\n}", "func exactFunction() {\n\treturn nil\n}", "func TestUidForUsername(t *testing.T) {\n\tuid, err := uidForUsername(\"root\")\n\tif err != nil {\n\t\tt.Errorf(\"uidForUsername(\\\"root\\\") returned error: %v\", err)\n\t\treturn\n\t}\n\tif uid != 0 {\n\t\tt.Errorf(\"uidForUsername(\\\"root\\\") returned %d, should be 0\", uid)\n\t}\n\n\t_, err = uidForUsername(\"asdfASDFxxx999\")\n\tif err == nil {\n\t\tt.Errorf(\"uidForUsername(\\\"asdfASDFxxx\\\") did not return error\")\n\t\treturn\n\t}\n}", "func getGroupIdString(id interface{}) (gid string, err error) {\r\n\tswitch t := id.(type) {\r\n\tcase string:\r\n\t\tif strings.Contains(id.(string), \"http\") {\r\n\t\t\treturn \"url=\" + url.QueryEscape(id.(string)), nil // group url\r\n\t\t}\r\n\t\treturn id.(string), nil // group id as a string\r\n\tcase uint64:\r\n\t\treturn strconv.FormatUint(id.(uint64), 10), nil // group id as an int\r\n\tdefault:\r\n\t\treturn gid, errors.New(fmt.Sprintf(\"Group ID type exception: Expecting string or uint64 got %T\", t))\r\n\t}\r\n}", "func GoodEnoughUUID() string {\n\tb := make([]byte, 16)\n\t_, err := rand.Read(b)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tuuid := fmt.Sprintf(\"%x-%x-%x-%x-%x\",\n\t\tb[0:4], b[4:6], b[6:8], b[8:10], b[10:])\n\treturn uuid\n}", "func mustBeUnique(label string) {\n\n\tif _, ok := functions[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as function\", label))\n\t}\n\n\tif _, ok := variables[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as variable\", label))\n\t}\n\n\tif _, ok := aliases[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as alias\", label))\n\t}\n}", "func ensureDot(extension string) string {\n\tif strings.Index(extension, \".\") == -1 {\n\t\textension = \".\" + extension\n\t}\n\treturn extension\n}", "func getSafeString(input interface{}) string {\r\n\tvar safeValue string\r\n\tvar isOk bool\r\n\r\n\tif input == nil {\r\n\t\tsafeValue = \"\"\r\n\t} else {\r\n\t\tsafeValue, isOk = input.(string)\r\n\t\tif isOk == false {\r\n\t\t\tsafeValue = \"\"\r\n\t\t}\r\n\t}\r\n\treturn safeValue\r\n}", "func mustGetUUID() string {\n\tu, err := uuid.NewRandom()\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\treturn u.String()\n}", "func fn3() { // want fn3:`Deprecated: Don't use this\\.`\n}", "func ensurePrefix(s, prefix string) string {\n\tif !strings.HasPrefix(s, prefix) {\n\t\ts = prefix + s\n\t}\n\treturn s\n}", "func pySafeName(nm string) string {\n\tif _, bad := pyKeywords[nm]; bad {\n\t\treturn \"my\" + nm\n\t}\n\treturn nm\n}", "func prepareHashPath(path, prefix string) string {\n\t// I need to strip the prefix. But... where does the prefix come from\n\treturn \"/\" + strings.TrimPrefix(path, prefix)\n}", "func fullCaller(skip int) (file string, line int, fnc string, ok bool) {\n\tvar pc uintptr\n\tpc, file, line, ok = runtime.Caller(skip + 1)\n\tif !ok {\n\t\treturn\n\t}\n\n\tf := runtime.FuncForPC(pc)\n\tfnc = f.Name()\n\treturn\n}", "func getValidVersion(version string) string {\n\tif version != \"\" {\n\t\treturn version\n\t}\n\n\treturn \"Not Installed\"\n}", "func makeSafeFileName(s string) string {\n\tconst maxLen = 200 // slightly arbitrary but must be <= 254 for most modern filesystems\n\n\t// First, tidy the file path to a clean representation\n\tresult := filepath.Clean(s)\n\n\t// Next, split the path into elements between separators and check each element.\n\telements := filepath.SplitList(result)\n\tnewElements := []string{}\n\n\tfor _, element := range elements {\n\t\tnewElements = append(newElements, makeSafeFileElement(element))\n\t}\n\n\tresult = filepath.Join(newElements...)\n\n\t// Also avoid starting a file name with a period as this has a special meaning on UNIX\n\t// and UNIX-like systems.\n\tdir := filepath.Dir(result)\n\tbase := filepath.Base(result)\n\n\tif base[0] == '.' {\n\t\tresult = filepath.Join(dir, base[1:])\n\t}\n\n\t// Ensure the resulting name isn't too long, as X.509 distinguished names can be very long.\n\tif len(result) > maxLen {\n\t\tresult = result[:maxLen]\n\t}\n\n\treturn result\n}", "func TestDiskIOStats_diskName(t *testing.T) {\n\ttests := []struct {\n\t\ttemplates []string\n\t\texpected string\n\t}{\n\t\t{[]string{\"$MY_PARAM_1\"}, \"myval1\"},\n\t\t{[]string{\"${MY_PARAM_1}\"}, \"myval1\"},\n\t\t{[]string{\"x$MY_PARAM_1\"}, \"xmyval1\"},\n\t\t{[]string{\"x${MY_PARAM_1}x\"}, \"xmyval1x\"},\n\t\t{[]string{\"$MISSING\", \"$MY_PARAM_1\"}, \"myval1\"},\n\t\t{[]string{\"$MY_PARAM_1\", \"$MY_PARAM_2\"}, \"myval1\"},\n\t\t{[]string{\"$MISSING\"}, \"null\"},\n\t\t{[]string{\"$MY_PARAM_1/$MY_PARAM_2\"}, \"myval1/myval2\"},\n\t\t{[]string{\"$MY_PARAM_2/$MISSING\"}, \"null\"},\n\t}\n\n\tfor _, tc := range tests {\n\t\tfunc() {\n\t\t\ts := DiskIO{\n\t\t\t\tNameTemplates: tc.templates,\n\t\t\t}\n\t\t\tdefer setupNullDisk(t, &s, \"null\")() //nolint:revive // done on purpose, cleaning will be executed properly\n\t\t\tname, _ := s.diskName(\"null\")\n\t\t\trequire.Equal(t, tc.expected, name, \"Templates: %#v\", tc.templates)\n\t\t}()\n\t}\n}", "func pySafeArg(anm string, idx int) string {\n\tif anm == \"\" {\n\t\tanm = fmt.Sprintf(\"arg_%d\", idx)\n\t}\n\treturn pySafeName(anm)\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func TestAliasingRecursionInvalid(t *testing.T) {\n\t_, errs := PrototypeString(`alias x = x\n\t\tx`)\n\tgoutil.AssertNow(t, errs != nil, \"errs should not be nil\")\n}", "func getPackageName(f string) string {\n\tfor {\n\t\tlastPeriod := strings.LastIndex(f, \".\")\n\t\tlastSlash := strings.LastIndex(f, \"/\")\n\t\tif lastPeriod > lastSlash {\n\t\t\tf = f[:lastPeriod]\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn f\n}", "func getFunctionName(fn interface{}) string {\n\tname := runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()\n\n\t// Method above returns functions in the form : main.foo\n\tparts := strings.Split(name, \".\")\n\treturn parts[len(parts)-1]\n}", "func cleanUserName(userName string) string {\n\tuserName = strings.Replace(userName, \"-\", \"\", -1)\n\tuserName = strings.Replace(userName, \".\", \"\", -1)\n\tuserName = strings.Replace(userName, \"_\", \"\", -1)\n\treturn strings.ToLower(userName)\n}", "func CheckIDFormat(ComponentID string) bool {\n if len(ComponentID) != 9 {\n // check the length of the ComponentID is nine\n return false\n } else if _, err := strconv.Atoi(ComponentID); err != nil {\n // check the ComponentID are all digits\n return false\n } else {\n // now everything looks fine\n return true\n }\n}", "func getSinglePath(v interface{}) (string, error) {\n\tif name, err := resourceName(v); err != nil {\n\t\treturn \"\", err\n\t} else if id, err := resourceId(v); err != nil {\n\t\treturn \"\", err\n\t} else {\n\t\treturn fmt.Sprintf(\"%s(%d)\", name, id), nil\n\t}\n}", "func getUserIdString(id string) (uid string) {\r\n\tif id == \"~\" || id == \"\" {\r\n\t\treturn \"~\" // me\r\n\t} else if strings.Contains(id, \"http\") {\r\n\t\treturn \"url=\" + url.QueryEscape(id) // someone else\r\n\t} else {\r\n\t\treturn \"id=\" + id // someone else's url\r\n\t}\r\n}", "func OldGetAnnotation(c, name string) string {\n\tprefix := fmt.Sprintf(\"+%s:\", name)\n\tif strings.HasPrefix(c, prefix) {\n\t\treturn strings.TrimPrefix(c, prefix)\n\t}\n\treturn \"\"\n}", "func TestSanitizedName(t *testing.T) {\n\ttables := []struct {\n\t\tbadPath string\n\t\tgoodPath string\n\t}{\n\t\t{\"\\\\..\\\\1.txt\", \"1.txt\"},\n\t\t{\"///foo/bar\", \"foo/bar\"},\n\t\t{\"C:/loo/bar2\", \"loo/bar2\"},\n\t\t{\"C:\\\\loo\\\\bar2\", \"loo\\\\bar2\"},\n\t\t{\"../../foo../../ba..r\", \"foo../ba..r\"},\n\t\t{\"../my.file\", \"my.file\"},\n\t}\n\tfor _, table := range tables {\n\t\tfixedPath := sanitizedName(table.badPath)\n\t\tif fixedPath != table.goodPath {\n\t\t\tt.Errorf(\"expected and fixedPath didn't match - %s : %s\", table.goodPath, fixedPath)\n\t\t}\n\t}\n}", "func TestPrewriteMultiple4A(t *testing.T) {\n}", "func getReqNameId(reqIIdList []cres.IID, driverNameId string) string {\n\tfor _, iid := range reqIIdList {\n\t\tif iid.SystemId == driverNameId {\n\t\t\treturn iid.NameId\n\t\t}\n\t}\n\treturn \"\"\n}", "func getAbsoluteURL(item *string, original_item string, url *url.URL) {\n var domain string = strings.Join(strings.Split(url.String(), \"/\")[:3], \"/\")\n if (strings.HasPrefix(*item, \"/\")) {\n if (strings.HasSuffix(url.String(), \"/\")) {\n *item = domain + (*item)[1:]\n } else {\n *item = domain + *item\n }\n utils.Log.Printf(\"[*] Modified item for URL for %s. Transformed from %s to %s\\n\", url, original_item, *item)\n }\n\n if (strings.HasPrefix(url.String(), \" \")) {\n *item = (*item)[1:]\n utils.Log.Printf(\"[*] Modified %s. Removed space from %s on %s\\n\", *item, original_item, url)\n }\n\n\n}", "func TestSimpleParser_baseUrl_err(t *testing.T) {\n\tif baseUrl(\"1234\") != \"1234\" {\n\t\tt.Logf(\"baseUrl method is expected to return original link on error\")\n\t\tt.FailNow()\n\t}\n}", "func notTested() string {\n\treturn \"This function isn't tested!\"\n}", "func asSupportedParameter(param string) (string, bool) {\n\tlower := strings.ToLower(param)\n\treturn lower, lowerCaseParameters[lower]\n}", "func LegacyOrigin(parts ...string) (ret string) {\n\tfor index, i := range parts {\n\t\tret += i\n\t\tif index < len(parts)-1 {\n\t\t\tret += LegacyOriginSeparator\n\t\t}\n\t}\n\treturn\n}", "func getUID(lib utils.PathIdentifier) string {\n\treturn lib.Key()[:5]\n}", "func getFullName()(string, string) {\n\treturn \"Ninja\", \"Coder\"\n}", "func generateUUID() string {\n uuid4, _ := uuid.NewV4()\n return uuid4.String()\n}", "func shadowedByParam2() (math string, fmt int) { return }", "func getInternalMountPath(workingMountDir string, vol *smbVolume) string {\n\tif vol == nil {\n\t\treturn \"\"\n\t}\n\tmountDir := vol.uuid\n\tif vol.uuid == \"\" {\n\t\tmountDir = vol.subDir\n\t}\n\treturn filepath.Join(workingMountDir, mountDir)\n}", "func wrapClientID(clientID string) string {\n\thostname, err := os.Hostname()\n\tif err != nil {\n\t\thostname = \"<error>\"\n\t}\n\n\t// Replace all non-alphanumeric chars with something benign that will work in the client id.\n\tre := regexp.MustCompile(\"[^a-zA-Z0-9]+\")\n\thostname = re.ReplaceAllString(hostname, \"-\")\n\n\t// Special case for running locally, add random\n\tif runtime.GOOS == \"darwin\" {\n\t\thostname += strconv.Itoa(rand.Intn(100))\n\t\treturn fmt.Sprintf(\"%s-%s\", clientID, hostname)\n\t}\n\treturn fmt.Sprintf(\"%s-%s\", clientID, hostname)\n}", "func getShorterString(a string, b string) int {\n\tif len(a) <= len(b) {\n\t\treturn len(a)\n\t}\n\treturn len(b)\n}", "func callerShortfile(file string, lastsep_ ...rune) string {\n\tlastsep := '/'\n\tif len(lastsep_) > 0 {\n\t\tlastsep = lastsep_[0]\n\t}\n\tshort := file\n\tfor i := len(file) - 1; i > 0; i-- {\n\t\tif file[i] == byte(lastsep) {\n\t\t\tshort = file[i+1:]\n\t\t\tbreak\n\t\t}\n\t}\n\treturn short\n}", "func unqualify(importPath string) string {\n\tif i := strings.LastIndex(importPath, sep); i != -1 {\n\t\timportPath = importPath[i+len(sep):]\n\t}\n\treturn importPath\n}", "func Test_HasPrefix(t *testing.T) {\n\tvalue := \"main.go\"\n\tprefix := \"main\"\n\tif !strings.HasPrefix(value, prefix) {\n\t\tt.Fatalf(\"expected %s to have prefix %s\", value, prefix)\n\t}\n}", "func cleancompstr(cleanup string) string {\n\tcleanup = strings.TrimSpace(cleanup)\n\tcleanup = strings.ToLower(cleanup)\n\treturn cleanup\n}", "func badTemper(string, string) (*os.File, error) {\n\treturn nil, fmt.Errorf(\"oups\")\n}", "func (d *Abstraction) getGeneratedName(s string, m string) string {\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(s)\n\tbuffer.WriteString(\".\")\n\tbuffer.WriteString(m)\n\treturn buffer.String()\n}", "func helper(k string) interface{} {\n\treturn k\n}", "func getUsername() string {\n\tlog.Debug(\"getUsername\")\n\tu := \"unknown\"\n\tosUser := \"\"\n\n\tswitch runtime.GOOS {\n\tcase \"darwin\", \"linux\", \"solaris\":\n\t\tosUser = os.Getenv(\"USER\")\n\tcase \"windows\":\n\t\tosUser = os.Getenv(\"USERNAME\")\n\n\t\t// remove domain\n\t\tosUser = osUser[strings.LastIndex(osUser, \"\\\\\")+1:]\n\t\tlog.Debugf(\"Windows user has been transformed into %s\", osUser)\n\n\t\t// HACK ugly ... if localized administrator, translate to administrator\n\t\tif isWinAdministrator(osUser) {\n\t\t\tosUser = \"Administrator\"\n\t\t}\n\t}\n\n\tif osUser != \"\" {\n\t\tu = osUser\n\t}\n\treturn u\n}", "func getCaller(skip int, shortFileName bool) string {\n\tvar b strings.Builder\n\t_, file, no, ok := runtime.Caller(skip)\n\tif ok {\n\t\tif shortFileName {\n\t\t\tif lastSlashIndex := strings.LastIndex(file, \"/\"); lastSlashIndex != -1 {\n\t\t\t\tfile = file[lastSlashIndex+1:]\n\t\t\t}\n\t\t}\n\t\tfmt.Fprintf(&b, \"%s:%d\", file, no)\n\t}\n\treturn b.String()\n}", "func ensureTrailingDot(details string) string {\n\tif !strings.HasSuffix(details, \".\") {\n\t\treturn fmt.Sprintf(\"%s.\", details)\n\t}\n\treturn details\n}", "func isBadVersion(version int) bool{\n\treturn true\n}", "func TestGetWrongUUID(t *testing.T) {\n\tclearTable()\n nt := New{{.NameExported}}()\n add{{.NameExported}}(nt)\n badUid := \"00000000-d01d-4c09-a4e7-59026d143b89\"\n\n\tstatement := fmt.Sprintf({{.NameExported}}URL, badUid)\n\n\treq, _ := http.NewRequest(\"GET\", statement, nil)\n\tresponse := executeRequest(req)\n\n\tcheckResponseCode(t, http.StatusNotFound, response.Code)\n}", "func LegacyInstanceObjectID(obj *ResourceInstanceObjectSrc) string {\n\tif obj == nil {\n\t\treturn \"<not created>\"\n\t}\n\n\tif obj.AttrsJSON != nil {\n\t\ttype WithID struct {\n\t\t\tID string `json:\"id\"`\n\t\t}\n\t\tvar withID WithID\n\t\terr := json.Unmarshal(obj.AttrsJSON, &withID)\n\t\tif err == nil {\n\t\t\treturn withID.ID\n\t\t}\n\t} else if obj.AttrsFlat != nil {\n\t\tif flatID, exists := obj.AttrsFlat[\"id\"]; exists {\n\t\t\treturn flatID\n\t\t}\n\t}\n\n\t// For resource types created after we removed id as special there may\n\t// not actually be one at all. This is okay because older tests won't\n\t// encounter this, and new tests shouldn't be using ids.\n\treturn \"<none>\"\n}", "func getErrOrigin() string {\n\tvar origin string\n\tif pc, file, line, ok := runtime.Caller(2); ok {\n\t\tif f := runtime.FuncForPC(pc); f != nil {\n\t\t\tif wd, err := os.Getwd(); err == nil {\n\t\t\t\torigin = fmt.Sprintf(\"%s %s:%d\", strings.TrimPrefix(f.Name(), pkgPath), strings.TrimPrefix(file, wd+string(os.PathSeparator)), line)\n\t\t\t}\n\t\t}\n\t}\n\treturn origin\n}", "func (objectIDs *DbObjectIDs) getUniqueID() (string, error) {\n\tid := objectIDs.ownerControllerName + \":\" + string(objectIDs.idsType.ownerObjectType)\n\tfor _, key := range objectIDs.idsType.GetExternalIDKeys() {\n\t\tvalue, ok := objectIDs.objectIDs[key]\n\t\tif !ok {\n\t\t\treturn \"\", fmt.Errorf(\"key %v is required but not present\", key)\n\t\t}\n\t\tid += \":\" + value\n\t}\n\treturn id, nil\n}", "func getCallPriorityID(strPriorityName string, espXmlmc *apiLib.XmlmcInstStruct, buffer *bytes.Buffer) (string, string) {\n\tpriorityID := \"\"\n\tif swImportConf.PriorityMapping[strPriorityName] != nil {\n\t\tstrPriorityName = fmt.Sprintf(\"%s\", swImportConf.PriorityMapping[strPriorityName])\n\t\tif strPriorityName != \"\" {\n\t\t\tpriorityID = getPriorityID(strPriorityName, espXmlmc, buffer)\n\t\t}\n\t}\n\treturn priorityID, strPriorityName\n}" ]
[ "0.5438719", "0.53733355", "0.5214762", "0.5027546", "0.49755836", "0.4947667", "0.48769575", "0.4803138", "0.47857717", "0.476706", "0.47616217", "0.47356617", "0.47237533", "0.4704707", "0.47020322", "0.46901146", "0.46885872", "0.46885788", "0.46649733", "0.46646145", "0.46595824", "0.4656375", "0.4652162", "0.46505806", "0.46505246", "0.46299964", "0.46293032", "0.46289325", "0.46287394", "0.46271962", "0.46260753", "0.46255302", "0.46228078", "0.4619368", "0.46131307", "0.46051222", "0.4603788", "0.4602976", "0.45996636", "0.45993793", "0.45944053", "0.45941105", "0.45930198", "0.45876405", "0.4585995", "0.45853367", "0.4576631", "0.45696688", "0.45610008", "0.4558917", "0.4555995", "0.4540337", "0.45394897", "0.45380422", "0.4533621", "0.45333973", "0.45322233", "0.45312214", "0.4527866", "0.4527866", "0.4527866", "0.4527866", "0.45220888", "0.45204678", "0.45176497", "0.451681", "0.45151135", "0.4513793", "0.450847", "0.4499973", "0.44994882", "0.4498088", "0.44971386", "0.44940624", "0.4491297", "0.4484903", "0.44816214", "0.44815457", "0.44810754", "0.4479096", "0.4477338", "0.44709912", "0.4470735", "0.4470475", "0.4460952", "0.44576898", "0.44525933", "0.44512793", "0.44495633", "0.4448962", "0.44488317", "0.44462538", "0.44443983", "0.4438881", "0.44360772", "0.44292986", "0.44289258", "0.44285437", "0.4427395", "0.44254258", "0.44246277" ]
0.0
-1
You should always use this function to get a new ListStaticRoutesParams instance, as then you are sure you have configured all required params
func (s *VPCService) NewListStaticRoutesParams() *ListStaticRoutesParams { p := &ListStaticRoutesParams{} p.p = make(map[string]interface{}) return p }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t}\n}", "func InitRoutes(listRouter *mux.Router) {\n\t// ---- List Creation ---- //\n\tlistRouter.HandleFunc(\"\", ListCreateHandler).Methods(\"POST\")\n\tlistRouter.HandleFunc(\"/\", ListCreateHandler).Methods(\"POST\")\n\t// ---- List Deletion ---- //\n\tlistRouter.HandleFunc(\"/{listId}\", ListDeleteHandler).Methods(\"DELETE\")\n\tlistRouter.HandleFunc(\"/{listId}/\", ListDeleteHandler).Methods(\"DELETE\")\n\t// ---- List View ---- //\n\tlistRouter.HandleFunc(\"/{listId}\", ListViewHandler).Methods(\"GET\")\n\tlistRouter.HandleFunc(\"/{listId}/\", ListViewHandler).Methods(\"GET\")\n\t// ---- List Update ---- //\n\tlistRouter.HandleFunc(\"/{listId}\", ListUpdateHandler).Methods(\"PATCH\")\n\tlistRouter.HandleFunc(\"/{listId}/\", ListUpdateHandler).Methods(\"PATCH\")\n}", "func NewStaticRouter() *StaticRouter {\n router := new(StaticRouter)\n\n return router\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules,\n\tmoneyMarkets MoneyMarkets, checkLtvIndexCount int) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t\tMoneyMarkets: moneyMarkets,\n\t\tCheckLtvIndexCount: checkLtvIndexCount,\n\t}\n}", "func NewListParams() *ListParams {\n\tvar ()\n\treturn &ListParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *VPCService) NewCreateStaticRouteParams(cidr string, gatewayid string) *CreateStaticRouteParams {\n\tp := &CreateStaticRouteParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"cidr\"] = cidr\n\tp.p[\"gatewayid\"] = gatewayid\n\treturn p\n}", "func StaticIPAMRoutes() *StaticIPAMRoutesApplyConfiguration {\n\treturn &StaticIPAMRoutesApplyConfiguration{}\n}", "func (m *MockRouterServiceIface) NewListRoutersParams() *ListRoutersParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListRoutersParams\")\n\tret0, _ := ret[0].(*ListRoutersParams)\n\treturn ret0\n}", "func (s *VPCService) NewDeleteStaticRouteParams(id string) *DeleteStaticRouteParams {\n\tp := &DeleteStaticRouteParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewStatic() filters.Spec { return &static{} }", "func NewStatic() filters.Spec { return &static{} }", "func NewParams(defaultSendEnabled bool) Params {\n\treturn Params{\n\t\tSendEnabled: nil,\n\t\tDefaultSendEnabled: defaultSendEnabled,\n\t}\n}", "func NewListScansParams() *ListScansParams {\n\tvar (\n\t\tmaxItemsDefault = int64(100)\n\t\toffsetDefault = int64(0)\n\t\torderByDefault = string(\"created_at\")\n\t\torderDirectionDefault = string(\"desc\")\n\t)\n\treturn &ListScansParams{\n\t\tMaxItems: &maxItemsDefault,\n\t\tOffset: &offsetDefault,\n\t\tOrderBy: &orderByDefault,\n\t\tOrderDirection: &orderDirectionDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func GetParams(c context.Context, r *http.Request) RouteParams {\n\tif val, ok := c.Get(r, context.BaseCtxKey(\"params\")); ok {\n\t\treturn val.(RouteParams)\n\t}\n\n\treturn RouteParams{}\n}", "func NewListScansParamsWithHTTPClient(client *http.Client) *ListScansParams {\n\tvar (\n\t\tmaxItemsDefault = int64(100)\n\t\toffsetDefault = int64(0)\n\t\torderByDefault = string(\"created_at\")\n\t\torderDirectionDefault = string(\"desc\")\n\t)\n\treturn &ListScansParams{\n\t\tMaxItems: &maxItemsDefault,\n\t\tOffset: &offsetDefault,\n\t\tOrderBy: &orderByDefault,\n\t\tOrderDirection: &orderDirectionDefault,\n\t\tHTTPClient: client,\n\t}\n}", "func Params(r *http.Request) map[string]string {\n\tpreviousPathOffset, ok :=\n\t\tr.Context().Value(previousPathOffsetContextKey).(int)\n\tif !ok {\n\t\tpreviousPathOffset = 0\n\t}\n\troutePath, ok := r.Context().Value(pathContextKey).(string)\n\tif !ok {\n\t\troutePath = \"/\"\n\t}\n\trequestPathComponents :=\n\t\tstrings.Split(r.URL.Path[1:], \"/\")[previousPathOffset:]\n\troutePathComponents := strings.Split(routePath[1:], \"/\")\n\n\tresult := make(map[string]string)\n\tfor i := 0; i < len(routePathComponents); i++ {\n\t\tif routePathComponents[i][0] == ':' {\n\t\t\tresult[routePathComponents[i][1:]] = requestPathComponents[i]\n\t\t}\n\t}\n\n\treturn result\n}", "func NewRoutes(cfg *config.Config, db *gorm.DB) *Routes {\n\tvar (\n\t\tuserService = userservices.NewService(db)\n\t\tauthService = authservices.NewService(db, userService)\n\t\tstudentService = studentservices.NewService(db)\n\n\t\tstaticHandler = static.NewHandler(cfg)\n\t\tauthHandler = auth.NewHandler(cfg, authService)\n\t\tuserHandler = user.NewHandler(cfg, userService)\n\t\tstudentHandler = student.NewHandler(cfg, studentService)\n\n\t\tr = &Routes{\n\t\t\tTemplateRoutes: []Route{\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"/\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: staticHandler.Index,\n\t\t\t\t\trequiresAuth: false,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAPIRoutes: []Route{\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"auth/checkAuthentication/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: authHandler.CheckAuth,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"auth/login/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: authHandler.Login,\n\t\t\t\t\trequiresAuth: false,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"auth/logout/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: authHandler.Logout,\n\t\t\t\t\trequiresAuth: false,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/findAll/\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: userHandler.FindAllAvailable,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/findById/{id:[0-9]+}\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: userHandler.FindByID,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/findByUsername/{username:[0-9a-zA-Z]+}\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: userHandler.FindByUsername,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/edit/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: userHandler.Edit,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/create/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: userHandler.Create,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/changePassword/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: userHandler.ChangePassword,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/delete/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: userHandler.Delete,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/profile/\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: userHandler.GetProfileForCurrentUser,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/current/changePassword/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: userHandler.ChangePasswordForCurrentUser,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/current/changeEmail/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: userHandler.ChangeEmailForCurrentUser,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/current/changeFullName/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: userHandler.ChangeFullNameForCurrentUser,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"user/current/privileges/\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: userHandler.GetPrivilegesForCurrentUser,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"student/findAll/\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: studentHandler.FindAllAvailable,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"student/findById/{id:[0-9]+}\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: studentHandler.FindByID,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"student/edit/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: studentHandler.Edit,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"student/create/\",\n\t\t\t\t\tmethod: \"POST\",\n\t\t\t\t\thandlerFunc: studentHandler.Create,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t\t&route{\n\t\t\t\t\tpattern: \"student/findByIdNumber/{idNumber:[0-9A-Za-z-]+}\",\n\t\t\t\t\tmethod: \"GET\",\n\t\t\t\t\thandlerFunc: studentHandler.FindByIDNumber,\n\t\t\t\t\trequiresAuth: true,\n\t\t\t\t\trequiredRoles: []string{\"ADMIN\"},\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t)\n\n\treturn r\n}", "func mustMakePubliclyViewableParams(fsc *frontendServerConfig) publicparams.Matcher {\n\tvar publiclyViewableParams publicparams.Matcher\n\tvar err error\n\n\t// Load the publiclyViewable params if configured and disable querying for issues.\n\tif len(fsc.PubliclyAllowableParams) > 0 {\n\t\tif publiclyViewableParams, err = publicparams.MatcherFromRules(fsc.PubliclyAllowableParams); err != nil {\n\t\t\tsklog.Fatalf(\"Could not load list of public params: %s\", err)\n\t\t}\n\t}\n\n\t// Check if this is public instance. If so, make sure we have a non-nil Matcher.\n\tif fsc.IsPublicView && publiclyViewableParams == nil {\n\t\tsklog.Fatal(\"A non-empty map of publiclyViewableParams must be provided if is public view.\")\n\t}\n\n\treturn publiclyViewableParams\n}", "func NewParams(acl ACL, daoOwner sdk.Address) Params {\n\treturn Params{\n\t\tACL: acl,\n\t\tDAOOwner: daoOwner,\n\t}\n}", "func NewParams() *Params {\n\treturn new(Params)\n}", "func (m *MockLoadBalancerServiceIface) NewListGlobalLoadBalancerRulesParams() *ListGlobalLoadBalancerRulesParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListGlobalLoadBalancerRulesParams\")\n\tret0, _ := ret[0].(*ListGlobalLoadBalancerRulesParams)\n\treturn ret0\n}", "func (r PatternedRoute) Params() map[string]interface{} {\n\tpv := make(map[string]interface{})\n\n\tparamNames := r.ParamNames()\n\tfor i, v := range r.ParamValues() {\n\t\tpv[paramNames[i]] = v\n\t\tif n, err := strconv.Atoi(v.(string)); err == nil {\n\t\t\tpv[paramNames[i]] = n\n\t\t}\n\t}\n\treturn pv\n}", "func newRoutes(service ServiceInterface) []routes.Route {\n\treturn []routes.Route{\n\t\troutes.Route{\n\t\t\tName: \"health_check\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/v1/health\",\n\t\t\tHandlerFunc: service.healthcheck,\n\t\t},\n\t}\n}", "func (s *Server) createRoutes() {\n\tvar routes = util.Routes{\n\t\tutil.Route{\n\t\t\tName: \"pong\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/\",\n\t\t\tHandlerFunc: s.pong(),\n\t\t},\n\t\tutil.Route{\n\t\t\tName: \"healthz\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/healthz\",\n\t\t\tHandlerFunc: util.Healthz(),\n\t\t},\n\t\tutil.Route{\n\t\t\tName: \"getAllItems\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/items\",\n\t\t\tHandlerFunc: s.getAllItems(),\n\t\t},\n\t\tutil.Route{\n\t\t\tName: \"setItemsPOST\",\n\t\t\tMethod: \"POST\",\n\t\t\tPattern: \"/items\",\n\t\t\tHandlerFunc: s.setItem(false),\n\t\t},\n\t\tutil.Route{\n\t\t\tName: \"setItemsPUT\",\n\t\t\tMethod: \"PUT\",\n\t\t\tPattern: \"/items\",\n\t\t\tHandlerFunc: s.setItem(true),\n\t\t},\n\t\tutil.Route{\n\t\t\tName: \"getItem\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/items/{id:[a-zA-Z0-9]+}\",\n\t\t\tHandlerFunc: s.getItem(),\n\t\t},\n\t\tutil.Route{\n\t\t\tName: \"delItem\",\n\t\t\tMethod: \"DELETE\",\n\t\t\tPattern: \"/items/{id:[a-zA-Z0-9]+}\",\n\t\t\tHandlerFunc: s.delItem(),\n\t\t},\n\t\tutil.Route{\n\t\t\tName: \"delay\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/delay\",\n\t\t\tHandlerFunc: s.delay(),\n\t\t},\n\t\tutil.Route{\n\t\t\tName: \"simulateError\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/error\",\n\t\t\tHandlerFunc: s.simulateError(),\n\t\t},\n\t}\n\n\tfor _, route := range routes {\n\t\th := route.HandlerFunc\n\n\t\t// Tracing each request\n\t\th = util.TracerMiddleware(h, route)\n\n\t\t// Logging each request\n\t\th = util.LoggerMiddleware(h, s.logger)\n\n\t\t// Assign requestID to each request\n\t\th = util.AssignRequestID(h, s.logger)\n\n\t\t// Monitoring each request\n\t\t// TODO: pass proper handler\n\t\tpromHandler := util.PrometheusMiddleware(h, route.Pattern, rm)\n\n\t\ts.router.\n\t\t\tMethods(route.Method).\n\t\t\tPath(route.Pattern).\n\t\t\tName(route.Name).\n\t\t\tHandler(promHandler)\n\t}\n\n\t// Prometheus endpoint\n\troute := util.Route{\n\t\tName: \"metrics\",\n\t\tMethod: \"GET\",\n\t\tPattern: \"/metrics\",\n\t\tHandlerFunc: nil,\n\t}\n\n\tpromHandler := promhttp.HandlerFor(s.promReg, promhttp.HandlerOpts{})\n\tpromHandler = promhttp.InstrumentMetricHandler(s.promReg, promHandler)\n\ts.router.\n\t\tMethods(route.Method).\n\t\tPath(route.Pattern).\n\t\tName(route.Name).\n\t\tHandler(promHandler)\n\n\t// 404 handler\n\tnotFound := util.PrometheusMiddleware(s.notFound(), \"metrics\", rm)\n\ts.router.NotFoundHandler = notFound\n}", "func NewRoutes(factory *api.HandlerFactory, config *config.Config, dal *dal.DAL, scanner *provider.Scanner, providers []provider.Provider) Routes {\n\troutes := make(map[string]http.HandlerFunc)\n\n\troutes[\"/subsonic/rest/ping\"] = factory.PublishHandler(handler.NewPingHandler())\n\troutes[\"/subsonic/rest/getlicense\"] = factory.PublishHandler(handler.NewGetLicenseHandler())\n\n\t// Scanning\n\troutes[\"/subsonic/rest/getscanstatus\"] = factory.PublishHandler(handler.NewGetScanStatusHandler(scanner))\n\troutes[\"/subsonic/rest/startscan\"] = factory.PublishHandler(handler.NewStartScanHandler(scanner))\n\n\t// Querying\n\troutes[\"/subsonic/rest/getalbumlist2\"] = factory.PublishHandler(handler.NewGetAlbumList2Handler(dal))\n\troutes[\"/subsonic/rest/getartists\"] = factory.PublishHandler(handler.NewGetArtistsHandler(dal, config))\n\troutes[\"/subsonic/rest/getindexes\"] = factory.PublishHandler(handler.NewGetIndexesHandler(dal, config))\n\troutes[\"/subsonic/rest/getartist\"] = factory.PublishHandler(handler.NewGetArtistHandler(dal))\n\troutes[\"/subsonic/rest/getalbum\"] = factory.PublishHandler(handler.NewGetAlbumHandler(dal))\n\troutes[\"/subsonic/rest/getsong\"] = factory.PublishHandler(handler.NewGetSongHandler(dal))\n\troutes[\"/subsonic/rest/getrandomsongs\"] = factory.PublishHandler(handler.NewGetRandomSongsHandler(dal))\n\troutes[\"/subsonic/rest/getmusicfolders\"] = factory.PublishHandler(handler.NewGetMusicFoldersHandler(providers))\n\troutes[\"/subsonic/rest/getmusicdirectory\"] = factory.PublishHandler(handler.NewGetMusicDirectoryHandler(dal))\n\troutes[\"/subsonic/rest/getgenres\"] = factory.PublishHandler(handler.NewGetGenresHandler(dal))\n\troutes[\"/subsonic/rest/getsongsbygenre\"] = factory.PublishHandler(handler.NewGetSongsByGenreHandler(dal))\n\troutes[\"/subsonic/rest/search2\"] = factory.PublishHandler(handler.NewSearchHandler(dal, handler.Search2))\n\troutes[\"/subsonic/rest/search3\"] = factory.PublishHandler(handler.NewSearchHandler(dal, handler.Search3))\n\n\t// Users\n\troutes[\"/subsonic/rest/getusers\"] = factory.PublishHandler(handler.NewGetUsersHandler(config))\n\troutes[\"/subsonic/rest/getuser\"] = factory.PublishHandler(handler.NewGetUserHandler(config))\n\n\t// Data\n\troutes[\"/subsonic/rest/getcoverart\"] = factory.PublishBinaryHandler(handler.NewGetCoverArtHandler(dal))\n\troutes[\"/subsonic/rest/stream\"] = factory.PublishBinaryHandler(handler.NewStreamHandler(dal))\n\troutes[\"/subsonic/rest/download\"] = factory.PublishBinaryHandler(handler.NewDownloadHandler(dal))\n\n\t// Playlists\n\troutes[\"/subsonic/rest/createplaylist\"] = factory.PublishHandler(handler.NewCreatePlaylistHandler(dal))\n\troutes[\"/subsonic/rest/getplaylists\"] = factory.PublishHandler(handler.NewGetPlaylistsHandler(dal))\n\troutes[\"/subsonic/rest/getplaylist\"] = factory.PublishHandler(handler.NewGetPlaylistHandler(dal))\n\troutes[\"/subsonic/rest/deleteplaylist\"] = factory.PublishHandler(handler.NewDeletePlaylistHandler(dal))\n\troutes[\"/subsonic/rest/updateplaylist\"] = factory.PublishHandler(handler.NewUpdatePlaylistHandler(dal))\n\n\troutes[\"/subsonic/rest/star\"] = factory.PublishHandler(handler.NewStarHandler(dal, true))\n\troutes[\"/subsonic/rest/unstar\"] = factory.PublishHandler(handler.NewStarHandler(dal, false))\n\n\treturn routes\n}", "func NewParamList(m map[string]interface{}) (*ParamList, error) {\n\tol := newOptionLoader(m)\n\n\tpl := &ParamList{\n\t\tapp: ol.LoadApp(),\n\t\tmoduleName: ol.LoadOptionalString(OptionModule),\n\t\tcomponentName: ol.LoadOptionalString(OptionComponentName),\n\t\tenvName: ol.LoadOptionalString(OptionEnvName),\n\n\t\tout: os.Stdout,\n\t\tfindModulesFn: component.ModulesFromEnv,\n\t\tfindModuleFn: component.GetModule,\n\t\tfindComponentFn: component.LocateComponent,\n\t}\n\n\tif ol.err != nil {\n\t\treturn nil, ol.err\n\t}\n\n\treturn pl, nil\n}", "func (m *MockRouterServiceIface) NewListVirtualRouterElementsParams() *ListVirtualRouterElementsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListVirtualRouterElementsParams\")\n\tret0, _ := ret[0].(*ListVirtualRouterElementsParams)\n\treturn ret0\n}", "func NewRoutes(p RoutesParams) *Routes {\n\treturn &Routes{\n\t\tlogger: p.Logger,\n\t\tcontroller: p.UserController,\n\t}\n}", "func NewParams() Params {\n\treturn &headerParams{\n\t\tparams: make(map[string]MaybeString),\n\t\tparamOrder: []string{},\n\t}\n}", "func (r *mdRouter) initRoutes() {\n\tr.routes = []router.Route{\n\t\t// GET\n\t\trouter.NewGetRoute(\"/{path:.*}\", r.getMetadataOperation),\n\t\t// POST\n\t\trouter.NewPostRoute(\"/{path:.*}\", r.postMetadataOperation),\n\t\t// PUT\n\t\trouter.NewPostRoute(\"/{path:.*}\", r.putMetadataOperation),\n\t\t// DELETE\n\t\trouter.NewDeleteRoute(\"/{path:.*}\", r.deleteMetadataOperation),\n\t}\n}", "func NewParams() (Params, error) {\n\treturn Params{\n\t\tBaseParams: codec.BaseParams{\n\t\t\tKeyFrameInterval: 60,\n\t\t},\n\t}, nil\n}", "func NewController_dev_Params_List(s *capnp.Segment, sz int32) (Controller_dev_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn capnp.StructList[Controller_dev_Params](l), err\n}", "func (s *VPCService) ListStaticRoutes(p *ListStaticRoutesParams) (*ListStaticRoutesResponse, error) {\n\tresp, err := s.cs.newRequest(\"listStaticRoutes\", p.toURLValues())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar r ListStaticRoutesResponse\n\tif err := json.Unmarshal(resp, &r); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &r, nil\n}", "func (b *RouteBuilder) Params(parameters ...*Parameter) *RouteBuilder {\n\tif b.parameters == nil {\n\t\tb.parameters = []*Parameter{}\n\t}\n\tb.parameters = append(b.parameters, parameters...)\n\treturn b\n}", "func (Itfparams) ApiRoutes() []string {\n\treturn []string{\n\t\t\"/api/objects/itfparams/bridge_port/\",\n\t\t\"/api/objects/itfparams/bridge_port/{ref}\",\n\t\t\"/api/objects/itfparams/bridge_port/{ref}/usedby\",\n\t\t\"/api/objects/itfparams/group/\",\n\t\t\"/api/objects/itfparams/group/{ref}\",\n\t\t\"/api/objects/itfparams/group/{ref}/usedby\",\n\t\t\"/api/objects/itfparams/link_aggregation_group/\",\n\t\t\"/api/objects/itfparams/link_aggregation_group/{ref}\",\n\t\t\"/api/objects/itfparams/link_aggregation_group/{ref}/usedby\",\n\t\t\"/api/objects/itfparams/primary/\",\n\t\t\"/api/objects/itfparams/primary/{ref}\",\n\t\t\"/api/objects/itfparams/primary/{ref}/usedby\",\n\t\t\"/api/objects/itfparams/secondary/\",\n\t\t\"/api/objects/itfparams/secondary/{ref}\",\n\t\t\"/api/objects/itfparams/secondary/{ref}/usedby\",\n\t}\n}", "func NewLineRouteParams() *LineRouteParams {\n\tvar ()\n\treturn &LineRouteParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewParams() *Parameters {\n\treturn &Parameters{\n\t\tTokenType: \"transit\",\n\t\tTLSMode: 1,\n\t\tLeaderOnly: true,\n\t\tConnectTimeout: defaultConnectTimeout,\n\t\tReadTimeout: defaultReadTimeout,\n\t\tRetryCount: defaultRetries,\n\t\tRequireType: \"master\",\n\t}\n}", "func initializeRoutes(enableAuth bool, tokenURL string, tracer opentracing.Tracer) *Routes {\n\tengine := gin.New()\n\tengine.Use(gin.Recovery())\n\troutes := &Routes{Engine: engine}\n\n\troutes.AddOrUpdateConfigItem.RouterGroup = routes.Group(\"/\")\n\troutes.AddOrUpdateConfigItem.RouterGroup.Use(middleware.LogrusLogger())\n\tif tracer != nil {\n\t\troutes.AddOrUpdateConfigItem.RouterGroup.Use(tracing.InitSpan(tracer, \"add_or_update_config_item\"))\n\t}\n\troutes.AddOrUpdateConfigItem.RouterGroup.Use(middleware.ContentTypes(\"application/json\"))\n\tif enableAuth {\n\n\t\trouteTokenURL := tokenURL\n\t\tif routeTokenURL == \"\" {\n\t\t\trouteTokenURL = \"https://info.services.auth.zalando.com/oauth2/tokeninfo\"\n\t\t}\n\t\troutes.AddOrUpdateConfigItem.Auth = ginoauth2.Auth(\n\t\t\tmiddleware.ScopesAuth(\"uid\"),\n\t\t\toauth2.Endpoint{\n\t\t\t\tTokenURL: routeTokenURL,\n\t\t\t},\n\t\t)\n\n\t}\n\n\troutes.CreateCluster.RouterGroup = routes.Group(\"/\")\n\troutes.CreateCluster.RouterGroup.Use(middleware.LogrusLogger())\n\tif tracer != nil {\n\t\troutes.CreateCluster.RouterGroup.Use(tracing.InitSpan(tracer, \"create_cluster\"))\n\t}\n\troutes.CreateCluster.RouterGroup.Use(middleware.ContentTypes(\"application/json\"))\n\tif enableAuth {\n\n\t\trouteTokenURL := tokenURL\n\t\tif routeTokenURL == \"\" {\n\t\t\trouteTokenURL = \"https://info.services.auth.zalando.com/oauth2/tokeninfo\"\n\t\t}\n\t\troutes.CreateCluster.Auth = ginoauth2.Auth(\n\t\t\tmiddleware.ScopesAuth(\"uid\"),\n\t\t\toauth2.Endpoint{\n\t\t\t\tTokenURL: routeTokenURL,\n\t\t\t},\n\t\t)\n\n\t}\n\n\troutes.CreateInfrastructureAccount.RouterGroup = routes.Group(\"/\")\n\troutes.CreateInfrastructureAccount.RouterGroup.Use(middleware.LogrusLogger())\n\tif tracer != nil {\n\t\troutes.CreateInfrastructureAccount.RouterGroup.Use(tracing.InitSpan(tracer, \"create_infrastructure_account\"))\n\t}\n\troutes.CreateInfrastructureAccount.RouterGroup.Use(middleware.ContentTypes(\"application/json\"))\n\tif enableAuth {\n\n\t\trouteTokenURL := tokenURL\n\t\tif routeTokenURL == \"\" {\n\t\t\trouteTokenURL = \"https://info.services.auth.zalando.com/oauth2/tokeninfo\"\n\t\t}\n\t\troutes.CreateInfrastructureAccount.Auth = ginoauth2.Auth(\n\t\t\tmiddleware.ScopesAuth(\"uid\", \"write\"),\n\t\t\toauth2.Endpoint{\n\t\t\t\tTokenURL: routeTokenURL,\n\t\t\t},\n\t\t)\n\n\t}\n\n\troutes.CreateOrUpdateNodePool.RouterGroup = routes.Group(\"/\")\n\troutes.CreateOrUpdateNodePool.RouterGroup.Use(middleware.LogrusLogger())\n\tif tracer != nil {\n\t\troutes.CreateOrUpdateNodePool.RouterGroup.Use(tracing.InitSpan(tracer, \"create_or_update_node_pool\"))\n\t}\n\troutes.CreateOrUpdateNodePool.RouterGroup.Use(middleware.ContentTypes(\"application/json\"))\n\tif enableAuth {\n\n\t\trouteTokenURL := tokenURL\n\t\tif routeTokenURL == \"\" {\n\t\t\trouteTokenURL = \"https://info.services.auth.zalando.com/oauth2/tokeninfo\"\n\t\t}\n\t\troutes.CreateOrUpdateNodePool.Auth = ginoauth2.Auth(\n\t\t\tmiddleware.ScopesAuth(\"uid\"),\n\t\t\toauth2.Endpoint{\n\t\t\t\tTokenURL: routeTokenURL,\n\t\t\t},\n\t\t)\n\n\t}\n\n\troutes.DeleteCluster.RouterGroup = routes.Group(\"/\")\n\troutes.DeleteCluster.RouterGroup.Use(middleware.LogrusLogger())\n\tif tracer != nil {\n\t\troutes.DeleteCluster.RouterGroup.Use(tracing.InitSpan(tracer, \"delete_cluster\"))\n\t}\n\tif enableAuth {\n\n\t\trouteTokenURL := tokenURL\n\t\tif routeTokenURL == \"\" {\n\t\t\trouteTokenURL = \"https://info.services.auth.zalando.com/oauth2/tokeninfo\"\n\t\t}\n\t\troutes.DeleteCluster.Auth = ginoauth2.Auth(\n\t\t\tmiddleware.ScopesAuth(\"uid\"),\n\t\t\toauth2.Endpoint{\n\t\t\t\tTokenURL: routeTokenURL,\n\t\t\t},\n\t\t)\n\n\t}\n\n\troutes.DeleteConfigItem.RouterGroup = routes.Group(\"/\")\n\troutes.DeleteConfigItem.RouterGroup.Use(middleware.LogrusLogger())\n\tif tracer != nil {\n\t\troutes.DeleteConfigItem.RouterGroup.Use(tracing.InitSpan(tracer, \"delete_config_item\"))\n\t}\n\tif enableAuth {\n\n\t\trouteTokenURL := tokenURL\n\t\tif routeTokenURL == \"\" {\n\t\t\trouteTokenURL = \"https://info.services.auth.zalando.com/oauth2/tokeninfo\"\n\t\t}\n\t\troutes.DeleteConfigItem.Auth = ginoauth2.Auth(\n\t\t\tmiddleware.ScopesAuth(\"uid\"),\n\t\t\toauth2.Endpoint{\n\t\t\t\tTokenURL: routeTokenURL,\n\t\t\t},\n\t\t)\n\n\t}\n\n\troutes.DeleteNodePool.RouterGroup = routes.Group(\"/\")\n\troutes.DeleteNodePool.RouterGroup.Use(middleware.LogrusLogger())\n\tif tracer != nil {\n\t\troutes.DeleteNodePool.RouterGroup.Use(tracing.InitSpan(tracer, \"delete_node_pool\"))\n\t}\n\tif enableAuth {\n\n\t\trouteTokenURL := tokenURL\n\t\tif routeTokenURL == \"\" {\n\t\t\trouteTokenURL = \"https://info.services.auth.zalando.com/oauth2/tokeninfo\"\n\t\t}\n\t\troutes.DeleteNodePool.Auth = ginoauth2.Auth(\n\t\t\tmiddleware.ScopesAuth(\"uid\"),\n\t\t\toauth2.Endpoint{\n\t\t\t\tTokenURL: routeTokenURL,\n\t\t\t},\n\t\t)\n\n\t}\n\n\troutes.GetCluster.RouterGroup = routes.Group(\"/\")\n\troutes.GetCluster.RouterGroup.Use(middleware.LogrusLogger())\n\tif tracer != nil {\n\t\troutes.GetCluster.RouterGroup.Use(tracing.InitSpan(tracer, \"get_cluster\"))\n\t}\n\tif enableAuth {\n\n\t\trouteTokenURL := tokenURL\n\t\tif routeTokenURL == \"\" {\n\t\t\trouteTokenURL = \"https://info.services.auth.zalando.com/oauth2/tokeninfo\"\n\t\t}\n\t\troutes.GetCluster.Auth = ginoauth2.Auth(\n\t\t\tmiddleware.ScopesAuth(\"uid\"),\n\t\t\toauth2.Endpoint{\n\t\t\t\tTokenURL: routeTokenURL,\n\t\t\t},\n\t\t)\n\n\t}\n\n\troutes.GetInfrastructureAccount.RouterGroup = routes.Group(\"/\")\n\troutes.GetInfrastructureAccount.RouterGroup.Use(middleware.LogrusLogger())\n\tif tracer != nil {\n\t\troutes.GetInfrastructureAccount.RouterGroup.Use(tracing.InitSpan(tracer, \"get_infrastructure_account\"))\n\t}\n\tif enableAuth {\n\n\t\trouteTokenURL := tokenURL\n\t\tif routeTokenURL == \"\" {\n\t\t\trouteTokenURL = \"https://info.services.auth.zalando.com/oauth2/tokeninfo\"\n\t\t}\n\t\troutes.GetInfrastructureAccount.Auth = ginoauth2.Auth(\n\t\t\tmiddleware.ScopesAuth(\"uid\"),\n\t\t\toauth2.Endpoint{\n\t\t\t\tTokenURL: routeTokenURL,\n\t\t\t},\n\t\t)\n\n\t}\n\n\troutes.ListClusters.RouterGroup = routes.Group(\"/\")\n\troutes.ListClusters.RouterGroup.Use(middleware.LogrusLogger())\n\tif tracer != nil {\n\t\troutes.ListClusters.RouterGroup.Use(tracing.InitSpan(tracer, \"list_clusters\"))\n\t}\n\tif enableAuth {\n\n\t\trouteTokenURL := tokenURL\n\t\tif routeTokenURL == \"\" {\n\t\t\trouteTokenURL = \"https://info.services.auth.zalando.com/oauth2/tokeninfo\"\n\t\t}\n\t\troutes.ListClusters.Auth = ginoauth2.Auth(\n\t\t\tmiddleware.ScopesAuth(\"uid\"),\n\t\t\toauth2.Endpoint{\n\t\t\t\tTokenURL: routeTokenURL,\n\t\t\t},\n\t\t)\n\n\t}\n\n\troutes.ListInfrastructureAccounts.RouterGroup = routes.Group(\"/\")\n\troutes.ListInfrastructureAccounts.RouterGroup.Use(middleware.LogrusLogger())\n\tif tracer != nil {\n\t\troutes.ListInfrastructureAccounts.RouterGroup.Use(tracing.InitSpan(tracer, \"list_infrastructure_accounts\"))\n\t}\n\tif enableAuth {\n\n\t\trouteTokenURL := tokenURL\n\t\tif routeTokenURL == \"\" {\n\t\t\trouteTokenURL = \"https://info.services.auth.zalando.com/oauth2/tokeninfo\"\n\t\t}\n\t\troutes.ListInfrastructureAccounts.Auth = ginoauth2.Auth(\n\t\t\tmiddleware.ScopesAuth(\"uid\"),\n\t\t\toauth2.Endpoint{\n\t\t\t\tTokenURL: routeTokenURL,\n\t\t\t},\n\t\t)\n\n\t}\n\n\troutes.ListNodePools.RouterGroup = routes.Group(\"/\")\n\troutes.ListNodePools.RouterGroup.Use(middleware.LogrusLogger())\n\tif tracer != nil {\n\t\troutes.ListNodePools.RouterGroup.Use(tracing.InitSpan(tracer, \"list_node_pools\"))\n\t}\n\tif enableAuth {\n\n\t\trouteTokenURL := tokenURL\n\t\tif routeTokenURL == \"\" {\n\t\t\trouteTokenURL = \"https://info.services.auth.zalando.com/oauth2/tokeninfo\"\n\t\t}\n\t\troutes.ListNodePools.Auth = ginoauth2.Auth(\n\t\t\tmiddleware.ScopesAuth(\"uid\"),\n\t\t\toauth2.Endpoint{\n\t\t\t\tTokenURL: routeTokenURL,\n\t\t\t},\n\t\t)\n\n\t}\n\n\troutes.UpdateCluster.RouterGroup = routes.Group(\"/\")\n\troutes.UpdateCluster.RouterGroup.Use(middleware.LogrusLogger())\n\tif tracer != nil {\n\t\troutes.UpdateCluster.RouterGroup.Use(tracing.InitSpan(tracer, \"update_cluster\"))\n\t}\n\troutes.UpdateCluster.RouterGroup.Use(middleware.ContentTypes(\"application/json\"))\n\tif enableAuth {\n\n\t\trouteTokenURL := tokenURL\n\t\tif routeTokenURL == \"\" {\n\t\t\trouteTokenURL = \"https://info.services.auth.zalando.com/oauth2/tokeninfo\"\n\t\t}\n\t\troutes.UpdateCluster.Auth = ginoauth2.Auth(\n\t\t\tmiddleware.ScopesAuth(\"uid\"),\n\t\t\toauth2.Endpoint{\n\t\t\t\tTokenURL: routeTokenURL,\n\t\t\t},\n\t\t)\n\n\t}\n\n\troutes.UpdateInfrastructureAccount.RouterGroup = routes.Group(\"/\")\n\troutes.UpdateInfrastructureAccount.RouterGroup.Use(middleware.LogrusLogger())\n\tif tracer != nil {\n\t\troutes.UpdateInfrastructureAccount.RouterGroup.Use(tracing.InitSpan(tracer, \"update_infrastructure_account\"))\n\t}\n\troutes.UpdateInfrastructureAccount.RouterGroup.Use(middleware.ContentTypes(\"application/json\"))\n\tif enableAuth {\n\n\t\trouteTokenURL := tokenURL\n\t\tif routeTokenURL == \"\" {\n\t\t\trouteTokenURL = \"https://info.services.auth.zalando.com/oauth2/tokeninfo\"\n\t\t}\n\t\troutes.UpdateInfrastructureAccount.Auth = ginoauth2.Auth(\n\t\t\tmiddleware.ScopesAuth(\"uid\", \"write\"),\n\t\t\toauth2.Endpoint{\n\t\t\t\tTokenURL: routeTokenURL,\n\t\t\t},\n\t\t)\n\n\t}\n\n\treturn routes\n}", "func (group *RouterGroup) Static(relativePath, root string) IRoutes {\n\treturn group.StaticFS(relativePath, Dir(root, false))\n}", "func (rc *Ctx) RouteParams() RouteParameters {\n\treturn rc.routeParams\n}", "func InitializeRoutes() {\n\thttp.HandleFunc(\"/webrtc/offer\", createWebRTCOffer)\n}", "func (m *MockFirewallServiceIface) NewListPaloAltoFirewallsParams() *ListPaloAltoFirewallsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListPaloAltoFirewallsParams\")\n\tret0, _ := ret[0].(*ListPaloAltoFirewallsParams)\n\treturn ret0\n}", "func New(allowed ...*Route) Filter {\n\treturn &filter{allowed: allowed}\n}", "func InitializeRoutes(router *mux.Router) {\n\trouter.HandleFunc(\"/eggs\", controllers.GetEggs).Methods(\"GET\")\n\trouter.HandleFunc(\"/eggs/{id}\", controllers.GetEgg).Methods(\"GET\")\n\trouter.HandleFunc(\"/eggs\", controllers.CreateEgg).Methods(\"POST\")\n\trouter.HandleFunc(\"/eggs/{id}\", controllers.DeleteEgg).Methods(\"DELETE\")\n}", "func NewIndexSiteRoutesParams() *IndexSiteRoutesParams {\n\tvar ()\n\treturn &IndexSiteRoutesParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewParams(\n\tSpotMarketInstantListingFee sdk.Coin,\n\tderivativeMarketInstantListingFee sdk.Coin,\n\tdefaultSpotMakerFee sdk.Dec,\n\tdefaultSpotTakerFee sdk.Dec,\n\tdefaultDerivativeMakerFee sdk.Dec,\n\tdefaultDerivativeTakerFee sdk.Dec,\n\tdefaultInitialMarginRatio sdk.Dec,\n\tdefaultMaintenanceMarginRatio sdk.Dec,\n\tdefaultFundingInterval int64,\n\tfundingMultiple int64,\n\trelayerFeeShare sdk.Dec,\n\tdefaultHourlyFundingRateCap sdk.Dec,\n\tdefaultHourlyInterestRate sdk.Dec,\n\tmaxDerivativeSideOrderCount uint32,\n) Params {\n\treturn Params{\n\t\tSpotMarketInstantListingFee: SpotMarketInstantListingFee,\n\t\tDerivativeMarketInstantListingFee: derivativeMarketInstantListingFee,\n\t\tDefaultSpotMakerFeeRate: defaultSpotMakerFee,\n\t\tDefaultSpotTakerFeeRate: defaultSpotTakerFee,\n\t\tDefaultDerivativeMakerFeeRate: defaultDerivativeMakerFee,\n\t\tDefaultDerivativeTakerFeeRate: defaultDerivativeTakerFee,\n\t\tDefaultInitialMarginRatio: defaultInitialMarginRatio,\n\t\tDefaultMaintenanceMarginRatio: defaultMaintenanceMarginRatio,\n\t\tDefaultFundingInterval: defaultFundingInterval,\n\t\tFundingMultiple: fundingMultiple,\n\t\tRelayerFeeShareRate: relayerFeeShare,\n\t\tDefaultHourlyFundingRateCap: defaultHourlyFundingRateCap,\n\t\tDefaultHourlyInterestRate: defaultHourlyInterestRate,\n\t\tMaxDerivativeOrderSideCount: maxDerivativeSideOrderCount,\n\t}\n}", "func (o *AggregatedDomain) StaticRoutes(info *bambou.FetchingInfo) (StaticRoutesList, *bambou.Error) {\n\n\tvar list StaticRoutesList\n\terr := bambou.CurrentSession().FetchChildren(o, StaticRouteIdentity, &list, info)\n\treturn list, err\n}", "func (m *MockSecurityGroupServiceIface) NewListSecurityGroupsParams() *ListSecurityGroupsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListSecurityGroupsParams\")\n\tret0, _ := ret[0].(*ListSecurityGroupsParams)\n\treturn ret0\n}", "func InitGetRoutes(e *echo.Echo) {\n\te.GET(\"user/all\", controllers.GetAllUser)\n\tr := e.Group(\"/restricted\")\n\n\t// Configure middleware with the custom claims type\n\tconfig := middleware.JWTConfig{\n\t\tClaims: &controllers.JwtCustomClaims{},\n\t\tSigningKey: []byte(\"bomba\"),\n\t}\n\tr.Use(middleware.JWTWithConfig(config))\n\tr.GET(\"/user/duration\", controllers.GetDurataionUsers)\n\te.GET(\"user/duration\", controllers.GetDurataionUsers)\n}", "func InitRoutes(router *gin.RouterGroup) {\n\trouter.GET(\":type/:id\", handler.GetIdentifiers)\n}", "func (group *RouterGroup) Static(relativePath string, root string) {\n\tpattern := path.Join(relativePath, \"/*filepath\") // custom parameter name\n\thandler := group.createStaticHandler(relativePath, http.Dir(root))\n\tgroup.GET(pattern, handler)\n}", "func GetRoutes() *httprouter.Router {\n\trouter := httprouter.New()\n\t///////////////////////////////////////////////////////////\n\t// Main application routes\n\t///////////////////////////////////////////////////////////\n\n\tapplication := controllers.Application{}\n\trouter.GET(\"/\", route(application.Index))\n\trouter.GET(\"/api/products\", route(application.AllProducts))\n\trouter.GET(\"/api/products/match\", route(application.Match))\n\n\t///////////////////////////////////////////////////////////\n\t// Static routes\n\t// Caching Static files\n\t///////////////////////////////////////////////////////////\n\tfileServer := http.FileServer(http.Dir(\"public\"))\n\trouter.GET(\"/static/*filepath\", gzip.Middleware(func(res http.ResponseWriter, req *http.Request, pm httprouter.Params) {\n\t\tres.Header().Set(\"Vary\", \"Accept-Encoding\")\n\t\tres.Header().Set(\"Cache-Control\", \"public, max-age=7776000\")\n\t\treq.URL.Path = pm.ByName(\"filepath\")\n\t\tfileServer.ServeHTTP(res, req)\n\t}))\n\treturn router\n}", "func get_route(params map[string]string) ([]Route,error){\n\t//Retrieve stations\n//\tvar fromStationObjs,toStationObjs []Station\n//\tvar fromStationObj,toStationObj []Station\n//\tvar err error\n//\tvar fromId,toId int\n\n\tvalues := make(url.Values)\n\tif fromStation,ok := params[\"fromStation\"] ; ok {\n\t\t// handle fromStation params\n\t\tfromStationObjs, err := search_stations(fromStation)\n\t\tfromStationObj := fromStationObjs[0]\n\t\tfromId := fromStationObj.Id\n\t\tvalues.Add(\"fromStation\",strconv.Itoa(fromId))\n\t\tif err != nil {\n\t\t\treturn nil,err\n\t\t}\n\t} else if lat,ok := params[\"fromLatitute\"]; ok {\n\t\tif lon, ok := params[\"fromLongitute\"]; ok {\n\t\t\tvalues.Add(\"fromLatitute\",lat)\n\t\t\tvalues.Add(\"fromLongitute\",lon)\n\t\t}\n\t}\n\t// same thing for destination...\n\tif toStation,ok := params[\"toStation\"] ; ok {\n\t\t// handle toStation params\n\t\ttoStationObjs, err := search_stations(toStation)\n\t\ttoStationObj := toStationObjs[0]\n\t\ttoId := toStationObj.Id\n\t\tvalues.Add(\"toStation\",strconv.Itoa(toId))\n\t\tif err != nil {\n\t\t\treturn nil,err\n\t\t}\n\t} else if lat,ok := params[\"toLatitute\"]; ok {\n\t\tif lon, ok := params[\"toLongitute\"]; ok {\n\t\t\tvalues.Add(\"toLatitute\",lat)\n\t\t\tvalues.Add(\"toLongitute\",lon)\n\t\t}\n\t}\n\n\t// construct URL query string\n\tif maxTravelTimeFootwayToStation, ok := params[\"maxTravelTimeFootwayToStation\"]; ok {\n\t\tvalues.Add(\"maxTravelTimeFootwayToStation\",maxTravelTimeFootwayToStation)\n\t}\n\n\tif maxTravelTimeFootwayToDestination, ok := params[\"maxTravelTimeFootwayToDestination\"]; ok {\n\t\tvalues.Add(\"maxTravelTimeFootwayToDestination\",maxTravelTimeFootwayToDestination)\n\t}\n\n\t// then construct the request URLs\n\turl := fmt.Sprintf(\"https://www.mvg.de/fahrinfo/api/routing/?%s\",values.Encode())\n\t// request and get response\n\tjsonString,err := request_mvg(url)\n\t// parse the result\n\t\n\tvar jsonResponse map[string][]Route\n\tif err = json.Unmarshal(jsonString,&jsonResponse); err != nil {\n\t\treturn nil,err\n\t}\n\treturn jsonResponse[\"connectionList\"],nil\n}", "func NewParams(createWhoisPrice string, updateWhoisPrice string, deleteWhoisPrice string) Params {\n\treturn Params{\n\t\tCreateWhoisPrice: createWhoisPrice,\n\t\tUpdateWhoisPrice: updateWhoisPrice,\n\t\tDeleteWhoisPrice: deleteWhoisPrice,\n\t}\n}", "func NewConfigListParams() *ConfigListParams {\n\tvar ()\n\treturn &ConfigListParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewBenchmark_send_Params_List(s *capnp.Segment, sz int32) (Benchmark_send_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn Benchmark_send_Params_List{l}, err\n}", "func NewRealmGateway_import_Params_List(s *capnp.Segment, sz int32) (RealmGateway_import_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn RealmGateway_import_Params_List{l}, err\n}", "func NewRealmGateway_import_Params_List(s *capnp.Segment, sz int32) (RealmGateway_import_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn RealmGateway_import_Params_List{l}, err\n}", "func (h *StaticHandler) AddRoutes(apply func(m, p string, h http.Handler, mws ...func(http.Handler) http.Handler)) {\n\tfileServer := http.FileServer(h.fs)\n\tapply(http.MethodGet, \"/*filepath\", http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tr.URL.Path = routegroup.PathParam(r.Context(), \"filepath\")\n\t\tfileServer.ServeHTTP(w, r)\n\t}))\n}", "func NewStatic(peers ...*memberlist.Node) Static {\n\treturn Static{\n\t\tpeers: peers,\n\t}\n}", "func NewGetNcosPatternitemsRequest(server string, params *GetNcosPatternitemsParams) (*http.Request, error) {\n\tvar err error\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/ncospatterns\")\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryValues := queryUrl.Query()\n\n\tif queryFrag, err := runtime.StyleParam(\"form\", true, \"ncos_level_id\", params.NcosLevelId); err != nil {\n\t\treturn nil, err\n\t} else if parsed, err := url.ParseQuery(queryFrag); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tfor k, v := range parsed {\n\t\t\tfor _, v2 := range v {\n\t\t\t\tqueryValues.Add(k, v2)\n\t\t\t}\n\t\t}\n\t}\n\n\tif queryFrag, err := runtime.StyleParam(\"form\", true, \"order_by\", params.OrderBy); err != nil {\n\t\treturn nil, err\n\t} else if parsed, err := url.ParseQuery(queryFrag); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tfor k, v := range parsed {\n\t\t\tfor _, v2 := range v {\n\t\t\t\tqueryValues.Add(k, v2)\n\t\t\t}\n\t\t}\n\t}\n\n\tif queryFrag, err := runtime.StyleParam(\"form\", true, \"order_by_direction\", params.OrderByDirection); err != nil {\n\t\treturn nil, err\n\t} else if parsed, err := url.ParseQuery(queryFrag); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tfor k, v := range parsed {\n\t\t\tfor _, v2 := range v {\n\t\t\t\tqueryValues.Add(k, v2)\n\t\t\t}\n\t\t}\n\t}\n\n\tif queryFrag, err := runtime.StyleParam(\"form\", true, \"page\", params.Page); err != nil {\n\t\treturn nil, err\n\t} else if parsed, err := url.ParseQuery(queryFrag); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tfor k, v := range parsed {\n\t\t\tfor _, v2 := range v {\n\t\t\t\tqueryValues.Add(k, v2)\n\t\t\t}\n\t\t}\n\t}\n\n\tif queryFrag, err := runtime.StyleParam(\"form\", true, \"rows\", params.Rows); err != nil {\n\t\treturn nil, err\n\t} else if parsed, err := url.ParseQuery(queryFrag); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tfor k, v := range parsed {\n\t\t\tfor _, v2 := range v {\n\t\t\t\tqueryValues.Add(k, v2)\n\t\t\t}\n\t\t}\n\t}\n\n\tqueryUrl.RawQuery = queryValues.Encode()\n\n\treq, err := http.NewRequest(\"GET\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func NewHandleFactory_newHandle_Params_List(s *capnp.Segment, sz int32) (HandleFactory_newHandle_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\tif err != nil {\n\t\treturn HandleFactory_newHandle_Params_List{}, err\n\t}\n\treturn HandleFactory_newHandle_Params_List{l}, nil\n}", "func PathParams(req *http.Request) (params map[string]string) {\n\tparams = req.Context().Value(paramsKey).(map[string]string)\n\n\treturn\n}", "func (server *Server) initializeRoutes() error {\n\n\tvar err error\n\n\t// uri\n\thome := constants.HOMEURI\n\tbalance := constants.BALANCEURI\n\ttradeBalance := constants.TRADEBALANCEURI\n\tledger := constants.LEDGERURI\n\n\t//**************** Home Route\n\n\terr = server.App.V1.HandleFunc(home, server.Home).Methods(http.MethodGet).GetError()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t//**************** Balance Routes\n\n\t// single request\n\terr = server.App.V1.HandleFunc(balance, server.GetBalance).Methods(http.MethodGet).GetError()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t//**************** TradeBalance Routes\n\n\t// single request\n\terr = server.App.V1.HandleFunc(tradeBalance, server.GetTradeBalance).Methods(http.MethodGet).GetError()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t//**************** Ledger Routes\n\n\t// single request\n\terr = server.App.V1.HandleFunc(ledger, server.GetLedger).Methods(http.MethodGet).GetError()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n\n}", "func NewListParamsWithHTTPClient(client *http.Client) *ListParams {\n\tvar ()\n\treturn &ListParams{\n\t\tHTTPClient: client,\n\t}\n}", "func (d *DHCPv4) ClasslessStaticRoute() []*Route {\n\tv := d.Options.Get(OptionClasslessStaticRoute)\n\tif v == nil {\n\t\treturn nil\n\t}\n\tvar routes Routes\n\tif err := routes.FromBytes(v); err != nil {\n\t\treturn nil\n\t}\n\treturn routes\n}", "func (m *MockLoadBalancerServiceIface) NewListSslCertsParams() *ListSslCertsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListSslCertsParams\")\n\tret0, _ := ret[0].(*ListSslCertsParams)\n\treturn ret0\n}", "func NewGetRefPlantsParams() GetRefPlantsParams {\n\n\tvar (\n\t\t// initialize parameters with default values\n\n\t\tlimitDefault = int64(20)\n\t\toffsetDefault = int64(0)\n\t)\n\n\treturn GetRefPlantsParams{\n\t\tLimit: limitDefault,\n\n\t\tOffset: offsetDefault,\n\t}\n}", "func InitRoutes(config *config.GeneralConfig, db *sqlx.DB) *chi.Mux {\n\trouter := chi.NewRouter()\n\trouter.Use(middleware.RequestID)\n\trouter.Use(middleware.Recoverer)\n\trouter.Use(appmiddleware.SetJSON)\n\trouter.Use(cors.New(cors.Options{\n\t\tAllowedMethods: []string{\"GET\", \"POST\", \"PUT\", \"DELETE\"},\n\t}).Handler)\n\t// prepare controller routes\n\tvldtor := validator.New()\n\tgovSgCarparkRp := govsgcarpark.NewRepo(config.GovSgService.BaseUrl, &http.Client{Timeout: constant.DefaultHttpTimeout * time.Second})\n\tcarparkInfoRp := carparkinfo.NewRepo(db)\n\tcarparkRp := carpark.NewRepo(db)\n\n\tgovSgCarparkUc := govsgcarpark.NewUsecase(govSgCarparkRp)\n\tcarparkInfoUc := carparkinfo.NewUsecase(carparkInfoRp)\n\tcarparkUc := carpark.NewUsecase(carparkRp, carparkInfoUc)\n\n\tcpInfoUploader := tasks.NewCarparkInfoUploader(govSgCarparkUc, carparkInfoUc)\n\tcpUploader := tasks.NewCarparkUploader(carparkUc, config.DbConfig.SeedPath)\n\n\tbase := controllers.NewBaseController(config, vldtor, db)\n\ttaskController := controllers.NewTaskController(base, cpUploader, cpInfoUploader)\n\tcarparkController := controllers.NewCarparkController(base, carparkUc)\n\n\t// Mounting controller routes\n\trouter.Route(\"/\", func(r chi.Router) {\n\t\tr.Group(base.Router)\n\t\tr.Group(taskController.Router)\n\t\tr.Group(carparkController.Router)\n\t})\n\treturn router\n}", "func init() {\n\t// system.Router.HandleFunc(\"/app/get/list/{crud}\", HandleListGeneric)\n}", "func (m *MockFirewallServiceIface) NewListFirewallRulesParams() *ListFirewallRulesParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListFirewallRulesParams\")\n\tret0, _ := ret[0].(*ListFirewallRulesParams)\n\treturn ret0\n}", "func InitializeRoutes(router *mux.Router) {\n\n\t//Employees routes\n\trouter.HandleFunc(\"/emp\", SetMiddlewareJSON(c.CreateEmp)).Methods(\"POST\")\n\trouter.HandleFunc(\"/emp\", SetMiddlewareJSON(c.GetAllEmp)).Methods(\"GET\")\n\trouter.HandleFunc(\"/emp/{id}\", SetMiddlewareJSON(c.GetEmp)).Methods(\"GET\")\n\trouter.HandleFunc(\"/emp/{id}\", SetMiddlewareJSON(c.UpdateEmp)).Methods(\"PUT\")\n\trouter.HandleFunc(\"/emp/{id}\", SetMiddlewareJSON(c.DeleteEmp)).Methods(\"DELETE\")\n}", "func (p *routeParser) paramsForPos(path string, paramsPositions [][2]int) []string {\n\tsize := len(paramsPositions)\n\tparams := getAllocFreeParams(size)\n\tfor i, positions := range paramsPositions {\n\t\tif positions[0] != positions[1] && len(path) >= positions[1] {\n\t\t\tparams[i] = path[positions[0]:positions[1]]\n\t\t} else {\n\t\t\tparams[i] = \"\"\n\t\t}\n\t}\n\n\treturn params\n}", "func initalizeRoutes() {\n\n\tv1 := app.Group(\"/v1\")\n\n\t// Auth controller routes\n\taccountRoutes := v1.Group(\"/account\")\n\taccountRoutes.POST(\"/register\", accountController.Register)\n\taccountRoutes.POST(\"/login\", accountController.Login)\n\taccountRoutes.POST(\"/refresh-token\", accountController.RefreshToken)\n\n\t// Post controller routes\n\tpostRoutes := v1.Group(\"/posts\").Use(middleware.Authorization())\n\tpostRoutes.GET(\"/\", postController.GetAll)\n\n}", "func NewParams() *Params {\n\tp := Params{}\n\tp.names = []string{}\n\tp.values = map[string]interface{}{}\n\n\treturn &p\n}", "func NewParams(communityTax sdk.Dec, withdrawAddrEnabled bool) Params {\n\treturn Params{\n\t\tCommunityTax: communityTax,\n\t\tWithdrawAddrEnabled: withdrawAddrEnabled,\n\t}\n}", "func NewParams(opts []copts.Opt) *Params {\r\n\tparams := &Params{}\r\n\tcopts.Apply(params, opts)\r\n\treturn params\r\n}", "func initializeRoutes() {\n\n\t// Handle the index route\n\trouter.GET(\"/\", showIndexPage)\n\n\t// User Routes init:\n\tuserRoutes := router.Group(\"/user\")\n\t{\n\t\t// Handle GET requests at /user/view/some_user_id to show a specific user\n\t\tuserRoutes.GET(\"/view/:user_id\", getUser)\n\t\t\n\t\t// Handle POST requests at /user/edit/ to edit a user\n\t\tuserRoutes.POST(\"/edit\", doBeforeRoute(), editUser)\n\t\t\n\t\t// Handle the GET requests at /user/create and show the user creation page\n\t\tuserRoutes.GET(\"/create\", doBeforeRoute(), showUserCreationPage)\n\n\t\t// Handle POST requests at /user/create and actually create the user\n\t\tuserRoutes.POST(\"/create\", doBeforeRoute(), createUser)\n\t}\n}", "func InitRoutes(db *sql.DB, cnf config.Config) *mux.Router {\n\trouter := mux.NewRouter()\n\trouter = setRESTRoutes(db, cnf, router)\n\trouter = setIPCRoutes(db, cnf, router)\n\treturn router\n}", "func (routeObj *Routes)NewRouter() *mux.Router {\n log := logger.GetLoggerInstance()\n router := mux.NewRouter().StrictSlash(true)\n routeObj.CreateAllRoutes()\n for _, route := range routeObj.entries {\n var handler http.Handler\n handler = route.HandlerFunc\n router.\n Methods(route.Method).\n Path(route.Pattern).\n Name(route.Name).\n Handler(handler)\n log.Trace(\"Created route for %s\", route.Name)\n }\n routeObj.controller = new(controller)\n return router\n}", "func (s *Server) initializeRoutes() {\n\n\t// Home Route\n\ts.Router.HandleFunc(\"/\", middlewares.SetMiddlewareJSON(s.Home)).Methods(\"GET\")\n\n\ts.Router.HandleFunc(\"/products\", middlewares.SetMiddlewareJSON(s.FindAllProducts)).Methods(\"GET\")\n\ts.Router.HandleFunc(\"/product\", middlewares.SetMiddlewareJSON(s.CreateProduct)).Methods(\"POST\")\n\ts.Router.HandleFunc(\"/product/{id:[0-9]+}\", middlewares.SetMiddlewareJSON(s.GetProduct)).Methods(\"GET\")\n\ts.Router.HandleFunc(\"/product/{id:[0-9]+}\", middlewares.SetMiddlewareJSON(s.UpdateProduct)).Methods(\"PUT\")\n\ts.Router.HandleFunc(\"/product/{id:[0-9]+}\", middlewares.SetMiddlewareJSON(s.DeleteProduct)).Methods(\"DELETE\")\n}", "func (d *MockDataResyncDSL) StaticRoute(val *l3.StaticRoutes_Route) vppclient.DataResyncDSL {\n\tkey := l3.RouteKey(val.VrfId, val.DstIpAddr, val.NextHopAddr)\n\top := dsl.TxnOp{Key: key, Value: val}\n\td.Ops = append(d.Ops, op)\n\treturn d\n}", "func NewParams(tokenCourse, subscriptionPrice, VPNGBPrice,\n\tstorageGBPrice, baseVPNGb, baseStorageGb uint32, courseSigners []sdk.AccAddress) Params {\n\treturn Params{\n\t\tTokenCourse: tokenCourse,\n\t\tSubscriptionPrice: subscriptionPrice,\n\t\tVPNGBPrice: VPNGBPrice,\n\t\tStorageGBPrice: storageGBPrice,\n\t\tBaseVPNGb: baseVPNGb,\n\t\tBaseStorageGb: baseStorageGb,\n\t\tCourseChangeSigners: courseSigners[:],\n\t}\n}", "func (m *MockLoadBalancerServiceIface) NewListLoadBalancerRulesParams() *ListLoadBalancerRulesParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListLoadBalancerRulesParams\")\n\tret0, _ := ret[0].(*ListLoadBalancerRulesParams)\n\treturn ret0\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewGetListParams() *GetListParams {\n\tvar ()\n\treturn &GetListParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (m *RouteMux) Static(pattern string, dir string) {\n\t//append a regex to the param to match everything\n\t// that comes after the prefix\n\tpattern = pattern + \"(.+)\"\n\tm.AddRoute(GET, pattern, func(w http.ResponseWriter, r *http.Request) {\n\t\tpath := filepath.Clean(r.URL.Path)\n\t\tpath = filepath.Join(dir, path)\n\t\thttp.ServeFile(w, r, path)\n\t})\n}", "func NewListScansParamsWithTimeout(timeout time.Duration) *ListScansParams {\n\tvar (\n\t\tmaxItemsDefault = int64(100)\n\t\toffsetDefault = int64(0)\n\t\torderByDefault = string(\"created_at\")\n\t\torderDirectionDefault = string(\"desc\")\n\t)\n\treturn &ListScansParams{\n\t\tMaxItems: &maxItemsDefault,\n\t\tOffset: &offsetDefault,\n\t\tOrderBy: &orderByDefault,\n\t\tOrderDirection: &orderDirectionDefault,\n\n\t\ttimeout: timeout,\n\t}\n}", "func NewParams(opts []copts.Opt) *Params {\n\tparams := &Params{}\n\tcopts.Apply(params, opts)\n\treturn params\n}", "func NewController_devShell_Params_List(s *capnp.Segment, sz int32) (Controller_devShell_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn capnp.StructList[Controller_devShell_Params](l), err\n}", "func GetParams(r *http.Request) *Params {\n\tvar params *Params\n\tp := r.Context().Value(ContextNameRouterParams)\n\tif p != nil {\n\t\tparams = (p).(*Params)\n\t}\n\tif params == nil {\n\t\tparams = &Params{}\n\t\tctx := context.WithValue(r.Context(), ContextNameRouterParams, params)\n\t\t*r = *r.WithContext(ctx)\n\t}\n\treturn params\n}", "func NewListFormsParams() *ListFormsParams {\n\n\treturn &ListFormsParams{}\n}", "func init() {\r\n\thttp.HandleFunc(\"/\", redirectIndex)\r\n\thttp.HandleFunc(\"/VehicleLocations\", getLocations)\r\n}", "func (env *Environment) GetRoutes() RoutesMap {\n\treturn RoutesMap{\n\t\t// subscribe/unsubscribe are reserved for websocket events.\n\t\t\"subscribe\": rpc.NewWSRPCFunc(env.Subscribe, \"query\"),\n\t\t\"unsubscribe\": rpc.NewWSRPCFunc(env.Unsubscribe, \"query\"),\n\t\t\"unsubscribe_all\": rpc.NewWSRPCFunc(env.UnsubscribeAll, \"\"),\n\n\t\t// info AP\n\t\t\"health\": rpc.NewRPCFunc(env.Health, \"\"),\n\t\t\"status\": rpc.NewRPCFunc(env.Status, \"\"),\n\t\t\"net_info\": rpc.NewRPCFunc(env.NetInfo, \"\"),\n\t\t\"blockchain\": rpc.NewRPCFunc(env.BlockchainInfo, \"minHeight,maxHeight\", rpc.Cacheable()),\n\t\t\"genesis\": rpc.NewRPCFunc(env.Genesis, \"\", rpc.Cacheable()),\n\t\t\"genesis_chunked\": rpc.NewRPCFunc(env.GenesisChunked, \"chunk\", rpc.Cacheable()),\n\t\t\"block\": rpc.NewRPCFunc(env.Block, \"height\", rpc.Cacheable(\"height\")),\n\t\t\"block_by_hash\": rpc.NewRPCFunc(env.BlockByHash, \"hash\", rpc.Cacheable()),\n\t\t\"block_results\": rpc.NewRPCFunc(env.BlockResults, \"height\", rpc.Cacheable(\"height\")),\n\t\t\"commit\": rpc.NewRPCFunc(env.Commit, \"height\", rpc.Cacheable(\"height\")),\n\t\t\"header\": rpc.NewRPCFunc(env.Header, \"height\", rpc.Cacheable(\"height\")),\n\t\t\"header_by_hash\": rpc.NewRPCFunc(env.HeaderByHash, \"hash\", rpc.Cacheable()),\n\t\t\"check_tx\": rpc.NewRPCFunc(env.CheckTx, \"tx\"),\n\t\t\"tx\": rpc.NewRPCFunc(env.Tx, \"hash,prove\", rpc.Cacheable()),\n\t\t\"tx_search\": rpc.NewRPCFunc(env.TxSearch, \"query,prove,page,per_page,order_by\"),\n\t\t\"block_search\": rpc.NewRPCFunc(env.BlockSearch, \"query,page,per_page,order_by\"),\n\t\t\"validators\": rpc.NewRPCFunc(env.Validators, \"height,page,per_page\", rpc.Cacheable(\"height\")),\n\t\t\"dump_consensus_state\": rpc.NewRPCFunc(env.DumpConsensusState, \"\"),\n\t\t\"consensus_state\": rpc.NewRPCFunc(env.GetConsensusState, \"\"),\n\t\t\"consensus_params\": rpc.NewRPCFunc(env.ConsensusParams, \"height\", rpc.Cacheable(\"height\")),\n\t\t\"unconfirmed_txs\": rpc.NewRPCFunc(env.UnconfirmedTxs, \"limit\"),\n\t\t\"num_unconfirmed_txs\": rpc.NewRPCFunc(env.NumUnconfirmedTxs, \"\"),\n\n\t\t// tx broadcast API\n\t\t\"broadcast_tx_commit\": rpc.NewRPCFunc(env.BroadcastTxCommit, \"tx\"),\n\t\t\"broadcast_tx_sync\": rpc.NewRPCFunc(env.BroadcastTxSync, \"tx\"),\n\t\t\"broadcast_tx_async\": rpc.NewRPCFunc(env.BroadcastTxAsync, \"tx\"),\n\n\t\t// abci API\n\t\t\"abci_query\": rpc.NewRPCFunc(env.ABCIQuery, \"path,data,height,prove\"),\n\t\t\"abci_info\": rpc.NewRPCFunc(env.ABCIInfo, \"\", rpc.Cacheable()),\n\n\t\t// evidence API\n\t\t\"broadcast_evidence\": rpc.NewRPCFunc(env.BroadcastEvidence, \"evidence\"),\n\t}\n}", "func NewParams(n, m int, prf, msg hasher.Hasher) *Params {\n\t// Don't allow creation of params if m == 0 or m > MaxMsgSize\n\tif m < 1 || m > MaxMsgSize {\n\t\treturn nil\n\t}\n\t// Don't allow creation of params if hash functions sizes are smaller than specified N and M\n\tif prf.Size() < n || msg.Size() < m {\n\t\treturn nil\n\t}\n\tchecksumLadders := 2\n\t// The only case that we need just 1 checksum ladder is for m=1\n\tif m == 1 {\n\t\tchecksumLadders = 1\n\t}\n\treturn &Params{\n\t\tn: n,\n\t\tm: m,\n\t\tprfHash: prf,\n\t\tmsgHash: msg,\n\t\ttotal: m + checksumLadders,\n\t}\n}", "func (s *Server) InitRoutes() {\n\ts.Router.GET(\"/ingredients\", s.AllIngredients)\n\ts.Router.POST(\"/ingredients\", s.NewIngredient)\n\ts.Router.GET(\"/ingredients/:id\", s.GetIngredient)\n\n\ts.Router.GET(\"/ingredients/:id/relations\", s.GetIngredientRelations)\n\ts.Router.DELETE(\"/ingredients/:id\", s.DeleteIngredient)\n\n\ts.Router.GET(\"/categories\", s.AllCategories)\n\ts.Router.POST(\"/categories\", s.NewCategory)\n\ts.Router.DELETE(\"/categories/:id\", s.DeleteCategory)\n\n\ts.Router.GET(\"/utensils\", s.AllUtensils)\n\ts.Router.POST(\"/utensils\", s.NewUtensil)\n\ts.Router.DELETE(\"/utensils/:id\", s.DeleteUtensil)\n\n\ts.Router.GET(\"/measures\", s.AllMeasures)\n\n\ts.Router.POST(\"/recipes\", s.NewRecipe)\n\ts.Router.GET(\"/recipes\", s.SearchRecipe)\n\ts.Router.GET(\"/recipes/:id\", s.RecipeById)\n\ts.Router.PUT(\"/recipes/:id\", s.UpdateRecipe)\n\ts.Router.DELETE(\"/recipes/:id\", s.DeleteRecipe)\n\n\ts.Router.POST(\"/recipes/images\", s.UploadImages)\n\n\ts.Router.GET(\"/live\", s.Live)\n}", "func (m *MockLoadBalancerServiceIface) NewListLoadBalancerRuleInstancesParams(id string) *ListLoadBalancerRuleInstancesParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListLoadBalancerRuleInstancesParams\", id)\n\tret0, _ := ret[0].(*ListLoadBalancerRuleInstancesParams)\n\treturn ret0\n}", "func getRoutes() {\n\tv1 := router.Group(\"/v1\")\n\taddUserRoutes(v1)\n\taddPingRoutes(v1)\n\n\tv2 := router.Group(\"/v2\")\n\taddPingRoutes(v2)\n}", "func AddPublicRoutes(\n\tprocessContext *process.ProcessContext,\n\trouters httputil.Routers,\n\tcfg *config.Dendrite,\n\tnatsInstance *jetstream.NATSInstance,\n\tfederation fclient.FederationClient,\n\trsAPI roomserverAPI.ClientRoomserverAPI,\n\tasAPI appserviceAPI.AppServiceInternalAPI,\n\ttransactionsCache *transactions.Cache,\n\tfsAPI federationAPI.ClientFederationAPI,\n\tuserAPI userapi.ClientUserAPI,\n\tuserDirectoryProvider userapi.QuerySearchProfilesAPI,\n\textRoomsProvider api.ExtraPublicRoomsProvider, enableMetrics bool,\n) {\n\tjs, natsClient := natsInstance.Prepare(processContext, &cfg.Global.JetStream)\n\n\tsyncProducer := &producers.SyncAPIProducer{\n\t\tJetStream: js,\n\t\tTopicReceiptEvent: cfg.Global.JetStream.Prefixed(jetstream.OutputReceiptEvent),\n\t\tTopicSendToDeviceEvent: cfg.Global.JetStream.Prefixed(jetstream.OutputSendToDeviceEvent),\n\t\tTopicTypingEvent: cfg.Global.JetStream.Prefixed(jetstream.OutputTypingEvent),\n\t\tTopicPresenceEvent: cfg.Global.JetStream.Prefixed(jetstream.OutputPresenceEvent),\n\t\tUserAPI: userAPI,\n\t\tServerName: cfg.Global.ServerName,\n\t}\n\n\trouting.Setup(\n\t\trouters,\n\t\tcfg, rsAPI, asAPI,\n\t\tuserAPI, userDirectoryProvider, federation,\n\t\tsyncProducer, transactionsCache, fsAPI,\n\t\textRoomsProvider, natsClient, enableMetrics,\n\t)\n}" ]
[ "0.5763995", "0.5503623", "0.54837483", "0.5298338", "0.52391577", "0.5228897", "0.52138287", "0.51941305", "0.5192935", "0.5192718", "0.5192718", "0.51372355", "0.5110385", "0.5057178", "0.50516367", "0.50513685", "0.5034027", "0.5021479", "0.50043017", "0.49624684", "0.4940524", "0.49240172", "0.48304594", "0.4829611", "0.48210987", "0.4814303", "0.48085126", "0.48077416", "0.47130516", "0.47046968", "0.4697441", "0.46818957", "0.46765444", "0.46662396", "0.46553257", "0.46516457", "0.4651404", "0.46506453", "0.46465677", "0.46342403", "0.46295923", "0.46241656", "0.46181625", "0.4617471", "0.46140155", "0.46126986", "0.46055987", "0.45966634", "0.45898044", "0.4588302", "0.45837834", "0.4580525", "0.45773768", "0.4576498", "0.45577762", "0.45515", "0.45297632", "0.45297632", "0.4516564", "0.45157126", "0.45120576", "0.45096835", "0.4505655", "0.45050198", "0.45042402", "0.45013562", "0.4498519", "0.44904304", "0.44895756", "0.44737452", "0.44678816", "0.4464372", "0.4458764", "0.44580844", "0.44531095", "0.44508943", "0.4445814", "0.44431433", "0.44345227", "0.44332162", "0.4427589", "0.44273677", "0.44242933", "0.44187245", "0.44117957", "0.44117957", "0.44092816", "0.44059518", "0.44052774", "0.4404764", "0.4403425", "0.44021466", "0.44011343", "0.43962076", "0.4396102", "0.43955976", "0.439547", "0.43902755", "0.43888792", "0.438423" ]
0.70899844
0
This is a courtesy helper function, which in some cases may not work as expected!
func (s *VPCService) GetStaticRouteByID(id string, opts ...OptionFunc) (*StaticRoute, int, error) { p := &ListStaticRoutesParams{} p.p = make(map[string]interface{}) p.p["id"] = id for _, fn := range append(s.cs.options, opts...) { if err := fn(s.cs, p); err != nil { return nil, -1, err } } l, err := s.ListStaticRoutes(p) if err != nil { if strings.Contains(err.Error(), fmt.Sprintf( "Invalid parameter id value=%s due to incorrect long value format, "+ "or entity does not exist", id)) { return nil, 0, fmt.Errorf("No match found for %s: %+v", id, l) } return nil, -1, err } if l.Count == 0 { return nil, l.Count, fmt.Errorf("No match found for %s: %+v", id, l) } if l.Count == 1 { return l.StaticRoutes[0], l.Count, nil } return nil, l.Count, fmt.Errorf("There is more then one result for StaticRoute UUID: %s!", id) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func getHelperMethodIfNeeded(functionName string, indent string) (string, bool) {\n\tswitch functionName {\n\tcase \"filebase64sha256\":\n\t\treturn `function computeFilebase64sha256(path string) string {\n\tconst fileData = Buffer.from(fs.readFileSync(path), 'binary')\n\treturn crypto.createHash('sha256').update(fileData).digest('hex')\n}`, true\n\tcase \"notImplemented\":\n\t\treturn fmt.Sprintf(\n\t\t\t`%sfunction notImplemented(message: string) {\n%s throw new Error(message);\n%s}`, indent, indent, indent), true\n\tcase \"singleOrNone\":\n\t\treturn fmt.Sprintf(\n\t\t\t`%sfunction singleOrNone<T>(elements: pulumi.Input<T>[]): pulumi.Input<T> {\n%s if (elements.length != 1) {\n%s throw new Error(\"singleOrNone expected input list to have a single element\");\n%s }\n%s return elements[0];\n%s}`, indent, indent, indent, indent, indent, indent), true\n\tdefault:\n\t\treturn \"\", false\n\t}\n}", "func getHelperMethodIfNeeded(functionName string, indent string) (string, bool) {\n\tswitch functionName {\n\tcase \"filebase64\":\n\t\treturn `private static string ReadFileBase64(string path) {\n\t\treturn Convert.ToBase64String(System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path)));\n\t}`, true\n\tcase \"filebase64sha256\":\n\t\treturn `private static string ComputeFileBase64Sha256(string path) {\n\t\tvar fileData = System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path));\n\t\tvar hashData = SHA256.Create().ComputeHash(fileData);\n\t\treturn Convert.ToBase64String(hashData);\n\t}`, true\n\tcase \"sha1\":\n\t\treturn `private static string ComputeSHA1(string input) {\n\t\treturn BitConverter.ToString(\n\t\t\tSHA1.Create().ComputeHash(Encoding.UTF8.GetBytes(input))\n\t\t).Replace(\"-\",\"\").ToLowerInvariant());\n\t}`, true\n\tcase \"notImplemented\":\n\t\treturn fmt.Sprintf(`\n%sstatic object NotImplemented(string errorMessage) \n%s{\n%s throw new System.NotImplementedException(errorMessage);\n%s}`, indent, indent, indent, indent), true\n\tdefault:\n\t\treturn \"\", false\n\t}\n}", "func TestGetNone4A(t *testing.T) {\n}", "func (f *Ifacer) getUniqueImportName(pkgName string, level int) string {\n\tstrs := strings.Split(pkgName, string(filepath.Separator))\n\n\tlenStr := len(strs)\n\n\tif lenStr-1 < level {\n\t\tf.logger.Panicf(\"%d out of range\", level)\n\t}\n\n\tvar importName string\n\tfor _, str := range strs[lenStr-level-1:] {\n\t\tif strings.Contains(str, \".\") {\n\t\t\tstr = strings.Replace(str, \".\", \"\", -1)\n\t\t}\n\t\timportName += str\n\t}\n\n\treturn importName\n}", "func DummyStringGetterFunction(name string) string {\n\treturn name\n}", "func almostOkayFunction() {\n\treturn nil\n}", "func isBadVersion(version int) bool{\n return false\n}", "func trimCaller(funcName string) string {\n\t// ex:\n\t// funcName = \"github.com/ddo/request.(*Client).Request\"\n\t// arrDir = [github.com ddo request.(*Client).Request]\n\t// lastDir = request.(*Client).Request\n\t// arrCaller = [request. (*Client).Request]\n\n\tarrDir := strings.Split(funcName, \"/\")\n\tlastDir := arrDir[len(arrDir)-1]\n\tarrCaller := strings.Split(lastDir, \".\")\n\n\tif len(arrCaller) < 2 {\n\t\treturn \"\"\n\t}\n\n\treturn arrCaller[len(arrCaller)-1]\n}", "func getValidPrefix(s string, base int64) string {\n\ttrace_util_0.Count(_util_00000, 47)\n\tvar (\n\t\tvalidLen int\n\t\tupper rune\n\t)\n\tswitch {\n\tcase base >= 2 && base <= 9:\n\t\ttrace_util_0.Count(_util_00000, 51)\n\t\tupper = rune('0' + base)\n\tcase base <= 36:\n\t\ttrace_util_0.Count(_util_00000, 52)\n\t\tupper = rune('A' + base - 10)\n\tdefault:\n\t\ttrace_util_0.Count(_util_00000, 53)\n\t\treturn \"\"\n\t}\n\ttrace_util_0.Count(_util_00000, 48)\nLoop:\n\tfor i := 0; i < len(s); i++ {\n\t\ttrace_util_0.Count(_util_00000, 54)\n\t\tc := rune(s[i])\n\t\tswitch {\n\t\tcase unicode.IsDigit(c) || unicode.IsLower(c) || unicode.IsUpper(c):\n\t\t\ttrace_util_0.Count(_util_00000, 55)\n\t\t\tc = unicode.ToUpper(c)\n\t\t\tif c < upper {\n\t\t\t\ttrace_util_0.Count(_util_00000, 58)\n\t\t\t\tvalidLen = i + 1\n\t\t\t} else {\n\t\t\t\ttrace_util_0.Count(_util_00000, 59)\n\t\t\t\t{\n\t\t\t\t\tbreak Loop\n\t\t\t\t}\n\t\t\t}\n\t\tcase c == '+' || c == '-':\n\t\t\ttrace_util_0.Count(_util_00000, 56)\n\t\t\tif i != 0 {\n\t\t\t\ttrace_util_0.Count(_util_00000, 60)\n\t\t\t\tbreak Loop\n\t\t\t}\n\t\tdefault:\n\t\t\ttrace_util_0.Count(_util_00000, 57)\n\t\t\tbreak Loop\n\t\t}\n\t}\n\ttrace_util_0.Count(_util_00000, 49)\n\tif validLen > 1 && s[0] == '+' {\n\t\ttrace_util_0.Count(_util_00000, 61)\n\t\treturn s[1:validLen]\n\t}\n\ttrace_util_0.Count(_util_00000, 50)\n\treturn s[:validLen]\n}", "func sanitizePackageName(importPath string) string {\n\talias := path.Base(importPath)\n\n\t// alias should be lower case\n\talias = strings.ToLower(alias)\n\n\t// alias should now only contain alphanumerics\n\timportsRegex := regexp.MustCompile(`[^a-z0-9]`)\n\talias = importsRegex.ReplaceAllString(alias, \"\")\n\n\t// can't have a first digit, per Go identifier rules, so just skip them\n\talias = strings.TrimLeftFunc(alias, unicode.IsDigit)\n\n\t// If path part was all digits, we may be left with an empty string. In this case use \"pkg\" as the alias.\n\tif alias == \"\" {\n\t\talias = \"pkg\"\n\t}\n\n\treturn alias\n}", "func TestPrewriteWrittenNoConflict4A(t *testing.T) {\n}", "func getOID(oid string) (string, error) {\n\tif strings.HasPrefix(oid, \".\") {\n\t\treturn oid, nil\n\t}\n\tmu.Lock()\n\tdefer mu.Unlock()\n\tfixed, ok := lookupOID[oid]\n\tif !ok {\n\t\treturn oid, errors.Errorf(\"no OID found for %s\", oid)\n\t}\n\treturn fixed, nil\n}", "func legacyFileName(prefix, instance, class, id string) string {\n\tvar fileName string\n\tinstance = strings.Replace(instance, \"\\\\\", \"__\", -1)\n\n\t// use it to build the file name\n\tif prefix == \"\" {\n\t\tfileName = fmt.Sprintf(\"%s_%s_%s.status\", instance, class, id)\n\t} else {\n\t\tfileName = fmt.Sprintf(\"%s_%s_%s_%s.status\", prefix, instance, class, id)\n\t}\n\treturn fileName\n}", "func uniquePackageOf(fd *descriptor.FileDescriptorProto) string {\n\ts, ok := uniquePackageName[fd]\n\tif !ok {\n\t\tlog.Fatal(\"internal error: no package name defined for \" + fd.GetName())\n\t}\n\treturn s\n}", "func getForcedGetter(sourceUrl string) (string, string) {\n\tif matches := forcedRegexp.FindStringSubmatch(sourceUrl); matches != nil && len(matches) > 2 {\n\t\treturn matches[1], matches[2]\n\t}\n\n\treturn \"\", sourceUrl\n}", "func getFullyQualifiedFunctionName(fn interface{}) string {\n\treturn runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()\n}", "func TestEmptyPrewrite4A(t *testing.T) {\n}", "func internalStartsWith(str string, prefix string, ignoreCase bool) bool {\n\tif str == \"\" || prefix == \"\" {\n\t\treturn (str == \"\" && prefix == \"\")\n\t}\n\tif utf8.RuneCountInString(prefix) > utf8.RuneCountInString(str) {\n\t\treturn false\n\t}\n\tif ignoreCase {\n\t\treturn strings.HasPrefix(strings.ToLower(str), strings.ToLower(prefix))\n\t}\n\treturn strings.HasPrefix(str, prefix)\n}", "func TestGetEmpty4A(t *testing.T) {\n}", "func ExampleMustSqueezeTrytes() {}", "func getAliasId(name string, mountAccessor string, entityAliasList *map[string]EntityAlias) string {\n\tfor aliasID, alias := range *entityAliasList {\n\t\tif alias.Name == name && alias.MountAccessor == mountAccessor {\n\t\t\treturn aliasID\n\t\t}\n\t}\n\treturn \"\"\n}", "func getInternalParentPrefix(pkgName string) string {\n\tcleanedPath := filepath.Clean(pkgName)\n\texplodedPath := strings.Split(cleanedPath, string(os.PathSeparator))\n\n\ti := len(explodedPath) - 1\n\tfor ; i > 0; i-- {\n\t\tif explodedPath[i] == internal {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn filepath.Join(explodedPath[0:i]...)\n}", "func smallestGoodBase(n string) string {\n \n}", "func idFromName(name string) string {\n\ts := strings.Split(strings.ToLower(strings.TrimSpace(name)), \" \")\n\tns := strings.Join(s, \"-\")\n\ts = strings.Split(ns, \".\")\n\treturn strings.Join(s, \"-\")\n}", "func packageName(skip int) (long, short string, ok bool) {\n\t// Full function name looks like path/to/pkg.Func\n\tvar f string\n\t_, _, f, ok = fullCaller(skip + 1)\n\tif !ok {\n\t\treturn\n\t}\n\n\t// Strip down to path/to/pkg\n\tdot := strings.LastIndex(f, \".\")\n\tif dot == -1 {\n\t\treturn\n\t}\n\tlong = f[:dot]\n\n\t// Strip down to pkg\n\tslash := strings.LastIndex(long, \"/\")\n\tif slash == -1 {\n\t\treturn\n\t}\n\tshort = long[slash+1:]\n\treturn\n}", "func TestSinglePrewrite4A(t *testing.T) {\n}", "func getPathConversionFunction() func(string) string {\n\tif runtime.GOOS != \"windows\" || os.Getenv(\"DOCKER_MACHINE_NAME\") == \"\" {\n\t\treturn func(path string) string { return path }\n\t}\n\n\treturn func(path string) string {\n\t\treturn fmt.Sprintf(\"/%s%s\", strings.ToUpper(path[:1]), path[2:])\n\t}\n}", "func FullNameNakedReturn(f, l string) (full string, length int) {\n full = f + \" \" + l;\n length = len(full)\n return \n}", "func resolveSourcePrefix(source string, sa Source) string {\n\tif sa.Prefix == \"false\" || sa.Prefix == \"\" {\n\t\treturn \"\"\n\t} else if sa.Prefix == \"true\" {\n\t\treturn source + \"_\"\n\t} else {\n\t\treturn sa.Prefix + \"_\"\n\t}\n}", "func TestManifestAPI_Get_UnknownSchema(t *testing.T) {}", "func checkSafeNameChars(nameFragment string) error {\n\tfor i, ch := range nameFragment {\n\t\tswitch {\n\t\tcase 'a' <= ch && ch <= 'z':\n\t\tcase '0' <= ch && ch <= '9':\n\t\tcase ch == '_':\n\t\tdefault:\n\t\t\treturn fmt.Errorf(\"Name fragment is not safe: %x at %d.\", ch, i)\n\t\t}\n\t\t// NO: case ch == '.'\n\t\t// Could also allow at most one dot but not for SQLite.\n\t\t// Maybe would make sense for other SQL DBMS which\n\t\t// use schema names / namespaces.\n\t}\n\treturn nil\n}", "func isCommonRetryableErrorCode(err error) (bool, string) {\n\tgerr, ok := err.(*googleapi.Error)\n\tif !ok {\n\t\treturn false, \"\"\n\t}\n\n\tif gerr.Code == 429 || gerr.Code == 500 || gerr.Code == 502 || gerr.Code == 503 {\n\t\tlog.Printf(\"[DEBUG] Dismissed an error as retryable based on error code: %s\", err)\n\t\treturn true, fmt.Sprintf(\"Retryable error code %d\", gerr.Code)\n\t}\n\treturn false, \"\"\n}", "func goodFunction() {\n\treturn nil\n}", "func getCallerPackage() (string, bool) {\n\tvar pkg string\n\tpc, _, _, ok := runtime.Caller(2)\n\tif !ok {\n\t\treturn pkg, false\n\t}\n\tparts := strings.Split(runtime.FuncForPC(pc).Name(), \".\")\n\tif parts[len(parts)-2][0] == '(' {\n\t\tpkg = strings.Join(parts[0:len(parts)-2], \".\")\n\t} else {\n\t\tpkg = strings.Join(parts[0:len(parts)-1], \".\")\n\t}\n\treturn pkg, true\n}", "func _getFuncName() string {\n var ptrVal = _getFuncPtrVal()\n\n // Look up the function object\n var fun = runtime.FuncForPC(ptrVal)\n\n // returns: _/home/user/src/gohavenet/src.TestProcMgr_False\n var funcNamePath = fun.Name()\n\n // Split on the slash and return just the func name\n var pathElems = strings.Split(funcNamePath, \"/\")\n var index = len(pathElems) - 1\n if index < 0 {\n index = 0\n }\n\n return pathElems[index]\n}", "func getPatchVersionTrimmed(version string) string {\n\tendIndex := strings.LastIndex(version, \".\")\n\tif endIndex != -1 {\n\t\tversion = version[:endIndex]\n\t}\n\treturn version\n}", "func fixLegacyInventoryName(obj *unstructured.Unstructured) error {\n\tif obj.GetName() == legacyInvName {\n\t\tklog.V(4).Infof(\"renaming legacy inventory name\")\n\t\trandomSuffix := common.RandomStr()\n\t\treturn addSuffixToName(obj, randomSuffix)\n\t}\n\treturn nil\n}", "func callerName(skip int) (pkgPath, funcName string, ok bool) {\n\tvar pc [1]uintptr\n\tn := runtime.Callers(skip+1, pc[:])\n\tif n != 1 {\n\t\treturn \"\", \"\", false\n\t}\n\n\tf := runtime.FuncForPC(pc[0]).Name()\n\ts := pkgPathRe.FindStringSubmatch(f)\n\tif len(s) < 3 {\n\t\tpanic(fmt.Errorf(\"failed to extract package path and function name from %q\", f))\n\t}\n\n\treturn s[1], s[2], true\n}", "func getValidContainerName(volumeName, protocol string) string {\n\tcontainerName := strings.ToLower(volumeName)\n\tif len(containerName) > containerNameMaxLength {\n\t\tcontainerName = containerName[0:containerNameMaxLength]\n\t}\n\tif !checkContainerNameBeginAndEnd(containerName) || len(containerName) < containerNameMinLength {\n\t\t// now we set as 63 for maximum container name length\n\t\t// todo: get cluster name\n\t\tcontainerName = k8sutil.GenerateVolumeName(fmt.Sprintf(\"pvc-%s\", protocol), uuid.NewUUID().String(), 63)\n\t\tklog.Warningf(\"the requested volume name (%q) is invalid, so it is regenerated as (%q)\", volumeName, containerName)\n\t}\n\tcontainerName = strings.Replace(containerName, \"--\", \"-\", -1)\n\n\treturn containerName\n}", "func funcName() string {\n\tpc, _, _, _ := runtime.Caller(1)\n\tcompleteFuncname := runtime.FuncForPC(pc).Name()\n\treturn strings.Split(completeFuncname, \".\")[len(strings.Split(completeFuncname, \".\"))-1]\n}", "func ensureValidHelper(name string, funcValue reflect.Value) {\n\tif funcValue.Kind() != reflect.Func {\n\t\tpanic(fmt.Errorf(\"Helper must be a function: %s\", name))\n\t}\n\n\tfuncType := funcValue.Type()\n\n\tif funcType.NumOut() != 1 {\n\t\tpanic(fmt.Errorf(\"Helper function must return a string or a SafeString: %s\", name))\n\t}\n\n\t// @todo Check if first returned value is a string, SafeString or interface{} ?\n}", "func exactFunction() {\n\treturn nil\n}", "func TestUidForUsername(t *testing.T) {\n\tuid, err := uidForUsername(\"root\")\n\tif err != nil {\n\t\tt.Errorf(\"uidForUsername(\\\"root\\\") returned error: %v\", err)\n\t\treturn\n\t}\n\tif uid != 0 {\n\t\tt.Errorf(\"uidForUsername(\\\"root\\\") returned %d, should be 0\", uid)\n\t}\n\n\t_, err = uidForUsername(\"asdfASDFxxx999\")\n\tif err == nil {\n\t\tt.Errorf(\"uidForUsername(\\\"asdfASDFxxx\\\") did not return error\")\n\t\treturn\n\t}\n}", "func getGroupIdString(id interface{}) (gid string, err error) {\r\n\tswitch t := id.(type) {\r\n\tcase string:\r\n\t\tif strings.Contains(id.(string), \"http\") {\r\n\t\t\treturn \"url=\" + url.QueryEscape(id.(string)), nil // group url\r\n\t\t}\r\n\t\treturn id.(string), nil // group id as a string\r\n\tcase uint64:\r\n\t\treturn strconv.FormatUint(id.(uint64), 10), nil // group id as an int\r\n\tdefault:\r\n\t\treturn gid, errors.New(fmt.Sprintf(\"Group ID type exception: Expecting string or uint64 got %T\", t))\r\n\t}\r\n}", "func GoodEnoughUUID() string {\n\tb := make([]byte, 16)\n\t_, err := rand.Read(b)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tuuid := fmt.Sprintf(\"%x-%x-%x-%x-%x\",\n\t\tb[0:4], b[4:6], b[6:8], b[8:10], b[10:])\n\treturn uuid\n}", "func mustBeUnique(label string) {\n\n\tif _, ok := functions[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as function\", label))\n\t}\n\n\tif _, ok := variables[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as variable\", label))\n\t}\n\n\tif _, ok := aliases[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as alias\", label))\n\t}\n}", "func ensureDot(extension string) string {\n\tif strings.Index(extension, \".\") == -1 {\n\t\textension = \".\" + extension\n\t}\n\treturn extension\n}", "func getSafeString(input interface{}) string {\r\n\tvar safeValue string\r\n\tvar isOk bool\r\n\r\n\tif input == nil {\r\n\t\tsafeValue = \"\"\r\n\t} else {\r\n\t\tsafeValue, isOk = input.(string)\r\n\t\tif isOk == false {\r\n\t\t\tsafeValue = \"\"\r\n\t\t}\r\n\t}\r\n\treturn safeValue\r\n}", "func mustGetUUID() string {\n\tu, err := uuid.NewRandom()\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\treturn u.String()\n}", "func fn3() { // want fn3:`Deprecated: Don't use this\\.`\n}", "func ensurePrefix(s, prefix string) string {\n\tif !strings.HasPrefix(s, prefix) {\n\t\ts = prefix + s\n\t}\n\treturn s\n}", "func prepareHashPath(path, prefix string) string {\n\t// I need to strip the prefix. But... where does the prefix come from\n\treturn \"/\" + strings.TrimPrefix(path, prefix)\n}", "func pySafeName(nm string) string {\n\tif _, bad := pyKeywords[nm]; bad {\n\t\treturn \"my\" + nm\n\t}\n\treturn nm\n}", "func fullCaller(skip int) (file string, line int, fnc string, ok bool) {\n\tvar pc uintptr\n\tpc, file, line, ok = runtime.Caller(skip + 1)\n\tif !ok {\n\t\treturn\n\t}\n\n\tf := runtime.FuncForPC(pc)\n\tfnc = f.Name()\n\treturn\n}", "func getValidVersion(version string) string {\n\tif version != \"\" {\n\t\treturn version\n\t}\n\n\treturn \"Not Installed\"\n}", "func makeSafeFileName(s string) string {\n\tconst maxLen = 200 // slightly arbitrary but must be <= 254 for most modern filesystems\n\n\t// First, tidy the file path to a clean representation\n\tresult := filepath.Clean(s)\n\n\t// Next, split the path into elements between separators and check each element.\n\telements := filepath.SplitList(result)\n\tnewElements := []string{}\n\n\tfor _, element := range elements {\n\t\tnewElements = append(newElements, makeSafeFileElement(element))\n\t}\n\n\tresult = filepath.Join(newElements...)\n\n\t// Also avoid starting a file name with a period as this has a special meaning on UNIX\n\t// and UNIX-like systems.\n\tdir := filepath.Dir(result)\n\tbase := filepath.Base(result)\n\n\tif base[0] == '.' {\n\t\tresult = filepath.Join(dir, base[1:])\n\t}\n\n\t// Ensure the resulting name isn't too long, as X.509 distinguished names can be very long.\n\tif len(result) > maxLen {\n\t\tresult = result[:maxLen]\n\t}\n\n\treturn result\n}", "func TestDiskIOStats_diskName(t *testing.T) {\n\ttests := []struct {\n\t\ttemplates []string\n\t\texpected string\n\t}{\n\t\t{[]string{\"$MY_PARAM_1\"}, \"myval1\"},\n\t\t{[]string{\"${MY_PARAM_1}\"}, \"myval1\"},\n\t\t{[]string{\"x$MY_PARAM_1\"}, \"xmyval1\"},\n\t\t{[]string{\"x${MY_PARAM_1}x\"}, \"xmyval1x\"},\n\t\t{[]string{\"$MISSING\", \"$MY_PARAM_1\"}, \"myval1\"},\n\t\t{[]string{\"$MY_PARAM_1\", \"$MY_PARAM_2\"}, \"myval1\"},\n\t\t{[]string{\"$MISSING\"}, \"null\"},\n\t\t{[]string{\"$MY_PARAM_1/$MY_PARAM_2\"}, \"myval1/myval2\"},\n\t\t{[]string{\"$MY_PARAM_2/$MISSING\"}, \"null\"},\n\t}\n\n\tfor _, tc := range tests {\n\t\tfunc() {\n\t\t\ts := DiskIO{\n\t\t\t\tNameTemplates: tc.templates,\n\t\t\t}\n\t\t\tdefer setupNullDisk(t, &s, \"null\")() //nolint:revive // done on purpose, cleaning will be executed properly\n\t\t\tname, _ := s.diskName(\"null\")\n\t\t\trequire.Equal(t, tc.expected, name, \"Templates: %#v\", tc.templates)\n\t\t}()\n\t}\n}", "func pySafeArg(anm string, idx int) string {\n\tif anm == \"\" {\n\t\tanm = fmt.Sprintf(\"arg_%d\", idx)\n\t}\n\treturn pySafeName(anm)\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func TestAliasingRecursionInvalid(t *testing.T) {\n\t_, errs := PrototypeString(`alias x = x\n\t\tx`)\n\tgoutil.AssertNow(t, errs != nil, \"errs should not be nil\")\n}", "func getPackageName(f string) string {\n\tfor {\n\t\tlastPeriod := strings.LastIndex(f, \".\")\n\t\tlastSlash := strings.LastIndex(f, \"/\")\n\t\tif lastPeriod > lastSlash {\n\t\t\tf = f[:lastPeriod]\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn f\n}", "func getFunctionName(fn interface{}) string {\n\tname := runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()\n\n\t// Method above returns functions in the form : main.foo\n\tparts := strings.Split(name, \".\")\n\treturn parts[len(parts)-1]\n}", "func cleanUserName(userName string) string {\n\tuserName = strings.Replace(userName, \"-\", \"\", -1)\n\tuserName = strings.Replace(userName, \".\", \"\", -1)\n\tuserName = strings.Replace(userName, \"_\", \"\", -1)\n\treturn strings.ToLower(userName)\n}", "func CheckIDFormat(ComponentID string) bool {\n if len(ComponentID) != 9 {\n // check the length of the ComponentID is nine\n return false\n } else if _, err := strconv.Atoi(ComponentID); err != nil {\n // check the ComponentID are all digits\n return false\n } else {\n // now everything looks fine\n return true\n }\n}", "func getSinglePath(v interface{}) (string, error) {\n\tif name, err := resourceName(v); err != nil {\n\t\treturn \"\", err\n\t} else if id, err := resourceId(v); err != nil {\n\t\treturn \"\", err\n\t} else {\n\t\treturn fmt.Sprintf(\"%s(%d)\", name, id), nil\n\t}\n}", "func getUserIdString(id string) (uid string) {\r\n\tif id == \"~\" || id == \"\" {\r\n\t\treturn \"~\" // me\r\n\t} else if strings.Contains(id, \"http\") {\r\n\t\treturn \"url=\" + url.QueryEscape(id) // someone else\r\n\t} else {\r\n\t\treturn \"id=\" + id // someone else's url\r\n\t}\r\n}", "func OldGetAnnotation(c, name string) string {\n\tprefix := fmt.Sprintf(\"+%s:\", name)\n\tif strings.HasPrefix(c, prefix) {\n\t\treturn strings.TrimPrefix(c, prefix)\n\t}\n\treturn \"\"\n}", "func TestPrewriteMultiple4A(t *testing.T) {\n}", "func TestSanitizedName(t *testing.T) {\n\ttables := []struct {\n\t\tbadPath string\n\t\tgoodPath string\n\t}{\n\t\t{\"\\\\..\\\\1.txt\", \"1.txt\"},\n\t\t{\"///foo/bar\", \"foo/bar\"},\n\t\t{\"C:/loo/bar2\", \"loo/bar2\"},\n\t\t{\"C:\\\\loo\\\\bar2\", \"loo\\\\bar2\"},\n\t\t{\"../../foo../../ba..r\", \"foo../ba..r\"},\n\t\t{\"../my.file\", \"my.file\"},\n\t}\n\tfor _, table := range tables {\n\t\tfixedPath := sanitizedName(table.badPath)\n\t\tif fixedPath != table.goodPath {\n\t\t\tt.Errorf(\"expected and fixedPath didn't match - %s : %s\", table.goodPath, fixedPath)\n\t\t}\n\t}\n}", "func getReqNameId(reqIIdList []cres.IID, driverNameId string) string {\n\tfor _, iid := range reqIIdList {\n\t\tif iid.SystemId == driverNameId {\n\t\t\treturn iid.NameId\n\t\t}\n\t}\n\treturn \"\"\n}", "func getAbsoluteURL(item *string, original_item string, url *url.URL) {\n var domain string = strings.Join(strings.Split(url.String(), \"/\")[:3], \"/\")\n if (strings.HasPrefix(*item, \"/\")) {\n if (strings.HasSuffix(url.String(), \"/\")) {\n *item = domain + (*item)[1:]\n } else {\n *item = domain + *item\n }\n utils.Log.Printf(\"[*] Modified item for URL for %s. Transformed from %s to %s\\n\", url, original_item, *item)\n }\n\n if (strings.HasPrefix(url.String(), \" \")) {\n *item = (*item)[1:]\n utils.Log.Printf(\"[*] Modified %s. Removed space from %s on %s\\n\", *item, original_item, url)\n }\n\n\n}", "func TestSimpleParser_baseUrl_err(t *testing.T) {\n\tif baseUrl(\"1234\") != \"1234\" {\n\t\tt.Logf(\"baseUrl method is expected to return original link on error\")\n\t\tt.FailNow()\n\t}\n}", "func notTested() string {\n\treturn \"This function isn't tested!\"\n}", "func asSupportedParameter(param string) (string, bool) {\n\tlower := strings.ToLower(param)\n\treturn lower, lowerCaseParameters[lower]\n}", "func getUID(lib utils.PathIdentifier) string {\n\treturn lib.Key()[:5]\n}", "func getFullName()(string, string) {\n\treturn \"Ninja\", \"Coder\"\n}", "func LegacyOrigin(parts ...string) (ret string) {\n\tfor index, i := range parts {\n\t\tret += i\n\t\tif index < len(parts)-1 {\n\t\t\tret += LegacyOriginSeparator\n\t\t}\n\t}\n\treturn\n}", "func generateUUID() string {\n uuid4, _ := uuid.NewV4()\n return uuid4.String()\n}", "func shadowedByParam2() (math string, fmt int) { return }", "func getInternalMountPath(workingMountDir string, vol *smbVolume) string {\n\tif vol == nil {\n\t\treturn \"\"\n\t}\n\tmountDir := vol.uuid\n\tif vol.uuid == \"\" {\n\t\tmountDir = vol.subDir\n\t}\n\treturn filepath.Join(workingMountDir, mountDir)\n}", "func wrapClientID(clientID string) string {\n\thostname, err := os.Hostname()\n\tif err != nil {\n\t\thostname = \"<error>\"\n\t}\n\n\t// Replace all non-alphanumeric chars with something benign that will work in the client id.\n\tre := regexp.MustCompile(\"[^a-zA-Z0-9]+\")\n\thostname = re.ReplaceAllString(hostname, \"-\")\n\n\t// Special case for running locally, add random\n\tif runtime.GOOS == \"darwin\" {\n\t\thostname += strconv.Itoa(rand.Intn(100))\n\t\treturn fmt.Sprintf(\"%s-%s\", clientID, hostname)\n\t}\n\treturn fmt.Sprintf(\"%s-%s\", clientID, hostname)\n}", "func getShorterString(a string, b string) int {\n\tif len(a) <= len(b) {\n\t\treturn len(a)\n\t}\n\treturn len(b)\n}", "func callerShortfile(file string, lastsep_ ...rune) string {\n\tlastsep := '/'\n\tif len(lastsep_) > 0 {\n\t\tlastsep = lastsep_[0]\n\t}\n\tshort := file\n\tfor i := len(file) - 1; i > 0; i-- {\n\t\tif file[i] == byte(lastsep) {\n\t\t\tshort = file[i+1:]\n\t\t\tbreak\n\t\t}\n\t}\n\treturn short\n}", "func unqualify(importPath string) string {\n\tif i := strings.LastIndex(importPath, sep); i != -1 {\n\t\timportPath = importPath[i+len(sep):]\n\t}\n\treturn importPath\n}", "func Test_HasPrefix(t *testing.T) {\n\tvalue := \"main.go\"\n\tprefix := \"main\"\n\tif !strings.HasPrefix(value, prefix) {\n\t\tt.Fatalf(\"expected %s to have prefix %s\", value, prefix)\n\t}\n}", "func cleancompstr(cleanup string) string {\n\tcleanup = strings.TrimSpace(cleanup)\n\tcleanup = strings.ToLower(cleanup)\n\treturn cleanup\n}", "func badTemper(string, string) (*os.File, error) {\n\treturn nil, fmt.Errorf(\"oups\")\n}", "func (d *Abstraction) getGeneratedName(s string, m string) string {\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(s)\n\tbuffer.WriteString(\".\")\n\tbuffer.WriteString(m)\n\treturn buffer.String()\n}", "func helper(k string) interface{} {\n\treturn k\n}", "func getUsername() string {\n\tlog.Debug(\"getUsername\")\n\tu := \"unknown\"\n\tosUser := \"\"\n\n\tswitch runtime.GOOS {\n\tcase \"darwin\", \"linux\", \"solaris\":\n\t\tosUser = os.Getenv(\"USER\")\n\tcase \"windows\":\n\t\tosUser = os.Getenv(\"USERNAME\")\n\n\t\t// remove domain\n\t\tosUser = osUser[strings.LastIndex(osUser, \"\\\\\")+1:]\n\t\tlog.Debugf(\"Windows user has been transformed into %s\", osUser)\n\n\t\t// HACK ugly ... if localized administrator, translate to administrator\n\t\tif isWinAdministrator(osUser) {\n\t\t\tosUser = \"Administrator\"\n\t\t}\n\t}\n\n\tif osUser != \"\" {\n\t\tu = osUser\n\t}\n\treturn u\n}", "func getCaller(skip int, shortFileName bool) string {\n\tvar b strings.Builder\n\t_, file, no, ok := runtime.Caller(skip)\n\tif ok {\n\t\tif shortFileName {\n\t\t\tif lastSlashIndex := strings.LastIndex(file, \"/\"); lastSlashIndex != -1 {\n\t\t\t\tfile = file[lastSlashIndex+1:]\n\t\t\t}\n\t\t}\n\t\tfmt.Fprintf(&b, \"%s:%d\", file, no)\n\t}\n\treturn b.String()\n}", "func ensureTrailingDot(details string) string {\n\tif !strings.HasSuffix(details, \".\") {\n\t\treturn fmt.Sprintf(\"%s.\", details)\n\t}\n\treturn details\n}", "func isBadVersion(version int) bool{\n\treturn true\n}", "func TestGetWrongUUID(t *testing.T) {\n\tclearTable()\n nt := New{{.NameExported}}()\n add{{.NameExported}}(nt)\n badUid := \"00000000-d01d-4c09-a4e7-59026d143b89\"\n\n\tstatement := fmt.Sprintf({{.NameExported}}URL, badUid)\n\n\treq, _ := http.NewRequest(\"GET\", statement, nil)\n\tresponse := executeRequest(req)\n\n\tcheckResponseCode(t, http.StatusNotFound, response.Code)\n}", "func LegacyInstanceObjectID(obj *ResourceInstanceObjectSrc) string {\n\tif obj == nil {\n\t\treturn \"<not created>\"\n\t}\n\n\tif obj.AttrsJSON != nil {\n\t\ttype WithID struct {\n\t\t\tID string `json:\"id\"`\n\t\t}\n\t\tvar withID WithID\n\t\terr := json.Unmarshal(obj.AttrsJSON, &withID)\n\t\tif err == nil {\n\t\t\treturn withID.ID\n\t\t}\n\t} else if obj.AttrsFlat != nil {\n\t\tif flatID, exists := obj.AttrsFlat[\"id\"]; exists {\n\t\t\treturn flatID\n\t\t}\n\t}\n\n\t// For resource types created after we removed id as special there may\n\t// not actually be one at all. This is okay because older tests won't\n\t// encounter this, and new tests shouldn't be using ids.\n\treturn \"<none>\"\n}", "func getErrOrigin() string {\n\tvar origin string\n\tif pc, file, line, ok := runtime.Caller(2); ok {\n\t\tif f := runtime.FuncForPC(pc); f != nil {\n\t\t\tif wd, err := os.Getwd(); err == nil {\n\t\t\t\torigin = fmt.Sprintf(\"%s %s:%d\", strings.TrimPrefix(f.Name(), pkgPath), strings.TrimPrefix(file, wd+string(os.PathSeparator)), line)\n\t\t\t}\n\t\t}\n\t}\n\treturn origin\n}", "func (objectIDs *DbObjectIDs) getUniqueID() (string, error) {\n\tid := objectIDs.ownerControllerName + \":\" + string(objectIDs.idsType.ownerObjectType)\n\tfor _, key := range objectIDs.idsType.GetExternalIDKeys() {\n\t\tvalue, ok := objectIDs.objectIDs[key]\n\t\tif !ok {\n\t\t\treturn \"\", fmt.Errorf(\"key %v is required but not present\", key)\n\t\t}\n\t\tid += \":\" + value\n\t}\n\treturn id, nil\n}", "func getCallPriorityID(strPriorityName string, espXmlmc *apiLib.XmlmcInstStruct, buffer *bytes.Buffer) (string, string) {\n\tpriorityID := \"\"\n\tif swImportConf.PriorityMapping[strPriorityName] != nil {\n\t\tstrPriorityName = fmt.Sprintf(\"%s\", swImportConf.PriorityMapping[strPriorityName])\n\t\tif strPriorityName != \"\" {\n\t\t\tpriorityID = getPriorityID(strPriorityName, espXmlmc, buffer)\n\t\t}\n\t}\n\treturn priorityID, strPriorityName\n}" ]
[ "0.54382825", "0.537262", "0.5215815", "0.5027418", "0.4975398", "0.49496406", "0.48785368", "0.48031178", "0.4786201", "0.47657558", "0.47629273", "0.47359633", "0.47222048", "0.47043297", "0.47027624", "0.46904278", "0.46901387", "0.46885514", "0.46665755", "0.46659398", "0.46592057", "0.46564803", "0.46520862", "0.46506956", "0.4650385", "0.46303272", "0.46296483", "0.4629173", "0.4628825", "0.46284923", "0.4625966", "0.4624669", "0.46244738", "0.4619596", "0.46129894", "0.46062362", "0.4603694", "0.46027172", "0.46010837", "0.45992196", "0.4595422", "0.45953396", "0.45938143", "0.45878768", "0.45863846", "0.45860708", "0.45778158", "0.45708576", "0.4562223", "0.45579806", "0.45571515", "0.45400572", "0.4538702", "0.45375508", "0.45348978", "0.4533087", "0.4532056", "0.45305866", "0.45279145", "0.45279145", "0.45279145", "0.45279145", "0.45227525", "0.4520747", "0.45180294", "0.45163244", "0.45158538", "0.45143905", "0.45078984", "0.44996935", "0.44993386", "0.4499218", "0.44967684", "0.44954318", "0.44913954", "0.44851273", "0.44821027", "0.4480578", "0.4480466", "0.44804257", "0.4477861", "0.44712496", "0.44705343", "0.44680944", "0.44623426", "0.44565588", "0.4452436", "0.44511658", "0.44499886", "0.44494784", "0.44493905", "0.4445965", "0.44443068", "0.44378096", "0.4436986", "0.44309473", "0.44284478", "0.44276965", "0.44272083", "0.44260067", "0.44246325" ]
0.0
-1
Lists all static routes
func (s *VPCService) ListStaticRoutes(p *ListStaticRoutesParams) (*ListStaticRoutesResponse, error) { resp, err := s.cs.newRequest("listStaticRoutes", p.toURLValues()) if err != nil { return nil, err } var r ListStaticRoutesResponse if err := json.Unmarshal(resp, &r); err != nil { return nil, err } return &r, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (d *Dispatcher) Static(w http.ResponseWriter, r *http.Request) {\n\tfor prefix, staticDir := range d.Router.StaticRoutes {\n\t\tif strings.HasPrefix(r.URL.Path, prefix) {\n\t\t\tfile := staticDir + r.URL.Path[len(prefix):]\n\t\t\thttp.ServeFile(w, r, file)\n\t\t\td.found = true\n\t\t}\n\t}\n}", "func (o *AggregatedDomain) StaticRoutes(info *bambou.FetchingInfo) (StaticRoutesList, *bambou.Error) {\n\n\tvar list StaticRoutesList\n\terr := bambou.CurrentSession().FetchChildren(o, StaticRouteIdentity, &list, info)\n\treturn list, err\n}", "func (group *RouterGroup) Static(relativePath, root string) IRoutes {\n\treturn group.StaticFS(relativePath, Dir(root, false))\n}", "func (m *RouteMux) Static(pattern string, dir string) {\n\t//append a regex to the param to match everything\n\t// that comes after the prefix\n\tpattern = pattern + \"(.+)\"\n\tm.AddRoute(GET, pattern, func(w http.ResponseWriter, r *http.Request) {\n\t\tpath := filepath.Clean(r.URL.Path)\n\t\tpath = filepath.Join(dir, path)\n\t\thttp.ServeFile(w, r, path)\n\t})\n}", "func (group *RouterGroup) Static(relativePath string, root string) {\n\tpattern := path.Join(relativePath, \"/*filepath\") // custom parameter name\n\thandler := group.createStaticHandler(relativePath, http.Dir(root))\n\tgroup.GET(pattern, handler)\n}", "func LoadRoutes() {\n\tchat.Load()\n\tstatic.Load()\n\n\t//fs := http.FileServer(http.Dir(\"asset/static\"))\n\t//http.Handle(\"/static/\", http.StripPrefix(\"/static/\", fs))\n}", "func Routes(g *echo.Group) {\n\tg.Add(\"GET\", \"/css/optimize/*\", Optimize)\n}", "func (g *RouterGroup) Static(relativePath string, root string) {\n\thandler := g.CreateStaticHandler(relativePath, http.Dir(root))\n\turlPattern := path.Join(relativePath, \"/*filepath\")\n\tg.GET(urlPattern, handler)\n}", "func (s *Server) Routes() http.Handler {\n\trouter := mux.NewRouter()\n\trouter.HandleFunc(\"/\", s.IndexHandler).Methods(\"GET\")\n\trouter.PathPrefix(\"/static/\").Handler(http.StripPrefix(\"/static/\", CacheControl(http.FileServer(http.Dir(\"static\")))))\n\treturn Logging(router)\n}", "func (rg *RouteGroup) Static(path string, dir string) *Route {\n\treturn rg.Any(path, func(c *Context) error {\n\t\tif c.Request.Method != \"GET\" && c.Request.Method != \"HEAD\" {\n\t\t\treturn NewHTTPError(http.StatusMethodNotAllowed)\n\t\t}\n\t\tfilePath := \"\"\n\t\turlPath := c.Request.URL.Path\n\t\tprefix := strings.TrimSuffix(path, \"/*\")\n\t\tif strings.HasPrefix(urlPath, prefix) {\n\t\t\tfilePath = filepath.Join(dir, urlPath[len(prefix):])\n\t\t}else{\n\t\t\treturn NewHTTPError(http.StatusNotFound)\n\t\t}\n\t\tfile, err := os.Open(filePath)\n\t\tif err != nil {\n\t\t\treturn NewHTTPError(http.StatusNotFound, err.Error())\n\t\t}\n\t\tdefer file.Close()\n\t\tfstat, err := file.Stat()\n\t\tif err != nil {\n\t\t\treturn NewHTTPError(http.StatusNotFound, err.Error())\n\t\t} else if fstat.IsDir() {\n\t\t\treturn NewHTTPError(http.StatusNotFound)\n\t\t}\n\t\thttp.ServeContent(c.Response, c.Request, filePath, fstat.ModTime(), file)\n\t\treturn nil\n\t})\n}", "func (r *Router) Static(url, rootPath string) *Path {\n\treturn r.StaticCustom(url, &StaticFS{\n\t\tRoot: rootPath,\n\t\tIndexNames: []string{\"index.html\"},\n\t\tGenerateIndexPages: true,\n\t\tAcceptByteRange: true,\n\t})\n}", "func ListRoutesHandler(res http.ResponseWriter, req *http.Request) {\n\tpaths := \"paths: / , cpu , newmem , pet , pupulate , depupulate\"\n\tmessageResponseJSON(res, http.StatusOK, paths)\n\treturn\n}", "func GetRoutes() *httprouter.Router {\n\trouter := httprouter.New()\n\t///////////////////////////////////////////////////////////\n\t// Main application routes\n\t///////////////////////////////////////////////////////////\n\n\tapplication := controllers.Application{}\n\trouter.GET(\"/\", route(application.Index))\n\trouter.GET(\"/api/products\", route(application.AllProducts))\n\trouter.GET(\"/api/products/match\", route(application.Match))\n\n\t///////////////////////////////////////////////////////////\n\t// Static routes\n\t// Caching Static files\n\t///////////////////////////////////////////////////////////\n\tfileServer := http.FileServer(http.Dir(\"public\"))\n\trouter.GET(\"/static/*filepath\", gzip.Middleware(func(res http.ResponseWriter, req *http.Request, pm httprouter.Params) {\n\t\tres.Header().Set(\"Vary\", \"Accept-Encoding\")\n\t\tres.Header().Set(\"Cache-Control\", \"public, max-age=7776000\")\n\t\treq.URL.Path = pm.ByName(\"filepath\")\n\t\tfileServer.ServeHTTP(res, req)\n\t}))\n\treturn router\n}", "func (group *RouterGroup) StaticFS(relativePath string, fs http.FileSystem) IRoutes {\n\tif strings.Contains(relativePath, \":\") || strings.Contains(relativePath, \"*\") {\n\t\tpanic(\"URL parameters can not be used when serving a static folder\")\n\t}\n\thandler := group.createStaticHandler(relativePath, fs)\n\turlPattern := path.Join(relativePath, \"/*filepath\")\n\n\t// Register GET and HEAD handlers\n\tgroup.GET(urlPattern, handler)\n\tgroup.HEAD(urlPattern, handler)\n\treturn group.returnObj()\n}", "func (m *Mux) staticRoute(rw http.ResponseWriter, req *http.Request) bool {\n\tfor _, s := range m.Routes[static] {\n\t\tif len(req.URL.Path) >= s.Size {\n\t\t\tif req.URL.Path[:s.Size] == s.Path {\n\t\t\t\ts.Handler.ServeHTTP(rw, req)\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t}\n\treturn false\n}", "func (group *RouterGroup) Static(staticpath string) {\n\tgroup.engine.AddStaticPath(group.pathNoLeadingSlash(staticpath))\n\tstaticpath = filepath.Join(staticpath, \"/*filepath\")\n\tgroup.Handle(&Route{\"GET\", staticpath, []HandlerFunc{group.handleStatic}})\n\tgroup.Handle(&Route{\"HEAD\", staticpath, []HandlerFunc{group.handleStatic}})\n}", "func (sh ServerHandler) DefineStaticRoute(r *mux.Router) {\n\tr.Methods(\"GET\").PathPrefix(\"/static/\").HandlerFunc(sh.serveStatic)\n}", "func getRoutes() {\n\tv1 := router.Group(\"/v1\")\n\taddUserRoutes(v1)\n\taddPingRoutes(v1)\n\n\tv2 := router.Group(\"/v2\")\n\taddPingRoutes(v2)\n}", "func (serv *Server) Static(urlPrefix, root string) {\n\tif strings.Contains(urlPrefix, \":\") || strings.Contains(urlPrefix, \"*\") {\n\t\tpanic(\"URL parameters can not be used when serving a static folder\")\n\t}\n\thandler := func(c *Context) {\n\t\t// Open file\n\t\tfpath := strings.TrimPrefix(c.Request.URL.Path, urlPrefix)\n\t\tf, fi, err := openFile(filepath.Join(root, fpath))\n\n\t\tif err != nil {\n\t\t\tif os.IsNotExist(err) {\n\t\t\t\tdefault404Handler(c)\n\t\t\t} else {\n\t\t\t\tc.Error(err)\n\t\t\t\tc.Writer.WriteHeader(http.StatusInternalServerError)\n\t\t\t\tc.Writer.WriteString(\"500 internal server error\")\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t\tdefer f.Close()\n\t\thttp.ServeContent(c.Writer, c.Request, fi.Name(), fi.ModTime(), f)\n\t\treturn\n\t}\n\n\turl := path.Join(urlPrefix, \"/*filepath\")\n\t// Register GET and HEAD handlers\n\tserv.GET(url, handler)\n\tserv.HEAD(url, handler)\n\treturn\n}", "func Routes() {\n\trouter.HandleFunc(\"/\", homeLink)\n\trouter.HandleFunc(\"/intstorage\", intStore)\n}", "func Routes(store Storager) {\n\thttp.HandleFunc(\"/\", func(w http.ResponseWriter, r *http.Request) {\n\t\tHandleRootReuest(w, r, store)\n\t})\n}", "func DumpStaticRoutes(log logging.Logger, vppChan govppapi.Channel, timeLog measure.StopWatchEntry) ([]*vppcalls.Route, error) {\n\t// IPFibDump time measurement\n\tstart := time.Now()\n\tdefer func() {\n\t\tif timeLog != nil {\n\t\t\ttimeLog.LogTimeEntry(time.Since(start))\n\t\t}\n\t}()\n\n\tvar routes []*vppcalls.Route\n\n\t// Dump IPv4 l3 FIB.\n\treqCtx := vppChan.SendMultiRequest(&l3ba.IPFibDump{})\n\tfor {\n\t\tfibDetails := &l3ba.IPFibDetails{}\n\t\tstop, err := reqCtx.ReceiveReply(fibDetails)\n\t\tif stop {\n\t\t\tbreak // Break from the loop.\n\t\t}\n\t\tif err != nil {\n\t\t\tlog.Error(err)\n\t\t\treturn nil, err\n\t\t}\n\t\tif len(fibDetails.Path) > 0 && fibDetails.Path[0].IsDrop == 1 {\n\t\t\t// skip drop routes, not supported by vpp-agent\n\t\t\tcontinue\n\t\t}\n\t\tipv4Route, err := dumpStaticRouteIPv4Details(fibDetails)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\troutes = append(routes, ipv4Route)\n\t}\n\n\t// Dump IPv6 l3 FIB.\n\treqCtx = vppChan.SendMultiRequest(&l3ba.IP6FibDump{})\n\tfor {\n\t\tfibDetails := &l3ba.IP6FibDetails{}\n\t\tstop, err := reqCtx.ReceiveReply(fibDetails)\n\t\tif stop {\n\t\t\tbreak // break out of the loop\n\t\t}\n\t\tif err != nil {\n\t\t\tlog.Error(err)\n\t\t\treturn nil, err\n\t\t}\n\t\tif len(fibDetails.Path) > 0 && fibDetails.Path[0].IsDrop == 1 {\n\t\t\t// skip drop routes, not supported by vpp-agent\n\t\t\tcontinue\n\t\t}\n\t\tipv6Route, err := dumpStaticRouteIPv6Details(fibDetails)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\troutes = append(routes, ipv6Route)\n\t}\n\n\treturn routes, nil\n}", "func (group *RouterGroup) Static(p, root string) {\n\tp = path.Join(p, \"/*filepath\")\n\tfileServer := http.FileServer(http.Dir(root))\n\n\tgroup.GET(p, func(c *Context) {\n\t\toriginal := c.Request.URL.Path\n\t\tc.Request.URL.Path = c.Params.ByName(\"filepath\")\n\n\t\twriter := c.Writer\n\n\t\theaders := writer.Header()\n\n\t\t// in production environment static content needs to be cached by browsers & proxies\n\t\tif Env == Prod {\n\t\t\t// cache for 3 months\n\t\t\theaders.Set(\"Expires\", time.Now().AddDate(0, 3, 0).Format(http.TimeFormat))\n\n\t\t\theaders.Add(\"Cache-Control\", \"public\")\n\t\t\theaders.Add(\"Cache-Control\", \"max-age=28771200\")\n\t\t}\n\n\t\tfileServer.ServeHTTP(writer, c.Request)\n\t\tc.Request.URL.Path = original\n\t})\n}", "func (instance *Instance) RenderRoutes() {\n instance.routeBuilder.RenderRoutes(instance)\n}", "func (r Plugin) All() []RouteInfo {\n\treturn r.routes\n}", "func (res *Resource) List(storage store.List) {\n\tres.HandleFuncC(\n\t\tpat.Get(patRoot),\n\t\tfunc(ctx context.Context, w http.ResponseWriter, r *http.Request) {\n\t\t\tres.listHandler(ctx, w, r, storage)\n\t\t},\n\t)\n\n\tres.addRoute(get, patRoot)\n}", "func (app *App) Static(url string) {\n\tapp.craterRequestHandler.handleStatic(regexp.MustCompile(\"^\"+url), url, http.Dir(app.settings.StaticPath))\n}", "func (m *Macross) Static(prefix, root string) {\n\tif prefix == \"/\" {\n\t\tprefix = prefix + \"*\"\n\t} else if len(prefix) > 1 {\n\t\tif prefix[:1] != \"/\" {\n\t\t\tprefix = prefix + \"/*\"\n\t\t} else {\n\t\t\tprefix = prefix + \"*\"\n\t\t}\n\t}\n\tm.Get(prefix, func(c *Context) error {\n\t\treturn c.ServeFile(path.Join(root, c.Parameter(0)))\n\t})\n}", "func (d *DHCPv4) ClasslessStaticRoute() []*Route {\n\tv := d.Options.Get(OptionClasslessStaticRoute)\n\tif v == nil {\n\t\treturn nil\n\t}\n\tvar routes Routes\n\tif err := routes.FromBytes(v); err != nil {\n\t\treturn nil\n\t}\n\treturn routes\n}", "func Static(w http.ResponseWriter, r *http.Request) {\n\tpath, _ := os.Getwd()\n\tpath = filepath.Join(path, \"web/static\")\n\n\thttp.StripPrefix(\n\t\t\"/static/\",\n\t\thttp.FileServer(http.Dir(path)),\n\t).ServeHTTP(w, r)\n}", "func (rout *RoutServeMux) ServeStaticFiles(folderName string) {\n\trout.assign(\"GET\", `/`+folderName+`/`,\n\t\trout.HFM(http.StripPrefix(`/`+folderName+`/`,\n\t\t\thttp.FileServer(http.Dir(`./`+folderName+`/`)))))\n}", "func Static(w http.ResponseWriter, r *http.Request) {\n http.ServeFile(w, r, r.URL.Path[1:])\n}", "func staticHandler(w http.ResponseWriter, r *http.Request) {\n\tvar path string\n\tif strings.HasSuffix(r.URL.Path, \"/\") {\n\t\tpath = r.URL.Path + \"index.html\"\n\t} else {\n\t\tpath = r.URL.Path\n\t}\n\thttp.ServeFile(w, r, \"static/\"+path)\n}", "func LoadRoutes() {\n\tabout.Load()\n\tdebug.Load()\n\tregister.Load()\n\tlogin.Load()\n\thome.Load()\n\tstatic.Load()\n\tstatus.Load()\n\tnotepad.Load()\n\tfabric.Load()\n}", "func (s *Server) GetRoutes() []Route {\n\treturn []Route{\n\t\tRoute{\n\t\t\tService: \"dapi\",\n\t\t\tName: \"index\",\n\t\t\tPath: \"/\",\n\t\t\tMethod: \"GET\",\n\t\t\tAuth: false,\n\t\t\tHandlerFunc: s.GetIndex,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dapi\",\n\t\t\tName: \"docs\",\n\t\t\tPath: \"/docs\",\n\t\t\tMethod: \"GET\",\n\t\t\tAuth: false,\n\t\t\tHandlerFunc: s.GetDocs,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dapi\",\n\t\t\tName: \"icon\",\n\t\t\tPath: \"/favicon.ico\",\n\t\t\tMethod: \"GET\",\n\t\t\tAuth: false,\n\t\t\tHandlerFunc: s.GetIcon,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"GetTokens\",\n\t\t\tPath: \"/dauth/tokens\",\n\t\t\tMethod: \"GET\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.GetTokens,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"GetTokens\",\n\t\t\tPath: \"/dauth/tokens/{id}\",\n\t\t\tMethod: \"GET\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.GetTokenByID,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"SaveTokens\",\n\t\t\tPath: \"/dauth/tokens\",\n\t\t\tMethod: \"POST\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.PostTokens,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"SaveTokens\",\n\t\t\tPath: \"/dauth/tokens/{id}\",\n\t\t\tMethod: \"PUT\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.PutTokenByID,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"DeleteTokens\",\n\t\t\tPath: \"/dauth/tokens/old\",\n\t\t\tMethod: \"DELETE\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.DeleteTokensOld,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"DeleteTokens\",\n\t\t\tPath: \"/dauth/tokens/old/{age}\",\n\t\t\tMethod: \"DELETE\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.DeleteTokensOld,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"DeleteTokens\",\n\t\t\tPath: \"/dauth/tokens/{id}\",\n\t\t\tMethod: \"DELETE\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.DeleteTokenByID,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"DeleteTokens\",\n\t\t\tPath: \"/dauth/tokens}\",\n\t\t\tMethod: \"DELETE\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.DeleteTokens,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"GetUsers\",\n\t\t\tPath: \"/dauth/users\",\n\t\t\tMethod: \"GET\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.GetUsers,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"GetUsers\",\n\t\t\tPath: \"/dauth/users/{id}\",\n\t\t\tMethod: \"GET\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.GetUserByID,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"SaveUsers\",\n\t\t\tPath: \"/dauth/users\",\n\t\t\tMethod: \"POST\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.PostUsers,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"SaveUsers\",\n\t\t\tPath: \"/dauth/users/{id}\",\n\t\t\tMethod: \"PUT\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.PutUserByID,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"DeleteUsers\",\n\t\t\tPath: \"/dauth/users/{id}\",\n\t\t\tMethod: \"DELETE\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.DeleteUserByID,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"DeleteUsers\",\n\t\t\tPath: \"/dauth/users\",\n\t\t\tMethod: \"DELETE\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.DeleteUsers,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"GetPerms\",\n\t\t\tPath: \"/dauth/perms\",\n\t\t\tMethod: \"GET\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.GetPerms,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"GetPerms\",\n\t\t\tPath: \"/dauth/perms/{id}\",\n\t\t\tMethod: \"GET\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.GetPermByID,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"SavePerms\",\n\t\t\tPath: \"/dauth/perms\",\n\t\t\tMethod: \"POST\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.PostPerms,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"SavePerms\",\n\t\t\tPath: \"/dauth/perms/{id}\",\n\t\t\tMethod: \"PUT\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.PutPermByID,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"DeletePerms\",\n\t\t\tPath: \"/dauth/perms/{id}\",\n\t\t\tMethod: \"DELETE\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.DeletePermByID,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"DeletePerms\",\n\t\t\tPath: \"/dauth/perms\",\n\t\t\tMethod: \"DELETE\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.DeletePerms,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"GetUserPerms\",\n\t\t\tPath: \"/dauth/userperms\",\n\t\t\tMethod: \"GET\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.GetUserPerms,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"GetUserPerms\",\n\t\t\tPath: \"/dauth/userperms/{id}\",\n\t\t\tMethod: \"GET\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.GetUserPermByID,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"SaveUserPerms\",\n\t\t\tPath: \"/dauth/userperms\",\n\t\t\tMethod: \"POST\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.PostUserPerms,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"SaveUserPerms\",\n\t\t\tPath: \"/dauth/userperms/{id}\",\n\t\t\tMethod: \"PUT\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.PutUserPermByID,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"DeleteUserPerms\",\n\t\t\tPath: \"/dauth/userperms/{id}\",\n\t\t\tMethod: \"DELETE\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.DeleteUserPermByID,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"DeleteUserPerms\",\n\t\t\tPath: \"/dauth/userperms\",\n\t\t\tMethod: \"DELETE\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.DeleteUserPerms,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"Auth\",\n\t\t\tPath: \"/dauth/auth\",\n\t\t\tMethod: \"GET\",\n\t\t\tAuth: true,\n\t\t\tHandlerFunc: s.Authenticate,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"Login\",\n\t\t\tPath: \"/dauth/login\",\n\t\t\tMethod: \"POST\",\n\t\t\tAuth: false,\n\t\t\tHandlerFunc: s.Login,\n\t\t},\n\t\tRoute{\n\t\t\tService: \"dauth\",\n\t\t\tName: \"Logout\",\n\t\t\tPath: \"/dauth/logout\",\n\t\t\tMethod: \"POST\",\n\t\t\tAuth: false,\n\t\t\tHandlerFunc: s.Logout,\n\t\t},\n\t}\n}", "func Static(opts *Options) macaron.Handler {\n\topts.FileSystem = Assets\n\t// we don't need to pass the directory, because the directory var is only\n\t// used when in the options there is no FileSystem.\n\treturn opts.staticHandler(\"\")\n}", "func AllRoutes() *mux.Router {\n\tvar AllRoutes = mux.NewRouter()\n\tAllRoutes.HandleFunc(\"/songs\", authMidware(songList)).Methods(\"GET\")\n\tAllRoutes.HandleFunc(\"/song/{id}\", authMidware(downloadSong)).Methods(\"GET\")\n\tAllRoutes.HandleFunc(\"/song\", authMidware(uploadSong)).Methods(\"POST\")\n\tAllRoutes.HandleFunc(\"/song/{id}\", authMidware(deleteSong)).Methods(\"DELETE\")\n\tAllRoutes.HandleFunc(\"/user/new\", newUser).Methods(\"POST\")\n\tAllRoutes.HandleFunc(\"/auth/login\", login).Methods(\"POST\")\n\tAllRoutes.HandleFunc(\"/auth/validate\", validate).Methods(\"GET\")\n\tAllRoutes.HandleFunc(\"/auth/google/token\", authMidware(updateAuthToken)).Methods(\"POST\")\n\n\treturn AllRoutes\n}", "func MapAllRoutes() {\n\tMapDefaultRoutes()\n\tMapSimRoutes()\n\n}", "func printAvailableRoutes(router *mux.Router, logger log.Logger, msg string) http.Handler {\n\tfn := func(w http.ResponseWriter, req *http.Request) {\n\t\tvar routes []string\n\t\terr := router.Walk(func(route *mux.Route, router *mux.Router, ancestors []*mux.Route) error {\n\t\t\tpath, err := route.GetPathTemplate()\n\t\t\tif err != nil {\n\t\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\t\tlogger.Log(\"msg\", \"walkFunc failed\", err, err.Error())\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\troutes = append(routes, path)\n\t\t\treturn nil\n\t\t})\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tlogger.Log(\"msg\", \"walkFunc failed\", err, err.Error())\n\t\t\treturn\n\t\t}\n\n\t\tfmt.Fprintln(w, msg)\n\t\tfmt.Fprintln(w, \"Available routes:\")\n\t\tfor _, path := range routes {\n\t\t\tfmt.Fprintln(w, path)\n\t\t}\n\t}\n\n\treturn http.HandlerFunc(fn)\n}", "func StaticIPAMRoutes() *StaticIPAMRoutesApplyConfiguration {\n\treturn &StaticIPAMRoutesApplyConfiguration{}\n}", "func (src *BgplgdSource) AllRoutes(\n\tctx context.Context,\n) (*api.RoutesResponse, error) {\n\treq, err := src.ShowRIBRequest(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tres, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Read and decode response\n\tbody, err := decoders.ReadJSONResponse(res)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\troutes, err := decodeRoutes(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Filtered routes are marked with a large BGP community\n\t// as defined in the reject reasons.\n\treceived := filterReceivedRoutes(src.cfg.RejectCommunities, routes)\n\trejected := filterRejectedRoutes(src.cfg.RejectCommunities, routes)\n\n\tresponse := &api.RoutesResponse{\n\t\tResponse: api.Response{\n\t\t\tMeta: src.makeResponseMeta(),\n\t\t},\n\t\tImported: received,\n\t\tNotExported: api.Routes{},\n\t\tFiltered: rejected,\n\t}\n\treturn response, nil\n}", "func Routes(router chi.Router) {\n\trouter.Get(\"/\", IndexHandeler)\n\n\trouter.Method(http.MethodGet, \"/talks\", Handler(getAllScheduledTalksHandler))\n\trouter.Method(http.MethodPost, \"/talks\", Handler(scheduleTalkHandler))\n}", "func Routes() {\n //Setup the main routes.\n setupMainRoutes()\n //Setup the routes for the connected packages.\n userhandlers.Routes()\n gamehandlers.Routes()\n\n\n //Hand the majority of routing over to mux.\n // gorilla/mux now handles all of the routing except for /static/\n http.Handle(\"/\", config.Config.Router)\n\n}", "func staticHandler(w http.ResponseWriter, r *http.Request) {\n var path string\n if strings.HasSuffix(r.URL.Path, \"/\") {\n path = r.URL.Path + \"index.html\"\n } else {\n path = r.URL.Path\n }\n http.ServeFile(w, r, \"static/\"+path)\n}", "func (rs dashboardResource) Routes() chi.Router {\n\tr := chi.NewRouter()\n\t// r.Use() // some middleware..\n\n\tr.Get(\"/:page\", rs.List) // GET /todos - read a list of todos\n\treturn r\n}", "func (s *Service) GetRoutes() []Route {\n\treturn []Route{\n\t\t{\n\t\t\tName: \"health_check\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/index\",\n\t\t\tHandlerFunc: s.index,\n\t\t},\n\t}\n}", "func (c *RBController) Static(w http.ResponseWriter, r *http.Request) (err error) {\n\tvars := mux.Vars(r)\n\tpath := \"./webroot/\" + vars[\"path\"]\n\n\tif PathExists(path) {\n\t\thttp.ServeFile(w, r, path)\n\t} else {\n\t\tc.RenderError(w, 404, \"Sorry, this page was not found.\")\n\t}\n\treturn nil\n}", "func PublicRoutes(router *mux.Router) {\n\t// Routes for GET method:\n\trouter.HandleFunc(\"/api/v1/ad/{id}\", controllers.GetAd).Methods(http.MethodGet) // get one ad by ID\n\trouter.HandleFunc(\"/api/v1/ads\", controllers.GetAds).Methods(http.MethodGet) // Get list of all ads TODO pagination and sort\n\n\t// Routes for POST method:\n\trouter.HandleFunc(\"/api/v1/ad\", controllers.CreateAd).Methods(http.MethodPost) // create new ad\n}", "func (s *Server) routes() {\n\ts.router.HandleFunc(\"/api/\", s.checkJWT(s.isAdmin(s.handleAPI()))).Methods(\"GET\")\n\ts.router.HandleFunc(\"/greetings\", s.handleGreeting(\"hello\"))\n\ts.router.HandleFunc(\"/greetings/{name}\", s.handleGreeting(\"hello\")).Methods(\"GET\")\n\ts.router.HandleFunc(\"/\", s.handleIndex()).Methods(\"GET\")\n}", "func (s *server) routes() {\n\thttp.HandleFunc(\"/\", s.handleIndex())\n\thttp.HandleFunc(\"/table/\",s.handleTableLoad())\n\thttp.HandleFunc(\"/new/\",s.handleNew())\n\thttp.HandleFunc(\"/add/\",s.handleAdd())\n\thttp.HandleFunc(\"/rec/\",s.handlePage())\n\thttp.HandleFunc(\"/del/\",s.handleDelete())\n\thttp.HandleFunc(\"/sort/\",s.handleSort())\n\thttp.HandleFunc(\"/search/\",s.handleSearch())\n\thttp.HandleFunc(\"/logout/\",s.handleLogout())\n\thttp.HandleFunc(\"/import/\",s.handleImport(\"\"))\n\thttp.HandleFunc(\"/upload/\",s.handleUpload())\n\thttp.HandleFunc(\"/bulkadd/\",s.handleBulk())\n\thttp.HandleFunc(\"/addbulk/\",s.handleAddBulk())\n\thttp.HandleFunc(\"/export/\",s.handleExport())\n\thttp.HandleFunc(\"/download/\",s.handleExportDL())\n\n\thttp.Handle(\"/html/\", http.StripPrefix(\"/html/\", http.FileServer(http.Dir(\"html\"))))\n\tfs := http.FileServer(http.Dir(\"css\"))\n\thttp.Handle(\"/css/\", http.StripPrefix(\"/css/\", fs)) \n\t\n}", "func serveRoutes(w http.ResponseWriter, r *http.Request) error {\n\treturn WriteJSON(w, Entrypoints())\n}", "func (b *Baa) Static(prefix string, dir string, index bool, h HandlerFunc) {\n\tif prefix == \"\" {\n\t\tpanic(\"baa.Static prefix can not be empty\")\n\t}\n\tif dir == \"\" {\n\t\tpanic(\"baa.Static dir can not be empty\")\n\t}\n\tb.Get(prefix+\"*\", newStatic(prefix, dir, index, h))\n}", "func Routes(router *server.Router) {\n\trouter.GET(\"/v2/healthcheck/ping\", handlePing)\n}", "func (s *ServerT) Routes() []RouteInfoT {\n\troutes := s.Router.Routes()\n\n\tif s.Config.HTTPHealthCheckURL != \"\" {\n\t\troutes = append(routes, RouteInfoT{\n\t\t\tMethod: \"GET\",\n\t\t\tPath: s.Config.HTTPHealthCheckURL,\n\t\t\tHandler: \"\",\n\t\t\tHandlerFunc: nil,\n\t\t})\n\t}\n\n\treturn routes\n}", "func PrintRoutes(r *chi.Mux) {\n\tlog.Println(\"Routes:\")\n\terr := chi.Walk(r, func(method string, route string, handler http.Handler, middlewares ...func(http.Handler) http.Handler) error {\n\t\tlog.Printf(\"\\t[%s]: '%s'\\n\", method, route)\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\tlog.Println(\"Error printing routes:\", err)\n\t}\n\tlog.Println(\"\")\n}", "func routes() {\n\thttp.HandleFunc(\"/\", home)\n\thttp.HandleFunc(\"/register\", register)\n\thttp.HandleFunc(\"/login\", login)\n\thttp.HandleFunc(\"/logout\", logout)\n}", "func (ex *blank) Routes(r chi.Router) {\n\tr.Get(\"/{id}\", ex.blankHandler)\n}", "func (k *RoutesCollection) GetAll() ([]*Route, error) {\n\ttxn := k.db.Txn(false)\n\tdefer txn.Abort()\n\n\titer, err := txn.Get(routeTableName, all, true)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar res []*Route\n\tfor el := iter.Next(); el != nil; el = iter.Next() {\n\t\tr, ok := el.(*Route)\n\t\tif !ok {\n\t\t\tpanic(unexpectedType)\n\t\t}\n\t\tres = append(res, &Route{Route: *r.DeepCopy()})\n\t}\n\ttxn.Commit()\n\treturn res, nil\n}", "func (r *RESTClient) ListRoutes(filter *IpRouteFilter) ([]*DetailedRoute, error) {\n\tendpoint := r.baseEndpoints.accountRoutes\n\tendpoint.RawQuery = filter.Encode()\n\tresp, err := r.sendRequest(\"GET\", endpoint, nil)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"REST request failed\")\n\t}\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode == http.StatusOK {\n\t\treturn parseListDetailedRoutes(resp.Body)\n\t}\n\n\treturn nil, r.statusCodeToError(\"list routes\", resp)\n}", "func (u *Controller) Routes(r framework.Mux) {\n\t// This is a special route.\n\tif !swaggerRoute.Bool() {\n\t\treturn\n\t}\n\tm := r.NewGroup(\"/misc\")\n\n\tb, err := Asset(\"swagger/index.json\")\n\tassert.Nil(err)\n\n\tvar data = make(map[string]interface{})\n\terr = json.Unmarshal(b, &data)\n\tassert.Nil(err)\n\tdata = load(data)\n\n\tm.GET(\"controllers-Controller-panic\", \"/panic\", framework.Handler(\n\t\tfunc(_ context.Context, w http.ResponseWriter, r *http.Request) {\n\t\t\tif r.Header.Get(\"token\") == panicToken.String() {\n\t\t\t\tpanic(\"Don't worry. it's just a test\")\n\t\t\t}\n\t\t\tw.WriteHeader(http.StatusOK)\n\t\t\t_, _ = w.Write([]byte(\"Noop ;)\"))\n\t\t}))\n\n\tm.GET(\"controllers-Controller-swagger\", filepath.Join(\"/swagger/index.json\"),\n\t\tframework.Handler(func(_ context.Context, w http.ResponseWriter, r *http.Request) {\n\t\t\ttmp := data\n\t\t\ttmp[\"host\"] = r.Host\n\t\t\tframework.JSON(w, http.StatusOK, data)\n\t\t}))\n}", "func Routes(router *gin.RouterGroup) {\n\trouter.GET(\"/:shardID/:nonce\", GetBlockByShardIDAndNonce)\n}", "func (ar *Router) InitRoutes() {\n\tar.router.HandleFunc(\"/health\", ar.healthHandler).Methods(\"GET\")\n}", "func PublicRoutes(a *fiber.App) {\n\t// Create routes group.\n\troute := a.Group(\"/api/v1\")\n\n\t// Routes for GET method:\n\troute.Get(\"/books\", controllers.GetBooks) // get list of all books\n\troute.Get(\"/book/:id\", controllers.GetBook) // get one book by ID\n\n\t// Routes for POST method:\n\troute.Post(\"/user/sign/up\", controllers.UserSignUp) // register a new user\n\troute.Post(\"/user/sign/in\", controllers.UserSignIn) // auth, return Access & Refresh tokens\n}", "func Routes(app *fiber.App, service Service) {\n\tapi := app.Group(\"/api/v1\")\n\n\tapi.Get(\"/health\", func(c *fiber.Ctx) error {\n\t\treturn c.Status(http.StatusOK).\n\t\t\tJSON(map[string]interface{}{\n\t\t\t\t\"health\": \"ok\",\n\t\t\t\t\"status\": http.StatusOK,\n\t\t\t})\n\t})\n\n\t// public endpoint\n\tapi.Get(\"/token/new\", GetNewAccessToken)\n\tapi.Get(\"/travels\", service.getTravels)\n\tapi.Get(\"/travels/:id\", service.getTravel)\n\n\t// private endpoint\n\tapi.Post(\"/travels\", JWTProtected(), service.createTravel)\n\tapi.Put(\"/travels/:id\", JWTProtected(), service.updateTravel)\n\tapi.Delete(\"/travels/:id\", JWTProtected(), service.deleteTravel)\n}", "func DefaultRoute(w http.ResponseWriter, r *http.Request) {\n\tmenu.ClearScreen()\n\tfmt.Printf(\"Request for resource recieived: %s\\n\\n\", r.URL.Path[1:])\n\tvar path string\n\n\tif r.URL.Path[1:] != \"\" {\n\t\tpath = r.URL.Path[1:]\n\t} else {\n\t\tpath = \"index.html\"\n\t}\n\n\tjoin := []string{\"static/\", path}\n\tstg := strings.Join(join, \"\")\n\thttp.ServeFile(w, r, stg)\n\tfmt.Printf(\"Response sent.\\n\\n\")\n}", "func (sH *StaticAssetsHandler) RegisterRoutes(router *mux.Router) {\n\tfileServer := http.FileServer(sH.assetsFS)\n\tif sH.options.BasePath != \"/\" {\n\t\tfileServer = http.StripPrefix(sH.options.BasePath+\"/\", fileServer)\n\t}\n\trouter.PathPrefix(\"/static/\").Handler(sH.loggingHandler(fileServer))\n\t// index.html is served by notFound handler\n\trouter.NotFoundHandler = sH.loggingHandler(http.HandlerFunc(sH.notFound))\n}", "func Static(opts *Options) macaron.Handler {\n\treturn macaron.Static(\n\t\topts.Directory,\n\t\tmacaron.StaticOptions{\n\t\t\tSkipLogging: opts.SkipLogging,\n\t\t\tFileSystem: bindata.Static(bindata.Options{\n\t\t\t\tAsset: Asset,\n\t\t\t\tAssetDir: AssetDir,\n\t\t\t\tAssetInfo: AssetInfo,\n\t\t\t\tAssetNames: AssetNames,\n\t\t\t\tPrefix: \"\",\n\t\t\t}),\n\t\t},\n\t)\n}", "func (a *Api) serveStatic(res http.ResponseWriter, req *http.Request) {\n\tdata, err := ioutil.ReadFile(\"index.html\")\n\tif err != nil {\n\t\tlog.Printf(\"templates - failure to read index.html\")\n\t}\n\tres.Header().Set(\"content-type\", \"text/html\")\n\tres.WriteHeader(200)\n\tres.Write(data)\n\treturn\n}", "func (lr *SiteRouter) GetAll(r *http.Request, w http.ResponseWriter, siteModel *models.SiteModel, stateManager state.StateManager, conn redis.Conn) {\n\tsites, err := siteModel.FetchAll(conn)\n\n\tif err != nil {\n\t\tWriteServerErrorResponse(\"Unable to retrieve sites\", http.StatusInternalServerError, w)\n\t\treturn\n\t}\n\n\tWriteServerResponse(sites, http.StatusOK, w)\n}", "func RegisterStaticHandlers(cfg *Config, db *gorm.DB, logger *logrus.Logger) {\n\thttp.HandleFunc(\"/\", handleDynamicContent(cfg, db, logger))\n}", "func registerRoutes() {\n\tuserRoutes()\n\troleRoutes()\n}", "func OptClasslessStaticRoute(routes ...*Route) Option {\n\treturn Option{\n\t\tCode: OptionClasslessStaticRoute,\n\t\tValue: Routes(routes),\n\t}\n}", "func routes(app *config.AppConfig) http.Handler {\n\tmux := chi.NewRouter()\n\n\tmux.Use(middleware.Recoverer) // middleware to handle panics gracefully\n\tmux.Use(NoSurf) // NoSurf used to combat CSRF attacks\n\tmux.Use(SessionLoad)\n\n\tmux.Get(\"/\", handlers.Repo.Home)\n\tmux.Get(\"/about\", handlers.Repo.About)\n\tmux.Get(\"/contact\", handlers.Repo.Contact)\n\tmux.Get(\"/coffee\", handlers.Repo.Coffee)\n\tmux.Get(\"/cassava-cake\", handlers.Repo.CassavaCake)\n\n\tmux.Get(\"/order\", handlers.Repo.Order)\n\tmux.Get(\"/OrderAvailabilityJSON\", handlers.Repo.OrderAvailabilityJSON)\n\n\tmux.Get(\"/confirm\", handlers.Repo.Confirm)\n\tmux.Post(\"/confirm\", handlers.Repo.PostConfirm)\n\tmux.Get(\"/order-summary\", handlers.Repo.OrderSummary)\n\n\tfileServer := http.FileServer(http.Dir(\"./static/\"))\n\tmux.Handle(\"/static/*\", http.StripPrefix(\"/static\", fileServer))\n\treturn mux\n}", "func (controller *WidgetController) GetRoutes() []string {\n\treturn []string{\n\t\t\"api/widgets/{{id}}\",\n\t}\n}", "func (s *Service) DumpRoutes(w io.Writer) error {\n return s.router.Walk(func(route *mux.Route, router *mux.Router, ancestors []*mux.Route) error {\n p, err := route.GetPathTemplate()\n if err != nil {\n return err\n }\n fmt.Fprintf(w, \" %v\", p)\n fmt.Fprintln(w)\n return nil\n })\n return nil\n}", "func (ds *DiscoveryService) ListRoutes(request *restful.Request, response *restful.Response) {\n\tkey := request.Request.URL.String()\n\tout, cached := ds.rdsCache.cachedDiscoveryResponse(key)\n\tif !cached {\n\t\tif sc := request.PathParameter(ServiceCluster); sc != ds.mesh.IstioServiceCluster {\n\t\t\terrorResponse(response, http.StatusNotFound,\n\t\t\t\tfmt.Sprintf(\"Unexpected %s %q\", ServiceCluster, sc))\n\t\t\treturn\n\t\t}\n\t\t// service-node holds the IP address\n\t\tip := request.PathParameter(ServiceNode)\n\n\t\t// route-config-name holds the listener port\n\t\trouteConfigName := request.PathParameter(RouteConfigName)\n\t\tport, err := strconv.Atoi(routeConfigName)\n\t\tif err != nil {\n\t\t\terrorResponse(response, http.StatusNotFound,\n\t\t\t\tfmt.Sprintf(\"Unexpected %s %q\", RouteConfigName, routeConfigName))\n\t\t\treturn\n\t\t}\n\n\t\tinstances := ds.services.HostInstances(map[string]bool{ip: true})\n\t\tservices := ds.services.Services()\n\t\thttpRouteConfigs := buildOutboundHTTPRoutes(instances, services, &ProxyContext{\n\t\t\tDiscovery: ds.services,\n\t\t\tConfig: ds.config,\n\t\t\tMeshConfig: ds.mesh,\n\t\t\tIPAddress: ip,\n\t\t})\n\n\t\trouteConfig, ok := httpRouteConfigs[port]\n\t\tif !ok {\n\t\t\terrorResponse(response, http.StatusNotFound,\n\t\t\t\tfmt.Sprintf(\"Missing route config for port %d\", port))\n\t\t\treturn\n\t\t}\n\t\tif out, err = json.MarshalIndent(routeConfig, \" \", \" \"); err != nil {\n\t\t\terrorResponse(response, http.StatusInternalServerError, err.Error())\n\t\t\treturn\n\t\t}\n\t\tds.rdsCache.updateCachedDiscoveryResponse(key, out)\n\t}\n\twriteResponse(response, out)\n}", "func (s *Server) initializeRoutes() {\n\ts.Mux.HandleFunc(\"/countries\", s.countries)\n\ts.Mux.HandleFunc(\"/countries/\", s.countryById)\n}", "func static(w http.ResponseWriter, r *http.Request) {\n\thttp.ServeFile(w, r, r.URL.Path[1:])\n\treturn\n}", "func List(client *occlient.Client, componentName string, applicationName string) ([]URL, error) {\n\n\tlabelSelector := fmt.Sprintf(\"%v=%v\", application.ApplicationLabel, applicationName)\n\n\tif componentName != \"\" {\n\t\tlabelSelector = labelSelector + fmt.Sprintf(\",%v=%v\", component.ComponentLabel, componentName)\n\t}\n\n\tlog.Debugf(\"Listing routes with label selector: %v\", labelSelector)\n\troutes, err := client.ListRoutes(labelSelector)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"unable to list route names\")\n\t}\n\n\tvar urls []URL\n\tfor _, r := range routes {\n\t\turls = append(urls, URL{\n\t\t\tName: r.Name,\n\t\t\tURL: r.Spec.Host,\n\t\t})\n\t}\n\n\treturn urls, nil\n}", "func InitializeRoutes() *mux.Router {\n\n\tmyServer := mux.NewRouter()\n\tmyServer.HandleFunc(\"/api/\", handleAPI())\n\tmyServer.HandleFunc(\"/about/\", handleAbout())\n\tmyServer.HandleFunc(\"/\", handleIndex())\n\tmyServer.HandleFunc(\"/index/\", serveTemplate())\n\tmyServer.PathPrefix(\"/static\").Handler(http.StripPrefix(\"/static/\", http.FileServer(http.Dir(\"./static\"))))\n\thttp.Handle(\"/\", myServer)\n\treturn myServer\n}", "func HttpMapStatics(m map[string]string) {\n\tfor u, root := range m {\n\t\tprefix := u\n\t\tl := len(prefix)\n\t\tif prefix[l-1] == '/' {\n\t\t\tprefix = prefix[0 : l-1]\n\t\t}\n\t\tlog.Printf(\"Handling %s (%s) to %s\", u, prefix, root)\n\t\thttp.Handle(u, http.StripPrefix(prefix, http.FileServer(http.Dir(root))))\n\t}\n}", "func (srv *VerbHandler) Routes() http.Handler {\n\n\tr := chi.NewRouter()\n\n\tr.Get(\"/\", srv.GetAll)\n\n\tr.Get(\"/exam\", srv.GetExam)\n\n\treturn r\n}", "func (router *Router) MapRoutes() {\n http.HandleFunc(\"/\", func(w http.ResponseWriter, r *http.Request) {\n found := false\n url := html.EscapeString(r.URL.Path)\n log.Printf(\"%q %q\", r.Method, url)\n\n for _, route := range router.Routes {\n if url == route.Pattern && r.Method == route.Method {\n found = true\n route.Handler.ServeHTTP(w, r)\n }\n }\n\n if !found {\n http.NotFound(w, r)\n }\n }) \n}", "func InitRoutes(listRouter *mux.Router) {\n\t// ---- List Creation ---- //\n\tlistRouter.HandleFunc(\"\", ListCreateHandler).Methods(\"POST\")\n\tlistRouter.HandleFunc(\"/\", ListCreateHandler).Methods(\"POST\")\n\t// ---- List Deletion ---- //\n\tlistRouter.HandleFunc(\"/{listId}\", ListDeleteHandler).Methods(\"DELETE\")\n\tlistRouter.HandleFunc(\"/{listId}/\", ListDeleteHandler).Methods(\"DELETE\")\n\t// ---- List View ---- //\n\tlistRouter.HandleFunc(\"/{listId}\", ListViewHandler).Methods(\"GET\")\n\tlistRouter.HandleFunc(\"/{listId}/\", ListViewHandler).Methods(\"GET\")\n\t// ---- List Update ---- //\n\tlistRouter.HandleFunc(\"/{listId}\", ListUpdateHandler).Methods(\"PATCH\")\n\tlistRouter.HandleFunc(\"/{listId}/\", ListUpdateHandler).Methods(\"PATCH\")\n}", "func (s *server) routes() {\n s.router.HandleFunc(\"/\", s.homePageHandler)\n s.router.HandleFunc(\"/signup/\", s.signupHandler)\n s.router.HandleFunc(\"/signin/\", s.signinHandler)\n s.router.HandleFunc(\"/signout/\", s.makeHandler(s.signoutHandler))\n s.router.HandleFunc(\"/view/\", s.makeHandler(s.viewHandler))\n s.router.HandleFunc(\"/save/\", s.makeHandler(s.saveHandler))\n s.router.HandleFunc(\"/edit/\", s.makeHandler(s.editHandler))\n s.router.HandleFunc(\"/delete/\", s.makeHandler(s.deleteHandler))\n\n s.validPath = regexp.MustCompile(\n \"^/(new|view|save|edit|delete|signout)/([0-9]*)$\")\n}", "func (s *Server) Routes() {\n\tvar routes = Routes{\n\t\tRoute{\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/plan/{planId}\",\n\t\t\tHandlerFunc: s.GetPlan(),\n\t\t},\n\t\tRoute{\n\t\t\tMethod: \"POST\",\n\t\t\tPattern: \"/plan\",\n\t\t\tHandlerFunc: s.SavePlan(),\n\t\t},\n\t\tRoute{\n\t\t\tMethod: \"PUT\",\n\t\t\tPattern: \"/plan/{planId}\",\n\t\t\tHandlerFunc: s.UpdatePlan(),\n\t\t},\n\t\tRoute{\n\t\t\tMethod: \"DELETE\",\n\t\t\tPattern: \"/plan/{planId}\",\n\t\t\tHandlerFunc: s.DeletePlan(),\n\t\t},\n\t\tRoute{\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/userplans/{userId}\",\n\t\t\tHandlerFunc: s.GetUserPlans(),\n\t\t},\n\t\tRoute{\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/userfav/{userId}\",\n\t\t\tHandlerFunc: s.GetUsersFavorites(),\n\t\t},\n\t\tRoute{\n\t\t\tMethod: \"POST\",\n\t\t\tPattern: \"/userfav/{userId}/plan\",\n\t\t\tHandlerFunc: s.AddFavorite(),\n\t\t},\n\t\tRoute{\n\t\t\tMethod: \"DELETE\",\n\t\t\tPattern: \"/userfav/{userId}/plan/{planId}\",\n\t\t\tHandlerFunc: s.DelFavorite(),\n\t\t},\n\t}\n\n\tfor _, route := range routes {\n\t\tvar handler http.HandlerFunc\n\t\thandler = route.HandlerFunc\n\t\thandler = Logger(handler)\n\n\t\ts.Router.\n\t\t\tMethods(route.Method).\n\t\t\tPath(route.Pattern).\n\t\t\tHandler(handler)\n\n\t}\n}", "func (h *ShortenerHandler) GetRoutes() chi.Router {\n\trouter := chi.NewRouter()\n\n\trouter.Post(\"/\", h.Store)\n\trouter.Get(\"/{shortURL}\", h.Find)\n\n\treturn router\n}", "func (c *FwRouter) ShowAll() ([]Entry, error) {\n\tresult, _ := c.versioning()\n\tif err := c.ns.Objects(util.Show, c.xpath(nil), result); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn result.Normalize(), nil\n}", "func InitialRouters() *mux.Router{\n\trouter := mux.NewRouter()\n\trouter.PathPrefix(\"/assets/\").Handler(http.StripPrefix(\"/assets/\", http.FileServer(http.Dir(\"./public/assets\"))))\n\trouter.HandleFunc(\"/health_check\", c.CheckHealth).Methods(\"GET\")\n\treturn router\n}", "func InitRoutes(router *gin.RouterGroup) {\n\trouter.GET(\":type/:id\", handler.GetIdentifiers)\n}", "func Static(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t// Serves any requested file from dist/. These are immutable & cached.\n\t\t// Served with the dist prefix, e.g. GET /dist/js/foo-HASH.js.\n\t\tif file := r.URL.Path[1:]; dist[file] {\n\t\t\tw.Header().Set(\"Cache-Control\", \"max-age=31536000, public, immutable\")\n\t\t\tw.Header().Set(\"Vary\", \"Accept-Encoding\")\n\n\t\t\t// Identify with original filename, not pre-compressed filename.\n\t\t\tif ctype := mime.TypeByExtension(filepath.Ext(file)); ctype != \"\" {\n\t\t\t\tw.Header().Set(\"Content-Type\", ctype)\n\t\t\t}\n\n\t\t\t// TODO Content negotiation github.com/golang/go/issues/19307.\n\t\t\taccept := r.Header.Get(\"Accept-Encoding\")\n\t\t\tif strings.Contains(accept, \"br\") && dist[file+\".br\"] {\n\t\t\t\tw.Header().Set(\"Content-Encoding\", \"br\")\n\t\t\t\tfile += \".br\"\n\t\t\t} else if strings.Contains(accept, \"gzip\") && dist[file+\".gz\"] {\n\t\t\t\tw.Header().Set(\"Content-Encoding\", \"gzip\")\n\t\t\t\tfile += \".gz\"\n\t\t\t}\n\n\t\t\thttp.ServeFile(w, r, file)\n\t\t\treturn\n\t\t}\n\n\t\t// Serves any requested file from public/. These aren't cached.\n\t\t// Served without a prefix, e.g. GET /robots.txt.\n\t\tif file := path.Join(\"public\", r.URL.Path); public[file] {\n\t\t\thttp.ServeFile(w, r, file)\n\t\t\treturn\n\t\t}\n\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "func Routes() *chi.Mux {\n\tr := chi.NewRouter()\n\n\t// v1/api/admin/configs\n\tr.Route(\"/\", func(r chi.Router) {\n\t\tr.Mount(\"/contents\", ContentRoutes())\n\t\tr.Mount(\"/users\", UserRoutes())\n\t\tr.Mount(\"/trees\", TreeRoutes())\n\t\tr.Mount(\"/schemas\", SchemaRoutes())\n\t\tr.Mount(\"/widgets\", WidgetRoutes())\n\t\tr.Mount(\"/datasets\", DatasetRoutes())\n\t\tr.Mount(\"/groups\", GroupRoutes())\n\t\tr.Mount(\"/currencies\", CurrencyRoutes())\n\t\tr.Mount(\"/jobs\", JobRoutes())\n\t})\n\n\treturn r\n}", "func receiveAllRoute(w http.ResponseWriter, r *http.Request) {\n\troute := \"ReceiveAll\"\n\n\thandleRoute(route)\n}", "func (r *Router) ListPaths() map[string][]string {\n\treturn r.router.List()\n}", "func NormalRoutes() http.Handler {\n\tr := chi.NewRouter()\n\n\t// for health check\n\tr.Head(\"/\", func(w http.ResponseWriter, req *http.Request) {\n\t\tw.WriteHeader(http.StatusOK)\n\t})\n\n\tif setting.HasRobotsTxt {\n\t\tr.Get(\"/robots.txt\", func(w http.ResponseWriter, req *http.Request) {\n\t\t\tfilePath := path.Join(setting.CustomPath, \"robots.txt\")\n\t\t\tfi, err := os.Stat(filePath)\n\t\t\tif err == nil && httpcache.HandleTimeCache(req, w, fi) {\n\t\t\t\treturn\n\t\t\t}\n\t\t\thttp.ServeFile(w, req, filePath)\n\t\t})\n\t}\n\n\tr.Get(\"/apple-touch-icon.png\", func(w http.ResponseWriter, req *http.Request) {\n\t\thttp.Redirect(w, req, path.Join(setting.StaticURLPrefix, \"img/apple-touch-icon.png\"), 301)\n\t})\n\n\t// prometheus metrics endpoint\n\tif setting.Metrics.Enabled {\n\t\tc := metrics.NewCollector()\n\t\tprometheus.MustRegister(c)\n\n\t\tr.Get(\"/metrics\", routers.Metrics)\n\t}\n\n\treturn r\n}", "func (c *FwRouter) GetAll() ([]Entry, error) {\n\tresult, _ := c.versioning()\n\tif err := c.ns.Objects(util.Get, c.xpath(nil), result); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn result.Normalize(), nil\n}", "func getRoutes(h *Handler) []Route {\n\treturn []Route{\n\t\tRoute{\n\t\t\t\"GetMessages\",\n\t\t\t\"GET\",\n\t\t\t\"/messages\",\n\t\t\th.GetMessages,\n\t\t},\n\t\tRoute{\n\t\t\t\"CreateMessages\",\n\t\t\t\"POST\",\n\t\t\t\"/messages\",\n\t\t\th.CreateMessage,\n\t\t},\n\t\tRoute{\n\t\t\t\"DeleteMessage\",\n\t\t\t\"DELETE\",\n\t\t\t\"/messages/{id}\",\n\t\t\th.DeleteMessage,\n\t\t},\n\t\tRoute{\n\t\t\t\"GetMessage\",\n\t\t\t\"GET\",\n\t\t\t\"/messages/{id}\",\n\t\t\th.GetMessage,\n\t\t},\n\t}\n}", "func ListHandler(w http.ResponseWriter, req *http.Request) {\n\tlistTemplate, _ := template.ParseFiles(\"static/merkliste.html\")\n\tlistTemplate.Execute(w, nil)\n}", "func (d *API) Routes(middlewares ...rest.Middleware) []*rest.Route {\n\troutes := []*rest.Route{\n\t\trest.Get(\"/state\", d.checkState),\n\t}\n\n\tfor _, route := range routes {\n\t\troute.Func = rest.WrapMiddlewares(middlewares, route.Func)\n\t}\n\treturn routes\n}", "func (server *Server) initializeRoutes() error {\n\n\tvar err error\n\n\t// uri\n\thome := constants.HOMEURI\n\tbalance := constants.BALANCEURI\n\ttradeBalance := constants.TRADEBALANCEURI\n\tledger := constants.LEDGERURI\n\n\t//**************** Home Route\n\n\terr = server.App.V1.HandleFunc(home, server.Home).Methods(http.MethodGet).GetError()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t//**************** Balance Routes\n\n\t// single request\n\terr = server.App.V1.HandleFunc(balance, server.GetBalance).Methods(http.MethodGet).GetError()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t//**************** TradeBalance Routes\n\n\t// single request\n\terr = server.App.V1.HandleFunc(tradeBalance, server.GetTradeBalance).Methods(http.MethodGet).GetError()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t//**************** Ledger Routes\n\n\t// single request\n\terr = server.App.V1.HandleFunc(ledger, server.GetLedger).Methods(http.MethodGet).GetError()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n\n}" ]
[ "0.71301985", "0.6694979", "0.6510682", "0.64110744", "0.63252157", "0.6294093", "0.6282486", "0.6238444", "0.6172719", "0.6080142", "0.60340565", "0.6008513", "0.59963053", "0.59519297", "0.5931559", "0.59232944", "0.59152883", "0.59044975", "0.58720803", "0.58646834", "0.5851142", "0.58455974", "0.5834514", "0.58327085", "0.5822733", "0.58160686", "0.58075047", "0.58020544", "0.5778773", "0.57743895", "0.57721984", "0.5762928", "0.5726676", "0.572302", "0.5720218", "0.570953", "0.569868", "0.56859815", "0.56844175", "0.56738573", "0.5640506", "0.5636964", "0.5617412", "0.56165457", "0.5611421", "0.5589246", "0.55671763", "0.5567176", "0.5566388", "0.5558842", "0.55490166", "0.5548526", "0.55384576", "0.5518321", "0.5513521", "0.55050236", "0.54964846", "0.54913497", "0.5489114", "0.54760766", "0.5466063", "0.5458409", "0.54564035", "0.5437911", "0.54282147", "0.5426187", "0.5425383", "0.54195493", "0.5411321", "0.5398532", "0.5391675", "0.5389068", "0.5389068", "0.538424", "0.53776884", "0.5376077", "0.53703773", "0.5361892", "0.5361595", "0.5360801", "0.5360761", "0.5360531", "0.5357991", "0.53480923", "0.53411406", "0.5338956", "0.53363454", "0.5334428", "0.53340137", "0.533223", "0.5329827", "0.5312603", "0.5308717", "0.530548", "0.53014916", "0.5300066", "0.52974975", "0.5270257", "0.526188", "0.52588665" ]
0.6706575
1
You should always use this function to get a new ListVPCOfferingsParams instance, as then you are sure you have configured all required params
func (s *VPCService) NewListVPCOfferingsParams() *ListVPCOfferingsParams { p := &ListVPCOfferingsParams{} p.p = make(map[string]interface{}) return p }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (s *VPCService) NewCreateVPCOfferingParams(displaytext string, name string, supportedservices []string) *CreateVPCOfferingParams {\n\tp := &CreateVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"displaytext\"] = displaytext\n\tp.p[\"name\"] = name\n\tp.p[\"supportedservices\"] = supportedservices\n\treturn p\n}", "func NewListParams() *ListParams {\n\tvar ()\n\treturn &ListParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *VPCService) NewUpdateVPCOfferingParams(id string) *UpdateVPCOfferingParams {\n\tp := &UpdateVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewBenchmark_send_Params_List(s *capnp.Segment, sz int32) (Benchmark_send_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn Benchmark_send_Params_List{l}, err\n}", "func NewController_dev_Params_List(s *capnp.Segment, sz int32) (Controller_dev_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn capnp.StructList[Controller_dev_Params](l), err\n}", "func NewParams(\n\tSpotMarketInstantListingFee sdk.Coin,\n\tderivativeMarketInstantListingFee sdk.Coin,\n\tdefaultSpotMakerFee sdk.Dec,\n\tdefaultSpotTakerFee sdk.Dec,\n\tdefaultDerivativeMakerFee sdk.Dec,\n\tdefaultDerivativeTakerFee sdk.Dec,\n\tdefaultInitialMarginRatio sdk.Dec,\n\tdefaultMaintenanceMarginRatio sdk.Dec,\n\tdefaultFundingInterval int64,\n\tfundingMultiple int64,\n\trelayerFeeShare sdk.Dec,\n\tdefaultHourlyFundingRateCap sdk.Dec,\n\tdefaultHourlyInterestRate sdk.Dec,\n\tmaxDerivativeSideOrderCount uint32,\n) Params {\n\treturn Params{\n\t\tSpotMarketInstantListingFee: SpotMarketInstantListingFee,\n\t\tDerivativeMarketInstantListingFee: derivativeMarketInstantListingFee,\n\t\tDefaultSpotMakerFeeRate: defaultSpotMakerFee,\n\t\tDefaultSpotTakerFeeRate: defaultSpotTakerFee,\n\t\tDefaultDerivativeMakerFeeRate: defaultDerivativeMakerFee,\n\t\tDefaultDerivativeTakerFeeRate: defaultDerivativeTakerFee,\n\t\tDefaultInitialMarginRatio: defaultInitialMarginRatio,\n\t\tDefaultMaintenanceMarginRatio: defaultMaintenanceMarginRatio,\n\t\tDefaultFundingInterval: defaultFundingInterval,\n\t\tFundingMultiple: fundingMultiple,\n\t\tRelayerFeeShareRate: relayerFeeShare,\n\t\tDefaultHourlyFundingRateCap: defaultHourlyFundingRateCap,\n\t\tDefaultHourlyInterestRate: defaultHourlyInterestRate,\n\t\tMaxDerivativeOrderSideCount: maxDerivativeSideOrderCount,\n\t}\n}", "func (s *VPCService) NewDeleteVPCOfferingParams(id string) *DeleteVPCOfferingParams {\n\tp := &DeleteVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (x *fastReflection_Params) New() protoreflect.Message {\n\treturn new(fastReflection_Params)\n}", "func NewParams(defaultSendEnabled bool) Params {\n\treturn Params{\n\t\tSendEnabled: nil,\n\t\tDefaultSendEnabled: defaultSendEnabled,\n\t}\n}", "func NewParamList(m map[string]interface{}) (*ParamList, error) {\n\tol := newOptionLoader(m)\n\n\tpl := &ParamList{\n\t\tapp: ol.LoadApp(),\n\t\tmoduleName: ol.LoadOptionalString(OptionModule),\n\t\tcomponentName: ol.LoadOptionalString(OptionComponentName),\n\t\tenvName: ol.LoadOptionalString(OptionEnvName),\n\n\t\tout: os.Stdout,\n\t\tfindModulesFn: component.ModulesFromEnv,\n\t\tfindModuleFn: component.GetModule,\n\t\tfindComponentFn: component.LocateComponent,\n\t}\n\n\tif ol.err != nil {\n\t\treturn nil, ol.err\n\t}\n\n\treturn pl, nil\n}", "func (rm *resourceManager) newListRequestPayload(\n\tr *resource,\n) (*svcsdk.DescribeVpcPeeringConnectionsInput, error) {\n\tres := &svcsdk.DescribeVpcPeeringConnectionsInput{}\n\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\n\treturn res, nil\n}", "func NewHandleFactory_newHandle_Params_List(s *capnp.Segment, sz int32) (HandleFactory_newHandle_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\tif err != nil {\n\t\treturn HandleFactory_newHandle_Params_List{}, err\n\t}\n\treturn HandleFactory_newHandle_Params_List{l}, nil\n}", "func NewOngoingNotification_cancel_Params_List(s *capnp.Segment, sz int32) (OngoingNotification_cancel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn OngoingNotification_cancel_Params_List{l}, err\n}", "func NewConfigListParams() *ConfigListParams {\n\tvar ()\n\treturn &ConfigListParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (p *ListParams) ToParams() *Params {\n\treturn &Params{\n\t\tContext: p.Context,\n\t}\n}", "func NewContainerListParams() *ContainerListParams {\n\tvar (\n\t\tallDefault = bool(false)\n\t\tsizeDefault = bool(false)\n\t)\n\treturn &ContainerListParams{\n\t\tAll: &allDefault,\n\t\tSize: &sizeDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules,\n\tmoneyMarkets MoneyMarkets, checkLtvIndexCount int) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t\tMoneyMarkets: moneyMarkets,\n\t\tCheckLtvIndexCount: checkLtvIndexCount,\n\t}\n}", "func NewParams(opts []copts.Opt) *Params {\r\n\tparams := &Params{}\r\n\tcopts.Apply(params, opts)\r\n\treturn params\r\n}", "func CreateListEndpointsRequest() (request *ListEndpointsRequest) {\n\trequest = &ListEndpointsRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Location\", \"2015-06-12\", \"ListEndpoints\", \"location\", \"openAPI\")\n\treturn\n}", "func GetListParamsFromContext(c iris.Context, orderName string) (listParmas GetListParameters, err error) {\n\tlistParmas.Page = c.URLParamIntDefault(\"page\", 1)\n\tlistParmas.Limit = c.URLParamIntDefault(\"limit\", 1)\n\tlistParmas.Order = c.URLParamDefault(\"order\", \"asc\")\n\tlistParmas.OrderBy = c.URLParamDefault(\"orderBy\", orderName)\n\treturn\n}", "func NewParams(opts []copts.Opt) *Params {\n\tparams := &Params{}\n\tcopts.Apply(params, opts)\n\treturn params\n}", "func NewEchoer_echo_Params_List(s *capnp.Segment, sz int32) (Echoer_echo_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\tif err != nil {\n\t\treturn Echoer_echo_Params_List{}, err\n\t}\n\treturn Echoer_echo_Params_List{l}, nil\n}", "func NewListScansParams() *ListScansParams {\n\tvar (\n\t\tmaxItemsDefault = int64(100)\n\t\toffsetDefault = int64(0)\n\t\torderByDefault = string(\"created_at\")\n\t\torderDirectionDefault = string(\"desc\")\n\t)\n\treturn &ListScansParams{\n\t\tMaxItems: &maxItemsDefault,\n\t\tOffset: &offsetDefault,\n\t\tOrderBy: &orderByDefault,\n\t\tOrderDirection: &orderDirectionDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewListRequest() *todopb.ListRequest {\n\tmessage := &todopb.ListRequest{}\n\treturn message\n}", "func NewHanger_hang_Params_List(s *capnp.Segment, sz int32) (Hanger_hang_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\tif err != nil {\n\t\treturn Hanger_hang_Params_List{}, err\n\t}\n\treturn Hanger_hang_Params_List{l}, nil\n}", "func (client *VideosClient) listCreateRequest(ctx context.Context, resourceGroupName string, accountName string, options *VideosClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Media/videoAnalyzers/{accountName}/videos\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif accountName == \"\" {\n\t\treturn nil, errors.New(\"parameter accountName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{accountName}\", url.PathEscape(accountName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-11-01-preview\")\n\tif options != nil && options.Top != nil {\n\t\treqQP.Set(\"$top\", strconv.FormatInt(int64(*options.Top), 10))\n\t}\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewParams(tokenCourse, subscriptionPrice, VPNGBPrice,\n\tstorageGBPrice, baseVPNGb, baseStorageGb uint32, courseSigners []sdk.AccAddress) Params {\n\treturn Params{\n\t\tTokenCourse: tokenCourse,\n\t\tSubscriptionPrice: subscriptionPrice,\n\t\tVPNGBPrice: VPNGBPrice,\n\t\tStorageGBPrice: storageGBPrice,\n\t\tBaseVPNGb: baseVPNGb,\n\t\tBaseStorageGb: baseStorageGb,\n\t\tCourseChangeSigners: courseSigners[:],\n\t}\n}", "func NewNotificationTarget_addOngoing_Params_List(s *capnp.Segment, sz int32) (NotificationTarget_addOngoing_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn NotificationTarget_addOngoing_Params_List{l}, err\n}", "func NewController_devShell_Params_List(s *capnp.Segment, sz int32) (Controller_devShell_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn capnp.StructList[Controller_devShell_Params](l), err\n}", "func NewParams() *Params {\n\treturn new(Params)\n}", "func NewParams(acl ACL, daoOwner sdk.Address) Params {\n\treturn Params{\n\t\tACL: acl,\n\t\tDAOOwner: daoOwner,\n\t}\n}", "func NewParams(pricePerByte abi.TokenAmount, paymentInterval uint64, paymentIntervalIncrease uint64) (Params, error) {\n\treturn Params{\n\t\tPricePerByte: pricePerByte,\n\t\tPaymentInterval: paymentInterval,\n\t\tPaymentIntervalIncrease: paymentIntervalIncrease,\n\t}, nil\n}", "func (c *providerConstructor) ParameterList() parameterList {\n\treturn c.params\n}", "func CreateListVpcInfoByVpcRequest() (request *ListVpcInfoByVpcRequest) {\n\trequest = &ListVpcInfoByVpcRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Ots\", \"2016-06-20\", \"ListVpcInfoByVpc\", \"ots\", \"openAPI\")\n\treturn\n}", "func NewCallOrder_getCallSequence_Params_List(s *capnp.Segment, sz int32) (CallOrder_getCallSequence_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 0}, sz)\n\tif err != nil {\n\t\treturn CallOrder_getCallSequence_Params_List{}, err\n\t}\n\treturn CallOrder_getCallSequence_Params_List{l}, nil\n}", "func (client *HCRPAssignmentsClient) listCreateRequest(ctx context.Context, resourceGroupName string, machineName string, options *HCRPAssignmentsClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.HybridCompute/machines/{machineName}/providers/Microsoft.GuestConfiguration/guestConfigurationAssignments\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif machineName == \"\" {\n\t\treturn nil, errors.New(\"parameter machineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{machineName}\", url.PathEscape(machineName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-01-25\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewUdpPort_send_Params_List(s *capnp.Segment, sz int32) (UdpPort_send_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn UdpPort_send_Params_List{l}, err\n}", "func (client *PublicIPAddressesClient) listCreateRequest(ctx context.Context, resourceGroupName string, options *PublicIPAddressesClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/publicIPAddresses\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (p *OnuTcontProfile) ListEssentialParams() map[string]interface{} {\r\n\tvar EssentialOnuTcontProfile = map[string]interface{}{\r\n\t\tOnuTcontProfileHeaders[0]: p.GetName(),\r\n\t\tOnuTcontProfileHeaders[1]: p.GenerateTcontName(),\r\n\t\tOnuTcontProfileHeaders[2]: p.TcontType,\r\n\t\tOnuTcontProfileHeaders[3]: p.TcontID,\r\n\t\tOnuTcontProfileHeaders[4]: formatKbits(p.FixedDataRate),\r\n\t\tOnuTcontProfileHeaders[5]: formatKbits(p.AssuredDataRate),\r\n\t\tOnuTcontProfileHeaders[6]: formatKbits(p.MaxDataRate),\r\n\t}\r\n\r\n\treturn EssentialOnuTcontProfile\r\n}", "func NewWaitListParams() *WaitListParams {\n\treturn &WaitListParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *Client) listCreateRequest(ctx context.Context, resourceGroupName string, resourceProviderNamespace string, resourceType string, resourceName string, options *ClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}/providers/Microsoft.Resources/changes\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif resourceProviderNamespace == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceProviderNamespace cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceProviderNamespace}\", url.PathEscape(resourceProviderNamespace))\n\tif resourceType == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceType cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceType}\", url.PathEscape(resourceType))\n\tif resourceName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceName}\", url.PathEscape(resourceName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-05-01\")\n\tif options != nil && options.Top != nil {\n\t\treqQP.Set(\"$top\", strconv.FormatInt(*options.Top, 10))\n\t}\n\tif options != nil && options.SkipToken != nil {\n\t\treqQP.Set(\"$skipToken\", *options.SkipToken)\n\t}\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewTcpPort_connect_Params_List(s *capnp.Segment, sz int32) (TcpPort_connect_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TcpPort_connect_Params_List{l}, err\n}", "func (k *ksonnetApp) ListParams(environment string) ([]*v1alpha1.KsonnetParameter, error) {\n\targs := []string{\"param\", \"list\", \"--output\", \"json\"}\n\tif environment != \"\" {\n\t\targs = append(args, \"--env\", environment)\n\t}\n\tout, err := k.ksCmd(args...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// Auxiliary data to hold unmarshaled JSON output, which may use different field names\n\tvar ksParams struct {\n\t\tData []struct {\n\t\t\tComponent string `json:\"component\"`\n\t\t\tKey string `json:\"param\"`\n\t\t\tValue string `json:\"value\"`\n\t\t} `json:\"data\"`\n\t}\n\tif err := json.Unmarshal([]byte(out), &ksParams); err != nil {\n\t\treturn nil, err\n\t}\n\tvar params []*v1alpha1.KsonnetParameter\n\tfor _, ksParam := range ksParams.Data {\n\t\tvalue := strings.Trim(ksParam.Value, `'\"`)\n\t\tparams = append(params, &v1alpha1.KsonnetParameter{\n\t\t\tComponent: ksParam.Component,\n\t\t\tName: ksParam.Key,\n\t\t\tValue: value,\n\t\t})\n\t}\n\treturn params, nil\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t}\n}", "func NewParams(createWhoisPrice string, updateWhoisPrice string, deleteWhoisPrice string) Params {\n\treturn Params{\n\t\tCreateWhoisPrice: createWhoisPrice,\n\t\tUpdateWhoisPrice: updateWhoisPrice,\n\t\tDeleteWhoisPrice: deleteWhoisPrice,\n\t}\n}", "func (l0 *l0Conn) parametersNew() (p *paramConf) {\n\tp = &paramConf{conf.New(l0.teo, &param{}), l0.teo.ev.subscribe(), l0}\n\tfmt.Printf(\"!!! Subscribed - peer connected !!!\\n\")\n\tgo func() {\n\t\t// TODO: uncomment wg using when normolise close channel during exit\n\t\tl0.teo.wg.Add(1)\n\t\tfor ev := range p.chanEvent {\n\t\t\tp.eventProcess(ev)\n\t\t}\n\t\tfmt.Printf(\"!!! Subscribed channel closed !!!\\n\")\n\t\tl0.teo.wg.Done()\n\t}()\n\treturn\n}", "func NewListPartsParams() ListPartsParams {\n\tvar ()\n\treturn ListPartsParams{}\n}", "func NewIpInterface_listenTcp_Params_List(s *capnp.Segment, sz int32) (IpInterface_listenTcp_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 1}, sz)\n\treturn IpInterface_listenTcp_Params_List{l}, err\n}", "func NewEmptyParamList() ParamList {\n\treturn ParamList{}\n}", "func NewListSourceFileOfProjectVersionParams() *ListSourceFileOfProjectVersionParams {\n\tvar ()\n\treturn &ListSourceFileOfProjectVersionParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *PublicIPAddressesClient) listAllCreateRequest(ctx context.Context, options *PublicIPAddressesClientListAllOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/providers/Microsoft.Network/publicIPAddresses\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (so ServiceOffering) ListRequest() (ListCommand, error) {\n\t// Restricted cannot be applied here because it really has three states\n\treq := &ListServiceOfferings{\n\t\tID: so.ID,\n\t\tName: so.Name,\n\t\tSystemVMType: so.SystemVMType,\n\t}\n\n\tif so.IsSystem {\n\t\treq.IsSystem = &so.IsSystem\n\t}\n\n\treturn req, nil\n}", "func NewFreezeParams() *FreezeParams {\n\treturn &FreezeParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (o *WaitListParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param address\n\tif err := r.SetPathParam(\"address\", o.Address); err != nil {\n\t\treturn err\n\t}\n\n\tif o.Height != nil {\n\n\t\t// query param height\n\t\tvar qrHeight uint64\n\n\t\tif o.Height != nil {\n\t\t\tqrHeight = *o.Height\n\t\t}\n\t\tqHeight := swag.FormatUint64(qrHeight)\n\t\tif qHeight != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"height\", qHeight); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.PublicKey != nil {\n\n\t\t// query param public_key\n\t\tvar qrPublicKey string\n\n\t\tif o.PublicKey != nil {\n\t\t\tqrPublicKey = *o.PublicKey\n\t\t}\n\t\tqPublicKey := qrPublicKey\n\t\tif qPublicKey != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"public_key\", qPublicKey); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func newBulletproofParams(m int) *bulletproofParams {\n\tmaxExp := privacy_util.MaxExp\n\tnumCommitValue := privacy_util.NumBase\n\tmaxOutputCoin := privacy_util.MaxOutputCoin\n\tcapacity := maxExp * m // fixed value\n\tparam := new(bulletproofParams)\n\tparam.g = make([]*operation.Point, capacity)\n\tparam.h = make([]*operation.Point, capacity)\n\tcsByte := []byte{}\n\n\tfor i := 0; i < capacity; i++ {\n\t\tparam.g[i] = operation.HashToPointFromIndex(int64(numCommitValue+i), operation.CStringBulletProof)\n\t\tparam.h[i] = operation.HashToPointFromIndex(int64(numCommitValue+i+maxOutputCoin*maxExp), operation.CStringBulletProof)\n\t\tcsByte = append(csByte, param.g[i].ToBytesS()...)\n\t\tcsByte = append(csByte, param.h[i].ToBytesS()...)\n\t}\n\n\tparam.u = new(operation.Point)\n\tparam.u = operation.HashToPointFromIndex(int64(numCommitValue+2*maxOutputCoin*maxExp), operation.CStringBulletProof)\n\tcsByte = append(csByte, param.u.ToBytesS()...)\n\n\tparam.cs = operation.HashToPoint(csByte)\n\treturn param\n}", "func NewParams(n, m int, prf, msg hasher.Hasher) *Params {\n\t// Don't allow creation of params if m == 0 or m > MaxMsgSize\n\tif m < 1 || m > MaxMsgSize {\n\t\treturn nil\n\t}\n\t// Don't allow creation of params if hash functions sizes are smaller than specified N and M\n\tif prf.Size() < n || msg.Size() < m {\n\t\treturn nil\n\t}\n\tchecksumLadders := 2\n\t// The only case that we need just 1 checksum ladder is for m=1\n\tif m == 1 {\n\t\tchecksumLadders = 1\n\t}\n\treturn &Params{\n\t\tn: n,\n\t\tm: m,\n\t\tprfHash: prf,\n\t\tmsgHash: msg,\n\t\ttotal: m + checksumLadders,\n\t}\n}", "func (rm *resourceManager) newListRequestPayload(\n\tr *resource,\n) (*svcsdk.DescribeVpnConnectionsInput, error) {\n\tres := &svcsdk.DescribeVpnConnectionsInput{}\n\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\n\treturn res, nil\n}", "func (client PeerExpressRouteCircuitConnectionsClient) listCreateRequest(ctx context.Context, resourceGroupName string, circuitName string, peeringName string, options *PeerExpressRouteCircuitConnectionsListOptions) (*azcore.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/expressRouteCircuits/{circuitName}/peerings/{peeringName}/peerConnections\"\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\turlPath = strings.ReplaceAll(urlPath, \"{circuitName}\", url.PathEscape(circuitName))\n\turlPath = strings.ReplaceAll(urlPath, \"{peeringName}\", url.PathEscape(peeringName))\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := azcore.NewRequest(ctx, http.MethodGet, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\tquery := req.URL.Query()\n\tquery.Set(\"api-version\", \"2020-07-01\")\n\treq.URL.RawQuery = query.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *VirtualMachinesClient) listCreateRequest(ctx context.Context, options *VirtualMachinesClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/providers/Microsoft.ConnectedVMwarevSphere/virtualMachines\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-01-10-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewListPaymentsParams() ListPaymentsParams {\n\n\tvar (\n\t\t// initialize parameters with default values\n\n\t\toffsetDefault = string(\"0\")\n\t\torderByDefault = string(\"createddate\")\n\t\tpageSizeDefault = string(\"100\")\n\t)\n\n\treturn ListPaymentsParams{\n\t\tOffset: &offsetDefault,\n\n\t\tOrderBy: &orderByDefault,\n\n\t\tPageSize: &pageSizeDefault,\n\t}\n}", "func (client *CloudServicesClient) listCreateRequest(ctx context.Context, resourceGroupName string, options *CloudServicesClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-09-04\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewGetPbxDevicePreferenceitemsRequest(server string, params *GetPbxDevicePreferenceitemsParams) (*http.Request, error) {\n\tvar err error\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/pbxdevicepreferences\")\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryValues := queryUrl.Query()\n\n\tif queryFrag, err := runtime.StyleParam(\"form\", true, \"order_by\", params.OrderBy); err != nil {\n\t\treturn nil, err\n\t} else if parsed, err := url.ParseQuery(queryFrag); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tfor k, v := range parsed {\n\t\t\tfor _, v2 := range v {\n\t\t\t\tqueryValues.Add(k, v2)\n\t\t\t}\n\t\t}\n\t}\n\n\tif queryFrag, err := runtime.StyleParam(\"form\", true, \"order_by_direction\", params.OrderByDirection); err != nil {\n\t\treturn nil, err\n\t} else if parsed, err := url.ParseQuery(queryFrag); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tfor k, v := range parsed {\n\t\t\tfor _, v2 := range v {\n\t\t\t\tqueryValues.Add(k, v2)\n\t\t\t}\n\t\t}\n\t}\n\n\tif queryFrag, err := runtime.StyleParam(\"form\", true, \"page\", params.Page); err != nil {\n\t\treturn nil, err\n\t} else if parsed, err := url.ParseQuery(queryFrag); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tfor k, v := range parsed {\n\t\t\tfor _, v2 := range v {\n\t\t\t\tqueryValues.Add(k, v2)\n\t\t\t}\n\t\t}\n\t}\n\n\tif queryFrag, err := runtime.StyleParam(\"form\", true, \"rows\", params.Rows); err != nil {\n\t\treturn nil, err\n\t} else if parsed, err := url.ParseQuery(queryFrag); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tfor k, v := range parsed {\n\t\t\tfor _, v2 := range v {\n\t\t\t\tqueryValues.Add(k, v2)\n\t\t\t}\n\t\t}\n\t}\n\n\tqueryUrl.RawQuery = queryValues.Encode()\n\n\treq, err := http.NewRequest(\"GET\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func NewListParamsWithHTTPClient(client *http.Client) *ListParams {\n\tvar ()\n\treturn &ListParams{\n\t\tHTTPClient: client,\n\t}\n}", "func NewPetListParams() *PetListParams {\n\treturn &PetListParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (p *OnuIgmpProfile) ListEssentialParams() map[string]interface{} {\r\n\tvar EssentialOnuIgmpProfile = map[string]interface{}{\r\n\t\tOnuIgmpProfileHeaders[0]: p.GetName(),\r\n\t\tOnuIgmpProfileHeaders[1]: p.GetMode(),\r\n\t\tOnuIgmpProfileHeaders[2]: p.GetProxy(),\r\n\t\tOnuIgmpProfileHeaders[3]: p.GetFastLeave(),\r\n\t\tOnuIgmpProfileHeaders[4]: p.GetUsTci(),\r\n\t\tOnuIgmpProfileHeaders[5]: p.DsGemPort,\r\n\t}\r\n\t// I want all of these Bools to return strings of \"Enabled/Disabled\"\r\n\treturn EssentialOnuIgmpProfile\r\n}", "func (m *MockRouterServiceIface) NewListVirtualRouterElementsParams() *ListVirtualRouterElementsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListVirtualRouterElementsParams\")\n\tret0, _ := ret[0].(*ListVirtualRouterElementsParams)\n\treturn ret0\n}", "func (m *MockProjectServiceIface) NewListProjectInvitationsParams() *ListProjectInvitationsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListProjectInvitationsParams\")\n\tret0, _ := ret[0].(*ListProjectInvitationsParams)\n\treturn ret0\n}", "func (client *CloudServicesClient) listAllCreateRequest(ctx context.Context, options *CloudServicesClientListAllOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/providers/Microsoft.Compute/cloudServices\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-09-04\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewParams() *Params {\n\tp := Params{}\n\tp.names = []string{}\n\tp.values = map[string]interface{}{}\n\n\treturn &p\n}", "func NewParams(\n\ttaxPolicy, rewardPolicy PolicyConstraints,\n\tseigniorageBurden sdk.Dec,\n\tminingIncrement sdk.Dec,\n\twindowShort, windowLong, windowProbation sdk.Int,\n) Params {\n\treturn Params{\n\t\tTaxPolicy: taxPolicy,\n\t\tRewardPolicy: rewardPolicy,\n\t\tSeigniorageBurdenTarget: seigniorageBurden,\n\t\tMiningIncrement: miningIncrement,\n\t\tWindowShort: windowShort,\n\t\tWindowLong: windowLong,\n\t\tWindowProbation: windowProbation,\n\t}\n}", "func (client *DefenderSettingsClient) listCreateRequest(ctx context.Context, options *DefenderSettingsClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/providers/Microsoft.IoTSecurity/defenderSettings\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewListEventsParams() *ListEventsParams {\n\tvar ()\n\treturn &ListEventsParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *VirtualNetworkLinksClient) listCreateRequest(ctx context.Context, resourceGroupName string, privateZoneName string, options *VirtualNetworkLinksListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/privateDnsZones/{privateZoneName}/virtualNetworkLinks\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif privateZoneName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateZoneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateZoneName}\", url.PathEscape(privateZoneName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.Top != nil {\n\t\treqQP.Set(\"$top\", strconv.FormatInt(int64(*options.Top), 10))\n\t}\n\treqQP.Set(\"api-version\", \"2020-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewServiceInfoRequest_List(s *capnp.Segment, sz int32) (ServiceInfoRequest_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn ServiceInfoRequest_List{l}, err\n}", "func CreateListEndpointsRequest() (request *ListEndpointsRequest) {\n\trequest = &ListEndpointsRequest{\n\t\tRoaRequest: &requests.RoaRequest{},\n\t}\n\trequest.InitWithApiInfo(\"PAIElasticDatasetAccelerator\", \"2022-08-01\", \"ListEndpoints\", \"/api/v1/endpoints\", \"datasetacc\", \"openAPI\")\n\trequest.Method = requests.GET\n\treturn\n}", "func DefaultParams() Params {\n\n\treturn Params{\n\t\tSpotMarketInstantListingFee: sdk.NewCoin(\"inj\", sdk.NewIntWithDecimal(SpotMarketInstantListingFee, 18)),\n\t\tDerivativeMarketInstantListingFee: sdk.NewCoin(\"inj\", sdk.NewIntWithDecimal(DerivativeMarketInstantListingFee, 18)),\n\t\tDefaultSpotMakerFeeRate: sdk.NewDecWithPrec(1, 3), // default 0.1% maker fees\n\t\tDefaultSpotTakerFeeRate: sdk.NewDecWithPrec(2, 3), // default 0.2% taker fees\n\t\tDefaultDerivativeMakerFeeRate: sdk.NewDecWithPrec(1, 3), // default 0.1% maker fees\n\t\tDefaultDerivativeTakerFeeRate: sdk.NewDecWithPrec(2, 3), // default 0.2% taker fees\n\t\tDefaultInitialMarginRatio: sdk.NewDecWithPrec(5, 2), // default 5% initial margin ratio\n\t\tDefaultMaintenanceMarginRatio: sdk.NewDecWithPrec(2, 2), // default 2% maintenance margin ratio\n\t\tDefaultFundingInterval: DefaultFundingIntervalSeconds,\n\t\tFundingMultiple: DefaultFundingMultipleSeconds,\n\t\tRelayerFeeShareRate: sdk.NewDecWithPrec(40, 2), // default 40% relayer fee share\n\t\tDefaultHourlyFundingRateCap: sdk.NewDecWithPrec(625, 6), // default 0.0625% max hourly funding rate\n\t\tDefaultHourlyInterestRate: sdk.NewDecWithPrec(416666, 11), // 0.01% daily interest rate = 0.0001 / 24 = 0.00000416666\n\t\tMaxDerivativeOrderSideCount: MaxDerivativeOrderSideCount,\n\t}\n}", "func (*ListRequest_PagingParams) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_rawDescGZIP(), []int{2, 0}\n}", "func NewGetListParams() *GetListParams {\n\tvar ()\n\treturn &GetListParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func ParamsList() string {\n\treturn `brokers=comma,delimited,host:ports\ntls.enabled=boolean\ntls.ca=/path/to/ca.pem\ntls.cert=/path/to/cert.pem\ntls.key=/path/to/key.pem\nsasl.mechanism=SCRAM-SHA-256 or SCRAM-SHA-512\nuser=username\npass=password\nadmin.hosts=comma,delimited,host:ports\nadmin.tls.enabled=boolean\nadmin.tls.ca=/path/to/ca.pem\nadmin.tls.cert=/path/to/cert.pem\nadmin.tls.key=/path/to/key.pem\nregistry.hosts=comma,delimited,host:ports\nregistry.tls.enabled=boolean\nregistry.tls.ca=/path/to/ca.pem\nregistry.tls.cert=/path/to/cert.pem\nregistry.tls.key=/path/to/key.pem\ncloud.client_id=somestring\ncloud.client_secret=somelongerstring\nglobals.prompt=\"%n\"\nglobals.no_default_cluster=boolean\nglobals.dial_timeout=duration(3s,1m,2h)\nglobals.request_timeout_overhead=duration(10s,1m,2h)\nglobals.retry_timeout=duration(30s,1m,2h)\nglobals.fetch_max_wait=duration(5s,1m,2h)\nglobals.kafka_protocol_request_client_id=rpk\n`\n}", "func NewListBuilder() *ListBuilder {\n\treturn &ListBuilder{\n\t\tCSPList: &CSPIList{\n\t\t\tObjectList: &apis.CStorPoolInstanceList{},\n\t\t},\n\t\tfilters: PredicateList{},\n\t}\n}", "func (client *ChargesClient) listCreateRequest(ctx context.Context, scope string, options *ChargesClientListOptions) (*policy.Request, error) {\n\turlPath := \"/{scope}/providers/Microsoft.Consumption/charges\"\n\turlPath = strings.ReplaceAll(urlPath, \"{scope}\", scope)\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-10-01\")\n\tif options != nil && options.StartDate != nil {\n\t\treqQP.Set(\"startDate\", *options.StartDate)\n\t}\n\tif options != nil && options.EndDate != nil {\n\t\treqQP.Set(\"endDate\", *options.EndDate)\n\t}\n\tif options != nil && options.Filter != nil {\n\t\treqQP.Set(\"$filter\", *options.Filter)\n\t}\n\tif options != nil && options.Apply != nil {\n\t\treqQP.Set(\"$apply\", *options.Apply)\n\t}\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *PipelinesClient) listByFactoryCreateRequest(ctx context.Context, resourceGroupName string, factoryName string, options *PipelinesClientListByFactoryOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DataFactory/factories/{factoryName}/pipelines\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif factoryName == \"\" {\n\t\treturn nil, errors.New(\"parameter factoryName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{factoryName}\", url.PathEscape(factoryName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2018-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func ParamSpecPointer_(name string, nick string, blurb string, flags ParamFlags) *ParamSpec {\n\tc_name := C.CString(name)\n\tdefer C.free(unsafe.Pointer(c_name))\n\n\tc_nick := C.CString(nick)\n\tdefer C.free(unsafe.Pointer(c_nick))\n\n\tc_blurb := C.CString(blurb)\n\tdefer C.free(unsafe.Pointer(c_blurb))\n\n\tc_flags := (C.GParamFlags)(flags)\n\n\tretC := C.g_param_spec_pointer(c_name, c_nick, c_blurb, c_flags)\n\tretGo := ParamSpecNewFromC(unsafe.Pointer(retC))\n\n\treturn retGo\n}", "func (m *MockLoadBalancerServiceIface) NewListGlobalLoadBalancerRulesParams() *ListGlobalLoadBalancerRulesParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListGlobalLoadBalancerRulesParams\")\n\tret0, _ := ret[0].(*ListGlobalLoadBalancerRulesParams)\n\treturn ret0\n}", "func (client *IPAllocationsClient) listCreateRequest(ctx context.Context, options *IPAllocationsClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/providers/Microsoft.Network/IpAllocations\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-04-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (s RealmGateway_export_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_export_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewAi_takeTurn_Params_List(s *capnp.Segment, sz int32) (Ai_takeTurn_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\tif err != nil {\n\t\treturn Ai_takeTurn_Params_List{}, err\n\t}\n\treturn Ai_takeTurn_Params_List{l}, nil\n}", "func NewGetaspecificCallListRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/calllists/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"GET\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func NewDevSession_updateManifest_Params_List(s *capnp.Segment, sz int32) (DevSession_updateManifest_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn capnp.StructList[DevSession_updateManifest_Params](l), err\n}", "func (s *VPCService) NewListVPCsParams() *ListVPCsParams {\n\tp := &ListVPCsParams{}\n\tp.p = make(map[string]interface{})\n\treturn p\n}", "func NewIpNetwork_getRemoteHost_Params_List(s *capnp.Segment, sz int32) (IpNetwork_getRemoteHost_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn IpNetwork_getRemoteHost_Params_List{l}, err\n}", "func (c *Client) BuildListRequest(ctx context.Context, v interface{}) (*http.Request, error) {\n\tu := &url.URL{Scheme: c.scheme, Host: c.host, Path: ListResourcePath()}\n\treq, err := http.NewRequest(\"GET\", u.String(), nil)\n\tif err != nil {\n\t\treturn nil, goahttp.ErrInvalidURL(\"resource\", \"List\", u.String(), err)\n\t}\n\tif ctx != nil {\n\t\treq = req.WithContext(ctx)\n\t}\n\n\treturn req, nil\n}", "func (client *VirtualRoutersClient) listCreateRequest(ctx context.Context, options *VirtualRoutersClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/providers/Microsoft.Network/virtualRouters\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewGetPbxFieldDevicePreferenceitemsRequest(server string, params *GetPbxFieldDevicePreferenceitemsParams) (*http.Request, error) {\n\tvar err error\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/pbxfielddevicepreferences\")\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryValues := queryUrl.Query()\n\n\tif queryFrag, err := runtime.StyleParam(\"form\", true, \"order_by\", params.OrderBy); err != nil {\n\t\treturn nil, err\n\t} else if parsed, err := url.ParseQuery(queryFrag); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tfor k, v := range parsed {\n\t\t\tfor _, v2 := range v {\n\t\t\t\tqueryValues.Add(k, v2)\n\t\t\t}\n\t\t}\n\t}\n\n\tif queryFrag, err := runtime.StyleParam(\"form\", true, \"order_by_direction\", params.OrderByDirection); err != nil {\n\t\treturn nil, err\n\t} else if parsed, err := url.ParseQuery(queryFrag); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tfor k, v := range parsed {\n\t\t\tfor _, v2 := range v {\n\t\t\t\tqueryValues.Add(k, v2)\n\t\t\t}\n\t\t}\n\t}\n\n\tif queryFrag, err := runtime.StyleParam(\"form\", true, \"page\", params.Page); err != nil {\n\t\treturn nil, err\n\t} else if parsed, err := url.ParseQuery(queryFrag); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tfor k, v := range parsed {\n\t\t\tfor _, v2 := range v {\n\t\t\t\tqueryValues.Add(k, v2)\n\t\t\t}\n\t\t}\n\t}\n\n\tif queryFrag, err := runtime.StyleParam(\"form\", true, \"rows\", params.Rows); err != nil {\n\t\treturn nil, err\n\t} else if parsed, err := url.ParseQuery(queryFrag); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tfor k, v := range parsed {\n\t\t\tfor _, v2 := range v {\n\t\t\t\tqueryValues.Add(k, v2)\n\t\t\t}\n\t\t}\n\t}\n\n\tqueryUrl.RawQuery = queryValues.Encode()\n\n\treq, err := http.NewRequest(\"GET\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (client *ExpressRoutePortsLocationsClient) listCreateRequest(ctx context.Context, options *ExpressRoutePortsLocationsClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/providers/Microsoft.Network/ExpressRoutePortsLocations\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-04-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (o *ListParams) WithContext(ctx context.Context) *ListParams {\n\to.SetContext(ctx)\n\treturn o\n}", "func NewParams(nickname NicknameParams, dTag DTagParams, bio BioParams, oracle OracleParams) Params {\n\treturn Params{\n\t\tNickname: nickname,\n\t\tDTag: dTag,\n\t\tBio: bio,\n\t\tOracle: oracle,\n\t}\n}" ]
[ "0.666936", "0.6070302", "0.60530233", "0.5921333", "0.58140475", "0.57182676", "0.56321764", "0.55119073", "0.54626906", "0.54392654", "0.5435461", "0.5426217", "0.540955", "0.53932065", "0.53767616", "0.5367842", "0.53649503", "0.53606665", "0.53549874", "0.5304402", "0.527451", "0.5269524", "0.52645653", "0.52363396", "0.52191645", "0.5198037", "0.5195151", "0.51940626", "0.5186978", "0.518189", "0.51728606", "0.51722306", "0.51720667", "0.51657027", "0.51656944", "0.5164448", "0.51529926", "0.5147936", "0.5145889", "0.5140825", "0.5136471", "0.5130121", "0.5115032", "0.5112618", "0.510313", "0.51028496", "0.5091569", "0.5079513", "0.50760186", "0.5054334", "0.5041965", "0.50414276", "0.503937", "0.5030129", "0.5030129", "0.50280964", "0.50260985", "0.5023071", "0.5021148", "0.50119275", "0.50088495", "0.50082815", "0.5006652", "0.5003197", "0.5002674", "0.49911904", "0.4984235", "0.49819735", "0.49813035", "0.49797785", "0.49690524", "0.4965935", "0.4960964", "0.4958816", "0.49576178", "0.49504483", "0.49490282", "0.49485835", "0.49481463", "0.49410406", "0.49369478", "0.49352267", "0.49332723", "0.49299943", "0.4925825", "0.4919826", "0.49055013", "0.4899024", "0.4899024", "0.48974678", "0.48973754", "0.4894617", "0.48944968", "0.4883832", "0.48837358", "0.4883526", "0.48807922", "0.48797253", "0.4869014", "0.48664522" ]
0.7861365
0
This is a courtesy helper function, which in some cases may not work as expected!
func (s *VPCService) GetVPCOfferingID(name string, opts ...OptionFunc) (string, int, error) { p := &ListVPCOfferingsParams{} p.p = make(map[string]interface{}) p.p["name"] = name for _, fn := range append(s.cs.options, opts...) { if err := fn(s.cs, p); err != nil { return "", -1, err } } l, err := s.ListVPCOfferings(p) if err != nil { return "", -1, err } if l.Count == 0 { return "", l.Count, fmt.Errorf("No match found for %s: %+v", name, l) } if l.Count == 1 { return l.VPCOfferings[0].Id, l.Count, nil } if l.Count > 1 { for _, v := range l.VPCOfferings { if v.Name == name { return v.Id, l.Count, nil } } } return "", l.Count, fmt.Errorf("Could not find an exact match for %s: %+v", name, l) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func getHelperMethodIfNeeded(functionName string, indent string) (string, bool) {\n\tswitch functionName {\n\tcase \"filebase64sha256\":\n\t\treturn `function computeFilebase64sha256(path string) string {\n\tconst fileData = Buffer.from(fs.readFileSync(path), 'binary')\n\treturn crypto.createHash('sha256').update(fileData).digest('hex')\n}`, true\n\tcase \"notImplemented\":\n\t\treturn fmt.Sprintf(\n\t\t\t`%sfunction notImplemented(message: string) {\n%s throw new Error(message);\n%s}`, indent, indent, indent), true\n\tcase \"singleOrNone\":\n\t\treturn fmt.Sprintf(\n\t\t\t`%sfunction singleOrNone<T>(elements: pulumi.Input<T>[]): pulumi.Input<T> {\n%s if (elements.length != 1) {\n%s throw new Error(\"singleOrNone expected input list to have a single element\");\n%s }\n%s return elements[0];\n%s}`, indent, indent, indent, indent, indent, indent), true\n\tdefault:\n\t\treturn \"\", false\n\t}\n}", "func getHelperMethodIfNeeded(functionName string, indent string) (string, bool) {\n\tswitch functionName {\n\tcase \"filebase64\":\n\t\treturn `private static string ReadFileBase64(string path) {\n\t\treturn Convert.ToBase64String(System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path)));\n\t}`, true\n\tcase \"filebase64sha256\":\n\t\treturn `private static string ComputeFileBase64Sha256(string path) {\n\t\tvar fileData = System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path));\n\t\tvar hashData = SHA256.Create().ComputeHash(fileData);\n\t\treturn Convert.ToBase64String(hashData);\n\t}`, true\n\tcase \"sha1\":\n\t\treturn `private static string ComputeSHA1(string input) {\n\t\treturn BitConverter.ToString(\n\t\t\tSHA1.Create().ComputeHash(Encoding.UTF8.GetBytes(input))\n\t\t).Replace(\"-\",\"\").ToLowerInvariant());\n\t}`, true\n\tcase \"notImplemented\":\n\t\treturn fmt.Sprintf(`\n%sstatic object NotImplemented(string errorMessage) \n%s{\n%s throw new System.NotImplementedException(errorMessage);\n%s}`, indent, indent, indent, indent), true\n\tdefault:\n\t\treturn \"\", false\n\t}\n}", "func TestGetNone4A(t *testing.T) {\n}", "func (f *Ifacer) getUniqueImportName(pkgName string, level int) string {\n\tstrs := strings.Split(pkgName, string(filepath.Separator))\n\n\tlenStr := len(strs)\n\n\tif lenStr-1 < level {\n\t\tf.logger.Panicf(\"%d out of range\", level)\n\t}\n\n\tvar importName string\n\tfor _, str := range strs[lenStr-level-1:] {\n\t\tif strings.Contains(str, \".\") {\n\t\t\tstr = strings.Replace(str, \".\", \"\", -1)\n\t\t}\n\t\timportName += str\n\t}\n\n\treturn importName\n}", "func DummyStringGetterFunction(name string) string {\n\treturn name\n}", "func almostOkayFunction() {\n\treturn nil\n}", "func isBadVersion(version int) bool{\n return false\n}", "func trimCaller(funcName string) string {\n\t// ex:\n\t// funcName = \"github.com/ddo/request.(*Client).Request\"\n\t// arrDir = [github.com ddo request.(*Client).Request]\n\t// lastDir = request.(*Client).Request\n\t// arrCaller = [request. (*Client).Request]\n\n\tarrDir := strings.Split(funcName, \"/\")\n\tlastDir := arrDir[len(arrDir)-1]\n\tarrCaller := strings.Split(lastDir, \".\")\n\n\tif len(arrCaller) < 2 {\n\t\treturn \"\"\n\t}\n\n\treturn arrCaller[len(arrCaller)-1]\n}", "func getValidPrefix(s string, base int64) string {\n\ttrace_util_0.Count(_util_00000, 47)\n\tvar (\n\t\tvalidLen int\n\t\tupper rune\n\t)\n\tswitch {\n\tcase base >= 2 && base <= 9:\n\t\ttrace_util_0.Count(_util_00000, 51)\n\t\tupper = rune('0' + base)\n\tcase base <= 36:\n\t\ttrace_util_0.Count(_util_00000, 52)\n\t\tupper = rune('A' + base - 10)\n\tdefault:\n\t\ttrace_util_0.Count(_util_00000, 53)\n\t\treturn \"\"\n\t}\n\ttrace_util_0.Count(_util_00000, 48)\nLoop:\n\tfor i := 0; i < len(s); i++ {\n\t\ttrace_util_0.Count(_util_00000, 54)\n\t\tc := rune(s[i])\n\t\tswitch {\n\t\tcase unicode.IsDigit(c) || unicode.IsLower(c) || unicode.IsUpper(c):\n\t\t\ttrace_util_0.Count(_util_00000, 55)\n\t\t\tc = unicode.ToUpper(c)\n\t\t\tif c < upper {\n\t\t\t\ttrace_util_0.Count(_util_00000, 58)\n\t\t\t\tvalidLen = i + 1\n\t\t\t} else {\n\t\t\t\ttrace_util_0.Count(_util_00000, 59)\n\t\t\t\t{\n\t\t\t\t\tbreak Loop\n\t\t\t\t}\n\t\t\t}\n\t\tcase c == '+' || c == '-':\n\t\t\ttrace_util_0.Count(_util_00000, 56)\n\t\t\tif i != 0 {\n\t\t\t\ttrace_util_0.Count(_util_00000, 60)\n\t\t\t\tbreak Loop\n\t\t\t}\n\t\tdefault:\n\t\t\ttrace_util_0.Count(_util_00000, 57)\n\t\t\tbreak Loop\n\t\t}\n\t}\n\ttrace_util_0.Count(_util_00000, 49)\n\tif validLen > 1 && s[0] == '+' {\n\t\ttrace_util_0.Count(_util_00000, 61)\n\t\treturn s[1:validLen]\n\t}\n\ttrace_util_0.Count(_util_00000, 50)\n\treturn s[:validLen]\n}", "func sanitizePackageName(importPath string) string {\n\talias := path.Base(importPath)\n\n\t// alias should be lower case\n\talias = strings.ToLower(alias)\n\n\t// alias should now only contain alphanumerics\n\timportsRegex := regexp.MustCompile(`[^a-z0-9]`)\n\talias = importsRegex.ReplaceAllString(alias, \"\")\n\n\t// can't have a first digit, per Go identifier rules, so just skip them\n\talias = strings.TrimLeftFunc(alias, unicode.IsDigit)\n\n\t// If path part was all digits, we may be left with an empty string. In this case use \"pkg\" as the alias.\n\tif alias == \"\" {\n\t\talias = \"pkg\"\n\t}\n\n\treturn alias\n}", "func TestPrewriteWrittenNoConflict4A(t *testing.T) {\n}", "func getOID(oid string) (string, error) {\n\tif strings.HasPrefix(oid, \".\") {\n\t\treturn oid, nil\n\t}\n\tmu.Lock()\n\tdefer mu.Unlock()\n\tfixed, ok := lookupOID[oid]\n\tif !ok {\n\t\treturn oid, errors.Errorf(\"no OID found for %s\", oid)\n\t}\n\treturn fixed, nil\n}", "func legacyFileName(prefix, instance, class, id string) string {\n\tvar fileName string\n\tinstance = strings.Replace(instance, \"\\\\\", \"__\", -1)\n\n\t// use it to build the file name\n\tif prefix == \"\" {\n\t\tfileName = fmt.Sprintf(\"%s_%s_%s.status\", instance, class, id)\n\t} else {\n\t\tfileName = fmt.Sprintf(\"%s_%s_%s_%s.status\", prefix, instance, class, id)\n\t}\n\treturn fileName\n}", "func uniquePackageOf(fd *descriptor.FileDescriptorProto) string {\n\ts, ok := uniquePackageName[fd]\n\tif !ok {\n\t\tlog.Fatal(\"internal error: no package name defined for \" + fd.GetName())\n\t}\n\treturn s\n}", "func getForcedGetter(sourceUrl string) (string, string) {\n\tif matches := forcedRegexp.FindStringSubmatch(sourceUrl); matches != nil && len(matches) > 2 {\n\t\treturn matches[1], matches[2]\n\t}\n\n\treturn \"\", sourceUrl\n}", "func getFullyQualifiedFunctionName(fn interface{}) string {\n\treturn runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()\n}", "func TestEmptyPrewrite4A(t *testing.T) {\n}", "func internalStartsWith(str string, prefix string, ignoreCase bool) bool {\n\tif str == \"\" || prefix == \"\" {\n\t\treturn (str == \"\" && prefix == \"\")\n\t}\n\tif utf8.RuneCountInString(prefix) > utf8.RuneCountInString(str) {\n\t\treturn false\n\t}\n\tif ignoreCase {\n\t\treturn strings.HasPrefix(strings.ToLower(str), strings.ToLower(prefix))\n\t}\n\treturn strings.HasPrefix(str, prefix)\n}", "func TestGetEmpty4A(t *testing.T) {\n}", "func ExampleMustSqueezeTrytes() {}", "func getAliasId(name string, mountAccessor string, entityAliasList *map[string]EntityAlias) string {\n\tfor aliasID, alias := range *entityAliasList {\n\t\tif alias.Name == name && alias.MountAccessor == mountAccessor {\n\t\t\treturn aliasID\n\t\t}\n\t}\n\treturn \"\"\n}", "func getInternalParentPrefix(pkgName string) string {\n\tcleanedPath := filepath.Clean(pkgName)\n\texplodedPath := strings.Split(cleanedPath, string(os.PathSeparator))\n\n\ti := len(explodedPath) - 1\n\tfor ; i > 0; i-- {\n\t\tif explodedPath[i] == internal {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn filepath.Join(explodedPath[0:i]...)\n}", "func smallestGoodBase(n string) string {\n \n}", "func idFromName(name string) string {\n\ts := strings.Split(strings.ToLower(strings.TrimSpace(name)), \" \")\n\tns := strings.Join(s, \"-\")\n\ts = strings.Split(ns, \".\")\n\treturn strings.Join(s, \"-\")\n}", "func packageName(skip int) (long, short string, ok bool) {\n\t// Full function name looks like path/to/pkg.Func\n\tvar f string\n\t_, _, f, ok = fullCaller(skip + 1)\n\tif !ok {\n\t\treturn\n\t}\n\n\t// Strip down to path/to/pkg\n\tdot := strings.LastIndex(f, \".\")\n\tif dot == -1 {\n\t\treturn\n\t}\n\tlong = f[:dot]\n\n\t// Strip down to pkg\n\tslash := strings.LastIndex(long, \"/\")\n\tif slash == -1 {\n\t\treturn\n\t}\n\tshort = long[slash+1:]\n\treturn\n}", "func TestSinglePrewrite4A(t *testing.T) {\n}", "func getPathConversionFunction() func(string) string {\n\tif runtime.GOOS != \"windows\" || os.Getenv(\"DOCKER_MACHINE_NAME\") == \"\" {\n\t\treturn func(path string) string { return path }\n\t}\n\n\treturn func(path string) string {\n\t\treturn fmt.Sprintf(\"/%s%s\", strings.ToUpper(path[:1]), path[2:])\n\t}\n}", "func FullNameNakedReturn(f, l string) (full string, length int) {\n full = f + \" \" + l;\n length = len(full)\n return \n}", "func resolveSourcePrefix(source string, sa Source) string {\n\tif sa.Prefix == \"false\" || sa.Prefix == \"\" {\n\t\treturn \"\"\n\t} else if sa.Prefix == \"true\" {\n\t\treturn source + \"_\"\n\t} else {\n\t\treturn sa.Prefix + \"_\"\n\t}\n}", "func TestManifestAPI_Get_UnknownSchema(t *testing.T) {}", "func checkSafeNameChars(nameFragment string) error {\n\tfor i, ch := range nameFragment {\n\t\tswitch {\n\t\tcase 'a' <= ch && ch <= 'z':\n\t\tcase '0' <= ch && ch <= '9':\n\t\tcase ch == '_':\n\t\tdefault:\n\t\t\treturn fmt.Errorf(\"Name fragment is not safe: %x at %d.\", ch, i)\n\t\t}\n\t\t// NO: case ch == '.'\n\t\t// Could also allow at most one dot but not for SQLite.\n\t\t// Maybe would make sense for other SQL DBMS which\n\t\t// use schema names / namespaces.\n\t}\n\treturn nil\n}", "func isCommonRetryableErrorCode(err error) (bool, string) {\n\tgerr, ok := err.(*googleapi.Error)\n\tif !ok {\n\t\treturn false, \"\"\n\t}\n\n\tif gerr.Code == 429 || gerr.Code == 500 || gerr.Code == 502 || gerr.Code == 503 {\n\t\tlog.Printf(\"[DEBUG] Dismissed an error as retryable based on error code: %s\", err)\n\t\treturn true, fmt.Sprintf(\"Retryable error code %d\", gerr.Code)\n\t}\n\treturn false, \"\"\n}", "func goodFunction() {\n\treturn nil\n}", "func getCallerPackage() (string, bool) {\n\tvar pkg string\n\tpc, _, _, ok := runtime.Caller(2)\n\tif !ok {\n\t\treturn pkg, false\n\t}\n\tparts := strings.Split(runtime.FuncForPC(pc).Name(), \".\")\n\tif parts[len(parts)-2][0] == '(' {\n\t\tpkg = strings.Join(parts[0:len(parts)-2], \".\")\n\t} else {\n\t\tpkg = strings.Join(parts[0:len(parts)-1], \".\")\n\t}\n\treturn pkg, true\n}", "func _getFuncName() string {\n var ptrVal = _getFuncPtrVal()\n\n // Look up the function object\n var fun = runtime.FuncForPC(ptrVal)\n\n // returns: _/home/user/src/gohavenet/src.TestProcMgr_False\n var funcNamePath = fun.Name()\n\n // Split on the slash and return just the func name\n var pathElems = strings.Split(funcNamePath, \"/\")\n var index = len(pathElems) - 1\n if index < 0 {\n index = 0\n }\n\n return pathElems[index]\n}", "func getPatchVersionTrimmed(version string) string {\n\tendIndex := strings.LastIndex(version, \".\")\n\tif endIndex != -1 {\n\t\tversion = version[:endIndex]\n\t}\n\treturn version\n}", "func fixLegacyInventoryName(obj *unstructured.Unstructured) error {\n\tif obj.GetName() == legacyInvName {\n\t\tklog.V(4).Infof(\"renaming legacy inventory name\")\n\t\trandomSuffix := common.RandomStr()\n\t\treturn addSuffixToName(obj, randomSuffix)\n\t}\n\treturn nil\n}", "func callerName(skip int) (pkgPath, funcName string, ok bool) {\n\tvar pc [1]uintptr\n\tn := runtime.Callers(skip+1, pc[:])\n\tif n != 1 {\n\t\treturn \"\", \"\", false\n\t}\n\n\tf := runtime.FuncForPC(pc[0]).Name()\n\ts := pkgPathRe.FindStringSubmatch(f)\n\tif len(s) < 3 {\n\t\tpanic(fmt.Errorf(\"failed to extract package path and function name from %q\", f))\n\t}\n\n\treturn s[1], s[2], true\n}", "func getValidContainerName(volumeName, protocol string) string {\n\tcontainerName := strings.ToLower(volumeName)\n\tif len(containerName) > containerNameMaxLength {\n\t\tcontainerName = containerName[0:containerNameMaxLength]\n\t}\n\tif !checkContainerNameBeginAndEnd(containerName) || len(containerName) < containerNameMinLength {\n\t\t// now we set as 63 for maximum container name length\n\t\t// todo: get cluster name\n\t\tcontainerName = k8sutil.GenerateVolumeName(fmt.Sprintf(\"pvc-%s\", protocol), uuid.NewUUID().String(), 63)\n\t\tklog.Warningf(\"the requested volume name (%q) is invalid, so it is regenerated as (%q)\", volumeName, containerName)\n\t}\n\tcontainerName = strings.Replace(containerName, \"--\", \"-\", -1)\n\n\treturn containerName\n}", "func funcName() string {\n\tpc, _, _, _ := runtime.Caller(1)\n\tcompleteFuncname := runtime.FuncForPC(pc).Name()\n\treturn strings.Split(completeFuncname, \".\")[len(strings.Split(completeFuncname, \".\"))-1]\n}", "func ensureValidHelper(name string, funcValue reflect.Value) {\n\tif funcValue.Kind() != reflect.Func {\n\t\tpanic(fmt.Errorf(\"Helper must be a function: %s\", name))\n\t}\n\n\tfuncType := funcValue.Type()\n\n\tif funcType.NumOut() != 1 {\n\t\tpanic(fmt.Errorf(\"Helper function must return a string or a SafeString: %s\", name))\n\t}\n\n\t// @todo Check if first returned value is a string, SafeString or interface{} ?\n}", "func exactFunction() {\n\treturn nil\n}", "func TestUidForUsername(t *testing.T) {\n\tuid, err := uidForUsername(\"root\")\n\tif err != nil {\n\t\tt.Errorf(\"uidForUsername(\\\"root\\\") returned error: %v\", err)\n\t\treturn\n\t}\n\tif uid != 0 {\n\t\tt.Errorf(\"uidForUsername(\\\"root\\\") returned %d, should be 0\", uid)\n\t}\n\n\t_, err = uidForUsername(\"asdfASDFxxx999\")\n\tif err == nil {\n\t\tt.Errorf(\"uidForUsername(\\\"asdfASDFxxx\\\") did not return error\")\n\t\treturn\n\t}\n}", "func getGroupIdString(id interface{}) (gid string, err error) {\r\n\tswitch t := id.(type) {\r\n\tcase string:\r\n\t\tif strings.Contains(id.(string), \"http\") {\r\n\t\t\treturn \"url=\" + url.QueryEscape(id.(string)), nil // group url\r\n\t\t}\r\n\t\treturn id.(string), nil // group id as a string\r\n\tcase uint64:\r\n\t\treturn strconv.FormatUint(id.(uint64), 10), nil // group id as an int\r\n\tdefault:\r\n\t\treturn gid, errors.New(fmt.Sprintf(\"Group ID type exception: Expecting string or uint64 got %T\", t))\r\n\t}\r\n}", "func GoodEnoughUUID() string {\n\tb := make([]byte, 16)\n\t_, err := rand.Read(b)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tuuid := fmt.Sprintf(\"%x-%x-%x-%x-%x\",\n\t\tb[0:4], b[4:6], b[6:8], b[8:10], b[10:])\n\treturn uuid\n}", "func mustBeUnique(label string) {\n\n\tif _, ok := functions[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as function\", label))\n\t}\n\n\tif _, ok := variables[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as variable\", label))\n\t}\n\n\tif _, ok := aliases[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as alias\", label))\n\t}\n}", "func ensureDot(extension string) string {\n\tif strings.Index(extension, \".\") == -1 {\n\t\textension = \".\" + extension\n\t}\n\treturn extension\n}", "func getSafeString(input interface{}) string {\r\n\tvar safeValue string\r\n\tvar isOk bool\r\n\r\n\tif input == nil {\r\n\t\tsafeValue = \"\"\r\n\t} else {\r\n\t\tsafeValue, isOk = input.(string)\r\n\t\tif isOk == false {\r\n\t\t\tsafeValue = \"\"\r\n\t\t}\r\n\t}\r\n\treturn safeValue\r\n}", "func mustGetUUID() string {\n\tu, err := uuid.NewRandom()\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\treturn u.String()\n}", "func fn3() { // want fn3:`Deprecated: Don't use this\\.`\n}", "func ensurePrefix(s, prefix string) string {\n\tif !strings.HasPrefix(s, prefix) {\n\t\ts = prefix + s\n\t}\n\treturn s\n}", "func prepareHashPath(path, prefix string) string {\n\t// I need to strip the prefix. But... where does the prefix come from\n\treturn \"/\" + strings.TrimPrefix(path, prefix)\n}", "func pySafeName(nm string) string {\n\tif _, bad := pyKeywords[nm]; bad {\n\t\treturn \"my\" + nm\n\t}\n\treturn nm\n}", "func fullCaller(skip int) (file string, line int, fnc string, ok bool) {\n\tvar pc uintptr\n\tpc, file, line, ok = runtime.Caller(skip + 1)\n\tif !ok {\n\t\treturn\n\t}\n\n\tf := runtime.FuncForPC(pc)\n\tfnc = f.Name()\n\treturn\n}", "func getValidVersion(version string) string {\n\tif version != \"\" {\n\t\treturn version\n\t}\n\n\treturn \"Not Installed\"\n}", "func makeSafeFileName(s string) string {\n\tconst maxLen = 200 // slightly arbitrary but must be <= 254 for most modern filesystems\n\n\t// First, tidy the file path to a clean representation\n\tresult := filepath.Clean(s)\n\n\t// Next, split the path into elements between separators and check each element.\n\telements := filepath.SplitList(result)\n\tnewElements := []string{}\n\n\tfor _, element := range elements {\n\t\tnewElements = append(newElements, makeSafeFileElement(element))\n\t}\n\n\tresult = filepath.Join(newElements...)\n\n\t// Also avoid starting a file name with a period as this has a special meaning on UNIX\n\t// and UNIX-like systems.\n\tdir := filepath.Dir(result)\n\tbase := filepath.Base(result)\n\n\tif base[0] == '.' {\n\t\tresult = filepath.Join(dir, base[1:])\n\t}\n\n\t// Ensure the resulting name isn't too long, as X.509 distinguished names can be very long.\n\tif len(result) > maxLen {\n\t\tresult = result[:maxLen]\n\t}\n\n\treturn result\n}", "func TestDiskIOStats_diskName(t *testing.T) {\n\ttests := []struct {\n\t\ttemplates []string\n\t\texpected string\n\t}{\n\t\t{[]string{\"$MY_PARAM_1\"}, \"myval1\"},\n\t\t{[]string{\"${MY_PARAM_1}\"}, \"myval1\"},\n\t\t{[]string{\"x$MY_PARAM_1\"}, \"xmyval1\"},\n\t\t{[]string{\"x${MY_PARAM_1}x\"}, \"xmyval1x\"},\n\t\t{[]string{\"$MISSING\", \"$MY_PARAM_1\"}, \"myval1\"},\n\t\t{[]string{\"$MY_PARAM_1\", \"$MY_PARAM_2\"}, \"myval1\"},\n\t\t{[]string{\"$MISSING\"}, \"null\"},\n\t\t{[]string{\"$MY_PARAM_1/$MY_PARAM_2\"}, \"myval1/myval2\"},\n\t\t{[]string{\"$MY_PARAM_2/$MISSING\"}, \"null\"},\n\t}\n\n\tfor _, tc := range tests {\n\t\tfunc() {\n\t\t\ts := DiskIO{\n\t\t\t\tNameTemplates: tc.templates,\n\t\t\t}\n\t\t\tdefer setupNullDisk(t, &s, \"null\")() //nolint:revive // done on purpose, cleaning will be executed properly\n\t\t\tname, _ := s.diskName(\"null\")\n\t\t\trequire.Equal(t, tc.expected, name, \"Templates: %#v\", tc.templates)\n\t\t}()\n\t}\n}", "func pySafeArg(anm string, idx int) string {\n\tif anm == \"\" {\n\t\tanm = fmt.Sprintf(\"arg_%d\", idx)\n\t}\n\treturn pySafeName(anm)\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func TestAliasingRecursionInvalid(t *testing.T) {\n\t_, errs := PrototypeString(`alias x = x\n\t\tx`)\n\tgoutil.AssertNow(t, errs != nil, \"errs should not be nil\")\n}", "func getPackageName(f string) string {\n\tfor {\n\t\tlastPeriod := strings.LastIndex(f, \".\")\n\t\tlastSlash := strings.LastIndex(f, \"/\")\n\t\tif lastPeriod > lastSlash {\n\t\t\tf = f[:lastPeriod]\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn f\n}", "func getFunctionName(fn interface{}) string {\n\tname := runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()\n\n\t// Method above returns functions in the form : main.foo\n\tparts := strings.Split(name, \".\")\n\treturn parts[len(parts)-1]\n}", "func cleanUserName(userName string) string {\n\tuserName = strings.Replace(userName, \"-\", \"\", -1)\n\tuserName = strings.Replace(userName, \".\", \"\", -1)\n\tuserName = strings.Replace(userName, \"_\", \"\", -1)\n\treturn strings.ToLower(userName)\n}", "func CheckIDFormat(ComponentID string) bool {\n if len(ComponentID) != 9 {\n // check the length of the ComponentID is nine\n return false\n } else if _, err := strconv.Atoi(ComponentID); err != nil {\n // check the ComponentID are all digits\n return false\n } else {\n // now everything looks fine\n return true\n }\n}", "func getSinglePath(v interface{}) (string, error) {\n\tif name, err := resourceName(v); err != nil {\n\t\treturn \"\", err\n\t} else if id, err := resourceId(v); err != nil {\n\t\treturn \"\", err\n\t} else {\n\t\treturn fmt.Sprintf(\"%s(%d)\", name, id), nil\n\t}\n}", "func getUserIdString(id string) (uid string) {\r\n\tif id == \"~\" || id == \"\" {\r\n\t\treturn \"~\" // me\r\n\t} else if strings.Contains(id, \"http\") {\r\n\t\treturn \"url=\" + url.QueryEscape(id) // someone else\r\n\t} else {\r\n\t\treturn \"id=\" + id // someone else's url\r\n\t}\r\n}", "func OldGetAnnotation(c, name string) string {\n\tprefix := fmt.Sprintf(\"+%s:\", name)\n\tif strings.HasPrefix(c, prefix) {\n\t\treturn strings.TrimPrefix(c, prefix)\n\t}\n\treturn \"\"\n}", "func TestPrewriteMultiple4A(t *testing.T) {\n}", "func TestSanitizedName(t *testing.T) {\n\ttables := []struct {\n\t\tbadPath string\n\t\tgoodPath string\n\t}{\n\t\t{\"\\\\..\\\\1.txt\", \"1.txt\"},\n\t\t{\"///foo/bar\", \"foo/bar\"},\n\t\t{\"C:/loo/bar2\", \"loo/bar2\"},\n\t\t{\"C:\\\\loo\\\\bar2\", \"loo\\\\bar2\"},\n\t\t{\"../../foo../../ba..r\", \"foo../ba..r\"},\n\t\t{\"../my.file\", \"my.file\"},\n\t}\n\tfor _, table := range tables {\n\t\tfixedPath := sanitizedName(table.badPath)\n\t\tif fixedPath != table.goodPath {\n\t\t\tt.Errorf(\"expected and fixedPath didn't match - %s : %s\", table.goodPath, fixedPath)\n\t\t}\n\t}\n}", "func getReqNameId(reqIIdList []cres.IID, driverNameId string) string {\n\tfor _, iid := range reqIIdList {\n\t\tif iid.SystemId == driverNameId {\n\t\t\treturn iid.NameId\n\t\t}\n\t}\n\treturn \"\"\n}", "func getAbsoluteURL(item *string, original_item string, url *url.URL) {\n var domain string = strings.Join(strings.Split(url.String(), \"/\")[:3], \"/\")\n if (strings.HasPrefix(*item, \"/\")) {\n if (strings.HasSuffix(url.String(), \"/\")) {\n *item = domain + (*item)[1:]\n } else {\n *item = domain + *item\n }\n utils.Log.Printf(\"[*] Modified item for URL for %s. Transformed from %s to %s\\n\", url, original_item, *item)\n }\n\n if (strings.HasPrefix(url.String(), \" \")) {\n *item = (*item)[1:]\n utils.Log.Printf(\"[*] Modified %s. Removed space from %s on %s\\n\", *item, original_item, url)\n }\n\n\n}", "func TestSimpleParser_baseUrl_err(t *testing.T) {\n\tif baseUrl(\"1234\") != \"1234\" {\n\t\tt.Logf(\"baseUrl method is expected to return original link on error\")\n\t\tt.FailNow()\n\t}\n}", "func notTested() string {\n\treturn \"This function isn't tested!\"\n}", "func asSupportedParameter(param string) (string, bool) {\n\tlower := strings.ToLower(param)\n\treturn lower, lowerCaseParameters[lower]\n}", "func getUID(lib utils.PathIdentifier) string {\n\treturn lib.Key()[:5]\n}", "func getFullName()(string, string) {\n\treturn \"Ninja\", \"Coder\"\n}", "func LegacyOrigin(parts ...string) (ret string) {\n\tfor index, i := range parts {\n\t\tret += i\n\t\tif index < len(parts)-1 {\n\t\t\tret += LegacyOriginSeparator\n\t\t}\n\t}\n\treturn\n}", "func generateUUID() string {\n uuid4, _ := uuid.NewV4()\n return uuid4.String()\n}", "func shadowedByParam2() (math string, fmt int) { return }", "func getInternalMountPath(workingMountDir string, vol *smbVolume) string {\n\tif vol == nil {\n\t\treturn \"\"\n\t}\n\tmountDir := vol.uuid\n\tif vol.uuid == \"\" {\n\t\tmountDir = vol.subDir\n\t}\n\treturn filepath.Join(workingMountDir, mountDir)\n}", "func wrapClientID(clientID string) string {\n\thostname, err := os.Hostname()\n\tif err != nil {\n\t\thostname = \"<error>\"\n\t}\n\n\t// Replace all non-alphanumeric chars with something benign that will work in the client id.\n\tre := regexp.MustCompile(\"[^a-zA-Z0-9]+\")\n\thostname = re.ReplaceAllString(hostname, \"-\")\n\n\t// Special case for running locally, add random\n\tif runtime.GOOS == \"darwin\" {\n\t\thostname += strconv.Itoa(rand.Intn(100))\n\t\treturn fmt.Sprintf(\"%s-%s\", clientID, hostname)\n\t}\n\treturn fmt.Sprintf(\"%s-%s\", clientID, hostname)\n}", "func getShorterString(a string, b string) int {\n\tif len(a) <= len(b) {\n\t\treturn len(a)\n\t}\n\treturn len(b)\n}", "func callerShortfile(file string, lastsep_ ...rune) string {\n\tlastsep := '/'\n\tif len(lastsep_) > 0 {\n\t\tlastsep = lastsep_[0]\n\t}\n\tshort := file\n\tfor i := len(file) - 1; i > 0; i-- {\n\t\tif file[i] == byte(lastsep) {\n\t\t\tshort = file[i+1:]\n\t\t\tbreak\n\t\t}\n\t}\n\treturn short\n}", "func unqualify(importPath string) string {\n\tif i := strings.LastIndex(importPath, sep); i != -1 {\n\t\timportPath = importPath[i+len(sep):]\n\t}\n\treturn importPath\n}", "func Test_HasPrefix(t *testing.T) {\n\tvalue := \"main.go\"\n\tprefix := \"main\"\n\tif !strings.HasPrefix(value, prefix) {\n\t\tt.Fatalf(\"expected %s to have prefix %s\", value, prefix)\n\t}\n}", "func cleancompstr(cleanup string) string {\n\tcleanup = strings.TrimSpace(cleanup)\n\tcleanup = strings.ToLower(cleanup)\n\treturn cleanup\n}", "func badTemper(string, string) (*os.File, error) {\n\treturn nil, fmt.Errorf(\"oups\")\n}", "func (d *Abstraction) getGeneratedName(s string, m string) string {\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(s)\n\tbuffer.WriteString(\".\")\n\tbuffer.WriteString(m)\n\treturn buffer.String()\n}", "func helper(k string) interface{} {\n\treturn k\n}", "func getUsername() string {\n\tlog.Debug(\"getUsername\")\n\tu := \"unknown\"\n\tosUser := \"\"\n\n\tswitch runtime.GOOS {\n\tcase \"darwin\", \"linux\", \"solaris\":\n\t\tosUser = os.Getenv(\"USER\")\n\tcase \"windows\":\n\t\tosUser = os.Getenv(\"USERNAME\")\n\n\t\t// remove domain\n\t\tosUser = osUser[strings.LastIndex(osUser, \"\\\\\")+1:]\n\t\tlog.Debugf(\"Windows user has been transformed into %s\", osUser)\n\n\t\t// HACK ugly ... if localized administrator, translate to administrator\n\t\tif isWinAdministrator(osUser) {\n\t\t\tosUser = \"Administrator\"\n\t\t}\n\t}\n\n\tif osUser != \"\" {\n\t\tu = osUser\n\t}\n\treturn u\n}", "func getCaller(skip int, shortFileName bool) string {\n\tvar b strings.Builder\n\t_, file, no, ok := runtime.Caller(skip)\n\tif ok {\n\t\tif shortFileName {\n\t\t\tif lastSlashIndex := strings.LastIndex(file, \"/\"); lastSlashIndex != -1 {\n\t\t\t\tfile = file[lastSlashIndex+1:]\n\t\t\t}\n\t\t}\n\t\tfmt.Fprintf(&b, \"%s:%d\", file, no)\n\t}\n\treturn b.String()\n}", "func ensureTrailingDot(details string) string {\n\tif !strings.HasSuffix(details, \".\") {\n\t\treturn fmt.Sprintf(\"%s.\", details)\n\t}\n\treturn details\n}", "func isBadVersion(version int) bool{\n\treturn true\n}", "func TestGetWrongUUID(t *testing.T) {\n\tclearTable()\n nt := New{{.NameExported}}()\n add{{.NameExported}}(nt)\n badUid := \"00000000-d01d-4c09-a4e7-59026d143b89\"\n\n\tstatement := fmt.Sprintf({{.NameExported}}URL, badUid)\n\n\treq, _ := http.NewRequest(\"GET\", statement, nil)\n\tresponse := executeRequest(req)\n\n\tcheckResponseCode(t, http.StatusNotFound, response.Code)\n}", "func LegacyInstanceObjectID(obj *ResourceInstanceObjectSrc) string {\n\tif obj == nil {\n\t\treturn \"<not created>\"\n\t}\n\n\tif obj.AttrsJSON != nil {\n\t\ttype WithID struct {\n\t\t\tID string `json:\"id\"`\n\t\t}\n\t\tvar withID WithID\n\t\terr := json.Unmarshal(obj.AttrsJSON, &withID)\n\t\tif err == nil {\n\t\t\treturn withID.ID\n\t\t}\n\t} else if obj.AttrsFlat != nil {\n\t\tif flatID, exists := obj.AttrsFlat[\"id\"]; exists {\n\t\t\treturn flatID\n\t\t}\n\t}\n\n\t// For resource types created after we removed id as special there may\n\t// not actually be one at all. This is okay because older tests won't\n\t// encounter this, and new tests shouldn't be using ids.\n\treturn \"<none>\"\n}", "func getErrOrigin() string {\n\tvar origin string\n\tif pc, file, line, ok := runtime.Caller(2); ok {\n\t\tif f := runtime.FuncForPC(pc); f != nil {\n\t\t\tif wd, err := os.Getwd(); err == nil {\n\t\t\t\torigin = fmt.Sprintf(\"%s %s:%d\", strings.TrimPrefix(f.Name(), pkgPath), strings.TrimPrefix(file, wd+string(os.PathSeparator)), line)\n\t\t\t}\n\t\t}\n\t}\n\treturn origin\n}", "func (objectIDs *DbObjectIDs) getUniqueID() (string, error) {\n\tid := objectIDs.ownerControllerName + \":\" + string(objectIDs.idsType.ownerObjectType)\n\tfor _, key := range objectIDs.idsType.GetExternalIDKeys() {\n\t\tvalue, ok := objectIDs.objectIDs[key]\n\t\tif !ok {\n\t\t\treturn \"\", fmt.Errorf(\"key %v is required but not present\", key)\n\t\t}\n\t\tid += \":\" + value\n\t}\n\treturn id, nil\n}", "func getCallPriorityID(strPriorityName string, espXmlmc *apiLib.XmlmcInstStruct, buffer *bytes.Buffer) (string, string) {\n\tpriorityID := \"\"\n\tif swImportConf.PriorityMapping[strPriorityName] != nil {\n\t\tstrPriorityName = fmt.Sprintf(\"%s\", swImportConf.PriorityMapping[strPriorityName])\n\t\tif strPriorityName != \"\" {\n\t\t\tpriorityID = getPriorityID(strPriorityName, espXmlmc, buffer)\n\t\t}\n\t}\n\treturn priorityID, strPriorityName\n}" ]
[ "0.54382825", "0.537262", "0.5215815", "0.5027418", "0.4975398", "0.49496406", "0.48785368", "0.48031178", "0.4786201", "0.47657558", "0.47629273", "0.47359633", "0.47222048", "0.47043297", "0.47027624", "0.46904278", "0.46901387", "0.46885514", "0.46665755", "0.46659398", "0.46592057", "0.46564803", "0.46520862", "0.46506956", "0.4650385", "0.46303272", "0.46296483", "0.4629173", "0.4628825", "0.46284923", "0.4625966", "0.4624669", "0.46244738", "0.4619596", "0.46129894", "0.46062362", "0.4603694", "0.46027172", "0.46010837", "0.45992196", "0.4595422", "0.45953396", "0.45938143", "0.45878768", "0.45863846", "0.45860708", "0.45778158", "0.45708576", "0.4562223", "0.45579806", "0.45571515", "0.45400572", "0.4538702", "0.45375508", "0.45348978", "0.4533087", "0.4532056", "0.45305866", "0.45279145", "0.45279145", "0.45279145", "0.45279145", "0.45227525", "0.4520747", "0.45180294", "0.45163244", "0.45158538", "0.45143905", "0.45078984", "0.44996935", "0.44993386", "0.4499218", "0.44967684", "0.44954318", "0.44913954", "0.44851273", "0.44821027", "0.4480578", "0.4480466", "0.44804257", "0.4477861", "0.44712496", "0.44705343", "0.44680944", "0.44623426", "0.44565588", "0.4452436", "0.44511658", "0.44499886", "0.44494784", "0.44493905", "0.4445965", "0.44443068", "0.44378096", "0.4436986", "0.44309473", "0.44284478", "0.44276965", "0.44272083", "0.44260067", "0.44246325" ]
0.0
-1
This is a courtesy helper function, which in some cases may not work as expected!
func (s *VPCService) GetVPCOfferingByName(name string, opts ...OptionFunc) (*VPCOffering, int, error) { id, count, err := s.GetVPCOfferingID(name, opts...) if err != nil { return nil, count, err } r, count, err := s.GetVPCOfferingByID(id, opts...) if err != nil { return nil, count, err } return r, count, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func getHelperMethodIfNeeded(functionName string, indent string) (string, bool) {\n\tswitch functionName {\n\tcase \"filebase64sha256\":\n\t\treturn `function computeFilebase64sha256(path string) string {\n\tconst fileData = Buffer.from(fs.readFileSync(path), 'binary')\n\treturn crypto.createHash('sha256').update(fileData).digest('hex')\n}`, true\n\tcase \"notImplemented\":\n\t\treturn fmt.Sprintf(\n\t\t\t`%sfunction notImplemented(message: string) {\n%s throw new Error(message);\n%s}`, indent, indent, indent), true\n\tcase \"singleOrNone\":\n\t\treturn fmt.Sprintf(\n\t\t\t`%sfunction singleOrNone<T>(elements: pulumi.Input<T>[]): pulumi.Input<T> {\n%s if (elements.length != 1) {\n%s throw new Error(\"singleOrNone expected input list to have a single element\");\n%s }\n%s return elements[0];\n%s}`, indent, indent, indent, indent, indent, indent), true\n\tdefault:\n\t\treturn \"\", false\n\t}\n}", "func getHelperMethodIfNeeded(functionName string, indent string) (string, bool) {\n\tswitch functionName {\n\tcase \"filebase64\":\n\t\treturn `private static string ReadFileBase64(string path) {\n\t\treturn Convert.ToBase64String(System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path)));\n\t}`, true\n\tcase \"filebase64sha256\":\n\t\treturn `private static string ComputeFileBase64Sha256(string path) {\n\t\tvar fileData = System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path));\n\t\tvar hashData = SHA256.Create().ComputeHash(fileData);\n\t\treturn Convert.ToBase64String(hashData);\n\t}`, true\n\tcase \"sha1\":\n\t\treturn `private static string ComputeSHA1(string input) {\n\t\treturn BitConverter.ToString(\n\t\t\tSHA1.Create().ComputeHash(Encoding.UTF8.GetBytes(input))\n\t\t).Replace(\"-\",\"\").ToLowerInvariant());\n\t}`, true\n\tcase \"notImplemented\":\n\t\treturn fmt.Sprintf(`\n%sstatic object NotImplemented(string errorMessage) \n%s{\n%s throw new System.NotImplementedException(errorMessage);\n%s}`, indent, indent, indent, indent), true\n\tdefault:\n\t\treturn \"\", false\n\t}\n}", "func TestGetNone4A(t *testing.T) {\n}", "func (f *Ifacer) getUniqueImportName(pkgName string, level int) string {\n\tstrs := strings.Split(pkgName, string(filepath.Separator))\n\n\tlenStr := len(strs)\n\n\tif lenStr-1 < level {\n\t\tf.logger.Panicf(\"%d out of range\", level)\n\t}\n\n\tvar importName string\n\tfor _, str := range strs[lenStr-level-1:] {\n\t\tif strings.Contains(str, \".\") {\n\t\t\tstr = strings.Replace(str, \".\", \"\", -1)\n\t\t}\n\t\timportName += str\n\t}\n\n\treturn importName\n}", "func DummyStringGetterFunction(name string) string {\n\treturn name\n}", "func almostOkayFunction() {\n\treturn nil\n}", "func isBadVersion(version int) bool{\n return false\n}", "func trimCaller(funcName string) string {\n\t// ex:\n\t// funcName = \"github.com/ddo/request.(*Client).Request\"\n\t// arrDir = [github.com ddo request.(*Client).Request]\n\t// lastDir = request.(*Client).Request\n\t// arrCaller = [request. (*Client).Request]\n\n\tarrDir := strings.Split(funcName, \"/\")\n\tlastDir := arrDir[len(arrDir)-1]\n\tarrCaller := strings.Split(lastDir, \".\")\n\n\tif len(arrCaller) < 2 {\n\t\treturn \"\"\n\t}\n\n\treturn arrCaller[len(arrCaller)-1]\n}", "func getValidPrefix(s string, base int64) string {\n\ttrace_util_0.Count(_util_00000, 47)\n\tvar (\n\t\tvalidLen int\n\t\tupper rune\n\t)\n\tswitch {\n\tcase base >= 2 && base <= 9:\n\t\ttrace_util_0.Count(_util_00000, 51)\n\t\tupper = rune('0' + base)\n\tcase base <= 36:\n\t\ttrace_util_0.Count(_util_00000, 52)\n\t\tupper = rune('A' + base - 10)\n\tdefault:\n\t\ttrace_util_0.Count(_util_00000, 53)\n\t\treturn \"\"\n\t}\n\ttrace_util_0.Count(_util_00000, 48)\nLoop:\n\tfor i := 0; i < len(s); i++ {\n\t\ttrace_util_0.Count(_util_00000, 54)\n\t\tc := rune(s[i])\n\t\tswitch {\n\t\tcase unicode.IsDigit(c) || unicode.IsLower(c) || unicode.IsUpper(c):\n\t\t\ttrace_util_0.Count(_util_00000, 55)\n\t\t\tc = unicode.ToUpper(c)\n\t\t\tif c < upper {\n\t\t\t\ttrace_util_0.Count(_util_00000, 58)\n\t\t\t\tvalidLen = i + 1\n\t\t\t} else {\n\t\t\t\ttrace_util_0.Count(_util_00000, 59)\n\t\t\t\t{\n\t\t\t\t\tbreak Loop\n\t\t\t\t}\n\t\t\t}\n\t\tcase c == '+' || c == '-':\n\t\t\ttrace_util_0.Count(_util_00000, 56)\n\t\t\tif i != 0 {\n\t\t\t\ttrace_util_0.Count(_util_00000, 60)\n\t\t\t\tbreak Loop\n\t\t\t}\n\t\tdefault:\n\t\t\ttrace_util_0.Count(_util_00000, 57)\n\t\t\tbreak Loop\n\t\t}\n\t}\n\ttrace_util_0.Count(_util_00000, 49)\n\tif validLen > 1 && s[0] == '+' {\n\t\ttrace_util_0.Count(_util_00000, 61)\n\t\treturn s[1:validLen]\n\t}\n\ttrace_util_0.Count(_util_00000, 50)\n\treturn s[:validLen]\n}", "func sanitizePackageName(importPath string) string {\n\talias := path.Base(importPath)\n\n\t// alias should be lower case\n\talias = strings.ToLower(alias)\n\n\t// alias should now only contain alphanumerics\n\timportsRegex := regexp.MustCompile(`[^a-z0-9]`)\n\talias = importsRegex.ReplaceAllString(alias, \"\")\n\n\t// can't have a first digit, per Go identifier rules, so just skip them\n\talias = strings.TrimLeftFunc(alias, unicode.IsDigit)\n\n\t// If path part was all digits, we may be left with an empty string. In this case use \"pkg\" as the alias.\n\tif alias == \"\" {\n\t\talias = \"pkg\"\n\t}\n\n\treturn alias\n}", "func TestPrewriteWrittenNoConflict4A(t *testing.T) {\n}", "func getOID(oid string) (string, error) {\n\tif strings.HasPrefix(oid, \".\") {\n\t\treturn oid, nil\n\t}\n\tmu.Lock()\n\tdefer mu.Unlock()\n\tfixed, ok := lookupOID[oid]\n\tif !ok {\n\t\treturn oid, errors.Errorf(\"no OID found for %s\", oid)\n\t}\n\treturn fixed, nil\n}", "func legacyFileName(prefix, instance, class, id string) string {\n\tvar fileName string\n\tinstance = strings.Replace(instance, \"\\\\\", \"__\", -1)\n\n\t// use it to build the file name\n\tif prefix == \"\" {\n\t\tfileName = fmt.Sprintf(\"%s_%s_%s.status\", instance, class, id)\n\t} else {\n\t\tfileName = fmt.Sprintf(\"%s_%s_%s_%s.status\", prefix, instance, class, id)\n\t}\n\treturn fileName\n}", "func uniquePackageOf(fd *descriptor.FileDescriptorProto) string {\n\ts, ok := uniquePackageName[fd]\n\tif !ok {\n\t\tlog.Fatal(\"internal error: no package name defined for \" + fd.GetName())\n\t}\n\treturn s\n}", "func getForcedGetter(sourceUrl string) (string, string) {\n\tif matches := forcedRegexp.FindStringSubmatch(sourceUrl); matches != nil && len(matches) > 2 {\n\t\treturn matches[1], matches[2]\n\t}\n\n\treturn \"\", sourceUrl\n}", "func getFullyQualifiedFunctionName(fn interface{}) string {\n\treturn runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()\n}", "func TestEmptyPrewrite4A(t *testing.T) {\n}", "func internalStartsWith(str string, prefix string, ignoreCase bool) bool {\n\tif str == \"\" || prefix == \"\" {\n\t\treturn (str == \"\" && prefix == \"\")\n\t}\n\tif utf8.RuneCountInString(prefix) > utf8.RuneCountInString(str) {\n\t\treturn false\n\t}\n\tif ignoreCase {\n\t\treturn strings.HasPrefix(strings.ToLower(str), strings.ToLower(prefix))\n\t}\n\treturn strings.HasPrefix(str, prefix)\n}", "func TestGetEmpty4A(t *testing.T) {\n}", "func ExampleMustSqueezeTrytes() {}", "func getAliasId(name string, mountAccessor string, entityAliasList *map[string]EntityAlias) string {\n\tfor aliasID, alias := range *entityAliasList {\n\t\tif alias.Name == name && alias.MountAccessor == mountAccessor {\n\t\t\treturn aliasID\n\t\t}\n\t}\n\treturn \"\"\n}", "func getInternalParentPrefix(pkgName string) string {\n\tcleanedPath := filepath.Clean(pkgName)\n\texplodedPath := strings.Split(cleanedPath, string(os.PathSeparator))\n\n\ti := len(explodedPath) - 1\n\tfor ; i > 0; i-- {\n\t\tif explodedPath[i] == internal {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn filepath.Join(explodedPath[0:i]...)\n}", "func smallestGoodBase(n string) string {\n \n}", "func idFromName(name string) string {\n\ts := strings.Split(strings.ToLower(strings.TrimSpace(name)), \" \")\n\tns := strings.Join(s, \"-\")\n\ts = strings.Split(ns, \".\")\n\treturn strings.Join(s, \"-\")\n}", "func packageName(skip int) (long, short string, ok bool) {\n\t// Full function name looks like path/to/pkg.Func\n\tvar f string\n\t_, _, f, ok = fullCaller(skip + 1)\n\tif !ok {\n\t\treturn\n\t}\n\n\t// Strip down to path/to/pkg\n\tdot := strings.LastIndex(f, \".\")\n\tif dot == -1 {\n\t\treturn\n\t}\n\tlong = f[:dot]\n\n\t// Strip down to pkg\n\tslash := strings.LastIndex(long, \"/\")\n\tif slash == -1 {\n\t\treturn\n\t}\n\tshort = long[slash+1:]\n\treturn\n}", "func TestSinglePrewrite4A(t *testing.T) {\n}", "func getPathConversionFunction() func(string) string {\n\tif runtime.GOOS != \"windows\" || os.Getenv(\"DOCKER_MACHINE_NAME\") == \"\" {\n\t\treturn func(path string) string { return path }\n\t}\n\n\treturn func(path string) string {\n\t\treturn fmt.Sprintf(\"/%s%s\", strings.ToUpper(path[:1]), path[2:])\n\t}\n}", "func FullNameNakedReturn(f, l string) (full string, length int) {\n full = f + \" \" + l;\n length = len(full)\n return \n}", "func resolveSourcePrefix(source string, sa Source) string {\n\tif sa.Prefix == \"false\" || sa.Prefix == \"\" {\n\t\treturn \"\"\n\t} else if sa.Prefix == \"true\" {\n\t\treturn source + \"_\"\n\t} else {\n\t\treturn sa.Prefix + \"_\"\n\t}\n}", "func TestManifestAPI_Get_UnknownSchema(t *testing.T) {}", "func checkSafeNameChars(nameFragment string) error {\n\tfor i, ch := range nameFragment {\n\t\tswitch {\n\t\tcase 'a' <= ch && ch <= 'z':\n\t\tcase '0' <= ch && ch <= '9':\n\t\tcase ch == '_':\n\t\tdefault:\n\t\t\treturn fmt.Errorf(\"Name fragment is not safe: %x at %d.\", ch, i)\n\t\t}\n\t\t// NO: case ch == '.'\n\t\t// Could also allow at most one dot but not for SQLite.\n\t\t// Maybe would make sense for other SQL DBMS which\n\t\t// use schema names / namespaces.\n\t}\n\treturn nil\n}", "func isCommonRetryableErrorCode(err error) (bool, string) {\n\tgerr, ok := err.(*googleapi.Error)\n\tif !ok {\n\t\treturn false, \"\"\n\t}\n\n\tif gerr.Code == 429 || gerr.Code == 500 || gerr.Code == 502 || gerr.Code == 503 {\n\t\tlog.Printf(\"[DEBUG] Dismissed an error as retryable based on error code: %s\", err)\n\t\treturn true, fmt.Sprintf(\"Retryable error code %d\", gerr.Code)\n\t}\n\treturn false, \"\"\n}", "func goodFunction() {\n\treturn nil\n}", "func getCallerPackage() (string, bool) {\n\tvar pkg string\n\tpc, _, _, ok := runtime.Caller(2)\n\tif !ok {\n\t\treturn pkg, false\n\t}\n\tparts := strings.Split(runtime.FuncForPC(pc).Name(), \".\")\n\tif parts[len(parts)-2][0] == '(' {\n\t\tpkg = strings.Join(parts[0:len(parts)-2], \".\")\n\t} else {\n\t\tpkg = strings.Join(parts[0:len(parts)-1], \".\")\n\t}\n\treturn pkg, true\n}", "func _getFuncName() string {\n var ptrVal = _getFuncPtrVal()\n\n // Look up the function object\n var fun = runtime.FuncForPC(ptrVal)\n\n // returns: _/home/user/src/gohavenet/src.TestProcMgr_False\n var funcNamePath = fun.Name()\n\n // Split on the slash and return just the func name\n var pathElems = strings.Split(funcNamePath, \"/\")\n var index = len(pathElems) - 1\n if index < 0 {\n index = 0\n }\n\n return pathElems[index]\n}", "func getPatchVersionTrimmed(version string) string {\n\tendIndex := strings.LastIndex(version, \".\")\n\tif endIndex != -1 {\n\t\tversion = version[:endIndex]\n\t}\n\treturn version\n}", "func fixLegacyInventoryName(obj *unstructured.Unstructured) error {\n\tif obj.GetName() == legacyInvName {\n\t\tklog.V(4).Infof(\"renaming legacy inventory name\")\n\t\trandomSuffix := common.RandomStr()\n\t\treturn addSuffixToName(obj, randomSuffix)\n\t}\n\treturn nil\n}", "func callerName(skip int) (pkgPath, funcName string, ok bool) {\n\tvar pc [1]uintptr\n\tn := runtime.Callers(skip+1, pc[:])\n\tif n != 1 {\n\t\treturn \"\", \"\", false\n\t}\n\n\tf := runtime.FuncForPC(pc[0]).Name()\n\ts := pkgPathRe.FindStringSubmatch(f)\n\tif len(s) < 3 {\n\t\tpanic(fmt.Errorf(\"failed to extract package path and function name from %q\", f))\n\t}\n\n\treturn s[1], s[2], true\n}", "func getValidContainerName(volumeName, protocol string) string {\n\tcontainerName := strings.ToLower(volumeName)\n\tif len(containerName) > containerNameMaxLength {\n\t\tcontainerName = containerName[0:containerNameMaxLength]\n\t}\n\tif !checkContainerNameBeginAndEnd(containerName) || len(containerName) < containerNameMinLength {\n\t\t// now we set as 63 for maximum container name length\n\t\t// todo: get cluster name\n\t\tcontainerName = k8sutil.GenerateVolumeName(fmt.Sprintf(\"pvc-%s\", protocol), uuid.NewUUID().String(), 63)\n\t\tklog.Warningf(\"the requested volume name (%q) is invalid, so it is regenerated as (%q)\", volumeName, containerName)\n\t}\n\tcontainerName = strings.Replace(containerName, \"--\", \"-\", -1)\n\n\treturn containerName\n}", "func funcName() string {\n\tpc, _, _, _ := runtime.Caller(1)\n\tcompleteFuncname := runtime.FuncForPC(pc).Name()\n\treturn strings.Split(completeFuncname, \".\")[len(strings.Split(completeFuncname, \".\"))-1]\n}", "func ensureValidHelper(name string, funcValue reflect.Value) {\n\tif funcValue.Kind() != reflect.Func {\n\t\tpanic(fmt.Errorf(\"Helper must be a function: %s\", name))\n\t}\n\n\tfuncType := funcValue.Type()\n\n\tif funcType.NumOut() != 1 {\n\t\tpanic(fmt.Errorf(\"Helper function must return a string or a SafeString: %s\", name))\n\t}\n\n\t// @todo Check if first returned value is a string, SafeString or interface{} ?\n}", "func exactFunction() {\n\treturn nil\n}", "func TestUidForUsername(t *testing.T) {\n\tuid, err := uidForUsername(\"root\")\n\tif err != nil {\n\t\tt.Errorf(\"uidForUsername(\\\"root\\\") returned error: %v\", err)\n\t\treturn\n\t}\n\tif uid != 0 {\n\t\tt.Errorf(\"uidForUsername(\\\"root\\\") returned %d, should be 0\", uid)\n\t}\n\n\t_, err = uidForUsername(\"asdfASDFxxx999\")\n\tif err == nil {\n\t\tt.Errorf(\"uidForUsername(\\\"asdfASDFxxx\\\") did not return error\")\n\t\treturn\n\t}\n}", "func getGroupIdString(id interface{}) (gid string, err error) {\r\n\tswitch t := id.(type) {\r\n\tcase string:\r\n\t\tif strings.Contains(id.(string), \"http\") {\r\n\t\t\treturn \"url=\" + url.QueryEscape(id.(string)), nil // group url\r\n\t\t}\r\n\t\treturn id.(string), nil // group id as a string\r\n\tcase uint64:\r\n\t\treturn strconv.FormatUint(id.(uint64), 10), nil // group id as an int\r\n\tdefault:\r\n\t\treturn gid, errors.New(fmt.Sprintf(\"Group ID type exception: Expecting string or uint64 got %T\", t))\r\n\t}\r\n}", "func GoodEnoughUUID() string {\n\tb := make([]byte, 16)\n\t_, err := rand.Read(b)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tuuid := fmt.Sprintf(\"%x-%x-%x-%x-%x\",\n\t\tb[0:4], b[4:6], b[6:8], b[8:10], b[10:])\n\treturn uuid\n}", "func mustBeUnique(label string) {\n\n\tif _, ok := functions[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as function\", label))\n\t}\n\n\tif _, ok := variables[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as variable\", label))\n\t}\n\n\tif _, ok := aliases[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as alias\", label))\n\t}\n}", "func ensureDot(extension string) string {\n\tif strings.Index(extension, \".\") == -1 {\n\t\textension = \".\" + extension\n\t}\n\treturn extension\n}", "func getSafeString(input interface{}) string {\r\n\tvar safeValue string\r\n\tvar isOk bool\r\n\r\n\tif input == nil {\r\n\t\tsafeValue = \"\"\r\n\t} else {\r\n\t\tsafeValue, isOk = input.(string)\r\n\t\tif isOk == false {\r\n\t\t\tsafeValue = \"\"\r\n\t\t}\r\n\t}\r\n\treturn safeValue\r\n}", "func mustGetUUID() string {\n\tu, err := uuid.NewRandom()\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\treturn u.String()\n}", "func fn3() { // want fn3:`Deprecated: Don't use this\\.`\n}", "func ensurePrefix(s, prefix string) string {\n\tif !strings.HasPrefix(s, prefix) {\n\t\ts = prefix + s\n\t}\n\treturn s\n}", "func prepareHashPath(path, prefix string) string {\n\t// I need to strip the prefix. But... where does the prefix come from\n\treturn \"/\" + strings.TrimPrefix(path, prefix)\n}", "func pySafeName(nm string) string {\n\tif _, bad := pyKeywords[nm]; bad {\n\t\treturn \"my\" + nm\n\t}\n\treturn nm\n}", "func fullCaller(skip int) (file string, line int, fnc string, ok bool) {\n\tvar pc uintptr\n\tpc, file, line, ok = runtime.Caller(skip + 1)\n\tif !ok {\n\t\treturn\n\t}\n\n\tf := runtime.FuncForPC(pc)\n\tfnc = f.Name()\n\treturn\n}", "func getValidVersion(version string) string {\n\tif version != \"\" {\n\t\treturn version\n\t}\n\n\treturn \"Not Installed\"\n}", "func makeSafeFileName(s string) string {\n\tconst maxLen = 200 // slightly arbitrary but must be <= 254 for most modern filesystems\n\n\t// First, tidy the file path to a clean representation\n\tresult := filepath.Clean(s)\n\n\t// Next, split the path into elements between separators and check each element.\n\telements := filepath.SplitList(result)\n\tnewElements := []string{}\n\n\tfor _, element := range elements {\n\t\tnewElements = append(newElements, makeSafeFileElement(element))\n\t}\n\n\tresult = filepath.Join(newElements...)\n\n\t// Also avoid starting a file name with a period as this has a special meaning on UNIX\n\t// and UNIX-like systems.\n\tdir := filepath.Dir(result)\n\tbase := filepath.Base(result)\n\n\tif base[0] == '.' {\n\t\tresult = filepath.Join(dir, base[1:])\n\t}\n\n\t// Ensure the resulting name isn't too long, as X.509 distinguished names can be very long.\n\tif len(result) > maxLen {\n\t\tresult = result[:maxLen]\n\t}\n\n\treturn result\n}", "func TestDiskIOStats_diskName(t *testing.T) {\n\ttests := []struct {\n\t\ttemplates []string\n\t\texpected string\n\t}{\n\t\t{[]string{\"$MY_PARAM_1\"}, \"myval1\"},\n\t\t{[]string{\"${MY_PARAM_1}\"}, \"myval1\"},\n\t\t{[]string{\"x$MY_PARAM_1\"}, \"xmyval1\"},\n\t\t{[]string{\"x${MY_PARAM_1}x\"}, \"xmyval1x\"},\n\t\t{[]string{\"$MISSING\", \"$MY_PARAM_1\"}, \"myval1\"},\n\t\t{[]string{\"$MY_PARAM_1\", \"$MY_PARAM_2\"}, \"myval1\"},\n\t\t{[]string{\"$MISSING\"}, \"null\"},\n\t\t{[]string{\"$MY_PARAM_1/$MY_PARAM_2\"}, \"myval1/myval2\"},\n\t\t{[]string{\"$MY_PARAM_2/$MISSING\"}, \"null\"},\n\t}\n\n\tfor _, tc := range tests {\n\t\tfunc() {\n\t\t\ts := DiskIO{\n\t\t\t\tNameTemplates: tc.templates,\n\t\t\t}\n\t\t\tdefer setupNullDisk(t, &s, \"null\")() //nolint:revive // done on purpose, cleaning will be executed properly\n\t\t\tname, _ := s.diskName(\"null\")\n\t\t\trequire.Equal(t, tc.expected, name, \"Templates: %#v\", tc.templates)\n\t\t}()\n\t}\n}", "func pySafeArg(anm string, idx int) string {\n\tif anm == \"\" {\n\t\tanm = fmt.Sprintf(\"arg_%d\", idx)\n\t}\n\treturn pySafeName(anm)\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func TestAliasingRecursionInvalid(t *testing.T) {\n\t_, errs := PrototypeString(`alias x = x\n\t\tx`)\n\tgoutil.AssertNow(t, errs != nil, \"errs should not be nil\")\n}", "func getPackageName(f string) string {\n\tfor {\n\t\tlastPeriod := strings.LastIndex(f, \".\")\n\t\tlastSlash := strings.LastIndex(f, \"/\")\n\t\tif lastPeriod > lastSlash {\n\t\t\tf = f[:lastPeriod]\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn f\n}", "func getFunctionName(fn interface{}) string {\n\tname := runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()\n\n\t// Method above returns functions in the form : main.foo\n\tparts := strings.Split(name, \".\")\n\treturn parts[len(parts)-1]\n}", "func cleanUserName(userName string) string {\n\tuserName = strings.Replace(userName, \"-\", \"\", -1)\n\tuserName = strings.Replace(userName, \".\", \"\", -1)\n\tuserName = strings.Replace(userName, \"_\", \"\", -1)\n\treturn strings.ToLower(userName)\n}", "func CheckIDFormat(ComponentID string) bool {\n if len(ComponentID) != 9 {\n // check the length of the ComponentID is nine\n return false\n } else if _, err := strconv.Atoi(ComponentID); err != nil {\n // check the ComponentID are all digits\n return false\n } else {\n // now everything looks fine\n return true\n }\n}", "func getSinglePath(v interface{}) (string, error) {\n\tif name, err := resourceName(v); err != nil {\n\t\treturn \"\", err\n\t} else if id, err := resourceId(v); err != nil {\n\t\treturn \"\", err\n\t} else {\n\t\treturn fmt.Sprintf(\"%s(%d)\", name, id), nil\n\t}\n}", "func getUserIdString(id string) (uid string) {\r\n\tif id == \"~\" || id == \"\" {\r\n\t\treturn \"~\" // me\r\n\t} else if strings.Contains(id, \"http\") {\r\n\t\treturn \"url=\" + url.QueryEscape(id) // someone else\r\n\t} else {\r\n\t\treturn \"id=\" + id // someone else's url\r\n\t}\r\n}", "func OldGetAnnotation(c, name string) string {\n\tprefix := fmt.Sprintf(\"+%s:\", name)\n\tif strings.HasPrefix(c, prefix) {\n\t\treturn strings.TrimPrefix(c, prefix)\n\t}\n\treturn \"\"\n}", "func TestPrewriteMultiple4A(t *testing.T) {\n}", "func TestSanitizedName(t *testing.T) {\n\ttables := []struct {\n\t\tbadPath string\n\t\tgoodPath string\n\t}{\n\t\t{\"\\\\..\\\\1.txt\", \"1.txt\"},\n\t\t{\"///foo/bar\", \"foo/bar\"},\n\t\t{\"C:/loo/bar2\", \"loo/bar2\"},\n\t\t{\"C:\\\\loo\\\\bar2\", \"loo\\\\bar2\"},\n\t\t{\"../../foo../../ba..r\", \"foo../ba..r\"},\n\t\t{\"../my.file\", \"my.file\"},\n\t}\n\tfor _, table := range tables {\n\t\tfixedPath := sanitizedName(table.badPath)\n\t\tif fixedPath != table.goodPath {\n\t\t\tt.Errorf(\"expected and fixedPath didn't match - %s : %s\", table.goodPath, fixedPath)\n\t\t}\n\t}\n}", "func getReqNameId(reqIIdList []cres.IID, driverNameId string) string {\n\tfor _, iid := range reqIIdList {\n\t\tif iid.SystemId == driverNameId {\n\t\t\treturn iid.NameId\n\t\t}\n\t}\n\treturn \"\"\n}", "func getAbsoluteURL(item *string, original_item string, url *url.URL) {\n var domain string = strings.Join(strings.Split(url.String(), \"/\")[:3], \"/\")\n if (strings.HasPrefix(*item, \"/\")) {\n if (strings.HasSuffix(url.String(), \"/\")) {\n *item = domain + (*item)[1:]\n } else {\n *item = domain + *item\n }\n utils.Log.Printf(\"[*] Modified item for URL for %s. Transformed from %s to %s\\n\", url, original_item, *item)\n }\n\n if (strings.HasPrefix(url.String(), \" \")) {\n *item = (*item)[1:]\n utils.Log.Printf(\"[*] Modified %s. Removed space from %s on %s\\n\", *item, original_item, url)\n }\n\n\n}", "func TestSimpleParser_baseUrl_err(t *testing.T) {\n\tif baseUrl(\"1234\") != \"1234\" {\n\t\tt.Logf(\"baseUrl method is expected to return original link on error\")\n\t\tt.FailNow()\n\t}\n}", "func notTested() string {\n\treturn \"This function isn't tested!\"\n}", "func asSupportedParameter(param string) (string, bool) {\n\tlower := strings.ToLower(param)\n\treturn lower, lowerCaseParameters[lower]\n}", "func getUID(lib utils.PathIdentifier) string {\n\treturn lib.Key()[:5]\n}", "func getFullName()(string, string) {\n\treturn \"Ninja\", \"Coder\"\n}", "func LegacyOrigin(parts ...string) (ret string) {\n\tfor index, i := range parts {\n\t\tret += i\n\t\tif index < len(parts)-1 {\n\t\t\tret += LegacyOriginSeparator\n\t\t}\n\t}\n\treturn\n}", "func generateUUID() string {\n uuid4, _ := uuid.NewV4()\n return uuid4.String()\n}", "func shadowedByParam2() (math string, fmt int) { return }", "func getInternalMountPath(workingMountDir string, vol *smbVolume) string {\n\tif vol == nil {\n\t\treturn \"\"\n\t}\n\tmountDir := vol.uuid\n\tif vol.uuid == \"\" {\n\t\tmountDir = vol.subDir\n\t}\n\treturn filepath.Join(workingMountDir, mountDir)\n}", "func wrapClientID(clientID string) string {\n\thostname, err := os.Hostname()\n\tif err != nil {\n\t\thostname = \"<error>\"\n\t}\n\n\t// Replace all non-alphanumeric chars with something benign that will work in the client id.\n\tre := regexp.MustCompile(\"[^a-zA-Z0-9]+\")\n\thostname = re.ReplaceAllString(hostname, \"-\")\n\n\t// Special case for running locally, add random\n\tif runtime.GOOS == \"darwin\" {\n\t\thostname += strconv.Itoa(rand.Intn(100))\n\t\treturn fmt.Sprintf(\"%s-%s\", clientID, hostname)\n\t}\n\treturn fmt.Sprintf(\"%s-%s\", clientID, hostname)\n}", "func getShorterString(a string, b string) int {\n\tif len(a) <= len(b) {\n\t\treturn len(a)\n\t}\n\treturn len(b)\n}", "func callerShortfile(file string, lastsep_ ...rune) string {\n\tlastsep := '/'\n\tif len(lastsep_) > 0 {\n\t\tlastsep = lastsep_[0]\n\t}\n\tshort := file\n\tfor i := len(file) - 1; i > 0; i-- {\n\t\tif file[i] == byte(lastsep) {\n\t\t\tshort = file[i+1:]\n\t\t\tbreak\n\t\t}\n\t}\n\treturn short\n}", "func unqualify(importPath string) string {\n\tif i := strings.LastIndex(importPath, sep); i != -1 {\n\t\timportPath = importPath[i+len(sep):]\n\t}\n\treturn importPath\n}", "func Test_HasPrefix(t *testing.T) {\n\tvalue := \"main.go\"\n\tprefix := \"main\"\n\tif !strings.HasPrefix(value, prefix) {\n\t\tt.Fatalf(\"expected %s to have prefix %s\", value, prefix)\n\t}\n}", "func cleancompstr(cleanup string) string {\n\tcleanup = strings.TrimSpace(cleanup)\n\tcleanup = strings.ToLower(cleanup)\n\treturn cleanup\n}", "func badTemper(string, string) (*os.File, error) {\n\treturn nil, fmt.Errorf(\"oups\")\n}", "func (d *Abstraction) getGeneratedName(s string, m string) string {\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(s)\n\tbuffer.WriteString(\".\")\n\tbuffer.WriteString(m)\n\treturn buffer.String()\n}", "func helper(k string) interface{} {\n\treturn k\n}", "func getUsername() string {\n\tlog.Debug(\"getUsername\")\n\tu := \"unknown\"\n\tosUser := \"\"\n\n\tswitch runtime.GOOS {\n\tcase \"darwin\", \"linux\", \"solaris\":\n\t\tosUser = os.Getenv(\"USER\")\n\tcase \"windows\":\n\t\tosUser = os.Getenv(\"USERNAME\")\n\n\t\t// remove domain\n\t\tosUser = osUser[strings.LastIndex(osUser, \"\\\\\")+1:]\n\t\tlog.Debugf(\"Windows user has been transformed into %s\", osUser)\n\n\t\t// HACK ugly ... if localized administrator, translate to administrator\n\t\tif isWinAdministrator(osUser) {\n\t\t\tosUser = \"Administrator\"\n\t\t}\n\t}\n\n\tif osUser != \"\" {\n\t\tu = osUser\n\t}\n\treturn u\n}", "func getCaller(skip int, shortFileName bool) string {\n\tvar b strings.Builder\n\t_, file, no, ok := runtime.Caller(skip)\n\tif ok {\n\t\tif shortFileName {\n\t\t\tif lastSlashIndex := strings.LastIndex(file, \"/\"); lastSlashIndex != -1 {\n\t\t\t\tfile = file[lastSlashIndex+1:]\n\t\t\t}\n\t\t}\n\t\tfmt.Fprintf(&b, \"%s:%d\", file, no)\n\t}\n\treturn b.String()\n}", "func ensureTrailingDot(details string) string {\n\tif !strings.HasSuffix(details, \".\") {\n\t\treturn fmt.Sprintf(\"%s.\", details)\n\t}\n\treturn details\n}", "func isBadVersion(version int) bool{\n\treturn true\n}", "func TestGetWrongUUID(t *testing.T) {\n\tclearTable()\n nt := New{{.NameExported}}()\n add{{.NameExported}}(nt)\n badUid := \"00000000-d01d-4c09-a4e7-59026d143b89\"\n\n\tstatement := fmt.Sprintf({{.NameExported}}URL, badUid)\n\n\treq, _ := http.NewRequest(\"GET\", statement, nil)\n\tresponse := executeRequest(req)\n\n\tcheckResponseCode(t, http.StatusNotFound, response.Code)\n}", "func LegacyInstanceObjectID(obj *ResourceInstanceObjectSrc) string {\n\tif obj == nil {\n\t\treturn \"<not created>\"\n\t}\n\n\tif obj.AttrsJSON != nil {\n\t\ttype WithID struct {\n\t\t\tID string `json:\"id\"`\n\t\t}\n\t\tvar withID WithID\n\t\terr := json.Unmarshal(obj.AttrsJSON, &withID)\n\t\tif err == nil {\n\t\t\treturn withID.ID\n\t\t}\n\t} else if obj.AttrsFlat != nil {\n\t\tif flatID, exists := obj.AttrsFlat[\"id\"]; exists {\n\t\t\treturn flatID\n\t\t}\n\t}\n\n\t// For resource types created after we removed id as special there may\n\t// not actually be one at all. This is okay because older tests won't\n\t// encounter this, and new tests shouldn't be using ids.\n\treturn \"<none>\"\n}", "func getErrOrigin() string {\n\tvar origin string\n\tif pc, file, line, ok := runtime.Caller(2); ok {\n\t\tif f := runtime.FuncForPC(pc); f != nil {\n\t\t\tif wd, err := os.Getwd(); err == nil {\n\t\t\t\torigin = fmt.Sprintf(\"%s %s:%d\", strings.TrimPrefix(f.Name(), pkgPath), strings.TrimPrefix(file, wd+string(os.PathSeparator)), line)\n\t\t\t}\n\t\t}\n\t}\n\treturn origin\n}", "func (objectIDs *DbObjectIDs) getUniqueID() (string, error) {\n\tid := objectIDs.ownerControllerName + \":\" + string(objectIDs.idsType.ownerObjectType)\n\tfor _, key := range objectIDs.idsType.GetExternalIDKeys() {\n\t\tvalue, ok := objectIDs.objectIDs[key]\n\t\tif !ok {\n\t\t\treturn \"\", fmt.Errorf(\"key %v is required but not present\", key)\n\t\t}\n\t\tid += \":\" + value\n\t}\n\treturn id, nil\n}", "func getCallPriorityID(strPriorityName string, espXmlmc *apiLib.XmlmcInstStruct, buffer *bytes.Buffer) (string, string) {\n\tpriorityID := \"\"\n\tif swImportConf.PriorityMapping[strPriorityName] != nil {\n\t\tstrPriorityName = fmt.Sprintf(\"%s\", swImportConf.PriorityMapping[strPriorityName])\n\t\tif strPriorityName != \"\" {\n\t\t\tpriorityID = getPriorityID(strPriorityName, espXmlmc, buffer)\n\t\t}\n\t}\n\treturn priorityID, strPriorityName\n}" ]
[ "0.54382825", "0.537262", "0.5215815", "0.5027418", "0.4975398", "0.49496406", "0.48785368", "0.48031178", "0.4786201", "0.47657558", "0.47629273", "0.47359633", "0.47222048", "0.47043297", "0.47027624", "0.46904278", "0.46901387", "0.46885514", "0.46665755", "0.46659398", "0.46592057", "0.46564803", "0.46520862", "0.46506956", "0.4650385", "0.46303272", "0.46296483", "0.4629173", "0.4628825", "0.46284923", "0.4625966", "0.4624669", "0.46244738", "0.4619596", "0.46129894", "0.46062362", "0.4603694", "0.46027172", "0.46010837", "0.45992196", "0.4595422", "0.45953396", "0.45938143", "0.45878768", "0.45863846", "0.45860708", "0.45778158", "0.45708576", "0.4562223", "0.45579806", "0.45571515", "0.45400572", "0.4538702", "0.45375508", "0.45348978", "0.4533087", "0.4532056", "0.45305866", "0.45279145", "0.45279145", "0.45279145", "0.45279145", "0.45227525", "0.4520747", "0.45180294", "0.45163244", "0.45158538", "0.45143905", "0.45078984", "0.44996935", "0.44993386", "0.4499218", "0.44967684", "0.44954318", "0.44913954", "0.44851273", "0.44821027", "0.4480578", "0.4480466", "0.44804257", "0.4477861", "0.44712496", "0.44705343", "0.44680944", "0.44623426", "0.44565588", "0.4452436", "0.44511658", "0.44499886", "0.44494784", "0.44493905", "0.4445965", "0.44443068", "0.44378096", "0.4436986", "0.44309473", "0.44284478", "0.44276965", "0.44272083", "0.44260067", "0.44246325" ]
0.0
-1
This is a courtesy helper function, which in some cases may not work as expected!
func (s *VPCService) GetVPCOfferingByID(id string, opts ...OptionFunc) (*VPCOffering, int, error) { p := &ListVPCOfferingsParams{} p.p = make(map[string]interface{}) p.p["id"] = id for _, fn := range append(s.cs.options, opts...) { if err := fn(s.cs, p); err != nil { return nil, -1, err } } l, err := s.ListVPCOfferings(p) if err != nil { if strings.Contains(err.Error(), fmt.Sprintf( "Invalid parameter id value=%s due to incorrect long value format, "+ "or entity does not exist", id)) { return nil, 0, fmt.Errorf("No match found for %s: %+v", id, l) } return nil, -1, err } if l.Count == 0 { return nil, l.Count, fmt.Errorf("No match found for %s: %+v", id, l) } if l.Count == 1 { return l.VPCOfferings[0], l.Count, nil } return nil, l.Count, fmt.Errorf("There is more then one result for VPCOffering UUID: %s!", id) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func getHelperMethodIfNeeded(functionName string, indent string) (string, bool) {\n\tswitch functionName {\n\tcase \"filebase64sha256\":\n\t\treturn `function computeFilebase64sha256(path string) string {\n\tconst fileData = Buffer.from(fs.readFileSync(path), 'binary')\n\treturn crypto.createHash('sha256').update(fileData).digest('hex')\n}`, true\n\tcase \"notImplemented\":\n\t\treturn fmt.Sprintf(\n\t\t\t`%sfunction notImplemented(message: string) {\n%s throw new Error(message);\n%s}`, indent, indent, indent), true\n\tcase \"singleOrNone\":\n\t\treturn fmt.Sprintf(\n\t\t\t`%sfunction singleOrNone<T>(elements: pulumi.Input<T>[]): pulumi.Input<T> {\n%s if (elements.length != 1) {\n%s throw new Error(\"singleOrNone expected input list to have a single element\");\n%s }\n%s return elements[0];\n%s}`, indent, indent, indent, indent, indent, indent), true\n\tdefault:\n\t\treturn \"\", false\n\t}\n}", "func getHelperMethodIfNeeded(functionName string, indent string) (string, bool) {\n\tswitch functionName {\n\tcase \"filebase64\":\n\t\treturn `private static string ReadFileBase64(string path) {\n\t\treturn Convert.ToBase64String(System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path)));\n\t}`, true\n\tcase \"filebase64sha256\":\n\t\treturn `private static string ComputeFileBase64Sha256(string path) {\n\t\tvar fileData = System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path));\n\t\tvar hashData = SHA256.Create().ComputeHash(fileData);\n\t\treturn Convert.ToBase64String(hashData);\n\t}`, true\n\tcase \"sha1\":\n\t\treturn `private static string ComputeSHA1(string input) {\n\t\treturn BitConverter.ToString(\n\t\t\tSHA1.Create().ComputeHash(Encoding.UTF8.GetBytes(input))\n\t\t).Replace(\"-\",\"\").ToLowerInvariant());\n\t}`, true\n\tcase \"notImplemented\":\n\t\treturn fmt.Sprintf(`\n%sstatic object NotImplemented(string errorMessage) \n%s{\n%s throw new System.NotImplementedException(errorMessage);\n%s}`, indent, indent, indent, indent), true\n\tdefault:\n\t\treturn \"\", false\n\t}\n}", "func TestGetNone4A(t *testing.T) {\n}", "func (f *Ifacer) getUniqueImportName(pkgName string, level int) string {\n\tstrs := strings.Split(pkgName, string(filepath.Separator))\n\n\tlenStr := len(strs)\n\n\tif lenStr-1 < level {\n\t\tf.logger.Panicf(\"%d out of range\", level)\n\t}\n\n\tvar importName string\n\tfor _, str := range strs[lenStr-level-1:] {\n\t\tif strings.Contains(str, \".\") {\n\t\t\tstr = strings.Replace(str, \".\", \"\", -1)\n\t\t}\n\t\timportName += str\n\t}\n\n\treturn importName\n}", "func DummyStringGetterFunction(name string) string {\n\treturn name\n}", "func almostOkayFunction() {\n\treturn nil\n}", "func isBadVersion(version int) bool{\n return false\n}", "func trimCaller(funcName string) string {\n\t// ex:\n\t// funcName = \"github.com/ddo/request.(*Client).Request\"\n\t// arrDir = [github.com ddo request.(*Client).Request]\n\t// lastDir = request.(*Client).Request\n\t// arrCaller = [request. (*Client).Request]\n\n\tarrDir := strings.Split(funcName, \"/\")\n\tlastDir := arrDir[len(arrDir)-1]\n\tarrCaller := strings.Split(lastDir, \".\")\n\n\tif len(arrCaller) < 2 {\n\t\treturn \"\"\n\t}\n\n\treturn arrCaller[len(arrCaller)-1]\n}", "func getValidPrefix(s string, base int64) string {\n\ttrace_util_0.Count(_util_00000, 47)\n\tvar (\n\t\tvalidLen int\n\t\tupper rune\n\t)\n\tswitch {\n\tcase base >= 2 && base <= 9:\n\t\ttrace_util_0.Count(_util_00000, 51)\n\t\tupper = rune('0' + base)\n\tcase base <= 36:\n\t\ttrace_util_0.Count(_util_00000, 52)\n\t\tupper = rune('A' + base - 10)\n\tdefault:\n\t\ttrace_util_0.Count(_util_00000, 53)\n\t\treturn \"\"\n\t}\n\ttrace_util_0.Count(_util_00000, 48)\nLoop:\n\tfor i := 0; i < len(s); i++ {\n\t\ttrace_util_0.Count(_util_00000, 54)\n\t\tc := rune(s[i])\n\t\tswitch {\n\t\tcase unicode.IsDigit(c) || unicode.IsLower(c) || unicode.IsUpper(c):\n\t\t\ttrace_util_0.Count(_util_00000, 55)\n\t\t\tc = unicode.ToUpper(c)\n\t\t\tif c < upper {\n\t\t\t\ttrace_util_0.Count(_util_00000, 58)\n\t\t\t\tvalidLen = i + 1\n\t\t\t} else {\n\t\t\t\ttrace_util_0.Count(_util_00000, 59)\n\t\t\t\t{\n\t\t\t\t\tbreak Loop\n\t\t\t\t}\n\t\t\t}\n\t\tcase c == '+' || c == '-':\n\t\t\ttrace_util_0.Count(_util_00000, 56)\n\t\t\tif i != 0 {\n\t\t\t\ttrace_util_0.Count(_util_00000, 60)\n\t\t\t\tbreak Loop\n\t\t\t}\n\t\tdefault:\n\t\t\ttrace_util_0.Count(_util_00000, 57)\n\t\t\tbreak Loop\n\t\t}\n\t}\n\ttrace_util_0.Count(_util_00000, 49)\n\tif validLen > 1 && s[0] == '+' {\n\t\ttrace_util_0.Count(_util_00000, 61)\n\t\treturn s[1:validLen]\n\t}\n\ttrace_util_0.Count(_util_00000, 50)\n\treturn s[:validLen]\n}", "func sanitizePackageName(importPath string) string {\n\talias := path.Base(importPath)\n\n\t// alias should be lower case\n\talias = strings.ToLower(alias)\n\n\t// alias should now only contain alphanumerics\n\timportsRegex := regexp.MustCompile(`[^a-z0-9]`)\n\talias = importsRegex.ReplaceAllString(alias, \"\")\n\n\t// can't have a first digit, per Go identifier rules, so just skip them\n\talias = strings.TrimLeftFunc(alias, unicode.IsDigit)\n\n\t// If path part was all digits, we may be left with an empty string. In this case use \"pkg\" as the alias.\n\tif alias == \"\" {\n\t\talias = \"pkg\"\n\t}\n\n\treturn alias\n}", "func TestPrewriteWrittenNoConflict4A(t *testing.T) {\n}", "func getOID(oid string) (string, error) {\n\tif strings.HasPrefix(oid, \".\") {\n\t\treturn oid, nil\n\t}\n\tmu.Lock()\n\tdefer mu.Unlock()\n\tfixed, ok := lookupOID[oid]\n\tif !ok {\n\t\treturn oid, errors.Errorf(\"no OID found for %s\", oid)\n\t}\n\treturn fixed, nil\n}", "func legacyFileName(prefix, instance, class, id string) string {\n\tvar fileName string\n\tinstance = strings.Replace(instance, \"\\\\\", \"__\", -1)\n\n\t// use it to build the file name\n\tif prefix == \"\" {\n\t\tfileName = fmt.Sprintf(\"%s_%s_%s.status\", instance, class, id)\n\t} else {\n\t\tfileName = fmt.Sprintf(\"%s_%s_%s_%s.status\", prefix, instance, class, id)\n\t}\n\treturn fileName\n}", "func uniquePackageOf(fd *descriptor.FileDescriptorProto) string {\n\ts, ok := uniquePackageName[fd]\n\tif !ok {\n\t\tlog.Fatal(\"internal error: no package name defined for \" + fd.GetName())\n\t}\n\treturn s\n}", "func getForcedGetter(sourceUrl string) (string, string) {\n\tif matches := forcedRegexp.FindStringSubmatch(sourceUrl); matches != nil && len(matches) > 2 {\n\t\treturn matches[1], matches[2]\n\t}\n\n\treturn \"\", sourceUrl\n}", "func getFullyQualifiedFunctionName(fn interface{}) string {\n\treturn runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()\n}", "func TestEmptyPrewrite4A(t *testing.T) {\n}", "func internalStartsWith(str string, prefix string, ignoreCase bool) bool {\n\tif str == \"\" || prefix == \"\" {\n\t\treturn (str == \"\" && prefix == \"\")\n\t}\n\tif utf8.RuneCountInString(prefix) > utf8.RuneCountInString(str) {\n\t\treturn false\n\t}\n\tif ignoreCase {\n\t\treturn strings.HasPrefix(strings.ToLower(str), strings.ToLower(prefix))\n\t}\n\treturn strings.HasPrefix(str, prefix)\n}", "func TestGetEmpty4A(t *testing.T) {\n}", "func ExampleMustSqueezeTrytes() {}", "func getAliasId(name string, mountAccessor string, entityAliasList *map[string]EntityAlias) string {\n\tfor aliasID, alias := range *entityAliasList {\n\t\tif alias.Name == name && alias.MountAccessor == mountAccessor {\n\t\t\treturn aliasID\n\t\t}\n\t}\n\treturn \"\"\n}", "func getInternalParentPrefix(pkgName string) string {\n\tcleanedPath := filepath.Clean(pkgName)\n\texplodedPath := strings.Split(cleanedPath, string(os.PathSeparator))\n\n\ti := len(explodedPath) - 1\n\tfor ; i > 0; i-- {\n\t\tif explodedPath[i] == internal {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn filepath.Join(explodedPath[0:i]...)\n}", "func smallestGoodBase(n string) string {\n \n}", "func idFromName(name string) string {\n\ts := strings.Split(strings.ToLower(strings.TrimSpace(name)), \" \")\n\tns := strings.Join(s, \"-\")\n\ts = strings.Split(ns, \".\")\n\treturn strings.Join(s, \"-\")\n}", "func packageName(skip int) (long, short string, ok bool) {\n\t// Full function name looks like path/to/pkg.Func\n\tvar f string\n\t_, _, f, ok = fullCaller(skip + 1)\n\tif !ok {\n\t\treturn\n\t}\n\n\t// Strip down to path/to/pkg\n\tdot := strings.LastIndex(f, \".\")\n\tif dot == -1 {\n\t\treturn\n\t}\n\tlong = f[:dot]\n\n\t// Strip down to pkg\n\tslash := strings.LastIndex(long, \"/\")\n\tif slash == -1 {\n\t\treturn\n\t}\n\tshort = long[slash+1:]\n\treturn\n}", "func TestSinglePrewrite4A(t *testing.T) {\n}", "func getPathConversionFunction() func(string) string {\n\tif runtime.GOOS != \"windows\" || os.Getenv(\"DOCKER_MACHINE_NAME\") == \"\" {\n\t\treturn func(path string) string { return path }\n\t}\n\n\treturn func(path string) string {\n\t\treturn fmt.Sprintf(\"/%s%s\", strings.ToUpper(path[:1]), path[2:])\n\t}\n}", "func FullNameNakedReturn(f, l string) (full string, length int) {\n full = f + \" \" + l;\n length = len(full)\n return \n}", "func TestManifestAPI_Get_UnknownSchema(t *testing.T) {}", "func resolveSourcePrefix(source string, sa Source) string {\n\tif sa.Prefix == \"false\" || sa.Prefix == \"\" {\n\t\treturn \"\"\n\t} else if sa.Prefix == \"true\" {\n\t\treturn source + \"_\"\n\t} else {\n\t\treturn sa.Prefix + \"_\"\n\t}\n}", "func checkSafeNameChars(nameFragment string) error {\n\tfor i, ch := range nameFragment {\n\t\tswitch {\n\t\tcase 'a' <= ch && ch <= 'z':\n\t\tcase '0' <= ch && ch <= '9':\n\t\tcase ch == '_':\n\t\tdefault:\n\t\t\treturn fmt.Errorf(\"Name fragment is not safe: %x at %d.\", ch, i)\n\t\t}\n\t\t// NO: case ch == '.'\n\t\t// Could also allow at most one dot but not for SQLite.\n\t\t// Maybe would make sense for other SQL DBMS which\n\t\t// use schema names / namespaces.\n\t}\n\treturn nil\n}", "func isCommonRetryableErrorCode(err error) (bool, string) {\n\tgerr, ok := err.(*googleapi.Error)\n\tif !ok {\n\t\treturn false, \"\"\n\t}\n\n\tif gerr.Code == 429 || gerr.Code == 500 || gerr.Code == 502 || gerr.Code == 503 {\n\t\tlog.Printf(\"[DEBUG] Dismissed an error as retryable based on error code: %s\", err)\n\t\treturn true, fmt.Sprintf(\"Retryable error code %d\", gerr.Code)\n\t}\n\treturn false, \"\"\n}", "func goodFunction() {\n\treturn nil\n}", "func getCallerPackage() (string, bool) {\n\tvar pkg string\n\tpc, _, _, ok := runtime.Caller(2)\n\tif !ok {\n\t\treturn pkg, false\n\t}\n\tparts := strings.Split(runtime.FuncForPC(pc).Name(), \".\")\n\tif parts[len(parts)-2][0] == '(' {\n\t\tpkg = strings.Join(parts[0:len(parts)-2], \".\")\n\t} else {\n\t\tpkg = strings.Join(parts[0:len(parts)-1], \".\")\n\t}\n\treturn pkg, true\n}", "func _getFuncName() string {\n var ptrVal = _getFuncPtrVal()\n\n // Look up the function object\n var fun = runtime.FuncForPC(ptrVal)\n\n // returns: _/home/user/src/gohavenet/src.TestProcMgr_False\n var funcNamePath = fun.Name()\n\n // Split on the slash and return just the func name\n var pathElems = strings.Split(funcNamePath, \"/\")\n var index = len(pathElems) - 1\n if index < 0 {\n index = 0\n }\n\n return pathElems[index]\n}", "func getPatchVersionTrimmed(version string) string {\n\tendIndex := strings.LastIndex(version, \".\")\n\tif endIndex != -1 {\n\t\tversion = version[:endIndex]\n\t}\n\treturn version\n}", "func fixLegacyInventoryName(obj *unstructured.Unstructured) error {\n\tif obj.GetName() == legacyInvName {\n\t\tklog.V(4).Infof(\"renaming legacy inventory name\")\n\t\trandomSuffix := common.RandomStr()\n\t\treturn addSuffixToName(obj, randomSuffix)\n\t}\n\treturn nil\n}", "func callerName(skip int) (pkgPath, funcName string, ok bool) {\n\tvar pc [1]uintptr\n\tn := runtime.Callers(skip+1, pc[:])\n\tif n != 1 {\n\t\treturn \"\", \"\", false\n\t}\n\n\tf := runtime.FuncForPC(pc[0]).Name()\n\ts := pkgPathRe.FindStringSubmatch(f)\n\tif len(s) < 3 {\n\t\tpanic(fmt.Errorf(\"failed to extract package path and function name from %q\", f))\n\t}\n\n\treturn s[1], s[2], true\n}", "func getValidContainerName(volumeName, protocol string) string {\n\tcontainerName := strings.ToLower(volumeName)\n\tif len(containerName) > containerNameMaxLength {\n\t\tcontainerName = containerName[0:containerNameMaxLength]\n\t}\n\tif !checkContainerNameBeginAndEnd(containerName) || len(containerName) < containerNameMinLength {\n\t\t// now we set as 63 for maximum container name length\n\t\t// todo: get cluster name\n\t\tcontainerName = k8sutil.GenerateVolumeName(fmt.Sprintf(\"pvc-%s\", protocol), uuid.NewUUID().String(), 63)\n\t\tklog.Warningf(\"the requested volume name (%q) is invalid, so it is regenerated as (%q)\", volumeName, containerName)\n\t}\n\tcontainerName = strings.Replace(containerName, \"--\", \"-\", -1)\n\n\treturn containerName\n}", "func funcName() string {\n\tpc, _, _, _ := runtime.Caller(1)\n\tcompleteFuncname := runtime.FuncForPC(pc).Name()\n\treturn strings.Split(completeFuncname, \".\")[len(strings.Split(completeFuncname, \".\"))-1]\n}", "func ensureValidHelper(name string, funcValue reflect.Value) {\n\tif funcValue.Kind() != reflect.Func {\n\t\tpanic(fmt.Errorf(\"Helper must be a function: %s\", name))\n\t}\n\n\tfuncType := funcValue.Type()\n\n\tif funcType.NumOut() != 1 {\n\t\tpanic(fmt.Errorf(\"Helper function must return a string or a SafeString: %s\", name))\n\t}\n\n\t// @todo Check if first returned value is a string, SafeString or interface{} ?\n}", "func exactFunction() {\n\treturn nil\n}", "func TestUidForUsername(t *testing.T) {\n\tuid, err := uidForUsername(\"root\")\n\tif err != nil {\n\t\tt.Errorf(\"uidForUsername(\\\"root\\\") returned error: %v\", err)\n\t\treturn\n\t}\n\tif uid != 0 {\n\t\tt.Errorf(\"uidForUsername(\\\"root\\\") returned %d, should be 0\", uid)\n\t}\n\n\t_, err = uidForUsername(\"asdfASDFxxx999\")\n\tif err == nil {\n\t\tt.Errorf(\"uidForUsername(\\\"asdfASDFxxx\\\") did not return error\")\n\t\treturn\n\t}\n}", "func getGroupIdString(id interface{}) (gid string, err error) {\r\n\tswitch t := id.(type) {\r\n\tcase string:\r\n\t\tif strings.Contains(id.(string), \"http\") {\r\n\t\t\treturn \"url=\" + url.QueryEscape(id.(string)), nil // group url\r\n\t\t}\r\n\t\treturn id.(string), nil // group id as a string\r\n\tcase uint64:\r\n\t\treturn strconv.FormatUint(id.(uint64), 10), nil // group id as an int\r\n\tdefault:\r\n\t\treturn gid, errors.New(fmt.Sprintf(\"Group ID type exception: Expecting string or uint64 got %T\", t))\r\n\t}\r\n}", "func GoodEnoughUUID() string {\n\tb := make([]byte, 16)\n\t_, err := rand.Read(b)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tuuid := fmt.Sprintf(\"%x-%x-%x-%x-%x\",\n\t\tb[0:4], b[4:6], b[6:8], b[8:10], b[10:])\n\treturn uuid\n}", "func mustBeUnique(label string) {\n\n\tif _, ok := functions[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as function\", label))\n\t}\n\n\tif _, ok := variables[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as variable\", label))\n\t}\n\n\tif _, ok := aliases[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as alias\", label))\n\t}\n}", "func ensureDot(extension string) string {\n\tif strings.Index(extension, \".\") == -1 {\n\t\textension = \".\" + extension\n\t}\n\treturn extension\n}", "func getSafeString(input interface{}) string {\r\n\tvar safeValue string\r\n\tvar isOk bool\r\n\r\n\tif input == nil {\r\n\t\tsafeValue = \"\"\r\n\t} else {\r\n\t\tsafeValue, isOk = input.(string)\r\n\t\tif isOk == false {\r\n\t\t\tsafeValue = \"\"\r\n\t\t}\r\n\t}\r\n\treturn safeValue\r\n}", "func mustGetUUID() string {\n\tu, err := uuid.NewRandom()\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\treturn u.String()\n}", "func fn3() { // want fn3:`Deprecated: Don't use this\\.`\n}", "func ensurePrefix(s, prefix string) string {\n\tif !strings.HasPrefix(s, prefix) {\n\t\ts = prefix + s\n\t}\n\treturn s\n}", "func prepareHashPath(path, prefix string) string {\n\t// I need to strip the prefix. But... where does the prefix come from\n\treturn \"/\" + strings.TrimPrefix(path, prefix)\n}", "func pySafeName(nm string) string {\n\tif _, bad := pyKeywords[nm]; bad {\n\t\treturn \"my\" + nm\n\t}\n\treturn nm\n}", "func fullCaller(skip int) (file string, line int, fnc string, ok bool) {\n\tvar pc uintptr\n\tpc, file, line, ok = runtime.Caller(skip + 1)\n\tif !ok {\n\t\treturn\n\t}\n\n\tf := runtime.FuncForPC(pc)\n\tfnc = f.Name()\n\treturn\n}", "func getValidVersion(version string) string {\n\tif version != \"\" {\n\t\treturn version\n\t}\n\n\treturn \"Not Installed\"\n}", "func makeSafeFileName(s string) string {\n\tconst maxLen = 200 // slightly arbitrary but must be <= 254 for most modern filesystems\n\n\t// First, tidy the file path to a clean representation\n\tresult := filepath.Clean(s)\n\n\t// Next, split the path into elements between separators and check each element.\n\telements := filepath.SplitList(result)\n\tnewElements := []string{}\n\n\tfor _, element := range elements {\n\t\tnewElements = append(newElements, makeSafeFileElement(element))\n\t}\n\n\tresult = filepath.Join(newElements...)\n\n\t// Also avoid starting a file name with a period as this has a special meaning on UNIX\n\t// and UNIX-like systems.\n\tdir := filepath.Dir(result)\n\tbase := filepath.Base(result)\n\n\tif base[0] == '.' {\n\t\tresult = filepath.Join(dir, base[1:])\n\t}\n\n\t// Ensure the resulting name isn't too long, as X.509 distinguished names can be very long.\n\tif len(result) > maxLen {\n\t\tresult = result[:maxLen]\n\t}\n\n\treturn result\n}", "func TestDiskIOStats_diskName(t *testing.T) {\n\ttests := []struct {\n\t\ttemplates []string\n\t\texpected string\n\t}{\n\t\t{[]string{\"$MY_PARAM_1\"}, \"myval1\"},\n\t\t{[]string{\"${MY_PARAM_1}\"}, \"myval1\"},\n\t\t{[]string{\"x$MY_PARAM_1\"}, \"xmyval1\"},\n\t\t{[]string{\"x${MY_PARAM_1}x\"}, \"xmyval1x\"},\n\t\t{[]string{\"$MISSING\", \"$MY_PARAM_1\"}, \"myval1\"},\n\t\t{[]string{\"$MY_PARAM_1\", \"$MY_PARAM_2\"}, \"myval1\"},\n\t\t{[]string{\"$MISSING\"}, \"null\"},\n\t\t{[]string{\"$MY_PARAM_1/$MY_PARAM_2\"}, \"myval1/myval2\"},\n\t\t{[]string{\"$MY_PARAM_2/$MISSING\"}, \"null\"},\n\t}\n\n\tfor _, tc := range tests {\n\t\tfunc() {\n\t\t\ts := DiskIO{\n\t\t\t\tNameTemplates: tc.templates,\n\t\t\t}\n\t\t\tdefer setupNullDisk(t, &s, \"null\")() //nolint:revive // done on purpose, cleaning will be executed properly\n\t\t\tname, _ := s.diskName(\"null\")\n\t\t\trequire.Equal(t, tc.expected, name, \"Templates: %#v\", tc.templates)\n\t\t}()\n\t}\n}", "func pySafeArg(anm string, idx int) string {\n\tif anm == \"\" {\n\t\tanm = fmt.Sprintf(\"arg_%d\", idx)\n\t}\n\treturn pySafeName(anm)\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func TestAliasingRecursionInvalid(t *testing.T) {\n\t_, errs := PrototypeString(`alias x = x\n\t\tx`)\n\tgoutil.AssertNow(t, errs != nil, \"errs should not be nil\")\n}", "func getPackageName(f string) string {\n\tfor {\n\t\tlastPeriod := strings.LastIndex(f, \".\")\n\t\tlastSlash := strings.LastIndex(f, \"/\")\n\t\tif lastPeriod > lastSlash {\n\t\t\tf = f[:lastPeriod]\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn f\n}", "func getFunctionName(fn interface{}) string {\n\tname := runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()\n\n\t// Method above returns functions in the form : main.foo\n\tparts := strings.Split(name, \".\")\n\treturn parts[len(parts)-1]\n}", "func cleanUserName(userName string) string {\n\tuserName = strings.Replace(userName, \"-\", \"\", -1)\n\tuserName = strings.Replace(userName, \".\", \"\", -1)\n\tuserName = strings.Replace(userName, \"_\", \"\", -1)\n\treturn strings.ToLower(userName)\n}", "func CheckIDFormat(ComponentID string) bool {\n if len(ComponentID) != 9 {\n // check the length of the ComponentID is nine\n return false\n } else if _, err := strconv.Atoi(ComponentID); err != nil {\n // check the ComponentID are all digits\n return false\n } else {\n // now everything looks fine\n return true\n }\n}", "func getSinglePath(v interface{}) (string, error) {\n\tif name, err := resourceName(v); err != nil {\n\t\treturn \"\", err\n\t} else if id, err := resourceId(v); err != nil {\n\t\treturn \"\", err\n\t} else {\n\t\treturn fmt.Sprintf(\"%s(%d)\", name, id), nil\n\t}\n}", "func getUserIdString(id string) (uid string) {\r\n\tif id == \"~\" || id == \"\" {\r\n\t\treturn \"~\" // me\r\n\t} else if strings.Contains(id, \"http\") {\r\n\t\treturn \"url=\" + url.QueryEscape(id) // someone else\r\n\t} else {\r\n\t\treturn \"id=\" + id // someone else's url\r\n\t}\r\n}", "func TestSanitizedName(t *testing.T) {\n\ttables := []struct {\n\t\tbadPath string\n\t\tgoodPath string\n\t}{\n\t\t{\"\\\\..\\\\1.txt\", \"1.txt\"},\n\t\t{\"///foo/bar\", \"foo/bar\"},\n\t\t{\"C:/loo/bar2\", \"loo/bar2\"},\n\t\t{\"C:\\\\loo\\\\bar2\", \"loo\\\\bar2\"},\n\t\t{\"../../foo../../ba..r\", \"foo../ba..r\"},\n\t\t{\"../my.file\", \"my.file\"},\n\t}\n\tfor _, table := range tables {\n\t\tfixedPath := sanitizedName(table.badPath)\n\t\tif fixedPath != table.goodPath {\n\t\t\tt.Errorf(\"expected and fixedPath didn't match - %s : %s\", table.goodPath, fixedPath)\n\t\t}\n\t}\n}", "func TestPrewriteMultiple4A(t *testing.T) {\n}", "func OldGetAnnotation(c, name string) string {\n\tprefix := fmt.Sprintf(\"+%s:\", name)\n\tif strings.HasPrefix(c, prefix) {\n\t\treturn strings.TrimPrefix(c, prefix)\n\t}\n\treturn \"\"\n}", "func getReqNameId(reqIIdList []cres.IID, driverNameId string) string {\n\tfor _, iid := range reqIIdList {\n\t\tif iid.SystemId == driverNameId {\n\t\t\treturn iid.NameId\n\t\t}\n\t}\n\treturn \"\"\n}", "func getAbsoluteURL(item *string, original_item string, url *url.URL) {\n var domain string = strings.Join(strings.Split(url.String(), \"/\")[:3], \"/\")\n if (strings.HasPrefix(*item, \"/\")) {\n if (strings.HasSuffix(url.String(), \"/\")) {\n *item = domain + (*item)[1:]\n } else {\n *item = domain + *item\n }\n utils.Log.Printf(\"[*] Modified item for URL for %s. Transformed from %s to %s\\n\", url, original_item, *item)\n }\n\n if (strings.HasPrefix(url.String(), \" \")) {\n *item = (*item)[1:]\n utils.Log.Printf(\"[*] Modified %s. Removed space from %s on %s\\n\", *item, original_item, url)\n }\n\n\n}", "func TestSimpleParser_baseUrl_err(t *testing.T) {\n\tif baseUrl(\"1234\") != \"1234\" {\n\t\tt.Logf(\"baseUrl method is expected to return original link on error\")\n\t\tt.FailNow()\n\t}\n}", "func notTested() string {\n\treturn \"This function isn't tested!\"\n}", "func asSupportedParameter(param string) (string, bool) {\n\tlower := strings.ToLower(param)\n\treturn lower, lowerCaseParameters[lower]\n}", "func getUID(lib utils.PathIdentifier) string {\n\treturn lib.Key()[:5]\n}", "func LegacyOrigin(parts ...string) (ret string) {\n\tfor index, i := range parts {\n\t\tret += i\n\t\tif index < len(parts)-1 {\n\t\t\tret += LegacyOriginSeparator\n\t\t}\n\t}\n\treturn\n}", "func getFullName()(string, string) {\n\treturn \"Ninja\", \"Coder\"\n}", "func generateUUID() string {\n uuid4, _ := uuid.NewV4()\n return uuid4.String()\n}", "func getInternalMountPath(workingMountDir string, vol *smbVolume) string {\n\tif vol == nil {\n\t\treturn \"\"\n\t}\n\tmountDir := vol.uuid\n\tif vol.uuid == \"\" {\n\t\tmountDir = vol.subDir\n\t}\n\treturn filepath.Join(workingMountDir, mountDir)\n}", "func shadowedByParam2() (math string, fmt int) { return }", "func wrapClientID(clientID string) string {\n\thostname, err := os.Hostname()\n\tif err != nil {\n\t\thostname = \"<error>\"\n\t}\n\n\t// Replace all non-alphanumeric chars with something benign that will work in the client id.\n\tre := regexp.MustCompile(\"[^a-zA-Z0-9]+\")\n\thostname = re.ReplaceAllString(hostname, \"-\")\n\n\t// Special case for running locally, add random\n\tif runtime.GOOS == \"darwin\" {\n\t\thostname += strconv.Itoa(rand.Intn(100))\n\t\treturn fmt.Sprintf(\"%s-%s\", clientID, hostname)\n\t}\n\treturn fmt.Sprintf(\"%s-%s\", clientID, hostname)\n}", "func getShorterString(a string, b string) int {\n\tif len(a) <= len(b) {\n\t\treturn len(a)\n\t}\n\treturn len(b)\n}", "func callerShortfile(file string, lastsep_ ...rune) string {\n\tlastsep := '/'\n\tif len(lastsep_) > 0 {\n\t\tlastsep = lastsep_[0]\n\t}\n\tshort := file\n\tfor i := len(file) - 1; i > 0; i-- {\n\t\tif file[i] == byte(lastsep) {\n\t\t\tshort = file[i+1:]\n\t\t\tbreak\n\t\t}\n\t}\n\treturn short\n}", "func unqualify(importPath string) string {\n\tif i := strings.LastIndex(importPath, sep); i != -1 {\n\t\timportPath = importPath[i+len(sep):]\n\t}\n\treturn importPath\n}", "func Test_HasPrefix(t *testing.T) {\n\tvalue := \"main.go\"\n\tprefix := \"main\"\n\tif !strings.HasPrefix(value, prefix) {\n\t\tt.Fatalf(\"expected %s to have prefix %s\", value, prefix)\n\t}\n}", "func cleancompstr(cleanup string) string {\n\tcleanup = strings.TrimSpace(cleanup)\n\tcleanup = strings.ToLower(cleanup)\n\treturn cleanup\n}", "func badTemper(string, string) (*os.File, error) {\n\treturn nil, fmt.Errorf(\"oups\")\n}", "func (d *Abstraction) getGeneratedName(s string, m string) string {\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(s)\n\tbuffer.WriteString(\".\")\n\tbuffer.WriteString(m)\n\treturn buffer.String()\n}", "func helper(k string) interface{} {\n\treturn k\n}", "func getUsername() string {\n\tlog.Debug(\"getUsername\")\n\tu := \"unknown\"\n\tosUser := \"\"\n\n\tswitch runtime.GOOS {\n\tcase \"darwin\", \"linux\", \"solaris\":\n\t\tosUser = os.Getenv(\"USER\")\n\tcase \"windows\":\n\t\tosUser = os.Getenv(\"USERNAME\")\n\n\t\t// remove domain\n\t\tosUser = osUser[strings.LastIndex(osUser, \"\\\\\")+1:]\n\t\tlog.Debugf(\"Windows user has been transformed into %s\", osUser)\n\n\t\t// HACK ugly ... if localized administrator, translate to administrator\n\t\tif isWinAdministrator(osUser) {\n\t\t\tosUser = \"Administrator\"\n\t\t}\n\t}\n\n\tif osUser != \"\" {\n\t\tu = osUser\n\t}\n\treturn u\n}", "func getCaller(skip int, shortFileName bool) string {\n\tvar b strings.Builder\n\t_, file, no, ok := runtime.Caller(skip)\n\tif ok {\n\t\tif shortFileName {\n\t\t\tif lastSlashIndex := strings.LastIndex(file, \"/\"); lastSlashIndex != -1 {\n\t\t\t\tfile = file[lastSlashIndex+1:]\n\t\t\t}\n\t\t}\n\t\tfmt.Fprintf(&b, \"%s:%d\", file, no)\n\t}\n\treturn b.String()\n}", "func ensureTrailingDot(details string) string {\n\tif !strings.HasSuffix(details, \".\") {\n\t\treturn fmt.Sprintf(\"%s.\", details)\n\t}\n\treturn details\n}", "func isBadVersion(version int) bool{\n\treturn true\n}", "func TestGetWrongUUID(t *testing.T) {\n\tclearTable()\n nt := New{{.NameExported}}()\n add{{.NameExported}}(nt)\n badUid := \"00000000-d01d-4c09-a4e7-59026d143b89\"\n\n\tstatement := fmt.Sprintf({{.NameExported}}URL, badUid)\n\n\treq, _ := http.NewRequest(\"GET\", statement, nil)\n\tresponse := executeRequest(req)\n\n\tcheckResponseCode(t, http.StatusNotFound, response.Code)\n}", "func LegacyInstanceObjectID(obj *ResourceInstanceObjectSrc) string {\n\tif obj == nil {\n\t\treturn \"<not created>\"\n\t}\n\n\tif obj.AttrsJSON != nil {\n\t\ttype WithID struct {\n\t\t\tID string `json:\"id\"`\n\t\t}\n\t\tvar withID WithID\n\t\terr := json.Unmarshal(obj.AttrsJSON, &withID)\n\t\tif err == nil {\n\t\t\treturn withID.ID\n\t\t}\n\t} else if obj.AttrsFlat != nil {\n\t\tif flatID, exists := obj.AttrsFlat[\"id\"]; exists {\n\t\t\treturn flatID\n\t\t}\n\t}\n\n\t// For resource types created after we removed id as special there may\n\t// not actually be one at all. This is okay because older tests won't\n\t// encounter this, and new tests shouldn't be using ids.\n\treturn \"<none>\"\n}", "func getErrOrigin() string {\n\tvar origin string\n\tif pc, file, line, ok := runtime.Caller(2); ok {\n\t\tif f := runtime.FuncForPC(pc); f != nil {\n\t\t\tif wd, err := os.Getwd(); err == nil {\n\t\t\t\torigin = fmt.Sprintf(\"%s %s:%d\", strings.TrimPrefix(f.Name(), pkgPath), strings.TrimPrefix(file, wd+string(os.PathSeparator)), line)\n\t\t\t}\n\t\t}\n\t}\n\treturn origin\n}", "func (objectIDs *DbObjectIDs) getUniqueID() (string, error) {\n\tid := objectIDs.ownerControllerName + \":\" + string(objectIDs.idsType.ownerObjectType)\n\tfor _, key := range objectIDs.idsType.GetExternalIDKeys() {\n\t\tvalue, ok := objectIDs.objectIDs[key]\n\t\tif !ok {\n\t\t\treturn \"\", fmt.Errorf(\"key %v is required but not present\", key)\n\t\t}\n\t\tid += \":\" + value\n\t}\n\treturn id, nil\n}", "func getCallPriorityID(strPriorityName string, espXmlmc *apiLib.XmlmcInstStruct, buffer *bytes.Buffer) (string, string) {\n\tpriorityID := \"\"\n\tif swImportConf.PriorityMapping[strPriorityName] != nil {\n\t\tstrPriorityName = fmt.Sprintf(\"%s\", swImportConf.PriorityMapping[strPriorityName])\n\t\tif strPriorityName != \"\" {\n\t\t\tpriorityID = getPriorityID(strPriorityName, espXmlmc, buffer)\n\t\t}\n\t}\n\treturn priorityID, strPriorityName\n}" ]
[ "0.54391617", "0.537337", "0.52153504", "0.5027685", "0.49748364", "0.49492276", "0.48793", "0.48030773", "0.47867504", "0.47672582", "0.47625", "0.47365943", "0.47231343", "0.47052392", "0.47017908", "0.4690704", "0.46896505", "0.468837", "0.46661186", "0.46651876", "0.4660059", "0.46563408", "0.46526176", "0.46522498", "0.46515664", "0.46304148", "0.46294066", "0.46291944", "0.4628808", "0.4628634", "0.4626985", "0.46251827", "0.4623576", "0.46198753", "0.46133012", "0.46065894", "0.46041447", "0.46031842", "0.46007428", "0.45996395", "0.45949078", "0.45948225", "0.4594602", "0.4587584", "0.458685", "0.45861182", "0.45775196", "0.4569256", "0.45618016", "0.4558084", "0.45567307", "0.45398208", "0.45388", "0.4538208", "0.45349208", "0.45334432", "0.45327297", "0.45305002", "0.45284516", "0.45284516", "0.45284516", "0.45284516", "0.45226273", "0.45218483", "0.4518053", "0.45167843", "0.4516224", "0.45142642", "0.45080796", "0.4499888", "0.44995216", "0.44993803", "0.44969517", "0.44944692", "0.44919115", "0.44850907", "0.44817296", "0.44817045", "0.44809243", "0.44796196", "0.4477853", "0.44706628", "0.4470178", "0.44692436", "0.44620207", "0.4457153", "0.445306", "0.44515565", "0.44502005", "0.44491532", "0.44488847", "0.44454673", "0.44444677", "0.44380328", "0.44369042", "0.44313204", "0.44297668", "0.4428367", "0.44268107", "0.44261277", "0.44246167" ]
0.0
-1
You should always use this function to get a new ListVPCsParams instance, as then you are sure you have configured all required params
func (s *VPCService) NewListVPCsParams() *ListVPCsParams { p := &ListVPCsParams{} p.p = make(map[string]interface{}) return p }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (s *VPCService) NewListVPCOfferingsParams() *ListVPCOfferingsParams {\n\tp := &ListVPCOfferingsParams{}\n\tp.p = make(map[string]interface{})\n\treturn p\n}", "func NewListParams() *ListParams {\n\tvar ()\n\treturn &ListParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func ListVPC(connectionName string, rsType string) ([]*cres.VPCInfo, error) {\n\tcblog.Info(\"call ListVPC()\")\n\n\t// check empty and trim user inputs\n connectionName, err := EmptyCheckAndTrim(\"connectionName\", connectionName)\n if err != nil {\n\t\tcblog.Error(err)\n return nil, err\n }\n\n\tcldConn, err := ccm.GetCloudConnection(connectionName)\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\n\thandler, err := cldConn.CreateVPCHandler()\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\n\t// (1) get IID:list\n\tiidInfoList, err := iidRWLock.ListIID(iidm.IIDSGROUP, connectionName, rsType)\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\n\tvar infoList []*cres.VPCInfo\n\tif iidInfoList == nil || len(iidInfoList) <= 0 {\n\t\tinfoList = []*cres.VPCInfo{}\n\t\treturn infoList, nil\n\t}\n\n\t// (2) Get VPCInfo-list with IID-list\n\twg := new(sync.WaitGroup)\n\tresultInfoList := []*cres.VPCInfo{}\n var retChanInfos []chan ResultVPCInfo\n for i:=0 ; i<len(iidInfoList); i++ {\n retChanInfos = append(retChanInfos, make(chan ResultVPCInfo))\n }\n\n for idx, iidInfo := range iidInfoList {\n\n wg.Add(1)\n\n go getVPCInfo(connectionName, handler, iidInfo.IId, retChanInfos[idx])\n\n wg.Done()\n\n }\n wg.Wait()\n\n var errList []string\n for idx, retChanInfo := range retChanInfos {\n chanInfo := <-retChanInfo\n\n if chanInfo.err != nil {\n if checkNotFoundError(chanInfo.err) {\n cblog.Info(chanInfo.err) } else {\n errList = append(errList, connectionName + \":VPC:\" + iidInfoList[idx].IId.NameId + \" # \" + chanInfo.err.Error())\n }\n } else {\n resultInfoList = append(resultInfoList, &chanInfo.vpcInfo)\n }\n\n close(retChanInfo)\n }\n\n if len(errList) > 0 {\n cblog.Error(strings.Join(errList, \"\\n\"))\n return nil, errors.New(strings.Join(errList, \"\\n\"))\n }\n\n return resultInfoList, nil\n}", "func (f *FakeInstance) ListVPCInfo(_ context.Context, _ string, _ *govultr.ListOptions) ([]govultr.VPCInfo, *govultr.Meta, *http.Response, error) {\n\tpanic(\"implement me\")\n}", "func GetVPCListMocked(t *testing.T, vpcsIn []*types.Vpc) []*types.Vpc {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewVPCService(cs)\n\tassert.Nil(err, \"Couldn't load VPC service\")\n\tassert.NotNil(ds, \"VPC service not instanced\")\n\n\t// to json\n\tdIn, err := json.Marshal(vpcsIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// call service\n\tcs.On(\"Get\", \"/network/vpcs\").Return(dIn, 200, nil)\n\tvpcsOut, err := ds.GetVPCList()\n\tassert.Nil(err, \"Error getting VPC list\")\n\tassert.Equal(vpcsIn, vpcsOut, \"GetVPCList returned different VPCs\")\n\n\treturn vpcsOut\n}", "func CreateListVpcInfoByVpcRequest() (request *ListVpcInfoByVpcRequest) {\n\trequest = &ListVpcInfoByVpcRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Ots\", \"2016-06-20\", \"ListVpcInfoByVpc\", \"ots\", \"openAPI\")\n\treturn\n}", "func (s *VPCService) NewListPrivateGatewaysParams() *ListPrivateGatewaysParams {\n\tp := &ListPrivateGatewaysParams{}\n\tp.p = make(map[string]interface{})\n\treturn p\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules,\n\tmoneyMarkets MoneyMarkets, checkLtvIndexCount int) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t\tMoneyMarkets: moneyMarkets,\n\t\tCheckLtvIndexCount: checkLtvIndexCount,\n\t}\n}", "func (m *MockSecurityGroupServiceIface) NewListSecurityGroupsParams() *ListSecurityGroupsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListSecurityGroupsParams\")\n\tret0, _ := ret[0].(*ListSecurityGroupsParams)\n\treturn ret0\n}", "func NewListInstancesParams() *ListInstancesParams {\n\tvar ()\n\treturn &ListInstancesParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *VPCService) NewCreateVPCParams(cidr string, displaytext string, name string, vpcofferingid string, zoneid string) *CreateVPCParams {\n\tp := &CreateVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"cidr\"] = cidr\n\tp.p[\"displaytext\"] = displaytext\n\tp.p[\"name\"] = name\n\tp.p[\"vpcofferingid\"] = vpcofferingid\n\tp.p[\"zoneid\"] = zoneid\n\treturn p\n}", "func NewParams(communityTax sdk.Dec, withdrawAddrEnabled bool) Params {\n\treturn Params{\n\t\tCommunityTax: communityTax,\n\t\tWithdrawAddrEnabled: withdrawAddrEnabled,\n\t}\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t}\n}", "func (o *ClusterUninstaller) listVPCs() (cloudResources, error) {\n\to.Logger.Debugf(\"Listing VPCs\")\n\n\tctx, cancel := o.contextWithTimeout()\n\tdefer cancel()\n\n\tselect {\n\tcase <-ctx.Done():\n\t\to.Logger.Debugf(\"listVPCs: case <-ctx.Done()\")\n\t\treturn nil, o.Context.Err() // we're cancelled, abort\n\tdefault:\n\t}\n\n\toptions := o.vpcSvc.NewListVpcsOptions()\n\tvpcs, _, err := o.vpcSvc.ListVpcs(options)\n\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"failed to list vps\")\n\t}\n\n\tvar foundOne = false\n\n\tresult := []cloudResource{}\n\tfor _, vpc := range vpcs.Vpcs {\n\t\tif strings.Contains(*vpc.Name, o.InfraID) {\n\t\t\tfoundOne = true\n\t\t\to.Logger.Debugf(\"listVPCs: FOUND: %s, %s\", *vpc.ID, *vpc.Name)\n\t\t\tresult = append(result, cloudResource{\n\t\t\t\tkey: *vpc.ID,\n\t\t\t\tname: *vpc.Name,\n\t\t\t\tstatus: \"\",\n\t\t\t\ttypeName: vpcTypeName,\n\t\t\t\tid: *vpc.ID,\n\t\t\t})\n\t\t}\n\t}\n\tif !foundOne {\n\t\to.Logger.Debugf(\"listVPCs: NO matching vpc against: %s\", o.InfraID)\n\t\tfor _, vpc := range vpcs.Vpcs {\n\t\t\to.Logger.Debugf(\"listVPCs: vpc: %s\", *vpc.Name)\n\t\t}\n\t}\n\n\treturn cloudResources{}.insert(result...), nil\n}", "func (i *InstanceServiceHandler) ListVPCInfo(ctx context.Context, instanceID string, options *ListOptions) ([]VPCInfo, *Meta, error) {\n\turi := fmt.Sprintf(\"%s/%s/vpcs\", instancePath, instanceID)\n\treq, err := i.client.NewRequest(ctx, http.MethodGet, uri, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tnewValues, err := query.Values(options)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\treq.URL.RawQuery = newValues.Encode()\n\n\tvpcs := new(vpcInfoBase)\n\tif err = i.client.DoWithContext(ctx, req, vpcs); err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\treturn vpcs.VPCs, vpcs.Meta, nil\n}", "func NewListPaymentsParams() ListPaymentsParams {\n\n\tvar (\n\t\t// initialize parameters with default values\n\n\t\toffsetDefault = string(\"0\")\n\t\torderByDefault = string(\"createddate\")\n\t\tpageSizeDefault = string(\"100\")\n\t)\n\n\treturn ListPaymentsParams{\n\t\tOffset: &offsetDefault,\n\n\t\tOrderBy: &orderByDefault,\n\n\t\tPageSize: &pageSizeDefault,\n\t}\n}", "func NewContainerListParams() *ContainerListParams {\n\tvar (\n\t\tallDefault = bool(false)\n\t\tsizeDefault = bool(false)\n\t)\n\treturn &ContainerListParams{\n\t\tAll: &allDefault,\n\t\tSize: &sizeDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewParams(defaultSendEnabled bool) Params {\n\treturn Params{\n\t\tSendEnabled: nil,\n\t\tDefaultSendEnabled: defaultSendEnabled,\n\t}\n}", "func (s *VPCService) NewCreateVPCOfferingParams(displaytext string, name string, supportedservices []string) *CreateVPCOfferingParams {\n\tp := &CreateVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"displaytext\"] = displaytext\n\tp.p[\"name\"] = name\n\tp.p[\"supportedservices\"] = supportedservices\n\treturn p\n}", "func (m *MockLoadBalancerServiceIface) NewListNetscalerLoadBalancersParams() *ListNetscalerLoadBalancersParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListNetscalerLoadBalancersParams\")\n\tret0, _ := ret[0].(*ListNetscalerLoadBalancersParams)\n\treturn ret0\n}", "func NewPetListParams() *PetListParams {\n\treturn &PetListParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (ts *Tester) createVPC() error {\n\tif ts.cfg.VPC.ID != \"\" {\n\t\tts.lg.Info(\"querying ELBv2\", zap.String(\"vpc-id\", ts.cfg.VPC.ID))\n\t\tctx, cancel := context.WithTimeout(context.Background(), time.Minute)\n\t\toutput, err := ts.elbv2APIV2.DescribeLoadBalancers(\n\t\t\tctx,\n\t\t\t&aws_elbv2_v2.DescribeLoadBalancersInput{},\n\t\t)\n\t\tcancel()\n\t\tif err != nil {\n\t\t\tts.lg.Warn(\"failed to describe ELBv2\", zap.Error(err))\n\t\t} else {\n\t\t\tfor _, ev := range output.LoadBalancers {\n\t\t\t\tarn := aws_v2.ToString(ev.LoadBalancerArn)\n\t\t\t\tvpcID := aws_v2.ToString(ev.VpcId)\n\t\t\t\tif vpcID == ts.cfg.VPC.ID {\n\t\t\t\t\tts.lg.Warn(\"found ELBv2 for this VPC; may overlap with the other cluster\",\n\t\t\t\t\t\tzap.String(\"vpc-id\", ts.cfg.VPC.ID),\n\t\t\t\t\t\tzap.String(\"elb-arn\", arn),\n\t\t\t\t\t)\n\t\t\t\t} else {\n\t\t\t\t\tts.lg.Info(\"found ELBv2 for other VPCs\", zap.String(\"vpc-id\", vpcID), zap.String(\"elb-arn\", arn))\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tts.lg.Info(\"querying subnet IDs for given VPC\",\n\t\t\tzap.String(\"vpc-id\", ts.cfg.VPC.ID),\n\t\t)\n\t\tctx, cancel = context.WithTimeout(context.Background(), time.Minute)\n\t\tsresp, err := ts.ec2APIV2.DescribeSubnets(\n\t\t\tctx,\n\t\t\t&aws_ec2_v2.DescribeSubnetsInput{\n\t\t\t\tFilters: []aws_ec2_v2_types.Filter{\n\t\t\t\t\t{\n\t\t\t\t\t\tName: aws_v2.String(\"vpc-id\"),\n\t\t\t\t\t\tValues: []string{ts.cfg.VPC.ID},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t})\n\t\tcancel()\n\t\tif err != nil {\n\t\t\tts.lg.Warn(\"failed to subnets\", zap.Error(err))\n\t\t\treturn err\n\t\t}\n\n\t\tts.cfg.VPC.PublicSubnetIDs = make([]string, 0, len(sresp.Subnets))\n\t\tts.cfg.VPC.PrivateSubnetIDs = make([]string, 0, len(sresp.Subnets))\n\t\tfor _, sv := range sresp.Subnets {\n\t\t\tid := aws_v2.ToString(sv.SubnetId)\n\t\t\tnetworkTagValue := \"\"\n\t\t\tfor _, tg := range sv.Tags {\n\t\t\t\tswitch aws_v2.ToString(tg.Key) {\n\t\t\t\tcase \"Network\":\n\t\t\t\t\tnetworkTagValue = aws_v2.ToString(tg.Value)\n\t\t\t\t}\n\t\t\t\tif networkTagValue != \"\" {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tts.lg.Info(\"found subnet\",\n\t\t\t\tzap.String(\"id\", id),\n\t\t\t\tzap.String(\"availability-zone\", aws_v2.ToString(sv.AvailabilityZone)),\n\t\t\t\tzap.String(\"network-tag\", networkTagValue),\n\t\t\t)\n\t\t\tswitch networkTagValue {\n\t\t\tcase \"Public\":\n\t\t\t\tts.cfg.VPC.PublicSubnetIDs = append(ts.cfg.VPC.PublicSubnetIDs, id)\n\t\t\tcase \"Private\":\n\t\t\t\tts.cfg.VPC.PrivateSubnetIDs = append(ts.cfg.VPC.PrivateSubnetIDs, id)\n\t\t\tdefault:\n\t\t\t\treturn fmt.Errorf(\"'Network' tag not found in subnet %q\", id)\n\t\t\t}\n\t\t}\n\t\tif len(ts.cfg.VPC.PublicSubnetIDs) == 0 {\n\t\t\treturn fmt.Errorf(\"no subnet found for VPC ID %q\", ts.cfg.VPC.ID)\n\t\t}\n\n\t\tts.lg.Info(\"querying security IDs\", zap.String(\"vpc-id\", ts.cfg.VPC.ID))\n\t\tctx, cancel = context.WithTimeout(context.Background(), time.Minute)\n\t\tgresp, err := ts.ec2APIV2.DescribeSecurityGroups(\n\t\t\tctx,\n\t\t\t&aws_ec2_v2.DescribeSecurityGroupsInput{\n\t\t\t\tFilters: []aws_ec2_v2_types.Filter{\n\t\t\t\t\t{\n\t\t\t\t\t\tName: aws_v2.String(\"vpc-id\"),\n\t\t\t\t\t\tValues: []string{ts.cfg.VPC.ID},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t})\n\t\tcancel()\n\t\tif err != nil {\n\t\t\tts.lg.Warn(\"failed to security groups\", zap.Error(err))\n\t\t\treturn err\n\t\t}\n\t\tfor _, sg := range gresp.SecurityGroups {\n\t\t\tid, name := aws_v2.ToString(sg.GroupId), aws_v2.ToString(sg.GroupName)\n\t\t\tts.lg.Info(\"found security group\", zap.String(\"id\", id), zap.String(\"name\", name))\n\t\t\tif name != \"default\" {\n\t\t\t\tts.cfg.VPC.SecurityGroupID = id\n\t\t\t}\n\t\t}\n\t\tif ts.cfg.VPC.SecurityGroupID == \"\" {\n\t\t\treturn fmt.Errorf(\"no security group found for VPC ID %q\", ts.cfg.VPC.ID)\n\t\t}\n\n\t\tts.cfg.Sync()\n\t\treturn nil\n\t}\n\tif !ts.cfg.VPC.Create {\n\t\tts.lg.Info(\"VPC.Create false; skipping creation\")\n\t\treturn nil\n\t}\n\tif ts.cfg.VPC.ID != \"\" &&\n\t\tlen(ts.cfg.VPC.PublicSubnetIDs) > 0 &&\n\t\tts.cfg.VPC.SecurityGroupID != \"\" {\n\t\tts.lg.Info(\"VPC already created; no need to create a new one\")\n\t\treturn nil\n\t}\n\n\tif err := ts._createVPC(); err != nil { // AWS::EC2::VPC\n\t\treturn err\n\t}\n\tif err := ts.modifyVPC(); err != nil {\n\t\treturn err\n\t}\n\tif err := ts.createSecurityGroups(); err != nil { // AWS::EC2::SecurityGroup\n\t\treturn err\n\t}\n\tif err := ts.associateVPCCIDRBlocks(); err != nil { // AWS::EC2::VPCCidrBlock\n\t\treturn err\n\t}\n\n\tif err := ts.createInternetGateway(); err != nil { // AWS::EC2::InternetGateway\n\t\treturn err\n\t}\n\tif err := ts.createVPCGatewayAttachment(); err != nil { // AWS::EC2::VPCGatewayAttachment\n\t\treturn err\n\t}\n\n\tif err := ts.createPublicSubnets(); err != nil { // AWS::EC2::Subnet\n\t\treturn err\n\t}\n\tif err := ts.createPublicRouteTable(); err != nil { // AWS::EC2::RouteTable\n\t\treturn err\n\t}\n\tif err := ts.createPublicRoute(); err != nil { // AWS::EC2::Route\n\t\treturn err\n\t}\n\tif err := ts.createPublicSubnetRouteTableAssociation(); err != nil { // AWS::EC2::SubnetRouteTableAssociation\n\t\treturn err\n\t}\n\n\tif err := ts.createPublicEIPs(); err != nil { // AWS::EC2::EIP\n\t\treturn err\n\t}\n\tif err := ts.createPublicNATGateways(); err != nil { // AWS::EC2::NatGateway\n\t\treturn err\n\t}\n\n\tif err := ts.createPrivateSubnets(); err != nil { // AWS::EC2::Subnet\n\t\treturn err\n\t}\n\tif err := ts.createPrivateRouteTables(); err != nil { // AWS::EC2::RouteTable\n\t\treturn err\n\t}\n\tif err := ts.createPrivateRoutes(); err != nil { // AWS::EC2::Route\n\t\treturn err\n\t}\n\tif err := ts.createPrivateSubnetRouteTableAssociation(); err != nil { // AWS::EC2::SubnetRouteTableAssociation\n\t\treturn err\n\t}\n\n\tif err := ts.createDHCPOptions(); err != nil { // AWS::EC2::DHCPOptions, AWS::EC2::VPCDHCPOptionsAssociation\n\t\treturn err\n\t}\n\n\tif err := ts.authorizeSecurityGroup(); err != nil {\n\t\treturn err\n\t}\n\n\tts.lg.Info(\"created a VPC\",\n\t\tzap.String(\"vpc-id\", ts.cfg.VPC.ID),\n\t\tzap.Strings(\"vpc-cidr-blocks\", ts.cfg.VPC.CIDRs),\n\t\tzap.Strings(\"public-subnet-ids\", ts.cfg.VPC.PublicSubnetIDs),\n\t\tzap.Strings(\"private-subnet-ids\", ts.cfg.VPC.PrivateSubnetIDs),\n\t\tzap.String(\"control-plane-security-group-id\", ts.cfg.VPC.SecurityGroupID),\n\t)\n\n\tts.cfg.Sync()\n\treturn nil\n}", "func (m *MockLoadBalancerServiceIface) NewListLoadBalancersParams() *ListLoadBalancersParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListLoadBalancersParams\")\n\tret0, _ := ret[0].(*ListLoadBalancersParams)\n\treturn ret0\n}", "func NewParams(\n\tSpotMarketInstantListingFee sdk.Coin,\n\tderivativeMarketInstantListingFee sdk.Coin,\n\tdefaultSpotMakerFee sdk.Dec,\n\tdefaultSpotTakerFee sdk.Dec,\n\tdefaultDerivativeMakerFee sdk.Dec,\n\tdefaultDerivativeTakerFee sdk.Dec,\n\tdefaultInitialMarginRatio sdk.Dec,\n\tdefaultMaintenanceMarginRatio sdk.Dec,\n\tdefaultFundingInterval int64,\n\tfundingMultiple int64,\n\trelayerFeeShare sdk.Dec,\n\tdefaultHourlyFundingRateCap sdk.Dec,\n\tdefaultHourlyInterestRate sdk.Dec,\n\tmaxDerivativeSideOrderCount uint32,\n) Params {\n\treturn Params{\n\t\tSpotMarketInstantListingFee: SpotMarketInstantListingFee,\n\t\tDerivativeMarketInstantListingFee: derivativeMarketInstantListingFee,\n\t\tDefaultSpotMakerFeeRate: defaultSpotMakerFee,\n\t\tDefaultSpotTakerFeeRate: defaultSpotTakerFee,\n\t\tDefaultDerivativeMakerFeeRate: defaultDerivativeMakerFee,\n\t\tDefaultDerivativeTakerFeeRate: defaultDerivativeTakerFee,\n\t\tDefaultInitialMarginRatio: defaultInitialMarginRatio,\n\t\tDefaultMaintenanceMarginRatio: defaultMaintenanceMarginRatio,\n\t\tDefaultFundingInterval: defaultFundingInterval,\n\t\tFundingMultiple: fundingMultiple,\n\t\tRelayerFeeShareRate: relayerFeeShare,\n\t\tDefaultHourlyFundingRateCap: defaultHourlyFundingRateCap,\n\t\tDefaultHourlyInterestRate: defaultHourlyInterestRate,\n\t\tMaxDerivativeOrderSideCount: maxDerivativeSideOrderCount,\n\t}\n}", "func NewParams() *Params {\n\treturn new(Params)\n}", "func NewListScansParams() *ListScansParams {\n\tvar (\n\t\tmaxItemsDefault = int64(100)\n\t\toffsetDefault = int64(0)\n\t\torderByDefault = string(\"created_at\")\n\t\torderDirectionDefault = string(\"desc\")\n\t)\n\treturn &ListScansParams{\n\t\tMaxItems: &maxItemsDefault,\n\t\tOffset: &offsetDefault,\n\t\tOrderBy: &orderByDefault,\n\t\tOrderDirection: &orderDirectionDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (m *MockResourcetagsServiceIface) NewListTagsParams() *ListTagsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListTagsParams\")\n\tret0, _ := ret[0].(*ListTagsParams)\n\treturn ret0\n}", "func NewParams(opts []copts.Opt) *Params {\r\n\tparams := &Params{}\r\n\tcopts.Apply(params, opts)\r\n\treturn params\r\n}", "func NewConfigListParams() *ConfigListParams {\n\tvar ()\n\treturn &ConfigListParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewParams(opts []copts.Opt) *Params {\n\tparams := &Params{}\n\tcopts.Apply(params, opts)\n\treturn params\n}", "func (client *PublicIPAddressesClient) listCloudServiceRoleInstancePublicIPAddressesCreateRequest(ctx context.Context, resourceGroupName string, cloudServiceName string, roleInstanceName string, networkInterfaceName string, ipConfigurationName string, options *PublicIPAddressesClientListCloudServiceRoleInstancePublicIPAddressesOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/roleInstances/{roleInstanceName}/networkInterfaces/{networkInterfaceName}/ipconfigurations/{ipConfigurationName}/publicipaddresses\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif roleInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter roleInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{roleInstanceName}\", url.PathEscape(roleInstanceName))\n\tif networkInterfaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkInterfaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkInterfaceName}\", url.PathEscape(networkInterfaceName))\n\tif ipConfigurationName == \"\" {\n\t\treturn nil, errors.New(\"parameter ipConfigurationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{ipConfigurationName}\", url.PathEscape(ipConfigurationName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (m *MockRouterServiceIface) NewListVirtualRouterElementsParams() *ListVirtualRouterElementsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListVirtualRouterElementsParams\")\n\tret0, _ := ret[0].(*ListVirtualRouterElementsParams)\n\treturn ret0\n}", "func NewBenchmark_send_Params_List(s *capnp.Segment, sz int32) (Benchmark_send_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn Benchmark_send_Params_List{l}, err\n}", "func (c *providerConstructor) ParameterList() parameterList {\n\treturn c.params\n}", "func CreateListPublicIpAddressPoolCidrBlocksRequest() (request *ListPublicIpAddressPoolCidrBlocksRequest) {\n\trequest = &ListPublicIpAddressPoolCidrBlocksRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Vpc\", \"2016-04-28\", \"ListPublicIpAddressPoolCidrBlocks\", \"vpc\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func (s *VPCService) NewUpdateVPCParams(id string) *UpdateVPCParams {\n\tp := &UpdateVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (s *VPCService) NewListStaticRoutesParams() *ListStaticRoutesParams {\n\tp := &ListStaticRoutesParams{}\n\tp.p = make(map[string]interface{})\n\treturn p\n}", "func NewParams(acl ACL, daoOwner sdk.Address) Params {\n\treturn Params{\n\t\tACL: acl,\n\t\tDAOOwner: daoOwner,\n\t}\n}", "func NewParams(createWhoisPrice string, updateWhoisPrice string, deleteWhoisPrice string) Params {\n\treturn Params{\n\t\tCreateWhoisPrice: createWhoisPrice,\n\t\tUpdateWhoisPrice: updateWhoisPrice,\n\t\tDeleteWhoisPrice: deleteWhoisPrice,\n\t}\n}", "func NewParams(tokenCourse, subscriptionPrice, VPNGBPrice,\n\tstorageGBPrice, baseVPNGb, baseStorageGb uint32, courseSigners []sdk.AccAddress) Params {\n\treturn Params{\n\t\tTokenCourse: tokenCourse,\n\t\tSubscriptionPrice: subscriptionPrice,\n\t\tVPNGBPrice: VPNGBPrice,\n\t\tStorageGBPrice: storageGBPrice,\n\t\tBaseVPNGb: baseVPNGb,\n\t\tBaseStorageGb: baseStorageGb,\n\t\tCourseChangeSigners: courseSigners[:],\n\t}\n}", "func NewParams() *Params {\n\tp := Params{}\n\tp.names = []string{}\n\tp.values = map[string]interface{}{}\n\n\treturn &p\n}", "func (k *ksonnetApp) ListParams(environment string) ([]*v1alpha1.KsonnetParameter, error) {\n\targs := []string{\"param\", \"list\", \"--output\", \"json\"}\n\tif environment != \"\" {\n\t\targs = append(args, \"--env\", environment)\n\t}\n\tout, err := k.ksCmd(args...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// Auxiliary data to hold unmarshaled JSON output, which may use different field names\n\tvar ksParams struct {\n\t\tData []struct {\n\t\t\tComponent string `json:\"component\"`\n\t\t\tKey string `json:\"param\"`\n\t\t\tValue string `json:\"value\"`\n\t\t} `json:\"data\"`\n\t}\n\tif err := json.Unmarshal([]byte(out), &ksParams); err != nil {\n\t\treturn nil, err\n\t}\n\tvar params []*v1alpha1.KsonnetParameter\n\tfor _, ksParam := range ksParams.Data {\n\t\tvalue := strings.Trim(ksParam.Value, `'\"`)\n\t\tparams = append(params, &v1alpha1.KsonnetParameter{\n\t\t\tComponent: ksParam.Component,\n\t\t\tName: ksParam.Key,\n\t\t\tValue: value,\n\t\t})\n\t}\n\treturn params, nil\n}", "func (client *PublicIPAddressesClient) listCloudServicePublicIPAddressesCreateRequest(ctx context.Context, resourceGroupName string, cloudServiceName string, options *PublicIPAddressesClientListCloudServicePublicIPAddressesOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/publicipaddresses\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewTemplateListParams() *TemplateListParams {\n\n\treturn &TemplateListParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewListEventsParams() *ListEventsParams {\n\tvar ()\n\treturn &ListEventsParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (h *VPCPeeringConnectionsHandler) List(project, vpcID string) ([]*VPCPeeringConnection, error) {\n\tvpc, err := h.client.VPCs.Get(project, vpcID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn vpc.PeeringConnections, nil\n}", "func NewController_dev_Params_List(s *capnp.Segment, sz int32) (Controller_dev_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn capnp.StructList[Controller_dev_Params](l), err\n}", "func NewListNodesParams() *ListNodesParams {\n\tvar (\n\t\tpageSizeDefault = int64(1000)\n\t)\n\treturn &ListNodesParams{\n\t\tPageSize: &pageSizeDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *PublicIPAddressesClient) listCreateRequest(ctx context.Context, resourceGroupName string, options *PublicIPAddressesClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/publicIPAddresses\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (rm *resourceManager) newListRequestPayload(\n\tr *resource,\n) (*svcsdk.DescribeVpcPeeringConnectionsInput, error) {\n\tres := &svcsdk.DescribeVpcPeeringConnectionsInput{}\n\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\n\treturn res, nil\n}", "func NewPcloudCloudinstancesVolumesGetallParams() *PcloudCloudinstancesVolumesGetallParams {\n\treturn &PcloudCloudinstancesVolumesGetallParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewGetListParams() *GetListParams {\n\tvar ()\n\treturn &GetListParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *PublicIPAddressesClient) listAllCreateRequest(ctx context.Context, options *PublicIPAddressesClientListAllOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/providers/Microsoft.Network/publicIPAddresses\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (m *MockRouterServiceIface) NewListRoutersParams() *ListRoutersParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListRoutersParams\")\n\tret0, _ := ret[0].(*ListRoutersParams)\n\treturn ret0\n}", "func (p *ListParams) ToParams() *Params {\n\treturn &Params{\n\t\tContext: p.Context,\n\t}\n}", "func CreateListBucketsRequest() (request *ListBucketsRequest) {\n\trequest = &ListBucketsRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"vs\", \"2018-12-12\", \"ListBuckets\", \"\", \"\")\n\trequest.Method = requests.POST\n\treturn\n}", "func (o *PcloudCloudinstancesVolumesGetallParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Affinity != nil {\n\n\t\t// query param affinity\n\t\tvar qrAffinity string\n\n\t\tif o.Affinity != nil {\n\t\t\tqrAffinity = *o.Affinity\n\t\t}\n\t\tqAffinity := qrAffinity\n\t\tif qAffinity != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"affinity\", qAffinity); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.Auxiliary != nil {\n\n\t\t// query param auxiliary\n\t\tvar qrAuxiliary bool\n\n\t\tif o.Auxiliary != nil {\n\t\t\tqrAuxiliary = *o.Auxiliary\n\t\t}\n\t\tqAuxiliary := swag.FormatBool(qrAuxiliary)\n\t\tif qAuxiliary != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"auxiliary\", qAuxiliary); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\t// path param cloud_instance_id\n\tif err := r.SetPathParam(\"cloud_instance_id\", o.CloudInstanceID); err != nil {\n\t\treturn err\n\t}\n\n\tif o.ReplicationEnabled != nil {\n\n\t\t// query param replicationEnabled\n\t\tvar qrReplicationEnabled bool\n\n\t\tif o.ReplicationEnabled != nil {\n\t\t\tqrReplicationEnabled = *o.ReplicationEnabled\n\t\t}\n\t\tqReplicationEnabled := swag.FormatBool(qrReplicationEnabled)\n\t\tif qReplicationEnabled != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"replicationEnabled\", qReplicationEnabled); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (m *MockProjectServiceIface) NewListProjectInvitationsParams() *ListProjectInvitationsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListProjectInvitationsParams\")\n\tret0, _ := ret[0].(*ListProjectInvitationsParams)\n\treturn ret0\n}", "func (s *VPCService) NewDeleteVPCParams(id string) *DeleteVPCParams {\n\tp := &DeleteVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewIpNetwork_getRemoteHostByName_Params_List(s *capnp.Segment, sz int32) (IpNetwork_getRemoteHostByName_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn IpNetwork_getRemoteHostByName_Params_List{l}, err\n}", "func NewWaitListParams() *WaitListParams {\n\treturn &WaitListParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *Service) ListVpcs() ([]string, error) {\n\tclusterIDs := []string{}\n\n\tvpc := &awsresources.VPC{\n\t\tInstallationName: s.installationName,\n\t\tAWSEntity: awsresources.AWSEntity{Clients: s.awsClients},\n\t}\n\n\tvpcs, err := vpc.List()\n\tif err != nil {\n\t\treturn []string{}, microerror.Mask(err)\n\t}\n\n\tfor _, vpc := range vpcs {\n\t\tclusterIDs = append(clusterIDs, vpc.Name)\n\t}\n\n\treturn clusterIDs, nil\n}", "func GetVPC(connectionName string, rsType string, nameID string) (*cres.VPCInfo, error) {\n\tcblog.Info(\"call GetVPC()\")\n\n\t// check empty and trim user inputs\n connectionName, err := EmptyCheckAndTrim(\"connectionName\", connectionName)\n if err != nil {\n\t\tcblog.Error(err)\n return nil, err\n }\n\n nameID, err = EmptyCheckAndTrim(\"nameID\", nameID)\n if err != nil {\n\t\tcblog.Error(err)\n return nil, err\n }\n\n\tcldConn, err := ccm.GetCloudConnection(connectionName)\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\n\thandler, err := cldConn.CreateVPCHandler()\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\n\tvpcSPLock.RLock(connectionName, nameID)\n\tdefer vpcSPLock.RUnlock(connectionName, nameID)\n\t// (1) get spiderIID(NameId)\n\tiidInfo, err := iidRWLock.GetIID(iidm.IIDSGROUP, connectionName, rsType, cres.IID{nameID, \"\"})\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\n\t// (2) get resource(driverIID)\n\tinfo, err := handler.GetVPC(getDriverIID(iidInfo.IId))\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\t// (3) set ResourceInfo(userIID)\n\tinfo.IId = getUserIID(iidInfo.IId)\n\n\t// set NameId for SubnetInfo List\n\t// create new SubnetInfo List\n\tsubnetInfoList := []cres.SubnetInfo{}\n\tfor _, subnetInfo := range info.SubnetInfoList {\t\t\n\t\tsubnetIIDInfo, err := iidRWLock.GetIIDbySystemID(iidm.SUBNETGROUP, connectionName, info.IId.NameId, subnetInfo.IId) // VPC info.IId.NameId => rsType\n\t\tif err != nil {\n\t\t\tcblog.Error(err)\n\t\t\treturn nil, err\n\t\t}\n\t\tif subnetIIDInfo.IId.NameId != \"\" { // insert only this user created.\n\t\t\tsubnetInfo.IId = getUserIID(subnetIIDInfo.IId)\n\t\t\tsubnetInfoList = append(subnetInfoList, subnetInfo)\n\t\t}\n\t}\n\tinfo.SubnetInfoList = subnetInfoList\n\n\treturn &info, nil\n}", "func NewParams(pricePerByte abi.TokenAmount, paymentInterval uint64, paymentIntervalIncrease uint64) (Params, error) {\n\treturn Params{\n\t\tPricePerByte: pricePerByte,\n\t\tPaymentInterval: paymentInterval,\n\t\tPaymentIntervalIncrease: paymentIntervalIncrease,\n\t}, nil\n}", "func (params *QueueParams) CreateParams() []*cloudformation.Parameter {\n\tstackParams := []*cloudformation.Parameter{}\n\tif params.DelaySeconds != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamDelaySeconds, *params.DelaySeconds))\n\t}\n\tif params.MaximumMessageSize != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamMaximumMessageSize, *params.MaximumMessageSize))\n\t}\n\tif params.MessageRetentionPeriod != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamMessageRetentionPeriod, *params.MessageRetentionPeriod))\n\t}\n\tif params.ReceiveMessageWaitTimeSeconds != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamReceiveMessageWaitTimeSeconds, *params.ReceiveMessageWaitTimeSeconds))\n\t}\n\tif params.RedriveMaxReceiveCount != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamRedriveMaxReceiveCount, *params.RedriveMaxReceiveCount))\n\t}\n\tif params.VisibilityTimeout != nil {\n\t\tstackParams = append(stackParams, mkParameter(ParamVisibilityTimeout, *params.VisibilityTimeout))\n\t}\n\treturn stackParams\n}", "func NewGetOutagesParams() *GetOutagesParams {\n\treturn &GetOutagesParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *VPCService) NewRestartVPCParams(id string) *RestartVPCParams {\n\tp := &RestartVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (o *PcloudCloudinstancesVolumesGetallParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func NewListSSHKeysParams() *ListSSHKeysParams {\n\treturn &ListSSHKeysParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewAi_takeTurn_Params_List(s *capnp.Segment, sz int32) (Ai_takeTurn_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\tif err != nil {\n\t\treturn Ai_takeTurn_Params_List{}, err\n\t}\n\treturn Ai_takeTurn_Params_List{l}, nil\n}", "func (m *MockProjectServiceIface) NewListProjectsParams() *ListProjectsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListProjectsParams\")\n\tret0, _ := ret[0].(*ListProjectsParams)\n\treturn ret0\n}", "func NewEchoer_echo_Params_List(s *capnp.Segment, sz int32) (Echoer_echo_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\tif err != nil {\n\t\treturn Echoer_echo_Params_List{}, err\n\t}\n\treturn Echoer_echo_Params_List{l}, nil\n}", "func NewParams(\n\ttaxPolicy, rewardPolicy PolicyConstraints,\n\tseigniorageBurden sdk.Dec,\n\tminingIncrement sdk.Dec,\n\twindowShort, windowLong, windowProbation sdk.Int,\n) Params {\n\treturn Params{\n\t\tTaxPolicy: taxPolicy,\n\t\tRewardPolicy: rewardPolicy,\n\t\tSeigniorageBurdenTarget: seigniorageBurden,\n\t\tMiningIncrement: miningIncrement,\n\t\tWindowShort: windowShort,\n\t\tWindowLong: windowLong,\n\t\tWindowProbation: windowProbation,\n\t}\n}", "func NewParamList(m map[string]interface{}) (*ParamList, error) {\n\tol := newOptionLoader(m)\n\n\tpl := &ParamList{\n\t\tapp: ol.LoadApp(),\n\t\tmoduleName: ol.LoadOptionalString(OptionModule),\n\t\tcomponentName: ol.LoadOptionalString(OptionComponentName),\n\t\tenvName: ol.LoadOptionalString(OptionEnvName),\n\n\t\tout: os.Stdout,\n\t\tfindModulesFn: component.ModulesFromEnv,\n\t\tfindModuleFn: component.GetModule,\n\t\tfindComponentFn: component.LocateComponent,\n\t}\n\n\tif ol.err != nil {\n\t\treturn nil, ol.err\n\t}\n\n\treturn pl, nil\n}", "func (client *CloudServicesClient) listAllCreateRequest(ctx context.Context, options *CloudServicesClientListAllOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/providers/Microsoft.Compute/cloudServices\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-09-04\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func CreateVPCMocked(t *testing.T, vpcIn *types.Vpc) *types.Vpc {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewVPCService(cs)\n\tassert.Nil(err, \"Couldn't load VPC service\")\n\tassert.NotNil(ds, \"VPC service not instanced\")\n\n\t// convertMap\n\tmapIn, err := utils.ItemConvertParams(*vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// to json\n\tdOut, err := json.Marshal(vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// call service\n\tcs.On(\"Post\", \"/network/vpcs/\", mapIn).Return(dOut, 200, nil)\n\tvpcOut, err := ds.CreateVPC(mapIn)\n\tassert.Nil(err, \"Error creating VPC list\")\n\tassert.Equal(vpcIn, vpcOut, \"CreateVPC returned different VPCs\")\n\n\treturn vpcOut\n}", "func (m *MockFirewallServiceIface) NewListPaloAltoFirewallsParams() *ListPaloAltoFirewallsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListPaloAltoFirewallsParams\")\n\tret0, _ := ret[0].(*ListPaloAltoFirewallsParams)\n\treturn ret0\n}", "func NewParams() *Parameters {\n\treturn &Parameters{\n\t\tTokenType: \"transit\",\n\t\tTLSMode: 1,\n\t\tLeaderOnly: true,\n\t\tConnectTimeout: defaultConnectTimeout,\n\t\tReadTimeout: defaultReadTimeout,\n\t\tRetryCount: defaultRetries,\n\t\tRequireType: \"master\",\n\t}\n}", "func (client *SourceControlConfigurationsClient) listCreateRequest(ctx context.Context, resourceGroupName string, clusterRp string, clusterResourceName string, clusterName string, options *SourceControlConfigurationsClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{clusterRp}/{clusterResourceName}/{clusterName}/providers/Microsoft.KubernetesConfiguration/sourceControlConfigurations\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif clusterRp == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterRp cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterRp}\", url.PathEscape(clusterRp))\n\tif clusterResourceName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterResourceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterResourceName}\", url.PathEscape(clusterResourceName))\n\tif clusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterName}\", url.PathEscape(clusterName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-11-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *PublicIPAddressesClient) listVirtualMachineScaleSetPublicIPAddressesCreateRequest(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string, options *PublicIPAddressesClientListVirtualMachineScaleSetPublicIPAddressesOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/virtualMachineScaleSets/{virtualMachineScaleSetName}/publicipaddresses\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif virtualMachineScaleSetName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualMachineScaleSetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualMachineScaleSetName}\", url.PathEscape(virtualMachineScaleSetName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2018-10-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewClient(config *ucloud.Config, credential *auth.Credential) *VPCClient {\n\tmeta := ucloud.ClientMeta{Product: \"VPC\"}\n\tclient := ucloud.NewClientWithMeta(config, credential, meta)\n\treturn &VPCClient{\n\t\tclient,\n\t}\n}", "func NewPcloudCloudinstancesVolumesGetallParamsWithHTTPClient(client *http.Client) *PcloudCloudinstancesVolumesGetallParams {\n\treturn &PcloudCloudinstancesVolumesGetallParams{\n\t\tHTTPClient: client,\n\t}\n}", "func (client *CloudServicesClient) listCreateRequest(ctx context.Context, resourceGroupName string, options *CloudServicesClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-09-04\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewGetPublicsRecipeParams() *GetPublicsRecipeParams {\n\n\treturn &GetPublicsRecipeParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (o *PcloudCloudinstancesVolumesGetallParams) WithContext(ctx context.Context) *PcloudCloudinstancesVolumesGetallParams {\n\to.SetContext(ctx)\n\treturn o\n}", "func (client *VirtualNetworkLinksClient) listCreateRequest(ctx context.Context, resourceGroupName string, privateZoneName string, options *VirtualNetworkLinksListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/privateDnsZones/{privateZoneName}/virtualNetworkLinks\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif privateZoneName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateZoneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateZoneName}\", url.PathEscape(privateZoneName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.Top != nil {\n\t\treqQP.Set(\"$top\", strconv.FormatInt(int64(*options.Top), 10))\n\t}\n\treqQP.Set(\"api-version\", \"2020-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (s *Stack) initVPC() error {\n\t// Tries to get VPC information\n\tvpcID, err := s.findVPCID()\n\tif err != nil {\n\t\treturn err\n\t}\n\tif vpcID != nil {\n\t\ts.vpc, err = s.GetVPC(*vpcID)\n\t\treturn err\n\t}\n\n\tvpc, err := s.CreateVPC(\n\t\tVPCRequest{\n\t\t\tName: s.authOpts.VPCName,\n\t\t\tCIDR: s.authOpts.VPCCIDR,\n\t\t},\n\t)\n\tif err != nil {\n\t\treturn fail.Errorf(\n\t\t\tfmt.Sprintf(\n\t\t\t\t\"failed to initialize VPC '%s': %s\", s.authOpts.VPCName, openstack.ProviderErrorToString(err),\n\t\t\t), err,\n\t\t)\n\t}\n\ts.vpc = vpc\n\treturn nil\n}", "func (g *VpcGenerator) InitResources() error {\n\tclient, err := g.LoadClientFromProfile()\n\tif err != nil {\n\t\treturn err\n\t}\n\tremaining := 1\n\tpageNumber := 1\n\tpageSize := 10\n\n\tallVpcs := make([]vpc.Vpc, 0)\n\n\tfor remaining > 0 {\n\t\traw, err := client.WithVpcClient(func(vpcClient *vpc.Client) (interface{}, error) {\n\t\t\trequest := vpc.CreateDescribeVpcsRequest()\n\t\t\trequest.RegionId = client.RegionID\n\t\t\trequest.PageSize = requests.NewInteger(pageSize)\n\t\t\trequest.PageNumber = requests.NewInteger(pageNumber)\n\t\t\treturn vpcClient.DescribeVpcs(request)\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tresponse := raw.(*vpc.DescribeVpcsResponse)\n\t\tallVpcs = append(allVpcs, response.Vpcs.Vpc...)\n\t\tremaining = response.TotalCount - pageNumber*pageSize\n\t\tpageNumber++\n\t}\n\n\tfor _, Vpc := range allVpcs {\n\t\tresource := resourceFromVpcResponse(Vpc)\n\t\tg.Resources = append(g.Resources, resource)\n\t}\n\n\treturn nil\n}", "func SetupVPC(mgr ctrl.Manager, l logging.Logger) error {\n\tname := managed.ControllerName(v1alpha3.VPCGroupKind)\n\treturn ctrl.NewControllerManagedBy(mgr).\n\t\tNamed(name).\n\t\tFor(&v1alpha3.VPC{}).\n\t\tComplete(managed.NewReconciler(mgr,\n\t\t\tresource.ManagedKind(v1alpha3.VPCGroupVersionKind),\n\t\t\tmanaged.WithExternalConnecter(&connector{client: mgr.GetClient(), newClientFn: ec2.NewVPCClient, awsConfigFn: utils.RetrieveAwsConfigFromProvider}),\n\t\t\tmanaged.WithReferenceResolver(managed.NewAPISimpleReferenceResolver(mgr.GetClient())),\n\t\t\tmanaged.WithConnectionPublishers(),\n\t\t\tmanaged.WithInitializers(&tagger{kube: mgr.GetClient()}),\n\t\t\tmanaged.WithLogger(l.WithValues(\"controller\", name)),\n\t\t\tmanaged.WithRecorder(event.NewAPIRecorder(mgr.GetEventRecorderFor(name)))))\n}", "func (m *MockAnnotationServiceIface) NewListAnnotationsParams() *ListAnnotationsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListAnnotationsParams\")\n\tret0, _ := ret[0].(*ListAnnotationsParams)\n\treturn ret0\n}", "func LoadVpcs(loader iface.EC2IF, tracer trace.Tracer) ([]*Vpc, error) {\n\tinDesc := &ec2.DescribeVpcsInput{DryRun: helper.NewFalse()}\n\toutDesc, err := loader.DescribeVpcs(inDesc)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar vpcs []*Vpc\n\n\tfor _, vpc := range outDesc.Vpcs {\n\n\t\tif vpc == nil {\n\t\t\ttracer.Warn(\"Got nil vpc, ignore it.\")\n\t\t\tcontinue\n\t\t}\n\n\t\tnameTag := FindNameTag(vpc.Tags, \"\")\n\n\t\tvpc := &Vpc{\n\t\t\tVpcID: *vpc.VpcId,\n\t\t\tIsDefaultVPC: *vpc.IsDefault,\n\t\t\tCIDR: *vpc.CidrBlock,\n\t\t\tNameTag: nameTag,\n\t\t}\n\n\t\tvpcs = append(vpcs, vpc)\n\t}\n\n\treturn vpcs, nil\n}", "func (client *PublicIPAddressesClient) listVirtualMachineScaleSetVMPublicIPAddressesCreateRequest(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string, virtualmachineIndex string, networkInterfaceName string, ipConfigurationName string, options *PublicIPAddressesClientListVirtualMachineScaleSetVMPublicIPAddressesOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/virtualMachineScaleSets/{virtualMachineScaleSetName}/virtualMachines/{virtualmachineIndex}/networkInterfaces/{networkInterfaceName}/ipconfigurations/{ipConfigurationName}/publicipaddresses\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif virtualMachineScaleSetName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualMachineScaleSetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualMachineScaleSetName}\", url.PathEscape(virtualMachineScaleSetName))\n\tif virtualmachineIndex == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualmachineIndex cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualmachineIndex}\", url.PathEscape(virtualmachineIndex))\n\tif networkInterfaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkInterfaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkInterfaceName}\", url.PathEscape(networkInterfaceName))\n\tif ipConfigurationName == \"\" {\n\t\treturn nil, errors.New(\"parameter ipConfigurationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{ipConfigurationName}\", url.PathEscape(ipConfigurationName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2018-10-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (m *MockLoadBalancerServiceIface) NewListSslCertsParams() *ListSslCertsParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListSslCertsParams\")\n\tret0, _ := ret[0].(*ListSslCertsParams)\n\treturn ret0\n}", "func NewListSourceFileOfProjectVersionParams() *ListSourceFileOfProjectVersionParams {\n\tvar ()\n\treturn &ListSourceFileOfProjectVersionParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewPcloudCloudinstancesVolumesGetallParamsWithTimeout(timeout time.Duration) *PcloudCloudinstancesVolumesGetallParams {\n\treturn &PcloudCloudinstancesVolumesGetallParams{\n\t\ttimeout: timeout,\n\t}\n}", "func (client *CloudServiceRoleInstancesClient) listCreateRequest(ctx context.Context, resourceGroupName string, cloudServiceName string, options *CloudServiceRoleInstancesListOptions) (*azcore.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/roleInstances\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := azcore.NewRequest(ctx, http.MethodGet, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\treqQP := req.URL.Query()\n\treqQP.Set(\"api-version\", \"2021-03-01\")\n\tif options != nil && options.Expand != nil {\n\t\treqQP.Set(\"$expand\", string(*options.Expand))\n\t}\n\treq.URL.RawQuery = reqQP.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (x *fastReflection_Params) New() protoreflect.Message {\n\treturn new(fastReflection_Params)\n}", "func CreateListEndpointsRequest() (request *ListEndpointsRequest) {\n\trequest = &ListEndpointsRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Location\", \"2015-06-12\", \"ListEndpoints\", \"location\", \"openAPI\")\n\treturn\n}", "func NewParams() Params {\n\treturn &headerParams{\n\t\tparams: make(map[string]MaybeString),\n\t\tparamOrder: []string{},\n\t}\n}", "func (m *MockLoadBalancerServiceIface) NewListLoadBalancerRuleInstancesParams(id string) *ListLoadBalancerRuleInstancesParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewListLoadBalancerRuleInstancesParams\", id)\n\tret0, _ := ret[0].(*ListLoadBalancerRuleInstancesParams)\n\treturn ret0\n}" ]
[ "0.63476235", "0.6014252", "0.60053194", "0.58696043", "0.5863686", "0.5848631", "0.56618655", "0.56585634", "0.56528836", "0.5642297", "0.559148", "0.55652446", "0.55578536", "0.5548695", "0.55245095", "0.5498253", "0.54819304", "0.5480253", "0.5473892", "0.54513234", "0.54383427", "0.5435896", "0.5428364", "0.5399777", "0.53940225", "0.537954", "0.53717077", "0.5336745", "0.5307681", "0.5307257", "0.5290265", "0.52819455", "0.5275394", "0.5253543", "0.5243514", "0.5236434", "0.52345055", "0.5226393", "0.52148527", "0.5203001", "0.51639706", "0.5162348", "0.5142271", "0.5139144", "0.5136171", "0.5135883", "0.5126644", "0.51163214", "0.5114945", "0.5109628", "0.5100212", "0.5088645", "0.5075013", "0.50724155", "0.505404", "0.50454515", "0.5038342", "0.5016968", "0.50076216", "0.4996658", "0.49942032", "0.4975573", "0.49690178", "0.49514127", "0.4949671", "0.49465582", "0.49398583", "0.49358904", "0.49026772", "0.48884457", "0.48849982", "0.4879477", "0.48706454", "0.48489672", "0.4844166", "0.4840147", "0.48368728", "0.48268917", "0.48224518", "0.4821095", "0.4820803", "0.48074788", "0.48030704", "0.48022953", "0.4789392", "0.47822952", "0.47775194", "0.4775541", "0.47722876", "0.47684312", "0.47649214", "0.47606492", "0.4757416", "0.47515306", "0.47368166", "0.47196338", "0.47115088", "0.47020635", "0.46984094", "0.46954495" ]
0.7435512
0
This is a courtesy helper function, which in some cases may not work as expected!
func (s *VPCService) GetVPCID(name string, opts ...OptionFunc) (string, int, error) { p := &ListVPCsParams{} p.p = make(map[string]interface{}) p.p["name"] = name for _, fn := range append(s.cs.options, opts...) { if err := fn(s.cs, p); err != nil { return "", -1, err } } l, err := s.ListVPCs(p) if err != nil { return "", -1, err } if l.Count == 0 { return "", l.Count, fmt.Errorf("No match found for %s: %+v", name, l) } if l.Count == 1 { return l.VPCs[0].Id, l.Count, nil } if l.Count > 1 { for _, v := range l.VPCs { if v.Name == name { return v.Id, l.Count, nil } } } return "", l.Count, fmt.Errorf("Could not find an exact match for %s: %+v", name, l) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func getHelperMethodIfNeeded(functionName string, indent string) (string, bool) {\n\tswitch functionName {\n\tcase \"filebase64sha256\":\n\t\treturn `function computeFilebase64sha256(path string) string {\n\tconst fileData = Buffer.from(fs.readFileSync(path), 'binary')\n\treturn crypto.createHash('sha256').update(fileData).digest('hex')\n}`, true\n\tcase \"notImplemented\":\n\t\treturn fmt.Sprintf(\n\t\t\t`%sfunction notImplemented(message: string) {\n%s throw new Error(message);\n%s}`, indent, indent, indent), true\n\tcase \"singleOrNone\":\n\t\treturn fmt.Sprintf(\n\t\t\t`%sfunction singleOrNone<T>(elements: pulumi.Input<T>[]): pulumi.Input<T> {\n%s if (elements.length != 1) {\n%s throw new Error(\"singleOrNone expected input list to have a single element\");\n%s }\n%s return elements[0];\n%s}`, indent, indent, indent, indent, indent, indent), true\n\tdefault:\n\t\treturn \"\", false\n\t}\n}", "func getHelperMethodIfNeeded(functionName string, indent string) (string, bool) {\n\tswitch functionName {\n\tcase \"filebase64\":\n\t\treturn `private static string ReadFileBase64(string path) {\n\t\treturn Convert.ToBase64String(System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path)));\n\t}`, true\n\tcase \"filebase64sha256\":\n\t\treturn `private static string ComputeFileBase64Sha256(string path) {\n\t\tvar fileData = System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path));\n\t\tvar hashData = SHA256.Create().ComputeHash(fileData);\n\t\treturn Convert.ToBase64String(hashData);\n\t}`, true\n\tcase \"sha1\":\n\t\treturn `private static string ComputeSHA1(string input) {\n\t\treturn BitConverter.ToString(\n\t\t\tSHA1.Create().ComputeHash(Encoding.UTF8.GetBytes(input))\n\t\t).Replace(\"-\",\"\").ToLowerInvariant());\n\t}`, true\n\tcase \"notImplemented\":\n\t\treturn fmt.Sprintf(`\n%sstatic object NotImplemented(string errorMessage) \n%s{\n%s throw new System.NotImplementedException(errorMessage);\n%s}`, indent, indent, indent, indent), true\n\tdefault:\n\t\treturn \"\", false\n\t}\n}", "func TestGetNone4A(t *testing.T) {\n}", "func (f *Ifacer) getUniqueImportName(pkgName string, level int) string {\n\tstrs := strings.Split(pkgName, string(filepath.Separator))\n\n\tlenStr := len(strs)\n\n\tif lenStr-1 < level {\n\t\tf.logger.Panicf(\"%d out of range\", level)\n\t}\n\n\tvar importName string\n\tfor _, str := range strs[lenStr-level-1:] {\n\t\tif strings.Contains(str, \".\") {\n\t\t\tstr = strings.Replace(str, \".\", \"\", -1)\n\t\t}\n\t\timportName += str\n\t}\n\n\treturn importName\n}", "func DummyStringGetterFunction(name string) string {\n\treturn name\n}", "func almostOkayFunction() {\n\treturn nil\n}", "func isBadVersion(version int) bool{\n return false\n}", "func trimCaller(funcName string) string {\n\t// ex:\n\t// funcName = \"github.com/ddo/request.(*Client).Request\"\n\t// arrDir = [github.com ddo request.(*Client).Request]\n\t// lastDir = request.(*Client).Request\n\t// arrCaller = [request. (*Client).Request]\n\n\tarrDir := strings.Split(funcName, \"/\")\n\tlastDir := arrDir[len(arrDir)-1]\n\tarrCaller := strings.Split(lastDir, \".\")\n\n\tif len(arrCaller) < 2 {\n\t\treturn \"\"\n\t}\n\n\treturn arrCaller[len(arrCaller)-1]\n}", "func getValidPrefix(s string, base int64) string {\n\ttrace_util_0.Count(_util_00000, 47)\n\tvar (\n\t\tvalidLen int\n\t\tupper rune\n\t)\n\tswitch {\n\tcase base >= 2 && base <= 9:\n\t\ttrace_util_0.Count(_util_00000, 51)\n\t\tupper = rune('0' + base)\n\tcase base <= 36:\n\t\ttrace_util_0.Count(_util_00000, 52)\n\t\tupper = rune('A' + base - 10)\n\tdefault:\n\t\ttrace_util_0.Count(_util_00000, 53)\n\t\treturn \"\"\n\t}\n\ttrace_util_0.Count(_util_00000, 48)\nLoop:\n\tfor i := 0; i < len(s); i++ {\n\t\ttrace_util_0.Count(_util_00000, 54)\n\t\tc := rune(s[i])\n\t\tswitch {\n\t\tcase unicode.IsDigit(c) || unicode.IsLower(c) || unicode.IsUpper(c):\n\t\t\ttrace_util_0.Count(_util_00000, 55)\n\t\t\tc = unicode.ToUpper(c)\n\t\t\tif c < upper {\n\t\t\t\ttrace_util_0.Count(_util_00000, 58)\n\t\t\t\tvalidLen = i + 1\n\t\t\t} else {\n\t\t\t\ttrace_util_0.Count(_util_00000, 59)\n\t\t\t\t{\n\t\t\t\t\tbreak Loop\n\t\t\t\t}\n\t\t\t}\n\t\tcase c == '+' || c == '-':\n\t\t\ttrace_util_0.Count(_util_00000, 56)\n\t\t\tif i != 0 {\n\t\t\t\ttrace_util_0.Count(_util_00000, 60)\n\t\t\t\tbreak Loop\n\t\t\t}\n\t\tdefault:\n\t\t\ttrace_util_0.Count(_util_00000, 57)\n\t\t\tbreak Loop\n\t\t}\n\t}\n\ttrace_util_0.Count(_util_00000, 49)\n\tif validLen > 1 && s[0] == '+' {\n\t\ttrace_util_0.Count(_util_00000, 61)\n\t\treturn s[1:validLen]\n\t}\n\ttrace_util_0.Count(_util_00000, 50)\n\treturn s[:validLen]\n}", "func sanitizePackageName(importPath string) string {\n\talias := path.Base(importPath)\n\n\t// alias should be lower case\n\talias = strings.ToLower(alias)\n\n\t// alias should now only contain alphanumerics\n\timportsRegex := regexp.MustCompile(`[^a-z0-9]`)\n\talias = importsRegex.ReplaceAllString(alias, \"\")\n\n\t// can't have a first digit, per Go identifier rules, so just skip them\n\talias = strings.TrimLeftFunc(alias, unicode.IsDigit)\n\n\t// If path part was all digits, we may be left with an empty string. In this case use \"pkg\" as the alias.\n\tif alias == \"\" {\n\t\talias = \"pkg\"\n\t}\n\n\treturn alias\n}", "func TestPrewriteWrittenNoConflict4A(t *testing.T) {\n}", "func getOID(oid string) (string, error) {\n\tif strings.HasPrefix(oid, \".\") {\n\t\treturn oid, nil\n\t}\n\tmu.Lock()\n\tdefer mu.Unlock()\n\tfixed, ok := lookupOID[oid]\n\tif !ok {\n\t\treturn oid, errors.Errorf(\"no OID found for %s\", oid)\n\t}\n\treturn fixed, nil\n}", "func legacyFileName(prefix, instance, class, id string) string {\n\tvar fileName string\n\tinstance = strings.Replace(instance, \"\\\\\", \"__\", -1)\n\n\t// use it to build the file name\n\tif prefix == \"\" {\n\t\tfileName = fmt.Sprintf(\"%s_%s_%s.status\", instance, class, id)\n\t} else {\n\t\tfileName = fmt.Sprintf(\"%s_%s_%s_%s.status\", prefix, instance, class, id)\n\t}\n\treturn fileName\n}", "func uniquePackageOf(fd *descriptor.FileDescriptorProto) string {\n\ts, ok := uniquePackageName[fd]\n\tif !ok {\n\t\tlog.Fatal(\"internal error: no package name defined for \" + fd.GetName())\n\t}\n\treturn s\n}", "func getForcedGetter(sourceUrl string) (string, string) {\n\tif matches := forcedRegexp.FindStringSubmatch(sourceUrl); matches != nil && len(matches) > 2 {\n\t\treturn matches[1], matches[2]\n\t}\n\n\treturn \"\", sourceUrl\n}", "func getFullyQualifiedFunctionName(fn interface{}) string {\n\treturn runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()\n}", "func TestEmptyPrewrite4A(t *testing.T) {\n}", "func internalStartsWith(str string, prefix string, ignoreCase bool) bool {\n\tif str == \"\" || prefix == \"\" {\n\t\treturn (str == \"\" && prefix == \"\")\n\t}\n\tif utf8.RuneCountInString(prefix) > utf8.RuneCountInString(str) {\n\t\treturn false\n\t}\n\tif ignoreCase {\n\t\treturn strings.HasPrefix(strings.ToLower(str), strings.ToLower(prefix))\n\t}\n\treturn strings.HasPrefix(str, prefix)\n}", "func TestGetEmpty4A(t *testing.T) {\n}", "func ExampleMustSqueezeTrytes() {}", "func getAliasId(name string, mountAccessor string, entityAliasList *map[string]EntityAlias) string {\n\tfor aliasID, alias := range *entityAliasList {\n\t\tif alias.Name == name && alias.MountAccessor == mountAccessor {\n\t\t\treturn aliasID\n\t\t}\n\t}\n\treturn \"\"\n}", "func getInternalParentPrefix(pkgName string) string {\n\tcleanedPath := filepath.Clean(pkgName)\n\texplodedPath := strings.Split(cleanedPath, string(os.PathSeparator))\n\n\ti := len(explodedPath) - 1\n\tfor ; i > 0; i-- {\n\t\tif explodedPath[i] == internal {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn filepath.Join(explodedPath[0:i]...)\n}", "func smallestGoodBase(n string) string {\n \n}", "func idFromName(name string) string {\n\ts := strings.Split(strings.ToLower(strings.TrimSpace(name)), \" \")\n\tns := strings.Join(s, \"-\")\n\ts = strings.Split(ns, \".\")\n\treturn strings.Join(s, \"-\")\n}", "func packageName(skip int) (long, short string, ok bool) {\n\t// Full function name looks like path/to/pkg.Func\n\tvar f string\n\t_, _, f, ok = fullCaller(skip + 1)\n\tif !ok {\n\t\treturn\n\t}\n\n\t// Strip down to path/to/pkg\n\tdot := strings.LastIndex(f, \".\")\n\tif dot == -1 {\n\t\treturn\n\t}\n\tlong = f[:dot]\n\n\t// Strip down to pkg\n\tslash := strings.LastIndex(long, \"/\")\n\tif slash == -1 {\n\t\treturn\n\t}\n\tshort = long[slash+1:]\n\treturn\n}", "func TestSinglePrewrite4A(t *testing.T) {\n}", "func getPathConversionFunction() func(string) string {\n\tif runtime.GOOS != \"windows\" || os.Getenv(\"DOCKER_MACHINE_NAME\") == \"\" {\n\t\treturn func(path string) string { return path }\n\t}\n\n\treturn func(path string) string {\n\t\treturn fmt.Sprintf(\"/%s%s\", strings.ToUpper(path[:1]), path[2:])\n\t}\n}", "func FullNameNakedReturn(f, l string) (full string, length int) {\n full = f + \" \" + l;\n length = len(full)\n return \n}", "func resolveSourcePrefix(source string, sa Source) string {\n\tif sa.Prefix == \"false\" || sa.Prefix == \"\" {\n\t\treturn \"\"\n\t} else if sa.Prefix == \"true\" {\n\t\treturn source + \"_\"\n\t} else {\n\t\treturn sa.Prefix + \"_\"\n\t}\n}", "func TestManifestAPI_Get_UnknownSchema(t *testing.T) {}", "func checkSafeNameChars(nameFragment string) error {\n\tfor i, ch := range nameFragment {\n\t\tswitch {\n\t\tcase 'a' <= ch && ch <= 'z':\n\t\tcase '0' <= ch && ch <= '9':\n\t\tcase ch == '_':\n\t\tdefault:\n\t\t\treturn fmt.Errorf(\"Name fragment is not safe: %x at %d.\", ch, i)\n\t\t}\n\t\t// NO: case ch == '.'\n\t\t// Could also allow at most one dot but not for SQLite.\n\t\t// Maybe would make sense for other SQL DBMS which\n\t\t// use schema names / namespaces.\n\t}\n\treturn nil\n}", "func isCommonRetryableErrorCode(err error) (bool, string) {\n\tgerr, ok := err.(*googleapi.Error)\n\tif !ok {\n\t\treturn false, \"\"\n\t}\n\n\tif gerr.Code == 429 || gerr.Code == 500 || gerr.Code == 502 || gerr.Code == 503 {\n\t\tlog.Printf(\"[DEBUG] Dismissed an error as retryable based on error code: %s\", err)\n\t\treturn true, fmt.Sprintf(\"Retryable error code %d\", gerr.Code)\n\t}\n\treturn false, \"\"\n}", "func goodFunction() {\n\treturn nil\n}", "func getCallerPackage() (string, bool) {\n\tvar pkg string\n\tpc, _, _, ok := runtime.Caller(2)\n\tif !ok {\n\t\treturn pkg, false\n\t}\n\tparts := strings.Split(runtime.FuncForPC(pc).Name(), \".\")\n\tif parts[len(parts)-2][0] == '(' {\n\t\tpkg = strings.Join(parts[0:len(parts)-2], \".\")\n\t} else {\n\t\tpkg = strings.Join(parts[0:len(parts)-1], \".\")\n\t}\n\treturn pkg, true\n}", "func _getFuncName() string {\n var ptrVal = _getFuncPtrVal()\n\n // Look up the function object\n var fun = runtime.FuncForPC(ptrVal)\n\n // returns: _/home/user/src/gohavenet/src.TestProcMgr_False\n var funcNamePath = fun.Name()\n\n // Split on the slash and return just the func name\n var pathElems = strings.Split(funcNamePath, \"/\")\n var index = len(pathElems) - 1\n if index < 0 {\n index = 0\n }\n\n return pathElems[index]\n}", "func getPatchVersionTrimmed(version string) string {\n\tendIndex := strings.LastIndex(version, \".\")\n\tif endIndex != -1 {\n\t\tversion = version[:endIndex]\n\t}\n\treturn version\n}", "func fixLegacyInventoryName(obj *unstructured.Unstructured) error {\n\tif obj.GetName() == legacyInvName {\n\t\tklog.V(4).Infof(\"renaming legacy inventory name\")\n\t\trandomSuffix := common.RandomStr()\n\t\treturn addSuffixToName(obj, randomSuffix)\n\t}\n\treturn nil\n}", "func callerName(skip int) (pkgPath, funcName string, ok bool) {\n\tvar pc [1]uintptr\n\tn := runtime.Callers(skip+1, pc[:])\n\tif n != 1 {\n\t\treturn \"\", \"\", false\n\t}\n\n\tf := runtime.FuncForPC(pc[0]).Name()\n\ts := pkgPathRe.FindStringSubmatch(f)\n\tif len(s) < 3 {\n\t\tpanic(fmt.Errorf(\"failed to extract package path and function name from %q\", f))\n\t}\n\n\treturn s[1], s[2], true\n}", "func getValidContainerName(volumeName, protocol string) string {\n\tcontainerName := strings.ToLower(volumeName)\n\tif len(containerName) > containerNameMaxLength {\n\t\tcontainerName = containerName[0:containerNameMaxLength]\n\t}\n\tif !checkContainerNameBeginAndEnd(containerName) || len(containerName) < containerNameMinLength {\n\t\t// now we set as 63 for maximum container name length\n\t\t// todo: get cluster name\n\t\tcontainerName = k8sutil.GenerateVolumeName(fmt.Sprintf(\"pvc-%s\", protocol), uuid.NewUUID().String(), 63)\n\t\tklog.Warningf(\"the requested volume name (%q) is invalid, so it is regenerated as (%q)\", volumeName, containerName)\n\t}\n\tcontainerName = strings.Replace(containerName, \"--\", \"-\", -1)\n\n\treturn containerName\n}", "func funcName() string {\n\tpc, _, _, _ := runtime.Caller(1)\n\tcompleteFuncname := runtime.FuncForPC(pc).Name()\n\treturn strings.Split(completeFuncname, \".\")[len(strings.Split(completeFuncname, \".\"))-1]\n}", "func ensureValidHelper(name string, funcValue reflect.Value) {\n\tif funcValue.Kind() != reflect.Func {\n\t\tpanic(fmt.Errorf(\"Helper must be a function: %s\", name))\n\t}\n\n\tfuncType := funcValue.Type()\n\n\tif funcType.NumOut() != 1 {\n\t\tpanic(fmt.Errorf(\"Helper function must return a string or a SafeString: %s\", name))\n\t}\n\n\t// @todo Check if first returned value is a string, SafeString or interface{} ?\n}", "func exactFunction() {\n\treturn nil\n}", "func TestUidForUsername(t *testing.T) {\n\tuid, err := uidForUsername(\"root\")\n\tif err != nil {\n\t\tt.Errorf(\"uidForUsername(\\\"root\\\") returned error: %v\", err)\n\t\treturn\n\t}\n\tif uid != 0 {\n\t\tt.Errorf(\"uidForUsername(\\\"root\\\") returned %d, should be 0\", uid)\n\t}\n\n\t_, err = uidForUsername(\"asdfASDFxxx999\")\n\tif err == nil {\n\t\tt.Errorf(\"uidForUsername(\\\"asdfASDFxxx\\\") did not return error\")\n\t\treturn\n\t}\n}", "func getGroupIdString(id interface{}) (gid string, err error) {\r\n\tswitch t := id.(type) {\r\n\tcase string:\r\n\t\tif strings.Contains(id.(string), \"http\") {\r\n\t\t\treturn \"url=\" + url.QueryEscape(id.(string)), nil // group url\r\n\t\t}\r\n\t\treturn id.(string), nil // group id as a string\r\n\tcase uint64:\r\n\t\treturn strconv.FormatUint(id.(uint64), 10), nil // group id as an int\r\n\tdefault:\r\n\t\treturn gid, errors.New(fmt.Sprintf(\"Group ID type exception: Expecting string or uint64 got %T\", t))\r\n\t}\r\n}", "func GoodEnoughUUID() string {\n\tb := make([]byte, 16)\n\t_, err := rand.Read(b)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tuuid := fmt.Sprintf(\"%x-%x-%x-%x-%x\",\n\t\tb[0:4], b[4:6], b[6:8], b[8:10], b[10:])\n\treturn uuid\n}", "func mustBeUnique(label string) {\n\n\tif _, ok := functions[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as function\", label))\n\t}\n\n\tif _, ok := variables[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as variable\", label))\n\t}\n\n\tif _, ok := aliases[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as alias\", label))\n\t}\n}", "func ensureDot(extension string) string {\n\tif strings.Index(extension, \".\") == -1 {\n\t\textension = \".\" + extension\n\t}\n\treturn extension\n}", "func getSafeString(input interface{}) string {\r\n\tvar safeValue string\r\n\tvar isOk bool\r\n\r\n\tif input == nil {\r\n\t\tsafeValue = \"\"\r\n\t} else {\r\n\t\tsafeValue, isOk = input.(string)\r\n\t\tif isOk == false {\r\n\t\t\tsafeValue = \"\"\r\n\t\t}\r\n\t}\r\n\treturn safeValue\r\n}", "func mustGetUUID() string {\n\tu, err := uuid.NewRandom()\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\treturn u.String()\n}", "func fn3() { // want fn3:`Deprecated: Don't use this\\.`\n}", "func ensurePrefix(s, prefix string) string {\n\tif !strings.HasPrefix(s, prefix) {\n\t\ts = prefix + s\n\t}\n\treturn s\n}", "func prepareHashPath(path, prefix string) string {\n\t// I need to strip the prefix. But... where does the prefix come from\n\treturn \"/\" + strings.TrimPrefix(path, prefix)\n}", "func pySafeName(nm string) string {\n\tif _, bad := pyKeywords[nm]; bad {\n\t\treturn \"my\" + nm\n\t}\n\treturn nm\n}", "func fullCaller(skip int) (file string, line int, fnc string, ok bool) {\n\tvar pc uintptr\n\tpc, file, line, ok = runtime.Caller(skip + 1)\n\tif !ok {\n\t\treturn\n\t}\n\n\tf := runtime.FuncForPC(pc)\n\tfnc = f.Name()\n\treturn\n}", "func getValidVersion(version string) string {\n\tif version != \"\" {\n\t\treturn version\n\t}\n\n\treturn \"Not Installed\"\n}", "func makeSafeFileName(s string) string {\n\tconst maxLen = 200 // slightly arbitrary but must be <= 254 for most modern filesystems\n\n\t// First, tidy the file path to a clean representation\n\tresult := filepath.Clean(s)\n\n\t// Next, split the path into elements between separators and check each element.\n\telements := filepath.SplitList(result)\n\tnewElements := []string{}\n\n\tfor _, element := range elements {\n\t\tnewElements = append(newElements, makeSafeFileElement(element))\n\t}\n\n\tresult = filepath.Join(newElements...)\n\n\t// Also avoid starting a file name with a period as this has a special meaning on UNIX\n\t// and UNIX-like systems.\n\tdir := filepath.Dir(result)\n\tbase := filepath.Base(result)\n\n\tif base[0] == '.' {\n\t\tresult = filepath.Join(dir, base[1:])\n\t}\n\n\t// Ensure the resulting name isn't too long, as X.509 distinguished names can be very long.\n\tif len(result) > maxLen {\n\t\tresult = result[:maxLen]\n\t}\n\n\treturn result\n}", "func TestDiskIOStats_diskName(t *testing.T) {\n\ttests := []struct {\n\t\ttemplates []string\n\t\texpected string\n\t}{\n\t\t{[]string{\"$MY_PARAM_1\"}, \"myval1\"},\n\t\t{[]string{\"${MY_PARAM_1}\"}, \"myval1\"},\n\t\t{[]string{\"x$MY_PARAM_1\"}, \"xmyval1\"},\n\t\t{[]string{\"x${MY_PARAM_1}x\"}, \"xmyval1x\"},\n\t\t{[]string{\"$MISSING\", \"$MY_PARAM_1\"}, \"myval1\"},\n\t\t{[]string{\"$MY_PARAM_1\", \"$MY_PARAM_2\"}, \"myval1\"},\n\t\t{[]string{\"$MISSING\"}, \"null\"},\n\t\t{[]string{\"$MY_PARAM_1/$MY_PARAM_2\"}, \"myval1/myval2\"},\n\t\t{[]string{\"$MY_PARAM_2/$MISSING\"}, \"null\"},\n\t}\n\n\tfor _, tc := range tests {\n\t\tfunc() {\n\t\t\ts := DiskIO{\n\t\t\t\tNameTemplates: tc.templates,\n\t\t\t}\n\t\t\tdefer setupNullDisk(t, &s, \"null\")() //nolint:revive // done on purpose, cleaning will be executed properly\n\t\t\tname, _ := s.diskName(\"null\")\n\t\t\trequire.Equal(t, tc.expected, name, \"Templates: %#v\", tc.templates)\n\t\t}()\n\t}\n}", "func pySafeArg(anm string, idx int) string {\n\tif anm == \"\" {\n\t\tanm = fmt.Sprintf(\"arg_%d\", idx)\n\t}\n\treturn pySafeName(anm)\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func TestAliasingRecursionInvalid(t *testing.T) {\n\t_, errs := PrototypeString(`alias x = x\n\t\tx`)\n\tgoutil.AssertNow(t, errs != nil, \"errs should not be nil\")\n}", "func getPackageName(f string) string {\n\tfor {\n\t\tlastPeriod := strings.LastIndex(f, \".\")\n\t\tlastSlash := strings.LastIndex(f, \"/\")\n\t\tif lastPeriod > lastSlash {\n\t\t\tf = f[:lastPeriod]\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn f\n}", "func getFunctionName(fn interface{}) string {\n\tname := runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()\n\n\t// Method above returns functions in the form : main.foo\n\tparts := strings.Split(name, \".\")\n\treturn parts[len(parts)-1]\n}", "func cleanUserName(userName string) string {\n\tuserName = strings.Replace(userName, \"-\", \"\", -1)\n\tuserName = strings.Replace(userName, \".\", \"\", -1)\n\tuserName = strings.Replace(userName, \"_\", \"\", -1)\n\treturn strings.ToLower(userName)\n}", "func CheckIDFormat(ComponentID string) bool {\n if len(ComponentID) != 9 {\n // check the length of the ComponentID is nine\n return false\n } else if _, err := strconv.Atoi(ComponentID); err != nil {\n // check the ComponentID are all digits\n return false\n } else {\n // now everything looks fine\n return true\n }\n}", "func getSinglePath(v interface{}) (string, error) {\n\tif name, err := resourceName(v); err != nil {\n\t\treturn \"\", err\n\t} else if id, err := resourceId(v); err != nil {\n\t\treturn \"\", err\n\t} else {\n\t\treturn fmt.Sprintf(\"%s(%d)\", name, id), nil\n\t}\n}", "func getUserIdString(id string) (uid string) {\r\n\tif id == \"~\" || id == \"\" {\r\n\t\treturn \"~\" // me\r\n\t} else if strings.Contains(id, \"http\") {\r\n\t\treturn \"url=\" + url.QueryEscape(id) // someone else\r\n\t} else {\r\n\t\treturn \"id=\" + id // someone else's url\r\n\t}\r\n}", "func OldGetAnnotation(c, name string) string {\n\tprefix := fmt.Sprintf(\"+%s:\", name)\n\tif strings.HasPrefix(c, prefix) {\n\t\treturn strings.TrimPrefix(c, prefix)\n\t}\n\treturn \"\"\n}", "func TestPrewriteMultiple4A(t *testing.T) {\n}", "func TestSanitizedName(t *testing.T) {\n\ttables := []struct {\n\t\tbadPath string\n\t\tgoodPath string\n\t}{\n\t\t{\"\\\\..\\\\1.txt\", \"1.txt\"},\n\t\t{\"///foo/bar\", \"foo/bar\"},\n\t\t{\"C:/loo/bar2\", \"loo/bar2\"},\n\t\t{\"C:\\\\loo\\\\bar2\", \"loo\\\\bar2\"},\n\t\t{\"../../foo../../ba..r\", \"foo../ba..r\"},\n\t\t{\"../my.file\", \"my.file\"},\n\t}\n\tfor _, table := range tables {\n\t\tfixedPath := sanitizedName(table.badPath)\n\t\tif fixedPath != table.goodPath {\n\t\t\tt.Errorf(\"expected and fixedPath didn't match - %s : %s\", table.goodPath, fixedPath)\n\t\t}\n\t}\n}", "func getReqNameId(reqIIdList []cres.IID, driverNameId string) string {\n\tfor _, iid := range reqIIdList {\n\t\tif iid.SystemId == driverNameId {\n\t\t\treturn iid.NameId\n\t\t}\n\t}\n\treturn \"\"\n}", "func getAbsoluteURL(item *string, original_item string, url *url.URL) {\n var domain string = strings.Join(strings.Split(url.String(), \"/\")[:3], \"/\")\n if (strings.HasPrefix(*item, \"/\")) {\n if (strings.HasSuffix(url.String(), \"/\")) {\n *item = domain + (*item)[1:]\n } else {\n *item = domain + *item\n }\n utils.Log.Printf(\"[*] Modified item for URL for %s. Transformed from %s to %s\\n\", url, original_item, *item)\n }\n\n if (strings.HasPrefix(url.String(), \" \")) {\n *item = (*item)[1:]\n utils.Log.Printf(\"[*] Modified %s. Removed space from %s on %s\\n\", *item, original_item, url)\n }\n\n\n}", "func TestSimpleParser_baseUrl_err(t *testing.T) {\n\tif baseUrl(\"1234\") != \"1234\" {\n\t\tt.Logf(\"baseUrl method is expected to return original link on error\")\n\t\tt.FailNow()\n\t}\n}", "func notTested() string {\n\treturn \"This function isn't tested!\"\n}", "func asSupportedParameter(param string) (string, bool) {\n\tlower := strings.ToLower(param)\n\treturn lower, lowerCaseParameters[lower]\n}", "func getUID(lib utils.PathIdentifier) string {\n\treturn lib.Key()[:5]\n}", "func getFullName()(string, string) {\n\treturn \"Ninja\", \"Coder\"\n}", "func LegacyOrigin(parts ...string) (ret string) {\n\tfor index, i := range parts {\n\t\tret += i\n\t\tif index < len(parts)-1 {\n\t\t\tret += LegacyOriginSeparator\n\t\t}\n\t}\n\treturn\n}", "func generateUUID() string {\n uuid4, _ := uuid.NewV4()\n return uuid4.String()\n}", "func shadowedByParam2() (math string, fmt int) { return }", "func getInternalMountPath(workingMountDir string, vol *smbVolume) string {\n\tif vol == nil {\n\t\treturn \"\"\n\t}\n\tmountDir := vol.uuid\n\tif vol.uuid == \"\" {\n\t\tmountDir = vol.subDir\n\t}\n\treturn filepath.Join(workingMountDir, mountDir)\n}", "func wrapClientID(clientID string) string {\n\thostname, err := os.Hostname()\n\tif err != nil {\n\t\thostname = \"<error>\"\n\t}\n\n\t// Replace all non-alphanumeric chars with something benign that will work in the client id.\n\tre := regexp.MustCompile(\"[^a-zA-Z0-9]+\")\n\thostname = re.ReplaceAllString(hostname, \"-\")\n\n\t// Special case for running locally, add random\n\tif runtime.GOOS == \"darwin\" {\n\t\thostname += strconv.Itoa(rand.Intn(100))\n\t\treturn fmt.Sprintf(\"%s-%s\", clientID, hostname)\n\t}\n\treturn fmt.Sprintf(\"%s-%s\", clientID, hostname)\n}", "func getShorterString(a string, b string) int {\n\tif len(a) <= len(b) {\n\t\treturn len(a)\n\t}\n\treturn len(b)\n}", "func callerShortfile(file string, lastsep_ ...rune) string {\n\tlastsep := '/'\n\tif len(lastsep_) > 0 {\n\t\tlastsep = lastsep_[0]\n\t}\n\tshort := file\n\tfor i := len(file) - 1; i > 0; i-- {\n\t\tif file[i] == byte(lastsep) {\n\t\t\tshort = file[i+1:]\n\t\t\tbreak\n\t\t}\n\t}\n\treturn short\n}", "func unqualify(importPath string) string {\n\tif i := strings.LastIndex(importPath, sep); i != -1 {\n\t\timportPath = importPath[i+len(sep):]\n\t}\n\treturn importPath\n}", "func Test_HasPrefix(t *testing.T) {\n\tvalue := \"main.go\"\n\tprefix := \"main\"\n\tif !strings.HasPrefix(value, prefix) {\n\t\tt.Fatalf(\"expected %s to have prefix %s\", value, prefix)\n\t}\n}", "func cleancompstr(cleanup string) string {\n\tcleanup = strings.TrimSpace(cleanup)\n\tcleanup = strings.ToLower(cleanup)\n\treturn cleanup\n}", "func badTemper(string, string) (*os.File, error) {\n\treturn nil, fmt.Errorf(\"oups\")\n}", "func (d *Abstraction) getGeneratedName(s string, m string) string {\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(s)\n\tbuffer.WriteString(\".\")\n\tbuffer.WriteString(m)\n\treturn buffer.String()\n}", "func helper(k string) interface{} {\n\treturn k\n}", "func getUsername() string {\n\tlog.Debug(\"getUsername\")\n\tu := \"unknown\"\n\tosUser := \"\"\n\n\tswitch runtime.GOOS {\n\tcase \"darwin\", \"linux\", \"solaris\":\n\t\tosUser = os.Getenv(\"USER\")\n\tcase \"windows\":\n\t\tosUser = os.Getenv(\"USERNAME\")\n\n\t\t// remove domain\n\t\tosUser = osUser[strings.LastIndex(osUser, \"\\\\\")+1:]\n\t\tlog.Debugf(\"Windows user has been transformed into %s\", osUser)\n\n\t\t// HACK ugly ... if localized administrator, translate to administrator\n\t\tif isWinAdministrator(osUser) {\n\t\t\tosUser = \"Administrator\"\n\t\t}\n\t}\n\n\tif osUser != \"\" {\n\t\tu = osUser\n\t}\n\treturn u\n}", "func getCaller(skip int, shortFileName bool) string {\n\tvar b strings.Builder\n\t_, file, no, ok := runtime.Caller(skip)\n\tif ok {\n\t\tif shortFileName {\n\t\t\tif lastSlashIndex := strings.LastIndex(file, \"/\"); lastSlashIndex != -1 {\n\t\t\t\tfile = file[lastSlashIndex+1:]\n\t\t\t}\n\t\t}\n\t\tfmt.Fprintf(&b, \"%s:%d\", file, no)\n\t}\n\treturn b.String()\n}", "func ensureTrailingDot(details string) string {\n\tif !strings.HasSuffix(details, \".\") {\n\t\treturn fmt.Sprintf(\"%s.\", details)\n\t}\n\treturn details\n}", "func isBadVersion(version int) bool{\n\treturn true\n}", "func TestGetWrongUUID(t *testing.T) {\n\tclearTable()\n nt := New{{.NameExported}}()\n add{{.NameExported}}(nt)\n badUid := \"00000000-d01d-4c09-a4e7-59026d143b89\"\n\n\tstatement := fmt.Sprintf({{.NameExported}}URL, badUid)\n\n\treq, _ := http.NewRequest(\"GET\", statement, nil)\n\tresponse := executeRequest(req)\n\n\tcheckResponseCode(t, http.StatusNotFound, response.Code)\n}", "func LegacyInstanceObjectID(obj *ResourceInstanceObjectSrc) string {\n\tif obj == nil {\n\t\treturn \"<not created>\"\n\t}\n\n\tif obj.AttrsJSON != nil {\n\t\ttype WithID struct {\n\t\t\tID string `json:\"id\"`\n\t\t}\n\t\tvar withID WithID\n\t\terr := json.Unmarshal(obj.AttrsJSON, &withID)\n\t\tif err == nil {\n\t\t\treturn withID.ID\n\t\t}\n\t} else if obj.AttrsFlat != nil {\n\t\tif flatID, exists := obj.AttrsFlat[\"id\"]; exists {\n\t\t\treturn flatID\n\t\t}\n\t}\n\n\t// For resource types created after we removed id as special there may\n\t// not actually be one at all. This is okay because older tests won't\n\t// encounter this, and new tests shouldn't be using ids.\n\treturn \"<none>\"\n}", "func getErrOrigin() string {\n\tvar origin string\n\tif pc, file, line, ok := runtime.Caller(2); ok {\n\t\tif f := runtime.FuncForPC(pc); f != nil {\n\t\t\tif wd, err := os.Getwd(); err == nil {\n\t\t\t\torigin = fmt.Sprintf(\"%s %s:%d\", strings.TrimPrefix(f.Name(), pkgPath), strings.TrimPrefix(file, wd+string(os.PathSeparator)), line)\n\t\t\t}\n\t\t}\n\t}\n\treturn origin\n}", "func (objectIDs *DbObjectIDs) getUniqueID() (string, error) {\n\tid := objectIDs.ownerControllerName + \":\" + string(objectIDs.idsType.ownerObjectType)\n\tfor _, key := range objectIDs.idsType.GetExternalIDKeys() {\n\t\tvalue, ok := objectIDs.objectIDs[key]\n\t\tif !ok {\n\t\t\treturn \"\", fmt.Errorf(\"key %v is required but not present\", key)\n\t\t}\n\t\tid += \":\" + value\n\t}\n\treturn id, nil\n}", "func getCallPriorityID(strPriorityName string, espXmlmc *apiLib.XmlmcInstStruct, buffer *bytes.Buffer) (string, string) {\n\tpriorityID := \"\"\n\tif swImportConf.PriorityMapping[strPriorityName] != nil {\n\t\tstrPriorityName = fmt.Sprintf(\"%s\", swImportConf.PriorityMapping[strPriorityName])\n\t\tif strPriorityName != \"\" {\n\t\t\tpriorityID = getPriorityID(strPriorityName, espXmlmc, buffer)\n\t\t}\n\t}\n\treturn priorityID, strPriorityName\n}" ]
[ "0.54382825", "0.537262", "0.5215815", "0.5027418", "0.4975398", "0.49496406", "0.48785368", "0.48031178", "0.4786201", "0.47657558", "0.47629273", "0.47359633", "0.47222048", "0.47043297", "0.47027624", "0.46904278", "0.46901387", "0.46885514", "0.46665755", "0.46659398", "0.46592057", "0.46564803", "0.46520862", "0.46506956", "0.4650385", "0.46303272", "0.46296483", "0.4629173", "0.4628825", "0.46284923", "0.4625966", "0.4624669", "0.46244738", "0.4619596", "0.46129894", "0.46062362", "0.4603694", "0.46027172", "0.46010837", "0.45992196", "0.4595422", "0.45953396", "0.45938143", "0.45878768", "0.45863846", "0.45860708", "0.45778158", "0.45708576", "0.4562223", "0.45579806", "0.45571515", "0.45400572", "0.4538702", "0.45375508", "0.45348978", "0.4533087", "0.4532056", "0.45305866", "0.45279145", "0.45279145", "0.45279145", "0.45279145", "0.45227525", "0.4520747", "0.45180294", "0.45163244", "0.45158538", "0.45143905", "0.45078984", "0.44996935", "0.44993386", "0.4499218", "0.44967684", "0.44954318", "0.44913954", "0.44851273", "0.44821027", "0.4480578", "0.4480466", "0.44804257", "0.4477861", "0.44712496", "0.44705343", "0.44680944", "0.44623426", "0.44565588", "0.4452436", "0.44511658", "0.44499886", "0.44494784", "0.44493905", "0.4445965", "0.44443068", "0.44378096", "0.4436986", "0.44309473", "0.44284478", "0.44276965", "0.44272083", "0.44260067", "0.44246325" ]
0.0
-1
This is a courtesy helper function, which in some cases may not work as expected!
func (s *VPCService) GetVPCByName(name string, opts ...OptionFunc) (*VPC, int, error) { id, count, err := s.GetVPCID(name, opts...) if err != nil { return nil, count, err } r, count, err := s.GetVPCByID(id, opts...) if err != nil { return nil, count, err } return r, count, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func getHelperMethodIfNeeded(functionName string, indent string) (string, bool) {\n\tswitch functionName {\n\tcase \"filebase64sha256\":\n\t\treturn `function computeFilebase64sha256(path string) string {\n\tconst fileData = Buffer.from(fs.readFileSync(path), 'binary')\n\treturn crypto.createHash('sha256').update(fileData).digest('hex')\n}`, true\n\tcase \"notImplemented\":\n\t\treturn fmt.Sprintf(\n\t\t\t`%sfunction notImplemented(message: string) {\n%s throw new Error(message);\n%s}`, indent, indent, indent), true\n\tcase \"singleOrNone\":\n\t\treturn fmt.Sprintf(\n\t\t\t`%sfunction singleOrNone<T>(elements: pulumi.Input<T>[]): pulumi.Input<T> {\n%s if (elements.length != 1) {\n%s throw new Error(\"singleOrNone expected input list to have a single element\");\n%s }\n%s return elements[0];\n%s}`, indent, indent, indent, indent, indent, indent), true\n\tdefault:\n\t\treturn \"\", false\n\t}\n}", "func getHelperMethodIfNeeded(functionName string, indent string) (string, bool) {\n\tswitch functionName {\n\tcase \"filebase64\":\n\t\treturn `private static string ReadFileBase64(string path) {\n\t\treturn Convert.ToBase64String(System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path)));\n\t}`, true\n\tcase \"filebase64sha256\":\n\t\treturn `private static string ComputeFileBase64Sha256(string path) {\n\t\tvar fileData = System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path));\n\t\tvar hashData = SHA256.Create().ComputeHash(fileData);\n\t\treturn Convert.ToBase64String(hashData);\n\t}`, true\n\tcase \"sha1\":\n\t\treturn `private static string ComputeSHA1(string input) {\n\t\treturn BitConverter.ToString(\n\t\t\tSHA1.Create().ComputeHash(Encoding.UTF8.GetBytes(input))\n\t\t).Replace(\"-\",\"\").ToLowerInvariant());\n\t}`, true\n\tcase \"notImplemented\":\n\t\treturn fmt.Sprintf(`\n%sstatic object NotImplemented(string errorMessage) \n%s{\n%s throw new System.NotImplementedException(errorMessage);\n%s}`, indent, indent, indent, indent), true\n\tdefault:\n\t\treturn \"\", false\n\t}\n}", "func TestGetNone4A(t *testing.T) {\n}", "func (f *Ifacer) getUniqueImportName(pkgName string, level int) string {\n\tstrs := strings.Split(pkgName, string(filepath.Separator))\n\n\tlenStr := len(strs)\n\n\tif lenStr-1 < level {\n\t\tf.logger.Panicf(\"%d out of range\", level)\n\t}\n\n\tvar importName string\n\tfor _, str := range strs[lenStr-level-1:] {\n\t\tif strings.Contains(str, \".\") {\n\t\t\tstr = strings.Replace(str, \".\", \"\", -1)\n\t\t}\n\t\timportName += str\n\t}\n\n\treturn importName\n}", "func DummyStringGetterFunction(name string) string {\n\treturn name\n}", "func almostOkayFunction() {\n\treturn nil\n}", "func isBadVersion(version int) bool{\n return false\n}", "func trimCaller(funcName string) string {\n\t// ex:\n\t// funcName = \"github.com/ddo/request.(*Client).Request\"\n\t// arrDir = [github.com ddo request.(*Client).Request]\n\t// lastDir = request.(*Client).Request\n\t// arrCaller = [request. (*Client).Request]\n\n\tarrDir := strings.Split(funcName, \"/\")\n\tlastDir := arrDir[len(arrDir)-1]\n\tarrCaller := strings.Split(lastDir, \".\")\n\n\tif len(arrCaller) < 2 {\n\t\treturn \"\"\n\t}\n\n\treturn arrCaller[len(arrCaller)-1]\n}", "func getValidPrefix(s string, base int64) string {\n\ttrace_util_0.Count(_util_00000, 47)\n\tvar (\n\t\tvalidLen int\n\t\tupper rune\n\t)\n\tswitch {\n\tcase base >= 2 && base <= 9:\n\t\ttrace_util_0.Count(_util_00000, 51)\n\t\tupper = rune('0' + base)\n\tcase base <= 36:\n\t\ttrace_util_0.Count(_util_00000, 52)\n\t\tupper = rune('A' + base - 10)\n\tdefault:\n\t\ttrace_util_0.Count(_util_00000, 53)\n\t\treturn \"\"\n\t}\n\ttrace_util_0.Count(_util_00000, 48)\nLoop:\n\tfor i := 0; i < len(s); i++ {\n\t\ttrace_util_0.Count(_util_00000, 54)\n\t\tc := rune(s[i])\n\t\tswitch {\n\t\tcase unicode.IsDigit(c) || unicode.IsLower(c) || unicode.IsUpper(c):\n\t\t\ttrace_util_0.Count(_util_00000, 55)\n\t\t\tc = unicode.ToUpper(c)\n\t\t\tif c < upper {\n\t\t\t\ttrace_util_0.Count(_util_00000, 58)\n\t\t\t\tvalidLen = i + 1\n\t\t\t} else {\n\t\t\t\ttrace_util_0.Count(_util_00000, 59)\n\t\t\t\t{\n\t\t\t\t\tbreak Loop\n\t\t\t\t}\n\t\t\t}\n\t\tcase c == '+' || c == '-':\n\t\t\ttrace_util_0.Count(_util_00000, 56)\n\t\t\tif i != 0 {\n\t\t\t\ttrace_util_0.Count(_util_00000, 60)\n\t\t\t\tbreak Loop\n\t\t\t}\n\t\tdefault:\n\t\t\ttrace_util_0.Count(_util_00000, 57)\n\t\t\tbreak Loop\n\t\t}\n\t}\n\ttrace_util_0.Count(_util_00000, 49)\n\tif validLen > 1 && s[0] == '+' {\n\t\ttrace_util_0.Count(_util_00000, 61)\n\t\treturn s[1:validLen]\n\t}\n\ttrace_util_0.Count(_util_00000, 50)\n\treturn s[:validLen]\n}", "func sanitizePackageName(importPath string) string {\n\talias := path.Base(importPath)\n\n\t// alias should be lower case\n\talias = strings.ToLower(alias)\n\n\t// alias should now only contain alphanumerics\n\timportsRegex := regexp.MustCompile(`[^a-z0-9]`)\n\talias = importsRegex.ReplaceAllString(alias, \"\")\n\n\t// can't have a first digit, per Go identifier rules, so just skip them\n\talias = strings.TrimLeftFunc(alias, unicode.IsDigit)\n\n\t// If path part was all digits, we may be left with an empty string. In this case use \"pkg\" as the alias.\n\tif alias == \"\" {\n\t\talias = \"pkg\"\n\t}\n\n\treturn alias\n}", "func TestPrewriteWrittenNoConflict4A(t *testing.T) {\n}", "func getOID(oid string) (string, error) {\n\tif strings.HasPrefix(oid, \".\") {\n\t\treturn oid, nil\n\t}\n\tmu.Lock()\n\tdefer mu.Unlock()\n\tfixed, ok := lookupOID[oid]\n\tif !ok {\n\t\treturn oid, errors.Errorf(\"no OID found for %s\", oid)\n\t}\n\treturn fixed, nil\n}", "func legacyFileName(prefix, instance, class, id string) string {\n\tvar fileName string\n\tinstance = strings.Replace(instance, \"\\\\\", \"__\", -1)\n\n\t// use it to build the file name\n\tif prefix == \"\" {\n\t\tfileName = fmt.Sprintf(\"%s_%s_%s.status\", instance, class, id)\n\t} else {\n\t\tfileName = fmt.Sprintf(\"%s_%s_%s_%s.status\", prefix, instance, class, id)\n\t}\n\treturn fileName\n}", "func uniquePackageOf(fd *descriptor.FileDescriptorProto) string {\n\ts, ok := uniquePackageName[fd]\n\tif !ok {\n\t\tlog.Fatal(\"internal error: no package name defined for \" + fd.GetName())\n\t}\n\treturn s\n}", "func getForcedGetter(sourceUrl string) (string, string) {\n\tif matches := forcedRegexp.FindStringSubmatch(sourceUrl); matches != nil && len(matches) > 2 {\n\t\treturn matches[1], matches[2]\n\t}\n\n\treturn \"\", sourceUrl\n}", "func getFullyQualifiedFunctionName(fn interface{}) string {\n\treturn runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()\n}", "func TestEmptyPrewrite4A(t *testing.T) {\n}", "func internalStartsWith(str string, prefix string, ignoreCase bool) bool {\n\tif str == \"\" || prefix == \"\" {\n\t\treturn (str == \"\" && prefix == \"\")\n\t}\n\tif utf8.RuneCountInString(prefix) > utf8.RuneCountInString(str) {\n\t\treturn false\n\t}\n\tif ignoreCase {\n\t\treturn strings.HasPrefix(strings.ToLower(str), strings.ToLower(prefix))\n\t}\n\treturn strings.HasPrefix(str, prefix)\n}", "func TestGetEmpty4A(t *testing.T) {\n}", "func ExampleMustSqueezeTrytes() {}", "func getAliasId(name string, mountAccessor string, entityAliasList *map[string]EntityAlias) string {\n\tfor aliasID, alias := range *entityAliasList {\n\t\tif alias.Name == name && alias.MountAccessor == mountAccessor {\n\t\t\treturn aliasID\n\t\t}\n\t}\n\treturn \"\"\n}", "func getInternalParentPrefix(pkgName string) string {\n\tcleanedPath := filepath.Clean(pkgName)\n\texplodedPath := strings.Split(cleanedPath, string(os.PathSeparator))\n\n\ti := len(explodedPath) - 1\n\tfor ; i > 0; i-- {\n\t\tif explodedPath[i] == internal {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn filepath.Join(explodedPath[0:i]...)\n}", "func smallestGoodBase(n string) string {\n \n}", "func idFromName(name string) string {\n\ts := strings.Split(strings.ToLower(strings.TrimSpace(name)), \" \")\n\tns := strings.Join(s, \"-\")\n\ts = strings.Split(ns, \".\")\n\treturn strings.Join(s, \"-\")\n}", "func packageName(skip int) (long, short string, ok bool) {\n\t// Full function name looks like path/to/pkg.Func\n\tvar f string\n\t_, _, f, ok = fullCaller(skip + 1)\n\tif !ok {\n\t\treturn\n\t}\n\n\t// Strip down to path/to/pkg\n\tdot := strings.LastIndex(f, \".\")\n\tif dot == -1 {\n\t\treturn\n\t}\n\tlong = f[:dot]\n\n\t// Strip down to pkg\n\tslash := strings.LastIndex(long, \"/\")\n\tif slash == -1 {\n\t\treturn\n\t}\n\tshort = long[slash+1:]\n\treturn\n}", "func TestSinglePrewrite4A(t *testing.T) {\n}", "func getPathConversionFunction() func(string) string {\n\tif runtime.GOOS != \"windows\" || os.Getenv(\"DOCKER_MACHINE_NAME\") == \"\" {\n\t\treturn func(path string) string { return path }\n\t}\n\n\treturn func(path string) string {\n\t\treturn fmt.Sprintf(\"/%s%s\", strings.ToUpper(path[:1]), path[2:])\n\t}\n}", "func FullNameNakedReturn(f, l string) (full string, length int) {\n full = f + \" \" + l;\n length = len(full)\n return \n}", "func resolveSourcePrefix(source string, sa Source) string {\n\tif sa.Prefix == \"false\" || sa.Prefix == \"\" {\n\t\treturn \"\"\n\t} else if sa.Prefix == \"true\" {\n\t\treturn source + \"_\"\n\t} else {\n\t\treturn sa.Prefix + \"_\"\n\t}\n}", "func TestManifestAPI_Get_UnknownSchema(t *testing.T) {}", "func checkSafeNameChars(nameFragment string) error {\n\tfor i, ch := range nameFragment {\n\t\tswitch {\n\t\tcase 'a' <= ch && ch <= 'z':\n\t\tcase '0' <= ch && ch <= '9':\n\t\tcase ch == '_':\n\t\tdefault:\n\t\t\treturn fmt.Errorf(\"Name fragment is not safe: %x at %d.\", ch, i)\n\t\t}\n\t\t// NO: case ch == '.'\n\t\t// Could also allow at most one dot but not for SQLite.\n\t\t// Maybe would make sense for other SQL DBMS which\n\t\t// use schema names / namespaces.\n\t}\n\treturn nil\n}", "func isCommonRetryableErrorCode(err error) (bool, string) {\n\tgerr, ok := err.(*googleapi.Error)\n\tif !ok {\n\t\treturn false, \"\"\n\t}\n\n\tif gerr.Code == 429 || gerr.Code == 500 || gerr.Code == 502 || gerr.Code == 503 {\n\t\tlog.Printf(\"[DEBUG] Dismissed an error as retryable based on error code: %s\", err)\n\t\treturn true, fmt.Sprintf(\"Retryable error code %d\", gerr.Code)\n\t}\n\treturn false, \"\"\n}", "func goodFunction() {\n\treturn nil\n}", "func getCallerPackage() (string, bool) {\n\tvar pkg string\n\tpc, _, _, ok := runtime.Caller(2)\n\tif !ok {\n\t\treturn pkg, false\n\t}\n\tparts := strings.Split(runtime.FuncForPC(pc).Name(), \".\")\n\tif parts[len(parts)-2][0] == '(' {\n\t\tpkg = strings.Join(parts[0:len(parts)-2], \".\")\n\t} else {\n\t\tpkg = strings.Join(parts[0:len(parts)-1], \".\")\n\t}\n\treturn pkg, true\n}", "func _getFuncName() string {\n var ptrVal = _getFuncPtrVal()\n\n // Look up the function object\n var fun = runtime.FuncForPC(ptrVal)\n\n // returns: _/home/user/src/gohavenet/src.TestProcMgr_False\n var funcNamePath = fun.Name()\n\n // Split on the slash and return just the func name\n var pathElems = strings.Split(funcNamePath, \"/\")\n var index = len(pathElems) - 1\n if index < 0 {\n index = 0\n }\n\n return pathElems[index]\n}", "func getPatchVersionTrimmed(version string) string {\n\tendIndex := strings.LastIndex(version, \".\")\n\tif endIndex != -1 {\n\t\tversion = version[:endIndex]\n\t}\n\treturn version\n}", "func fixLegacyInventoryName(obj *unstructured.Unstructured) error {\n\tif obj.GetName() == legacyInvName {\n\t\tklog.V(4).Infof(\"renaming legacy inventory name\")\n\t\trandomSuffix := common.RandomStr()\n\t\treturn addSuffixToName(obj, randomSuffix)\n\t}\n\treturn nil\n}", "func callerName(skip int) (pkgPath, funcName string, ok bool) {\n\tvar pc [1]uintptr\n\tn := runtime.Callers(skip+1, pc[:])\n\tif n != 1 {\n\t\treturn \"\", \"\", false\n\t}\n\n\tf := runtime.FuncForPC(pc[0]).Name()\n\ts := pkgPathRe.FindStringSubmatch(f)\n\tif len(s) < 3 {\n\t\tpanic(fmt.Errorf(\"failed to extract package path and function name from %q\", f))\n\t}\n\n\treturn s[1], s[2], true\n}", "func getValidContainerName(volumeName, protocol string) string {\n\tcontainerName := strings.ToLower(volumeName)\n\tif len(containerName) > containerNameMaxLength {\n\t\tcontainerName = containerName[0:containerNameMaxLength]\n\t}\n\tif !checkContainerNameBeginAndEnd(containerName) || len(containerName) < containerNameMinLength {\n\t\t// now we set as 63 for maximum container name length\n\t\t// todo: get cluster name\n\t\tcontainerName = k8sutil.GenerateVolumeName(fmt.Sprintf(\"pvc-%s\", protocol), uuid.NewUUID().String(), 63)\n\t\tklog.Warningf(\"the requested volume name (%q) is invalid, so it is regenerated as (%q)\", volumeName, containerName)\n\t}\n\tcontainerName = strings.Replace(containerName, \"--\", \"-\", -1)\n\n\treturn containerName\n}", "func funcName() string {\n\tpc, _, _, _ := runtime.Caller(1)\n\tcompleteFuncname := runtime.FuncForPC(pc).Name()\n\treturn strings.Split(completeFuncname, \".\")[len(strings.Split(completeFuncname, \".\"))-1]\n}", "func ensureValidHelper(name string, funcValue reflect.Value) {\n\tif funcValue.Kind() != reflect.Func {\n\t\tpanic(fmt.Errorf(\"Helper must be a function: %s\", name))\n\t}\n\n\tfuncType := funcValue.Type()\n\n\tif funcType.NumOut() != 1 {\n\t\tpanic(fmt.Errorf(\"Helper function must return a string or a SafeString: %s\", name))\n\t}\n\n\t// @todo Check if first returned value is a string, SafeString or interface{} ?\n}", "func exactFunction() {\n\treturn nil\n}", "func TestUidForUsername(t *testing.T) {\n\tuid, err := uidForUsername(\"root\")\n\tif err != nil {\n\t\tt.Errorf(\"uidForUsername(\\\"root\\\") returned error: %v\", err)\n\t\treturn\n\t}\n\tif uid != 0 {\n\t\tt.Errorf(\"uidForUsername(\\\"root\\\") returned %d, should be 0\", uid)\n\t}\n\n\t_, err = uidForUsername(\"asdfASDFxxx999\")\n\tif err == nil {\n\t\tt.Errorf(\"uidForUsername(\\\"asdfASDFxxx\\\") did not return error\")\n\t\treturn\n\t}\n}", "func getGroupIdString(id interface{}) (gid string, err error) {\r\n\tswitch t := id.(type) {\r\n\tcase string:\r\n\t\tif strings.Contains(id.(string), \"http\") {\r\n\t\t\treturn \"url=\" + url.QueryEscape(id.(string)), nil // group url\r\n\t\t}\r\n\t\treturn id.(string), nil // group id as a string\r\n\tcase uint64:\r\n\t\treturn strconv.FormatUint(id.(uint64), 10), nil // group id as an int\r\n\tdefault:\r\n\t\treturn gid, errors.New(fmt.Sprintf(\"Group ID type exception: Expecting string or uint64 got %T\", t))\r\n\t}\r\n}", "func GoodEnoughUUID() string {\n\tb := make([]byte, 16)\n\t_, err := rand.Read(b)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tuuid := fmt.Sprintf(\"%x-%x-%x-%x-%x\",\n\t\tb[0:4], b[4:6], b[6:8], b[8:10], b[10:])\n\treturn uuid\n}", "func mustBeUnique(label string) {\n\n\tif _, ok := functions[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as function\", label))\n\t}\n\n\tif _, ok := variables[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as variable\", label))\n\t}\n\n\tif _, ok := aliases[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as alias\", label))\n\t}\n}", "func ensureDot(extension string) string {\n\tif strings.Index(extension, \".\") == -1 {\n\t\textension = \".\" + extension\n\t}\n\treturn extension\n}", "func getSafeString(input interface{}) string {\r\n\tvar safeValue string\r\n\tvar isOk bool\r\n\r\n\tif input == nil {\r\n\t\tsafeValue = \"\"\r\n\t} else {\r\n\t\tsafeValue, isOk = input.(string)\r\n\t\tif isOk == false {\r\n\t\t\tsafeValue = \"\"\r\n\t\t}\r\n\t}\r\n\treturn safeValue\r\n}", "func mustGetUUID() string {\n\tu, err := uuid.NewRandom()\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\treturn u.String()\n}", "func fn3() { // want fn3:`Deprecated: Don't use this\\.`\n}", "func ensurePrefix(s, prefix string) string {\n\tif !strings.HasPrefix(s, prefix) {\n\t\ts = prefix + s\n\t}\n\treturn s\n}", "func prepareHashPath(path, prefix string) string {\n\t// I need to strip the prefix. But... where does the prefix come from\n\treturn \"/\" + strings.TrimPrefix(path, prefix)\n}", "func pySafeName(nm string) string {\n\tif _, bad := pyKeywords[nm]; bad {\n\t\treturn \"my\" + nm\n\t}\n\treturn nm\n}", "func fullCaller(skip int) (file string, line int, fnc string, ok bool) {\n\tvar pc uintptr\n\tpc, file, line, ok = runtime.Caller(skip + 1)\n\tif !ok {\n\t\treturn\n\t}\n\n\tf := runtime.FuncForPC(pc)\n\tfnc = f.Name()\n\treturn\n}", "func getValidVersion(version string) string {\n\tif version != \"\" {\n\t\treturn version\n\t}\n\n\treturn \"Not Installed\"\n}", "func makeSafeFileName(s string) string {\n\tconst maxLen = 200 // slightly arbitrary but must be <= 254 for most modern filesystems\n\n\t// First, tidy the file path to a clean representation\n\tresult := filepath.Clean(s)\n\n\t// Next, split the path into elements between separators and check each element.\n\telements := filepath.SplitList(result)\n\tnewElements := []string{}\n\n\tfor _, element := range elements {\n\t\tnewElements = append(newElements, makeSafeFileElement(element))\n\t}\n\n\tresult = filepath.Join(newElements...)\n\n\t// Also avoid starting a file name with a period as this has a special meaning on UNIX\n\t// and UNIX-like systems.\n\tdir := filepath.Dir(result)\n\tbase := filepath.Base(result)\n\n\tif base[0] == '.' {\n\t\tresult = filepath.Join(dir, base[1:])\n\t}\n\n\t// Ensure the resulting name isn't too long, as X.509 distinguished names can be very long.\n\tif len(result) > maxLen {\n\t\tresult = result[:maxLen]\n\t}\n\n\treturn result\n}", "func TestDiskIOStats_diskName(t *testing.T) {\n\ttests := []struct {\n\t\ttemplates []string\n\t\texpected string\n\t}{\n\t\t{[]string{\"$MY_PARAM_1\"}, \"myval1\"},\n\t\t{[]string{\"${MY_PARAM_1}\"}, \"myval1\"},\n\t\t{[]string{\"x$MY_PARAM_1\"}, \"xmyval1\"},\n\t\t{[]string{\"x${MY_PARAM_1}x\"}, \"xmyval1x\"},\n\t\t{[]string{\"$MISSING\", \"$MY_PARAM_1\"}, \"myval1\"},\n\t\t{[]string{\"$MY_PARAM_1\", \"$MY_PARAM_2\"}, \"myval1\"},\n\t\t{[]string{\"$MISSING\"}, \"null\"},\n\t\t{[]string{\"$MY_PARAM_1/$MY_PARAM_2\"}, \"myval1/myval2\"},\n\t\t{[]string{\"$MY_PARAM_2/$MISSING\"}, \"null\"},\n\t}\n\n\tfor _, tc := range tests {\n\t\tfunc() {\n\t\t\ts := DiskIO{\n\t\t\t\tNameTemplates: tc.templates,\n\t\t\t}\n\t\t\tdefer setupNullDisk(t, &s, \"null\")() //nolint:revive // done on purpose, cleaning will be executed properly\n\t\t\tname, _ := s.diskName(\"null\")\n\t\t\trequire.Equal(t, tc.expected, name, \"Templates: %#v\", tc.templates)\n\t\t}()\n\t}\n}", "func pySafeArg(anm string, idx int) string {\n\tif anm == \"\" {\n\t\tanm = fmt.Sprintf(\"arg_%d\", idx)\n\t}\n\treturn pySafeName(anm)\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func TestAliasingRecursionInvalid(t *testing.T) {\n\t_, errs := PrototypeString(`alias x = x\n\t\tx`)\n\tgoutil.AssertNow(t, errs != nil, \"errs should not be nil\")\n}", "func getPackageName(f string) string {\n\tfor {\n\t\tlastPeriod := strings.LastIndex(f, \".\")\n\t\tlastSlash := strings.LastIndex(f, \"/\")\n\t\tif lastPeriod > lastSlash {\n\t\t\tf = f[:lastPeriod]\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn f\n}", "func getFunctionName(fn interface{}) string {\n\tname := runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()\n\n\t// Method above returns functions in the form : main.foo\n\tparts := strings.Split(name, \".\")\n\treturn parts[len(parts)-1]\n}", "func cleanUserName(userName string) string {\n\tuserName = strings.Replace(userName, \"-\", \"\", -1)\n\tuserName = strings.Replace(userName, \".\", \"\", -1)\n\tuserName = strings.Replace(userName, \"_\", \"\", -1)\n\treturn strings.ToLower(userName)\n}", "func CheckIDFormat(ComponentID string) bool {\n if len(ComponentID) != 9 {\n // check the length of the ComponentID is nine\n return false\n } else if _, err := strconv.Atoi(ComponentID); err != nil {\n // check the ComponentID are all digits\n return false\n } else {\n // now everything looks fine\n return true\n }\n}", "func getSinglePath(v interface{}) (string, error) {\n\tif name, err := resourceName(v); err != nil {\n\t\treturn \"\", err\n\t} else if id, err := resourceId(v); err != nil {\n\t\treturn \"\", err\n\t} else {\n\t\treturn fmt.Sprintf(\"%s(%d)\", name, id), nil\n\t}\n}", "func getUserIdString(id string) (uid string) {\r\n\tif id == \"~\" || id == \"\" {\r\n\t\treturn \"~\" // me\r\n\t} else if strings.Contains(id, \"http\") {\r\n\t\treturn \"url=\" + url.QueryEscape(id) // someone else\r\n\t} else {\r\n\t\treturn \"id=\" + id // someone else's url\r\n\t}\r\n}", "func OldGetAnnotation(c, name string) string {\n\tprefix := fmt.Sprintf(\"+%s:\", name)\n\tif strings.HasPrefix(c, prefix) {\n\t\treturn strings.TrimPrefix(c, prefix)\n\t}\n\treturn \"\"\n}", "func TestPrewriteMultiple4A(t *testing.T) {\n}", "func TestSanitizedName(t *testing.T) {\n\ttables := []struct {\n\t\tbadPath string\n\t\tgoodPath string\n\t}{\n\t\t{\"\\\\..\\\\1.txt\", \"1.txt\"},\n\t\t{\"///foo/bar\", \"foo/bar\"},\n\t\t{\"C:/loo/bar2\", \"loo/bar2\"},\n\t\t{\"C:\\\\loo\\\\bar2\", \"loo\\\\bar2\"},\n\t\t{\"../../foo../../ba..r\", \"foo../ba..r\"},\n\t\t{\"../my.file\", \"my.file\"},\n\t}\n\tfor _, table := range tables {\n\t\tfixedPath := sanitizedName(table.badPath)\n\t\tif fixedPath != table.goodPath {\n\t\t\tt.Errorf(\"expected and fixedPath didn't match - %s : %s\", table.goodPath, fixedPath)\n\t\t}\n\t}\n}", "func getReqNameId(reqIIdList []cres.IID, driverNameId string) string {\n\tfor _, iid := range reqIIdList {\n\t\tif iid.SystemId == driverNameId {\n\t\t\treturn iid.NameId\n\t\t}\n\t}\n\treturn \"\"\n}", "func getAbsoluteURL(item *string, original_item string, url *url.URL) {\n var domain string = strings.Join(strings.Split(url.String(), \"/\")[:3], \"/\")\n if (strings.HasPrefix(*item, \"/\")) {\n if (strings.HasSuffix(url.String(), \"/\")) {\n *item = domain + (*item)[1:]\n } else {\n *item = domain + *item\n }\n utils.Log.Printf(\"[*] Modified item for URL for %s. Transformed from %s to %s\\n\", url, original_item, *item)\n }\n\n if (strings.HasPrefix(url.String(), \" \")) {\n *item = (*item)[1:]\n utils.Log.Printf(\"[*] Modified %s. Removed space from %s on %s\\n\", *item, original_item, url)\n }\n\n\n}", "func TestSimpleParser_baseUrl_err(t *testing.T) {\n\tif baseUrl(\"1234\") != \"1234\" {\n\t\tt.Logf(\"baseUrl method is expected to return original link on error\")\n\t\tt.FailNow()\n\t}\n}", "func notTested() string {\n\treturn \"This function isn't tested!\"\n}", "func asSupportedParameter(param string) (string, bool) {\n\tlower := strings.ToLower(param)\n\treturn lower, lowerCaseParameters[lower]\n}", "func getUID(lib utils.PathIdentifier) string {\n\treturn lib.Key()[:5]\n}", "func getFullName()(string, string) {\n\treturn \"Ninja\", \"Coder\"\n}", "func LegacyOrigin(parts ...string) (ret string) {\n\tfor index, i := range parts {\n\t\tret += i\n\t\tif index < len(parts)-1 {\n\t\t\tret += LegacyOriginSeparator\n\t\t}\n\t}\n\treturn\n}", "func generateUUID() string {\n uuid4, _ := uuid.NewV4()\n return uuid4.String()\n}", "func shadowedByParam2() (math string, fmt int) { return }", "func getInternalMountPath(workingMountDir string, vol *smbVolume) string {\n\tif vol == nil {\n\t\treturn \"\"\n\t}\n\tmountDir := vol.uuid\n\tif vol.uuid == \"\" {\n\t\tmountDir = vol.subDir\n\t}\n\treturn filepath.Join(workingMountDir, mountDir)\n}", "func wrapClientID(clientID string) string {\n\thostname, err := os.Hostname()\n\tif err != nil {\n\t\thostname = \"<error>\"\n\t}\n\n\t// Replace all non-alphanumeric chars with something benign that will work in the client id.\n\tre := regexp.MustCompile(\"[^a-zA-Z0-9]+\")\n\thostname = re.ReplaceAllString(hostname, \"-\")\n\n\t// Special case for running locally, add random\n\tif runtime.GOOS == \"darwin\" {\n\t\thostname += strconv.Itoa(rand.Intn(100))\n\t\treturn fmt.Sprintf(\"%s-%s\", clientID, hostname)\n\t}\n\treturn fmt.Sprintf(\"%s-%s\", clientID, hostname)\n}", "func getShorterString(a string, b string) int {\n\tif len(a) <= len(b) {\n\t\treturn len(a)\n\t}\n\treturn len(b)\n}", "func callerShortfile(file string, lastsep_ ...rune) string {\n\tlastsep := '/'\n\tif len(lastsep_) > 0 {\n\t\tlastsep = lastsep_[0]\n\t}\n\tshort := file\n\tfor i := len(file) - 1; i > 0; i-- {\n\t\tif file[i] == byte(lastsep) {\n\t\t\tshort = file[i+1:]\n\t\t\tbreak\n\t\t}\n\t}\n\treturn short\n}", "func unqualify(importPath string) string {\n\tif i := strings.LastIndex(importPath, sep); i != -1 {\n\t\timportPath = importPath[i+len(sep):]\n\t}\n\treturn importPath\n}", "func Test_HasPrefix(t *testing.T) {\n\tvalue := \"main.go\"\n\tprefix := \"main\"\n\tif !strings.HasPrefix(value, prefix) {\n\t\tt.Fatalf(\"expected %s to have prefix %s\", value, prefix)\n\t}\n}", "func cleancompstr(cleanup string) string {\n\tcleanup = strings.TrimSpace(cleanup)\n\tcleanup = strings.ToLower(cleanup)\n\treturn cleanup\n}", "func badTemper(string, string) (*os.File, error) {\n\treturn nil, fmt.Errorf(\"oups\")\n}", "func (d *Abstraction) getGeneratedName(s string, m string) string {\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(s)\n\tbuffer.WriteString(\".\")\n\tbuffer.WriteString(m)\n\treturn buffer.String()\n}", "func helper(k string) interface{} {\n\treturn k\n}", "func getUsername() string {\n\tlog.Debug(\"getUsername\")\n\tu := \"unknown\"\n\tosUser := \"\"\n\n\tswitch runtime.GOOS {\n\tcase \"darwin\", \"linux\", \"solaris\":\n\t\tosUser = os.Getenv(\"USER\")\n\tcase \"windows\":\n\t\tosUser = os.Getenv(\"USERNAME\")\n\n\t\t// remove domain\n\t\tosUser = osUser[strings.LastIndex(osUser, \"\\\\\")+1:]\n\t\tlog.Debugf(\"Windows user has been transformed into %s\", osUser)\n\n\t\t// HACK ugly ... if localized administrator, translate to administrator\n\t\tif isWinAdministrator(osUser) {\n\t\t\tosUser = \"Administrator\"\n\t\t}\n\t}\n\n\tif osUser != \"\" {\n\t\tu = osUser\n\t}\n\treturn u\n}", "func getCaller(skip int, shortFileName bool) string {\n\tvar b strings.Builder\n\t_, file, no, ok := runtime.Caller(skip)\n\tif ok {\n\t\tif shortFileName {\n\t\t\tif lastSlashIndex := strings.LastIndex(file, \"/\"); lastSlashIndex != -1 {\n\t\t\t\tfile = file[lastSlashIndex+1:]\n\t\t\t}\n\t\t}\n\t\tfmt.Fprintf(&b, \"%s:%d\", file, no)\n\t}\n\treturn b.String()\n}", "func ensureTrailingDot(details string) string {\n\tif !strings.HasSuffix(details, \".\") {\n\t\treturn fmt.Sprintf(\"%s.\", details)\n\t}\n\treturn details\n}", "func isBadVersion(version int) bool{\n\treturn true\n}", "func TestGetWrongUUID(t *testing.T) {\n\tclearTable()\n nt := New{{.NameExported}}()\n add{{.NameExported}}(nt)\n badUid := \"00000000-d01d-4c09-a4e7-59026d143b89\"\n\n\tstatement := fmt.Sprintf({{.NameExported}}URL, badUid)\n\n\treq, _ := http.NewRequest(\"GET\", statement, nil)\n\tresponse := executeRequest(req)\n\n\tcheckResponseCode(t, http.StatusNotFound, response.Code)\n}", "func LegacyInstanceObjectID(obj *ResourceInstanceObjectSrc) string {\n\tif obj == nil {\n\t\treturn \"<not created>\"\n\t}\n\n\tif obj.AttrsJSON != nil {\n\t\ttype WithID struct {\n\t\t\tID string `json:\"id\"`\n\t\t}\n\t\tvar withID WithID\n\t\terr := json.Unmarshal(obj.AttrsJSON, &withID)\n\t\tif err == nil {\n\t\t\treturn withID.ID\n\t\t}\n\t} else if obj.AttrsFlat != nil {\n\t\tif flatID, exists := obj.AttrsFlat[\"id\"]; exists {\n\t\t\treturn flatID\n\t\t}\n\t}\n\n\t// For resource types created after we removed id as special there may\n\t// not actually be one at all. This is okay because older tests won't\n\t// encounter this, and new tests shouldn't be using ids.\n\treturn \"<none>\"\n}", "func getErrOrigin() string {\n\tvar origin string\n\tif pc, file, line, ok := runtime.Caller(2); ok {\n\t\tif f := runtime.FuncForPC(pc); f != nil {\n\t\t\tif wd, err := os.Getwd(); err == nil {\n\t\t\t\torigin = fmt.Sprintf(\"%s %s:%d\", strings.TrimPrefix(f.Name(), pkgPath), strings.TrimPrefix(file, wd+string(os.PathSeparator)), line)\n\t\t\t}\n\t\t}\n\t}\n\treturn origin\n}", "func (objectIDs *DbObjectIDs) getUniqueID() (string, error) {\n\tid := objectIDs.ownerControllerName + \":\" + string(objectIDs.idsType.ownerObjectType)\n\tfor _, key := range objectIDs.idsType.GetExternalIDKeys() {\n\t\tvalue, ok := objectIDs.objectIDs[key]\n\t\tif !ok {\n\t\t\treturn \"\", fmt.Errorf(\"key %v is required but not present\", key)\n\t\t}\n\t\tid += \":\" + value\n\t}\n\treturn id, nil\n}", "func getCallPriorityID(strPriorityName string, espXmlmc *apiLib.XmlmcInstStruct, buffer *bytes.Buffer) (string, string) {\n\tpriorityID := \"\"\n\tif swImportConf.PriorityMapping[strPriorityName] != nil {\n\t\tstrPriorityName = fmt.Sprintf(\"%s\", swImportConf.PriorityMapping[strPriorityName])\n\t\tif strPriorityName != \"\" {\n\t\t\tpriorityID = getPriorityID(strPriorityName, espXmlmc, buffer)\n\t\t}\n\t}\n\treturn priorityID, strPriorityName\n}" ]
[ "0.54382825", "0.537262", "0.5215815", "0.5027418", "0.4975398", "0.49496406", "0.48785368", "0.48031178", "0.4786201", "0.47657558", "0.47629273", "0.47359633", "0.47222048", "0.47043297", "0.47027624", "0.46904278", "0.46901387", "0.46885514", "0.46665755", "0.46659398", "0.46592057", "0.46564803", "0.46520862", "0.46506956", "0.4650385", "0.46303272", "0.46296483", "0.4629173", "0.4628825", "0.46284923", "0.4625966", "0.4624669", "0.46244738", "0.4619596", "0.46129894", "0.46062362", "0.4603694", "0.46027172", "0.46010837", "0.45992196", "0.4595422", "0.45953396", "0.45938143", "0.45878768", "0.45863846", "0.45860708", "0.45778158", "0.45708576", "0.4562223", "0.45579806", "0.45571515", "0.45400572", "0.4538702", "0.45375508", "0.45348978", "0.4533087", "0.4532056", "0.45305866", "0.45279145", "0.45279145", "0.45279145", "0.45279145", "0.45227525", "0.4520747", "0.45180294", "0.45163244", "0.45158538", "0.45143905", "0.45078984", "0.44996935", "0.44993386", "0.4499218", "0.44967684", "0.44954318", "0.44913954", "0.44851273", "0.44821027", "0.4480578", "0.4480466", "0.44804257", "0.4477861", "0.44712496", "0.44705343", "0.44680944", "0.44623426", "0.44565588", "0.4452436", "0.44511658", "0.44499886", "0.44494784", "0.44493905", "0.4445965", "0.44443068", "0.44378096", "0.4436986", "0.44309473", "0.44284478", "0.44276965", "0.44272083", "0.44260067", "0.44246325" ]
0.0
-1
This is a courtesy helper function, which in some cases may not work as expected!
func (s *VPCService) GetVPCByID(id string, opts ...OptionFunc) (*VPC, int, error) { p := &ListVPCsParams{} p.p = make(map[string]interface{}) p.p["id"] = id for _, fn := range append(s.cs.options, opts...) { if err := fn(s.cs, p); err != nil { return nil, -1, err } } l, err := s.ListVPCs(p) if err != nil { if strings.Contains(err.Error(), fmt.Sprintf( "Invalid parameter id value=%s due to incorrect long value format, "+ "or entity does not exist", id)) { return nil, 0, fmt.Errorf("No match found for %s: %+v", id, l) } return nil, -1, err } if l.Count == 0 { return nil, l.Count, fmt.Errorf("No match found for %s: %+v", id, l) } if l.Count == 1 { return l.VPCs[0], l.Count, nil } return nil, l.Count, fmt.Errorf("There is more then one result for VPC UUID: %s!", id) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func getHelperMethodIfNeeded(functionName string, indent string) (string, bool) {\n\tswitch functionName {\n\tcase \"filebase64sha256\":\n\t\treturn `function computeFilebase64sha256(path string) string {\n\tconst fileData = Buffer.from(fs.readFileSync(path), 'binary')\n\treturn crypto.createHash('sha256').update(fileData).digest('hex')\n}`, true\n\tcase \"notImplemented\":\n\t\treturn fmt.Sprintf(\n\t\t\t`%sfunction notImplemented(message: string) {\n%s throw new Error(message);\n%s}`, indent, indent, indent), true\n\tcase \"singleOrNone\":\n\t\treturn fmt.Sprintf(\n\t\t\t`%sfunction singleOrNone<T>(elements: pulumi.Input<T>[]): pulumi.Input<T> {\n%s if (elements.length != 1) {\n%s throw new Error(\"singleOrNone expected input list to have a single element\");\n%s }\n%s return elements[0];\n%s}`, indent, indent, indent, indent, indent, indent), true\n\tdefault:\n\t\treturn \"\", false\n\t}\n}", "func getHelperMethodIfNeeded(functionName string, indent string) (string, bool) {\n\tswitch functionName {\n\tcase \"filebase64\":\n\t\treturn `private static string ReadFileBase64(string path) {\n\t\treturn Convert.ToBase64String(System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path)));\n\t}`, true\n\tcase \"filebase64sha256\":\n\t\treturn `private static string ComputeFileBase64Sha256(string path) {\n\t\tvar fileData = System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path));\n\t\tvar hashData = SHA256.Create().ComputeHash(fileData);\n\t\treturn Convert.ToBase64String(hashData);\n\t}`, true\n\tcase \"sha1\":\n\t\treturn `private static string ComputeSHA1(string input) {\n\t\treturn BitConverter.ToString(\n\t\t\tSHA1.Create().ComputeHash(Encoding.UTF8.GetBytes(input))\n\t\t).Replace(\"-\",\"\").ToLowerInvariant());\n\t}`, true\n\tcase \"notImplemented\":\n\t\treturn fmt.Sprintf(`\n%sstatic object NotImplemented(string errorMessage) \n%s{\n%s throw new System.NotImplementedException(errorMessage);\n%s}`, indent, indent, indent, indent), true\n\tdefault:\n\t\treturn \"\", false\n\t}\n}", "func TestGetNone4A(t *testing.T) {\n}", "func (f *Ifacer) getUniqueImportName(pkgName string, level int) string {\n\tstrs := strings.Split(pkgName, string(filepath.Separator))\n\n\tlenStr := len(strs)\n\n\tif lenStr-1 < level {\n\t\tf.logger.Panicf(\"%d out of range\", level)\n\t}\n\n\tvar importName string\n\tfor _, str := range strs[lenStr-level-1:] {\n\t\tif strings.Contains(str, \".\") {\n\t\t\tstr = strings.Replace(str, \".\", \"\", -1)\n\t\t}\n\t\timportName += str\n\t}\n\n\treturn importName\n}", "func DummyStringGetterFunction(name string) string {\n\treturn name\n}", "func almostOkayFunction() {\n\treturn nil\n}", "func isBadVersion(version int) bool{\n return false\n}", "func trimCaller(funcName string) string {\n\t// ex:\n\t// funcName = \"github.com/ddo/request.(*Client).Request\"\n\t// arrDir = [github.com ddo request.(*Client).Request]\n\t// lastDir = request.(*Client).Request\n\t// arrCaller = [request. (*Client).Request]\n\n\tarrDir := strings.Split(funcName, \"/\")\n\tlastDir := arrDir[len(arrDir)-1]\n\tarrCaller := strings.Split(lastDir, \".\")\n\n\tif len(arrCaller) < 2 {\n\t\treturn \"\"\n\t}\n\n\treturn arrCaller[len(arrCaller)-1]\n}", "func getValidPrefix(s string, base int64) string {\n\ttrace_util_0.Count(_util_00000, 47)\n\tvar (\n\t\tvalidLen int\n\t\tupper rune\n\t)\n\tswitch {\n\tcase base >= 2 && base <= 9:\n\t\ttrace_util_0.Count(_util_00000, 51)\n\t\tupper = rune('0' + base)\n\tcase base <= 36:\n\t\ttrace_util_0.Count(_util_00000, 52)\n\t\tupper = rune('A' + base - 10)\n\tdefault:\n\t\ttrace_util_0.Count(_util_00000, 53)\n\t\treturn \"\"\n\t}\n\ttrace_util_0.Count(_util_00000, 48)\nLoop:\n\tfor i := 0; i < len(s); i++ {\n\t\ttrace_util_0.Count(_util_00000, 54)\n\t\tc := rune(s[i])\n\t\tswitch {\n\t\tcase unicode.IsDigit(c) || unicode.IsLower(c) || unicode.IsUpper(c):\n\t\t\ttrace_util_0.Count(_util_00000, 55)\n\t\t\tc = unicode.ToUpper(c)\n\t\t\tif c < upper {\n\t\t\t\ttrace_util_0.Count(_util_00000, 58)\n\t\t\t\tvalidLen = i + 1\n\t\t\t} else {\n\t\t\t\ttrace_util_0.Count(_util_00000, 59)\n\t\t\t\t{\n\t\t\t\t\tbreak Loop\n\t\t\t\t}\n\t\t\t}\n\t\tcase c == '+' || c == '-':\n\t\t\ttrace_util_0.Count(_util_00000, 56)\n\t\t\tif i != 0 {\n\t\t\t\ttrace_util_0.Count(_util_00000, 60)\n\t\t\t\tbreak Loop\n\t\t\t}\n\t\tdefault:\n\t\t\ttrace_util_0.Count(_util_00000, 57)\n\t\t\tbreak Loop\n\t\t}\n\t}\n\ttrace_util_0.Count(_util_00000, 49)\n\tif validLen > 1 && s[0] == '+' {\n\t\ttrace_util_0.Count(_util_00000, 61)\n\t\treturn s[1:validLen]\n\t}\n\ttrace_util_0.Count(_util_00000, 50)\n\treturn s[:validLen]\n}", "func sanitizePackageName(importPath string) string {\n\talias := path.Base(importPath)\n\n\t// alias should be lower case\n\talias = strings.ToLower(alias)\n\n\t// alias should now only contain alphanumerics\n\timportsRegex := regexp.MustCompile(`[^a-z0-9]`)\n\talias = importsRegex.ReplaceAllString(alias, \"\")\n\n\t// can't have a first digit, per Go identifier rules, so just skip them\n\talias = strings.TrimLeftFunc(alias, unicode.IsDigit)\n\n\t// If path part was all digits, we may be left with an empty string. In this case use \"pkg\" as the alias.\n\tif alias == \"\" {\n\t\talias = \"pkg\"\n\t}\n\n\treturn alias\n}", "func TestPrewriteWrittenNoConflict4A(t *testing.T) {\n}", "func getOID(oid string) (string, error) {\n\tif strings.HasPrefix(oid, \".\") {\n\t\treturn oid, nil\n\t}\n\tmu.Lock()\n\tdefer mu.Unlock()\n\tfixed, ok := lookupOID[oid]\n\tif !ok {\n\t\treturn oid, errors.Errorf(\"no OID found for %s\", oid)\n\t}\n\treturn fixed, nil\n}", "func legacyFileName(prefix, instance, class, id string) string {\n\tvar fileName string\n\tinstance = strings.Replace(instance, \"\\\\\", \"__\", -1)\n\n\t// use it to build the file name\n\tif prefix == \"\" {\n\t\tfileName = fmt.Sprintf(\"%s_%s_%s.status\", instance, class, id)\n\t} else {\n\t\tfileName = fmt.Sprintf(\"%s_%s_%s_%s.status\", prefix, instance, class, id)\n\t}\n\treturn fileName\n}", "func uniquePackageOf(fd *descriptor.FileDescriptorProto) string {\n\ts, ok := uniquePackageName[fd]\n\tif !ok {\n\t\tlog.Fatal(\"internal error: no package name defined for \" + fd.GetName())\n\t}\n\treturn s\n}", "func getForcedGetter(sourceUrl string) (string, string) {\n\tif matches := forcedRegexp.FindStringSubmatch(sourceUrl); matches != nil && len(matches) > 2 {\n\t\treturn matches[1], matches[2]\n\t}\n\n\treturn \"\", sourceUrl\n}", "func getFullyQualifiedFunctionName(fn interface{}) string {\n\treturn runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()\n}", "func TestEmptyPrewrite4A(t *testing.T) {\n}", "func internalStartsWith(str string, prefix string, ignoreCase bool) bool {\n\tif str == \"\" || prefix == \"\" {\n\t\treturn (str == \"\" && prefix == \"\")\n\t}\n\tif utf8.RuneCountInString(prefix) > utf8.RuneCountInString(str) {\n\t\treturn false\n\t}\n\tif ignoreCase {\n\t\treturn strings.HasPrefix(strings.ToLower(str), strings.ToLower(prefix))\n\t}\n\treturn strings.HasPrefix(str, prefix)\n}", "func TestGetEmpty4A(t *testing.T) {\n}", "func ExampleMustSqueezeTrytes() {}", "func getAliasId(name string, mountAccessor string, entityAliasList *map[string]EntityAlias) string {\n\tfor aliasID, alias := range *entityAliasList {\n\t\tif alias.Name == name && alias.MountAccessor == mountAccessor {\n\t\t\treturn aliasID\n\t\t}\n\t}\n\treturn \"\"\n}", "func getInternalParentPrefix(pkgName string) string {\n\tcleanedPath := filepath.Clean(pkgName)\n\texplodedPath := strings.Split(cleanedPath, string(os.PathSeparator))\n\n\ti := len(explodedPath) - 1\n\tfor ; i > 0; i-- {\n\t\tif explodedPath[i] == internal {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn filepath.Join(explodedPath[0:i]...)\n}", "func smallestGoodBase(n string) string {\n \n}", "func idFromName(name string) string {\n\ts := strings.Split(strings.ToLower(strings.TrimSpace(name)), \" \")\n\tns := strings.Join(s, \"-\")\n\ts = strings.Split(ns, \".\")\n\treturn strings.Join(s, \"-\")\n}", "func packageName(skip int) (long, short string, ok bool) {\n\t// Full function name looks like path/to/pkg.Func\n\tvar f string\n\t_, _, f, ok = fullCaller(skip + 1)\n\tif !ok {\n\t\treturn\n\t}\n\n\t// Strip down to path/to/pkg\n\tdot := strings.LastIndex(f, \".\")\n\tif dot == -1 {\n\t\treturn\n\t}\n\tlong = f[:dot]\n\n\t// Strip down to pkg\n\tslash := strings.LastIndex(long, \"/\")\n\tif slash == -1 {\n\t\treturn\n\t}\n\tshort = long[slash+1:]\n\treturn\n}", "func TestSinglePrewrite4A(t *testing.T) {\n}", "func getPathConversionFunction() func(string) string {\n\tif runtime.GOOS != \"windows\" || os.Getenv(\"DOCKER_MACHINE_NAME\") == \"\" {\n\t\treturn func(path string) string { return path }\n\t}\n\n\treturn func(path string) string {\n\t\treturn fmt.Sprintf(\"/%s%s\", strings.ToUpper(path[:1]), path[2:])\n\t}\n}", "func FullNameNakedReturn(f, l string) (full string, length int) {\n full = f + \" \" + l;\n length = len(full)\n return \n}", "func TestManifestAPI_Get_UnknownSchema(t *testing.T) {}", "func resolveSourcePrefix(source string, sa Source) string {\n\tif sa.Prefix == \"false\" || sa.Prefix == \"\" {\n\t\treturn \"\"\n\t} else if sa.Prefix == \"true\" {\n\t\treturn source + \"_\"\n\t} else {\n\t\treturn sa.Prefix + \"_\"\n\t}\n}", "func checkSafeNameChars(nameFragment string) error {\n\tfor i, ch := range nameFragment {\n\t\tswitch {\n\t\tcase 'a' <= ch && ch <= 'z':\n\t\tcase '0' <= ch && ch <= '9':\n\t\tcase ch == '_':\n\t\tdefault:\n\t\t\treturn fmt.Errorf(\"Name fragment is not safe: %x at %d.\", ch, i)\n\t\t}\n\t\t// NO: case ch == '.'\n\t\t// Could also allow at most one dot but not for SQLite.\n\t\t// Maybe would make sense for other SQL DBMS which\n\t\t// use schema names / namespaces.\n\t}\n\treturn nil\n}", "func isCommonRetryableErrorCode(err error) (bool, string) {\n\tgerr, ok := err.(*googleapi.Error)\n\tif !ok {\n\t\treturn false, \"\"\n\t}\n\n\tif gerr.Code == 429 || gerr.Code == 500 || gerr.Code == 502 || gerr.Code == 503 {\n\t\tlog.Printf(\"[DEBUG] Dismissed an error as retryable based on error code: %s\", err)\n\t\treturn true, fmt.Sprintf(\"Retryable error code %d\", gerr.Code)\n\t}\n\treturn false, \"\"\n}", "func goodFunction() {\n\treturn nil\n}", "func getCallerPackage() (string, bool) {\n\tvar pkg string\n\tpc, _, _, ok := runtime.Caller(2)\n\tif !ok {\n\t\treturn pkg, false\n\t}\n\tparts := strings.Split(runtime.FuncForPC(pc).Name(), \".\")\n\tif parts[len(parts)-2][0] == '(' {\n\t\tpkg = strings.Join(parts[0:len(parts)-2], \".\")\n\t} else {\n\t\tpkg = strings.Join(parts[0:len(parts)-1], \".\")\n\t}\n\treturn pkg, true\n}", "func _getFuncName() string {\n var ptrVal = _getFuncPtrVal()\n\n // Look up the function object\n var fun = runtime.FuncForPC(ptrVal)\n\n // returns: _/home/user/src/gohavenet/src.TestProcMgr_False\n var funcNamePath = fun.Name()\n\n // Split on the slash and return just the func name\n var pathElems = strings.Split(funcNamePath, \"/\")\n var index = len(pathElems) - 1\n if index < 0 {\n index = 0\n }\n\n return pathElems[index]\n}", "func getPatchVersionTrimmed(version string) string {\n\tendIndex := strings.LastIndex(version, \".\")\n\tif endIndex != -1 {\n\t\tversion = version[:endIndex]\n\t}\n\treturn version\n}", "func fixLegacyInventoryName(obj *unstructured.Unstructured) error {\n\tif obj.GetName() == legacyInvName {\n\t\tklog.V(4).Infof(\"renaming legacy inventory name\")\n\t\trandomSuffix := common.RandomStr()\n\t\treturn addSuffixToName(obj, randomSuffix)\n\t}\n\treturn nil\n}", "func callerName(skip int) (pkgPath, funcName string, ok bool) {\n\tvar pc [1]uintptr\n\tn := runtime.Callers(skip+1, pc[:])\n\tif n != 1 {\n\t\treturn \"\", \"\", false\n\t}\n\n\tf := runtime.FuncForPC(pc[0]).Name()\n\ts := pkgPathRe.FindStringSubmatch(f)\n\tif len(s) < 3 {\n\t\tpanic(fmt.Errorf(\"failed to extract package path and function name from %q\", f))\n\t}\n\n\treturn s[1], s[2], true\n}", "func getValidContainerName(volumeName, protocol string) string {\n\tcontainerName := strings.ToLower(volumeName)\n\tif len(containerName) > containerNameMaxLength {\n\t\tcontainerName = containerName[0:containerNameMaxLength]\n\t}\n\tif !checkContainerNameBeginAndEnd(containerName) || len(containerName) < containerNameMinLength {\n\t\t// now we set as 63 for maximum container name length\n\t\t// todo: get cluster name\n\t\tcontainerName = k8sutil.GenerateVolumeName(fmt.Sprintf(\"pvc-%s\", protocol), uuid.NewUUID().String(), 63)\n\t\tklog.Warningf(\"the requested volume name (%q) is invalid, so it is regenerated as (%q)\", volumeName, containerName)\n\t}\n\tcontainerName = strings.Replace(containerName, \"--\", \"-\", -1)\n\n\treturn containerName\n}", "func funcName() string {\n\tpc, _, _, _ := runtime.Caller(1)\n\tcompleteFuncname := runtime.FuncForPC(pc).Name()\n\treturn strings.Split(completeFuncname, \".\")[len(strings.Split(completeFuncname, \".\"))-1]\n}", "func ensureValidHelper(name string, funcValue reflect.Value) {\n\tif funcValue.Kind() != reflect.Func {\n\t\tpanic(fmt.Errorf(\"Helper must be a function: %s\", name))\n\t}\n\n\tfuncType := funcValue.Type()\n\n\tif funcType.NumOut() != 1 {\n\t\tpanic(fmt.Errorf(\"Helper function must return a string or a SafeString: %s\", name))\n\t}\n\n\t// @todo Check if first returned value is a string, SafeString or interface{} ?\n}", "func exactFunction() {\n\treturn nil\n}", "func TestUidForUsername(t *testing.T) {\n\tuid, err := uidForUsername(\"root\")\n\tif err != nil {\n\t\tt.Errorf(\"uidForUsername(\\\"root\\\") returned error: %v\", err)\n\t\treturn\n\t}\n\tif uid != 0 {\n\t\tt.Errorf(\"uidForUsername(\\\"root\\\") returned %d, should be 0\", uid)\n\t}\n\n\t_, err = uidForUsername(\"asdfASDFxxx999\")\n\tif err == nil {\n\t\tt.Errorf(\"uidForUsername(\\\"asdfASDFxxx\\\") did not return error\")\n\t\treturn\n\t}\n}", "func getGroupIdString(id interface{}) (gid string, err error) {\r\n\tswitch t := id.(type) {\r\n\tcase string:\r\n\t\tif strings.Contains(id.(string), \"http\") {\r\n\t\t\treturn \"url=\" + url.QueryEscape(id.(string)), nil // group url\r\n\t\t}\r\n\t\treturn id.(string), nil // group id as a string\r\n\tcase uint64:\r\n\t\treturn strconv.FormatUint(id.(uint64), 10), nil // group id as an int\r\n\tdefault:\r\n\t\treturn gid, errors.New(fmt.Sprintf(\"Group ID type exception: Expecting string or uint64 got %T\", t))\r\n\t}\r\n}", "func GoodEnoughUUID() string {\n\tb := make([]byte, 16)\n\t_, err := rand.Read(b)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tuuid := fmt.Sprintf(\"%x-%x-%x-%x-%x\",\n\t\tb[0:4], b[4:6], b[6:8], b[8:10], b[10:])\n\treturn uuid\n}", "func mustBeUnique(label string) {\n\n\tif _, ok := functions[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as function\", label))\n\t}\n\n\tif _, ok := variables[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as variable\", label))\n\t}\n\n\tif _, ok := aliases[label]; ok {\n\t\tpanic(fmt.Sprintf(\"%s already defined as alias\", label))\n\t}\n}", "func ensureDot(extension string) string {\n\tif strings.Index(extension, \".\") == -1 {\n\t\textension = \".\" + extension\n\t}\n\treturn extension\n}", "func getSafeString(input interface{}) string {\r\n\tvar safeValue string\r\n\tvar isOk bool\r\n\r\n\tif input == nil {\r\n\t\tsafeValue = \"\"\r\n\t} else {\r\n\t\tsafeValue, isOk = input.(string)\r\n\t\tif isOk == false {\r\n\t\t\tsafeValue = \"\"\r\n\t\t}\r\n\t}\r\n\treturn safeValue\r\n}", "func mustGetUUID() string {\n\tu, err := uuid.NewRandom()\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\treturn u.String()\n}", "func fn3() { // want fn3:`Deprecated: Don't use this\\.`\n}", "func ensurePrefix(s, prefix string) string {\n\tif !strings.HasPrefix(s, prefix) {\n\t\ts = prefix + s\n\t}\n\treturn s\n}", "func prepareHashPath(path, prefix string) string {\n\t// I need to strip the prefix. But... where does the prefix come from\n\treturn \"/\" + strings.TrimPrefix(path, prefix)\n}", "func pySafeName(nm string) string {\n\tif _, bad := pyKeywords[nm]; bad {\n\t\treturn \"my\" + nm\n\t}\n\treturn nm\n}", "func fullCaller(skip int) (file string, line int, fnc string, ok bool) {\n\tvar pc uintptr\n\tpc, file, line, ok = runtime.Caller(skip + 1)\n\tif !ok {\n\t\treturn\n\t}\n\n\tf := runtime.FuncForPC(pc)\n\tfnc = f.Name()\n\treturn\n}", "func getValidVersion(version string) string {\n\tif version != \"\" {\n\t\treturn version\n\t}\n\n\treturn \"Not Installed\"\n}", "func makeSafeFileName(s string) string {\n\tconst maxLen = 200 // slightly arbitrary but must be <= 254 for most modern filesystems\n\n\t// First, tidy the file path to a clean representation\n\tresult := filepath.Clean(s)\n\n\t// Next, split the path into elements between separators and check each element.\n\telements := filepath.SplitList(result)\n\tnewElements := []string{}\n\n\tfor _, element := range elements {\n\t\tnewElements = append(newElements, makeSafeFileElement(element))\n\t}\n\n\tresult = filepath.Join(newElements...)\n\n\t// Also avoid starting a file name with a period as this has a special meaning on UNIX\n\t// and UNIX-like systems.\n\tdir := filepath.Dir(result)\n\tbase := filepath.Base(result)\n\n\tif base[0] == '.' {\n\t\tresult = filepath.Join(dir, base[1:])\n\t}\n\n\t// Ensure the resulting name isn't too long, as X.509 distinguished names can be very long.\n\tif len(result) > maxLen {\n\t\tresult = result[:maxLen]\n\t}\n\n\treturn result\n}", "func TestDiskIOStats_diskName(t *testing.T) {\n\ttests := []struct {\n\t\ttemplates []string\n\t\texpected string\n\t}{\n\t\t{[]string{\"$MY_PARAM_1\"}, \"myval1\"},\n\t\t{[]string{\"${MY_PARAM_1}\"}, \"myval1\"},\n\t\t{[]string{\"x$MY_PARAM_1\"}, \"xmyval1\"},\n\t\t{[]string{\"x${MY_PARAM_1}x\"}, \"xmyval1x\"},\n\t\t{[]string{\"$MISSING\", \"$MY_PARAM_1\"}, \"myval1\"},\n\t\t{[]string{\"$MY_PARAM_1\", \"$MY_PARAM_2\"}, \"myval1\"},\n\t\t{[]string{\"$MISSING\"}, \"null\"},\n\t\t{[]string{\"$MY_PARAM_1/$MY_PARAM_2\"}, \"myval1/myval2\"},\n\t\t{[]string{\"$MY_PARAM_2/$MISSING\"}, \"null\"},\n\t}\n\n\tfor _, tc := range tests {\n\t\tfunc() {\n\t\t\ts := DiskIO{\n\t\t\t\tNameTemplates: tc.templates,\n\t\t\t}\n\t\t\tdefer setupNullDisk(t, &s, \"null\")() //nolint:revive // done on purpose, cleaning will be executed properly\n\t\t\tname, _ := s.diskName(\"null\")\n\t\t\trequire.Equal(t, tc.expected, name, \"Templates: %#v\", tc.templates)\n\t\t}()\n\t}\n}", "func pySafeArg(anm string, idx int) string {\n\tif anm == \"\" {\n\t\tanm = fmt.Sprintf(\"arg_%d\", idx)\n\t}\n\treturn pySafeName(anm)\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func _escFSMustByte(useLocal bool, name string) []byte {\n\tb, err := _escFSByte(useLocal, name)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func TestAliasingRecursionInvalid(t *testing.T) {\n\t_, errs := PrototypeString(`alias x = x\n\t\tx`)\n\tgoutil.AssertNow(t, errs != nil, \"errs should not be nil\")\n}", "func getPackageName(f string) string {\n\tfor {\n\t\tlastPeriod := strings.LastIndex(f, \".\")\n\t\tlastSlash := strings.LastIndex(f, \"/\")\n\t\tif lastPeriod > lastSlash {\n\t\t\tf = f[:lastPeriod]\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn f\n}", "func getFunctionName(fn interface{}) string {\n\tname := runtime.FuncForPC(reflect.ValueOf(fn).Pointer()).Name()\n\n\t// Method above returns functions in the form : main.foo\n\tparts := strings.Split(name, \".\")\n\treturn parts[len(parts)-1]\n}", "func cleanUserName(userName string) string {\n\tuserName = strings.Replace(userName, \"-\", \"\", -1)\n\tuserName = strings.Replace(userName, \".\", \"\", -1)\n\tuserName = strings.Replace(userName, \"_\", \"\", -1)\n\treturn strings.ToLower(userName)\n}", "func CheckIDFormat(ComponentID string) bool {\n if len(ComponentID) != 9 {\n // check the length of the ComponentID is nine\n return false\n } else if _, err := strconv.Atoi(ComponentID); err != nil {\n // check the ComponentID are all digits\n return false\n } else {\n // now everything looks fine\n return true\n }\n}", "func getSinglePath(v interface{}) (string, error) {\n\tif name, err := resourceName(v); err != nil {\n\t\treturn \"\", err\n\t} else if id, err := resourceId(v); err != nil {\n\t\treturn \"\", err\n\t} else {\n\t\treturn fmt.Sprintf(\"%s(%d)\", name, id), nil\n\t}\n}", "func getUserIdString(id string) (uid string) {\r\n\tif id == \"~\" || id == \"\" {\r\n\t\treturn \"~\" // me\r\n\t} else if strings.Contains(id, \"http\") {\r\n\t\treturn \"url=\" + url.QueryEscape(id) // someone else\r\n\t} else {\r\n\t\treturn \"id=\" + id // someone else's url\r\n\t}\r\n}", "func TestSanitizedName(t *testing.T) {\n\ttables := []struct {\n\t\tbadPath string\n\t\tgoodPath string\n\t}{\n\t\t{\"\\\\..\\\\1.txt\", \"1.txt\"},\n\t\t{\"///foo/bar\", \"foo/bar\"},\n\t\t{\"C:/loo/bar2\", \"loo/bar2\"},\n\t\t{\"C:\\\\loo\\\\bar2\", \"loo\\\\bar2\"},\n\t\t{\"../../foo../../ba..r\", \"foo../ba..r\"},\n\t\t{\"../my.file\", \"my.file\"},\n\t}\n\tfor _, table := range tables {\n\t\tfixedPath := sanitizedName(table.badPath)\n\t\tif fixedPath != table.goodPath {\n\t\t\tt.Errorf(\"expected and fixedPath didn't match - %s : %s\", table.goodPath, fixedPath)\n\t\t}\n\t}\n}", "func TestPrewriteMultiple4A(t *testing.T) {\n}", "func OldGetAnnotation(c, name string) string {\n\tprefix := fmt.Sprintf(\"+%s:\", name)\n\tif strings.HasPrefix(c, prefix) {\n\t\treturn strings.TrimPrefix(c, prefix)\n\t}\n\treturn \"\"\n}", "func getReqNameId(reqIIdList []cres.IID, driverNameId string) string {\n\tfor _, iid := range reqIIdList {\n\t\tif iid.SystemId == driverNameId {\n\t\t\treturn iid.NameId\n\t\t}\n\t}\n\treturn \"\"\n}", "func getAbsoluteURL(item *string, original_item string, url *url.URL) {\n var domain string = strings.Join(strings.Split(url.String(), \"/\")[:3], \"/\")\n if (strings.HasPrefix(*item, \"/\")) {\n if (strings.HasSuffix(url.String(), \"/\")) {\n *item = domain + (*item)[1:]\n } else {\n *item = domain + *item\n }\n utils.Log.Printf(\"[*] Modified item for URL for %s. Transformed from %s to %s\\n\", url, original_item, *item)\n }\n\n if (strings.HasPrefix(url.String(), \" \")) {\n *item = (*item)[1:]\n utils.Log.Printf(\"[*] Modified %s. Removed space from %s on %s\\n\", *item, original_item, url)\n }\n\n\n}", "func TestSimpleParser_baseUrl_err(t *testing.T) {\n\tif baseUrl(\"1234\") != \"1234\" {\n\t\tt.Logf(\"baseUrl method is expected to return original link on error\")\n\t\tt.FailNow()\n\t}\n}", "func notTested() string {\n\treturn \"This function isn't tested!\"\n}", "func asSupportedParameter(param string) (string, bool) {\n\tlower := strings.ToLower(param)\n\treturn lower, lowerCaseParameters[lower]\n}", "func getUID(lib utils.PathIdentifier) string {\n\treturn lib.Key()[:5]\n}", "func LegacyOrigin(parts ...string) (ret string) {\n\tfor index, i := range parts {\n\t\tret += i\n\t\tif index < len(parts)-1 {\n\t\t\tret += LegacyOriginSeparator\n\t\t}\n\t}\n\treturn\n}", "func getFullName()(string, string) {\n\treturn \"Ninja\", \"Coder\"\n}", "func generateUUID() string {\n uuid4, _ := uuid.NewV4()\n return uuid4.String()\n}", "func getInternalMountPath(workingMountDir string, vol *smbVolume) string {\n\tif vol == nil {\n\t\treturn \"\"\n\t}\n\tmountDir := vol.uuid\n\tif vol.uuid == \"\" {\n\t\tmountDir = vol.subDir\n\t}\n\treturn filepath.Join(workingMountDir, mountDir)\n}", "func shadowedByParam2() (math string, fmt int) { return }", "func wrapClientID(clientID string) string {\n\thostname, err := os.Hostname()\n\tif err != nil {\n\t\thostname = \"<error>\"\n\t}\n\n\t// Replace all non-alphanumeric chars with something benign that will work in the client id.\n\tre := regexp.MustCompile(\"[^a-zA-Z0-9]+\")\n\thostname = re.ReplaceAllString(hostname, \"-\")\n\n\t// Special case for running locally, add random\n\tif runtime.GOOS == \"darwin\" {\n\t\thostname += strconv.Itoa(rand.Intn(100))\n\t\treturn fmt.Sprintf(\"%s-%s\", clientID, hostname)\n\t}\n\treturn fmt.Sprintf(\"%s-%s\", clientID, hostname)\n}", "func getShorterString(a string, b string) int {\n\tif len(a) <= len(b) {\n\t\treturn len(a)\n\t}\n\treturn len(b)\n}", "func callerShortfile(file string, lastsep_ ...rune) string {\n\tlastsep := '/'\n\tif len(lastsep_) > 0 {\n\t\tlastsep = lastsep_[0]\n\t}\n\tshort := file\n\tfor i := len(file) - 1; i > 0; i-- {\n\t\tif file[i] == byte(lastsep) {\n\t\t\tshort = file[i+1:]\n\t\t\tbreak\n\t\t}\n\t}\n\treturn short\n}", "func unqualify(importPath string) string {\n\tif i := strings.LastIndex(importPath, sep); i != -1 {\n\t\timportPath = importPath[i+len(sep):]\n\t}\n\treturn importPath\n}", "func Test_HasPrefix(t *testing.T) {\n\tvalue := \"main.go\"\n\tprefix := \"main\"\n\tif !strings.HasPrefix(value, prefix) {\n\t\tt.Fatalf(\"expected %s to have prefix %s\", value, prefix)\n\t}\n}", "func cleancompstr(cleanup string) string {\n\tcleanup = strings.TrimSpace(cleanup)\n\tcleanup = strings.ToLower(cleanup)\n\treturn cleanup\n}", "func badTemper(string, string) (*os.File, error) {\n\treturn nil, fmt.Errorf(\"oups\")\n}", "func (d *Abstraction) getGeneratedName(s string, m string) string {\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(s)\n\tbuffer.WriteString(\".\")\n\tbuffer.WriteString(m)\n\treturn buffer.String()\n}", "func helper(k string) interface{} {\n\treturn k\n}", "func getUsername() string {\n\tlog.Debug(\"getUsername\")\n\tu := \"unknown\"\n\tosUser := \"\"\n\n\tswitch runtime.GOOS {\n\tcase \"darwin\", \"linux\", \"solaris\":\n\t\tosUser = os.Getenv(\"USER\")\n\tcase \"windows\":\n\t\tosUser = os.Getenv(\"USERNAME\")\n\n\t\t// remove domain\n\t\tosUser = osUser[strings.LastIndex(osUser, \"\\\\\")+1:]\n\t\tlog.Debugf(\"Windows user has been transformed into %s\", osUser)\n\n\t\t// HACK ugly ... if localized administrator, translate to administrator\n\t\tif isWinAdministrator(osUser) {\n\t\t\tosUser = \"Administrator\"\n\t\t}\n\t}\n\n\tif osUser != \"\" {\n\t\tu = osUser\n\t}\n\treturn u\n}", "func getCaller(skip int, shortFileName bool) string {\n\tvar b strings.Builder\n\t_, file, no, ok := runtime.Caller(skip)\n\tif ok {\n\t\tif shortFileName {\n\t\t\tif lastSlashIndex := strings.LastIndex(file, \"/\"); lastSlashIndex != -1 {\n\t\t\t\tfile = file[lastSlashIndex+1:]\n\t\t\t}\n\t\t}\n\t\tfmt.Fprintf(&b, \"%s:%d\", file, no)\n\t}\n\treturn b.String()\n}", "func ensureTrailingDot(details string) string {\n\tif !strings.HasSuffix(details, \".\") {\n\t\treturn fmt.Sprintf(\"%s.\", details)\n\t}\n\treturn details\n}", "func isBadVersion(version int) bool{\n\treturn true\n}", "func TestGetWrongUUID(t *testing.T) {\n\tclearTable()\n nt := New{{.NameExported}}()\n add{{.NameExported}}(nt)\n badUid := \"00000000-d01d-4c09-a4e7-59026d143b89\"\n\n\tstatement := fmt.Sprintf({{.NameExported}}URL, badUid)\n\n\treq, _ := http.NewRequest(\"GET\", statement, nil)\n\tresponse := executeRequest(req)\n\n\tcheckResponseCode(t, http.StatusNotFound, response.Code)\n}", "func LegacyInstanceObjectID(obj *ResourceInstanceObjectSrc) string {\n\tif obj == nil {\n\t\treturn \"<not created>\"\n\t}\n\n\tif obj.AttrsJSON != nil {\n\t\ttype WithID struct {\n\t\t\tID string `json:\"id\"`\n\t\t}\n\t\tvar withID WithID\n\t\terr := json.Unmarshal(obj.AttrsJSON, &withID)\n\t\tif err == nil {\n\t\t\treturn withID.ID\n\t\t}\n\t} else if obj.AttrsFlat != nil {\n\t\tif flatID, exists := obj.AttrsFlat[\"id\"]; exists {\n\t\t\treturn flatID\n\t\t}\n\t}\n\n\t// For resource types created after we removed id as special there may\n\t// not actually be one at all. This is okay because older tests won't\n\t// encounter this, and new tests shouldn't be using ids.\n\treturn \"<none>\"\n}", "func getErrOrigin() string {\n\tvar origin string\n\tif pc, file, line, ok := runtime.Caller(2); ok {\n\t\tif f := runtime.FuncForPC(pc); f != nil {\n\t\t\tif wd, err := os.Getwd(); err == nil {\n\t\t\t\torigin = fmt.Sprintf(\"%s %s:%d\", strings.TrimPrefix(f.Name(), pkgPath), strings.TrimPrefix(file, wd+string(os.PathSeparator)), line)\n\t\t\t}\n\t\t}\n\t}\n\treturn origin\n}", "func (objectIDs *DbObjectIDs) getUniqueID() (string, error) {\n\tid := objectIDs.ownerControllerName + \":\" + string(objectIDs.idsType.ownerObjectType)\n\tfor _, key := range objectIDs.idsType.GetExternalIDKeys() {\n\t\tvalue, ok := objectIDs.objectIDs[key]\n\t\tif !ok {\n\t\t\treturn \"\", fmt.Errorf(\"key %v is required but not present\", key)\n\t\t}\n\t\tid += \":\" + value\n\t}\n\treturn id, nil\n}", "func getCallPriorityID(strPriorityName string, espXmlmc *apiLib.XmlmcInstStruct, buffer *bytes.Buffer) (string, string) {\n\tpriorityID := \"\"\n\tif swImportConf.PriorityMapping[strPriorityName] != nil {\n\t\tstrPriorityName = fmt.Sprintf(\"%s\", swImportConf.PriorityMapping[strPriorityName])\n\t\tif strPriorityName != \"\" {\n\t\t\tpriorityID = getPriorityID(strPriorityName, espXmlmc, buffer)\n\t\t}\n\t}\n\treturn priorityID, strPriorityName\n}" ]
[ "0.54391617", "0.537337", "0.52153504", "0.5027685", "0.49748364", "0.49492276", "0.48793", "0.48030773", "0.47867504", "0.47672582", "0.47625", "0.47365943", "0.47231343", "0.47052392", "0.47017908", "0.4690704", "0.46896505", "0.468837", "0.46661186", "0.46651876", "0.4660059", "0.46563408", "0.46526176", "0.46522498", "0.46515664", "0.46304148", "0.46294066", "0.46291944", "0.4628808", "0.4628634", "0.4626985", "0.46251827", "0.4623576", "0.46198753", "0.46133012", "0.46065894", "0.46041447", "0.46031842", "0.46007428", "0.45996395", "0.45949078", "0.45948225", "0.4594602", "0.4587584", "0.458685", "0.45861182", "0.45775196", "0.4569256", "0.45618016", "0.4558084", "0.45567307", "0.45398208", "0.45388", "0.4538208", "0.45349208", "0.45334432", "0.45327297", "0.45305002", "0.45284516", "0.45284516", "0.45284516", "0.45284516", "0.45226273", "0.45218483", "0.4518053", "0.45167843", "0.4516224", "0.45142642", "0.45080796", "0.4499888", "0.44995216", "0.44993803", "0.44969517", "0.44944692", "0.44919115", "0.44850907", "0.44817296", "0.44817045", "0.44809243", "0.44796196", "0.4477853", "0.44706628", "0.4470178", "0.44692436", "0.44620207", "0.4457153", "0.445306", "0.44515565", "0.44502005", "0.44491532", "0.44488847", "0.44454673", "0.44444677", "0.44380328", "0.44369042", "0.44313204", "0.44297668", "0.4428367", "0.44268107", "0.44261277", "0.44246167" ]
0.0
-1
You should always use this function to get a new RestartVPCParams instance, as then you are sure you have configured all required params
func (s *VPCService) NewRestartVPCParams(id string) *RestartVPCParams { p := &RestartVPCParams{} p.p = make(map[string]interface{}) p.p["id"] = id return p }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (client *CloudServiceRoleInstancesClient) restartCreateRequest(ctx context.Context, roleInstanceName string, resourceGroupName string, cloudServiceName string, options *CloudServiceRoleInstancesBeginRestartOptions) (*azcore.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/roleInstances/{roleInstanceName}/restart\"\n\tif roleInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter roleInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{roleInstanceName}\", url.PathEscape(roleInstanceName))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := azcore.NewRequest(ctx, http.MethodPost, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\treqQP := req.URL.Query()\n\treqQP.Set(\"api-version\", \"2021-03-01\")\n\treq.URL.RawQuery = reqQP.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *CloudServicesClient) restartCreateRequest(ctx context.Context, resourceGroupName string, cloudServiceName string, options *CloudServicesClientBeginRestartOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/restart\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-09-04\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\tif options != nil && options.Parameters != nil {\n\t\treturn req, runtime.MarshalAsJSON(req, *options.Parameters)\n\t}\n\treturn req, nil\n}", "func (client *ClustersClient) restartCreateRequest(ctx context.Context, resourceGroupName string, clusterName string, options *ClustersClientBeginRestartOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/serverGroupsv2/{clusterName}/restart\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif clusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterName}\", url.PathEscape(clusterName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-11-08\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *VirtualMachinesClient) restartCreateRequest(ctx context.Context, resourceGroupName string, virtualMachineName string, options *VirtualMachinesClientBeginRestartOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ConnectedVMwarevSphere/virtualMachines/{virtualMachineName}/restart\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif virtualMachineName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualMachineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualMachineName}\", url.PathEscape(virtualMachineName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-01-10-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *VirtualMachineScaleSetsClient) restartCreateRequest(ctx context.Context, resourceGroupName string, vmScaleSetName string, options *VirtualMachineScaleSetsBeginRestartOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/virtualMachineScaleSets/{vmScaleSetName}/restart\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif vmScaleSetName == \"\" {\n\t\treturn nil, errors.New(\"parameter vmScaleSetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vmScaleSetName}\", url.PathEscape(vmScaleSetName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tif options != nil && options.VMInstanceIDs != nil {\n\t\treturn req, runtime.MarshalAsJSON(req, *options.VMInstanceIDs)\n\t}\n\treturn req, nil\n}", "func createHyperShiftVPC() (*HyperShiftVPC, error) {\n\tctx := context.Background()\n\n\tvar vpc HyperShiftVPC\n\tworkingDir := viper.GetString(config.ReportDir)\n\n\ttf, err := terraform.New(workingDir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefer func() {\n\t\t_ = tf.Uninstall(ctx)\n\t}()\n\n\tlog.Println(\"Creating ROSA HyperShift aws vpc\")\n\n\terr = copyFile(\"terraform/setup-vpc.tf\", fmt.Sprintf(\"%s/setup-vpc.tf\", workingDir))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = tf.Init(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = callAndSetAWSSession(func() error {\n\t\terr := tf.Plan(\n\t\t\tctx,\n\t\t\ttfexec.Var(fmt.Sprintf(\"aws_region=%s\", viper.GetString(config.AWSRegion))),\n\t\t\ttfexec.Var(fmt.Sprintf(\"cluster_name=%s\", viper.GetString(config.Cluster.Name))),\n\t\t)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\terr = tf.Apply(ctx)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\toutput, err := tf.Output(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvpc.PrivateSubnet = strings.ReplaceAll(string(output[\"cluster-private-subnet\"].Value), \"\\\"\", \"\")\n\tvpc.PublicSubnet = strings.ReplaceAll(string(output[\"cluster-public-subnet\"].Value), \"\\\"\", \"\")\n\tvpc.NodePrivateSubnet = strings.ReplaceAll(string(output[\"node-private-subnet\"].Value), \"\\\"\", \"\")\n\n\tlog.Println(\"ROSA HyperShift aws vpc created!\")\n\n\treturn &vpc, nil\n}", "func (client *WebAppsClient) restartCreateRequest(ctx context.Context, resourceGroupName string, name string, options *WebAppsRestartOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/restart\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.SoftRestart != nil {\n\t\treqQP.Set(\"softRestart\", strconv.FormatBool(*options.SoftRestart))\n\t}\n\tif options != nil && options.Synchronous != nil {\n\t\treqQP.Set(\"synchronous\", strconv.FormatBool(*options.Synchronous))\n\t}\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *WebAppsClient) restartSlotCreateRequest(ctx context.Context, resourceGroupName string, name string, slot string, options *WebAppsRestartSlotOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/slots/{slot}/restart\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif slot == \"\" {\n\t\treturn nil, errors.New(\"parameter slot cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{slot}\", url.PathEscape(slot))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.SoftRestart != nil {\n\t\treqQP.Set(\"softRestart\", strconv.FormatBool(*options.SoftRestart))\n\t}\n\tif options != nil && options.Synchronous != nil {\n\t\treqQP.Set(\"synchronous\", strconv.FormatBool(*options.Synchronous))\n\t}\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *ContainerGroupsClient) restartCreateRequest(ctx context.Context, resourceGroupName string, containerGroupName string, options *ContainerGroupsClientBeginRestartOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerInstance/containerGroups/{containerGroupName}/restart\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif containerGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter containerGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{containerGroupName}\", url.PathEscape(containerGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func prepareRunParams(options RunInstances) map[string]string {\n\tif options.SubnetId != \"\" || len(options.NetworkInterfaces) > 0 {\n\t\treturn makeParamsVPC(\"RunInstances\")\n\t} else {\n\t\treturn makeParams(\"RunInstances\")\n\t}\n}", "func (client *CloudServiceRoleInstancesClient) rebuildCreateRequest(ctx context.Context, roleInstanceName string, resourceGroupName string, cloudServiceName string, options *CloudServiceRoleInstancesBeginRebuildOptions) (*azcore.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/roleInstances/{roleInstanceName}/rebuild\"\n\tif roleInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter roleInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{roleInstanceName}\", url.PathEscape(roleInstanceName))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := azcore.NewRequest(ctx, http.MethodPost, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\treqQP := req.URL.Query()\n\treqQP.Set(\"api-version\", \"2021-03-01\")\n\treq.URL.RawQuery = reqQP.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (s *VPCService) NewCreateVPCParams(cidr string, displaytext string, name string, vpcofferingid string, zoneid string) *CreateVPCParams {\n\tp := &CreateVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"cidr\"] = cidr\n\tp.p[\"displaytext\"] = displaytext\n\tp.p[\"name\"] = name\n\tp.p[\"vpcofferingid\"] = vpcofferingid\n\tp.p[\"zoneid\"] = zoneid\n\treturn p\n}", "func (s *Stack) initVPC() error {\n\t// Tries to get VPC information\n\tvpcID, err := s.findVPCID()\n\tif err != nil {\n\t\treturn err\n\t}\n\tif vpcID != nil {\n\t\ts.vpc, err = s.GetVPC(*vpcID)\n\t\treturn err\n\t}\n\n\tvpc, err := s.CreateVPC(\n\t\tVPCRequest{\n\t\t\tName: s.authOpts.VPCName,\n\t\t\tCIDR: s.authOpts.VPCCIDR,\n\t\t},\n\t)\n\tif err != nil {\n\t\treturn fail.Errorf(\n\t\t\tfmt.Sprintf(\n\t\t\t\t\"failed to initialize VPC '%s': %s\", s.authOpts.VPCName, openstack.ProviderErrorToString(err),\n\t\t\t), err,\n\t\t)\n\t}\n\ts.vpc = vpc\n\treturn nil\n}", "func (s *VPCService) NewUpdateVPCParams(id string) *UpdateVPCParams {\n\tp := &UpdateVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (c *UDDBClient) NewRestartUDDBInstanceRequest() *RestartUDDBInstanceRequest {\n\treq := &RestartUDDBInstanceRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "func (c *UDBClient) NewRestartUDBInstanceRequest() *RestartUDBInstanceRequest {\n\treq := &RestartUDBInstanceRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "func (client DeploymentsClient) RestartPreparer(ctx context.Context, resourceGroupName string, serviceName string, appName string, deploymentName string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"appName\": autorest.Encode(\"path\", appName),\n\t\t\"deploymentName\": autorest.Encode(\"path\", deploymentName),\n\t\t\"resourceGroupName\": autorest.Encode(\"path\", resourceGroupName),\n\t\t\"serviceName\": autorest.Encode(\"path\", serviceName),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t}\n\n\tconst APIVersion = \"2022-11-01-preview\"\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": APIVersion,\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsPost(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.AppPlatform/Spring/{serviceName}/apps/{appName}/deployments/{deploymentName}/restart\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func (client *PublicIPAddressesClient) listCloudServiceRoleInstancePublicIPAddressesCreateRequest(ctx context.Context, resourceGroupName string, cloudServiceName string, roleInstanceName string, networkInterfaceName string, ipConfigurationName string, options *PublicIPAddressesClientListCloudServiceRoleInstancePublicIPAddressesOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/roleInstances/{roleInstanceName}/networkInterfaces/{networkInterfaceName}/ipconfigurations/{ipConfigurationName}/publicipaddresses\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif roleInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter roleInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{roleInstanceName}\", url.PathEscape(roleInstanceName))\n\tif networkInterfaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkInterfaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkInterfaceName}\", url.PathEscape(networkInterfaceName))\n\tif ipConfigurationName == \"\" {\n\t\treturn nil, errors.New(\"parameter ipConfigurationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{ipConfigurationName}\", url.PathEscape(ipConfigurationName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (rm *resourceManager) newCreateRequestPayload(\n\tctx context.Context,\n\tr *resource,\n) (*svcsdk.CreateVpcPeeringConnectionInput, error) {\n\tres := &svcsdk.CreateVpcPeeringConnectionInput{}\n\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Spec.PeerOwnerID != nil {\n\t\tres.SetPeerOwnerId(*r.ko.Spec.PeerOwnerID)\n\t}\n\tif r.ko.Spec.PeerRegion != nil {\n\t\tres.SetPeerRegion(*r.ko.Spec.PeerRegion)\n\t}\n\tif r.ko.Spec.PeerVPCID != nil {\n\t\tres.SetPeerVpcId(*r.ko.Spec.PeerVPCID)\n\t}\n\tif r.ko.Spec.TagSpecifications != nil {\n\t\tf4 := []*svcsdk.TagSpecification{}\n\t\tfor _, f4iter := range r.ko.Spec.TagSpecifications {\n\t\t\tf4elem := &svcsdk.TagSpecification{}\n\t\t\tif f4iter.ResourceType != nil {\n\t\t\t\tf4elem.SetResourceType(*f4iter.ResourceType)\n\t\t\t}\n\t\t\tif f4iter.Tags != nil {\n\t\t\t\tf4elemf1 := []*svcsdk.Tag{}\n\t\t\t\tfor _, f4elemf1iter := range f4iter.Tags {\n\t\t\t\t\tf4elemf1elem := &svcsdk.Tag{}\n\t\t\t\t\tif f4elemf1iter.Key != nil {\n\t\t\t\t\t\tf4elemf1elem.SetKey(*f4elemf1iter.Key)\n\t\t\t\t\t}\n\t\t\t\t\tif f4elemf1iter.Value != nil {\n\t\t\t\t\t\tf4elemf1elem.SetValue(*f4elemf1iter.Value)\n\t\t\t\t\t}\n\t\t\t\t\tf4elemf1 = append(f4elemf1, f4elemf1elem)\n\t\t\t\t}\n\t\t\t\tf4elem.SetTags(f4elemf1)\n\t\t\t}\n\t\t\tf4 = append(f4, f4elem)\n\t\t}\n\t\tres.SetTagSpecifications(f4)\n\t}\n\tif r.ko.Spec.VPCID != nil {\n\t\tres.SetVpcId(*r.ko.Spec.VPCID)\n\t}\n\n\treturn res, nil\n}", "func SetupVPC(mgr ctrl.Manager, l logging.Logger) error {\n\tname := managed.ControllerName(v1alpha3.VPCGroupKind)\n\treturn ctrl.NewControllerManagedBy(mgr).\n\t\tNamed(name).\n\t\tFor(&v1alpha3.VPC{}).\n\t\tComplete(managed.NewReconciler(mgr,\n\t\t\tresource.ManagedKind(v1alpha3.VPCGroupVersionKind),\n\t\t\tmanaged.WithExternalConnecter(&connector{client: mgr.GetClient(), newClientFn: ec2.NewVPCClient, awsConfigFn: utils.RetrieveAwsConfigFromProvider}),\n\t\t\tmanaged.WithReferenceResolver(managed.NewAPISimpleReferenceResolver(mgr.GetClient())),\n\t\t\tmanaged.WithConnectionPublishers(),\n\t\t\tmanaged.WithInitializers(&tagger{kube: mgr.GetClient()}),\n\t\t\tmanaged.WithLogger(l.WithValues(\"controller\", name)),\n\t\t\tmanaged.WithRecorder(event.NewAPIRecorder(mgr.GetEventRecorderFor(name)))))\n}", "func NewRegenerateDeployKeyParams() *RegenerateDeployKeyParams {\n\treturn &RegenerateDeployKeyParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *VPCService) NewListVPCsParams() *ListVPCsParams {\n\tp := &ListVPCsParams{}\n\tp.p = make(map[string]interface{})\n\treturn p\n}", "func (f *FakeInstance) AttachVPC(_ context.Context, _, _ string) error {\n\tpanic(\"implement me\")\n}", "func NewGenerateVPCConfigRequestAction(creationContext *EksClusterCreateUpdateContext, stackName string) *GenerateVPCConfigRequestAction {\n\treturn &GenerateVPCConfigRequestAction{\n\t\tcontext: creationContext,\n\t\tstackName: stackName,\n\t}\n}", "func (client *VirtualMachineScaleSetsClient) redeployCreateRequest(ctx context.Context, resourceGroupName string, vmScaleSetName string, options *VirtualMachineScaleSetsBeginRedeployOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/virtualMachineScaleSets/{vmScaleSetName}/redeploy\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif vmScaleSetName == \"\" {\n\t\treturn nil, errors.New(\"parameter vmScaleSetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vmScaleSetName}\", url.PathEscape(vmScaleSetName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tif options != nil && options.VMInstanceIDs != nil {\n\t\treturn req, runtime.MarshalAsJSON(req, *options.VMInstanceIDs)\n\t}\n\treturn req, nil\n}", "func CreateVPCMocked(t *testing.T, vpcIn *types.Vpc) *types.Vpc {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewVPCService(cs)\n\tassert.Nil(err, \"Couldn't load VPC service\")\n\tassert.NotNil(ds, \"VPC service not instanced\")\n\n\t// convertMap\n\tmapIn, err := utils.ItemConvertParams(*vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// to json\n\tdOut, err := json.Marshal(vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// call service\n\tcs.On(\"Post\", \"/network/vpcs/\", mapIn).Return(dOut, 200, nil)\n\tvpcOut, err := ds.CreateVPC(mapIn)\n\tassert.Nil(err, \"Error creating VPC list\")\n\tassert.Equal(vpcIn, vpcOut, \"CreateVPC returned different VPCs\")\n\n\treturn vpcOut\n}", "func GetVPC(connectionName string, rsType string, nameID string) (*cres.VPCInfo, error) {\n\tcblog.Info(\"call GetVPC()\")\n\n\t// check empty and trim user inputs\n connectionName, err := EmptyCheckAndTrim(\"connectionName\", connectionName)\n if err != nil {\n\t\tcblog.Error(err)\n return nil, err\n }\n\n nameID, err = EmptyCheckAndTrim(\"nameID\", nameID)\n if err != nil {\n\t\tcblog.Error(err)\n return nil, err\n }\n\n\tcldConn, err := ccm.GetCloudConnection(connectionName)\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\n\thandler, err := cldConn.CreateVPCHandler()\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\n\tvpcSPLock.RLock(connectionName, nameID)\n\tdefer vpcSPLock.RUnlock(connectionName, nameID)\n\t// (1) get spiderIID(NameId)\n\tiidInfo, err := iidRWLock.GetIID(iidm.IIDSGROUP, connectionName, rsType, cres.IID{nameID, \"\"})\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\n\t// (2) get resource(driverIID)\n\tinfo, err := handler.GetVPC(getDriverIID(iidInfo.IId))\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\t// (3) set ResourceInfo(userIID)\n\tinfo.IId = getUserIID(iidInfo.IId)\n\n\t// set NameId for SubnetInfo List\n\t// create new SubnetInfo List\n\tsubnetInfoList := []cres.SubnetInfo{}\n\tfor _, subnetInfo := range info.SubnetInfoList {\t\t\n\t\tsubnetIIDInfo, err := iidRWLock.GetIIDbySystemID(iidm.SUBNETGROUP, connectionName, info.IId.NameId, subnetInfo.IId) // VPC info.IId.NameId => rsType\n\t\tif err != nil {\n\t\t\tcblog.Error(err)\n\t\t\treturn nil, err\n\t\t}\n\t\tif subnetIIDInfo.IId.NameId != \"\" { // insert only this user created.\n\t\t\tsubnetInfo.IId = getUserIID(subnetIIDInfo.IId)\n\t\t\tsubnetInfoList = append(subnetInfoList, subnetInfo)\n\t\t}\n\t}\n\tinfo.SubnetInfoList = subnetInfoList\n\n\treturn &info, nil\n}", "func (ts *Tester) createVPC() error {\n\tif ts.cfg.VPC.ID != \"\" {\n\t\tts.lg.Info(\"querying ELBv2\", zap.String(\"vpc-id\", ts.cfg.VPC.ID))\n\t\tctx, cancel := context.WithTimeout(context.Background(), time.Minute)\n\t\toutput, err := ts.elbv2APIV2.DescribeLoadBalancers(\n\t\t\tctx,\n\t\t\t&aws_elbv2_v2.DescribeLoadBalancersInput{},\n\t\t)\n\t\tcancel()\n\t\tif err != nil {\n\t\t\tts.lg.Warn(\"failed to describe ELBv2\", zap.Error(err))\n\t\t} else {\n\t\t\tfor _, ev := range output.LoadBalancers {\n\t\t\t\tarn := aws_v2.ToString(ev.LoadBalancerArn)\n\t\t\t\tvpcID := aws_v2.ToString(ev.VpcId)\n\t\t\t\tif vpcID == ts.cfg.VPC.ID {\n\t\t\t\t\tts.lg.Warn(\"found ELBv2 for this VPC; may overlap with the other cluster\",\n\t\t\t\t\t\tzap.String(\"vpc-id\", ts.cfg.VPC.ID),\n\t\t\t\t\t\tzap.String(\"elb-arn\", arn),\n\t\t\t\t\t)\n\t\t\t\t} else {\n\t\t\t\t\tts.lg.Info(\"found ELBv2 for other VPCs\", zap.String(\"vpc-id\", vpcID), zap.String(\"elb-arn\", arn))\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tts.lg.Info(\"querying subnet IDs for given VPC\",\n\t\t\tzap.String(\"vpc-id\", ts.cfg.VPC.ID),\n\t\t)\n\t\tctx, cancel = context.WithTimeout(context.Background(), time.Minute)\n\t\tsresp, err := ts.ec2APIV2.DescribeSubnets(\n\t\t\tctx,\n\t\t\t&aws_ec2_v2.DescribeSubnetsInput{\n\t\t\t\tFilters: []aws_ec2_v2_types.Filter{\n\t\t\t\t\t{\n\t\t\t\t\t\tName: aws_v2.String(\"vpc-id\"),\n\t\t\t\t\t\tValues: []string{ts.cfg.VPC.ID},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t})\n\t\tcancel()\n\t\tif err != nil {\n\t\t\tts.lg.Warn(\"failed to subnets\", zap.Error(err))\n\t\t\treturn err\n\t\t}\n\n\t\tts.cfg.VPC.PublicSubnetIDs = make([]string, 0, len(sresp.Subnets))\n\t\tts.cfg.VPC.PrivateSubnetIDs = make([]string, 0, len(sresp.Subnets))\n\t\tfor _, sv := range sresp.Subnets {\n\t\t\tid := aws_v2.ToString(sv.SubnetId)\n\t\t\tnetworkTagValue := \"\"\n\t\t\tfor _, tg := range sv.Tags {\n\t\t\t\tswitch aws_v2.ToString(tg.Key) {\n\t\t\t\tcase \"Network\":\n\t\t\t\t\tnetworkTagValue = aws_v2.ToString(tg.Value)\n\t\t\t\t}\n\t\t\t\tif networkTagValue != \"\" {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tts.lg.Info(\"found subnet\",\n\t\t\t\tzap.String(\"id\", id),\n\t\t\t\tzap.String(\"availability-zone\", aws_v2.ToString(sv.AvailabilityZone)),\n\t\t\t\tzap.String(\"network-tag\", networkTagValue),\n\t\t\t)\n\t\t\tswitch networkTagValue {\n\t\t\tcase \"Public\":\n\t\t\t\tts.cfg.VPC.PublicSubnetIDs = append(ts.cfg.VPC.PublicSubnetIDs, id)\n\t\t\tcase \"Private\":\n\t\t\t\tts.cfg.VPC.PrivateSubnetIDs = append(ts.cfg.VPC.PrivateSubnetIDs, id)\n\t\t\tdefault:\n\t\t\t\treturn fmt.Errorf(\"'Network' tag not found in subnet %q\", id)\n\t\t\t}\n\t\t}\n\t\tif len(ts.cfg.VPC.PublicSubnetIDs) == 0 {\n\t\t\treturn fmt.Errorf(\"no subnet found for VPC ID %q\", ts.cfg.VPC.ID)\n\t\t}\n\n\t\tts.lg.Info(\"querying security IDs\", zap.String(\"vpc-id\", ts.cfg.VPC.ID))\n\t\tctx, cancel = context.WithTimeout(context.Background(), time.Minute)\n\t\tgresp, err := ts.ec2APIV2.DescribeSecurityGroups(\n\t\t\tctx,\n\t\t\t&aws_ec2_v2.DescribeSecurityGroupsInput{\n\t\t\t\tFilters: []aws_ec2_v2_types.Filter{\n\t\t\t\t\t{\n\t\t\t\t\t\tName: aws_v2.String(\"vpc-id\"),\n\t\t\t\t\t\tValues: []string{ts.cfg.VPC.ID},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t})\n\t\tcancel()\n\t\tif err != nil {\n\t\t\tts.lg.Warn(\"failed to security groups\", zap.Error(err))\n\t\t\treturn err\n\t\t}\n\t\tfor _, sg := range gresp.SecurityGroups {\n\t\t\tid, name := aws_v2.ToString(sg.GroupId), aws_v2.ToString(sg.GroupName)\n\t\t\tts.lg.Info(\"found security group\", zap.String(\"id\", id), zap.String(\"name\", name))\n\t\t\tif name != \"default\" {\n\t\t\t\tts.cfg.VPC.SecurityGroupID = id\n\t\t\t}\n\t\t}\n\t\tif ts.cfg.VPC.SecurityGroupID == \"\" {\n\t\t\treturn fmt.Errorf(\"no security group found for VPC ID %q\", ts.cfg.VPC.ID)\n\t\t}\n\n\t\tts.cfg.Sync()\n\t\treturn nil\n\t}\n\tif !ts.cfg.VPC.Create {\n\t\tts.lg.Info(\"VPC.Create false; skipping creation\")\n\t\treturn nil\n\t}\n\tif ts.cfg.VPC.ID != \"\" &&\n\t\tlen(ts.cfg.VPC.PublicSubnetIDs) > 0 &&\n\t\tts.cfg.VPC.SecurityGroupID != \"\" {\n\t\tts.lg.Info(\"VPC already created; no need to create a new one\")\n\t\treturn nil\n\t}\n\n\tif err := ts._createVPC(); err != nil { // AWS::EC2::VPC\n\t\treturn err\n\t}\n\tif err := ts.modifyVPC(); err != nil {\n\t\treturn err\n\t}\n\tif err := ts.createSecurityGroups(); err != nil { // AWS::EC2::SecurityGroup\n\t\treturn err\n\t}\n\tif err := ts.associateVPCCIDRBlocks(); err != nil { // AWS::EC2::VPCCidrBlock\n\t\treturn err\n\t}\n\n\tif err := ts.createInternetGateway(); err != nil { // AWS::EC2::InternetGateway\n\t\treturn err\n\t}\n\tif err := ts.createVPCGatewayAttachment(); err != nil { // AWS::EC2::VPCGatewayAttachment\n\t\treturn err\n\t}\n\n\tif err := ts.createPublicSubnets(); err != nil { // AWS::EC2::Subnet\n\t\treturn err\n\t}\n\tif err := ts.createPublicRouteTable(); err != nil { // AWS::EC2::RouteTable\n\t\treturn err\n\t}\n\tif err := ts.createPublicRoute(); err != nil { // AWS::EC2::Route\n\t\treturn err\n\t}\n\tif err := ts.createPublicSubnetRouteTableAssociation(); err != nil { // AWS::EC2::SubnetRouteTableAssociation\n\t\treturn err\n\t}\n\n\tif err := ts.createPublicEIPs(); err != nil { // AWS::EC2::EIP\n\t\treturn err\n\t}\n\tif err := ts.createPublicNATGateways(); err != nil { // AWS::EC2::NatGateway\n\t\treturn err\n\t}\n\n\tif err := ts.createPrivateSubnets(); err != nil { // AWS::EC2::Subnet\n\t\treturn err\n\t}\n\tif err := ts.createPrivateRouteTables(); err != nil { // AWS::EC2::RouteTable\n\t\treturn err\n\t}\n\tif err := ts.createPrivateRoutes(); err != nil { // AWS::EC2::Route\n\t\treturn err\n\t}\n\tif err := ts.createPrivateSubnetRouteTableAssociation(); err != nil { // AWS::EC2::SubnetRouteTableAssociation\n\t\treturn err\n\t}\n\n\tif err := ts.createDHCPOptions(); err != nil { // AWS::EC2::DHCPOptions, AWS::EC2::VPCDHCPOptionsAssociation\n\t\treturn err\n\t}\n\n\tif err := ts.authorizeSecurityGroup(); err != nil {\n\t\treturn err\n\t}\n\n\tts.lg.Info(\"created a VPC\",\n\t\tzap.String(\"vpc-id\", ts.cfg.VPC.ID),\n\t\tzap.Strings(\"vpc-cidr-blocks\", ts.cfg.VPC.CIDRs),\n\t\tzap.Strings(\"public-subnet-ids\", ts.cfg.VPC.PublicSubnetIDs),\n\t\tzap.Strings(\"private-subnet-ids\", ts.cfg.VPC.PrivateSubnetIDs),\n\t\tzap.String(\"control-plane-security-group-id\", ts.cfg.VPC.SecurityGroupID),\n\t)\n\n\tts.cfg.Sync()\n\treturn nil\n}", "func (client *PublicIPAddressesClient) getCloudServicePublicIPAddressCreateRequest(ctx context.Context, resourceGroupName string, cloudServiceName string, roleInstanceName string, networkInterfaceName string, ipConfigurationName string, publicIPAddressName string, options *PublicIPAddressesClientGetCloudServicePublicIPAddressOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/roleInstances/{roleInstanceName}/networkInterfaces/{networkInterfaceName}/ipconfigurations/{ipConfigurationName}/publicipaddresses/{publicIpAddressName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif roleInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter roleInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{roleInstanceName}\", url.PathEscape(roleInstanceName))\n\tif networkInterfaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkInterfaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkInterfaceName}\", url.PathEscape(networkInterfaceName))\n\tif ipConfigurationName == \"\" {\n\t\treturn nil, errors.New(\"parameter ipConfigurationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{ipConfigurationName}\", url.PathEscape(ipConfigurationName))\n\tif publicIPAddressName == \"\" {\n\t\treturn nil, errors.New(\"parameter publicIPAddressName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{publicIpAddressName}\", url.PathEscape(publicIPAddressName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\tif options != nil && options.Expand != nil {\n\t\treqQP.Set(\"$expand\", *options.Expand)\n\t}\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (c *VPCClient) NewDescribeVPCIntercomRequest() *DescribeVPCIntercomRequest {\n\treq := &DescribeVPCIntercomRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "func (client *CapacitiesClient) resumeCreateRequest(ctx context.Context, resourceGroupName string, dedicatedCapacityName string, options *CapacitiesClientBeginResumeOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.PowerBIDedicated/capacities/{dedicatedCapacityName}/resume\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif dedicatedCapacityName == \"\" {\n\t\treturn nil, errors.New(\"parameter dedicatedCapacityName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{dedicatedCapacityName}\", url.PathEscape(dedicatedCapacityName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-01-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *CloudServiceRoleInstancesClient) reimageCreateRequest(ctx context.Context, roleInstanceName string, resourceGroupName string, cloudServiceName string, options *CloudServiceRoleInstancesBeginReimageOptions) (*azcore.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/roleInstances/{roleInstanceName}/reimage\"\n\tif roleInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter roleInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{roleInstanceName}\", url.PathEscape(roleInstanceName))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := azcore.NewRequest(ctx, http.MethodPost, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\treqQP := req.URL.Query()\n\treqQP.Set(\"api-version\", \"2021-03-01\")\n\treq.URL.RawQuery = reqQP.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (c *UDBClient) NewRestartRWSplittingRequest() *RestartRWSplittingRequest {\n\treq := &RestartRWSplittingRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "func Resume() *ResumeParams {\n\treturn &ResumeParams{}\n}", "func (f *FakeInstance) DetachVPC(_ context.Context, _, _ string) error {\n\tpanic(\"implement me\")\n}", "func deleteHyperShiftVPC(workingDir string) error {\n\tctx := context.Background()\n\n\ttf, err := terraform.New(workingDir)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer func() {\n\t\t_ = tf.Uninstall(ctx)\n\t}()\n\n\terr = tf.Init(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.Println(\"Deleting ROSA HyperShift aws vpc\")\n\n\terr = callAndSetAWSSession(func() error {\n\t\treturn tf.Destroy(\n\t\t\tctx,\n\t\t\ttfexec.Var(fmt.Sprintf(\"aws_region=%s\", viper.GetString(config.AWSRegion))),\n\t\t\ttfexec.Var(fmt.Sprintf(\"cluster_name=%s\", viper.GetString(config.Cluster.Name))),\n\t\t)\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.Println(\"ROSA HyperShift aws vpc deleted!\")\n\n\treturn nil\n}", "func (r *RestartInstanceRequest) FromJsonString(s string) error {\n\tf := make(map[string]interface{})\n\tif err := json.Unmarshal([]byte(s), &f); err != nil {\n\t\treturn err\n\t}\n\tdelete(f, \"InstanceId\")\n\tdelete(f, \"ForceRestart\")\n\tdelete(f, \"RestartMode\")\n\tif len(f) > 0 {\n\t\treturn tcerr.NewTencentCloudSDKError(\"ClientError.BuildRequestError\", \"RestartInstanceRequest has unknown keys!\", \"\")\n\t}\n\treturn json.Unmarshal([]byte(s), &r)\n}", "func newRestartCommand(client *client.Client) *Command {\n\trestartStrings := docstrings.Get(\"restart\")\n\trestartCmd := BuildCommandKS(nil, runRestart, restartStrings, client, requireSession, requireAppNameAsArg)\n\trestartCmd.Args = cobra.RangeArgs(0, 1)\n\n\treturn restartCmd\n}", "func (client *PublicIPAddressesClient) getVirtualMachineScaleSetPublicIPAddressCreateRequest(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string, virtualmachineIndex string, networkInterfaceName string, ipConfigurationName string, publicIPAddressName string, options *PublicIPAddressesClientGetVirtualMachineScaleSetPublicIPAddressOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/virtualMachineScaleSets/{virtualMachineScaleSetName}/virtualMachines/{virtualmachineIndex}/networkInterfaces/{networkInterfaceName}/ipconfigurations/{ipConfigurationName}/publicipaddresses/{publicIpAddressName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif virtualMachineScaleSetName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualMachineScaleSetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualMachineScaleSetName}\", url.PathEscape(virtualMachineScaleSetName))\n\tif virtualmachineIndex == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualmachineIndex cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualmachineIndex}\", url.PathEscape(virtualmachineIndex))\n\tif networkInterfaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkInterfaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkInterfaceName}\", url.PathEscape(networkInterfaceName))\n\tif ipConfigurationName == \"\" {\n\t\treturn nil, errors.New(\"parameter ipConfigurationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{ipConfigurationName}\", url.PathEscape(ipConfigurationName))\n\tif publicIPAddressName == \"\" {\n\t\treturn nil, errors.New(\"parameter publicIPAddressName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{publicIpAddressName}\", url.PathEscape(publicIPAddressName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2018-10-01\")\n\tif options != nil && options.Expand != nil {\n\t\treqQP.Set(\"$expand\", *options.Expand)\n\t}\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (d *Driver) Restart() error {\n\tcs := d.client()\n\t_, err := cs.AsyncRequest(&egoscale.RebootVirtualMachine{\n\t\tID: d.ID,\n\t}, d.async)\n\n\treturn err\n}", "func (s *VPCService) NewDeleteVPCParams(id string) *DeleteVPCParams {\n\tp := &DeleteVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (rm *resourceManager) newCreateRequestPayload(\n\tctx context.Context,\n\tr *resource,\n) (*svcsdk.CreateVpnConnectionInput, error) {\n\tres := &svcsdk.CreateVpnConnectionInput{}\n\n\tif r.ko.Spec.CustomerGatewayID != nil {\n\t\tres.SetCustomerGatewayId(*r.ko.Spec.CustomerGatewayID)\n\t}\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Spec.Options != nil {\n\t\tf2 := &svcsdk.VpnConnectionOptionsSpecification{}\n\t\tif r.ko.Spec.Options.EnableAcceleration != nil {\n\t\t\tf2.SetEnableAcceleration(*r.ko.Spec.Options.EnableAcceleration)\n\t\t}\n\t\tif r.ko.Spec.Options.LocalIPv4NetworkCIDR != nil {\n\t\t\tf2.SetLocalIpv4NetworkCidr(*r.ko.Spec.Options.LocalIPv4NetworkCIDR)\n\t\t}\n\t\tif r.ko.Spec.Options.LocalIPv6NetworkCIDR != nil {\n\t\t\tf2.SetLocalIpv6NetworkCidr(*r.ko.Spec.Options.LocalIPv6NetworkCIDR)\n\t\t}\n\t\tif r.ko.Spec.Options.RemoteIPv4NetworkCIDR != nil {\n\t\t\tf2.SetRemoteIpv4NetworkCidr(*r.ko.Spec.Options.RemoteIPv4NetworkCIDR)\n\t\t}\n\t\tif r.ko.Spec.Options.RemoteIPv6NetworkCIDR != nil {\n\t\t\tf2.SetRemoteIpv6NetworkCidr(*r.ko.Spec.Options.RemoteIPv6NetworkCIDR)\n\t\t}\n\t\tif r.ko.Spec.Options.StaticRoutesOnly != nil {\n\t\t\tf2.SetStaticRoutesOnly(*r.ko.Spec.Options.StaticRoutesOnly)\n\t\t}\n\t\tif r.ko.Spec.Options.TunnelInsideIPVersion != nil {\n\t\t\tf2.SetTunnelInsideIpVersion(*r.ko.Spec.Options.TunnelInsideIPVersion)\n\t\t}\n\t\tif r.ko.Spec.Options.TunnelOptions != nil {\n\t\t\tf2f7 := []*svcsdk.VpnTunnelOptionsSpecification{}\n\t\t\tfor _, f2f7iter := range r.ko.Spec.Options.TunnelOptions {\n\t\t\t\tf2f7elem := &svcsdk.VpnTunnelOptionsSpecification{}\n\t\t\t\tif f2f7iter.DPDTimeoutAction != nil {\n\t\t\t\t\tf2f7elem.SetDPDTimeoutAction(*f2f7iter.DPDTimeoutAction)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.DPDTimeoutSeconds != nil {\n\t\t\t\t\tf2f7elem.SetDPDTimeoutSeconds(*f2f7iter.DPDTimeoutSeconds)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.IKEVersions != nil {\n\t\t\t\t\tf2f7elemf2 := []*svcsdk.IKEVersionsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf2iter := range f2f7iter.IKEVersions {\n\t\t\t\t\t\tf2f7elemf2elem := &svcsdk.IKEVersionsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf2iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf2elem.SetValue(*f2f7elemf2iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf2 = append(f2f7elemf2, f2f7elemf2elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetIKEVersions(f2f7elemf2)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase1DHGroupNumbers != nil {\n\t\t\t\t\tf2f7elemf3 := []*svcsdk.Phase1DHGroupNumbersRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf3iter := range f2f7iter.Phase1DHGroupNumbers {\n\t\t\t\t\t\tf2f7elemf3elem := &svcsdk.Phase1DHGroupNumbersRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf3iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf3elem.SetValue(*f2f7elemf3iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf3 = append(f2f7elemf3, f2f7elemf3elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase1DHGroupNumbers(f2f7elemf3)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase1EncryptionAlgorithms != nil {\n\t\t\t\t\tf2f7elemf4 := []*svcsdk.Phase1EncryptionAlgorithmsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf4iter := range f2f7iter.Phase1EncryptionAlgorithms {\n\t\t\t\t\t\tf2f7elemf4elem := &svcsdk.Phase1EncryptionAlgorithmsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf4iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf4elem.SetValue(*f2f7elemf4iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf4 = append(f2f7elemf4, f2f7elemf4elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase1EncryptionAlgorithms(f2f7elemf4)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase1IntegrityAlgorithms != nil {\n\t\t\t\t\tf2f7elemf5 := []*svcsdk.Phase1IntegrityAlgorithmsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf5iter := range f2f7iter.Phase1IntegrityAlgorithms {\n\t\t\t\t\t\tf2f7elemf5elem := &svcsdk.Phase1IntegrityAlgorithmsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf5iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf5elem.SetValue(*f2f7elemf5iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf5 = append(f2f7elemf5, f2f7elemf5elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase1IntegrityAlgorithms(f2f7elemf5)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase1LifetimeSeconds != nil {\n\t\t\t\t\tf2f7elem.SetPhase1LifetimeSeconds(*f2f7iter.Phase1LifetimeSeconds)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase2DHGroupNumbers != nil {\n\t\t\t\t\tf2f7elemf7 := []*svcsdk.Phase2DHGroupNumbersRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf7iter := range f2f7iter.Phase2DHGroupNumbers {\n\t\t\t\t\t\tf2f7elemf7elem := &svcsdk.Phase2DHGroupNumbersRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf7iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf7elem.SetValue(*f2f7elemf7iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf7 = append(f2f7elemf7, f2f7elemf7elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase2DHGroupNumbers(f2f7elemf7)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase2EncryptionAlgorithms != nil {\n\t\t\t\t\tf2f7elemf8 := []*svcsdk.Phase2EncryptionAlgorithmsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf8iter := range f2f7iter.Phase2EncryptionAlgorithms {\n\t\t\t\t\t\tf2f7elemf8elem := &svcsdk.Phase2EncryptionAlgorithmsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf8iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf8elem.SetValue(*f2f7elemf8iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf8 = append(f2f7elemf8, f2f7elemf8elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase2EncryptionAlgorithms(f2f7elemf8)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase2IntegrityAlgorithms != nil {\n\t\t\t\t\tf2f7elemf9 := []*svcsdk.Phase2IntegrityAlgorithmsRequestListValue{}\n\t\t\t\t\tfor _, f2f7elemf9iter := range f2f7iter.Phase2IntegrityAlgorithms {\n\t\t\t\t\t\tf2f7elemf9elem := &svcsdk.Phase2IntegrityAlgorithmsRequestListValue{}\n\t\t\t\t\t\tif f2f7elemf9iter.Value != nil {\n\t\t\t\t\t\t\tf2f7elemf9elem.SetValue(*f2f7elemf9iter.Value)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf2f7elemf9 = append(f2f7elemf9, f2f7elemf9elem)\n\t\t\t\t\t}\n\t\t\t\t\tf2f7elem.SetPhase2IntegrityAlgorithms(f2f7elemf9)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.Phase2LifetimeSeconds != nil {\n\t\t\t\t\tf2f7elem.SetPhase2LifetimeSeconds(*f2f7iter.Phase2LifetimeSeconds)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.PreSharedKey != nil {\n\t\t\t\t\tf2f7elem.SetPreSharedKey(*f2f7iter.PreSharedKey)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.RekeyFuzzPercentage != nil {\n\t\t\t\t\tf2f7elem.SetRekeyFuzzPercentage(*f2f7iter.RekeyFuzzPercentage)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.RekeyMarginTimeSeconds != nil {\n\t\t\t\t\tf2f7elem.SetRekeyMarginTimeSeconds(*f2f7iter.RekeyMarginTimeSeconds)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.ReplayWindowSize != nil {\n\t\t\t\t\tf2f7elem.SetReplayWindowSize(*f2f7iter.ReplayWindowSize)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.StartupAction != nil {\n\t\t\t\t\tf2f7elem.SetStartupAction(*f2f7iter.StartupAction)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.TunnelInsideCIDR != nil {\n\t\t\t\t\tf2f7elem.SetTunnelInsideCidr(*f2f7iter.TunnelInsideCIDR)\n\t\t\t\t}\n\t\t\t\tif f2f7iter.TunnelInsideIPv6CIDR != nil {\n\t\t\t\t\tf2f7elem.SetTunnelInsideIpv6Cidr(*f2f7iter.TunnelInsideIPv6CIDR)\n\t\t\t\t}\n\t\t\t\tf2f7 = append(f2f7, f2f7elem)\n\t\t\t}\n\t\t\tf2.SetTunnelOptions(f2f7)\n\t\t}\n\t\tres.SetOptions(f2)\n\t}\n\tif r.ko.Spec.TagSpecifications != nil {\n\t\tf3 := []*svcsdk.TagSpecification{}\n\t\tfor _, f3iter := range r.ko.Spec.TagSpecifications {\n\t\t\tf3elem := &svcsdk.TagSpecification{}\n\t\t\tif f3iter.ResourceType != nil {\n\t\t\t\tf3elem.SetResourceType(*f3iter.ResourceType)\n\t\t\t}\n\t\t\tif f3iter.Tags != nil {\n\t\t\t\tf3elemf1 := []*svcsdk.Tag{}\n\t\t\t\tfor _, f3elemf1iter := range f3iter.Tags {\n\t\t\t\t\tf3elemf1elem := &svcsdk.Tag{}\n\t\t\t\t\tif f3elemf1iter.Key != nil {\n\t\t\t\t\t\tf3elemf1elem.SetKey(*f3elemf1iter.Key)\n\t\t\t\t\t}\n\t\t\t\t\tif f3elemf1iter.Value != nil {\n\t\t\t\t\t\tf3elemf1elem.SetValue(*f3elemf1iter.Value)\n\t\t\t\t\t}\n\t\t\t\t\tf3elemf1 = append(f3elemf1, f3elemf1elem)\n\t\t\t\t}\n\t\t\t\tf3elem.SetTags(f3elemf1)\n\t\t\t}\n\t\t\tf3 = append(f3, f3elem)\n\t\t}\n\t\tres.SetTagSpecifications(f3)\n\t}\n\tif r.ko.Spec.TransitGatewayID != nil {\n\t\tres.SetTransitGatewayId(*r.ko.Spec.TransitGatewayID)\n\t}\n\tif r.ko.Spec.Type != nil {\n\t\tres.SetType(*r.ko.Spec.Type)\n\t}\n\tif r.ko.Spec.VPNGatewayID != nil {\n\t\tres.SetVpnGatewayId(*r.ko.Spec.VPNGatewayID)\n\t}\n\n\treturn res, nil\n}", "func (m *MockSecurityGroupServiceIface) NewRevokeSecurityGroupEgressParams(id string) *RevokeSecurityGroupEgressParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewRevokeSecurityGroupEgressParams\", id)\n\tret0, _ := ret[0].(*RevokeSecurityGroupEgressParams)\n\treturn ret0\n}", "func NewCreateVPCAction(creationContext *EksClusterCreateUpdateContext, stackName string) *CreateVPCAction {\n\treturn &CreateVPCAction{\n\t\tcontext: creationContext,\n\t\tstackName: stackName,\n\t\t//describeStacksTimeInterval: 10 * time.Second,\n\t\t//stackCreationTimeout: 3 * time.Minute,\n\t}\n}", "func (client *PublicIPAddressesClient) updateTagsCreateRequest(ctx context.Context, resourceGroupName string, publicIPAddressName string, parameters TagsObject, options *PublicIPAddressesClientUpdateTagsOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/publicIPAddresses/{publicIpAddressName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif publicIPAddressName == \"\" {\n\t\treturn nil, errors.New(\"parameter publicIPAddressName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{publicIpAddressName}\", url.PathEscape(publicIPAddressName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func NewParams() *Parameters {\n\treturn &Parameters{\n\t\tTokenType: \"transit\",\n\t\tTLSMode: 1,\n\t\tLeaderOnly: true,\n\t\tConnectTimeout: defaultConnectTimeout,\n\t\tReadTimeout: defaultReadTimeout,\n\t\tRetryCount: defaultRetries,\n\t\tRequireType: \"master\",\n\t}\n}", "func (s *FluentdService) Restart(ctx context.Context, r *pb.FluentdRestartRequest) (*pb.FluentdRestartResponse, error) {\n\treturn &pb.FluentdRestartResponse{Status: pb.FluentdRestartResponse_RESTART_SUCCESS}, nil\n}", "func NewParams(defaultSendEnabled bool) Params {\n\treturn Params{\n\t\tSendEnabled: nil,\n\t\tDefaultSendEnabled: defaultSendEnabled,\n\t}\n}", "func NewParams(communityTax sdk.Dec, withdrawAddrEnabled bool) Params {\n\treturn Params{\n\t\tCommunityTax: communityTax,\n\t\tWithdrawAddrEnabled: withdrawAddrEnabled,\n\t}\n}", "func (client *ItemLevelRecoveryConnectionsClient) provisionCreateRequest(ctx context.Context, vaultName string, resourceGroupName string, fabricName string, containerName string, protectedItemName string, recoveryPointID string, parameters ILRRequestResource, options *ItemLevelRecoveryConnectionsClientProvisionOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.RecoveryServices/vaults/{vaultName}/backupFabrics/{fabricName}/protectionContainers/{containerName}/protectedItems/{protectedItemName}/recoveryPoints/{recoveryPointId}/provisionInstantItemRecovery\"\n\tif vaultName == \"\" {\n\t\treturn nil, errors.New(\"parameter vaultName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vaultName}\", url.PathEscape(vaultName))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif fabricName == \"\" {\n\t\treturn nil, errors.New(\"parameter fabricName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{fabricName}\", url.PathEscape(fabricName))\n\tif containerName == \"\" {\n\t\treturn nil, errors.New(\"parameter containerName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{containerName}\", url.PathEscape(containerName))\n\tif protectedItemName == \"\" {\n\t\treturn nil, errors.New(\"parameter protectedItemName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{protectedItemName}\", url.PathEscape(protectedItemName))\n\tif recoveryPointID == \"\" {\n\t\treturn nil, errors.New(\"parameter recoveryPointID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{recoveryPointId}\", url.PathEscape(recoveryPointID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (i *Instance) restart(req *route.Request) route.Response {\n\tmsg.Info(\"Instance Restart: %s\", i.Name())\n\tif i.Destroyed() {\n\t\tmsg.Detail(\"Instance does not exist, skipping...\")\n\t\treturn route.OK\n\t}\n\tif resp := i.Derived().PreRestart(req); resp != route.OK {\n\t\treturn resp\n\t}\n\tif resp := i.Derived().Restart(req); resp != route.OK {\n\t\treturn resp\n\t}\n\tif resp := i.Derived().PostRestart(req); resp != route.OK {\n\t\treturn resp\n\t}\n\tmsg.Detail(\"Restarted: %s\", i.Id())\n\taaa.Accounting(\"Instance restarted: %s, %s\", i.Name(), i.Id())\n\treturn route.OK\n}", "func (client *CloudServiceRoleInstancesClient) getCreateRequest(ctx context.Context, roleInstanceName string, resourceGroupName string, cloudServiceName string, options *CloudServiceRoleInstancesGetOptions) (*azcore.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/roleInstances/{roleInstanceName}\"\n\tif roleInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter roleInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{roleInstanceName}\", url.PathEscape(roleInstanceName))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := azcore.NewRequest(ctx, http.MethodGet, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\treqQP := req.URL.Query()\n\treqQP.Set(\"api-version\", \"2021-03-01\")\n\tif options != nil && options.Expand != nil {\n\t\treqQP.Set(\"$expand\", string(*options.Expand))\n\t}\n\treq.URL.RawQuery = reqQP.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *PublicIPAddressesClient) listVirtualMachineScaleSetVMPublicIPAddressesCreateRequest(ctx context.Context, resourceGroupName string, virtualMachineScaleSetName string, virtualmachineIndex string, networkInterfaceName string, ipConfigurationName string, options *PublicIPAddressesClientListVirtualMachineScaleSetVMPublicIPAddressesOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/virtualMachineScaleSets/{virtualMachineScaleSetName}/virtualMachines/{virtualmachineIndex}/networkInterfaces/{networkInterfaceName}/ipconfigurations/{ipConfigurationName}/publicipaddresses\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif virtualMachineScaleSetName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualMachineScaleSetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualMachineScaleSetName}\", url.PathEscape(virtualMachineScaleSetName))\n\tif virtualmachineIndex == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualmachineIndex cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualmachineIndex}\", url.PathEscape(virtualmachineIndex))\n\tif networkInterfaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkInterfaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkInterfaceName}\", url.PathEscape(networkInterfaceName))\n\tif ipConfigurationName == \"\" {\n\t\treturn nil, errors.New(\"parameter ipConfigurationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{ipConfigurationName}\", url.PathEscape(ipConfigurationName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2018-10-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client InfraRoleInstancesClient) RebootPreparer(ctx context.Context, location string, infraRoleInstance string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"infraRoleInstance\": autorest.Encode(\"path\", infraRoleInstance),\n\t\t\"location\": autorest.Encode(\"path\", location),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t}\n\n\tconst APIVersion = \"2016-05-01\"\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": APIVersion,\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsPost(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/System.{location}/providers/Microsoft.Fabric.Admin/fabricLocations/{location}/infraRoleInstances/{infraRoleInstance}/Reboot\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func (client *WebAppsClient) resetProductionSlotConfigCreateRequest(ctx context.Context, resourceGroupName string, name string, options *WebAppsResetProductionSlotConfigOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/resetSlotConfig\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func preparecreateServiceparams(params map[string]string, createservice Createservice, Region string) {\n\tif Region != \"\" {\n\t\tparams[\"Region\"] = Region\n\t}\n\tparams[\"amztarget\"] = \"AmazonEC2ContainerServiceV20141113.CreateService\"\n}", "func (a ClustersAPI) Restart(clusterID string) error {\n\tdata := struct {\n\t\tClusterID string `json:\"cluster_id,omitempty\" url:\"cluster_id,omitempty\"`\n\t}{\n\t\tclusterID,\n\t}\n\t_, err := a.Client.performQuery(http.MethodPost, \"/clusters/restart\", data, nil)\n\treturn err\n}", "func CreateDescribeReservedInstancesRequest() (request *DescribeReservedInstancesRequest) {\n\trequest = &DescribeReservedInstancesRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Ecs\", \"2014-05-26\", \"DescribeReservedInstances\", \"ecs\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func prepareCreateclusterrparams(params map[string]string, clusterName string, Region string) {\n\tif clusterName != \"\" {\n\t\tparams[\"clusterName\"] = clusterName\n\t}\n\tif Region != \"\" {\n\t\tparams[\"Region\"] = Region\n\t}\n\tparams[\"amztarget\"] = \"AmazonEC2ContainerServiceV20141113.CreateCluster\"\n}", "func (client *CloudServicesClient) rebuildCreateRequest(ctx context.Context, resourceGroupName string, cloudServiceName string, options *CloudServicesClientBeginRebuildOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/rebuild\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-09-04\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\tif options != nil && options.Parameters != nil {\n\t\treturn req, runtime.MarshalAsJSON(req, *options.Parameters)\n\t}\n\treturn req, nil\n}", "func (x *fastReflection_Params) New() protoreflect.Message {\n\treturn new(fastReflection_Params)\n}", "func NewStartV1Params() *StartV1Params {\n\tvar ()\n\treturn &StartV1Params{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *Client) RenewInstanceWithOptions(request *RenewInstanceRequest, runtime *util.RuntimeOptions) (_result *RenewInstanceResponse, _err error) {\n\t_err = util.ValidateModel(request)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\tquery := map[string]interface{}{}\n\tif !tea.BoolValue(util.IsUnset(request.AutoPay)) {\n\t\tquery[\"AutoPay\"] = request.AutoPay\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.BusinessInfo)) {\n\t\tquery[\"BusinessInfo\"] = request.BusinessInfo\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Capacity)) {\n\t\tquery[\"Capacity\"] = request.Capacity\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ClientToken)) {\n\t\tquery[\"ClientToken\"] = request.ClientToken\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.CouponNo)) {\n\t\tquery[\"CouponNo\"] = request.CouponNo\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.FromApp)) {\n\t\tquery[\"FromApp\"] = request.FromApp\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.InstanceClass)) {\n\t\tquery[\"InstanceClass\"] = request.InstanceClass\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.InstanceId)) {\n\t\tquery[\"InstanceId\"] = request.InstanceId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.OwnerAccount)) {\n\t\tquery[\"OwnerAccount\"] = request.OwnerAccount\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.OwnerId)) {\n\t\tquery[\"OwnerId\"] = request.OwnerId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Period)) {\n\t\tquery[\"Period\"] = request.Period\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ResourceOwnerAccount)) {\n\t\tquery[\"ResourceOwnerAccount\"] = request.ResourceOwnerAccount\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ResourceOwnerId)) {\n\t\tquery[\"ResourceOwnerId\"] = request.ResourceOwnerId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.SecurityToken)) {\n\t\tquery[\"SecurityToken\"] = request.SecurityToken\n\t}\n\n\treq := &openapi.OpenApiRequest{\n\t\tQuery: openapiutil.Query(query),\n\t}\n\tparams := &openapi.Params{\n\t\tAction: tea.String(\"RenewInstance\"),\n\t\tVersion: tea.String(\"2015-01-01\"),\n\t\tProtocol: tea.String(\"HTTPS\"),\n\t\tPathname: tea.String(\"/\"),\n\t\tMethod: tea.String(\"POST\"),\n\t\tAuthType: tea.String(\"AK\"),\n\t\tStyle: tea.String(\"RPC\"),\n\t\tReqBodyType: tea.String(\"formData\"),\n\t\tBodyType: tea.String(\"json\"),\n\t}\n\t_result = &RenewInstanceResponse{}\n\t_body, _err := client.CallApi(params, req, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_err = tea.Convert(_body, &_result)\n\treturn _result, _err\n}", "func (client *VirtualMachineScaleSetsClient) restart(ctx context.Context, resourceGroupName string, vmScaleSetName string, options *VirtualMachineScaleSetsBeginRestartOptions) (*http.Response, error) {\n\treq, err := client.restartCreateRequest(ctx, resourceGroupName, vmScaleSetName, options)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresp, err := client.pl.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !runtime.HasStatusCode(resp, http.StatusOK, http.StatusAccepted) {\n\t\treturn nil, client.restartHandleError(resp)\n\t}\n\treturn resp, nil\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t}\n}", "func NewGetPublicsRecipeParamsWithTimeout(timeout time.Duration) *GetPublicsRecipeParams {\n\n\treturn &GetPublicsRecipeParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "func NewClient(config *ucloud.Config, credential *auth.Credential) *VPCClient {\n\tmeta := ucloud.ClientMeta{Product: \"VPC\"}\n\tclient := ucloud.NewClientWithMeta(config, credential, meta)\n\treturn &VPCClient{\n\t\tclient,\n\t}\n}", "func main() {\n\t// Env Vars\n\tawsRegion := os.Getenv(\"awsRegion\")\n\n\tsourceRDS := os.Getenv(\"sourceRDS\")\n\trestoreRDS := os.Getenv(\"restoreRDS\")\n\trdsSubnetGroup := os.Getenv(\"rdsSubnetGroup\")\n\trdsSecurityGroupId := os.Getenv(\"rdsSecurityGroupId\")\n\n\t// Optional restore date and time - defaults to latest available point in time\n\trestoreDate := os.Getenv(\"restoreDate\")\n\trestoreTime := os.Getenv(\"restoreTime\")\n\n\t// Optional instance type - defaults to db.t3.small\n\trdsInstanceType := os.Getenv(\"rdsInstanceType\")\n\n\t// Optional rds engine - defaults to aurora-mysql\n\trdsEngine := os.Getenv(\"rdsEngine\")\n\n\t// TODO: figure out how to add this to created cluster without too many conditionals\n\t // both on - db_cluster_parameter_group_name and db_parameter_group_name\n\n\t// Optional parameter group - defaults to default.aurora-mysql5.7\n\t//rdsParameterGroup := os.Getenv(\"rdsParameterGroup\")\n\n\t// Params\n\tvar restoreParams = map[string]string{\n\t\t\"awsRegion\": awsRegion,\n\t\t\"sourceRDS\": sourceRDS,\n\t\t\"restoreRDS\": restoreRDS,\n\t\t\"rdsSubnetGroup\": rdsSubnetGroup,\n\t\t\"rdsSecurityGroupId\": rdsSecurityGroupId,\n\t}\n\n\t// Init AWS Session and RDS Client\n\trdsClient, initErr := initRDSClient(awsRegion)\n\tif initErr != nil {\n\t\tfmt.Printf(\"Init Err: %v\", initErr)\n\t\tos.Exit(1)\n\t}\n\n\t// If date and time provided use it instead of last restorable time\n\tif restoreDate != \"\" {\n\t\tif restoreTime != \"\" {\n\t\t\trestoreParams[\"restoreFromTime\"] = restoreDate + \"T\" + restoreTime + \".000Z\"\n\t\t} else {\n\t\t\trestoreParams[\"restoreFromTime\"] = restoreDate + \"T01:00:00.000Z\"\n\t\t}\n\t\tfmt.Printf(\"Restore time set to %v\\n\", restoreParams[\"restoreFromTime\"])\n\t} else {\n\t\tfmt.Printf(\"Restore time set to latest available\\n\")\n\t}\n\n\t// If instance type provided change default\n\tif rdsInstanceType != \"\" {\n\t\trestoreParams[\"rdsInstanceType\"] = rdsInstanceType\n\t} else {\n\t\trestoreParams[\"rdsInstanceType\"] = \"db.t3.small\"\n\t}\n\n\t// If rds engine provided change default\n\tif rdsEngine != \"\" {\n\t\trestoreParams[\"rdsEngine\"] = rdsEngine\n\t} else {\n\t\trestoreParams[\"rdsEngine\"] = \"aurora-mysql\"\n\t}\n\n\t//// If rds parameter group provided change default\n\t//if rdsEngine != \"\" {\n\t\t//restoreParams[\"rdsParameterGroup\"] = rdsParameterGroup\n\t//} else {\n\t\t//restoreParams[\"rdsParameterGroup\"] = \"default.aurora-mysql5.7\"\n\t//}\n\n\t// Check if RDS instance exists, if it doesn't, skip Instance delete step\n\trdsInstanceExists, checkRDSInstanceExistsErr := rdsInstanceExists(rdsClient, restoreParams)\n\tif checkRDSInstanceExistsErr != nil {\n\t\tfmt.Printf(\"Check if RDS Instance exists Err: %v\", checkRDSInstanceExistsErr)\n\t\tos.Exit(1)\n\t}\n\n\t// Check if RDS instance exists, if it doesn't skip Instance delete step\n\tif rdsInstanceExists {\n\t\t// Delete RDS instance\n\t\tdeleteInstanceErr := deleteRDSInstance(rdsClient, restoreParams)\n\t\tif deleteInstanceErr != nil {\n\t\t\tfmt.Printf(\"Delete RDS Instance Err: %v\", deleteInstanceErr)\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\twaitDeleteInstanceErr := waitUntilRDSInstanceDeleted(rdsClient, restoreParams)\n\t\tif waitDeleteInstanceErr != nil {\n\t\t\tfmt.Printf(\"Wait RDS Instance delete Err : %v\", waitDeleteInstanceErr)\n\t\t\tos.Exit(1)\n\t\t}\n\t}\n\n\t// Check if RDS cluster exists, if it doesn't, skip Cluster delete step\n\t// Should be executed only if Instance is deleted first, as instance deletion actually deletes cluster as well\n\trdsClusterExists, checkRDSClusterExistsErr := rdsClusterExists(rdsClient, restoreParams)\n\tif checkRDSClusterExistsErr != nil {\n\t\tfmt.Printf(\"Check if RDS Cluster exists Err: %v\", checkRDSClusterExistsErr)\n\t\tos.Exit(1)\n\t}\n\n\tif rdsClusterExists {\n\t\t// Delete RDS cluster\n\t\tdeleteClusterErr := deleteRDSCluster(rdsClient, restoreParams)\n\t\tif deleteClusterErr != nil {\n\t\t\tfmt.Printf(\"Delete RDS Cluster Err: %v\", deleteClusterErr)\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\t// Wait until RDS Cluster is deleted\n\t\twaitDeleteClusterErr := waitUntilRDSClusterDeleted(rdsClient, restoreParams)\n\t\tif waitDeleteClusterErr != nil {\n\t\t\tfmt.Printf(\"Wait RDS Cluster delete Err : %v\", waitDeleteClusterErr)\n\t\t\tos.Exit(1)\n\t\t}\n\t}\n\n\t// Restore point in time RDS into a new cluster\n\trestoreErr := restorePointInTimeRDS(rdsClient, restoreParams)\n\tif restoreErr != nil {\n\t\tfmt.Printf(\"Restore Point-In-Time RDS Err: %v\", restoreErr)\n\t\tos.Exit(1)\n\t}\n\n\t// Wait until DB instance created\n\twaitClusterCreateErr := waitUntilRDSClusterCreated(rdsClient, restoreParams)\n\tif waitClusterCreateErr != nil {\n\t\tfmt.Printf(\"Wait RDS Cluster create Err: %v\", waitClusterCreateErr)\n\t\tos.Exit(1)\n\t}\n\n\t// Create RDS Instance in RDS Cluster\n\tcreateRDSInstanceErr := createRDSInstance(rdsClient, restoreParams)\n\tif createRDSInstanceErr != nil {\n\t\tfmt.Printf(\"Create RDS Instance Err: %v\", createRDSInstanceErr)\n\t\tos.Exit(1)\n\t}\n\n\t// Wait until DB instance created in RDS cluster\n\twaitInstanceCreateErr := waitUntilRDSInstanceCreated(rdsClient, restoreParams)\n\tif waitInstanceCreateErr != nil {\n\t\tfmt.Printf(\"Wait RDS Instance create Err: %v\", waitInstanceCreateErr)\n\t\tos.Exit(1)\n\t}\n}", "func NewRestartApmRetryWith() *RestartApmRetryWith {\n\treturn &RestartApmRetryWith{}\n}", "func NewParams() (Params, error) {\n\treturn Params{\n\t\tBaseParams: codec.BaseParams{\n\t\t\tKeyFrameInterval: 60,\n\t\t},\n\t}, nil\n}", "func (ts *Tester) deleteVPC() error {\n\tif !ts.cfg.VPC.Create {\n\t\tts.lg.Info(\"VPC.Create false; skipping deletion\")\n\t\treturn nil\n\t}\n\n\twaitDur := 30 * time.Second\n\tts.lg.Info(\"sleeping before VPC deletion\", zap.Duration(\"wait\", waitDur))\n\ttime.Sleep(waitDur)\n\n\tts.lg.Info(\"deleting VPC\", zap.String(\"vpc-id\", ts.cfg.VPC.ID))\n\n\tvar errs []string\n\n\tif err := ts.revokeSecurityGroups(); err != nil {\n\t\tts.lg.Warn(\"failed to delete ELB v2\", zap.Error(err))\n\t\ttime.Sleep(10 * time.Second) // retry\n\t}\n\tif err := ts.deleteELBv2(); err != nil {\n\t\tts.lg.Warn(\"failed to delete ELB v2\", zap.Error(err))\n\t\ttime.Sleep(10 * time.Second) // retry\n\t}\n\tif err := ts.deleteDHCPOptions(); err != nil {\n\t\tts.lg.Warn(\"failed to delete DHCP options\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\n\tif err := ts.deletePrivateSubnetRouteTableAssociation(); err != nil {\n\t\tts.lg.Warn(\"failed to delete subnet route table association\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\tif err := ts.deletePrivateRouteTables(); err != nil {\n\t\tts.lg.Warn(\"failed to delete private route tables\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\tif err := ts.deletePrivateSubnets(); err != nil {\n\t\tts.lg.Warn(\"failed to delete private subnets\", zap.Error(err))\n\t\ttime.Sleep(10 * time.Second)\n\t}\n\n\tselect {\n\tcase <-time.After(30 * time.Second):\n\tcase <-ts.stopCreationCh:\n\t\treturn errors.New(\"stopped\")\n\t}\n\n\tif err := ts.deleteELBv2(); err != nil {\n\t\tts.lg.Warn(\"failed to delete ELB v2\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\tif err := ts.revokeSecurityGroups(); err != nil {\n\t\tts.lg.Warn(\"failed to revoke security groups\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\n\tselect {\n\tcase <-time.After(10 * time.Second):\n\tcase <-ts.stopCreationCh:\n\t\treturn errors.New(\"stopped\")\n\t}\n\n\tif err := ts.deletePublicNATGateways(); err != nil {\n\t\tts.lg.Warn(\"failed to delete public NAT gateways\", zap.Error(err))\n\t\ttime.Sleep(20 * time.Second)\n\t}\n\tif err := ts.deletePublicEIPs(); err != nil {\n\t\tts.lg.Warn(\"failed to delete public EIPs\", zap.Error(err))\n\t\ttime.Sleep(10 * time.Second)\n\t}\n\n\tselect {\n\tcase <-time.After(10 * time.Second):\n\tcase <-ts.stopCreationCh:\n\t\treturn errors.New(\"stopped\")\n\t}\n\n\t// try again, NAT gateway delete may take some time\n\tif err := ts.deletePublicNATGateways(); err != nil {\n\t\tts.lg.Warn(\"failed to delete public NAT gateways\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\tif err := ts.deletePublicEIPs(); err != nil {\n\t\tts.lg.Warn(\"failed to delete public EIPs\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\n\tselect {\n\tcase <-time.After(10 * time.Second):\n\tcase <-ts.stopCreationCh:\n\t\treturn errors.New(\"stopped\")\n\t}\n\n\tif err := ts.deletePublicSubnetRouteTableAssociation(); err != nil {\n\t\tts.lg.Warn(\"failed to delete public subnet route table association\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\tif err := ts.deletePublicRouteTable(); err != nil {\n\t\tts.lg.Warn(\"failed to delete public route table\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\tif err := ts.deletePrivateSubnets(); err != nil {\n\t\tts.lg.Warn(\"failed to delete private subnets\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\tif err := ts.deletePublicSubnets(); err != nil {\n\t\tts.lg.Warn(\"failed to delete public subnets\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\n\tselect {\n\tcase <-time.After(10 * time.Second):\n\tcase <-ts.stopCreationCh:\n\t\treturn errors.New(\"stopped\")\n\t}\n\n\tif err := ts.deleteVPCGatewayAttachment(); err != nil {\n\t\tts.lg.Warn(\"failed to VPC gateway attachment\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\tif err := ts.deleteInternetGateway(); err != nil {\n\t\tts.lg.Warn(\"failed to delete internet gateway\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\n\tselect {\n\tcase <-time.After(10 * time.Second):\n\tcase <-ts.stopCreationCh:\n\t\treturn errors.New(\"stopped\")\n\t}\n\n\tif err := ts.deleteOtherSecurityGroups(); err != nil {\n\t\tts.lg.Warn(\"failed to delete sg\", zap.Error(err))\n\t\ttime.Sleep(10 * time.Second)\n\t}\n\tif err := ts.deleteSecurityGroups(); err != nil {\n\t\tts.lg.Warn(\"failed to delete ENIs\", zap.Error(err))\n\t\ttime.Sleep(10 * time.Second)\n\t}\n\n\tselect {\n\tcase <-time.After(20 * time.Second):\n\tcase <-ts.stopCreationCh:\n\t\treturn errors.New(\"stopped\")\n\t}\n\n\tif err := ts.deleteSecurityGroups(); err != nil {\n\t\tts.lg.Warn(\"failed to delete ENIs\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\n\tif err := ts._deleteVPC(); err != nil {\n\t\tts.lg.Warn(\"failed to delete VPC\", zap.Error(err))\n\t\terrs = append(errs, err.Error())\n\t}\n\n\tif len(errs) > 0 {\n\t\treturn errors.New(strings.Join(errs, \",\"))\n\t}\n\treturn nil\n}", "func (q *CoreClient) Restart() (err error) {\n\t_, err = q.RequestWithoutData(http.MethodPost, \"/safeRestart\", nil, nil, 503)\n\treturn\n}", "func (client *ManagedClustersClient) resetServicePrincipalProfileCreateRequest(ctx context.Context, resourceGroupName string, resourceName string, parameters ManagedClusterServicePrincipalProfile, options *ManagedClustersClientBeginResetServicePrincipalProfileOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerService/managedClusters/{resourceName}/resetServicePrincipalProfile\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif resourceName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceName}\", url.PathEscape(resourceName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2020-11-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (client *ItemLevelRecoveryConnectionsClient) revokeCreateRequest(ctx context.Context, vaultName string, resourceGroupName string, fabricName string, containerName string, protectedItemName string, recoveryPointID string, options *ItemLevelRecoveryConnectionsClientRevokeOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.RecoveryServices/vaults/{vaultName}/backupFabrics/{fabricName}/protectionContainers/{containerName}/protectedItems/{protectedItemName}/recoveryPoints/{recoveryPointId}/revokeInstantItemRecovery\"\n\tif vaultName == \"\" {\n\t\treturn nil, errors.New(\"parameter vaultName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vaultName}\", url.PathEscape(vaultName))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif fabricName == \"\" {\n\t\treturn nil, errors.New(\"parameter fabricName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{fabricName}\", url.PathEscape(fabricName))\n\tif containerName == \"\" {\n\t\treturn nil, errors.New(\"parameter containerName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{containerName}\", url.PathEscape(containerName))\n\tif protectedItemName == \"\" {\n\t\treturn nil, errors.New(\"parameter protectedItemName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{protectedItemName}\", url.PathEscape(protectedItemName))\n\tif recoveryPointID == \"\" {\n\t\treturn nil, errors.New(\"parameter recoveryPointID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{recoveryPointId}\", url.PathEscape(recoveryPointID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewGetPublicsRecipeParams() *GetPublicsRecipeParams {\n\n\treturn &GetPublicsRecipeParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func CreateStopInstancesRequest() (request *StopInstancesRequest) {\n\trequest = &StopInstancesRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Ecs\", \"2014-05-26\", \"StopInstances\", \"ecs\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func (action *GenerateVPCConfigRequestAction) ExecuteAction(input interface{}) (output interface{}, err error) {\n\tlog.Infoln(\"EXECUTE GenerateVPCConfigRequestAction, stack name:\", action.stackName)\n\tcloudformationSrv := cloudformation.New(action.context.Session)\n\n\tdescribeStackResourcesInput := &cloudformation.DescribeStackResourcesInput{\n\t\tStackName: aws.String(action.stackName),\n\t}\n\n\tstackResources, err := cloudformationSrv.DescribeStackResources(describeStackResourcesInput)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tstackResourceMap := make(map[string]cloudformation.StackResource)\n\tfor _, res := range stackResources.StackResources {\n\t\tstackResourceMap[*res.LogicalResourceId] = *res\n\t}\n\n\tsecurityGroupResource, found := stackResourceMap[\"ControlPlaneSecurityGroup\"]\n\tif !found {\n\t\treturn nil, errors.New(\"Unable to find ControlPlaneSecurityGroup resource\")\n\t}\n\tsubnet01resource, found := stackResourceMap[\"Subnet01\"]\n\tif !found {\n\t\treturn nil, errors.New(\"Unable to find Subnet02 resource\")\n\t}\n\tsubnet02resource, found := stackResourceMap[\"Subnet02\"]\n\tif !found {\n\t\treturn nil, errors.New(\"Unable to find Subnet01 resource\")\n\t}\n\tsubnet03resource, found := stackResourceMap[\"Subnet03\"]\n\tif !found {\n\t\treturn nil, errors.New(\"Unable to find Subnet03 resource\")\n\t}\n\tvpcResource, found := stackResourceMap[\"VPC\"]\n\tif !found {\n\t\treturn nil, errors.New(\"Unable to find VPC resource\")\n\t}\n\n\tlog.Infof(\"Stack resources: %v\", stackResources)\n\n\taction.context.VpcID = vpcResource.PhysicalResourceId\n\taction.context.SecurityGroupID = securityGroupResource.PhysicalResourceId\n\taction.context.SubnetIDs = []*string{subnet01resource.PhysicalResourceId, subnet02resource.PhysicalResourceId, subnet03resource.PhysicalResourceId}\n\n\treturn &eks.VpcConfigRequest{\n\t\tSecurityGroupIds: []*string{action.context.SecurityGroupID},\n\t\tSubnetIds: action.context.SubnetIDs,\n\t}, nil\n}", "func (client *PublicIPAddressesClient) createOrUpdateCreateRequest(ctx context.Context, resourceGroupName string, publicIPAddressName string, parameters PublicIPAddress, options *PublicIPAddressesClientBeginCreateOrUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/publicIPAddresses/{publicIpAddressName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif publicIPAddressName == \"\" {\n\t\treturn nil, errors.New(\"parameter publicIPAddressName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{publicIpAddressName}\", url.PathEscape(publicIPAddressName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPut, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (client *CapacityReservationsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, capacityReservationGroupName string, capacityReservationName string, parameters CapacityReservationUpdate, options *CapacityReservationsBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/capacityReservationGroups/{capacityReservationGroupName}/capacityReservations/{capacityReservationName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif capacityReservationGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter capacityReservationGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{capacityReservationGroupName}\", url.PathEscape(capacityReservationGroupName))\n\tif capacityReservationName == \"\" {\n\t\treturn nil, errors.New(\"parameter capacityReservationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{capacityReservationName}\", url.PathEscape(capacityReservationName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (client *ClustersClient) stopCreateRequest(ctx context.Context, resourceGroupName string, clusterName string, options *ClustersClientBeginStopOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/serverGroupsv2/{clusterName}/stop\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif clusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterName}\", url.PathEscape(clusterName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-11-08\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (s *VPCService) NewCreateVPCOfferingParams(displaytext string, name string, supportedservices []string) *CreateVPCOfferingParams {\n\tp := &CreateVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"displaytext\"] = displaytext\n\tp.p[\"name\"] = name\n\tp.p[\"supportedservices\"] = supportedservices\n\treturn p\n}", "func (m *MockRouterServiceIface) NewRebootRouterParams(id string) *RebootRouterParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewRebootRouterParams\", id)\n\tret0, _ := ret[0].(*RebootRouterParams)\n\treturn ret0\n}", "func NewMockPVWithParams(privKey crypto.PrivKey, breakProposalSigning, breakVoteSigning bool) MockPV {\n\treturn MockPV{privKey, breakProposalSigning, breakVoteSigning}\n}", "func NewParams() *Params {\n\treturn new(Params)\n}", "func SchedulerRestartOp(nodes []*cke.Node, cluster string, params cke.ServiceParams) cke.Operator {\n\treturn &schedulerRestartOp{\n\t\tnodes: nodes,\n\t\tcluster: cluster,\n\t\tparams: params,\n\t}\n}", "func Restart(args ...string) {\n logger.Log(fmt.Sprintf(\"Restarting %v\\n\", process))\n Stop(args...)\n Start(args...)\n}", "func RestartFrame(callFrameID CallFrameID) *RestartFrameParams {\n\treturn &RestartFrameParams{\n\t\tCallFrameID: callFrameID,\n\t}\n}", "func (client *CapacityReservationsClient) createOrUpdateCreateRequest(ctx context.Context, resourceGroupName string, capacityReservationGroupName string, capacityReservationName string, parameters CapacityReservation, options *CapacityReservationsBeginCreateOrUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/capacityReservationGroups/{capacityReservationGroupName}/capacityReservations/{capacityReservationName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif capacityReservationGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter capacityReservationGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{capacityReservationGroupName}\", url.PathEscape(capacityReservationGroupName))\n\tif capacityReservationName == \"\" {\n\t\treturn nil, errors.New(\"parameter capacityReservationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{capacityReservationName}\", url.PathEscape(capacityReservationName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPut, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func NewParams(pricePerByte abi.TokenAmount, paymentInterval uint64, paymentIntervalIncrease uint64) (Params, error) {\n\treturn Params{\n\t\tPricePerByte: pricePerByte,\n\t\tPaymentInterval: paymentInterval,\n\t\tPaymentIntervalIncrease: paymentIntervalIncrease,\n\t}, nil\n}", "func (m Miner) Restart() error {\n\tclient, err := jsonrpc.Dial(\"tcp\", m.Address)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer client.Close()\n\targs.psw = m.Password\n\treturn client.Call(methodRestartMiner, args, nil)\n}", "func testRenderNewVPC(vpc api.EKSAsset) (string, error) {\n\tt, err := template.New(\"eksTemplate\").Parse(newVPCTempl)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn executeTemplate(t, vpc)\n}", "func TestDvLIRClient_Restart(t *testing.T) {\n\tip := viper.GetString(\"IPAddress\")\n\tpw := viper.GetString(\"Password\")\n\n\tdvlirClient, err := NewDvLIRClient(ip, pw)\n\tif !assert.NoError(t, err, \"Error while creating Api client\") {\n\t\treturn\n\t}\n\n\terr = dvlirClient.Login()\n\tif !assert.NoError(t, err, \"Error during Login\") {\n\t\treturn\n\t}\n\n\t_, err = dvlirClient.AllowResetWithPwd(\"Yes\")\n\tif !assert.NoError(t, err, \"Error during AllowResetWithPwd request\") {\n\t\treturn\n\t}\n\n\tres, err := dvlirClient.Restart()\n\tif !assert.NoError(t, err, \"Error during Restart request\") {\n\t\treturn\n\t}\n\n\tfmt.Println(res)\n\tdefer func() {\n\t\terr = dvlirClient.Logout()\n\t\tif !assert.NoError(t, err, \"Error during Logout\") {\n\t\t\treturn\n\t\t}\n\t}()\n}", "func (client *WebAppsClient) recoverSiteConfigurationSnapshotSlotCreateRequest(ctx context.Context, resourceGroupName string, name string, snapshotID string, slot string, options *WebAppsRecoverSiteConfigurationSnapshotSlotOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/slots/{slot}/config/web/snapshots/{snapshotId}/recover\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif snapshotID == \"\" {\n\t\treturn nil, errors.New(\"parameter snapshotID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{snapshotId}\", url.PathEscape(snapshotID))\n\tif slot == \"\" {\n\t\treturn nil, errors.New(\"parameter slot cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{slot}\", url.PathEscape(slot))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (pomo *Pomo) Restart() {\n\tpomo.SetDuration(DEFAULT_DURATION)\n}", "func (s stack) CreateNetwork(req abstract.NetworkRequest) (res *abstract.Network, ferr fail.Error) {\n\tnullAN := abstract.NewNetwork()\n\tif s.IsNull() {\n\t\treturn nullAN, fail.InvalidInstanceError()\n\t}\n\n\tdefer debug.NewTracer(nil, tracing.ShouldTrace(\"stack.aws\") || tracing.ShouldTrace(\"stacks.network\"), \"(%v)\", req).WithStopwatch().Entering().Exiting()\n\n\t// Check if network already there\n\tvar xerr fail.Error\n\tif _, xerr = s.rpcDescribeVpcByName(aws.String(req.Name)); xerr != nil {\n\t\tswitch xerr.(type) {\n\t\tcase *fail.ErrNotFound:\n\t\t\tdebug.IgnoreError(xerr)\n\t\t\t// continue\n\t\tdefault:\n\t\t\treturn nullAN, xerr\n\t\t}\n\t} else {\n\t\treturn nullAN, fail.DuplicateError(\"a Network/VPC named '%s' already exists\")\n\t}\n\n\t// if not, create the network/VPC\n\ttheVpc, xerr := s.rpcCreateVpc(aws.String(req.Name), aws.String(req.CIDR))\n\tif xerr != nil {\n\t\treturn nullAN, fail.Wrap(xerr, \"failed to create VPC\")\n\t}\n\n\t// wait until available status\n\tif IsOperation(theVpc, \"State\", reflect.TypeOf(\"\")) {\n\t\tretryErr := retry.WhileUnsuccessful(\n\t\t\tfunc() error {\n\t\t\t\tvpcTmp, innerXErr := s.rpcDescribeVpcByID(theVpc.VpcId)\n\t\t\t\tif innerXErr != nil {\n\t\t\t\t\treturn innerXErr\n\t\t\t\t}\n\t\t\t\tif aws.StringValue(vpcTmp.State) != \"available\" {\n\t\t\t\t\treturn fail.NewError(\"not ready\")\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t},\n\t\t\ttemporal.GetMinDelay(),\n\t\t\ttemporal.GetDefaultDelay(),\n\t\t)\n\t\tif retryErr != nil {\n\t\t\tswitch retryErr.(type) {\n\t\t\tcase *retry.ErrStopRetry:\n\t\t\t\treturn nullAN, fail.Wrap(fail.Cause(retryErr), \"stopping retries\")\n\t\t\tcase *fail.ErrTimeout:\n\t\t\t\treturn nullAN, fail.Wrap(fail.Cause(retryErr), \"timeout\")\n\t\t\tdefault:\n\t\t\t\treturn nullAN, retryErr\n\t\t\t}\n\t\t}\n\t}\n\n\tdefer func() {\n\t\tif ferr != nil && !req.KeepOnFailure {\n\t\t\tif theVpc != nil {\n\t\t\t\tderr := s.DeleteNetwork(aws.StringValue(theVpc.VpcId))\n\t\t\t\tif derr != nil {\n\t\t\t\t\t_ = ferr.AddConsequence(derr)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}()\n\n\tgw, xerr := s.rpcCreateInternetGateway()\n\tif xerr != nil {\n\t\treturn nullAN, fail.Wrap(xerr, \"failed to create internet gateway\")\n\t}\n\n\tif xerr = s.rpcAttachInternetGateway(theVpc.VpcId, gw.InternetGatewayId); xerr != nil {\n\t\treturn nullAN, fail.Wrap(xerr, \"failed to attach internet gateway to Network\")\n\t}\n\n\tdefer func() {\n\t\tif ferr != nil && !req.KeepOnFailure {\n\t\t\tif derr := s.rpcDetachInternetGateway(theVpc.VpcId, gw.InternetGatewayId); derr != nil {\n\t\t\t\t_ = ferr.AddConsequence(normalizeError(derr))\n\t\t\t}\n\t\t}\n\t}()\n\n\ttables, xerr := s.rpcDescribeRouteTables(aws.String(\"vpc-id\"), []*string{theVpc.VpcId})\n\tif xerr != nil {\n\t\treturn nullAN, xerr\n\t}\n\tif len(tables) < 1 {\n\t\treturn nullAN, fail.InconsistentError(\"no Route Tables\")\n\t}\n\n\tif xerr = s.rpcCreateRoute(gw.InternetGatewayId, tables[0].RouteTableId, aws.String(\"0.0.0.0/0\")); xerr != nil {\n\t\treturn nullAN, fail.Wrap(xerr, \"failed to create route\")\n\t}\n\n\tdefer func() {\n\t\tif ferr != nil && !req.KeepOnFailure {\n\t\t\tif derr := s.rpcDeleteRoute(tables[0].RouteTableId, aws.String(\"0.0.0.0/0\")); derr != nil {\n\t\t\t\t_ = ferr.AddConsequence(normalizeError(derr))\n\t\t\t}\n\t\t}\n\t}()\n\n\tanet := abstract.NewNetwork()\n\tanet.ID = aws.StringValue(theVpc.VpcId)\n\tanet.Name = req.Name\n\tanet.CIDR = req.CIDR\n\tanet.DNSServers = req.DNSServers\n\n\t// Make sure we log warnings\n\t_ = anet.OK()\n\n\treturn anet, nil\n}", "func newRebalanceOptions() *rebalanceOptions {\n\treturn &rebalanceOptions{\n\t\tconfig: clusterConfigShim{},\n\t\tlogger: log.NewNopLogger(),\n\t\tclock: clock.New(),\n\t}\n}", "func buildApplyInstanceRequest(group *proto.NodeGroup, operator string) *resource.ApplyInstanceReq {\n\treturn &resource.ApplyInstanceReq{\n\t\tNodeType: resource.CVM,\n\n\t\tRegion: group.GetRegion(),\n\t\tVpcID: group.GetAutoScaling().GetVpcID(),\n\t\tZoneList: group.GetAutoScaling().Zones,\n\t\tSubnetList: group.GetAutoScaling().SubnetIDs,\n\t\tInstanceType: group.GetLaunchTemplate().InstanceType,\n\t\tCPU: group.GetLaunchTemplate().CPU,\n\t\tMemory: group.GetLaunchTemplate().Mem,\n\t\tGpu: group.GetLaunchTemplate().GPU,\n\t\tInstanceChargeType: group.GetLaunchTemplate().InstanceChargeType,\n\t\tSystemDisk: resource.DataDisk{\n\t\t\tDiskType: group.GetLaunchTemplate().GetSystemDisk().DiskType,\n\t\t\tDiskSize: group.GetLaunchTemplate().GetSystemDisk().DiskSize,\n\t\t},\n\t\tDataDisks: func() []resource.DataDisk {\n\t\t\tif len(group.GetLaunchTemplate().GetDataDisks()) > 0 {\n\t\t\t\tdisks := make([]resource.DataDisk, 0)\n\t\t\t\tfor _, disk := range group.GetLaunchTemplate().GetDataDisks() {\n\t\t\t\t\tif disk == nil {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tdisks = append(disks, resource.DataDisk{\n\t\t\t\t\t\tDiskType: disk.GetDiskType(),\n\t\t\t\t\t\tDiskSize: disk.GetDiskSize(),\n\t\t\t\t\t})\n\t\t\t\t}\n\t\t\t\treturn disks\n\t\t\t}\n\n\t\t\treturn nil\n\t\t}(),\n\t\tImage: func() *resource.ImageInfo {\n\t\t\tvar (\n\t\t\t\timageId = \"\"\n\t\t\t\timageName = \"\"\n\t\t\t)\n\t\t\tif group.GetLaunchTemplate() != nil && group.GetLaunchTemplate().GetImageInfo() != nil {\n\t\t\t\timageId = group.GetLaunchTemplate().GetImageInfo().ImageID\n\t\t\t\timageName = group.GetLaunchTemplate().GetImageInfo().ImageName\n\t\t\t}\n\t\t\treturn &resource.ImageInfo{\n\t\t\t\tImageID: imageId,\n\t\t\t\tImageName: imageName,\n\t\t\t}\n\t\t}(),\n\t\tLoginInfo: &resource.LoginSettings{Password: group.GetLaunchTemplate().GetInitLoginPassword()},\n\t\tSecurityGroupIds: group.GetLaunchTemplate().GetSecurityGroupIDs(),\n\t\tEnhancedService: &resource.EnhancedService{\n\t\t\tSecurityService: group.GetLaunchTemplate().GetIsSecurityService(),\n\t\t\tMonitorService: group.GetLaunchTemplate().GetIsMonitorService(),\n\t\t},\n\t\tPoolID: group.GetConsumerID(),\n\t\tOperator: operator,\n\t}\n}", "func (client *ReplicationProtectionContainersClient) switchProtectionCreateRequest(ctx context.Context, resourceName string, resourceGroupName string, fabricName string, protectionContainerName string, switchInput SwitchProtectionInput, options *ReplicationProtectionContainersClientBeginSwitchProtectionOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.RecoveryServices/vaults/{resourceName}/replicationFabrics/{fabricName}/replicationProtectionContainers/{protectionContainerName}/switchprotection\"\n\tif resourceName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceName}\", url.PathEscape(resourceName))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif fabricName == \"\" {\n\t\treturn nil, errors.New(\"parameter fabricName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{fabricName}\", url.PathEscape(fabricName))\n\tif protectionContainerName == \"\" {\n\t\treturn nil, errors.New(\"parameter protectionContainerName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{protectionContainerName}\", url.PathEscape(protectionContainerName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-10-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, switchInput)\n}", "func NewParams(opts []copts.Opt) *Params {\r\n\tparams := &Params{}\r\n\tcopts.Apply(params, opts)\r\n\treturn params\r\n}", "func (m *MockSecurityGroupServiceIface) NewRevokeSecurityGroupIngressParams(id string) *RevokeSecurityGroupIngressParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewRevokeSecurityGroupIngressParams\", id)\n\tret0, _ := ret[0].(*RevokeSecurityGroupIngressParams)\n\treturn ret0\n}" ]
[ "0.63760054", "0.6137805", "0.6118869", "0.6013704", "0.5836048", "0.5655855", "0.5580644", "0.55493265", "0.55057836", "0.5347395", "0.52220577", "0.5217112", "0.5205428", "0.5137475", "0.5028076", "0.5016816", "0.49328592", "0.4929713", "0.4915443", "0.48902702", "0.4854745", "0.48424092", "0.48273265", "0.4823891", "0.48156583", "0.4807465", "0.4779603", "0.47620898", "0.4754684", "0.47380218", "0.47346416", "0.47176585", "0.47077337", "0.47070086", "0.4675763", "0.46747643", "0.46390724", "0.46269527", "0.46252134", "0.46177414", "0.46157768", "0.4592336", "0.45898652", "0.45691666", "0.45682016", "0.45646814", "0.4561202", "0.4559777", "0.4558382", "0.45446026", "0.454062", "0.45328468", "0.45115763", "0.4509628", "0.45055646", "0.44918415", "0.44903213", "0.44870996", "0.44817665", "0.4465063", "0.44607657", "0.4455001", "0.44410875", "0.44410443", "0.4438669", "0.44382867", "0.4434774", "0.44322905", "0.44260785", "0.44218993", "0.44181323", "0.44125718", "0.44044244", "0.4398336", "0.43926537", "0.43884534", "0.437366", "0.43708533", "0.43688115", "0.4368272", "0.43625116", "0.4359606", "0.43576556", "0.43553117", "0.43515208", "0.43509677", "0.4324854", "0.43246046", "0.43074515", "0.43064988", "0.4304087", "0.4303961", "0.42948386", "0.42928702", "0.42902225", "0.42901963", "0.42896205", "0.42876533", "0.4286199", "0.42839226" ]
0.74721575
0
You should always use this function to get a new UpdateVPCParams instance, as then you are sure you have configured all required params
func (s *VPCService) NewUpdateVPCParams(id string) *UpdateVPCParams { p := &UpdateVPCParams{} p.p = make(map[string]interface{}) p.p["id"] = id return p }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (s *VPCService) NewUpdateVPCOfferingParams(id string) *UpdateVPCOfferingParams {\n\tp := &UpdateVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func UpdateVPCMocked(t *testing.T, vpcIn *types.Vpc) *types.Vpc {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewVPCService(cs)\n\tassert.Nil(err, \"Couldn't load VPC service\")\n\tassert.NotNil(ds, \"VPC service not instanced\")\n\n\t// convertMap\n\tmapIn, err := utils.ItemConvertParams(*vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// to json\n\tdOut, err := json.Marshal(vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// call service\n\tcs.On(\"Put\", fmt.Sprintf(\"/network/vpcs/%s\", vpcIn.ID), mapIn).Return(dOut, 200, nil)\n\tvpcOut, err := ds.UpdateVPC(mapIn, vpcIn.ID)\n\tassert.Nil(err, \"Error updating VPC list\")\n\tassert.Equal(vpcIn, vpcOut, \"UpdateVPC returned different VPCs\")\n\n\treturn vpcOut\n}", "func (client *PublicIPAddressesClient) updateTagsCreateRequest(ctx context.Context, resourceGroupName string, publicIPAddressName string, parameters TagsObject, options *PublicIPAddressesClientUpdateTagsOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/publicIPAddresses/{publicIpAddressName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif publicIPAddressName == \"\" {\n\t\treturn nil, errors.New(\"parameter publicIPAddressName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{publicIpAddressName}\", url.PathEscape(publicIPAddressName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func SetupVPC(mgr ctrl.Manager, l logging.Logger) error {\n\tname := managed.ControllerName(v1alpha3.VPCGroupKind)\n\treturn ctrl.NewControllerManagedBy(mgr).\n\t\tNamed(name).\n\t\tFor(&v1alpha3.VPC{}).\n\t\tComplete(managed.NewReconciler(mgr,\n\t\t\tresource.ManagedKind(v1alpha3.VPCGroupVersionKind),\n\t\t\tmanaged.WithExternalConnecter(&connector{client: mgr.GetClient(), newClientFn: ec2.NewVPCClient, awsConfigFn: utils.RetrieveAwsConfigFromProvider}),\n\t\t\tmanaged.WithReferenceResolver(managed.NewAPISimpleReferenceResolver(mgr.GetClient())),\n\t\t\tmanaged.WithConnectionPublishers(),\n\t\t\tmanaged.WithInitializers(&tagger{kube: mgr.GetClient()}),\n\t\t\tmanaged.WithLogger(l.WithValues(\"controller\", name)),\n\t\t\tmanaged.WithRecorder(event.NewAPIRecorder(mgr.GetEventRecorderFor(name)))))\n}", "func (s *VPCService) NewRestartVPCParams(id string) *RestartVPCParams {\n\tp := &RestartVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewParams(communityTax sdk.Dec, withdrawAddrEnabled bool) Params {\n\treturn Params{\n\t\tCommunityTax: communityTax,\n\t\tWithdrawAddrEnabled: withdrawAddrEnabled,\n\t}\n}", "func (nt *Network) UpdateParams() {\n\tnt.Network.UpdateParams()\n}", "func NewUpdateSubnetParams() *UpdateSubnetParams {\n\tvar ()\n\treturn &UpdateSubnetParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *CapacityReservationsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, capacityReservationGroupName string, capacityReservationName string, parameters CapacityReservationUpdate, options *CapacityReservationsBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/capacityReservationGroups/{capacityReservationGroupName}/capacityReservations/{capacityReservationName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif capacityReservationGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter capacityReservationGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{capacityReservationGroupName}\", url.PathEscape(capacityReservationGroupName))\n\tif capacityReservationName == \"\" {\n\t\treturn nil, errors.New(\"parameter capacityReservationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{capacityReservationName}\", url.PathEscape(capacityReservationName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (client *ClustersClient) updateCreateRequest(ctx context.Context, resourceGroupName string, clusterName string, parameters ClusterForUpdate, options *ClustersClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/serverGroupsv2/{clusterName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif clusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterName}\", url.PathEscape(clusterName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-11-08\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (ts *Tester) createVPC() error {\n\tif ts.cfg.VPC.ID != \"\" {\n\t\tts.lg.Info(\"querying ELBv2\", zap.String(\"vpc-id\", ts.cfg.VPC.ID))\n\t\tctx, cancel := context.WithTimeout(context.Background(), time.Minute)\n\t\toutput, err := ts.elbv2APIV2.DescribeLoadBalancers(\n\t\t\tctx,\n\t\t\t&aws_elbv2_v2.DescribeLoadBalancersInput{},\n\t\t)\n\t\tcancel()\n\t\tif err != nil {\n\t\t\tts.lg.Warn(\"failed to describe ELBv2\", zap.Error(err))\n\t\t} else {\n\t\t\tfor _, ev := range output.LoadBalancers {\n\t\t\t\tarn := aws_v2.ToString(ev.LoadBalancerArn)\n\t\t\t\tvpcID := aws_v2.ToString(ev.VpcId)\n\t\t\t\tif vpcID == ts.cfg.VPC.ID {\n\t\t\t\t\tts.lg.Warn(\"found ELBv2 for this VPC; may overlap with the other cluster\",\n\t\t\t\t\t\tzap.String(\"vpc-id\", ts.cfg.VPC.ID),\n\t\t\t\t\t\tzap.String(\"elb-arn\", arn),\n\t\t\t\t\t)\n\t\t\t\t} else {\n\t\t\t\t\tts.lg.Info(\"found ELBv2 for other VPCs\", zap.String(\"vpc-id\", vpcID), zap.String(\"elb-arn\", arn))\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tts.lg.Info(\"querying subnet IDs for given VPC\",\n\t\t\tzap.String(\"vpc-id\", ts.cfg.VPC.ID),\n\t\t)\n\t\tctx, cancel = context.WithTimeout(context.Background(), time.Minute)\n\t\tsresp, err := ts.ec2APIV2.DescribeSubnets(\n\t\t\tctx,\n\t\t\t&aws_ec2_v2.DescribeSubnetsInput{\n\t\t\t\tFilters: []aws_ec2_v2_types.Filter{\n\t\t\t\t\t{\n\t\t\t\t\t\tName: aws_v2.String(\"vpc-id\"),\n\t\t\t\t\t\tValues: []string{ts.cfg.VPC.ID},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t})\n\t\tcancel()\n\t\tif err != nil {\n\t\t\tts.lg.Warn(\"failed to subnets\", zap.Error(err))\n\t\t\treturn err\n\t\t}\n\n\t\tts.cfg.VPC.PublicSubnetIDs = make([]string, 0, len(sresp.Subnets))\n\t\tts.cfg.VPC.PrivateSubnetIDs = make([]string, 0, len(sresp.Subnets))\n\t\tfor _, sv := range sresp.Subnets {\n\t\t\tid := aws_v2.ToString(sv.SubnetId)\n\t\t\tnetworkTagValue := \"\"\n\t\t\tfor _, tg := range sv.Tags {\n\t\t\t\tswitch aws_v2.ToString(tg.Key) {\n\t\t\t\tcase \"Network\":\n\t\t\t\t\tnetworkTagValue = aws_v2.ToString(tg.Value)\n\t\t\t\t}\n\t\t\t\tif networkTagValue != \"\" {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tts.lg.Info(\"found subnet\",\n\t\t\t\tzap.String(\"id\", id),\n\t\t\t\tzap.String(\"availability-zone\", aws_v2.ToString(sv.AvailabilityZone)),\n\t\t\t\tzap.String(\"network-tag\", networkTagValue),\n\t\t\t)\n\t\t\tswitch networkTagValue {\n\t\t\tcase \"Public\":\n\t\t\t\tts.cfg.VPC.PublicSubnetIDs = append(ts.cfg.VPC.PublicSubnetIDs, id)\n\t\t\tcase \"Private\":\n\t\t\t\tts.cfg.VPC.PrivateSubnetIDs = append(ts.cfg.VPC.PrivateSubnetIDs, id)\n\t\t\tdefault:\n\t\t\t\treturn fmt.Errorf(\"'Network' tag not found in subnet %q\", id)\n\t\t\t}\n\t\t}\n\t\tif len(ts.cfg.VPC.PublicSubnetIDs) == 0 {\n\t\t\treturn fmt.Errorf(\"no subnet found for VPC ID %q\", ts.cfg.VPC.ID)\n\t\t}\n\n\t\tts.lg.Info(\"querying security IDs\", zap.String(\"vpc-id\", ts.cfg.VPC.ID))\n\t\tctx, cancel = context.WithTimeout(context.Background(), time.Minute)\n\t\tgresp, err := ts.ec2APIV2.DescribeSecurityGroups(\n\t\t\tctx,\n\t\t\t&aws_ec2_v2.DescribeSecurityGroupsInput{\n\t\t\t\tFilters: []aws_ec2_v2_types.Filter{\n\t\t\t\t\t{\n\t\t\t\t\t\tName: aws_v2.String(\"vpc-id\"),\n\t\t\t\t\t\tValues: []string{ts.cfg.VPC.ID},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t})\n\t\tcancel()\n\t\tif err != nil {\n\t\t\tts.lg.Warn(\"failed to security groups\", zap.Error(err))\n\t\t\treturn err\n\t\t}\n\t\tfor _, sg := range gresp.SecurityGroups {\n\t\t\tid, name := aws_v2.ToString(sg.GroupId), aws_v2.ToString(sg.GroupName)\n\t\t\tts.lg.Info(\"found security group\", zap.String(\"id\", id), zap.String(\"name\", name))\n\t\t\tif name != \"default\" {\n\t\t\t\tts.cfg.VPC.SecurityGroupID = id\n\t\t\t}\n\t\t}\n\t\tif ts.cfg.VPC.SecurityGroupID == \"\" {\n\t\t\treturn fmt.Errorf(\"no security group found for VPC ID %q\", ts.cfg.VPC.ID)\n\t\t}\n\n\t\tts.cfg.Sync()\n\t\treturn nil\n\t}\n\tif !ts.cfg.VPC.Create {\n\t\tts.lg.Info(\"VPC.Create false; skipping creation\")\n\t\treturn nil\n\t}\n\tif ts.cfg.VPC.ID != \"\" &&\n\t\tlen(ts.cfg.VPC.PublicSubnetIDs) > 0 &&\n\t\tts.cfg.VPC.SecurityGroupID != \"\" {\n\t\tts.lg.Info(\"VPC already created; no need to create a new one\")\n\t\treturn nil\n\t}\n\n\tif err := ts._createVPC(); err != nil { // AWS::EC2::VPC\n\t\treturn err\n\t}\n\tif err := ts.modifyVPC(); err != nil {\n\t\treturn err\n\t}\n\tif err := ts.createSecurityGroups(); err != nil { // AWS::EC2::SecurityGroup\n\t\treturn err\n\t}\n\tif err := ts.associateVPCCIDRBlocks(); err != nil { // AWS::EC2::VPCCidrBlock\n\t\treturn err\n\t}\n\n\tif err := ts.createInternetGateway(); err != nil { // AWS::EC2::InternetGateway\n\t\treturn err\n\t}\n\tif err := ts.createVPCGatewayAttachment(); err != nil { // AWS::EC2::VPCGatewayAttachment\n\t\treturn err\n\t}\n\n\tif err := ts.createPublicSubnets(); err != nil { // AWS::EC2::Subnet\n\t\treturn err\n\t}\n\tif err := ts.createPublicRouteTable(); err != nil { // AWS::EC2::RouteTable\n\t\treturn err\n\t}\n\tif err := ts.createPublicRoute(); err != nil { // AWS::EC2::Route\n\t\treturn err\n\t}\n\tif err := ts.createPublicSubnetRouteTableAssociation(); err != nil { // AWS::EC2::SubnetRouteTableAssociation\n\t\treturn err\n\t}\n\n\tif err := ts.createPublicEIPs(); err != nil { // AWS::EC2::EIP\n\t\treturn err\n\t}\n\tif err := ts.createPublicNATGateways(); err != nil { // AWS::EC2::NatGateway\n\t\treturn err\n\t}\n\n\tif err := ts.createPrivateSubnets(); err != nil { // AWS::EC2::Subnet\n\t\treturn err\n\t}\n\tif err := ts.createPrivateRouteTables(); err != nil { // AWS::EC2::RouteTable\n\t\treturn err\n\t}\n\tif err := ts.createPrivateRoutes(); err != nil { // AWS::EC2::Route\n\t\treturn err\n\t}\n\tif err := ts.createPrivateSubnetRouteTableAssociation(); err != nil { // AWS::EC2::SubnetRouteTableAssociation\n\t\treturn err\n\t}\n\n\tif err := ts.createDHCPOptions(); err != nil { // AWS::EC2::DHCPOptions, AWS::EC2::VPCDHCPOptionsAssociation\n\t\treturn err\n\t}\n\n\tif err := ts.authorizeSecurityGroup(); err != nil {\n\t\treturn err\n\t}\n\n\tts.lg.Info(\"created a VPC\",\n\t\tzap.String(\"vpc-id\", ts.cfg.VPC.ID),\n\t\tzap.Strings(\"vpc-cidr-blocks\", ts.cfg.VPC.CIDRs),\n\t\tzap.Strings(\"public-subnet-ids\", ts.cfg.VPC.PublicSubnetIDs),\n\t\tzap.Strings(\"private-subnet-ids\", ts.cfg.VPC.PrivateSubnetIDs),\n\t\tzap.String(\"control-plane-security-group-id\", ts.cfg.VPC.SecurityGroupID),\n\t)\n\n\tts.cfg.Sync()\n\treturn nil\n}", "func (s *VPCService) NewCreateVPCParams(cidr string, displaytext string, name string, vpcofferingid string, zoneid string) *CreateVPCParams {\n\tp := &CreateVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"cidr\"] = cidr\n\tp.p[\"displaytext\"] = displaytext\n\tp.p[\"name\"] = name\n\tp.p[\"vpcofferingid\"] = vpcofferingid\n\tp.p[\"zoneid\"] = zoneid\n\treturn p\n}", "func NewSwarmUpdateParams() *SwarmUpdateParams {\n\tvar (\n\t\trotateManagerTokenDefault = bool(false)\n\t\trotateManagerUnlockKeyDefault = bool(false)\n\t\trotateWorkerTokenDefault = bool(false)\n\t)\n\treturn &SwarmUpdateParams{\n\t\tRotateManagerToken: &rotateManagerTokenDefault,\n\t\tRotateManagerUnlockKey: &rotateManagerUnlockKeyDefault,\n\t\tRotateWorkerToken: &rotateWorkerTokenDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *VPCService) NewDeleteVPCParams(id string) *DeleteVPCParams {\n\tp := &DeleteVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (f *FakeInstance) AttachVPC(_ context.Context, _, _ string) error {\n\tpanic(\"implement me\")\n}", "func (client *CloudServicesClient) updateCreateRequest(ctx context.Context, resourceGroupName string, cloudServiceName string, parameters CloudServiceUpdate, options *CloudServicesClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-09-04\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (params *QueueParams) UpdateParams() []*cloudformation.Parameter {\n\treturn []*cloudformation.Parameter{\n\t\tmkOptionalParameter(ParamDelaySeconds, params.DelaySeconds),\n\t\tmkOptionalParameter(ParamMaximumMessageSize, params.MaximumMessageSize),\n\t\tmkOptionalParameter(ParamMessageRetentionPeriod, params.MessageRetentionPeriod),\n\t\tmkOptionalParameter(ParamReceiveMessageWaitTimeSeconds, params.ReceiveMessageWaitTimeSeconds),\n\t\tmkOptionalParameter(ParamRedriveMaxReceiveCount, params.RedriveMaxReceiveCount),\n\t\tmkOptionalParameter(ParamVisibilityTimeout, params.VisibilityTimeout),\n\t}\n}", "func (s *Stack) initVPC() error {\n\t// Tries to get VPC information\n\tvpcID, err := s.findVPCID()\n\tif err != nil {\n\t\treturn err\n\t}\n\tif vpcID != nil {\n\t\ts.vpc, err = s.GetVPC(*vpcID)\n\t\treturn err\n\t}\n\n\tvpc, err := s.CreateVPC(\n\t\tVPCRequest{\n\t\t\tName: s.authOpts.VPCName,\n\t\t\tCIDR: s.authOpts.VPCCIDR,\n\t\t},\n\t)\n\tif err != nil {\n\t\treturn fail.Errorf(\n\t\t\tfmt.Sprintf(\n\t\t\t\t\"failed to initialize VPC '%s': %s\", s.authOpts.VPCName, openstack.ProviderErrorToString(err),\n\t\t\t), err,\n\t\t)\n\t}\n\ts.vpc = vpc\n\treturn nil\n}", "func NewParams(createWhoisPrice string, updateWhoisPrice string, deleteWhoisPrice string) Params {\n\treturn Params{\n\t\tCreateWhoisPrice: createWhoisPrice,\n\t\tUpdateWhoisPrice: updateWhoisPrice,\n\t\tDeleteWhoisPrice: deleteWhoisPrice,\n\t}\n}", "func generateUpdatingParamsSchema(\n\ttd tierDetails,\n) service.InputParametersSchema {\n\tips := service.InputParametersSchema{\n\t\tPropertySchemas: map[string]service.PropertySchema{\n\t\t\t\"resourceGroup\": schemas.GetResourceGroupSchema(),\n\t\t\t\"location\": schemas.GetLocationSchema(),\n\t\t\t\"backupRedundancy\": &service.StringPropertySchema{\n\t\t\t\tTitle: \"Backup redundancy\",\n\t\t\t\tDescription: \"Specifies the backup redundancy\",\n\t\t\t\tOneOf: td.allowedBackupRedundancy,\n\t\t\t\tDefaultValue: \"local\",\n\t\t\t},\n\t\t\t\"serverName\": &service.StringPropertySchema{\n\t\t\t\tTitle: \"Server Name\",\n\t\t\t\tDescription: \"Name of the MySQL server\",\n\t\t\t\tMinLength: ptr.ToInt(3),\n\t\t\t\tMaxLength: ptr.ToInt(63),\n\t\t\t\t// The server name can only contain lower case characters and numbers.\n\t\t\t\tAllowedPattern: `^[a-z0-9]+$`,\n\t\t\t},\n\t\t\t\"virtualNetwork\": &service.ObjectPropertySchema{\n\t\t\t\tTitle: \"Virtual Network Settings\",\n\t\t\t\tDescription: \"Virtual Network (vnet) settings\",\n\t\t\t\tPropertySchemas: map[string]service.PropertySchema{\n\t\t\t\t\t\"name\": &service.StringPropertySchema{\n\t\t\t\t\t\tTitle:\t\"Virtual Network Name\",\n\t\t\t\t\t\tDescription: \"Name of the Virtual Network (vnet)\",\n\t\t\t\t\t\tMinLength: ptr.ToInt(2),\n\t\t\t\t\t\tMaxLength: ptr.ToInt(80),\n\t\t\t\t\t},\n\t\t\t\t\t\"resourceGroup\": &service.StringPropertySchema{\n\t\t\t\t\t\tTitle:\t\"Virtual Network Resource Group\",\n\t\t\t\t\t\tDescription: \"Name of the Virtual Network's Resource Group\",\n\t\t\t\t\t\tMinLength: ptr.ToInt(1),\n\t\t\t\t\t\tMaxLength: ptr.ToInt(63),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"adminAccountSettings\": &service.ObjectPropertySchema{\n\t\t\t\tTitle: \"Admin Account Settings\",\n\t\t\t\tDescription: \"Settings of administrator account of MySQL server. Typically you do not need to specify this.\",\n\t\t\t\tPropertySchemas: map[string]service.PropertySchema{\n\t\t\t\t\t\"adminUsername\": &service.StringPropertySchema{\n\t\t\t\t\t\tTitle: \"Admin Username\",\n\t\t\t\t\t\tDescription: \"The administrator username for the server.\",\n\t\t\t\t\t\tMinLength: ptr.ToInt(1),\n\t\t\t\t\t\tMaxLength: ptr.ToInt(63),\n\t\t\t\t\t\tCustomPropertyValidator: usernameValidator,\n\t\t\t\t\t},\n\t\t\t\t\t\"adminPassword\": &service.StringPropertySchema{\n\t\t\t\t\t\tTitle: \"Admin Password\",\n\t\t\t\t\t\tDescription: \"The administrator password for the server. **Warning**: you may leak your password if you specify this property, others can see this password in your request body and `ServiceInstance` definition. DO NOT use this property unless you know what you are doing.\",\n\t\t\t\t\t\tMinLength: ptr.ToInt(8),\n\t\t\t\t\t\tMaxLength: ptr.ToInt(128),\n\t\t\t\t\t\tCustomPropertyValidator: passwordValidator,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"cores\": &service.IntPropertySchema{\n\t\t\t\tTitle: \"Cores\",\n\t\t\t\tDescription: \"Specifies vCores, which represent the logical \" +\n\t\t\t\t\t\"CPU of the underlying hardware\",\n\t\t\t\tAllowedValues: td.allowedCores,\n\t\t\t\tDefaultValue: ptr.ToInt64(td.defaultCores),\n\t\t\t},\n\t\t\t\"storage\": &service.IntPropertySchema{\n\t\t\t\tTitle: \"Storage\",\n\t\t\t\tDescription: \"Specifies the storage in GBs\",\n\t\t\t\tDefaultValue: ptr.ToInt64(10),\n\t\t\t\tMinValue: ptr.ToInt64(5),\n\t\t\t\tMaxValue: ptr.ToInt64(td.maxStorage),\n\t\t\t},\n\t\t\t\"backupRetention\": &service.IntPropertySchema{\n\t\t\t\tTitle: \"Backup retention\",\n\t\t\t\tDescription: \"Specifies the number of days for backup retention\",\n\t\t\t\tDefaultValue: ptr.ToInt64(7),\n\t\t\t\tMinValue: ptr.ToInt64(7),\n\t\t\t\tMaxValue: ptr.ToInt64(35),\n\t\t\t},\n\t\t\t\"sslEnforcement\": &service.StringPropertySchema{\n\t\t\t\tTitle: \"SSL enforcement\",\n\t\t\t\tDescription: \"Specifies whether the server requires the use of TLS\" +\n\t\t\t\t\t\" when connecting. Left unspecified, SSL will be enforced\",\n\t\t\t\tOneOf: schemas.EnabledDisabledValues(),\n\t\t\t\tDefaultValue: schemas.EnabledParamString,\n\t\t\t},\n\t\t\t\"firewallRules\": &service.ArrayPropertySchema{\n\t\t\t\tTitle: \"Firewall rules\",\n\t\t\t\tDescription: \"Firewall rules to apply to instance. \" +\n\t\t\t\t\t\"If left unspecified, defaults to only Azure IPs\",\n\t\t\t\tItemsSchema: &service.ObjectPropertySchema{\n\t\t\t\t\tTitle: \"Firewall rule\",\n\t\t\t\t\tDescription: \"Individual Firewall Rule\",\n\t\t\t\t\tRequiredProperties: []string{\n\t\t\t\t\t\t\"name\",\n\t\t\t\t\t\t\"startIPAddress\",\n\t\t\t\t\t\t\"endIPAddress\",\n\t\t\t\t\t},\n\t\t\t\t\tPropertySchemas: map[string]service.PropertySchema{\n\t\t\t\t\t\t\"name\": &service.StringPropertySchema{\n\t\t\t\t\t\t\tTitle: \"Name\",\n\t\t\t\t\t\t\tDescription: \"Name of firewall rule\",\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"startIPAddress\": &service.StringPropertySchema{\n\t\t\t\t\t\t\tTitle: \"Start IP address\",\n\t\t\t\t\t\t\tDescription: \"Start of firewall rule range\",\n\t\t\t\t\t\t\tCustomPropertyValidator: ipValidator,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"endIPAddress\": &service.StringPropertySchema{\n\t\t\t\t\t\t\tTitle: \"End IP address\",\n\t\t\t\t\t\t\tDescription: \"End of firewall rule range\",\n\t\t\t\t\t\t\tCustomPropertyValidator: ipValidator,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tCustomPropertyValidator: firewallRuleValidator,\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"virtualNetworkRules\": &service.ArrayPropertySchema{\n\t\t\t\tTitle: \"Virtual network rules\",\n\t\t\t\tDescription: \"Virtual network rules to apply to instance. \",\n\t\t\t\tItemsSchema: &service.ObjectPropertySchema{\n\t\t\t\t\tTitle: \"Virtual network rule\",\n\t\t\t\t\tDescription: \"Individual virtual network rule\",\n\t\t\t\t\tRequiredProperties: []string{\n\t\t\t\t\t\t\"name\",\n\t\t\t\t\t\t\"subnetName\",\n\t\t\t\t\t},\n\t\t\t\t\tPropertySchemas: map[string]service.PropertySchema{\n\t\t\t\t\t\t\"name\": &service.StringPropertySchema{\n\t\t\t\t\t\t\tTitle: \"Name\",\n\t\t\t\t\t\t\tDescription: \"Name of virtual network rule\",\n\t\t\t\t\t\t},\t\t\t\t\t\n\t\t\t\t\t\t\"subnetName\": &service.StringPropertySchema{\n\t\t\t\t\t\t\tTitle: \"Subnet Name\",\n\t\t\t\t\t\t\tDescription: \"Name of the subnet in the Virtual Network\",\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"tags\": &service.ObjectPropertySchema{\n\t\t\t\tTitle: \"Tags\",\n\t\t\t\tDescription: \"Tags to be applied to new resources,\" +\n\t\t\t\t\t\" specified as key/value pairs.\",\n\t\t\t\tAdditional: &service.StringPropertySchema{},\n\t\t\t},\n\t\t},\n\t}\n\treturn ips\n}", "func (client *VideosClient) updateCreateRequest(ctx context.Context, resourceGroupName string, accountName string, videoName string, parameters VideoEntity, options *VideosClientUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Media/videoAnalyzers/{accountName}/videos/{videoName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif accountName == \"\" {\n\t\treturn nil, errors.New(\"parameter accountName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{accountName}\", url.PathEscape(accountName))\n\tif videoName == \"\" {\n\t\treturn nil, errors.New(\"parameter videoName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{videoName}\", url.PathEscape(videoName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-11-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (client *CapacitiesClient) updateCreateRequest(ctx context.Context, resourceGroupName string, dedicatedCapacityName string, capacityUpdateParameters DedicatedCapacityUpdateParameters, options *CapacitiesClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.PowerBIDedicated/capacities/{dedicatedCapacityName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif dedicatedCapacityName == \"\" {\n\t\treturn nil, errors.New(\"parameter dedicatedCapacityName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{dedicatedCapacityName}\", url.PathEscape(dedicatedCapacityName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-01-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, capacityUpdateParameters)\n}", "func (client *PacketCoreDataPlanesClient) updateTagsCreateRequest(ctx context.Context, resourceGroupName string, packetCoreControlPlaneName string, packetCoreDataPlaneName string, parameters TagsObject, options *PacketCoreDataPlanesClientUpdateTagsOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.MobileNetwork/packetCoreControlPlanes/{packetCoreControlPlaneName}/packetCoreDataPlanes/{packetCoreDataPlaneName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif packetCoreControlPlaneName == \"\" {\n\t\treturn nil, errors.New(\"parameter packetCoreControlPlaneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{packetCoreControlPlaneName}\", url.PathEscape(packetCoreControlPlaneName))\n\tif packetCoreDataPlaneName == \"\" {\n\t\treturn nil, errors.New(\"parameter packetCoreDataPlaneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{packetCoreDataPlaneName}\", url.PathEscape(packetCoreDataPlaneName))\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\tif err := runtime.MarshalAsJSON(req, parameters); err != nil {\n\t\treturn nil, err\n\t}\n\treturn req, nil\n}", "func (client *VirtualNetworkLinksClient) updateCreateRequest(ctx context.Context, resourceGroupName string, privateZoneName string, virtualNetworkLinkName string, parameters VirtualNetworkLink, options *VirtualNetworkLinksBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/privateDnsZones/{privateZoneName}/virtualNetworkLinks/{virtualNetworkLinkName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif privateZoneName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateZoneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateZoneName}\", url.PathEscape(privateZoneName))\n\tif virtualNetworkLinkName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualNetworkLinkName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualNetworkLinkName}\", url.PathEscape(virtualNetworkLinkName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2020-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tif options != nil && options.IfMatch != nil {\n\t\treq.Raw().Header.Set(\"If-Match\", *options.IfMatch)\n\t}\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (client *KeyVaultClient) updateSecretCreateRequest(ctx context.Context, vaultBaseURL string, secretName string, secretVersion string, parameters SecretUpdateParameters, options *KeyVaultClientUpdateSecretOptions) (*policy.Request, error) {\n\thost := \"{vaultBaseUrl}\"\n\thost = strings.ReplaceAll(host, \"{vaultBaseUrl}\", vaultBaseURL)\n\turlPath := \"/secrets/{secret-name}/{secret-version}\"\n\tif secretName == \"\" {\n\t\treturn nil, errors.New(\"parameter secretName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{secret-name}\", url.PathEscape(secretName))\n\t// if secretVersion == \"\" {\n\t// \treturn nil, errors.New(\"parameter secretVersion cannot be empty\")\n\t// }\n\turlPath = strings.ReplaceAll(urlPath, \"{secret-version}\", url.PathEscape(secretVersion))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.2\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (client *SQLVirtualMachinesClient) updateCreateRequest(ctx context.Context, resourceGroupName string, sqlVirtualMachineName string, parameters Update, options *SQLVirtualMachinesClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.SqlVirtualMachine/sqlVirtualMachines/{sqlVirtualMachineName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif sqlVirtualMachineName == \"\" {\n\t\treturn nil, errors.New(\"parameter sqlVirtualMachineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{sqlVirtualMachineName}\", url.PathEscape(sqlVirtualMachineName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2017-03-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (client *ManagedInstancesClient) updateCreateRequest(ctx context.Context, resourceGroupName string, managedInstanceName string, parameters ManagedInstanceUpdate, options *ManagedInstancesClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/managedInstances/{managedInstanceName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif managedInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedInstanceName}\", url.PathEscape(managedInstanceName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-08-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\tif err := runtime.MarshalAsJSON(req, parameters); err != nil {\n\t\treturn nil, err\n\t}\n\treturn req, nil\n}", "func newUpdatePrivateCloudUpdatePrivateCloudRequest(ctx context.Context, f *PrivateCloud, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\tres := f\n\t_ = res\n\n\tif v, err := expandPrivateCloudNetworkConfig(c, f.NetworkConfig, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding NetworkConfig into networkConfig: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"networkConfig\"] = v\n\t}\n\tif v, err := expandPrivateCloudManagementCluster(c, f.ManagementCluster, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ManagementCluster into managementCluster: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"managementCluster\"] = v\n\t}\n\tif v := f.Description; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"description\"] = v\n\t}\n\tif v, err := expandPrivateCloudHcx(c, f.Hcx, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Hcx into hcx: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"hcx\"] = v\n\t}\n\tif v, err := expandPrivateCloudNsx(c, f.Nsx, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Nsx into nsx: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"nsx\"] = v\n\t}\n\tif v, err := expandPrivateCloudVcenter(c, f.Vcenter, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Vcenter into vcenter: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"vcenter\"] = v\n\t}\n\treq[\"name\"] = fmt.Sprintf(\"projects/%s/locations/%s/privateClouds/%s\", *f.Project, *f.Location, *f.Name)\n\n\treturn req, nil\n}", "func NewPutZoneParams() *PutZoneParams {\n\tvar ()\n\treturn &PutZoneParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (f *FakeInstance) DetachVPC(_ context.Context, _, _ string) error {\n\tpanic(\"implement me\")\n}", "func (vpc *VampClientProvider) checkAndSetParameters() {\n\tif vpc.URL == \"\" {\n\t\tvpc.URL = viper.GetString(\"url\")\n\t\tvpc.Token = viper.GetString(\"token\")\n\t\tvpc.APIVersion = viper.GetString(\"apiversion\")\n\t\tvpc.Cert = viper.GetString(\"cert\")\n\t\tvpc.Project = viper.GetString(\"project\")\n\t\tvpc.Cluster = viper.GetString(\"cluster\")\n\t\tvpc.VirtualCluster = viper.GetString(\"virtualcluster\")\n\t}\n}", "func (client *PublicIPAddressesClient) createOrUpdateCreateRequest(ctx context.Context, resourceGroupName string, publicIPAddressName string, parameters PublicIPAddress, options *PublicIPAddressesClientBeginCreateOrUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/publicIPAddresses/{publicIpAddressName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif publicIPAddressName == \"\" {\n\t\treturn nil, errors.New(\"parameter publicIPAddressName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{publicIpAddressName}\", url.PathEscape(publicIPAddressName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPut, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func CreateVPCMocked(t *testing.T, vpcIn *types.Vpc) *types.Vpc {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewVPCService(cs)\n\tassert.Nil(err, \"Couldn't load VPC service\")\n\tassert.NotNil(ds, \"VPC service not instanced\")\n\n\t// convertMap\n\tmapIn, err := utils.ItemConvertParams(*vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// to json\n\tdOut, err := json.Marshal(vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// call service\n\tcs.On(\"Post\", \"/network/vpcs/\", mapIn).Return(dOut, 200, nil)\n\tvpcOut, err := ds.CreateVPC(mapIn)\n\tassert.Nil(err, \"Error creating VPC list\")\n\tassert.Equal(vpcIn, vpcOut, \"CreateVPC returned different VPCs\")\n\n\treturn vpcOut\n}", "func createHyperShiftVPC() (*HyperShiftVPC, error) {\n\tctx := context.Background()\n\n\tvar vpc HyperShiftVPC\n\tworkingDir := viper.GetString(config.ReportDir)\n\n\ttf, err := terraform.New(workingDir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefer func() {\n\t\t_ = tf.Uninstall(ctx)\n\t}()\n\n\tlog.Println(\"Creating ROSA HyperShift aws vpc\")\n\n\terr = copyFile(\"terraform/setup-vpc.tf\", fmt.Sprintf(\"%s/setup-vpc.tf\", workingDir))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = tf.Init(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = callAndSetAWSSession(func() error {\n\t\terr := tf.Plan(\n\t\t\tctx,\n\t\t\ttfexec.Var(fmt.Sprintf(\"aws_region=%s\", viper.GetString(config.AWSRegion))),\n\t\t\ttfexec.Var(fmt.Sprintf(\"cluster_name=%s\", viper.GetString(config.Cluster.Name))),\n\t\t)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\terr = tf.Apply(ctx)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\toutput, err := tf.Output(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvpc.PrivateSubnet = strings.ReplaceAll(string(output[\"cluster-private-subnet\"].Value), \"\\\"\", \"\")\n\tvpc.PublicSubnet = strings.ReplaceAll(string(output[\"cluster-public-subnet\"].Value), \"\\\"\", \"\")\n\tvpc.NodePrivateSubnet = strings.ReplaceAll(string(output[\"node-private-subnet\"].Value), \"\\\"\", \"\")\n\n\tlog.Println(\"ROSA HyperShift aws vpc created!\")\n\n\treturn &vpc, nil\n}", "func GetVPC(connectionName string, rsType string, nameID string) (*cres.VPCInfo, error) {\n\tcblog.Info(\"call GetVPC()\")\n\n\t// check empty and trim user inputs\n connectionName, err := EmptyCheckAndTrim(\"connectionName\", connectionName)\n if err != nil {\n\t\tcblog.Error(err)\n return nil, err\n }\n\n nameID, err = EmptyCheckAndTrim(\"nameID\", nameID)\n if err != nil {\n\t\tcblog.Error(err)\n return nil, err\n }\n\n\tcldConn, err := ccm.GetCloudConnection(connectionName)\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\n\thandler, err := cldConn.CreateVPCHandler()\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\n\tvpcSPLock.RLock(connectionName, nameID)\n\tdefer vpcSPLock.RUnlock(connectionName, nameID)\n\t// (1) get spiderIID(NameId)\n\tiidInfo, err := iidRWLock.GetIID(iidm.IIDSGROUP, connectionName, rsType, cres.IID{nameID, \"\"})\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\n\t// (2) get resource(driverIID)\n\tinfo, err := handler.GetVPC(getDriverIID(iidInfo.IId))\n\tif err != nil {\n\t\tcblog.Error(err)\n\t\treturn nil, err\n\t}\n\t// (3) set ResourceInfo(userIID)\n\tinfo.IId = getUserIID(iidInfo.IId)\n\n\t// set NameId for SubnetInfo List\n\t// create new SubnetInfo List\n\tsubnetInfoList := []cres.SubnetInfo{}\n\tfor _, subnetInfo := range info.SubnetInfoList {\t\t\n\t\tsubnetIIDInfo, err := iidRWLock.GetIIDbySystemID(iidm.SUBNETGROUP, connectionName, info.IId.NameId, subnetInfo.IId) // VPC info.IId.NameId => rsType\n\t\tif err != nil {\n\t\t\tcblog.Error(err)\n\t\t\treturn nil, err\n\t\t}\n\t\tif subnetIIDInfo.IId.NameId != \"\" { // insert only this user created.\n\t\t\tsubnetInfo.IId = getUserIID(subnetIIDInfo.IId)\n\t\t\tsubnetInfoList = append(subnetInfoList, subnetInfo)\n\t\t}\n\t}\n\tinfo.SubnetInfoList = subnetInfoList\n\n\treturn &info, nil\n}", "func (s *VPCService) NewListVPCsParams() *ListVPCsParams {\n\tp := &ListVPCsParams{}\n\tp.p = make(map[string]interface{})\n\treturn p\n}", "func NewParams(\n\ttaxPolicy, rewardPolicy PolicyConstraints,\n\tseigniorageBurden sdk.Dec,\n\tminingIncrement sdk.Dec,\n\twindowShort, windowLong, windowProbation sdk.Int,\n) Params {\n\treturn Params{\n\t\tTaxPolicy: taxPolicy,\n\t\tRewardPolicy: rewardPolicy,\n\t\tSeigniorageBurdenTarget: seigniorageBurden,\n\t\tMiningIncrement: miningIncrement,\n\t\tWindowShort: windowShort,\n\t\tWindowLong: windowLong,\n\t\tWindowProbation: windowProbation,\n\t}\n}", "func VPCID(vpcID string) RequestOptionFunc {\n\treturn func(body *RequestBody) error {\n\t\tbody.VpcId = vpcID\n\t\treturn nil\n\t}\n}", "func NewParams(defaultSendEnabled bool) Params {\n\treturn Params{\n\t\tSendEnabled: nil,\n\t\tDefaultSendEnabled: defaultSendEnabled,\n\t}\n}", "func (client *ClustersClient) updateCreateRequest(ctx context.Context, resourceGroupName string, clusterName string, parameters ClusterPatch, options *ClustersUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.OperationalInsights/clusters/{clusterName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif clusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter clusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{clusterName}\", url.PathEscape(clusterName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func newUpdateAttestorUpdateAttestorRequest(ctx context.Context, f *Attestor, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\n\treturn req, nil\n}", "func (client *IPAllocationsClient) updateTagsCreateRequest(ctx context.Context, resourceGroupName string, ipAllocationName string, parameters TagsObject, options *IPAllocationsClientUpdateTagsOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/IpAllocations/{ipAllocationName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif ipAllocationName == \"\" {\n\t\treturn nil, errors.New(\"parameter ipAllocationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{ipAllocationName}\", url.PathEscape(ipAllocationName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-04-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\tif err := runtime.MarshalAsJSON(req, parameters); err != nil {\n\t\treturn nil, err\n\t}\n\treturn req, nil\n}", "func (client *VirtualMachinesClient) updateCreateRequest(ctx context.Context, resourceGroupName string, virtualMachineName string, body VirtualMachineUpdate, options *VirtualMachinesClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ConnectedVMwarevSphere/virtualMachines/{virtualMachineName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif virtualMachineName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualMachineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualMachineName}\", url.PathEscape(virtualMachineName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-01-10-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, body)\n}", "func UpdateVPCFailJSONMocked(t *testing.T, vpcIn *types.Vpc) *types.Vpc {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewVPCService(cs)\n\tassert.Nil(err, \"Couldn't load VPC service\")\n\tassert.NotNil(ds, \"VPC service not instanced\")\n\n\t// convertMap\n\tmapIn, err := utils.ItemConvertParams(*vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// wrong json\n\tdIn := []byte{10, 20, 30}\n\n\t// call service\n\tcs.On(\"Put\", fmt.Sprintf(\"/network/vpcs/%s\", vpcIn.ID), mapIn).Return(dIn, 200, nil)\n\tvpcOut, err := ds.UpdateVPC(mapIn, vpcIn.ID)\n\n\tassert.NotNil(err, \"We are expecting a marshalling error\")\n\tassert.Nil(vpcOut, \"Expecting nil output\")\n\tassert.Contains(err.Error(), \"invalid character\", \"Error message should include the string 'invalid character'\")\n\n\treturn vpcOut\n}", "func newUpdateInstanceUpdateInstanceRequest(ctx context.Context, f *Instance, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\n\tif v := f.Description; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"description\"] = v\n\t}\n\tif v := f.State; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"state\"] = v\n\t}\n\tif v := f.StatusMessage; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"statusMessage\"] = v\n\t}\n\tif v := f.CreateTime; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"createTime\"] = v\n\t}\n\tif v := f.Tier; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"tier\"] = v\n\t}\n\tif v := f.Labels; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"labels\"] = v\n\t}\n\tif v, err := expandInstanceFileSharesSlice(c, f.FileShares); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding FileShares into fileShares: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"fileShares\"] = v\n\t}\n\tif v, err := expandInstanceNetworksSlice(c, f.Networks); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Networks into networks: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"networks\"] = v\n\t}\n\tif v := f.Etag; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"etag\"] = v\n\t}\n\treturn req, nil\n}", "func NewUpdateWidgetParams() *UpdateWidgetParams {\n\tvar (\n\t\tacceptDefault = string(\"application/json\")\n\t\tcontentTypeDefault = string(\"application/json\")\n\t)\n\treturn &UpdateWidgetParams{\n\t\tAccept: &acceptDefault,\n\t\tContentType: &contentTypeDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (m *MockProjectServiceIface) NewUpdateProjectInvitationParams(projectid string) *UpdateProjectInvitationParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewUpdateProjectInvitationParams\", projectid)\n\tret0, _ := ret[0].(*UpdateProjectInvitationParams)\n\treturn ret0\n}", "func (rm *resourceManager) newUpdateRequestPayload(\n\tr *resource,\n) (*svcsdk.UpdateStageInput, error) {\n\tres := &svcsdk.UpdateStageInput{}\n\n\tif r.ko.Spec.AccessLogSettings != nil {\n\t\tf0 := &svcsdk.AccessLogSettings{}\n\t\tif r.ko.Spec.AccessLogSettings.DestinationARN != nil {\n\t\t\tf0.SetDestinationArn(*r.ko.Spec.AccessLogSettings.DestinationARN)\n\t\t}\n\t\tif r.ko.Spec.AccessLogSettings.Format != nil {\n\t\t\tf0.SetFormat(*r.ko.Spec.AccessLogSettings.Format)\n\t\t}\n\t\tres.SetAccessLogSettings(f0)\n\t}\n\tif r.ko.Spec.APIID != nil {\n\t\tres.SetApiId(*r.ko.Spec.APIID)\n\t}\n\tif r.ko.Spec.AutoDeploy != nil {\n\t\tres.SetAutoDeploy(*r.ko.Spec.AutoDeploy)\n\t}\n\tif r.ko.Spec.ClientCertificateID != nil {\n\t\tres.SetClientCertificateId(*r.ko.Spec.ClientCertificateID)\n\t}\n\tif r.ko.Spec.DefaultRouteSettings != nil {\n\t\tf4 := &svcsdk.RouteSettings{}\n\t\tif r.ko.Spec.DefaultRouteSettings.DataTraceEnabled != nil {\n\t\t\tf4.SetDataTraceEnabled(*r.ko.Spec.DefaultRouteSettings.DataTraceEnabled)\n\t\t}\n\t\tif r.ko.Spec.DefaultRouteSettings.DetailedMetricsEnabled != nil {\n\t\t\tf4.SetDetailedMetricsEnabled(*r.ko.Spec.DefaultRouteSettings.DetailedMetricsEnabled)\n\t\t}\n\t\tif r.ko.Spec.DefaultRouteSettings.LoggingLevel != nil {\n\t\t\tf4.SetLoggingLevel(*r.ko.Spec.DefaultRouteSettings.LoggingLevel)\n\t\t}\n\t\tif r.ko.Spec.DefaultRouteSettings.ThrottlingBurstLimit != nil {\n\t\t\tf4.SetThrottlingBurstLimit(*r.ko.Spec.DefaultRouteSettings.ThrottlingBurstLimit)\n\t\t}\n\t\tif r.ko.Spec.DefaultRouteSettings.ThrottlingRateLimit != nil {\n\t\t\tf4.SetThrottlingRateLimit(*r.ko.Spec.DefaultRouteSettings.ThrottlingRateLimit)\n\t\t}\n\t\tres.SetDefaultRouteSettings(f4)\n\t}\n\tif r.ko.Spec.DeploymentID != nil {\n\t\tres.SetDeploymentId(*r.ko.Spec.DeploymentID)\n\t}\n\tif r.ko.Spec.Description != nil {\n\t\tres.SetDescription(*r.ko.Spec.Description)\n\t}\n\tif r.ko.Spec.RouteSettings != nil {\n\t\tf7 := map[string]*svcsdk.RouteSettings{}\n\t\tfor f7key, f7valiter := range r.ko.Spec.RouteSettings {\n\t\t\tf7val := &svcsdk.RouteSettings{}\n\t\t\tif f7valiter.DataTraceEnabled != nil {\n\t\t\t\tf7val.SetDataTraceEnabled(*f7valiter.DataTraceEnabled)\n\t\t\t}\n\t\t\tif f7valiter.DetailedMetricsEnabled != nil {\n\t\t\t\tf7val.SetDetailedMetricsEnabled(*f7valiter.DetailedMetricsEnabled)\n\t\t\t}\n\t\t\tif f7valiter.LoggingLevel != nil {\n\t\t\t\tf7val.SetLoggingLevel(*f7valiter.LoggingLevel)\n\t\t\t}\n\t\t\tif f7valiter.ThrottlingBurstLimit != nil {\n\t\t\t\tf7val.SetThrottlingBurstLimit(*f7valiter.ThrottlingBurstLimit)\n\t\t\t}\n\t\t\tif f7valiter.ThrottlingRateLimit != nil {\n\t\t\t\tf7val.SetThrottlingRateLimit(*f7valiter.ThrottlingRateLimit)\n\t\t\t}\n\t\t\tf7[f7key] = f7val\n\t\t}\n\t\tres.SetRouteSettings(f7)\n\t}\n\tif r.ko.Spec.StageName != nil {\n\t\tres.SetStageName(*r.ko.Spec.StageName)\n\t}\n\tif r.ko.Spec.StageVariables != nil {\n\t\tf9 := map[string]*string{}\n\t\tfor f9key, f9valiter := range r.ko.Spec.StageVariables {\n\t\t\tvar f9val string\n\t\t\tf9val = *f9valiter\n\t\t\tf9[f9key] = &f9val\n\t\t}\n\t\tres.SetStageVariables(f9)\n\t}\n\n\treturn res, nil\n}", "func prepareRunParams(options RunInstances) map[string]string {\n\tif options.SubnetId != \"\" || len(options.NetworkInterfaces) > 0 {\n\t\treturn makeParamsVPC(\"RunInstances\")\n\t} else {\n\t\treturn makeParams(\"RunInstances\")\n\t}\n}", "func NewParams(tokenCourse, subscriptionPrice, VPNGBPrice,\n\tstorageGBPrice, baseVPNGb, baseStorageGb uint32, courseSigners []sdk.AccAddress) Params {\n\treturn Params{\n\t\tTokenCourse: tokenCourse,\n\t\tSubscriptionPrice: subscriptionPrice,\n\t\tVPNGBPrice: VPNGBPrice,\n\t\tStorageGBPrice: storageGBPrice,\n\t\tBaseVPNGb: baseVPNGb,\n\t\tBaseStorageGb: baseStorageGb,\n\t\tCourseChangeSigners: courseSigners[:],\n\t}\n}", "func NewContainerUpdateParams() *ContainerUpdateParams {\n\tvar ()\n\treturn &ContainerUpdateParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t}\n}", "func (client *VirtualMachineScaleSetsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, vmScaleSetName string, parameters VirtualMachineScaleSetUpdate, options *VirtualMachineScaleSetsBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/virtualMachineScaleSets/{vmScaleSetName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif vmScaleSetName == \"\" {\n\t\treturn nil, errors.New(\"parameter vmScaleSetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vmScaleSetName}\", url.PathEscape(vmScaleSetName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (client *NetworkToNetworkInterconnectsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, networkFabricName string, networkToNetworkInterconnectName string, body NetworkToNetworkInterconnectPatch, options *NetworkToNetworkInterconnectsClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedNetworkFabric/networkFabrics/{networkFabricName}/networkToNetworkInterconnects/{networkToNetworkInterconnectName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif networkFabricName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkFabricName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkFabricName}\", url.PathEscape(networkFabricName))\n\tif networkToNetworkInterconnectName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkToNetworkInterconnectName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkToNetworkInterconnectName}\", url.PathEscape(networkToNetworkInterconnectName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-06-15\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, body)\n}", "func (client *RouteTablesClient) updateTagsCreateRequest(ctx context.Context, resourceGroupName string, routeTableName string, parameters TagsObject, options *RouteTablesUpdateTagsOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/routeTables/{routeTableName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif routeTableName == \"\" {\n\t\treturn nil, errors.New(\"parameter routeTableName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{routeTableName}\", url.PathEscape(routeTableName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func UpdateVPCFailErrMocked(t *testing.T, vpcIn *types.Vpc) *types.Vpc {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewVPCService(cs)\n\tassert.Nil(err, \"Couldn't load VPC service\")\n\tassert.NotNil(ds, \"VPC service not instanced\")\n\n\t// convertMap\n\tmapIn, err := utils.ItemConvertParams(*vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// to json\n\tdOut, err := json.Marshal(vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// call service\n\tcs.On(\"Put\", fmt.Sprintf(\"/network/vpcs/%s\", vpcIn.ID), mapIn).Return(dOut, 200, fmt.Errorf(\"mocked error\"))\n\tvpcOut, err := ds.UpdateVPC(mapIn, vpcIn.ID)\n\n\tassert.NotNil(err, \"We are expecting an error\")\n\tassert.Nil(vpcOut, \"Expecting nil output\")\n\tassert.Equal(err.Error(), \"mocked error\", \"Error should be 'mocked error'\")\n\n\treturn vpcOut\n}", "func NewClient(config *ucloud.Config, credential *auth.Credential) *VPCClient {\n\tmeta := ucloud.ClientMeta{Product: \"VPC\"}\n\tclient := ucloud.NewClientWithMeta(config, credential, meta)\n\treturn &VPCClient{\n\t\tclient,\n\t}\n}", "func (client *AFDOriginsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, profileName string, originGroupName string, originName string, originUpdateProperties AFDOriginUpdateParameters, options *AFDOriginsClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Cdn/profiles/{profileName}/originGroups/{originGroupName}/origins/{originName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif profileName == \"\" {\n\t\treturn nil, errors.New(\"parameter profileName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{profileName}\", url.PathEscape(profileName))\n\tif originGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter originGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{originGroupName}\", url.PathEscape(originGroupName))\n\tif originName == \"\" {\n\t\treturn nil, errors.New(\"parameter originName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{originName}\", url.PathEscape(originName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, originUpdateProperties)\n}", "func NewParams(opts []copts.Opt) *Params {\r\n\tparams := &Params{}\r\n\tcopts.Apply(params, opts)\r\n\treturn params\r\n}", "func (rm *resourceManager) newCreateRequestPayload(\n\tctx context.Context,\n\tr *resource,\n) (*svcsdk.CreateVpcPeeringConnectionInput, error) {\n\tres := &svcsdk.CreateVpcPeeringConnectionInput{}\n\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Spec.PeerOwnerID != nil {\n\t\tres.SetPeerOwnerId(*r.ko.Spec.PeerOwnerID)\n\t}\n\tif r.ko.Spec.PeerRegion != nil {\n\t\tres.SetPeerRegion(*r.ko.Spec.PeerRegion)\n\t}\n\tif r.ko.Spec.PeerVPCID != nil {\n\t\tres.SetPeerVpcId(*r.ko.Spec.PeerVPCID)\n\t}\n\tif r.ko.Spec.TagSpecifications != nil {\n\t\tf4 := []*svcsdk.TagSpecification{}\n\t\tfor _, f4iter := range r.ko.Spec.TagSpecifications {\n\t\t\tf4elem := &svcsdk.TagSpecification{}\n\t\t\tif f4iter.ResourceType != nil {\n\t\t\t\tf4elem.SetResourceType(*f4iter.ResourceType)\n\t\t\t}\n\t\t\tif f4iter.Tags != nil {\n\t\t\t\tf4elemf1 := []*svcsdk.Tag{}\n\t\t\t\tfor _, f4elemf1iter := range f4iter.Tags {\n\t\t\t\t\tf4elemf1elem := &svcsdk.Tag{}\n\t\t\t\t\tif f4elemf1iter.Key != nil {\n\t\t\t\t\t\tf4elemf1elem.SetKey(*f4elemf1iter.Key)\n\t\t\t\t\t}\n\t\t\t\t\tif f4elemf1iter.Value != nil {\n\t\t\t\t\t\tf4elemf1elem.SetValue(*f4elemf1iter.Value)\n\t\t\t\t\t}\n\t\t\t\t\tf4elemf1 = append(f4elemf1, f4elemf1elem)\n\t\t\t\t}\n\t\t\t\tf4elem.SetTags(f4elemf1)\n\t\t\t}\n\t\t\tf4 = append(f4, f4elem)\n\t\t}\n\t\tres.SetTagSpecifications(f4)\n\t}\n\tif r.ko.Spec.VPCID != nil {\n\t\tres.SetVpcId(*r.ko.Spec.VPCID)\n\t}\n\n\treturn res, nil\n}", "func (client *PortalConfigClient) updateCreateRequest(ctx context.Context, resourceGroupName string, serviceName string, portalConfigID string, ifMatch string, parameters PortalConfigContract, options *PortalConfigClientUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ApiManagement/service/{serviceName}/portalconfigs/{portalConfigId}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif serviceName == \"\" {\n\t\treturn nil, errors.New(\"parameter serviceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{serviceName}\", url.PathEscape(serviceName))\n\tif portalConfigID == \"\" {\n\t\treturn nil, errors.New(\"parameter portalConfigID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{portalConfigId}\", url.PathEscape(portalConfigID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-08-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"If-Match\"] = []string{ifMatch}\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\tif err := runtime.MarshalAsJSON(req, parameters); err != nil {\n\t\treturn nil, err\n\t}\n\treturn req, nil\n}", "func (s *RegionService) NewUpdateRegionParams(id int) *UpdateRegionParams {\n\tp := &UpdateRegionParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewParams(pricePerByte abi.TokenAmount, paymentInterval uint64, paymentIntervalIncrease uint64) (Params, error) {\n\treturn Params{\n\t\tPricePerByte: pricePerByte,\n\t\tPaymentInterval: paymentInterval,\n\t\tPaymentIntervalIncrease: paymentIntervalIncrease,\n\t}, nil\n}", "func (c *VPCClient) NewDescribeVPCIntercomRequest() *DescribeVPCIntercomRequest {\n\treq := &DescribeVPCIntercomRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "func NewParams() *Params {\n\treturn new(Params)\n}", "func NewEditParams() *EditParams {\n\treturn &EditParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *ReplicationvCentersClient) updateCreateRequest(ctx context.Context, fabricName string, vcenterName string, updateVCenterRequest UpdateVCenterRequest, options *ReplicationvCentersClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.RecoveryServices/vaults/{resourceName}/replicationFabrics/{fabricName}/replicationvCenters/{vcenterName}\"\n\tif client.resourceName == \"\" {\n\t\treturn nil, errors.New(\"parameter client.resourceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceName}\", url.PathEscape(client.resourceName))\n\tif client.resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter client.resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(client.resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif fabricName == \"\" {\n\t\treturn nil, errors.New(\"parameter fabricName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{fabricName}\", url.PathEscape(fabricName))\n\tif vcenterName == \"\" {\n\t\treturn nil, errors.New(\"parameter vcenterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vcenterName}\", url.PathEscape(vcenterName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-11-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, updateVCenterRequest)\n}", "func (x *fastReflection_MsgUpdateParams) New() protoreflect.Message {\n\treturn new(fastReflection_MsgUpdateParams)\n}", "func NewParams(opts []copts.Opt) *Params {\n\tparams := &Params{}\n\tcopts.Apply(params, opts)\n\treturn params\n}", "func (client *ManagedClustersClient) updateTagsCreateRequest(ctx context.Context, resourceGroupName string, resourceName string, parameters TagsObject, options *ManagedClustersClientBeginUpdateTagsOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerService/managedClusters/{resourceName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif resourceName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceName}\", url.PathEscape(resourceName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2020-11-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (client VersionsClient) UpdatePreparer(ctx context.Context, resourceGroupName string, templateSpecName string, templateSpecVersion string, templateSpecVersionUpdateModel *VersionUpdateModel) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"resourceGroupName\": autorest.Encode(\"path\", resourceGroupName),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t\t\"templateSpecName\": autorest.Encode(\"path\", templateSpecName),\n\t\t\"templateSpecVersion\": autorest.Encode(\"path\", templateSpecVersion),\n\t}\n\n\tconst APIVersion = \"2019-06-01-preview\"\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": APIVersion,\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsContentType(\"application/json; charset=utf-8\"),\n\t\tautorest.AsPatch(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Resources/templateSpecs/{templateSpecName}/versions/{templateSpecVersion}\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\tif templateSpecVersionUpdateModel != nil {\n\t\tpreparer = autorest.DecoratePreparer(preparer,\n\t\t\tautorest.WithJSON(templateSpecVersionUpdateModel))\n\t}\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func (client *AgentPoolsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, kubernetesClusterName string, agentPoolName string, agentPoolUpdateParameters AgentPoolPatchParameters, options *AgentPoolsClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.NetworkCloud/kubernetesClusters/{kubernetesClusterName}/agentPools/{agentPoolName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif kubernetesClusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter kubernetesClusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{kubernetesClusterName}\", url.PathEscape(kubernetesClusterName))\n\tif agentPoolName == \"\" {\n\t\treturn nil, errors.New(\"parameter agentPoolName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{agentPoolName}\", url.PathEscape(agentPoolName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\tif err := runtime.MarshalAsJSON(req, agentPoolUpdateParameters); err != nil {\n\t\treturn nil, err\n\t}\n\treturn req, nil\n}", "func (x *fastReflection_Params) New() protoreflect.Message {\n\treturn new(fastReflection_Params)\n}", "func NewParams(acl ACL, daoOwner sdk.Address) Params {\n\treturn Params{\n\t\tACL: acl,\n\t\tDAOOwner: daoOwner,\n\t}\n}", "func (client *RecordSetsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, privateZoneName string, recordType RecordType, relativeRecordSetName string, parameters RecordSet, options *RecordSetsUpdateOptions) (*azcore.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/privateDnsZones/{privateZoneName}/{recordType}/{relativeRecordSetName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif privateZoneName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateZoneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateZoneName}\", url.PathEscape(privateZoneName))\n\tif recordType == \"\" {\n\t\treturn nil, errors.New(\"parameter recordType cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{recordType}\", url.PathEscape(string(recordType)))\n\tif relativeRecordSetName == \"\" {\n\t\treturn nil, errors.New(\"parameter relativeRecordSetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{relativeRecordSetName}\", relativeRecordSetName)\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := azcore.NewRequest(ctx, http.MethodPatch, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\treqQP := req.URL.Query()\n\treqQP.Set(\"api-version\", \"2020-06-01\")\n\treq.URL.RawQuery = reqQP.Encode()\n\tif options != nil && options.IfMatch != nil {\n\t\treq.Header.Set(\"If-Match\", *options.IfMatch)\n\t}\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, req.MarshalAsJSON(parameters)\n}", "func (s *VPCService) NewCreateVPCOfferingParams(displaytext string, name string, supportedservices []string) *CreateVPCOfferingParams {\n\tp := &CreateVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"displaytext\"] = displaytext\n\tp.p[\"name\"] = name\n\tp.p[\"supportedservices\"] = supportedservices\n\treturn p\n}", "func (s *ProjectService) NewUpdateProjectInvitationParams(projectid string) *UpdateProjectInvitationParams {\n\tp := &UpdateProjectInvitationParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"projectid\"] = projectid\n\treturn p\n}", "func (client *VirtualMachineScaleSetVMRunCommandsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, vmScaleSetName string, instanceID string, runCommandName string, runCommand VirtualMachineRunCommandUpdate, options *VirtualMachineScaleSetVMRunCommandsBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/virtualMachineScaleSets/{vmScaleSetName}/virtualMachines/{instanceId}/runCommands/{runCommandName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif vmScaleSetName == \"\" {\n\t\treturn nil, errors.New(\"parameter vmScaleSetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vmScaleSetName}\", url.PathEscape(vmScaleSetName))\n\tif instanceID == \"\" {\n\t\treturn nil, errors.New(\"parameter instanceID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{instanceId}\", url.PathEscape(instanceID))\n\tif runCommandName == \"\" {\n\t\treturn nil, errors.New(\"parameter runCommandName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{runCommandName}\", url.PathEscape(runCommandName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json, text/json\")\n\treturn req, runtime.MarshalAsJSON(req, runCommand)\n}", "func (client *WebAppsClient) updateVnetConnectionCreateRequest(ctx context.Context, resourceGroupName string, name string, vnetName string, connectionEnvelope VnetInfoResource, options *WebAppsUpdateVnetConnectionOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Web/sites/{name}/virtualNetworkConnections/{vnetName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif name == \"\" {\n\t\treturn nil, errors.New(\"parameter name cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{name}\", url.PathEscape(name))\n\tif vnetName == \"\" {\n\t\treturn nil, errors.New(\"parameter vnetName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{vnetName}\", url.PathEscape(vnetName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-02-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, connectionEnvelope)\n}", "func (s *ProjectService) NewUpdateProjectParams(id string) *UpdateProjectParams {\n\tp := &UpdateProjectParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (client *KeyVaultClient) updateKeyCreateRequest(ctx context.Context, vaultBaseURL string, keyName string, keyVersion string, parameters KeyUpdateParameters, options *KeyVaultClientUpdateKeyOptions) (*policy.Request, error) {\n\thost := \"{vaultBaseUrl}\"\n\thost = strings.ReplaceAll(host, \"{vaultBaseUrl}\", vaultBaseURL)\n\turlPath := \"/keys/{key-name}/{key-version}\"\n\tif keyName == \"\" {\n\t\treturn nil, errors.New(\"parameter keyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{key-name}\", url.PathEscape(keyName))\n\t// if keyVersion == \"\" {\n\t// \treturn nil, errors.New(\"parameter keyVersion cannot be empty\")\n\t// }\n\turlPath = strings.ReplaceAll(urlPath, \"{key-version}\", url.PathEscape(keyVersion))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.3\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func NewUpdateEventParams() *UpdateEventParams {\n\tvar ()\n\treturn &UpdateEventParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *KeyVaultClient) updateKeyCreateRequest(ctx context.Context, vaultBaseURL string, keyName string, keyVersion string, parameters KeyUpdateParameters, options *KeyVaultClientUpdateKeyOptions) (*policy.Request, error) {\n\thost := \"{vaultBaseUrl}\"\n\thost = strings.ReplaceAll(host, \"{vaultBaseUrl}\", vaultBaseURL)\n\turlPath := \"/keys/{key-name}/{key-version}\"\n\tif keyName == \"\" {\n\t\treturn nil, errors.New(\"parameter keyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{key-name}\", url.PathEscape(keyName))\n\tif keyVersion == \"\" {\n\t\treturn nil, errors.New(\"parameter keyVersion cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{key-version}\", url.PathEscape(keyVersion))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.2\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules,\n\tmoneyMarkets MoneyMarkets, checkLtvIndexCount int) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t\tMoneyMarkets: moneyMarkets,\n\t\tCheckLtvIndexCount: checkLtvIndexCount,\n\t}\n}", "func (enc *JBIG2Encoder) UpdateParams(params *PdfObjectDictionary) {\n\tbpc, err := GetNumberAsInt64(params.Get(\"BitsPerComponent\"))\n\tif err == nil {\n\t\tenc.BitsPerComponent = int(bpc)\n\t}\n\twidth, err := GetNumberAsInt64(params.Get(\"Width\"))\n\tif err == nil {\n\t\tenc.Width = int(width)\n\t}\n\theight, err := GetNumberAsInt64(params.Get(\"Height\"))\n\tif err == nil {\n\t\tenc.Height = int(height)\n\t}\n\tcolorComponents, err := GetNumberAsInt64(params.Get(\"ColorComponents\"))\n\tif err == nil {\n\t\tenc.ColorComponents = int(colorComponents)\n\t}\n}", "func newUpdateParam4Update(req *http.Request) (*UpdateParam, error) {\n\tparam := &UpdateParam{}\n\terr := xreq.BindURI(req, param)\n\n\treturn param, err\n}", "func UpdateVPCFailStatusMocked(t *testing.T, vpcIn *types.Vpc) *types.Vpc {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewVPCService(cs)\n\tassert.Nil(err, \"Couldn't load VPC service\")\n\tassert.NotNil(ds, \"VPC service not instanced\")\n\n\t// convertMap\n\tmapIn, err := utils.ItemConvertParams(*vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// to json\n\tdOut, err := json.Marshal(vpcIn)\n\tassert.Nil(err, \"VPC test data corrupted\")\n\n\t// call service\n\tcs.On(\"Put\", fmt.Sprintf(\"/network/vpcs/%s\", vpcIn.ID), mapIn).Return(dOut, 499, nil)\n\tvpcOut, err := ds.UpdateVPC(mapIn, vpcIn.ID)\n\n\tassert.NotNil(err, \"We are expecting an status code error\")\n\tassert.Nil(vpcOut, \"Expecting nil output\")\n\tassert.Contains(err.Error(), \"499\", \"Error should contain http code 499\")\n\treturn vpcOut\n}", "func (c *UDBClient) NewUpdateUDBParamGroupRequest() *UpdateUDBParamGroupRequest {\n\treq := &UpdateUDBParamGroupRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "func (r *UpdateInstanceRequest) FromJsonString(s string) error {\n\tf := make(map[string]interface{})\n\tif err := json.Unmarshal([]byte(s), &f); err != nil {\n\t\treturn err\n\t}\n\tdelete(f, \"InstanceId\")\n\tdelete(f, \"InstanceName\")\n\tdelete(f, \"NodeNum\")\n\tdelete(f, \"EsConfig\")\n\tdelete(f, \"Password\")\n\tdelete(f, \"EsAcl\")\n\tdelete(f, \"DiskSize\")\n\tdelete(f, \"NodeType\")\n\tdelete(f, \"MasterNodeNum\")\n\tdelete(f, \"MasterNodeType\")\n\tdelete(f, \"MasterNodeDiskSize\")\n\tdelete(f, \"ForceRestart\")\n\tdelete(f, \"CosBackup\")\n\tdelete(f, \"NodeInfoList\")\n\tdelete(f, \"PublicAccess\")\n\tdelete(f, \"EsPublicAcl\")\n\tdelete(f, \"KibanaPublicAccess\")\n\tdelete(f, \"KibanaPrivateAccess\")\n\tdelete(f, \"BasicSecurityType\")\n\tdelete(f, \"KibanaPrivatePort\")\n\tdelete(f, \"ScaleType\")\n\tdelete(f, \"MultiZoneInfo\")\n\tdelete(f, \"SceneType\")\n\tdelete(f, \"KibanaConfig\")\n\tdelete(f, \"WebNodeTypeInfo\")\n\tdelete(f, \"SwitchPrivateLink\")\n\tdelete(f, \"EnableCerebro\")\n\tdelete(f, \"CerebroPublicAccess\")\n\tdelete(f, \"CerebroPrivateAccess\")\n\tdelete(f, \"EsConfigSet\")\n\tdelete(f, \"OperationDuration\")\n\tdelete(f, \"KibanaAlteringPublicAccess\")\n\tif len(f) > 0 {\n\t\treturn tcerr.NewTencentCloudSDKError(\"ClientError.BuildRequestError\", \"UpdateInstanceRequest has unknown keys!\", \"\")\n\t}\n\treturn json.Unmarshal([]byte(s), &r)\n}", "func (t *Role) UpdateParams() []interface{} {\n\treturn []interface{}{\n\t\t&t.Name,\n\t}\n}", "func (client *MonitoringSettingsClient) updatePutCreateRequest(ctx context.Context, resourceGroupName string, serviceName string, monitoringSettingResource MonitoringSettingResource, options *MonitoringSettingsClientBeginUpdatePutOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.AppPlatform/Spring/{serviceName}/monitoringSettings/default\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif serviceName == \"\" {\n\t\treturn nil, errors.New(\"parameter serviceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{serviceName}\", url.PathEscape(serviceName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPut, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-01-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, monitoringSettingResource)\n}", "func (client *PublicIPAddressesClient) getCloudServicePublicIPAddressCreateRequest(ctx context.Context, resourceGroupName string, cloudServiceName string, roleInstanceName string, networkInterfaceName string, ipConfigurationName string, publicIPAddressName string, options *PublicIPAddressesClientGetCloudServicePublicIPAddressOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/roleInstances/{roleInstanceName}/networkInterfaces/{networkInterfaceName}/ipconfigurations/{ipConfigurationName}/publicipaddresses/{publicIpAddressName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif roleInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter roleInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{roleInstanceName}\", url.PathEscape(roleInstanceName))\n\tif networkInterfaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkInterfaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkInterfaceName}\", url.PathEscape(networkInterfaceName))\n\tif ipConfigurationName == \"\" {\n\t\treturn nil, errors.New(\"parameter ipConfigurationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{ipConfigurationName}\", url.PathEscape(ipConfigurationName))\n\tif publicIPAddressName == \"\" {\n\t\treturn nil, errors.New(\"parameter publicIPAddressName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{publicIpAddressName}\", url.PathEscape(publicIPAddressName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\tif options != nil && options.Expand != nil {\n\t\treqQP.Set(\"$expand\", *options.Expand)\n\t}\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (rm *resourceManager) newUpdateRequestPayload(\n\tctx context.Context,\n\tr *resource,\n) (*svcsdk.ModifyVpnConnectionInput, error) {\n\tres := &svcsdk.ModifyVpnConnectionInput{}\n\n\tif r.ko.Spec.CustomerGatewayID != nil {\n\t\tres.SetCustomerGatewayId(*r.ko.Spec.CustomerGatewayID)\n\t}\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Spec.TransitGatewayID != nil {\n\t\tres.SetTransitGatewayId(*r.ko.Spec.TransitGatewayID)\n\t}\n\tif r.ko.Status.VPNConnectionID != nil {\n\t\tres.SetVpnConnectionId(*r.ko.Status.VPNConnectionID)\n\t}\n\tif r.ko.Spec.VPNGatewayID != nil {\n\t\tres.SetVpnGatewayId(*r.ko.Spec.VPNGatewayID)\n\t}\n\n\treturn res, nil\n}", "func (client *VirtualNetworkTapsClient) updateTagsCreateRequest(ctx context.Context, resourceGroupName string, tapName string, tapParameters TagsObject, options *VirtualNetworkTapsUpdateTagsOptions) (*azcore.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/virtualNetworkTaps/{tapName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\turlPath = strings.ReplaceAll(urlPath, \"{tapName}\", url.PathEscape(tapName))\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := azcore.NewRequest(ctx, http.MethodPatch, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\tquery := req.URL.Query()\n\tquery.Set(\"api-version\", \"2020-07-01\")\n\treq.URL.RawQuery = query.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, req.MarshalAsJSON(tapParameters)\n}", "func (client *PeeringPoliciesClient) createOrUpdateCreateRequest(ctx context.Context, resourceGroupName string, managedNetworkName string, managedNetworkPeeringPolicyName string, managedNetworkPolicy PeeringPolicy, options *PeeringPoliciesClientBeginCreateOrUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedNetwork/managedNetworks/{managedNetworkName}/managedNetworkPeeringPolicies/{managedNetworkPeeringPolicyName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif managedNetworkName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedNetworkName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedNetworkName}\", url.PathEscape(managedNetworkName))\n\tif managedNetworkPeeringPolicyName == \"\" {\n\t\treturn nil, errors.New(\"parameter managedNetworkPeeringPolicyName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managedNetworkPeeringPolicyName}\", url.PathEscape(managedNetworkPeeringPolicyName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPut, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-06-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, managedNetworkPolicy)\n}", "func (m *MockProjectServiceIface) NewUpdateProjectParams(id string) *UpdateProjectParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewUpdateProjectParams\", id)\n\tret0, _ := ret[0].(*UpdateProjectParams)\n\treturn ret0\n}", "func (m *MockAnnotationServiceIface) NewUpdateAnnotationVisibilityParams(adminsonly bool, id string) *UpdateAnnotationVisibilityParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewUpdateAnnotationVisibilityParams\", adminsonly, id)\n\tret0, _ := ret[0].(*UpdateAnnotationVisibilityParams)\n\treturn ret0\n}", "func (client *PublicIPAddressesClient) listCloudServiceRoleInstancePublicIPAddressesCreateRequest(ctx context.Context, resourceGroupName string, cloudServiceName string, roleInstanceName string, networkInterfaceName string, ipConfigurationName string, options *PublicIPAddressesClientListCloudServiceRoleInstancePublicIPAddressesOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/cloudServices/{cloudServiceName}/roleInstances/{roleInstanceName}/networkInterfaces/{networkInterfaceName}/ipconfigurations/{ipConfigurationName}/publicipaddresses\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif cloudServiceName == \"\" {\n\t\treturn nil, errors.New(\"parameter cloudServiceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{cloudServiceName}\", url.PathEscape(cloudServiceName))\n\tif roleInstanceName == \"\" {\n\t\treturn nil, errors.New(\"parameter roleInstanceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{roleInstanceName}\", url.PathEscape(roleInstanceName))\n\tif networkInterfaceName == \"\" {\n\t\treturn nil, errors.New(\"parameter networkInterfaceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{networkInterfaceName}\", url.PathEscape(networkInterfaceName))\n\tif ipConfigurationName == \"\" {\n\t\treturn nil, errors.New(\"parameter ipConfigurationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{ipConfigurationName}\", url.PathEscape(ipConfigurationName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewPutParams() *PutParams {\n\tvar ()\n\treturn &PutParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (c *VPCClient) NewUpdateNATGWSubnetRequest() *UpdateNATGWSubnetRequest {\n\treq := &UpdateNATGWSubnetRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}" ]
[ "0.62927604", "0.5984308", "0.57419705", "0.55560946", "0.54537505", "0.54031587", "0.5352362", "0.53317314", "0.5315268", "0.5305434", "0.5287703", "0.5245366", "0.5233076", "0.5228383", "0.5221681", "0.52133876", "0.5200755", "0.51736766", "0.5159794", "0.51556337", "0.5154545", "0.5139331", "0.51169586", "0.5111968", "0.5110937", "0.5103945", "0.50889003", "0.5070566", "0.50537246", "0.5039523", "0.5018945", "0.500628", "0.49675822", "0.49658084", "0.4959112", "0.49579936", "0.49430722", "0.49400944", "0.49320364", "0.4915561", "0.49034315", "0.48916546", "0.4887119", "0.4871582", "0.48702854", "0.48697188", "0.48584834", "0.48446295", "0.48382124", "0.48349696", "0.48278978", "0.4825294", "0.4822235", "0.4818194", "0.4818112", "0.4810805", "0.48074928", "0.48053712", "0.48015738", "0.48014593", "0.4795517", "0.4791088", "0.47864348", "0.47861603", "0.47858775", "0.47589546", "0.47569203", "0.4752822", "0.4750314", "0.47474778", "0.47472033", "0.4742292", "0.47409588", "0.47404966", "0.4736807", "0.47358254", "0.4723603", "0.47205818", "0.47124562", "0.471114", "0.47090074", "0.47052714", "0.46993935", "0.4699165", "0.4688602", "0.46854368", "0.4679741", "0.46773905", "0.4674216", "0.46673557", "0.46641284", "0.4663555", "0.4660722", "0.46605557", "0.46583804", "0.46555084", "0.4650143", "0.4647488", "0.4635534", "0.46346393" ]
0.70835716
0
You should always use this function to get a new UpdateVPCOfferingParams instance, as then you are sure you have configured all required params
func (s *VPCService) NewUpdateVPCOfferingParams(id string) *UpdateVPCOfferingParams { p := &UpdateVPCOfferingParams{} p.p = make(map[string]interface{}) p.p["id"] = id return p }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func newUpdateParam4Update(req *http.Request) (*UpdateParam, error) {\n\tparam := &UpdateParam{}\n\terr := xreq.BindURI(req, param)\n\n\treturn param, err\n}", "func (x *fastReflection_MsgUpdateParams) New() protoreflect.Message {\n\treturn new(fastReflection_MsgUpdateParams)\n}", "func (params *QueueParams) UpdateParams() []*cloudformation.Parameter {\n\treturn []*cloudformation.Parameter{\n\t\tmkOptionalParameter(ParamDelaySeconds, params.DelaySeconds),\n\t\tmkOptionalParameter(ParamMaximumMessageSize, params.MaximumMessageSize),\n\t\tmkOptionalParameter(ParamMessageRetentionPeriod, params.MessageRetentionPeriod),\n\t\tmkOptionalParameter(ParamReceiveMessageWaitTimeSeconds, params.ReceiveMessageWaitTimeSeconds),\n\t\tmkOptionalParameter(ParamRedriveMaxReceiveCount, params.RedriveMaxReceiveCount),\n\t\tmkOptionalParameter(ParamVisibilityTimeout, params.VisibilityTimeout),\n\t}\n}", "func (enc *JBIG2Encoder) UpdateParams(params *PdfObjectDictionary) {\n\tbpc, err := GetNumberAsInt64(params.Get(\"BitsPerComponent\"))\n\tif err == nil {\n\t\tenc.BitsPerComponent = int(bpc)\n\t}\n\twidth, err := GetNumberAsInt64(params.Get(\"Width\"))\n\tif err == nil {\n\t\tenc.Width = int(width)\n\t}\n\theight, err := GetNumberAsInt64(params.Get(\"Height\"))\n\tif err == nil {\n\t\tenc.Height = int(height)\n\t}\n\tcolorComponents, err := GetNumberAsInt64(params.Get(\"ColorComponents\"))\n\tif err == nil {\n\t\tenc.ColorComponents = int(colorComponents)\n\t}\n}", "func (v *PublicParamsManager) Update() error {\n\tv.mutex.Lock()\n\tdefer v.mutex.Unlock()\n\n\tif v.publicParamsLoader == nil {\n\t\treturn errors.New(\"public parameters loader not set\")\n\t}\n\n\tpp, err := v.publicParamsLoader.FetchParams()\n\tif err != nil {\n\t\treturn errors.WithMessagef(err, \"failed force fetching public parameters\")\n\t}\n\tv.pp = pp\n\n\treturn nil\n}", "func NewUpdateFlowParams() *UpdateFlowParams {\n\treturn &UpdateFlowParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewUpdateParamsCmd() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"update [change-file]\",\n\t\tShort: \"UpdateValidator params\",\n\t\tArgs: cobra.ExactArgs(1),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tclientCtx, err := client.GetClientTxContext(cmd)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tchanges, _ := utils.ParseParamChange(clientCtx.LegacyAmino, args[0])\n\n\t\t\tmsg := types.NewMsgUpdateParams(\n\t\t\t\tchanges.ToParamChanges(),\n\t\t\t\tclientCtx.GetFromAddress(),\n\t\t\t)\n\n\t\t\tif err := msg.ValidateBasic(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\treturn tx.GenerateOrBroadcastTxCLI(clientCtx, cmd.Flags(), msg)\n\t\t},\n\t}\n\n\tflags.AddTxFlagsToCmd(cmd)\n\t_ = cmd.MarkFlagRequired(flags.FlagFrom)\n\n\treturn cmd\n}", "func (nt *Network) UpdateParams() {\n\tnt.Network.UpdateParams()\n}", "func NewUpdateWidgetParams() *UpdateWidgetParams {\n\tvar (\n\t\tacceptDefault = string(\"application/json\")\n\t\tcontentTypeDefault = string(\"application/json\")\n\t)\n\treturn &UpdateWidgetParams{\n\t\tAccept: &acceptDefault,\n\t\tContentType: &contentTypeDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewUpdateEventParams() *UpdateEventParams {\n\tvar ()\n\treturn &UpdateEventParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewParams(createWhoisPrice string, updateWhoisPrice string, deleteWhoisPrice string) Params {\n\treturn Params{\n\t\tCreateWhoisPrice: createWhoisPrice,\n\t\tUpdateWhoisPrice: updateWhoisPrice,\n\t\tDeleteWhoisPrice: deleteWhoisPrice,\n\t}\n}", "func NewUpdateDeviceParams() *UpdateDeviceParams {\n\tvar ()\n\treturn &UpdateDeviceParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *VPCService) NewCreateVPCOfferingParams(displaytext string, name string, supportedservices []string) *CreateVPCOfferingParams {\n\tp := &CreateVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"displaytext\"] = displaytext\n\tp.p[\"name\"] = name\n\tp.p[\"supportedservices\"] = supportedservices\n\treturn p\n}", "func NewUpdatePatientParams() *UpdatePatientParams {\n\tvar ()\n\treturn &UpdatePatientParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (x *fastReflection_MsgUpdateParamsResponse) New() protoreflect.Message {\n\treturn new(fastReflection_MsgUpdateParamsResponse)\n}", "func NewParams(defaultSendEnabled bool) Params {\n\treturn Params{\n\t\tSendEnabled: nil,\n\t\tDefaultSendEnabled: defaultSendEnabled,\n\t}\n}", "func (client *VideosClient) updateCreateRequest(ctx context.Context, resourceGroupName string, accountName string, videoName string, parameters VideoEntity, options *VideosClientUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Media/videoAnalyzers/{accountName}/videos/{videoName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif accountName == \"\" {\n\t\treturn nil, errors.New(\"parameter accountName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{accountName}\", url.PathEscape(accountName))\n\tif videoName == \"\" {\n\t\treturn nil, errors.New(\"parameter videoName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{videoName}\", url.PathEscape(videoName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-11-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (x *fastReflection_Params) New() protoreflect.Message {\n\treturn new(fastReflection_Params)\n}", "func (s *ProjectService) NewUpdateProjectInvitationParams(projectid string) *UpdateProjectInvitationParams {\n\tp := &UpdateProjectInvitationParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"projectid\"] = projectid\n\treturn p\n}", "func (ly *ModLayer) UpdateParams() {\n\tly.Layer.UpdateParams()\n}", "func NewParams(opts []copts.Opt) *Params {\r\n\tparams := &Params{}\r\n\tcopts.Apply(params, opts)\r\n\treturn params\r\n}", "func NewParams() *Params {\n\treturn new(Params)\n}", "func (s *ProjectService) NewUpdateProjectParams(id string) *UpdateProjectParams {\n\tp := &UpdateProjectParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (s *VPCService) NewUpdateVPCParams(id string) *UpdateVPCParams {\n\tp := &UpdateVPCParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewParams() (Params, error) {\n\treturn Params{\n\t\tBaseParams: codec.BaseParams{\n\t\t\tKeyFrameInterval: 60,\n\t\t},\n\t}, nil\n}", "func (m *MockProjectServiceIface) NewUpdateProjectInvitationParams(projectid string) *UpdateProjectInvitationParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewUpdateProjectInvitationParams\", projectid)\n\tret0, _ := ret[0].(*UpdateProjectInvitationParams)\n\treturn ret0\n}", "func NewParams(opts []copts.Opt) *Params {\n\tparams := &Params{}\n\tcopts.Apply(params, opts)\n\treturn params\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewUpdateCustomIDPParams() *UpdateCustomIDPParams {\n\tvar (\n\t\taidDefault = string(\"default\")\n\t\tiidDefault = string(\"default\")\n\t\ttidDefault = string(\"default\")\n\t)\n\treturn &UpdateCustomIDPParams{\n\t\tAid: aidDefault,\n\t\tIid: iidDefault,\n\t\tTid: tidDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s RealmGateway_export_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_export_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s *VPCService) NewListVPCOfferingsParams() *ListVPCOfferingsParams {\n\tp := &ListVPCOfferingsParams{}\n\tp.p = make(map[string]interface{})\n\treturn p\n}", "func NewParams(pricePerByte abi.TokenAmount, paymentInterval uint64, paymentIntervalIncrease uint64) (Params, error) {\n\treturn Params{\n\t\tPricePerByte: pricePerByte,\n\t\tPaymentInterval: paymentInterval,\n\t\tPaymentIntervalIncrease: paymentIntervalIncrease,\n\t}, nil\n}", "func (o *GradientDescent) updateParams() {\n\tvar wg sync.WaitGroup\n\tfor key := range o.observed {\n\t\tif key.HasGrad() {\n\t\t\twg.Add(1)\n\t\t\tgo func(param Optimizable) {\n\t\t\t\tdefer wg.Done()\n\t\t\t\tdelta := o.method.Delta(param)\n\t\t\t\tparam.ApplyDelta(delta)\n\t\t\t}(key)\n\t\t}\n\t}\n\twg.Wait()\n}", "func (l0 *l0Conn) parametersNew() (p *paramConf) {\n\tp = &paramConf{conf.New(l0.teo, &param{}), l0.teo.ev.subscribe(), l0}\n\tfmt.Printf(\"!!! Subscribed - peer connected !!!\\n\")\n\tgo func() {\n\t\t// TODO: uncomment wg using when normolise close channel during exit\n\t\tl0.teo.wg.Add(1)\n\t\tfor ev := range p.chanEvent {\n\t\t\tp.eventProcess(ev)\n\t\t}\n\t\tfmt.Printf(\"!!! Subscribed channel closed !!!\\n\")\n\t\tl0.teo.wg.Done()\n\t}()\n\treturn\n}", "func (q legacyQueryServer) Params(ctx context.Context, req *v1beta1.QueryParamsRequest) (*v1beta1.QueryParamsResponse, error) {\n\tresp, err := q.qs.Params(ctx, &v1.QueryParamsRequest{\n\t\tParamsType: req.ParamsType,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &v1beta1.QueryParamsResponse{}\n\n\tif resp.DepositParams == nil && resp.VotingParams == nil && resp.TallyParams == nil {\n\t\treturn nil, status.Errorf(codes.InvalidArgument, \"%s is not a valid parameter type\", req.ParamsType)\n\t}\n\n\tif resp.DepositParams != nil {\n\t\tminDeposit := sdk.NewCoins(resp.DepositParams.MinDeposit...)\n\t\tresponse.DepositParams = v1beta1.NewDepositParams(minDeposit, *resp.DepositParams.MaxDepositPeriod)\n\t}\n\n\tif resp.VotingParams != nil {\n\t\tresponse.VotingParams = v1beta1.NewVotingParams(*resp.VotingParams.VotingPeriod)\n\t}\n\n\tif resp.TallyParams != nil {\n\t\tquorum, err := sdkmath.LegacyNewDecFromStr(resp.TallyParams.Quorum)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tthreshold, err := sdkmath.LegacyNewDecFromStr(resp.TallyParams.Threshold)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvetoThreshold, err := sdkmath.LegacyNewDecFromStr(resp.TallyParams.VetoThreshold)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tresponse.TallyParams = v1beta1.NewTallyParams(quorum, threshold, vetoThreshold)\n\t}\n\n\treturn response, nil\n}", "func NewPartialUpdateAppParams() *PartialUpdateAppParams {\n\tvar ()\n\treturn &PartialUpdateAppParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (rm *resourceManager) newUpdateRequestPayload(\n\tctx context.Context,\n\tr *resource,\n) (*svcsdk.ModifyVpnConnectionInput, error) {\n\tres := &svcsdk.ModifyVpnConnectionInput{}\n\n\tif r.ko.Spec.CustomerGatewayID != nil {\n\t\tres.SetCustomerGatewayId(*r.ko.Spec.CustomerGatewayID)\n\t}\n\tif r.ko.Spec.DryRun != nil {\n\t\tres.SetDryRun(*r.ko.Spec.DryRun)\n\t}\n\tif r.ko.Spec.TransitGatewayID != nil {\n\t\tres.SetTransitGatewayId(*r.ko.Spec.TransitGatewayID)\n\t}\n\tif r.ko.Status.VPNConnectionID != nil {\n\t\tres.SetVpnConnectionId(*r.ko.Status.VPNConnectionID)\n\t}\n\tif r.ko.Spec.VPNGatewayID != nil {\n\t\tres.SetVpnGatewayId(*r.ko.Spec.VPNGatewayID)\n\t}\n\n\treturn res, nil\n}", "func NewUpdateCredentialParams() *UpdateCredentialParams {\n\tvar ()\n\treturn &UpdateCredentialParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (c *UDBClient) NewUpdateUDBParamGroupRequest() *UpdateUDBParamGroupRequest {\n\treq := &UpdateUDBParamGroupRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "func newUpdateAttestorUpdateAttestorRequest(ctx context.Context, f *Attestor, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\n\treturn req, nil\n}", "func NewContainerUpdateParams() *ContainerUpdateParams {\n\tvar ()\n\treturn &ContainerUpdateParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (t *Role) UpdateParams() []interface{} {\n\treturn []interface{}{\n\t\t&t.Name,\n\t}\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules,\n\tmoneyMarkets MoneyMarkets, checkLtvIndexCount int) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t\tMoneyMarkets: moneyMarkets,\n\t\tCheckLtvIndexCount: checkLtvIndexCount,\n\t}\n}", "func NewParams(communityTax sdk.Dec, withdrawAddrEnabled bool) Params {\n\treturn Params{\n\t\tCommunityTax: communityTax,\n\t\tWithdrawAddrEnabled: withdrawAddrEnabled,\n\t}\n}", "func (s *CBOW) UpdateParams(ps []params.Param) {\n\tfor j, l := range s.Layers {\n\t\tp := l.GetParam()\n\t\t// ignore if weight is nil.\n\t\tif p.Weight == nil {\n\t\t\tcontinue\n\t\t}\n\t\tl.SetParam(ps[0])\n\t\ts.Layers[j] = l\n\t}\n\n\ts.LossLayer.UpdateParams([]params.Param{ps[1]})\n}", "func NewParams(n, m int, prf, msg hasher.Hasher) *Params {\n\t// Don't allow creation of params if m == 0 or m > MaxMsgSize\n\tif m < 1 || m > MaxMsgSize {\n\t\treturn nil\n\t}\n\t// Don't allow creation of params if hash functions sizes are smaller than specified N and M\n\tif prf.Size() < n || msg.Size() < m {\n\t\treturn nil\n\t}\n\tchecksumLadders := 2\n\t// The only case that we need just 1 checksum ladder is for m=1\n\tif m == 1 {\n\t\tchecksumLadders = 1\n\t}\n\treturn &Params{\n\t\tn: n,\n\t\tm: m,\n\t\tprfHash: prf,\n\t\tmsgHash: msg,\n\t\ttotal: m + checksumLadders,\n\t}\n}", "func newUpdateGoogleChannelConfigUpdateGoogleChannelConfigRequest(ctx context.Context, f *GoogleChannelConfig, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\tres := f\n\t_ = res\n\n\tif v := f.CryptoKeyName; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"cryptoKeyName\"] = v\n\t}\n\treturn req, nil\n}", "func NewParams(tokenCourse, subscriptionPrice, VPNGBPrice,\n\tstorageGBPrice, baseVPNGb, baseStorageGb uint32, courseSigners []sdk.AccAddress) Params {\n\treturn Params{\n\t\tTokenCourse: tokenCourse,\n\t\tSubscriptionPrice: subscriptionPrice,\n\t\tVPNGBPrice: VPNGBPrice,\n\t\tStorageGBPrice: storageGBPrice,\n\t\tBaseVPNGb: baseVPNGb,\n\t\tBaseStorageGb: baseStorageGb,\n\t\tCourseChangeSigners: courseSigners[:],\n\t}\n}", "func (s *TemplateService) NewUpdateTemplateParams(id string) *UpdateTemplateParams {\n\tp := &UpdateTemplateParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewEditParams() *EditParams {\n\treturn &EditParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewParams(\n\ttaxPolicy, rewardPolicy PolicyConstraints,\n\tseigniorageBurden sdk.Dec,\n\tminingIncrement sdk.Dec,\n\twindowShort, windowLong, windowProbation sdk.Int,\n) Params {\n\treturn Params{\n\t\tTaxPolicy: taxPolicy,\n\t\tRewardPolicy: rewardPolicy,\n\t\tSeigniorageBurdenTarget: seigniorageBurden,\n\t\tMiningIncrement: miningIncrement,\n\t\tWindowShort: windowShort,\n\t\tWindowLong: windowLong,\n\t\tWindowProbation: windowProbation,\n\t}\n}", "func NewUpdateProjectDeviceParams() UpdateProjectDeviceParams {\n\n\treturn UpdateProjectDeviceParams{}\n}", "func NewUpdateDeviceProfileParams() *UpdateDeviceProfileParams {\n\tvar ()\n\treturn &UpdateDeviceProfileParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewReplacechangeaspecificPbxFieldDevicePreferenceRequestWithBody(server string, id string, contentType string, body io.Reader) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/pbxfielddevicepreferences/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"PUT\", queryUrl.String(), body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Add(\"Content-Type\", contentType)\n\treturn req, nil\n}", "func NewParams(acl ACL, daoOwner sdk.Address) Params {\n\treturn Params{\n\t\tACL: acl,\n\t\tDAOOwner: daoOwner,\n\t}\n}", "func NewParams(\n\tSpotMarketInstantListingFee sdk.Coin,\n\tderivativeMarketInstantListingFee sdk.Coin,\n\tdefaultSpotMakerFee sdk.Dec,\n\tdefaultSpotTakerFee sdk.Dec,\n\tdefaultDerivativeMakerFee sdk.Dec,\n\tdefaultDerivativeTakerFee sdk.Dec,\n\tdefaultInitialMarginRatio sdk.Dec,\n\tdefaultMaintenanceMarginRatio sdk.Dec,\n\tdefaultFundingInterval int64,\n\tfundingMultiple int64,\n\trelayerFeeShare sdk.Dec,\n\tdefaultHourlyFundingRateCap sdk.Dec,\n\tdefaultHourlyInterestRate sdk.Dec,\n\tmaxDerivativeSideOrderCount uint32,\n) Params {\n\treturn Params{\n\t\tSpotMarketInstantListingFee: SpotMarketInstantListingFee,\n\t\tDerivativeMarketInstantListingFee: derivativeMarketInstantListingFee,\n\t\tDefaultSpotMakerFeeRate: defaultSpotMakerFee,\n\t\tDefaultSpotTakerFeeRate: defaultSpotTakerFee,\n\t\tDefaultDerivativeMakerFeeRate: defaultDerivativeMakerFee,\n\t\tDefaultDerivativeTakerFeeRate: defaultDerivativeTakerFee,\n\t\tDefaultInitialMarginRatio: defaultInitialMarginRatio,\n\t\tDefaultMaintenanceMarginRatio: defaultMaintenanceMarginRatio,\n\t\tDefaultFundingInterval: defaultFundingInterval,\n\t\tFundingMultiple: fundingMultiple,\n\t\tRelayerFeeShareRate: relayerFeeShare,\n\t\tDefaultHourlyFundingRateCap: defaultHourlyFundingRateCap,\n\t\tDefaultHourlyInterestRate: defaultHourlyInterestRate,\n\t\tMaxDerivativeOrderSideCount: maxDerivativeSideOrderCount,\n\t}\n}", "func NewParams(nickname NicknameParams, dTag DTagParams, bio BioParams, oracle OracleParams) Params {\n\treturn Params{\n\t\tNickname: nickname,\n\t\tDTag: dTag,\n\t\tBio: bio,\n\t\tOracle: oracle,\n\t}\n}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t}\n}", "func newUpdateKeyUpdateKeyRequest(ctx context.Context, f *Key, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\tres := f\n\t_ = res\n\n\tif v := f.DisplayName; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"displayName\"] = v\n\t}\n\tif v, err := expandKeyWebSettings(c, f.WebSettings, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding WebSettings into webSettings: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"webSettings\"] = v\n\t}\n\tif v, err := expandKeyAndroidSettings(c, f.AndroidSettings, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding AndroidSettings into androidSettings: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"androidSettings\"] = v\n\t}\n\tif v, err := expandKeyIosSettings(c, f.IosSettings, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding IosSettings into iosSettings: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"iosSettings\"] = v\n\t}\n\tif v := f.Labels; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"labels\"] = v\n\t}\n\treturn req, nil\n}", "func NewParams() *Params {\n\tp := Params{}\n\tp.names = []string{}\n\tp.values = map[string]interface{}{}\n\n\treturn &p\n}", "func (s *VPCService) NewDeleteVPCOfferingParams(id string) *DeleteVPCOfferingParams {\n\tp := &DeleteVPCOfferingParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func (s *UserService) NewUpdateUserParams(id string) *UpdateUserParams {\n\tp := &UpdateUserParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewReplacechangeaspecificPbxDevicePreferenceRequestWithBody(server string, id string, contentType string, body io.Reader) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/pbxdevicepreferences/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"PUT\", queryUrl.String(), body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Add(\"Content-Type\", contentType)\n\treturn req, nil\n}", "func (m *MockProjectServiceIface) NewUpdateProjectParams(id string) *UpdateProjectParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewUpdateProjectParams\", id)\n\tret0, _ := ret[0].(*UpdateProjectParams)\n\treturn ret0\n}", "func (client *PortalConfigClient) updateCreateRequest(ctx context.Context, resourceGroupName string, serviceName string, portalConfigID string, ifMatch string, parameters PortalConfigContract, options *PortalConfigClientUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ApiManagement/service/{serviceName}/portalconfigs/{portalConfigId}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif serviceName == \"\" {\n\t\treturn nil, errors.New(\"parameter serviceName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{serviceName}\", url.PathEscape(serviceName))\n\tif portalConfigID == \"\" {\n\t\treturn nil, errors.New(\"parameter portalConfigID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{portalConfigId}\", url.PathEscape(portalConfigID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-08-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"If-Match\"] = []string{ifMatch}\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\tif err := runtime.MarshalAsJSON(req, parameters); err != nil {\n\t\treturn nil, err\n\t}\n\treturn req, nil\n}", "func (x *fastReflection_MsgUpdateParams) Mutable(fd protoreflect.FieldDescriptor) protoreflect.Value {\n\tswitch fd.FullName() {\n\tcase \"cosmos.distribution.v1beta1.MsgUpdateParams.params\":\n\t\tif x.Params == nil {\n\t\t\tx.Params = new(Params)\n\t\t}\n\t\treturn protoreflect.ValueOfMessage(x.Params.ProtoReflect())\n\tcase \"cosmos.distribution.v1beta1.MsgUpdateParams.authority\":\n\t\tpanic(fmt.Errorf(\"field authority of message cosmos.distribution.v1beta1.MsgUpdateParams is not mutable\"))\n\tdefault:\n\t\tif fd.IsExtension() {\n\t\t\tpanic(fmt.Errorf(\"proto3 declared messages do not support extensions: cosmos.distribution.v1beta1.MsgUpdateParams\"))\n\t\t}\n\t\tpanic(fmt.Errorf(\"message cosmos.distribution.v1beta1.MsgUpdateParams does not contain field %s\", fd.FullName()))\n\t}\n}", "func NewReplacechangeaspecificPeeringServerPreferenceRequestWithBody(server string, id string, contentType string, body io.Reader) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/peeringserverpreferences/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"PUT\", queryUrl.String(), body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Add(\"Content-Type\", contentType)\n\treturn req, nil\n}", "func (client *ConnectedEnvironmentsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, connectedEnvironmentName string, options *ConnectedEnvironmentsClientUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.App/connectedEnvironments/{connectedEnvironmentName}\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif connectedEnvironmentName == \"\" {\n\t\treturn nil, errors.New(\"parameter connectedEnvironmentName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{connectedEnvironmentName}\", url.PathEscape(connectedEnvironmentName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-06-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewChangeaspecificPbxFieldDevicePreferenceRequestWithBody(server string, id string, contentType string, body io.Reader) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/pbxfielddevicepreferences/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"PATCH\", queryUrl.String(), body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Add(\"Content-Type\", contentType)\n\treturn req, nil\n}", "func NewChangeaspecificPbxDevicePreferenceRequestWithBody(server string, id string, contentType string, body io.Reader) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/pbxdevicepreferences/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"PATCH\", queryUrl.String(), body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Add(\"Content-Type\", contentType)\n\treturn req, nil\n}", "func (s *Server) init(ctx context.Context, req *jsonrpc2.Request) (interface{}, error) {\n\tin := new(updateReq)\n\tif err := json.Unmarshal([]byte(*req.Params), in); err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, s.peer.Init(ctx, in.ID, in.State)\n}", "func NewUpdatePriceListParams() *UpdatePriceListParams {\n\tvar ()\n\treturn &UpdatePriceListParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (q queryServer) Params(ctx context.Context, req *v1.QueryParamsRequest) (*v1.QueryParamsResponse, error) {\n\tif req == nil {\n\t\treturn nil, status.Error(codes.InvalidArgument, \"invalid request\")\n\t}\n\n\tparams, err := q.k.Params.Get(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresponse := &v1.QueryParamsResponse{}\n\n\t//nolint:staticcheck // needed for legacy parameters\n\tswitch req.ParamsType {\n\tcase v1.ParamDeposit:\n\t\tdepositParams := v1.NewDepositParams(params.MinDeposit, params.MaxDepositPeriod)\n\t\tresponse.DepositParams = &depositParams\n\n\tcase v1.ParamVoting:\n\t\tvotingParams := v1.NewVotingParams(params.VotingPeriod)\n\t\tresponse.VotingParams = &votingParams\n\n\tcase v1.ParamTallying:\n\t\ttallyParams := v1.NewTallyParams(params.Quorum, params.Threshold, params.VetoThreshold)\n\t\tresponse.TallyParams = &tallyParams\n\tdefault:\n\t\tif len(req.ParamsType) > 0 {\n\t\t\treturn nil, status.Errorf(codes.InvalidArgument, \"unknown params type: %s\", req.ParamsType)\n\t\t}\n\t}\n\tresponse.Params = &params\n\n\treturn response, nil\n}", "func NewUpdateAddonParams() *UpdateAddonParams {\n\tvar ()\n\treturn &UpdateAddonParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *AgentPoolsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, kubernetesClusterName string, agentPoolName string, agentPoolUpdateParameters AgentPoolPatchParameters, options *AgentPoolsClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.NetworkCloud/kubernetesClusters/{kubernetesClusterName}/agentPools/{agentPoolName}\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif kubernetesClusterName == \"\" {\n\t\treturn nil, errors.New(\"parameter kubernetesClusterName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{kubernetesClusterName}\", url.PathEscape(kubernetesClusterName))\n\tif agentPoolName == \"\" {\n\t\treturn nil, errors.New(\"parameter agentPoolName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{agentPoolName}\", url.PathEscape(agentPoolName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\tif err := runtime.MarshalAsJSON(req, agentPoolUpdateParameters); err != nil {\n\t\treturn nil, err\n\t}\n\treturn req, nil\n}", "func (m *MockLoadBalancerServiceIface) NewUpdateGlobalLoadBalancerRuleParams(id string) *UpdateGlobalLoadBalancerRuleParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewUpdateGlobalLoadBalancerRuleParams\", id)\n\tret0, _ := ret[0].(*UpdateGlobalLoadBalancerRuleParams)\n\treturn ret0\n}", "func NewFreezeParams() *FreezeParams {\n\treturn &FreezeParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (o *APIKey) UpdateP(exec boil.Executor, whitelist ...string) {\n\terr := o.Update(exec, whitelist...)\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n}", "func ValidateUpdateParams(sl validator.StructLevel) {\n\troute := sl.Current().Interface().(UpdateParams)\n\tif route.Type != \"\" && route.Grade == \"\" {\n\t\tsl.ReportError(route.Grade, \"Grade\", \"grade\", \"required\", \"\")\n\t}\n\tif route.Grade != \"\" && route.Type == \"\" {\n\t\tsl.ReportError(route.Type, \"Type\", \"type\", \"required\", \"\")\n\t}\n}", "func NewUpdateWidgetParamsWithTimeout(timeout time.Duration) *UpdateWidgetParams {\n\tvar (\n\t\tacceptDefault = string(\"application/json\")\n\t\tcontentTypeDefault = string(\"application/json\")\n\t)\n\treturn &UpdateWidgetParams{\n\t\tAccept: &acceptDefault,\n\t\tContentType: &contentTypeDefault,\n\n\t\ttimeout: timeout,\n\t}\n}", "func (m *MockFirewallServiceIface) NewUpdatePortForwardingRuleParams(id string) *UpdatePortForwardingRuleParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewUpdatePortForwardingRuleParams\", id)\n\tret0, _ := ret[0].(*UpdatePortForwardingRuleParams)\n\treturn ret0\n}", "func NewChangeaspecificPeeringServerPreferenceRequestWithBody(server string, id string, contentType string, body io.Reader) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/peeringserverpreferences/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"PATCH\", queryUrl.String(), body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Add(\"Content-Type\", contentType)\n\treturn req, nil\n}", "func (client *CapacityReservationsClient) updateCreateRequest(ctx context.Context, resourceGroupName string, capacityReservationGroupName string, capacityReservationName string, parameters CapacityReservationUpdate, options *CapacityReservationsBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/capacityReservationGroups/{capacityReservationGroupName}/capacityReservations/{capacityReservationName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif capacityReservationGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter capacityReservationGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{capacityReservationGroupName}\", url.PathEscape(capacityReservationGroupName))\n\tif capacityReservationName == \"\" {\n\t\treturn nil, errors.New(\"parameter capacityReservationName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{capacityReservationName}\", url.PathEscape(capacityReservationName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-07-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (_Contract *ContractSession) ProposalParams(proposalID *big.Int) (struct {\n\tPType *big.Int\n\tExecutable uint8\n\tMinVotes *big.Int\n\tMinAgreement *big.Int\n\tOpinionScales []*big.Int\n\tOptions [][32]byte\n\tProposalContract common.Address\n\tVotingStartTime *big.Int\n\tVotingMinEndTime *big.Int\n\tVotingMaxEndTime *big.Int\n}, error) {\n\treturn _Contract.Contract.ProposalParams(&_Contract.CallOpts, proposalID)\n}", "func (ac *addrConn) adjustParams(r transport.GoAwayReason) {\n\tswitch r {\n\tcase transport.GoAwayTooManyPings:\n\t\tv := 2 * ac.dopts.copts.KeepaliveParams.Time\n\t\tac.cc.mu.Lock()\n\t\tif v > ac.cc.mkp.Time {\n\t\t\tac.cc.mkp.Time = v\n\t\t}\n\t\tac.cc.mu.Unlock()\n\t}\n}", "func (client *SQLVirtualMachinesClient) updateCreateRequest(ctx context.Context, resourceGroupName string, sqlVirtualMachineName string, parameters Update, options *SQLVirtualMachinesClientBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.SqlVirtualMachine/sqlVirtualMachines/{sqlVirtualMachineName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif sqlVirtualMachineName == \"\" {\n\t\treturn nil, errors.New(\"parameter sqlVirtualMachineName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{sqlVirtualMachineName}\", url.PathEscape(sqlVirtualMachineName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2017-03-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func NewReplacechangeaspecificPbxDeviceProfilePreferenceRequestWithBody(server string, id string, contentType string, body io.Reader) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/pbxdeviceprofilepreferences/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"PUT\", queryUrl.String(), body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Add(\"Content-Type\", contentType)\n\treturn req, nil\n}", "func (input *BeegoInput) Params() map[string]string {\n\tm := make(map[string]string)\n\tfor i, v := range input.pnames {\n\t\tif i <= len(input.pvalues) {\n\t\t\tm[v] = input.pvalues[i]\n\t\t}\n\t}\n\treturn m\n}", "func NewUpdateDriverEndpointParams() UpdateDriverEndpointParams {\n\tvar ()\n\treturn UpdateDriverEndpointParams{}\n}", "func NewChangeaspecificPbxDeviceProfilePreferenceRequestWithBody(server string, id string, contentType string, body io.Reader) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/pbxdeviceprofilepreferences/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"PATCH\", queryUrl.String(), body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Add(\"Content-Type\", contentType)\n\treturn req, nil\n}", "func NewSessionDataUpdateParams() *SessionDataUpdateParams {\n\tvar ()\n\treturn &SessionDataUpdateParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *VirtualNetworkLinksClient) updateCreateRequest(ctx context.Context, resourceGroupName string, privateZoneName string, virtualNetworkLinkName string, parameters VirtualNetworkLink, options *VirtualNetworkLinksBeginUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/privateDnsZones/{privateZoneName}/virtualNetworkLinks/{virtualNetworkLinkName}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif privateZoneName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateZoneName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateZoneName}\", url.PathEscape(privateZoneName))\n\tif virtualNetworkLinkName == \"\" {\n\t\treturn nil, errors.New(\"parameter virtualNetworkLinkName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualNetworkLinkName}\", url.PathEscape(virtualNetworkLinkName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPatch, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2020-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tif options != nil && options.IfMatch != nil {\n\t\treq.Raw().Header.Set(\"If-Match\", *options.IfMatch)\n\t}\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func (node *Node) Param(vc *validation.Config, keys ...string) *Node {\n\n\tif len(keys) == 0 { panic(\"NO KEYS SUPPLIED FOR NEW PARAMETER\") }\n\n\tnode.RLock()\n\t\tp := node.Parameter\n\tnode.RUnlock()\n\tif p != nil {\n\t\treturn p\n\t}\n\n\tn := node.new(\"{\" + keys[0] + \"}\")\n\n\tvc.Keys = keys\n\n\tn.Lock()\n\t\tn.Validation = vc\n\t\tn.Validations = append(n.Validations, vc)\n\tn.Unlock()\n\n\tnode.Lock()\n\t\tnode.Parameter = n\n\tnode.Unlock()\n\n\treturn n\n}", "func NewUpdateBuildPropertiesParams() *UpdateBuildPropertiesParams {\n\tvar ()\n\treturn &UpdateBuildPropertiesParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (s *Server) update(req *jsonrpc2.Request) (interface{}, error) {\n\tin := new(updateReq)\n\tif err := json.Unmarshal([]byte(*req.Params), in); err != nil {\n\t\treturn nil, err\n\t}\n\treturn nil, s.peer.Update(noContext, in.ID, in.State)\n}", "func (o JobOutput) RuntimeUpdatableParams() RuntimeUpdatableParamsResponseOutput {\n\treturn o.ApplyT(func(v *Job) RuntimeUpdatableParamsResponseOutput { return v.RuntimeUpdatableParams }).(RuntimeUpdatableParamsResponseOutput)\n}", "func (m *MockLoadBalancerServiceIface) NewUpdateLoadBalancerParams(id string) *UpdateLoadBalancerParams {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewUpdateLoadBalancerParams\", id)\n\tret0, _ := ret[0].(*UpdateLoadBalancerParams)\n\treturn ret0\n}", "func generateUpdatingParamsSchema(\n\ttd tierDetails,\n) service.InputParametersSchema {\n\tips := service.InputParametersSchema{\n\t\tPropertySchemas: map[string]service.PropertySchema{\n\t\t\t\"resourceGroup\": schemas.GetResourceGroupSchema(),\n\t\t\t\"location\": schemas.GetLocationSchema(),\n\t\t\t\"backupRedundancy\": &service.StringPropertySchema{\n\t\t\t\tTitle: \"Backup redundancy\",\n\t\t\t\tDescription: \"Specifies the backup redundancy\",\n\t\t\t\tOneOf: td.allowedBackupRedundancy,\n\t\t\t\tDefaultValue: \"local\",\n\t\t\t},\n\t\t\t\"serverName\": &service.StringPropertySchema{\n\t\t\t\tTitle: \"Server Name\",\n\t\t\t\tDescription: \"Name of the MySQL server\",\n\t\t\t\tMinLength: ptr.ToInt(3),\n\t\t\t\tMaxLength: ptr.ToInt(63),\n\t\t\t\t// The server name can only contain lower case characters and numbers.\n\t\t\t\tAllowedPattern: `^[a-z0-9]+$`,\n\t\t\t},\n\t\t\t\"virtualNetwork\": &service.ObjectPropertySchema{\n\t\t\t\tTitle: \"Virtual Network Settings\",\n\t\t\t\tDescription: \"Virtual Network (vnet) settings\",\n\t\t\t\tPropertySchemas: map[string]service.PropertySchema{\n\t\t\t\t\t\"name\": &service.StringPropertySchema{\n\t\t\t\t\t\tTitle:\t\"Virtual Network Name\",\n\t\t\t\t\t\tDescription: \"Name of the Virtual Network (vnet)\",\n\t\t\t\t\t\tMinLength: ptr.ToInt(2),\n\t\t\t\t\t\tMaxLength: ptr.ToInt(80),\n\t\t\t\t\t},\n\t\t\t\t\t\"resourceGroup\": &service.StringPropertySchema{\n\t\t\t\t\t\tTitle:\t\"Virtual Network Resource Group\",\n\t\t\t\t\t\tDescription: \"Name of the Virtual Network's Resource Group\",\n\t\t\t\t\t\tMinLength: ptr.ToInt(1),\n\t\t\t\t\t\tMaxLength: ptr.ToInt(63),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"adminAccountSettings\": &service.ObjectPropertySchema{\n\t\t\t\tTitle: \"Admin Account Settings\",\n\t\t\t\tDescription: \"Settings of administrator account of MySQL server. Typically you do not need to specify this.\",\n\t\t\t\tPropertySchemas: map[string]service.PropertySchema{\n\t\t\t\t\t\"adminUsername\": &service.StringPropertySchema{\n\t\t\t\t\t\tTitle: \"Admin Username\",\n\t\t\t\t\t\tDescription: \"The administrator username for the server.\",\n\t\t\t\t\t\tMinLength: ptr.ToInt(1),\n\t\t\t\t\t\tMaxLength: ptr.ToInt(63),\n\t\t\t\t\t\tCustomPropertyValidator: usernameValidator,\n\t\t\t\t\t},\n\t\t\t\t\t\"adminPassword\": &service.StringPropertySchema{\n\t\t\t\t\t\tTitle: \"Admin Password\",\n\t\t\t\t\t\tDescription: \"The administrator password for the server. **Warning**: you may leak your password if you specify this property, others can see this password in your request body and `ServiceInstance` definition. DO NOT use this property unless you know what you are doing.\",\n\t\t\t\t\t\tMinLength: ptr.ToInt(8),\n\t\t\t\t\t\tMaxLength: ptr.ToInt(128),\n\t\t\t\t\t\tCustomPropertyValidator: passwordValidator,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"cores\": &service.IntPropertySchema{\n\t\t\t\tTitle: \"Cores\",\n\t\t\t\tDescription: \"Specifies vCores, which represent the logical \" +\n\t\t\t\t\t\"CPU of the underlying hardware\",\n\t\t\t\tAllowedValues: td.allowedCores,\n\t\t\t\tDefaultValue: ptr.ToInt64(td.defaultCores),\n\t\t\t},\n\t\t\t\"storage\": &service.IntPropertySchema{\n\t\t\t\tTitle: \"Storage\",\n\t\t\t\tDescription: \"Specifies the storage in GBs\",\n\t\t\t\tDefaultValue: ptr.ToInt64(10),\n\t\t\t\tMinValue: ptr.ToInt64(5),\n\t\t\t\tMaxValue: ptr.ToInt64(td.maxStorage),\n\t\t\t},\n\t\t\t\"backupRetention\": &service.IntPropertySchema{\n\t\t\t\tTitle: \"Backup retention\",\n\t\t\t\tDescription: \"Specifies the number of days for backup retention\",\n\t\t\t\tDefaultValue: ptr.ToInt64(7),\n\t\t\t\tMinValue: ptr.ToInt64(7),\n\t\t\t\tMaxValue: ptr.ToInt64(35),\n\t\t\t},\n\t\t\t\"sslEnforcement\": &service.StringPropertySchema{\n\t\t\t\tTitle: \"SSL enforcement\",\n\t\t\t\tDescription: \"Specifies whether the server requires the use of TLS\" +\n\t\t\t\t\t\" when connecting. Left unspecified, SSL will be enforced\",\n\t\t\t\tOneOf: schemas.EnabledDisabledValues(),\n\t\t\t\tDefaultValue: schemas.EnabledParamString,\n\t\t\t},\n\t\t\t\"firewallRules\": &service.ArrayPropertySchema{\n\t\t\t\tTitle: \"Firewall rules\",\n\t\t\t\tDescription: \"Firewall rules to apply to instance. \" +\n\t\t\t\t\t\"If left unspecified, defaults to only Azure IPs\",\n\t\t\t\tItemsSchema: &service.ObjectPropertySchema{\n\t\t\t\t\tTitle: \"Firewall rule\",\n\t\t\t\t\tDescription: \"Individual Firewall Rule\",\n\t\t\t\t\tRequiredProperties: []string{\n\t\t\t\t\t\t\"name\",\n\t\t\t\t\t\t\"startIPAddress\",\n\t\t\t\t\t\t\"endIPAddress\",\n\t\t\t\t\t},\n\t\t\t\t\tPropertySchemas: map[string]service.PropertySchema{\n\t\t\t\t\t\t\"name\": &service.StringPropertySchema{\n\t\t\t\t\t\t\tTitle: \"Name\",\n\t\t\t\t\t\t\tDescription: \"Name of firewall rule\",\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"startIPAddress\": &service.StringPropertySchema{\n\t\t\t\t\t\t\tTitle: \"Start IP address\",\n\t\t\t\t\t\t\tDescription: \"Start of firewall rule range\",\n\t\t\t\t\t\t\tCustomPropertyValidator: ipValidator,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"endIPAddress\": &service.StringPropertySchema{\n\t\t\t\t\t\t\tTitle: \"End IP address\",\n\t\t\t\t\t\t\tDescription: \"End of firewall rule range\",\n\t\t\t\t\t\t\tCustomPropertyValidator: ipValidator,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tCustomPropertyValidator: firewallRuleValidator,\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"virtualNetworkRules\": &service.ArrayPropertySchema{\n\t\t\t\tTitle: \"Virtual network rules\",\n\t\t\t\tDescription: \"Virtual network rules to apply to instance. \",\n\t\t\t\tItemsSchema: &service.ObjectPropertySchema{\n\t\t\t\t\tTitle: \"Virtual network rule\",\n\t\t\t\t\tDescription: \"Individual virtual network rule\",\n\t\t\t\t\tRequiredProperties: []string{\n\t\t\t\t\t\t\"name\",\n\t\t\t\t\t\t\"subnetName\",\n\t\t\t\t\t},\n\t\t\t\t\tPropertySchemas: map[string]service.PropertySchema{\n\t\t\t\t\t\t\"name\": &service.StringPropertySchema{\n\t\t\t\t\t\t\tTitle: \"Name\",\n\t\t\t\t\t\t\tDescription: \"Name of virtual network rule\",\n\t\t\t\t\t\t},\t\t\t\t\t\n\t\t\t\t\t\t\"subnetName\": &service.StringPropertySchema{\n\t\t\t\t\t\t\tTitle: \"Subnet Name\",\n\t\t\t\t\t\t\tDescription: \"Name of the subnet in the Virtual Network\",\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"tags\": &service.ObjectPropertySchema{\n\t\t\t\tTitle: \"Tags\",\n\t\t\t\tDescription: \"Tags to be applied to new resources,\" +\n\t\t\t\t\t\" specified as key/value pairs.\",\n\t\t\t\tAdditional: &service.StringPropertySchema{},\n\t\t\t},\n\t\t},\n\t}\n\treturn ips\n}" ]
[ "0.6440519", "0.6067548", "0.60496044", "0.59772027", "0.59327334", "0.5914964", "0.58818066", "0.58776516", "0.5840255", "0.58113474", "0.57877177", "0.5765398", "0.57169944", "0.5673503", "0.56530154", "0.5650576", "0.56261855", "0.56162935", "0.5581176", "0.55780923", "0.55760413", "0.5535184", "0.5500435", "0.5484852", "0.5468854", "0.546867", "0.5467401", "0.54631126", "0.54631126", "0.5440584", "0.5432019", "0.5432019", "0.5420898", "0.5412762", "0.54045963", "0.53771555", "0.5376706", "0.5368973", "0.5355261", "0.5347914", "0.5340181", "0.5340178", "0.5335822", "0.5325717", "0.5317969", "0.53169227", "0.5308084", "0.53062344", "0.52949905", "0.5292141", "0.5280031", "0.52771777", "0.5274228", "0.5273722", "0.526744", "0.5264271", "0.5261434", "0.52564335", "0.52559054", "0.5255326", "0.5253215", "0.5233517", "0.5232737", "0.52305853", "0.52271104", "0.5224745", "0.522232", "0.5214666", "0.52083707", "0.5205767", "0.5199027", "0.5197575", "0.51869446", "0.5186065", "0.51698357", "0.5160381", "0.51598275", "0.5153795", "0.51489437", "0.5142743", "0.5140501", "0.51375127", "0.5135698", "0.51304895", "0.51279646", "0.51185924", "0.5118213", "0.51172966", "0.51118916", "0.51097244", "0.51054454", "0.50930756", "0.50907135", "0.50812", "0.5075994", "0.5064665", "0.50611573", "0.5046131", "0.5041824", "0.5038196" ]
0.7709969
0
Write the document info object for this PDF file. Add pdfcpu as Producer with proper creation date and mod date.
func writeDocumentInfoDict(ctx *PDFContext) error { // => 14.3.3 Document Information Dictionary // Optional: // Title - // Author - // Subject - // Keywords - // Creator - // Producer modified by pdfcpu // CreationDate modified by pdfcpu // ModDate modified by pdfcpu // Trapped - log.Debug.Printf("*** writeDocumentInfoDict begin: offset=%d ***\n", ctx.Write.Offset) // Document info object is optional. if ctx.Info == nil { log.Debug.Printf("writeDocumentInfoObject end: No info object present, offset=%d\n", ctx.Write.Offset) // Note: We could generate an info object from scratch in this scenario. return nil } log.Debug.Printf("writeDocumentInfoObject: %s\n", *ctx.Info) obj := *ctx.Info dict, err := ctx.DereferenceDict(obj) if err != nil || dict == nil { return err } // TODO Refactor - for stats only. err = writeInfoDict(ctx, dict) if err != nil { return err } // These are the modifications for the info dict of this PDF file: dateStringLiteral := DateStringLiteral(time.Now()) dict.Update("CreationDate", dateStringLiteral) dict.Update("ModDate", dateStringLiteral) dict.Update("Producer", PDFStringLiteral(PDFCPULongVersion)) _, _, err = writeDeepObject(ctx, obj) if err != nil { return err } log.Debug.Printf("*** writeDocumentInfoDict end: offset=%d ***\n", ctx.Write.Offset) return nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (h *pdfHandler) pdfCreate() error {\n\n\t//\tCreate a new PDF doc & write title & current date\n\tpdf := h.newReport()\n\n\t//\tFilter Tool Output\n\n\t//\tAdd Target Table\n\tpdf = h.targettable(pdf)\n\n\t//\tAdd Tools Run Table\n\tpdf = h.toolstable(pdf)\n\n\t//\tAdd Banner Table\n\tpdf = h.nmapbannertable(pdf)\n\n\tif h.cveRetrieval {\n\t\tpdf = h.cvetable(pdf)\n\t}\n\n\tpdf = h.httprinttable(pdf)\n\tpdf = h.httpmethodstable(pdf)\n\tpdf = h.robotstxttable(pdf)\n\n\tif h.subdomainEnumeration {\n\t\tpdf = h.subdomainstable(pdf)\n\t}\n\tpdf = h.urlsdiscoveredtable(pdf)\t//\tmaybe change this to add output after all 3 rel & appspider\n\tpdf = h.nmapComments_MAYBE_table(pdf)\n\tpdf = h.wpscantable(pdf)\n\n\tif h.ucinputInjection {\n\t\t// pdf = h.reflectedoutputtable(pdf)\t\t//\tIncludes findings before any XSS checks take place\n\t\t// pdf = h.injectiontesttable(pdf)\t//\tIncludes xsstrike & seleniun checks\n\t\tpdf = h.reflectedoutputtable(pdf)\n\t\tpdf = h.xsstriketable(pdf)\n\t\tpdf = h.seleniumxsstable(pdf)\n\t}\n\n\tpdf = h.nmapvulnstable(pdf)\n\tpdf = h.niktotable(pdf)\n\t// pdf = h.whatwebtable(pdf)\n\n\tif h.sqlinjection {\n\t\t// pdf = h.sqlmaptable(pdf)\n\t}\n\n\tif pdf.Err() {\n\t\tlog.Printf(\"Failed while creating the PDF Report: %s\\n\", pdf.Error())\n\t\treturn pdf.Error()\n\t}\n\n\t//\tSave\n\terr := h.savePDF(pdf)\n\tif err != nil {\n\t\tlog.Printf(\"Cannot save PDF: %s\\n\", err)\n\t\treturn err\n\t}\n\treturn nil\n}", "func writeDocumentInfoDict(ctx *Context) error {\n\n\tlog.Write.Printf(\"*** writeDocumentInfoDict begin: offset=%d ***\\n\", ctx.Write.Offset)\n\n\t// Note: The document info object is optional but pdfcpu ensures one.\n\n\tif ctx.Info == nil {\n\t\tlog.Write.Printf(\"writeDocumentInfoObject end: No info object present, offset=%d\\n\", ctx.Write.Offset)\n\t\treturn nil\n\t}\n\n\tlog.Write.Printf(\"writeDocumentInfoObject: %s\\n\", *ctx.Info)\n\n\to := *ctx.Info\n\n\td, err := ctx.DereferenceDict(o)\n\tif err != nil || d == nil {\n\t\treturn err\n\t}\n\n\t_, _, err = writeDeepObject(ctx, o)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.Write.Printf(\"*** writeDocumentInfoDict end: offset=%d ***\\n\", ctx.Write.Offset)\n\n\treturn nil\n}", "func main() {\n // Writing to file\n pdf.Cell(0,20,\"xtet \\n\")\n pdf.Cell(0,20,\"xtet \\n\")\n fmt.Println(\"Calling writesummary\")\n pdf.SetFont(\"Arial\",\"B\",15)\n pdf.Write(35,\"shit coding\")\n\n WriteSummary(\"netflow-2019.05.03\", []string{\"source_ip\",\"destination_ip\",\"source_port\",\"destination_port\"})\n err := pdf.OutputFileAndClose(\"test.pdf\")\n if err != nil {\n fmt.Println(\"Could not write to file\", err)\n }\n}", "func (di pdfDocInfo) print() {\n\tfmt.Printf(\"Filename: %s\\n\", di.Filename)\n\tfmt.Printf(\" Pages: %d\\n\", di.NumPages)\n\tfmt.Printf(\" Title: %s\\n\", di.Title)\n\tfmt.Printf(\" Author: %s\\n\", di.Author)\n\tfmt.Printf(\" Subject: %s\\n\", di.Subject)\n\tfmt.Printf(\" Keywords: %s\\n\", di.Keywords)\n\tfmt.Printf(\" Creator: %s\\n\", di.Creator)\n\tfmt.Printf(\" Producer: %s\\n\", di.Producer)\n\tfmt.Printf(\" CreationDate: %s\\n\", di.CreationDate)\n\tfmt.Printf(\" ModDate: %s\\n\", di.ModDate)\n\tfmt.Printf(\" Trapped: %s\\n\", di.Trapped)\n\n\tif di.CustomInfo != nil {\n\t\tfor k, v := range di.CustomInfo {\n\t\t\tfmt.Printf(\" %s: %s\\n\", k, v)\n\t\t}\n\t}\n}", "func createMinimalFile() {\n\tlog.Printf(\"createMinimalFile\")\n\n\tminimal, err := pdf.Create(\"h7-minimal.pdf\")\n\tif err != nil {\n\t\tlog.Fatalln(errgo.Details(err))\n\t}\n\tdefer minimal.Close()\n\n\tminimal.Root = pdf.ObjectReference{ObjectNumber: 1}\n\n\t// catalog\n\tminimal.Add(pdf.IndirectObject{\n\t\tObjectReference: pdf.ObjectReference{ObjectNumber: 1},\n\t\tObject: pdf.Dictionary{\n\t\t\tpdf.Name(\"Type\"): pdf.Name(\"Catalog\"),\n\t\t\tpdf.Name(\"Outlines\"): pdf.ObjectReference{\n\t\t\t\tObjectNumber: 2,\n\t\t\t},\n\t\t\tpdf.Name(\"Pages\"): pdf.ObjectReference{\n\t\t\t\tObjectNumber: 3,\n\t\t\t},\n\t\t},\n\t})\n\n\t// outlines\n\tminimal.Add(pdf.IndirectObject{\n\t\tObjectReference: pdf.ObjectReference{ObjectNumber: 2},\n\t\tObject: pdf.Dictionary{\n\t\t\tpdf.Name(\"Type\"): pdf.Name(\"Outlines\"),\n\t\t\tpdf.Name(\"Count\"): pdf.Integer(0),\n\t\t},\n\t})\n\n\t// pages\n\tminimal.Add(pdf.IndirectObject{\n\t\tObjectReference: pdf.ObjectReference{ObjectNumber: 3},\n\t\tObject: pdf.Dictionary{\n\t\t\tpdf.Name(\"Type\"): pdf.Name(\"Pages\"),\n\t\t\tpdf.Name(\"Kids\"): pdf.Array{\n\t\t\t\tpdf.ObjectReference{\n\t\t\t\t\tObjectNumber: 4,\n\t\t\t\t},\n\t\t\t},\n\t\t\tpdf.Name(\"Count\"): pdf.Integer(1),\n\t\t},\n\t})\n\n\t// page\n\tminimal.Add(pdf.IndirectObject{\n\t\tObjectReference: pdf.ObjectReference{ObjectNumber: 4},\n\t\tObject: pdf.Dictionary{\n\t\t\tpdf.Name(\"Type\"): pdf.Name(\"Page\"),\n\t\t\tpdf.Name(\"Parent\"): pdf.ObjectReference{\n\t\t\t\tObjectNumber: 3,\n\t\t\t},\n\t\t\tpdf.Name(\"MediaBox\"): pdf.Array{\n\t\t\t\tpdf.Integer(0),\n\t\t\t\tpdf.Integer(0),\n\t\t\t\tpdf.Integer(612),\n\t\t\t\tpdf.Integer(792),\n\t\t\t},\n\t\t\tpdf.Name(\"Contents\"): pdf.ObjectReference{\n\t\t\t\tObjectNumber: 5,\n\t\t\t},\n\t\t\tpdf.Name(\"Resources\"): pdf.Dictionary{\n\t\t\t\tpdf.Name(\"ProcSet\"): pdf.ObjectReference{\n\t\t\t\t\tObjectNumber: 6,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t})\n\n\t// content stream\n\tminimal.Add(pdf.IndirectObject{\n\t\tObjectReference: pdf.ObjectReference{ObjectNumber: 5},\n\t\tObject: pdf.Stream{\n\t\t\tDictionary: pdf.Dictionary{\n\t\t\t\tpdf.Name(\"Length\"): pdf.Integer(0),\n\t\t\t},\n\t\t},\n\t})\n\n\t// procset\n\tminimal.Add(pdf.IndirectObject{\n\t\tObjectReference: pdf.ObjectReference{ObjectNumber: 6},\n\t\tObject: pdf.Array{\n\t\t\tpdf.Name(\"PDF\"),\n\t\t},\n\t})\n\n\tminimal.Root = pdf.ObjectReference{ObjectNumber: 1}\n\n\terr = minimal.Save()\n\tif err != nil {\n\t\tlog.Fatalln(errgo.Details(err))\n\t}\n}", "func processPDF(pub *apilcp.LcpPublication, inputPath string, encrypter crypto.Encrypter, lcpProfile license.EncryptionProfile) error {\n\n\tpub.ContentType = \"application/pdf+lcp\"\n\n\t// generate a temp Readium Package (rwpp) which embeds the PDF file; its title is the PDF file name\n\ttmpPackagePath := pub.Output + \".tmp\"\n\terr := pack.BuildRWPPFromPDF(filepath.Base(inputPath), inputPath, tmpPackagePath)\n\tif err != nil {\n\t\tpub.ErrorMessage = \"Error building Web Publication package from PDF\"\n\t\treturn err\n\t}\n\tdefer os.Remove(tmpPackagePath)\n\n\t// build an encrypted package\n\terr = buildEncryptedRWPP(pub, tmpPackagePath, encrypter, lcpProfile)\n\treturn err\n}", "func main(){\n PDFNetInitialize()\n \n // Relative path to the folder containing the test files.\n inputPath := \"../../TestFiles/\"\n \n doc := NewPDFDoc(inputPath + \"tiger.pdf\")\n doc.InitSecurityHandler()\n \n // Set our PrinterMode options\n printerMode := NewPrinterMode()\n printerMode.SetCollation(true)\n printerMode.SetCopyCount(1)\n printerMode.SetDPI(100); // regardless of ordering, an explicit DPI setting overrides the OutputQuality setting\n printerMode.SetDuplexing(PrinterModeE_Duplex_Auto)\n \n // If the XPS print path is being used, then the printer spooler file will\n // ignore the grayscale option and be in full color\n printerMode.SetOutputColor(PrinterModeE_OutputColor_Grayscale)\n printerMode.SetOutputQuality(PrinterModeE_OutputQuality_Medium)\n // printerMode.SetNUp(2,1)\n // printerMode.SetScaleType(PrinterModeE_ScaleType_FitToOutPage)\n \n // Print the PDF document to the default printer, using \"tiger.pdf\" as the document\n // name, send the file to the printer not to an output file, print all pages, set the printerMode\n // and a cancel flag to true\n pageSet := NewPageSet(1, doc.GetPageCount())\n boolValue := true\n PrintStartPrintJob(doc, \"\", doc.GetFileName(), \"\", pageSet, printerMode, &boolValue)\n}", "func Create_pdf(informations map[string]string, acc loader.Account_Informations) ([]string, error) {\n\tvar err error\n\tvar file_path string\n\tfile_path = Create_folder(acc.Fax_email_connection_host.String, acc.Fax_email_connection_username.String)\n\n\tpdf := gofpdf.New(\"P\", \"pt\", \"A4\", \"\")\n\tpdf.SetAutoPageBreak(true, 40)\n\tpdf.SetMargins(30, 0, 30)\n\ttestText := \"tly with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.\"\n\tpdf.SetFooterFunc(func() {\n\t\tpdf.SetY(-25)\n\t\tpdf.SetFont(\"times\", \"I\", 8)\n\t\tpdf.CellFormat(0, 10, testText,\n\t\t\t\"\", 1, \"C\", false, 0, \"\")\n\t})\n\tpdf.AddPage()\n\n\tpdf.SetTopMargin(30)\n\tpdf.SetFont(\"times\", \"\", 10)\n\tpdf.Image((\"./test_logos/logo_test.png\"), 30, 30, 180, 70, false, \"\", 0, \"\")\n\tpdf.Image((\"./test_logos/cover_test.png\"), 450, 30, 120, 70, false, \"\", 0, \"\")\n\n\t//display umlaute in right form\n\ttr := pdf.UnicodeTranslatorFromDescriptor(\"\")\n\tpdf.Ln(20)\n\tpdf.SetX(100)\n\tpdf.SetY(150)\n\ttext := \"FROM: \" + informations[\"from\"]\n\tpdf.Cell(10, 10, tr(text))\n\n\tpdf.SetX(100)\n\tpdf.SetY(200)\n\ttext = \"TO: \" + informations[\"to\"]\n\tpdf.Cell(10, 10, tr(text))\n\n\tpdf.SetX(20)\n\tpdf.SetY(250)\n\ttext = \"SUBJECT: \" + informations[\"subject\"]\n\tpdf.Cell(10, 10, tr(text))\n\tpdf.SetX(30)\n\tpdf.SetY(300)\n\tpdf.SetFont(\"times\", \"\", 12)\n\tpdf.MultiCell(0, 20, tr(informations[\"message\"]), \"0\", \"\", false)\n\n\tpage_count := pdf.PageCount()\n\tfor i := 0; i <= page_count; i++ {\n\t\tfmt.Println(\"pagecount: \", pdf.PageCount())\n\t\tpdf.SetPage(i)\n\t\t//other way doesn't work\n\t\tif pdf.PageCount() == 1 {\n\t\t\tpdf.Line(30, 290, 565.28, 290)\n\t\t\tpdf.Line(30, 290, 30, 800)\n\t\t\tpdf.Line(565.28, 290, 565.28, 800)\n\t\t\tpdf.Line(30, 800, 565.28, 800)\n\t\t} else {\n\t\t\tif i == 1 {\n\t\t\t\tpdf.Line(30, 290, 565.28, 290)\n\t\t\t\tpdf.Line(30, 290, 30, 800)\n\t\t\t\tpdf.Line(565.28, 290, 565.28, 800)\n\t\t\t\tpdf.Line(30, 800, 565.28, 800)\n\n\t\t\t} else {\n\t\t\t\tpdf.Line(30, 30, 565.28, 30)\n\t\t\t\tpdf.Line(30, 30, 30, 800)\n\t\t\t\tpdf.Line(565.28, 30, 565.28, 800)\n\t\t\t\tpdf.Line(30, 800, 565.28, 800)\n\n\t\t\t}\n\t\t}\n\n\t}\n\n\t//create uuid for unique pdf name (temp file - later this file will be removed because of a merge with other files)\n\tuuid, _ := uuid.NewV4()\n\ttmp_filename := uuid.String() + \".pdf\"\n\tresult := []string{}\n\tresult = append(result, file_path, tmp_filename)\n\tfile_path += \"/\" + tmp_filename\n\terr = pdf.OutputFileAndClose(file_path)\n\tif err != nil {\n\t\treturn nil, errors.Errorf(\"[create_pdf] failed to store created message pdf: \\n%v\", err)\n\t}\n\treturn result, nil\n}", "func PDFProducer() runtime.Producer {\n\treturn runtime.ProducerFunc(func(writer io.Writer, data interface{}) error {\n\t\trw, ok := data.(io.ReadCloser)\n\t\tif !ok {\n\t\t\treturn errors.Errorf(\"could not convert %+v to io.ReadCloser\", data)\n\t\t}\n\t\t_, err := io.Copy(writer, rw)\n\t\treturn err\n\t})\n}", "func Ticketpdf(ID string) {\n\tpdf := gofpdf.New(\"P\", \"mm\", \"A6\", \"\")\n\tpdf.AddPage()\n\tpdf.SetFont(\"Arial\", \"B\", 16)\n\tpdf.Cell(40, 10, \"COMPROBANTE DE PAGO\")\n\tpdf.Ln(10)\n\tpdf.SetFont(\"Arial\", \"B\", 10)\n\tpdf.Cell(40, 10, \"Operacion: \"+ID)\n\tpdf.Ln(5)\n\tpdf.Cell(40, 10, \"Fecha: \"+time.Now().String())\n\terr := pdf.OutputFileAndClose(\"PDF/\" + ID + \".pdf\")\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n}", "func (p *Pdf) Generate(props Properties, downConvert bool) {\n\tif p.ScrType == PDF && downConvert {\n\t\tp.useConvertedVersion = true\n\t\tp.tmpPath = p.downConvert()\n\t}\n\tp.initPdf()\n\tp.processPdf(props)\n\tp.safeAndCleanup()\n}", "func PrintToPDF(v Datum, cookies map[string]string, path string) error {\n\n\tname := utils.FileName(v.Title, \"pdf\")\n\n\tfilename := filepath.Join(path, name)\n\tfmt.Printf(\"正在生成文件:【\\033[37;1m%s\\033[0m】 \", name)\n\n\t_, exist, err := utils.FileSize(filename)\n\n\tif err != nil {\n\t\tfmt.Printf(\"\\033[31;1m%s, err=%v\\033[0m\\n\", \"失败1\", err)\n\t\treturn err\n\t}\n\n\tif exist {\n\t\tfmt.Printf(\"\\033[33;1m%s\\033[0m\\n\", \"已存在\")\n\t\treturn nil\n\t}\n\n\terr = utils.ColumnPrintToPDF(v.ID, filename, cookies)\n\n\tif err != nil {\n\t\tfmt.Printf(\"\\033[31;1m%s, err=%v\\033[0m\\n\", \"失败2\", err)\n\t\treturn err\n\t}\n\n\tfmt.Printf(\"\\033[32;1m%s\\033[0m\\n\", \"完成\")\n\n\treturn nil\n}", "func Pdf(cajaID string) {\n\t//var Caja CajaModel.CajaMgo\n\tcaja := CajaModel.GetAll()\n\t//fmt.Println(caja[0].Cargo)\n\tfmt.Println(\"Genera PDF\")\n\tpdf := gofpdf.New(\"P\", \"mm\", \"A4\", \"\")\n\tpdf.AddPage()\n\tpdf.SetFont(\"Arial\", \"B\", 16)\n\tpdf.Cell(40, 10, \"CORTE DE CAJA\")\n\tpdf.Ln(10)\n\tpdf.Cell(40, 10, \"CAJA: \"+cajaID)\n\tt1 := time.Now()\n\tpdf.Ln(10)\n\tpdf.Cell(40, 10, \"Fecha: \"+t1.String())\n\tpdf.Ln(20)\n\tpdf.Cell(40, 10, \"R E S U M E N\")\n\tpdf.Ln(10)\n\tvar lineas int\n\tvar sumacargo float64\n\tvar sumaabono float64\n\tfor i, row := range caja {\n\t\tpdf.Ln(7)\n\t\tpdf.Cell(12, 6, strconv.Itoa(i))\n\t\t//pdf.CellFormat(12, 6, strconv.Itoa(i), \"1\", 0, \"\", false, 0, \"\")\n\t\t//pdf.Cell(45, 10, row.ID.Hex())\n\t\tcargo := strconv.FormatFloat(row.Cargo, 'f', 2, 64)\n\t\tpdf.Cell(30, 6, cargo)\n\t\tabono := strconv.FormatFloat(row.Abono, 'f', 2, 64)\n\t\tpdf.Cell(30, 6, abono)\n\t\t//pdf.Cell(80, 10, row.Operacion.Hex())\n\t\tpdf.Cell(60, 6, (row.FechaHora.String()))\n\t\tlineas = lineas + 1\n\t\tsumacargo = sumacargo + row.Cargo\n\t\tsumaabono = sumaabono + row.Abono\n\t}\n\t//\n\tpdf.Ln(10)\n\tpdf.Cell(40, 10, \"T O T A L E S\")\n\tpdf.Ln(15)\n\tpdf.Cell(12, 6, strconv.Itoa(lineas))\n\tsumacargox := strconv.FormatFloat(sumacargo, 'f', 2, 64)\n\tpdf.Cell(30, 6, sumacargox)\n\tsumaabonox := strconv.FormatFloat(sumaabono, 'f', 2, 64)\n\tpdf.Cell(30, 6, sumaabonox)\n\tpdf.Cell(60, 6, \"\")\n\t//\n\tpdf.Ln(10)\n\tpdf.Cell(60, 10, \"SALDO EN CAJAS\")\n\tsaldo := strconv.FormatFloat(sumacargo-sumaabono, 'f', 2, 64)\n\tpdf.Cell(60, 10, saldo)\n\t//Pie\n\t//\n\terr := pdf.OutputFileAndClose(\"PDF/\" + cajaID + \".pdf\")\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n}", "func (s *SimPDF) Details(title, auth, subject, keywords string) {\n\ts.Title = title\n\ts.Author = auth\n\ts.Subject = subject\n\ts.Keywords = keywords\n\ts.CreationDate = time.Now().Local()\n\ts.PDF.SetCreationDate(s.CreationDate)\n\tif !IsDefault(s.Title) {\n\t\ts.PDF.SetTitle(s.Title, true)\n\t}\n\tif !IsDefault(s.Author) {\n\t\ts.PDF.SetAuthor(s.Author, true)\n\t\ts.PDF.SetCreator(s.Author, true)\n\t}\n\tif !IsDefault(s.Subject) {\n\t\ts.PDF.SetSubject(s.Subject, true)\n\t}\n\tif !IsDefault(s.Keywords) {\n\t\ts.PDF.SetKeywords(s.Keywords, true)\n\t}\n}", "func (h *pdfHandler) newReport() *gofpdf.Fpdf {\n\t//\tNew() creates\n\n\t//\t\"mm\" unit for expressing lengths & sizes\n\t//\t\"Letter\" -> Paper format\n\t//\t\"L\" or \"P\" -> Orientation\n\t//\tpath to a font directory\n\tpdf := gofpdf.New(\"P\", \"mm\", \"Letter\", \"\")\n\n\t//\n\tpdf.AddPage()\n\n\t//\tset font\n\t//\t\t\"B\" -> bold\n\t//\t\tint -> size\n\tpdf.SetFont(fontname, \"B\", 28)\n\n\t//\tWrite a text cell of length 40 & height 10.\n\t//\t\t-\tno starting coords\n\t//\t\t\tCell() moves the current pos to the end of the cell\n\t//\t\t\t\t\tnext Cell() will continue after\n\tpdf.Cell(40, 10, \"Nier - Report\")\n\n\t//\tLn()\t->\tMoves the current pos to a new line\n\t//\t\t\t\t(optional height param)\n\tpdf.Ln(12)\n\n\tpdf.SetFont(fontname, \"\", 20)\n\tvar date string = time.Now().Format(\"2006-01-02 15:04:05 Monday\")\n\tpdf.Cell(40, 10, date)\n\tpdf.Ln(12)\n\t//\tNote on Cell() & Ln()\n\t//\n\t//\tCell() -> No Coordinates\n\t//\t\tdocument keeps them internally\n\t//\t\tadvances to the right by the length of the cell being written\n\t//\tLn() -> moves current position back to the left border & down\n\t//\t\t\tby the provided value\n\n\t//\tAdd Logo\n\tpdf = h.image(pdf)\n\n\t//@HERE\n\tpdf.SetHeaderFunc(func() {\n\t\t//?DONE?@TODO\tCHANGE THE IMAGE way to the one used earlier\n\t\t//pdf.Image(imageFile(\"image/avatar.jpg\"), 10, 6, 30, 0, false, \"\", 0, \"\")\n\t\tpdf.ImageOptions(\n\t\t\th.installationDir+\"/image/avatar.jpg\",\n\t\t\t// 20, 20,\n\t\t\t// 140, 100,\t//\n\t\t\t10, 6,\n\t\t\t15, 0,\n\t\t\tfalse,\n\t\t\tgofpdf.ImageOptions{ImageType: \"JPG\", ReadDpi: true},\n\t\t\t0,\n\t\t\t\"\",\n\t\t)\n\t\tpdf.SetY(5)\n\t\tpdf.SetFont(\"Arial\", \"B\", 15)\n\t\tpdf.Cell(80, 0, \"\")\n\t\tpdf.CellFormat(45, 10, \"Nier - Report\", \"B\", 0, \"C\", false, 0, \"\")\n\t\tpdf.Ln(20)\n\t})\n\tpdf.SetFooterFunc(func() {\n\t\tpdf.SetY(-15)\n\t\tpdf.SetFont(\"Arial\", \"I\", 8)\n\t\tpdf.CellFormat(0, 10, fmt.Sprintf(\"Page %d/{nb}\", pdf.PageNo()), \"\", 0, \"C\", false, 0, \"\")\n\t})\n\tpdf.AliasNbPages(\"\") //\tDefines an alias for the total number of pages\n\tpdf.AddPage()\n\t//\tHERE Is the Content\n\tpdf.SetFont(fontname, \"\", 12)\n\t// for j := 1; j <= 40; j++ {\n\t// \tpdf.CellFormat(0, 10, fmt.Sprintf(\"Printing line number %d\", j), \"\", 1, \"\", false, 0, \"\")\n\t// }\n\n\treturn pdf\n}", "func GeneratePdf(filename string) error {\n\n c := flag.String(\"c\", \"config.json\", \"Specify the configuration file.\")\n\tflag.Parse()\n\tfile, err := os.Open(*c)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer file.Close()\n\tdecoder := json.NewDecoder(file)\n\tConfig := Configuration{}\n\terr = decoder.Decode(&Config)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n // For testing Config Structure fmt.Printf(\"%+v\\n\", &Config)\n\n pdf := gofpdf.New(\"P\", \"mm\", \"A4\", \"\")\n pdf.AddPage()\n pdf.SetFont(\"Arial\", \"B\", 16)\n\n // ImageOptions(src, x, y, width, height, flow, options, link, linkStr)\n pdf.ImageOptions(\n \"sigsci-logo__primary_sm.png\",\n 0, 0,\n 0, 0,\n false,\n gofpdf.ImageOptions{ImageType: \"PNG\", ReadDpi: true},\n 0,\n \"\",\n )\n\n // CellFormat(width, height, text, border, position after, align, fill, link, linkStr)\n title := \"SigSci Agent Report for Corp: \"; title += Config.Corp\n pdf.CellFormat(190, 7, \" \", \"0\", 1, \"CM\", false, 0, \"\")\n pdf.CellFormat(190, 7, title, \"0\", 1, \"CM\", false, 0, \"\")\n pdf.CellFormat(190, 7, \" \", \"0\", 1, \"CM\", false, 0, \"\")\n pdf.SetFont(\"Arial\", \"\", 10)\n pdf.CellFormat(40, 7, \"Site\", \"BR\", 0, \"LM\", false, 0, \"\")\n pdf.CellFormat(95, 7, \"Agent\", \"BR\", 0, \"LM\", false, 0, \"\")\n pdf.CellFormat(20, 7, \"Version\", \"BR\", 0, \"LM\", false, 0, \"\")\n pdf.CellFormat(20, 7, \"Status\", \"BR\", 1, \"LM\", false, 0, \"\")\n pdf.SetFont(\"Arial\", \"\", 8)\n\n sc := sigsci.NewTokenClient(Config.Email, Config.APItoken)\n mySites, err := sc.ListSites(Config.Corp)\n if err != nil {\n panic(err)\n }\n var prevSiteName = ` `\n var agentLink = `https://dashboard.signalsciences.net/corps/`\n for _, elem := range mySites {\n agents, err1 := sc.ListAgents(Config.Corp, elem.Name)\n if err1 != nil {\n panic(err1)\n }\n for _, elem1 := range agents {\n if elem.Name != prevSiteName {\n pdf.CellFormat(40, 7, elem.Name, \"0\", 0, \"LM\", false, 0, \"\")\n prevSiteName = elem.Name\n \n } else {\n pdf.CellFormat(40, 7, \" \", \"0\", 0, \"LM\", false, 0, \"\")\n }\n agentLink += Config.Corp; agentLink += `/sites/`; agentLink += elem.Name;\n agentLink += `/agents/`; agentLink += elem1.AgentName\n \n pdf.CellFormat(95, 7, elem1.AgentName, \"0\", 0, \"LM\", false, 0, agentLink)\n pdf.CellFormat(20, 7, elem1.AgentVersion, \"0\", 0, \"LM\", false, 0, \"\")\n pdf.CellFormat(20, 7, elem1.AgentStatus, \"0\", 1, \"LM\", false, 0, \"\")\n\n agentLink = `https://dashboard.signalsciences.net/corps/`\n }\n } \n \n return pdf.OutputFileAndClose(filename)\n}", "func (f *Format) Render() error {\n\tmodules := sortModules(f.Config.GetSource())\n\tdocument, err := buildDocument(f.Config.ToolVersion, modules[0])\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tpackages, otherLicenses, err := f.buildPackages(modules)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfile, err2 := os.Create(f.Config.Filename)\n\tif err2 != nil {\n\t\treturn err2\n\t}\n\t// todo organize file generation code below\n\t//Print DOCUMENT\n\tfile.WriteString(fmt.Sprintf(\"SPDXVersion: %s\\n\", document.SPDXVersion))\n\tfile.WriteString(fmt.Sprintf(\"DataLicense: %s\\n\", document.DataLicense))\n\tfile.WriteString(fmt.Sprintf(\"SPDXID: %s\\n\", document.SPDXID))\n\tfile.WriteString(fmt.Sprintf(\"DocumentName: %s\\n\", document.DocumentName))\n\tfile.WriteString(fmt.Sprintf(\"DocumentNamespace: %s\\n\", document.DocumentNamespace))\n\tfile.WriteString(fmt.Sprintf(\"Creator: %s\\n\", document.Creator))\n\tfile.WriteString(fmt.Sprintf(\"Created: %v\\n\\n\", document.Created))\n\t//Print Package\n\tfor _, pkg := range packages {\n\t\tfile.WriteString(fmt.Sprintf(\"##### Package representing the %s\\n\\n\", pkg.PackageName))\n\t\tgeneratePackage(file, pkg)\n\t\tif pkg.RootPackage {\n\t\t\tfile.WriteString(fmt.Sprintf(\"Relationship: %s DESCRIBES %s \\n\\n\", document.SPDXID, pkg.SPDXID))\n\t\t}\n\t\t//Print DEPS ON\n\t\tif len(pkg.DependsOn) > 0 {\n\t\t\tfor _, subPkg := range pkg.DependsOn {\n\t\t\t\tfile.WriteString(fmt.Sprintf(\"Relationship: %s DEPENDS_ON %s \\n\", pkg.SPDXID, subPkg.SPDXID))\n\t\t\t}\n\t\t\tfile.WriteString(\"\\n\")\n\t\t}\n\n\t}\n\n\t//Print Other Licenses\n\tif len(otherLicenses) > 0 {\n\t\tfile.WriteString(\"##### Non-standard license\\n\\n\")\n\t\tfor lic := range otherLicenses {\n\t\t\tfile.WriteString(fmt.Sprintf(\"LicenseID: LicenseRef-%s\\n\", lic))\n\t\t\tfile.WriteString(fmt.Sprintf(\"ExtractedText: %s\\n\", otherLicenses[lic].ExtractedText))\n\t\t\tfile.WriteString(fmt.Sprintf(\"LicenseName: %s\\n\", otherLicenses[lic].Name))\n\t\t\tfile.WriteString(fmt.Sprintf(\"LicenseComment: %s\\n\\n\", otherLicenses[lic].Comments))\n\t\t}\n\t}\n\n\t// Write to file\n\tfile.Sync()\n\n\treturn nil\n}", "func (p *Pocket2RM) GeneratePDF(ad* ArticleDetails) (string, error) {\n\tfilename := FixForFileName(ad.Title)\n\tif filename == \"\" {\n\t\tfilename = FixForFileName(ad.URL)\n\t}\n\n\tfmt.Printf(\"filename:%s\\n\", filename)\n\t\n\toutputPath, err := GenerateOutputFilename(p.Config.GetString(\"pdf_file_store\"), filename)\n\tif err != nil {\n\t\treturn \"\", nil\n\t}\n\n\tgencmd := p.Config.GetString(\"pdf_gen_binary\")\n\twrapcmd := p.Config.GetString(\"pdf_gen_wrapper\")\n\n\tcmd := exec.Command(wrapcmd, gencmd, ad.URL, outputPath)\n\n\terr = cmd.Run()\n\n\tif err != nil {\n\t\tfmt.Printf(\"ERR:%s\\n\", err.Error())\n\t\treturn \"\", err\n\t}\n\t\n\treturn outputPath, err\n}", "func (p *postProcessor) WritePRInfoToFile(prTitle, prBody string) error {\n\tif prTitle == \"\" && prBody == \"\" {\n\t\tlog.Println(\"No updated PR info found, will not write PR title and description to file.\")\n\t\treturn nil\n\t}\n\t// if file exists at location, delete\n\tif err := os.Remove(p.prFilepath); err != nil {\n\t\tif errors.Is(err, fs.ErrNotExist) {\n\t\t\tlog.Println(err)\n\t\t} else {\n\t\t\treturn err\n\t\t}\n\t}\n\tf, err := os.OpenFile(p.prFilepath, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0644)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer f.Close()\n\tlog.Println(\"Writing PR title and description to file.\")\n\tif _, err := f.WriteString(fmt.Sprintf(\"%s\\n\\n%s\", prTitle, prBody)); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (bookkeepingImp) PersistDocumentInfo(log log.T, docInfo docModel.DocumentInfo, documentID, instanceID, locationFolder string) {\n\tdocmanager.PersistDocumentInfo(log, docInfo, documentID, instanceID, locationFolder)\n}", "func (a *PDFApiService) SetInfo(ctx _context.Context, pdfSetInfoParameters PdfSetInfoParameters) (PdfSetInfoResponse, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue PdfSetInfoResponse\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/api/pdf/SetInfo\"\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json-patch+json\", \"application/json\", \"text/json\", \"application/_*+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"text/plain\", \"application/json\", \"text/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &pdfSetInfoParameters\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v PdfSetInfoResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func (bi *BinaryInfo) Producer() string {\n\tfor _, cu := range bi.Images[0].compileUnits {\n\t\tif cu.isgo && cu.producer != \"\" {\n\t\t\treturn cu.producer\n\t\t}\n\t}\n\treturn \"\"\n}", "func main() {\n// \tfmt.Println(os.Args[0])\n\t// Read the file and dump into the slice of structs\n\tdm := SummaryReport.ReadFile(infile)\n// \tfor _, v := range dm {\n\t\tfmt.Println(*dm[0])\n// \t}\n\t\n// \tCompute number of subjects by treatment group\n\t\t\n// \tTurn values into strings\n\t\t\n// \tCompute number of non-mising Age values by TG\n\t\t\n// \tTurn values into strings\n\t\t\n// \tCompute mean of age by TG and SD by TG\n\t\t\n// \tTurn Mean and SD values into strings\n\t\t\n// \tCompute median values of Age by TG\n\t\t\n// \tTurn median values into strings\n\t\t\n// \tCompute min values of Age by TG\n\t\t\n// \tTurn min values into strings\n\t\t\n// \tCompute max values of Age by TG\n\t\t\n// \tTurn max values into strings\n\t\n// \tNew Report \n\t\n\th := titles()\n\terr := SummaryReport.WriteReport(outfile, h)\n\n\tfmt.Println(err)\n// \t\n// \t\n// \t\n// \tpdf.AddPage()\n// // \tbasicTable()\n// \n// \terr := pdf.OutputFileAndClose(*outputFile)\n// \tfmt.Println(err)\n}", "func init() {\n pdf = gofpdf.New(\"P\", \"mm\", \"A4\", \"\")\n\n // Tilte Page\n pdf.AddPage()\n pdf.SetFont(\"Arial\", \"B\", 60)\n pdf.WriteAligned(0, 35, \"Report Sample\\n\", \"c\")\n pdf.Write(35, \"\\n\")\n\n y := pdf.GetY() // Get the current Y position\n pdf.Image(\"./gopher.png\", 55, y, 0, 35, false, \"\", 0, \"\")\n pdf.SetFont(\"Times\", \"\", 20)\n pdf.Write(35, \"\\nName:Nishan MAharjan\\n\")\n pdf.Write(1, \"\\nID:Don\\n\")\n\n // Second Page\n pdf.AddPage()\n\n // Elasticsearch part starts here\n es = Elasticsearch.ES{ // This could be different\n User: \"admin\",\n Password: \"admin\",\n }\n err := es.Build_es_type()\n if err != nil {\n fmt.Println(\"Threat Intel ERROR: Could Build elasticsearch type: \", err)\n return\n }\n\n}", "func (f *StorageFilePdf) TypeInfo() tdp.Type {\n\ttyp := tdp.Type{\n\t\tName: \"storage.filePdf\",\n\t\tID: StorageFilePdfTypeID,\n\t}\n\tif f == nil {\n\t\ttyp.Null = true\n\t\treturn typ\n\t}\n\ttyp.Fields = []tdp.Field{}\n\treturn typ\n}", "func genPdf(dataType string) {\n\tvar wg sync.WaitGroup\n\thome, err := homedir.Dir() // Fetch the current user home dir.\n\tutils.PanicErr(err) // Panic in case user dir not available\n\tpdfPath := filepath.Join(home, utils.PDFPATH)\n\trecords := db.ViewTxn(dataType)\n\ttotalRecords := len(records)\n\tlimit := 30\n\tslots := (totalRecords / limit) + 1\n\tslot := 1\n\n\tswitch dataType {\n\tcase utils.STUDENT_TYPE:\n\t\tpdfPath = filepath.Join(pdfPath, utils.STUDENT_TYPE)\n\t\terr = os.MkdirAll(pdfPath, 0755)\n\t\tutils.FatalErr(err)\n\t\tfor slot <= slots {\n\t\t\tskip := (slot - 1) * limit\n\t\t\tremainingRecords := totalRecords - skip\n\t\t\tpendingLimit := math.Min(float64(remainingRecords), float64(limit))\n\t\t\tupperBoundary := int(pendingLimit) + skip\n\t\t\tbatchRecords := records[skip:upperBoundary]\n\t\t\tslot++\n\t\t\tfor _, record := range batchRecords {\n\t\t\t\tstudentDetails := *record\n\t\t\t\tvar rec models.Student\n\t\t\t\terr := json.Unmarshal([]byte(studentDetails.Value), &rec)\n\t\t\t\tif err != nil {\n\t\t\t\t\tutils.LogErr(err)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\twg.Add(1)\n\t\t\t\tgo gen.GenerateStudentPdf(&wg, rec, pdfPath)\n\t\t\t}\n\t\t}\n\tcase utils.CUSTOMER_TYPE:\n\t\tpdfPath = filepath.Join(pdfPath, utils.CUSTOMER_TYPE)\n\t\terr = os.MkdirAll(pdfPath, 0755)\n\t\tutils.FatalErr(err)\n\t\tfor slot <= slots {\n\t\t\tskip := (slot - 1) * limit\n\t\t\tremainingRecords := totalRecords - skip\n\t\t\tpendingLimit := math.Min(float64(remainingRecords), float64(limit))\n\t\t\tupperBoundary := int(pendingLimit) + skip\n\t\t\tbatchRecords := records[skip:upperBoundary]\n\t\t\tslot++\n\t\t\tfor _, record := range batchRecords {\n\t\t\t\tcustomerDetails := *record\n\t\t\t\tvar rec models.Customer\n\t\t\t\terr := json.Unmarshal([]byte(customerDetails.Value), &rec)\n\t\t\t\tif err != nil {\n\t\t\t\t\tutils.LogErr(err)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\twg.Add(1)\n\t\t\t\tgo gen.GenerateInvoicePdf(&wg, rec, pdfPath)\n\t\t\t}\n\t\t}\n\tcase utils.EMPLOYEE_TYPE:\n\t\tpdfPath = filepath.Join(pdfPath, utils.EMPLOYEE_TYPE)\n\t\terr = os.MkdirAll(pdfPath, 0755)\n\t\tutils.FatalErr(err)\n\t\tfor slot <= slots {\n\t\t\tskip := (slot - 1) * limit\n\t\t\tremainingRecords := totalRecords - skip\n\t\t\tpendingLimit := math.Min(float64(remainingRecords), float64(limit))\n\t\t\tupperBoundary := int(pendingLimit) + skip\n\t\t\tbatchRecords := records[skip:upperBoundary]\n\t\t\tslot++\n\t\t\tfor _, record := range batchRecords {\n\t\t\t\temployeeDetails := *record\n\t\t\t\tvar rec models.Employee\n\t\t\t\terr := json.Unmarshal([]byte(employeeDetails.Value), &rec)\n\t\t\t\tif err != nil {\n\t\t\t\t\tutils.LogErr(err)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\twg.Add(1)\n\t\t\t\tgo gen.GeneratePayslipPdf(&wg, rec, pdfPath)\n\t\t\t}\n\t\t}\n\tdefault:\n\t\tfmt.Println(utils.INVALID_FEATURE)\n\t}\n\twg.Wait()\n}", "func (m *MetricsProvider) DocumentCreateUpdateTime(value time.Duration) {\n}", "func (w *Writer) WriteInfoRecord(payload map[string]string) (recordID string, err error) {\n\t// Initialize the record\n\tinfoRecord := NewRecord(\"\", false)\n\n\t// Set the headers\n\tinfoRecord.Header.Set(\"WARC-Date\", time.Now().UTC().Format(time.RFC3339Nano))\n\tinfoRecord.Header.Set(\"WARC-Filename\", strings.TrimSuffix(w.FileName, \".open\"))\n\tinfoRecord.Header.Set(\"WARC-Type\", \"warcinfo\")\n\tinfoRecord.Header.Set(\"Content-Type\", \"application/warc-fields\")\n\n\t// Write the payload\n\tfor k, v := range payload {\n\t\tinfoRecord.Content.Write([]byte(fmt.Sprintf(\"%s: %s\\r\\n\", k, v)))\n\t}\n\n\t// Generate WARC-Block-Digest\n\tinfoRecord.Header.Set(\"WARC-Block-Digest\", \"sha1:\"+GetSHA1(infoRecord.Content))\n\n\t// Finally, write the record and flush the data\n\trecordID, err = w.WriteRecord(infoRecord)\n\tif err != nil {\n\t\treturn recordID, err\n\t}\n\n\tw.FileWriter.Flush()\n\n\treturn recordID, err\n}", "func (w *Worker) FixPDF(j *Job) {\n\t// We work on a copy of the file, not the original!\n\tvar err = copyfile(j.SourcePath, j.DestPath)\n\tif err != nil {\n\t\tw.retry(j, \"unable to copy PDF file %q: %s\", j.SourcePath, err)\n\t\treturn\n\t}\n\n\t// Gather intel on the file\n\tvar cmd = exec.Command(\"exiftool\", \"-json\", j.DestPath)\n\tvar out bytes.Buffer\n\tcmd.Stdout = &out\n\terr = cmd.Run()\n\tif err != nil {\n\t\tw.retry(j, \"unable to get EXIF data for %q: %s\", j.DestPath, err)\n\t\treturn\n\t}\n\n\t// Fix it! This may be a bit dangerous, but the odds of the bad LCCN\n\t// actually showing up in EXIF data and *not* needing to be changed seem\n\t// pretty unlikely.\n\tvar fixed = bytes.Replace(out.Bytes(), w.badLCCN, w.goodLCCN, -1)\n\n\t// Forcibly set source file info; this just makes things a pain when the\n\t// filename has the old LCCN, and the old is a subset of the new\n\tvar sourceLine = fmt.Sprintf(`\"SourceFile\": \"%s\"`, j.DestPath)\n\tfixed = sourceFileReplacer.ReplaceAllLiteral(fixed, []byte(sourceLine))\n\n\t// Create a temp file for storing the exif JSON\n\tvar tmp *os.File\n\ttmp, err = ioutil.TempFile(\"\", \"\")\n\tif err != nil {\n\t\tw.retry(j, \"unable to create tempfile to store EXIF JSON for %q: %s\", j.DestPath, err)\n\t\treturn\n\t}\n\tdefer func() {\n\t\ttmp.Close()\n\t\tos.Remove(tmp.Name())\n\t}()\n\n\t// Write the fixed data to a file; exiftool really wants its JSON from a\n\t// file, not stdin or flags\n\tvar n int\n\tn, err = tmp.Write(fixed)\n\tif err != nil {\n\t\tw.retry(j, \"unable to create tempfile to store EXIF JSON for %q: %s\", j.DestPath, err)\n\t\treturn\n\t}\n\tif n != len(fixed) {\n\t\tw.retry(j, \"unable to create tempfile to store EXIF JSON for %q: data was only partially written\", j.DestPath, err)\n\t\treturn\n\t}\n\n\t// Import the fixed data\n\tcmd = exec.Command(\"exiftool\", \"-overwrite_original\", \"-json=\"+tmp.Name(), j.DestPath)\n\terr = cmd.Run()\n\tif err != nil {\n\t\tw.retry(j, \"unable to write EXIF data for %q: %s\", j.DestPath, err)\n\t}\n}", "func (s *Description) CreateDocumentInfo() *DocumentInfo {\n\ts.documentInfo = &DocumentInfo{}\n\treturn s.documentInfo\n}", "func GetPDFPage(pdfName string, imageName string, pageNum int) error {\n\n\tabsPath, err := os.Getwd()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tInpath := filepath.Join(absPath, \"input\", pdfName)\n\tOutpath := filepath.Join(absPath, \"output\")\n\n\tif _, err := os.Stat(Outpath); os.IsNotExist(err) {\n\t\tlog.Println(\"Output dir not found. Creating at \", Outpath)\n\t\tos.Mkdir(Outpath, os.ModePerm)\n\t}\n\n\timagick.Initialize()\n\tdefer imagick.Terminate()\n\n\tmw := imagick.NewMagickWand()\n\tdefer mw.Destroy()\n\n\tif err := mw.SetResolution(72, 72); err != nil {\n\t\treturn err\n\t}\n\n\t// Load the image file into imagick\n\tif err := mw.ReadImage(Inpath); err != nil {\n\t\treturn err\n\t}\n\n\tmw.SetIteratorIndex(pageNum - 1)\n\n\t// Set any compression (100 = max quality)\n\tif err := mw.SetCompressionQuality(100); err != nil {\n\t\treturn err\n\t}\n\n\t// Convert into JPG\n\tif err := mw.SetFormat(\"jpg\"); err != nil {\n\t\treturn err\n\t}\n\n\t// Save File\n\treturn mw.WriteImage(filepath.Join(Outpath, imageName))\n}", "func ParsePdf(fileName string) (*PdfInfo, error) {\n\tpdfInfo := PdfInfo{}\n\n\tfile, err := os.Open(fileName)\n\tif err != nil {\n\t\tlogError(err)\n\t\treturn &pdfInfo, err\n\t}\n\n\tdefer file.Close()\n\n\tversion, err := readPdfInfoVersion(file)\n\tif err != nil {\n\t\tlogError(err)\n\t\treturn &pdfInfo, err\n\t}\n\n\tpdfInfo.PdfVersion = version\n\n\tpdfInfo.PagesCount = countPages(file)\n\n\terr = readXrefOffset(file, &pdfInfo)\n\tif err != nil {\n\t\tlogError(err)\n\t\treturn &pdfInfo, err\n\t}\n\n\tgetTrailerSection(file, &pdfInfo)\n\n\t// original xref\n\terr, parsedXref, trailerSection := readXrefBlock(file, pdfInfo.OriginalXrefOffset, true)\n\tif err != nil {\n\t\tlogError(err)\n\t\treturn &pdfInfo, err\n\t}\n\tpdfInfo.XrefTable = append(pdfInfo.XrefTable, parsedXref)\n\tpdfInfo.AdditionalTrailerSection = append(pdfInfo.AdditionalTrailerSection, trailerSection)\n\n\treadAllXrefSections(file, &pdfInfo, pdfInfo.OriginalTrailerSection.Prev)\n\n\tif trailerSection != nil {\n\t\treadAllXrefSections(file, &pdfInfo, trailerSection.Prev)\n\t}\n\n\troot := findRootObject(&pdfInfo, file)\n\tif root == nil {\n\t\terr = cannotFindRootObject\n\t\tlogError(err)\n\t\treturn &pdfInfo, nil\n\t}\n\tpdfInfo.Root = *root\n\n\tinfo := searchInfoSection(&pdfInfo, file)\n\tif info == nil {\n\t\terr = cannotFindInfoObject\n\t\tlogError(err)\n\t\treturn &pdfInfo, nil\n\t}\n\tpdfInfo.Info = *info\n\n\tmeta, err := findMetadataObject(&pdfInfo, file)\n\tlogError(err)\n\tif meta != nil {\n\t\tpdfInfo.Metadata = *meta\n\t}\n\n\treturn &pdfInfo, nil\n}", "func (Format) PDF() Format {\n\treturn 1\n}", "func (s *SimPDF) NewPage(page models.Pages) {\n\ts.Page = page\n\ts.PDF.AddPageFormat(page.ToPDFOrientation(), gofpdf.SizeType{Wd: page.Width, Ht: page.Height})\n}", "func (w *Worker) startWriter() {\n\tf, err := os.Create(w.OutputFile)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer f.Close()\n\n\t// Write the header\n\t_, err = f.Write(head)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// Write all of the incoming pages, when the channel closes will exit\n\tfor text := range w.OutText {\n\t\t// Remove HTML carriage return added as a product of xml marshing\n\t\ttext := strings.Replace(string(text), \"&#xA;\", \"\", -1)\n\n\t\t// Write a newline\n\t\t_, err := f.Write([]byte(\"\\n\"))\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\n\t\t// Write the article body\n\t\t_, err = f.Write([]byte(text))\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}\n\n\t// Lastly, close up the file with the final </page> tag\n\t_, err = f.Write([]byte(`</page>`))\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tlog.Println(\"Writer done\")\n}", "func Build_pdf(appl *App) error {\n\n var err error\n\tvar cmdArgs []string\n\tvar cmdArgs_cover []string\n\tvar cmdArgs_resume []string\n var cmdArgs_CV []string\n\n if appl.Option <= 6 && appl.Option > 0 {\n contents, err := Replace_strings(TEX_COVER_TEMPL, appl.KvMap_tex)\n \tif err != nil {\n \t\tpanic(err)\n \t}\n \terr = write_file(\"cover.tex\", contents)\n }\n\n switch {\n case appl.Option == 1: // Everything w/ ref included as one file\n go appl.text_cover()\n cmdArgs = []string{\"-synctex=1\", \"-interaction=nonstopmode\", \"\\\"main_all_ref\\\".tex\"}\n case appl.Option == 2: // Everything w/ ref as seperate files\n go appl.text_cover()\n cmdArgs_cover = []string{\"-synctex=1\", \"-interaction=nonstopmode\", \"\\\"main_cover\\\".tex\"}\n cmdArgs_resume = []string{\"-synctex=1\", \"-interaction=nonstopmode\", \"\\\"main_resume\\\".tex\"}\n cmdArgs_CV = []string{\"-synctex=1\", \"-interaction=nonstopmode\", \"\\\"main_CV_ref\\\".tex\"}\n case appl.Option == 3: // Cover + CV w/ ref included as one file\n go appl.text_cover()\n cmdArgs = []string{\"-synctex=1\", \"-interaction=nonstopmode\", \"\\\"main_cover_CV_ref\\\".tex\"}\n case appl.Option == 4: // Cover + CV w/ ref as seperate files\n go appl.text_cover()\n cmdArgs_cover = []string{\"-synctex=1\", \"-interaction=nonstopmode\", \"\\\"main_cover\\\".tex\"}\n cmdArgs_CV = []string{\"-synctex=1\", \"-interaction=nonstopmode\", \"\\\"main_CV_ref\\\".tex\"}\n case appl.Option == 5: // Cover + Resume included as one file\n go appl.text_cover()\n cmdArgs = []string{\"-synctex=1\", \"-interaction=nonstopmode\", \"\\\"main_cover_resume\\\".tex\"}\n case appl.Option == 6: // Cover + Resume as seperate files\n go appl.text_cover()\n cmdArgs_cover = []string{\"-synctex=1\", \"-interaction=nonstopmode\", \"\\\"main_cover\\\".tex\"}\n cmdArgs_resume = []string{\"-synctex=1\", \"-interaction=nonstopmode\", \"\\\"main_resume\\\".tex\"}\n case appl.Option == 7: // CV w/ ref\n cmdArgs = []string{\"-synctex=1\", \"-interaction=nonstopmode\", \"\\\"main_CV_ref\\\".tex\"}\n case appl.Option == 8: // CV w/0 ref\n cmdArgs = []string{\"-synctex=1\", \"-interaction=nonstopmode\", \"\\\"main_CV\\\".tex\"}\n case appl.Option == 9: // just the resume\n cmdArgs = []string{\"-synctex=1\", \"-interaction=nonstopmode\", \"\\\"main_resume\\\".tex\"}\n default: // the follow up\n go appl.text_follow_up()\n cmdArgs = []string{\"-synctex=1\", \"-interaction=nonstopmode\", \"\\\"main_CV_ref\\\".tex\"}\n }\n\n if len(cmdArgs) > 0 {\n err = cmd.Run_cmd(TEX_CMD, cmdArgs)\n if err != nil {\n panic(err)\n }\n }\n\n if len(cmdArgs_cover) > 0 {\n err = cmd.Run_cmd(TEX_CMD, cmdArgs_cover)\n if err != nil {\n panic(err)\n }\n }\n\n if len(cmdArgs_resume) > 0 {\n err = cmd.Run_cmd(TEX_CMD, cmdArgs_resume)\n if err != nil {\n panic(err)\n }\n }\n\n if len(cmdArgs_CV) > 0 {\n err = cmd.Run_cmd(TEX_CMD, cmdArgs_CV)\n if err != nil {\n panic(err)\n }\n }\n\n err = rename_files(appl)\n if err != nil {\n panic(err)\n }\n\n\treturn nil\n}", "func Writer(w io.Writer, c *canvas.Canvas) error {\n\tpdf := New(w, c.W, c.H)\n\tc.Render(pdf)\n\treturn pdf.Close()\n}", "func (rt *Runtime) Write(c chan Data) (err error) {\n\tf, err := os.Create(rt.Filename)\n\tif err != nil {\n\t\treturn err\n\t}\n\tw := csv.NewWriter(f)\n\ts := fmt.Sprintf(\"%v\\n%v\", SupporterFields, DonationFields)\n\ta := strings.Split(s, \"\\n\")\n\t//Headers\n\tw.Write(a)\n\tw.Flush()\n\n\tfor d := range c {\n\t\tvar r []string\n\t\tx := \"\"\n\t\tfor _, k := range a {\n\t\t\tswitch k {\n\t\t\tcase \"supporter_KEY\":\n\t\t\t\tx = d.SupporterKey\n\t\t\tcase \"First_Name\":\n\t\t\t\tx = d.FirstName\n\t\t\tcase \"Last_Name\":\n\t\t\t\tx = d.LastName\n\t\t\tcase \"Email\":\n\t\t\t\tx = d.Email\n\t\t\tcase \"Street\":\n\t\t\t\tx = d.Street\n\t\t\tcase \"Street_2\":\n\t\t\t\tx = d.Street2\n\t\t\tcase \"City\":\n\t\t\t\tx = d.City\n\t\t\tcase \"State\":\n\t\t\t\tx = d.State\n\t\t\tcase \"Zip\":\n\t\t\t\tx = d.Zip\n\t\t\tcase \"Country\":\n\t\t\t\tx = d.Country\n\t\t\tcase \"donation_KEY\":\n\t\t\t\tx = d.DonationKey\n\t\t\tcase \"Transaction_Date\":\n\t\t\t\tx = d.TransactionDate.Format(\"2006-02-01\")\n\t\t\tcase \"Tracking_Code\":\n\t\t\t\tx = d.TrackingCode\n\t\t\tcase \"Donation_Tracking_Code\":\n\t\t\t\tx = d.DonationTrackingCode\n\t\t\tcase \"Designation_Code\":\n\t\t\t\tx = d.DesignationCode\n\t\t\tcase \"Result\":\n\t\t\t\tx = d.Result\n\t\t\tcase \"TransactionType\":\n\t\t\t\tx = d.TransactionType\n\t\t\tcase \"amount\":\n\t\t\t\tx = fmt.Sprintf(\"%.2f\", d.Amount)\n\t\t\t}\n\t\t\tr = append(r, x)\n\t\t}\n\t\tw.Write(r)\n\t\tw.Flush()\n\t}\n\terr = f.Close()\n\treturn err\n}", "func renderPDF(vb []Visit) gopdf.GoPdf {\n\tdoc := gopdf.GoPdf{}\n\tdoc.Start(gopdf.Config{ PageSize: *gopdf.PageSizeA4 })\n\tdoc.AddPage()\n\terr := doc.AddTTFFont(\"Roboto\", \"./assets/Roboto-Regular.ttf\")\n\tif err != nil {\n\t\tlogrus.Error(err)\n\t}\n\n\tdoc.SetTextColor(getForegroundColor())\n\n\toffsetY := 25\n\n\tfor i,v := range vb {\n\t\toffsetX := 8\n\t\tif i%2 == 1 {\n\t\t\toffsetX = 300\n\t\t}\n\t\tif i%2 == 0 && i != 0 {\n\t\t\toffsetY += 175\n\t\t}\n\t\tdoc.SetX(float64(offsetX))\n\t\tdoc.SetY(float64(offsetY))\n\t\tif err := doc.SetFont(\"Roboto\", \"\", 36); err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tif err := doc.Cell(nil, v.Visitor.LastName); err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tdoc.Br(40)\n\t\tdoc.SetX(float64(offsetX))\n\t\tif err := doc.SetFont(\"Roboto\", \"\", 24); err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tif err := doc.Cell(nil, v.Visitor.FirstName); err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tdoc.Br(40)\n\t\tdoc.SetX(float64(offsetX))\n\t\tif err := doc.SetFont(\"Roboto\", \"\", 12); err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tdoc.Line(float64(offsetX),float64(offsetY + 87), float64(offsetX + 250), float64(offsetY + 87) )\n\t\tdoc.Text(v.Visitor.Company)\n\t\tdoc.Br(24)\n\t\tdoc.SetX(float64(offsetX))\n\t\tdoc.Text(\"Supervisor: \" + v.Supervisor.DisplayName)\n\t\tdoc.Br(18)\n\t\tdoc.SetX(float64(offsetX))\n\t\tt,_ := time.Parse(\"2006-01-02\", v.Date)\n\t\tdoc.Text(\"Gültig am: \" + t.Format(\"02.01.2006\"))\n\t\tdoc.SetFont(\"Roboto\", \"\", 8)\n\t\tdoc.Br(12)\n\t\tdoc.SetX(float64(offsetX))\n\n\t\tdoc.Text(\"Dieses Badge muss jederzeit gut sichtbar getragen werden.\")\n\t}\n\n\tdoc.SetLineType(\"dashed\")\n\tdoc.Line(290, 0, 290, 1500)\n\tdoc.Line(0, 175, 1500, 175)\n\tdoc.Line(0, 350, 1500, 350)\n\tdoc.Line(0, 525, 1500, 525)\n\tdoc.Line(0, 700, 1500, 700)\n\treturn doc\n}", "func (p *Producer) Info() payload.ProducerInfo {\n\treturn p.info\n}", "func (w *Writer) Info(m string) error {}", "func (wm Watermark) isPDF() bool {\n\treturn wm.Mode == WMPDF\n}", "func main(){\n // Relative path to the folder containing the test files.\n inputPath := \"../../TestFiles/\"\n outputPath := \"../../TestFiles/Output/\"\n inputFileName := \"newsletter\"\n \n // The first step in every application using PDFNet is to initialize the \n // library and set the path to common PDF resources. The library is usually \n // initialized only once, but calling Initialize() multiple times is also fine.\n PDFNetInitialize()\n \n //--------------------------------------------------------------------------------\n // Example 1) Simple optimization of a pdf with default settings.\n \n doc := NewPDFDoc(inputPath + inputFileName + \".pdf\")\n doc.InitSecurityHandler()\n OptimizerOptimize(doc)\n \n doc.Save(outputPath + inputFileName + \"_opt1.pdf\", uint(SDFDocE_linearized))\n doc.Close()\n \n //--------------------------------------------------------------------------------\n // Example 2) Reduce image quality and use jpeg compression for\n // non monochrome images. \n doc = NewPDFDoc(inputPath + inputFileName + \".pdf\")\n doc.InitSecurityHandler()\n imageSettings := NewImageSettings()\n \n // low quality jpeg compression\n imageSettings.SetCompressionMode(ImageSettingsE_jpeg)\n imageSettings.SetQuality(1)\n \n // Set the output dpi to be standard screen resolution\n imageSettings.SetImageDPI(144,96)\n \n // this option will recompress images not compressed with\n // jpeg compression and use the result if the new image\n // is smaller.\n imageSettings.ForceRecompression(true)\n \n // this option is not commonly used since it can \n // potentially lead to larger files. It should be enabled\n // only if the output compression specified should be applied\n // to every image of a given type regardless of the output image size\n //imageSettings.ForceChanges(true)\n\n optSettings := NewOptimizerSettings()\n optSettings.SetColorImageSettings(imageSettings)\n optSettings.SetGrayscaleImageSettings(imageSettings)\n\n // use the same settings for both color and grayscale images\n OptimizerOptimize(doc, optSettings)\n \n doc.Save(outputPath + inputFileName + \"_opt2.pdf\", uint(SDFDocE_linearized))\n doc.Close()\n \n //--------------------------------------------------------------------------------\n // Example 3) Use monochrome image settings and default settings\n // for color and grayscale images. \n \n doc = NewPDFDoc(inputPath + inputFileName + \".pdf\")\n doc.InitSecurityHandler()\n\n monoImageSettings := NewMonoImageSettings()\n \n monoImageSettings.SetCompressionMode(MonoImageSettingsE_jbig2)\n monoImageSettings.ForceRecompression(true)\n\n optSettings = NewOptimizerSettings()\n optSettings.SetMonoImageSettings(monoImageSettings)\n \n OptimizerOptimize(doc, optSettings)\n doc.Save(outputPath + inputFileName + \"_opt3.pdf\", uint(SDFDocE_linearized))\n doc.Close()\n\t\n // ----------------------------------------------------------------------\n // Example 4) Use Flattener to simplify content in this document\n // using default settings\n \n doc = NewPDFDoc(inputPath + \"TigerText.pdf\")\n doc.InitSecurityHandler()\n \n fl := NewFlattener()\n // The following lines can increase the resolution of background\n // images.\n //fl.SetDPI(300)\n //fl.SetMaximumImagePixels(5000000)\n\n // This line can be used to output Flate compressed background\n // images rather than DCTDecode compressed images which is the default\n //fl.SetPreferJPG(false)\n\n // In order to adjust thresholds for when text is Flattened\n // the following function can be used.\n //fl.SetThreshold(FlattenerE_threshold_keep_most)\n\n // We use e_fast option here since it is usually preferable\n // to avoid Flattening simple pages in terms of size and \n // rendering speed. If the desire is to simplify the \n // document for processing such that it contains only text and\n // a background image e_simple should be used instead.\n fl.Process(doc, FlattenerE_fast)\n doc.Save(outputPath + \"TigerText_flatten.pdf\", uint(SDFDocE_linearized))\n doc.Close()\n\n // ----------------------------------------------------------------------\n // Example 5) Optimize a PDF for viewing using SaveViewerOptimized.\n \n doc = NewPDFDoc(inputPath + inputFileName + \".pdf\")\n doc.InitSecurityHandler()\n \n opts := NewViewerOptimizedOptions()\n\n // set the maximum dimension (width or height) that thumbnails will have.\n opts.SetThumbnailSize(1500)\n\n // set thumbnail rendering threshold. A number from 0 (include all thumbnails) to 100 (include only the first thumbnail) \n // representing the complexity at which SaveViewerOptimized would include the thumbnail. \n // By default it only produces thumbnails on the first and complex pages. \n // The following line will produce thumbnails on every page.\n // opts.SetThumbnailRenderingThreshold(0) \n\n doc.SaveViewerOptimized(outputPath + inputFileName + \"_SaveViewerOptimized.pdf\", opts)\n doc.Close()\n}", "func (upload *fileUpload) writeInfo() error {\n\tdata, err := json.Marshal(upload.info)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn ioutil.WriteFile(upload.infoPath, data, defaultFilePerm)\n}", "func (p *Page) MustPDF(toFile ...string) []byte {\n\tr, err := p.PDF(&proto.PagePrintToPDF{})\n\tp.e(err)\n\tbin, err := ioutil.ReadAll(r)\n\tp.e(err)\n\n\tp.e(saveFile(saveFileTypePDF, bin, toFile))\n\treturn bin\n}", "func (mod Chromium) PDF(ctx context.Context, logger *zap.Logger, URL, outputPath string, options Options) error {\n\tdebug := debugLogger{logger: logger.Named(\"browser\")}\n\tuserProfileDirPath := gotenberg.NewDirPath()\n\n\targs := append(chromedp.DefaultExecAllocatorOptions[:],\n\t\tchromedp.CombinedOutput(debug),\n\t\tchromedp.ExecPath(mod.binPath),\n\t\tchromedp.NoSandbox,\n\t\t// See:\n\t\t// https://github.com/gotenberg/gotenberg/issues/327\n\t\t// https://github.com/chromedp/chromedp/issues/904\n\t\tchromedp.DisableGPU,\n\t\t// See:\n\t\t// https://github.com/puppeteer/puppeteer/issues/661\n\t\t// https://github.com/puppeteer/puppeteer/issues/2410\n\t\tchromedp.Flag(\"font-render-hinting\", \"none\"),\n\t\tchromedp.UserDataDir(userProfileDirPath),\n\t)\n\n\tif mod.userAgent != \"\" && options.UserAgent == \"\" {\n\t\t// Deprecated.\n\t\targs = append(args, chromedp.UserAgent(mod.userAgent))\n\t}\n\n\tif mod.incognito {\n\t\targs = append(args, chromedp.Flag(\"incognito\", mod.incognito))\n\t}\n\n\tif mod.allowInsecureLocalhost {\n\t\t// See https://github.com/gotenberg/gotenberg/issues/488.\n\t\targs = append(args, chromedp.Flag(\"allow-insecure-localhost\", true))\n\t}\n\n\tif mod.ignoreCertificateErrors {\n\t\targs = append(args, chromedp.IgnoreCertErrors)\n\t}\n\n\tif mod.disableWebSecurity {\n\t\targs = append(args, chromedp.Flag(\"disable-web-security\", true))\n\t}\n\n\tif mod.allowFileAccessFromFiles {\n\t\t// See https://github.com/gotenberg/gotenberg/issues/356.\n\t\targs = append(args, chromedp.Flag(\"allow-file-access-from-files\", true))\n\t}\n\n\tif mod.hostResolverRules != \"\" {\n\t\t// See https://github.com/gotenberg/gotenberg/issues/488.\n\t\targs = append(args, chromedp.Flag(\"host-resolver-rules\", mod.hostResolverRules))\n\t}\n\n\tif mod.proxyServer != \"\" {\n\t\t// See https://github.com/gotenberg/gotenberg/issues/376.\n\t\targs = append(args, chromedp.ProxyServer(mod.proxyServer))\n\t}\n\n\tif options.UserAgent != \"\" {\n\t\targs = append(args, chromedp.UserAgent(options.UserAgent))\n\t}\n\n\t// See https://github.com/gotenberg/gotenberg/issues/524.\n\tdeadline, ok := ctx.Deadline()\n\tif !ok {\n\t\treturn errors.New(\"context has no deadline\")\n\t}\n\n\targs = append(args, chromedp.WSURLReadTimeout(time.Until(deadline)))\n\n\tallocatorCtx, cancel := chromedp.NewExecAllocator(ctx, args...)\n\tdefer cancel()\n\n\ttaskCtx, cancel := chromedp.NewContext(allocatorCtx,\n\t\tchromedp.WithDebugf(debug.Printf),\n\t)\n\tdefer cancel()\n\n\t// We validate the \"main\" URL against our allow / deny lists.\n\tif !mod.allowList.MatchString(URL) {\n\t\treturn fmt.Errorf(\"'%s' does not match the expression from the allowed list: %w\", URL, ErrURLNotAuthorized)\n\t}\n\n\tif mod.denyList.String() != \"\" && mod.denyList.MatchString(URL) {\n\t\treturn fmt.Errorf(\"'%s' matches the expression from the denied list: %w\", URL, ErrURLNotAuthorized)\n\t}\n\n\tvar (\n\t\tconsoleExceptions error\n\t\tconsoleExceptionsMu sync.RWMutex\n\t)\n\n\tprintToPDF := func(URL string, options Options, outputPath string) chromedp.Tasks {\n\t\t// We validate the underlying requests against our allow / deny lists.\n\t\t// If a request does not pass the validation, we make it fail.\n\t\tlistenForEventRequestPaused(taskCtx, logger, mod.allowList, mod.denyList)\n\n\t\t// See https://github.com/gotenberg/gotenberg/issues/262.\n\t\tif options.FailOnConsoleExceptions && !mod.disableJavaScript {\n\t\t\tlistenForEventExceptionThrown(taskCtx, logger, &consoleExceptions, &consoleExceptionsMu)\n\t\t}\n\n\t\treturn chromedp.Tasks{\n\t\t\tnetwork.Enable(),\n\t\t\tfetch.Enable(),\n\t\t\truntime.Enable(),\n\t\t\tchromedp.ActionFunc(func(ctx context.Context) error {\n\t\t\t\t// See https://github.com/gotenberg/gotenberg/issues/175.\n\t\t\t\tif !mod.disableJavaScript {\n\t\t\t\t\tlogger.Debug(\"JavaScript not disabled\")\n\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\tlogger.Debug(\"disable JavaScript\")\n\n\t\t\t\terr := emulation.SetScriptExecutionDisabled(true).Do(ctx)\n\t\t\t\tif err == nil {\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\treturn fmt.Errorf(\"disable JavaScript: %w\", err)\n\t\t\t}),\n\t\t\tchromedp.ActionFunc(func(ctx context.Context) error {\n\t\t\t\tif len(options.ExtraHTTPHeaders) == 0 {\n\t\t\t\t\tlogger.Debug(\"no extra HTTP headers\")\n\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\tlogger.Debug(fmt.Sprintf(\"extra HTTP headers: %+v\", options.ExtraHTTPHeaders))\n\n\t\t\t\theaders := make(network.Headers, len(options.ExtraHTTPHeaders))\n\t\t\t\tfor key, value := range options.ExtraHTTPHeaders {\n\t\t\t\t\theaders[key] = value\n\t\t\t\t}\n\n\t\t\t\terr := network.SetExtraHTTPHeaders(headers).Do(ctx)\n\t\t\t\tif err == nil {\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\treturn fmt.Errorf(\"set extra HTTP headers: %w\", err)\n\t\t\t}),\n\t\t\tchromedp.ActionFunc(func(ctx context.Context) error {\n\t\t\t\tlogger.Debug(fmt.Sprintf(\"navigate to '%s'\", URL))\n\n\t\t\t\t_, _, _, err := page.Navigate(URL).Do(ctx)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"navigate to '%s': %w\", URL, err)\n\t\t\t\t}\n\n\t\t\t\terr = runBatch(\n\t\t\t\t\tctx,\n\t\t\t\t\twaitForEventDomContentEventFired(ctx, logger),\n\t\t\t\t\twaitForEventLoadEventFired(ctx, logger),\n\t\t\t\t\twaitForEventNetworkIdle(ctx, logger),\n\t\t\t\t\twaitForEventLoadingFinished(ctx, logger),\n\t\t\t\t)\n\n\t\t\t\tif err == nil {\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\treturn fmt.Errorf(\"wait for events: %w\", err)\n\t\t\t}),\n\t\t\tchromedp.ActionFunc(func(ctx context.Context) error {\n\t\t\t\t// See https://github.com/gotenberg/gotenberg/issues/226.\n\t\t\t\tif !options.OmitBackground {\n\t\t\t\t\tlogger.Debug(\"default white background not hidden\")\n\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\tif !options.PrintBackground {\n\t\t\t\t\t// See https://github.com/chromedp/chromedp/issues/1179#issuecomment-1284794416.\n\t\t\t\t\treturn fmt.Errorf(\"validate omit background: %w\", ErrOmitBackgroundWithoutPrintBackground)\n\t\t\t\t}\n\n\t\t\t\tlogger.Debug(\"hide default white background\")\n\n\t\t\t\terr := emulation.SetDefaultBackgroundColorOverride().WithColor(\n\t\t\t\t\t&cdp.RGBA{\n\t\t\t\t\t\tR: 0,\n\t\t\t\t\t\tG: 0,\n\t\t\t\t\t\tB: 0,\n\t\t\t\t\t\tA: 0,\n\t\t\t\t\t}).Do(ctx)\n\n\t\t\t\tif err == nil {\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\treturn fmt.Errorf(\"hide default white background: %w\", err)\n\t\t\t}),\n\t\t\tchromedp.ActionFunc(func(ctx context.Context) error {\n\t\t\t\t// See:\n\t\t\t\t// https://github.com/gotenberg/gotenberg/issues/354\n\t\t\t\t// https://github.com/puppeteer/puppeteer/issues/2685\n\t\t\t\t// https://github.com/chromedp/chromedp/issues/520\n\t\t\t\tscript := `\n(() => {\n\tconst css = 'html { -webkit-print-color-adjust: exact !important; }';\n\n\tconst style = document.createElement('style');\n\tstyle.type = 'text/css';\n\tstyle.appendChild(document.createTextNode(css));\n\tdocument.head.appendChild(style);\n})();\n`\n\n\t\t\t\tevaluate := chromedp.Evaluate(script, nil)\n\t\t\t\terr := evaluate.Do(ctx)\n\n\t\t\t\tif err == nil {\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\treturn fmt.Errorf(\"add CSS for exact colors: %w\", err)\n\t\t\t}),\n\t\t\tchromedp.ActionFunc(func(ctx context.Context) error {\n\t\t\t\tif len(options.ExtraLinkTags) == 0 {\n\t\t\t\t\tlogger.Debug(\"no extra link tags\")\n\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\tlogger.Debug(fmt.Sprintf(\"extra link tags: %+v\", options.ExtraLinkTags))\n\n\t\t\t\taddLinkTag := func(i int, linkTag LinkTag) func() error {\n\t\t\t\t\treturn func() error {\n\t\t\t\t\t\tscript := `\n(() => {\n\tconst link = document.createElement('link');\n\tlink.href = '%s';\n\tlink.rel = 'stylesheet'\n\tdocument.head.appendChild(link);\n})();\n`\n\n\t\t\t\t\t\tevaluate := chromedp.Evaluate(fmt.Sprintf(script, linkTag.Href), nil)\n\t\t\t\t\t\terr := evaluate.Do(ctx)\n\n\t\t\t\t\t\tif err == nil {\n\t\t\t\t\t\t\treturn nil\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\treturn fmt.Errorf(\"add extra link tag %d: %w\", i, err)\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\teg, _ := errgroup.WithContext(ctx)\n\n\t\t\t\tfor i, linkTag := range options.ExtraLinkTags {\n\t\t\t\t\teg.Go(addLinkTag(i, linkTag))\n\t\t\t\t}\n\n\t\t\t\terr := eg.Wait()\n\t\t\t\tif err == nil {\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\treturn fmt.Errorf(\"add extra link tags: %w\", err)\n\t\t\t}),\n\t\t\tchromedp.ActionFunc(func(ctx context.Context) error {\n\t\t\t\tif options.EmulatedMediaType == \"\" {\n\t\t\t\t\tlogger.Debug(\"no emulated media type\")\n\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\tif options.EmulatedMediaType != \"screen\" && options.EmulatedMediaType != \"print\" {\n\t\t\t\t\treturn fmt.Errorf(\"validate emulated media type '%s': %w\", options.EmulatedMediaType, ErrInvalidEmulatedMediaType)\n\t\t\t\t}\n\n\t\t\t\tlogger.Debug(fmt.Sprintf(\"emulate media type '%s'\", options.EmulatedMediaType))\n\n\t\t\t\temulatedMedia := emulation.SetEmulatedMedia()\n\n\t\t\t\terr := emulatedMedia.WithMedia(options.EmulatedMediaType).Do(ctx)\n\t\t\t\tif err == nil {\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\treturn fmt.Errorf(\"emulate media type '%s': %w\", options.EmulatedMediaType, err)\n\t\t\t}),\n\t\t\tchromedp.ActionFunc(func(ctx context.Context) error {\n\t\t\t\tif mod.disableJavaScript {\n\t\t\t\t\tlogger.Debug(\"JavaScript disabled, skipping extra script tags\")\n\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\tif len(options.ExtraScriptTags) == 0 {\n\t\t\t\t\tlogger.Debug(\"no extra script tags\")\n\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\tlogger.Debug(fmt.Sprintf(\"extra script tags: %+v\", options.ExtraScriptTags))\n\n\t\t\t\taddScriptTag := func(i int, scriptTag ScriptTag) func() error {\n\t\t\t\t\treturn func() error {\n\t\t\t\t\t\tscript := `\n(() => {\n\tconst script = document.createElement('script');\n\tscript.src = '%s';\n\tdocument.head.appendChild(script);\n})();\n`\n\n\t\t\t\t\t\tevaluate := chromedp.Evaluate(fmt.Sprintf(script, scriptTag.Src), nil)\n\t\t\t\t\t\terr := evaluate.Do(ctx)\n\n\t\t\t\t\t\tif err == nil {\n\t\t\t\t\t\t\treturn nil\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\treturn fmt.Errorf(\"add extra script tag %d: %w\", i, err)\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\teg, _ := errgroup.WithContext(ctx)\n\n\t\t\t\tfor i, scriptTag := range options.ExtraScriptTags {\n\t\t\t\t\teg.Go(addScriptTag(i, scriptTag))\n\t\t\t\t}\n\n\t\t\t\terr := eg.Wait()\n\t\t\t\tif err == nil {\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\treturn fmt.Errorf(\"add extra script tags: %w\", err)\n\t\t\t}),\n\t\t\tchromedp.ActionFunc(func(ctx context.Context) error {\n\t\t\t\tif mod.disableJavaScript {\n\t\t\t\t\tlogger.Debug(\"JavaScript disabled, skipping wait delay\")\n\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\tif options.WaitDelay <= 0 {\n\t\t\t\t\tlogger.Debug(\"no wait delay\")\n\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\t// We wait for a given amount of time so that JavaScript\n\t\t\t\t// scripts have a chance to finish before printing the page\n\t\t\t\t// to PDF.\n\t\t\t\tlogger.Debug(fmt.Sprintf(\"wait '%s' before print\", options.WaitDelay))\n\n\t\t\t\tselect {\n\t\t\t\tcase <-ctx.Done():\n\t\t\t\t\treturn fmt.Errorf(\"wait delay: %w\", ctx.Err())\n\t\t\t\tcase <-time.After(options.WaitDelay):\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\t\t\t}),\n\t\t\tchromedp.ActionFunc(func(ctx context.Context) error {\n\t\t\t\tif mod.disableJavaScript {\n\t\t\t\t\tlogger.Debug(\"JavaScript disabled, skipping wait for window status / wait for expression\")\n\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\tif options.WaitWindowStatus == \"\" && options.WaitForExpression == \"\" {\n\t\t\t\t\tlogger.Debug(\"no wait for window status nor wait for expression\")\n\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\tevaluate := func(expression string) error {\n\t\t\t\t\t// We wait until the evaluation of the expression is true or\n\t\t\t\t\t// until the context is done.\n\t\t\t\t\tlogger.Debug(fmt.Sprintf(\"wait until '%s' is true before print\", expression))\n\n\t\t\t\t\tticker := time.NewTicker(time.Duration(100) * time.Millisecond)\n\n\t\t\t\t\tfor {\n\t\t\t\t\t\tselect {\n\t\t\t\t\t\tcase <-ctx.Done():\n\t\t\t\t\t\t\tticker.Stop()\n\n\t\t\t\t\t\t\treturn fmt.Errorf(\"context done while evaluating '%s': %w\", expression, ctx.Err())\n\t\t\t\t\t\tcase <-ticker.C:\n\t\t\t\t\t\t\tvar ok bool\n\n\t\t\t\t\t\t\tevaluate := chromedp.Evaluate(expression, &ok)\n\t\t\t\t\t\t\terr := evaluate.Do(ctx)\n\n\t\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\t\treturn fmt.Errorf(\"evaluate: %v: %w\", err, ErrInvalidEvaluationExpression)\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tif ok {\n\t\t\t\t\t\t\t\tticker.Stop()\n\n\t\t\t\t\t\t\t\treturn nil\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif options.WaitWindowStatus != \"\" {\n\t\t\t\t\tlogger.Warn(\"option 'WaitWindowStatus' is deprecated; prefer 'WaitForExpression' instead\")\n\n\t\t\t\t\terr := evaluate(fmt.Sprintf(\"window.status === '%s'\", options.WaitWindowStatus))\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn fmt.Errorf(\"wait for window.status === '%s': %w\", options.WaitWindowStatus, err)\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif options.WaitForExpression != \"\" {\n\t\t\t\t\terr := evaluate(options.WaitForExpression)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn fmt.Errorf(\"wait for expression '%s': %w\", options.WaitForExpression, err)\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\treturn nil\n\t\t\t}),\n\t\t\tchromedp.ActionFunc(func(ctx context.Context) error {\n\t\t\t\tprintToPDF := page.PrintToPDF().\n\t\t\t\t\tWithTransferMode(page.PrintToPDFTransferModeReturnAsStream).\n\t\t\t\t\tWithLandscape(options.Landscape).\n\t\t\t\t\tWithPrintBackground(options.PrintBackground).\n\t\t\t\t\tWithScale(options.Scale).\n\t\t\t\t\tWithPaperWidth(options.PaperWidth).\n\t\t\t\t\tWithPaperHeight(options.PaperHeight).\n\t\t\t\t\tWithMarginTop(options.MarginTop).\n\t\t\t\t\tWithMarginBottom(options.MarginBottom).\n\t\t\t\t\tWithMarginLeft(options.MarginLeft).\n\t\t\t\t\tWithMarginRight(options.MarginRight).\n\t\t\t\t\tWithPageRanges(options.PageRanges).\n\t\t\t\t\tWithPreferCSSPageSize(options.PreferCSSPageSize)\n\n\t\t\t\thasCustomHeaderFooter := options.HeaderTemplate != DefaultOptions().HeaderTemplate ||\n\t\t\t\t\toptions.FooterTemplate != DefaultOptions().FooterTemplate\n\n\t\t\t\tif !hasCustomHeaderFooter {\n\t\t\t\t\tlogger.Debug(\"no custom header nor footer\")\n\n\t\t\t\t\tprintToPDF = printToPDF.WithDisplayHeaderFooter(false)\n\t\t\t\t} else {\n\t\t\t\t\tlogger.Debug(\"with custom header and/or footer\")\n\n\t\t\t\t\tprintToPDF = printToPDF.\n\t\t\t\t\t\tWithDisplayHeaderFooter(true).\n\t\t\t\t\t\tWithHeaderTemplate(options.HeaderTemplate).\n\t\t\t\t\t\tWithFooterTemplate(options.FooterTemplate)\n\t\t\t\t}\n\n\t\t\t\tlogger.Debug(fmt.Sprintf(\"print to PDF with: %+v\", printToPDF))\n\n\t\t\t\t_, stream, err := printToPDF.Do(ctx)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"print to PDF: %w\", err)\n\t\t\t\t}\n\n\t\t\t\treader := &streamReader{\n\t\t\t\t\tctx: ctx,\n\t\t\t\t\thandle: stream,\n\t\t\t\t\tr: nil,\n\t\t\t\t\tpos: 0,\n\t\t\t\t\teof: false,\n\t\t\t\t}\n\n\t\t\t\tdefer func() {\n\t\t\t\t\terr := reader.Close()\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlogger.Error(fmt.Sprintf(\"close reader: %s\", err))\n\t\t\t\t\t}\n\t\t\t\t}()\n\n\t\t\t\tfile, err := os.OpenFile(outputPath, os.O_CREATE|os.O_WRONLY, 0600)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"open output path: %w\", err)\n\t\t\t\t}\n\n\t\t\t\tdefer func() {\n\t\t\t\t\terr := file.Close()\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlogger.Error(fmt.Sprintf(\"close output path: %s\", err))\n\t\t\t\t\t}\n\t\t\t\t}()\n\n\t\t\t\tbuffer := bufio.NewReader(reader)\n\n\t\t\t\t_, err = buffer.WriteTo(file)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"write result to output path: %w\", err)\n\t\t\t\t}\n\n\t\t\t\treturn nil\n\t\t\t}),\n\t\t}\n\t}\n\n\tactiveInstancesCountMu.Lock()\n\tactiveInstancesCount += 1\n\tactiveInstancesCountMu.Unlock()\n\n\terr := chromedp.Run(taskCtx, printToPDF(URL, options, outputPath))\n\n\tactiveInstancesCountMu.Lock()\n\tactiveInstancesCount -= 1\n\tactiveInstancesCountMu.Unlock()\n\n\t// Always remove the user profile directory created by Chromium.\n\tgo func() {\n\t\tlogger.Debug(fmt.Sprintf(\"remove user profile directory '%s'\", userProfileDirPath))\n\n\t\terr := os.RemoveAll(userProfileDirPath)\n\t\tif err != nil {\n\t\t\tlogger.Error(fmt.Sprintf(\"remove user profile directory: %s\", err))\n\t\t}\n\t}()\n\n\tif err != nil {\n\t\terrMessage := err.Error()\n\n\t\tif strings.Contains(errMessage, \"Show invalid printer settings error (-32000)\") {\n\t\t\treturn ErrInvalidPrinterSettings\n\t\t}\n\n\t\tif strings.Contains(errMessage, \"Page range syntax error\") {\n\t\t\treturn ErrPageRangesSyntaxError\n\t\t}\n\n\t\tif strings.Contains(errMessage, \"rpcc: message too large\") {\n\t\t\treturn ErrRpccMessageTooLarge\n\t\t}\n\n\t\t// See https://github.com/gotenberg/gotenberg/issues/633.\n\t\tif strings.Contains(errMessage, \"chrome failed to start\") {\n\t\t\tfailedStartsCountMu.Lock()\n\t\t\tfailedStartsCount += 1\n\t\t\tfailedStartsCountMu.Unlock()\n\t\t}\n\n\t\treturn fmt.Errorf(\"chromium PDF: %w\", err)\n\t}\n\n\t// See https://github.com/gotenberg/gotenberg/issues/633.\n\tfailedStartsCountMu.Lock()\n\tfailedStartsCount = 0\n\tfailedStartsCountMu.Unlock()\n\n\t// See https://github.com/gotenberg/gotenberg/issues/262.\n\tconsoleExceptionsMu.RLock()\n\tdefer consoleExceptionsMu.RUnlock()\n\n\tif consoleExceptions != nil {\n\t\treturn fmt.Errorf(\"%v: %w\", consoleExceptions, ErrConsoleExceptions)\n\t}\n\n\treturn nil\n}", "func NewInfo(version string, t time.Time) File {\n\tvar info = struct {\n\t\tVersion string\n\t\tTime time.Time\n\t}{version, t}\n\tjs, err := json.Marshal(info)\n\tif err != nil {\n\t\t// json.Marshal only fails for bad types; there are no bad types in info.\n\t\tpanic(\"unexpected json.Marshal failure\")\n\t}\n\treturn MemFile(js, t)\n}", "func (f Impl) AddPage() {\n\tf.GoPdf.AddPage()\n}", "func (m *FileRequestBuilder) CreatePatchRequestInformation(ctx context.Context, body iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.AgreementFileable, requestConfiguration *FileRequestBuilderPatchRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.urlTemplate\n requestInfo.PathParameters = m.pathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.PATCH\n requestInfo.Headers[\"Accept\"] = \"application/json\"\n requestInfo.SetContentFromParsable(ctx, m.requestAdapter, \"application/json\", body)\n if requestConfiguration != nil {\n requestInfo.AddRequestHeaders(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "func (bdi *Info) ProduceName() string {\n\treturn C.GoString(C.spdk_bdev_get_product_name(bdi.ptr()))\n}", "func addDate(fileInfo os.FileInfo){\r\n\tcrtTime := fileInfo.Sys().(*syscall.Win32FileAttributeData)\r\n\tfullTime := time.Unix(0, crtTime.CreationTime.Nanoseconds()).String()\r\n\tcrtDate := fullTime[0:10]\r\n\tnewName = fileName + sepChar + crtDate\r\n\tfileName = newName\r\n}", "func GetPDF(pdfName string, imageName string) error {\n\n\tabsPath, err := os.Getwd()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tInpath := filepath.Join(absPath, \"input\", pdfName)\n\tOutpath := filepath.Join(absPath, \"output\")\n\n\tif _, err := os.Stat(Outpath); os.IsNotExist(err) {\n\t\tlog.Println(\"Output dir not found. Creating at \", Outpath)\n\t\tos.Mkdir(Outpath, os.ModePerm)\n\t}\n\n\timagick.Initialize()\n\tdefer imagick.Terminate()\n\n\tmw := imagick.NewMagickWand()\n\tdefer mw.Destroy()\n\n\tif err := mw.SetResolution(72, 72); err != nil {\n\t\treturn err\n\t}\n\n\t// Load the image file into imagick\n\tif err := mw.ReadImage(Inpath); err != nil {\n\t\treturn err\n\t}\n\n\tmw.SetIteratorIndex(0)\n\n\tlog.Print(\"Converting \", pdfName, absPath)\n\n\t// Set any compression (100 = max quality)\n\tif err := mw.SetCompressionQuality(50); err != nil {\n\t\treturn err\n\t}\n\n\t// Convert into JPG\n\tif err := mw.SetFormat(\"jpg\"); err != nil {\n\t\treturn err\n\t}\n\n\t// Save File\n\treturn mw.WriteImages(filepath.Join(Outpath, imageName), false)\n}", "func main() {\n\tinputPdf := \"sample_form.pdf\"\n\tfillJSONFile := \"formdata.json\"\n\toutputFile := \"output.pdf\"\n\n\terr := fillFields(inputPdf, fillJSONFile, outputFile)\n\tif err != nil {\n\t\tfmt.Printf(\"Error: %v\\n\", err)\n\t\tos.Exit(1)\n\t}\n\n\tfmt.Printf(\"Success, output written to %s\\n\", outputFile)\n}", "func BuildPdf(p *PdfData) ([]byte, error) {\n\n\terr := p.build()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"p.build() fail\")\n\t}\n\n\tb, err := p.bytes()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"p.Byte() fail\")\n\t}\n\n\treturn b, nil\n}", "func (d *PdfDate) ToPdfObject() core.PdfObject {\n\tstr := fmt.Sprintf(\"D:%.4d%.2d%.2d%.2d%.2d%.2d%c%.2d'%.2d'\",\n\t\td.year, d.month, d.day, d.hour, d.minute, d.second,\n\t\td.utOffsetSign, d.utOffsetHours, d.utOffsetMins)\n\treturn core.MakeString(str)\n}", "func WriteFile(d *defs, fileName string, objName string, bflags attrVal) {\n objType, attrLen := getMaxAttr(objName)\n f, err := os.Create(fileName); if err != nil {\n fmt.Println(err)\n f.Close()\n return\n }\n defer func(){\n err := f.Close(); if err != nil {\n fmt.Println(\"Failed to close file \", err)\n }\n if bflags.Has(\"color\"){\n fmt.Printf(\"%vWrite%v: created a new config file '%v'\\n\",Green,RST,fileName)\n }else {\n fmt.Printf(\"Write: created a new config file '%v'\\n\",fileName)\n }\n }()\n // write nagios objects to a file\n for _, def := range *d {\n formatDef := formatObjDef(def, objType, attrLen)\n f.WriteString(formatDef)\n }\n}", "func printVersionAndLicense(file io.Writer) {\n\tfmt.Fprintf(file, \"vidx2pidx version %v\\n\", Version)\n\tfmt.Fprintf(file, \"%v\\n\", License)\n}", "func (parser *PdfParser) PdfVersion() Version {\n\treturn parser.version\n}", "func (f *EvaluationReportFormFiller) contactInformation(customer models.ServiceMember, officeUser models.OfficeUser) {\n\tcontactInfo := FormatContactInformationValues(customer, officeUser)\n\n\tgap := pxToMM(16.0)\n\tcolumnWidth := -pageSideMarginMm + (letterWidthMm-gap)/2.0\n\ttextHeight := pxToMM(21.0)\n\tcustomerContactText := strings.Join([]string{contactInfo.CustomerFullName, contactInfo.CustomerPhone, contactInfo.CustomerRank, contactInfo.CustomerAffiliation}, \"\\n\")\n\tqaeContactText := strings.Join([]string{contactInfo.QAEFullName, contactInfo.QAEPhone, contactInfo.QAEEmail}, \"\\n\")\n\n\tf.pdf.SetFontStyle(\"B\")\n\tf.pdf.SetFontUnitSize(textFontSize)\n\tf.setTextColorBaseDarkest()\n\tf.setBorderColor()\n\tf.pdf.SetX(pageSideMarginMm)\n\tf.pdf.CellFormat(columnWidth, textHeight+pxToMM(8.0), \"Customer information\", \"B\", moveRight, \"LM\", false, 0, \"\")\n\tf.pdf.SetX(pageSideMarginMm + columnWidth + gap)\n\tf.pdf.CellFormat(columnWidth, textHeight+pxToMM(8.0), \"QAE\", \"B\", moveDown, \"LM\", false, 0, \"\")\n\tf.pdf.SetFontStyle(\"\")\n\tf.addVerticalSpace(pxToMM(4.0))\n\tcontentY := f.pdf.GetY()\n\tf.pdf.MultiCell(columnWidth, textHeight, customerContactText, \"\", \"LM\", false)\n\tendY := f.pdf.GetY()\n\tf.pdf.MoveTo(pageSideMarginMm+columnWidth+gap, contentY)\n\tf.pdf.MultiCell(columnWidth, textHeight, qaeContactText, \"\", \"LM\", false)\n\n\tbottomMargin := pxToMM(36.0)\n\tf.pdf.MoveTo(pageSideMarginMm, endY+bottomMargin)\n}", "func ExamplePdfMaroto_SetCreationDate() {\n\tm := pdf.NewMaroto(consts.Portrait, consts.A4)\n\ttimeNow := time.Now()\n\n\tm.SetCreationDate(timeNow)\n\n\t// Do more things and save...\n}", "func (o *EnforcerReport) Doc() string {\n\n\treturn `Post a new defender statistics report.`\n}", "func Example23() {\n\tf, err := os.Create(\"Example_23.pdf\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tw := bufio.NewWriter(f)\n\n\tpdf := pdfjet.NewPDF(w, compliance.PDF15)\n\n\tfont := pdfjet.NewCoreFont(pdf, corefont.Helvetica())\n\n\tf, err = os.Open(\"fonts/Droid/DroidSerif-Regular.ttf.stream\")\n\treader := bufio.NewReader(f)\n\tfont2 := pdfjet.NewFontStream1(pdf, reader)\n\n\tf, err = os.Open(\"fonts/Droid/DroidSansMono.ttf.stream\")\n\treader = bufio.NewReader(f)\n\tfont3 := pdfjet.NewFontStream1(pdf, reader)\n\n\tf, err = os.Open(\"images/ee-map.png\")\n\treader = bufio.NewReader(f)\n\timage := pdfjet.NewImage(pdf, reader, imagetype.PNG)\n\tf.Close()\n\n\tpage := pdfjet.NewPage(pdf, letter.Portrait, true)\n\n\tflag := pdfjet.NewBoxAt(85.0, 85.0, 64.0, 32.0)\n\n\tpath := pdfjet.NewPath()\n\n\tpath.Add(pdfjet.NewPoint(13.0, 0.0))\n\tpath.Add(pdfjet.NewPoint(15.5, 4.5))\n\n\tpath.Add(pdfjet.NewPoint(18.0, 3.5))\n\tpath.Add(pdfjet.NewControlPoint(15.5, 13.5))\n\tpath.Add(pdfjet.NewControlPoint(15.5, 13.5))\n\tpath.Add(pdfjet.NewPoint(20.5, 7.5))\n\n\tpath.Add(pdfjet.NewPoint(21.0, 9.5))\n\tpath.Add(pdfjet.NewPoint(25.0, 9.0))\n\tpath.Add(pdfjet.NewPoint(24.0, 13.0))\n\tpath.Add(pdfjet.NewPoint(25.5, 14.0))\n\tpath.Add(pdfjet.NewPoint(19.0, 19.0))\n\tpath.Add(pdfjet.NewPoint(20.0, 21.5))\n\tpath.Add(pdfjet.NewPoint(13.5, 20.5))\n\tpath.Add(pdfjet.NewPoint(13.5, 27.0))\n\tpath.Add(pdfjet.NewPoint(12.5, 27.0))\n\tpath.Add(pdfjet.NewPoint(12.5, 20.5))\n\tpath.Add(pdfjet.NewPoint(6.0, 21.5))\n\tpath.Add(pdfjet.NewPoint(7.0, 19.0))\n\tpath.Add(pdfjet.NewPoint(0.5, 14.0))\n\tpath.Add(pdfjet.NewPoint(2.0, 13.0))\n\tpath.Add(pdfjet.NewPoint(1.0, 9.0))\n\tpath.Add(pdfjet.NewPoint(5.0, 9.5))\n\n\tpath.Add(pdfjet.NewPoint(5.5, 7.5))\n\tpath.Add(pdfjet.NewControlPoint(10.5, 13.5))\n\tpath.Add(pdfjet.NewControlPoint(10.5, 13.5))\n\tpath.Add(pdfjet.NewPoint(8.0, 3.5))\n\n\tpath.Add(pdfjet.NewPoint(10.5, 4.5))\n\tpath.SetClosePath(true)\n\tpath.SetColor(color.Red)\n\tpath.SetFillShape(true)\n\tpath.PlaceIn(flag, 19.0, 3.0)\n\n\tpath.DrawOn(page)\n\n\tbox := pdfjet.NewBox()\n\tbox.SetSize(16.0, 32.0)\n\tbox.SetColor(color.Red)\n\tbox.SetFillShape(true)\n\tbox.PlaceIn(flag, 0.0, 0.0)\n\tbox.DrawOn(page)\n\tbox.PlaceIn(flag, 48.0, 0.0)\n\tbox.DrawOn(page)\n\n\tpath.ScaleBy(15.0)\n\tpath.SetFillShape(false)\n\txy := path.DrawOn(page)\n\n\tbox = pdfjet.NewBox()\n\tbox.SetLocation(xy[0], xy[1])\n\tbox.SetSize(20.0, 20.0)\n\tbox.DrawOn(page)\n\n\tfont.SetSize(24.0)\n\ttextField := pdfjet.NewTextLine(font, \"Hello, World!\")\n\ttextField.SetLocation(300.0, 300.0)\n\ttextField.SetColor(color.Blanchedalmond)\n\ttextField.DrawOn(page)\n\n\tfont2.SetSize(24.0)\n\ttextField2 := pdfjet.NewTextLine(font2, \"This is great!\")\n\ttextField2.SetLocation(400.0, 400.0)\n\ttextField2.SetColor(color.Blue)\n\ttextField2.SetStrikeout(true)\n\ttextField2.SetUnderline(true)\n\ttextField2.DrawOn(page)\n\n\tfont2.SetSize(14.0)\n\ttextField2 = pdfjet.NewTextLine(font2, \"This is great!\")\n\ttextField2.SetLocation(400.0, 500.0)\n\ttextField2.SetColor(color.Blue)\n\ttextField2.DrawOn(page)\n\n\tfont3.SetSize(24.0)\n\ttextField2 = pdfjet.NewTextLine(font3, \"This is great!\")\n\ttextField2.SetLocation(400.0, 600.0)\n\ttextField2.SetColor(color.Blue)\n\ttextField2.DrawOn(page)\n\n\timage.SetLocation(100.0, 500.0)\n\timage.ScaleBy(0.5)\n\timage.DrawOn(page)\n\n\tpdf.Complete()\n\n\tf.Close()\n}", "func reportProcess(r *gRPCReporter) {\n\tif process == nil {\n\t\tprocess = initProcessStat(r)\n\t}\n\n\tif process.status == NotInit {\n\t\t// create metadata file\n\t\tif p, err := process.initMetadataFile(r); err != nil {\n\t\t\tr.logger.Warnf(\"process status file init failure: %s, %v\", p, err)\n\t\t} else {\n\t\t\tprocess.status = Reported\n\t\t}\n\t} else if process.status == Reported {\n\t\t// keep the metadata file alive(update modify time)\n\t\tupdateTime := time.Now()\n\t\tif err := os.Chtimes(process.metadataFile, updateTime, updateTime); err != nil {\n\t\t\tr.logger.Warnf(\"keep the process metadata alive failure: %v\", err)\n\t\t}\n\t}\n}", "func newDocumentInfo(msg ssmmds.Message, parsedMsg messageContracts.SendCommandPayload) contracts.DocumentInfo {\n\n\tdocumentInfo := new(contracts.DocumentInfo)\n\n\tdocumentInfo.CommandID, _ = messageContracts.GetCommandID(*msg.MessageId)\n\tdocumentInfo.DocumentID = documentInfo.CommandID\n\tdocumentInfo.InstanceID = *msg.Destination\n\tdocumentInfo.MessageID = *msg.MessageId\n\tdocumentInfo.RunID = times.ToIsoDashUTC(times.DefaultClock.Now())\n\tdocumentInfo.CreatedDate = *msg.CreatedDate\n\tdocumentInfo.DocumentName = parsedMsg.DocumentName\n\tdocumentInfo.DocumentStatus = contracts.ResultStatusInProgress\n\n\treturn *documentInfo\n}", "func (spec *Spec) writePKIToDisk(ca *x509.Certificate, keyPair *tls.Certificate) (err error) {\n\n\tSpecWriteCount.WithLabelValues(spec.Path).Inc()\n\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tSpecWriteFailureCount.WithLabelValues(spec.Path).Inc()\n\t\t} else {\n\t\t\tspec.renewalForced = false\n\t\t}\n\t}()\n\n\tif spec.CA.File != nil {\n\t\terr = spec.CA.File.WriteCertificate(ca)\n\t\tif err != nil {\n\t\t\terr = errors.WithMessagef(err, \"failed writing CA to disk\")\n\t\t\treturn\n\t\t}\n\t\tspec.updateCAExpiry(ca.NotAfter)\n\t}\n\n\tif keyPair == nil {\n\t\treturn nil\n\t}\n\n\tkeyData, err := encodeKeyToPem(keyPair.PrivateKey)\n\tif err != nil {\n\t\treturn\n\t}\n\n\terr = spec.Cert.WriteCertificate(keyPair.Leaf)\n\tif err != nil {\n\t\terr = errors.WithMessagef(err, \"failed writing certificate to disk\")\n\t\treturn\n\t}\n\terr = spec.Key.WriteFile(keyData)\n\n\tif err != nil {\n\t\terr = errors.WithMessage(err, \"failed writing key to disk\")\n\t\treturn\n\t}\n\tspec.updateCertExpiry(keyPair.Leaf.NotAfter)\n\n\treturn\n}", "func writePodInformation(pod corev1.Pod) string {\n\tvar buffer strings.Builder\n\tvar containers, readyContainers, restarts int\n\tfor _, conStatus := range pod.Status.ContainerStatuses {\n\t\tcontainers++\n\t\tif conStatus.Ready {\n\t\t\treadyContainers++\n\t\t}\n\n\t\trestarts += int(conStatus.RestartCount)\n\t}\n\n\tbuffer.WriteString(pod.GetName())\n\tbuffer.WriteString(\"\\t\")\n\tbuffer.WriteString(strconv.Itoa(readyContainers))\n\tbuffer.WriteString(\"/\")\n\tbuffer.WriteString(strconv.Itoa(containers))\n\tbuffer.WriteString(\"\\t\")\n\tbuffer.WriteString(string(pod.Status.Phase))\n\n\tif pod.Status.Phase == corev1.PodPending {\n\t\tfor _, condition := range pod.Status.Conditions {\n\t\t\t// Only check the PodScheduled condition.\n\t\t\tif condition.Type != corev1.PodScheduled {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// If the Pod is scheduled we can ignore this condition.\n\t\t\tif condition.Status == corev1.ConditionTrue {\n\t\t\t\tbuffer.WriteString(\"\\t-\")\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// Printout the message, why the Pod is not scheduling.\n\t\t\tbuffer.WriteString(\"\\t\")\n\t\t\tif condition.Message != \"\" {\n\t\t\t\tbuffer.WriteString(condition.Message)\n\t\t\t} else {\n\t\t\t\tbuffer.WriteString(\"-\")\n\t\t\t}\n\t\t}\n\t} else {\n\t\tbuffer.WriteString(\"\\t-\")\n\t}\n\n\tbuffer.WriteString(\"\\t\")\n\tbuffer.WriteString(strconv.Itoa(restarts))\n\n\tif _, ok := pod.Labels[fdbv1beta2.FDBProcessGroupIDLabel]; ok {\n\t\tvar mainTag, sidecarTag string\n\t\tfor _, container := range pod.Spec.Containers {\n\t\t\tif container.Name == fdbv1beta2.MainContainerName {\n\t\t\t\tmainTag = strings.Split(container.Image, \":\")[1]\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif container.Name == fdbv1beta2.SidecarContainerName {\n\t\t\t\tsidecarTag = strings.Split(container.Image, \":\")[1]\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\n\t\tbuffer.WriteString(\"\\t\")\n\t\tbuffer.WriteString(mainTag)\n\t\tbuffer.WriteString(\"\\t\")\n\t\tbuffer.WriteString(sidecarTag)\n\t} else {\n\t\tbuffer.WriteString(\"\\t-\\t-\")\n\t}\n\n\tbuffer.WriteString(\"\\t\")\n\tendIdx := len(pod.Status.PodIPs) - 1\n\tfor idx, ip := range pod.Status.PodIPs {\n\t\tbuffer.WriteString(ip.IP)\n\t\tif endIdx > idx {\n\t\t\tbuffer.WriteString(\",\")\n\t\t}\n\t}\n\n\tbuffer.WriteString(\"\\t\")\n\tbuffer.WriteString(pod.Spec.NodeName)\n\tbuffer.WriteString(\"\\t\")\n\tbuffer.WriteString(duration.HumanDuration(time.Since(pod.CreationTimestamp.Time)))\n\n\treturn buffer.String()\n}", "func (masterfile *MasterFile) Print(spacing int) {\n\tlog.Debug(\"%*sMagic : %s\", spacing, \"\", masterfile.Magic)\n\tlog.Debug(\"%*sMD5 : %s\", spacing, \"\", masterfile.Md5)\n\tlog.Debug(\"%*sGeneration : %d\", spacing, \"\", masterfile.Generation)\n}", "func Merge_pdf(filenames map[string][]string) (string, error) {\n\tcommand := \"\"\n\ttmppath := \"\"\n\tvar extraCmds []string\n\tfor path, name := range filenames {\n\t\ttmppath = path\n\t\tfor i := 0; i < len(name); i++ {\n\t\t\tcommand = path + \"/\" + name[i]\n\t\t\textraCmds = append(extraCmds, command)\n\t\t}\n\t}\n\tuuid, _ := uuid.NewV4()\n\ttmp_filename := uuid.String() + \".pdf\"\n\ttmppath += \"/\" + tmp_filename\n\textraCmds = append(extraCmds, tmppath)\n\t//use pdfunite to merge pdf\n\ts, err := exec.Command(\"pdfunite\", extraCmds...).Output()\n\treslt := string(s)\n\tlog.Println(reslt)\n\tif err != nil {\n\t\treturn \"\", errors.Errorf(\"[merge_pdf] failed to execute pdfunite command: \\n%v\", err)\n\t}\n\ttif_file, err := Create_tif(tmppath)\n\tif err != nil {\n\t\treturn \"\", errors.Errorf(\"[merge_pdf] failed to create tif file from created pdf: \\n%v\", err)\n\t}\n\treturn tif_file, nil\n\n}", "func (d *document) CreateAndWrite(pageFile string, content string) error {\n\tif pageFile == \"\" {\n\t\treturn nil\n\t}\n\td.lock.Lock()\n\tabsFilePath := d.GetAbsPageFileByPageFile(pageFile)\n\tabsDir := filepath.Dir(absFilePath)\n\terr := os.MkdirAll(absDir, 0777)\n\tif err != nil {\n\t\td.lock.Unlock()\n\t\treturn err\n\t}\n\td.lock.Unlock()\n\treturn File.WriteFile(absFilePath, content)\n}", "func PDFParser(fname string) {\n\t//r, _ := pdf.Open(\"./856_HDPRO_ 4060 [04022019].pdf\")\n\tr, _ := pdf.Open(\"../edi_automation_testing/files/\" + fname)\n\tsegment := \"\"\n\tfield := \"\"\n\tnum := 0\n\tvar edi []segmentStruct\n\tvar seg *segmentStruct\n\tvar fl *fieldStruct\n\tfor i := 4; i < r.NumPage(); i++ {\n\t\tp := r.Page(i)\n\t\twords := findWords(p.Content().Text)\n\t\tfor _, v := range words {\n\t\t\tif v.FontSize > 20 && len(v.S) < 4 {\n\t\t\t\tsegment = v.S\n\t\t\t\tedi = append(edi, segmentStruct{Name: v.S})\n\t\t\t\tseg = &edi[len(edi)-1]\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif v.FontSize > 18 {\n\t\t\t\tseg.Desc = seg.Desc + \" \" + v.S\n\t\t\t\tseg.Desc = strings.TrimSpace(seg.Desc)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif len(segment) > 0 {\n\t\t\t\tif strings.HasPrefix(v.S, \"Max: \") {\n\t\t\t\t\tseg.Max = v.S[5:]\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tif strings.HasPrefix(v.S, \"Loop: \") {\n\t\t\t\t\tseg.Loop = v.S[6:]\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tif strings.Contains(v.S, \"Optional\") {\n\t\t\t\t\tseg.Req = \"N/A\"\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tif strings.Contains(v.S, \"Mandatory\") {\n\t\t\t\t\tseg.Req = \"M\"\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tif len(v.S) >= len(segment) {\n\t\t\t\t\tif v.S[:len(segment)] == segment {\n\t\t\t\t\t\tfield = v.S\n\t\t\t\t\t\tnum = 0\n\t\t\t\t\t\tseg.List = append(seg.List, fieldStruct{})\n\t\t\t\t\t\tseg.List[len(seg.List)-1].Name = v.S\n\t\t\t\t\t\tfl = &seg.List[len(seg.List)-1]\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tif len(field) > 0 && num < 10 {\n\t\t\t\tnum++\n\t\t\t\tswitch num {\n\t\t\t\tcase 1:\n\t\t\t\t\tfl.setid(v.S)\n\t\t\t\tcase 2:\n\t\t\t\t\tfl.setdesc(v.S)\n\t\t\t\tcase 3:\n\t\t\t\t\tfl.setreq(v.S)\n\t\t\t\tcase 4:\n\t\t\t\t\tfl.setdatatype(v.S)\n\t\t\t\tcase 5:\n\t\t\t\t\tfl.setminmax(v.S)\n\t\t\t\t}\n\t\t\t\tif strings.Contains(v.S, \"Description:\") {\n\t\t\t\t\tnum = 10\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tbuf := new(bytes.Buffer)\n\tenc := json.NewEncoder(buf)\n\tenc.SetEscapeHTML(false)\n\tenc.SetIndent(\"\", \" \")\n\t_ = enc.Encode(edi)\n\t_ = ioutil.WriteFile(\"edi.json\", buf.Bytes(), 0644)\n\tlog.Printf(\"written json\")\n}", "func (c *FileMessageWriter) Process() {\n\n\ttargetFile := TargetFile{}\n\n\tfor msg := range c.Msg {\n\n\t\tfilePath := <-c.TargetFilePath\n\t\tf, _ := targetFile.Get(filePath)\n\t\tdefer f.Close()\n\n\t\tfmt.Fprintf(f, \"%v\", msg)\n\t}\n\n}", "func (a *PDFApiService) GetInfo(ctx _context.Context, pdfGetInfoParameters PdfGetInfoParameters) (PdfGetInfoResponse, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue PdfGetInfoResponse\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/api/pdf/GetInfo\"\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json-patch+json\", \"application/json\", \"text/json\", \"application/_*+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"text/plain\", \"application/json\", \"text/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &pdfGetInfoParameters\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v PdfGetInfoResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func (d *galleryDocument) CreatedAt() time.Time { return d.EXIF.TakenAt }", "func GetPDFPages(inPath string, outPath string, frames []parser.Section) error {\n\n\tif _, err := os.Stat(outPath); os.IsNotExist(err) {\n\t\tlog.Println(\"Output dir not found. Creating at \", outPath)\n\t\terr := os.Mkdir(outPath, os.ModePerm)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"[PDF Extractor] %s\", err)\n\t\t}\n\t}\n\n\timagick.Initialize()\n\tdefer imagick.Terminate()\n\n\tmw := imagick.NewMagickWand()\n\tdefer mw.Destroy()\n\n\tif err := mw.SetResolution(300, 300); err != nil {\n\t\treturn err\n\t}\n\n\t// Load the image file into imagick\n\tif err := mw.ReadImage(inPath); err != nil {\n\t\treturn err\n\t}\n\n\t// fmt.Println(mw.GetNumberImages())\n\n\t// Set any compression (100 = max quality)\n\tif err := mw.SetCompressionQuality(100); err != nil {\n\t\treturn err\n\t}\n\n\tif err := mw.SetFormat(\"jpg\"); err != nil {\n\t\treturn err\n\t}\n\tvar err error\n\tfor _, frame := range frames {\n\n\t\tmw.SetIteratorIndex(frame.Page - 1)\n\n\t\t// if err := mw.SetImageFormat(\"jpeg\"); err != nil {\n\t\t// \treturn err\n\t\t// }\n\n\t\t// Save File\n\t\terr = mw.WriteImage(filepath.Join(outPath, frame.FrameSrc.ImageSrc))\n\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"%s [PDF extraction: page: %d, loc: %s, to %s] \", err, frame.Page, inPath, filepath.Join(outPath, frame.FrameSrc.ImageSrc))\n\t\t}\n\n\t}\n\treturn nil\n}", "func (*PageInfo) Descriptor() ([]byte, []int) {\n\treturn file_app_proto_rawDescGZIP(), []int{19}\n}", "func convertToOptimizedPDF(in string, out string) error {\n\tq, err := qpdf.New()\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer q.Close()\n\tif !*debugMode {\n\t\tq.SetSuppressWarnings(true)\n\t}\n\tif err := q.ReadFile(in); err != nil {\n\t\treturn err\n\t}\n\t// TODO enable optimization flags\n\tif err := q.InitFileWrite(out); err != nil {\n\t\treturn err\n\t}\n\tq.SetObjectStreamMode(qpdf.ObjectStreamGenerate)\n\tq.SetStreamDataMode(qpdf.StreamDataPreserve)\n\tq.SetCompressStreams(true)\n\tif err := q.Write(); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (*PageInfo) Descriptor() ([]byte, []int) {\n\treturn file_user_proto_rawDescGZIP(), []int{9}\n}", "func (pc *pidController) create() error {\n\tfile, err := pc.filesystem.Create(pc.pidFilePath)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to create PID file at %s\", pc.pidFilePath)\n\t}\n\n\tdefer func() {\n\t\tif err := file.Close(); err != nil {\n\t\t\toktetoLog.Debugf(\"Error closing file %s: %s\", pc.pidFilePath, err)\n\t\t}\n\t}()\n\n\toktetoPID := strconv.Itoa(pc.pidProvider.provide())\n\tif _, err := file.WriteString(oktetoPID); err != nil {\n\t\treturn fmt.Errorf(\"unable to write to PID file at %s\", pc.pidFilePath)\n\t}\n\n\t// initialize watcher if it's not already initialized\n\tif pc.watcher == nil {\n\t\tpc.watcher, err = pc.pidWatcherProvider.provide()\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"could not create watcher for file '%s': %w\", pc.pidFilePath, err)\n\t\t}\n\n\t\tif err := pc.watcher.Add(pc.pidFilePath); err != nil {\n\t\t\treturn fmt.Errorf(\"could not add '%s' to watcher: %w\", pc.pidFilePath, err)\n\t\t}\n\t}\n\n\treturn nil\n}", "func Info(w io.Writer, format string, args ...any) {\n\tformat = strings.TrimRight(format, \"\\r\\n\") + \"\\n\"\n\tfmt.Fprintf(w, \"\\n\"+Wrap(Bold(\"INFO: \")+format, DefaultTextWidth)+\"\\n\", args...)\n}", "func (c *Controller) handleBasePdf(templateData map[string]interface{}, tmp string, nameFile string, orientation string) string {\n\tt, err := c.template.Get(tmp)\n\tif err != nil {\n\t\treturn \"1\"\n\t}\n\n\tbuff := bytes.NewBuffer([]byte{})\n\terr = t.Execute(buff, templateData)\n\tif err != nil {\n\t\tc.reporter.Errorf(\"[handlePDF] Failed execute pdf, err: %s\", err.Error())\n\t\treturn \"1\"\n\t}\n\n\tpdfBuffer := bytes.NewBuffer([]byte{})\n\tgen, err := wkhtmltopdf.NewPDFGenerator()\n\tif err != nil {\n\t\tc.reporter.Errorf(\"[handlePDF] Failed generate pdf, err: %s\", err.Error())\n\t\treturn \"1\"\n\t}\n\n\tif orientation == \"Landscape\" {\n\t\tgen.Orientation.Set(wkhtmltopdf.OrientationLandscape)\n\t\tgen.MarginBottom.Set(0)\n\t\tgen.MarginTop.Set(0)\n\t\tgen.MarginLeft.Set(0)\n\t\tgen.MarginRight.Set(0)\n\t}\n\tgen.SetOutput(pdfBuffer)\n\tgen.AddPage(wkhtmltopdf.NewPageReader(buff))\n\tgen.Create()\n\n\tb := pdfBuffer.Bytes()\n\tb64Pdf := base64.StdEncoding.EncodeToString(b)\n\n\treturn b64Pdf\n}", "func getFile(doc *job.Document, c chan<- *job.Document, e chan<- error) {\n\tdata, err := doc.Get()\n\tif err != nil {\n\t\te <- fmt.Errorf(\"%v: %v\", doc.Key, err)\n\t\treturn\n\t}\n\tpath := doc.LocalPath()\n\terr = ioutil.WriteFile(path, data, 0644)\n\tif err != nil {\n\t\te <- fmt.Errorf(\"%v: %v\", doc.Key, err)\n\t\treturn\n\t}\n\terr = doc.GetMetadata(cpdf.New(path, doc.Id()))\n\tif err != nil {\n\t\te <- fmt.Errorf(\"while extracting metadata from '%v': %v\", doc.Key, err)\n\t\treturn\n\t}\n\tc <- doc\n}", "func (f StorageFilePdf) construct() StorageFileTypeClass { return &f }", "func (pm *procMan) WritePID(t *testing.T, pid int) {\n\tpm.Lock()\n\tdefer pm.Unlock()\n\tpsProc, err := ps.FindProcess(pid)\n\tif err != nil {\n\t\tt.Fatalf(\"cannot inspect proc %d: %s\", pid, err)\n\t}\n\tif psProc == nil {\n\t\ttime.Sleep(time.Second)\n\t\tpsProc, err := ps.FindProcess(pid)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"cannot inspect proc %d: %s\", pid, err)\n\t\t}\n\t\tif psProc == nil {\n\t\t\tt.Logf(\"Warning! Possibly orphaned PID: %d\", pid)\n\t\t\treturn\n\t\t}\n\t}\n\n\tpidFile := pm.PIDFile\n\n\tvar f *os.File\n\tif s, err := os.Stat(pidFile); err != nil {\n\t\tif !isNotExist(err) {\n\t\t\tt.Fatalf(\"could not stat %q: %s\", pidFile, err)\n\t\t\treturn\n\t\t}\n\t\tif s != nil && s.IsDir() {\n\t\t\tt.Fatalf(\"cannot write to file %q: it's a directory\", pidFile)\n\t\t}\n\t\tf, err = os.Create(pidFile)\n\t\tdefer closeFiles(f)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"could not create %q: %s\", pidFile, err)\n\t\t}\n\t}\n\tif f == nil {\n\t\tvar err error\n\t\tf, err = os.OpenFile(pidFile, os.O_APPEND|os.O_WRONLY, os.ModeAppend)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"could not open %q: %s\", pidFile, err)\n\t\t\treturn\n\t\t}\n\t\tdefer closeFiles(f)\n\t}\n\tif psProc == nil {\n\t\tt.Logf(\"Warning! Unable to write PID %d to pidfile: psProc became nil all of a sudden\", pid)\n\t\treturn\n\n\t}\n\tif _, err := fmt.Fprintf(f, \"%d\\t%s\\n\", pid, psProc.Executable()); err != nil {\n\t\tt.Fatalf(\"could not write PID %d (exe %s) to file %q: %s\",\n\t\t\tpid, psProc.Executable(), pidFile, err)\n\t}\n}", "func (p *Page) Print() {\n\tout, err := os.Create(p.url)\n\n\tif err != nil {\n\t\tfmt.Printf(\"Could not create file [%s].\\n\", p.url)\n\t\tpanic(err)\n\t}\n\tdefer out.Close()\n\n\t// Print header.\n\tFprintHeader(out, p.title)\n\n\t// Print title.\n\tfmt.Fprintf(out, \"<h1>%s</h1>\\n\\n\", p.title)\n\n\t// Print contents.\n\tfmt.Fprintf(out, \"%s\\n\\n\", Markdown(p.content))\n\n\t// Print index link.\n\tfmt.Fprintf(out, \"<a href=\\\"%s\\\">[index]</a>\\n\", GetURL(p.burl))\n\n\t// Print footer.\n\tFprintFooter(out)\n}", "func (o *FileInfoCreateParams) SetInfo(info *models.FileInfo) {\n\to.Info = info\n}", "func processAndPrint(sdet util.Servicedetail,templateFile string) {\n\tif !strings.HasSuffix(templateFile,\".gohtml\") {\n\t\tfmt.Printf(\"Template file %s does not end with .gohtml\\n\",templateFile)\n\t\treturn\n\t}\n\n\ttargetFile := strings.TrimSuffix(templateFile,\".gohtml\")\n\tf, err := os.Create(targetFile)\n\tif err != nil {\n\t\tfmt.Printf(\"Could not open file %s for writing.Err = %s\\n\",targetFile,err.Error())\n\t\treturn\n\t}\n\n\tdefer f.Close()\n\n\ttpl, err := template.ParseFiles(templateFile)\n\tif err != nil {\n\t\tfmt.Printf(\"uh oh problem with template.err = %s\\n\", err.Error())\n\t\treturn\n\t}\n\n\ttpl.Execute(f, sdet)\n}", "func (p *PdfiumImplementation) FPDF_SaveWithVersion(request *requests.FPDF_SaveWithVersion) (*responses.FPDF_SaveWithVersion, error) {\n\tp.Lock()\n\tdefer p.Unlock()\n\n\tdocumentHandle, err := p.getDocumentHandle(request.Document)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\twriter := C.FPDF_FILEWRITE{}\n\twriter.version = 1\n\n\t// Set the Go callback through cgo.\n\tC.FPDF_FILEWRITE_SET_WRITE_BLOCK(&writer)\n\n\tvar fileBuf *bytes.Buffer\n\tvar curFile *os.File\n\tif request.FileWriter != nil {\n\t\tcurrentWriter = request.FileWriter\n\t} else if request.FilePath != nil {\n\t\tnewFile, err := os.Create(*request.FilePath)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcurrentWriter = newFile\n\t\tcurFile = newFile\n\t} else {\n\t\tfileBuf = &bytes.Buffer{}\n\t\tcurrentWriter = fileBuf\n\t}\n\n\tdefer func() {\n\t\t// Always remove writer.\n\t\tcurrentWriter = nil\n\n\t\tif curFile != nil {\n\t\t\tcurFile.Close()\n\t\t}\n\t}()\n\n\tvar success C.int\n\tif request.FileVersion == 0 {\n\t\tsuccess = C.FPDF_SaveAsCopy(documentHandle.handle, &writer, C.ulong(request.Flags))\n\t} else {\n\t\tsuccess = C.FPDF_SaveWithVersion(documentHandle.handle, &writer, C.ulong(request.Flags), C.int(request.FileVersion))\n\t}\n\n\tif int(success) == 0 {\n\t\treturn nil, errors.New(\"save of document failed\")\n\t}\n\n\tresp := &responses.FPDF_SaveWithVersion{}\n\tif request.FilePath != nil {\n\t\tresp.FilePath = request.FilePath\n\t}\n\n\tif fileBuf != nil {\n\t\tpdfContent := fileBuf.Bytes()\n\t\tresp.FileBytes = &pdfContent\n\t}\n\n\treturn resp, nil\n}", "func PrimaryDocumentation() {\n\tdocNum := 0\n\tfor {\n\t\t_ = ioutil.WriteFile(\"system/primary_doc\"+strconv.Itoa(ElevatorID)+\".txt\", []byte(strconv.FormatInt(int64(docNum), 10)), 0644)\n\t\ttime.Sleep(1*time.Second)\n\t\tdocNum += 1\n\t}\n}", "func addImageToPdf(inputPath string, outputPath string, imagePath string, pageNum int, xPos float64, yPos float64, iwidth float64) error {\n\tc := creator.New()\n\n\t// Prepare the image.\n\timg, err := c.NewImageFromFile(imagePath)\n\tif err != nil {\n\t\treturn err\n\t}\n\timg.ScaleToWidth(iwidth)\n\timg.SetPos(xPos, yPos)\n\n\t// Optionally, set an encoder for the image. If none is specified, the\n\t// encoder defaults to core.FlateEncoder, which applies lossless compression\n\t// to the image stream. However, core.FlateEncoder tends to produce large\n\t// image streams which results in large output file sizes.\n\t// However, the encoder can be changed to core.DCTEncoder, which applies\n\t// lossy compression (this type of compression is used by JPEG images) in\n\t// order to reduce the output file size.\n\tencoder := core.NewDCTEncoder()\n\t// The default quality is 75. There is not much difference in the image\n\t// quality between 75 and 100 but the size difference when compressing the\n\t// image stream is signficant.\n\t// encoder.Quality = 100\n\timg.SetEncoder(encoder)\n\n\t// Read the input pdf file.\n\tf, err := os.Open(inputPath)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer f.Close()\n\n\tpdfReader, err := model.NewPdfReader(f)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tnumPages, err := pdfReader.GetNumPages()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Load the pages.\n\tfor i := 0; i < numPages; i++ {\n\t\tpage, err := pdfReader.GetPage(i + 1)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// Add the page.\n\t\terr = c.AddPage(page)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// If the specified page, or -1, apply the image to the page.\n\t\tif i+1 == pageNum || pageNum == -1 {\n\t\t\t_ = c.Draw(img)\n\t\t}\n\t}\n\n\terr = c.WriteToFile(outputPath)\n\treturn err\n}", "func newDoc(c *gin.Context) {\n\tkey := uuid.New()\n\tres := saveDocument(key, c)\n\tif res.Ok == false {\n\t\tif res.Message == \"file exists\" {\n\t\t\tc.JSON(fileExistsErr, res)\n\t\t} else {\n\t\t\tlog.Printf(\"Error saving document: %s\", res.Error)\n\t\t\tc.JSON(statusErr, res)\n\t\t}\n\t} else {\n\t\tc.JSON(statusOk, res)\n\t}\n}", "func (r renderer) DocumentHeader(out *bytes.Buffer) {}", "func Setup(f *gofpdf.Fpdf) {\n\tf.SetMargins(20, 20, 20) // left, top, right margins\n\tf.SetAutoPageBreak(true, 20) // bottom margin\n\tf.AddPage()\n\tf.SetFillColor(255, 255, 255)\n\tf.SetTextColor(36, 41, 46)\n}", "func PdfToCloudVision(ctx context.Context, e GCSEvent) error {\n\tlog.Printf(\"Bucket: %v\\n\", e.Bucket)\n\tlog.Printf(\"File: %v\\n\", e.Name)\n\n\tif strings.HasSuffix(e.Name, \".pdf\") {\n\t\tif err := setup(ctx); err != nil {\n\t\t\treturn fmt.Errorf(\"Setup Error: %v\", err)\n\t\t}\n\n\t\tif resultBucket == \"\" {\n\t\t\treturn fmt.Errorf((\"RESULT_BUCKET is empty\"))\n\t\t}\n\n\t\tlog.Printf(\"Searching text in %v\", e.Name)\n\n\t\trequest := &visionpb.BatchAnnotateFilesRequest{\n\t\t\tRequests: []*visionpb.AnnotateFileRequest{\n\t\t\t\t{\n\t\t\t\t\tFeatures: []*visionpb.Feature{\n\t\t\t\t\t\t{Type: visionpb.Feature_DOCUMENT_TEXT_DETECTION},\n\t\t\t\t\t},\n\t\t\t\t\tInputConfig: &visionpb.InputConfig{\n\t\t\t\t\t\tGcsSource: &visionpb.GcsSource{Uri: fmt.Sprintf(\"gs://%s/%s\", e.Bucket, e.Name)},\n\t\t\t\t\t\tMimeType: \"application/pdf\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\n\t\tres, err := visionClient.BatchAnnotateFiles(ctx, request)\n\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Detext texts faild: %v\", err)\n\t\t}\n\n\t\tfirstResp := res.Responses[0]\n\n\t\tresultFileName := strings.Replace(e.Name, \".pdf\", \".txt\", 1)\n\t\tfullTextBuilder := strings.Builder{}\n\n\t\tfor _, v := range firstResp.Responses {\n\t\t\tfullTextBuilder.WriteString(v.FullTextAnnotation.Text)\n\t\t}\n\n\t\twriter := storageClient.Bucket(resultBucket).Object(resultFileName).NewWriter(ctx)\n\t\twriter.ContentType = \"text/plain; charset=\\\"utf-8\\\"\"\n\n\t\tdefer writer.Close()\n\n\t\tif _, err := writer.Write([]byte(fullTextBuilder.String())); err != nil {\n\t\t\treturn fmt.Errorf(\"Writing Result faild: %v\", err)\n\t\t}\n\t}\n\n\treturn nil\n}", "func createSignatureField(option *SignOption, handler model.SignatureHandler, certChain ...*x509.Certificate) (*model.PdfFieldSignature, *model.PdfSignature, error) {\n\t// Create new signature.\n\tsignature := model.NewPdfSignature(handler)\n\n\tif len(certChain) > 0 {\n\t\t// Create PDF array object which will contain the certificate chain data,\n\t\t// The first element of the array must be the signing certificate.\n\t\t// The rest of the certificate chain is used for validating the authenticity\n\t\t// of the signing certificate.\n\t\tpdfCerts := core.MakeArray()\n\t\tfor _, cert := range certChain {\n\t\t\tpdfCerts.Append(core.MakeString(string(cert.Raw)))\n\t\t}\n\n\t\tsignature.Cert = pdfCerts\n\t}\n\n\tif err := signature.Initialize(); err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tnow := time.Now()\n\tsignature.SetName(option.Fullname)\n\tsignature.SetReason(option.Reason)\n\tsignature.SetDate(now, \"D:20060102150405-07'00'\")\n\tsignature.SetLocation(option.Location)\n\n\t// Create signature field and appearance.\n\tsignatureFields := make([]*annotator.SignatureLine, 0)\n\topts := annotator.NewSignatureFieldOpts()\n\n\t// Only when annotate option is enabled.\n\tif option.Annotate {\n\t\tif option.FontSize > 0 {\n\t\t\topts.FontSize = float64(option.FontSize)\n\t\t}\n\n\t\t// Set default position.\n\t\topts.Rect = []float64{10, 25, 75, 60}\n\t\tif option.Position != nil && len(option.Position) == 4 {\n\t\t\topts.Rect = option.Position\n\t\t}\n\n\t\tsignatureFields = append(signatureFields,\n\t\t\tannotator.NewSignatureLine(\"Signed By\", option.Fullname),\n\t\t\tannotator.NewSignatureLine(\"Date\", now.Format(time.RFC1123)),\n\t\t\tannotator.NewSignatureLine(\"Reason\", option.Reason),\n\t\t\tannotator.NewSignatureLine(\"Location\", option.Location),\n\t\t)\n\n\t\tfor k, v := range option.Extra {\n\t\t\tsignatureFields = append(signatureFields, annotator.NewSignatureLine(k, v))\n\t\t}\n\t}\n\n\tfield, err := annotator.NewSignatureField(\n\t\tsignature,\n\t\tsignatureFields,\n\t\topts,\n\t)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tfield.T = core.MakeString(\"External Signature\")\n\n\treturn field, signature, nil\n}", "func (*CreateDocumentRequest) Descriptor() ([]byte, []int) {\n\treturn file_ssn_dataservice_v1_dataservice_proto_rawDescGZIP(), []int{5}\n}", "func GeneratePayslipPdf(wg *sync.WaitGroup, employee models.Employee, pdfPath string) {\n\tdefer wg.Done()\n\tgrayColor := getGrayColor()\n\ttitle, employerName, employeeName, payPeriod, payDate, designation, workDays,\n\t\tctc, netSalary, absence, signature, tableHeader, contents := generatePayslipContent(employee)\n\tm := pdf.NewMaroto(consts.Portrait, consts.A4)\n\tm.SetPageMargins(10, 5, 10)\n\tm.RegisterHeader(func() {\n\t\tm.Row(30, func() {\n\t\t\tm.Col(6, func() {\n\t\t\t\tm.Text(title, props.Text{\n\t\t\t\t\tTop: 0,\n\t\t\t\t\tSize: 50,\n\t\t\t\t\tStyle: consts.Bold,\n\t\t\t\t\tAlign: consts.Left,\n\t\t\t\t\tExtrapolate: false,\n\t\t\t\t\tFamily: consts.Courier,\n\t\t\t\t})\n\t\t\t})\n\t\t})\n\t})\n\tm.Row(10, func() {\n\t\tm.Col(6, func() {\n\t\t\tm.Text(employerName, props.Text{\n\t\t\t\tTop: 5,\n\t\t\t\tFamily: consts.Helvetica,\n\t\t\t\tSize: 12,\n\t\t\t\tAlign: consts.Left,\n\t\t\t\tExtrapolate: false,\n\t\t\t})\n\t\t})\n\t\tm.Col(6, func() {\n\t\t\tm.Text(payPeriod, props.Text{\n\t\t\t\tTop: 5,\n\t\t\t\tFamily: consts.Helvetica,\n\t\t\t\tSize: 12,\n\t\t\t\tAlign: consts.Right,\n\t\t\t\tExtrapolate: false,\n\t\t\t})\n\t\t})\n\t})\n\tm.Row(10, func() {\n\t\tm.Col(6, func() {\n\t\t\tm.Text(employeeName, props.Text{\n\t\t\t\tTop: 2,\n\t\t\t\tFamily: consts.Helvetica,\n\t\t\t\tSize: 12,\n\t\t\t\tAlign: consts.Left,\n\t\t\t\tExtrapolate: false,\n\t\t\t})\n\t\t})\n\t\tm.Col(6, func() {\n\t\t\tm.Text(payDate, props.Text{\n\t\t\t\tTop: 2,\n\t\t\t\tFamily: consts.Helvetica,\n\t\t\t\tSize: 12,\n\t\t\t\tAlign: consts.Right,\n\t\t\t\tExtrapolate: false,\n\t\t\t})\n\t\t})\n\t})\n\tm.Line(10)\n\n\tm.Row(8, func() {\n\t\tm.Col(6, func() {\n\t\t\tm.Text(designation, props.Text{\n\t\t\t\tSize: 10,\n\t\t\t\tAlign: consts.Left,\n\t\t\t\tExtrapolate: false,\n\t\t\t})\n\t\t})\n\t\tm.Col(6, func() {\n\t\t\tm.Text(workDays, props.Text{\n\t\t\t\tSize: 10,\n\t\t\t\tAlign: consts.Right,\n\t\t\t\tExtrapolate: false,\n\t\t\t})\n\t\t})\n\t})\n\tm.Row(5, func() {\n\t\tm.Col(4, func() {\n\t\t\tm.Text(ctc, props.Text{\n\t\t\t\tSize: 10,\n\t\t\t\tAlign: consts.Left,\n\t\t\t\tExtrapolate: false,\n\t\t\t})\n\t\t})\n\t\tm.Col(4, func() {\n\t\t\tm.Text(netSalary, props.Text{\n\t\t\t\tSize: 10,\n\t\t\t\tAlign: consts.Center,\n\t\t\t\tExtrapolate: false,\n\t\t\t})\n\t\t})\n\t\tm.Col(4, func() {\n\t\t\tm.Text(absence, props.Text{\n\t\t\t\tSize: 10,\n\t\t\t\tAlign: consts.Right,\n\t\t\t\tExtrapolate: false,\n\t\t\t})\n\t\t})\n\t})\n\tm.Line(10)\n\tm.Row(20, func() {})\n\tm.TableList(tableHeader, contents, props.TableList{\n\t\tHeaderProp: props.TableListContent{\n\t\t\tSize: 12,\n\t\t\tGridSizes: []uint{6, 6},\n\t\t},\n\t\tContentProp: props.TableListContent{\n\t\t\tSize: 10,\n\t\t\tGridSizes: []uint{6, 6},\n\t\t},\n\t\tAlign: consts.Center,\n\t\tHeaderContentSpace: 5,\n\t\tAlternatedBackground: &grayColor,\n\t\tLine: true,\n\t})\n\tm.Row(40, func() {\n\n\t})\n\tm.Row(20, func() {\n\t\tm.ColSpace(6)\n\t\tm.Col(6, func() {\n\t\t\tm.Text(employee.Company_Name, props.Text{\n\t\t\t\tTop: 8,\n\t\t\t\tFamily: consts.Courier,\n\t\t\t\tSize: 8,\n\t\t\t\tAlign: consts.Center,\n\t\t\t\tExtrapolate: false,\n\t\t\t})\n\t\t\tm.Signature(signature, props.Font{\n\t\t\t\tFamily: consts.Helvetica,\n\t\t\t\tStyle: consts.Italic,\n\t\t\t\tSize: 12,\n\t\t\t})\n\t\t})\n\t})\n\tpdfPath = pdfPath + fmt.Sprintf(\"/%s-%s.pdf\", employee.Employee_Name, employee.Pay_Period)\n\terr := m.OutputFileAndClose(pdfPath)\n\tif err != nil {\n\t\terrDesc := fmt.Sprintf(\"Could not save payslip for: %s\", employee.Employee_Name)\n\t\tfmt.Println(errDesc, err)\n\t\treturn\n\t}\n\tsuccessDesc := fmt.Sprintf(\"Payslip generated for employee: %s\", employee.Employee_Name)\n\tfmt.Println(successDesc)\n}", "func (m *PrinterCreateOperation) Serialize(writer i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.SerializationWriter)(error) {\n err := m.PrintOperation.Serialize(writer)\n if err != nil {\n return err\n }\n {\n err = writer.WriteStringValue(\"certificate\", m.GetCertificate())\n if err != nil {\n return err\n }\n }\n {\n err = writer.WriteObjectValue(\"printer\", m.GetPrinter())\n if err != nil {\n return err\n }\n }\n return nil\n}", "func (m *PrinterCreateOperation) Serialize(writer i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.SerializationWriter)(error) {\n err := m.PrintOperation.Serialize(writer)\n if err != nil {\n return err\n }\n {\n err = writer.WriteStringValue(\"certificate\", m.GetCertificate())\n if err != nil {\n return err\n }\n }\n {\n err = writer.WriteObjectValue(\"printer\", m.GetPrinter())\n if err != nil {\n return err\n }\n }\n return nil\n}", "func (*ReqSaveDocument) Descriptor() ([]byte, []int) {\n\treturn file_search_proto_rawDescGZIP(), []int{1}\n}", "func (a *attachUp) AddDoc(p, n string) AttachmentUploader {\n\ta.d = append(a.d, p)\n\tif n == \"\" {\n\t\tn = filepath.Base(p)\n\t}\n\ta.dn = append(a.dn, n)\n\treturn a\n}" ]
[ "0.5771785", "0.57302326", "0.54646504", "0.53362805", "0.5308433", "0.53021276", "0.50320226", "0.501289", "0.4978011", "0.49645504", "0.49591908", "0.49384385", "0.48863402", "0.48383003", "0.48352864", "0.48336372", "0.48251352", "0.47946233", "0.47817183", "0.47696257", "0.47290212", "0.46453065", "0.4635072", "0.46126494", "0.46115157", "0.45880815", "0.45792437", "0.45578352", "0.45515573", "0.45008892", "0.44778368", "0.4470576", "0.44634387", "0.44518477", "0.4441952", "0.4429921", "0.44148576", "0.4409955", "0.4409101", "0.43866763", "0.43481094", "0.4347504", "0.4324929", "0.43238112", "0.43098912", "0.43037683", "0.43018606", "0.42915255", "0.4279968", "0.4274893", "0.42677897", "0.4264926", "0.426126", "0.4247737", "0.42277128", "0.42182717", "0.4201349", "0.4194017", "0.41762745", "0.41744468", "0.41644233", "0.41393915", "0.4134705", "0.4129291", "0.41255558", "0.4123821", "0.41232243", "0.41210783", "0.41197577", "0.41122657", "0.40957433", "0.4095397", "0.40940455", "0.40919128", "0.40877092", "0.40852678", "0.40649074", "0.40617988", "0.40575162", "0.40538487", "0.40486273", "0.40482637", "0.4033264", "0.40325436", "0.4029246", "0.40155667", "0.40062937", "0.40052074", "0.39993408", "0.39974937", "0.39957637", "0.3993449", "0.3988887", "0.398865", "0.39859748", "0.39839557", "0.3975943", "0.3975943", "0.39743218", "0.3973787" ]
0.6340151
0
Set sets the database name, and initializes the database
func Set(database Type) error { dbName = database.InfluxDb if err := dbName.Initialize(); err != nil { return err } return nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func SetDatabase(database *db.Resource) {\n\tResource = database\n\tclassCollection{}.Start()\n\tuserCollection{}.Start()\n\tquizCollection{}.Start()\n}", "func (m *MongoDB) SetDatabase(name string) {\n\tm.db = m.client.Database(name)\n}", "func (d *dbs) Set(db Db) error {\n\td.mutex.Lock()\n\tdefer d.mutex.Unlock()\n\n\t\t\t\t\t\tlog.Print(\"---- The postgresql database set 01\")\n\t\t\t\t\t\t\n\tif db == nil || !db.Loaded() {\n\t\treturn fmt.Errorf(\"The database could not be loaded\")\n\t}\n\n\tname := db.GetName()\n\n\t_dbs := d.Databases[name]\n\t\t\t\t\t\tlog.Print(\"---- The postgresql database set 02\")\n\t_dbs.Pool = append(_dbs.Pool, db)\n\n\tif db.IsMaster() {\n\t\t_dbs.Master = db\n\t}\n\n\td.Databases[name] = _dbs\n\t\t\t\t\t\tlog.Print(\"---- The postgresql database set 03\")\n\treturn nil\n}", "func SetDB(db *sql.DB) {\n\tproductionDB = db\n}", "func SetDB(db *config.DatabaseCfg) {\n\tdbc = db\n}", "func SetCurrentDB(dbName string) error {\n\tmu.Lock()\n\tdefer mu.Unlock()\n\tif dbName == \"\" {\n\t\treturn errors.New(\"Must specifiy databse to be set\")\n\t}\n\tif state[\"currentDB\"].(string) == dbName {\n\t\treturn nil\n\t}\n\tclient := state[\"dbClient\"].(driver.Client)\n\tdb, err := client.Database(nil, dbName)\n\tif err == nil {\n\t\tstate[\"currentDB\"] = dbName\n\t\tcurrentDB = db\n\t}\n\treturn err\n}", "func SetDBName(dbname string) func(*MGO) error {\n\treturn func(m *MGO) error {\n\t\tm.dbname = dbname\n\t\treturn nil\n\t}\n}", "func SetDefaultDB(defDB string) {\n\tdefaultDB = defDB\n}", "func setDB(newdb *gorm.DB) {\n\tonce.Do(func() {\n\t\tdb = newdb\n\t})\n}", "func (options *DBOptions) SetDatabase(name string) *DBOptions {\n\toptions.databaseName = name\n\treturn options\n}", "func SetDatabaseConfig(datab Database) (error) {\n\tdb, err := sql.Open(\"mysql\", datab.Username+\":\"+datab.Password+\"@/\"+datab.Database)\n\tdefer db.Close()\n\tif (err == nil) {\n\t\tdatabase = datab\n\t\tfmt.Println(\"Able to open Connection to database\")\n\t}\n\treturn err\n}", "func (p Config) SetDB(conn *gorm.DB) {\n\tdb = conn\n}", "func (s *DatabaseServerV3) SetDatabase(database Database) error {\n\tdatabaseV3, ok := database.(*DatabaseV3)\n\tif !ok {\n\t\treturn trace.BadParameter(\"expected *DatabaseV3, got %T\", database)\n\t}\n\ts.Spec.Database = databaseV3\n\treturn nil\n}", "func SetDBOne(host, database, user, pass string) {\n\tdbInfo = &model.DBInfo{\n\t\tHosts: []*model.DBHost{\n\t\t\t&model.DBHost{\n\t\t\t\tAddress: host,\n\t\t\t\tDatabases: []*model.DBDatabase{&model.DBDatabase{Name: database}},\n\t\t\t\tUser: user,\n\t\t\t\tPassword: pass,\n\t\t\t},\n\t\t},\n\t}\n}", "func SetDB(conn *gorm.DB) {\n\tdb = conn\n}", "func (mc *MongoClient) SetDatabase(dbname string) *MongoClient {\n\tmc.dbname = dbname\n\treturn mc\n}", "func SetDatabase(database *gocb.Bucket) {\n\tdb = database\n}", "func (o *OracleDatabase) Set(ctx context.Context, req *state.SetRequest) error {\n\treturn o.dbaccess.Set(ctx, req)\n}", "func SetDB(db *gorm.DB) {\n\tDB = db\n\tDB.AutoMigrate(&Reservation{}, &User{})\n}", "func SetSQLiteDB(ctx context.Context, db *sqlx.DB) {\n\tb, err := ioutil.ReadFile(\"../create-schema.sqlite.sql\")\n\n\tif err != nil {\n\t\tfmt.Println(\"error: cannot load ../create-schema.sqlite.sql\")\n\t\tpanic(err)\n\t}\n\n\tdb.MustExecContext(ctx, string(b))\n}", "func (a *adapter) SetDatabaseName(s string) {\n\ta.database = s\n}", "func Setup() (*sql.DB, error) {\n\n\tdbUser := config.GetString(\"database.user\")\n\tdbPasswd := config.GetString(\"database.passwd\")\n\tdbHost := config.GetString(\"database.host\")\n\tdbName := config.GetString(\"database.name\")\n\tdbConnection := config.GetString(\"database.connection\")\n\tconnectionString := dbUser + \":\" + dbPasswd + \"@\" + dbConnection + \"(\" + dbHost + \")\" + \"/\" + dbName + \"?charset=utf8\"\n\n\tdb, err := sql.Open(\"mysql\", connectionString)\n\n\tif err != nil {\n\t\tprint(\"sql open:\" + err.Error())\n\t\treturn nil, err\n\t}\n\n\t// Ping the database once since Open() doesn't open a connection\n\terr = db.Ping()\n\tif err != nil {\n\t\tprint(\"do.ping:\" + err.Error())\n\t\treturn nil, err\n\t}\n\n\tDatabase = db\n\treturn Database, nil\n}", "func (storage *Storage) SetDbPath(dbPath string) {\n}", "func Database(name ...string) gdb.DB {\n\tconfig := Config()\n\tgroup := gdb.DEFAULT_GROUP_NAME\n\tif len(name) > 0 && name[0] != \"\" {\n\t\tgroup = name[0]\n\t}\n\tinstanceKey := fmt.Sprintf(\"%s.%s\", gFRAME_CORE_COMPONENT_NAME_DATABASE, group)\n\tdb := instances.GetOrSetFuncLock(instanceKey, func() interface{} {\n\t\t// Configuration already exists.\n\t\tif gdb.GetConfig(group) != nil {\n\t\t\tdb, err := gdb.Instance(group)\n\t\t\tif err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\t\t\treturn db\n\t\t}\n\t\tm := config.GetMap(\"database\")\n\t\tif m == nil {\n\t\t\tpanic(`database init failed: \"database\" node not found, is config file or configuration missing?`)\n\t\t}\n\t\t// Parse <m> as map-slice and adds it to gdb's global configurations.\n\t\tfor group, groupConfig := range m {\n\t\t\tcg := gdb.ConfigGroup{}\n\t\t\tswitch value := groupConfig.(type) {\n\t\t\tcase []interface{}:\n\t\t\t\tfor _, v := range value {\n\t\t\t\t\tif node := parseDBConfigNode(v); node != nil {\n\t\t\t\t\t\tcg = append(cg, *node)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\tcase map[string]interface{}:\n\t\t\t\tif node := parseDBConfigNode(value); node != nil {\n\t\t\t\t\tcg = append(cg, *node)\n\t\t\t\t}\n\t\t\t}\n\t\t\tif len(cg) > 0 {\n\t\t\t\tintlog.Printf(\"%s, %#v\", group, cg)\n\t\t\t\tgdb.SetConfigGroup(group, cg)\n\t\t\t}\n\t\t}\n\t\t// Parse <m> as a single node configuration,\n\t\t// which is the default group configuration.\n\t\tif node := parseDBConfigNode(m); node != nil {\n\t\t\tcg := gdb.ConfigGroup{}\n\t\t\tif node.LinkInfo != \"\" || node.Host != \"\" {\n\t\t\t\tcg = append(cg, *node)\n\t\t\t}\n\t\t\tif len(cg) > 0 {\n\t\t\t\tintlog.Printf(\"%s, %#v\", gdb.DEFAULT_GROUP_NAME, cg)\n\t\t\t\tgdb.SetConfigGroup(gdb.DEFAULT_GROUP_NAME, cg)\n\t\t\t}\n\t\t}\n\n\t\tif db, err := gdb.New(name...); err == nil {\n\t\t\t// Initialize logger for ORM.\n\t\t\tm := config.GetMap(fmt.Sprintf(\"database.%s\", qn_logGER_NODE_NAME))\n\t\t\tif m == nil {\n\t\t\t\tm = config.GetMap(qn_logGER_NODE_NAME)\n\t\t\t}\n\t\t\tif m != nil {\n\t\t\t\tif err := db.GetLogger().SetConfigWithMap(m); err != nil {\n\t\t\t\t\tpanic(err)\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn db\n\t\t} else {\n\t\t\tpanic(err)\n\t\t}\n\t\treturn nil\n\t})\n\tif db != nil {\n\t\treturn db.(gdb.DB)\n\t}\n\treturn nil\n}", "func StartDatabase(driverName string, dataSourceName string) (db *sql.DB, err error) {\n\n\tdb, err = sql.Open(driverName, dataSourceName)\n\n\treturn db, err\n}", "func initDatabase() {\n\tif dbPath == \"\" {\n\t\t// No path provided, use the default path\n\t\tdbPath = getDefaultDBPath()\n\t}\n\t// Start the database\n\tdb, err := poddata.New(dbPath)\n\tif err != nil {\n\t\tlogrus.Fatal(err.Error())\n\t}\n\tdata = db\n}", "func SetupDatabase(db *gorm.DB) error {\n\tDB = db\n\n\treturn nil\n}", "func InitDatabase(dbName *string, dst ...interface{}) {\n\tlog.Info().Msgf(\"Loading database %v\", *dbName)\n\tvar err error\n\tdbFile = sqlite.Open(fmt.Sprintf(\"%v.db\", *dbName))\n\tdatastore, err = gorm.Open(dbFile, &gorm.Config{\n\t\tDisableForeignKeyConstraintWhenMigrating: true,\n\t})\n\tif err != nil {\n\t\tpanic(\"failed to connect database\")\n\t}\n\n\t// Migrate the schema\n\terr = datastore.AutoMigrate(dst...)\n\tif err != nil {\n\t\tlog.Fatal().Err(err).Msg(\"Migration failed! Please check the logs!\")\n\t}\n}", "func InitDatabase() *sql.DB {\n\tlog.Println(\"connecting database.\")\n\n\tquery := url.Values{}\n\tquery.Add(\"database\", \"Company\")\n\n\tu := &url.URL{\n\t\tScheme: \"sqlserver\",\n\t\tUser: url.UserPassword(\"sa\", \"1234\"),\n\t\tHost: fmt.Sprintf(\"%s:%d\", \"localhost\", 1433),\n\t\t// Path: instance, // if connecting to an instance instead of a port\n\t\tRawQuery: query.Encode(),\n\t}\n\n\tlog.Println(u.String())\n\n\tcondb, err := sql.Open(\"sqlserver\", u.String())\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tlog.Println(\"test ping database.\")\n\tif err = condb.Ping(); err != nil {\n\t\tpanic(err)\n\t}\n\treturn condb\n}", "func setupDatabase(i int) string {\n\t// Indicate that this is the prod database and not the test.\n\tdbDir := filepath.Join(os.TempDir(), \"test\")\n\t// Create the directory if it doesn't exist.\n\tif _, err := os.Stat(dbDir); os.IsNotExist(err) {\n\t\tos.Mkdir(dbDir, 0755)\n\t}\n\n\tdb := filepath.Join(dbDir, fmt.Sprintf(\"tracer-test-db-%d.db\", i))\n\t// Delete any existing database entries.\n\tconfigure.DeleteDatabase(db)\n\n\treturn db\n}", "func (s *syncer) dbSetup() error {\n\ts.logger.Info(\"Connecting to the database\")\n\n\tsqlDB, err := sql.Open(\"sqlite3_with_fk\", s.config.Database)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Setup the DB struct\n\ts.db = sqlDB\n\n\t// We don't want multiple clients during setup\n\ts.db.SetMaxOpenConns(1)\n\n\t// Test the connection\n\terr = s.db.Ping()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Create the DB schema (if needed)\n\t_, err = s.db.Exec(schema)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Set the connection limit for the DB pool\n\ts.db.SetMaxOpenConns(10)\n\n\treturn nil\n}", "func (ctx *Context) SetPrincipalDB(w, ro *sql.DB) {\n\tif w == nil {\n\t\tpanic(\"write DB connection cannot be nil\")\n\t}\n\tctx.principalDBWrite, ctx.principalDBReadOnly = w, ro\n}", "func (o *Ga4ghExternalIdentifier) SetDatabase(v string) {\n\to.Database = &v\n}", "func (s *shard) DatabaseName() string { return s.databaseName }", "func Database(connString string) {\n\tnewLogger := logger.New(\n\t\tlog.New(os.Stdout, \"\\r\\n\", log.LstdFlags),\n\t\tlogger.Config{\n\t\t\tSlowThreshold: time.Second, // Slow SQL threshold\n\t\t\tLogLevel: logger.Silent, // Log level\n\t\t\tIgnoreRecordNotFoundError: true, // Ignore ErrRecordNotFound error for logger\n\t\t\tColorful: false, // Disable color\n\t\t},\n\t)\n\n\tdb, err := gorm.Open(postgres.Open(connString), &gorm.Config{\n\t\tLogger: newLogger,\n\t})\n\t\n\t// Error\n\tif err != nil {\n\t\tutil.Log().Panic(\"database connection failed\", err)\n\t}\n\n\t//setting connection pool\n\tsqlDB, err := db.DB()\n\tif err != nil {\n\t\tutil.Log().Panic(\"sqlDB failed\", err)\n\t}\n\n\t//idle\n\tsqlDB.SetMaxIdleConns(50)\n\t//open connections\n\tsqlDB.SetMaxOpenConns(100)\n\t//timeout\n\tsqlDB.SetConnMaxLifetime(time.Second * 30)\n\n\tglobal.GORM_DB = db\n\n\tmigration()\n}", "func InitDatabase() *Server {\n\tvar err error\n\n\tconnString := getConnString()\n\n\tlog.Printf(\"Setting connection to db with configuration: %s \\n\", connString)\n\n\tserver := &Server{}\n\tserver.db, err = sql.Open(\"sqlserver\", connString)\n\tif err != nil {\n\t\tlog.Fatal(\"Error opening connection: \", err.Error())\n\t}\n\n\tserver.db.SetConnMaxLifetime(time.Minute * 4)\n\n\treturn server\n}", "func SetupDatabase() {\n\tu := helper.GetEnv(\"DATABASE_USER\", \"golang\")\n\tp := helper.GetEnv(\"DATABSE_PASSWORD\", \"golang\")\n\th := helper.GetEnv(\"DATABASE_HOST\", \"localhost:3306\")\n\tn := helper.GetEnv(\"DATABASE_NAME\", \"go_test\")\n\tq := \"charset=utf8mb4&parseTime=True&loc=Local\"\n\n\t// Assemble the connection string.\n\tdsn := fmt.Sprintf(\"%s:%s@tcp(%s)/%s?%s\", u, p, h, n, q)\n\n\t// Connect to the database.\n\tdb, err := gorm.Open(mysql.Open(dsn), &gorm.Config{})\n\n\t// Migrate the schema\n\tdb.AutoMigrate(&User{})\n\n\tif err != nil {\n\t\tpanic(\"Could not open database connection\")\n\t}\n\n\tDB = db\n}", "func SetupDatabase(mgr ctrl.Manager, o controller.Options) error {\n\tname := managed.ControllerName(svcapitypes.DatabaseGroupKind)\n\topts := []option{\n\t\tfunc(e *external) {\n\t\t\te.preObserve = preObserve\n\t\t\te.postObserve = postObserve\n\t\t\te.preDelete = preDelete\n\t\t\te.postCreate = postCreate\n\t\t\te.preCreate = preCreate\n\t\t\te.lateInitialize = lateInitialize\n\t\t\te.isUpToDate = isUpToDate\n\t\t\te.preUpdate = preUpdate\n\t\t},\n\t}\n\n\tcps := []managed.ConnectionPublisher{managed.NewAPISecretPublisher(mgr.GetClient(), mgr.GetScheme())}\n\tif o.Features.Enabled(features.EnableAlphaExternalSecretStores) {\n\t\tcps = append(cps, connection.NewDetailsManager(mgr.GetClient(), v1alpha1.StoreConfigGroupVersionKind))\n\t}\n\n\treturn ctrl.NewControllerManagedBy(mgr).\n\t\tNamed(name).\n\t\tWithOptions(o.ForControllerRuntime()).\n\t\tFor(&svcapitypes.Database{}).\n\t\tComplete(managed.NewReconciler(mgr,\n\t\t\tresource.ManagedKind(svcapitypes.DatabaseGroupVersionKind),\n\t\t\tmanaged.WithExternalConnecter(&connector{kube: mgr.GetClient(), opts: opts}),\n\t\t\tmanaged.WithPollInterval(o.PollInterval),\n\t\t\tmanaged.WithLogger(o.Logger.WithValues(\"controller\", name)),\n\t\t\tmanaged.WithRecorder(event.NewAPIRecorder(mgr.GetEventRecorderFor(name))),\n\t\t\tmanaged.WithConnectionPublishers(cps...)))\n}", "func NewDatabase(databaseName string, reset bool) *sql.DB {\n\t// Use default name if not specified\n\tif databaseName == \"\" {\n\t\t// check if the storage directory exist, if not create it\n\t\tstorage, err := os.Stat(\"./storage\")\n\t\tif err != nil {\n\t\t\tos.Mkdir(\"./storage\", os.ModeDir)\n\t\t} else if !storage.IsDir() {\n\t\t\t// check if the storage is indeed a directory or not\n\t\t\tlog.Fatal(\"\\\"storage\\\" exist but is not a directory\")\n\t\t}\n\t\tdatabaseName = \"./storage/db.sqlite\"\n\t}\n\tif reset {\n\t\tos.Remove(databaseName)\n\t}\n\tdb, err := sql.Open(\"sqlite3\", databaseName)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tsqlStmt := `CREATE TABLE IF NOT EXISTS User (\n nick TEXT NOT NULL PRIMARY KEY,\n email TEXT);`\n\t_, err = db.Exec(sqlStmt)\n\tif err != nil {\n\t\tlog.Fatalf(\"%q: %s\\n\", err, sqlStmt)\n\t}\n\n\tdbPtr = db\n\treturn db\n}", "func Setup(testname string, t *testing.T) *sql.DB {\n\n\tdb, err := sql.Open(\"ramsql\", testname)\n\tif err != nil {\n\t\tt.Fatalf(\"Cannot open conn to ramsql: %s\\n\", err)\n\t}\n\n\terr = database.InitSchemas(db)\n\tif err != nil {\n\t\tt.Fatalf(\"Cannot setup database schemas: %s\", err)\n\t}\n\n\treturn db\n}", "func (this *MGOClient) UseDB(dbname string) error {\n if this.session == nil {\n return fmt.Errorf(\"invalid session object\")\n }\n\n this.database = this.session.DB(dbname)\n return nil\n}", "func setJornadaDB(journaley jornada) {\n\t_, err := database.Exec(\"call sp_insert_jornada(:1,:2)\", journaley.Nombre, journaley.Temporada)\n\tif err != nil {\n\t\tfmt.Println(\"Error in Query:\", err)\n\t\treturn\n\t}\n\n}", "func SetupDatabase(readerConfig, writerConfig Option) (reader, writer *sql.DB, err error) {\n\treader, err = createConnection(readerConfig)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\twriter, err = createConnection(writerConfig)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\treturn reader, writer, nil\n}", "func setupDatabase(driver string, db *sql.DB) error {\n\treturn ddl.Migrate(driver, db)\n}", "func (s *PvlSourceImpl) dbSet(ctx context.Context, hash libkb.PvlKitHash, pvl libkb.PvlKitString) {\n\tdb := s.G().LocalDb\n\tif db == nil {\n\t\ts.G().Log.CErrorf(ctx, \"storing pvl: no db\")\n\t\treturn\n\t}\n\tent := entry{\n\t\tDBVersion: dbVersion,\n\t\tHash: hash,\n\t\tPvlKit: pvl,\n\t}\n\terr := db.PutObj(dbKey, nil, ent)\n\tif err != nil {\n\t\ts.G().Log.CErrorf(ctx, \"storing pvl: %s\", err)\n\t}\n}", "func (db *StockDB) Setup(env Environment) *StockDB {\n\t// TODO(jhurwich) implement user/pass/address switch based on local or prod environment\n\tvar dbname, password, host, user, suffix string\n\tswitch env {\n\tcase Local:\n\t\tdbname = \"trendydb\"\n\t\tpassword = \"localpass\"\n\t\thost = \"localhost\"\n\t\tuser = \"localuser\"\n\t\tsuffix = \"?sslmode=disable\"\n\tcase Production:\n\t\t// TODO(jhurwich) define for production environment\n\tcase TestLocal:\n\t\tdbname = \"trendytestdb\"\n\t\tpassword = \"localpass\"\n\t\thost = \"localhost\"\n\t\tuser = \"localuser\"\n\t\tsuffix = \"?sslmode=disable\"\n\t}\n\tdbSource := fmt.Sprintf(\"postgres://%s:%s@%s/%s%s\", user, password, host, dbname, suffix)\n\n\t// initialize the db, note that it's a global object, it is never closed\n\tdb = &StockDB{*(sqlx.MustConnect(\"postgres\", dbSource))}\n\tdb.CreateIfNotExists()\n\tDB = db // not entirely sure why we need this line with the address assignment two up, but whatever\n\treturn db\n}", "func (s *DB) Set(name string, value interface{}) *DB {\n\treturn s.clone().InstantSet(name, value)\n}", "func SetStateDb() {\n\tgenCode(flagSetStateDb)\n}", "func InitDatabase(dsn string) error {\n\tfmt.Println(\"Init db connection\")\n\t// config := mysql.NewConfig()\n\t// config.User = username\n\t// config.Passwd = password\n\t// config.Net = protocol\n\t// config.Addr = host\n\t// config.DBName = database\n\t// config.Params = map[string]string{\n\t// \t\"charset\": charset,\n\t// \t\"parseTime\": \"True\",\n\t// }\n\tdb, err := gorm.Open(\"sqlite3\", dsn)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn err\n\t}\n\tDbConn = db\n\treturn nil\n}", "func (ac *CredentialAccessor) SetDB(db db.FabricCADB) {\n\tac.db = db\n}", "func (op *Options) DatabaseName(dbName string) *Options {\n\top.optFuncs = append(op.optFuncs, func(t *T) {\n\t\tt.dbName = dbName\n\t})\n\treturn op\n}", "func SetupDatabase() {\n\tvar err error\n\tDbConn, err = sql.Open(\"mysql\", \"root:Passw0rd123!@tcp(127.0.0.1:3306)/inventorydb\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tDbConn.SetMaxOpenConns(3)\n\tDbConn.SetMaxIdleConns(3)\n\tDbConn.SetConnMaxLifetime(60 * time.Second)\n}", "func (mc Wrapper) Database(name string) DataLayer {\n\treturn &WrapperDatabase{Database: mc.Client.Database(name)}\n}", "func InitDB(setting *domain.GlobalConfig) {\n\tsource := \"\"\n\tswitch setting.DBType {\n\tcase domain.SQLITE3:\n\t\tlogrus.Info(\"InitDB has done when new client, skip.\")\n\t\treturn\n\tcase domain.MYSQL:\n\t\tsource = fmt.Sprintf(\"%s:%s@tcp(%s:%s)/\",\n\t\t\tsetting.DBUser, setting.DBPassword, setting.DBHost, setting.DBPort)\n\tdefault:\n\t\tsource = fmt.Sprintf(\"%s:%s@tcp(%s:%s)/\",\n\t\t\tsetting.DBUser, setting.DBPassword, setting.DBHost, setting.DBPort)\n\t}\n\n\tdb, err := sql.Open(setting.DBType, source)\n\tif err != nil {\n\t\tlogrus.Fatalf(\"connection to db error: %s\", err)\n\t}\n\tdefer db.Close()\n\n\tsql := \"CREATE DATABASE IF NOT EXISTS \" + setting.DBName + \";\"\n\t_, err = db.Exec(sql)\n\tif err != nil {\n\t\tlogrus.Fatalf(\"create db %s error: %v\", setting.DBName, err)\n\t}\n}", "func InitializeDB() *Database {\n\tconfig := new(dbConfig)\n\tconfigFile, err := ioutil.ReadFile(\"config.yaml\")\n\terr = yaml.Unmarshal(configFile, &config)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tcredentials := fmt.Sprintf(\"%s:%s@/%s?charset=utf8&parseTime=True&loc=Local\", config.Database.DatabaseUser, config.Database.DatabasePassword, config.Database.Database)\n\tdialect := config.Database.DatabaseType\n\n\tdb, err := gorm.Open(dialect, credentials)\n\tif err != nil {\n\t\tlog.Fatal().Msgf(\"Failed to connect to Database. Reason: %v\\n\", err)\n\t}\n\tlog.Info().Msg(\"Successfully connected to qBot Database.\")\n\n\tdb.DB().SetConnMaxLifetime(time.Second * 100)\n\tdb.DB().SetMaxIdleConns(50)\n\tdb.DB().SetMaxOpenConns(200)\n\n\t//db.DropTableIfExists(models.User{}, models.Question{}, models.Answer{}) // Temp\n\t//db.DropTable(\"user_questions\", \"question_answers\", \"user_answers\") // Temp\n\tif err := db.AutoMigrate(models.User{}, models.Question{}, models.Answer{}).Error; err != nil {\n\t\tlog.Fatal().Msgf(\"Unable to migrate database. \\nReason: %v\", err)\n\t}\n\tlog.Info().Msg(\"Database migration successful.\")\n\treturn &Database{db}\n}", "func InitDB(dataSourceName string) {\n\n\t\tvar err error\n\t\tDB, err = sql.Open(\"postgres\", dataSourceName)\n\t\tif err != nil {\n\t\t\t\tlog.Println(err)\n\t\t}\n\n\t\tif err = DB.Ping(); err != nil {\n\t\t\t\tlog.Println(err)\n\t\t} else {\n\t\t\t\tlog.Println(\"Connection to db established!\")\n\t\t}\n\n}", "func WithDatabase(db string) Option {\n\treturn func(o *P) {\n\t\to.DB = db\n\t}\n}", "func init() {\n\tuser := \"root\"\n\tpass := \"pwpw\"\n\tname := \"itemsDB\"\n\n\tdbconf := user + \":\" + pass + \"@/\" + name\n\tconn, err := sql.Open(\"mysql\", dbconf)\n\tif err != nil {\n\t\tpanic(err.Error)\n\t}\n\tConn = conn\n}", "func (self PostgresDatabase) setDBVersion(version int) (err error) {\n log.Println(\"set db version to\", version)\n _, err = self.conn.Exec(\"DELETE FROM Settings WHERE name = $1\", \"version\")\n _, err = self.conn.Exec(\"INSERT INTO Settings(name, value) VALUES($1, $2)\", \"version\", fmt.Sprintf(\"%d\", version))\n return\n}", "func (s *Store) Database(name string) (di *DatabaseInfo, err error) {\n\terr = s.read(func(data *Data) error {\n\t\tdi = data.Database(name)\n\t\tif di == nil {\n\t\t\treturn errInvalidate\n\t\t}\n\t\treturn nil\n\t})\n\treturn\n}", "func (test *Test) SetupDatabase() error {\n\treturn errors.New(\"Not implemented yet\")\n}", "func Database(cnf config.DatabaseConfig) Configurator {\n\treturn func(instance *Storage) (err error) {\n\t\tdefer func() {\n\t\t\tif r := recover(); r != nil {\n\t\t\t\tswitch v := r.(type) {\n\t\t\t\tcase error:\n\t\t\t\t\terr = v\n\t\t\t\tdefault:\n\t\t\t\t\terr = errors.New(\"unknown panic\")\n\t\t\t\t}\n\t\t\t}\n\t\t}()\n\t\tinstance.exec = internal.New(cnf.DriverName())\n\t\tinstance.db, err = sql.Open(cnf.DriverName(), string(cnf.DSN))\n\t\tif err == nil {\n\t\t\tinstance.db.SetMaxOpenConns(cnf.MaxOpenConns)\n\t\t\tinstance.db.SetMaxIdleConns(cnf.MaxIdleConns)\n\t\t\tinstance.db.SetConnMaxLifetime(cnf.ConnMaxLifetime)\n\t\t}\n\t\treturn\n\t}\n}", "func SetDBInfo(ctx context.Context, info *model.DBInfo) {\n\tdbInfo = info\n}", "func NewDatabase(dataSourceName string) (*Database, error) {\n\tvar d Database\n\tvar err error\n\tif d.db, err = sql.Open(ScrapperDBDriver, dataSourceName); err != nil {\n\t\treturn nil, err\n\t}\n\tif err = d.scrapper.prepare(d.db); err != nil {\n\t\treturn nil, err\n\t}\n\tlog.Info(\"complete storage setting\")\n\treturn &d, nil\n}", "func InitDB() {\n\tdatabase, err := sql.Open(\"mysql\", \"jiraiya:Shivi<323@tcp(database-1.caqh2nel7qhl.us-east-2.rds.amazonaws.com:3306)/cumul\")\n\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\n\tDB = database\n}", "func NewDatabase(path, name string) *Database {\n\tdb, err := sql.Open(\"sqlite3\", path)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tschema, ok := schemas[name]\n\tif !ok {\n\t\tpanic(fmt.Errorf(\"Unknown schema: %q\", name))\n\t}\n\tthis := &Database{db: db}\n\tthis.apply(schema)\n\treturn this\n}", "func InitDatabase(database *models.Database) error {\n\tdb, err := getDatabase(database)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.Infof(\"Registering database: %s\", db.String())\n\tif err := db.Register(); err != nil {\n\t\treturn err\n\t}\n\n\tlog.Info(\"Register database completed\")\n\treturn nil\n}", "func (r *RdbReport) StartDatabase(n int) error {\n\treturn nil\n}", "func DB(name ...string) *sqlx.DB {\n\tif len(name) == 0 {\n\t\tif defaultDB == nil {\n\t\t\tlogger.Panic(fmt.Sprintf(\"yiigo: unknown db.%s (forgotten configure?)\", defaultConn))\n\t\t}\n\n\t\treturn defaultDB\n\t}\n\n\tv, ok := dbmap.Load(name[0])\n\n\tif !ok {\n\t\tlogger.Panic(fmt.Sprintf(\"yiigo: unknown db.%s (forgotten configure?)\", name[0]))\n\t}\n\n\treturn v.(*sqlx.DB)\n}", "func InitDB() {\n\tconnStr := \"user=osama dbname=hackernews password=ibnjunaid \"\n\t// Use root:dbpass@tcp(172.17.0.2)/hackernews, if you're using Windows.\n\tdb, err := sql.Open(\"postgres\", connStr)\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\tDb = db\n\n}", "func Open(dbpath string) {\n\tdb, err := OpenDB(dbpath)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tdefaultDB = db\n}", "func SetupDB() {\n\n\t// sqlite \"gorm.io/driver/sqlite\"\n\t//database, err := gorm.Open(sqlite.Open(\"database.db\"), &gorm.Config{})\n\n\t// mysql \"gorm.io/driver/mysql\"\n\t// dsn := \"root:@tcp(127.0.0.1:3306)/cmgostock?charset=utf8mb4&parseTime=True&loc=Local\"\n\t// database, err := gorm.Open(mysql.Open(dsn), &gorm.Config{})\n\n\t// postgresql \t\"gorm.io/driver/postgres\"\n\tdsn := \"host=10.82.69.121 user=postgres password=1234 dbname=cmgostock port=5432 sslmode=disable TimeZone=Asia/Bangkok\"\n\t//dsn := \"host=localhost user=postgres password=1234 dbname=cmgostock port=5432 sslmode=disable TimeZone=Asia/Bangkok\"\n\t database, err := gorm.Open(postgres.Open(dsn), &gorm.Config{})\n\tif err != nil {\n\t\tpanic(\"failed to connect database\")\n\t}\n\n\tdatabase.AutoMigrate(&model.User{})\n\tdatabase.AutoMigrate(&model.Product{})\n\tdatabase.AutoMigrate(&model.Transaction{})\n\n\tdb = database\n}", "func (s *SimpleBlockFactory) SetStateDB(sdb *state.ChainStateDB) {\n}", "func setupDB() error {\n\t// get parameters and initialize the database\n\tdbDriver := os.Getenv(\"MESSAGES_DB_DRIVER\")\n\tdbName := os.Getenv(\"MESSAGES_DB_NAME\")\n\tif dbDriver == \"\" || dbName == \"\" {\n\t\treturn errors.New(\"main: db driver or db name not set\")\n\t}\n\n\tif err := db.InitDB(dbDriver, dbName); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (h *Server) UseDataBase() *Server {\n\t//initialize the db.\n\tdb.OnInit()\n\treturn h\n}", "func NewDatabase(name string, root *doltdb.RootValue, ddb *doltdb.DoltDB, rs *env.RepoState) *Database {\n\treturn &Database{\n\t\tname: name,\n\t\troot: root,\n\t\tddb: ddb,\n\t\trs: rs,\n\t\tbatchMode: single,\n\t\ttables: make(map[string]*DoltTable),\n\t}\n}", "func (env *Env) InitDB(filename string) {\n\t// sqlite3 database\n\tdb, err := gorm.Open(\"sqlite3\", filename)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\t// setup schema\n\tdb.AutoMigrate(&WineInfo{})\n\n\tenv.db = db\n}", "func (sys *IAMSys) PolicyDBSet(name, policy string) error {\n\tobjectAPI := newObjectLayerFn()\n\tif objectAPI == nil {\n\t\treturn errServerNotInitialized\n\t}\n\n\tsys.Lock()\n\tdefer sys.Unlock()\n\n\treturn sys.policyDBSet(objectAPI, name, policy, false)\n}", "func (s *Manager) SetDatabaseConnection(ctx context.Context, project, dbAlias string, v config.CrudStub) error {\n\t// Acquire a lock\n\ts.lock.Lock()\n\tdefer s.lock.Unlock()\n\n\tprojectConfig, err := s.getConfigWithoutLock(project)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// update database config\n\tcoll, ok := projectConfig.Modules.Crud[dbAlias]\n\tif !ok {\n\t\tprojectConfig.Modules.Crud[dbAlias] = &config.CrudStub{Conn: v.Conn, Enabled: v.Enabled, Collections: map[string]*config.TableRule{}, Type: v.Type}\n\t} else {\n\t\tcoll.Conn = v.Conn\n\t\tcoll.Enabled = v.Enabled\n\t\tcoll.Type = v.Type\n\t}\n\n\tif err := s.modules.SetCrudConfig(project, projectConfig.Modules.Crud); err != nil {\n\t\tlogrus.Errorf(\"error setting crud config - %s\", err.Error())\n\t\treturn err\n\t}\n\n\treturn s.setProject(ctx, projectConfig)\n}", "func setupDatabase(db *sqlx.DB) error {\n\t// turn on write-ahead log and store temp tables on disk.\n\t_, err := db.Exec(`\n\t\tPRAGMA journal_mode=WAL;\n\t\tPRAGMA temp_store=1;\n\t\tPRAGMA foreign_keys=ON;\n\t\tPRAGMA encoding='UTF-8';\n\t`)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"execute PRAGMAs: %w\", err)\n\t}\n\n\ttx, err := db.Beginx()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"begin Tx: %w\", err)\n\t}\n\tdefer tx.Rollback()\n\n\tvar version int\n\tif err = tx.Get(&version, `PRAGMA user_version;`); err != nil {\n\t\treturn fmt.Errorf(\"PRAGMA user_version: %w\", err)\n\t}\n\tlog.Printf(\"[repo] current schema: %d\", version)\n\n\tswitch version {\n\tcase 0:\n\t\tlog.Printf(\"initialising database ...\")\n\t\t_, err = tx.Exec(`\n\t\t\t-- data table\n\t\t\tCREATE TABLE IF NOT EXISTS codepoints (\n\t\t\t\thex TEXT PRIMARY KEY,\n\t\t\t\tdec INTEGER,\n\t\t\t\tcategory TEXT,\n\t\t\t\tname TEXT,\n\t\t\t\taliases TEXT,\n\t\t\t\tentity TEXT\n\t\t\t);\n\t\t\t-- CREATE INDEX IF NOT EXISTS idx_hex ON codepoints(hex);\n\n\t\t\t-- full-text search\n\t\t\tCREATE VIRTUAL TABLE IF NOT EXISTS search USING FTS5(\n\t\t\t\tname,\n\t\t\t\taliases,\n\t\t\t\tentity,\n\t\t\t\thex,\n\t\t\t\tdec,\n\t\t\t\tcontent = 'codepoints',\n\t\t\t\ttokenize = \"unicode61 remove_diacritics 1 separators '-'\"\n\t\t\t);\n\n\t\t\tCREATE TRIGGER IF NOT EXISTS codepoints_ai AFTER INSERT ON codepoints\n\t\t\tBEGIN\n\t\t\t\tINSERT INTO search (rowid, name, aliases, entity, hex, dec)\n\t\t\t\t\tVALUES (new.rowid, new.name, new.aliases, new.entity, new.hex, new.dec);\n\t\t\tEND;\n\t\t\tCREATE TRIGGER IF NOT EXISTS codepoints_ad AFTER DELETE ON codepoints\n\t\t\tBEGIN\n\t\t\t\tINSERT INTO search (search, rowid, name, aliases, entity, hex, dec)\n\t\t\t\t\tVALUES ('delete', old.rowid, old.name, old.aliases, old.entity, old.hex, old.dec);\n\t\t\tEND;\n\t\t\tCREATE TRIGGER IF NOT EXISTS codepoints_au AFTER UPDATE ON codepoints\n\t\t\tBEGIN\n\t\t\t\tINSERT INTO search (search, rowid, name, aliases, entity, hex, dec)\n\t\t\t\t\tVALUES ('delete', old.rowid, old.name, old.aliases, old.entity, old.hex, old.dec);\n\t\t\t\tINSERT INTO search (rowid, name, aliases, entity, hex, dec)\n\t\t\t\t\tVALUES (new.rowid, new.name, new.aliases, new.entity, new.hex, new.dec);\n\t\t\tEND;\n\n\t\t\tPRAGMA user_version = 1;\n\t\t`)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"migrate to version 1: %w\", err)\n\t\t}\n\t\tfallthrough\n\tcase 1: // future migration\n\t\tbreak\n\t}\n\n\tif err = tx.Commit(); err != nil {\n\t\treturn fmt.Errorf(\"commit schema updates: %w\", err)\n\t}\n\tvar n int\n\tif err = db.Get(&n, `PRAGMA user_version;`); err != nil {\n\t\treturn fmt.Errorf(\"PRAGMA user_version: %w\", err)\n\t}\n\n\tif n > version {\n\t\tif _, err := db.Exec(`VACUUM;`); err != nil {\n\t\t\treturn fmt.Errorf(\"VACUUM database: %w\", err)\n\t\t}\n\t}\n\treturn nil\n}", "func (c *PostgresConnect) SwitchDatabase(dbName string) error {\n\tif c.DB != nil {\n\t\tif err := c.DB.Close(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tdns := c.baseDNS + \" dbname=\" + dbName\n\tdb, err := sql.Open(\"postgres\", dns)\n\tif err != nil {\n\t\treturn err\n\t}\n\tc.DB = db\n\treturn nil\n}", "func (config *Config) configureDB(viperRegistry *viper.Viper) error {\n\tdbConfig := &DatabaseSetting{}\n\tdb := viperRegistry.Sub(\"db\")\n\n\tif err := db.Unmarshal(dbConfig); err != nil {\n\t\treturn err\n\t}\n\n\tif !db.IsSet(\"user\") {\n\t\tif !viperRegistry.IsSet(\"DB_USER\") {\n\t\t\treturn errors.New(\"database user not set\")\n\t\t}\n\n\t\tdbConfig.User = viperRegistry.GetString(\"DB_USER\")\n\t}\n\n\tif !db.IsSet(\"password\") {\n\t\tif !viperRegistry.IsSet(\"DB_PASSWORD\") {\n\t\t\treturn errors.New(\"database password not set\")\n\t\t}\n\n\t\tdbConfig.Password = viperRegistry.GetString(\"DB_PASSWORD\")\n\t}\n\n\tif !db.IsSet(\"name\") {\n\t\tif !viperRegistry.IsSet(\"DB_NAME\") {\n\t\t\treturn errors.New(\"database name not set\")\n\t\t}\n\n\t\tdbConfig.Name = viperRegistry.GetString(\"DB_NAME\")\n\t}\n\n\tif !db.IsSet(\"address\") {\n\t\tif !viperRegistry.IsSet(\"DB_ADDRESS\") {\n\t\t\treturn errors.New(\"database address not set\")\n\t\t}\n\n\t\tdbConfig.Address = viperRegistry.GetString(\"DB_ADDRESS\")\n\t}\n\n\tconfig.Database = dbConfig\n\n\treturn nil\n}", "func getDB(name string) *bolt.DB {\n\tlog.WithFields(log.Fields{\n\t\t\"databaseName\": name,\n\t}).Info(\"Initiating database\")\n\tdb, err := bolt.Open(name, 0600, nil)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\treturn db\n}", "func InitializeDatabase(config string, log debug.Logger) {\n\tdatabaseAccess = databaseConnection{dbconfig: config, log: log}\n\tdatabaseAccess.initialize()\n}", "func WithDatabase(db string) Option {\n\treturn func(opt *options) {\n\t\topt.database = db\n\t}\n}", "func (db *Database) Init() {\n\tdata, dbErr := tiedot.OpenDB(db.Location)\n\tif dbErr != nil {\n\t\tlog.Error(dbConnectionError{\n\t\t\tmsg: \"Failed to connect to the tiedot database\",\n\t\t\terr: dbErr,\n\t\t})\n\t}\n\n\t// Set up the collections - throw away the error for now.\n\tfor _, c := range db.Collections {\n\t\tdata.Create(c.Name)\n\t\tdata.Use(c.Name).Index(c.Index)\n\t}\n\n\tdb.Data = data\n}", "func initDatabase() (*database.Database, error) {\n\tvar db *database.Database\n\n\tif *storage == MemoryStorage {\n\t\tdb = database.NewDatabase(database.NewMemoryWriter())\n\t} else if *storage == FileStorage {\n\t\tw, err := database.NewFileWriter(*storageFile)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"creating file storage error: %s\", err)\n\t\t}\n\t\tdb = database.NewDatabase(w)\n\t}\n\treturn db, nil\n}", "func (ctx *Context) SetPaymentDB(w, ro *sql.DB) {\n\tif w == nil {\n\t\tpanic(\"write DB connection cannot be nil\")\n\t}\n\tctx.paymentDBWrite, ctx.paymentDBReadOnly = w, ro\n}", "func (s *shard) DatabaseName() string {\n\treturn s.databaseName\n}", "func InitDB(dataSourceName string) (*sqlx.DB, error) {\n\tvar err error\n\n\tdb, err = sqlx.Open(\"sqlite3\", dataSourceName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttableSchema := `CREATE TABLE IF NOT EXISTS agents (\n\t\tagent_id TEXT PRIMARY KEY UNIQUE,\n\t\tstarted_at datetime NOT NULL,\n\t\tterminated_at datetime,\n\t\tcurrent_status TEXT NOT NULL,\n\t\teffective_config TEXT NOT NULL\n\t);`\n\n\t_, err = db.Exec(tableSchema)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Error in creating agents table: %s\", err.Error())\n\t}\n\n\tAllAgents = Agents{\n\t\tagentsById: make(map[string]*Agent),\n\t\tconnections: make(map[types.Connection]map[string]bool),\n\t\tmux: sync.RWMutex{},\n\t}\n\treturn db, nil\n}", "func DialDatabase(v int) dialOptionFn {\n\treturn func(o *dialOptions) {\n\t\to.db = v\n\t}\n}", "func Setup() {\n\tdao.Server = \"mongodb://\" + os.Getenv(\"MONGO_USER\") + \":\" + os.Getenv(\"MONGO_PWORD\") + \"@ds125469.mlab.com:25469/newsy_db\"\n\tdao.Database = \"newsy_db\"\n}", "func InitDatabase() *Database {\n\t// eg. \"postgres://postgres:postgres@localhost/postgres?sslmode=disable\"\n\t// TODO: enable SSL on DB\n\tconn, err := sql.Open(\"postgres\", os.Getenv(\"PG_CONNECTION_STRING\"))\n\tif err != nil {\n\t\tlog.Fatal(err) // kill server if we can't use DB on startup\n\t}\n\treturn &Database{\n\t\tconn: conn,\n\t}\n}", "func SetupDatabase(db *gorm.DB, logMode bool) {\n\tdb.LogMode(logMode)\n\n\tuserDB = models.NewUserDB(*db)\n}", "func initDB(databaseFile string) {\n\tvar err error\n\tdb, err = sql.Open(\"sqlite3\", databaseFile)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tfmt.Println(\"Initalized connection with \" + databaseFile + \"!\")\n}", "func DBDatabase(database string) DBOption {\n\treturn func(pm *param) *param {\n\t\tpm.Database = database\n\t\treturn pm\n\t}\n}", "func InitDatabase(redisClient *redis.Client, logger log.Logger) (err error) {\n\t// Checking if database is already exists.\n\tok := false\n\tif ok, err = databaseCheck(redisClient, logger); ok || (err != nil) {\n\t\treturn\n\t}\n\t// Getting list of girls.\n\tlogger.Info(\"Updating database.\")\n\treturn parseMGEWiki(redisClient, logger)\n}", "func Database() *sqlx.DB {\n\treturn db\n}", "func (s *AthenaDatasetDefinition) SetDatabase(v string) *AthenaDatasetDefinition {\n\ts.Database = &v\n\treturn s\n}", "func NewDB(dataSourceName string) (*DB, error) {\n\tdb, err := sql.Open(\"mysql\", dataSourceName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif err = db.Ping(); err != nil {\n\t\treturn nil, err\n\t}\n\tif err = setupDB(db); err != nil {\n\t\treturn nil, err\n\t}\n\tdb.Close()\n\n\t// Re-open, this time with a specified database\n\tslashIndex := strings.Index(dataSourceName, \"/\")\n\tif slashIndex < 0 {\n\t\treturn nil, fmt.Errorf(\"Invalid data source name\")\n\t}\n\tdb, err = sql.Open(\n\t\t\"mysql\",\n\t\tdataSourceName[:slashIndex+1]+\"ether\"+dataSourceName[slashIndex+1:],\n\t)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif err = db.Ping(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &DB{db}, nil\n}" ]
[ "0.6894468", "0.68926525", "0.68820035", "0.6720033", "0.6676408", "0.6497395", "0.64962465", "0.6446048", "0.63628155", "0.6351238", "0.6197192", "0.6141161", "0.60879815", "0.6045192", "0.6041036", "0.60176116", "0.6016969", "0.5912471", "0.58280826", "0.57885677", "0.57798475", "0.57571197", "0.57526225", "0.5739557", "0.5722115", "0.5721724", "0.5712558", "0.5688037", "0.5665445", "0.5603062", "0.5588627", "0.55762523", "0.5574922", "0.5545235", "0.55190706", "0.5512831", "0.55005425", "0.54672515", "0.54669756", "0.54581195", "0.5453406", "0.5446775", "0.54457045", "0.5424814", "0.54033613", "0.5403307", "0.5391955", "0.53912705", "0.5364683", "0.5363897", "0.535698", "0.5352837", "0.534854", "0.5339359", "0.5338723", "0.53326946", "0.5322355", "0.53113514", "0.53067786", "0.5305557", "0.5299561", "0.5298935", "0.52961373", "0.5290933", "0.5285336", "0.5284365", "0.52831966", "0.52830195", "0.5281552", "0.5280993", "0.52694815", "0.5266034", "0.52642053", "0.52629346", "0.52628094", "0.5257391", "0.5253881", "0.52527356", "0.52521425", "0.5236599", "0.5233834", "0.52318794", "0.52309424", "0.52267754", "0.5222322", "0.52063555", "0.52018285", "0.52002907", "0.5197084", "0.5196672", "0.51965714", "0.51937366", "0.5193465", "0.51895666", "0.51875013", "0.5183756", "0.51816225", "0.5180901", "0.5174611", "0.51743287" ]
0.7478315
0
WriteLogToDB writes logs to our database
func WriteLogToDB(responseLog request.ResponseLog) error { if err := dbName.AddRecord(responseLog); err != nil { return fmt.Errorf("error while writing a log to the database:\n %v", err) } return nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (dblog *DataBaseLogger) WriteToDB(str string) {\n\tstmt, err := dblog.database.Prepare(\"INSERT INTO Log(PREFIX, DATE, TIME, MESSAGE) VALUES(?, ?, ?, ?)\")\n\tif err != nil {\n\t\tlog.Print(err)\n\t}\n\tdate, time := getDateTime()\n\t_, err = stmt.Exec(dblog.prefix, date, time, str)\n\tif err != nil {\n\t\tlog.Print(err)\n\t}\n}", "func (a *DBAppender) WriteLog(level string, catalog string, callin int, v ...interface{}) {\n\t// arg call in not used.\n\tcallin = 3\n\ta.mu.Lock()\n\tm := LogTable{}\n\tm.Level = level\n\tm.Catalog = catalog\n\tm.Message = fmt.Sprint(v...)\n\tm.CreateTime = time.Now()\n\n\t_, file, line, ok := runtime.Caller(callin)\n\tif !ok {\n\t\tfile = \"???\"\n\t\tline = 0\n\t}\n\n\tm.Source = file\n\tm.Line = line\n\n\t// do save\n\tif err := Insert(a.Sql, m); err != nil {\n\t\tfmt.Printf(\"Write Logger to DB Error: %v\\n\", err)\n\t}\n\n\ta.mu.Unlock()\n}", "func WriteLog(ctx context.Context, log *Log, db *sql.DB) error {\n\tdefer metrics.InsertLogDbTime.Time(time.Now())\n\tdlock.Lock().Lock()\n\tdefer dlock.Lock().Unlock()\n\n\ttx, err := db.Begin()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, err = tx.Exec(`\n INSERT INTO\n\t\t\tintegration_log (integration_parent, run_id, kind, level, datatype, value)\n\t\t\tVALUES (\n\t\t\t\t?, ?, ?, ?, ?, ?\n\t\t\t);\n\t`, log.ParentUID, log.RunID, log.Kind, log.Level, log.Datatype, log.Value)\n\tif err != nil {\n\t\ttx.Rollback()\n\t\treturn err\n\t}\n\treturn tx.Commit()\n}", "func (l *logger) WriteLog(s ...interface{}) {\n\tl.Lock()\n\tdefer l.Unlock()\n\tl.buffer.WriteString(fmt.Sprintf(\"%s %s\", l.timeInterface.GetNow(), l.GetLogLevel()))\n\tl.makeLogContent(s...)\n\t//l.mysqlChan <- l.buffer.String()\n\tl.buffer.WriteString(\"\\n\")\n\tl.fd.Write(l.buffer.Bytes())\n\tl.buffer.Reset()\n}", "func AppendToDBLogFile(lines []string) error {\n\tdbTxLogFile, err := os.OpenFile(DbTxLogFilePath, os.O_RDWR|os.O_CREATE|os.O_APPEND, 0644)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tpanic(err)\n\t}\n\tdefer dbTxLogFile.Close()\n\n\tw := bufio.NewWriter(dbTxLogFile)\n\tfor _, v := range lines {\n\t\tw.WriteString(v + \"\\n\")\n\t}\n\treturn w.Flush()\n}", "func WriteDB(taskList []tasks.Task, task tasks.Task) {\n\tfmt.Println(taskList, task)\n\tnewList := []tasks.Task{task}\n\n\ttaskList = append(newList, taskList...)\n\n\tCloseDB(taskList)\n}", "func MakeLogDatabase() *Logdatabase {\n\tr := Logdatabase{lock: &sync.Mutex{},\n\t\tdb: make(map[string]map[string]logrecord),\n\t\tdirty: false,\n\t\trollingLog: MakeRollingLog(time.Hour * 24),\n\t}\n\n\tr.sweeper = time.NewTicker(10 * time.Second)\n\tgo func() {\n\t\thandledError := false\n\t\tfor {\n\t\t\t<-r.sweeper.C\n\t\t\terr := r.DumpDatabaseToFile(\"\")\n\t\t\tif err != nil {\n\t\t\t\tif handledError == false {\n\t\t\t\t\tlog.Printf(\"Error when saving database %s\", err.Error())\n\t\t\t\t\thandledError = true\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\thandledError = true\n\t\t\t}\n\n\t\t}\n\t}()\n\treturn &r\n}", "func (f *RecordStorage) WriteLog(gsn int, record string) {\n\t_, err := f.writer.WriteString(strconv.Itoa(gsn) + \"\\t\" + record + \"\\n\")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\t// Flush to force write to stable storage\n\tf.writer.Flush()\n\tf.currentRecordCount++\n\tif f.currentRecordCount == recordLimit {\n\t\tf.currentRecordCount = 0\n\t\tf.file.Close()\n\t\tf.fileNumber++\n\t\tf.file = createFile(f.volumePath, genFilename(f.fileNumber))\n\t\tf.writer = createBufferedWriter(f.file)\n\t}\n}", "func dbLogger() {\n\tlogChan = make(chan fuel_log, 1024)\n\n\t// Check if we need to create a new database.\n\tcreateDatabase := false\n\tif _, err := os.Stat(SQLITE_DB_FILE); os.IsNotExist(err) {\n\t\tcreateDatabase = true\n\t\tlogger.Debugf(\"creating new database '%s'.\\n\", SQLITE_DB_FILE)\n\t}\n\n\tdb, err := sql.Open(\"sqlite3\", SQLITE_DB_FILE)\n\tif err != nil {\n\t\tlogger.Errorf(\"sql.Open(): %s\\n\", err.Error())\n\t}\n\tdefer db.Close()\n\n\tif createDatabase {\n\t\tcreateSmt := `\n\t\t\tCREATE TABLE fuel_flow (id INTEGER NOT NULL PRIMARY KEY AUTOINCREMENT, log_date_start INTEGER, log_date_end INTEGER, flow REAL);\n\t\t`\n\n\t\t_, err = db.Exec(createSmt)\n\t\tif err != nil {\n\t\t\tlogger.Errorf(\"%q: %s\\n\", err, createSmt)\n\t\t\treturn\n\t\t}\n\t}\n\n\tfor {\n\t\tf := <-logChan\n\t\t//FIXME: Timestamps here are a hack.\n\t\tq := fmt.Sprintf(\"INSERT INTO fuel_flow(log_date_start, log_date_end, flow) values(%d, %d, %f)\", f.log_date_start.Unix(), f.log_date_end.Unix(), f.flow)\n\t\t_, err = db.Exec(q)\n\t\tif err != nil {\n\t\t\tlogger.Errorf(\"stmt.Exec(): %s\\n\", err.Error())\n\t\t}\n\t}\n}", "func (db *MsgLogDB) WriteMessages() {\n\tif db.db == nil || db.err != nil {\n\t\tdb.tryOpenDatabase()\n\t}\n\tif db.Error() != nil {\n\t\tlog.Fatalf(\"database: %+v\", errors.Wrap(db.Error(), \"write messages\"))\n\t}\n\tif len(db.msgs) == 0 {\n\t\treturn\n\t}\n\tsqlStr := \"INSERT INTO dmon(stamp, level, system, component, message) VALUES \"\n\tvals := []interface{}{}\n\tfor _, m := range db.msgs {\n\t\tsqlStr += \"(?, ?, ?, ?, ?),\"\n\t\tvals = append(vals, m.Stamp, m.Level, m.System, m.Component, m.Message)\n\t}\n\tsqlStr = strings.TrimSuffix(sqlStr, \",\")\n\tstmt, _ := db.db.Prepare(sqlStr)\n\t_, db.err = stmt.Exec(vals...)\n\tif db.err != nil {\n\t\tdb.err = errors.Wrap(db.err, \"write to db\")\n\t\tlog.Printf(\"%v\", db.err)\n\t\tdb.db.Close()\n\t\tdb.db = nil\n\t\tdb.msgs = db.msgs[:0]\n\t\treturn\n\t}\n\tdb.msgs = db.msgs[:0]\n}", "func (w *InfluxDbWriter) Write(batch influxdb_client.BatchPoints) error {\n\t// Write to the DB\n\tstart := time.Now()\n\terr := w.client.Write(batch)\n\telapsed := time.Since(start).Seconds()\n\tif err != nil {\n\t\tlog.Println(\"DB write failed after:\", elapsed, \"seconds\")\n\t\treturn err\n\t}\n\t// Only track write delay for successes\n\tlog.Println(\"DB write completed in:\", elapsed, \"seconds\")\n\t// TODO(dmar): Log rate of `db_write_delay`\n\treturn nil\n}", "func WriteDeltaToDB(d Delta, tx *sql.Tx) (bool, error) {\n\ttext, err := json.Marshal(d)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\t_, err = tx.Exec(`\n\tINSERT INTO deltas\n\t\t(id, streamID, msg)\n\tVALUES \n\t\t(?, ?, ?)\n\t`, d.GetID(), d.GetStreamID(), string(text))\n\n\tif err == nil {\n\t\treturn true, nil // new delta inserted\n\n\t}\n\tif sqlErr, ok := err.(sqlite3.Error); ok {\n\t\tif sqlErr.ExtendedCode == sqlite3.ErrConstraintPrimaryKey {\n\t\t\treturn false, nil // not new but no error\n\t\t}\n\t}\n\treturn false, err\n\n}", "func (ls *LevelDBStore) StoreLog(log *raft.Log) error {\n\treturn ls.StoreLogs([]*raft.Log{log})\n}", "func (ln *LogInfo) InsertLogfile(sqldb *sql.DB) (int, error) {\n\tif !ln.Tabled {\n\n\t\tquery := `INSERT INTO logfile\n\t(mongo_oid, uuid, root_name, size, lines, submissionid) VALUES ($1, $2, $3, $4, $5, $6)\n\tON CONFLICT DO NOTHING`\n\t\t_, err := sqldb.Exec(query, ln.MongoID.String(), ln.ID.String(), ln.RootName, ln.Stats.Bytes, ln.Stats.Lines, ln.SubmissionID.String())\n\n\t\tif err != nil {\n\t\t\treturn 0, err\n\t\t}\n\n\t\tln.Tabled = true\n\t}\n\n\tvar logID int\n\n\terr := sqldb.QueryRow(`SELECT id FROM logfile WHERE uuid = $1`, ln.ID.String()).Scan(&logID)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\treturn logID, nil\n}", "func (log *DatabaseLog) listen() {\n\terr := log.db.Start()\n\tif err != nil {\n\t\tlog.err <- fmt.Errorf(\"could start database log: %v\", err)\n\t\treturn\n\t}\n\tlog.err <- nil\n\tfor {\n\t\tmsg, ok := <-log.io\n\t\tif !ok {\n\t\t\tbreak\n\t\t}\n\t\tif (uint8(log.level) & uint8(msg.level)) > 0 {\n\t\t\tlog.db.Write(msg.level, msg.message)\n\t\t}\n\t}\n\terr = log.db.Close()\n\tif err != nil {\n\t\tlog.err <- fmt.Errorf(\"could not close database log: %v\", err)\n\t\treturn\n\t}\n\tlog.err <- nil\n}", "func (ls *LevelDBStore) StoreLogs(logs []*raft.Log) error {\n\tls.rwMtx.Lock()\n\tdefer ls.rwMtx.Unlock()\n\tb := leveldb.Batch{}\n\tfor _, log := range logs {\n\t\tkey := uint64ToBytes(log.Index)\n\t\tval, err := encodeMsgPack(log)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tb.Put(key, val.Bytes())\n\t}\n\n\treturn ls.ldb.Write(&b, nil)\n}", "func (l *Logger) SetDBLogging(enabled bool) {\n\tl.dbLogging = enabled\n}", "func (db *DB) writeDB(mappings map[string]string) error {\n\tvar data []byte\n\tvar err error\n\tif len(mappings) > 0 {\n\t\tdata, err = yaml.Marshal(mappings)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\ttmpfile := db.DBPath + \".tmp\"\n\terr = ioutil.WriteFile(tmpfile, data, 0644)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Rename(tmpfile, db.DBPath)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func updateDbLogFile(dbName string, logfile string, marker string, streamedTimeStamp string) {\n\n\tkey := map[string]*dynamodb.AttributeValue{\n\t\t\"db_name\": {\n\t\t\tS: aws.String(dbName),\n\t\t},\n\t}\n\ttoken, _ := dbNextToken.Load(dbName)\n\treqInput := &dynamodb.UpdateItemInput{\n\t\tTableName: aws.String(stateTableName),\n\t\tKey: key,\n\t\tUpdateExpression: aws.String(\"SET #LF = :l, #MK =:m, #HR =:h, #TK =:t\"),\n\t\tExpressionAttributeNames: map[string]*string{\n\t\t\t\"#LF\": aws.String(\"db_logfile\"),\n\t\t\t\"#MK\": aws.String(\"marker\"),\n\t\t\t\"#HR\": aws.String(\"streamed_timestamp\"),\n\t\t\t\"#TK\": aws.String(\"seq_token\"),\n\t\t},\n\t\tExpressionAttributeValues: map[string]*dynamodb.AttributeValue{\n\t\t\t\":l\": {S: aws.String(logfile)},\n\t\t\t\":m\": {S: aws.String(marker)},\n\t\t\t\":h\": {S: aws.String(streamedTimeStamp)},\n\t\t\t\":t\": {S: aws.String(token.(string))},\n\t\t},\n\t\tReturnValues: aws.String(\"ALL_NEW\"),\n\t}\n\n\tres, err := dySvc.UpdateItem(reqInput)\n\tif err != nil {\n\t\tif aerr, ok := err.(awserr.Error); ok {\n\t\t\tswitch aerr.Code() {\n\t\t\tcase dynamodb.ErrCodeConditionalCheckFailedException:\n\t\t\t\tlog.Println(dynamodb.ErrCodeConditionalCheckFailedException,\n\t\t\t\t\taerr.Error())\n\t\t\tcase dynamodb.ErrCodeProvisionedThroughputExceededException:\n\t\t\t\tlog.Println(dynamodb.ErrCodeProvisionedThroughputExceededException,\n\t\t\t\t\taerr.Error())\n\t\t\tcase dynamodb.ErrCodeResourceNotFoundException:\n\t\t\t\tlog.Println(dynamodb.ErrCodeResourceNotFoundException, aerr.Error())\n\t\t\tcase dynamodb.ErrCodeItemCollectionSizeLimitExceededException:\n\t\t\t\tlog.Println(dynamodb.ErrCodeItemCollectionSizeLimitExceededException,\n\t\t\t\t\taerr.Error())\n\t\t\tcase dynamodb.ErrCodeInternalServerError:\n\t\t\t\tlog.Println(dynamodb.ErrCodeInternalServerError, aerr.Error())\n\t\t\tdefault:\n\t\t\t\tlog.Println(aerr.Error())\n\t\t\t}\n\t\t} else {\n\t\t\tlog.Println(err.Error())\n\t\t}\n\t}\n\tlog.Println(\"Streamed Postgres Error Log File\", res)\n}", "func (db *fakeDB) Log() []string {\n\tdb.mu.Lock()\n\tdefer db.mu.Unlock()\n\treturn append([]string(nil), db.log...)\n}", "func WriteLog(sText string) {\n\n\tf, err := os.OpenFile(sLogName, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0600)\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer f.Close()\n\n\tf.WriteString(sText)\n\n}", "func (p *partition) WriteLog(msg []byte) error {\n\tif len(msg) == 0 {\n\t\treturn nil\n\t}\n\treturn p.log.Put(msg)\n}", "func writeToDB(exchange,queue,bindingKey,msg,errInfo string) {\n\t//fmt.Println(\"in writeToDB(),111\")\n\tstmt, err := SqlDB.Prepare(\"insert into failed_message(exchange,queue,binding_key,message,error) values(?,?,?,?,?)\")\n\tFailOnError(err, \"prepare error\")\n\t_,err = stmt.Exec(exchange, queue, bindingKey, msg, errInfo)\n\tFailOnError(err, \"insert error\")\n}", "func (s *SqliteServer) WriteRecords(records []gdp.Record) error {\n\tif len(records) == 0 {\n\t\treturn nil\n\t}\n\n\ttx, err := s.db.Begin()\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer tx.Rollback()\n\n\tstmt, err := tx.Prepare(\"INSERT INTO log_entry (hash, recno, timestamp, accuracy, prevhash, value, sig) VALUES (?, ?, ?, ?, ?, ?, ?)\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer stmt.Close()\n\tfor _, record := range records {\n\t\t_, err = stmt.Exec(\n\t\t\trecord.Hash[:],\n\t\t\trecord.RecNo,\n\t\t\trecord.Timestamp,\n\t\t\trecord.Accuracy,\n\t\t\trecord.PrevHash[:],\n\t\t\trecord.Value,\n\t\t\trecord.Sig,\n\t\t)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t}\n\n\terr = tx.Commit()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tzap.S().Infow(\n\t\t\"Wrote records\",\n\t\t\"numRecords\", len(records),\n\t)\n\n\treturn nil\n}", "func (b *raftBadger) StoreLogs(logs []*raft.Log) error {\n\n\tmaxBatchSize := b.gs.GetStore().(*badger.DB).MaxBatchSize()\n\tmin := uint64(0)\n\tmax := uint64(len(logs))\n\tranges := b.generateRanges(min, max, maxBatchSize)\n\tfor _, r := range ranges {\n\t\ttxn := b.gs.GetStore().(*badger.DB).NewTransaction(true)\n\t\tdefer txn.Discard()\n\t\tfor index := r.from; index < r.to; index++ {\n\t\t\tlog := logs[index]\n\t\t\tvar out bytes.Buffer\n\t\t\tenc := gob.NewEncoder(&out)\n\t\t\tb.logger.Info(\"StoreLogs\", \"index\", hclog.Fmt(\"%d\", log.Index), hclog.Fmt(\"%v\", \"term\"), log.Term)\n\t\t\tenc.Encode(log)\n\t\t\tif err := txn.Set(logKeyOf(log.Index), out.Bytes()); err != nil {\n\t\t\t\tb.logger.Error(\"failed saving log\", \"index\", hclog.Fmt(\"%d\", log.Index), hclog.Fmt(\"%v\", \"term\"), log.Term)\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\tif err := txn.Commit(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tb.logger.Info(\"LogStored\")\n\n\treturn nil\n}", "func InsertLog(apiName, res string) {\r\n\tdbmap, e := dbConnect()\r\n\tif e != nil {\r\n\t\tlog.Println(e)\r\n\t\treturn\r\n\t}\r\n\r\n\tdbmap.AddTableWithName(structs.TApiCalledLog{}, \"T_API_CALLED_LOG\")\r\n\tdefer dbmap.Db.Close()\r\n\r\n\tdto := &structs.TApiCalledLog{APIName: apiName, OperationResult: res, InsDate: time.Now()}\r\n\r\n\terr := dbmap.Insert(dto)\r\n\r\n\tif err != nil {\r\n\t\tprintln(err.Error())\r\n\t}\r\n}", "func (d *Database) SaveToFile() error {\n\t//TODO Use absolute path\n\terr := os.Chdir(\"../\" + config.DBFolder)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn err\n\t}\n\n\tf, err := os.Create(fmt.Sprintf(\"%s%d\", d.DatabaseName, d.Dlog.GetIndex()))\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn errors.New(\"error\")\n\t}\n\n\tfmt.Printf(\"Saving database instance to file. Max index: %d\\n\", d.Dlog.GetIndex())\n\tencoder := gob.NewEncoder(f)\n\terr = encoder.Encode(d.Data)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tf.Close()\n\n\treturn nil\n}", "func logWriteFile(fileName, fileDir, title string, value interface{}) {\n\t//create dir\n\tFileDirAutoCreate(fileDir)\n\n\t//delete time out file\n\tlogDelTimeOutFile(fileDir)\n\n\tpath := fileDir + logFileName(\"\")\n\n\t//format content struct\n\tformatContent := LogFormat{\n\t\tType: fileName,\n\t\tTypeVal: value,\n\t\tTitle: title,\n\t}\n\n\tcontent := logFormatContent(formatContent)\n\tstatus := FileWrite(path, content)\n\n\tif !status {\n\t\tLog(formatContent)\n\t}\n}", "func writeToDataStore(logData string) {\n\t// fmt.Println(\"Preparing data for store: \",logData)\n\tlogger.Debug().Msg(\"Preparing logdata for store: \" + logData)\n\tlog.Println(logData)\n\treturn\n}", "func (ml *MissingLog) SaveLog() error {\n\n\tjsonData, err := json.Marshal(ml.Entries)\n\tif nil != err {\n\t\tfmt.Printf(\"error marshalling log: %s\", err)\n\t\treturn err\n\t}\n\n\treturn ioutil.WriteFile(ml.LogFile, jsonData, os.ModeExclusive)\n\n}", "func writeLog(text string) {\n\tf, _ := os.OpenFile(logFile, os.O_APPEND|os.O_WRONLY, 0600)\n\t// f.. microsoft\n\tf.WriteString(time.Now().Format(\"Mon Jan _2 15:04:05 2006\") + \" \" + text + \"\\r\\n\")\n\tf.Sync()\n\n\tdefer f.Close()\n}", "func writeToLog(file *os.File, msg string, offSet int64) error {\n\tbs, err := json.Marshal(&msg)\n\tcheck(err)\n\t_, err = file.WriteAt(bs, offSet)\n\treturn err\n}", "func (m *arangodb) CollectDBServerLogs(w io.Writer) error {\n\tif err := m.updateServerInfo(); err != nil {\n\t\treturn maskAny(err)\n\t}\n\tif err := m.collectServerLogs(w, \"dbserver\"); err != nil && errors.Cause(err) != io.EOF {\n\t\treturn maskAny(err)\n\t}\n\treturn nil\n}", "func (db RDB) SetLogger(w io.Writer) {\n\tflags := log.Ldate | log.Lmicroseconds | log.Lshortfile\n\tdb._log = log.New(w, \"\", flags)\n}", "func (f *FileHandler) WriteLog(e *Entry) {\n\tvar logfile string\n\tif !f.separate {\n\t\tlogfile = f.path\n\t} else {\n\t\tlogfile = fmt.Sprintf(\"%s-%s.log\", strings.ToLower(e.Level.String()), e.Logger.Name())\n\t\tlogfile = path.Join(f.path, logfile)\n\t}\n\n\tf.m.Lock()\n\tdefer f.m.Unlock()\n\n\tfile, err := os.OpenFile(logfile, os.O_APPEND|os.O_WRONLY|os.O_CREATE, 0644)\n\tif err != nil {\n\t\tfmt.Printf(\"Error opening log file: %v\\n\", err)\n\t}\n\tdefer file.Close()\n\n\t_, err = file.Write(f.formatter.FormatByte(e))\n\tif err != nil {\n\t\tfmt.Printf(\"Error writing to log file: %v\\n\", err)\n\t}\n\treturn\n}", "func (l *LevelDBLog) Close() (err error) {\n\tl.Lock()\n\tdefer l.Unlock()\n\n\tif err = l.db.Close(); err != nil {\n\t\treturn err\n\t}\n\tl.db = nil\n\treturn nil\n}", "func TestDbLog(t *testing.T) {\n\tl := &mockLogger{}\n\topt := Options{Logger: l}\n\n\topt.Errorf(\"test\")\n\trequire.Equal(t, \"ERROR: test\", l.output)\n\topt.Infof(\"test\")\n\trequire.Equal(t, \"INFO: test\", l.output)\n\topt.Warningf(\"test\")\n\trequire.Equal(t, \"WARNING: test\", l.output)\n}", "func (logger *DefaultLogger) WriteLog(log Log) {\n\t// Tiny format: \"Method Url Status Content-Length - Response-time ms\"\n\tstr := fmt.Sprintf(\"%s %s %s %d - %.3f ms\",\n\t\tColorMethod(log[\"Method\"].(string)),\n\t\tlog[\"URL\"],\n\t\tColorStatus(log[\"Status\"].(int)),\n\t\tlog[\"Length\"],\n\t\tfloat64(time.Now().Sub(log[\"Start\"].(time.Time)))/1e6,\n\t)\n\t// Don't block current process.\n\tgo func() {\n\t\tif _, err := fmt.Fprintln(logger.W, str); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}()\n}", "func (db RDB) Write(queries ...string) ([]gorqlite.WriteResult, error) {\n\tif db.debug {\n\t\tfor _, query := range queries {\n\t\t\tdb.debugf(\"Write: %s\\n\", query)\n\t\t}\n\t}\n\treturn db.dbs.Write(queries)\n}", "func Savelog(logmessage string) {\n\n\tBlock{\n\t\tTry: func() {\n\t\t\tf, err := os.OpenFile(persistence.Logfile, os.O_RDWR | os.O_CREATE | os.O_APPEND, 0666)\n\t\t\tif err != nil {\n\t\t\t\tError (err)\n\t\t\t}\n\t\t\tdefer f.Close()\n\n\t\t\tf.Write([]byte(logmessage+\"\\n\"))\n\t\t\tf.Sync()\n\t\t},\n\t\tCatch: func(e Exception) {\n\n\t\t\tError(e)\n\t\t},\n\t\tFinally: func() {\n\t\t\tInfo(\"Save to log completed...\")\n\t\t},\n\t}.Do()\n}", "func (f *freeClientPool) saveToDb() {\n\tnow := f.clock.Now()\n\tstorage := freeClientPoolStorage{\n\t\tLogOffset: uint64(f.logOffset(now)),\n\t\tList: make([]*freeClientPoolEntry, len(f.addressMap)),\n\t}\n\ti := 0\n\tfor _, e := range f.addressMap {\n\t\tif e.connected {\n\t\t\tf.calcLogUsage(e, now)\n\t\t}\n\t\tstorage.List[i] = e\n\t\ti++\n\t}\n\tenc, err := rlp.EncodeToBytes(storage)\n\tif err != nil {\n\t\tlog.Error(\"Failed to encode client list\", \"err\", err)\n\t} else {\n\t\tf.db.Put([]byte(\"freeClientPool\"), enc)\n\t}\n}", "func NewDataBaseLog(DB *sql.DB) *DataBaseLogger {\n\tvar DBLog DataBaseLogger\n\tDBLog.database = DB\n\treturn &DBLog\n}", "func (base *DatabaseImplementation) InsertMigrationLog(schema string, version int, name string, batch string) error {\n\tstmt, err := base.DB.Prepare(base.mq.InsertMigrationLogSQL(schema))\n\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer stmt.Close()\n\t_, err1 := stmt.Exec(version, name, batch)\n\treturn err1\n}", "func SaveErrlog(data interface{}) bool {\n\t// errlogDB := SetDB(DBerrlogServer...)\n\t// defer errlogDB.Close()\n\t// return errlogDB.Save(data)\n\treturn true\n}", "func (s *Wal) StoreLog(log *raft.Log) error {\n\ts.mu.Lock()\n\tdefer s.mu.Unlock()\n\ts.buf = s.buf[:0]\n\ts.buf = appendLog(s.buf, log)\n\treturn s.log.Write(log.Index, s.buf)\n}", "func dumpBinlog(dbPath string, bw *blog.BinlogWriter) error {\n\tlog.Debug(\"dbPath \", dbPath)\n\tdb, err := leveldb.OpenFile(dbPath, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer db.Close()\n\n\t// 分三次读取 文件否则会有大量的table map event重复\n\thi, hd, hu := have(db)\n\n\tif hi {\n\t\tif err := dumpData(db, bw, WriteRowsEvent); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif hd {\n\t\tif err := dumpData(db, bw, DeleteRowsEvent); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif hu {\n\t\tif err := dumpData(db, bw, UpdateRowsEvent); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "func (ldb *Logdatabase) DumpRollingLog() ([]byte, error) {\n\tldb.lock.Lock()\n\tdefer ldb.lock.Unlock()\n\n\trollingLogCounts := ldb.rollingLog.GetAllCounts()\n\n\tdata := make(map[string]logrecord)\n\n\tfor k, v := range rollingLogCounts {\n\t\tr, _ := ldb.getURINoLock(k, \"hit\")\n\t\tr.Count = v\n\t\tdata[k] = r\n\t}\n\tresult, err := json.MarshalIndent(data, \"\", \" \")\n\treturn result, err\n}", "func writeToStore() {\n\tf, err := os.OpenFile(DBFile, os.O_APPEND|os.O_WRONLY, 0600)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdefer f.Close()\n\tif _, err := f.WriteString(strings.Join(passGenerator(), \"\") + \",\" + createSecrets() + \"\\n\"); err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "func (t *TimeSeries) Write(db string) error {\n\tcsvf, err := os.Create(db)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\twriter := csv.NewWriter(bufio.NewWriter(csvf))\n\tfor _, record := range t.records {\n\t\tvalues := []string{\n\t\t\trecord.timestamp.Format(time.RFC3339),\n\t\t\tfmt.Sprintf(\"%v\", record.Datum),\n\t\t}\n\t\terr = writer.Write(values)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\twriter.Flush()\n\tif err := writer.Error(); err != nil {\n\t\treturn err\n\t}\n\n\treturn csvf.Close()\n}", "func CreateFrameLog(db *sqlx.DB, fl *FrameLog) error {\n\tnow := time.Now()\n\t_, err := db.Exec(`\n\t\tinsert into frame_log (\n\t\t\tcreated_at,\n\t\t\tdev_eui,\n\t\t\trx_info_set,\n\t\t\ttx_info,\n\t\t\tphy_payload\n\t\t) values ($1, $2, $3, $4, $5)`,\n\t\tnow,\n\t\tfl.DevEUI[:],\n\t\tfl.RXInfoSet,\n\t\tfl.TXInfo,\n\t\tfl.PHYPayload,\n\t)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"insert error\")\n\t}\n\tfl.CreatedAt = now\n\treturn nil\n}", "func (logWriter LogWriter) writeLog(logger *logrus.Logger, testName string, text string) error {\n\tfile, err := logWriter.getOrCreateFile(logger, testName)\n\tif err != nil {\n\t\tlogger.Errorf(\"Error retrieving log for test: %s\", testName)\n\t\treturn errors.WithStackTrace(err)\n\t}\n\t_, err = file.WriteString(text + \"\\n\")\n\tif err != nil {\n\t\tlogger.Errorf(\"Error (%s) writing log entry: %s\", err, text)\n\t\treturn errors.WithStackTrace(err)\n\t}\n\tfile.Sync()\n\treturn nil\n}", "func (lp *LogFile) writeLog(p []byte) {\n\tfileOnly := lp.Flags&FileOnly == FileOnly\n\n\tif !fileOnly {\n\t\t_, err := os.Stderr.Write(p)\n\t\tif err != nil {\n\t\t\t// Well I can't write to stderr to report it... so just return\n\t\t\treturn\n\t\t}\n\t}\n\n\tif lp.file == nil {\n\t\treturn\n\t}\n\n\t// Am I about to go over my file size limit?\n\tif lp.MaxSize > 0 && (lp.size+int64(len(p))) >= lp.MaxSize {\n\t\tlp.closeLog()\n\n\t\tif lp.RotateFileFunc != nil {\n\t\t\tlp.RotateFileFunc()\n\t\t}\n\n\t\t// Recreate the logfile truncating it (in case it wasn't rotated)\n\t\tif !lp.openLogFile(truncateLog) {\n\t\t\treturn\n\t\t}\n\t}\n\n\tn, err := lp.buf.Write(p)\n\tif err != nil {\n\t\tlp.PrintError(\"Logfile error writing to %s: %s\\n\", lp.FileName, err)\n\t}\n\tif lp.FlushSeconds <= 0 {\n\t\tlp.flushLog()\n\t}\n\n\tlp.size += int64(n)\n\n\treturn\n}", "func createLogRecord(logType, logID string, transaction *sql.Tx) {\n\tvar err error\n\tvar statement = &sql.Stmt{}\n\tswitch logType {\n\tcase \"router\":\n\t\tstatement, err = transaction.Prepare(\"insert into Log_Records (log_type, router_log_id) values(?, ?)\")\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tbreak\n\tcase \"linux\":\n\t\tstatement, err = transaction.Prepare(\"insert into Log_Records (log_type, linux_log_id) values(?, ?)\")\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tbreak\n\tcase \"windows\":\n\t\tstatement, err = transaction.Prepare(\"insert into Log_Records (log_type, windows_log_id) values(?, ?)\")\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tbreak\n\t}\n\tdefer statement.Close()\n\t_, err = statement.Exec(logType, logID)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n}", "func WriteLogs(t *testing.T, filePath string, logs plog.Logs) error {\n\tif err := writeLogs(filePath, logs); err != nil {\n\t\treturn err\n\t}\n\tt.Logf(\"Golden file successfully written to %s.\", filePath)\n\tt.Log(\"NOTE: The WriteLogs call must be removed in order to pass the test.\")\n\tt.Fail()\n\treturn nil\n}", "func LogUpload(dbOwner, dbFolder, dbName, loggedInUser, ipAddr, serverSw, userAgent string, uploadDate time.Time, sha string) error {\n\t// If the uploader isn't a logged in user, use a NULL value for that column\n\tvar uploader pgx.NullString\n\tif loggedInUser != \"\" {\n\t\tuploader.String = loggedInUser\n\t\tuploader.Valid = true\n\t}\n\n\t// Store the upload details\n\tdbQuery := `\n\t\tWITH d AS (\n\t\t\tSELECT db.db_id, db.folder, db.db_name\n\t\t\tFROM sqlite_databases AS db\n\t\t\tWHERE user_id = (\n\t\t\t\t\tSELECT user_id\n\t\t\t\t\tFROM users\n\t\t\t\t\tWHERE lower(user_name) = lower($1)\n\t\t\t\t)\n\t\t\t\tAND db.folder = $2\n\t\t\t\tAND db.db_name = $3\n\t\t)\n\t\tINSERT INTO database_uploads (db_id, user_id, ip_addr, server_sw, user_agent, upload_date, db_sha256)\n\t\tSELECT (SELECT db_id FROM d), (SELECT user_id FROM users WHERE lower(user_name) = lower($4)), $5, $6, $7, $8, $9`\n\tcommandTag, err := pdb.Exec(dbQuery, dbOwner, dbFolder, dbName, uploader, ipAddr, serverSw, userAgent,\n\t\tuploadDate, sha)\n\tif err != nil {\n\t\tlog.Printf(\"Storing record of upload '%s%s%s', sha '%s' by '%s' failed: %v\\n\", dbOwner, dbFolder,\n\t\t\tdbName, sha, uploader, err)\n\t\treturn err\n\t}\n\tif numRows := commandTag.RowsAffected(); numRows != 1 {\n\t\tlog.Printf(\"Wrong number of rows (%v) affected while storing upload record for '%s%s%s'\\n\", numRows,\n\t\t\tdbOwner, dbFolder, dbName)\n\t}\n\treturn nil\n}", "func (g *Game) saveEventToDB(message string, heroes []*Hero) error {\n db, err := GetDBConnection(g.databaseURL)\n if err != nil {\n return err\n }\n defer db.Close()\n\n tx, err := db.Begin()\n if err != nil {\n return err\n }\n\n r, err := tx.Exec(\"INSERT INTO worldevent (event_text) VALUES (?)\", message)\n if err != nil {\n return err\n }\n\n eventID, err := r.LastInsertId()\n if err != nil {\n return err\n }\n\n for _, hero := range heroes {\n if _, err = tx.Exec(\"INSERT INTO heroworldevent (hero_id, worldevent_id ) VALUES (?, ?)\", hero.id, eventID); err != nil {\n return err\n }\n }\n\n err = tx.Commit()\n if err != nil {\n tx.Rollback()\n return err\n }\n\n return nil\n}", "func (l Log) saveAndWriteToLog(path string, file *os.File, text string) error {\n\terr := l.save(path)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = file.WriteString(\"-----\" + text + \"-----\")\n\treturn err\n}", "func writeLog(msg ...interface{}) {\n\tlogLocker.Lock()\n\tdefer logLocker.Unlock()\n\tif *confVerbose {\n\t\tcolor.Green(fmt.Sprint(time.Now().Format(\"02_01_06-15.04.05\"), \"[WRITE] ->\", msg))\n\t}\n}", "func initLogDB() {\n\n\t// Init config data\n\tdbConf := GetDBConfig()\n\tdbConf.IsAppDB = false\n\n\tdbPoolApp, err := initSocketConnectionPool(dbConf)\n\tif err != nil {\n\t\tlog.Println(\"initial dbConnLog fail : \", err.Error())\n\t} else {\n\t\tlog.Println(\"initial dbConnLog successful\")\n\t\tdbConf.Conn = dbPoolApp\n\t\tdbConf.InitSuccess = true\n\t}\n\n\tdbConf.Err = err\n\n\t// Keep instance\n\tdbLogConf = dbConf\n}", "func (db *DB) Write(wo *WriteOptions, w *WriteBatch) error {\n\tif db.closed {\n\t\tpanic(ErrDBClosed)\n\t}\n\n\tvar errStr *C.char\n\tC.leveldb_write(db.Ldb, wo.Opt, w.wbatch, &errStr)\n\tif errStr != nil {\n\t\tgs := C.GoString(errStr)\n\t\tC.leveldb_free(unsafe.Pointer(errStr))\n\t\treturn DatabaseError(gs)\n\t}\n\treturn nil\n}", "func (b *LDBBatch) Write() error {\n return b.db.Write(b.batch, nil)\n}", "func TestPostWrite(t *testing.T) {\n\t// set up test server and mocked LogStore\n\tmockLogStore := new(MockedLogStore)\n\tserver := newTestServer(mockLogStore)\n\ttestServer := httptest.NewServer(server.server.Handler)\n\tdefer testServer.Close()\n\tclient := testServer.Client()\n\n\tlogsToWrite := []logstore.LogEntry{\n\t\tlogEntry(MustParse(\"2018-01-01T12:00:00.000Z\"), \"event 1\"),\n\t\tlogEntry(MustParse(\"2018-01-01T12:01:00.000Z\"), \"event 2\"),\n\t\tlogEntry(MustParse(\"2018-01-01T12:03:00.000Z\"), \"event 3\"),\n\t}\n\n\t//\n\t// set up mock expectations\n\t//\n\n\tmockLogStore.On(\"Ready\").Return(true, nil)\n\tmockLogStore.On(\"Write\", logsToWrite).Return(nil)\n\n\t//\n\t// make call\n\t//\n\tjsonBytes, _ := json.Marshal(logsToWrite)\n\tbody := strings.NewReader(string(jsonBytes))\n\tresp, _ := client.Post(testServer.URL+\"/write\", \"application/json\", body)\n\t// should return 503 (Service Unavailable)\n\tassert.Equalf(t, http.StatusOK, resp.StatusCode, \"unexpected response code\")\n\tassert.Equalf(t, ``, readBody(t, resp), \"unexpected response\")\n\n\t// verify that expected calls were made\n\tmockLogStore.AssertExpectations(t)\n}", "func WriteLog(class int, format string, args ...interface{}) {\n\tif class < 0 || class >= len(loggers) {\n\t\tWriteLog(InternalLogger, \"ERROR: Invalid Log() class %d\", class)\n\n\t\treturn\n\t}\n\n\ts := formatLogMessage(class, format, args...)\n\n\tif logFile != nil {\n\t\t_, err := logFile.Write([]byte(s + \"\\n\"))\n\t\tif err != nil {\n\t\t\tlogFile = nil\n\n\t\t\tWriteLog(InternalLogger, \"ERROR: Log() unable to write log entry; %v\", err)\n\n\t\t\treturn\n\t\t}\n\t} else {\n\t\tfmt.Println(s)\n\t}\n}", "func (r *raftLog) StoreLogs(logs []*raft.Log) error {\n\ttx, err := r.conn.Begin(true)\n\tif err != nil {\n\t\treturn err\n\t}\n\tbucket := tx.Bucket(logsBucket)\n\tfor _, log := range logs {\n\t\tvar (\n\t\t\tkey [8]byte\n\t\t\tval []byte\n\t\t)\n\t\tbinary.BigEndian.PutUint64(key[:], log.Index)\n\t\tval, err = r.encodeRaftLog(log)\n\t\tif err != nil {\n\t\t\tbreak\n\t\t}\n\t\terr = bucket.Put(key[:], val)\n\t\tif err != nil {\n\t\t\tbreak\n\t\t}\n\t}\n\tif err != nil {\n\t\ttx.Rollback()\n\t} else {\n\t\terr = tx.Commit()\n\t\tif err == nil && r.hasCache {\n\t\t\tr.Lock()\n\t\t\t// Cache only on success\n\t\t\tfor _, l := range logs {\n\t\t\t\tr.cache[l.Index%r.cacheSize] = l\n\t\t\t}\n\t\t\tr.Unlock()\n\t\t}\n\t}\n\treturn err\n}", "func WriteLogs(filepath, data string) error {\n\n\t// First, we create an instance of a timezone location object\n\tconst layout = \"Jan 2, 2006 at 3:04 PM\"\n\n\t// Get log file\n\tlogFile, err := file.Open(filepath)\n\tdefer file.Close(logFile)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdata = time.Now().Format(layout) + \" - \" + data + \"\\n\"\n\t_, err = file.Write(logFile, []byte(data))\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = file.Sync(logFile)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (h *Handler) HandleLog(e *log.Entry) error {\n\th.mu.Lock()\n\tdefer h.mu.Unlock()\n\n\terr := h.enc.Encode(e)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = h.conn.Write([]byte(\"\\n\"))\n\treturn err\n}", "func CreateDeploymentLog(ctx context.Context, db sqlx.Queryer, dl *DeploymentLog) error {\n\tdl.CreatedAt = time.Now()\n\n\terr := sqlx.Get(db, &dl.ID, `\n\t\tinsert into deployment_log (\n\t\t\tcreated_at,\n\t\t\tdeployment_id,\n\t\t\tdev_eui,\n\t\t\tf_port,\n\t\t\tcommand,\n\t\t\tfields\n\t\t) values (\n\t\t\t$1, $2, $3, $4, $5, $6)\n\t\treturning\n\t\t\tid`,\n\t\tdl.CreatedAt,\n\t\tdl.DeploymentID,\n\t\tdl.DevEUI,\n\t\tdl.FPort,\n\t\tdl.Command,\n\t\tdl.Fields,\n\t)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"sql create error: %w\", err)\n\t}\n\n\tlog.WithFields(log.Fields{\n\t\t\"deployment_id\": dl.DeploymentID,\n\t\t\"dev_eui\": dl.DevEUI,\n\t\t\"command\": dl.Command,\n\t}).Info(\"storage: deployment log created\")\n\n\treturn nil\n}", "func WriteTaskToDB(t Task) {\n\terr := globalDBcollection.Insert(&t)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n}", "func SaveToDB(table, resourceID string, data interface{}) error {\n\tdataByte, err := json.Marshal(data)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"while marshalling data, got: %v\", err)\n\t}\n\treturn db.Connector.Create(table, resourceID, string(dataByte))\n}", "func (config *Config) WriteLog(LogLevel int, format string, a ...interface{}) {\n\tif config.LogLevel < LogLevel || config.Logger == nil {\n\t\treturn\n\t}\n\n\tvar logBuffer bytes.Buffer\n\tlogBuffer.WriteString(LogTag[LogLevel-1])\n\tlogBuffer.WriteString(fmt.Sprintf(format, a...))\n\tconfig.Logger.Printf(\"%s\", logBuffer.String())\n}", "func TestDbLog_Add(t *testing.T) {\n\thandler := debug.NewLocalDb()\n\tdb := newDbLog(handler)\n\t_, err := db.Add(0, \"success\", \"\", 0, \"\", time.GetDayTime())\n\tif err == nil {\n\t\tt.Errorf(\"Add check cronId fail\")\n\t\treturn\n\t}\n\tid, err := db.Add(1, \"success\", \"123\", 1000, \"hello\", time.GetDayTime())\n\tif err != nil {\n\t\tt.Errorf(\"Add fail, error=[%v]\", err)\n\t\treturn\n\t}\n\tif id <= 0{\n\t\tt.Errorf(\"Add check rows fail\")\n\t\treturn\n\t}\n\tdb.Delete(id)\n}", "func (db *Database) WriteDatabase(w io.Writer) {\n\tfor _, v := range db.Preamble {\n\t\twritePreamble(w, v)\n\t}\n\tfmt.Fprintln(w)\n\n\t// write the symbols in sorted order\n\tsyms := make([]string, len(db.Symbols))\n\ti := 0\n\tfor k := range db.Symbols {\n\t\tsyms[i] = k\n\t\ti++\n\t}\n\tsort.Strings(syms)\n\tfor _, k := range syms {\n\t\twriteSymbol(w, k, db.Symbols[k])\n\t}\n\n\tfor _, e := range db.Pubs {\n\t\twriteEntry(w, e)\n\t}\n}", "func (r *TaskRepository) AddWorklog(db db.DB, worklog *entities.Worklog) error {\n\t_, err := db.NamedExec(`\n\tINSERT INTO worklogs (uuid,logged_time,task_id,status,created_at,updated_at)\n\tVALUES (:uuid, :logged_time, :task_id, :status, now(), now())`, worklog)\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error inserting worklogs to db: %w\", err)\n\t}\n\n\treturn nil\n}", "func (wc *WritelogCreate) Save(ctx context.Context) (*Writelog, error) {\n\tvar (\n\t\terr error\n\t\tnode *Writelog\n\t)\n\tif len(wc.hooks) == 0 {\n\t\tif err = wc.check(); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tnode, err = wc.sqlSave(ctx)\n\t} else {\n\t\tvar mut Mutator = MutateFunc(func(ctx context.Context, m Mutation) (Value, error) {\n\t\t\tmutation, ok := m.(*WritelogMutation)\n\t\t\tif !ok {\n\t\t\t\treturn nil, fmt.Errorf(\"unexpected mutation type %T\", m)\n\t\t\t}\n\t\t\tif err = wc.check(); err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\twc.mutation = mutation\n\t\t\tnode, err = wc.sqlSave(ctx)\n\t\t\tmutation.done = true\n\t\t\treturn node, err\n\t\t})\n\t\tfor i := len(wc.hooks) - 1; i >= 0; i-- {\n\t\t\tmut = wc.hooks[i](mut)\n\t\t}\n\t\tif _, err := mut.Mutate(ctx, wc.mutation); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn node, err\n}", "func LogDatabaseEvent(db *bolt.DB, severity string, message_meta *persistence.MessageMeta, event_code string) error {\n\tsource := persistence.NewDatabaseEventSource()\n\teventlog := persistence.NewEventLog(severity, message_meta, event_code, persistence.SRC_TYPE_DB, source)\n\treturn persistence.SaveEventLog(db, eventlog)\n}", "func (l *Log) Save(ctx context.Context) error {\n\tif l.ID == \"\" {\n\t\tuuid, err := uuid.NewRandom()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tl.ID = uuid.String()\n\t}\n\n\tif l.Started.IsZero() {\n\t\treturn fmt.Errorf(\"started cannot be nil\")\n\t}\n\n\tif l.Stopped.IsZero() {\n\t\treturn fmt.Errorf(\"stopped cannot be nil\")\n\t}\n\n\tif l.Created.IsZero() {\n\t\tl.Created = time.Now()\n\t}\n\n\tl.Modified = time.Now()\n\n\tif l.User.Empty() {\n\t\treturn fmt.Errorf(\"no user specified\")\n\t}\n\n\tif _, err := db.ExecContext(\n\t\tctx,\n\t\t`\nINSERT INTO logs(id, description, project, sector, started, stopped, user_id, created_at, modified_at)\nVALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9)\nON CONFLICT (id) DO UPDATE\nSET (description, project, sector, started, stopped, user_id, modified_at) = ($2, $3, $4, $5, $6, $7, $9)\nWHERE logs.id = $1;\n`,\n\t\tl.ID,\n\t\tl.Description,\n\t\tl.Project,\n\t\tl.Sector,\n\t\tl.Started,\n\t\tl.Stopped,\n\t\tl.User.ID,\n\t\tl.Created,\n\t\tl.Modified,\n\t); err != nil {\n\t\treturn fmt.Errorf(\"upsert log: %w\", err)\n\t}\n\n\treturn nil\n}", "func writeLogs(filePath string, logs plog.Logs) error {\n\tunmarshaler := &plog.JSONMarshaler{}\n\tfileBytes, err := unmarshaler.MarshalLogs(logs)\n\tif err != nil {\n\t\treturn err\n\t}\n\tvar jsonVal map[string]interface{}\n\tif err = json.Unmarshal(fileBytes, &jsonVal); err != nil {\n\t\treturn err\n\t}\n\tb := &bytes.Buffer{}\n\tenc := yaml.NewEncoder(b)\n\tenc.SetIndent(2)\n\tif err := enc.Encode(jsonVal); err != nil {\n\t\treturn err\n\t}\n\treturn os.WriteFile(filePath, b.Bytes(), 0600)\n}", "func (s *stepSaver) WriteLog(l *logLine) error {\n\tstoredLine := storedLogLine{\n\t\tTime: l.Time,\n\t\tMessage: l.Message,\n\t\tLine: s.lineCount,\n\t\tStepName: l.Step,\n\t}\n\n\tif len(storedLine.Message) > maxLineSize {\n\t\tvar buffer bytes.Buffer\n\t\tbuffer.WriteString(storedLine.Message[:maxLineSize])\n\t\tbuffer.WriteString(fmt.Sprintf(\" [line truncated after %d characters]\", maxLineSize))\n\t\tstoredLine.Message = buffer.String()\n\t}\n\tif err := s.encoder.Encode(storedLine); err != nil {\n\t\treturn fmt.Errorf(\"marshaling log line %v: %v\", storedLine, err)\n\t}\n\n\treturn nil\n}", "func (dbs *BadgerStore) StoreLog(log *raft.Log) error {\n\treturn dbs.StoreLogs([]*raft.Log{log})\n}", "func (b *batch) Write() error {\n\tb.db.lock.RLock()\n\tdefer b.db.lock.RUnlock()\n\n\tswitch {\n\tcase b.db.db == nil:\n\t\treturn database.ErrClosed\n\tcase b.db.corrupted():\n\t\treturn database.ErrAvoidCorruption\n\t}\n\treturn b.db.db.Write(b.db.writeOptions, b.batch)\n}", "func (db *BalanceDB) CreateHistoryLog(ctx context.Context, tx pgx.Tx, h *model.TransactionHistory) error {\n\t_, err := tx.Exec(ctx, `\n\t\tINSERT INTO \n\t\t\ttransaction_history\n\t\t\t(id_from, id_to, amount, comment, created_at)\n\t\tVALUES\n\t\t\t($1, $2, $3, $4, $5)\n\t`, h.IDFrom, h.IDTo, h.Amount, h.Comment, h.CreatedAt)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func InsertLog(action, activity, errorMessage, resourceID, resourceType string, userID uuid.UUID, c buffalo.Context) error {\n\tlog := &models.SystemLog{}\n\tlog.Action = action\n\tlog.Activity = activity\n\tif len(errorMessage) > 0 {\n\t\tlog.Error = true\n\t\tlog.ErrorMessage = errorMessage\n\t}\n\tip := helpers.FromRequest(c.Request())\n\tlog.ClientIP = \"not found\"\n\tif len(ip) > 0 {\n\t\tlog.ClientIP = ip\n\t}\n\tlog.UserID = userID\n\tlog.ResourceID = resourceID\n\tlog.ResourceType = resourceType\n\n\ttx := c.Value(\"tx\").(*pop.Connection)\n\t_, err := tx.ValidateAndCreate(log)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (d *dnsmasq) WriteLogs(ctx context.Context, f *os.File) error {\n\treturn d.env.ReadAndWriteLogIfExists(d.env.ChrootPath(logPath), f)\n}", "func (log *DatabaseLog) Close() error {\n\terr := log.BaseLog.Close()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error closing database log: %v\", err)\n\t}\n\treturn nil\n}", "func (w *FileLogWriter) LogWrite(rec *LogRecord) {\n\tw.rec <- rec\n}", "func (sl *StoreLogger) LogWrite(level ConfigLevel, key string, val interface{}) {\n\tlogLine := fmt.Sprintf(\"%s%s: writing level=%v key=%s val=%s\", time.Now().UTC().Format(TIME_FORMAT), LOG_NAME, level, key, val)\n\tsl.Log.Print(logLine)\n}", "func (b *BadgerStore) StoreLogs(logs []*raft.Log) error {\n\terr := b.conn.Update(func(txn *badger.Txn) error {\n\t\tfor _, log := range logs {\n\t\t\tkey := uint64ToBytes(log.Index)\n\t\t\tval, err := encodeMsgPack(log)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif err := txn.Set(key, val.Bytes()); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (conn dbconn) CreateLog(logType int, text string, logError string, jobHistoryID string, createDate time.Time) (id int, affectedRows int, err error) {\n\n\tvar etext string\n\tif len(logError) > 0 {\n\t\tetext = logError\n\t}\n\n\tconn.Exec(&Procedure{\n\t\tcreateLog,\n\t\t[]interface{}{logType, text, etext, jobHistoryID, createDate},\n\t\tfunc(results interface{}, dberr error) {\n\t\t\terr = dberr\n\n\t\t\tif result, ok := results.(sql.Result); ok {\n\t\t\t\tvar idOut int64\n\n\t\t\t\t// Get the id of the last inserted record\n\t\t\t\tif idOut, err = result.LastInsertId(); err == nil {\n\t\t\t\t\tid = int(idOut)\n\t\t\t\t}\n\n\t\t\t\t// Get the number of affected rows for the execution\n\t\t\t\tif idOut, err = result.RowsAffected(); ok {\n\t\t\t\t\taffectedRows = int(idOut)\n\t\t\t\t}\n\t\t\t}\n\n\t\t},\n\t})\n\n\treturn id, affectedRows, err\n}", "func (dbInst *DB) WriteBatch(batch *gorocksdb.WriteBatch) error {\n\tif err := dbInst.rocksDB.Write(dbInst.writeOpts, batch); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (self *BenchDatabase) Save(docs ...SqlInserter) error {\n\tif self.db == nil {\n\t\terr := self.Connect()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\ttx, err := self.db.Begin()\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor _, doc := range docs {\n\t\tif err = doc.SqlInsert(tx); err != nil {\n\t\t\tif rb_err := tx.Rollback(); rb_err != nil {\n\t\t\t\treturn rb_err\n\t\t\t}\n\t\t\treturn err\n\t\t}\n\t}\n\tif err = tx.Commit(); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (h *DBHandle) WriteBatch(batch *UpdateBatch, sync bool) error {\n\tif len(batch.KVs) == 0 {\n\t\treturn nil\n\t}\n\tlevelBatch := &leveldb.Batch{}\n\tfor k, v := range batch.KVs {\n\t\tkey := constructLevelKey(h.dbName, []byte(k))\n\t\tif v == nil {\n\t\t\tlevelBatch.Delete(key)\n\t\t} else {\n\t\t\tlevelBatch.Put(key, v)\n\t\t}\n\t}\n\tif err := h.db.WriteBatch(levelBatch, sync); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (h *DBHandle) WriteBatch(batch *UpdateBatch, sync bool) error {\n\tif len(batch.KVs) == 0 {\n\t\treturn nil\n\t}\n\tlevelBatch := &leveldb.Batch{}\n\tfor k, v := range batch.KVs {\n\t\tkey := constructLevelKey(h.dbName, []byte(k))\n\t\tif v == nil {\n\t\t\tlevelBatch.Delete(key)\n\t\t} else {\n\t\t\tlevelBatch.Put(key, v)\n\t\t}\n\t}\n\tif err := h.db.WriteBatch(levelBatch, sync); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func tailDatabaseLogFile(dbName, logfile, marker, hour string) error {\n\n\tlog.Printf(\"Starting to tail %s file for db %s from marker %s\", logfile, dbName, marker)\n\trdsClient := rds.New(awsSession)\n\n\tdbInfo := &rds.DownloadDBLogFilePortionInput{\n\t\tDBInstanceIdentifier: aws.String(dbName), // DB Instance\n\t\tLogFileName: aws.String(logfile), // FileName with yyyy-mm-dd appended.\n\t\tMarker: aws.String(marker), // Starts at 0.\n\t}\n\n\tres, err := rdsClient.DownloadDBLogFilePortion(dbInfo)\n\tif err != nil {\n\t\tif aerr, ok := err.(awserr.Error); ok {\n\t\t\tswitch aerr.Code() {\n\t\t\tcase rds.ErrCodeDBInstanceNotFoundFault:\n\t\t\t\tlog.Println(rds.ErrCodeDBInstanceNotFoundFault, aerr.Error())\n\t\t\tcase rds.ErrCodeDBLogFileNotFoundFault:\n\t\t\t\tlog.Println(rds.ErrCodeDBLogFileNotFoundFault, aerr.Error())\n\t\t\t\tupdateDbLogFile(dbName, logfile, \"COMPLETED\", hour)\n\t\t\tdefault:\n\t\t\t\tlog.Println(aerr.Error())\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\tlog.Println(err)\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t}\n\tif len(*res.LogFileData) == 0 {\n\t\tlog.Printf(\"No data has been appended to the log file %s from marker %s\", logfile, marker)\n\t\treturn nil\n\t}\n\t// Write the log lines to the cloudwatch log group\n\tlog.Printf(\"The sequence token for db %s is %s\", dbName, dbNextToken.Load(dbName))\n\tif nextToken, ok := dbNextToken.Load(dbName); ok {\n\t\t// err = streamLogTextToCloudWatch(dbName, logfile, nextToken, res)\n\t\tlog.Println(\"Skipped Streaming the logs as we are testing\")\n\t\ttime.Sleep(2 * time.Second)\n\t} else {\n\t\t// err = streamLogTextToCloudWatch(dbName, logfile, initSeqToken, res)\n\t\tlog.Println(\"Skipped Streaming the logs as we are testing\")\n\t\ttime.Sleep(2 * time.Second)\n\t}\n\tif err != nil {\n\t\tlog.Println(\"Streaming to CloudWatch Error\", err)\n\t\treturn err\n\t}\n\n\tdbHour, _ := time.Parse(logFileTS, hour)\n\tcurrentTime := time.Now().In(loc)\n\n\tlog.Printf(\"Data Pending %v, CurrentUTCTime - EventUTCTime > 1 hour: %v\",\n\t\t*res.AdditionalDataPending, currentTime.Sub(dbHour) >= time.Hour)\n\tlog.Print(\"********Postgres Error Log Data********\\n\", *res.LogFileData)\n\tlog.Println(\"********Postgres End Error Log Data********\")\n\n\t// File has been completely streamed and more than 1 hour has passed.\n\tif !*res.AdditionalDataPending && currentTime.Sub(dbHour) >= time.Hour {\n\t\t// updateDbLogFile(dbName, logfile, \"COMPLETED\", hour)\n\t\tlog.Println(\"Skipped Udpating the State Table as we are testing\")\n\t\tlog.Printf(\"Completed Processing DBLog File %s for db %s\", logfile, dbName)\n\t} else if !*res.AdditionalDataPending && currentTime.Sub(dbHour) < time.Hour {\n\t\t// updateDbLogFile(dbName, logfile, *res.Marker, hour)\n\t\tlog.Println(\"Skipped Udpating the State Table as we are testing\")\n\t\tlog.Printf(\"Partially completed processing DBLog File %s for db %s\", logfile, dbName)\n\t}\n\treturn nil\n}", "func (mdbc *MongoDbController) initLoggingDatabase(dbName string) error {\n\tdb := mdbc.MongoClient.Database(dbName)\n\n\tjsonSchema := bson.M{\n\t\t\"bsonType\": \"object\",\n\t\t\"required\": []string{\"timestamp\", \"type\"},\n\t\t\"properties\": bson.M{\n\t\t\t\"timestamp\": bson.M{\n\t\t\t\t\"bsonType\": \"timestamp\",\n\t\t\t\t\"description\": \"timestamp is required and must be a timestamp\",\n\t\t\t},\n\t\t\t\"type\": bson.M{\n\t\t\t\t\"bsonType\": \"string\",\n\t\t\t\t\"description\": \"type is required and must be a string\",\n\t\t\t},\n\t\t},\n\t}\n\n\tcolOpts := options.CreateCollection().SetValidator(bson.M{\"$jsonSchema\": jsonSchema})\n\tcolOpts.SetCapped(true)\n\tcolOpts.SetSizeInBytes(100000)\n\n\tcreateCollectionErr := db.CreateCollection(context.TODO(), \"logging\", colOpts)\n\n\tif createCollectionErr != nil {\n\t\treturn dbController.NewDBError(createCollectionErr.Error())\n\t}\n\n\treturn nil\n}", "func NewLog(ctx context.Context, db *sql.DB) (*Log, error) {\n\tconn, err := stdlib.AcquireConn(db)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer releaseConn(db, conn)\n\n\t// only ever load new events\n\tlastID, err := swodb.New(conn).LastLogID(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tl := &Log{\n\t\tdb: db,\n\t\teventCh: make(chan Message),\n\t}\n\tgo l.readLoop(log.FromContext(ctx).BackgroundContext(), lastID)\n\treturn l, nil\n}", "func (repo *GormRepository) WriteBotEventLog(log *model.BotEventLog) error {\n\tif log == nil || log.RequestID == uuid.Nil {\n\t\treturn nil\n\t}\n\treturn repo.db.Create(log).Error\n}", "func WiteLog(prefix string, text string) {\n\tf, err := os.OpenFile(\"log/logs.log\", os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\tdefer f.Close()\n\tlogger := log.New(f, prefix, log.LstdFlags)\n\tlogger.Printf(\"<========= Start log \" + prefix + \"=========>\")\n\tlogger.Printf(text)\n\tlogger.Printf(\"<========= End log \" + prefix + \"=========>\")\n}", "func writeLogs() (err error) {\n\t// Logging to a file.\n\thome, err := os.UserHomeDir()\n\tif err != nil {\n\t\treturn err\n\t}\n\tf, err := os.Create(home + \"/Desktop/\" + \"gin.log\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tgin.DefaultWriter = io.MultiWriter(f)\n\treturn nil\n}", "func (dbs *BadgerStore) StoreLogs(logs []*raft.Log) error {\n\ttxn := dbs.store.NewTransaction(true)\n\n\tdefer txn.Discard()\n\n\tfor _, log := range logs {\n\t\tkey := uint64ToBytes(log.Index)\n\t\tval, err := encodeMsgPack(log)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\terr = txn.Set(key, val.Bytes())\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif err := txn.Commit(nil); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (r *TableEventHandler) HandleLogEvent() {\n\tdefer func() {\n\t\tif err := recover(); err != nil {\n\t\t\tr.After.Errs <- err\n\t\t}\n\t}()\n\tfor {\n\t\tselect {\n\t\tcase <-r.After.Ctx.Done():\n\t\t\t// context done\n\t\t\treturn\n\t\tcase e, hasMore := <-r.EventChan:\n\t\t\tif !hasMore {\n\t\t\t\tlog.Warn(\"channel is closed\")\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// write to level db in case of merge\n\t\t\tif err := r.handle(e); err != nil {\n\t\t\t\tlog.Error(\"handle event error exit channel \", err)\n\t\t\t\tpanic(err)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n}" ]
[ "0.7434155", "0.6841301", "0.68359804", "0.6267141", "0.6021269", "0.59769577", "0.58852136", "0.58506334", "0.583804", "0.582855", "0.56772476", "0.5555004", "0.55167997", "0.55116194", "0.5498247", "0.54875624", "0.54716736", "0.5461373", "0.5429766", "0.5427228", "0.5408741", "0.5394024", "0.53860295", "0.533608", "0.53211284", "0.52985865", "0.5286658", "0.5276817", "0.5275558", "0.5256531", "0.5254219", "0.5241495", "0.5225005", "0.5210999", "0.5208562", "0.5183673", "0.51796985", "0.5143482", "0.51368886", "0.5133096", "0.5129203", "0.512795", "0.51156706", "0.51062596", "0.5100306", "0.50933", "0.5075083", "0.50601846", "0.50601137", "0.50539523", "0.50472385", "0.50460434", "0.50361574", "0.50356984", "0.5034754", "0.50178885", "0.5015477", "0.501306", "0.50040346", "0.4995178", "0.49787635", "0.49713463", "0.49640477", "0.4962638", "0.49494663", "0.49407545", "0.4930932", "0.49224243", "0.4919704", "0.49181718", "0.49148825", "0.49133217", "0.49005568", "0.48968837", "0.48917496", "0.48885036", "0.48884994", "0.48872384", "0.4869646", "0.48506466", "0.4850333", "0.48423177", "0.48419756", "0.48199376", "0.48108461", "0.4808084", "0.48006344", "0.47988322", "0.4797535", "0.47939417", "0.47937387", "0.47937387", "0.47936288", "0.47838336", "0.47804233", "0.477548", "0.47661668", "0.4760273", "0.47544223", "0.47486356" ]
0.77328366
0
GetRecordsForURL gets records from the database for all the given URLs the records timestamp is bounded between and [origin timeframe, origin]
func GetRecordsForURL(url string, origin time.Time, timeframe int64) ([]request.ResponseLog, error) { res, err := dbName.GetRecordsForURL(url, origin, timeframe) if err != nil { return nil, err } return res, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (sts *SqliteTweetStore) IntervalUrls(startTime time.Time, endTime time.Time) []*twittertypes.TwitterUrl {\n var urls = make([]*twittertypes.TwitterUrl, 0, 200)\n urlquery := \"SELECT tweets.tweetid, urls.object FROM tweets JOIN urls ON tweets.tweetid = urls.tweetid WHERE tweets.time > ? AND tweets.time < ? ORDER BY tweets.tweetid DESC;\"\n rows, err := sts.DB.Query(urlquery, startTime, endTime)\n if err != nil {\n fmt.Printf(\"Error getting interval urls: %s\\n\", err)\n return nil\n }\n for rows.Next() {\n var tweetid int64\n var tweeturlstring []byte\n err = rows.Scan(&tweetid, &tweeturlstring)\n if err != nil {\n fmt.Printf(\"Error scanning tweeturl row: %s\\n\", err)\n continue\n }\n var tweeturl = &twittertypes.TwitterUrl{}\n err = json.Unmarshal(tweeturlstring, tweeturl)\n if err != nil {\n fmt.Printf(\"Error unmarshalling tweeturl row: %s\\n\", err)\n fmt.Printf(\"Problematic tweet: %d \\n%s\\n\", tweetid, string(tweeturlstring))\n } else {\n fmt.Printf(\"Got tweeturl\\n\")\n }\n urls = append(urls, tweeturl)\n }\n err = rows.Err() // get any error encountered during iterationerr := row.Scan(&lastId)\n return urls\n}", "func processUrls(dasquery dasql.DASQuery, system, api string, urls []string) []mongo.DASRecord {\n\tvar outRecords []mongo.DASRecord\n\tout := make(chan utils.ResponseType)\n\tdefer close(out)\n\tumap := map[string]int{}\n\tclient := utils.HttpClient()\n\tfor _, furl := range urls {\n\t\tumap[furl] = 1 // keep track of processed urls below\n\t\tgo utils.Fetch(client, furl, \"\", out) // \"\" specify optional args\n\t}\n\t// collect all results from out channel\n\texit := false\n\tfor {\n\t\tselect {\n\t\tcase r := <-out:\n\t\t\t// process data\n\t\t\tvar records []mongo.DASRecord\n\t\t\tif system == \"dbs3\" || system == \"dbs\" {\n\t\t\t\trecords = DBSUnmarshal(api, r.Data)\n\t\t\t} else if system == \"phedex\" {\n\t\t\t\trecords = PhedexUnmarshal(api, r.Data)\n\t\t\t}\n\t\t\tfor _, rec := range records {\n\t\t\t\trec[\"url\"] = r.Url\n\t\t\t\toutRecords = append(outRecords, rec)\n\t\t\t}\n\t\t\t// remove from umap, indicate that we processed it\n\t\t\tdelete(umap, r.Url) // remove Url from map\n\t\tdefault:\n\t\t\tif len(umap) == 0 { // no more requests, merge data records\n\t\t\t\texit = true\n\t\t\t}\n\t\t\ttime.Sleep(time.Duration(10) * time.Millisecond) // wait for response\n\t\t}\n\t\tif exit {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn outRecords\n}", "func (p *Provider) GetRecords(ctx context.Context, zone string) ([]libdns.Record, error) {\n\tp.mutex.Lock()\n\tdefer p.mutex.Unlock()\n\n\tclient := &http.Client{}\n\n\treq, err := http.NewRequest(http.MethodGet, fmt.Sprintf(\"https://api.leaseweb.com/hosting/v2/domains/%s/resourceRecordSets\", zone), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Add(LeasewebApiKeyHeader, p.APIKey)\n\n\tres, err := client.Do(req)\n\tdefer res.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif res.StatusCode < 200 || res.StatusCode > 299 {\n\t\treturn nil, fmt.Errorf(\"Received StatusCode %d from Leaseweb API\", res.StatusCode)\n\t}\n\n\tdata, err := ioutil.ReadAll(res.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar recordSets LeasewebRecordSets\n\tjson.Unmarshal([]byte(data), &recordSets)\n\n\tvar records []libdns.Record\n\n\tfor _, resourceRecordSet := range recordSets.ResourceRecordSets {\n\t\tfor _, content := range resourceRecordSet.Content {\n\t\t\trecord := libdns.Record{\n\t\t\t\tName: resourceRecordSet.Name,\n\t\t\t\tValue: content,\n\t\t\t\tType: resourceRecordSet.Type,\n\t\t\t\tTTL: time.Duration(resourceRecordSet.TTL) * time.Second,\n\t\t\t}\n\t\t\trecords = append(records, record)\n\t\t}\n\t}\n\n\treturn records, nil\n}", "func (chart *Chart) getDataForURL(url string) []benchmark.BenchmarkData {\n\tvar result []benchmark.BenchmarkData\n\n\turl = settings.NormalizeUrl(url)\n\n\tdbSession := settings.MongoDB()\n\tdefer dbSession.Close()\n\n\tcollection := dbSession.DB(\"StressTests\").C(\"hosts\")\n\tcollection.Find(bson.M{\"url\": url}).All(&result)\n\n\treturn result\n}", "func (c Client) GetRecords(ctx context.Context, hostname, recordType string) ([]DNSRecord, error) {\n\tendpoint := c.baseURL.JoinPath(\"dns\", \"record\", hostname)\n\n\tquery := endpoint.Query()\n\tquery.Set(\"recordType\", recordType)\n\tendpoint.RawQuery = query.Encode()\n\n\tapiResp := RecordsResponse{}\n\terr := c.doRetry(ctx, http.MethodGet, endpoint.String(), nil, &apiResp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif apiResp.StatusCode/100 != 2 {\n\t\treturn nil, fmt.Errorf(\"API error: %w\", apiResp.APIException)\n\t}\n\n\treturn apiResp.DNSRecords, nil\n}", "func ReturnUrls() (*sql.Rows, error) {\n\n\tdb, errDB := db.DBConnection()\n\tdefer db.Close()\n\tif errDB != nil {\n\t\tlog.Println(\"Cant connect to server host!\")\n\t}\n\n\tresult, err := db.Query(\"SELECT id,name,url,return_code,content,check_interval FROM sp_urls\")\n\n\treturn result, err\n}", "func GetAllURL(w http.ResponseWriter, r *http.Request) {\n\t// set headers\n\t// w.Header().Set(\"Content-Type\", \"application/json\")\n\t// w.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET\")\n\n\tif !auth.IsValidToken(r.Header.Get(\"x-auth-token\")) {\n\t\tresp := response{Status: \"error\", Message: \"Invalid Token\"}\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\n\tcursor, err := collection.Find(context.TODO(), bson.D{})\n\tif err != nil {\n\t\tlg.WriteError(err.Error())\n\t}\n\tdefer cursor.Close(context.TODO())\n\n\tvar urls []bson.M\n\n\tfor cursor.Next(context.TODO()) {\n\t\tvar url bson.M\n\t\tif err = cursor.Decode(&url); err != nil {\n\t\t\tlg.WriteError(err.Error())\n\t\t}\n\t\turls = append(urls, url)\n\t}\n\n\tjson.NewEncoder(w).Encode(urls)\n}", "func geturls(w http.ResponseWriter, r *http.Request) {\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tvar urls []Myurl\n\tdb.Find(&urls)\n\tjson.NewEncoder(w).Encode(urls)\n}", "func FetchUrls(userid string) (urls map[string]string, err error) {\n\tvar result *sql.Rows\n\turls = make(map[string]string)\n\tresult, err = DB.Query(\"Select urlname, url from urls where userid = ? group by urlname, url\", userid)\n\tif err != nil {\n\t\turls = nil\n\t\treturn\n\t}\n\n\tfor result.Next() {\n\t\tvar url string\n\t\tvar urlname string\n\t\tif err = result.Scan(&urlname, &url); err != nil {\n\t\t\turls = nil\n\t\t\tbreak\n\t\t}\n\t\tif url != \"\" {\n\t\t\tif urlname == \"\" {\n\t\t\t\turlname = url[:20]\n\t\t\t}\n\t\t\turls[urlname] = url\n\t\t}\n\t}\n\treturn\n}", "func generateRequestURLs(apiUrl string, yql string, symbols []Symbol, yearBegin int, yearEnd int,\n\tpastYearStmt *sql.Stmt, currYearStmt *sql.Stmt) <-chan string {\n\tout := make(chan string)\n\tgo func() {\n\t\ttoday := time.Now()\n\t\tfor i := 0; i < len(symbols); i++ {\n\t\t\tfor year := yearBegin; year <= yearEnd ; year++ {\n\t\t\t\tif year == today.Year() {\n\t\t\t\t\tnextHstDt := getNextHstDate(currYearStmt, symbols[i].Sym, today.Year())\n\t\t\t\t\tif nextHstDt.Day() < today.Day() {\n\t\t\t\t\t\tfmt.Printf(\"Preparing API call for current year, getting historical quotes for %s since %d-%d-%d\\n\",\n\t\t\t\t\t\t\tsymbols[i].Sym, nextHstDt.Year(), int(nextHstDt.Month()), nextHstDt.Day())\n\t\t\t\t\t\tout <- formatRequestURL(apiUrl, yql, symbols[i].Sym, nextHstDt.Year(), int(nextHstDt.Month()),\n\t\t\t\t\t\t\tnextHstDt.Day(), int(today.Month()), today.Day())\n\t\t\t\t\t} else {\n\t\t\t\t\t\tfmt.Printf(\"Skipping API call, historical quotes for %s exist for the year %d\\n\",\n\t\t\t\t\t\t\tsymbols[i].Sym, year)\n\t\t\t\t\t}\n\t\t\t\t} else if !quotesExistForPastYear(pastYearStmt, symbols[i].Sym, year) {\n\t\t\t\t\tfmt.Printf(\"Preparing API call, historical quotes for %s exist for the year %d\\n\",\n\t\t\t\t\t\tsymbols[i].Sym, year)\n\t\t\t\t\tout <- formatRequestURL(apiUrl, yql, symbols[i].Sym, year, 1, 1, 12, 31)\n\t\t\t\t} else {\n\t\t\t\t\tnextHstDt := getNextHstDate(currYearStmt, symbols[i].Sym, year)\n\t\t\t\t\tif nextHstDt.Day() < 31 && nextHstDt.Year() == year {\n\t\t\t\t\t\tfmt.Printf(\"Preparing API call for the year %d, getting historical quotes for %s since %d-%d-%d\\n\",\n\t\t\t\t\t\t\tyear, symbols[i].Sym, nextHstDt.Year(), int(nextHstDt.Month()), nextHstDt.Day())\n\t\t\t\t\t\tout <- formatRequestURL(apiUrl, yql, symbols[i].Sym, nextHstDt.Year(), int(nextHstDt.Month()),\n\t\t\t\t\t\t\tnextHstDt.Day(), int(today.Month()), today.Day())\n\t\t\t\t\t} else {\n\t\t\t\t\t\tfmt.Printf(\"Skipping API call, historical quotes for %s exist for the year %d\\n\",\n\t\t\t\t\t\t\tsymbols[i].Sym, year)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tclose(out)\n\t}()\n\treturn out\n}", "func (p *Provider) AppendRecords(ctx context.Context, zone string, records []libdns.Record) ([]libdns.Record, error) {\n\tp.mutex.Lock()\n\tdefer p.mutex.Unlock()\n\n\tclient := &http.Client{}\n\n\tvar addedRecords []libdns.Record\n\n\tfor _, record := range records {\n\t\tbody := &LeasewebRecordSet{\n\t\t\tName: record.Name,\n\t\t\tType: record.Type,\n\t\t\tContent: []string{record.Value},\n\t\t\tTTL: int(record.TTL.Seconds()),\n\t\t}\n\n\t\tbodyBuffer := new(bytes.Buffer)\n\t\tjson.NewEncoder(bodyBuffer).Encode(body)\n\n\t\treq, err := http.NewRequest(http.MethodPost, fmt.Sprintf(\"https://api.leaseweb.com/hosting/v2/domains/%s/resourceRecordSets\", zone), bodyBuffer)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treq.Header.Add(LeasewebApiKeyHeader, p.APIKey)\n\n\t\tres, err := client.Do(req)\n\t\tdefer res.Body.Close()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif res.StatusCode < 200 || res.StatusCode > 299 {\n\t\t\treturn nil, fmt.Errorf(\"Received StatusCode %d from Leaseweb API\", res.StatusCode)\n\t\t}\n\n\t\taddedRecords = append(addedRecords, record)\n\t}\n\n\treturn addedRecords, nil\n}", "func (s *cloudDNSService) getResourceRecordSets(dnsZone string) ([]*dns.ResourceRecordSet, error) {\n\ttimer := pkg.NewTimer(prometheus.ObserverFunc(func(v float64) {\n\t\trequestRecordsTimeSummary.WithLabelValues(dnsZone).Observe(v)\n\t}))\n\tdefer timer.ObserveDuration()\n\n\tpageToken := \"\"\n\n\tresourceRecordSets := make([]*dns.ResourceRecordSet, 0, 16)\n\tfor {\n\t\treq := s.service.ResourceRecordSets.List(s.project, dnsZone)\n\t\tif pageToken != \"\" {\n\t\t\treq.PageToken(pageToken)\n\t\t}\n\t\tresp, err := req.Do()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"[Cloud DNS] Error getting DNS resourceRecordSets from zone %s: %v\", dnsZone, err)\n\t\t}\n\t\tfor _, r := range resp.Rrsets {\n\t\t\tresourceRecordSets = append(resourceRecordSets, r)\n\t\t}\n\t\tif resp.NextPageToken == \"\" {\n\t\t\tbreak\n\t\t}\n\t\tpageToken = resp.NextPageToken\n\t}\n\treturn resourceRecordSets, nil\n}", "func (getter *Getter) RetrieveURIs(sourceURI string, customLimit int) []string {\n\tvar wg sync.WaitGroup\n\tvar links []soup.Root\n\tvar single bool\n\tvar i = 0\n\tvar useLimit bool\n\n\tif customLimit == 0 {\n\t\tuseLimit = false\n\t} else {\n\t\tuseLimit = true\n\t}\n\n\tt := strings.Split(sourceURI, \"/\")\n\tfilename := t[len(t)-1]\n\n\tif strings.Contains(filename, \".\") {\n\t\t// sourceURI is a single file\n\t\tsingle = true\n\t\tdoc := soup.HTMLParse(\"<a href='\" + sourceURI + \"'>\" + sourceURI + \"</a>\")\n\t\tlinks = doc.FindAll(\"a\")\n\t} else {\n\t\tresp, err := soup.Get(sourceURI)\n\t\tif err != nil {\n\t\t\tos.Exit(1)\n\t\t}\n\t\tdoc := soup.HTMLParse(resp)\n\t\tlinks = doc.Find(\"table\").FindAll(\"a\")\n\t}\n\n\tlog.Printf(\"Retrieved this many links %v\", len(links))\n\n\tif len(links) > MAXRETRIEVALSIZE {\n\t\tlog.Printf(\"Unable to continue. More files (%v) requested to download than allowed(%v)\", len(links), MAXRETRIEVALSIZE)\n\t\treturn nil\n\t}\n\n\t// NOTE remember that unbuffered channels hang\n\tallFileLocations := make(chan string, len(links))\n\tfor _, link := range links {\n\t\tswitch useLimit {\n\t\tcase true:\n\t\t\tif i != customLimit {\n\t\t\t\tvar fileURI string\n\t\t\t\twg.Add(1)\n\t\t\t\tlog.Printf(\"%v| Link: %v\", link.Text(), link.Attrs()[\"href\"])\n\n\t\t\t\tif single {\n\t\t\t\t\tfileURI = link.Attrs()[\"href\"]\n\t\t\t\t} else {\n\t\t\t\t\tfileURI = sourceURI + link.Attrs()[\"href\"]\n\t\t\t\t}\n\n\t\t\t\tgo func(file string, wg *sync.WaitGroup) {\n\t\t\t\t\tdefer wg.Done()\n\t\t\t\t\tgetter.RetrieveSingleFile(file, allFileLocations)\n\t\t\t\t}(fileURI, &wg)\n\n\t\t\t\ti++\n\t\t\t}\n\t\t\tbreak\n\t\tcase false:\n\t\t\tvar fileURI string\n\t\t\twg.Add(1)\n\t\t\tlog.Printf(\"%v| Link: %v\", link.Text(), link.Attrs()[\"href\"])\n\n\t\t\tif single {\n\t\t\t\tfileURI = link.Attrs()[\"href\"]\n\t\t\t} else {\n\t\t\t\tfileURI = sourceURI + link.Attrs()[\"href\"]\n\t\t\t}\n\n\t\t\tgo func(file string, wg *sync.WaitGroup) {\n\t\t\t\tdefer wg.Done()\n\t\t\t\tgetter.RetrieveSingleFile(file, allFileLocations)\n\t\t\t}(fileURI, &wg)\n\t\t} //switch\n\t} //for\n\n\twg.Wait()\n\tclose(allFileLocations)\n\tvar fileList []string\n\tfor file := range allFileLocations {\n\t\tfileList = append(fileList, file)\n\t}\n\treturn fileList\n}", "func (m *Manager) GetRecords(name string, from, to int) (record.Records, error) {\n\tm.mutex.RLock()\n\tdefer m.mutex.RUnlock()\n\tt, err := m.recent.GetThread(name)\n\tif log.If(err) {\n\t\treturn nil, err\n\t}\n\treturn t.Slice(from, to, m.spams)\n}", "func getMatchingRoutes(logs logs, date string) (map[string]int, error) {\n\turls := map[string]int{}\n\n\tswitch {\n\tcase withSeconds.FindString(date) == date:\n\t\t// If we match the whole date, this is the simplest case;\n\t\t// We just have to count the entries\n\t\tyear, _ := strconv.Atoi(date[0:4])\n\t\tmonth, _ := strconv.Atoi(date[5:7])\n\t\tday, _ := strconv.Atoi(date[8:10])\n\t\thour, _ := strconv.Atoi(date[11:13])\n\t\tminute, _ := strconv.Atoi(date[14:16])\n\t\tsecond, _ := strconv.Atoi(date[17:19])\n\t\tval, ok := logs[year][month][day][hour][minute][second]\n\t\tif !ok {\n\t\t\tfmt.Println(\"not found, count is 0\")\n\t\t\treturn urls, nil\n\t\t}\n\t\treturn val, nil\n\tcase withMinutes.FindString(date) == date:\n\t\tyear, _ := strconv.Atoi(date[0:4])\n\t\tmonth, _ := strconv.Atoi(date[5:7])\n\t\tday, _ := strconv.Atoi(date[8:10])\n\t\thour, _ := strconv.Atoi(date[11:13])\n\t\tminute, _ := strconv.Atoi(date[14:16])\n\t\tval, ok := logs[year][month][day][hour][minute]\n\t\tif !ok {\n\t\t\tfmt.Println(\"not found, count is 0\")\n\t\t\treturn urls, nil\n\t\t}\n\t\taddRoutesFromSecondsToList(urls, val)\n\t\treturn urls, nil\n\n\tcase withHours.FindString(date) == date:\n\t\tyear, _ := strconv.Atoi(date[0:4])\n\t\tmonth, _ := strconv.Atoi(date[5:7])\n\t\tday, _ := strconv.Atoi(date[8:10])\n\t\thour, _ := strconv.Atoi(date[11:13])\n\t\tval, ok := logs[year][month][day][hour]\n\t\tif !ok {\n\t\t\tfmt.Println(\"not found, count is 0\")\n\t\t\treturn urls, nil\n\t\t}\n\t\taddRoutesFromMinutesToList(urls, val)\n\t\treturn urls, nil\n\n\tcase withDays.FindString(date) == date:\n\t\tyear, _ := strconv.Atoi(date[0:4])\n\t\tmonth, _ := strconv.Atoi(date[5:7])\n\t\tday, _ := strconv.Atoi(date[8:10])\n\t\tval, ok := logs[year][month][day]\n\t\tif !ok {\n\t\t\tfmt.Println(\"not found, count is 0\")\n\t\t\treturn urls, nil\n\t\t}\n\t\taddRoutesFromHoursToList(urls, val)\n\t\treturn urls, nil\n\n\tcase withMonths.FindString(date) == date:\n\t\tyear, _ := strconv.Atoi(date[0:4])\n\t\tmonth, _ := strconv.Atoi(date[5:7])\n\t\tval, ok := logs[year][month]\n\t\tif !ok {\n\t\t\tfmt.Println(\"not found, count is 0\")\n\t\t\treturn urls, nil\n\t\t}\n\t\taddRoutesFromDaysToList(urls, val)\n\t\treturn urls, nil\n\n\tcase withYears.FindString(date) == date:\n\t\tyear, _ := strconv.Atoi(date[0:4])\n\t\tval, ok := logs[year]\n\t\tif !ok {\n\t\t\tfmt.Println(\"not found, count is 0\")\n\t\t\treturn urls, nil\n\t\t}\n\t\taddRoutesFromMonthsToList(urls, val)\n\t\treturn urls, nil\n\n\tdefault:\n\t\treturn urls, errors.New(\"invalid date format\")\n\t}\n}", "func GetRecords(db *sql.DB, table string, iplist map[string]*string) {\n\tvar query string\n\tif table == \"short_ban\" {\n\t\tquery = shortBanIPs\n\t} else if table == \"long_ban\" {\n\t\tquery = longBanIPs\n\t} else {\n\t\tlog.Error().\n\t\t\tStr(\"Table\", table).\n\t\t\tMsg(\"GetRecords: Invalid table name\")\n\t\treturn\n\t}\n\trows, err := db.Query(query)\n\tif err != nil {\n\t\tlog.Printf(\"Error getting IP from row on table %s: %s\", table, err)\n\t\treturn\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tvar ip string\n\t\terr = rows.Scan(&ip)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Error getting IP from row in table %s: %s\", table, err)\n\t\t\tcontinue\n\t\t}\n\t\t// modify the IP to have a CIDR value\n\t\t// TODO: handle this more gracefully in the future\n\t\tip = ip + \"/32\"\n\t\tiplist[ip] = &ip\n\t\t//*iplist = append(*iplist, &ip)\n\t}\n}", "func dbsUrls(dasquery dasql.DASQuery, api string) []string {\n\tinst := dasquery.Instance\n\t// get runs from spec\n\trunsArgs := runArgs(dasquery)\n\tvalidFile := fileStatus(dasquery)\n\n\t// find all blocks for given dataset or block\n\tvar urls []string\n\tfor _, blk := range findBlocks(dasquery) {\n\t\tmyurl := fmt.Sprintf(\"%s/%s?block_name=%s\", DBSUrl(inst), api, url.QueryEscape(blk))\n\t\tif len(runsArgs) > 0 {\n\t\t\tmyurl += runsArgs // append run arguments\n\t\t}\n\t\tif validFile {\n\t\t\tif !strings.Contains(myurl, \"validFileOnly\") {\n\t\t\t\tmyurl += fmt.Sprintf(\"&validFileOnly=1\") // append validFileOnly=1\n\t\t\t}\n\t\t}\n\t\turls = append(urls, myurl)\n\t}\n\treturn utils.List2Set(urls)\n}", "func (task *ParseTask) GetRecords(content []byte) ([]wisply.Recorder, error) {\n\tmsg := \"\"\n\ttask.addContent(\"records\")\n\trecords, err := task.remote.GetRecords(content)\n\tnumber := len(records)\n\tif number == 0 {\n\t\tmsg = \"There are no new records\"\n\t} else {\n\t\tmsg = \"Success. \" + strconv.Itoa(number) + \" `records` has been identified\"\n\t}\n\ttask.finishRequest(err, msg)\n\n\treturn records, err\n}", "func GetGroupURLs(url string) []string {\n\n\t// Initialize Colly Collector\n\tc := colly.NewCollector(\n\t\tcolly.AllowedDomains(\"www.tbs-sct.gc.ca\"),\n\t)\n\n\tc.OnRequest(func(r *colly.Request) {\n\t\tfmt.Println(\"Visiting\", r.URL)\n\t})\n\n\tc.OnError(func(_ *colly.Response, err error) {\n\t\tlog.Println(\"Something went wrong\", err)\n\t})\n\n\tc.OnResponse(func(r *colly.Response) {\n\t\tfmt.Println(\"Visited\", r.Request.URL)\n\t})\n\n\t// set URLs for scraping\n\tpath := url\n\n\t// set empty array for urls\n\turls := []string{}\n\n\t// Test scraping function rates of pay\n\tc.OnHTML(\"a[href]\", func(e *colly.HTMLElement) {\n\n\t\tlink := e.Attr(\"href\")\n\t\tfmt.Println(link)\n\n\t\tif strings.Contains(link, \"rates\") {\n\t\t\turls = append(urls, link)\n\t\t}\n\t})\n\n\tc.OnScraped(func(r *colly.Response) {\n\t\tfmt.Println(\"Finished\", r.Request.URL)\n\t})\n\n\tc.Visit(path)\n\n\treturn urls\n}", "func (c *cockroachdb) getRecords(tokens []string, fetchFiles bool) ([]Record, error) {\n\t// Lookup the latest version of each record specified by\n\t// the provided tokens.\n\tquery := `SELECT a.*\n FROM records a\n LEFT OUTER JOIN records b\n ON a.token = b.token\n AND a.version < b.version\n WHERE b.token IS NULL\n AND a.token IN (?)`\n\trows, err := c.recordsdb.Raw(query, tokens).Rows()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\trecords := make([]Record, 0, len(tokens))\n\tfor rows.Next() {\n\t\tvar r Record\n\t\terr := c.recordsdb.ScanRows(rows, &r)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\trecords = append(records, r)\n\t}\n\tif err = rows.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Compile a list of record primary keys\n\tkeys := make([]string, 0, len(records))\n\tfor _, v := range records {\n\t\tkeys = append(keys, v.Key)\n\t}\n\n\tif fetchFiles {\n\t\t// Lookup files and metadata streams for each of the\n\t\t// previously queried records.\n\t\terr = c.recordsdb.\n\t\t\tPreload(\"Metadata\").\n\t\t\tPreload(\"Files\").\n\t\t\tWhere(keys).\n\t\t\tFind(&records).\n\t\t\tError\n\t} else {\n\t\t// Lookup just the metadata streams for each of the\n\t\t// previously queried records.\n\t\terr = c.recordsdb.\n\t\t\tPreload(\"Metadata\").\n\t\t\tWhere(keys).\n\t\t\tFind(&records).\n\t\t\tError\n\t}\n\n\treturn records, err\n}", "func (p *Provider) GetRecords(ctx context.Context, zone string) ([]libdns.Record, error) {\n\treturn nil, fmt.Errorf(\"not implemented\")\n}", "func (cp *singleConnectionPool) URLs() []*url.URL { return []*url.URL{cp.connection.URL} }", "func (client *AuroraDNSClient) GetRecords(zoneID string) ([]records.GetRecordsResponse, error) {\n\tlogrus.Debugf(\"GetRecords(%s)\", zoneID)\n\trelativeURL := fmt.Sprintf(\"zones/%s/records\", zoneID)\n\n\tresponse, err := client.requestor.Request(relativeURL, \"GET\", []byte(\"\"))\n\tif err != nil {\n\t\tlogrus.Errorf(\"Failed to receive records: %s\", err)\n\t\treturn nil, err\n\t}\n\n\tvar respData []records.GetRecordsResponse\n\terr = json.Unmarshal(response, &respData)\n\tif err != nil {\n\t\tlogrus.Errorf(\"Failed to unmarshall response: %s\", err)\n\t\treturn nil, err\n\t}\n\n\treturn respData, nil\n}", "func (p *F5DNSLBProvider) Records(ctx context.Context) ([]*endpoint.Endpoint, error) {\n\t// If not present return empty\n\t// else find all A pool-members from the pool\n\tlog.Println(\"Records invoked\")\n\tsubs, err := p.GetFilteredDNSConfig()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\trecords := p.TransformToRecords(subs)\n\treturn records, nil\n}", "func urlBlobs(blobs blobPaths) error {\n\tblobs = validBlobHashes(blobs)\n\n\tdataIndex, err := NewMainDataIndex()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, hash := range blobs {\n\t\tpErr(\"%v\\n\", dataIndex.urlBlob(hash))\n\t}\n\n\treturn nil\n}", "func URLs(dir string, skip bool) error {\n\turls := []string{federalRevenueURL, nationalTreasureBaseURL}\n\thandlers := []getURLsHandler{federalRevenueGetURLsNoUpdatedAt, nationalTreasureGetURLs}\n\tvar out []string\n\tfor idx := range urls {\n\t\tu, err := getURLs(urls[idx], handlers[idx], dir, skip)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error gathering resources for download: %w\", err)\n\t\t}\n\t\tout = append(out, u...)\n\t}\n\tsort.Strings(out)\n\tfmt.Println(strings.Join(out, \"\\n\"))\n\treturn nil\n}", "func (_obj *DataService) GetActivityRecords(index int32, batch int32, activity_id string, nextIndex *int32, recordList *[]ActivityRecord, _opt ...map[string]string) (ret int32, err error) {\n\n\tvar length int32\n\tvar have bool\n\tvar ty byte\n\t_os := codec.NewBuffer()\n\terr = _os.Write_int32(index, 1)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\terr = _os.Write_int32(batch, 2)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\terr = _os.Write_string(activity_id, 3)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\terr = _os.Write_int32((*nextIndex), 4)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\terr = _os.WriteHead(codec.LIST, 5)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\terr = _os.Write_int32(int32(len((*recordList))), 0)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tfor _, v := range *recordList {\n\n\t\terr = v.WriteBlock(_os, 0)\n\t\tif err != nil {\n\t\t\treturn ret, err\n\t\t}\n\n\t}\n\n\tvar _status map[string]string\n\tvar _context map[string]string\n\tif len(_opt) == 1 {\n\t\t_context = _opt[0]\n\t} else if len(_opt) == 2 {\n\t\t_context = _opt[0]\n\t\t_status = _opt[1]\n\t}\n\t_resp := new(requestf.ResponsePacket)\n\ttarsCtx := context.Background()\n\n\terr = _obj.s.Tars_invoke(tarsCtx, 0, \"getActivityRecords\", _os.ToBytes(), _status, _context, _resp)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\t_is := codec.NewReader(tools.Int8ToByte(_resp.SBuffer))\n\terr = _is.Read_int32(&ret, 0, true)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\terr = _is.Read_int32(&(*nextIndex), 4, true)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\terr, have, ty = _is.SkipToNoCheck(5, true)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tif ty == codec.LIST {\n\t\terr = _is.Read_int32(&length, 0, true)\n\t\tif err != nil {\n\t\t\treturn ret, err\n\t\t}\n\n\t\t(*recordList) = make([]ActivityRecord, length)\n\t\tfor i20, e20 := int32(0), length; i20 < e20; i20++ {\n\n\t\t\terr = (*recordList)[i20].ReadBlock(_is, 0, false)\n\t\t\tif err != nil {\n\t\t\t\treturn ret, err\n\t\t\t}\n\n\t\t}\n\t} else if ty == codec.SIMPLE_LIST {\n\t\terr = fmt.Errorf(\"not support simple_list type\")\n\t\tif err != nil {\n\t\t\treturn ret, err\n\t\t}\n\n\t} else {\n\t\terr = fmt.Errorf(\"require vector, but not\")\n\t\tif err != nil {\n\t\t\treturn ret, err\n\t\t}\n\n\t}\n\n\tif len(_opt) == 1 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t} else if len(_opt) == 2 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t\tfor k := range _status {\n\t\t\tdelete(_status, k)\n\t\t}\n\t\tfor k, v := range _resp.Status {\n\t\t\t_status[k] = v\n\t\t}\n\n\t}\n\t_ = length\n\t_ = have\n\t_ = ty\n\treturn ret, nil\n}", "func (p *AWSProvider) Records(zone string) ([]*endpoint.Endpoint, error) {\n\tendpoints := []*endpoint.Endpoint{}\n\n\tf := func(resp *route53.ListResourceRecordSetsOutput, lastPage bool) (shouldContinue bool) {\n\t\tfor _, r := range resp.ResourceRecordSets {\n\t\t\t// TODO(linki, ownership): Remove once ownership system is in place.\n\t\t\t// See: https://github.com/kubernetes-incubator/external-dns/pull/122/files/74e2c3d3e237411e619aefc5aab694742001cdec#r109863370\n\t\t\tswitch aws.StringValue(r.Type) {\n\t\t\tcase route53.RRTypeA, route53.RRTypeCname, route53.RRTypeTxt:\n\t\t\t\tbreak\n\t\t\tdefault:\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tfor _, rr := range r.ResourceRecords {\n\t\t\t\tendpoints = append(endpoints, endpoint.NewEndpoint(aws.StringValue(r.Name), aws.StringValue(rr.Value), aws.StringValue(r.Type)))\n\t\t\t}\n\n\t\t\tif r.AliasTarget != nil {\n\t\t\t\tendpoints = append(endpoints, endpoint.NewEndpoint(aws.StringValue(r.Name), aws.StringValue(r.AliasTarget.DNSName), \"ALIAS\"))\n\t\t\t}\n\t\t}\n\n\t\treturn true\n\t}\n\n\tparams := &route53.ListResourceRecordSetsInput{\n\t\tHostedZoneId: aws.String(expandedHostedZoneID(zone)),\n\t}\n\n\tif err := p.Client.ListResourceRecordSetsPages(params, f); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn endpoints, nil\n}", "func getLogs(w http.ResponseWriter, r *http.Request) {\n\tquery := r.URL.Query()\n\ts := query.Get(\"starttime\")\n\te := query.Get(\"endtime\")\n\tif s == \"\" || e == \"\" {\n\t\trespondWithError(w, http.StatusBadRequest, fmt.Errorf(\"empty parameters being passed\"))\n\t\treturn\n\t}\n\tstart, err := strconv.Atoi(s)\n\tif err != nil {\n\t\trespondWithError(w, http.StatusBadRequest, fmt.Errorf(\"check the value of parameters being passed\"))\n\t\treturn\n\t}\n\tend, err := strconv.Atoi(e)\n\tif err != nil {\n\t\trespondWithError(w, http.StatusBadRequest, fmt.Errorf(\"check the value of parameters being passed\"))\n\t\treturn\n\t}\n\n\tclaims := getClaims(w, r)\n\tkey := claims[\"key\"].(string)\n\tlogs, err := db.GetLogs([]byte(key), int64(start), int64(end))\n\tif err != nil {\n\t\trespondWithError(w, http.StatusInternalServerError, fmt.Errorf(\"Something went wrong getting the data requested\"))\n\t\treturn\n\t}\n\tsendResponse(w, logs)\n\treturn\n}", "func getHistory(source string) ([]TransferData, error) {\n\turl := fmt.Sprintf(\"%s/history?duration=%s\", source, url.QueryEscape(AgentRouter.CronInterval))\n\tresp := utils.FetchResponse(url, []byte{})\n\tif resp.Error != nil {\n\t\treturn nil, resp.Error\n\t}\n\tvar transferRecords []TransferData\n\terr := json.Unmarshal(resp.Data, &transferRecords)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn transferRecords, nil\n}", "func (r *requestParams) getURLs(res *http.Response, imWebPage bool) ([]string, error) {\n\tvar ar []string\n\tdoc, err := goquery.NewDocumentFromReader(res.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treg1 := regexp.MustCompile(\"key: 'ds:1'\")\n\treg2 := regexp.MustCompile(`\"(https?:\\/\\/.+?)\",\\d+,\\d+`)\n\treg3 := regexp.MustCompile(`https:\\/\\/encrypted\\-tbn0`)\n\treg4 := regexp.MustCompile(`\"(https?:\\/\\/.+?)\"`)\n\treg5 := regexp.MustCompile(`https?:\\/\\/.+?\\.jpg|https?:\\/\\/.+?\\.png|https?:\\/\\/.+?\\.gif`)\n\tdoc.Find(\"script\").Each(func(_ int, s *goquery.Selection) {\n\t\tif reg1.MatchString(s.Text()) {\n\t\t\tvar urls [][]string\n\t\t\tif imWebPage {\n\t\t\t\turls = reg4.FindAllStringSubmatch(s.Text(), -1)\n\t\t\t\tfor _, u := range urls {\n\t\t\t\t\tif !reg3.MatchString(u[1]) && !reg5.MatchString(u[0]) {\n\t\t\t\t\t\tss, err := strconv.Unquote(`\"` + u[1] + `\"`)\n\t\t\t\t\t\tif err == nil {\n\t\t\t\t\t\t\tar = append(ar, ss)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\turls = reg2.FindAllStringSubmatch(s.Text(), -1)\n\t\t\t\tfor _, u := range urls {\n\t\t\t\t\tif !reg3.MatchString(u[1]) {\n\t\t\t\t\t\tss, err := strconv.Unquote(`\"` + u[1] + `\"`)\n\t\t\t\t\t\tif err == nil {\n\t\t\t\t\t\t\tar = append(ar, ss)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t})\n\tif len(ar) == 0 {\n\t\treturn nil, errors.New(\"data couldn't be retrieved\")\n\t}\n\treturn ar, nil\n}", "func (p *PDNSProvider) Records(ctx context.Context) (endpoints []*endpoint.Endpoint, _ error) {\n\tzones, _, err := p.client.ListZones()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfilteredZones, _ := p.client.PartitionZones(zones)\n\n\tfor _, zone := range filteredZones {\n\t\tz, _, err := p.client.ListZone(zone.Id)\n\t\tif err != nil {\n\t\t\tlog.Warnf(\"Unable to fetch Records\")\n\t\t\treturn nil, err\n\t\t}\n\n\t\tfor _, rr := range z.Rrsets {\n\t\t\te, err := p.convertRRSetToEndpoints(rr)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tendpoints = append(endpoints, e...)\n\t\t}\n\t}\n\n\tlog.Debugf(\"Records fetched:\\n%+v\", endpoints)\n\treturn endpoints, nil\n}", "func TimeRangeForWeb(r *http.Request, fieldName string) QueryProcessor {\n\tqueryParams := r.URL.Query()\n\tstartParam, okStart := queryParams[\"start\"]\n\tendParam, okEnd := queryParams[\"end\"]\n\n\tvar startTime, endTime time.Time\n\tvar err error\n\tif okStart {\n\t\tstartTime, err = time.Parse(time.RFC3339, startParam[0])\n\t\tif err != nil {\n\t\t\terr = microappError.NewValidationError(\"Key_InvalidFields\", map[string]string{\"start\": \"Key_InvalidValue\"})\n\t\t}\n\t}\n\n\tif err == nil && okEnd {\n\t\tendTime, err = time.Parse(time.RFC3339, endParam[0])\n\t\tif err != nil {\n\t\t\terr = microappError.NewValidationError(\"Key_InvalidFields\", map[string]string{\"end\": \"Key_InvalidValue\"})\n\t\t}\n\t}\n\n\treturn func(db *gorm.DB, out interface{}) (*gorm.DB, microappError.DatabaseError) {\n\t\tif err != nil {\n\t\t\treturn db, microappError.NewDatabaseError(err)\n\t\t}\n\n\t\tif okStart {\n\t\t\tdb = db.Where(fieldName+\" >= ?\", startTime.UTC())\n\t\t}\n\t\tif okEnd {\n\t\t\tdb = db.Where(fieldName+\" <= ?\", endTime.UTC())\n\t\t}\n\n\t\treturn db, nil\n\t}\n}", "func getRecords(res *RecordsResp, qntString string) {\n\t//Setting the default value of the query status to false.\n\t//If the query succeeds, at the end, we cange this status to true.\n\tres.Status = false\n\n\tqnt, err := strconv.Atoi(qntString)\n\tif err != nil {\n\t\tlog.Printf(\"Function getRecords: Something went wrong when converting the quantity of records from string to int.\\n %v\\n\", err)\n\t\treturn\n\t}\n\t\n\t// Connecting to the database\n session, err := mgo.Dial(\"localhost\");\n if err != nil {\n \tlog.Printf(\"Function getRecords: Error when opening connection to database.\\n %v\\n\", err)\n \treturn\n }\n defer session.Close()\n \n // Querying the database\n conn := session.DB(DATABASE_NAME).C(RECORDS_COLLECTION)\n if err := conn.Find(nil).Limit(qnt).All(&res.Records); err != nil {\n \tlog.Printf(\"Function getRecords: Error when querying database.\\n %v\\n\", err)\n \treturn\n }\n \n // Getting the User Data\n conn = session.DB(DATABASE_NAME).C(USERS_COLLECTION)\n for i, _ := range res.Records {\n \tif err := conn.FindId(res.Records[i].UserId).One(&res.Records[i].UserData); err != nil {\n \t\tlog.Printf(\"Function getRecords: Error when getting user data\\n %v\\n\", err)\n \t\treturn\n \t}\n }\n \n //Query succeeded\n res.Status = true\n}", "func getURLsfromPageWithName( name string ) ([]string, error) {\n\n\turlList := []string{}\n\n\tindex := 1\n\tfor {\n\t\turl := fmt.Sprintf(apiURLFormat, name, index)\n\t\tcontents, err := downloadContentsfromURL(url)\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Unable to download contents %s\\n\", err.Error())\n\t\t\t//return nil, err\n\t\t\tbreak\n\t\t}\n\n\t\tvar resp IViewSeriesSubResponse\n\t\terr = json.Unmarshal([]byte(contents), &resp)\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Unable to unmarshal contents %s\\n\", err.Error())\n\t\t\tbreak\n\t\t}\n\n\t\tfor _, ep := range resp.Embedded.VideoEpisodes {\n\t\t\tnewUrl := fmt.Sprintf(urlTemplate, ep.HouseNumber)\n\t\t\turlList = append(urlList, newUrl)\n\t\t}\n\n\t\t// next page of links.\n\t\tindex++\n\t}\n\n\tuniqueList := uniqueStringList(urlList)\n\n\treturn uniqueList, nil\n}", "func jsonURLsHandler(w http.ResponseWriter, r *http.Request) {\n\trunID := r.FormValue(\"runID\")\n\turls, err := resultStore.GetURLs(runID)\n\tif err != nil {\n\t\thttputils.ReportError(w, r, err, fmt.Sprintf(\"Failed to retrieve URLs for run %s\", runID))\n\t}\n\tsendJsonResponse(w, map[string][]map[string]string{\"urls\": urls})\n}", "func GetChildURLs(url string, domain ...string) ([]string, error) {\n\n\t// setup http client\n\t// pakai \"GET\" request\n\tclient := &http.Client{}\n\trb := &bytes.Buffer{}\n\treq, err := http.NewRequest(\"GET\", url, rb)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// pastikan response body close\n\t// dan \"read all\"\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tp := `<a\\s+(?:[^>]*?\\s+)?href=\"([^\"]*)\"`\n\tif len(domain) > 0 && domain[0] != \"\" {\n\t\tp = fmt.Sprintf(`<a\\s+(?:[^>]*?\\s+)?href=\"((?:http|https)://[^\"]*\\.%s[^\"]*)\"`, domain[0])\n\t}\n\n\t// ambil pattern dari html anchor\n\tpattern, err := regexp.Compile(p)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\turls := []string{}\n\tfound := pattern.FindAllStringSubmatch(string(body), -1)\n\n\t// tidak ada link, tidak usah diteruskan\n\tif len(found) == 0 {\n\t\treturn urls, nil\n\t}\n\n\tfor _, f := range found {\n\t\tif len(f) == 2 {\n\t\t\t// jika parameter ada parameter domain\n\t\t\turls = append(urls, f[1])\n\n\t\t}\n\t}\n\n\treturn urls, nil\n}", "func GetStreamingTrends(w http.ResponseWriter, r *http.Request) {\n\tfrom := r.URL.Query().Get(\"From\")\n\tto := r.URL.Query().Get(\"To\")\n\tuserId := r.URL.Query().Get(\"UserId\")\n\tkey := r.URL.Query()[\"Key\"]\n\tfromTime, err := time.Parse(\"2006-01-02\", from)\n\terrors.Pie(err)\n\t// fromTime = fromTime.Add(8 * time.Hour)\n\ttoTime := fromTime.Add(24 * time.Hour)\n\tendTime, err := time.Parse(\"2006-01-02\", to)\n\t// endTime = endTime.Add(8 * time.Hour)\n\terrors.Pie(err)\n\n\tvalues := []interface{}{userId, pq.Array(key)}\n\tphi := 3\n\tquery := \"\"\n\tunion := \"\"\n\tfor toTime.Unix() <= endTime.Unix() {\n\t\tquery += union + fmt.Sprintf(`(select $%d::timestamp::date as date, key, min(value), max(value), avg(value), sum(value)\n\t\t\tfrom\n\t\tsession_records\n\t\t\twhere\n\t\tuser_id = $1\n\t\tand key = ANY($2)\n\t\tand value != -1\n\t\tand timestamp between $%d and $%d group by key)`, phi, phi, phi+1)\n\t\tvalues = append(values, fromTime.Unix(), toTime.Unix())\n\t\tfromTime = toTime\n\t\ttoTime = toTime.Add(24 * time.Hour)\n\t\tphi += 2\n\t\tunion = \" UNION \"\n\t\tlogger.Debugf(\"From: %s, To: %s\", fromTime, toTime)\n\t}\n\n\tdb := datastore.GetConnection()\n\tlogger.Debug(query)\n\trows, err := db.Query(query, values...)\n\terrors.Pie(err)\n\n\tresult := []map[string]map[string]interface{}{}\n\tfor rows.Next() {\n\t\tvar date string\n\t\tvar key string\n\t\tvar min float64\n\t\tvar max float64\n\t\tvar avg float64\n\t\tvar sum float64\n\t\trows.Scan(&date, &key, &min, &max, &avg, &sum)\n\t\trow := map[string]map[string]interface{}{}\n\t\trow[key] = map[string]interface{}{\n\t\t\t\"Date\": date,\n\t\t\t\"Min\": min,\n\t\t\t\"Max\": max,\n\t\t\t\"Avg\": avg,\n\t\t\t\"Sum\": sum,\n\t\t}\n\t\tresult = append(result, row)\n\t}\n\ttypes.MarshalInto(result, w)\n}", "func (cp *statusConnectionPool) URLs() []*url.URL {\n\tvar urls []*url.URL\n\n\tcp.Lock()\n\tdefer cp.Unlock()\n\n\tfor _, c := range cp.live {\n\t\turls = append(urls, c.URL)\n\t}\n\n\treturn urls\n}", "func retrieve(target *url.URL) Result {\n\n\trt := http.DefaultTransport\n\tvar req *http.Request\n\n\terr := backoff.Retry(func() (e error) {\n\t\treq, e = http.NewRequest(\"GET\", target.String(), nil)\n\t\treturn\n\t}, backoff.NewExponentialBackOff())\n\n\tif err != nil {\n\t\treturn Result{Status: \"E_REQ\", URL: target.String(), Took: 0,\n\t\t\tEpoch: time.Now().Unix(), Locations: EmptyLocations}\n\t}\n\n\tvar resp *http.Response\n\n\tstart := time.Now()\n\terr = backoff.Retry(func() (e error) {\n\t\tresp, e = rt.RoundTrip(req)\n\t\tif e != nil {\n\t\t\tlog.Printf(\"retrying %s\", req.URL.String())\n\t\t}\n\t\treturn e\n\t}, backoff.NewExponentialBackOff())\n\telapsed := time.Since(start)\n\n\tif err != nil {\n\t\treturn Result{Status: \"E_REQ\", URL: target.String(), Took: elapsed.Seconds(),\n\t\t\tEpoch: time.Now().Unix(), Locations: EmptyLocations}\n\t}\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\n\tif err != nil {\n\t\treturn Result{Status: \"E_READ\", URL: target.String(), Took: elapsed.Seconds(),\n\t\t\tEpoch: time.Now().Unix(), Locations: EmptyLocations}\n\t}\n\n\tresp.Body.Close()\n\n\tvar ar APIResponse\n\terr = json.Unmarshal(body, &ar)\n\tif err != nil {\n\t\treturn Result{Status: \"E_JSON\", URL: target.String(), Took: elapsed.Seconds(),\n\t\t\tEpoch: time.Now().Unix(), Locations: EmptyLocations}\n\t}\n\n\tif resp.StatusCode != 200 {\n\t\treturn Result{Status: resp.Status, URL: target.String(), Took: elapsed.Seconds(), Epoch: time.Now().Unix(), Locations: EmptyLocations}\n\t}\n\n\tresult := Result{Status: resp.Status, URL: target.String(), Took: elapsed.Seconds(), Epoch: time.Now().Unix()}\n\n\tfor _, value := range ar.Values {\n\t\tif value.Type == \"URL\" {\n\t\t\tvar v URLValue\n\t\t\terr := json.Unmarshal(value.Data, &v)\n\t\t\tif err != nil {\n\t\t\t\treturn Result{Status: \"E_JSON\", URL: target.String(), Took: elapsed.Seconds(), Epoch: time.Now().Unix()}\n\t\t\t}\n\t\t\tresult.Locations = append(result.Locations, v.Value)\n\t\t}\n\t}\n\tif len(result.Locations) == 0 {\n\t\tresult.Locations = EmptyLocations\n\t}\n\treturn result\n}", "func (c *DeviceController) GetRecords(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tres := r53.GetRecordSets(vars[\"id\"])\n\tc.SendJSON(\n\t\tw,\n\t\tr,\n\t\tres,\n\t\thttp.StatusOK,\n\t)\n}", "func GetUriFilteringTraffic(engine *xorm.Engine, prefixType string, prefixTypeId int64, trafficType string) (trafficList []UriFilteringTraffic, err error) {\n\ttrafficList = []UriFilteringTraffic{}\n\terr = engine.Where(\"prefix_type = ? AND prefix_type_id = ? AND traffic_type = ?\",prefixType, prefixTypeId, trafficType).OrderBy(\"id ASC\").Find(&trafficList)\n\treturn\n}", "func (d *DBClient) AllRecordsHandler(w http.ResponseWriter, req *http.Request, next http.HandlerFunc) {\n\trecords, err := d.Cache.GetAllRequests()\n\n\tif err == nil {\n\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\t\tvar response recordedRequests\n\t\tresponse.Data = records\n\t\tb, err := json.Marshal(response)\n\n\t\tif err != nil {\n\t\t\tlog.Error(err)\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t} else {\n\t\t\tw.Write(b)\n\t\t\treturn\n\t\t}\n\t} else {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"Error\": err.Error(),\n\t\t}).Error(\"Failed to get data from cache!\")\n\n\t\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\t\tw.WriteHeader(500) // can't process this entity\n\t\treturn\n\t}\n}", "func (client DnsClient) getDomainRecords(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodGet, \"/zones/{zoneNameOrId}/records/{domain}\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response GetDomainRecordsResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "func GetMultiDomainLog(cli bce.Client, queryData *LogQueryData) ([]LogEntry, error) {\n\tif queryData == nil {\n\t\treturn nil, errors.New(\"queryData could not be nil\")\n\t}\n\tif err := checkTimeInterval(queryData.TimeInterval, 180*24*60*60); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif queryData.PageNo == 0 {\n\t\tqueryData.PageNo = 1\n\t}\n\tif queryData.PageNo < 0 {\n\t\treturn nil, errors.New(\"invalid queryData.PageNo, it should be larger than 0\")\n\t}\n\n\tif queryData.PageSize < 0 {\n\t\treturn nil, errors.New(\"invalid queryData.PageSize, it should be larger than 0\")\n\t}\n\n\trespObj := &struct {\n\t\tStartTime string `json:\"startTime\"`\n\t\tEndTime string `json:\"endTime\"`\n\t\tTotalCount int `json:\"totalCount\"`\n\t\tUrls []struct {\n\t\t\t*LogBase\n\t\t\tLogTimeBegin string `json:\"logTimeBegin\"`\n\t\t\tLogTimeEnd string `json:\"logTimeEnd\"`\n\t\t} `json:\"urls\"`\n\t}{}\n\n\terr := httpRequest(cli, \"POST\", \"/v2/log/list\", nil, queryData, respObj)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresult := make([]LogEntry, 0, len(respObj.Urls))\n\n\tfor i, _ := range respObj.Urls {\n\t\tlog := LogEntry{\n\t\t\tLogBase: respObj.Urls[i].LogBase,\n\t\t\tTimeInterval: &TimeInterval{\n\t\t\t\tStartTime: respObj.Urls[i].LogTimeBegin,\n\t\t\t\tEndTime: respObj.Urls[i].LogTimeEnd,\n\t\t\t},\n\t\t}\n\t\tresult = append(result, log)\n\t}\n\n\treturn result, nil\n}", "func getRecordsstdin(url string) []byte {\n\tfmt.Println(\"Gib Anfangs- und Enddatum an. (dd.mm.yyyy)\")\n\tscanner := bufio.NewScanner(os.Stdin)\n\tfmt.Print(\"Anfangsdatum: \")\n\tscanner.Scan()\n\tstart := parsedate(scanner.Text())\n\n\tfmt.Print(\"Enddatum: \")\n\tscanner.Scan()\n\tende := parsedate(scanner.Text())\n\n\tresp, err := http.Get(url + \"starttime=\" + start + \"&endtime=\" + ende)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\tdefer resp.Body.Close()\n\n\tdata, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\treturn data\n}", "func deleteRecords(url string, ids []int) {\n\n\t// define transport properties\n\ttr := &http.Transport{\n\t\tMaxIdleConns: 10,\n\t\tIdleConnTimeout: 30 * time.Second,\n\t\tDisableCompression: true,\n\t}\n\n\t// initialize a new http client\n\tclient := &http.Client{Transport: tr}\n\n\tfor _, id := range ids {\n\n\t\t// each record must be deleted individually\n\t\tdeleteURL := fmt.Sprintf(\"%s/%d\", url, id)\n\n\t\tlog.Printf(\"DELETE: %s\", deleteURL)\n\n\t\t// define a new request with corresponding authentication header\n\t\treq, err := http.NewRequest(\"DELETE\", deleteURL, nil)\n\t\treq.Header.Add(\"Authorization\", fmt.Sprintf(\"Bearer %s\", ninoxAPIKey))\n\t\treq.Header.Add(\"Content-Type\", \"application/json; charset=utf-8\")\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"could not create post request: %+v\", err)\n\t\t}\n\n\t\tresp, err := client.Do(req)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"could not perform post request: %+v\", err)\n\t\t}\n\t\tdefer resp.Body.Close() // nolint:errcheck\n\n\t\tcontent, err := ioutil.ReadAll(resp.Body)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"could not read response: %+v\", err)\n\t\t}\n\n\t\tlog.Printf(\"%s\", content)\n\t}\n\n}", "func (api *API) ListDNSRecords(ctx context.Context, rc *ResourceContainer, params ListDNSRecordsParams) ([]DNSRecord, *ResultInfo, error) {\n\tif rc.Identifier == \"\" {\n\t\treturn nil, nil, ErrMissingZoneID\n\t}\n\n\tparams.Name = toUTS46ASCII(params.Name)\n\n\tautoPaginate := true\n\tif params.PerPage >= 1 || params.Page >= 1 {\n\t\tautoPaginate = false\n\t}\n\n\tif params.PerPage < 1 {\n\t\tparams.PerPage = listDNSRecordsDefaultPageSize\n\t}\n\n\tif params.Page < 1 {\n\t\tparams.Page = 1\n\t}\n\n\tvar records []DNSRecord\n\tvar lastResultInfo ResultInfo\n\n\tfor {\n\t\turi := buildURI(fmt.Sprintf(\"/zones/%s/dns_records\", rc.Identifier), params)\n\t\tres, err := api.makeRequestContext(ctx, http.MethodGet, uri, nil)\n\t\tif err != nil {\n\t\t\treturn []DNSRecord{}, &ResultInfo{}, err\n\t\t}\n\t\tvar listResponse DNSListResponse\n\t\terr = json.Unmarshal(res, &listResponse)\n\t\tif err != nil {\n\t\t\treturn []DNSRecord{}, &ResultInfo{}, fmt.Errorf(\"%s: %w\", errUnmarshalError, err)\n\t\t}\n\t\trecords = append(records, listResponse.Result...)\n\t\tlastResultInfo = listResponse.ResultInfo\n\t\tparams.ResultInfo = listResponse.ResultInfo.Next()\n\t\tif params.ResultInfo.Done() || !autoPaginate {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn records, &lastResultInfo, nil\n}", "func MakeQueryFromUrlsList(rootdir string, urlsList [][]string) (downloads []DownloadQuery) {\n\tfor index1, urls := range urlsList {\n\t\tprefix := strconv.Itoa(index1)\n\t\tdirPath := filepath.Join(rootdir, prefix)\n\t\tfor index2, url := range urls {\n\t\t\tfilename := prefix + \"_\" + strconv.Itoa(index2) +\n\t\t\t\turl[strings.LastIndex(url, \".\"):]\n\t\t\tdownloads = append(downloads, NewDownloadQuery(url, dirPath, filename))\n\t\t}\n\t}\n\treturn\n}", "func getLocations(c *gin.Context) {\n\t//Reads minutes from querystring\n\tvar minutes string\n\tminutes = c.DefaultQuery(\"minutes\", \"5\")\n\tmin, err := strconv.ParseFloat(minutes, 64)\n\tif err != nil {\n\t\t//Sets the default values in case of erroneous input\n\t\tmin = DefaultMins\n\t}\n\t//Reads the distance flag from the querystring\n\tvar distanceReq string\n\twantsDistance := false //By default the distance computation is not required\n\tdistanceReq = c.DefaultQuery(\"distance\", \"false\")\n\tif distanceReq == \"true\" {\n\t\twantsDistance = true\n\t}\n\t//Reads driverId from the path params\n\tid := c.Param(\"id\")\n\t//Retrieves the eligible timestamps info from REDIS\n\t//Evaluate Now() timestamp (Unix time)\n\tnow := time.Now().Unix()\n\t//Gets a list of recorded timestamps for driver:id\n\tif pool == nil {\n\t\t//Pool not initialized (e.g. in unit tests). Provide a pool initialization\n\t\tlog.Println(\"Redis pool not initialized. Proceed with initialization\")\n\t\tpool = newPool(Config.Redis.Host)\n\t}\n\tconn := pool.Get()\n\tdefer conn.Close()\n\treply, err := redis.Int64s(conn.Do(\"SORT\", fmt.Sprintf(\"driver:%v:timestamps\", id), \"LIMIT\", 0, min*60, \"DESC\"))\n\tif err != nil {\n\t\tlog.Printf(\"Error in processing SORT request. %v\", err)\n\t\tc.String(http.StatusInternalServerError, \"Ooops. Something went wrong on our side.\")\n\t\treturn\n\t}\n\tlog.Printf(\"Got timestamp list. %v\", reply)\n\t//Empty timestamp list? --> driver doesn't exist. Reply with 404 error\n\tif len(reply) == 0 {\n\t\tnotFoundReply := map[string]string{\n\t\t\t\"message\": \"Driver not found\",\n\t\t}\n\t\tc.IndentedJSON(http.StatusNotFound, notFoundReply)\n\t\treturn\n\t}\n\teligibleTimestamps := make([]int64, 0)\n\tfor i := 0; i < len(reply); i++ {\n\t\ttimestamp := reply[i]\n\t\tif float64(timestamp) >= float64(now)-(min*60) {\n\t\t\teligibleTimestamps = append(eligibleTimestamps, reply[i])\n\t\t} else {\n\t\t\t//Sorted array. There are no more interesting timestamps. Ends for cycle\n\t\t\ti = len(reply)\n\t\t}\n\t}\n\t//Builds the response\n\tresponse := make([]map[string]interface{}, 0)\n\tvar total float64 //total Holds the total distance that a driver made during \"minutes\"\n\ttotal = 0\n\tfor i := 0; i < len(eligibleTimestamps); i++ {\n\t\t//Since eligibleTimestamps is ordered by DESC and the response is ordered by ASC we use a decreasing cursor\n\t\tj := len(eligibleTimestamps) - 1 - i\n\t\ttimestamp := eligibleTimestamps[j]\n\t\treply, err := redis.Positions(conn.Do(\"GEOPOS\", fmt.Sprintf(\"driver:%v:log\", id), timestamp))\n\t\tif err != nil {\n\t\t\t//Error in executing GEOPOS. Go on with next i\n\t\t\tlog.Printf(\"Error in processing GEOPOS request. %v\", err)\n\t\t\tlog.Println(\"Going on to retrieve GEOPOS for other eligible timestamps\")\n\t\t} else {\n\t\t\t//Reply contains long and lat. Add them to response and round to 6 digits precision\n\t\t\tnewElement := make(map[string]interface{})\n\t\t\tnewElement[\"latitude\"] = math.Floor(reply[0][1]*1e6) / 1e6\n\t\t\tnewElement[\"longitude\"] = math.Floor(reply[0][0]*1e6) / 1e6\n\t\t\tnewElement[\"updated_at\"] = timestampAsISO(timestamp)\n\t\t\t//Check if it has to add distance and delta in the response\n\t\t\tif wantsDistance {\n\t\t\t\t//Evaluates the distance between eligibleTimestamps[j] and eligibleTimestamps[j-1]\n\t\t\t\tvar delta float64\n\t\t\t\tif i == 0 {\n\t\t\t\t\t//The first element is the start for evaluating deltas\n\t\t\t\t\tdelta = 0\n\t\t\t\t} else {\n\t\t\t\t\t//Retrieves delta\n\t\t\t\t\tdelta, err = redis.Float64(conn.Do(\"GEODIST\", fmt.Sprintf(\"driver:%v:log\", id), eligibleTimestamps[j], eligibleTimestamps[j+1], \"m\"))\n\t\t\t\t}\n\t\t\t\t//Updates total (if GEODIST calls gives an error, delta = 0)\n\t\t\t\ttotal = total + delta\n\t\t\t\t//Adds delta and total to the response\n\t\t\t\tnewElement[\"elapsedDistance\"] = math.Floor(delta*1e3) / 1e3\n\t\t\t\tnewElement[\"cumulativeDistance\"] = math.Floor(total*1e3) / 1e3\n\t\t\t}\n\t\t\t//Updates response slice\n\t\t\tresponse = append(response, newElement)\n\t\t}\n\t}\n\t//Sends the response\n\tc.IndentedJSON(http.StatusOK, response)\n\treturn\n}", "func listRecords(client *dnsimple.Client, accountID, domain string,\n\toptions *dnsimple.ZoneRecordListOptions) (records zoneRecords, err error) {\n\tif options == nil {\n\t\toptions = &dnsimple.ZoneRecordListOptions{}\n\t}\n\tfor p := 1; ; p++ {\n\t\tlistZoneRecordsResponse, err := client.Zones.ListRecords(accountID, domain, options)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tfor i := range listZoneRecordsResponse.Data {\n\t\t\trecords = append(records, listZoneRecordsResponse.Data[i])\n\t\t}\n\t\tif options.Page == 0 {\n\t\t\toptions.Page = 2\n\t\t} else {\n\t\t\toptions.Page++\n\t\t}\n\t\tif p >= listZoneRecordsResponse.Pagination.TotalPages {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn\n}", "func (c *Cache) URLs() []string {\n\turls := make([]string, len(c.urls))\n\tcopy(urls, c.urls)\n\treturn urls\n}", "func (f *Fast) GetUrls() (urls []string, err error) {\n\tr := rq.Get(f.url)\n\tr.Qs(\"https\", \"true\")\n\tr.Qs(\"token\", f.token)\n\tr.Qs(\"urlCount\", strconv.Itoa(f.urlCount))\n\n\t_, res, err := f.client.Send(r, false)\n\tif err != nil {\n\t\terr = errInternet\n\t\treturn\n\t}\n\tdefer res.Body.Close()\n\n\turls = pickjson.PickString(res.Body, \"url\", 0)\n\tdebug.Info(\"urls:\", len(urls))\n\treturn\n}", "func (s *Server) getMediaURLMany(urls []trackInfo) ([]trackInfo, error) {\n\tif len(urls) == 0 {\n\t\treturn nil, errors.New(\"No URLs provided\")\n\t}\n\ttype result struct {\n\t\turl string\n\t\tindex int\n\t}\n\tresChan := make(chan result, len(urls))\n\terrChan := make(chan error)\n\n\tfor i, d := range urls {\n\t\tgo func(i int, url string) {\n\t\t\tmediaURL, err := s.scdl.GetDownloadURL(url, \"progressive\")\n\t\t\tif err != nil {\n\t\t\t\terrChan <- err\n\t\t\t\treturn\n\t\t\t}\n\t\t\tresChan <- result{url: mediaURL, index: i}\n\t\t}(i, d.URL)\n\t}\n\n\tcount := 0\n\tfor {\n\t\tselect {\n\t\tcase err := <-errChan:\n\t\t\treturn nil, err\n\t\tcase res := <-resChan:\n\t\t\turls[res.index].URL = res.url\n\t\t\tcount++\n\t\t}\n\n\t\tif count == len(urls) {\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn urls, nil\n}", "func GetByDateRange(rw http.ResponseWriter, r *http.Request) {\n\tuserID := r.Header.Get(\"userid\")\n\tstartDate := r.URL.Query().Get(\"startDate\")\n\tendDate := r.URL.Query().Get(\"endDate\")\n\n\t// Validate startDate and endDate\n\tif startDate == \"\" || endDate == \"\" {\n\t\tlog.Printf(\"Invalid params, startDate or endDate is missing\\n\")\n\t\trw.WriteHeader(http.StatusBadRequest)\n\t\trw.Write([]byte(\"Missing startDate or endDate\"))\n\t\treturn\n\t}\n\n\tif _, err := time.Parse(time.RFC3339, startDate); err != nil {\n\t\tlog.Printf(\"Invalid value for startDate\\n\")\n\t\trw.WriteHeader(http.StatusBadRequest)\n\t\trw.Write([]byte(\"Invalid startDate\"))\n\t\treturn\n\t}\n\n\tif _, err := time.Parse(time.RFC3339, endDate); err != nil {\n\t\tlog.Printf(\"Invalid value for endDate\\n\")\n\t\trw.WriteHeader(http.StatusBadRequest)\n\t\trw.Write([]byte(\"Invalid endDate\"))\n\t\treturn\n\t}\n\n\tquery := `SELECT * FROM events\n\t\tWHERE owner_id = $1 AND\n\t\t(start_time BETWEEN $2 AND $3 OR\n\t\tend_time BETWEEN $2 AND $3)`\n\n\trows, err := conn.DB.Query(query, userID, startDate, endDate)\n\tif err != nil {\n\t\tlog.Printf(\"DB error: %s\\n\", err)\n\t\trw.WriteHeader(http.StatusBadRequest)\n\t\trw.Write([]byte(\"Unable to communicate with database\"))\n\t\treturn\n\t}\n\tdefer rows.Close()\n\n\tevents := []Event{}\n\tfor rows.Next() {\n\t\te := Event{}\n\t\tloc := sql.NullString{}\n\t\tnotes := sql.NullString{}\n\n\t\terr = rows.Scan(&e.EventID, &e.Title, &e.StartTime, &e.EndTime, &loc, &notes, &e.OwnerID)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"DB error: %s\\n\", err)\n\t\t\trw.WriteHeader(http.StatusBadRequest)\n\t\t\trw.Write([]byte(\"Error reading from database\"))\n\t\t\treturn\n\t\t}\n\n\t\te.Location = loc.String\n\t\te.Notes = notes.String\n\n\t\tevents = append(events, e)\n\t}\n\n\trw.WriteHeader(http.StatusOK)\n\trw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(rw).Encode(events)\n}", "func DnsRecording(ctx context.Context, queryContext table.QueryContext) ([]map[string]string, error) {\n\treturn pcap.GetData(), nil\n}", "func (endpoint *Endpoint) ListLogSources(ctx context.Context, fields string, filter string, sort string, min, max int) (*LogSourcesPaginatedResponse, error) {\n\t// Options\n\toptions := []Option{}\n\tif fields != \"\" {\n\t\toptions = append(options, WithParam(\"fields\", fields))\n\t}\n\tif filter != \"\" {\n\t\toptions = append(options, WithParam(\"filter\", filter))\n\t}\n\tif sort != \"\" {\n\t\toptions = append(options, WithParam(\"sort\", sort))\n\t}\n\toptions = append(options, WithHeader(\"Range\", fmt.Sprintf(\"items=%d-%d\", min, max)))\n\n\t// Do the request\n\tresp, err := endpoint.client.do(ctx, http.MethodGet, \"/config/event_sources/log_source_management/log_sources\", options...)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error while calling the endpoint: %s\", err)\n\t}\n\n\tif resp.StatusCode != 200 {\n\t\treturn nil, fmt.Errorf(\"error with the status code: %d\", resp.StatusCode)\n\t}\n\n\t// Process the Content-Range\n\tmin, max, total, err := parseContentRange(resp.Header.Get(\"Content-Range\"))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error while parsing the content-range: %s\", err)\n\t}\n\n\t// Prepare the response\n\tresponse := &LogSourcesPaginatedResponse{\n\t\tTotal: total,\n\t\tMin: min,\n\t\tMax: max,\n\t}\n\n\t// Decode the response\n\terr = json.NewDecoder(resp.Body).Decode(&response.LogSources)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error while decoding the response: %s\", err)\n\t}\n\n\treturn response, nil\n}", "func (g *Game) Records(filter *LeaderboardFilter, embeds string) (*LeaderboardCollection, *Error) {\n\treturn fetchLeaderboardsLink(firstLink(g, \"records\"), filter, nil, embeds)\n}", "func getUrls(key string) []string {\n return []string{\"https://www.zoopla.co.uk/for-sale/houses/manchester/?q=Manchester&radius=0&results_sort=newest_listings&search_source=refine\"}\n}", "func (d *DigitalOcean) List(ctx context.Context, domain string) ([]Record, error) {\n\treq, err := d.prepareRequest(http.MethodGet, fmt.Sprintf(\"/domains/%s/records?per_page=200\", domain), nil)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to prepare a request: %w\", err)\n\t}\n\n\tctx, cancel := context.WithTimeout(ctx, d.timeout)\n\tdefer cancel()\n\n\treq = req.WithContext(ctx)\n\n\tres, err := d.c.Do(req)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to do a request: %w\", err)\n\t}\n\n\tdefer res.Body.Close()\n\n\tif !misc.Success(res.StatusCode) {\n\t\treturn nil, fmt.Errorf(\"unexpected response with status code %d\", res.StatusCode)\n\t}\n\n\tvar records domainRecords\n\tif err := json.NewDecoder(res.Body).Decode(&records); err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to decode the response: %w\", err)\n\t}\n\n\tif records.Links.Pages.Next != \"\" {\n\t\tlog.Debugf(\"there are more than 200 dns record for %s domain, are you sure that's correct? if yes, please raise an issue here: https://github.com/skibish/ddns/issues/new\", domain)\n\t}\n\n\treturn records.Records, nil\n}", "func LoadURLs(urlsFile string) []string {\n\t// Fetch URLs from the given file, which should be formatted as one URL per line\n\t// NOTE: This reads the entire file and stores it in memory.\n\t// This can be memory-intensive if the file is large, but\n\t// majestic_1million.csv is 78MB, so that should be fine\n\tcontent, err := ioutil.ReadFile(urlsFile)\n\tif err != nil {\n\t\tlog.Fatalf(\"Could not read URLs file: %v\", err)\n\t}\n\tlines := strings.Split(string(content), \"\\n\")\n\treturn lines\n}", "func FindByOriginalURL(db *mongo.Client, url string) (Record, error) {\n\tfilter := bson.D{{Key: \"originalurl\", Value: url}}\n\tctx, _ := context.WithTimeout(context.Background(), 3*time.Second)\n\tresult := db.Database(\"url-shortener\").Collection(\"urls\").FindOne(ctx, filter)\n\n\tvar record Record\n\tif result.Err() != nil {\n\t\treturn record, result.Err()\n\t}\n\tresult.Decode(&record)\n\treturn record, nil\n}", "func SpiderTimeMap(url string) (*TimeMap, error) {\n tmap, err := recurseSpider(url, nil)\n if err != nil {\n return nil, err\n }\n mementos := tmap.GetMementos()\n others := []Memento{}\n for i := 0; i < len(tmap.Links); i++ {\n if (tmap.Links[i].Params[\"rel\"] != \"timemap\" &&\n !strings.HasSuffix(tmap.Links[i].Params[\"rel\"], \"memento\")) {\n others = append(others, tmap.Links[i])\n }\n }\n sort.Sort(memslice(mementos))\n last := 0\n for i := 1; i < len(mementos); i++ {\n // need to get rid of any duplicate URLs. Making the assumption that\n // they will have the same datetime, so will have sorted right beside\n // each other.\n if mementos[last].Url != mementos[i].Url {\n last++\n if last != i {\n mementos[last] = mementos[i]\n }\n }\n }\n\n tmap.Links = append(others, mementos[:last + 1]...)\n return tmap, nil\n}", "func getLocations(w http.ResponseWriter, r *http.Request) {\r\n\r\n\tctx := appengine.NewContext(r)\r\n\tlog.Infof(ctx, \"Requested URL: %v\", r.URL)\r\n\r\n\t// What callback function should we use?\r\n\tcallback := \"\"\r\n\tif callbackParam, _ := r.URL.Query()[\"callback\"]; len(callbackParam) == 1 {\r\n\t\tcallback = callbackParam[0]\r\n\t} else {\r\n\t\thttp.Error(w, \"Missing 'callback' parameter\", http.StatusBadRequest)\r\n\t\treturn\r\n\t}\r\n\r\n\t// Should we return cached test data?\r\n\tvar wantCached bool;\r\n\tif _, ok := r.URL.Query()[\"cachedTestData\"]; ok {\r\n\t\twantCached = true;\r\n\t}\r\n\r\n\tvar data []byte\r\n\r\n\t// Do we want to use cached data?\r\n\tvar cacheKey *datastore.Key\r\n\tif wantCached {\r\n\t\tlog.Infof(ctx, \"Trying to use cached data...\")\r\n\t\tcacheKey = datastore.NewKey(ctx, \"VehicleLocations\", \"lastKnown\", 0, nil)\r\n\t\tvlData := new(VehicleLocations)\r\n\t\tif err := datastore.Get(ctx, cacheKey, vlData); err == nil {\r\n\t\t\tdata = vlData.JsonData\r\n\t\t\tlog.Infof(ctx, \"Got the data from the cache: %v bytes\", len(data))\r\n\t\t}\r\n\t}\r\n\r\n\t// Do we still need to get the data?\t\r\n\tif data == nil {\r\n\t\tlog.Infof(ctx, \"Getting the real data from CoA\")\r\n\r\n\t\t// Get the latest bus locations\r\n\t\tclient := urlfetch.Client(ctx)\r\n\t\tresp, err := client.Get(\"https://data.texas.gov/download/gyui-3zdd/text/plain\")\r\n\t\tif err != nil {\r\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\r\n\t\t\treturn\r\n\t\t}\r\n\r\n\t\t// Read the data and cache it if necessary\t\t\r\n\t\tvar b bytes.Buffer\r\n\t\tb.ReadFrom(resp.Body);\r\n\t\tdata = b.Bytes();\r\n\t\tlog.Infof(ctx, \"Got %v bytes\", len(data))\r\n\r\n\t\t// Cache this for later, if desired\r\n\t\tif wantCached {\r\n\t\t\tvlData := new(VehicleLocations)\r\n\t\t\tvlData.JsonData = data\r\n\t\t\tif _, err := datastore.Put(ctx, cacheKey, vlData); err != nil {\r\n\t\t\t\tlog.Errorf(ctx, \"Caching failed: %v\", err)\r\n\t\t\t}\r\n\t\t\tlog.Infof(ctx, \"Cached the data for later\")\r\n\t\t}\r\n\t}\r\n\r\n\t// Write the data back to the client, wrapped by a function call to the specified callback.\r\n\tfmt.Fprintf(w, callback)\r\n\tfmt.Fprint(w, \"(\")\r\n\tw.Write(data)\r\n\tfmt.Fprint(w, \")\")\r\n}", "func fastURLs(u string) ([]string, error) {\n\tresp, err := http.Get(u)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer resp.Body.Close()\n\n\tdest := make([]map[string]string, 0, 5)\n\tdec := json.NewDecoder(resp.Body)\n\tif err := dec.Decode(&dest); err != nil {\n\t\treturn nil, err\n\t}\n\n\tlist := make([]string, len(dest))\n\tfor i, u := range dest {\n\t\tlist[i] = u[\"url\"]\n\t}\n\treturn list, nil\n}", "func CrawlUrls(cat *CatType) []*Video {\n\tret := []*Video{}\n\tmaxPageNum := cat.MaxPageNum\n\tpage := 1\n\tnow := time.Now().Unix()\n\tfor page <= maxPageNum {\n\t\turl := fmt.Sprintf(cat.PageUrl, page, now)\n\t\tpage++\n\t\tlog.Println(url)\n\t\tres, err := http.Get(url)\n\t\tif err != nil {\n\t\t\tlog.Println(err, url)\n\t\t\tcontinue\n\t\t}\n\t\tbytes, _ := ioutil.ReadAll(res.Body)\n\t\tres.Body.Close()\n\t\tv := &Result{}\n\t\terr = json.Unmarshal(bytes, v)\n\t\tif err != nil {\n\t\t\tlog.Println(err, string(bytes), page)\n\t\t\tcontinue\n\t\t}\n\t\tret = append(ret, v.Data.Videos...)\n\n\t}\n\treturn ret\n}", "func (n *NameCom) ListRecords(request *ListRecordsRequest) (*ListRecordsResponse, error) {\n\tendpoint := fmt.Sprintf(\"/v4/domains/%s/records\", request.DomainName)\n\n\tvalues := url.Values{}\n\tif request.PerPage != 0 {\n\t\tvalues.Set(\"perPage\", fmt.Sprintf(\"%d\", request.PerPage))\n\t}\n\tif request.Page != 0 {\n\t\tvalues.Set(\"page\", fmt.Sprintf(\"%d\", request.Page))\n\t}\n\n\tbody, err := n.get(endpoint, values)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp := &ListRecordsResponse{}\n\n\terr = json.NewDecoder(body).Decode(resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp, nil\n}", "func (o *dnsOp) listRecords(zone dnsprovider.Zone) ([]dnsprovider.ResourceRecordSet, error) {\n\tkey := zone.Name() + \"::\" + zone.ID()\n\n\trrs := o.recordsCache[key]\n\tif rrs == nil {\n\t\trrsProvider, ok := zone.ResourceRecordSets()\n\t\tif !ok {\n\t\t\treturn nil, fmt.Errorf(\"zone does not support resource records %q\", zone.Name())\n\t\t}\n\n\t\tklog.V(2).Infof(\"Querying all dnsprovider records for zone %q\", zone.Name())\n\t\tvar err error\n\t\trrs, err = rrsProvider.List()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"error querying resource records for zone %q: %v\", zone.Name(), err)\n\t\t}\n\n\t\to.recordsCache[key] = rrs\n\t}\n\n\treturn rrs, nil\n}", "func fetchDataForInterval(db dbclient.DBClient, cloudCost dbclient.CloudCostClient, startDate time.Time, stopDate time.Time) {\n\tif startDate.After(stopDate) {\n\t\tlog.Fatalf(\"Fetch for interval: start date can't be after stop date\")\n\t}\n\n\tcurrentTime := time.Date(startDate.Year(), startDate.Month(), startDate.Day(), 0, 0, 0, 0, startDate.Location())\n\t// Make sure stop date will be included\n\tstopDate = time.Date(stopDate.Year(), stopDate.Month(), stopDate.Day(), 0, 0, 0, 1, stopDate.Location())\n\n\tfor currentTime.Before(stopDate) {\n\t\tfetchDataForDate(db, cloudCost, currentTime)\n\t\tcurrentTime = currentTime.AddDate(0, 0, 1)\n\t}\n}", "func (sts *SqliteTweetStore) IntervalTweets(startTime time.Time, endTime time.Time) []*twittertypes.Tweet {\n var tweets = make([]*twittertypes.Tweet, 0, 200)\n urlquery := \"SELECT tweetid, fulltweet FROM tweets WHERE tweets.time > ? AND tweets.time < ? ORDER BY tweets.tweetid DESC;\"\n rows, err := sts.DB.Query(urlquery, startTime, endTime)\n if err != nil {\n fmt.Printf(\"Error getting interval urls: %s\\n\", err)\n return nil\n }\n for rows.Next() {\n var tweetid int64\n var tweetstring []byte\n err = rows.Scan(&tweetid, &tweetstring)\n if err != nil {\n fmt.Printf(\"Error scanning tweetafterid row: %s\\n\", err)\n continue\n }\n var tweet = &twittertypes.Tweet{}\n err = json.Unmarshal(tweetstring, tweet)\n if err != nil {\n fmt.Printf(\"Error unmarshalling intervalTweetRow row: %s\\n\", err)\n fmt.Printf(\"Problematic tweet: %d \\n%s\\n\", tweetid, string(tweetstring))\n }\n tweets = append(tweets, tweet)\n }\n err = rows.Err() // get any error encountered during iterationerr := row.Scan(&lastId)\n return tweets\n}", "func getHostedZoneRecords(svc *route53.Route53, zone *string) (*route53.ListResourceRecordSetsOutput, error) {\n\n\trrInput := &route53.ListResourceRecordSetsInput{\n\t\tHostedZoneId: zone,\n\t}\n\thostedZoneRecordSets, err := svc.ListResourceRecordSets(rrInput)\n\n\tif err != nil {\n\t\tfmt.Printf(\"error obtaining hosted zone %s by id: %s\", aws.StringValue(zone), err)\n\t\treturn nil, err\n\t}\n\n\treturn hostedZoneRecordSets, nil\n}", "func Tracks(w http.ResponseWriter, r *http.Request) {\n\tdb := store.Bolt()\n\tdb.View(func(tx *bolt.Tx) error {\n\t\tb := tx.Bucket([]byte(\"_index:Location:StartTime\"))\n\n\t\tc := b.Cursor()\n\n\t\tvar startTimes []time.Time\n\n\t\tfor k, _ := c.First(); k != nil; k, _ = c.Next() {\n\t\t\t// Create a decoder and receive a value.\n\t\t\tdec := gob.NewDecoder(bytes.NewReader(k))\n\t\t\tvar v time.Time\n\t\t\terr := dec.Decode(&v)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatal(\"decode:\", err)\n\t\t\t}\n\t\t\tstartTimes = append(startTimes, v)\n\t\t}\n\t\tjson.NewEncoder(w).Encode(startTimes)\n\n\t\treturn nil\n\t})\n\n}", "func QueryForPictureByDate(begin time.Time, end time.Time, r *http.Request) ([]SpycamPicture, error) {\n ctx := appengine.NewContext(r)\n var pictures []SpycamPicture\n q := datastore.NewQuery(SpycamModelName).\n Filter(\"Timestamp <=\", end).\n Filter(\"Timestamp >=\", begin).\n Order(\"Timestamp\") // Order(\"-Timestamp\")\n _, err := q.GetAll(ctx, &pictures) // returns keys, and err.\n return pictures, err\n}", "func (p *Provider) SetRecords(ctx context.Context, zone string, records []libdns.Record) ([]libdns.Record, error) {\n\tp.mutex.Lock()\n\tdefer p.mutex.Unlock()\n\n\tclient := &http.Client{}\n\n\tvar updatedRecords []libdns.Record\n\n\tvar resourceRecordSets []LeasewebRecordSet\n\n\tfor _, record := range records {\n\n\t\trecordSet := LeasewebRecordSet{\n\t\t\tName: record.Name,\n\t\t\tType: record.Type,\n\t\t\tContent: []string{record.Value},\n\t\t\tTTL: int(record.TTL.Seconds()),\n\t\t}\n\n\t\tresourceRecordSets = append(resourceRecordSets, recordSet)\n\n\t\tupdatedRecords = append(updatedRecords, record)\n\t}\n\n\tbody := &LeasewebRecordSets{\n\t\tResourceRecordSets: resourceRecordSets,\n\t}\n\n\tbodyBuffer := new(bytes.Buffer)\n\tjson.NewEncoder(bodyBuffer).Encode(body)\n\n\treq, err := http.NewRequest(http.MethodPut, fmt.Sprintf(\"https://api.leaseweb.com/hosting/v2/domains/%s/resourceRecordSets\", zone), bodyBuffer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Add(LeasewebApiKeyHeader, p.APIKey)\n\n\tres, err := client.Do(req)\n\tdefer res.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif res.StatusCode < 200 || res.StatusCode > 299 {\n\t\treturn nil, fmt.Errorf(\"Received StatusCode %d from Leaseweb API\", res.StatusCode)\n\t}\n\n\treturn updatedRecords, nil\n}", "func (ttr *TradeTimeRange) QueryRecords() *TradeRecordQuery {\n\treturn (&TradeTimeRangeClient{config: ttr.config}).QueryRecords(ttr)\n}", "func loadReviews(urls []string, limit int) []httpResponse {\n // the buffered channel that will block at limit\n buffered_chan := make(chan struct{}, limit)\n // the results channel that won't block\n results_chan := make(chan *httpResponse)\n\n // Let's not forget to close our channels\n defer func() {\n close(buffered_chan)\n close(results_chan)\n }()\n\n // Concurrently make the http get requests\n for _, url := range urls {\n go makeRequest(url, buffered_chan, results_chan)\n }\n\n // Our return slice\n var results []httpResponse\n // Populate the return slice\n for{\n result := <-results_chan\n results = append(results, *result)\n if len(results) == len(urls) {\n \t\t\tbreak\n \t\t}\n }\n return results\n}", "func (v *Libravatar) baseURL(email *mail.Address, openid *url.URL) (string, error) {\n\tvar service, protocol, domain string\n\n\tif v.useHTTPS {\n\t\tprotocol = \"https://\"\n\t\tservice = v.secureServiceBase\n\t\tdomain = v.secureFallbackHost\n\n\t} else {\n\t\tprotocol = \"http://\"\n\t\tservice = v.serviceBase\n\t\tdomain = v.fallbackHost\n\t}\n\n\thost := v.getDomain(email, openid)\n\tkey := cacheKey{service, host}\n\tnow := time.Now()\n\tv.nameCacheMutex.Lock()\n\tval, found := v.nameCache[key]\n\tv.nameCacheMutex.Unlock()\n\tif found && now.Sub(val.checkedAt) <= v.nameCacheDuration {\n\t\treturn protocol + val.target, nil\n\t}\n\n\t_, addrs, err := net.LookupSRV(service, \"tcp\", host)\n\tif err != nil && err.(*net.DNSError).IsTimeout {\n\t\treturn \"\", err\n\t}\n\n\tif len(addrs) == 1 {\n\t\t// select only record, if only one is available\n\t\tdomain = strings.TrimSuffix(addrs[0].Target, \".\")\n\t} else if len(addrs) > 1 {\n\t\t// Select first record according to RFC2782 weight\n\t\t// ordering algorithm (page 3)\n\n\t\ttype record struct {\n\t\t\tsrv *net.SRV\n\t\t\tweight uint16\n\t\t}\n\n\t\tvar (\n\t\t\ttotalWeight uint16\n\t\t\trecords []record\n\t\t\ttopPriority = addrs[0].Priority\n\t\t\ttopRecord *net.SRV\n\t\t)\n\n\t\tfor _, rr := range addrs {\n\t\t\tif rr.Priority > topPriority {\n\t\t\t\tcontinue\n\t\t\t} else if rr.Priority < topPriority {\n\t\t\t\t// won't happen, because net sorts\n\t\t\t\t// by priority, but just in case\n\t\t\t\ttotalWeight = 0\n\t\t\t\trecords = nil\n\t\t\t\ttopPriority = rr.Priority\n\t\t\t}\n\n\t\t\ttotalWeight += rr.Weight\n\n\t\t\tif rr.Weight > 0 {\n\t\t\t\trecords = append(records, record{rr, totalWeight})\n\t\t\t} else if rr.Weight == 0 {\n\t\t\t\trecords = append([]record{record{srv: rr, weight: totalWeight}}, records...)\n\t\t\t}\n\t\t}\n\n\t\tif len(records) == 1 {\n\t\t\ttopRecord = records[0].srv\n\t\t} else {\n\t\t\trandnum := uint16(rand.Intn(int(totalWeight)))\n\n\t\t\tfor _, rr := range records {\n\t\t\t\tif rr.weight >= randnum {\n\t\t\t\t\ttopRecord = rr.srv\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tdomain = fmt.Sprintf(\"%s:%d\", topRecord.Target, topRecord.Port)\n\t}\n\n\tv.nameCacheMutex.Lock()\n\tv.nameCache[key] = cacheValue{checkedAt: now, target: domain}\n\tv.nameCacheMutex.Unlock()\n\treturn protocol + domain, nil\n}", "func httpCall(results *[][]string, url string) (err error) {\n\t// glog.Infof(\"HTTP GET %s\\n\", url)\n\tclient := &http.Client{\n\t\tTimeout: time.Duration(chQueryDefaultTimeout),\n\t}\n\trequest, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\tglog.Error(err)\n\t\treturn err\n\t}\n\tresponse, err := client.Do(request)\n\tif err != nil {\n\t\tglog.Error(err)\n\t\treturn err\n\t}\n\tdefer response.Body.Close()\n\tbody, err := ioutil.ReadAll(response.Body)\n\tif err != nil {\n\t\tglog.Error(err)\n\t\treturn err\n\t}\n\n\tfor _, line := range strings.Split(string(body), \"\\n\") {\n\t\tpairs := strings.Split(line, \"\\t\")\n\t\tif len(pairs) < 2 {\n\t\t\tcontinue\n\t\t}\n\t\t*results = append(*results, pairs)\n\t}\n\t// glog.Infof(\"Loaded %d rows\", len(*results))\n\n\treturn nil\n}", "func GetAll(c http.Client, urls []string, after time.Duration) (results map[string]Result) {\n\tResponses.Add(1)\n\n\tresults = make(map[string]Result, len(urls))\n\trequests := make(chan Result, len(urls))\n\ttimeout := &ErrResult{fmt.Errorf(\"timeout %v\", after)}\n\n\t// Initialize pending requests all with timeout\n\tfor _, u := range urls {\n\t\tresults[u] = Result{u, \"\", nil, timeout}\n\t}\n\n\t// Fork off instrumeted requests\n\tfor _, u := range urls {\n\t\tgo func(url string) {\n\t\t\tinstrumentGet(func() {\n\t\t\t\trequests <- Get(c, url)\n\t\t\t})\n\t\t}(u)\n\t}\n\n\t// Join results up until the deadline, anything still pending\n\t// will have been initialized with timeout\n\tdeadline := time.After(after)\n\tfor pending := len(urls); pending > 0; pending-- {\n\t\tselect {\n\t\tcase res := <-requests:\n\t\t\tresults[res.RequestURI] = res\n\t\t\tSuccessRequests.Add(1)\n\t\tcase <-deadline:\n\t\t\treturn\n\t\t}\n\t}\n\n\treturn\n}", "func GetImages(ctx context.Context, client *googleFirestore.Client, dataset, pathToOutputDir string) {\n\tworksessionColRef := client.Collection(\"workSessions\")\n\tdatasetWorkSessionDocRef := worksessionColRef.Doc(dataset)\n\tprocessedURLColRef := datasetWorkSessionDocRef.Collection(\"processedUrls\")\n\n\tdocumentRefIterator := processedURLColRef.DocumentRefs(ctx)\n\n\tif documentRefIterator == nil {\n\t\tlog.Fatalf(\"Document ref iterator is nil for processedUrls. Dataset = %q\", dataset)\n\t}\n\n\turlsToDownload := []string{}\n\tfileIds := []string{}\n\tfilenamesMetadata := [][]string{}\n\n\tfor {\n\t\tdocRef, errRefIterator := documentRefIterator.Next()\n\t\tif errRefIterator == iterator.Done {\n\t\t\tbreak\n\t\t}\n\n\t\tif errRefIterator != nil {\n\t\t\tlog.Printf(\"Error getting document ref. Err: %v\", errRefIterator)\n\t\t\tcontinue\n\t\t}\n\n\t\tdocSnapshot, errRef := docRef.Get(ctx)\n\t\tif errRef != nil {\n\t\t\tlog.Printf(\"Error getting document snapshot. Err: %v\", errRef)\n\t\t\tcontinue\n\t\t}\n\n\t\tvar processedURLDoc firestore.ProcessedUrlDocument\n\t\terrSnapshot := docSnapshot.DataTo(&processedURLDoc)\n\n\t\tif errSnapshot != nil {\n\t\t\tlog.Printf(\"Error getting processed url document data. Err: %v\", errSnapshot)\n\t\t\tcontinue\n\t\t}\n\n\t\tfor _, annotatedElementsData := range processedURLDoc.Data.AnnotatedElementsData {\n\t\t\tlog.Printf(\"Collected new url: %q. Data annotation ID: %s.\\n\", annotatedElementsData.Url, annotatedElementsData.DataAnnotationID)\n\n\t\t\tfileID := annotatedElementsData.DataAnnotationID\n\t\t\tif fileID == \"\" {\n\t\t\t\tfileID = uuid.MakeUUID()\n\t\t\t}\n\n\t\t\turlsToDownload = append(urlsToDownload, annotatedElementsData.Url)\n\t\t\tfileIds = append(fileIds, fileID)\n\t\t\tfilenamesMetadata = append(filenamesMetadata, []string{fileID, annotatedElementsData.Url})\n\t\t}\n\t}\n\n\thttpClient := httputils.NewHTTPClient()\n\n\tdestinationDirForFiles := pathToOutputDir + \"/export-\" + time.Now().Format(time.RFC3339)\n\tfileutils.CreateDirIfNotExists(destinationDirForFiles)\n\tfor idx, url := range urlsToDownload {\n\t\tfileutils.DownloadAndSaveFile(httpClient, &url, fileIds[idx], destinationDirForFiles)\n\t}\n\n\tmetadataFilenamePath := path.Join(destinationDirForFiles, \"filenames_metadata.csv\")\n\tmetadataFilenamesFile := fileutils.CreateFile(&metadataFilenamePath)\n\n\tcsv.NewWriter(metadataFilenamesFile).WriteAll(filenamesMetadata)\n}", "func RunRecordList(ns string, config doit.Config, out io.Writer, args []string) error {\n\tif len(args) != 1 {\n\t\treturn doit.NewMissingArgsErr(ns)\n\t}\n\tname := args[0]\n\n\tclient := config.GetGodoClient()\n\n\tif len(name) < 1 {\n\t\treturn errors.New(\"domain name is missing\")\n\t}\n\n\tf := func(opt *godo.ListOptions) ([]interface{}, *godo.Response, error) {\n\t\tlist, resp, err := client.Domains.Records(name, opt)\n\t\tif err != nil {\n\t\t\treturn nil, nil, err\n\t\t}\n\n\t\tsi := make([]interface{}, len(list))\n\t\tfor i := range list {\n\t\t\tsi[i] = list[i]\n\t\t}\n\n\t\treturn si, resp, err\n\t}\n\n\tsi, err := doit.PaginateResp(f)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlist := make([]godo.DomainRecord, len(si))\n\tfor i := range si {\n\t\tlist[i] = si[i].(godo.DomainRecord)\n\t}\n\n\treturn displayOutput(&domainRecord{domainRecords: list}, out)\n}", "func processSites(sites []string, wg *sync.WaitGroup) {\n\tfor i, site := range sites {\n\t\t// Launch each retrieval in a go routine. This makes each request concurrent\n\t\tgo func(index int, site string) {\n\t\t\tdefer wg.Done()\n\n\t\t\t// start a timer for this request\n\t\t\tbegin := time.Now()\n\n\t\t\t// Retrieve the site\n\t\t\tresp, err := http.Get(site)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(site, err)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tfmt.Printf(\"%d) Site %q took %s to retrieve with status code of %d.\\n\", index, site, time.Since(begin), resp.StatusCode)\n\t\t}(i, site)\n\t}\n}", "func ConvertURLS(cr []URL, name, version string) *results.Result {\n\tu := cr[len(cr)-1]\n\tpublished, _ := time.Parse(DateFormat, u.UploadTime)\n\treturn results.NewResult(name, version, u.URL, published)\n}", "func (d *DomainRecordsServiceHandler) List(ctx context.Context, domain string, options *ListOptions) ([]DomainRecord, *Meta, error) {\n\treq, err := d.client.NewRequest(ctx, http.MethodGet, fmt.Sprintf(\"%s/%s/records\", domainPath, domain), nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tnewValues, err := query.Values(options)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\treq.URL.RawQuery = newValues.Encode()\n\n\trecords := new(domainRecordsBase)\n\tif err = d.client.DoWithContext(ctx, req, records); err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\treturn records.Records, records.Meta, nil\n}", "func listDNSRecords(cfg *Config, c *CfVars, zoneID string, recordName string) ([]cloudflare.DNSRecord, error) {\n\tsubDomainRecord := cloudflare.DNSRecord{Name: recordName}\n\trec, err := c.API.DNSRecords(c.context, zoneID, subDomainRecord)\n\tif err != nil {\n\t\treturn nil, err\n\n\t}\n\n\treturn rec, nil\n}", "func (d *dnsClient) getDomainRecords(ctx context.Context, domainName, rr, recordType string) (map[string]alidns.Record, error) {\n\tif err := d.waitForAliDNSRateLimiter(ctx); err != nil {\n\t\treturn nil, err\n\t}\n\n\trecords := make(map[string]alidns.Record)\n\tpageSize, pageNumber := 20, 1\n\treq := alidns.CreateDescribeDomainRecordsRequest()\n\treq.PageSize = requests.NewInteger(pageSize)\n\tfor {\n\t\treq.PageNumber = requests.NewInteger(pageNumber)\n\t\treq.DomainName = domainName\n\t\treq.RRKeyWord = rr\n\t\treq.TypeKeyWord = recordType\n\t\tresp, err := d.Client.DescribeDomainRecords(req)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tfor _, record := range resp.DomainRecords.Record {\n\t\t\trecords[record.Value] = record\n\t\t}\n\t\tif resp.PageNumber*int64(pageSize) >= resp.TotalCount {\n\t\t\tbreak\n\t\t}\n\t\tpageNumber++\n\t}\n\treturn records, nil\n}", "func (l *Links) Retrieve(filters map[string][]string) ([]*model.Link, error) {\n\twhereClause, values, err := l.buildFilters(filters)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar rows *sql.Rows\n\tif len(whereClause) != 0 {\n\t\tquery := l.selectPattern + \"WHERE \" + whereClause\n\t\trows, err = l.records.db.Query(query, values...)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t} else {\n\t\trows, err = l.records.db.Query(l.selectPattern)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tvar result []*model.Link\n\tfor rows.Next() {\n\t\tlink, err := l.scanRow(rows.Scan)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult = append(result, link)\n\t}\n\treturn result, nil\n}", "func (a *azurednsProvider) GetZoneRecords(domain string, meta map[string]string) (models.Records, error) {\n\texistingRecords, _, _, err := a.getExistingRecords(domain)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn existingRecords, nil\n}", "func recupURLsFromConfig(config Config) (URLs []string) {\n\n\t//recup the different urls from the config file\n\turlString := strings.TrimLeft(config.URL, \"[\")\n\turlString = strings.TrimRight(urlString, \"]\")\n\tURLs = strings.Split(urlString, \",\")\n\n\t// save to slice\n\tfor i := 0; i < len(URLs); i++ {\n\t\tURLs[i] = strings.TrimSpace(URLs[i])\n\t}\n\n\t// if no MPD urls passed in, stop the app\n\tif URLs == nil {\n\t\tfmt.Println(\"No urls has been found in the config file\")\n\t\t// stop the app\n\t\tutils.StopApp()\n\t}\n\n\treturn\n}", "func gatherWaveBuffers(urls []string) ([]*audio.IntBuffer, error) {\n\twg := sync.WaitGroup{}\n\twg.Add(len(urls))\n\n\terrs := make([]error, len(urls))\n\tdatas := make([]*audio.IntBuffer, len(urls))\n\tfor i := range urls {\n\t\ti := i\n\t\turl := urls[i]\n\t\tgo func() {\n\t\t\tdefer wg.Done()\n\t\t\tdatas[i], errs[i] = getWaveBuffer(url)\n\t\t}()\n\t}\n\twg.Wait()\n\n\tfor _, err := range errs {\n\t\tif err != nil {\n\t\t\treturn nil, errgo.Mask(err)\n\t\t}\n\t}\n\n\treturn datas, nil\n}", "func (api *HWApi) SearchLogs(hosthash, logtype string, startDate, endDate time.Time) ([]string, error) {\n\t// // regexp replacer\n\t// rp := regexp.MustCompile(`^`)\n\t// create empty slice\n\tres := []string{}\n\t// if startdate > enddate reversal them\n\tif endDate.Before(startDate) {\n\t\ttempDate := endDate\n\t\tendDate = startDate\n\t\tstartDate = tempDate\n\t}\n\tif api.AuthToken == nil || api.AuthToken.LogTokens == \"\" {\n\t\treturn res, fmt.Errorf(\"log token not exists, make sure you have called auth method before using SearchLogs\")\n\t}\n\t// split request to multiple request if end - start > 1day due to limitation of response\n\t// test response lines, if gt 10000, seperate request to two request\n\tr, e := api.Request(&Request{\n\t\tMethod: GET,\n\t\tURL: storageURL + \"/\" + hosthash,\n\t\t// timelayout 2006-01-02T15:04:05Z\n\t\tQuery: map[string]string{\n\t\t\t\"marker\": startDate.Format(logtype + \"/2006/01/02/\" + logtype + \"_20060102-150405\"),\n\t\t\t\"end_marker\": endDate.Format(logtype + \"/2006/01/02/\" + logtype + \"_20060102-150405\"),\n\t\t},\n\t})\n\tif e != nil {\n\t\treturn res, fmt.Errorf(\"Search accesslogs failed, %s\", e.Error())\n\t}\n\n\tlines := string(r.body)\n\tif len(strings.Split(lines, \"\\n\")) >= 10000 {\n\t\tnd := endDate.Sub(startDate)\n\t\tr1, e1 := api.SearchLogs(hosthash, logtype, startDate, startDate.Add(nd/2))\n\t\tr2, e2 := api.SearchLogs(hosthash, logtype, startDate.Add(nd/2), endDate)\n\t\tif e1 != nil {\n\t\t\treturn []string{}, e1\n\t\t}\n\t\tif e2 != nil {\n\t\t\treturn []string{}, e2\n\t\t}\n\t\tres = append(res, r1...)\n\t\tres = append(res, r2...)\n\t} else {\n\t\tres = append(res, strings.Split(strings.ReplaceAll(hosthash+\"/\"+(strings.TrimSuffix(lines, \"\\n\")), \"\\n\", \";\"+hosthash+\"/\"), \";\")...)\n\t}\n\n\treturn res, nil\n}", "func (agent *Agent) Run(domain string, filterRegex *regexp.Regexp, includeSubdomains bool, keys *session.Keys) (URLs chan scraping.URL) {\n\tURLs = make(chan scraping.URL)\n\n\tgo func() {\n\t\tdefer close(URLs)\n\n\t\tses, err := session.New(domain, filterRegex, includeSubdomains, 10, keys)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\twg := &sync.WaitGroup{}\n\n\t\t// Run each source in parallel on the target domain\n\t\tfor name, source := range agent.sources {\n\t\t\twg.Add(1)\n\n\t\t\tgo func(name string, source scraping.Source) {\n\t\t\t\tfor res := range source.Run(domain, ses, includeSubdomains) {\n\t\t\t\t\tURLs <- res\n\t\t\t\t}\n\n\t\t\t\twg.Done()\n\t\t\t}(name, source)\n\t\t}\n\n\t\twg.Wait()\n\n\t}()\n\n\treturn\n}", "func GetAllURLs() error {\n\tr, err := http.Get(\"http://localhost:8080/api/fetcher\")\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn err\n\t}\n\tdefer r.Body.Close()\n\t//new decoder that reads from r\n\tdec := json.NewDecoder(r.Body)\n\t//checks if request body contains only fields that are in the structure\n\tdec.DisallowUnknownFields()\n\t//decode request in json format and store it in the url struct\n\terr = dec.Decode(&collection.Items)\n\t//check various errors\n\tif err != nil {\n\t\thandleError(err)\n\t\treturn err\n\t}\n\treturn nil\n}", "func (a *LogsApiService) GetLogRecordsExecute(r ApiGetLogRecordsRequest) (LogRecordsList, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue LogRecordsList\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"LogsApiService.GetLogRecords\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/logs/search\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.from != nil {\n\t\tlocalVarQueryParams.Add(\"from\", parameterToString(*r.from, \"\"))\n\t}\n\tif r.to != nil {\n\t\tlocalVarQueryParams.Add(\"to\", parameterToString(*r.to, \"\"))\n\t}\n\tif r.limit != nil {\n\t\tlocalVarQueryParams.Add(\"limit\", parameterToString(*r.limit, \"\"))\n\t}\n\tif r.query != nil {\n\t\tlocalVarQueryParams.Add(\"query\", parameterToString(*r.query, \"\"))\n\t}\n\tif r.sort != nil {\n\t\tlocalVarQueryParams.Add(\"sort\", parameterToString(*r.sort, \"\"))\n\t}\n\tif r.nextSliceKey != nil {\n\t\tlocalVarQueryParams.Add(\"nextSliceKey\", parameterToString(*r.nextSliceKey, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json; charset=utf-8\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"Api-Token\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = _ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v ErrorEnvelope\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func (client DnsClient) getZoneRecords(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodGet, \"/zones/{zoneNameOrId}/records\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response GetZoneRecordsResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "func (api API) GetDNSRecords(domain string) (records []DNSRecord, err error) {\n\tresp, err := api.performRequest(\n\t\t\"GET\",\n\t\tfmt.Sprintf(\"%s%s%s%s\", api.baseURL, \"v4/domains/\", domain, \"/records\"),\n\t\tnil,\n\t)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar result struct {\n\t\tRecords []DNSRecord\n\t}\n\n\terr = json.Unmarshal(resp, &result)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn result.Records, nil\n}", "func filterRecords(resourceRecordSet []*route53.ResourceRecordSet, domain string) []*route53.ResourceRecordSet {\n\tvar result []*route53.ResourceRecordSet\n\tfor i := 0; i < len(resourceRecordSet); i++ {\n\t\tif *resourceRecordSet[i].Type == \"A\" && isValidRecord(*resourceRecordSet[i].Name, domain) {\n\t\t\tresult = append(result, resourceRecordSet[i])\n\t\t}\n\t}\n\treturn result\n}", "func (b *ByBit) GetTradingRecords(symbol string, from int64, limit int) (result []TradingRecord, err error) {\n\tvar ret GetTradingRecordsResult\n\tparams := map[string]interface{}{}\n\tparams[\"symbol\"] = symbol\n\tif from > 0 {\n\t\tparams[\"from\"] = from\n\t}\n\tif limit > 0 {\n\t\tparams[\"limit\"] = limit\n\t}\n\t_, err = b.PublicRequest(http.MethodGet, \"v2/public/trading-records\", params, &ret)\n\tif err != nil {\n\t\treturn\n\t}\n\tresult = ret.Result\n\treturn\n}", "func (l *ImmutableTimestampedLog) LoadRecordsRaw(fromIdx, toIdx uint32, descending bool) ([][]byte, error) {\n\tif fromIdx > toIdx {\n\t\treturn nil, nil\n\t}\n\tret := make([][]byte, 0, toIdx-fromIdx+1)\n\tfromIdxInt := int(fromIdx)\n\ttoIdxInt := int(toIdx)\n\tif !descending {\n\t\tfor i := fromIdxInt; i <= toIdxInt; i++ {\n\t\t\tr, err := l.getRawRecordAtIndex(uint32(i))\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tret = append(ret, r)\n\t\t}\n\t} else {\n\t\tfor i := toIdxInt; i >= fromIdxInt; i-- {\n\t\t\tr, err := l.getRawRecordAtIndex(uint32(i))\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tret = append(ret, r)\n\t\t}\n\t}\n\treturn ret, nil\n}", "func getHistory(ctx context.Context, args *map[string]interface{}) error {\n\tvar resultRows []Operation\n\n\tha, ok := (*args)[\"historyArgs\"].(historyArgs)\n\tif !ok {\n\t\treturn fmt.Errorf(\"unable to cast arguments to type historyArgs\")\n\t}\n\n\texportType := ha.exportType\n\n\t// Get everything from the fhir_endpoints_info_history table for the given URL\n\n\tvar selectHistory string\n\tif exportType == \"month\" {\n\t\tselectHistory = `\n\t\tSELECT fhir_endpoints_info_history.url, fhir_endpoints_metadata.http_response, fhir_endpoints_metadata.response_time_seconds, fhir_endpoints_metadata.errors,\n\t\tcapability_statement, tls_version, mime_types, operation_resource,\n\t\tfhir_endpoints_metadata.smart_http_response, smart_response, fhir_endpoints_info_history.updated_at, capability_fhir_version\n\t\tFROM fhir_endpoints_info_history, fhir_endpoints_metadata\n\t\tWHERE fhir_endpoints_info_history.metadata_id = fhir_endpoints_metadata.id AND fhir_endpoints_info_history.url=$1 AND (date_trunc('month', fhir_endpoints_info_history.updated_at) = date_trunc('month', current_date - INTERVAL '1 month'))\n\t\tORDER BY fhir_endpoints_info_history.updated_at DESC;`\n\t} else if exportType == \"30days\" {\n\t\tselectHistory = `\n\t\tSELECT fhir_endpoints_info_history.url, fhir_endpoints_metadata.http_response, fhir_endpoints_metadata.response_time_seconds, fhir_endpoints_metadata.errors,\n\t\tcapability_statement, tls_version, mime_types, operation_resource,\n\t\tfhir_endpoints_metadata.smart_http_response, smart_response, fhir_endpoints_info_history.updated_at, capability_fhir_version\n\t\tFROM fhir_endpoints_info_history, fhir_endpoints_metadata\n\t\tWHERE fhir_endpoints_info_history.metadata_id = fhir_endpoints_metadata.id AND fhir_endpoints_info_history.url=$1 AND (date_trunc('day', fhir_endpoints_info_history.updated_at) >= date_trunc('day', current_date - INTERVAL '30 day'))\n\t\tORDER BY fhir_endpoints_info_history.updated_at DESC;`\n\t} else if exportType == \"all\" {\n\t\tselectHistory = `\n\t\tSELECT fhir_endpoints_info_history.url, fhir_endpoints_metadata.http_response, fhir_endpoints_metadata.response_time_seconds, fhir_endpoints_metadata.errors,\n\t\tcapability_statement, tls_version, mime_types, operation_resource,\n\t\tfhir_endpoints_metadata.smart_http_response, smart_response, fhir_endpoints_info_history.updated_at, capability_fhir_version\n\t\tFROM fhir_endpoints_info_history, fhir_endpoints_metadata\n\t\tWHERE fhir_endpoints_info_history.metadata_id = fhir_endpoints_metadata.id AND fhir_endpoints_info_history.url=$1\n\t\tORDER BY fhir_endpoints_info_history.updated_at DESC;`\n\t}\n\n\thistoryRows, err := ha.store.DB.QueryContext(ctx, selectHistory, ha.fhirURL)\n\tif err != nil {\n\t\tlog.Warnf(\"Failed getting the history rows for URL %s. Error: %s\", ha.fhirURL, err)\n\t\tresult := Result{\n\t\t\tURL: ha.fhirURL,\n\t\t\tRows: resultRows,\n\t\t}\n\t\tha.result <- result\n\t\treturn nil\n\t}\n\n\t// Puts the rows in an array and sends it back on the channel to be processed\n\tdefer historyRows.Close()\n\tfor historyRows.Next() {\n\t\tvar op Operation\n\t\tvar url string\n\t\tvar capStat []byte\n\t\tvar smartRsp []byte\n\t\tvar opRes []byte\n\t\terr = historyRows.Scan(\n\t\t\t&url,\n\t\t\t&op.HTTPResponse,\n\t\t\t&op.HTTPResponseTimeSecond,\n\t\t\t&op.Errors,\n\t\t\t&capStat,\n\t\t\t&op.TLSVersion,\n\t\t\tpq.Array(&op.MIMETypes),\n\t\t\t&opRes,\n\t\t\t&op.SMARTHTTPResponse,\n\t\t\t&smartRsp,\n\t\t\t&op.UpdatedAt,\n\t\t\t&op.FHIRVersion)\n\t\tif err != nil {\n\t\t\tlog.Warnf(\"Error while scanning the rows of the history table for URL %s. Error: %s\", ha.fhirURL, err)\n\t\t\tresult := Result{\n\t\t\t\tURL: ha.fhirURL,\n\t\t\t\tRows: resultRows,\n\t\t\t}\n\t\t\tha.result <- result\n\t\t\treturn nil\n\t\t}\n\n\t\top.SMARTResponse = getSMARTResponse(smartRsp)\n\t\top.SupportedResources = getSupportedResources(opRes)\n\n\t\tresultRows = append(resultRows, op)\n\t}\n\tresult := Result{\n\t\tURL: ha.fhirURL,\n\t\tRows: resultRows,\n\t}\n\tha.result <- result\n\treturn nil\n}" ]
[ "0.60592014", "0.57499135", "0.5547638", "0.5546007", "0.5371057", "0.53532696", "0.5269713", "0.51961905", "0.51784796", "0.50762266", "0.50672424", "0.50599116", "0.49910152", "0.49898016", "0.49876833", "0.49719512", "0.49457273", "0.4919259", "0.49056196", "0.48882523", "0.48712057", "0.4871128", "0.48646522", "0.48524028", "0.4807186", "0.48046887", "0.4776598", "0.47631112", "0.47623464", "0.47583365", "0.47400323", "0.47378445", "0.4722006", "0.47159272", "0.47092068", "0.47080585", "0.4695176", "0.468544", "0.46729317", "0.46667078", "0.46450192", "0.46363455", "0.46337864", "0.46201938", "0.46072382", "0.459891", "0.45987368", "0.459258", "0.45862016", "0.45853928", "0.4570807", "0.45465535", "0.45462698", "0.4543632", "0.453539", "0.45344782", "0.45343363", "0.45053288", "0.45036396", "0.44955045", "0.44934428", "0.44934356", "0.4491914", "0.44828984", "0.44808492", "0.44775626", "0.44739628", "0.44687507", "0.44603807", "0.44591886", "0.44581106", "0.44566825", "0.44511786", "0.4444214", "0.4441285", "0.44284195", "0.44277152", "0.44260845", "0.44238898", "0.44106844", "0.44029802", "0.4400898", "0.439427", "0.43910247", "0.43839708", "0.43823197", "0.43814436", "0.4376362", "0.43617317", "0.43595165", "0.4356474", "0.43541154", "0.43517402", "0.434857", "0.4348469", "0.43478388", "0.4345383", "0.43400058", "0.43358967", "0.4335686" ]
0.8447795
0
GetUser returns a User for for given ID
func (c *Client) GetUser(userID int) (*User, error) { userIDStr := strconv.Itoa(userID) resp := &User{} err := c.apiget("/users/"+userIDStr, resp) if err != nil { return nil, err } return resp, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func GetUser(id int) (components.User, error) {\n\treturn getUser(id)\n}", "func (c *Client) GetUser(id string) (*dto.User, error) {\n\tvar user *dto.User\n\n\tr, err := c.NewRequest(\n\t\t\"GET\",\n\t\tfmt.Sprintf(\"users/%s\", id),\n\t\tnil,\n\t)\n\n\tif err != nil {\n\t\treturn user, err\n\t}\n\n\t_, err = c.Do(r, &user)\n\treturn user, err\n}", "func (u *UserService) GetUser(id string) (*User, error) {\n\tuser := &User{}\n\terr := u.QueryRow(\"SELECT id, name, phone, email, password FROM users WHERE id=$1 LIMIT 1\", id).Scan(&user.ID, &user.Name, &user.Phone, &user.Email, &user.HashedPassword)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn user, nil\n}", "func (c Client) GetUser(ctx context.Context, id string) (api.User, error) {\n\t// TODO (erik): Make this function handle emails properly.\n\tvar user api.User\n\tif err := c.db.GetContext(ctx, &user, \"select * from users where id = ?\", id); err != nil {\n\t\treturn user, err\n\t}\n\n\treturn user, nil\n}", "func GetUser(id int64) (*User, error) {\n\tuser := User{}\n\terr := meddler.QueryRow(db, &user, userFindIdStmt, id)\n\treturn &user, err\n}", "func (r *Repo) GetUser(_ context.Context, id int64) (entities.User, error) {\n\tvar u entities.User\n\terr := r.Get(&u, \"SELECT * FROM users WHERE id = $1\", id)\n\tif err != nil {\n\t\treturn entities.User{}, fmt.Errorf(\"error getting user: %w\", err)\n\t}\n\treturn u, nil\n}", "func (s *Store) GetUser(id bson.ObjectId) (*models.User, error) {\n\tvar user models.User\n\terr := s.Users.Find(bson.M{\"_id\": id}).One(&user)\n\treturn &user, err\n}", "func (us *Users) Get(id int64) (*User, error) {\n\texp := fmt.Sprintf(\"user_id=%v\", id)\n\n\treturn getUserWhere(exp)\n}", "func (u *usecase) Get(ctx context.Context, id string) (*User, error) {\n\tuser, err := u.repository.Get(ctx, id)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"error fetching a single user\")\n\t}\n\treturn user, nil\n}", "func (d *DB) GetUser(id int) (User, error) {\n\tvar user User\n\terr := d.db.Find(&user, id).Error\n\tif err != nil {\n\t\treturn user, err\n\t}\n\n\treturn user, nil\n}", "func (m *Model) GetUser(ctx context.Context, id string) (*dto.User, error) {\n\treturn m.userDAO.Get(ctx, id)\n}", "func GetUser(id int) (User, error) {\n\tvar user User\n\trow := DB.QueryRow(\"select id, realname, username, email from users where id = $1\", id)\n\terr := row.Scan(&user.ID, &user.Realname, &user.Username, &user.Email)\n\treturn user, err\n}", "func GetUser(id string) (User, error) {\n\tresult := User{}\n\terr := db.QueryRow(\"SELECT * FROM web_users WHERE ID = ?\", id).Scan(&result.ID, &result.Username,\n\t\t&result.RegisteredOn, &result.LastLogin, &result.AvatarURL, &result.AccessToken, &result.RefreshToken,\n\t\t&result.AccessExpiration)\n\tif err != nil {\n\t\treturn User{}, err\n\t}\n\n\treturn result, nil\n}", "func (h *Handler) GetUser(w http.ResponseWriter, r *http.Request) {\n\tid, err := strconv.Atoi(r.URL.Query().Get(\"id\"))\n\tif err != nil {\n\t\trender.BadRequest(w, r, \"id must be an integer greater zero\")\n\t\treturn\n\t}\n\n\t// Query user details from userID\n\tuser, err := h.Client.User.\n\t\tQuery().\n\t\tWhere(usr.ID(id)).\n\t\tOnly(r.Context())\n\tif err != nil {\n\t\tswitch {\n\t\tcase ent.IsNotFound(err):\n\t\t\trender.NotFound(w, r, \"Email Doesn't exists\")\n\t\tdefault:\n\t\t\trender.InternalServerError(w, r, \"Server Error\")\n\t\t}\n\t\treturn\n\t}\n\trender.OK(w, r, user)\n}", "func GetUserByID(c *gin.Context) {\n\tid := c.Params.ByName(\"id\")\n\tvar user models.User\n\terr := models.GetUserByID(&user, id)\n\tif err != nil {\n\t\tc.AbortWithStatus(http.StatusNotFound)\n\t} else {\n\t\tc.JSON(http.StatusOK, user)\n\t}\n}", "func (c *Client) GetUser(ctx context.Context, id string) (*UserResponse, error) {\n\tvar resp struct {\n\t\tUser UserResponse `json:\"user\"`\n\t}\n\n\tvariables := make(map[string]interface{})\n\tvariables[\"id\"] = id\n\n\terr := c.transport.Raw(ctx, `\n\t\tquery User($id: String!) {\n\t\t\tuser(id: $id) {\n\t\t\t\tid\n\t\t\t\tname\n\t\t\t\temail\n\t\t\t\trole {\n\t\t\t\t\tid\n\t\t\t\t\tlabel\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t`, variables, &resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &resp.User, nil\n}", "func GetUser(db *gorm.DB, w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tid := vars[\"id\"]\n\tuser := getUserByID(db, id, w, r)\n\tif user == nil {\n\t\treturn\n\t}\n\tRespondJSON(w, http.StatusOK, user)\n}", "func (u *UserService) GetUser(ctx context.Context, principal jwt.User, id string) (model.User, error) {\n\tspan, ctx := opentracing.StartSpanFromContext(ctx, \"user_service_get_user\")\n\tdefer span.Finish()\n\n\terr := u.AuthService.AssertUserAccess(ctx, principal, id)\n\tif err != nil {\n\t\treturn model.User{}, err\n\t}\n\n\tuser, found, err := u.UserRepo.Find(ctx, id)\n\tif err != nil {\n\t\treturn model.User{}, err\n\t}\n\n\tif !found {\n\t\terr = fmt.Errorf(\"user with id %s does not exist\", id)\n\t\treturn model.User{}, httputil.NotFoundError(err)\n\t}\n\n\tu.AuditLog.Read(ctx, principal.ID, \"user:%s\", id)\n\treturn user, nil\n}", "func (db *DB) GetUser(id string) (*model.User, error) {\n\tvar user model.User\n\n\tcursor := db.collections.users.FindOne(\n\t\tcontext.Background(),\n\t\tbson.D{primitive.E{\n\t\t\tKey: \"_id\",\n\t\t\tValue: id,\n\t\t}},\n\t)\n\n\tif cursor.Err() != nil {\n\t\treturn nil, cursor.Err()\n\t}\n\n\terr := cursor.Decode(&user)\n\tif err != nil {\n\t\tif err == mongo.ErrNoDocuments {\n\t\t\treturn nil, nil\n\t\t}\n\n\t\treturn nil, err\n\t}\n\n\treturn &user, nil\n}", "func (u *UserCtr) GetUserByid(c *gin.Context) {\n\tid,err := strconv.Atoi(c.Param(\"id\"))\n\tif err != nil {\n\t\tresp := errors.New(err.Error())\n\t\tc.JSON(http.StatusInternalServerError, resp)\n\t\treturn\n\t}\n\n\tuser, err := model.UserByID(u.DB,id)\n\tif err != nil {\n\t\tresp := errors.New(err.Error())\n\t\tc.JSON(http.StatusInternalServerError, resp)\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusOK, gin.H{\n\t\t\"result\": user,\n\t})\n\treturn\n\n}", "func (m *User) GetUser(id int64) (interface{}, error) {\n\tm.ID = id\n\te := m.Read()\n\treturn m, e\n}", "func (m *User) GetUser(id int64) (interface{}, error) {\n\tm.ID = id\n\te := m.Read()\n\treturn m, e\n}", "func GetUser(id uint) (user *User, err error) {\n\tuser = new(User)\n\terr = NewUserQuerySet(db).IDEq(id).One(user)\n\treturn\n}", "func GetUser(id int) (*User, error) {\n\tuser := new(User)\n\terr := db.Model(user).Where(\"id = ?\", id).Select()\n\treturn user, err\n}", "func GetUserById(id int, db *gorm.DB) (user User, err error) {\n\tuser.ID = id\n\tif err = db.First(&user).Error; err != nil {\n\t\terr = ErrUserNotFound\n\t}\n\treturn\n}", "func (c *HTTPClient) GetUser(id string) (*User, error) {\n\tvar (\n\t\terr error\n\t\trawData RawResponse\n\t\tuser User\n\t)\n\n\trequest := fasthttp.AcquireRequest()\n\tresponse := fasthttp.AcquireResponse()\n\tdefer fasthttp.ReleaseResponse(response)\n\n\trequest.Header.Add(\"Content-Type\", \"application/json\")\n\trequest.Header.SetMethod(\"GET\")\n\trequest.SetRequestURI(baseURL + \"/users/\" + id)\n\n\terr = c.fasthttpClient.Do(request, response)\n\tfasthttp.ReleaseRequest(request)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = json.Unmarshal(response.Body(), &rawData)\n\tuser.raw = &rawData\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr = json.Unmarshal(rawData.Data, &user)\n\n\treturn &user, getStatusError(response.StatusCode())\n}", "func (u *UserModel) GetUserById(id uint64) (*UserModel, error) {\n\td := DB.Self.Where(\"id = ?\", id).First(&u)\n\tfmt.Println(\"GetUser-d\", d)\n\treturn u, d.Error\n}", "func GetUser(w http.ResponseWriter, r *http.Request) {\n\tparams := mux.Vars(r)\n\tuserID, err := strconv.ParseInt(params[\"id\"], 10, 64)\n\tif err != nil {\n\t\tresponses.Error(w, http.StatusBadRequest, err)\n\t\treturn\n\t}\n\n\tdb, err := database.Connect()\n\tif err != nil {\n\t\tresponses.Error(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\tdefer db.Close()\n\n\trepository := repository.NewRepositoryUser(db)\n\tuser, err := repository.GetUserById(userID)\n\tif err != nil {\n\t\tresponses.Error(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\tif user.Id == 0 {\n\t\tresponses.Error(w, http.StatusNotFound, errors.New(\"Usuarios não encontrado\"))\n\t\treturn\n\t}\n\tresponses.JSON(w, http.StatusOK, user)\n\n}", "func (u *UsersAPI) GetUser(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\n\tid := vars[\"id\"]\n\tuser, err := u.service.GetUser(id)\n\tif err != nil {\n\t\thandler.RespondError(w, http.StatusNotFound, err.Error())\n\t\treturn\n\t}\n\thandler.RespondJSON(w, http.StatusOK, user)\n}", "func GetUser(id string) *User {\n\tif user, ok := Users[id]; ok {\n\t\treturn user\n\t}\n\treturn nil\n}", "func (p *DB) GetUser(id string) (*UserRecord, error) {\n\tvar user UserRecord\n\terr := p.user.Find(bson.M{\"id\": id}).One(&user)\n\tif err != nil {\n\t\treturn nil, errors.New(ankr_default.DbError+err.Error())\n\t}\n\treturn &user, nil\n}", "func (s *Service) GetUser(id bson.ObjectId) (User, error) {\n\tsession := s.db.Copy()\n\tdefer session.Close()\n\n\tc := session.DB(\"\").C(userCollection)\n\tvar user User\n\terr := c.FindId(id).One(&user)\n\tif err != nil {\n\t\treturn user, fmt.Errorf(\"user not found: %v\", err)\n\t}\n\n\treturn user, nil\n}", "func (rep *UserRepo) Get(ctx context.Context, id string) (*User, error) {\n\tu := &User{}\n\terr := rep.db.Query(\n\t\tctx,\n\t\trep.db.Select(\"*\").From(rep.table()).Where(\"id = ?\", id),\n\t).Decode(u)\n\treturn u, err\n}", "func GetUserWithID(uid uint) *User {\n\tvar dbUsr User\n\tDb.First(&dbUsr, \"id=?\", uid)\n\treturn &dbUsr\n}", "func (u *User) GetUserByID(id string) *User {\n\tvar result User\n\n\terr := database.DB.Where(\"id = ?\", id).First(&result).Error\n\n\tif err != nil {\n\t\treturn nil\n\t}\n\n\treturn &result\n}", "func GetUserByID(c *gin.Context) {\n\tid := c.Params.ByName(\"id\")\n\tvar user Models.User\n\terr := Models.GetUserByID(&user, id)\n\tif err != nil {\n\t\tc.JSON(http.StatusNotFound, gin.H{\n\t\t\t\"error\" : gin.H { \n\t\t\t\"status\": http.StatusNotFound,\n\t\t\t\"message\": err.Error(),\n\t\t}})\n\t\tc.AbortWithStatus(http.StatusNotFound)\n\t} else {\n\t\tc.JSON(http.StatusOK,gin.H{\n\t\t\t\"data\" : user,\n\t\t\t\"status\": http.StatusOK,\n\t\t})\n\t}\n}", "func (db *Database) GetUser(id int) (*User, error) {\n\trow := db.db.QueryRow(`\n\t\tSELECT id, username, owner FROM melodious.accounts WHERE id=$1;\n\t`, id)\n\tuser := &User{}\n\terr := row.Scan(&(user.ID), &(user.Username), &(user.Owner))\n\tif err != nil {\n\t\treturn &User{}, err\n\t}\n\treturn user, nil\n}", "func GetUserByID(c *gin.Context) {\n\tuser, err := getUserFromParams(c)\n\tif err != nil {\n\t\tc.AbortWithStatus(http.StatusNotFound)\n\t} else {\n\t\tc.JSON(http.StatusOK, user)\n\t}\n}", "func (c *UserClient) Get(ctx context.Context, id int) (*User, error) {\n\treturn c.Query().Where(user.ID(id)).Only(ctx)\n}", "func (c *UserClient) Get(ctx context.Context, id int) (*User, error) {\n\treturn c.Query().Where(user.ID(id)).Only(ctx)\n}", "func (c *UserClient) Get(ctx context.Context, id int) (*User, error) {\n\treturn c.Query().Where(user.ID(id)).Only(ctx)\n}", "func (c *UserClient) Get(ctx context.Context, id int) (*User, error) {\n\treturn c.Query().Where(user.ID(id)).Only(ctx)\n}", "func (c *UserClient) Get(ctx context.Context, id int) (*User, error) {\n\treturn c.Query().Where(user.ID(id)).Only(ctx)\n}", "func (c *UserClient) Get(ctx context.Context, id int) (*User, error) {\n\treturn c.Query().Where(user.ID(id)).Only(ctx)\n}", "func (c *UserClient) Get(ctx context.Context, id int) (*User, error) {\n\treturn c.Query().Where(user.ID(id)).Only(ctx)\n}", "func (c *UserClient) Get(ctx context.Context, id int) (*User, error) {\n\treturn c.Query().Where(user.ID(id)).Only(ctx)\n}", "func GetUser(db sqlx.Queryer, id int64) (User, error) {\n\tvar user User\n\terr := sqlx.Get(db, &user, \"select \"+externalUserFields+\" from \\\"user\\\" where id = $1\", id)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn user, ErrDoesNotExist\n\t\t}\n\t\treturn user, errors.Wrap(err, \"select error\")\n\t}\n\n\treturn user, nil\n}", "func GetUserByID(c *gin.Context, client *statsd.Client) {\n\tlog.Info(\"getting user by id\")\n\tid := c.Params.ByName(\"id\")\n\tvar user entity.User\n\terr := model.GetUserByID(&user, id, client)\n\tif err != nil {\n\t\tlog.Error(err)\n\t\tc.JSON(http.StatusNotFound, gin.H{\n\t\t\t\"error\": err.Error(),\n\t\t})\n\t\treturn\n\t} else {\n\t\tc.JSON(http.StatusOK, gin.H{\n\t\t\t\"id\": user.ID,\n\t\t\t\"first_name\": user.FirstName,\n\t\t\t\"last_name\": user.LastName,\n\t\t\t\"username\": user.Username,\n\t\t\t\"account_created\": user.AccountCreated,\n\t\t\t\"account_updated\": user.AccountUpdated,\n\t\t})\n\t}\n}", "func GetUserById(id int) (v *User, err error) {\n\to := orm.NewOrm()\n\tv = &User{Id: id}\n\tif err = o.Read(v); err == nil {\n\t\treturn v, nil\n\t}\n\treturn nil, err\n}", "func GetUser(db *gorm.DB, w http.ResponseWriter, r *http.Request) {\n\trepo := users.NewUserRepository(db)\n\tvars := mux.Vars(r)\n\n\ttarget, _ := strconv.Atoi(vars[\"id\"])\n\tuser, changed := repo.GetUser(users.User{}, target)\n\n\tif !changed {\n\t\tutils.JsonResponse(w, utils.ErrorResponse{Error: \"User matching query not found\"}, http.StatusNotFound)\n\t} else {\n\t\tutils.JsonResponse(w, user, http.StatusOK)\n\t}\n}", "func (c *UserClient) Get(ctx context.Context, id int64) (*User, error) {\n\treturn c.Query().Where(user.ID(id)).Only(ctx)\n}", "func GetUser(id bson.ObjectId) User {\n\tsession, _ := mgo.Dial(\"127.0.0.1\")\n\tdefer session.Close()\n\tsession.SetMode(mgo.Monotonic, true)\n\tdb := session.DB(\"reimburse-me\").C(\"user\")\n\tvar result User\n\tdb.FindId(id).One(&result)\n\tresult.Token = \"\"\n\treturn result\n}", "func (u *userService) Get(id string) (*domain.User, error) {\n\treturn u.storage.Get(id)\n}", "func getUser(c *gin.Context, db *gorm.DB) *models.User {\n\tuserID, err := strconv.Atoi(c.Param(\"userID\"))\n\tif err != nil {\n\t\tjsonError(c, \"could not parse user id\", err)\n\t\treturn nil\n\t}\n\n\tuser := &models.User{}\n\tq := db.Where(\"id = ?\", userID).First(user)\n\tif err := q.Error; err != nil {\n\t\tjsonError(c, \"error looking up user\", err)\n\t\treturn nil\n\t} else if q.RecordNotFound() {\n\t\tjsonError(c, \"user not found\", nil)\n\t\treturn nil\n\t}\n\treturn user\n}", "func (_this *UserHandler) GetUser() echo.HandlerFunc {\n\treturn func(c echo.Context) error {\n\t\tid, _ := strconv.ParseInt(c.Param(\"id\"), 10, 64)\n\n\t\tresp, err := _this.userService.GetUser(id)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn c.JSON(http.StatusOK, resp)\n\t}\n}", "func (repo *GormRepository) GetUser(userID uint) (*models.User, error) {\n\tuser := models.User{\n\t\tID: userID,\n\t}\n\t// if err := repo.db.First(&user).Error; err != nil {\n\t// \treturn nil, err\n\t// }\n\t// return &user, nil\n\treturn getUser(repo.db, false, &user)\n}", "func (c *UserClient) Get(ctx context.Context, id uuid.UUID) (*User, error) {\n\treturn c.Query().Where(user.ID(id)).Only(ctx)\n}", "func (c *UserClient) Get(ctx context.Context, id uuid.UUID) (*User, error) {\n\treturn c.Query().Where(user.ID(id)).Only(ctx)\n}", "func GetUserByID(id int) (*UserByID, error) {\n\tres := &UserByID{}\n\terr := urlToStruct(fmt.Sprintf(\"/users/userbyid/%d\", id), res)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn res, nil\n}", "func GetUser(id bson.ObjectId) (User, error) {\n\tvar (\n\t\tuser User\n\t\terr error\n\t)\n\n\tc := newUserCollection()\n\tdefer c.Close()\n\n\terr = c.Session.Find(bson.M{\"_id\": id}).One(&user)\n\treturn user, err\n}", "func (c *UserDatabaseClient) GetUser(id string) (*entity.UserDao, error) {\n\n\tvar entity entity.UserDao\n\n\tcollection := c.db.Collection(\"users\")\n\tdbResource := collection.FindOne(context.Background(), bson.M{\"_id\": id})\n\n\terr := dbResource.Err()\n\tif err != nil {\n\t\tif err == mongo.ErrNoDocuments {\n\t\t\treturn nil, nil\n\t\t}\n\t\treturn nil, err\n\t}\n\n\terr = dbResource.Decode(&entity)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &entity, nil\n}", "func (ur *UserRepository) GetUser(ctx context.Context, id uint) (user.User, error) {\n\tq := `\n\tSELECT id, user_name, role\n\tFROM users \n\tWHERE id = $1;\n\t`\n\n\trow := ur.Data.DB.QueryRowContext(ctx, q, id)\n\n\tvar u user.User\n\terr := row.Scan(&u.ID, &u.UserName, &u.Role)\n\tif err != nil {\n\t\treturn user.User{}, err\n\t}\n\treturn u, nil\n}", "func (_ *User) GetById(id uint) (interface{}, error) {\n\tuser := User{}\n\tif disableGetUserById || getTestDb().Where(\"id = ?\", id).Find(&user).RecordNotFound() {\n\t\treturn &user, errors.New(\"User not found\")\n\t}\n\treturn &user, nil\n}", "func (us *userService) Get(id int64) (*model.User, error) {\n\treturn us.userRepo.GetByID(id)\n}", "func GetUserById(context *fiber.Ctx) error {\n\tid, err := ParseId(context)\n\n\tif err != nil {\n\t\treturn context.Status(400).JSON(&fiber.Map{\"error\": err.Error()})\n\t}\n\n\tvar user = repository.GetUserById(id)\n\n\tif user.ID == 0 {\n\t\tlog.Printf(\"user not found: %d\", id)\n\t\treturn context.Status(404).JSON(&fiber.Map{\"response\": \"not found\"})\n\t} else {\n\t\treturn context.Status(200).JSON(user)\n\t}\n}", "func (context Context) GetUserByID(id string) (result *types.User, err error) {\n\n\tif id == \"\" {\n\t\tid = types.UserThis\n\t}\n\n\tresp, err := context.sendAPIGetRequest(path.Join(\"users\", id), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttype getUserByIDResponse struct {\n\t\tData types.User `json:\"data\"`\n\t}\n\trespObject := getUserByIDResponse{}\n\terr = json.NewDecoder(resp.Body).Decode(&respObject)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"JSON decode error\")\n\t}\n\n\treturn &respObject.Data, nil\n}", "func (h *Handler) GetUser(c *fiber.Ctx) error {\n\tid, err := strconv.Atoi(c.Params(\"id\"))\n\n\tif err != nil {\n\t\treturn c.Status(400).JSON(fiber.Map{\"status\": \"error\", \"message\": \"User ID is invalid\"})\n\t}\n\n\tvar usr user.User\n\n\tusr, err = h.service.GetUserById(id)\n\n\tif err != nil {\n\t\treturn c.Status(400).JSON(fiber.Map{\"status\": \"error\", \"message\": \"Cannot get user\"})\n\t}\n\n\treturn c.Status(200).JSON(fiber.Map{\"status\": \"success\", \"data\": user.Response{\n\t\tEmail: usr.Email,\n\t\tName: usr.Name,\n\t}})\n}", "func (s *UserService) GetUserByID(id interface{}) (*User, error) {\n\tuser, err := s.usersRepository.GetByID(id)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn user, nil\n}", "func (s *usersService) GetByID(id int) (User, error) {\n\tusr, err := s.repo.GetById(id)\n\tif err != nil {\n\t\tlog.Printf(\"error getting user: %s\\n\", err)\n\t\treturn User{}, err\n\t}\n\treturn usr, nil\n}", "func GetUser(tx *sql.Tx, id int64) (*User, error) {\n\tu := User{}\n\treturn &u, tx.QueryRow(\n\t\t\"select id, name, password_hash from users where id = $1\",\n\t\tid,\n\t).Scan(\n\t\t&u.ID,\n\t\t&u.Name,\n\t\t&u.PasswordHash,\n\t)\n}", "func (u UserController) GetUserByID(w http.ResponseWriter, r *http.Request, p httprouter.Params) {\n\tid := p.ByName(\"id\")\n\tuser, err := u.userRepository.GetByID(id)\n\tif err != nil {\n\t\tif _, ok := err.(models.UserNotFoundError); ok {\n\t\t\thttp.Error(w, \"not found\", http.StatusNotFound)\n\t\t\treturn\n\t\t}\n\t\thttp.Error(w, \"service unavailable\", http.StatusServiceUnavailable)\n\t\treturn\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(user)\n}", "func (u *User) Get(id string) error {\n\tsession := mongoSession.Clone()\n\tdefer session.Close()\n\tcollection := session.DB(mongoDialInfo.Database).C(usersCollectionName)\n\t// TODO: handle error\n\tif !bson.IsObjectIdHex(id) {\n\t\treturn errors.New(\"Invalid Object ID\")\n\t}\n\tobjectID := bson.ObjectIdHex(id)\n\terr := collection.FindId(objectID).One(u)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func GetUserByID(id int64) *User {\n\tuser := new(User)\n\trow := DB.QueryRow(\"SELECT * from user WHERE id=?\", id)\n\terr := row.Scan(&user.ID, &user.Email, &user.Password, &user.Fullname, &user.TSLastLogin, &user.TSCreate, &user.TSUpdate, &user.Permission)\n\tif err != nil {\n\t\tlog.Errorln(\"User SELECT by ID Err: \", err)\n\t\treturn nil\n\t}\n\treturn user\n}", "func (us *usersService) GetUserByID(userID int64) (*users.User, *errors.RestError) {\n\tvar err *errors.RestError\n\tvar user = users.User{ID: userID}\n\tif err = user.Get(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &user, nil\n}", "func (uc UserController) GetUser(w http.ResponseWriter, r *http.Request, params httprouter.Params) {\n\n\t//get the param first\n\tid := params.ByName(\"id\")\n\n\t//verify id is objectid hex representation, otherwise return status not found\n\tif !bson.IsObjectIdHex(id) {\n\t\tw.WriteHeader(http.StatusNotFound) //404\n\t\treturn\n\t}\n\n\t//objectidhex returns as object id from the provided hex representation\n\toid := bson.ObjectIdHex(id)\n\n\tu := models.User{}\n\n\t//fetch user\n\tif err := uc.session.DB(\"go-web-dev-db\").C(\"users\").FindId(oid).One(&u); err != nil {\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\treturn\n\t}\n\n\tuj, err := json.Marshal(u)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application.json\")\n\tw.WriteHeader(http.StatusOK)\n\tfmt.Fprintf(w, \"%s\\n\", uj)\n\n}", "func (s UserStorage) GetOne(id string) (model.User, error) {\n\tintID, err := strconv.ParseInt(id, 10, 64)\n\tif err != nil {\n\t\terrMessage := fmt.Sprintf(\"User id must be an integer: %s\", id)\n\t\treturn model.User{}, api2go.NewHTTPError(errors.New(errMessage), errMessage, http.StatusBadRequest)\n\t}\n\tvar user model.User\n\tstr := []string{GET_ALL, \"where users.user_id = $1 limit 1\"}\n\tGET_ONE := strings.Join(str, \" \")\n\terror := s.db.SelectOne(&user, GET_ONE, intID)\n\tif error == nil {\n\t\treturn user, nil\n\t} else {\n\t\treturn model.User{}, fmt.Errorf(\"User for id %s not found\", id)\n\t}\t\n\t// return s.getOneWithAssociations(intID)\n}", "func (rep *UserRepository) GetByID(userID int64) (user *models.User, err error) {\n\tuser = &models.User{}\n\terr = databaseConnection.First(user, \"id = ?\", userID).Error\n\treturn\n}", "func Get(id int64) (User, error) {\n\tvar u User\n\tstmt, err := db.Prepare(\"select id, name, age, created from user where id = ? \")\n\tdefer stmt.Close()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn u, err\n\t}\n\terr = stmt.QueryRow(id).Scan(&u.ID, &u.Name, &u.Age, &u.Created)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn u, err\n\t}\n\treturn u, nil\n}", "func (c *Client) GetUserByID(id string) (User, error) {\n\tvar (\n\t\turi = \"/rest/users/\" + id\n\t\tqueryParams = createQuery(&map[string]string{\n\t\t\t\"id\": id,\n\t\t})\n\t\tuser User\n\t)\n\n\tif id == \"\" {\n\t\treturn user, fmt.Errorf(\"id must not be empty\")\n\t}\n\n\tresponse, err := c.RestAPICall(rest.GET, uri, queryParams, nil)\n\n\tif err != nil {\n\t\treturn user, err\n\t}\n\n\tif err := json.Unmarshal([]byte(response), &user); err != nil {\n\t\treturn user, apiResponseError(response, err)\n\t}\n\n\treturn user, err\n}", "func (s *userServices) GetUser(userID uint64) (*userdata.User, *errors.RestErr) {\n\tresult := &userdata.User{ID: userID}\n\tif err := result.Get(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn result, nil\n}", "func (userController UserController) GetUser(w http.ResponseWriter, r *http.Request, p httprouter.Params) {\n\tid := p.ByName(\"id\")\n\n\tif !bson.IsObjectIdHex(id) {\n\t\tw.WriteHeader(404)\n\t\treturn\n\t}\n\n\toid := bson.ObjectIdHex(id)\n\n\tu := models.User{}\n\n\tif err := userController.session.DB(\"office_space\").C(\"users\").FindId(oid).One(&u); err != nil {\n\t\tw.WriteHeader(404)\n\t\treturn\n\t}\n\tuj, _ := json.Marshal(u)\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(200)\n\tfmt.Fprintf(w, \"%s\", uj)\n}", "func (p *UserPool) GetUser(id string) *store.User {\n\treturn p.users[id]\n}", "func (m *postgresDBRepo) GetUserById(id int) (models.User, error) {\n\tctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)\n\tdefer cancel()\n\n\tquery := `select id, first_name, last_name, email, password,\n\t\t access_level, created_at, updated_at\n\t\tfrom users where id = $1`\n\n\trow := m.DB.QueryRowContext(ctx, query, id)\n\tvar u models.User\n\terr := row.Scan(&u.ID, &u.FirstName, &u.LastName, &u.Email, &u.Password, &u.AccessLevel, &u.CreatedAt, &u.UpdatedAt)\n\tif err != nil {\n\t\treturn u, err\n\t}\n\n\treturn u, nil\n}", "func (s *UserRepository) GetUser(id string) (*akwad.Account, error) {\n\treturn nil, nil\n}", "func (s *UserServiceImpl) GetUser(c *gin.Context, userID int) (*models.User, error) {\n\tdb := c.MustGet(\"db\").(*gorm.DB)\n\tuser := &models.User{}\n\terr := db.First(&user, userID).Error\n\treturn user, err\n}", "func (uc UserController) GetUser(w http.ResponseWriter, r *http.Request, p httprouter.Params) {\n\t// Grab id\n\tid := p.ByName(\"id\")\n\n\t// Verify id is ObjectId, otherwise bail\n\tif !bson.IsObjectIdHex(id) {\n\t\tw.WriteHeader(404)\n\t\treturn\n\t}\n\n\t// Grab id\n\toid := bson.ObjectIdHex(id)\n\n\t// Stub user\n\tu := models.User{}\n\n\t// Fetch user\n\tif err := uc.session.DB(\"todos\").C(\"users\").FindId(oid).One(&u); err != nil {\n\t\tw.WriteHeader(404)\n\t\treturn\n\t}\n\n\t// Marshal provided interface into JSON structure\n\tuj, _ := json.Marshal(u)\n\n\t// Write content-type, statuscode, payload\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(200)\n\tfmt.Fprintf(w, \"%s\", uj)\n}", "func GetUserByID(user *models.User, id uint) (err error) {\n\tif err = config.DB.Where(\"id = ?\", id).First(user).Error; err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (m *manager) Get(ctx context.Context, id int) (*models.User, error) {\n\tusers, err := m.dao.List(ctx, q.New(q.KeyWords{\"user_id\": id}))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(users) == 0 {\n\t\treturn nil, errors.NotFoundError(nil).WithMessage(\"user %d not found\", id)\n\t}\n\n\treturn users[0], nil\n}", "func (es *ExpenseStoreSQL) GetUser(id int) *User {\n\tvar user *User\n\n\trows, err := es.Query(\"SELECT * FROM users WHERE user_id = ?\", id)\n\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\tvar (\n\t\tuserID int64\n\t\tfirstName string\n\t\tlastName string\n\t\temail string\n\t)\n\n\tfor rows.Next() {\n\t\tif err = rows.Scan(&userID, &firstName, &lastName, &email); err != nil {\n\t\t\tlog.Fatalln(err)\n\t\t}\n\t\tuser = &User{userID, firstName, lastName, email}\n\t}\n\n\treturn user\n}", "func GetUserByID(id uint) (models.User, error) {\n\tvar u models.User\n\tresult := database.GetPostgresDB().First(&u, id)\n\tif result.Error != nil {\n\t\treturn models.User{}, result.Error\n\t}\n\treturn u, nil\n}", "func GetUserByID(id uint, userDAO UserDAO) domain.UserResource {\n\treturn userDAO.GetUserByID(id)\n}", "func (u *User) GetUser(id int) error {\n\tconn, err := db.Connect()\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer conn.Close()\n\n\tsql := `SELECT id,username,password,name,is_admin FROM users WHERE id = $1 LIMIT 1`\n\trow := conn.QueryRow(sql, id)\n\n\terr = row.Scan(&u.ID, &u.Username, &u.Password, &u.Name, &u.IsAdmin)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func GetByID(w http.ResponseWriter, r *http.Request, DB *gorm.DB) {\n\tvar dbUser User\n\tparams := mux.Vars(r)\n\tuserID := params[\"id\"]\n\t//Need to make sure that the user that is requesting user info is either the user or an admin user\n\ttoken := r.Header.Get(\"Authorization\")\n\tresult, ID := utils.VerifyJWT(token)\n\tmyID := strconv.FormatUint(uint64(ID), 10)\n\t//results := utils.IsAdmin(token, DB)\n\t//fmt.Printf(\"%v\", results)\n\tif (result && userID == myID) || isAdmin(token, DB) {\n\t\tDB.Where(\"ID = ?\", userID).First(&dbUser)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusOK)\n\t\tjson.NewEncoder(w).Encode(dbUser)\n\t} else {\n\t\tnotauthorizedResponse := response.JsonResponse(\"Not authorized\", 409)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tjson.NewEncoder(w).Encode(notauthorizedResponse)\n\t}\n\n}", "func GetUser(w http.ResponseWriter, r *http.Request) {\n\tid, _ := strconv.Atoi(mux.Vars(r)[\"id\"])\n\tuser, err := models.GetUser(id)\n\n\tif err != nil {\n\t\tfmt.Fprintln(w, http.StatusNotFound)\n\t} else {\n\t\tjson.NewEncoder(w).Encode(user)\n\t}\n}", "func (repository Users) Get(ID uint64) (models.User, error) {\n\tline, error := repository.db.Query(\"SELECT id, name, nick, email, createdAt from users where id = ?\",\n\t\tID)\n\n\tif error != nil {\n\t\treturn models.User{}, error\n\t}\n\n\tdefer line.Close()\n\n\tvar user models.User\n\n\tif line.Next() {\n\t\tif error = line.Scan(\n\t\t\t&user.ID,\n\t\t\t&user.Name,\n\t\t\t&user.Nick,\n\t\t\t&user.Email,\n\t\t\t&user.CreatedAt,\n\t\t); error != nil {\n\t\t\treturn models.User{}, error\n\t\t}\n\t}\n\n\treturn user, nil\n}", "func UserGet(ctx context.Context, id *string, userRepo model.UserRepository) (*model.User, error) {\n\treqID := utils.GetReqIDFromContext(ctx)\n\tlogger := log.WithFields(log.Fields{\n\t\tconstant.ReqID: reqID,\n\t\t\"user_id\": id,\n\t})\n\tlogger.Debug(\"Enter in UserGet service\")\n\treturn userRepo.Find(ctx, id)\n}", "func GetUser(qy db.Queryer, userid int64) (*User, error) {\n\treturn GetUserWithID(qy, userid)\n}", "func (a *UserAPI) GetUserByID(ctx *gin.Context) {\n\twithID(ctx, \"id\", func(id uint) {\n\t\tif user := a.DB.GetUserByID(uint(id)); user != nil {\n\t\t\tctx.JSON(200, toExternal(user))\n\t\t} else {\n\t\t\tctx.AbortWithError(404, errors.New(\"user does not exist\"))\n\t\t}\n\t})\n}", "func (serv *AppServer) GetUser(uID int) User {\n\treturn *ParseUser(serv.ServerRequest([]string{\"GetUser\", strconv.Itoa(uID)}))\n}", "func (us *UserService) GetByID(ctx context.Context, id string) (user.User, error) {\n\tctx, cancel := context.WithTimeout(ctx, waitTime*time.Second)\n\tdefer cancel()\n\n\tobjectID, err := primitive.ObjectIDFromHex(id)\n\tif err != nil {\n\t\tus.log.Error(err)\n\t\treturn user.User{}, response.ErrInvalidID\n\t}\n\n\tu, err := us.repository.GetByID(ctx, objectID)\n\tif err != nil {\n\t\tus.log.Error(err)\n\t\treturn user.User{}, err\n\t}\n\n\treturn u, nil\n}", "func GetUserByID(db *sql.DB, ID int) (models.UserResponse, error) {\n\trows, err := db.Query(\"SELECT id, username, createdAt, email FROM users WHERE id = ?\", ID)\n\tif err != nil {\n\t\treturn models.UserResponse{}, err\n\t}\n\n\tif rows.Next() {\n\t\tvar id int\n\t\tvar username string\n\t\tvar createdAt time.Time\n\t\tvar email string\n\t\terr = rows.Scan(&id, &username, &createdAt, &email)\n\t\tif err != nil {\n\t\t\treturn models.UserResponse{}, err\n\t\t}\n\n\t\treturn models.UserResponse{ID: id, Username: username, CreatedAt: createdAt, Email: email}, nil\n\t}\n\treturn models.UserResponse{}, ErrUserNotFound\n}" ]
[ "0.8404203", "0.8208872", "0.8104104", "0.80417556", "0.80383563", "0.80031097", "0.79930073", "0.79624104", "0.7956015", "0.79517967", "0.792432", "0.79198223", "0.7918773", "0.7908796", "0.78870136", "0.7877933", "0.78747845", "0.78590804", "0.7849828", "0.7844147", "0.78439766", "0.78439766", "0.7834872", "0.7828169", "0.7822312", "0.7804616", "0.7787032", "0.7774216", "0.7773238", "0.7756432", "0.77467465", "0.77429223", "0.77330834", "0.77303356", "0.7723296", "0.77229166", "0.76987344", "0.76974154", "0.7697357", "0.7697357", "0.7697357", "0.7697357", "0.7697357", "0.7697357", "0.7697357", "0.7697357", "0.7694771", "0.7691673", "0.76805377", "0.7675437", "0.76745677", "0.7644119", "0.76348335", "0.7633698", "0.76115286", "0.7610792", "0.7607316", "0.7607316", "0.7603227", "0.76005554", "0.7598085", "0.75913155", "0.758805", "0.75852764", "0.7578437", "0.7573398", "0.75720036", "0.75719166", "0.75706196", "0.75646394", "0.7564322", "0.7562289", "0.755641", "0.75536346", "0.7547626", "0.75440437", "0.754354", "0.7540723", "0.7536834", "0.75340134", "0.7528071", "0.75243974", "0.7519798", "0.7512152", "0.7503302", "0.7501545", "0.7491344", "0.74854016", "0.7482288", "0.7482122", "0.74817955", "0.7479718", "0.74753565", "0.74729174", "0.7472408", "0.746666", "0.746555", "0.745985", "0.7459444", "0.7455985", "0.7455264" ]
0.0
-1
Me returns connected user
func (c *Client) Me() (*User, error) { resp := &User{} err := c.apiget("/me", resp) if err != nil { return nil, err } return resp, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (c *Client) Me() (*object.PublicUser, error) {\n\tvar user object.PublicUser\n\tif err := c.Get(\"/me\", &user); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &user, nil\n}", "func (client *Client) Me() (User, error) {\n\tuser := User{}\n\tif err := client.Get(\"me/\", &user); err != nil {\n\t\treturn User{}, err\n\t}\n\treturn user, nil\n}", "func (tc TeresaClient) Me() (user *models.User, err error) {\n\tr, err := tc.teresa.Users.GetCurrentUser(nil, tc.apiKeyAuthFunc)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn r.Payload, nil\n}", "func (s userService) Me() (*api.User, error) {\n\treturn s.client.httpClient.GetMyUser()\n}", "func (c *baseClient) GetMe(ctx context.Context) (*User, error) {\n\tuser := new(User)\n\treturn user, c.Execute(ctx, \"getMe\", nil, user)\n}", "func (c *Client) Me() (*discord.User, error) {\n\tvar me *discord.User\n\treturn me, c.RequestJSON(&me, \"GET\", EndpointMe)\n}", "func (g *GitLab) Me() (ret User, err error) {\n\turi := g.uri(\"/user\", nil)\n\tresp, _, err := g.get(uri, nil)\n\terr = forgeRet(resp, &ret, err)\n\treturn\n}", "func (u *UserService) Me(ctx context.Context) (*User, *http.Response, error) {\n\treq, err := u.client.newRequest(\"GET\", \"user.me\", nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tvar user User\n\tresp, err := u.client.do(ctx, req, &user)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\treturn &user, resp, nil\n}", "func (g Graph) GetMe(w http.ResponseWriter, r *http.Request) {\n\n\tu, ok := revactx.ContextGetUser(r.Context())\n\tif !ok {\n\t\tg.logger.Error().Msg(\"user not in context\")\n\t\terrorcode.ServiceNotAvailable.Render(w, r, http.StatusInternalServerError, \"user not in context\")\n\t\treturn\n\t}\n\n\tg.logger.Info().Interface(\"user\", u).Msg(\"User in /me\")\n\n\tme := identity.CreateUserModelFromCS3(u)\n\n\trender.Status(r, http.StatusOK)\n\trender.JSON(w, r, me)\n}", "func (a *Auth) Me(c echo.Context) (*models.User, error) {\n\tau := a.rbac.User(c)\n\treturn a.udb.View(a.db, au.ID)\n}", "func (a UsersAPI) Me() (ScimUser, error) {\n\treturn a.readByPath(\"/preview/scim/v2/Me\")\n}", "func (c *Client) Me(ctx context.Context) (*models.User, error) {\n\tvar resp MeResponse\n\n\terr := c.transport.Raw(ctx, `\n\t\tquery Me {\n\t\t\tme {\n\t\t\t\tid\n\t\t\t\temail\n\t\t\t\tname\n\t\t\t}\n\t\t}\n\t`, nil, &resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp.User, nil\n}", "func (b *Bot) GetMe() (*User, error) {\n\tresult, err := b.call(\"getMe\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*User), nil\n}", "func GetCurrentUserByGit() string { return cgitUser }", "func (c *Client) GetMe() (dto.User, error) {\n\tr, err := c.NewRequest(\"GET\", \"v1/user\", nil)\n\n\tif err != nil {\n\t\treturn dto.User{}, err\n\t}\n\n\tvar user dto.User\n\t_, err = c.Do(r, &user)\n\treturn user, err\n}", "func (bot *BotAPI) GetMe() (User, error) {\n\tresp, err := bot.MakeRequest(\"get_login_info\", nil)\n\tif err != nil {\n\t\treturn User{}, err\n\t}\n\n\tvar user User\n\tjson.Unmarshal(resp.Data, &user)\n\n\tbot.debugLog(\"GetMe\", nil, user)\n\n\treturn user, nil\n}", "func (b *Bot) GetMe() (result *User, err error) {\n\tvar (\n\t\tuResult User\n\t\tiResult interface{}\n\t\toResult axon.O\n\t\tok bool\n\t)\n\tif iResult, err = b.doGet(\"getMe\"); err == nil {\n\t\tif oResult, ok = iResult.(map[string]interface{}); !ok {\n\t\t\terr = errors.New(\"doGet returned unexpected type\")\n\t\t\treturn\n\t\t}\n\t\tuResult.ID, _ = oResult.GetInteger(\"id\")\n\t\tuResult.IsBot, _ = oResult.GetBoolean(\"is_bot\")\n\t\tuResult.FirstName, _ = oResult.GetString(\"first_name\")\n\t\tuResult.LastName, _ = oResult.GetString(\"last_name\")\n\t\tuResult.Username, _ = oResult.GetString(\"username\")\n\t\tuResult.LanguageCode, _ = oResult.GetString(\"language_code\")\n\t\tuResult.CanJoinGroups, _ = oResult.GetBoolean(\"can_join_groups\")\n\t\tuResult.CanReadAllGroupMessages, _ = oResult.GetBoolean(\"can_read_all_group_messages\")\n\t\tuResult.SupportsInlineQueries, _ = oResult.GetBoolean(\"supports_inline_queries\")\n\t}\n\treturn &uResult, err\n}", "func (g Graph) GetMe(w http.ResponseWriter, r *http.Request) {\n\tclaims := oidc.FromContext(r.Context())\n\tg.logger.Info().Interface(\"Claims\", claims).Msg(\"Claims in /me\")\n\n\t// TODO make filter configurable\n\tfilter := fmt.Sprintf(\"(&(objectClass=posixAccount)(cn=%s))\", claims.PreferredUsername)\n\tuser, err := g.ldapGetSingleEntry(g.config.Ldap.BaseDNUsers, filter)\n\tif err != nil {\n\t\tg.logger.Info().Err(err).Msgf(\"Failed to read user %s\", claims.PreferredUsername)\n\t\terrorcode.ItemNotFound.Render(w, r, http.StatusNotFound)\n\t\treturn\n\t}\n\n\tme := createUserModelFromLDAP(user)\n\n\trender.Status(r, http.StatusOK)\n\trender.JSON(w, r, me)\n}", "func (c *anypointClient) getCurrentUser(token string) (*User, error) {\n\theaders := map[string]string{\n\t\t\"Authorization\": \"Bearer \" + token,\n\t}\n\n\trequest := coreapi.Request{\n\t\tMethod: coreapi.GET,\n\t\tURL: c.baseURL + \"/accounts/api/me\",\n\t\tHeaders: headers,\n\t}\n\n\tvar user CurrentUser\n\terr := c.invokeJSON(request, &user)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &user.User, nil\n}", "func CurrUser() string {\n\tu, err := user.Current()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn u.Username\n}", "func (g *Client) CurrentUser() (*User, error) {\n\tpath := getUrl([]string{\"user\"})\n\treq, _ := http.NewRequest(\"GET\", path, nil)\n\n\tvar ret *User\n\tif _, err := g.Do(req, &ret); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ret, nil\n}", "func GetMe(client *Client) (*User, error) {\n\tresp, err := client.Request(http.MethodGet, apiURL(\"me\"), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tif err := isError(resp); err != nil {\n\t\treturn nil, fmt.Errorf(\"tado° API error: %w\", err)\n\t}\n\n\tme := &User{}\n\tif err := json.NewDecoder(resp.Body).Decode(me); err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to decode tado° API response: %w\", err)\n\t}\n\n\treturn me, nil\n}", "func (s KWSession) MyUser() (user KiteUser, err error) {\n\terr = s.Call(APIRequest{\n\t\tMethod: \"GET\",\n\t\tPath: \"/rest/users/me\",\n\t\tOutput: &user,\n\t})\n\treturn\n}", "func GetCurrentUser(ctx context.Context) string {\n\treturn ctx.Value(userIdKey).(string)\n}", "func (c *anypointClient) GetCurrentUser() (*User, error) {\n\treturn c.getCurrentUser(c.auth.GetToken())\n}", "func GetCurrentUser(r *http.Request, ctx *handlers.Context) *users.User {\r\n\tsessionState := &handlers.SessionState{}\r\n\t_, err := sessions.GetState(r, ctx.SessionKey, ctx.SessionStore, sessionState)\r\n\tif err != nil {\r\n\t\tfmt.Printf(\"Error cannot get session state: \"+err.Error(), http.StatusUnauthorized)\r\n\t}\r\n\tsessionUser := sessionState.User\r\n\treturn sessionUser\r\n}", "func (h *Host) User() string {\n}", "func getCurrentUser(c context.Context) (*user.User, error) {\n\tu, err := endpoints.CurrentUser(c, scopes, audiences, clientIds)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif u == nil {\n\t\treturn nil, errors.New(\"Unauthorized: Please, sign in.\")\n\t}\n\t//c.Value(\"Current user: %#v\", u)\n\t//\tc.Debugf(\"Current user: %#v\", u)\n\tc.Done()\n\treturn u, nil\n}", "func (s *UsersService) GetCurrent() (*User, error) {\n\tvar data User\n\terr := s.client.get(\"/users/me\", map[string]string{}, nil, &data)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &data, err\n}", "func User() string {\n\treturn user\n}", "func (g *GlobalContext) CurrentUser() (*keybase1.User, error) {\n\tconfigCli, err := client.GetConfigClient(libkb.G)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcurrentStatus, err := configCli.GetCurrentStatus(context.TODO(), 0)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif !currentStatus.LoggedIn {\n\t\treturn nil, fmt.Errorf(\"Please login to Keybase before using Secrets. You can do this by issuing the command `keybase login`\")\n\t}\n\n\tmyUID := currentStatus.User.Uid\n\n\tuserCli, err := client.GetUserClient(libkb.G)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tme, err := userCli.LoadUser(context.TODO(), keybase1.LoadUserArg{Uid: myUID})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &me, nil\n}", "func (bot *Bot) GetMe() (*User, error) {\n\tresp, err := bot.request(nil, MethodGetMe)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar data User\n\terr = json.Unmarshal(*resp.Result, &data)\n\treturn &data, err\n}", "func (client *Client) CurrentUser() string {\n\treturn client.currentUser\n}", "func (s *UsersService) CurrentUser() (*User, *Response, error) {\n\treq, err := s.client.NewRequest(\"GET\", \"users/me\", nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tusr := new(User)\n\tresp, err := s.client.Do(req, usr)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn usr, resp, err\n}", "func (c *config) User(token string, t int) (*model.User, error) {\n\tuser, err := c.newClientToken(token, \"\").GetCurrentUser()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn user, nil\n\t// return all, nil\n}", "func getUser(r *http.Request) string {\n\tsession, _ := store.Get(r, serverConfig.CookieName)\n\tauthenticated, ok := session.Values[\"auth\"]\n\tif ok == true && authenticated == true {\n\t\temail := session.Values[\"email\"]\n\t\tif email != nil {\n\t\t\treturn email.(string)\n\t\t}\n\t}\n\treturn \"\"\n}", "func (usr user) whoami() string {\n return fmt.Sprint(\"My name is \", usr.name)\n}", "func GetCurrentUser(e Executor) (*User, error) {\n\treq, _ := http.NewRequest(\"GET\", RexBaseURL+apiCurrentUser, nil)\n\n\tresp, err := e.Execute(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer func() {\n\t\tio.Copy(ioutil.Discard, resp.Body)\n\t}()\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar u User\n\terr = json.Unmarshal(body, &u)\n\tu.SelfLink = u.Links.User.Href // assign self link\n\treturn &u, err\n}", "func (conn *Conn) Me() *state.Nick {\n\tif conn.st != nil {\n\t\tconn.cfg.Me = conn.st.Me()\n\t}\n\treturn conn.cfg.Me\n}", "func (bot *Bot) GetMe() (user *User, err error) {\n\t_, resBody, err := bot.client.Get(methodGetMe, nil, nil)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"GetMe: %w\", err)\n\t}\n\n\tuser = &User{}\n\tres := &response{\n\t\tResult: user,\n\t}\n\terr = res.unpack(resBody)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"GetMe: %w\", err)\n\t}\n\n\treturn user, nil\n}", "func (client *Client) User() string {\n\tclient.mutex.RLock()\n\tdefer client.mutex.RUnlock()\n\n\treturn client.user\n}", "func checkMe(r *http.Request) (*User, error) {\n\treturn getUserFromCookie(r)\n}", "func (env *Env) currentUser(r *http.Request) (*models.User, error) {\n\ts, err := env.session(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif s.UserID == 0 {\n\t\treturn nil, errors.New(\"user not logged in\")\n\t}\n\n\treturn env.db.GetUser(s.UserID)\n}", "func GetUser(socketID uuid.UUID) (model.User, error) {\n\tvar session model.Session\n\tvar user model.User\n\tmodel.DB().Where(\"socket_id = ?\", socketID).First(&session)\n\tmodel.DB().Model(&session).Related(&user)\n\tif user.ID != uuid.Nil {\n\t\treturn user, nil\n\t}\n\treturn model.User{}, fmt.Errorf(\"No user is associated with this connection\")\n}", "func CurrentUser(c *gin.Context) *models.User {\n\tvar user models.User\n\tsession := sessions.Default(c)\n\tcurrentUserID := session.Get(\"user_id\")\n\n\tif currentUserID == nil {\n\t\treturn nil\n\t} else if err := config.DB.First(&user, currentUserID).Error; err != nil {\n\t\treturn nil\n\t}\n\n\treturn &user\n}", "func (s LoginSession) Me() (*Redditor, error) {\n\treq := &request{\n\t\turl: \"https://www.reddit.com/api/me.json\",\n\t\tcookie: s.cookie,\n\t\tuseragent: s.useragent,\n\t}\n\tbody, err := req.getResponse()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttype Response struct {\n\t\tData Redditor\n\t}\n\tr := &Response{}\n\terr = json.NewDecoder(body).Decode(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &r.Data, nil\n}", "func (conf blah) User() string {\n\treturn usr.Username\n}", "func (c *Client) Me() (*www.LoginReply, error) {\n\tresponseBody, err := c.makeRequest(http.MethodGet,\n\t\twww.PoliteiaWWWAPIRoute, www.RouteUserMe, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar lr www.LoginReply\n\terr = json.Unmarshal(responseBody, &lr)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unmarshal LoginReply: %v\", err)\n\t}\n\n\tif c.cfg.Verbose {\n\t\terr := prettyPrintJSON(lr)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn &lr, nil\n}", "func GetLoggedUser(c *gin.Context) data.User {\n\tif c.Keys == nil {\n\t\treturn data.User{}\n\t}\n\n\tu, ok := c.Keys[\"user\"].(data.User)\n\n\tif !ok {\n\t\treturn data.User{}\n\t}\n\n\treturn u\n}", "func (ctrl *UserController) Me(c *gin.Context) {\n\tuserID := c.GetString(auth.UserIDKey)\n\n\tuser, err := ctrl.Repository.RetrieveUser(userID)\n\tif err != nil {\n\t\tif errors.Is(err, gorm.ErrRecordNotFound) {\n\t\t\tc.AbortWithStatusJSON(http.StatusNotFound, utils.Err(\"User not found\"))\n\t\t\treturn\n\t\t}\n\n\t\tc.AbortWithStatus(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusOK, user)\n}", "func (c *client) WhoAmI() (User, TelegramError) {\n\trequest, err := createBotGet(c.token, \"getMe\")\n\n\tif err != nil {\n\t\treturn User{}, errToTelegramErr(err)\n\t}\n\n\tresponse, err := c.httpClient.Do(request)\n\tif err != nil {\n\t\treturn User{}, errToTelegramErr(err)\n\t}\n\n\tif response.StatusCode != http.StatusOK {\n\t\treturn User{}, responseToTgError(response)\n\t}\n\ttgResp := userResponse{}\n\tdecoder := json.NewDecoder(response.Body)\n\n\tif err = decoder.Decode(&tgResp); err != nil {\n\t\treturn tgResp.Result, errToTelegramErr(err)\n\t}\n\tresponse.Body.Close()\n\n\treturn tgResp.Result, nil\n}", "func CurrentUser(client client.Client) (User, error) {\n\tuser := User{}\n\tres, err := client.PerformAction(\"user\", \"current\", map[string]string{}, nil)\n\tif err != nil {\n\t\treturn user, fmt.Errorf(\"Error: Could not get current user! \\n%s\", err.Error())\n\t}\n\tif res.StatusCode > 299 {\n\t\tbody, err := ioutil.ReadAll(res.Body)\n\t\tif err != nil {\n\t\t\treturn user, err\n\t\t}\n\t\treturn user, fmt.Errorf(\"Unexpected HTTP status: %d\\n%s\\n\", res.StatusCode, string(body))\n\t}\n\tdefer res.Body.Close()\n\tres.Unmarshal(&user)\n\treturn user, nil\n}", "func (m *AadUserConversationMember) GetUser()(Userable) {\n return m.user\n}", "func getCurrentUser() {\n\tvar URL *url.URL\n\tURL, err := url.Parse(\"https://api.spotify.com\")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tURL.Path += \"v1/me\"\n\n\tclient := &http.Client{}\n\treq, err := http.NewRequest(\"GET\", URL.String(), nil)\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\treq.Header.Set(\"Authorization\", \"Bearer \"+sAcsTok.AccessToken)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\terr = json.Unmarshal(body, &sCurrentUser)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tfmt.Println()\n\tfmt.Println(\"User Information:\")\n\tfmt.Printf(\"\\t:User Name: %s\\n\", sCurrentUser.DisplayName)\n\tfmt.Printf(\"\\t:User ID: %s\\n\", sCurrentUser.UserID)\n\tfmt.Printf(\"\\t:User account type: %s\\n\", sCurrentUser.AccountLevel)\n\n\tdefer resp.Body.Close()\n}", "func GetCurrentUser() (string, error) {\n\tu, err := user.Current()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn u.Username, err\n}", "func (c *Client) RetrieveMe() (out *User, err error) {\n\treturn c.RetrieveMeWithContext(context.Background())\n}", "func (i *interactor) CurrentUser(ctx context.Context) (api.UserInfo, error) {\n\treturn server.GetUserInfo(ctx)\n}", "func (m *User) GetAboutMe()(*string) {\n return m.aboutMe\n}", "func (a *localAuth) GetUser(userGUID string) (*interfaces.ConnectedUser, error) {\n\tlog.Debug(\"GetUser\")\n\n\tlocalUsersRepo, err := localusers.NewPgsqlLocalUsersRepository(a.databaseConnectionPool)\n\tif err != nil {\n\t\tlog.Errorf(\"Database error getting repo for Local users: %v\", err)\n\t\treturn nil, err\n\t}\n\n\tuser, err := localUsersRepo.FindUser(userGUID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tuaaAdmin := (user.Scope == a.p.Config.ConsoleConfig.ConsoleAdminScope)\n\n\tvar scopes []string\n\tscopes = make([]string, 3)\n\tscopes[0] = user.Scope\n\tscopes[1] = \"password.write\"\n\tscopes[2] = \"scim.write\"\n\n\tconnectdUser := &interfaces.ConnectedUser{\n\t\tGUID: userGUID,\n\t\tName: user.Username,\n\t\tAdmin: uaaAdmin,\n\t\tScopes: scopes,\n\t}\n\n\treturn connectdUser, nil\n}", "func getUser(c *gin.Context) user.User {\n\tvar u user.User\n\tif v, ok := c.Get(session); ok {\n\t\tu = v.(user.User)\n\t}\n\treturn u\n}", "func (c *Config) GetCurrentUser(w http.ResponseWriter, r *http.Request) {\n\tu := middleware.UserFromContext(r.Context())\n\tbjson.WriteJSON(w, u, http.StatusOK)\n}", "func getUser(ctx context.Context) string {\n\tidentityContext := auth.IdentityContextFromContext(ctx)\n\treturn identityContext.UserID()\n}", "func GetCurrentUser(ctx context.Context) (graphrbac.AADObject, error) {\n\tobjClient := getObjectsClient()\n\treturn objClient.GetCurrentUser(ctx)\n}", "func (mc *MonitaClient) CurrentUser() (*user.CurrentUserResponse, error) {\n\tres, err := mc.request(\"GET\", \"v1/user\", nil, &user.CurrentUserResponse{}, 200)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresult, _ := res.(*user.CurrentUserResponse)\n\n\treturn result, nil\n}", "func GetUser(c *gin.Context) *models.User {\n\tuser, _, _ := cookies.CurrentUser(c)\n\tif user == nil {\n\t\treturn &models.User{}\n\t}\n\treturn user\n}", "func (a *API) GetMe() (*UserInfo, error) {\n\tu := urlWithPath(*a.TargetURL, \"/userinfo\")\n\tu.RawQuery = \"scheme=openid\"\n\n\tinfo := &UserInfo{}\n\terr := a.doJSON(http.MethodGet, &u, nil, info, true)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn info, nil\n}", "func GetCurrent(r *http.Request) (*User, error) {\n\tun, pass, _ := r.BasicAuth()\n\tu := &User{\n\t\tUsername: un,\n\t\tPassword: pass,\n\t}\n\tif u.Username == os.Getenv(\"REGISTRY_ADMIN_USER\") && u.Password == os.Getenv(\"REGISTRY_ADMIN_PASS\") {\n\t\tu.Admin = true\n\t\treturn u, nil\n\t}\n\tu.Username = strings.ToLower(u.Username)\n\tauth, aerr := u.Authenticated()\n\tif aerr != nil {\n\t\treturn u, aerr\n\t}\n\tif !auth {\n\t\treturn u, errors.New(http.StatusText(http.StatusUnauthorized))\n\t}\n\terr := u.Get()\n\tif err != nil {\n\t\treturn u, err\n\t}\n\treturn u, nil\n}", "func GetCurrentUser(c *gin.Context) {\n\tuser := middleware.GetCurrentUser(c)\n\tif user == nil {\n\t\tc.AbortWithStatus(http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusOK, user)\n}", "func (ctx *Context) User() interface{} {\n\treturn ctx.UserValue[\"user\"]\n}", "func getLoggedIn(r *http.Request) users.User {\n\tc, err := r.Cookie(userCookieName)\n\tif err != nil {\n\t\treturn users.User{}\n\t}\n\treturn users.GetUser(c.Value)\n}", "func (auth *AuthManager) user(user account.AccountID) *clientInfo {\n\tauth.connMtx.RLock()\n\tdefer auth.connMtx.RUnlock()\n\treturn auth.users[user]\n}", "func (ac *AuthContext) CurrentUser() (*models.User, error) {\n\tsession, _ := ac.session.GetSession()\n\tuserId := session.Values[\"user_id\"]\n\n\tif userId == nil {\n\t\treturn nil, errors.New(\"No current user.\")\n\t}\n\n\tuser := &models.User{}\n\tif err := user.SelectId(userId.(int)); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn user, nil\n}", "func (i *Influx) GetMe() (me *protocol.Me, err error) {\n\tres, err := i.HTTPInstance.Get(context.TODO(), i.HTTPClient, i.GetBasicURL()+\"/me\", map[string]string{}, nil)\n\n\terr = json.Unmarshal(res, &me)\n\n\treturn\n}", "func CurrentUser(c *gin.Context) {\n\tsession := sessions.Default(c)\n\tuserID := session.Get(\"userID\")\n\tif userID == nil {\n\t\tc.JSON(http.StatusOK, gin.H{\n\t\t\t\"msg\": \"User not logged in.\",\n\t\t\t\"err\": \"User ID not in session.\",\n\t\t})\n\t} else {\n\t\tc.JSON(http.StatusOK, gin.H{\n\t\t\t\"msg\": session.Get(\"Username\"),\n\t\t\t\"err\": \"\",\n\t\t})\n\t}\n}", "func CurrentOfflineUser(r *http.Request, c appengine.Context) *mdl.User {\n\tvar u *mdl.User\n\tif config.OfflineMode {\n\t\tif currentUser := mdl.FindUser(c, \"Username\", config.OfflineUser.Name); currentUser == nil {\n\t\t\tu, _ = mdl.CreateUser(c, config.OfflineUser.Email, config.OfflineUser.Name, config.OfflineUser.Username, \"\", true, mdl.GenerateAuthKey())\n\t\t} else {\n\t\t\tu = currentUser\n\t\t}\n\t}\n\treturn u\n}", "func (h *Handler) GetSelf(w http.ResponseWriter, r *http.Request) {\n\tctx := r.Context()\n\n\t// TODO move user to handler parameter?\n\tu, ok := ctxpkg.ContextGetUser(ctx)\n\tif !ok {\n\t\tresponse.WriteOCSError(w, r, response.MetaServerError.StatusCode, \"missing user in context\", fmt.Errorf(\"missing user in context\"))\n\t\treturn\n\t}\n\n\tresponse.WriteOCSSuccess(w, r, &User{\n\t\tID: u.Username,\n\t\tDisplayName: u.DisplayName,\n\t\tEmail: u.Mail,\n\t\tUserType: conversions.UserTypeString(u.Id.Type),\n\t\tLanguage: h.getLanguage(ctx),\n\t})\n}", "func GetUser(id bson.ObjectId) User {\n\tsession, _ := mgo.Dial(\"127.0.0.1\")\n\tdefer session.Close()\n\tsession.SetMode(mgo.Monotonic, true)\n\tdb := session.DB(\"reimburse-me\").C(\"user\")\n\tvar result User\n\tdb.FindId(id).One(&result)\n\tresult.Token = \"\"\n\treturn result\n}", "func getUserOrNullLogin(db *gorm.DB, appUserID string, w http.ResponseWriter, r *http.Request) *models.AppUser {\n\tuser := models.AppUser{}\n\tif err := db.Where(\"app_user_status = ?\", true).First(&user, models.AppUser{AppUserID: appUserID}).Error; err != nil {\n\t\treturn nil\n\t}\n\treturn &user\n}", "func (rCalc *SingleRuleCalculator) ActiveUser() string { return rCalc.userID }", "func Current() (*User, error) {\n\treturn current()\n}", "func (r *apiV1Router) GetMe(ctx *gin.Context) {\n\tclaims := extractClaimsFromCtx(ctx)\n\tif claims == nil {\n\t\tr.logger.Warn(\"could not extract auth claims from request context\")\n\t\tmodels.SendAPIError(ctx, http.StatusBadRequest, \"missing auth information\")\n\t\treturn\n\t}\n\n\tuser, err := r.userService.GetUserWithID(ctx, claims.Id)\n\tif err != nil {\n\t\tif err == services.ErrNotFound {\n\t\t\tr.logger.Warn(\"user not found\", zap.Any(\"id\", claims.Id))\n\t\t\tmodels.SendAPIError(ctx, http.StatusBadRequest, \"user not found\")\n\t\t} else {\n\t\t\tr.logger.Error(\"could not fetch user\", zap.Error(err))\n\t\t\tmodels.SendAPIError(ctx, http.StatusInternalServerError, \"there was a problem with fetching the user\")\n\t\t}\n\t\treturn\n\t}\n\tctx.JSON(http.StatusOK, getMeRes{\n\t\tUser: *user,\n\t})\n}", "func (c *APIClient) GetCurrentUser() (*models.User, error) {\n\tvar user models.User\n\n\tresponse, err := c.getJSON(\"/api/user\", &user)\n\n\t// We are not authenticated\n\tif response != nil && response.StatusCode == http.StatusForbidden {\n\t\treturn nil, nil\n\t}\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &user, nil\n}", "func GetCurrentUser(inputUser string) (string, error) {\n\tu, err := user.Current()\n\tif err == nil {\n\t\t//Only root could specify a filter username\n\t\tif u.Username == \"root\" {\n\t\t\tif inputUser == \"\" {\n\t\t\t\treturn \"\", nil\n\t\t\t} else {\n\t\t\t\treturn inputUser, nil\n\t\t\t}\n\t\t} else {\n\t\t\tif inputUser != \"\" {\n\t\t\t\tvar err = errors.New(\"Only root could specify -u user!\")\n\t\t\t\treturn \"\", err\n\t\t\t} else {\n\t\t\t\treturn u.Username, nil\n\t\t\t}\n\t\t}\n\t}\n\treturn \"\", err\n}", "func getDiscordUserID(session *discordgo.Session) (string, error) {\n\tif user := session.State.User; user != nil {\n\t\treturn user.ID, nil\n\t}\n\n\tuser, err := session.User(\"@me\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn user.ID, nil\n}", "func (grc *GitRemoteConfiguration) GetUser() *string {\n\treturn grc.User\n}", "func getLoggedInUser(c *gin.Context) (int, string) {\n // get cookie\n val, err := c.Request.Cookie(SessionCookieName)\n if err != nil {\n return 0, \"\"\n }\n \n // search for session\n con := stores.redisPool.Get()\n defer con.Close()\n\n // base64 decode session id\n bytes, err := base64.URLEncoding.DecodeString(val.Value)\n if err != nil {\n return 0, \"\"\n }\n\n // sha256 hash of session id for lookup\n shaSum := sha256.Sum256(bytes)\n sessionHash := base64.URLEncoding.EncodeToString(shaSum[:])\n\n userId, err := redis.Int(con.Do(\"GET\", \"session:\" + sessionHash))\n if err != nil {\n return 0, val.Value\n }\n\n // return the logged in userid\n return userId, val.Value\n}", "func getGitUser() {\n\t//if cgitUser == \"\" {\n\tif c, s := RunCmd(\"git config --list|grep name|head -1|awk -F '=' '{print $2}'\"); c {\n\t\tcgitUser = s\n\t\t//} else {\n\t\t//\tlog.Debug(\"failed to get git user\")\n\t\t//\tcgitUser = \"gituserUnknown\"\n\t}\n\t//}\n\t//return cgitUser\n}", "func (w *Wechaty) UserSelf() _interface.IContactSelf {\n\tuserID := w.puppet.SelfID()\n\treturn w.Contact().LoadSelf(userID)\n}", "func CurrentUser(ctx context.Context) (User, error) {\n\tif user, ok := ctx.Value(UserContextKey).(User); ok {\n\t\treturn user, nil\n\t}\n\n\treturn User{}, ErrBadTypeAssertion\n}", "func GetCurrentUser(t *testing.T) *user.User {\n\tuser, err := user.Current()\n\tif err != nil {\n\t\tt.Fatal(\"Expectd to fetch the current user but received an error\", err)\n\t}\n\treturn user\n}", "func (g *github) GetUserName() string { return g.userName }", "func (app *App) User() *msgraph.UserRequestBuilder {\n\tif app.Login == \"\" {\n\t\treturn app.GraphClient.Me()\n\t}\n\tuserID := app.Login\n\tif app.LoginMap != nil {\n\t\tif id, ok := app.LoginMap[app.Login]; ok {\n\t\t\tuserID = id\n\t\t}\n\t}\n\treturn app.GraphClient.Users().ID(userID)\n}", "func (i ClusterInstance) User() string {\n\tif i.UserName == \"\" {\n\t\treturn defaultUsername\n\t}\n\treturn i.UserName\n}", "func (c *slackConversation) User() string {\n\treturn c.Event.User\n}", "func (_UsersData *UsersDataCallerSession) GetOwner() (common.Address, error) {\n\treturn _UsersData.Contract.GetOwner(&_UsersData.CallOpts)\n}", "func GetUser(w http.ResponseWriter, r *http.Request) GSUser {\n\tvar u GSUser\n\tcookie, err := r.Cookie(\"session\")\n\tif err == nil {\n\t\tif s, ok := gs.sessions[cookie.Value]; ok {\n\t\t\tu = gs.users[s.userName]\n\t\t\treturn u\n\t\t}\n\t}\n\treturn u\n}", "func (c *Config) GetCurUser() *UserInfo {\n\tif c.Idx >= 0 && c.Idx < len(c.Users) {\n\t\treturn c.Users[c.Idx]\n\t}\n\treturn nil\n}", "func (obj *LinkUrl) GetUser() string {\n\tif obj.urlUser != \"\" {\n\t\treturn obj.urlUser\n\t}\n\tuser := \"\"\n\tuserConfig := utils.GetConfigFromKey(utils.ChannelUserID)\n\tif userConfig != nil {\n\t\tuser = obj.urlProps.GetProperty(userConfig, \"\")\n\t\tif user == \"\" {\n\t\t\tenv := utils.NewTGEnvironment()\n\t\t\tuser = env.GetChannelUser()\n\t\t\tif user == \"\" {\n\t\t\t\tuser = env.GetChannelDefaultUser()\n\t\t\t}\n\t\t}\n\t}\n\treturn user\n}", "func (a *App) CurrentUser() dapp.Identity {\n\treturn dapp.CurrentUser(a.ID)\n}", "func (c *Client) GetMyUser() (*api.User, error) {\n\tout := &api.User{}\n\trawURL := fmt.Sprintf(pathMeUser, c.base.String())\n\terr := c.get(rawURL, true, out)\n\treturn out, errio.Error(err)\n}" ]
[ "0.7473086", "0.73378134", "0.725125", "0.71865046", "0.71819675", "0.71012664", "0.7078115", "0.70481575", "0.69000304", "0.68007416", "0.6787282", "0.67787707", "0.6760421", "0.6718504", "0.67102885", "0.6709678", "0.6683153", "0.6674113", "0.664068", "0.66393137", "0.66300386", "0.65791154", "0.6557369", "0.6544399", "0.6520678", "0.6519368", "0.6485851", "0.64736336", "0.644521", "0.64449906", "0.6391846", "0.6384224", "0.6347214", "0.6332084", "0.6312047", "0.6288219", "0.6283695", "0.6278613", "0.62720895", "0.62665105", "0.6260493", "0.62514657", "0.62416774", "0.62373775", "0.62048185", "0.61923903", "0.618547", "0.6184525", "0.61789286", "0.6175409", "0.61663324", "0.6160581", "0.61534584", "0.6144988", "0.6141407", "0.6138694", "0.61320746", "0.6102535", "0.609335", "0.60928285", "0.6091729", "0.6083633", "0.60667175", "0.6015157", "0.60112303", "0.5997277", "0.59952956", "0.5991522", "0.5984758", "0.59829545", "0.59764326", "0.5964364", "0.59635687", "0.5958308", "0.59525144", "0.593378", "0.5921025", "0.59131825", "0.59056073", "0.58881176", "0.58841306", "0.5882906", "0.58772576", "0.5853402", "0.5846853", "0.58386004", "0.5838348", "0.5821954", "0.5798088", "0.57765156", "0.5771627", "0.5770155", "0.5764409", "0.57621783", "0.5759767", "0.5744232", "0.57396185", "0.5735906", "0.5729976", "0.5722371" ]
0.71552444
5
GetUserOrders lists orders for a user limit and offset stand for pagination the boolean returns indicates if it was the last page or not. This function only works for connected user.
func (c *Client) GetUserOrders(u *User, limit, offset int) ([]*Order, error, bool) { if u == nil { return nil, errors.New("user can't be nil"), false } userIDStr := strconv.Itoa(u.ID) limitStr := strconv.Itoa(limit) offsetStr := strconv.Itoa(offset) orders := &ListOrderResponse{} err := c.apiget("/users/"+userIDStr+"/orders?limit="+limitStr+"&offset="+offsetStr, orders) if err != nil { return nil, err, false } return orders.Orders, nil, orders.Meta.Next == "" }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func GetOrders(db *sqlx.DB) gin.HandlerFunc {\n\n\treturn func(c *gin.Context) {\n\n\t\tvar user1 User\n\t\tuserName, exists := c.Get(\"user\")\n\t\tif !exists {\n\t\t\tc.AbortWithError(503, errors.NewAPIError(503, \"failed to get user\", \"internal server error\", c))\n\t\t\treturn\n\t\t}\n\n\t\tdbErr := db.Get(&user1, \"SELECT * FROM gaea.user WHERE user_name=$1\", userName)\n\t\tif dbErr != nil {\n\t\t\tc.AbortWithError(503, errors.NewAPIError(503, \"failed to get user\", \"internal server error\", c))\n\t\t\treturn\n\t\t}\n\n\t\tvar memberStatus bool\n\t\tswitch {\n\t\tcase user1.Role == \"nonmember\":\n\t\t\tmemberStatus = false\n\t\tdefault:\n\t\t\tmemberStatus = true\n\t\t}\n\n\t\tvar ords []Order\n\t\tvar retOrds []Order\n\t\tvar qtyOrd int\n\n\t\terr1 := db.Get(&qtyOrd, `SELECT COUNT(*) FROM gaea.order WHERE user_name=$1`,\n\t\t\tuserName)\n\t\tif err1 != nil {\n\t\t\tfmt.Println(err1)\n\t\t\tc.AbortWithError(503, errors.NewAPIError(503, \"failed to get orders\", \"internal server error\", c))\n\t\t\treturn\n\t\t}\n\t\tif qtyOrd > 0 {\n\t\t\terr2 := db.Select(&ords, `SELECT * FROM gaea.order WHERE user_name=$1`,\n\t\t\t\tuserName)\n\t\t\tif err2 != nil {\n\t\t\t\tfmt.Println(err2)\n\t\t\t\tc.AbortWithError(503, errors.NewAPIError(503, \"failed to get orders\", \"internal server error\", c))\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tvar amtErr error\n\n\t\t\tfor _, order := range ords {\n\t\t\t\torder.ItemQty, order.AmountTotal, amtErr = CalcOrderTotals(order.OrderId, memberStatus, db)\n\t\t\t\tif amtErr != nil {\n\t\t\t\t\tfmt.Printf(\"%s\", amtErr)\n\t\t\t\t}\n\t\t\t\tretOrds = append(retOrds, order)\n\t\t\t}\n\t\t}\n\n\t\tc.JSON(200, gin.H{\"qty\": qtyOrd, \"orders\": retOrds})\n\t}\n}", "func getCurrentOrders(userName string, isAdmin bool) ([]viewOrder, error) {\r\n\r\n\tviewOrderSlice := make([]viewOrder, 0)\r\n\tpizzaSlice, _ := pizzaList.GetAllPizza()\r\n\torderQSlice, err := orderQueue.GetAllOrders(userName, isAdmin)\r\n\r\n\tif err != nil {\r\n\t\treturn viewOrderSlice, err\r\n\t} else {\r\n\t\tfor idx1, val1 := range orderQSlice {\r\n\t\t\torderSlice := val1.OrderSlice\r\n\t\t\tviewOrderItemSlice := make([]viewOrderItem, 0)\r\n\r\n\t\t\tfor idx2, val2 := range orderSlice {\r\n\t\t\t\tfor _, val3 := range pizzaSlice {\r\n\t\t\t\t\tif val2.PizzaNo == val3.PizzaNo {\r\n\t\t\t\t\t\tpizzaOrder := viewOrderItem{idx2 + 1, val2.PizzaNo, val3.PizzaName, fmt.Sprintf(\"%.2f\", val3.PizzaPrice), val2.OrderQty, \"\", \"\"}\r\n\t\t\t\t\t\tviewOrderItemSlice = append(viewOrderItemSlice, pizzaOrder)\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\r\n\t\t\tviewOrder := viewOrder{idx1 + 1, val1.OrderNo, viewOrderItemSlice, fmt.Sprintf(\"%.2f\", val1.TotalCost), val1.UserName}\r\n\t\t\tviewOrderSlice = append(viewOrderSlice, viewOrder)\r\n\t\t}\r\n\t}\r\n\r\n\treturn viewOrderSlice, nil\r\n}", "func GetCustomerOrders(c buffalo.Context) error {\n\tcustomer, err := GetUserByID(c.Param(\"user_id\"), c)\n\tif err != nil {\n\t\treturn errors.WithStack(errors.New(\"could not find user\"))\n\t}\n\ttx := c.Value(\"tx\").(*pop.Connection)\n\torders := &models.Orders{}\n\n\tif err := tx.Eager().Where(\"user_id = ? AND status = ?\", customer.ID, Paid).All(orders); err != nil {\n\t\treturn c.Error(http.StatusInternalServerError, err)\n\t}\n\treturn c.Render(http.StatusOK, r.JSON(map[string]interface{}{\n\t\t\"message\": \"successful\",\n\t\t\"orders\": orders,\n\t}))\n}", "func (a *App) getOrders(w http.ResponseWriter, r *http.Request) {\n\tpage, err := strconv.Atoi(r.URL.Query().Get(\"page\"))\n\tif err != nil {\n\t\thelpers.RespondWithError(w, http.StatusBadRequest, \"INVALID_PAGE_NUMBER\")\n\t\treturn\n\t}\n\n\tlimit, err := strconv.Atoi(r.URL.Query().Get(\"limit\"))\n\tif err != nil {\n\t\thelpers.RespondWithError(w, http.StatusBadRequest, \"INVALID_LIMIT_NUMBER\")\n\t\treturn\n\t}\n\n\tOrders, err := models.GetOrders(a.DB, (page - 1), limit)\n\tif err != nil {\n\t\thelpers.RespondWithError(w, http.StatusInternalServerError, \"DB_CONNECTION_ERR\")\n\t\treturn\n\t}\n\tif len(Orders) == 0 {\n\t\thelpers.RespondWithError(w, http.StatusInternalServerError, \"DATA_NOT_FOUND\")\n\t\treturn\n\t}\n\thelpers.RespondWithJSON(w, http.StatusOK, Orders)\n}", "func getCompletedOrders(userName string, isAdmin bool) []viewOrder {\r\n\r\n\tmyCompletedOrderSlice := make([]viewOrder, 0)\r\n\r\n\tif !isAdmin {\r\n\t\ti := 0\r\n\t\tfor _, val1 := range completedOrderSlice {\r\n\t\t\tif val1.UserName == userName {\r\n\t\t\t\tmyCompletedOrderSlice = append(myCompletedOrderSlice, val1)\r\n\t\t\t\tmyCompletedOrderSlice[i].IdxNo = i + 1\r\n\t\t\t\ti++\r\n\t\t\t}\r\n\t\t}\r\n\t} else {\r\n\t\treturn completedOrderSlice\r\n\t}\r\n\r\n\treturn myCompletedOrderSlice\r\n}", "func (m manager) UserOrders(userID string) (acmeserverless.Orders, error) {\n\t// Create a map of DynamoDB Attribute Values containing the table keys\n\t// for the access pattern PK = USER KeyID = ID\n\tkm := make(map[string]*dynamodb.AttributeValue)\n\tkm[\":type\"] = &dynamodb.AttributeValue{\n\t\tS: aws.String(\"ORDER\"),\n\t}\n\tkm[\":userid\"] = &dynamodb.AttributeValue{\n\t\tS: aws.String(userID),\n\t}\n\n\t// Create the QueryInput\n\tqi := &dynamodb.QueryInput{\n\t\tTableName: aws.String(os.Getenv(\"TABLE\")),\n\t\tKeyConditionExpression: aws.String(\"PK = :type\"),\n\t\tFilterExpression: aws.String(\"KeyID = :username\"),\n\t\tExpressionAttributeValues: km,\n\t}\n\n\t// Execute the DynamoDB query\n\tqo, err := dbs.Query(qi)\n\tif err != nil {\n\t\treturn acmeserverless.Orders{}, err\n\t}\n\n\torders := make(acmeserverless.Orders, len(qo.Items))\n\n\tfor idx, ord := range qo.Items {\n\t\tstr := ord[\"Payload\"].S\n\t\to, err := acmeserverless.UnmarshalOrder(*str)\n\t\tif err != nil {\n\t\t\tlog.Println(fmt.Sprintf(\"error unmarshalling order data: %s\", err.Error()))\n\t\t\tcontinue\n\t\t}\n\t\torders[idx] = o\n\t}\n\n\treturn orders, nil\n}", "func (s *OrderService) GetOrdersForUser(userID string) ([]string, error) {\n\t// NOTE We use the username as a key in the orders state set, to hold an index of orders\n\tdata, err := s.client.GetState(context.Background(), s.storeName, userID, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\torders := []string{}\n\n\t// If no data, just return an empty array\n\tif data.Value == nil {\n\t\treturn orders, nil\n\t}\n\n\tif err = json.Unmarshal(data.Value, &orders); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn orders, nil\n}", "func (s *Store) GetOrdersByUser(uid string) (l []interface{}, err error) {\n\treturn s.w.Get(s.orders, bson.M{\"uid\": uid})\n}", "func (b *Bitmex) GetActiveOrders(ctx context.Context, req *order.MultiOrderRequest) (order.FilteredOrders, error) {\n\terr := req.Validate()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tparams := OrdersRequest{\n\t\tFilter: \"{\\\"open\\\":true}\",\n\t}\n\tresp, err := b.GetOrders(ctx, &params)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tformat, err := b.GetPairFormat(asset.PerpetualContract, false)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\torders := make([]order.Detail, len(resp))\n\tfor i := range resp {\n\t\tvar orderStatus order.Status\n\t\torderStatus, err = order.StringToOrderStatus(resp[i].OrdStatus)\n\t\tif err != nil {\n\t\t\tlog.Errorf(log.ExchangeSys, \"%s %v\", b.Name, err)\n\t\t}\n\t\tvar oType order.Type\n\t\toType, err = b.getOrderType(resp[i].OrdType)\n\t\tif err != nil {\n\t\t\tlog.Errorf(log.ExchangeSys, \"%s %v\", b.Name, err)\n\t\t}\n\t\torderDetail := order.Detail{\n\t\t\tDate: resp[i].Timestamp,\n\t\t\tPrice: resp[i].Price,\n\t\t\tAmount: resp[i].OrderQty,\n\t\t\tExecutedAmount: resp[i].CumQty,\n\t\t\tRemainingAmount: resp[i].LeavesQty,\n\t\t\tExchange: b.Name,\n\t\t\tOrderID: resp[i].OrderID,\n\t\t\tSide: orderSideMap[resp[i].Side],\n\t\t\tStatus: orderStatus,\n\t\t\tType: oType,\n\t\t\tPair: currency.NewPairWithDelimiter(resp[i].Symbol,\n\t\t\t\tresp[i].SettlCurrency,\n\t\t\t\tformat.Delimiter),\n\t\t}\n\n\t\torders[i] = orderDetail\n\t}\n\treturn req.Filter(b.Name, orders), nil\n}", "func (mr *MockOrderUsecaseMockRecorder) GetUserOrders(arg0, arg1 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetUserOrders\", reflect.TypeOf((*MockOrderUsecase)(nil).GetUserOrders), arg0, arg1)\n}", "func vieworders(res http.ResponseWriter, req *http.Request) {\r\n\tmyUser := getUser(res, req)\r\n\tif !alreadyLoggedIn(req) {\r\n\t\thttp.Redirect(res, req, \"/\", http.StatusSeeOther)\r\n\t\treturn\r\n\t}\r\n\r\n\tclientMsg := \"\" // To display message to the user on the client\r\n\r\n\t// Get slice of the current orders for the user.\r\n\t// Admin can view all orders.\r\n\tviewOrderSlice, err := getCurrentOrders(myUser.UserName, myUser.IsAdmin)\r\n\r\n\tif err != nil {\r\n\t\tclientMsg = \"No orders found. \"\r\n\r\n\t\tlog.WithFields(logrus.Fields{\r\n\t\t\t\"userName\": myUser.UserName,\r\n\t\t}).Info(err)\r\n\t}\r\n\r\n\t// Get slice of the completed orders for the user.\r\n\t// Admin can view all orders.\r\n\tmyCompletedOrderSlice := getCompletedOrders(myUser.UserName, myUser.IsAdmin)\r\n\r\n\tif len(myCompletedOrderSlice) == 0 {\r\n\t\tlog.WithFields(logrus.Fields{\r\n\t\t\t\"userName\": myUser.UserName,\r\n\t\t}).Info(\"no completed orders\")\r\n\t}\r\n\r\n\tdata := struct {\r\n\t\tUser user\r\n\t\tViewOrderSlice []viewOrder\r\n\t\tCntCurrentItems int\r\n\t\tCompletedOrderSlice []viewOrder\r\n\t\tCntCompletedItems int\r\n\t\tClientMsg string\r\n\t}{\r\n\t\tmyUser,\r\n\t\tviewOrderSlice,\r\n\t\tlen(viewOrderSlice),\r\n\t\tmyCompletedOrderSlice,\r\n\t\tlen(myCompletedOrderSlice),\r\n\t\tclientMsg,\r\n\t}\r\n\r\n\ttpl.ExecuteTemplate(res, \"vieworders.gohtml\", data)\r\n}", "func GetOrders(c *gin.Context) {\n\tid := c.Params.ByName(\"id\")\n\n\tif id == \"\" {\n\t\terrors.ErrRequiredParam(c.Writer, http.StatusBadRequest, \"order id is required\")\n\t\treturn\n\t}\n\n\torder, err := s.client.GetOrder(id)\n\tif err != nil {\n\t\ts.l.Printf(\"failed to request order information: %s\\n\", err)\n\t\treturn\n\t}\n\n\tmodels.Respond(c.Writer, order)\n\treturn\n}", "func GetCustomerOrders(c *gin.Context) {\n\tc.JSON(http.StatusOK, gin.H{\"message\": \"NOT IMPLEMENTED\"})\n}", "func getOrders(shopCode string) error {\n\n\tmethods := []string{\"gy.erp.trade.history.get\", \"gy.erp.trade.get\"}\n\tpgSize, _ := strconv.Atoi(config.Config(\"PAGE_SIZE\"))\n\n\tif err := saveOrders(pgSize, shopCode, methods); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func GetOrders() ([]byte, error) {\n\tvar db, _ = sql.Open(\"sqlite3\", \"cache/users.sqlite3\")\n\tdefer db.Close()\n\tvar ou string\n\tvar ta, ts int64 \n\tq, err := db.Query(\"select ouid, chargedamount, timestamp from orders\")\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\t\n\tvar a []interface{}\n\t\n\tfor q.Next() {\n\t\tq.Scan(&ou, &ta, &ts)\n\t\tb := make(map[string]interface{})\t\n\t\tb[\"ouid\"] = ou\n\t\tb[\"chargedamount\"] = float64(ta)/100\n\t\t// b[\"timestamp\"] = ts\n\t\tb[\"timestamp\"] = string(time.Unix(ts, 0).Format(\"02.01.2006 15:04:05\"))\n\t\ta = append(a, b)\n\t}\n\t\n\tgetord, err := json.Marshal(a)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t\treturn getord, nil\n}", "func (s *ApiService) GetOrders(ctx context.Context, orderId string) (ordf.ImplResponse, error) {\n\t// TODO: implement long polling on separate polling API\n\t// will need to update SDK to pass in last known state and check for change\n\torder, err := s.ordersService.GetOrder(ctx, orderId)\n\tif err != nil {\n\t\treturn ordf.Response(500, nil), err\n\t}\n\n\treturn ordf.Response(200, order), nil\n}", "func (c *Client) GetOrders(pageID int) *types.OrderList {\n\torders := &types.OrderList{}\n\tc.Client.Find(&orders.Items).Where(\"id >= ?\", pageID).Order(\"id\").Limit(pageSize + 1)\n\tif len(orders.Items) == pageSize+1 {\n\t\torders.NextPageID = orders.Items[len(orders.Items)-1].ID\n\t\torders.Items = orders.Items[:pageSize+1]\n\t}\n\treturn orders\n}", "func (s *Client) GetOrders(options *types.Options) (orders []*types.Order, err error) {\n\turl := baseURL + \"/orders\"\n\tquery := util.ParseOptions(options)\n\tsign, err := s.sign(query)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbody, err := s.getResponse(url, \"GET\", sign, query)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr = json.Unmarshal(body, &orders)\n\treturn\n}", "func (app *App) GetOrders(page, perPage int, snapshotID string) (*rpc.GetOrdersResponse, error) {\n\tordersInfos := []*zeroex.AcceptedOrderInfo{}\n\tif perPage <= 0 {\n\t\treturn &rpc.GetOrdersResponse{\n\t\t\tOrdersInfos: ordersInfos,\n\t\t\tSnapshotID: snapshotID,\n\t\t}, nil\n\t}\n\n\tvar snapshot *db.Snapshot\n\tif snapshotID == \"\" {\n\t\t// Create a new snapshot\n\t\tsnapshotID = uuid.New().String()\n\t\tvar err error\n\t\tsnapshot, err = app.db.Orders.GetSnapshot()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\texpirationTimestamp := time.Now().Add(1 * time.Minute)\n\t\tapp.snapshotExpirationWatcher.Add(expirationTimestamp, snapshotID)\n\t\tapp.muIdToSnapshotInfo.Lock()\n\t\tapp.idToSnapshotInfo[snapshotID] = snapshotInfo{\n\t\t\tSnapshot: snapshot,\n\t\t\tExpirationTimestamp: expirationTimestamp,\n\t\t}\n\t\tapp.muIdToSnapshotInfo.Unlock()\n\t} else {\n\t\t// Try and find an existing snapshot\n\t\tapp.muIdToSnapshotInfo.Lock()\n\t\tinfo, ok := app.idToSnapshotInfo[snapshotID]\n\t\tif !ok {\n\t\t\tapp.muIdToSnapshotInfo.Unlock()\n\t\t\treturn nil, ErrSnapshotNotFound{id: snapshotID}\n\t\t}\n\t\tsnapshot = info.Snapshot\n\t\t// Reset the snapshot's expiry\n\t\tapp.snapshotExpirationWatcher.Remove(info.ExpirationTimestamp, snapshotID)\n\t\texpirationTimestamp := time.Now().Add(1 * time.Minute)\n\t\tapp.snapshotExpirationWatcher.Add(expirationTimestamp, snapshotID)\n\t\tapp.idToSnapshotInfo[snapshotID] = snapshotInfo{\n\t\t\tSnapshot: snapshot,\n\t\t\tExpirationTimestamp: expirationTimestamp,\n\t\t}\n\t\tapp.muIdToSnapshotInfo.Unlock()\n\t}\n\n\tnotRemovedFilter := app.db.Orders.IsRemovedIndex.ValueFilter([]byte{0})\n\tvar selectedOrders []*meshdb.Order\n\terr := snapshot.NewQuery(notRemovedFilter).Offset(page * perPage).Max(perPage).Run(&selectedOrders)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, order := range selectedOrders {\n\t\tordersInfos = append(ordersInfos, &zeroex.AcceptedOrderInfo{\n\t\t\tOrderHash: order.Hash,\n\t\t\tSignedOrder: order.SignedOrder,\n\t\t\tFillableTakerAssetAmount: order.FillableTakerAssetAmount,\n\t\t})\n\t}\n\n\tgetOrdersResponse := &rpc.GetOrdersResponse{\n\t\tSnapshotID: snapshotID,\n\t\tOrdersInfos: ordersInfos,\n\t}\n\n\treturn getOrdersResponse, nil\n}", "func (k *Kraken) GetActiveOrders(getOrdersRequest *exchange.GetOrdersRequest) ([]exchange.OrderDetail, error) {\n\tresp, err := k.GetOpenOrders(OrderInfoOptions{})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar orders []exchange.OrderDetail\n\tfor i := range resp.Open {\n\t\tsymbol := currency.NewPairDelimiter(resp.Open[i].Descr.Pair,\n\t\t\tk.ConfigCurrencyPairFormat.Delimiter)\n\t\torderDate := time.Unix(int64(resp.Open[i].StartTm), 0)\n\t\tside := exchange.OrderSide(strings.ToUpper(resp.Open[i].Descr.Type))\n\n\t\torders = append(orders, exchange.OrderDetail{\n\t\t\tID: i,\n\t\t\tAmount: resp.Open[i].Vol,\n\t\t\tRemainingAmount: (resp.Open[i].Vol - resp.Open[i].VolExec),\n\t\t\tExecutedAmount: resp.Open[i].VolExec,\n\t\t\tExchange: k.Name,\n\t\t\tOrderDate: orderDate,\n\t\t\tPrice: resp.Open[i].Price,\n\t\t\tOrderSide: side,\n\t\t\tCurrencyPair: symbol,\n\t\t})\n\t}\n\n\texchange.FilterOrdersByTickRange(&orders, getOrdersRequest.StartTicks,\n\t\tgetOrdersRequest.EndTicks)\n\texchange.FilterOrdersBySide(&orders, getOrdersRequest.OrderSide)\n\texchange.FilterOrdersByCurrencies(&orders, getOrdersRequest.Currencies)\n\n\treturn orders, nil\n}", "func (m *MockOrderUsecase) GetUserOrders(arg0 context.Context, arg1 int) ([]models.Order, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetUserOrders\", arg0, arg1)\n\tret0, _ := ret[0].([]models.Order)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "func CustomerGetAllOrders(w http.ResponseWriter, r *http.Request) {\n\tvar message string\n\tvar hasmessge bool\n\tif ordersave {\n\t\tordersave = false\n\t\tmessage = \"Your test drive has been booked successfully.\"\n\t\thasmessge = true\n\t}\n\tsession, _ := storecustomer.Get(r, \"customerusername\")\n\temail, _ := session.Values[\"customer\"]\n\tcustomer := services.GetOneCustomerBYemail(email)\n\torders := services.GetParticularCustomerTestDrive(r, customer)\n\tcusttpl.ExecuteTemplate(w, \"order.html\", struct {\n\t\tOrders []model.TestDrive\n\t\tHasMessage bool\n\t\tMessage string\n\t}{orders, hasmessge, message})\n}", "func (controller OrderController) GetOrders() *graphql.Field {\n\treturn &graphql.Field{\n\t\tType: graphql.NewList(ordertype.OrderType),\n\t\tArgs: graphql.FieldConfigArgument{\n\t\t\t\"token\": &graphql.ArgumentConfig{\n\t\t\t\tType: graphql.String,\n\t\t\t},\n\t\t\t\"skip\": &graphql.ArgumentConfig{\n\t\t\t\tType: graphql.Int,\n\t\t\t},\n\t\t\t\"limit\": &graphql.ArgumentConfig{\n\t\t\t\tType: graphql.Int,\n\t\t\t},\n\t\t},\n\t\tResolve: func(p graphql.ResolveParams) (interface{}, error) {\n\t\t\ttoken, _ := p.Args[\"token\"].(string)\n\t\t\tskip, _ := p.Args[\"skip\"].(int)\n\t\t\tlimit, _ := p.Args[\"limit\"].(int)\n\n\t\t\tuser, _ := controller.usercase.ParseToken(p.Context, token)\n\n\t\t\torders, err := controller.ordercase.GetOrders(p.Context, user, skip, limit)\n\n\t\t\treturn orders, err\n\t\t},\n\t}\n\n}", "func GetOrders() (orders []Orders, err error) {\r\n\tvar rows *sql.Rows\r\n\tif rows, err = Get(`select * from orders where deleted_at is null order by created_at desc;`); err != nil {\r\n\t\tCheckError(\"Error getting Orders.\", err, false)\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\tdefer rows.Close()\r\n\tfor rows.Next() {\r\n\t\torder := Orders{}\r\n\t\tif err = rows.Scan(&order.ID, &order.DocEntry, &order.DocNum, &order.Canceled, &order.CardCode, &order.CardName, &order.VatSum, &order.DocTotal, &order.Synced, &order.CreatedBy, &order.CreatedAt, &order.UpdatedAt, &order.DeletedAt, &order.Comment, &order.Returned, &order.DiscountApprovedBy); err != nil {\r\n\t\t\tCheckError(\"Error Scanning Orders.\", err, false)\r\n\t\t} else {\r\n\t\t\torders = append(orders, order)\r\n\t\t}\r\n\t}\r\n\r\n\treturn\r\n}", "func (w *ServerInterfaceWrapper) GetOrders(ctx echo.Context) error {\n\tvar err error\n\n\tctx.Set(ApiKeyAuthScopes, []string{\"\"})\n\n\t// Parameter object where we will unmarshal all parameters from the context\n\tvar params GetOrdersParams\n\t// ------------- Optional query parameter \"symbol\" -------------\n\n\terr = runtime.BindQueryParameter(\"form\", true, false, \"symbol\", ctx.QueryParams(), &params.Symbol)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf(\"Invalid format for parameter symbol: %s\", err))\n\t}\n\n\t// ------------- Optional query parameter \"from\" -------------\n\n\terr = runtime.BindQueryParameter(\"form\", true, false, \"from\", ctx.QueryParams(), &params.From)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf(\"Invalid format for parameter from: %s\", err))\n\t}\n\n\t// ------------- Optional query parameter \"to\" -------------\n\n\terr = runtime.BindQueryParameter(\"form\", true, false, \"to\", ctx.QueryParams(), &params.To)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf(\"Invalid format for parameter to: %s\", err))\n\t}\n\n\t// ------------- Optional query parameter \"status\" -------------\n\n\terr = runtime.BindQueryParameter(\"form\", true, false, \"status\", ctx.QueryParams(), &params.Status)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf(\"Invalid format for parameter status: %s\", err))\n\t}\n\n\t// ------------- Optional query parameter \"limit\" -------------\n\n\terr = runtime.BindQueryParameter(\"form\", true, false, \"limit\", ctx.QueryParams(), &params.Limit)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf(\"Invalid format for parameter limit: %s\", err))\n\t}\n\n\t// Invoke the callback with all the unmarshalled arguments\n\terr = w.Handler.GetOrders(ctx, params)\n\treturn err\n}", "func orderHistoryGet(c *gin.Context) {\n\tIsUsrSectionActive, usrName := session.SessinStatus(c, \"user_session_cookie\")\n\tif !IsUsrSectionActive {\n\t\tc.HTML(\n\t\t\thttp.StatusOK,\n\t\t\t\"user_login.html\",\n\t\t\tgin.H{\"title\": \"User Login\",\n\t\t\t\t\"diplay\": \"none\", // TBD make use of this logic to diplay error\n\t\t\t},\n\t\t)\n\n\t} else {\n\t\tsessionCookie, _ := c.Cookie(\"user_session_cookie\")\n\t\t_, _, _, _, _, custID := db.TraceUserWithSIDinDB(sessionCookie)\n\t\t//Collecting all Order details to show\n\t\toK, UserOrderHisory := db.GetOrderHistory(custID)\n\t\tif !oK {\n\t\t\tfmt.Println(\"Something is went wrong while collecting order details !!\")\n\t\t}\n\t\tc.HTML(\n\t\t\thttp.StatusOK,\n\t\t\t\"orderhistory.html\",\n\t\t\tgin.H{\"title\": \"Orders\",\n\t\t\t\t\"OrderHistrory\": UserOrderHisory,\n\t\t\t\t\"usrName\": usrName,\n\t\t\t},\n\t\t)\n\n\t}\n\n}", "func (h *HUOBI) GetOrders(ctx context.Context, symbol currency.Pair, types, start, end, states, from, direct, size string) ([]OrderInfo, error) {\n\tresp := struct {\n\t\tOrders []OrderInfo `json:\"data\"`\n\t}{}\n\n\tvals := url.Values{}\n\tsymbolValue, err := h.FormatSymbol(symbol, asset.Spot)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvals.Set(\"symbol\", symbolValue)\n\tvals.Set(\"states\", states)\n\n\tif types != \"\" {\n\t\tvals.Set(\"types\", types)\n\t}\n\n\tif start != \"\" {\n\t\tvals.Set(\"start-date\", start)\n\t}\n\n\tif end != \"\" {\n\t\tvals.Set(\"end-date\", end)\n\t}\n\n\tif from != \"\" {\n\t\tvals.Set(\"from\", from)\n\t}\n\n\tif direct != \"\" {\n\t\tvals.Set(\"direct\", direct)\n\t}\n\n\tif size != \"\" {\n\t\tvals.Set(\"size\", size)\n\t}\n\n\terr = h.SendAuthenticatedHTTPRequest(ctx, exchange.RestSpot, http.MethodGet, huobiGetOrders, vals, nil, &resp, false)\n\treturn resp.Orders, err\n}", "func (o *ExchangeCurrency) UserOrders(mods ...qm.QueryMod) userOrderQuery {\n\tvar queryMods []qm.QueryMod\n\tif len(mods) != 0 {\n\t\tqueryMods = append(queryMods, mods...)\n\t}\n\n\tqueryMods = append(queryMods,\n\t\tqm.Where(\"\\\"user_order\\\".\\\"exchange_currency_id\\\"=?\", o.ID),\n\t)\n\n\tquery := UserOrders(queryMods...)\n\tqueries.SetFrom(query.Query, \"\\\"user_order\\\"\")\n\n\tif len(queries.GetSelect(query.Query)) == 0 {\n\t\tqueries.SetSelect(query.Query, []string{\"\\\"user_order\\\".*\"})\n\t}\n\n\treturn query\n}", "func GetMerchantOrders(c buffalo.Context) error {\n\tmerchant, err := GetMerchantByUserID(c.Param(\"user_id\"), c)\n\tif err != nil {\n\t\treturn errors.WithStack(errors.New(\"could not find merchant\"))\n\t}\n\ttx := c.Value(\"tx\").(*pop.Connection)\n\torderItems := &models.OrderItems{}\n\n\tif err := tx.Eager().Where(\"merchant_id = ?\", merchant.ID).All(orderItems); err != nil {\n\t\treturn c.Error(http.StatusInternalServerError, err)\n\t}\n\treturn c.Render(http.StatusOK, r.JSON(orderItems))\n}", "func GetOpenOrders() (orders []Order, error error) {\n\tjsonData, err := doTauRequest(1, \"GET\", \"trading/myopenorders/\", nil)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"GetOpenOrders->%v\", err)\n\t}\n\tlog.Tracef(\"jsonData=%s\", string(jsonData))\n\tif err := json.Unmarshal(jsonData, &orders); err != nil {\n\t\treturn nil, fmt.Errorf(\"GetOpenOrders->%v\", err)\n\t}\n\treturn orders, nil\n}", "func (v *Kounta) GetOrdersComplete(token string, company string, siteID string, start string) ([]Order, error) {\n\tclient := &http.Client{}\n\tclient.CheckRedirect = checkRedirectFunc\n\n\tu, _ := url.ParseRequestURI(baseURL)\n\tu.Path = fmt.Sprintf(ordersCompleteURL, company, siteID)\n\turlStr := fmt.Sprintf(\"%v\", u)\n\n\tfmt.Println(\"u.Path \", u.Path)\n\n\t//urlStr += \"?created_gte=2018-08-28\"\n\tif start != \"\" {\n\t\turlStr += \"?start=\" + start\n\t}\n\n\t//fmt.Println(urlStr)\n\n\tr, err := http.NewRequest(\"GET\", urlStr, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tr.Header = http.Header(make(map[string][]string))\n\tr.Header.Set(\"Accept\", \"application/json\")\n\tr.Header.Set(\"Authorization\", \"Bearer \"+token)\n\n\tres, err := client.Do(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\trawResBody, err := ioutil.ReadAll(res.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif res.StatusCode == 200 {\n\t\tvar resp []Order\n\n\t\tfmt.Println(res.Header[\"X-Next-Page\"])\n\n\t\t//\tfmt.Println(string(rawResBody))\n\n\t\terr = json.Unmarshal(rawResBody, &resp)\n\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn resp, nil\n\t}\n\tfmt.Println(string(rawResBody))\n\treturn nil, fmt.Errorf(\"Failed to get Kounta Categories %s\", res.Status)\n\n}", "func (h *HitBTC) GetActiveorders(ctx context.Context, currency string) ([]Order, error) {\n\tvar resp []Order\n\terr := h.SendAuthenticatedHTTPRequest(ctx, exchange.RestSpot, http.MethodGet,\n\t\torders+\"?symbol=\"+currency,\n\t\turl.Values{},\n\t\ttradingRequests,\n\t\t&resp)\n\n\treturn resp, err\n}", "func (h *HUOBIHADAX) GetOrders(symbol, types, start, end, states, from, direct, size string) ([]OrderInfo, error) {\n\ttype response struct {\n\t\tResponse\n\t\tOrders []OrderInfo `json:\"data\"`\n\t}\n\n\tvals := url.Values{}\n\tvals.Set(\"symbol\", symbol)\n\tvals.Set(\"states\", states)\n\n\tif types != \"\" {\n\t\tvals.Set(\"types\", types)\n\t}\n\n\tif start != \"\" {\n\t\tvals.Set(\"start-date\", start)\n\t}\n\n\tif end != \"\" {\n\t\tvals.Set(\"end-date\", end)\n\t}\n\n\tif from != \"\" {\n\t\tvals.Set(\"from\", from)\n\t}\n\n\tif direct != \"\" {\n\t\tvals.Set(\"direct\", direct)\n\t}\n\n\tif size != \"\" {\n\t\tvals.Set(\"size\", size)\n\t}\n\n\tvar result response\n\terr := h.SendAuthenticatedHTTPRequest(http.MethodGet, huobihadaxGetOrders, vals, &result)\n\n\tif result.ErrorMessage != \"\" {\n\t\treturn nil, errors.New(result.ErrorMessage)\n\t}\n\treturn result.Orders, err\n}", "func GetOrders(page int, limit int) ([]*Order, error) {\n\tvar orders []*Order\n\n\terr := db.Offset(page * limit).Limit(limit).Find(&orders).Error\n\tif err != nil && err != gorm.ErrRecordNotFound {\n\t\treturn nil, err\n\t}\n\n\treturn orders, nil\n}", "func (t *TauAPI) GetOpenOrders() (orders []Order, error error) {\n\tjsonData, err := t.doTauRequest(&TauReq{\n\t\tVersion: 1,\n\t\tMethod: \"GET\",\n\t\tPath: \"trading/myopenorders\",\n\t\tNeedsAuth: true,\n\t})\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"GetOpenOrders->%v\", err)\n\t}\n\tif err := json.Unmarshal(jsonData, &orders); err != nil {\n\t\treturn nil, fmt.Errorf(\"GetOpenOrders->%v\", err)\n\t}\n\treturn orders, nil\n}", "func (p *Poloniex) GetOpenOrders(ctx context.Context, currency string) (OpenOrdersResponse, error) {\n\tvalues := url.Values{}\n\tvalues.Set(\"currencyPair\", currency)\n\tresult := OpenOrdersResponse{}\n\treturn result, p.SendAuthenticatedHTTPRequest(ctx, exchange.RestSpot, http.MethodPost, poloniexOrders, values, &result.Data)\n}", "func (d *Db) GetOrders(name string, col string) []Order {\n\tvar query string\n\tif col != \"none\" {\n\t\tquery = \"SELECT restaurant, orderDate, details, userName, client, lastName FROM orders_view; WHERE soa.orders.\" + col + \"=\" + name\n\t} else {\n\t\tquery = \"SELECT restaurant, orderDate, details, userName, client, lastName FROM orders_view;\"\n\t}\n\tstmt, err := d.Prepare(query)\n\tif err != nil {\n\t\tfmt.Println(\"GetOrders Preperation Err: \", err)\n\t}\n\n\t// Make query with our stmt, passing in name argument\n\trows, err := stmt.Query()\n\tif err != nil {\n\t\tfmt.Println(\"GetOrders Query Err: \", err)\n\t}\n\n\t// Create User struct for holding each row's data\n\tvar client Client\n\tvar user User\n\tvar rest Restaurant\n\tvar order Order\n\tvar date string\n\tpreset := \"2006-01-02 15:04:05\"\n\t// Create slice of Client for our response\n\torders := []Order{}\n\t// Copy the columns from row into the values pointed at by r (Client)\n\tfor rows.Next() {\n\t\terr = rows.Scan(\n\t\t\t&rest.Name,\n\t\t\t&date,\n\t\t\t&order.Details,\n\t\t\t&user.Name,\n\t\t\t&client.FName,\n\t\t\t&client.LName,\n\t\t)\n\t\torder.Restaurant = rest\n\t\torder.User = user\n\t\torder.Client = client\n\t\torder.OrderDate, _ = time.Parse(preset, date)\n\t\tif err != nil {\n\t\t\tfmt.Println(\"Error scanning rows: \", err)\n\t\t}\n\t\torders = append(orders, order)\n\t}\n\n\treturn orders\n}", "func (u *UserProfile) initOrdersMeta(limit int) error {\n\tu.ordersMeta = &customerOrders{}\n\treturn u.customerEndpoint(\n\t\tu.cli, \"order\",\n\t\tParams{\"limit\": limit, \"lang\": DefaultLang},\n\t\t&u.ordersMeta,\n\t)\n}", "func (_EtherDelta *EtherDeltaCallerSession) Orders(arg0 common.Address, arg1 [32]byte) (bool, error) {\n\treturn _EtherDelta.Contract.Orders(&_EtherDelta.CallOpts, arg0, arg1)\n}", "func (n *Nicehash) GetAllMyOrders(location, algo int64) (orders AllMyOrders, err error) {\n\n\treqUrl := fmt.Sprintf(\"?method=orders.get&my&location=%d&algo=%d\", location, algo)\n\t_, err = n.client.do(\"GET\", reqUrl, \"private\", &orders)\n\tif err != nil {\n\t\treturn\n\t}\n\n\treturn\n}", "func TestWsGetActiveOrders(t *testing.T) {\n\tsetupWsAuth(t)\n\tif _, err := h.wsGetActiveOrders(); err != nil {\n\t\tt.Fatal(err)\n\t}\n}", "func (_EtherDelta *EtherDeltaSession) Orders(arg0 common.Address, arg1 [32]byte) (bool, error) {\n\treturn _EtherDelta.Contract.Orders(&_EtherDelta.CallOpts, arg0, arg1)\n}", "func (c *CoinbasePro) GetActiveOrders(ctx context.Context, req *order.MultiOrderRequest) (order.FilteredOrders, error) {\n\terr := req.Validate()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar respOrders []GeneralizedOrderResponse\n\tvar fPair currency.Pair\n\tfor i := range req.Pairs {\n\t\tfPair, err = c.FormatExchangeCurrency(req.Pairs[i], asset.Spot)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tvar resp []GeneralizedOrderResponse\n\t\tresp, err = c.GetOrders(ctx,\n\t\t\t[]string{\"open\", \"pending\", \"active\"},\n\t\t\tfPair.String())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\trespOrders = append(respOrders, resp...)\n\t}\n\n\tformat, err := c.GetPairFormat(asset.Spot, false)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\torders := make([]order.Detail, len(respOrders))\n\tfor i := range respOrders {\n\t\tvar curr currency.Pair\n\t\tcurr, err = currency.NewPairDelimiter(respOrders[i].ProductID,\n\t\t\tformat.Delimiter)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvar side order.Side\n\t\tside, err = order.StringToOrderSide(respOrders[i].Side)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvar orderType order.Type\n\t\torderType, err = order.StringToOrderType(respOrders[i].Type)\n\t\tif err != nil {\n\t\t\tlog.Errorf(log.ExchangeSys, \"%s %v\", c.Name, err)\n\t\t}\n\t\torders[i] = order.Detail{\n\t\t\tOrderID: respOrders[i].ID,\n\t\t\tAmount: respOrders[i].Size,\n\t\t\tExecutedAmount: respOrders[i].FilledSize,\n\t\t\tType: orderType,\n\t\t\tDate: respOrders[i].CreatedAt,\n\t\t\tSide: side,\n\t\t\tPair: curr,\n\t\t\tExchange: c.Name,\n\t\t}\n\t}\n\treturn req.Filter(c.Name, orders), nil\n}", "func (e *Huobi) GetOrders(stockType string) interface{} {\n\tstockType = strings.ToUpper(stockType)\n\tif _, ok := e.stockTypeMap[stockType]; !ok {\n\t\te.logger.Log(constant.ERROR, \"\", 0.0, 0.0, \"GetOrders() error, unrecognized stockType: \", stockType)\n\t\treturn false\n\t}\n\tresult, err := services.GetOrders(e.stockTypeMap[stockType] + \"usdt\")\n\tif err != nil {\n\t\te.logger.Log(constant.ERROR, \"\", 0.0, 0.0, \"GetOrders() error, \", err)\n\t\treturn false\n\t}\n\tif result.Status != \"ok\" {\n\t\te.logger.Log(constant.ERROR, \"\", 0.0, 0.0, \"GetOrders() error, \", result.ErrMsg)\n\t\treturn false\n\t}\n\torders := []Order{}\n\tcount := len(result.Data)\n\tfor i := 0; i < count; i++ {\n\t\torders = append(orders, Order{\n\t\t\tID: fmt.Sprint(result.Data[i].ID),\n\t\t\tPrice: conver.Float64Must(result.Data[i].Price),\n\t\t\tAmount: conver.Float64Must(result.Data[i].Amount),\n\t\t\tDealAmount: conver.Float64Must(result.Data[i].DealAmount),\n\t\t\tTradeType: e.tradeTypeMap[result.Data[i].TradeType],\n\t\t\tStockType: stockType,\n\t\t})\n\t}\n\treturn orders\n}", "func (v *Kounta) GetOrders(token string, company string, siteID string) ([]Order, error) {\n\tclient := &http.Client{}\n\tclient.CheckRedirect = checkRedirectFunc\n\n\tu, _ := url.ParseRequestURI(baseURL)\n\tu.Path = fmt.Sprintf(ordersURL, company, siteID)\n\turlStr := fmt.Sprintf(\"%v\", u)\n\n\tr, err := http.NewRequest(\"GET\", urlStr, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tr.Header = http.Header(make(map[string][]string))\n\tr.Header.Set(\"Accept\", \"application/json\")\n\tr.Header.Set(\"Authorization\", \"Bearer \"+token)\n\n\tres, err := client.Do(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\trawResBody, err := ioutil.ReadAll(res.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif res.StatusCode == 200 {\n\t\tvar resp []Order\n\n\t\t//fmt.Println(string(rawResBody))\n\n\t\terr = json.Unmarshal(rawResBody, &resp)\n\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn resp, nil\n\t}\n\treturn nil, fmt.Errorf(\"Failed to get Kounta Categories %s\", res.Status)\n\n}", "func (bc backendClient) QueryOpenOrders(addrStr, product, side string, start, end, page, perPage int) (orders []types.Order,\n\terr error) {\n\tperPageNum, err := params.CheckQueryOrdersParams(addrStr, product, side, start, end, page, perPage)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// field hideNoFill fixed by false\n\tjsonBytes, err := bc.GetCodec().MarshalJSON(\n\t\tbackendtypes.NewQueryOrderListParams(addrStr, product, side, page, perPageNum, int64(start), int64(end), false),\n\t)\n\tif err != nil {\n\t\treturn orders, utils.ErrMarshalJSON(err.Error())\n\t}\n\n\tpath := fmt.Sprintf(\"custom/%s/%s/open\", backendtypes.QuerierRoute, backendtypes.QueryOrderList)\n\tres, _, err := bc.Query(path, jsonBytes)\n\tif err != nil {\n\t\treturn orders, utils.ErrClientQuery(err.Error())\n\t}\n\n\tif err = utils.UnmarshalListResponse(res, &orders); err != nil {\n\t\treturn orders, utils.ErrFilterDataFromListResponse(\"open orders\", err.Error())\n\t}\n\n\treturn\n}", "func (wc *WooCommerce) GetOrders(page int) ([]models.Order, error) {\n\tbody, err := wc.GetOrdersJSON(page)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar result []models.Order\n\tif err := json.Unmarshal(body, &result); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn result, nil\n}", "func (wc *WooCommerce) GetOrdersJSON(page int) ([]byte, error) {\n\tif page < 1 {\n\t\tpage = 1\n\t}\n\t\n\tapiURL := fmt.Sprintf(\"%s/wp-json/wc/v3/orders?page=%d\", wc.URL, page)\n\treq, err := http.NewRequest(\"GET\", apiURL, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.SetBasicAuth(wc.Username, wc.Password)\n\n\tresp, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t_ = resp.Body.Close()\n\n\treturn body, nil\n}", "func (s *orderRepo) GetOrdersByUserID(userID int64) (*[]entity.OrdersByUserID, *resterrors.RestErr) {\n\n\tquery := `\n\t\tSELECT\n\t\t\to.id,\n\t\t\to.company_id,\n\t\t\tc.name,\n\t\t\to.total_price,\n\t\t\tIFNULL(cr.total_rating, 0) \t\t\tAS total_rating,\n\t\t\tCOUNT(op.id)\t\t \t\t\t\t\t\t\t\tAS total_items,\n\t\t\to.created_at\n\n\t\tFROM \t\t\t\ttab_order \t\to\n\n\t\tINNER JOIN \ttab_company\t\t\t\t\t\tc\n\t\t\t\tON \t\t\to.company_id\t\t\t\t\t= c.id\n\n\t\tLEFT JOIN \ttab_rating\t\tcr\n\t\t\t\tON \t\t\to.company_id\t\t\t\t\t= cr.company_id\n\t\t\t\tAND\t\t\tcr.user_id\t\t\t\t\t\t= o.user_id\n\n\t\tLEFT JOIN \ttab_order_product\t\t\top\n\t\t\t\tON \t\t\to.id\t\t\t\t\t\t\t\t\t= op.order_id\n\n\t\tWHERE \t\t\to.user_id \t\t\t\t\t\t= ?\n\t\t\n\t\tGROUP BY\t\t\n\t\t\to.id, \n\t\t\to.company_id, \n\t\t\tc.name, \n\t\t\to.total_price, \n\t\t\tcr.total_rating, \n\t\t\to.created_at;\n\t`\n\n\tstmt, err := s.db.Prepare(query)\n\tif err != nil {\n\t\terrorCode := \"Error 0004: \"\n\t\tlog.Println(fmt.Sprintf(\"%sError when trying to prepare the query statement in GetOrdersByUserID\", errorCode), err)\n\t\treturn nil, resterrors.NewInternalServerError(fmt.Sprintf(\"%sDatabase error\", errorCode))\n\t}\n\tdefer stmt.Close()\n\n\trows, err := stmt.Query(userID)\n\tif err != nil {\n\t\terrorCode := \"Error 0004: \"\n\t\tlog.Println(fmt.Sprintf(\"%sError when trying to prepare the query statement in GetOrdersByUserID\", errorCode), err)\n\t\treturn nil, resterrors.NewInternalServerError(fmt.Sprintf(\"%sDatabase error\", errorCode))\n\t}\n\n\tvar orders []entity.OrdersByUserID\n\tvar order entity.OrdersByUserID\n\tfor rows.Next() {\n\t\terr = rows.Scan(\n\t\t\t&order.OrderID,\n\t\t\t&order.CompanyID,\n\t\t\t&order.CompanyName,\n\t\t\t&order.TotalPrice,\n\t\t\t&order.TotalRating,\n\t\t\t&order.TotalItems,\n\t\t\t&order.CreatedAt,\n\t\t)\n\t\tif err != nil {\n\t\t\terrorCode := \"Error 0005: \"\n\t\t\tlog.Println(fmt.Sprintf(\"%sError when trying to execute Query in GetOrdersByUserID\", errorCode), err)\n\t\t\treturn nil, mysqlutils.HandleMySQLError(errorCode, err)\n\t\t}\n\t\torders = append(orders, order)\n\t}\n\n\treturn &orders, nil\n}", "func (api *API) GetOpenOrders(accountName string) ([]*OpenOrders, error) {\n\tvar resp []*OpenOrders\n\terr := api.call(\"market_history\", \"get_open_orders\", []string{accountName}, &resp)\n\treturn resp, err\n}", "func (dal *UserDAL) GetUserOffers(id int, before time.Time, size int) ([]models.Offer, error) {\n\toffers := []models.Offer{}\n\terr := dal.db.Select(&offers,\n\t\t`SELECT * FROM offer WHERE userid = $1 AND timestamp < $2\n\t\t\tORDER BY timestamp DESC\n\t\t\tLIMIT $3`, id, before.UTC(), size)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn offers, nil\n}", "func (h *HUOBIHADAX) GetOpenOrders(accountID, symbol, side string, size int) ([]OrderInfo, error) {\n\ttype response struct {\n\t\tResponse\n\t\tOrders []OrderInfo `json:\"data\"`\n\t}\n\n\tvals := url.Values{}\n\tvals.Set(\"symbol\", symbol)\n\tvals.Set(\"accountID\", accountID)\n\tif len(side) > 0 {\n\t\tvals.Set(\"side\", side)\n\t}\n\tvals.Set(\"size\", fmt.Sprintf(\"%v\", size))\n\n\tvar result response\n\terr := h.SendAuthenticatedHTTPRequest(http.MethodGet, huobihadaxGetOpenOrders, vals, &result)\n\n\tif result.ErrorMessage != \"\" {\n\t\treturn nil, errors.New(result.ErrorMessage)\n\t}\n\n\treturn result.Orders, err\n}", "func (p *bitsharesAPI) GetLimitOrders(base, quote objects.GrapheneObject, limit int) (objects.LimitOrders, error) {\n\tif limit > GetLimitOrdersLimit {\n\t\tlimit = GetLimitOrdersLimit\n\t}\n\n\tvar result objects.LimitOrders\n\terr := p.call(p.databaseAPIID, \"get_limit_orders\", &result, base.Id(), quote.Id(), limit)\n\treturn result, err\n}", "func (env Env) ListOrders(filter checkout.OrderFilter, page gorest.Pagination) (checkout.CMSOrderList, error) {\n\tdefer env.logger.Sync()\n\tsugar := env.logger.Sugar()\n\n\twhere := filter.SQLWhere()\n\tcountCh := make(chan int64)\n\tlistCh := make(chan checkout.CMSOrderList)\n\n\tgo func() {\n\t\tdefer close(countCh)\n\t\tn, err := env.countOrder(where)\n\t\tif err != nil {\n\t\t\tsugar.Error(err)\n\t\t}\n\n\t\tcountCh <- n\n\t}()\n\n\tgo func() {\n\t\tdefer close(listCh)\n\n\t\torders, err := env.listOrders(where, page)\n\n\t\tlistCh <- checkout.CMSOrderList{\n\t\t\tPagedList: pkg.PagedList{\n\t\t\t\tTotal: 0,\n\t\t\t\tPagination: gorest.Pagination{},\n\t\t\t\tErr: err,\n\t\t\t},\n\t\t\tData: orders,\n\t\t}\n\t}()\n\n\tcount, listResult := <-countCh, <-listCh\n\tif listResult.Err != nil {\n\t\treturn checkout.CMSOrderList{}, listResult.Err\n\t}\n\n\treturn checkout.CMSOrderList{\n\t\tPagedList: pkg.PagedList{\n\t\t\tTotal: count,\n\t\t\tPagination: page,\n\t\t\tErr: nil,\n\t\t},\n\t\tData: listResult.Data,\n\t}, nil\n}", "func (c *Client) GetAccountOrders(address string, opts *GetAccountOrdersOptions) ([]Order, *Response, error) {\n\tpath := \"/accounts/\" + address + \"/orders\"\n\n\tif opts != nil {\n\t\tv := url.Values{}\n\n\t\tif !opts.Date.IsZero() {\n\t\t\tv.Set(\"start\", FormatTime(opts.Date))\n\t\t}\n\n\t\tif opts.Limit != 0 {\n\t\t\tv.Set(\"limit\", strconv.Itoa(opts.Limit))\n\t\t}\n\n\t\tpath += \"?\" + v.Encode()\n\t}\n\n\tres, err := c.Do(http.MethodGet, path)\n\n\tdata := &accountOrdersResponse{}\n\terr = json.Unmarshal(res.Body, data)\n\tif err != nil {\n\t\treturn nil, res, err\n\t}\n\n\treturn data.Orders, res, nil\n}", "func GetOrderItems(db *sqlx.DB) gin.HandlerFunc {\n\n\treturn func(c *gin.Context) {\n\t\torderID := c.Param(\"orderID\")\n\t\tvar oItems []OrderItem\n\t\tvar count int\n\n\t\tcountErr := db.Get(&count, \"SELECT COUNT(*) from gaea.orderitem WHERE order_id=$1\", orderID)\n\t\tif countErr != nil {\n\t\t\tfmt.Println(countErr)\n\t\t\tc.AbortWithError(503, errors.NewAPIError(503, \"failed on getting count of order items\", \"internal server error\", c))\n\t\t\treturn\n\t\t}\n\t\tif count > 0 {\n\t\t\terr := db.Select(&oItems, \"SELECT * FROM gaea.orderitem WHERE order_id=$1\", orderID)\n\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(err)\n\t\t\t\tc.AbortWithError(503, errors.NewAPIError(503, \"failed on getting order items\", \"internal server error\", c))\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif ok := auth.MustUser(c, oItems[0].UserName); !ok {\n\t\t\t\tc.AbortWithError(401, errors.NewAPIError(401, \"tried to get order items for different user\", \"internal server error\", c))\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\t\tc.JSON(200, gin.H{\"qty\": count, \"order_items\": oItems, \"query\": \"order-\" + orderID})\n\t}\n}", "func (_EtherDelta *EtherDeltaCaller) Orders(opts *bind.CallOpts, arg0 common.Address, arg1 [32]byte) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _EtherDelta.contract.Call(opts, out, \"orders\", arg0, arg1)\n\treturn *ret0, err\n}", "func (endpoint *Endpoint) ListUsers(ctx context.Context, fields string, filter string, sort string, min, max int) (*UsersPaginatedResponse, error) {\n\t// Options\n\toptions := []Option{}\n\toptions = append(options, WithParam(\"current_user\", \"false\"))\n\tif fields != \"\" {\n\t\toptions = append(options, WithParam(\"fields\", fields))\n\t}\n\tif filter != \"\" {\n\t\toptions = append(options, WithParam(\"filter\", filter))\n\t}\n\tif sort != \"\" {\n\t\toptions = append(options, WithParam(\"sort\", sort))\n\t}\n\toptions = append(options, WithHeader(\"Range\", fmt.Sprintf(\"items=%d-%d\", min, max)))\n\n\t// Do the request\n\tresp, err := endpoint.client.do(ctx, http.MethodGet, \"/config/access/users\", options...)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error while calling the endpoint: %s\", err)\n\t}\n\n\tif resp.StatusCode != 200 {\n\t\treturn nil, fmt.Errorf(\"error with the status code: %d\", resp.StatusCode)\n\t}\n\n\t// Process the Content-Range\n\tmin, max, total, err := parseContentRange(resp.Header.Get(\"Content-Range\"))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error while parsing the content-range: %s\", err)\n\t}\n\n\t// Prepare the response\n\tresponse := &UsersPaginatedResponse{\n\t\tTotal: total,\n\t\tMin: min,\n\t\tMax: max,\n\t}\n\n\t// Decode the response\n\terr = json.NewDecoder(resp.Body).Decode(&response.User)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error while decoding the response: %s\", err)\n\t}\n\n\treturn response, nil\n}", "func (h *HitBTC) GetOpenOrders(ctx context.Context, currency string) ([]OrderHistoryResponse, error) {\n\tvalues := url.Values{}\n\tvalues.Set(\"symbol\", currency)\n\tvar result []OrderHistoryResponse\n\n\treturn result, h.SendAuthenticatedHTTPRequest(ctx, exchange.RestSpot, http.MethodGet,\n\t\tapiv2OpenOrders,\n\t\tvalues,\n\t\ttradingRequests,\n\t\t&result)\n}", "func GetAllOrders(service order.Service) http.HandlerFunc {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\torders, err := service.GetAllOrders(r.Context())\n\t\tif err != nil {\n\t\t\tutils.RespondJSON(w, err.Code, err.Error())\n\t\t\treturn\n\t\t}\n\t\tresponse := make([]response.Order, 0)\n\t\tfor _, order := range orders {\n\t\t\tresponse = append(response, toOrderResponse(order))\n\t\t}\n\t\tutils.RespondJSON(w, http.StatusOK, response)\n\t})\n}", "func (h *HitBTC) GetOrders(ctx context.Context, currency string) ([]OrderHistoryResponse, error) {\n\tvalues := url.Values{}\n\tvalues.Set(\"symbol\", currency)\n\tvar result []OrderHistoryResponse\n\n\treturn result, h.SendAuthenticatedHTTPRequest(ctx, exchange.RestSpot, http.MethodGet,\n\t\tapiV2OrderHistory,\n\t\tvalues,\n\t\ttradingRequests,\n\t\t&result)\n}", "func (order *Order) Get(pan *Panaccess, params *url.Values) ([]Order, error) {\n\t//Everything has a limit\n\tif (*params).Get(\"limit\") == \"\" {\n\t\t(*params).Add(\"limit\", \"1000\")\n\t}\n\t//Call Function\n\tresp, err := pan.Call(\n\t\t\"getListOfOrders\",\n\t\tparams)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t//Retrieve all rows and parse as a slice of Subscriber\n\tvar rows GetOrdersFilterResponse\n\tbodyBytes, err := json.Marshal(resp.Answer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr = json.Unmarshal(bodyBytes, &rows)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !resp.Success {\n\t\treturn nil, errors.New(resp.ErrorMessage)\n\t}\n\treturn rows.OrderEntries, nil\n}", "func (g Graph) GetUsers(w http.ResponseWriter, r *http.Request) {\n\tsanitizedPath := strings.TrimPrefix(r.URL.Path, \"/graph/v1.0/\")\n\todataReq, err := godata.ParseRequest(r.Context(), sanitizedPath, r.URL.Query())\n\tif err != nil {\n\t\tg.logger.Err(err).Interface(\"query\", r.URL.Query()).Msg(\"query error\")\n\t\terrorcode.InvalidRequest.Render(w, r, http.StatusBadRequest, err.Error())\n\t\treturn\n\t}\n\tusers, err := g.identityBackend.GetUsers(r.Context(), r.URL.Query())\n\tif err != nil {\n\t\tvar errcode errorcode.Error\n\t\tif errors.As(err, &errcode) {\n\t\t\terrcode.Render(w, r)\n\t\t} else {\n\t\t\terrorcode.GeneralException.Render(w, r, http.StatusInternalServerError, err.Error())\n\t\t}\n\t\treturn\n\t}\n\n\tusers, err = sortUsers(odataReq, users)\n\tif err != nil {\n\t\tvar errcode errorcode.Error\n\t\tif errors.As(err, &errcode) {\n\t\t\terrcode.Render(w, r)\n\t\t} else {\n\t\t\terrorcode.GeneralException.Render(w, r, http.StatusInternalServerError, err.Error())\n\t\t}\n\t\treturn\n\t}\n\trender.Status(r, http.StatusOK)\n\trender.JSON(w, r, &listResponse{Value: users})\n}", "func GetAllAdminUsers(query map[string]string, fields []string, sortby []string, order []string,\n\toffset int64, limit int64) (ml []interface{}, err error) {\n\to := orm.NewOrm()\n\tqs := o.QueryTable(new(AdminUsers))\n\t// query k=v\n\tfor k, v := range query {\n\t\t// rewrite dot-notation to Object__Attribute\n\t\tk = strings.Replace(k, \".\", \"__\", -1)\n\t\tqs = qs.Filter(k, v)\n\t}\n\t// order by:\n\tvar sortFields []string\n\tif len(sortby) != 0 {\n\t\tif len(sortby) == len(order) {\n\t\t\t// 1) for each sort field, there is an associated order\n\t\t\tfor i, v := range sortby {\n\t\t\t\torderby := \"\"\n\t\t\t\tif order[i] == \"desc\" {\n\t\t\t\t\torderby = \"-\" + v\n\t\t\t\t} else if order[i] == \"asc\" {\n\t\t\t\t\torderby = v\n\t\t\t\t} else {\n\t\t\t\t\treturn nil, errors.New(\"Error: Invalid order. Must be either [asc|desc]\")\n\t\t\t\t}\n\t\t\t\tsortFields = append(sortFields, orderby)\n\t\t\t}\n\t\t\tqs = qs.OrderBy(sortFields...)\n\t\t} else if len(sortby) != len(order) && len(order) == 1 {\n\t\t\t// 2) there is exactly one order, all the sorted fields will be sorted by this order\n\t\t\tfor _, v := range sortby {\n\t\t\t\torderby := \"\"\n\t\t\t\tif order[0] == \"desc\" {\n\t\t\t\t\torderby = \"-\" + v\n\t\t\t\t} else if order[0] == \"asc\" {\n\t\t\t\t\torderby = v\n\t\t\t\t} else {\n\t\t\t\t\treturn nil, errors.New(\"Error: Invalid order. Must be either [asc|desc]\")\n\t\t\t\t}\n\t\t\t\tsortFields = append(sortFields, orderby)\n\t\t\t}\n\t\t} else if len(sortby) != len(order) && len(order) != 1 {\n\t\t\treturn nil, errors.New(\"Error: 'sortby', 'order' sizes mismatch or 'order' size is not 1\")\n\t\t}\n\t} else {\n\t\tif len(order) != 0 {\n\t\t\treturn nil, errors.New(\"Error: unused 'order' fields\")\n\t\t}\n\t}\n\n\tvar l []AdminUsers\n\tqs = qs.OrderBy(sortFields...).RelatedSel()\n\tif _, err = qs.Limit(limit, offset).All(&l, fields...); err == nil {\n\t\tif len(fields) == 0 {\n\t\t\tfor _, v := range l {\n\t\t\t\tml = append(ml, v)\n\t\t\t}\n\t\t} else {\n\t\t\t// trim unused fields\n\t\t\tfor _, v := range l {\n\t\t\t\tm := make(map[string]interface{})\n\t\t\t\tval := reflect.ValueOf(v)\n\t\t\t\tfor _, fname := range fields {\n\t\t\t\t\tm[fname] = val.FieldByName(fname).Interface()\n\t\t\t\t}\n\t\t\t\tml = append(ml, m)\n\t\t\t}\n\t\t}\n\t\treturn ml, nil\n\t}\n\treturn nil, err\n}", "func AllCustomerOrdersEndpoint(w http.ResponseWriter, r *http.Request) {\n\torders, err := dao.FindAllCustomerOrders()\n\tif err != nil {\n\t\trespondWithError(w, http.StatusInternalServerError, err.Error())\n\t\treturn\n\t}\n\trespondWithJson(w, http.StatusOK, orders)\n}", "func (t *TauAPI) GetMarketOrders(market string) (MarketOrders, error) {\n\tvar mo MarketOrders\n\tvar maxBid, minAsk float64\n\tjsonData, err := t.doTauRequest(&TauReq{\n\t\tVersion: 1,\n\t\tMethod: \"GET\",\n\t\tPath: \"trading/orders?market=\" + strings.ToLower(market),\n\t})\n\tif err != nil {\n\t\treturn mo, fmt.Errorf(\"TauGetMarketOrders ->%s\", err.Error())\n\t}\n\tif err := json.Unmarshal(jsonData, &mo); err != nil {\n\t\treturn mo, err\n\t}\n\tmaxBid = 0.0\n\tfor _, b := range mo.Bids {\n\t\tbid, _ := strconv.ParseFloat(b.Price.String(), 64)\n\t\tmaxBid = math.Max(bid, maxBid)\n\t}\n\tif len(mo.Asks) == 0 {\n\t\tminAsk = maxBid + 0.01\n\t} else {\n\t\tminAsk, _ = strconv.ParseFloat(mo.Asks[0].Price.String(), 64)\n\t\tfor _, a := range mo.Asks {\n\t\t\task, _ := strconv.ParseFloat(a.Price.String(), 64)\n\t\t\tminAsk = math.Min(ask, minAsk)\n\t\t}\n\t}\n\tmo.MaxBid = maxBid\n\tmo.MinAsk = minAsk\n\treturn mo, nil\n}", "func (exchangeCurrencyL) LoadUserOrders(e boil.Executor, singular bool, maybeExchangeCurrency interface{}, mods queries.Applicator) error {\n\tvar slice []*ExchangeCurrency\n\tvar object *ExchangeCurrency\n\n\tif singular {\n\t\tobject = maybeExchangeCurrency.(*ExchangeCurrency)\n\t} else {\n\t\tslice = *maybeExchangeCurrency.(*[]*ExchangeCurrency)\n\t}\n\n\targs := make([]interface{}, 0, 1)\n\tif singular {\n\t\tif object.R == nil {\n\t\t\tobject.R = &exchangeCurrencyR{}\n\t\t}\n\t\targs = append(args, object.ID)\n\t} else {\n\tOuter:\n\t\tfor _, obj := range slice {\n\t\t\tif obj.R == nil {\n\t\t\t\tobj.R = &exchangeCurrencyR{}\n\t\t\t}\n\n\t\t\tfor _, a := range args {\n\t\t\t\tif a == obj.ID {\n\t\t\t\t\tcontinue Outer\n\t\t\t\t}\n\t\t\t}\n\n\t\t\targs = append(args, obj.ID)\n\t\t}\n\t}\n\n\tquery := NewQuery(qm.From(`user_order`), qm.WhereIn(`exchange_currency_id in ?`, args...))\n\tif mods != nil {\n\t\tmods.Apply(query)\n\t}\n\n\tresults, err := query.Query(e)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to eager load user_order\")\n\t}\n\n\tvar resultSlice []*UserOrder\n\tif err = queries.Bind(results, &resultSlice); err != nil {\n\t\treturn errors.Wrap(err, \"failed to bind eager loaded slice user_order\")\n\t}\n\n\tif err = results.Close(); err != nil {\n\t\treturn errors.Wrap(err, \"failed to close results in eager load on user_order\")\n\t}\n\tif err = results.Err(); err != nil {\n\t\treturn errors.Wrap(err, \"error occurred during iteration of eager loaded relations for user_order\")\n\t}\n\n\tif len(userOrderAfterSelectHooks) != 0 {\n\t\tfor _, obj := range resultSlice {\n\t\t\tif err := obj.doAfterSelectHooks(e); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\tif singular {\n\t\tobject.R.UserOrders = resultSlice\n\t\tfor _, foreign := range resultSlice {\n\t\t\tif foreign.R == nil {\n\t\t\t\tforeign.R = &userOrderR{}\n\t\t\t}\n\t\t\tforeign.R.ExchangeCurrency = object\n\t\t}\n\t\treturn nil\n\t}\n\n\tfor _, foreign := range resultSlice {\n\t\tfor _, local := range slice {\n\t\t\tif local.ID == foreign.ExchangeCurrencyID {\n\t\t\t\tlocal.R.UserOrders = append(local.R.UserOrders, foreign)\n\t\t\t\tif foreign.R == nil {\n\t\t\t\t\tforeign.R = &userOrderR{}\n\t\t\t\t}\n\t\t\t\tforeign.R.ExchangeCurrency = local\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func GetUsers(ctx context.Context, req *pb.GetUserRequest) (*pb.GetUserResponse, error) {\n\tgetUserFunction := func(conn *grpc.ClientConn) (interface{}, error) {\n\t\tclient := pb.NewUserServiceClient(conn)\n\n\t\tmd1 := metadata.Pairs(\n\t\t\t\"X-Custom-orgname\", \"This is my Custom Header O_o Weird\",\n\t\t\t\"authorization\", \"bearer some_token_if8y3498eufhkfj\")\n\t\tctx := metadata.NewOutgoingContext(context.Background(), md1)\n\n\t\tresp, err := client.GetUser(ctx, req)\n\t\tif err != nil {\n\t\t\tentry.WithField(logrus.ErrorKey, err).Errorln(\"Error occurred while trying to Get Users Table\")\n\n\t\t\tst := status.Convert(err)\n\t\t\tfor _, detail := range st.Details() {\n\t\t\t\tswitch t := detail.(type) {\n\t\t\t\tcase *pb.Error:\n\t\t\t\t\tfmt.Println(\"Oops! Get request was rejected by the server.\")\n\t\t\t\t\tfmt.Printf(\"The %q field was wrong:\\n\", t.Message)\n\t\t\t\t\tfmt.Printf(\"\\t%d\\n\", t.Code)\n\t\t\t\t\tfmt.Printf(\"\\t%s\\n\", t.Type)\n\t\t\t\t\tfmt.Printf(\"\\t%s\\n\", t.DetailedMessage)\n\t\t\t\tdefault:\n\t\t\t\t\tfmt.Printf(\"Object found was %v with type %v\", detail, reflect.TypeOf(detail))\n\t\t\t\t}\n\t\t\t}\n\n\t\t\treturn nil, err\n\t\t}\n\t\treturn resp, nil\n\t}\n\tresp, err := SafeExecute(getUserFunction)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tgetUserResponse, ok := resp.(*pb.GetUserResponse)\n\tif !ok {\n\t\treturn nil, errors.New(\"Could not cast response to get user\")\n\t}\n\treturn getUserResponse, nil\n}", "func returnAllOrders(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\tfmt.Fprintf(w, \"Welcome to the returnAllOrders!\")\n\tfmt.Println(\"Endpoint Hit: returnAllOrders\")\n\n\tvar orders []Orders\n\n\tresults, err := db.Query(\"select orders.id, users.username, stocks.symbol, shares from orders inner join users on orders.user_id = users.id inner join stocks on orders.stock_id = stocks.id\")\n\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\n\tfor results.Next() {\n\t\tvar order Orders\n\t\terr = results.Scan(&order.ID, &order.Username, &order.Symbol, &order.Shares)\n\t\tif err != nil {\n\t\t\tpanic(err.Error())\n\t\t}\n\t\torders = append(orders, order)\n\t}\n\tjson.NewEncoder(w).Encode(orders)\n}", "func (n *NameCom) ListOrders(request *ListOrdersRequest) (*ListOrdersResponse, error) {\n\tendpoint := fmt.Sprintf(\"/v4/orders\")\n\n\tvalues := url.Values{}\n\tif request.PerPage != 0 {\n\t\tvalues.Set(\"perPage\", fmt.Sprintf(\"%d\", request.PerPage))\n\t}\n\tif request.Page != 0 {\n\t\tvalues.Set(\"page\", fmt.Sprintf(\"%d\", request.Page))\n\t}\n\n\tbody, err := n.get(endpoint, values)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp := &ListOrdersResponse{}\n\n\terr = json.NewDecoder(body).Decode(resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp, nil\n}", "func (_Lmc *LmcSession) GetUserOwedTokens(_userAddress common.Address, _index *big.Int) (*big.Int, error) {\n\treturn _Lmc.Contract.GetUserOwedTokens(&_Lmc.CallOpts, _userAddress, _index)\n}", "func GetAllUsers(query map[string]string, fields []string, sortby []string, order []string,\n\toffset int64, limit int64) (ml []interface{}, err error) {\n\to := orm.NewOrm()\n\tqs := o.QueryTable(new(Users))\n\t// query k=v\n\tfor k, v := range query {\n\t\t// rewrite dot-notation to Object__Attribute\n\t\tk = strings.Replace(k, \".\", \"__\", -1)\n\t\tqs = qs.Filter(k, v)\n\t}\n\t// order by:\n\tvar sortFields []string\n\tif len(sortby) != 0 {\n\t\tif len(sortby) == len(order) {\n\t\t\t// 1) for each sort field, there is an associated order\n\t\t\tfor i, v := range sortby {\n\t\t\t\torderby := \"\"\n\t\t\t\tif order[i] == \"desc\" {\n\t\t\t\t\torderby = \"-\" + v\n\t\t\t\t} else if order[i] == \"asc\" {\n\t\t\t\t\torderby = v\n\t\t\t\t} else {\n\t\t\t\t\treturn nil, errors.New(\"Error: Invalid order. Must be either [asc|desc]\")\n\t\t\t\t}\n\t\t\t\tsortFields = append(sortFields, orderby)\n\t\t\t}\n\t\t\tqs = qs.OrderBy(sortFields...)\n\t\t} else if len(sortby) != len(order) && len(order) == 1 {\n\t\t\t// 2) there is exactly one order, all the sorted fields will be sorted by this order\n\t\t\tfor _, v := range sortby {\n\t\t\t\torderby := \"\"\n\t\t\t\tif order[0] == \"desc\" {\n\t\t\t\t\torderby = \"-\" + v\n\t\t\t\t} else if order[0] == \"asc\" {\n\t\t\t\t\torderby = v\n\t\t\t\t} else {\n\t\t\t\t\treturn nil, errors.New(\"Error: Invalid order. Must be either [asc|desc]\")\n\t\t\t\t}\n\t\t\t\tsortFields = append(sortFields, orderby)\n\t\t\t}\n\t\t} else if len(sortby) != len(order) && len(order) != 1 {\n\t\t\treturn nil, errors.New(\"Error: 'sortby', 'order' sizes mismatch or 'order' size is not 1\")\n\t\t}\n\t} else {\n\t\tif len(order) != 0 {\n\t\t\treturn nil, errors.New(\"Error: unused 'order' fields\")\n\t\t}\n\t}\n\n\tvar l []Users\n\tqs = qs.OrderBy(sortFields...)\n\tif _, err := qs.Limit(limit, offset).All(&l, fields...); err == nil {\n\t\tif len(fields) == 0 {\n\t\t\tfor _, v := range l {\n\t\t\t\tml = append(ml, v)\n\t\t\t}\n\t\t} else {\n\t\t\t// trim unused fields\n\t\t\tfor _, v := range l {\n\t\t\t\tm := make(map[string]interface{})\n\t\t\t\tval := reflect.ValueOf(v)\n\t\t\t\tfor _, fname := range fields {\n\t\t\t\t\tm[fname] = val.FieldByName(fname).Interface()\n\t\t\t\t}\n\t\t\t\tml = append(ml, m)\n\t\t\t}\n\t\t}\n\t\treturn ml, nil\n\t}\n\treturn nil, err\n}", "func GetUsers(opts ...UserQueryOption) ([]*User, error) {\n\tquery := &UserQuery{}\n\tfor _, opt := range opts {\n\t\tquery = opt(query)\n\t}\n\t_User_mutex.RLock()\n\tdefer _User_mutex.RUnlock()\n\tvar users []*User\n\tif query.filter != nil {\n\t\tfor _, v := range _User_cache {\n\t\t\tif query.filter(v) {\n\t\t\t\tusers = append(users, v)\n\t\t\t}\n\t\t}\n\t} else {\n\t\tfor _, v := range _User_cache {\n\t\t\tusers = append(users, v)\n\t\t}\n\t}\n\tif query.sort != nil {\n\t\tquery.sort(users)\n\t}\n\treturn users, nil\n}", "func (ths *Reader) rdOrders() bool {\n\tret, err := ths.orderClt.ClientGet(ths.OrderAddr, rhttp.ReturnCustomType)\n\tths.Datas.ClearOrderBook()\n\tif err == nil {\n\t\tths.addAsksOrders(ret.(*YOrderList), nil)\n\t\tths.addBidsOrders(ret.(*YOrderList), nil)\n\t\treturn true\n\t}\n\n\t_L.Error(\"Yobit : Client get(order) has error :\\n%+v\", err)\n\tths.initOrderParams()\n\treturn false\n}", "func (h *HUOBI) GetOpenOrders(ctx context.Context, symbol currency.Pair, accountID, side string, size int64) ([]OrderInfo, error) {\n\tresp := struct {\n\t\tOrders []OrderInfo `json:\"data\"`\n\t}{}\n\n\tvals := url.Values{}\n\tsymbolValue, err := h.FormatSymbol(symbol, asset.Spot)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvals.Set(\"symbol\", symbolValue)\n\tvals.Set(\"accountID\", accountID)\n\tif len(side) > 0 {\n\t\tvals.Set(\"side\", side)\n\t}\n\tvals.Set(\"size\", strconv.FormatInt(size, 10))\n\n\terr = h.SendAuthenticatedHTTPRequest(ctx, exchange.RestSpot, http.MethodGet, huobiGetOpenOrders, vals, nil, &resp, false)\n\treturn resp.Orders, err\n}", "func UsersGet(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\tlog.Println(\"starting retrieval\")\n\tstart := 0\n\tlimit := 10\n\n\tnext := start + limit\n\n\tw.Header().Set(\"Pragma\", \"no-cache\")\n\tw.Header().Set(\"Link\", \"<http://localhost:8080/api/users?start=\"+string(next)+\"; rel=\\\"next\\\"\")\n\n\trows, _ := database.Query(\"SELECT * FROM users LIMIT 10\")\n\n\tusers := Users{}\n\n\tfor rows.Next() {\n\t\tuser := User{}\n\t\trows.Scan(&user.ID, &user.Username, &user.First, &user.Last, &user.Email)\n\t\tusers.Users = append(users.Users, user)\n\t}\n\n\toutput, err := json.Marshal(users)\n\tif err != nil {\n\t\tfmt.Fprintln(w, \"Something went wrong while processing your request: \", err)\n\t}\n\n\tfmt.Fprintln(w, string(output))\n}", "func TestGetOpenOrders(t *testing.T) {\n\tt.Parallel()\n\targs := OrderInfoOptions{Trades: true}\n\t_, err := k.GetOpenOrders(context.Background(), args)\n\tif err == nil {\n\t\tt.Error(\"GetOpenOrders() Expected error\")\n\t}\n}", "func (_Lmc *LmcCallerSession) GetUserOwedTokens(_userAddress common.Address, _index *big.Int) (*big.Int, error) {\n\treturn _Lmc.Contract.GetUserOwedTokens(&_Lmc.CallOpts, _userAddress, _index)\n}", "func (o *V3SetErrorOrderInput) GetOrdersOk() (*[]V3OrderIntegrationError, bool) {\n\tif o == nil || o.Orders == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Orders, true\n}", "func (apiContext Context) UsersGet(w http.ResponseWriter, r *http.Request) {\n\n\t// Get context variables.\n\tmodelContext := context.Get(r, \"modelContext\").(model.Context)\n\n\t// Extract query parameters.\n\tquery := r.URL.Query()\n\tidStr := query.Get(\"id\")\n\tstatus := query.Get(\"status\")\n\tcursor := query.Get(\"cursor\")\n\tlimitStr := query.Get(\"limit\")\n\torderBy := query.Get(\"order-by\")\n\torder := query.Get(\"order\")\n\n\t// Parse non-string parametes.\n\tid := []string{}\n\tif idStr != \"\" {\n\t\tid = strings.Split(idStr, \",\")\n\t}\n\tlimit := 20\n\tif limitStr != \"\" {\n\t\tvar err error\n\t\tlimit, err = strconv.Atoi(limitStr)\n\t\tif err != nil {\n\t\t\tresponses.Context(apiContext).RespondWithError(w, r, http.StatusBadRequest, \"The 'limit' parameter is not a valid integer.\", errors.WithStack(err))\n\t\t\treturn\n\t\t}\n\t\tif limit < 1 {\n\t\t\tlimit = 1\n\t\t}\n\t\tif limit > 100 {\n\t\t\tlimit = 100\n\t\t}\n\t}\n\n\t// Build the filters map.\n\tvar filters = map[string]interface{}{}\n\tif len(id) > 0 {\n\t\tfilters[\"id\"] = id\n\t}\n\tif status != \"\" {\n\t\tfilters[\"status\"] = status\n\t}\n\n\t// Access model.\n\tresult, cm, err := modelContext.GetUsers(filters, limit, cursor, orderBy, order)\n\tif errors.Cause(err) == model.ErrBadInput {\n\t\tresponses.Context(apiContext).RespondWithError(w, r, http.StatusBadRequest, \"Parameters were wrong.\", errors.WithStack(err))\n\t\treturn\n\t} else if err != nil {\n\t\tresponses.Context(apiContext).RespondWithError(w, r, http.StatusInternalServerError, \"Something went wrong.\", errors.WithStack(err))\n\t\treturn\n\t}\n\n\t// We never return the user's password.\n\tfor i := 0; i < len(result); i++ {\n\t\tresult[i].PasswordHash = \"\"\n\t}\n\n\t// Build the response.\n\tvar response = map[string]interface{}{}\n\tresponse[\"data\"] = result\n\tresponse[\"metadata\"] = cm\n\n\t// Add the next link.\n\tresponse[\"links\"] = map[string]interface{}{\n\t\t\"next\": nil,\n\t}\n\tif cm.NextPageCursor != \"\" {\n\t\tquery = url.Values{}\n\t\tquery.Set(\"id\", strings.Join(id, \",\"))\n\t\tquery.Set(\"status\", status)\n\t\tquery.Set(\"limit\", strconv.Itoa(limit))\n\t\tquery.Set(\"order-by\", orderBy)\n\t\tquery.Set(\"order\", order)\n\t\tquery.Set(\"cursor\", cm.NextPageCursor)\n\t\tfor key := range query {\n\t\t\tif query.Get(key) == \"\" {\n\t\t\t\tquery.Del(key)\n\t\t\t}\n\t\t}\n\t\tnextURL := url.URL{\n\t\t\tScheme: \"http\",\n\t\t\tHost: r.Host,\n\t\t\tPath: r.URL.Path,\n\t\t\tRawQuery: query.Encode(),\n\t\t}\n\t\tresponse[\"links\"].(map[string]interface{})[\"next\"] = nextURL.String()\n\t}\n\n\t// Return response.\n\tresponses.RespondWithJSON(w, http.StatusOK, response)\n}", "func (o *V3SetErrorOrderInput) HasOrders() bool {\n\tif o != nil && o.Orders != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func GetUsers(req *http.Request, render render.Render, account services.Account) {\n qs := req.URL.Query()\n userIDs := qs[\"userId\"]\n var users []models.User\n for _, userID := range userIDs {\n if user, err := account.GetUser(userID); err != nil {\n render.JSON(err.HttpCode, err)\n return\n } else {\n users = append(users, *user)\n }\n }\n render.JSON(http.StatusOK, users)\n}", "func (p *PostsController) GetUserPosts(limit, userId, profileId int, cursor string) ([]models.Post, bool) {\n\tvar posts []models.Post\n\n\tif limit > 50 {\n\t\tlimit = 50\n\t}\n\tlimit++\n\n\tif cursor != \"\" {\n\t\tp.db.Raw(`\n\t\t\tSELECT p.*,\n\t\t\t( SELECT \"value\" from \"likes\" \n\t\t\tWHERE \"user_id\" = ? and \"post_id\" = p.id) as \"StateValue\"\n\t\t\tFROM posts p\n\t\t\tWHERE user_id = ?\n\t\t\tAND p.created_at < ?\n\t\t\tORDER BY p.created_at DESC\n\t\t\tLIMIT ?\n\t\t`, userId, profileId, cursor, limit).Find(&posts)\n\t} else {\n\t\tp.db.Raw(`\n\t\t\tSELECT p.*,\n\t\t\t( SELECT \"value\" from \"likes\" \n\t\t\tWHERE \"user_id\" = ? and \"post_id\" = p.id) as \"StateValue\"\n\t\t\tFROM posts p\n\t\t\tWHERE user_id = ?\n\t\t\tORDER BY p.created_at DESC\n\t\t\tLIMIT ?\n\t\t`, userId, profileId, limit).Find(&posts)\n\t}\n\tif len(posts) == 0 {\n\t\treturn nil, false\n\t}\n\tif len(posts) == limit {\n\t\treturn posts[0 : limit-1], true\n\t}\n\n\treturn posts, false\n}", "func (dao *OrderDAOIMpl) getOrdersByUserID(userID int) ([]model.UserOrder, error) {\n\tvar orders []model.Order\n\tvar userOrders []model.UserOrder\n\tif err := connection.GetConnection().DB.Find(&orders).Where(\"user_id=?\", userID).Error; err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, value := range orders {\n\t\tlog.Println(value)\n\t\tif productID, err := dao.productOrderDAO.GetProductIDByOrderID(value.ID); err == nil {\n\t\t\tuserOrders = append(userOrders, model.UserOrder{\n\t\t\t\tProductID: productID,\n\t\t\t\tAmmount: value.Amount,\n\t\t\t\tDate: value.Date,\n\t\t\t})\n\t\t} else {\n\t\t\tlog.Println(\"Error when we try to get productID by order ID!\")\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn userOrders, nil\n}", "func GetUsers(c *gin.Context) {\n\trequestID := c.GetString(\"x-request-id\")\n\thelper.Logger(requestID, \"\").Infoln(\"RequestID= \", requestID)\n\t// cacheTest := helper.CacheExists(\"xxxxxxxxxx\")\n\t// helper.Logger(requestID, \"\").Infoln(\"cacheTest= \", cacheTest)\n\n\thttpCode, body, erro := helper.MakeHTTPRequest(\"GET\", \"https://api-101.glitch.me/customers\", \"\", nil, true)\n\thelper.Logger(requestID, \"\").Infoln(\"httpCode= \", httpCode)\n\thelper.Logger(requestID, \"\").Infoln(\"body= \", fmt.Sprintf(\"%s\", body))\n\thelper.Logger(requestID, \"\").Infoln(\"error= \", erro)\n\n\tvar user []models.User\n\terr := models.GetAllUsers(&user)\n\tif err != nil {\n\t\tc.AbortWithStatus(http.StatusNotFound)\n\t} else {\n\t\tc.JSON(http.StatusOK, user)\n\t}\n}", "func returnUsersAccounts(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tvar users []User\n\tvar orders []Orders\n\t//fmt.Println(\"Request URI: \", path.Base(r.RequestURI))\n\tusername := path.Base(r.RequestURI)\n\n\t// query for userid\n\tresults, err := db.Query(\"Select * from users where username = ?\", username)\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\n\tfor results.Next() {\n\t\tvar user User\n\t\terr := results.Scan(&user.ID, &user.Username)\n\t\tif err != nil {\n\t\t\tpanic(err.Error())\n\t\t}\n\n\t\tusers = append(users, user)\n\t\tfmt.Println(\"Userid: \", users[0].ID)\n\t}\n\n\t// query the orders table with userid and return all rows\n\n\t//select orders.id, users.username, stocks.symbol, shares from orders inner join users on orders.user_id = users.id inner join stocks on orders.stock_id = stocks.id\n\tresults, err = db.Query(\"select orders.id, users.username, stocks.symbol, shares from orders inner join users on orders.user_id = users.id inner join stocks on orders.stock_id = stocks.id where orders.user_id = ?\", users[0].ID)\n\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\n\tfor results.Next() {\n\t\tvar order Orders\n\t\terr = results.Scan(&order.ID, &order.Username, &order.Symbol, &order.Shares)\n\t\tif err != nil {\n\t\t\tpanic(err.Error())\n\t\t}\n\t\torders = append(orders, order)\n\t}\n\tjson.NewEncoder(w).Encode(orders)\n}", "func (svc *svc) ListOrders(ctx context.Context, query model.OrderQuery) ([]model.Order, int64, error) {\n\torders, err := svc.repo.ListOrders(ctx, query)\n\tif err != nil {\n\t\treturn nil, 0, err\n\t}\n\n\ttotal, err := svc.repo.CountOrders(ctx, query)\n\tif err != nil {\n\t\treturn nil, 0, err\n\t}\n\n\treturn orders, total, nil\n}", "func GetCourierOrders(c buffalo.Context) error {\n\tcourier, err := GetCourierByUserID(c.Param(\"user_id\"), c)\n\tif err != nil {\n\t\treturn errors.WithStack(errors.New(\"could not find courier\"))\n\t}\n\ttx := c.Value(\"tx\").(*pop.Connection)\n\torders := &models.Orders{}\n\n\tif err := tx.Eager().Where(\"courier_id = ?\", courier.ID).All(orders); err != nil {\n\t\treturn c.Error(http.StatusInternalServerError, err)\n\t}\n\treturn c.Render(http.StatusOK, r.JSON(orders))\n}", "func (context Context) GetUsers(status string) (result []types.User, err error) {\n\n\tresult = []types.User{}\n\tnextCursor := \"\"\n\n\tfor {\n\n\t\tquery := map[string]string{}\n\t\tif nextCursor != \"\" {\n\t\t\tquery[\"cursor\"] = nextCursor\n\t\t}\n\t\tif status != \"\" {\n\t\t\tquery[\"status\"] = status\n\t\t}\n\t\tresp, err := context.sendAPIGetRequest(\"users\", query)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\ttype getUsersResponse struct {\n\t\t\tData []types.User `json:\"data\"`\n\t\t\tMetadata types.CollectionMetadata `json:\"metadata\"`\n\t\t\tLinks map[string]string `json:\"links\"`\n\t\t}\n\t\trespObject := getUsersResponse{}\n\t\terr = json.NewDecoder(resp.Body).Decode(&respObject)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"JSON decode error\")\n\t\t}\n\t\tnextCursor = respObject.Metadata.NextPageCursor\n\t\tresult = append(result, respObject.Data...)\n\n\t\tif nextCursor == \"\" || len(respObject.Data) == 0 {\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn result, nil\n}", "func getUsersHandler(c *gin.Context) {\n\tuser, _ := c.Get(JwtIdentityKey)\n\n\t// Role check.\n\tif !isAdmin(user) {\n\t\tc.JSON(http.StatusUnauthorized, gin.H{\"message\": \"unauthorized\"})\n\t\treturn\n\t}\n\n\tpage := c.DefaultQuery(\"page\", \"1\")\n\tcount := c.DefaultQuery(\"count\", \"10\")\n\tpageInt, _ := strconv.Atoi(page)\n\tcountInt, _ := strconv.Atoi(count)\n\n\tif page == \"0\" {\n\t\tpageInt = 1\n\t}\n\n\tvar wg sync.WaitGroup\n\tvar users *[]types.User\n\tvar usersCount int\n\n\tdb := data.New()\n\twg.Add(1)\n\tgo func() {\n\t\tusers = db.Users.GetUsers((pageInt-1)*countInt, countInt)\n\t\twg.Done()\n\t}()\n\n\twg.Add(1)\n\tgo func() {\n\t\tusersCount = db.Users.GetUsersCount()\n\t\twg.Done()\n\t}()\n\twg.Wait()\n\n\tc.JSON(http.StatusOK, gin.H{\n\t\t\"code\": http.StatusOK,\n\t\t\"users\": users,\n\t\t\"count\": usersCount,\n\t})\n}", "func (q *QueryResolver) ListOrders(\n\tctx context.Context,\n\tcursor *int,\n\tlimit *int,\n\tfilter *string,\n) (*models.OrderListWithCursor, error) {\n\tc := resolverutils.GetCursor(cursor)\n\tl := resolverutils.GetLimit(limit)\n\tf := resolverutils.GetFilter(filter)\n\tlist, err := q.GetOrderClient(registry.ORDER).\n\t\tListOrders(ctx, &pb.ListParameters{Cursor: c, Limit: l, Filter: f})\n\tif err != nil {\n\t\terrorutils.AddGQLError(ctx, err)\n\t\tq.Logger.Error(err)\n\t\treturn nil, err\n\t}\n\torders := []*pb.Order{}\n\tfor _, n := range list.Data {\n\t\titem := &pb.Order{\n\t\t\tData: &pb.Order_Data{\n\t\t\t\tType: n.Type,\n\t\t\t\tId: n.Id,\n\t\t\t\tAttributes: n.Attributes,\n\t\t\t},\n\t\t}\n\t\torders = append(orders, item)\n\t}\n\tlm := int(l)\n\treturn &models.OrderListWithCursor{\n\t\tOrders: orders,\n\t\tNextCursor: int(list.Meta.NextCursor),\n\t\tPreviousCursor: int(c),\n\t\tLimit: &lm,\n\t\tTotalCount: len(orders),\n\t}, nil\n}", "func (p *Poloniex) GetLoanOrders(ctx context.Context, currency string) (LoanOrders, error) {\n\tresp := LoanOrders{}\n\tpath := fmt.Sprintf(\"/public?command=returnLoanOrders&currency=%s\", currency)\n\n\treturn resp, p.SendHTTPRequest(ctx, exchange.RestSpot, path, &resp)\n}", "func GetUsersPage(resp http.ResponseWriter, req *http.Request) {\n\tpage := request.MapPage(mux.Vars(req))\n\tstart := page.GetPage() * page.GetSize()\n\tend := start + page.GetSize()\n\n\tif end > len(users) {\n\t\tend = len(users)\n\t}\n\n\tvar content []interface{}\n\tif page.GetSize() > 0 && start < len(users) {\n\t\tcontent = append(content, users[start:end])\n\t}\n\n\tresult := response.BuildPage(&content, page, int64(len(users)))\n\n\tresponse.WriteJSON(http.StatusOK, result, resp)\n}", "func GetUsers(c *gin.Context) {\n\tvar users []models.User\n\tpagination := models.GeneratePaginationFromRequest(c)\n\terr := repository.GetAllUsersPaged(&users, &pagination)\n\tif err != nil {\n\t\tc.AbortWithStatus(http.StatusNotFound)\n\t} else {\n\t\tc.JSON(http.StatusOK, users)\n\t}\n}", "func GetUsers() {\n\tvar users []User\n\t_, err := orm.NewOrm().QueryTable(\"t_user\").Filter(\"name__contains\", \"awd\").All(&users)\n\tif err == nil {\n\t\tfor _, user := range users {\n\t\t\tfmt.Println(user.ToString())\n\t\t}\n\t}\n}", "func (s *OrderService) GetByUserAddress(a, bt, qt common.Address, from, to int64, limit ...int) ([]*types.Order, error) {\n\treturn s.orderDao.GetByUserAddress(a, bt, qt, from, to, limit...)\n}", "func (a *Client) BatchRetrieveOrders(params *BatchRetrieveOrdersParams, authInfo runtime.ClientAuthInfoWriter, opts ...ClientOption) (*BatchRetrieveOrdersOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewBatchRetrieveOrdersParams()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"BatchRetrieveOrders\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/v2/orders/batch-retrieve\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &BatchRetrieveOrdersReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*BatchRetrieveOrdersOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for BatchRetrieveOrders: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "func GetAll() echo.HandlerFunc {\n\treturn func(context echo.Context) error {\n\t\toffsetParam, offsetErr := strconv.Atoi(context.QueryParam(\"offset\"))\n\t\tif offsetErr != nil {\n\t\t\toffsetParam = 0\n\t\t}\n\t\tlimitParam, limitErr := strconv.Atoi(context.QueryParam(\"limit\"))\n\t\tif limitErr != nil {\n\t\t\tlimitParam = 0\n\t\t}\n\t\tvar users []User\n\t\tvar totalCount int\n\t\tvar err error\n\t\tcriteria, order := getSortingParams(context)\n\n\t\tusers, totalCount, err = FindAll(criteria, order, offsetParam, limitParam)\n\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t\treturn context.JSON(http.StatusInternalServerError, errors.New(\"User list retrieval error\"))\n\t\t}\n\t\tformattedUsers := make([]formattedUser, len(users))\n\t\tfor i := range users {\n\t\t\tformattedUsers[i] = formatUser(&users[i])\n\t\t\ti++\n\t\t}\n\t\tcontentType := context.Request().Header().Get(\"Accept\")\n\t\tif contentType != \"\" && len(contentType) >= len(echo.MIMEApplicationJSON) && contentType[:len(echo.MIMEApplicationJSON)] == echo.MIMEApplicationJSON {\n\t\t\tcontext.Response().Header().Set(\"X-TOTAL-COUNT\", strconv.Itoa(totalCount))\n\t\t\treturn context.JSON(http.StatusOK, formattedUsers)\n\t\t}\n\t\tfilepath, err := createCsvFile(formattedUsers)\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Cannot create User list file: %v\", err)\n\t\t\treturn context.JSON(http.StatusInternalServerError, fmt.Errorf(\"Cannot open file: %v\", err))\n\t\t}\n\t\treturn context.File(filepath)\n\t}\n}", "func GetUserWallets(uc *mw.IcopContext, c *gin.Context) {\n\tuserID := mw.GetAuthUser(c).UserID\n\treq := &pb.GetWalletsRequest{\n\t\tBase: NewBaseRequest(uc),\n\t\tUserId: userID,\n\t}\n\twallets, err := dbClient.GetUserWallets(c, req)\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, cerr.LogAndReturnError(uc.Log, err, \"Error reading wallets\", cerr.GeneralError))\n\t\treturn\n\t}\n\n\tws := make([]GetUserWalletsResponse, len(wallets.Wallets))\n\tfor i, w := range wallets.Wallets {\n\t\tfederationAddress := \"\"\n\t\tif w.FriendlyId != \"\" && w.Domain != \"\" {\n\t\t\tfederationAddress = w.FriendlyId + \"*\" + w.Domain\n\t\t}\n\t\tws[i] = GetUserWalletsResponse{\n\t\t\tID: w.Id,\n\t\t\tPublicKey0: w.PublicKey_0,\n\t\t\tWalletName: w.WalletName,\n\t\t\tFederationAddress: federationAddress,\n\t\t\tShowOnHomescreen: w.ShowOnHomescreen,\n\t\t}\n\t}\n\n\tc.JSON(http.StatusOK, ws)\n}", "func (c *Client) GetUsers(queryParams ...string) (map[string]interface{}, error) {\n\tlog.info(\"========== GET CLIENT USERS ==========\")\n\turl := buildURL(path[\"users\"])\n\n\treturn c.do(\"GET\", url, \"\", queryParams)\n}" ]
[ "0.64790285", "0.60525525", "0.5916686", "0.59054846", "0.5729368", "0.5729098", "0.5621597", "0.55264294", "0.54783624", "0.54391855", "0.5343373", "0.5285358", "0.5271198", "0.52530855", "0.52495444", "0.52429914", "0.52391744", "0.5197829", "0.5187002", "0.5164428", "0.5163491", "0.51447904", "0.5138289", "0.5062454", "0.5056705", "0.5046918", "0.5019194", "0.50145257", "0.5004511", "0.4964741", "0.4964676", "0.49591362", "0.49402168", "0.4931678", "0.4930193", "0.49238297", "0.49204972", "0.49099392", "0.49080494", "0.49007282", "0.48942178", "0.48923504", "0.4891102", "0.48847926", "0.48822248", "0.48603725", "0.4833815", "0.48309118", "0.47983435", "0.47917485", "0.47848508", "0.4776909", "0.4759747", "0.47487825", "0.47402593", "0.47384202", "0.47338015", "0.47243994", "0.47205552", "0.47183463", "0.47097245", "0.4709001", "0.46989197", "0.46884018", "0.466107", "0.4642765", "0.46416414", "0.46308237", "0.46260676", "0.46205708", "0.46154016", "0.46047708", "0.45711672", "0.45697278", "0.4569112", "0.45538166", "0.45483026", "0.45442602", "0.45367053", "0.45331717", "0.45324615", "0.45043257", "0.4499108", "0.44929576", "0.4486352", "0.44702217", "0.4461968", "0.4461147", "0.44600123", "0.44598782", "0.4451667", "0.44363445", "0.44273955", "0.44256863", "0.44205967", "0.44152778", "0.44089532", "0.44068155", "0.43995774", "0.439466" ]
0.7990207
0
ConvertJobToDMOJob converts a native job object to dmo job.
func ConvertJobToDMOJob(job metav1.Object, kind string, specs map[v1.ReplicaType]*v1.ReplicaSpec, jobStatus *v1.JobStatus, region string) (*dmo.Job, error) { klog.V(5).Infof("[ConvertJobToDMOJob] kind: %s, job: %s/%s", kind, job.GetNamespace(), job.GetName()) dmoJob := dmo.Job{ Name: job.GetName(), Namespace: job.GetNamespace(), JobID: string(job.GetUID()), Version: job.GetResourceVersion(), Kind: kind, Resources: "", GmtCreated: job.GetCreationTimestamp().Time, } if region != "" { dmoJob.DeployRegion = &region } if tn, err := tenancy.GetTenancy(job); err == nil && tn != nil { dmoJob.Tenant = &tn.Tenant dmoJob.Owner = &tn.User if dmoJob.DeployRegion == nil && tn.Region != "" { dmoJob.DeployRegion = &tn.Region } } else { dmoJob.Tenant = pointer.StringPtr("") dmoJob.Owner = pointer.StringPtr("") } dmoJob.Status = v1.JobCreated if condLen := len(jobStatus.Conditions); condLen > 0 { dmoJob.Status = jobStatus.Conditions[condLen-1].Type } if runningCond := util.GetCondition(*jobStatus, v1.JobRunning); runningCond != nil { dmoJob.GmtJobRunning = &runningCond.LastTransitionTime.Time } if finishTime := jobStatus.CompletionTime; finishTime != nil { dmoJob.GmtJobFinished = &finishTime.Time } dmoJob.Deleted = util.IntPtr(0) dmoJob.IsInEtcd = util.IntPtr(1) resources := computeJobResources(specs) resourcesBytes, err := json.Marshal(&resources) if err != nil { return nil, err } dmoJob.Resources = string(resourcesBytes) return &dmoJob, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (d *JobDoc) ToJob() *jobs.Job {\n\treturn &jobs.Job{\n\t\tID: d.ID,\n\t\tName: d.Name,\n\t\tCreatedAt: d.CreatedAt,\n\t\tUpdatedAt: d.UpdatedAt,\n\t}\n}", "func GetJobFromRadixJob(job *v1.RadixJob, jobDeployments []*deploymentModels.DeploymentSummary) *Job {\n\tsteps := GetJobStepsFromRadixJob(job)\n\n\tcreated := radixutils.FormatTime(&job.CreationTimestamp)\n\tif job.Status.Created != nil {\n\t\t// Use this instead, because in a migration this may be more correct\n\t\t// as migrated jobs will have the same creation timestamp in the new cluster\n\t\tcreated = radixutils.FormatTime(job.Status.Created)\n\t}\n\n\tvar jobComponents []*deploymentModels.ComponentSummary\n\tif len(jobDeployments) > 0 {\n\t\tjobComponents = jobDeployments[0].Components\n\t}\n\n\tjobModel := Job{\n\t\tName: job.GetName(),\n\t\tBranch: job.Spec.Build.Branch,\n\t\tCommitID: job.Spec.Build.CommitID,\n\t\tCreated: created,\n\t\tStarted: radixutils.FormatTime(job.Status.Started),\n\t\tEnded: radixutils.FormatTime(job.Status.Ended),\n\t\tStatus: GetStatusFromRadixJobStatus(job.Status, job.Spec.Stop),\n\t\tPipeline: string(job.Spec.PipeLineType),\n\t\tSteps: steps,\n\t\tDeployments: jobDeployments,\n\t\tComponents: jobComponents,\n\t\tTriggeredBy: job.Spec.TriggeredBy,\n\t}\n\tif job.Spec.PipeLineType == v1.Promote {\n\t\tjobModel.PromotedFromEnvironment = job.Spec.Promote.FromEnvironment\n\t\tjobModel.PromotedToEnvironment = job.Spec.Promote.ToEnvironment\n\t\tjobModel.PromotedDeploymentName = job.Spec.Promote.DeploymentName\n\t}\n\n\treturn &jobModel\n}", "func (j *RawJob) toJob() (Job, error) {\n\tjob, jobInput, err := j.decodeSerializedFields()\n\tif err != nil {\n\t\treturn Job{}, err\n\t}\n\tresult := Job{\n\t\tID: j.ID,\n\t\tGroupID: j.GroupID,\n\t\tSuperGroupID: j.SuperGroupID,\n\t\tcronID: j.CronID,\n\t\tCronExpression: j.CronExpression,\n\t\tpaused: j.Paused,\n\t\tcreatedAt: j.CreatedAt,\n\t\tupdatedAt: j.UpdatedAt,\n\t\tJob: job,\n\t\tJobInput: jobInput.OtherInputs,\n\t}\n\treturn result, nil\n}", "func DlpJobTriggerInspectJobToProto(o *dlp.JobTriggerInspectJob) *dlppb.DlpJobTriggerInspectJob {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &dlppb.DlpJobTriggerInspectJob{}\n\tp.SetStorageConfig(DlpJobTriggerInspectJobStorageConfigToProto(o.StorageConfig))\n\tp.SetInspectConfig(DlpJobTriggerInspectJobInspectConfigToProto(o.InspectConfig))\n\tp.SetInspectTemplateName(dcl.ValueOrEmptyString(o.InspectTemplateName))\n\tsActions := make([]*dlppb.DlpJobTriggerInspectJobActions, len(o.Actions))\n\tfor i, r := range o.Actions {\n\t\tsActions[i] = DlpJobTriggerInspectJobActionsToProto(&r)\n\t}\n\tp.SetActions(sActions)\n\treturn p\n}", "func toProtoJob(e *ent.Job) (*Job, error) {\n\tv := &Job{}\n\tbenefits := e.Benefits\n\tv.Benefits = benefits\n\tcreatedat := timestamppb.New(e.CreatedAt)\n\tv.CreatedAt = createdat\n\temploymenttype := toProtoJob_EmploymentType(e.EmploymentType)\n\tv.EmploymentType = employmenttype\n\tid := int32(e.ID)\n\tv.Id = id\n\tmaxsalary := e.MaxSalary\n\tv.MaxSalary = maxsalary\n\tminsalary := e.MinSalary\n\tv.MinSalary = minsalary\n\trequirements := e.Requirements\n\tv.Requirements = requirements\n\tresponsibilities := e.Responsibilities\n\tv.Responsibilities = responsibilities\n\tsalaryunit := toProtoJob_SalaryUnit(e.SalaryUnit)\n\tv.SalaryUnit = salaryunit\n\ttitle := e.Title\n\tv.Title = title\n\tupdatedat := timestamppb.New(e.UpdatedAt)\n\tv.UpdatedAt = updatedat\n\tif edg := e.Edges.Owner; edg != nil {\n\t\tid := int32(edg.ID)\n\t\tv.Owner = &User{\n\t\t\tId: id,\n\t\t}\n\t}\n\tfor _, edg := range e.Edges.Skills {\n\t\tid := int32(edg.ID)\n\t\tv.Skills = append(v.Skills, &Skill{\n\t\t\tId: id,\n\t\t})\n\t}\n\treturn v, nil\n}", "func copyJobToHookJob(src common.Job) (dst HookJob) {\n\tdst.ID = src.UUID\n\tdst.Name = src.Name\n\tdst.Status = src.Status\n\tdst.Owner = src.Owner\n\tdst.StartTime = src.StartTime\n\tdst.CrackedHashes = src.CrackedHashes\n\tdst.TotalHashes = src.TotalHashes\n\tdst.Progress = src.Progress\n\tdst.Params = src.Parameters\n\tdst.ToolID = src.ToolUUID\n\tdst.PerformanceTitle = src.PerformanceTitle\n\tdst.PerformanceData = src.PerformanceData\n\tdst.OutputTitles = src.OutputTitles\n\tdst.OutputData = src.OutputData\n\n\treturn dst\n}", "func newJobJob(dbJob *models.Job) (j *JobJob, err error) {\n\tj = &JobJob{Job: NewJob(dbJob)}\n\tj.TargetJob, err = models.FindJob(dbJob.ObjectID)\n\tif err != nil {\n\t\treturn j, err\n\t}\n\tif j.TargetJob == nil {\n\t\treturn j, fmt.Errorf(\"job id %d does not exist\", dbJob.ObjectID)\n\t}\n\treturn j, err\n}", "func DeSerializeJob(jobBytes []byte) (*work.Job, error) {\n\tvar j work.Job\n\terr := json.Unmarshal(jobBytes, &j)\n\n\treturn &j, err\n}", "func UnmarshalJob(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(Job)\n\terr = core.UnmarshalPrimitive(m, \"command_object\", &obj.CommandObject)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_object_id\", &obj.CommandObjectID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_name\", &obj.CommandName)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_parameter\", &obj.CommandParameter)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_options\", &obj.CommandOptions)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"inputs\", &obj.Inputs, UnmarshalVariableData)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"settings\", &obj.Settings, UnmarshalVariableData)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"tags\", &obj.Tags)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"id\", &obj.ID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"name\", &obj.Name)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"description\", &obj.Description)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"location\", &obj.Location)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"resource_group\", &obj.ResourceGroup)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"submitted_at\", &obj.SubmittedAt)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"submitted_by\", &obj.SubmittedBy)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"start_at\", &obj.StartAt)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"end_at\", &obj.EndAt)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"duration\", &obj.Duration)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"status\", &obj.Status, UnmarshalJobStatus)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"data\", &obj.Data, UnmarshalJobData)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"targets_ini\", &obj.TargetsIni)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"bastion\", &obj.Bastion, UnmarshalTargetResourceset)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"log_summary\", &obj.LogSummary, UnmarshalJobLogSummary)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"log_store_url\", &obj.LogStoreURL)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"state_store_url\", &obj.StateStoreURL)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"results_url\", &obj.ResultsURL)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"updated_at\", &obj.UpdatedAt)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func (d *defaultJobRepository) GetJob(ctxIn context.Context, jobID string) (*Job, error) {\n _, span := trace.StartSpan(ctxIn, \"(*defaultJobRepository).GetJob\")\n defer span.End()\n\n job := &Job{ID: jobID}\n err := d.storageService.DB().\n Model(job).\n Where(\"id = ?\", jobID).\n Where(\"audit_deleted_timestamp is null\").\n Select()\n\n if err == pg.ErrNoRows {\n return nil, nil\n } else if err != nil {\n return nil, fmt.Errorf(\"get job with id %s failed: %s\", jobID, err)\n }\n\n return job, err\n}", "func copyJobToHookQueueJob(src common.Job) (dst HookQueueOrderJobData) {\n\tdst.ID = src.UUID\n\tdst.Name = src.Name\n\tdst.Status = src.Status\n\tdst.Owner = src.Owner\n\tdst.StartTime = src.StartTime\n\tdst.CrackedHashes = src.CrackedHashes\n\tdst.TotalHashes = src.TotalHashes\n\tdst.Progress = src.Progress\n\n\treturn dst\n}", "func (e *Exporter) createJobObject() error {\n\tvar err error\n\te.jobObject, err = windows.CreateJobObject(nil, nil)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to create job object: %v\", err)\n\t}\n\n\tjobInfo := windows.JOBOBJECT_EXTENDED_LIMIT_INFORMATION{\n\t\tBasicLimitInformation: windows.JOBOBJECT_BASIC_LIMIT_INFORMATION{\n\t\t\tLimitFlags: windows.JOB_OBJECT_LIMIT_KILL_ON_JOB_CLOSE,\n\t\t},\n\t}\n\t_, err = windows.SetInformationJobObject(\n\t\te.jobObject,\n\t\twindows.JobObjectExtendedLimitInformation,\n\t\tuintptr(unsafe.Pointer(&jobInfo)),\n\t\tuint32(unsafe.Sizeof(jobInfo)),\n\t)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to set job object info:%v\", err)\n\t}\n\n\terr = windows.AssignProcessToJobObject(e.jobObject, (*process)(unsafe.Pointer(e.cmd.Process)).handle)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to assign process to job object:%v\", err)\n\t}\n\n\treturn nil\n}", "func NewJob(object dbus.BusObject) *Job {\n\treturn &Job{object}\n}", "func ProtoToJobTrigger(p *dlppb.DlpJobTrigger) *dlp.JobTrigger {\n\tobj := &dlp.JobTrigger{\n\t\tName: dcl.StringOrNil(p.GetName()),\n\t\tDisplayName: dcl.StringOrNil(p.GetDisplayName()),\n\t\tDescription: dcl.StringOrNil(p.GetDescription()),\n\t\tInspectJob: ProtoToDlpJobTriggerInspectJob(p.GetInspectJob()),\n\t\tCreateTime: dcl.StringOrNil(p.GetCreateTime()),\n\t\tUpdateTime: dcl.StringOrNil(p.GetUpdateTime()),\n\t\tLastRunTime: dcl.StringOrNil(p.GetLastRunTime()),\n\t\tStatus: ProtoToDlpJobTriggerStatusEnum(p.GetStatus()),\n\t\tLocationId: dcl.StringOrNil(p.GetLocationId()),\n\t\tParent: dcl.StringOrNil(p.GetParent()),\n\t\tLocation: dcl.StringOrNil(p.GetLocation()),\n\t}\n\tfor _, r := range p.GetTriggers() {\n\t\tobj.Triggers = append(obj.Triggers, *ProtoToDlpJobTriggerTriggers(r))\n\t}\n\tfor _, r := range p.GetErrors() {\n\t\tobj.Errors = append(obj.Errors, *ProtoToDlpJobTriggerErrors(r))\n\t}\n\treturn obj\n}", "func ProtoToDlpJobTriggerInspectJob(p *dlppb.DlpJobTriggerInspectJob) *dlp.JobTriggerInspectJob {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &dlp.JobTriggerInspectJob{\n\t\tStorageConfig: ProtoToDlpJobTriggerInspectJobStorageConfig(p.GetStorageConfig()),\n\t\tInspectConfig: ProtoToDlpJobTriggerInspectJobInspectConfig(p.GetInspectConfig()),\n\t\tInspectTemplateName: dcl.StringOrNil(p.GetInspectTemplateName()),\n\t}\n\tfor _, r := range p.GetActions() {\n\t\tobj.Actions = append(obj.Actions, *ProtoToDlpJobTriggerInspectJobActions(r))\n\t}\n\treturn obj\n}", "func GetJob(ctx context.Context, p string) (j *Job, err error) {\n\tt := utils.FromTaskContext(ctx)\n\n\tj = &Job{}\n\n\tcontent, err := contexts.DB.Get(constants.FormatJobKey(t, p), nil)\n\tif err == leveldb.ErrNotFound {\n\t\treturn nil, nil\n\t}\n\tif err != nil {\n\t\treturn\n\t}\n\n\terr = msgpack.Unmarshal(content, j)\n\tif err != nil {\n\t\tlogrus.Panicf(\"Msgpack unmarshal failed for %v.\", err)\n\t}\n\treturn\n}", "func (e *DDLEvent) FromJob(job *model.Job) {\n\tvar tableName string\n\tif job.BinlogInfo.TableInfo != nil {\n\t\ttableName = job.BinlogInfo.TableInfo.Name.O\n\t}\n\te.StartTs = job.StartTS\n\te.CommitTs = job.BinlogInfo.FinishedTS\n\te.Query = job.Query\n\te.Schema = job.SchemaName\n\te.Table = tableName\n\te.Type = job.Type\n}", "func Open(ctx context.Context, options *Options) (_ *JobObject, err error) {\n\tif options == nil || (options != nil && options.Name == \"\") {\n\t\treturn nil, errors.New(\"no job object name specified to open\")\n\t}\n\n\tunicodeJobName, err := winapi.NewUnicodeString(options.Name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar jobHandle windows.Handle\n\tif options != nil && options.UseNTVariant {\n\t\toa := winapi.ObjectAttributes{\n\t\t\tLength: unsafe.Sizeof(winapi.ObjectAttributes{}),\n\t\t\tObjectName: unicodeJobName,\n\t\t\tAttributes: 0,\n\t\t}\n\t\tstatus := winapi.NtOpenJobObject(&jobHandle, winapi.JOB_OBJECT_ALL_ACCESS, &oa)\n\t\tif status != 0 {\n\t\t\treturn nil, winapi.RtlNtStatusToDosError(status)\n\t\t}\n\t} else {\n\t\tjobHandle, err = winapi.OpenJobObject(winapi.JOB_OBJECT_ALL_ACCESS, false, unicodeJobName.Buffer)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tdefer func() {\n\t\tif err != nil {\n\t\t\twindows.Close(jobHandle)\n\t\t}\n\t}()\n\n\tjob := &JobObject{\n\t\thandle: jobHandle,\n\t}\n\n\t// If the IOCP we'll be using to receive messages for all jobs hasn't been\n\t// created, create it and start polling.\n\tif options != nil && options.Notifications {\n\t\tmq, err := setupNotifications(ctx, job)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tjob.mq = mq\n\t}\n\n\treturn job, nil\n}", "func CronJobObjectWrapper(create CronJobCreator) ObjectCreator {\n\treturn func(existing runtime.Object) (runtime.Object, error) {\n\t\tif existing != nil {\n\t\t\treturn create(existing.(*batchv1beta1.CronJob))\n\t\t}\n\t\treturn create(&batchv1beta1.CronJob{})\n\t}\n}", "func UnmarshalJobLite(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(JobLite)\n\terr = core.UnmarshalPrimitive(m, \"id\", &obj.ID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"name\", &obj.Name)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"description\", &obj.Description)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_object\", &obj.CommandObject)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_object_id\", &obj.CommandObjectID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_name\", &obj.CommandName)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"tags\", &obj.Tags)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"location\", &obj.Location)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"resource_group\", &obj.ResourceGroup)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"targets_ini\", &obj.TargetsIni)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"submitted_at\", &obj.SubmittedAt)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"submitted_by\", &obj.SubmittedBy)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"duration\", &obj.Duration)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"start_at\", &obj.StartAt)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"end_at\", &obj.EndAt)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"status\", &obj.Status, UnmarshalJobStatus)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"log_summary\", &obj.LogSummary, UnmarshalJobLogSummary)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"updated_at\", &obj.UpdatedAt)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func GetMessageForJob(agentID uuid.UUID, job Job) (messages.Base, error) {\n\tm := messages.Base{\n\t\tVersion: 1.0,\n\t\tID: agentID,\n\t}\n\tif !isAgent(agentID) {\n\t\treturn m, fmt.Errorf(\"%s is not a valid agent\", agentID.String())\n\t}\n\tm.Padding = core.RandStringBytesMaskImprSrc(Agents[agentID].PaddingMax)\n\tswitch job.Type {\n\tcase \"cmd\":\n\t\tm.Type = \"CmdPayload\"\n\t\tp := messages.CmdPayload{\n\t\t\tCommand: job.Args[0],\n\t\t\tJob: job.ID,\n\t\t}\n\t\tif len(job.Args) > 1 {\n\t\t\tp.Args = strings.Join(job.Args[1:], \" \")\n\t\t}\n\t\tm.Payload = p\n\tcase \"shellcode\":\n\t\tm.Type = \"Shellcode\"\n\t\tp := messages.Shellcode{\n\t\t\tMethod: job.Args[0],\n\t\t\tJob: job.ID,\n\t\t}\n\n\t\tif p.Method == \"self\" {\n\t\t\tp.Bytes = job.Args[1]\n\t\t} else if p.Method == \"remote\" || p.Method == \"rtlcreateuserthread\" || p.Method == \"userapc\" {\n\t\t\ti, err := strconv.Atoi(job.Args[1])\n\t\t\tif err != nil {\n\t\t\t\treturn m, err\n\t\t\t}\n\t\t\tp.PID = uint32(i)\n\t\t\tp.Bytes = job.Args[2]\n\t\t}\n\t\tm.Payload = p\n\tcase \"download\":\n\t\tm.Type = \"FileTransfer\"\n\t\tLog(agentID, fmt.Sprintf(\"Downloading file from agent at %s\\n\", job.Args[0]))\n\n\t\tp := messages.FileTransfer{\n\t\t\tFileLocation: job.Args[0],\n\t\t\tJob: job.ID,\n\t\t\tIsDownload: false,\n\t\t}\n\t\tm.Payload = p\n\tcase \"initialize\":\n\t\tm.Type = \"AgentControl\"\n\t\tp := messages.AgentControl{\n\t\t\tCommand: job.Type,\n\t\t\tJob: job.ID,\n\t\t}\n\t\tm.Payload = p\n\tcase \"kill\":\n\t\tm.Type = \"AgentControl\"\n\t\tp := messages.AgentControl{\n\t\t\tCommand: job.Args[0],\n\t\t\tJob: job.ID,\n\t\t}\n\t\tm.Payload = p\n\tcase \"ls\":\n\t\tm.Type = \"NativeCmd\"\n\t\tp := messages.NativeCmd{\n\t\t\tJob: job.ID,\n\t\t\tCommand: job.Args[0],\n\t\t}\n\n\t\tif len(job.Args) > 1 {\n\t\t\tp.Args = job.Args[1]\n\t\t} else {\n\t\t\tp.Args = \"./\"\n\t\t}\n\t\tm.Payload = p\n\tcase \"killdate\":\n\t\tm.Type = \"AgentControl\"\n\t\tp := messages.AgentControl{\n\t\t\tCommand: job.Args[0],\n\t\t\tJob: job.ID,\n\t\t}\n\t\tif len(job.Args) == 2 {\n\t\t\tp.Args = job.Args[1]\n\t\t}\n\t\tm.Payload = p\n\tcase \"cd\":\n\t\tm.Type = \"NativeCmd\"\n\t\tp := messages.NativeCmd{\n\t\t\tJob: job.ID,\n\t\t\tCommand: job.Args[0],\n\t\t\tArgs: strings.Join(job.Args[1:], \" \"),\n\t\t}\n\t\tm.Payload = p\n\tcase \"pwd\":\n\t\tm.Type = \"NativeCmd\"\n\t\tp := messages.NativeCmd{\n\t\t\tJob: job.ID,\n\t\t\tCommand: job.Args[0],\n\t\t\tArgs: \"\",\n\t\t}\n\t\tm.Payload = p\n\tcase \"maxretry\":\n\t\tm.Type = \"AgentControl\"\n\t\tp := messages.AgentControl{\n\t\t\tCommand: job.Args[0],\n\t\t\tJob: job.ID,\n\t\t}\n\n\t\tif len(job.Args) == 2 {\n\t\t\tp.Args = job.Args[1]\n\t\t}\n\t\tm.Payload = p\n\tcase \"padding\":\n\t\tm.Type = \"AgentControl\"\n\t\tp := messages.AgentControl{\n\t\t\tCommand: job.Args[0],\n\t\t\tJob: job.ID,\n\t\t}\n\n\t\tif len(job.Args) == 2 {\n\t\t\tp.Args = job.Args[1]\n\t\t}\n\t\tm.Payload = p\n\tcase \"skew\":\n\t\tm.Type = \"AgentControl\"\n\t\tp := messages.AgentControl{\n\t\t\tCommand: job.Args[0],\n\t\t\tJob: job.ID,\n\t\t}\n\n\t\tif len(job.Args) == 2 {\n\t\t\tp.Args = job.Args[1]\n\t\t}\n\t\tm.Payload = p\n\tcase \"sleep\":\n\t\tm.Type = \"AgentControl\"\n\t\tp := messages.AgentControl{\n\t\t\tCommand: job.Args[0],\n\t\t\tJob: job.ID,\n\t\t}\n\n\t\tif len(job.Args) == 2 {\n\t\t\tp.Args = job.Args[1]\n\t\t}\n\t\tm.Payload = p\n\tcase \"Minidump\":\n\t\tm.Type = \"Module\"\n\t\tp := messages.Module{\n\t\t\tCommand: job.Type,\n\t\t\tJob: job.ID,\n\t\t\tArgs: job.Args,\n\t\t}\n\t\tm.Payload = p\n\tcase \"upload\":\n\t\tm.Type = \"FileTransfer\"\n\t\t// TODO add error handling; check 2 args (src, dst)\n\t\tuploadFile, uploadFileErr := ioutil.ReadFile(job.Args[0])\n\t\tif uploadFileErr != nil {\n\t\t\t// TODO send \"ServerOK\"\n\t\t\treturn m, fmt.Errorf(\"there was an error reading %s: %v\", job.Type, uploadFileErr)\n\t\t}\n\t\tfileHash := sha256.New()\n\t\t_, err := io.WriteString(fileHash, string(uploadFile))\n\t\tif err != nil {\n\t\t\tmessage(\"warn\", fmt.Sprintf(\"There was an error generating file hash:\\r\\n%s\", err.Error()))\n\t\t}\n\t\tLog(agentID, fmt.Sprintf(\"Uploading file from server at %s of size %d bytes and SHA-256: %x to agent at %s\",\n\t\t\tjob.Args[0],\n\t\t\tlen(uploadFile),\n\t\t\tfileHash.Sum(nil),\n\t\t\tjob.Args[1]))\n\n\t\tp := messages.FileTransfer{\n\t\t\tFileLocation: job.Args[1],\n\t\t\tFileBlob: base64.StdEncoding.EncodeToString([]byte(uploadFile)),\n\t\t\tIsDownload: true, // The agent will be downloading the file provided by the server in the FileBlob field\n\t\t\tJob: job.ID,\n\t\t}\n\t\tm.Payload = p\n\tdefault:\n\t\tm.Type = \"ServerOk\"\n\t\treturn m, errors.New(\"invalid job type, sending ServerOK\")\n\t}\n\treturn m, nil\n}", "func MockJob() batchv1.Job {\n\tp := MockPod()\n\treturn batchv1.Job{\n\t\tSpec: batchv1.JobSpec{\n\t\t\tTemplate: corev1.PodTemplateSpec{Spec: p.Spec},\n\t\t},\n\t}\n}", "func SerializeJob(job *work.Job) ([]byte, error) {\n\treturn json.Marshal(job)\n}", "func Transform(job *batchv1.Job) *batchv1.Job {\n\treturn &batchv1.Job{\n\t\tObjectMeta: metadata.TransformObjectMeta(job.ObjectMeta),\n\t\tSpec: batchv1.JobSpec{\n\t\t\tCompletions: job.Spec.Completions,\n\t\t\tParallelism: job.Spec.Parallelism,\n\t\t},\n\t\tStatus: batchv1.JobStatus{\n\t\t\tActive: job.Status.Active,\n\t\t\tSucceeded: job.Status.Succeeded,\n\t\t\tFailed: job.Status.Failed,\n\t\t},\n\t}\n}", "func (w *Worker) handleJob(job *gotell.Job) {\n\tw.Logger.Printf(\"Handling job %v: %v - Created at %v\", job.ID, job.Data, job.Created)\n\n\t// Send our job as values to the handler.\n\terr := w.jobHandler(job.Clone())\n\n\tif err != nil {\n\t\tw.Logger.Printf(\"Error handling job ID %v: %v, retrying\", job.ID, err)\n\t\terr = w.retryStrategy(w.store, job, err)\n\t\tif err != nil {\n\t\t\tw.Logger.Println(\"Error retrying job\", job.ID, err)\n\t\t}\n\t\treturn\n\t}\n\tw.Logger.Println(\"Job completed\", job.ID)\n\n\terr = w.store.CompleteJob(job)\n\tif err != nil {\n\t\tw.Logger.Println(\"Error completing job\", job.ID, err)\n\t\t// TODO work out what to do when the job fails to complete.\n\t}\n}", "func (t *JobMessage) ToAPI() models.JobMessage {\n\treturn models.JobMessage{\n\t\tCreatedAt: *TimeToDateTime(&t.CreatedAt),\n\t\tMessage: t.Message,\n\t}\n}", "func createJobObject() (windows.Handle, error) {\n\tjob, err := windows.CreateJobObject(nil, nil)\n\tif err != nil {\n\t\treturn windows.InvalidHandle, err\n\t}\n\n\tinfo := windows.JOBOBJECT_EXTENDED_LIMIT_INFORMATION{\n\t\tBasicLimitInformation: windows.JOBOBJECT_BASIC_LIMIT_INFORMATION{\n\t\t\tLimitFlags: windows.JOB_OBJECT_LIMIT_KILL_ON_JOB_CLOSE,\n\t\t},\n\t}\n\tif _, err := windows.SetInformationJobObject(\n\t\tjob,\n\t\twindows.JobObjectExtendedLimitInformation,\n\t\tuintptr(unsafe.Pointer(&info)),\n\t\tuint32(unsafe.Sizeof(info))); err != nil {\n\t\treturn windows.InvalidHandle, err\n\t}\n\treturn job, nil\n}", "func Create(ctx context.Context, options *Options) (_ *JobObject, err error) {\n\tif options == nil {\n\t\toptions = &Options{}\n\t}\n\n\tvar jobName *winapi.UnicodeString\n\tif options.Name != \"\" {\n\t\tjobName, err = winapi.NewUnicodeString(options.Name)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tvar jobHandle windows.Handle\n\tif options.UseNTVariant {\n\t\toa := winapi.ObjectAttributes{\n\t\t\tLength: unsafe.Sizeof(winapi.ObjectAttributes{}),\n\t\t\tObjectName: jobName,\n\t\t\tAttributes: 0,\n\t\t}\n\t\tstatus := winapi.NtCreateJobObject(&jobHandle, winapi.JOB_OBJECT_ALL_ACCESS, &oa)\n\t\tif status != 0 {\n\t\t\treturn nil, winapi.RtlNtStatusToDosError(status)\n\t\t}\n\t} else {\n\t\tvar jobNameBuf *uint16\n\t\tif jobName != nil && jobName.Buffer != nil {\n\t\t\tjobNameBuf = jobName.Buffer\n\t\t}\n\t\tjobHandle, err = windows.CreateJobObject(nil, jobNameBuf)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tdefer func() {\n\t\tif err != nil {\n\t\t\twindows.Close(jobHandle)\n\t\t}\n\t}()\n\n\tjob := &JobObject{\n\t\thandle: jobHandle,\n\t}\n\n\t// If the IOCP we'll be using to receive messages for all jobs hasn't been\n\t// created, create it and start polling.\n\tif options.Notifications {\n\t\tmq, err := setupNotifications(ctx, job)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tjob.mq = mq\n\t}\n\n\tif options.EnableIOTracking {\n\t\tif err := enableIOTracking(jobHandle); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn job, nil\n}", "func JobTriggerToProto(resource *dlp.JobTrigger) *dlppb.DlpJobTrigger {\n\tp := &dlppb.DlpJobTrigger{}\n\tp.SetName(dcl.ValueOrEmptyString(resource.Name))\n\tp.SetDisplayName(dcl.ValueOrEmptyString(resource.DisplayName))\n\tp.SetDescription(dcl.ValueOrEmptyString(resource.Description))\n\tp.SetInspectJob(DlpJobTriggerInspectJobToProto(resource.InspectJob))\n\tp.SetCreateTime(dcl.ValueOrEmptyString(resource.CreateTime))\n\tp.SetUpdateTime(dcl.ValueOrEmptyString(resource.UpdateTime))\n\tp.SetLastRunTime(dcl.ValueOrEmptyString(resource.LastRunTime))\n\tp.SetStatus(DlpJobTriggerStatusEnumToProto(resource.Status))\n\tp.SetLocationId(dcl.ValueOrEmptyString(resource.LocationId))\n\tp.SetParent(dcl.ValueOrEmptyString(resource.Parent))\n\tp.SetLocation(dcl.ValueOrEmptyString(resource.Location))\n\tsTriggers := make([]*dlppb.DlpJobTriggerTriggers, len(resource.Triggers))\n\tfor i, r := range resource.Triggers {\n\t\tsTriggers[i] = DlpJobTriggerTriggersToProto(&r)\n\t}\n\tp.SetTriggers(sTriggers)\n\tsErrors := make([]*dlppb.DlpJobTriggerErrors, len(resource.Errors))\n\tfor i, r := range resource.Errors {\n\t\tsErrors[i] = DlpJobTriggerErrorsToProto(&r)\n\t}\n\tp.SetErrors(sErrors)\n\n\treturn p\n}", "func ToJobBase(r repoconfig.JobBase) job.Base {\n\treturn job.Base{\n\t\tName: r.Name,\n\t\tLabels: r.Labels,\n\t\tAnnotations: r.Annotations,\n\t\tMaxConcurrency: r.MaxConcurrency,\n\t\tAgent: r.Agent,\n\t\tCluster: r.Cluster,\n\t\tNamespace: r.Namespace,\n\t\tErrorOnEviction: r.ErrorOnEviction,\n\t\tSourcePath: r.SourcePath,\n\t\tSpec: r.Spec,\n\t\tPipelineRunSpec: r.PipelineRunSpec,\n\t\tUtilityConfig: ToUtilityConfig(r.UtilityConfig),\n\t}\n}", "func (c *Client) JobFromID(ctx context.Context, id string) (*Job, error) {\n\tjob, err := c.service.getJob(ctx, c.projectID, id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tjob.c = c\n\treturn job, nil\n}", "func (s *Service) ToObject(data *Data) (r interface{}, err error) {\n\tdefer func() {\n\t\tif rec := recover(); rec != nil {\n\t\t\terr = makeError(rec)\n\t\t}\n\t}()\n\tvar ok bool\n\tif data == nil {\n\t\treturn nil, nil\n\t}\n\ttypeID := data.Type()\n\tserializer := s.lookupBuiltinDeserializer(typeID)\n\tif serializer == nil {\n\t\tserializer, ok = s.registry[typeID]\n\t\tif !ok {\n\t\t\treturn nil, ihzerrors.NewSerializationError(fmt.Sprintf(\"there is no suitable de-serializer for type %d\", typeID), nil)\n\t\t}\n\t}\n\tdataInput := NewObjectDataInput(data.Buffer(), DataOffset, s, !s.SerializationConfig.LittleEndian)\n\treturn serializer.Read(dataInput), nil\n}", "func (d Dispatcher) Job(id string) (string, error) {\n\tj, err := d.GetBC().FindJob(id)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tjBytes, err := helpers.Serialize(j)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn string(jBytes), nil\n}", "func GetJob(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *JobState, opts ...pulumi.ResourceOption) (*Job, error) {\n\tvar resource Job\n\terr := ctx.ReadResource(\"aws-native:databrew:Job\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (n *Namespace) GetJob(backend Backend, jobID string) (*Job, error) {\n\n\t// ensure the namespace exists\n\terr := n.checkOrCreateNamespace(backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// get the stored JSON\n\tjson, _, err := backend.ReadKey(getJobPath(n.namespace, jobID))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"problem retrieving job %v\", err)\n\t}\n\n\t// load into a Job\n\tjob := &Job{}\n\terr = job.Deserialize(json)\n\treturn job, err\n}", "func NewJob() *Job {\n\treturn &Job{}\n}", "func ExportJob(conn *dbus.Conn, path dbus.ObjectPath, v Jober) error {\n\treturn conn.ExportSubtreeMethodTable(map[string]interface{}{\n\t\t\"Cancel\": v.Cancel,\n\t}, path, InterfaceJob)\n}", "func (d *mongoDriver) tryDispatchJob(ctx context.Context, iter *mongo.Cursor, startAt time.Time) (amboy.Job, dispatchAttemptInfo) {\n\tvar dispatchInfo dispatchAttemptInfo\n\tfor iter.Next(ctx) {\n\t\tji := &registry.JobInterchange{}\n\t\tif err := iter.Decode(ji); err != nil {\n\t\t\tgrip.Warning(message.WrapError(err, message.Fields{\n\t\t\t\t\"message\": \"problem decoding job document into interchange job\",\n\t\t\t\t\"driver_id\": d.instanceID,\n\t\t\t\t\"service\": \"amboy.queue.mdb\",\n\t\t\t\t\"operation\": \"next job\",\n\t\t\t\t\"is_group\": d.opts.UseGroups,\n\t\t\t\t\"group\": d.opts.GroupName,\n\t\t\t\t\"duration_secs\": time.Since(startAt).Seconds(),\n\t\t\t}))\n\t\t\t// try for the next thing in the iterator if we can\n\t\t\tcontinue\n\t\t}\n\n\t\tj, err := ji.Resolve(d.opts.Format)\n\t\tif err != nil {\n\t\t\tgrip.Warning(message.WrapError(err, message.Fields{\n\t\t\t\t\"message\": \"problem converting interchange job into in-memory job\",\n\t\t\t\t\"driver_id\": d.instanceID,\n\t\t\t\t\"service\": \"amboy.queue.mdb\",\n\t\t\t\t\"operation\": \"next job\",\n\t\t\t\t\"is_group\": d.opts.UseGroups,\n\t\t\t\t\"group\": d.opts.GroupName,\n\t\t\t\t\"duration_secs\": time.Since(startAt).Seconds(),\n\t\t\t}))\n\t\t\t// try for the next thing in the iterator if we can\n\t\t\tcontinue\n\t\t}\n\n\t\tif j.TimeInfo().IsStale() {\n\t\t\tres, err := d.getCollection().DeleteOne(ctx, bson.M{\"_id\": ji.Name})\n\t\t\tmsg := message.Fields{\n\t\t\t\t\"message\": \"found stale job\",\n\t\t\t\t\"driver_id\": d.instanceID,\n\t\t\t\t\"service\": \"amboy.queue.mdb\",\n\t\t\t\t\"num_deleted\": res.DeletedCount,\n\t\t\t\t\"operation\": \"next job\",\n\t\t\t\t\"job_id\": j.ID(),\n\t\t\t\t\"job_type\": j.Type().Name,\n\t\t\t\t\"is_group\": d.opts.UseGroups,\n\t\t\t\t\"group\": d.opts.GroupName,\n\t\t\t\t\"duration_secs\": time.Since(startAt).Seconds(),\n\t\t\t}\n\t\t\tgrip.Warning(message.WrapError(err, msg))\n\t\t\tgrip.NoticeWhen(err == nil, msg)\n\t\t\tcontinue\n\t\t}\n\n\t\tlockTimeout := d.LockTimeout()\n\t\tdispatchable := isDispatchable(j.Status(), lockTimeout)\n\t\tif !dispatchable {\n\t\t\tdispatchInfo.skips++\n\t\t\tcontinue\n\t\t} else if d.isOtherJobHoldingScopes(ctx, j) {\n\t\t\tdispatchInfo.skips++\n\t\t\tcontinue\n\t\t}\n\n\t\tif err = d.dispatcher.Dispatch(ctx, j); err != nil {\n\t\t\tdispatchInfo.misses++\n\t\t\tgrip.DebugWhen(dispatchable && !d.isMongoDupScope(err),\n\t\t\t\tmessage.WrapError(err, message.Fields{\n\t\t\t\t\t\"message\": \"failed to dispatch job, possibly due to lock contention\",\n\t\t\t\t\t\"driver_id\": d.instanceID,\n\t\t\t\t\t\"service\": \"amboy.queue.mdb\",\n\t\t\t\t\t\"operation\": \"dispatch job\",\n\t\t\t\t\t\"job_id\": j.ID(),\n\t\t\t\t\t\"job_type\": j.Type().Name,\n\t\t\t\t\t\"scopes\": j.Scopes(),\n\t\t\t\t\t\"stat\": j.Status(),\n\t\t\t\t\t\"is_group\": d.opts.UseGroups,\n\t\t\t\t\t\"group\": d.opts.GroupName,\n\t\t\t\t\t\"dup_key\": isMongoDupKey(err),\n\t\t\t\t\t\"duration_secs\": time.Since(startAt).Seconds(),\n\t\t\t\t}),\n\t\t\t)\n\t\t\tcontinue\n\t\t}\n\n\t\treturn j, dispatchInfo\n\t}\n\n\treturn nil, dispatchInfo\n}", "func MakeJob(bind *v1alpha1.Bind, namespace string, serviceAccountName string, jobName string, spec *v1alpha1.EventSourceSpec, op BindOperation, trigger EventTrigger, route string, bindContext BindContext) (*batchv1.Job, error) {\n\tlabels := map[string]string{\n\t\t\"app\": \"bindpod\",\n\t}\n\n\tpodTemplate, err := makePodTemplate(bind, namespace, serviceAccountName, jobName, spec, op, trigger, route, bindContext)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &batchv1.Job{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: jobName,\n\t\t\tNamespace: namespace,\n\t\t\tLabels: labels,\n\t\t\tOwnerReferences: []metav1.OwnerReference{*metav1.NewControllerRef(bind, v1alpha1.SchemeGroupVersion.WithKind(\"Bind\"))},\n\t\t},\n\t\tSpec: batchv1.JobSpec{\n\t\t\tTemplate: *podTemplate,\n\t\t},\n\t}, nil\n}", "func (c *Client) JobFromID(ctx context.Context, id string) (*Job, error) {\n\treturn c.JobFromProject(ctx, c.projectID, id, c.Location)\n}", "func (djd DiskJobDetails) AsJobDetails() (*JobDetails, bool) {\n\treturn nil, false\n}", "func NewJob() *Job {\n\treturn &Job{\n\t\tID: uuid.New().String(),\n\t\tPriority: PriorityNormal,\n\t\tTimestamp: time.Now(),\n\t\tContentType: ContentTypeMsgpack,\n\t}\n}", "func NewJobJob(dbJob *models.Job) *JobJob {\n\tvar j, err = newJobJob(dbJob)\n\tif err != nil {\n\t\tlogger.Criticalf(\"Unable to create job-targeting job %d: %s\", dbJob.ID, err)\n\t}\n\n\treturn j\n}", "func (s *Service) ToObject(data *Data) (r interface{}, err error) {\n\tdefer func() {\n\t\tif rec := recover(); rec != nil {\n\t\t\terr = makeError(rec)\n\t\t}\n\t}()\n\tif data == nil {\n\t\treturn nil, nil\n\t}\n\ttypeID := data.Type()\n\tif typeID == 0 {\n\t\treturn data, nil\n\t}\n\tserializer, ok := s.registry[typeID]\n\tif !ok {\n\t\treturn nil, hzerrors.NewHazelcastSerializationError(fmt.Sprintf(\"there is no suitable de-serializer for type %d\", typeID), nil)\n\t}\n\tdataInput := NewObjectDataInput(data.Buffer(), DataOffset, s, s.SerializationConfig.BigEndian)\n\treturn serializer.Read(dataInput), nil\n}", "func MakeJobInterchange(j amboy.Job, f amboy.Format) (*JobInterchange, error) {\n\ttypeInfo := j.Type()\n\n\tif typeInfo.Version < 0 {\n\t\treturn nil, errors.New(\"cannot use jobs with versions less than 0 with job interchange\")\n\t}\n\n\tdep, err := makeDependencyInterchange(f, j.Dependency())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdata, err := convertTo(f, j)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\toutput := &JobInterchange{\n\t\tName: j.ID(),\n\t\tType: typeInfo.Name,\n\t\tVersion: typeInfo.Version,\n\t\tPriority: j.Priority(),\n\t\tStatus: j.Status(),\n\t\tTimeInfo: j.TimeInfo(),\n\t\tEnqueueScopes: j.EnqueueScopes(),\n\t\tEnqueueAllScopes: j.EnqueueAllScopes(),\n\t\tRetryInfo: j.RetryInfo(),\n\t\tJob: data,\n\t\tDependency: dep,\n\t}\n\n\treturn output, nil\n}", "func (in *PyTorchJob) DeepCopyObject() runtime.Object {\n\tif c := in.DeepCopy(); c != nil {\n\t\treturn c\n\t}\n\treturn nil\n}", "func (job *Job) SaveToMDSon(w io.Writer) error {\n\tbuf, err := mdson.Marshal(job)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to save job configuration: %s\", err)\n\t}\n\t_, err = w.Write(buf)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to save job configuration: %s\", err)\n\t}\n\treturn nil\n}", "func GetJob(params job.GetJobParams) middleware.Responder {\n\tjobRepo, err := repository.GetCassandraJobberRepository()\n\tif err != nil {\n\t\tnewErr := fmt.Errorf(\"Unable to access jobs repository: %v\", err)\n\t\tse := createServiceError(newErr, http.StatusInternalServerError)\n\t\treturn job.NewGetJobDefault(0).WithPayload(&se)\n\t}\n\n\tj, err := jobRepo.GetJob(params.ID)\n\tif err != nil {\n\t\tnewErr := fmt.Errorf(\"Unable to get job: %v\", err)\n\t\tse := createServiceError(newErr, http.StatusInternalServerError)\n\t\treturn job.NewGetJobDefault(0).WithPayload(&se)\n\t}\n\n\tif j == nil {\n\t\tnewErr := fmt.Errorf(\"Unable to locate job: %s\", params.ID)\n\t\tse := createServiceError(newErr, http.StatusNotFound)\n\t\treturn job.NewGetJobDefault(0).WithPayload(&se)\n\t}\n\n\tapiJob := j.ToAPI()\n\treturn job.NewGetJobOK().WithPayload(&apiJob)\n}", "func (m *Mongo) GetJob(ctx context.Context, id string) (*models.Job, error) {\n\tvar job models.Job\n\tif err := m.connection.Collection(m.ActualCollectionName(config.ImportsCollection)).FindOne(ctx, bson.M{\"id\": id}, &job); err != nil {\n\t\tif errors.Is(err, mongodriver.ErrNoDocumentFound) {\n\t\t\treturn nil, apierrors.ErrJobNotFound\n\t\t}\n\t\treturn nil, err\n\t}\n\n\treturn &job, nil\n}", "func StopJob(nomad *NomadServer, job *Job) (int, error) {\n\turl := fmt.Sprintf(\"http://%v:%v/v1/job/%v\", nomad.Address, nomad.Port, job.Name)\n\treq, err := retryablehttp.NewRequest(http.MethodDelete, url, bytes.NewReader([]byte{}))\n\tif err != nil {\n\t\tbuf := log(\"event\", \"stop_job_request_error\", \"jobname\", job.Name, \"error\", err.Error())\n\t\treturn http.StatusInternalServerError, errors.New(buf.String())\n\t}\n\tresp, err := retryablehttp.NewClient().Do(req)\n\tif err != nil {\n\t\tbuf := log(\"event\", \"stop_job_client_error\", \"jobname\", job.Name, \"error\", err.Error())\n\t\treturn resp.StatusCode, errors.New(buf.String())\n\t}\n\treturn resp.StatusCode, nil\n}", "func GetJob(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *JobState, opts ...pulumi.ResourceOption) (*Job, error) {\n\tvar resource Job\n\terr := ctx.ReadResource(\"google-native:dataflow/v1b3:Job\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (s *Scheduler) GetJob(jid ffs.JobID) (ffs.Job, error) {\n\tj, err := s.js.Get(jid)\n\tif err != nil {\n\t\tif err == jstore.ErrNotFound {\n\t\t\treturn ffs.Job{}, ErrNotFound\n\t\t}\n\t\treturn ffs.Job{}, fmt.Errorf(\"get Job from store: %s\", err)\n\t}\n\treturn j, nil\n}", "func (c *Client) GetJob(jobID string) (*Job, error) {\n\tclient := &http.Client{}\n\turl := fmt.Sprintf(\"http://%s/api/v1/jobs/%s\", c.options.ServerAddr, jobID)\n\treq, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\tlogrus.WithError(err)\n\t\treturn nil, err\n\t}\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\tlogrus.WithError(err)\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tlogrus.WithError(err)\n\t\treturn nil, err\n\t}\n\tjob := &Job{}\n\tif err := json.Unmarshal(body, job); err != nil {\n\t\tlogrus.WithError(err)\n\t\treturn nil, err\n\t}\n\treturn job, nil\n}", "func (jd JobDetails) AsJobDetails() (*JobDetails, bool) {\n\treturn &jd, true\n}", "func (t *JobSvr) DealJob(job *JobEntity) {\n\t// 1.1 update job status to JOB_STATUS_DEALING\n\t_, err := DefaultJobDao.UpdateById(job.Id, dbx.Params{\n\t\t\"status\": JOB_STATUS_DEALING,\n\t})\n\tif err != nil {\n\t\tlogger.Errorf(\"Failed to update Job status: %s\", \"Dealing\")\n\t\treturn\n\t}\n\n\tapp, err := DefaultAppSvr.GetById(job.AppId)\n\tif err != nil {\n\t\tlogger.Errorf(\"Failed to get app, id=%d, err=%s\", job.AppId, err.Error())\n\t\treturn\n\t}\n\n\tdeploy := new(DeploymentEntity)\n\terr = DefaultDeploymentDao.GetById(job.DeploymentId, deploy)\n\tif err != nil {\n\t\tlogger.Errorf(\"Failed to get deployment, deploymentId=%d, err=%s\", job.DeploymentId, err.Error())\n\t\treturn\n\t}\n\n\t// 2.1 start to deal deploy job\n\terr = NewJobFlow(deploy, job, app).Do()\n\n\t// 3.1 update job and deployment status\n\tjobStatus := JOB_STATUS_SUCC\n\tif err != nil {\n\t\tjobStatus = JOB_STATUS_FAILED\n\t}\n\t_, err = DefaultJobDao.UpdateById(job.Id, dbx.Params{\n\t\t\"status\": jobStatus,\n\t})\n\tif err != nil {\n\t\tlogger.Errorf(\"Failed to update Job status: %s\", \"Dealing\")\n\t\treturn\n\t}\n\n\t// 4.1 try to update deployment status\n\terr = DefaultDeploymentSvr.TryUpdateDeploymentStatus(job.DeploymentId)\n\tif err != nil {\n\t\tlogger.Errorf(\"Failed to UpdateDeploymentStatus, err=%s\", err.Error())\n\t}\n}", "func FindJob(ctx context.Context, exec boil.ContextExecutor, iD int64, selectCols ...string) (*Job, error) {\n\tjobObj := &Job{}\n\n\tsel := \"*\"\n\tif len(selectCols) > 0 {\n\t\tsel = strings.Join(strmangle.IdentQuoteSlice(dialect.LQ, dialect.RQ, selectCols), \",\")\n\t}\n\tquery := fmt.Sprintf(\n\t\t\"select %s from \\\"jobs\\\" where \\\"id\\\"=$1\", sel,\n\t)\n\n\tq := queries.Raw(query, iD)\n\n\terr := q.Bind(ctx, exec, jobObj)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: unable to select from jobs\")\n\t}\n\n\treturn jobObj, nil\n}", "func NewJob(jobType string, data interface{}) Job {\n\tj := Job{\n\t\tuuid: uuid.New().String(),\n\t\tjobType: jobType,\n\t\tdata: data,\n\t}\n\n\t// detect the coordinated request\n\tif req, ok := data.(*request.CoordinatedRequest); ok {\n\t\tj.req = req\n\t}\n\n\treturn j\n}", "func (in *MPIJob) DeepCopyObject() runtime.Object {\n\tif c := in.DeepCopy(); c != nil {\n\t\treturn c\n\t}\n\treturn nil\n}", "func (o *orm) CreateJob(ctx context.Context, jobSpec *Job, p pipeline.Pipeline) (Job, error) {\n\tvar jb Job\n\tfor _, task := range p.Tasks {\n\t\tif task.Type() == pipeline.TaskTypeBridge {\n\t\t\t// Bridge must exist\n\t\t\tname := task.(*pipeline.BridgeTask).Name\n\t\t\tbt := bridges.BridgeType{}\n\t\t\tif err := o.db.First(&bt, \"name = ?\", name).Error; err != nil {\n\t\t\t\tif errors.Is(err, gorm.ErrRecordNotFound) {\n\t\t\t\t\treturn jb, errors.Wrap(pipeline.ErrNoSuchBridge, name)\n\t\t\t\t}\n\t\t\t\treturn jb, err\n\t\t\t}\n\t\t}\n\t}\n\n\ttx := postgres.TxFromContext(ctx, o.db)\n\n\t// Autogenerate a job ID if not specified\n\tif jobSpec.ExternalJobID == (uuid.UUID{}) {\n\t\tjobSpec.ExternalJobID = uuid.NewV4()\n\t}\n\n\tswitch jobSpec.Type {\n\tcase DirectRequest:\n\t\terr := tx.Create(&jobSpec.DirectRequestSpec).Error\n\t\tif err != nil {\n\t\t\treturn jb, errors.Wrap(err, \"failed to create DirectRequestSpec for jobSpec\")\n\t\t}\n\t\tjobSpec.DirectRequestSpecID = &jobSpec.DirectRequestSpec.ID\n\tcase FluxMonitor:\n\t\terr := tx.Create(&jobSpec.FluxMonitorSpec).Error\n\t\tif err != nil {\n\t\t\treturn jb, errors.Wrap(err, \"failed to create FluxMonitorSpec for jobSpec\")\n\t\t}\n\t\tjobSpec.FluxMonitorSpecID = &jobSpec.FluxMonitorSpec.ID\n\tcase OffchainReporting:\n\t\tif jobSpec.OffchainreportingOracleSpec.EncryptedOCRKeyBundleID.Valid {\n\t\t\t_, err := o.keyStore.OCR().Get(jobSpec.OffchainreportingOracleSpec.EncryptedOCRKeyBundleID.String)\n\t\t\tif err != nil {\n\t\t\t\treturn jb, errors.Wrapf(ErrNoSuchKeyBundle, \"%v\", jobSpec.OffchainreportingOracleSpec.EncryptedOCRKeyBundleID)\n\t\t\t}\n\t\t}\n\t\tif jobSpec.OffchainreportingOracleSpec.P2PPeerID != nil {\n\t\t\t_, err := o.keyStore.P2P().Get(jobSpec.OffchainreportingOracleSpec.P2PPeerID.Raw())\n\t\t\tif err != nil {\n\t\t\t\treturn jb, errors.Wrapf(ErrNoSuchPeerID, \"%v\", jobSpec.OffchainreportingOracleSpec.P2PPeerID)\n\t\t\t}\n\t\t}\n\t\tif jobSpec.OffchainreportingOracleSpec.TransmitterAddress != nil {\n\t\t\t_, err := o.keyStore.Eth().Get(jobSpec.OffchainreportingOracleSpec.TransmitterAddress.Hex())\n\t\t\tif err != nil {\n\t\t\t\treturn jb, errors.Wrapf(ErrNoSuchTransmitterAddress, \"%v\", jobSpec.OffchainreportingOracleSpec.TransmitterAddress)\n\t\t\t}\n\t\t}\n\n\t\terr := tx.Create(&jobSpec.OffchainreportingOracleSpec).Error\n\t\tif err != nil {\n\t\t\treturn jb, errors.Wrap(err, \"failed to create OffchainreportingOracleSpec for jobSpec\")\n\t\t}\n\t\tjobSpec.OffchainreportingOracleSpecID = &jobSpec.OffchainreportingOracleSpec.ID\n\tcase Keeper:\n\t\terr := tx.Create(&jobSpec.KeeperSpec).Error\n\t\tif err != nil {\n\t\t\treturn jb, errors.Wrap(err, \"failed to create KeeperSpec for jobSpec\")\n\t\t}\n\t\tjobSpec.KeeperSpecID = &jobSpec.KeeperSpec.ID\n\tcase Cron:\n\t\terr := tx.Create(&jobSpec.CronSpec).Error\n\t\tif err != nil {\n\t\t\treturn jb, errors.Wrap(err, \"failed to create CronSpec for jobSpec\")\n\t\t}\n\t\tjobSpec.CronSpecID = &jobSpec.CronSpec.ID\n\tcase VRF:\n\t\terr := tx.Create(&jobSpec.VRFSpec).Error\n\t\tpqErr, ok := err.(*pgconn.PgError)\n\t\tif err != nil && ok && pqErr.Code == \"23503\" {\n\t\t\tif pqErr.ConstraintName == \"vrf_specs_public_key_fkey\" {\n\t\t\t\treturn jb, errors.Wrapf(ErrNoSuchPublicKey, \"%s\", jobSpec.VRFSpec.PublicKey.String())\n\t\t\t}\n\t\t}\n\t\tif err != nil {\n\t\t\treturn jb, errors.Wrap(err, \"failed to create VRFSpec for jobSpec\")\n\t\t}\n\t\tjobSpec.VRFSpecID = &jobSpec.VRFSpec.ID\n\tcase Webhook:\n\t\terr := tx.Create(&jobSpec.WebhookSpec).Error\n\t\tif err != nil {\n\t\t\treturn jb, errors.Wrap(err, \"failed to create WebhookSpec for jobSpec\")\n\t\t}\n\t\tjobSpec.WebhookSpecID = &jobSpec.WebhookSpec.ID\n\t\tfor i, eiWS := range jobSpec.WebhookSpec.ExternalInitiatorWebhookSpecs {\n\t\t\tjobSpec.WebhookSpec.ExternalInitiatorWebhookSpecs[i].WebhookSpecID = jobSpec.WebhookSpec.ID\n\t\t\terr := tx.Create(&jobSpec.WebhookSpec.ExternalInitiatorWebhookSpecs[i]).Error\n\t\t\tif err != nil {\n\t\t\t\treturn jb, errors.Wrapf(err, \"failed to create ExternalInitiatorWebhookSpec for WebhookSpec: %#v\", eiWS)\n\t\t\t}\n\t\t}\n\tdefault:\n\t\tlogger.Fatalf(\"Unsupported jobSpec.Type: %v\", jobSpec.Type)\n\t}\n\n\tpipelineSpecID, err := o.pipelineORM.CreateSpec(ctx, tx, p, jobSpec.MaxTaskDuration)\n\tif err != nil {\n\t\treturn jb, errors.Wrap(err, \"failed to create pipeline spec\")\n\t}\n\tjobSpec.PipelineSpecID = pipelineSpecID\n\terr = tx.Create(jobSpec).Error\n\tif err != nil {\n\t\treturn jb, errors.Wrap(err, \"failed to create job\")\n\t}\n\n\treturn o.FindJob(ctx, jobSpec.ID)\n}", "func (p *SqliteProvider) SaveJob(job *models.Job) error {\n\t_, err := p.db.NamedExec(`INSERT OR REPLACE INTO jobs (jid, status, started_at, finished_at, created_by, client_id, multi_job_id, details)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tVALUES (:jid, :status, :started_at, :finished_at, :created_by, :client_id, :multi_job_id, :details)`,\n\t\tconvertToSqlite(job))\n\tif err == nil {\n\t\tp.log.Debugf(\"Job saved successfully: %v\", *job)\n\t}\n\treturn err\n}", "func DeleteJob(cmd CmdInterface) {\n\tjob, err := store.FindJob(cmd.Parts[1])\n\tif err != nil {\n\t\tReturnError(cmd, err.Error())\n\t\treturn\n\t}\n\terr = job.Delete()\n\tif err != nil {\n\t\tReturnError(cmd, err.Error())\n\t\treturn\n\t}\n\n\tReturnString(cmd, \"OK\")\n}", "func NewMockJobFrom(i Job) *MockJob {\n\treturn &MockJob{\n\t\tNameFunc: &JobNameFunc{\n\t\t\tdefaultHook: i.Name,\n\t\t},\n\t\tRunFunc: &JobRunFunc{\n\t\t\tdefaultHook: i.Run,\n\t\t},\n\t}\n}", "func convertFetchJobToJSON(input SetBucketFetchJobInput) (data string, err error) {\n\tobjectHeaders := make(map[string]string)\n\tfor key, value := range input.ObjectHeaders {\n\t\tif value != \"\" {\n\t\t\t_key := strings.ToLower(key)\n\t\t\tif !strings.HasPrefix(key, HEADER_PREFIX_OBS) {\n\t\t\t\t_key = HEADER_PREFIX_META_OBS + _key\n\t\t\t}\n\t\t\tobjectHeaders[_key] = value\n\t\t}\n\t}\n\tinput.ObjectHeaders = objectHeaders\n\tjson, err := json.Marshal(input)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdata = string(json)\n\treturn\n}", "func (cl *Client) GetJob() (*MapReduceJob, error) {\n\tresp, err := cl.client.Get(cl.baseurl)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn nil, fmt.Errorf(\"Got status: %s\", resp.Status)\n\t}\n\tdefer resp.Body.Close()\n\tdecoder := json.NewDecoder(resp.Body)\n\tjb := &MapReduceJob{}\n\terr = decoder.Decode(jb)\n\treturn jb, err\n}", "func (c *podConverter) ConvertObject(originalObj interface{}) (convertedObj interface{}, err error) {\n\tpod, ok := originalObj.(*corev1.Pod)\n\tif ok {\n\t\treturn c.stripDownPod(pod), nil\n\t}\n\n\tif deleteTombstone, ok := originalObj.(cache.DeletedFinalStateUnknown); ok {\n\t\tpod, ok = deleteTombstone.Obj.(*corev1.Pod)\n\t\tif ok {\n\t\t\t//the object on a DeletedFinalStateUnknown will be from the cache we don't need to strip it again\n\t\t\treturn pod, nil\n\t\t}\n\t}\n\n\treturn nil, fmt.Errorf(\"failed to convert object to pod\")\n}", "func (t *DRMAATracker) DeleteJob(jobID string) error {\n\tt.Lock()\n\tdefer t.Unlock()\n\t// job needs to be in an end state\n\tps, err := t.session.JobPs(jobID)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif ps != drmaa.PsDone && ps != drmaa.PsFailed {\n\t\treturn fmt.Errorf(\"job is not in an end state (%v)\", ps)\n\t}\n\tt.store.RemoveJob(jobID)\n\treturn nil\n}", "func (in *TransformJob) DeepCopy() *TransformJob {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(TransformJob)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func jobFromPJ(pj *v1.ProwJob) Job {\n\treturn Job{Name: pj.Spec.Job, State: pj.Status.State, Icon: statusIcon(pj.Status.State), URL: pj.Status.URL}\n}", "func (shim *JobDirectClient) ViewJob(ctx context.Context, in *QueryJob, opts ...grpc.CallOption) (Job_ViewJobClient, error) {\n md, _ := metadata.FromOutgoingContext(ctx)\n ictx := metadata.NewIncomingContext(ctx, md)\n\n\tw := &directJobViewJob{ictx, make(chan *QueryResult, 100), in, nil}\n if shim.streamServerInt != nil {\n go func() {\n defer w.close()\n info := grpc.StreamServerInfo{\n FullMethod: \"/gripql.Job/ViewJob\",\n IsServerStream: true,\n }\n w.e = shim.streamServerInt(shim.server, w, &info, _Job_ViewJob_Handler)\n } ()\n return w, nil\n }\n\tgo func() {\n defer w.close()\n\t\tw.e = shim.server.ViewJob(in, w)\n\t}()\n\treturn w, nil\n}", "func (m *MPIJobTrainer) getTrainingJobFromCache(name, ns string) (TrainingJob, error) {\n\n\tvar (\n\t\tjobPod v1.Pod\n\t\tjob batchv1.Job\n\t\tlatest metav1.Time\n\t)\n\n\tpods := []v1.Pod{}\n\n\t// 1. Find the batch job\n\tfor _, item := range allJobs {\n\t\tif isMPIJob(name, ns, item) {\n\t\t\tjob = item\n\t\t\tbreak\n\t\t}\n\t}\n\n\t// 2. Find the pods, and determine the pod of the job\n\tfor _, item := range allPods {\n\n\t\tif !isMPIPod(name, ns, item) {\n\t\t\tcontinue\n\t\t}\n\n\t\tmeta := item.ObjectMeta\n\t\tisJob := false\n\t\towners := meta.OwnerReferences\n\t\tfor _, owner := range owners {\n\t\t\tif owner.Kind == \"Job\" {\n\t\t\t\tisJob = true\n\t\t\t\tlog.Debugf(\"find job pod %v, break\", item)\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\tif !isJob {\n\t\t\t// for non-job pod, add it into the pod list\n\t\t\tpods = append(pods, item)\n\t\t\tlog.Debugf(\"add pod %v to pods\", item)\n\t\t} else {\n\t\t\tif jobPod.Name == \"\" {\n\t\t\t\tlatest = item.CreationTimestamp\n\t\t\t\tjobPod = item\n\t\t\t\tlog.Debugf(\"set pod %s as first jobpod, and it's time is %v\", jobPod.Name, jobPod.CreationTimestamp)\n\t\t\t} else {\n\t\t\t\tlog.Debugf(\"current jobpod %s , and it's time is %v\", jobPod.Name, latest)\n\t\t\t\tlog.Debugf(\"candidiate jobpod %s , and it's time is %v\", item.Name, item.CreationTimestamp)\n\t\t\t\tcurrent := item.CreationTimestamp\n\t\t\t\tif latest.Before(&current) {\n\t\t\t\t\tjobPod = item\n\t\t\t\t\tlatest = current\n\t\t\t\t\tlog.Debugf(\"replace\")\n\t\t\t\t} else {\n\t\t\t\t\tlog.Debugf(\"no replace\")\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tpods = append(pods, jobPod)\n\n\treturn &MPIJob{\n\t\tJobInfo: &JobInfo{\n\t\t\tjob: job,\n\t\t\tjobPod: jobPod,\n\t\t\tpods: pods,\n\t\t\tname: name,\n\t\t\ttrainerType: m.Type(),\n\t\t},\n\t}, nil\n}", "func (in *ElasticDLJob) DeepCopy() *ElasticDLJob {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(ElasticDLJob)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func NewMigrationJob(ctx *pulumi.Context,\n\tname string, args *MigrationJobArgs, opts ...pulumi.ResourceOption) (*MigrationJob, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.Destination == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Destination'\")\n\t}\n\tif args.MigrationJobId == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'MigrationJobId'\")\n\t}\n\tif args.Source == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Source'\")\n\t}\n\tif args.Type == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Type'\")\n\t}\n\tvar resource MigrationJob\n\terr := ctx.RegisterResource(\"google-native:datamigration/v1beta1:MigrationJob\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func NewMockJob() *MockJob {\n\treturn &MockJob{\n\t\tNameFunc: &JobNameFunc{\n\t\t\tdefaultHook: func() string {\n\t\t\t\treturn \"\"\n\t\t\t},\n\t\t},\n\t\tRunFunc: &JobRunFunc{\n\t\t\tdefaultHook: func(context.Context, database.DB, streaming.Sender) (*search.Alert, error) {\n\t\t\t\treturn nil, nil\n\t\t\t},\n\t\t},\n\t}\n}", "func (agent *Agent) GetJob() *Job {\n\tagent.rwLock.RLock()\n\tdefer agent.rwLock.RUnlock()\n\tif agent.currentJob == nil {\n\t\treturn nil\n\t}\n\treturn agent.currentJob.Copy()\n}", "func (o *orm) FindJob(ctx context.Context, id int32) (jb Job, err error) {\n\ttx := postgres.TxFromContext(ctx, o.db)\n\terr = PreloadAllJobTypes(tx).\n\t\tPreload(\"JobSpecErrors\").\n\t\tFirst(&jb, \"jobs.id = ?\", id).\n\t\tError\n\tif err != nil {\n\t\treturn jb, err\n\t}\n\n\tif jb.OffchainreportingOracleSpec != nil {\n\t\tvar ch evm.Chain\n\t\tch, err = o.chainSet.Get(jb.OffchainreportingOracleSpec.EVMChainID.ToInt())\n\t\tif err != nil {\n\t\t\treturn jb, err\n\t\t}\n\t\tjb.OffchainreportingOracleSpec = LoadDynamicConfigVars(ch.Config(), *jb.OffchainreportingOracleSpec)\n\t}\n\treturn jb, err\n}", "func (js *JobService) DeleteJob(id uint) (*entity.Job, []error) {\n\tusr, errs := js.jobRepo.DeleteJob(id)\n\n\tif len(errs) > 0 {\n\t\treturn nil, errs\n\t}\n\n\treturn usr, nil\n}", "func NewJob(ctx *pulumi.Context,\n\tname string, args *JobArgs, opts ...pulumi.ResourceOption) (*Job, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.RoleArn == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'RoleArn'\")\n\t}\n\tif args.Type == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Type'\")\n\t}\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource Job\n\terr := ctx.RegisterResource(\"aws-native:databrew:Job\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func NewJob(ctx *pulumi.Context,\n\tname string, args *JobArgs, opts ...pulumi.ResourceOption) (*Job, error) {\n\tif args == nil {\n\t\targs = &JobArgs{}\n\t}\n\n\treplaceOnChanges := pulumi.ReplaceOnChanges([]string{\n\t\t\"location\",\n\t\t\"project\",\n\t})\n\topts = append(opts, replaceOnChanges)\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource Job\n\terr := ctx.RegisterResource(\"google-native:dataflow/v1b3:Job\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (shim *JobDirectClient) ResumeJob(ctx context.Context, in *ExtendQuery, opts ...grpc.CallOption) (Job_ResumeJobClient, error) {\n md, _ := metadata.FromOutgoingContext(ctx)\n ictx := metadata.NewIncomingContext(ctx, md)\n\n\tw := &directJobResumeJob{ictx, make(chan *QueryResult, 100), in, nil}\n if shim.streamServerInt != nil {\n go func() {\n defer w.close()\n info := grpc.StreamServerInfo{\n FullMethod: \"/gripql.Job/ResumeJob\",\n IsServerStream: true,\n }\n w.e = shim.streamServerInt(shim.server, w, &info, _Job_ResumeJob_Handler)\n } ()\n return w, nil\n }\n\tgo func() {\n defer w.close()\n\t\tw.e = shim.server.ResumeJob(in, w)\n\t}()\n\treturn w, nil\n}", "func (js *JobSession) RunJob(jt drmaa2interface.JobTemplate) (drmaa2interface.Job, error) {\n\tid, err := js.tracker[0].AddJob(jt)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn newJob(id, js.name, jt, js.tracker[0]), nil\n}", "func (in *Job) DeepCopy() *Job {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Job)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func (s *DiffCmd) Job(job string, w io.Writer) error {\n\tdiffer, err := diff.New(s.releaseRepo, s.release1, s.release2)\n\tif err != nil {\n\t\treturn err\n\t}\n\td, err := differ.DiffJob(job)\n\tif err != nil {\n\t\treturn err\n\t}\n\ts.printDiffResult(w, d)\n\treturn nil\n}", "func GetJobStepsFromRadixJob(job *v1.RadixJob) []Step {\n\tvar steps []Step\n\tfor _, jobStep := range job.Status.Steps {\n\t\tstep := Step{\n\t\t\tName: jobStep.Name,\n\t\t\tStatus: string(jobStep.Condition),\n\t\t\tStarted: radixutils.FormatTime(jobStep.Started),\n\t\t\tEnded: radixutils.FormatTime(jobStep.Ended),\n\t\t\tPodName: jobStep.PodName,\n\t\t\tComponents: jobStep.Components,\n\t\t}\n\n\t\tsteps = append(steps, step)\n\t}\n\n\treturn steps\n}", "func DeleteJob(ns, name string) error {\n\tdeletePolicy := metav1.DeletePropagationForeground\n\terr := kubecli.BatchV1().Jobs(ns).Delete(name, &metav1.DeleteOptions{\n\t\tPropagationPolicy: &deletePolicy,\n\t})\n\tif err != nil && !apierrors.IsNotFound(err) {\n\t\treturn err\n\t}\n\n\terr = DeletePodsByLabel(ns, map[string]string{\"job-name\": name})\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (experiment ExperimentDetails) BuildJob(pod *podtemplatespec.Builder, jobspec *jobspec.Builder) (*batchv1.Job, error) {\n\t//restartPolicy := corev1.RestartPolicyOnFailure\n\tjobObj, err := job.NewBuilder().\n\t\tWithJobSpecBuilder(jobspec).\n\t\tWithName(experiment.JobName).\n\t\tWithNamespace(experiment.Namespace).\n\t\tWithLabels(experiment.ExpLabels).\n\t\tBuild()\n\tif err != nil {\n\t\tlog.Errorln(err)\n\t\treturn jobObj, err\n\t}\n\treturn jobObj, nil\n}", "func (c APIClient) GetMonitoringJob(id string) (MonitoringJob, error) {\n\tvar mj MonitoringJob\n\t_, err := c.doHTTPUnmarshal(\"GET\", fmt.Sprintf(\"https://api.nsone.net/v1/monitoring/jobs/%s\", id), nil, &mj)\n\treturn mj, err\n}", "func ReconcileJob(reqLogger logr.Logger, c client.Client, job *batchv1.Job, wait bool) error {\n\tif err := SetCreationSpecAnnotation(&job.ObjectMeta, job); err != nil {\n\t\treturn err\n\t}\n\n\tfound := &batchv1.Job{}\n\tif err := c.Get(context.TODO(), types.NamespacedName{Name: job.Name, Namespace: job.Namespace}, found); err != nil {\n\t\t// Return API error\n\t\tif client.IgnoreNotFound(err) != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Create the job\n\t\tif err := c.Create(context.TODO(), job); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Check the found job spec\n\tif !CreationSpecsEqual(job.ObjectMeta, found.ObjectMeta) {\n\t\t// We need to delete the job and requeue\n\t\tif err := c.Delete(context.TODO(), found); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif wait {\n\t\t\treturn errors.NewRequeueError(\"Deleting stale job and requeuing\", 5)\n\t\t}\n\t}\n\n\tif wait {\n\t\t// Make sure the job completed\n\t\tif found.Status.Succeeded != 1 {\n\t\t\treturn errors.NewRequeueError(\"Waiting for job to complete\", 3)\n\t\t}\n\t}\n\n\treturn nil\n}", "func (d DB) Get(id string) (*job.Job, error) {\n\ttemplate := `select to_jsonb(j.job) from (select * from %[1]s where job ->> 'id' = $1) as j;`\n\tquery := fmt.Sprintf(template, TABLE_NAME)\n\tvar r sql.NullString\n\terr := d.conn.QueryRow(query, id).Scan(&r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresult := &job.Job{}\n\tif r.Valid {\n\t\terr = json.Unmarshal([]byte(r.String), &result)\n\t}\n\treturn result, err\n}", "func GetJobFromTo(r common.GetJobFromToRequest) common.GetJobFromToResponse {\n\tjm, found := JobsAdmin.JobMgr(r.JobID)\n\tif !found {\n\t\t// Job with JobId does not exists.\n\t\t// Search the plan files in Azcopy folder and resurrect the Job.\n\t\tif !JobsAdmin.ResurrectJob(r.JobID, EMPTY_SAS_STRING, EMPTY_SAS_STRING) {\n\t\t\treturn common.GetJobFromToResponse{\n\t\t\t\tErrorMsg: fmt.Sprintf(\"Job with JobID %v does not exist or is invalid\", r.JobID),\n\t\t\t}\n\t\t}\n\t\tjm, _ = JobsAdmin.JobMgr(r.JobID)\n\t}\n\n\t// Get zeroth part of the job part plan.\n\tjp0, ok := jm.JobPartMgr(0)\n\tif !ok {\n\t\treturn common.GetJobFromToResponse{\n\t\t\tErrorMsg: fmt.Sprintf(\"error getting the job's FromTo with JobID %v\", r.JobID),\n\t\t}\n\t}\n\n\t// Use first transfer's source/destination as represent.\n\tsource, destination, _ := jp0.Plan().TransferSrcDstStrings(0)\n\tif source == \"\" && destination == \"\" {\n\t\treturn common.GetJobFromToResponse{\n\t\t\tErrorMsg: fmt.Sprintf(\"error getting the source/destination with JobID %v\", r.JobID),\n\t\t}\n\t}\n\n\treturn common.GetJobFromToResponse{\n\t\tErrorMsg: \"\",\n\t\tFromTo: jp0.Plan().FromTo,\n\t\tSource: source,\n\t\tDestination: destination,\n\t}\n}", "func (r *DeviceManagementExportJobRequest) Get(ctx context.Context) (resObj *DeviceManagementExportJob, err error) {\n\tvar query string\n\tif r.query != nil {\n\t\tquery = \"?\" + r.query.Encode()\n\t}\n\terr = r.JSONRequest(ctx, \"GET\", query, nil, &resObj)\n\treturn\n}", "func (regionEnv *RegionEnv) deleteJob(job *unstructured.Unstructured, wait bool) error {\n\tgvk := schema.GroupVersionKind{Group: \"batch\", Version: \"v1\", Kind: \"Job\"}\n\tregionEnv.Logger.Infof(\"Deleting Job %s\", job.GetName())\n\tmapping, _ := regionEnv.Mapper.RESTMapping(gvk.GroupKind(), gvk.Version)\n\tdynamicInterface := regionEnv.DynamicClient.Resource(mapping.Resource).Namespace(regionEnv.Cfg.Namespace)\n\n\tpropagation := metav1.DeletePropagationForeground\n\tdeleteOptions := metav1.DeleteOptions{\n\t\tGracePeriodSeconds: int64Ref(0),\n\t\tPropagationPolicy: &propagation,\n\t}\n\n\tif wait {\n\t\tlistOptions := metav1.ListOptions{\n\t\t\tFieldSelector: fmt.Sprintf(\"metadata.name=%s\", job.GetName()),\n\t\t\tTimeoutSeconds: int64Ref(30),\n\t\t}\n\t\twatcher, err := dynamicInterface.Watch(regionEnv.Context, listOptions)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer watcher.Stop()\n\n\t\twatchCh := watcher.ResultChan()\n\t\terr = dynamicInterface.Delete(regionEnv.Context, job.GetName(), deleteOptions)\n\t\tif err != nil {\n\t\t\tif errors.IsNotFound(err) {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\treturn err\n\t\t}\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase <-regionEnv.Context.Done():\n\t\t\t\treturn regionEnv.Context.Err()\n\n\t\t\tcase event, ok := <-watchCh:\n\t\t\t\tif !ok {\n\t\t\t\t\treturn fmt.Errorf(\"timeout deleting job\")\n\t\t\t\t}\n\n\t\t\t\tif event.Type == watch.Deleted {\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\t\t\t\tif event.Type == watch.Error {\n\t\t\t\t\tregionEnv.Logger.Warnf(\"error reported during job deletion: %v\", event.Object)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t} else {\n\t\terr := dynamicInterface.Delete(regionEnv.Context, job.GetName(), deleteOptions)\n\t\tif err != nil {\n\t\t\tif errors.IsNotFound(err) {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func (in *PyTorchJob) DeepCopy() *PyTorchJob {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(PyTorchJob)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func NewJob(rule *config.Rule, process *stage.Process, window *batch.Window, group *batch.Group) (*Job, error) {\n\tjob := &Job{\n\t\tStatus: shared.StatusOK,\n\t\tRule: rule,\n\t\tProcess: process,\n\t\tWindow: window,\n\t\tGroup: group,\n\t}\n\n\tdest := rule.Dest.Clone()\n\tvar err error\n\tvar URIs []string\n\tif window != nil {\n\t\tURIs = window.URIs\n\t} else {\n\t\tURIs = []string{process.Source.URL}\n\t}\n\tif len(process.Params) == 0 {\n\t\tprocess.Params = make(map[string]interface{})\n\t}\n\tif group != nil {\n\t\tprocess.Params[shared.GroupID] = group.ID()\n\t\tprocess.GroupURL = group.URL\n\t}\n\texpander := process.Expander(URIs)\n\n\tprocess.DestTable = expander.ExpandAsText(process.DestTable)\n\tprocess.DoneProcessURL = expander.ExpandAsText(process.DoneProcessURL)\n\tprocess.FailedURL = expander.ExpandAsText(process.FailedURL)\n\tprocess.ProcessURL = expander.ExpandAsText(process.ProcessURL)\n\n\tprocess.Params[shared.EventIDKey] = process.EventID\n\tsource := process.Source\n\tif window != nil {\n\t\tsource = window.Source\n\t}\n\tif source == nil {\n\t\tsource = &stage.Source{Time: time.Now()}\n\t}\n\tif _, ok := process.Params[shared.DateKey]; !ok {\n\t\tprocess.Params[shared.DateKey] = source.Time.Format(shared.DateSuffixLayout)\n\t}\n\tif _, ok := process.Params[shared.HourKey]; !ok {\n\t\tprocess.Params[shared.HourKey] = source.Time.Format(\"03\")\n\t}\n\tjob.Load, err = dest.NewJobConfigurationLoad(process.Source, URIs...)\n\treturn job, err\n}", "func (jm *JobManager) LoadJob(job Job) error {\n\tjm.Lock()\n\tdefer jm.Unlock()\n\n\treturn jm.loadJobUnsafe(job)\n}", "func (c *Controller) RetryJob(jobID string) error {\n\tif utils.IsEmptyStr(jobID) {\n\t\treturn errors.New(\"empty job ID\")\n\t}\n\n\treturn c.backendPool.RetryJob(jobID)\n}", "func (c *Controller) StopJob(jobID string) error {\n\tif utils.IsEmptyStr(jobID) {\n\t\treturn errors.New(\"empty job ID\")\n\t}\n\n\treturn c.backendPool.StopJob(jobID)\n}", "func (s *service) DeleteJob(id string) error {\n\tfoundJob, err := s.repo.GetJob(id)\n\tif err != nil {\n\t\treturn httperror.NewNotFoundError(\"job not found\")\n\t}\n\ts.mu.Lock()\n\tjobCh, ok := s.jobWorkers[foundJob.ID]\n\ts.mu.Unlock()\n\tif ok {\n\t\tjobCh <- struct{}{}\n\t}\n\treturn s.repo.DeleteJob(foundJob)\n}", "func (qmap BuildQuestionJob) DoJob() interface{}{\n\tvar qmap1 map[string]interface{} =qmap\n\treturn makeQuestion(qmap1)\n\n}", "func (hjd HeavyJobDetails) AsJobDetails() (*JobDetails, bool) {\n\treturn nil, false\n}", "func (t *JobImpl) GetJob() *gojenkins.Job {\n\treturn t.Job\n}" ]
[ "0.60048664", "0.587857", "0.5687375", "0.5642202", "0.55156004", "0.55004555", "0.5362468", "0.53549623", "0.5266923", "0.51861054", "0.51524085", "0.513916", "0.51014316", "0.507694", "0.507012", "0.5016417", "0.50094414", "0.49602214", "0.4947756", "0.4905305", "0.49035007", "0.49010193", "0.48762828", "0.48523134", "0.48101923", "0.480921", "0.4796152", "0.4790604", "0.47740453", "0.47738612", "0.47322217", "0.47206286", "0.47152606", "0.46956822", "0.46914798", "0.46793574", "0.46704346", "0.46696764", "0.46574488", "0.46447268", "0.46442136", "0.46317625", "0.46266633", "0.46046668", "0.45925164", "0.45883965", "0.45854995", "0.45706075", "0.45608538", "0.45575023", "0.45447955", "0.4542276", "0.45419005", "0.45303154", "0.45194045", "0.45116183", "0.4500957", "0.44994944", "0.44979724", "0.44873282", "0.44834676", "0.44776326", "0.4473292", "0.44708604", "0.44612017", "0.4453397", "0.44445273", "0.44111732", "0.44058982", "0.43813133", "0.43774384", "0.43711826", "0.43618956", "0.43591163", "0.43583137", "0.4353242", "0.4344119", "0.43430167", "0.4341498", "0.43411085", "0.43271363", "0.4318972", "0.43155536", "0.43025577", "0.43024737", "0.42996818", "0.4297731", "0.42925942", "0.42910588", "0.4287063", "0.42869857", "0.4286034", "0.42836738", "0.42740718", "0.42730358", "0.4272386", "0.4272119", "0.4269081", "0.42660475", "0.4259869" ]
0.7853218
0
ExtractTypedJobInfos extract commonapi struct and infos from different typed job objects.
func ExtractTypedJobInfos(job metav1.Object) (kind string, spec map[v1.ReplicaType]*v1.ReplicaSpec, status v1.JobStatus, err error) { switch typed := job.(type) { case *trainingv1alpha1.TFJob: return trainingv1alpha1.TFJobKind, typed.Spec.TFReplicaSpecs, typed.Status, nil case *trainingv1alpha1.PyTorchJob: return trainingv1alpha1.PyTorchJobKind, typed.Spec.PyTorchReplicaSpecs, typed.Status, nil case *trainingv1alpha1.XGBoostJob: return trainingv1alpha1.XGBoostJobKind, typed.Spec.XGBReplicaSpecs, typed.Status.JobStatus, nil case *trainingv1alpha1.XDLJob: return trainingv1alpha1.XDLJobKind, typed.Spec.XDLReplicaSpecs, typed.Status, nil } return "", nil, v1.JobStatus{}, fmt.Errorf("unkonwn job kind, %s/%s", job.GetNamespace(), job.GetName()) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func GetAllJobInfo(\n\tctx context.Context,\n\tconn sqlexec.SQLExecutor,\n\tuser string,\n) ([]*JobInfo, error) {\n\tctx = util.WithInternalSourceType(ctx, kv.InternalLoadData)\n\trs, err := conn.ExecuteInternal(ctx,\n\t\t`SELECT\n\t\texpected_status,\n\t\tupdate_time >= DATE_SUB(CURRENT_TIMESTAMP(6), INTERVAL %? SECOND) AS is_alive,\n\t\tend_time,\n\t\tresult_message,\n\t\terror_message,\n\t\tstart_time,\n\n\t\tjob_id,\n\t\tdata_source,\n\t\ttable_schema,\n\t\ttable_name,\n\t\timport_mode,\n\t\tprogress,\n\t\tcreate_user\n\t\tFROM mysql.load_data_jobs\n\t\tWHERE create_user = %?;`,\n\t\tOfflineThresholdInSec, user)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer terror.Call(rs.Close)\n\trows, err := sqlexec.DrainRecordSet(ctx, rs, 1)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tret := make([]*JobInfo, 0, len(rows))\n\tfor _, row := range rows {\n\t\tjobInfo, err := getJobInfo(row)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tret = append(ret, jobInfo)\n\t}\n\n\treturn ret, nil\n}", "func (d *mongoDriver) JobInfo(ctx context.Context) <-chan amboy.JobInfo {\n\tinfos := make(chan amboy.JobInfo)\n\tgo func() {\n\t\tdefer close(infos)\n\t\tq := bson.M{}\n\t\td.modifyQueryForGroup(q)\n\n\t\titer, err := d.getCollection().Find(ctx,\n\t\t\tq,\n\t\t\t&options.FindOptions{\n\t\t\t\tSort: bson.M{\"status.mod_ts\": -1},\n\t\t\t\tProjection: bson.M{\n\t\t\t\t\t\"_id\": 1,\n\t\t\t\t\t\"status\": 1,\n\t\t\t\t\t\"retry_info\": 1,\n\t\t\t\t\t\"time_info\": 1,\n\t\t\t\t\t\"type\": 1,\n\t\t\t\t\t\"version\": 1,\n\t\t\t\t},\n\t\t\t})\n\t\tif err != nil {\n\t\t\tgrip.Warning(message.WrapError(err, message.Fields{\n\t\t\t\t\"message\": \"problem with query\",\n\t\t\t\t\"driver_id\": d.instanceID,\n\t\t\t\t\"service\": \"amboy.queue.mdb\",\n\t\t\t\t\"operation\": \"job info iterator\",\n\t\t\t\t\"is_group\": d.opts.UseGroups,\n\t\t\t\t\"group\": d.opts.GroupName,\n\t\t\t}))\n\t\t\treturn\n\t\t}\n\n\t\tfor iter.Next(ctx) {\n\t\t\tji := &registry.JobInterchange{}\n\t\t\tif err := iter.Decode(ji); err != nil {\n\t\t\t\tgrip.Warning(message.WrapError(err, message.Fields{\n\t\t\t\t\t\"message\": \"problem decoding job document into interchange job\",\n\t\t\t\t\t\"driver_id\": d.instanceID,\n\t\t\t\t\t\"service\": \"amboy.queue.mdb\",\n\t\t\t\t\t\"operation\": \"job info iterator\",\n\t\t\t\t\t\"is_group\": d.opts.UseGroups,\n\t\t\t\t\t\"group\": d.opts.GroupName,\n\t\t\t\t}))\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\td.removeMetadata(ji)\n\t\t\tinfo := amboy.JobInfo{\n\t\t\t\tID: ji.Name,\n\t\t\t\tStatus: ji.Status,\n\t\t\t\tTime: ji.TimeInfo,\n\t\t\t\tRetry: ji.RetryInfo,\n\t\t\t\tType: amboy.JobType{\n\t\t\t\t\tName: ji.Type,\n\t\t\t\t\tVersion: ji.Version,\n\t\t\t\t},\n\t\t\t}\n\n\t\t\tselect {\n\t\t\tcase <-ctx.Done():\n\t\t\t\treturn\n\t\t\tcase infos <- info:\n\t\t\t}\n\n\t\t}\n\t}()\n\n\treturn infos\n}", "func UnmarshalJob(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(Job)\n\terr = core.UnmarshalPrimitive(m, \"command_object\", &obj.CommandObject)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_object_id\", &obj.CommandObjectID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_name\", &obj.CommandName)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_parameter\", &obj.CommandParameter)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_options\", &obj.CommandOptions)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"inputs\", &obj.Inputs, UnmarshalVariableData)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"settings\", &obj.Settings, UnmarshalVariableData)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"tags\", &obj.Tags)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"id\", &obj.ID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"name\", &obj.Name)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"description\", &obj.Description)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"location\", &obj.Location)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"resource_group\", &obj.ResourceGroup)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"submitted_at\", &obj.SubmittedAt)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"submitted_by\", &obj.SubmittedBy)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"start_at\", &obj.StartAt)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"end_at\", &obj.EndAt)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"duration\", &obj.Duration)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"status\", &obj.Status, UnmarshalJobStatus)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"data\", &obj.Data, UnmarshalJobData)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"targets_ini\", &obj.TargetsIni)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"bastion\", &obj.Bastion, UnmarshalTargetResourceset)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"log_summary\", &obj.LogSummary, UnmarshalJobLogSummary)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"log_store_url\", &obj.LogStoreURL)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"state_store_url\", &obj.StateStoreURL)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"results_url\", &obj.ResultsURL)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"updated_at\", &obj.UpdatedAt)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func UnmarshalJobLite(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(JobLite)\n\terr = core.UnmarshalPrimitive(m, \"id\", &obj.ID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"name\", &obj.Name)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"description\", &obj.Description)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_object\", &obj.CommandObject)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_object_id\", &obj.CommandObjectID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_name\", &obj.CommandName)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"tags\", &obj.Tags)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"location\", &obj.Location)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"resource_group\", &obj.ResourceGroup)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"targets_ini\", &obj.TargetsIni)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"submitted_at\", &obj.SubmittedAt)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"submitted_by\", &obj.SubmittedBy)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"duration\", &obj.Duration)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"start_at\", &obj.StartAt)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"end_at\", &obj.EndAt)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"status\", &obj.Status, UnmarshalJobStatus)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"log_summary\", &obj.LogSummary, UnmarshalJobLogSummary)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"updated_at\", &obj.UpdatedAt)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func (c *CommonJobDetails) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"actions\":\n\t\t\terr = unpopulate(val, \"Actions\", &c.Actions)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"chainOfCustodySasKey\":\n\t\t\terr = unpopulate(val, \"ChainOfCustodySasKey\", &c.ChainOfCustodySasKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"contactDetails\":\n\t\t\terr = unpopulate(val, \"ContactDetails\", &c.ContactDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"copyLogDetails\":\n\t\t\tc.CopyLogDetails, err = unmarshalCopyLogDetailsClassificationArray(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataCenterCode\":\n\t\t\terr = unpopulate(val, \"DataCenterCode\", &c.DataCenterCode)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataExportDetails\":\n\t\t\terr = unpopulate(val, \"DataExportDetails\", &c.DataExportDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataImportDetails\":\n\t\t\terr = unpopulate(val, \"DataImportDetails\", &c.DataImportDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"datacenterAddress\":\n\t\t\tc.DatacenterAddress, err = unmarshalDatacenterAddressResponseClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"deliveryPackage\":\n\t\t\terr = unpopulate(val, \"DeliveryPackage\", &c.DeliveryPackage)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"deviceErasureDetails\":\n\t\t\terr = unpopulate(val, \"DeviceErasureDetails\", &c.DeviceErasureDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"expectedDataSizeInTeraBytes\":\n\t\t\terr = unpopulate(val, \"ExpectedDataSizeInTeraBytes\", &c.ExpectedDataSizeInTeraBytes)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"jobDetailsType\":\n\t\t\terr = unpopulate(val, \"JobDetailsType\", &c.JobDetailsType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"jobStages\":\n\t\t\terr = unpopulate(val, \"JobStages\", &c.JobStages)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"keyEncryptionKey\":\n\t\t\terr = unpopulate(val, \"KeyEncryptionKey\", &c.KeyEncryptionKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"lastMitigationActionOnJob\":\n\t\t\terr = unpopulate(val, \"LastMitigationActionOnJob\", &c.LastMitigationActionOnJob)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"preferences\":\n\t\t\terr = unpopulate(val, \"Preferences\", &c.Preferences)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"returnPackage\":\n\t\t\terr = unpopulate(val, \"ReturnPackage\", &c.ReturnPackage)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"reverseShipmentLabelSasKey\":\n\t\t\terr = unpopulate(val, \"ReverseShipmentLabelSasKey\", &c.ReverseShipmentLabelSasKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"shippingAddress\":\n\t\t\terr = unpopulate(val, \"ShippingAddress\", &c.ShippingAddress)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t\t}\n\t}\n\treturn nil\n}", "func getJobInfo(row chunk.Row) (*JobInfo, error) {\n\tvar err error\n\tjobInfo := JobInfo{\n\t\tJobID: row.GetInt64(6),\n\t\tDataSource: row.GetString(7),\n\t\tTableSchema: row.GetString(8),\n\t\tTableName: row.GetString(9),\n\t\tImportMode: row.GetString(10),\n\t\tProgress: row.GetString(11),\n\t\tUser: row.GetString(12),\n\t}\n\tjobInfo.Status, jobInfo.StatusMessage, err = getJobStatus(row)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &jobInfo, nil\n}", "func (jdt *JobDetailsType) UnmarshalJSON(body []byte) error {\n\tvar m map[string]*json.RawMessage\n\terr := json.Unmarshal(body, &m)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor k, v := range m {\n\t\tswitch k {\n\t\tcase \"copyProgress\":\n\t\t\tif v != nil {\n\t\t\t\tvar copyProgress []CopyProgress\n\t\t\t\terr = json.Unmarshal(*v, &copyProgress)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjdt.CopyProgress = &copyProgress\n\t\t\t}\n\t\tcase \"expectedDataSizeInTeraBytes\":\n\t\t\tif v != nil {\n\t\t\t\tvar expectedDataSizeInTeraBytes int32\n\t\t\t\terr = json.Unmarshal(*v, &expectedDataSizeInTeraBytes)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjdt.ExpectedDataSizeInTeraBytes = &expectedDataSizeInTeraBytes\n\t\t\t}\n\t\tcase \"jobStages\":\n\t\t\tif v != nil {\n\t\t\t\tvar jobStages []JobStages\n\t\t\t\terr = json.Unmarshal(*v, &jobStages)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjdt.JobStages = &jobStages\n\t\t\t}\n\t\tcase \"contactDetails\":\n\t\t\tif v != nil {\n\t\t\t\tvar contactDetails ContactDetails\n\t\t\t\terr = json.Unmarshal(*v, &contactDetails)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjdt.ContactDetails = &contactDetails\n\t\t\t}\n\t\tcase \"shippingAddress\":\n\t\t\tif v != nil {\n\t\t\t\tvar shippingAddress ShippingAddress\n\t\t\t\terr = json.Unmarshal(*v, &shippingAddress)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjdt.ShippingAddress = &shippingAddress\n\t\t\t}\n\t\tcase \"deliveryPackage\":\n\t\t\tif v != nil {\n\t\t\t\tvar deliveryPackage PackageShippingDetails\n\t\t\t\terr = json.Unmarshal(*v, &deliveryPackage)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjdt.DeliveryPackage = &deliveryPackage\n\t\t\t}\n\t\tcase \"returnPackage\":\n\t\t\tif v != nil {\n\t\t\t\tvar returnPackage PackageShippingDetails\n\t\t\t\terr = json.Unmarshal(*v, &returnPackage)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjdt.ReturnPackage = &returnPackage\n\t\t\t}\n\t\tcase \"destinationAccountDetails\":\n\t\t\tif v != nil {\n\t\t\t\tdestinationAccountDetails, err := unmarshalBasicDestinationAccountDetailsArray(*v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjdt.DestinationAccountDetails = &destinationAccountDetails\n\t\t\t}\n\t\tcase \"errorDetails\":\n\t\t\tif v != nil {\n\t\t\t\tvar errorDetails []JobErrorDetails\n\t\t\t\terr = json.Unmarshal(*v, &errorDetails)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjdt.ErrorDetails = &errorDetails\n\t\t\t}\n\t\tcase \"preferences\":\n\t\t\tif v != nil {\n\t\t\t\tvar preferences Preferences\n\t\t\t\terr = json.Unmarshal(*v, &preferences)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjdt.Preferences = &preferences\n\t\t\t}\n\t\tcase \"copyLogDetails\":\n\t\t\tif v != nil {\n\t\t\t\tcopyLogDetails, err := unmarshalBasicCopyLogDetailsArray(*v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjdt.CopyLogDetails = &copyLogDetails\n\t\t\t}\n\t\tcase \"reverseShipmentLabelSasKey\":\n\t\t\tif v != nil {\n\t\t\t\tvar reverseShipmentLabelSasKey string\n\t\t\t\terr = json.Unmarshal(*v, &reverseShipmentLabelSasKey)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjdt.ReverseShipmentLabelSasKey = &reverseShipmentLabelSasKey\n\t\t\t}\n\t\tcase \"chainOfCustodySasKey\":\n\t\t\tif v != nil {\n\t\t\t\tvar chainOfCustodySasKey string\n\t\t\t\terr = json.Unmarshal(*v, &chainOfCustodySasKey)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjdt.ChainOfCustodySasKey = &chainOfCustodySasKey\n\t\t\t}\n\t\tcase \"jobDetailsType\":\n\t\t\tif v != nil {\n\t\t\t\tvar jobDetailsType JobDetailsTypeEnum\n\t\t\t\terr = json.Unmarshal(*v, &jobDetailsType)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjdt.JobDetailsType = jobDetailsType\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func (l *Libvirt) DomainGetJobInfo(Dom Domain) (rType int32, rTimeElapsed uint64, rTimeRemaining uint64, rDataTotal uint64, rDataProcessed uint64, rDataRemaining uint64, rMemTotal uint64, rMemProcessed uint64, rMemRemaining uint64, rFileTotal uint64, rFileProcessed uint64, rFileRemaining uint64, err error) {\n\tvar buf []byte\n\n\targs := DomainGetJobInfoArgs {\n\t\tDom: Dom,\n\t}\n\n\tbuf, err = encode(&args)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tvar r response\n\tr, err = l.requestStream(163, constants.Program, buf, nil, nil)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// Return value unmarshaling\n\ttpd := typedParamDecoder{}\n\tct := map[string]xdr.TypeDecoder{\"libvirt.TypedParam\": tpd}\n\trdr := bytes.NewReader(r.Payload)\n\tdec := xdr.NewDecoderCustomTypes(rdr, 0, ct)\n\t// Type: int32\n\t_, err = dec.Decode(&rType)\n\tif err != nil {\n\t\treturn\n\t}\n\t// TimeElapsed: uint64\n\t_, err = dec.Decode(&rTimeElapsed)\n\tif err != nil {\n\t\treturn\n\t}\n\t// TimeRemaining: uint64\n\t_, err = dec.Decode(&rTimeRemaining)\n\tif err != nil {\n\t\treturn\n\t}\n\t// DataTotal: uint64\n\t_, err = dec.Decode(&rDataTotal)\n\tif err != nil {\n\t\treturn\n\t}\n\t// DataProcessed: uint64\n\t_, err = dec.Decode(&rDataProcessed)\n\tif err != nil {\n\t\treturn\n\t}\n\t// DataRemaining: uint64\n\t_, err = dec.Decode(&rDataRemaining)\n\tif err != nil {\n\t\treturn\n\t}\n\t// MemTotal: uint64\n\t_, err = dec.Decode(&rMemTotal)\n\tif err != nil {\n\t\treturn\n\t}\n\t// MemProcessed: uint64\n\t_, err = dec.Decode(&rMemProcessed)\n\tif err != nil {\n\t\treturn\n\t}\n\t// MemRemaining: uint64\n\t_, err = dec.Decode(&rMemRemaining)\n\tif err != nil {\n\t\treturn\n\t}\n\t// FileTotal: uint64\n\t_, err = dec.Decode(&rFileTotal)\n\tif err != nil {\n\t\treturn\n\t}\n\t// FileProcessed: uint64\n\t_, err = dec.Decode(&rFileProcessed)\n\tif err != nil {\n\t\treturn\n\t}\n\t// FileRemaining: uint64\n\t_, err = dec.Decode(&rFileRemaining)\n\tif err != nil {\n\t\treturn\n\t}\n\n\treturn\n}", "func GetJobInfo(\n\tctx context.Context,\n\tconn sqlexec.SQLExecutor,\n\tjobID int64,\n) (*JobInfo, error) {\n\tctx = util.WithInternalSourceType(ctx, kv.InternalLoadData)\n\trs, err := conn.ExecuteInternal(ctx,\n\t\t`SELECT\n\t\texpected_status,\n\t\tupdate_time >= DATE_SUB(CURRENT_TIMESTAMP(6), INTERVAL %? SECOND) AS is_alive,\n\t\tend_time,\n\t\tresult_message,\n\t\terror_message,\n\t\tstart_time,\n\n\t\tjob_id,\n\t\tdata_source,\n\t\ttable_schema,\n\t\ttable_name,\n\t\timport_mode,\n\t\tprogress,\n\t\tcreate_user\n\t\tFROM mysql.load_data_jobs\n\t\tWHERE job_id = %?;`,\n\t\tOfflineThresholdInSec, jobID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer terror.Call(rs.Close)\n\trows, err := sqlexec.DrainRecordSet(ctx, rs, 1)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(rows) != 1 {\n\t\treturn nil, fmt.Errorf(\"job %d not found\", jobID)\n\t}\n\n\treturn getJobInfo(rows[0])\n}", "func (c APIClient) GetMonitoringJobTypes() (MonitoringJobTypes, error) {\n\tvar mjt MonitoringJobTypes\n\t_, err := c.doHTTPUnmarshal(\"GET\", \"https://api.nsone.net/v1/monitoring/jobtypes\", nil, &mjt)\n\treturn mjt, err\n}", "func (t *DRMAATracker) JobInfo(jobID string) (drmaa2interface.JobInfo, error) {\n\t// we get the job info when the job is finished - we can also\n\t// use the DRM system specific calls (like on GE)\n\tstate, _, err := t.JobState(jobID)\n\tif err != nil {\n\t\treturn drmaa2interface.JobInfo{}, err\n\t}\n\tif state == drmaa2interface.Failed || state == drmaa2interface.Done {\n\t\t// job is in end state\n\t\tjinfo, err := t.session.Wait(jobID, 60)\n\t\tif err != nil {\n\t\t\treturn drmaa2interface.JobInfo{}, err\n\t\t}\n\t\treturn ConvertDRMAAJobInfoToDRMAA2JobInfo(&jinfo), nil\n\t}\n\treturn drmaa2interface.JobInfo{}, nil\n}", "func getFieldsAndTags(status string, result int, tls bool, codes ...int) (fields map[string]interface{}, tags map[string]string) {\n\tcodeTypes := []string{\n\t\t\"connect_code\",\n\t\t\"ehlo_code\",\n\t\t\"starttls_code\",\n\t\t\"from_code\",\n\t\t\"to_code\",\n\t\t\"data_code\",\n\t\t\"body_code\",\n\t\t\"quit_code\",\n\t}\n\n\tfields = map[string]interface{}{\n\t\t\"result_code\": uint64(result),\n\t\t\"connect_time\": 1.0,\n\t\t\"total_time\": 2.0,\n\t}\n\ttags = map[string]string{\n\t\t\"result\": status,\n\t\t\"server\": \"127.0.0.1\",\n\t\t\"port\": \"2004\",\n\t}\n\n\t// populate the codes provided into the corresponding metric name\n\t// codes are only provided if that step is executed\n\t// the last code is always for \"quit\"\n\tfor i, code := range codes {\n\t\tif i > 1 && !tls {\n\t\t\tfields[codeTypes[i+1]] = code\n\t\t} else {\n\t\t\tfields[codeTypes[i]] = code\n\t\t}\n\t}\n\n\treturn fields, tags\n}", "func (dt *Tracker) JobInfo(jobid string) (drmaa2interface.JobInfo, error) {\n\treturn dt.processTracker.JobInfo(jobid)\n}", "func NewInfo(job *bigquery.Job) *Info {\n\tstageInfo := activity.Parse(job.JobReference.JobId)\n\tstartTime := time.Unix(job.Statistics.StartTime/1000, 0)\n\tendTime := time.Unix(job.Statistics.EndTime/1000, 0)\n\tcreateTime := time.Unix(job.Statistics.CreationTime/1000, 0)\n\tinfo := &Info{\n\t\tProjectID: job.JobReference.ProjectId,\n\t\tJobID: job.Id,\n\t\tCreateTime: createTime,\n\t\tStartTime: startTime,\n\t\tEndTime: endTime,\n\t\tTimeTakenMs: int(job.Statistics.EndTime - job.Statistics.CreationTime),\n\t\tExecutionTimeMs: int(job.Statistics.EndTime - job.Statistics.StartTime),\n\t\tJobType: stageInfo.Action,\n\t\tDestinationTable: stageInfo.DestTable,\n\t}\n\tif job.Statistics.Load != nil {\n\t\tinfo.InputFileBytes = int(job.Statistics.Load.InputFileBytes)\n\t\tinfo.InputFiles = int(job.Statistics.Load.InputFiles)\n\t\tinfo.OutputBytes = int(job.Statistics.Load.OutputBytes)\n\t\tinfo.OutputRows = int(job.Statistics.Load.OutputRows)\n\t\tinfo.BadRecords = int(job.Statistics.Load.BadRecords)\n\t}\n\tinfo.TotalBytesProcessed = int(job.Statistics.TotalBytesProcessed)\n\tinfo.TotalSlotMs = int(job.Statistics.TotalSlotMs)\n\tif len(job.Statistics.ReservationUsage) > 0 {\n\t\tinfo.ReservationName = job.Statistics.ReservationUsage[0].Name\n\t}\n\tif job.Status != nil && len(job.Status.Errors) > 0 {\n\t\tif JSON, err := json.Marshal(job.Status.Errors); err == nil {\n\t\t\tinfo.Error = string(JSON)\n\t\t}\n\t}\n\tif job.Configuration != nil && job.Configuration.Load != nil {\n\t\tinfo.URIs = job.Configuration.Load.SourceUris\n\t\tif len(job.Configuration.Load.SourceUris) > 0 {\n\t\t\tinfo.URI = job.Configuration.Load.SourceUris[0]\n\t\t}\n\t}\n\n\treturn info\n}", "func (jd *JobDetails) UnmarshalJSON(body []byte) error {\n\tvar m map[string]*json.RawMessage\n\terr := json.Unmarshal(body, &m)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor k, v := range m {\n\t\tswitch k {\n\t\tcase \"expectedDataSizeInTeraBytes\":\n\t\t\tif v != nil {\n\t\t\t\tvar expectedDataSizeInTeraBytes int32\n\t\t\t\terr = json.Unmarshal(*v, &expectedDataSizeInTeraBytes)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjd.ExpectedDataSizeInTeraBytes = &expectedDataSizeInTeraBytes\n\t\t\t}\n\t\tcase \"jobStages\":\n\t\t\tif v != nil {\n\t\t\t\tvar jobStages []JobStages\n\t\t\t\terr = json.Unmarshal(*v, &jobStages)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjd.JobStages = &jobStages\n\t\t\t}\n\t\tcase \"contactDetails\":\n\t\t\tif v != nil {\n\t\t\t\tvar contactDetails ContactDetails\n\t\t\t\terr = json.Unmarshal(*v, &contactDetails)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjd.ContactDetails = &contactDetails\n\t\t\t}\n\t\tcase \"shippingAddress\":\n\t\t\tif v != nil {\n\t\t\t\tvar shippingAddress ShippingAddress\n\t\t\t\terr = json.Unmarshal(*v, &shippingAddress)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjd.ShippingAddress = &shippingAddress\n\t\t\t}\n\t\tcase \"deliveryPackage\":\n\t\t\tif v != nil {\n\t\t\t\tvar deliveryPackage PackageShippingDetails\n\t\t\t\terr = json.Unmarshal(*v, &deliveryPackage)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjd.DeliveryPackage = &deliveryPackage\n\t\t\t}\n\t\tcase \"returnPackage\":\n\t\t\tif v != nil {\n\t\t\t\tvar returnPackage PackageShippingDetails\n\t\t\t\terr = json.Unmarshal(*v, &returnPackage)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjd.ReturnPackage = &returnPackage\n\t\t\t}\n\t\tcase \"destinationAccountDetails\":\n\t\t\tif v != nil {\n\t\t\t\tdestinationAccountDetails, err := unmarshalBasicDestinationAccountDetailsArray(*v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjd.DestinationAccountDetails = &destinationAccountDetails\n\t\t\t}\n\t\tcase \"errorDetails\":\n\t\t\tif v != nil {\n\t\t\t\tvar errorDetails []JobErrorDetails\n\t\t\t\terr = json.Unmarshal(*v, &errorDetails)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjd.ErrorDetails = &errorDetails\n\t\t\t}\n\t\tcase \"preferences\":\n\t\t\tif v != nil {\n\t\t\t\tvar preferences Preferences\n\t\t\t\terr = json.Unmarshal(*v, &preferences)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjd.Preferences = &preferences\n\t\t\t}\n\t\tcase \"copyLogDetails\":\n\t\t\tif v != nil {\n\t\t\t\tcopyLogDetails, err := unmarshalBasicCopyLogDetailsArray(*v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjd.CopyLogDetails = &copyLogDetails\n\t\t\t}\n\t\tcase \"reverseShipmentLabelSasKey\":\n\t\t\tif v != nil {\n\t\t\t\tvar reverseShipmentLabelSasKey string\n\t\t\t\terr = json.Unmarshal(*v, &reverseShipmentLabelSasKey)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjd.ReverseShipmentLabelSasKey = &reverseShipmentLabelSasKey\n\t\t\t}\n\t\tcase \"chainOfCustodySasKey\":\n\t\t\tif v != nil {\n\t\t\t\tvar chainOfCustodySasKey string\n\t\t\t\terr = json.Unmarshal(*v, &chainOfCustodySasKey)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjd.ChainOfCustodySasKey = &chainOfCustodySasKey\n\t\t\t}\n\t\tcase \"jobDetailsType\":\n\t\t\tif v != nil {\n\t\t\t\tvar jobDetailsType JobDetailsTypeEnum\n\t\t\t\terr = json.Unmarshal(*v, &jobDetailsType)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjd.JobDetailsType = jobDetailsType\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func (jdt JobDetailsType) AsJobDetails() (*JobDetails, bool) {\n\treturn nil, false\n}", "func (s *Slurm) JobInfo(ctx context.Context, req *api.JobInfoRequest) (*api.JobInfoResponse, error) {\n\tinfo, err := s.client.SJobInfo(req.JobId)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"could not get job %d info\", req.JobId)\n\t}\n\n\tpInfo, err := mapSInfoToProtoInfo(info)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"could not convert slurm info into proto info\")\n\t}\n\n\tif len(pInfo) == 0 {\n\t\treturn nil, errors.New(\"job info slice is empty, probably invalid scontrol output\")\n\t}\n\n\treturn &api.JobInfoResponse{Info: pInfo}, nil\n}", "func (hjd *HeavyJobDetails) UnmarshalJSON(body []byte) error {\n\tvar m map[string]*json.RawMessage\n\terr := json.Unmarshal(body, &m)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor k, v := range m {\n\t\tswitch k {\n\t\tcase \"copyProgress\":\n\t\t\tif v != nil {\n\t\t\t\tvar copyProgress []CopyProgress\n\t\t\t\terr = json.Unmarshal(*v, &copyProgress)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\thjd.CopyProgress = &copyProgress\n\t\t\t}\n\t\tcase \"expectedDataSizeInTeraBytes\":\n\t\t\tif v != nil {\n\t\t\t\tvar expectedDataSizeInTeraBytes int32\n\t\t\t\terr = json.Unmarshal(*v, &expectedDataSizeInTeraBytes)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\thjd.ExpectedDataSizeInTeraBytes = &expectedDataSizeInTeraBytes\n\t\t\t}\n\t\tcase \"jobStages\":\n\t\t\tif v != nil {\n\t\t\t\tvar jobStages []JobStages\n\t\t\t\terr = json.Unmarshal(*v, &jobStages)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\thjd.JobStages = &jobStages\n\t\t\t}\n\t\tcase \"contactDetails\":\n\t\t\tif v != nil {\n\t\t\t\tvar contactDetails ContactDetails\n\t\t\t\terr = json.Unmarshal(*v, &contactDetails)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\thjd.ContactDetails = &contactDetails\n\t\t\t}\n\t\tcase \"shippingAddress\":\n\t\t\tif v != nil {\n\t\t\t\tvar shippingAddress ShippingAddress\n\t\t\t\terr = json.Unmarshal(*v, &shippingAddress)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\thjd.ShippingAddress = &shippingAddress\n\t\t\t}\n\t\tcase \"deliveryPackage\":\n\t\t\tif v != nil {\n\t\t\t\tvar deliveryPackage PackageShippingDetails\n\t\t\t\terr = json.Unmarshal(*v, &deliveryPackage)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\thjd.DeliveryPackage = &deliveryPackage\n\t\t\t}\n\t\tcase \"returnPackage\":\n\t\t\tif v != nil {\n\t\t\t\tvar returnPackage PackageShippingDetails\n\t\t\t\terr = json.Unmarshal(*v, &returnPackage)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\thjd.ReturnPackage = &returnPackage\n\t\t\t}\n\t\tcase \"destinationAccountDetails\":\n\t\t\tif v != nil {\n\t\t\t\tdestinationAccountDetails, err := unmarshalBasicDestinationAccountDetailsArray(*v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\thjd.DestinationAccountDetails = &destinationAccountDetails\n\t\t\t}\n\t\tcase \"errorDetails\":\n\t\t\tif v != nil {\n\t\t\t\tvar errorDetails []JobErrorDetails\n\t\t\t\terr = json.Unmarshal(*v, &errorDetails)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\thjd.ErrorDetails = &errorDetails\n\t\t\t}\n\t\tcase \"preferences\":\n\t\t\tif v != nil {\n\t\t\t\tvar preferences Preferences\n\t\t\t\terr = json.Unmarshal(*v, &preferences)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\thjd.Preferences = &preferences\n\t\t\t}\n\t\tcase \"copyLogDetails\":\n\t\t\tif v != nil {\n\t\t\t\tcopyLogDetails, err := unmarshalBasicCopyLogDetailsArray(*v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\thjd.CopyLogDetails = &copyLogDetails\n\t\t\t}\n\t\tcase \"reverseShipmentLabelSasKey\":\n\t\t\tif v != nil {\n\t\t\t\tvar reverseShipmentLabelSasKey string\n\t\t\t\terr = json.Unmarshal(*v, &reverseShipmentLabelSasKey)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\thjd.ReverseShipmentLabelSasKey = &reverseShipmentLabelSasKey\n\t\t\t}\n\t\tcase \"chainOfCustodySasKey\":\n\t\t\tif v != nil {\n\t\t\t\tvar chainOfCustodySasKey string\n\t\t\t\terr = json.Unmarshal(*v, &chainOfCustodySasKey)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\thjd.ChainOfCustodySasKey = &chainOfCustodySasKey\n\t\t\t}\n\t\tcase \"jobDetailsType\":\n\t\t\tif v != nil {\n\t\t\t\tvar jobDetailsType JobDetailsTypeEnum\n\t\t\t\terr = json.Unmarshal(*v, &jobDetailsType)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\thjd.JobDetailsType = jobDetailsType\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func (q *Queue) JobInfo(jobUUID string) common.Job {\n\tlog.WithField(\"job\", jobUUID).Debug(\"Gathering information on job.\")\n\tq.Lock()\n\tdefer q.Unlock()\n\n\tfor _, job := range q.stack {\n\t\tif job.UUID == jobUUID {\n\t\t\treturn job\n\t\t}\n\t}\n\n\treturn common.Job{}\n}", "func (j *JobDetails) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", j, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"actions\":\n\t\t\terr = unpopulate(val, \"Actions\", &j.Actions)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"chainOfCustodySasKey\":\n\t\t\terr = unpopulate(val, \"ChainOfCustodySasKey\", &j.ChainOfCustodySasKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"contactDetails\":\n\t\t\terr = unpopulate(val, \"ContactDetails\", &j.ContactDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"copyLogDetails\":\n\t\t\tj.CopyLogDetails, err = unmarshalCopyLogDetailsClassificationArray(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"copyProgress\":\n\t\t\terr = unpopulate(val, \"CopyProgress\", &j.CopyProgress)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataCenterCode\":\n\t\t\terr = unpopulate(val, \"DataCenterCode\", &j.DataCenterCode)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataExportDetails\":\n\t\t\terr = unpopulate(val, \"DataExportDetails\", &j.DataExportDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataImportDetails\":\n\t\t\terr = unpopulate(val, \"DataImportDetails\", &j.DataImportDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"datacenterAddress\":\n\t\t\tj.DatacenterAddress, err = unmarshalDatacenterAddressResponseClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"deliveryPackage\":\n\t\t\terr = unpopulate(val, \"DeliveryPackage\", &j.DeliveryPackage)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"deviceErasureDetails\":\n\t\t\terr = unpopulate(val, \"DeviceErasureDetails\", &j.DeviceErasureDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"devicePassword\":\n\t\t\terr = unpopulate(val, \"DevicePassword\", &j.DevicePassword)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"expectedDataSizeInTeraBytes\":\n\t\t\terr = unpopulate(val, \"ExpectedDataSizeInTeraBytes\", &j.ExpectedDataSizeInTeraBytes)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"jobDetailsType\":\n\t\t\terr = unpopulate(val, \"JobDetailsType\", &j.JobDetailsType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"jobStages\":\n\t\t\terr = unpopulate(val, \"JobStages\", &j.JobStages)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"keyEncryptionKey\":\n\t\t\terr = unpopulate(val, \"KeyEncryptionKey\", &j.KeyEncryptionKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"lastMitigationActionOnJob\":\n\t\t\terr = unpopulate(val, \"LastMitigationActionOnJob\", &j.LastMitigationActionOnJob)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"preferences\":\n\t\t\terr = unpopulate(val, \"Preferences\", &j.Preferences)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"returnPackage\":\n\t\t\terr = unpopulate(val, \"ReturnPackage\", &j.ReturnPackage)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"reverseShipmentLabelSasKey\":\n\t\t\terr = unpopulate(val, \"ReverseShipmentLabelSasKey\", &j.ReverseShipmentLabelSasKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"shippingAddress\":\n\t\t\terr = unpopulate(val, \"ShippingAddress\", &j.ShippingAddress)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", j, err)\n\t\t}\n\t}\n\treturn nil\n}", "func NewJobInfo(input string) (JobInfo, error) {\n\tvar ji JobInfo\n\terr := xml.Unmarshal([]byte(input), &ji)\n\n\tif err != nil {\n\t\treturn JobInfo{}, err\n\t}\n\n\tdeleteTargets := make(map[int]Job)\n\n\t//Handle extrapolation of pending tasks\n\n\tfor k, p := range ji.PendingJobs.JobList {\n\t\tif DoesJobContainTaskRange(p) {\n\t\t\t//Mark for deletion and substitution\n\t\t\tdeleteTargets[k] = p\n\t\t}\n\t}\n\n\t//If anything comes up as an extrapolatable task list, we need to extrapolate to multiple job entries and remove the original listing.\n\tif len(deleteTargets) > 0 {\n\t\t//Reiterate over collected jobs to cleanup and reconstruct\n\t\tfor k, p := range deleteTargets {\n\n\t\t\tjobs, err := ExtrapolateTasksToJobs(p)\n\n\t\t\tif err != nil {\n\t\t\t\t//We can't do anything with this entry. Just continue along\n\t\t\t\tlog.Error(\"An error occurred trying to extrapolate Task range into JobList\", err)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t//Remove the target Job\n\t\t\tji.PendingJobs.JobList = append(ji.PendingJobs.JobList[:k], ji.PendingJobs.JobList[k+1:]...)\n\n\t\t\t//Append Extrapolated Jobs\n\t\t\tji.PendingJobs.JobList = append(ji.PendingJobs.JobList, jobs...)\n\t\t}\n\n\t\t//Sort the slice after all the shuffling By Job Number and Task IDß\n\t\tsort.Slice(ji.PendingJobs.JobList, func(i, j int) bool {\n\t\t\treturn ji.PendingJobs.JobList[i].JBJobNumber < ji.PendingJobs.JobList[j].JBJobNumber && ji.PendingJobs.JobList[i].Tasks.TaskID < ji.PendingJobs.JobList[j].Tasks.TaskID\n\t\t})\n\t}\n\n\treturn ji, nil\n}", "func ExtractJobs(r pagination.Page) ([]Job, error) {\n\tvar s []Job\n\terr := r.(JobPage).Result.ExtractIntoSlicePtr(&s, \"job_list\")\n\treturn s, err\n}", "func extractJob(card *goquery.Selection,c chan<- extractedJob){\n\tid,_ := card.Attr(\"data-jk\")\n\ttitle := CleanStrings(card.Find(\".jobTitle>span\").Text())\n\tlocation := CleanStrings(card.Find(\".companyLocation\").Text())\n\tsalary := CleanStrings(card.Find(\".salary-snippet\").Text())\n\tsummary := CleanStrings(card.Find(\".summary\").Text())\n\tc <- extractedJob{\n\t\tid: id,\n\t\ttitle: title,\n\t\tlocation: location,\n\t\tsalary: salary,\n\t\tsummary: summary,\n\t}\n}", "func AsExtractable(input interface{}) (string, map[string]interface{}) {\n\tvar extractableOutput string\n\tvar structuredOutput data.Map\n\tswitch value := input.(type) {\n\tcase string:\n\t\textractableOutput = value\n\tcase []byte:\n\t\textractableOutput = string(value)\n\tcase []interface{}:\n\t\tif len(value) > 0 {\n\t\t\tif toolbox.IsString(value[0]) {\n\t\t\t\textractableOutput = toolbox.AsString(value[0])\n\t\t\t} else {\n\t\t\t\tstructuredOutput = AsDataMap(value[0])\n\t\t\t}\n\t\t}\n\tdefault:\n\t\tstructuredOutput = AsDataMap(value)\n\t}\n\tif extractableOutput != \"\" {\n\t\tif toolbox.IsStructuredJSON(extractableOutput) {\n\t\t\tif strings.HasPrefix(strings.Trim(extractableOutput, \" \\r\\n\"), \"[\") {\n\t\t\t\tstructuredOutput = data.NewMap()\n\t\t\t\tif aSlice, err := toolbox.JSONToSlice(extractableOutput); err == nil {\n\t\t\t\t\tstructuredOutput.Put(\"value\", aSlice)\n\t\t\t\t}\n\t\t\t} else if aMap, err := toolbox.JSONToMap(extractableOutput); err == nil {\n\t\t\t\tstructuredOutput = data.Map(aMap)\n\t\t\t}\n\t\t}\n\t}\n\treturn extractableOutput, structuredOutput\n}", "func (s JobProcessDetails) MarshalFields(e protocol.FieldEncoder) error {\n\tif s.NumberOfCanceledThings != nil {\n\t\tv := *s.NumberOfCanceledThings\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"numberOfCanceledThings\", protocol.Int64Value(v), metadata)\n\t}\n\tif s.NumberOfFailedThings != nil {\n\t\tv := *s.NumberOfFailedThings\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"numberOfFailedThings\", protocol.Int64Value(v), metadata)\n\t}\n\tif s.NumberOfInProgressThings != nil {\n\t\tv := *s.NumberOfInProgressThings\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"numberOfInProgressThings\", protocol.Int64Value(v), metadata)\n\t}\n\tif s.NumberOfQueuedThings != nil {\n\t\tv := *s.NumberOfQueuedThings\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"numberOfQueuedThings\", protocol.Int64Value(v), metadata)\n\t}\n\tif s.NumberOfRejectedThings != nil {\n\t\tv := *s.NumberOfRejectedThings\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"numberOfRejectedThings\", protocol.Int64Value(v), metadata)\n\t}\n\tif s.NumberOfRemovedThings != nil {\n\t\tv := *s.NumberOfRemovedThings\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"numberOfRemovedThings\", protocol.Int64Value(v), metadata)\n\t}\n\tif s.NumberOfSucceededThings != nil {\n\t\tv := *s.NumberOfSucceededThings\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"numberOfSucceededThings\", protocol.Int64Value(v), metadata)\n\t}\n\tif s.NumberOfTimedOutThings != nil {\n\t\tv := *s.NumberOfTimedOutThings\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"numberOfTimedOutThings\", protocol.Int64Value(v), metadata)\n\t}\n\tif s.ProcessingTargets != nil {\n\t\tv := s.ProcessingTargets\n\n\t\tmetadata := protocol.Metadata{}\n\t\tls0 := e.List(protocol.BodyTarget, \"processingTargets\", metadata)\n\t\tls0.Start()\n\t\tfor _, v1 := range v {\n\t\t\tls0.ListAddValue(protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v1)})\n\t\t}\n\t\tls0.End()\n\n\t}\n\treturn nil\n}", "func (h *HeavyJobDetails) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", h, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"actions\":\n\t\t\terr = unpopulate(val, \"Actions\", &h.Actions)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"chainOfCustodySasKey\":\n\t\t\terr = unpopulate(val, \"ChainOfCustodySasKey\", &h.ChainOfCustodySasKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"contactDetails\":\n\t\t\terr = unpopulate(val, \"ContactDetails\", &h.ContactDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"copyLogDetails\":\n\t\t\th.CopyLogDetails, err = unmarshalCopyLogDetailsClassificationArray(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"copyProgress\":\n\t\t\terr = unpopulate(val, \"CopyProgress\", &h.CopyProgress)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataCenterCode\":\n\t\t\terr = unpopulate(val, \"DataCenterCode\", &h.DataCenterCode)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataExportDetails\":\n\t\t\terr = unpopulate(val, \"DataExportDetails\", &h.DataExportDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataImportDetails\":\n\t\t\terr = unpopulate(val, \"DataImportDetails\", &h.DataImportDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"datacenterAddress\":\n\t\t\th.DatacenterAddress, err = unmarshalDatacenterAddressResponseClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"deliveryPackage\":\n\t\t\terr = unpopulate(val, \"DeliveryPackage\", &h.DeliveryPackage)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"deviceErasureDetails\":\n\t\t\terr = unpopulate(val, \"DeviceErasureDetails\", &h.DeviceErasureDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"devicePassword\":\n\t\t\terr = unpopulate(val, \"DevicePassword\", &h.DevicePassword)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"expectedDataSizeInTeraBytes\":\n\t\t\terr = unpopulate(val, \"ExpectedDataSizeInTeraBytes\", &h.ExpectedDataSizeInTeraBytes)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"jobDetailsType\":\n\t\t\terr = unpopulate(val, \"JobDetailsType\", &h.JobDetailsType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"jobStages\":\n\t\t\terr = unpopulate(val, \"JobStages\", &h.JobStages)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"keyEncryptionKey\":\n\t\t\terr = unpopulate(val, \"KeyEncryptionKey\", &h.KeyEncryptionKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"lastMitigationActionOnJob\":\n\t\t\terr = unpopulate(val, \"LastMitigationActionOnJob\", &h.LastMitigationActionOnJob)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"preferences\":\n\t\t\terr = unpopulate(val, \"Preferences\", &h.Preferences)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"returnPackage\":\n\t\t\terr = unpopulate(val, \"ReturnPackage\", &h.ReturnPackage)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"reverseShipmentLabelSasKey\":\n\t\t\terr = unpopulate(val, \"ReverseShipmentLabelSasKey\", &h.ReverseShipmentLabelSasKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"shippingAddress\":\n\t\t\terr = unpopulate(val, \"ShippingAddress\", &h.ShippingAddress)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", h, err)\n\t\t}\n\t}\n\treturn nil\n}", "func (r *Request) GetInfo() ([]string, []string, []string) {\n\tvar tags, fields, types []string\n\tval := reflect.ValueOf(r).Elem()\n\tfor i := 0; i < val.NumField(); i++ {\n\t\tvalueField := val.Field(i)\n\t\tvaluestring := fmt.Sprintf(\"%v\", valueField.Interface())\n\t\tfields = append(fields, valuestring)\n\t\ttypefield := val.Type().Field(i)\n\t\ttypes = append(types, typefield.Name)\n\t\ttag := typefield.Tag\n\t\ttags = append(tags, tag.Get(\"json\"))\n\n\t}\n\treturn tags, fields, types\n}", "func (l *Libvirt) DomainGetBlockJobInfo(Dom Domain, Path string, Flags uint32) (rFound int32, rType int32, rBandwidth uint64, rCur uint64, rEnd uint64, err error) {\n\tvar buf []byte\n\n\targs := DomainGetBlockJobInfoArgs {\n\t\tDom: Dom,\n\t\tPath: Path,\n\t\tFlags: Flags,\n\t}\n\n\tbuf, err = encode(&args)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tvar r response\n\tr, err = l.requestStream(238, constants.Program, buf, nil, nil)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// Return value unmarshaling\n\ttpd := typedParamDecoder{}\n\tct := map[string]xdr.TypeDecoder{\"libvirt.TypedParam\": tpd}\n\trdr := bytes.NewReader(r.Payload)\n\tdec := xdr.NewDecoderCustomTypes(rdr, 0, ct)\n\t// Found: int32\n\t_, err = dec.Decode(&rFound)\n\tif err != nil {\n\t\treturn\n\t}\n\t// Type: int32\n\t_, err = dec.Decode(&rType)\n\tif err != nil {\n\t\treturn\n\t}\n\t// Bandwidth: uint64\n\t_, err = dec.Decode(&rBandwidth)\n\tif err != nil {\n\t\treturn\n\t}\n\t// Cur: uint64\n\t_, err = dec.Decode(&rCur)\n\tif err != nil {\n\t\treturn\n\t}\n\t// End: uint64\n\t_, err = dec.Decode(&rEnd)\n\tif err != nil {\n\t\treturn\n\t}\n\n\treturn\n}", "func externalTypeInfoForGoTypes(gts map[goType]bool) (map[goType]avrotypemap.ExternalTypeResult, error) {\n\n\tpkgs := make(map[string]int)\n\tvar pkgPaths []string\n\taddPkg := func(pkgPath string) {\n\t\tif _, ok := pkgs[pkgPath]; !ok {\n\t\t\tpkgs[pkgPath] = len(pkgPaths)\n\t\t\tpkgPaths = append(pkgPaths, pkgPath)\n\t\t}\n\t}\n\taddPkg(\"github.com/heetch/avro\")\n\taddPkg(\"github.com/heetch/avro/cmd/avrogo/avrotypemap\")\n\tfor gt := range gts {\n\t\taddPkg(gt.PkgPath)\n\t}\n\tmp := typeInfoMainParams{\n\t\tImportIDs: make(map[string]string),\n\t}\n\tfor _, p := range pkgPaths {\n\t\tmp.Imports = append(mp.Imports, p)\n\t\t// TODO make sure there's no duplicate name.\n\t\tmp.ImportIDs[p] = importPathToName(p)\n\t}\n\tfor gt := range gts {\n\t\tmp.Types = append(mp.Types, gt)\n\t}\n\tvar buf bytes.Buffer\n\tif err := typeInfoMainTemplate.Execute(&buf, mp); err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot execute type info main template: %v\", err)\n\t}\n\tresultData, err := format.Source(buf.Bytes())\n\tif err != nil {\n\t\tfmt.Printf(\"%s\\n\", buf.Bytes())\n\t\treturn nil, fmt.Errorf(\"cannot format typeinfo source: %v\", err)\n\t}\n\tf, err := os.CreateTemp(*dirFlag, \"avro-introspect*.go\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tprog := f.Name()\n\tdefer os.Remove(prog)\n\tdefer f.Close()\n\tif _, err := f.Write(resultData); err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot write %q: %v\", f.Name(), err)\n\t}\n\tf.Close()\n\tvar runStdout bytes.Buffer\n\tcmd := exec.Command(\"go\", \"run\", filepath.Base(prog))\n\tcmd.Dir = *dirFlag\n\tcmd.Stdout = &runStdout\n\tcmd.Stderr = os.Stderr\n\tif err := cmd.Run(); err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to run introspect program: %v\", err)\n\t}\n\tvar resultSlice []avrotypemap.ExternalTypeResult\n\tif err := json.Unmarshal(runStdout.Bytes(), &resultSlice); err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot unmarshal introspect output %q: %v\", runStdout.Bytes(), err)\n\t}\n\tif len(resultSlice) != len(gts) {\n\t\treturn nil, fmt.Errorf(\"unexpected result count, got %d want %d\", len(resultSlice), len(gts))\n\t}\n\tresults := make(map[goType]avrotypemap.ExternalTypeResult)\n\tfor i, result := range resultSlice {\n\t\tresults[mp.Types[i]] = result\n\t}\n\treturn results, nil\n}", "func (obj *GenericObject) GetChildInfos(ctx context.Context) ([]*NxInfo, error) {\n\tresult := &struct {\n\t\tInfos []*NxInfo `json:\"qInfos\"`\n\t}{}\n\terr := obj.RPC(ctx, \"GetChildInfos\", result)\n\treturn result.Infos, err\n}", "func flattenStoredInfoType(c *Client, i interface{}, res *StoredInfoType) *StoredInfoType {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\tif len(m) == 0 {\n\t\treturn nil\n\t}\n\n\tresultRes := &StoredInfoType{}\n\tresultRes.Name = dcl.SelfLinkToName(dcl.FlattenString(m[\"name\"]))\n\tresultRes.DisplayName = dcl.FlattenString(m[\"displayName\"])\n\tresultRes.Description = dcl.FlattenString(m[\"description\"])\n\tresultRes.LargeCustomDictionary = flattenStoredInfoTypeLargeCustomDictionary(c, m[\"largeCustomDictionary\"], res)\n\tresultRes.Dictionary = flattenStoredInfoTypeDictionary(c, m[\"dictionary\"], res)\n\tresultRes.Regex = flattenStoredInfoTypeRegex(c, m[\"regex\"], res)\n\tresultRes.Parent = dcl.FlattenString(m[\"parent\"])\n\tresultRes.Location = dcl.FlattenString(m[\"location\"])\n\n\treturn resultRes\n}", "func (jdt JobDetailsType) AsBasicJobDetails() (BasicJobDetails, bool) {\n\treturn &jdt, true\n}", "func (c *Configuration) JobInfoFiles() ([]string, error) {\n\tfileInfos, err := ioutil.ReadDir(c.JobInfoDir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tres := []string{}\n\tfor i := 0; i<len(fileInfos); i++ {\n\t\tfileInfo := fileInfos[i]\n\t\tname := fileInfo.Name()\n\t\tif strings.HasSuffix(name, \".json\") {\n\t\t\tres = append(res, name)\n\t\t}\n\t}\n\n\treturn res, nil\n}", "func expandTypes(api, need map[name]interface{}) map[name]interface{} {\n\tret := map[name]interface{}{}\n\n\tfor n, i := range need {\n\t\tret[n] = i\n\t\tswitch v := i.(type) {\n\t\tcase command:\n\t\t\taddName(api, ret, v.Name)\n\t\t\tif v.BoxedInput {\n\t\t\t\taddName(api, ret, v.Inputs.Ref)\n\t\t\t} else {\n\t\t\t\tfor _, f := range v.Inputs.Fields(api) {\n\t\t\t\t\taddName(api, ret, f.Type)\n\t\t\t\t}\n\t\t\t}\n\t\t\tif v.Output.Type != \"\" {\n\t\t\t\taddName(api, ret, v.Output.Type)\n\t\t\t}\n\t\tcase event:\n\t\t\taddName(api, ret, v.Name)\n\t\t\tif v.BoxedData {\n\t\t\t\taddName(api, ret, v.Data.Ref)\n\t\t\t} else {\n\t\t\t\tfor _, f := range v.Data.Fields(api) {\n\t\t\t\t\taddName(api, ret, f.Type)\n\t\t\t\t}\n\t\t\t}\n\t\tcase structType:\n\t\t\taddName(api, ret, v.Name)\n\t\t\tfor _, f := range v.Fields {\n\t\t\t\taddName(api, ret, f.Type)\n\t\t\t}\n\t\t\tif v.Base != \"\" {\n\t\t\t\tfor _, f := range api[v.Base].(structType).Fields {\n\t\t\t\t\taddName(api, ret, f.Type)\n\t\t\t\t}\n\t\t\t}\n\t\tcase simpleUnion:\n\t\t\taddName(api, ret, v.Name)\n\t\t\tfor _, typ := range v.Options {\n\t\t\t\taddName(api, ret, typ)\n\t\t\t}\n\t\tcase flatUnion:\n\t\t\taddName(api, ret, v.Name)\n\t\t\tfor _, f := range v.Base.Fields(api) {\n\t\t\t\taddName(api, ret, f.Type)\n\t\t\t}\n\t\t\tfor _, typ := range v.Options {\n\t\t\t\tfor _, f := range api[typ].(structType).Fields {\n\t\t\t\t\taddName(api, ret, f.Type)\n\t\t\t\t}\n\t\t\t}\n\t\tcase alternate:\n\t\t\taddName(api, ret, v.Name)\n\t\t\tfor _, typ := range v.Options {\n\t\t\t\taddName(api, ret, typ)\n\t\t\t}\n\t\tcase enum:\n\t\t\taddName(api, ret, v.Name)\n\t\t}\n\t}\n\treturn ret\n}", "func (j *Job) readMetadata() (JobMetadata, error) {\n\tdata, appErr := j.pluginAPI.KVGet(j.key)\n\tif appErr != nil {\n\t\treturn JobMetadata{}, errors.Wrap(appErr, \"failed to read data\")\n\t}\n\n\tif data == nil {\n\t\treturn JobMetadata{}, nil\n\t}\n\n\tvar metadata JobMetadata\n\terr := json.Unmarshal(data, &metadata)\n\tif err != nil {\n\t\treturn JobMetadata{}, errors.Wrap(err, \"failed to decode data\")\n\t}\n\n\treturn metadata, nil\n}", "func flattenStoredInfoTypeLargeCustomDictionary(c *Client, i interface{}, res *StoredInfoType) *StoredInfoTypeLargeCustomDictionary {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &StoredInfoTypeLargeCustomDictionary{}\n\n\tif dcl.IsEmptyValueIndirect(i) {\n\t\treturn EmptyStoredInfoTypeLargeCustomDictionary\n\t}\n\tr.OutputPath = flattenStoredInfoTypeLargeCustomDictionaryOutputPath(c, m[\"outputPath\"], res)\n\tr.CloudStorageFileSet = flattenStoredInfoTypeLargeCustomDictionaryCloudStorageFileSet(c, m[\"cloudStorageFileSet\"], res)\n\tr.BigQueryField = flattenStoredInfoTypeLargeCustomDictionaryBigQueryField(c, m[\"bigQueryField\"], res)\n\n\treturn r\n}", "func (j *JobInput) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", j, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"@odata.type\":\n\t\t\terr = unpopulate(val, \"ODataType\", &j.ODataType)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", j, err)\n\t\t}\n\t}\n\treturn nil\n}", "func (bd *LocalTargetBuildAndDeployer) extract(specs []model.TargetSpec) []model.LocalTarget {\n\tvar targs []model.LocalTarget\n\tfor _, s := range specs {\n\t\tswitch s := s.(type) {\n\t\tcase model.LocalTarget:\n\t\t\ttargs = append(targs, s)\n\t\t}\n\t}\n\treturn targs\n}", "func GetInfo(result []interface{}, index int)map[string]interface{}{\n\tvar info map[string]interface{}\n\tif index < len(result){\n\t\tinfo = result[index].(map[string]interface{})\n\t\t// point := info[\"point\"]\n\t\treturn info\n\t}\n\treturn info\n\n}", "func (api *ServerAPI) GetKnownJobs() (resultFromJenkins *Status, err error) {\n\tresp, err := http.Get(fmt.Sprintf(\"%v/api/json?tree=jobs[name,color]\", api.ServerLocation))\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer func() { _ = resp.Body.Close() }()\n\tresultFromJenkins = &Status{}\n\terr = json.NewDecoder(resp.Body).Decode(&resultFromJenkins)\n\treturn resultFromJenkins, nil\n}", "func flattenStoredInfoTypeLargeCustomDictionaryBigQueryFieldTable(c *Client, i interface{}, res *StoredInfoType) *StoredInfoTypeLargeCustomDictionaryBigQueryFieldTable {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &StoredInfoTypeLargeCustomDictionaryBigQueryFieldTable{}\n\n\tif dcl.IsEmptyValueIndirect(i) {\n\t\treturn EmptyStoredInfoTypeLargeCustomDictionaryBigQueryFieldTable\n\t}\n\tr.ProjectId = dcl.FlattenString(m[\"projectId\"])\n\tr.DatasetId = dcl.FlattenString(m[\"datasetId\"])\n\tr.TableId = dcl.FlattenString(m[\"tableId\"])\n\n\treturn r\n}", "func goPackageInfo(details []*ptypes.Any) *gopb.GoPackageInfo {\n\tfor _, msg := range details {\n\t\tvar info gopb.GoPackageInfo\n\t\tif err := ptypes.UnmarshalAny(msg, &info); err == nil {\n\t\t\treturn &info\n\t\t}\n\t}\n\treturn nil\n}", "func handleInfoDict(ctx *Context, d Dict) (err error) {\n\n\tfor key, value := range d {\n\n\t\tswitch key {\n\n\t\tcase \"Title\":\n\t\t\tlog.Write.Println(\"found Title\")\n\n\t\tcase \"Author\":\n\t\t\tlog.Write.Println(\"found Author\")\n\t\t\t// Record for stats.\n\t\t\tctx.Author, err = ctx.DereferenceText(value)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tctx.Author = csvSafeString(ctx.Author)\n\n\t\tcase \"Subject\":\n\t\t\tlog.Write.Println(\"found Subject\")\n\n\t\tcase \"Keywords\":\n\t\t\tlog.Write.Println(\"found Keywords\")\n\n\t\tcase \"Creator\":\n\t\t\tlog.Write.Println(\"found Creator\")\n\t\t\t// Record for stats.\n\t\t\tctx.Creator, err = ctx.DereferenceText(value)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tctx.Creator = csvSafeString(ctx.Creator)\n\n\t\tcase \"Producer\", \"CreationDate\", \"ModDate\":\n\t\t\t// pdfcpu will modify these as direct dict entries.\n\t\t\tlog.Write.Printf(\"found %s\", key)\n\t\t\tif indRef, ok := value.(IndirectRef); ok {\n\t\t\t\t// Get rid of these extra objects.\n\t\t\t\tctx.Optimize.DuplicateInfoObjects[int(indRef.ObjectNumber)] = true\n\t\t\t}\n\n\t\tcase \"Trapped\":\n\t\t\tlog.Write.Println(\"found Trapped\")\n\n\t\tdefault:\n\t\t\tlog.Write.Printf(\"handleInfoDict: found out of spec entry %s %v\\n\", key, value)\n\n\t\t}\n\t}\n\n\treturn nil\n}", "func UnmarshalJobData(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(JobData)\n\terr = core.UnmarshalPrimitive(m, \"job_type\", &obj.JobType)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"action_job_data\", &obj.ActionJobData, UnmarshalJobDataAction)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func expandStoredInfoType(c *Client, f *StoredInfoType) (map[string]interface{}, error) {\n\tm := make(map[string]interface{})\n\tres := f\n\t_ = res\n\tif v := f.Name; dcl.ValueShouldBeSent(v) {\n\t\tm[\"name\"] = v\n\t}\n\tif v := f.DisplayName; dcl.ValueShouldBeSent(v) {\n\t\tm[\"displayName\"] = v\n\t}\n\tif v := f.Description; dcl.ValueShouldBeSent(v) {\n\t\tm[\"description\"] = v\n\t}\n\tif v, err := expandStoredInfoTypeLargeCustomDictionary(c, f.LargeCustomDictionary, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding LargeCustomDictionary into largeCustomDictionary: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"largeCustomDictionary\"] = v\n\t}\n\tif v, err := expandStoredInfoTypeDictionary(c, f.Dictionary, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Dictionary into dictionary: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"dictionary\"] = v\n\t}\n\tif v, err := expandStoredInfoTypeRegex(c, f.Regex, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Regex into regex: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"regex\"] = v\n\t}\n\tif v, err := dcl.EmptyValue(); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Parent into parent: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"parent\"] = v\n\t}\n\tif v, err := dcl.EmptyValue(); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Location into location: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"location\"] = v\n\t}\n\n\treturn m, nil\n}", "func getWrappedLogMessagesOfType(t *testing.T, entityName, entityVersion, typ string, logOutput []byte) [][]byte {\n\tlines := bytes.Split(logOutput, []byte(\"\\n\"))\n\tvar logLines [][]byte\n\tfor _, line := range lines {\n\t\tif len(line) == 0 {\n\t\t\tcontinue\n\t\t}\n\t\tvar currEntry map[string]interface{}\n\t\tassert.NoError(t, json.Unmarshal(line, &currEntry), \"failed to parse json line %q\", string(line))\n\t\tassert.Equal(t, \"wrapped.1\", currEntry[\"type\"])\n\t\tassert.Equal(t, entityName, currEntry[\"entityName\"])\n\t\tassert.Equal(t, entityVersion, currEntry[\"entityVersion\"])\n\t\tif payload, ok := currEntry[\"payload\"].(map[string]interface{}); ok {\n\t\t\tif payloadLog, ok := payload[payload[\"type\"].(string)].(map[string]interface{}); ok {\n\t\t\t\tif payloadLogLineType, ok := payloadLog[\"type\"]; ok && payloadLogLineType == typ {\n\t\t\t\t\tif payloadBytes, err := json.Marshal(payloadLog); err == nil {\n\t\t\t\t\t\tlogLines = append(logLines, payloadBytes)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn logLines\n}", "func UnmarshalJobLogSummaryActionJob(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(JobLogSummaryActionJob)\n\terr = core.UnmarshalPrimitive(m, \"target_count\", &obj.TargetCount)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"task_count\", &obj.TaskCount)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"play_count\", &obj.PlayCount)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"recap\", &obj.Recap, UnmarshalJobLogSummaryActionJobRecap)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func extractFields(raw []byte) any {\n\tvar resp map[string]any\n\n\terr := json.Unmarshal(raw, &resp)\n\tif err != nil {\n\t\tvar arrResp []map[string]any\n\n\t\terr := json.Unmarshal(raw, &arrResp)\n\t\tif err != nil {\n\t\t\treturn string(raw)\n\t\t}\n\n\t\treturn arrResp\n\t}\n\n\treturn resp\n}", "func extractAnalyzerWorkerStructure(c context.Context, wf *admin.Workflow) map[string]*analyzerToWorkers {\n\tm := map[string]*analyzerToWorkers{}\n\tfor _, w := range wf.Workers {\n\t\tanalyzer := strings.Split(w.Name, \"_\")[0]\n\t\ta, ok := m[analyzer]\n\t\tif !ok {\n\t\t\ta = &analyzerToWorkers{\n\t\t\t\tAnalyzer: &track.AnalyzerInvocation{\n\t\t\t\t\tID: analyzer,\n\t\t\t\t\tName: analyzer,\n\t\t\t\t\tState: tricium.State_PENDING,\n\t\t\t\t},\n\t\t\t}\n\t\t\tm[analyzer] = a\n\t\t}\n\t\taw := &track.WorkerInvocation{\n\t\t\tID: w.Name,\n\t\t\tName: w.Name,\n\t\t\tState: tricium.State_PENDING,\n\t\t\tPlatform: w.ProvidesForPlatform,\n\t\t}\n\t\tfor _, n := range w.Next {\n\t\t\taw.Next = append(aw.Next, n)\n\t\t}\n\t\ta.Workers = append(a.Workers, aw)\n\t\tlogging.Infof(c, \"Found analyzer/worker: %v\", a)\n\t}\n\treturn m\n}", "func (s GetJobInput) MarshalFields(e protocol.FieldEncoder) error {\n\te.SetValue(protocol.HeaderTarget, \"Content-Type\", protocol.StringValue(\"application/x-amz-json-1.1\"), protocol.Metadata{})\n\n\tif s.AppId != nil {\n\t\tv := *s.AppId\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.PathTarget, \"appId\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.BranchName != nil {\n\t\tv := *s.BranchName\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.PathTarget, \"branchName\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.JobId != nil {\n\t\tv := *s.JobId\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.PathTarget, \"jobId\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\treturn nil\n}", "func (c CommonJobDetails) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"actions\", c.Actions)\n\tpopulate(objectMap, \"chainOfCustodySasKey\", c.ChainOfCustodySasKey)\n\tpopulate(objectMap, \"contactDetails\", c.ContactDetails)\n\tpopulate(objectMap, \"copyLogDetails\", c.CopyLogDetails)\n\tpopulate(objectMap, \"dataCenterCode\", c.DataCenterCode)\n\tpopulate(objectMap, \"dataExportDetails\", c.DataExportDetails)\n\tpopulate(objectMap, \"dataImportDetails\", c.DataImportDetails)\n\tpopulate(objectMap, \"datacenterAddress\", c.DatacenterAddress)\n\tpopulate(objectMap, \"deliveryPackage\", c.DeliveryPackage)\n\tpopulate(objectMap, \"deviceErasureDetails\", c.DeviceErasureDetails)\n\tpopulate(objectMap, \"expectedDataSizeInTeraBytes\", c.ExpectedDataSizeInTeraBytes)\n\tobjectMap[\"jobDetailsType\"] = c.JobDetailsType\n\tpopulate(objectMap, \"jobStages\", c.JobStages)\n\tpopulate(objectMap, \"keyEncryptionKey\", c.KeyEncryptionKey)\n\tpopulate(objectMap, \"lastMitigationActionOnJob\", c.LastMitigationActionOnJob)\n\tpopulate(objectMap, \"preferences\", c.Preferences)\n\tpopulate(objectMap, \"returnPackage\", c.ReturnPackage)\n\tpopulate(objectMap, \"reverseShipmentLabelSasKey\", c.ReverseShipmentLabelSasKey)\n\tpopulate(objectMap, \"shippingAddress\", c.ShippingAddress)\n\treturn json.Marshal(objectMap)\n}", "func (djd DiskJobDetails) AsJobDetails() (*JobDetails, bool) {\n\treturn nil, false\n}", "func (p *Plugin) GenericOIDCExtractUserProcessGroups(ic *security.IssuerConfig, claims *security.GenericOIDCClaims) (user *security.User, err error) {\n\tif ic == nil {\n\t\treturn nil, errors.New(\"issuerConfig must not be nil\")\n\t}\n\treturn genericOidcExtractUser(ic, claims, p.extractAndProcessGroups)\n}", "func (r commonResult) Extract() (*Service, error) {\n\tif r.Err != nil {\n\t\treturn nil, r.Err\n\t}\n\n\tvar res struct {\n\t\tService `json:\"service\"`\n\t}\n\n\terr := mapstructure.Decode(r.Body, &res)\n\n\treturn &res.Service, err\n}", "func (d *DiskJobDetails) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", d, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"actions\":\n\t\t\terr = unpopulate(val, \"Actions\", &d.Actions)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"chainOfCustodySasKey\":\n\t\t\terr = unpopulate(val, \"ChainOfCustodySasKey\", &d.ChainOfCustodySasKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"contactDetails\":\n\t\t\terr = unpopulate(val, \"ContactDetails\", &d.ContactDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"copyLogDetails\":\n\t\t\td.CopyLogDetails, err = unmarshalCopyLogDetailsClassificationArray(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"copyProgress\":\n\t\t\terr = unpopulate(val, \"CopyProgress\", &d.CopyProgress)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataCenterCode\":\n\t\t\terr = unpopulate(val, \"DataCenterCode\", &d.DataCenterCode)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataExportDetails\":\n\t\t\terr = unpopulate(val, \"DataExportDetails\", &d.DataExportDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataImportDetails\":\n\t\t\terr = unpopulate(val, \"DataImportDetails\", &d.DataImportDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"datacenterAddress\":\n\t\t\td.DatacenterAddress, err = unmarshalDatacenterAddressResponseClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"deliveryPackage\":\n\t\t\terr = unpopulate(val, \"DeliveryPackage\", &d.DeliveryPackage)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"deviceErasureDetails\":\n\t\t\terr = unpopulate(val, \"DeviceErasureDetails\", &d.DeviceErasureDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"disksAndSizeDetails\":\n\t\t\terr = unpopulate(val, \"DisksAndSizeDetails\", &d.DisksAndSizeDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"expectedDataSizeInTeraBytes\":\n\t\t\terr = unpopulate(val, \"ExpectedDataSizeInTeraBytes\", &d.ExpectedDataSizeInTeraBytes)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"granularCopyProgress\":\n\t\t\terr = unpopulate(val, \"GranularCopyProgress\", &d.GranularCopyProgress)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"jobDetailsType\":\n\t\t\terr = unpopulate(val, \"JobDetailsType\", &d.JobDetailsType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"jobStages\":\n\t\t\terr = unpopulate(val, \"JobStages\", &d.JobStages)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"keyEncryptionKey\":\n\t\t\terr = unpopulate(val, \"KeyEncryptionKey\", &d.KeyEncryptionKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"lastMitigationActionOnJob\":\n\t\t\terr = unpopulate(val, \"LastMitigationActionOnJob\", &d.LastMitigationActionOnJob)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"passkey\":\n\t\t\terr = unpopulate(val, \"Passkey\", &d.Passkey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"preferences\":\n\t\t\terr = unpopulate(val, \"Preferences\", &d.Preferences)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"preferredDisks\":\n\t\t\terr = unpopulate(val, \"PreferredDisks\", &d.PreferredDisks)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"returnPackage\":\n\t\t\terr = unpopulate(val, \"ReturnPackage\", &d.ReturnPackage)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"reverseShipmentLabelSasKey\":\n\t\t\terr = unpopulate(val, \"ReverseShipmentLabelSasKey\", &d.ReverseShipmentLabelSasKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"shippingAddress\":\n\t\t\terr = unpopulate(val, \"ShippingAddress\", &d.ShippingAddress)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", d, err)\n\t\t}\n\t}\n\treturn nil\n}", "func (p *PKGBUILD) GetInfo(name string, types ...atom.AtomType) (*atom.Info, bool) {\n\tcb := atom.CheckName(name)\n\tif len(types) > 0 {\n\t\tcb = atom.NamedCheckAll(atom.CheckName(name), atom.NewNameMatcher(types...))\n\t}\n\treturn p.info.FilterFirst(cb)\n}", "func expandStoredInfoTypeLargeCustomDictionary(c *Client, f *StoredInfoTypeLargeCustomDictionary, res *StoredInfoType) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v, err := expandStoredInfoTypeLargeCustomDictionaryOutputPath(c, f.OutputPath, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding OutputPath into outputPath: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"outputPath\"] = v\n\t}\n\tif v, err := expandStoredInfoTypeLargeCustomDictionaryCloudStorageFileSet(c, f.CloudStorageFileSet, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding CloudStorageFileSet into cloudStorageFileSet: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"cloudStorageFileSet\"] = v\n\t}\n\tif v, err := expandStoredInfoTypeLargeCustomDictionaryBigQueryField(c, f.BigQueryField, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding BigQueryField into bigQueryField: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"bigQueryField\"] = v\n\t}\n\n\treturn m, nil\n}", "func (jdt JobDetailsType) AsHeavyJobDetails() (*HeavyJobDetails, bool) {\n\treturn nil, false\n}", "func expandStoredInfoTypeLargeCustomDictionaryBigQueryFieldTable(c *Client, f *StoredInfoTypeLargeCustomDictionaryBigQueryFieldTable, res *StoredInfoType) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v, err := dcl.SelfLinkToNameExpander(f.ProjectId); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ProjectId into projectId: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"projectId\"] = v\n\t}\n\tif v, err := dcl.SelfLinkToNameExpander(f.DatasetId); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding DatasetId into datasetId: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"datasetId\"] = v\n\t}\n\tif v, err := dcl.SelfLinkToNameExpander(f.TableId); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding TableId into tableId: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"tableId\"] = v\n\t}\n\n\treturn m, nil\n}", "func getMultipartObjectInfo(storage StorageAPI, bucket, object string) (info MultipartObjectInfo, err error) {\n\toffset := int64(0)\n\tr, err := storage.ReadFile(bucket, pathJoin(object, multipartMetaFile), offset)\n\tif err != nil {\n\t\treturn MultipartObjectInfo{}, err\n\t}\n\tdecoder := json.NewDecoder(r)\n\terr = decoder.Decode(&info)\n\tif err != nil {\n\t\treturn MultipartObjectInfo{}, err\n\t}\n\treturn info, nil\n}", "func AllTypeInfo() *types.Info {\n\treturn &types.Info{\n\t\tTypes: make(map[ast.Expr]types.TypeAndValue),\n\t\tDefs: make(map[*ast.Ident]types.Object),\n\t\tUses: make(map[*ast.Ident]types.Object),\n\t\tImplicits: make(map[ast.Node]types.Object),\n\t\tSelections: make(map[*ast.SelectorExpr]*types.Selection),\n\t\tScopes: make(map[ast.Node]*types.Scope),\n\t}\n}", "func (s JobSummary) MarshalFields(e protocol.FieldEncoder) error {\n\tif s.CommitId != nil {\n\t\tv := *s.CommitId\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"commitId\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.CommitMessage != nil {\n\t\tv := *s.CommitMessage\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"commitMessage\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.CommitTime != nil {\n\t\tv := *s.CommitTime\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"commitTime\", protocol.TimeValue{V: v, Format: protocol.UnixTimeFormat}, metadata)\n\t}\n\tif s.EndTime != nil {\n\t\tv := *s.EndTime\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"endTime\", protocol.TimeValue{V: v, Format: protocol.UnixTimeFormat}, metadata)\n\t}\n\tif s.JobArn != nil {\n\t\tv := *s.JobArn\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"jobArn\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.JobId != nil {\n\t\tv := *s.JobId\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"jobId\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif len(s.JobType) > 0 {\n\t\tv := s.JobType\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"jobType\", protocol.QuotedValue{ValueMarshaler: v}, metadata)\n\t}\n\tif s.StartTime != nil {\n\t\tv := *s.StartTime\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"startTime\", protocol.TimeValue{V: v, Format: protocol.UnixTimeFormat}, metadata)\n\t}\n\tif len(s.Status) > 0 {\n\t\tv := s.Status\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"status\", protocol.QuotedValue{ValueMarshaler: v}, metadata)\n\t}\n\treturn nil\n}", "func UnmarshalJobLog(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(JobLog)\n\terr = core.UnmarshalPrimitive(m, \"job_id\", &obj.JobID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"job_name\", &obj.JobName)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"log_summary\", &obj.LogSummary, UnmarshalJobLogSummary)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"format\", &obj.Format)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"details\", &obj.Details)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"updated_at\", &obj.UpdatedAt)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func (hjd HeavyJobDetails) AsJobDetails() (*JobDetails, bool) {\n\treturn nil, false\n}", "func UnmarshalJobLogSummaryRepoDownloadJob(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(JobLogSummaryRepoDownloadJob)\n\terr = core.UnmarshalPrimitive(m, \"scanned_file_count\", &obj.ScannedFileCount)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"quarantined_file_count\", &obj.QuarantinedFileCount)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"detected_filetype\", &obj.DetectedFiletype)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"inputs_count\", &obj.InputsCount)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"outputs_count\", &obj.OutputsCount)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func (djd *DiskJobDetails) UnmarshalJSON(body []byte) error {\n\tvar m map[string]*json.RawMessage\n\terr := json.Unmarshal(body, &m)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor k, v := range m {\n\t\tswitch k {\n\t\tcase \"preferredDisks\":\n\t\t\tif v != nil {\n\t\t\t\tvar preferredDisks map[string]*int32\n\t\t\t\terr = json.Unmarshal(*v, &preferredDisks)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.PreferredDisks = preferredDisks\n\t\t\t}\n\t\tcase \"copyProgress\":\n\t\t\tif v != nil {\n\t\t\t\tvar copyProgress []DiskCopyProgress\n\t\t\t\terr = json.Unmarshal(*v, &copyProgress)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.CopyProgress = &copyProgress\n\t\t\t}\n\t\tcase \"disksAndSizeDetails\":\n\t\t\tif v != nil {\n\t\t\t\tvar disksAndSizeDetails map[string]*int32\n\t\t\t\terr = json.Unmarshal(*v, &disksAndSizeDetails)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.DisksAndSizeDetails = disksAndSizeDetails\n\t\t\t}\n\t\tcase \"passkey\":\n\t\t\tif v != nil {\n\t\t\t\tvar passkey string\n\t\t\t\terr = json.Unmarshal(*v, &passkey)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.Passkey = &passkey\n\t\t\t}\n\t\tcase \"expectedDataSizeInTeraBytes\":\n\t\t\tif v != nil {\n\t\t\t\tvar expectedDataSizeInTeraBytes int32\n\t\t\t\terr = json.Unmarshal(*v, &expectedDataSizeInTeraBytes)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.ExpectedDataSizeInTeraBytes = &expectedDataSizeInTeraBytes\n\t\t\t}\n\t\tcase \"jobStages\":\n\t\t\tif v != nil {\n\t\t\t\tvar jobStages []JobStages\n\t\t\t\terr = json.Unmarshal(*v, &jobStages)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.JobStages = &jobStages\n\t\t\t}\n\t\tcase \"contactDetails\":\n\t\t\tif v != nil {\n\t\t\t\tvar contactDetails ContactDetails\n\t\t\t\terr = json.Unmarshal(*v, &contactDetails)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.ContactDetails = &contactDetails\n\t\t\t}\n\t\tcase \"shippingAddress\":\n\t\t\tif v != nil {\n\t\t\t\tvar shippingAddress ShippingAddress\n\t\t\t\terr = json.Unmarshal(*v, &shippingAddress)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.ShippingAddress = &shippingAddress\n\t\t\t}\n\t\tcase \"deliveryPackage\":\n\t\t\tif v != nil {\n\t\t\t\tvar deliveryPackage PackageShippingDetails\n\t\t\t\terr = json.Unmarshal(*v, &deliveryPackage)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.DeliveryPackage = &deliveryPackage\n\t\t\t}\n\t\tcase \"returnPackage\":\n\t\t\tif v != nil {\n\t\t\t\tvar returnPackage PackageShippingDetails\n\t\t\t\terr = json.Unmarshal(*v, &returnPackage)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.ReturnPackage = &returnPackage\n\t\t\t}\n\t\tcase \"destinationAccountDetails\":\n\t\t\tif v != nil {\n\t\t\t\tdestinationAccountDetails, err := unmarshalBasicDestinationAccountDetailsArray(*v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.DestinationAccountDetails = &destinationAccountDetails\n\t\t\t}\n\t\tcase \"errorDetails\":\n\t\t\tif v != nil {\n\t\t\t\tvar errorDetails []JobErrorDetails\n\t\t\t\terr = json.Unmarshal(*v, &errorDetails)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.ErrorDetails = &errorDetails\n\t\t\t}\n\t\tcase \"preferences\":\n\t\t\tif v != nil {\n\t\t\t\tvar preferences Preferences\n\t\t\t\terr = json.Unmarshal(*v, &preferences)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.Preferences = &preferences\n\t\t\t}\n\t\tcase \"copyLogDetails\":\n\t\t\tif v != nil {\n\t\t\t\tcopyLogDetails, err := unmarshalBasicCopyLogDetailsArray(*v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.CopyLogDetails = &copyLogDetails\n\t\t\t}\n\t\tcase \"reverseShipmentLabelSasKey\":\n\t\t\tif v != nil {\n\t\t\t\tvar reverseShipmentLabelSasKey string\n\t\t\t\terr = json.Unmarshal(*v, &reverseShipmentLabelSasKey)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.ReverseShipmentLabelSasKey = &reverseShipmentLabelSasKey\n\t\t\t}\n\t\tcase \"chainOfCustodySasKey\":\n\t\t\tif v != nil {\n\t\t\t\tvar chainOfCustodySasKey string\n\t\t\t\terr = json.Unmarshal(*v, &chainOfCustodySasKey)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.ChainOfCustodySasKey = &chainOfCustodySasKey\n\t\t\t}\n\t\tcase \"jobDetailsType\":\n\t\t\tif v != nil {\n\t\t\t\tvar jobDetailsType JobDetailsTypeEnum\n\t\t\t\terr = json.Unmarshal(*v, &jobDetailsType)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdjd.JobDetailsType = jobDetailsType\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func copyJobToHookJob(src common.Job) (dst HookJob) {\n\tdst.ID = src.UUID\n\tdst.Name = src.Name\n\tdst.Status = src.Status\n\tdst.Owner = src.Owner\n\tdst.StartTime = src.StartTime\n\tdst.CrackedHashes = src.CrackedHashes\n\tdst.TotalHashes = src.TotalHashes\n\tdst.Progress = src.Progress\n\tdst.Params = src.Parameters\n\tdst.ToolID = src.ToolUUID\n\tdst.PerformanceTitle = src.PerformanceTitle\n\tdst.PerformanceData = src.PerformanceData\n\tdst.OutputTitles = src.OutputTitles\n\tdst.OutputData = src.OutputData\n\n\treturn dst\n}", "func (j *Job) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", j, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &j.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &j.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &j.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"systemData\":\n\t\t\terr = unpopulate(val, \"SystemData\", &j.SystemData)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &j.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", j, err)\n\t\t}\n\t}\n\treturn nil\n}", "func metainfo(obj MilpaObject) (string, string, error) {\n\tv := reflect.ValueOf(obj)\n\tif v.Kind() != reflect.Ptr {\n\t\treturn \"\", \"\", fmt.Errorf(\"Expected pointer, but got %v\",\n\t\t\tv.Type().Name())\n\t}\n\tv = v.Elem()\n\tif v.Kind() != reflect.Struct {\n\t\treturn \"\", \"\", fmt.Errorf(\"Expected struct, but got %v: %v (%#v)\",\n\t\t\tv.Kind(), v.Type().Name(), v.Interface())\n\t}\n\tkind := v.FieldByName(\"Kind\")\n\tif !kind.IsValid() {\n\t\treturn \"\", \"\", fmt.Errorf(\"%v does not have TypeMeta\", v)\n\t}\n\tapiversion := v.FieldByName(\"APIVersion\")\n\tif !apiversion.IsValid() {\n\t\treturn \"\", \"\", fmt.Errorf(\"%v does not have TypeMeta\", v)\n\t}\n\treturn kind.String(), apiversion.String(), nil\n}", "func getPluginInfos(r *http.Request, pullLatest, requireSubfolder bool) ([]Plugin, string, string, string, error) {\n\terr := r.ParseForm()\n\tif err != nil {\n\t\treturn nil, \"\", \"\", \"\", err\n\t}\n\n\trepo := strings.TrimSpace(r.Form.Get(\"clone_url\"))\n\tversion := strings.TrimSpace(r.Form.Get(\"version\"))\n\tsubfolder := strings.TrimSpace(r.Form.Get(\"subfolder\"))\n\tif repo == \"\" {\n\t\treturn nil, \"\", \"\", \"\", fmt.Errorf(\"missing required field(s)\")\n\t}\n\n\t// assume root of repository if no subfolder given, and if one is required\n\tif requireSubfolder && subfolder == \"\" {\n\t\tsubfolder = \".\"\n\t}\n\n\t// get list of plugins\n\tinfos, err := allPluginInfos(repo, version, subfolder, pullLatest)\n\tif err != nil {\n\t\treturn nil, \"\", \"\", \"\", fmt.Errorf(\"getting plugin list: %v\", err)\n\t}\n\n\t// reject as error if any plugin name is not unique within this repo,\n\t// since it is otherwise impossible to distinguish one from another;\n\t// plugins don't have IDs until they're in the database\n\tif duplicate, dupName := anyDuplicatePluginName(infos); duplicate {\n\t\treturn nil, \"\", \"\", \"\",\n\t\t\tfmt.Errorf(\"plugin name '%s' is not unique within repo %s\", dupName, repo)\n\t}\n\n\treturn infos, repo, version, subfolder, nil\n}", "func (c *ci) JobDetails(job string) *format.LogResponse {\n\tj := c.jobs[job]\n\treturn &format.LogResponse{\n\t\tJob: j.Status(true, true),\n\t}\n}", "func (s SearchTxsResult) UnpackInterfaces(unpacker codectypes.AnyUnpacker) error {\n\tfor _, tx := range s.Txs {\n\t\terr := codectypes.UnpackInterfaces(tx, unpacker)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func flattenStoredInfoTypeLargeCustomDictionaryBigQueryFieldTableMap(c *Client, i interface{}, res *StoredInfoType) map[string]StoredInfoTypeLargeCustomDictionaryBigQueryFieldTable {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]StoredInfoTypeLargeCustomDictionaryBigQueryFieldTable{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]StoredInfoTypeLargeCustomDictionaryBigQueryFieldTable{}\n\t}\n\n\titems := make(map[string]StoredInfoTypeLargeCustomDictionaryBigQueryFieldTable)\n\tfor k, item := range a {\n\t\titems[k] = *flattenStoredInfoTypeLargeCustomDictionaryBigQueryFieldTable(c, item.(map[string]interface{}), res)\n\t}\n\n\treturn items\n}", "func (c *CustomerDiskJobDetails) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"actions\":\n\t\t\terr = unpopulate(val, \"Actions\", &c.Actions)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"chainOfCustodySasKey\":\n\t\t\terr = unpopulate(val, \"ChainOfCustodySasKey\", &c.ChainOfCustodySasKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"contactDetails\":\n\t\t\terr = unpopulate(val, \"ContactDetails\", &c.ContactDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"copyLogDetails\":\n\t\t\tc.CopyLogDetails, err = unmarshalCopyLogDetailsClassificationArray(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"copyProgress\":\n\t\t\terr = unpopulate(val, \"CopyProgress\", &c.CopyProgress)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataCenterCode\":\n\t\t\terr = unpopulate(val, \"DataCenterCode\", &c.DataCenterCode)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataExportDetails\":\n\t\t\terr = unpopulate(val, \"DataExportDetails\", &c.DataExportDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataImportDetails\":\n\t\t\terr = unpopulate(val, \"DataImportDetails\", &c.DataImportDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"datacenterAddress\":\n\t\t\tc.DatacenterAddress, err = unmarshalDatacenterAddressResponseClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"deliverToDcPackageDetails\":\n\t\t\terr = unpopulate(val, \"DeliverToDcPackageDetails\", &c.DeliverToDcPackageDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"deliveryPackage\":\n\t\t\terr = unpopulate(val, \"DeliveryPackage\", &c.DeliveryPackage)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"deviceErasureDetails\":\n\t\t\terr = unpopulate(val, \"DeviceErasureDetails\", &c.DeviceErasureDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"enableManifestBackup\":\n\t\t\terr = unpopulate(val, \"EnableManifestBackup\", &c.EnableManifestBackup)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"expectedDataSizeInTeraBytes\":\n\t\t\terr = unpopulate(val, \"ExpectedDataSizeInTeraBytes\", &c.ExpectedDataSizeInTeraBytes)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"exportDiskDetailsCollection\":\n\t\t\terr = unpopulate(val, \"ExportDiskDetailsCollection\", &c.ExportDiskDetailsCollection)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"importDiskDetailsCollection\":\n\t\t\terr = unpopulate(val, \"ImportDiskDetailsCollection\", &c.ImportDiskDetailsCollection)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"jobDetailsType\":\n\t\t\terr = unpopulate(val, \"JobDetailsType\", &c.JobDetailsType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"jobStages\":\n\t\t\terr = unpopulate(val, \"JobStages\", &c.JobStages)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"keyEncryptionKey\":\n\t\t\terr = unpopulate(val, \"KeyEncryptionKey\", &c.KeyEncryptionKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"lastMitigationActionOnJob\":\n\t\t\terr = unpopulate(val, \"LastMitigationActionOnJob\", &c.LastMitigationActionOnJob)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"preferences\":\n\t\t\terr = unpopulate(val, \"Preferences\", &c.Preferences)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"returnPackage\":\n\t\t\terr = unpopulate(val, \"ReturnPackage\", &c.ReturnPackage)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"returnToCustomerPackageDetails\":\n\t\t\terr = unpopulate(val, \"ReturnToCustomerPackageDetails\", &c.ReturnToCustomerPackageDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"reverseShipmentLabelSasKey\":\n\t\t\terr = unpopulate(val, \"ReverseShipmentLabelSasKey\", &c.ReverseShipmentLabelSasKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"shippingAddress\":\n\t\t\terr = unpopulate(val, \"ShippingAddress\", &c.ShippingAddress)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t\t}\n\t}\n\treturn nil\n}", "func Extract(pblocks *[]string, jstr []byte, flags KCodeFlags, verbose bool) []string {\n\t//log.Info(fmt.Sprintf(\"%s,%s\\n\",string(jstr),typeof(jstr)))\n\t// The top level input for kcode could contain:\n\t// a. Single Object block\n\t// b. Array of Object blocks\n\t// You determine which one by checking datatype return value in call to Get\n\tblock, datatype, _, err := jsonparser.Get(jstr, \"xml\", \"block\")\n\tcheck(\"block\", err)\n\tswitch datatype {\n\tcase jsonparser.Object:\n\t\tlog.Info(\"---- extract: Top level single block ----\")\n\t\tprocessBlock(pblocks, &block, flags, datatype, verbose)\n\tcase jsonparser.Array:\n\t\tlog.Info(\"---- extract: Top level array of blocks ----\")\n\t\t// You can use `ArrayEach` helper to iterate items in block [item1, item2 .... itemN]\n\t\tjsonparser.ArrayEach(jstr, func(block []byte, dataType jsonparser.ValueType, offset int, err error) {\n\t\t\tprocessBlock(pblocks, &block, flags, datatype, verbose)\n\t\t}, \"xml\", \"block\")\n\tdefault:\n\t\tlog.Panic(fmt.Sprintf(\"extract - unknown datatype=%s\", datatype))\n\t}\n\treturn *pblocks\n}", "func flattenStoredInfoTypeLargeCustomDictionaryBigQueryField(c *Client, i interface{}, res *StoredInfoType) *StoredInfoTypeLargeCustomDictionaryBigQueryField {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &StoredInfoTypeLargeCustomDictionaryBigQueryField{}\n\n\tif dcl.IsEmptyValueIndirect(i) {\n\t\treturn EmptyStoredInfoTypeLargeCustomDictionaryBigQueryField\n\t}\n\tr.Table = flattenStoredInfoTypeLargeCustomDictionaryBigQueryFieldTable(c, m[\"table\"], res)\n\tr.Field = flattenStoredInfoTypeLargeCustomDictionaryBigQueryFieldField(c, m[\"field\"], res)\n\n\treturn r\n}", "func UnmarshalResultInfo(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(ResultInfo)\n\terr = core.UnmarshalPrimitive(m, \"page\", &obj.Page)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"per_page\", &obj.PerPage)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"count\", &obj.Count)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"total_count\", &obj.TotalCount)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func (s JobSummary) MarshalFields(e protocol.FieldEncoder) error {\n\tif s.CompletedAt != nil {\n\t\tv := *s.CompletedAt\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"completedAt\",\n\t\t\tprotocol.TimeValue{V: v, Format: protocol.UnixTimeFormatName, QuotedFormatTime: true}, metadata)\n\t}\n\tif s.CreatedAt != nil {\n\t\tv := *s.CreatedAt\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"createdAt\",\n\t\t\tprotocol.TimeValue{V: v, Format: protocol.UnixTimeFormatName, QuotedFormatTime: true}, metadata)\n\t}\n\tif s.JobArn != nil {\n\t\tv := *s.JobArn\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"jobArn\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.JobId != nil {\n\t\tv := *s.JobId\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"jobId\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.LastUpdatedAt != nil {\n\t\tv := *s.LastUpdatedAt\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"lastUpdatedAt\",\n\t\t\tprotocol.TimeValue{V: v, Format: protocol.UnixTimeFormatName, QuotedFormatTime: true}, metadata)\n\t}\n\tif len(s.Status) > 0 {\n\t\tv := s.Status\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"status\", protocol.QuotedValue{ValueMarshaler: v}, metadata)\n\t}\n\tif len(s.TargetSelection) > 0 {\n\t\tv := s.TargetSelection\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"targetSelection\", protocol.QuotedValue{ValueMarshaler: v}, metadata)\n\t}\n\tif s.ThingGroupId != nil {\n\t\tv := *s.ThingGroupId\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"thingGroupId\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\treturn nil\n}", "func (obj *Doc) GetAllInfos(ctx context.Context) ([]*NxInfo, error) {\n\tresult := &struct {\n\t\tInfos []*NxInfo `json:\"qInfos\"`\n\t}{}\n\terr := obj.RPC(ctx, \"GetAllInfos\", result)\n\treturn result.Infos, err\n}", "func UnmarshalActionJob(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(ActionJob)\n\terr = core.UnmarshalPrimitive(m, \"id\", &obj.ID)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func (j *JobInputHTTP) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", j, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"baseUri\":\n\t\t\terr = unpopulate(val, \"BaseURI\", &j.BaseURI)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"end\":\n\t\t\tj.End, err = unmarshalClipTimeClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"files\":\n\t\t\terr = unpopulate(val, \"Files\", &j.Files)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"inputDefinitions\":\n\t\t\tj.InputDefinitions, err = unmarshalInputDefinitionClassificationArray(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"label\":\n\t\t\terr = unpopulate(val, \"Label\", &j.Label)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"@odata.type\":\n\t\t\terr = unpopulate(val, \"ODataType\", &j.ODataType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"start\":\n\t\t\tj.Start, err = unmarshalClipTimeClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", j, err)\n\t\t}\n\t}\n\treturn nil\n}", "func (jd JobDetails) AsJobDetails() (*JobDetails, bool) {\n\treturn &jd, true\n}", "func (s CreateJobInput) MarshalFields(e protocol.FieldEncoder) error {\n\te.SetValue(protocol.HeaderTarget, \"Content-Type\", protocol.StringValue(\"application/json\"), protocol.Metadata{})\n\n\tif s.HopDestinations != nil {\n\t\tv := s.HopDestinations\n\n\t\tmetadata := protocol.Metadata{}\n\t\tls0 := e.List(protocol.BodyTarget, \"hopDestinations\", metadata)\n\t\tls0.Start()\n\t\tfor _, v1 := range v {\n\t\t\tls0.ListAddFields(v1)\n\t\t}\n\t\tls0.End()\n\t}\n\tif s.AccelerationSettings != nil {\n\t\tv := s.AccelerationSettings\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetFields(protocol.BodyTarget, \"accelerationSettings\", v, metadata)\n\t}\n\tif len(s.BillingTagsSource) > 0 {\n\t\tv := s.BillingTagsSource\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"billingTagsSource\", protocol.QuotedValue{ValueMarshaler: v}, metadata)\n\t}\n\tvar ClientRequestToken string\n\tif s.ClientRequestToken != nil {\n\t\tClientRequestToken = *s.ClientRequestToken\n\t} else {\n\t\tClientRequestToken = protocol.GetIdempotencyToken()\n\t}\n\t{\n\t\tv := ClientRequestToken\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"clientRequestToken\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.JobTemplate != nil {\n\t\tv := *s.JobTemplate\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"jobTemplate\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.Priority != nil {\n\t\tv := *s.Priority\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"priority\", protocol.Int64Value(v), metadata)\n\t}\n\tif s.Queue != nil {\n\t\tv := *s.Queue\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"queue\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.Role != nil {\n\t\tv := *s.Role\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"role\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.Settings != nil {\n\t\tv := s.Settings\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetFields(protocol.BodyTarget, \"settings\", v, metadata)\n\t}\n\tif len(s.SimulateReservedQueue) > 0 {\n\t\tv := s.SimulateReservedQueue\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"simulateReservedQueue\", protocol.QuotedValue{ValueMarshaler: v}, metadata)\n\t}\n\tif len(s.StatusUpdateInterval) > 0 {\n\t\tv := s.StatusUpdateInterval\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"statusUpdateInterval\", protocol.QuotedValue{ValueMarshaler: v}, metadata)\n\t}\n\tif s.Tags != nil {\n\t\tv := s.Tags\n\n\t\tmetadata := protocol.Metadata{}\n\t\tms0 := e.Map(protocol.BodyTarget, \"tags\", metadata)\n\t\tms0.Start()\n\t\tfor k1, v1 := range v {\n\t\t\tms0.MapSetValue(k1, protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v1)})\n\t\t}\n\t\tms0.End()\n\n\t}\n\tif s.UserMetadata != nil {\n\t\tv := s.UserMetadata\n\n\t\tmetadata := protocol.Metadata{}\n\t\tms0 := e.Map(protocol.BodyTarget, \"userMetadata\", metadata)\n\t\tms0.Start()\n\t\tfor k1, v1 := range v {\n\t\t\tms0.MapSetValue(k1, protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v1)})\n\t\t}\n\t\tms0.End()\n\n\t}\n\treturn nil\n}", "func gatherInfo(prefix string, spec interface{}, env map[string]string, isInsideStructSlice, forUsage bool) ([]varInfo, error) {\n\ts := reflect.ValueOf(spec)\n\n\tif s.Kind() != reflect.Ptr {\n\t\treturn nil, ErrInvalidSpecification\n\t}\n\ts = s.Elem()\n\tif s.Kind() != reflect.Struct {\n\t\treturn nil, ErrInvalidSpecification\n\t}\n\ttypeOfSpec := s.Type()\n\n\t// over allocate an info array, we will extend if needed later\n\tinfos := make([]varInfo, 0, s.NumField())\n\tfor i := 0; i < s.NumField(); i++ {\n\t\tf := s.Field(i)\n\t\tftype := typeOfSpec.Field(i)\n\t\tif !f.CanSet() || isTrue(ftype.Tag.Get(\"ignored\")) {\n\t\t\tcontinue\n\t\t}\n\n\t\tfor f.Kind() == reflect.Ptr {\n\t\t\tif f.IsNil() {\n\t\t\t\tif f.Type().Elem().Kind() != reflect.Struct {\n\t\t\t\t\t// nil pointer to a non-struct: leave it alone\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\t// nil pointer to struct: create a zero instance\n\t\t\t\tf.Set(reflect.New(f.Type().Elem()))\n\t\t\t}\n\t\t\tf = f.Elem()\n\t\t}\n\n\t\t// Capture information about the config variable\n\t\tinfo := varInfo{\n\t\t\tName: ftype.Name,\n\t\t\tField: f,\n\t\t\tTags: ftype.Tag,\n\t\t\tAlt: strings.ToUpper(ftype.Tag.Get(\"envconfig\")),\n\t\t}\n\n\t\t// Default to the field name as the env var name (will be upcased)\n\t\tinfo.Key = info.Name\n\n\t\t// Best effort to un-pick camel casing as separate words\n\t\tif isTrue(ftype.Tag.Get(\"split_words\")) {\n\t\t\twords := gatherRegexp.FindAllStringSubmatch(ftype.Name, -1)\n\t\t\tif len(words) > 0 {\n\t\t\t\tvar name []string\n\t\t\t\tfor _, words := range words {\n\t\t\t\t\tif m := acronymRegexp.FindStringSubmatch(words[0]); len(m) == 3 {\n\t\t\t\t\t\tname = append(name, m[1], m[2])\n\t\t\t\t\t} else {\n\t\t\t\t\t\tname = append(name, words[0])\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tinfo.Key = strings.Join(name, \"_\")\n\t\t\t}\n\t\t}\n\t\tif info.Alt != \"\" {\n\t\t\tinfo.Key = info.Alt\n\t\t\tif isInsideStructSlice {\n\t\t\t\t// we don't want this to be read, since we're inside of a struct slice,\n\t\t\t\t// each slice element will have same Alt and thus they would overwrite themselves\n\t\t\t\tinfo.Alt = \"\"\n\t\t\t}\n\t\t}\n\t\tif prefix != \"\" {\n\t\t\tinfo.Key = fmt.Sprintf(\"%s_%s\", prefix, info.Key)\n\t\t}\n\t\tinfo.Key = strings.ToUpper(info.Key)\n\n\t\tif decoderFrom(f) != nil || setterFrom(f) != nil || textUnmarshaler(f) != nil || binaryUnmarshaler(f) != nil {\n\t\t\t// there's a decoder defined, no further processing needed\n\t\t\tinfos = append(infos, info)\n\t\t} else if f.Kind() == reflect.Struct {\n\t\t\t// it's a struct without a specific decoder set\n\t\t\tinnerPrefix := prefix\n\t\t\tif !ftype.Anonymous {\n\t\t\t\tinnerPrefix = info.Key\n\t\t\t}\n\n\t\t\tembeddedPtr := f.Addr().Interface()\n\t\t\tembeddedInfos, err := gatherInfo(innerPrefix, embeddedPtr, env, isInsideStructSlice, forUsage)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tinfos = append(infos, embeddedInfos...)\n\t\t} else if arePointers := isSliceOfStructPtrs(f); arePointers || isSliceOfStructs(f) {\n\t\t\t// it's a slice of structs\n\t\t\tvar (\n\t\t\t\tl int\n\t\t\t\tprefixFormat prefixFormatter\n\t\t\t)\n\t\t\tif forUsage {\n\t\t\t\t// it's just for usage so we don't know how many of them can be out there\n\t\t\t\t// so we'll print one info with a generic [N] index\n\t\t\t\tl = 1\n\t\t\t\tprefixFormat = usagePrefix{info.Key, \"[N]\"}\n\t\t\t} else {\n\t\t\t\tvar err error\n\t\t\t\t// let's find out how many are defined by the env vars, and gather info of each one of them\n\t\t\t\tif l, err = sliceLen(info.Key, env); err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\tprefixFormat = processPrefix(info.Key)\n\t\t\t\t// if no keys, check the alternative keys, unless we're inside of a slice\n\t\t\t\tif l == 0 && info.Alt != \"\" && !isInsideStructSlice {\n\t\t\t\t\tif l, err = sliceLen(info.Alt, env); err != nil {\n\t\t\t\t\t\treturn nil, err\n\t\t\t\t\t}\n\t\t\t\t\tprefixFormat = processPrefix(info.Alt)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tf.Set(reflect.MakeSlice(f.Type(), l, l))\n\t\t\tfor i := 0; i < l; i++ {\n\t\t\t\tvar structPtrValue reflect.Value\n\n\t\t\t\tif arePointers {\n\t\t\t\t\tf.Index(i).Set(reflect.New(f.Type().Elem().Elem()))\n\t\t\t\t\tstructPtrValue = f.Index(i)\n\t\t\t\t} else {\n\t\t\t\t\tstructPtrValue = f.Index(i).Addr()\n\t\t\t\t}\n\n\t\t\t\tembeddedInfos, err := gatherInfo(prefixFormat.format(i), structPtrValue.Interface(), env, true, forUsage)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\tinfos = append(infos, embeddedInfos...)\n\t\t\t}\n\t\t} else {\n\t\t\tinfos = append(infos, info)\n\t\t}\n\t}\n\treturn infos, nil\n}", "func processAllConfigTagsOfStruct(target interface{}, logger interfaces.LoggerFunc, nameOfParentField string, parent configTag, handleConfigTagFun handleConfigTagFunc) error {\n\tif target == nil {\n\t\treturn fmt.Errorf(\"The target must not be nil\")\n\t}\n\n\ttargetType, targetValue, err := getTargetTypeAndValue(target)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"Obtaining target type and -value for target='%v',nameOfParentField='%s',parent='%s'\", target, nameOfParentField, parent)\n\t}\n\n\tfor i := 0; i < targetType.NumField(); i++ {\n\t\tfield := targetType.Field(i)\n\t\tfieldValue := targetValue.Field(i)\n\t\tfType := field.Type\n\n\t\tfieldName := fullFieldName(nameOfParentField, field.Name)\n\t\tlogPrefix := fmt.Sprintf(\"[Process-(%s)]\", fieldName)\n\t\tlogger(interfaces.LogLevelDebug, \"%s field-type=%s\\n\", logPrefix, fType)\n\n\t\tisPrimitive, cfgTag, err := extractConfigTagFromStructField(field, parent)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"Extracting config tag\")\n\t\t}\n\n\t\t// skip the field in case there is no config tag\n\t\tif cfgTag == nil {\n\t\t\tlogger(interfaces.LogLevelInfo, \"%s no tag found entry will be skipped.\\n\", logPrefix)\n\t\t\tcontinue\n\t\t}\n\n\t\t// This is a non primitive type whose fields are not annotated\n\t\tif !isPrimitive && !hasAnnotatedFields(fType) {\n\t\t\tcfgTag.isComplexTypeWithoutAnnotatedFields = true\n\t\t}\n\n\t\tlogger(interfaces.LogLevelDebug, \"%s parsed config entry=%v. Is primitive=%t.\\n\", logPrefix, cfgTag, isPrimitive)\n\n\t\terr = handleConfigTagFun(fieldName, isPrimitive, fType, fieldValue, *cfgTag)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"Handling configTag %s for field '%s'\", *cfgTag, fieldName)\n\t\t}\n\t}\n\treturn nil\n}", "func TestExtractCtxObjects(t *testing.T) {\n\ttype args struct {\n\t\ttext string\n\t\tctxAnchor *CtxAnchor\n\t\tcount *uint32\n\t}\n\ttests := []struct {\n\t\tname string\n\t\targs args\n\t\twant []*Extract\n\t\twantErr bool\n\t}{}\n\tfor _, tt := range tests {\n\t\tt.Run(tt.name, func(t *testing.T) {\n\t\t\tgot, err := ExtractCtxObjects(tt.args.text, tt.args.ctxAnchor, tt.args.count)\n\t\t\tif (err != nil) != tt.wantErr {\n\t\t\t\tt.Errorf(\"ExtractCtxObjects() error = %v, wantErr %v\", err, tt.wantErr)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif !reflect.DeepEqual(got, tt.want) {\n\t\t\t\tt.Errorf(\"ExtractCtxObjects() = %v, want %v\", got, tt.want)\n\t\t\t}\n\t\t})\n\t}\n}", "func commonLoad(values func(string) (string, bool), object interface{}, metaDataKey string) error {\n\tobjectType := reflect.TypeOf(object)\n\tif objectType.Kind() != reflect.Ptr {\n\t\treturn errors.New(\"utility.commonLoad was called with non-pointer object\")\n\t}\n\n\tpointeeType := objectType.Elem()\n\tif pointeeType.Kind() != reflect.Struct {\n\t\treturn errors.New(\"utility.commonLoad was called with an object that wasn't a pointer to a struct\")\n\t}\n\tpointeeValue := reflect.ValueOf(object).Elem()\n\n\tfieldCount := pointeeType.NumField()\n\tfor fieldIndex := 0; fieldIndex < fieldCount; fieldIndex++ {\n\t\tfield := pointeeType.Field(fieldIndex)\n\t\tvalue, ok := values(field.Name)\n\t\tif !ok {\n\t\t\tvar tagValue string\n\t\t\ttagValue, ok = field.Tag.Lookup(metaDataKey)\n\t\t\tif ok {\n\t\t\t\tvalue, ok = values(tagValue)\n\t\t\t}\n\t\t}\n\n\t\tif fieldValue := pointeeValue.Field(fieldIndex); ok && fieldValue.CanSet() {\n\t\t\tswitch field.Type.Kind() {\n\t\t\tcase reflect.Bool:\n\t\t\t\tvar boolValue bool\n\t\t\t\tswitch strings.ToLower(value) {\n\t\t\t\tcase \"1\":\n\t\t\t\t\tboolValue = true\n\n\t\t\t\tcase \"true\":\n\t\t\t\t\tboolValue = true\n\n\t\t\t\tcase \"t\":\n\t\t\t\t\tboolValue = true\n\t\t\t\t}\n\t\t\t\tfieldValue.SetBool(boolValue)\n\n\t\t\tcase reflect.Int:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Int8:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Int16:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Int32:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Int64:\n\t\t\t\tvar intValue int64\n\t\t\t\tif 0 != len(value) {\n\t\t\t\t\t_, err := fmt.Sscanf(value, \"%d\", &intValue)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tfieldValue.SetInt(intValue)\n\n\t\t\tcase reflect.Uint:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Uint8:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Uint16:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Uint32:\n\t\t\t\tfallthrough\n\t\t\tcase reflect.Uint64:\n\t\t\t\tvar uintValue uint64\n\t\t\t\tif 0 != len(value) {\n\t\t\t\t\t_, err := fmt.Sscanf(value, \"%d\", &uintValue)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tfieldValue.SetUint(uintValue)\n\n\t\t\tcase reflect.String:\n\t\t\t\tfieldValue.SetString(value)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func flattenStoredInfoTypeLargeCustomDictionaryBigQueryFieldSlice(c *Client, i interface{}, res *StoredInfoType) []StoredInfoTypeLargeCustomDictionaryBigQueryField {\n\ta, ok := i.([]interface{})\n\tif !ok {\n\t\treturn []StoredInfoTypeLargeCustomDictionaryBigQueryField{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn []StoredInfoTypeLargeCustomDictionaryBigQueryField{}\n\t}\n\n\titems := make([]StoredInfoTypeLargeCustomDictionaryBigQueryField, 0, len(a))\n\tfor _, item := range a {\n\t\titems = append(items, *flattenStoredInfoTypeLargeCustomDictionaryBigQueryField(c, item.(map[string]interface{}), res))\n\t}\n\n\treturn items\n}", "func unmarshallJobResponse(resp []byte) JobApiResponse {\n\n\tvar apiResp JobApiResponse\n\n\tif err := json.Unmarshal(resp, &apiResp); err != nil {\n\t\tlogger.Fatalf(\"Problem reaading api response: %s\", err)\n\t}\n\n\tif apiResp.Status != apiError && apiResp.Status != apiSuccess {\n\t\tlogger.Fatalf(\"Unknown status response: %s\", apiResp.Status)\n\t}\n\n\treturn apiResp\n\n}", "func (c *ci) JobDetails(jobname string) *format.LogResponse {\n\tj := c.jobs[jobname]\n\treturn &format.LogResponse{\n\t\tJob: j.Status(true, true),\n\t}\n}", "func (j *RawJob) decodeSerializedFields() (CronJob, CronJobInput, error) {\n\tvar decoder *gob.Decoder\n\tvar err error\n\n\t// decode from base64 the serialized job\n\tdecodedJob, err := base64.StdEncoding.DecodeString(j.SerializedJob)\n\tif err != nil {\n\t\treturn nil, CronJobInput{}, err\n\t}\n\n\t// decode the interface executing the rawJob\n\tdecoder = gob.NewDecoder(bytes.NewBuffer(decodedJob))\n\tvar runJob CronJob\n\tif err = decoder.Decode(&runJob); err != nil {\n\t\treturn nil, CronJobInput{}, err\n\t}\n\n\t// decode the input from json\n\tvar jobInputMap map[string]interface{}\n\tif err := json.Unmarshal([]byte(j.SerializedJobInput), &jobInputMap); err != nil {\n\t\treturn nil, CronJobInput{}, err\n\t}\n\n\t// and build the overall object containing all the\n\t// inputs will be passed to the Job\n\trunJobInput := CronJobInput{\n\t\tJobID: j.ID,\n\t\tGroupID: j.GroupID,\n\t\tSuperGroupID: j.SuperGroupID,\n\t\tCronExpression: j.CronExpression,\n\t\tOtherInputs: jobInputMap,\n\t}\n\treturn runJob, runJobInput, nil\n}", "func (j *Job) UnmarshalArgs(out interface{}) error {\n\terr := json.Unmarshal([]byte(*j.msg.Body), out)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"sqsq: unmarshalling args\")\n\t}\n\treturn nil\n}", "func (s Job) MarshalFields(e protocol.FieldEncoder) error {\n\tif s.AbortConfig != nil {\n\t\tv := s.AbortConfig\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetFields(protocol.BodyTarget, \"abortConfig\", v, metadata)\n\t}\n\tif s.Comment != nil {\n\t\tv := *s.Comment\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"comment\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.CompletedAt != nil {\n\t\tv := *s.CompletedAt\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"completedAt\",\n\t\t\tprotocol.TimeValue{V: v, Format: protocol.UnixTimeFormatName, QuotedFormatTime: true}, metadata)\n\t}\n\tif s.CreatedAt != nil {\n\t\tv := *s.CreatedAt\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"createdAt\",\n\t\t\tprotocol.TimeValue{V: v, Format: protocol.UnixTimeFormatName, QuotedFormatTime: true}, metadata)\n\t}\n\tif s.Description != nil {\n\t\tv := *s.Description\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"description\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.ForceCanceled != nil {\n\t\tv := *s.ForceCanceled\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"forceCanceled\", protocol.BoolValue(v), metadata)\n\t}\n\tif s.JobArn != nil {\n\t\tv := *s.JobArn\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"jobArn\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.JobExecutionsRolloutConfig != nil {\n\t\tv := s.JobExecutionsRolloutConfig\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetFields(protocol.BodyTarget, \"jobExecutionsRolloutConfig\", v, metadata)\n\t}\n\tif s.JobId != nil {\n\t\tv := *s.JobId\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"jobId\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.JobProcessDetails != nil {\n\t\tv := s.JobProcessDetails\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetFields(protocol.BodyTarget, \"jobProcessDetails\", v, metadata)\n\t}\n\tif s.LastUpdatedAt != nil {\n\t\tv := *s.LastUpdatedAt\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"lastUpdatedAt\",\n\t\t\tprotocol.TimeValue{V: v, Format: protocol.UnixTimeFormatName, QuotedFormatTime: true}, metadata)\n\t}\n\tif s.PresignedUrlConfig != nil {\n\t\tv := s.PresignedUrlConfig\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetFields(protocol.BodyTarget, \"presignedUrlConfig\", v, metadata)\n\t}\n\tif s.ReasonCode != nil {\n\t\tv := *s.ReasonCode\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"reasonCode\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif len(s.Status) > 0 {\n\t\tv := s.Status\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"status\", protocol.QuotedValue{ValueMarshaler: v}, metadata)\n\t}\n\tif len(s.TargetSelection) > 0 {\n\t\tv := s.TargetSelection\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"targetSelection\", protocol.QuotedValue{ValueMarshaler: v}, metadata)\n\t}\n\tif s.Targets != nil {\n\t\tv := s.Targets\n\n\t\tmetadata := protocol.Metadata{}\n\t\tls0 := e.List(protocol.BodyTarget, \"targets\", metadata)\n\t\tls0.Start()\n\t\tfor _, v1 := range v {\n\t\t\tls0.ListAddValue(protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v1)})\n\t\t}\n\t\tls0.End()\n\n\t}\n\tif s.TimeoutConfig != nil {\n\t\tv := s.TimeoutConfig\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetFields(protocol.BodyTarget, \"timeoutConfig\", v, metadata)\n\t}\n\treturn nil\n}", "func (jdt JobDetailsType) AsJobDetailsType() (*JobDetailsType, bool) {\n\treturn &jdt, true\n}", "func (obj *GenericObject) GetChildInfosRaw(ctx context.Context) (json.RawMessage, error) {\n\tresult := &struct {\n\t\tInfos json.RawMessage `json:\"qInfos\"`\n\t}{}\n\terr := obj.RPC(ctx, \"GetChildInfos\", result)\n\treturn result.Infos, err\n}", "func neededTypes(api map[name]interface{}) map[name]interface{} {\n\tneed := map[name]interface{}{}\n\n\tfor n, i := range api {\n\t\tswitch i.(type) {\n\t\tcase command:\n\t\t\tneed[n] = i\n\t\tcase event:\n\t\t\tneed[n] = i\n\t\t}\n\t}\n\n\tfor {\n\t\tnextNeed := expandTypes(api, need)\n\t\tif len(need) == len(nextNeed) {\n\t\t\tbreak\n\t\t}\n\t\tneed = nextNeed\n\t}\n\n\treturn need\n}", "func (hook *Hook) Getinfo() (map[string]string, error) {\n\tcmd := exec.Command(\"svnlook\", \"info\", hook.repospath)\n\tstdout, err := cmd.StdoutPipe()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif err = cmd.Start(); err != nil {\n\t\treturn nil, err\n\t}\n\tinfo, err := ioutil.ReadAll(stdout)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsplitinfo := strings.SplitN(string(info), \"\\n\", -1)\n\tinfomap := make(map[string]string)\n\tinfomap[\"author\"] = splitinfo[0]\n\tinfomap[\"timestamp\"] = splitinfo[1]\n\tinfomap[\"logsize\"] = splitinfo[2]\n\tinfomap[\"log\"] = splitinfo[3]\n\treturn infomap, nil\n}", "func (e Extractor) extract(dst interface{}, o metav1.Object) (interface{}, error) {\n\tdata := make(map[string]interface{})\n\tfor name, annotationParser := range e.annotations {\n\t\tval, err := annotationParser.Parse(o)\n\t\tglog.V(6).Infof(\"annotation %v in %v %v/%v: %v\", name, \"o.GetKind()\", o.GetNamespace(), o.GetName(), val)\n\t\tif err != nil {\n\t\t\tif errors.IsMissingAnnotations(err) {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tglog.V(5).Infof(\"error reading %v annotation in %v %v/%v: %v\", name, \"o.GetKind()\", o.GetNamespace(), o.GetName(), err)\n\t\t\treturn dst, err\n\t\t}\n\t\tif val != nil {\n\t\t\tdata[name] = val\n\t\t}\n\t}\n\terr := mergo.MapWithOverwrite(dst, data)\n\tif err != nil {\n\t\tglog.Errorf(\"unexpected error merging extracted annotations: %v\", err)\n\t\treturn dst, err\n\t}\n\n\treturn dst, nil\n}", "func flattenStoredInfoTypeLargeCustomDictionaryBigQueryFieldMap(c *Client, i interface{}, res *StoredInfoType) map[string]StoredInfoTypeLargeCustomDictionaryBigQueryField {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]StoredInfoTypeLargeCustomDictionaryBigQueryField{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]StoredInfoTypeLargeCustomDictionaryBigQueryField{}\n\t}\n\n\titems := make(map[string]StoredInfoTypeLargeCustomDictionaryBigQueryField)\n\tfor k, item := range a {\n\t\titems[k] = *flattenStoredInfoTypeLargeCustomDictionaryBigQueryField(c, item.(map[string]interface{}), res)\n\t}\n\n\treturn items\n}", "func (e *GetAddressInfoResult) UnmarshalJSON(data []byte) error {\n\t// Step 1: Create type aliases of the original struct, including the\n\t// embedded one.\n\ttype Alias GetAddressInfoResult\n\ttype EmbeddedAlias embeddedAddressInfo\n\n\t// Step 2: Create an anonymous struct with raw replacements for the special\n\t// fields.\n\taux := &struct {\n\t\tScriptType *string `json:\"script,omitempty\"`\n\t\tEmbedded *struct {\n\t\t\tScriptType *string `json:\"script,omitempty\"`\n\t\t\t*EmbeddedAlias\n\t\t} `json:\"embedded,omitempty\"`\n\t\t*Alias\n\t}{\n\t\tAlias: (*Alias)(e),\n\t}\n\n\t// Step 3: Unmarshal the data into the anonymous struct.\n\tif err := json.Unmarshal(data, &aux); err != nil {\n\t\treturn err\n\t}\n\n\t// Step 4: Convert the raw fields to the desired types\n\tvar (\n\t\tsc *txscript.ScriptClass\n\t\terr error\n\t)\n\n\tif aux.ScriptType != nil {\n\t\tsc, err = txscript.NewScriptClass(*aux.ScriptType)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\te.ScriptType = sc\n\n\tif aux.Embedded != nil {\n\t\tvar (\n\t\t\tembeddedSc *txscript.ScriptClass\n\t\t\terr error\n\t\t)\n\n\t\tif aux.Embedded.ScriptType != nil {\n\t\t\tembeddedSc, err = txscript.NewScriptClass(*aux.Embedded.ScriptType)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\te.Embedded = (*embeddedAddressInfo)(aux.Embedded.EmbeddedAlias)\n\t\te.Embedded.ScriptType = embeddedSc\n\t}\n\n\treturn nil\n}" ]
[ "0.52188885", "0.50464547", "0.5019366", "0.5004914", "0.4876212", "0.48568764", "0.4832693", "0.47235188", "0.45539555", "0.4530978", "0.45181894", "0.4496372", "0.44590893", "0.4442017", "0.44325438", "0.4422323", "0.44221032", "0.44206938", "0.4404893", "0.4376227", "0.43638048", "0.4355568", "0.43204948", "0.4310539", "0.4306524", "0.4288196", "0.42383242", "0.422791", "0.4227329", "0.4221117", "0.41715595", "0.4160222", "0.41501153", "0.4126224", "0.41252038", "0.41202992", "0.4096931", "0.40937325", "0.40862155", "0.4080206", "0.4079256", "0.4067649", "0.40668663", "0.40515554", "0.40481082", "0.40325072", "0.403228", "0.40286535", "0.40275124", "0.40270647", "0.40185717", "0.4013621", "0.40120113", "0.40042576", "0.40004966", "0.3994865", "0.39847052", "0.3972629", "0.39657623", "0.3962102", "0.39585117", "0.39578122", "0.3956725", "0.39460942", "0.3942433", "0.39374858", "0.39344093", "0.3924634", "0.39165008", "0.39135805", "0.39071167", "0.3903974", "0.39033258", "0.39020896", "0.389999", "0.3898638", "0.38907474", "0.38781488", "0.38758606", "0.38748518", "0.38672018", "0.38647074", "0.3864381", "0.38642776", "0.38637456", "0.38604328", "0.38590324", "0.3848365", "0.38417497", "0.38392493", "0.38340715", "0.38304967", "0.38282183", "0.38229942", "0.38226756", "0.3821484", "0.382147", "0.382047", "0.38157493", "0.3815613" ]
0.76527816
0
HelloHandler hello world handler
func HelloHandler(w http.ResponseWriter, r *http.Request) { w.WriteHeader(http.StatusOK) if _, err := w.Write([]byte("Hi from hello handler. This is not secured endpoint")); err != nil { log.Printf("error: %s", err.Error()) } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func helloHandler() string { return \"Hello\" }", "func HelloHandler(w http.ResponseWriter, r *http.Request) {\n\tw.Write([]byte(\"Hello, world!\"))\n}", "func (c *MyEngine) SayHelloHandler() {\n\tc.Handle(\"GET\", \"/say\", c.SayHelloFunc())\n}", "func (hl *Helloword) HandlerHelloWorld(writer http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\tutil.ResponseJSON(hl.d, writer)\n}", "func helloHandler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintf(w, \"Hello, World!\")\n}", "func HelloworldHandler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintf(w, Helloworld())\n}", "func helloHandler(w http.ResponseWriter, r *http.Request) {\n\tname := r.URL.Query().Get(\"name\")\n\n\t// must add headers before you start writing the body\n\tw.Header().Add(\"Content-Type\", \"text/plain\")\n\n\tw.Write([]byte(\"hello \" + name))\n}", "func (hl *Helloword) HandlerHelloWorldWithName(writer http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\td := &data{}\n\td.Text = hl.d.Text + \" \" + ps.ByName(\"name\")\n\tutil.ResponseJSON(d, writer)\n}", "func SayHelloHandler(w http.ResponseWriter, r *http.Request) {\n\tvar output strings.Builder\n\n\tcurrentEnvironment := os.Getenv(\"ENVIRONMENT\")\n\tw.Header().Set(\"Content-Type\", \"text/html\")\n\n\toutput.WriteString(fmt.Sprintf(\"<html><head><title>HI ALL hello there! - %s</title></head><body>\", currentEnvironment))\n\n\toutput.WriteString(\"<h1>Hi AppTeam!</h1>\") // ##_CHANGE ME_##\n\n\toutput.WriteString(fmt.Sprintf(\"<h2>Random Quote: %s</h2>\", quote.Glass())) // Opt()\n\toutput.WriteString(fmt.Sprintf(\"<h2>Current Environment: %s</h2>\", currentEnvironment))\n\toutput.WriteString(\"</body><html>\")\n\n\t// write output to stream\n\tfmt.Fprintf(w, output.String())\n}", "func Hello(w http.ResponseWriter, r *http.Request) {\n\tlog.Println(\"In Hello endpoint handler function\")\n\tfmt.Fprintf(w, \"Hello, %q\", html.EscapeString(r.URL.Path))\n}", "func hello() http.Handler {\n\treturn http.HandlerFunc(ServeHTTP)\n}", "func helloHandler(w http.ResponseWriter, r *http.Request) {\n\tname := r.URL.Query().Get(\"name\")\n\tw.Header().Add(\"Content-Type\", \"text/plain\")\n\tw.Header().Add(\"Access-Control-Allow-Origin\", \"*\")\n\tfmt.Fprintf(w, \"Hello %s!\", name) // replaces %s with name. This means you can construct a query like loaclhost:4000/hello?name=Adam\n}", "func (h *Handlers) HelloWorld(res http.ResponseWriter, req *http.Request) {\n\tres.Header().Set(\"Content-Type\", \"application/json\")\n\tbody, err := json.Marshal(map[string]string{\n\t\t\"data\": \"Hello, world\",\n\t})\n\tif err != nil {\n\t\tres.WriteHeader(500)\n\t\treturn\n\t}\n\tres.WriteHeader(200)\n\tres.Write(body)\n}", "func (e *Helloworld) Hello(ctx context.Context, req *helloworld.HelloRequest, rsp *helloworld.HelloResponse) error {\n\tlogger.Info(\"Received Helloworld.Call request\")\n\treturn nil\n}", "func (hl *Helloword) HandlerHelloWorldWithName(writer http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\t// swagger:operation GET /helloword/{name} hellowordWithName\n\t// ---\n\t// parameters :\n\t// - name : name\n\t// in : path\n\t// description : your name here bro\n\t// required : true\n\t// type : string\n\t// responses :\n\t// '200' : HellowordResponse\n\td := &data{}\n\td.Text = hl.d.Text + \" \" + ps.ByName(\"name\")\n\thttputil.ResponseJSON(d, writer)\n}", "func MyGreetHandler(w http.ResponseWriter, r *http.Request) {\n\tGreetVN(w, \"Anh\")\n}", "func HomeHandler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprint(w, \"Hello!\")\n}", "func helloWorldHandler (w http.ResponseWriter, r *http.Request){ //writes back to browser\r\n\tfmt.Fprint(w, \"Hello. My GAE go app!\")\r\n}", "func IndexHandler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintln(w, \"\\nHello World !\")\n}", "func handler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintf(w, \"Hello World!\")\n}", "func (c App) HelloWorld(page int) (http.Handler, bool, error) {\n\treturn nil, false, nil\n}", "func handleHello(args[]interface{}){\n\tm := args[0].(*msg.Hello)\n\ta := args[1].(gate.Agent)\n\tlog.Debug(\"Received <%v>\", m.Name) //~ Print all. (Not just m.Name)\n\tswitch randNo.Intn(2){\n\tcase 0:\n\t\tlog.Debug(\"msg.Hello sent\")\n\t\ta.WriteMsg(&msg.Hello{\n\t\t\tName:\"God\",\n\t\t})\n\tdefault:\n\t\tlog.Debug(\"msg.Gate sent\")\n\t\ta.WriteMsg(&msg.Gate{\n\t\t\tHost:\"www.blizzard.com\",\n\t\t})\n\t}\n}", "func mainHandler(w http.ResponseWriter, r *http.Request) {\n fmt.Fprintf(w, \"Welcome to the home page!\")\n}", "func HelloWorld(w http.ResponseWriter, req *http.Request) {\n\tlog.Printf(\"Received request to %s\", req.URL.Path)\n\tw.WriteHeader(http.StatusOK)\n\tw.Write([]byte(\"hello-world\"))\n}", "func helloWorldHandler() func(http.ResponseWriter, *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tw.WriteHeader(http.StatusOK)\n\t\tfmt.Fprintln(w, \"Hello world\")\n\t}\n}", "func Handler() (Response, error) {\n\treturn NewResponse(\"Hello, World\"), nil\n}", "func HelloServer(w http.ResponseWriter, req *http.Request) {\n\tio.WriteString(w, \"hello, world!\\n\")\n}", "func HelloServer(w http.ResponseWriter, req *http.Request) {\n\tio.WriteString(w, \"hello, world!\\n\")\n}", "func PlaintextHandler(ctx *atreugo.RequestCtx) error {\n\tctx.WriteString(helloWorldStr)\n\treturn nil\n}", "func HelloWorld(rw http.ResponseWriter, req *http.Request) {\n\tfmt.Fprintf(rw, \"Hello, world - service\")\n}", "func Hello(w http.ResponseWriter, req *http.Request) {\n\tlog.Println(\"/hello API called\")\n\tfmt.Fprintf(w, \"Hello Agent!\")\n\tlog.Println(\"/hello API call successful!\")\n}", "func handler(w http.ResponseWriter, r *http.Request) {\n\tpath := strings.Split(r.URL.Path, \"/\")[1:]\n\tfmt.Println(path)\n\tif len(path) > 1 && path[0] == \"greet\" {\n\n\t}\n\tfmt.Fprintf(w, \"Hello, %v\\n\", path[1])\n}", "func (h Hello) Hello(ctx context.Context, request *example.HelloRequest) (*example.HelloResponse, error) {\n\treturn &example.HelloResponse{\n\t\tResponse: fmt.Sprintf(\"Greetings! You said: %s\", request.Text),\n\t}, nil\n}", "func HelloworldWebserver() {\n\thttp.HandleFunc(\"/helloworld\", HelloworldHandler)\n\n\thttp.ListenAndServe(\":8080\", nil)\n}", "func (id *Hello) SayHello(c frame.Context) error {\n\tvar res hello.HelloResponse\n\tres.Message = \"welcome~~~\"\n\tlog.Info(\"SayHello receiver....\", c.Bizid(), c.Header().Get(\"A\"))\n\treturn c.JSON(&res)\n}", "func handler(w http.ResponseWriter, r *http.Request) {\n\taudit(START)\n\t// localhost:8080/{argument} \n\tfmt.Fprintf(w, \"Welcome, %q!\", html.EscapeString(r.URL.Path[1:]))\n\taudit(END)\n}", "func defaulthandler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprint(w, \"Hello surfer!\")\n}", "func Hello(w http.ResponseWriter, r *http.Request) {\n\thttp.ServeFile(w, r, \"index.html\")\n}", "func GetWelcomeHandler(w http.ResponseWriter, r *http.Request) {\r\n\tcommon.RenderJSON(w, r, entity.Welcome{Message: \"Hello World\"})\r\n}", "func HelloServer(w http.ResponseWriter, req *http.Request) {\n\tio.WriteString(w, \"hello \"+req.Header.Get(pam.REQ_X_API)+\"!\\n\")\n}", "func hello(w http.ResponseWriter, r *http.Request) {\n\tw.Write([]byte(fake.Hello()))\n}", "func GetWelcomeHandler(w http.ResponseWriter, r *http.Request) {\n\tcommon.RenderJSON(w, r, welcomeStruct{Message: \"Hello World\"})\n\n}", "func SayHelloWorld(w http.ResponseWriter, r *http.Request) {\n\n\tw.Write([]byte(\"Hello, World!\"))\n}", "func (h *HTTPHandler) Hello(w http.ResponseWriter, r *http.Request) {\n\tcommon := CommonResponse{Message: \"Parse request error.\", Errors: nil}\n\th.ResponseJSON(w, common)\n}", "func Handler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintf(w, \"<h1>Hello from Go, you went to: %s</h1>\", (*r.URL).Path)\n}", "func indexHandler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprint(w, \"Whoa, Nice!\")\n}", "func HelloServer(w http.ResponseWriter, req *http.Request) {\n\tio.WriteString(w, \"Server ist Online, \"+req.URL.Query().Get(\":name\")+\"!\\n\")\n}", "func (h *helloServ) Hello(ctx context.Context, req *pb.HelloRequest) (*pb.HelloResponse, error) {\n\tif req.Name == \"\" {\n\t\treturn nil, fmt.Errorf(\"No name\")\n\t}\n\treturn &pb.HelloResponse{\n\t\tMessage: fmt.Sprintf(\"Hello %s\", req.Name),\n\t}, nil\n}", "func HomeHandler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintf(w, \"Home page\")\n}", "func (s *greetingServer) Hello(ctx context.Context, req *pb.GreetingRequest) (*pb.GreetingResponse, error) {\n\tmsg := fmt.Sprintf(\"Hello, %s.\", req.GetName())\n\treturn &pb.GreetingResponse{Message: msg}, nil\n}", "func handler(w http.ResponseWriter, r *http.Request) {\n\t// Writes to the client\n\tfmt.Fprintf(w, \"Hello World\\n\")\n}", "func handler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintf(w, \"Hi there, I love %s!\", r.URL.Path[1:])\n}", "func (mw loggingMiddleware) Hello(s string) (output string, err error) {\n\tdefer func(begin time.Time) {\n\t\tmw.logger.Log(\n\t\t\t\"method\", \"Hello\",\n\t\t\t\"input\", s,\n\t\t\t\"err\", err,\n\t\t\t\"took\", time.Since(begin),\n\t\t)\n\t}(time.Now())\n\n\toutput, err = mw.next.Hello(s)\n\treturn\n}", "func (s *EchoService) Hello(ctx context.Context, in *pb.EchoMessage) (*pb.EchoMessage, error) {\n\tglog.Debugf(\"Echo: get Hello %v\", in)\n\treturn &pb.EchoMessage{Body: \"Hello from server!\"}, nil\n}", "func IndexHandler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintf(w, \"Hello, %q\", html.EscapeString(r.URL.Path))\n}", "func Handler(ctx context.Context) (Response, error) {\n\t_, span := tracer.Start(ctx, \"handler\")\n\tdefer span.End()\n\tvar buf bytes.Buffer\n\n\tbody, err := json.Marshal(map[string]interface{}{\n\t\t\"message\": \"Go Serverless v1.0! Your function executed successfully!\",\n\t})\n\tif err != nil {\n\t\treturn Response{StatusCode: 404}, err\n\t}\n\tjson.HTMLEscape(&buf, body)\n\n\tresp := Response{\n\t\tStatusCode: 200,\n\t\tIsBase64Encoded: false,\n\t\tBody: buf.String(),\n\t\tHeaders: map[string]string{\n\t\t\t\"Content-Type\": \"application/json\",\n\t\t\t\"X-MyCompany-Func-Reply\": \"hello-handler\",\n\t\t},\n\t}\n\n\treturn resp, nil\n}", "func Hello(res http.ResponseWriter, req *http.Request) {\n\tif req.Method == \"GET\" {\n\t\tfmt.Fprintln(res, \"Hello World!\")\n\t\t// } else {\n\t\tfmt.Fprintln(res, c.GenerateOTP())\n\t}\n}", "func indexHandler(w http.ResponseWriter, r *http.Request) {\n\tif r.URL.Path != \"/\" {\n\t\thttp.NotFound(w, r)\n\t\treturn\n\t}\n\tfmt.Fprint(w, \"Hello, World!\")\n}", "func HomeHandler(w http.ResponseWriter, r *http.Request) {\n\tlog.Println(\"Welcome home\")\n\tlog.Println(\"Request:\", r)\n\n\tw.WriteHeader(http.StatusOK)\n\n}", "func (a *App) Hello(writer http.ResponseWriter, request *http.Request) {\n\tfmt.Fprintln(writer, \"Hello from vice-file-transfers\")\n}", "func MainHandler(resp http.ResponseWriter, _ *http.Request) {\r\n resp.Write([]byte(\"Hi there! I'm PoGoBot!\"))\r\n}", "func index_handler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprint(w, \"Whoa go is cool\")\n}", "func (b *Backend) Hello() error {\n\treturn b.addEntry(\"hello\")\n}", "func APIHandler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintf(w, \"Hello World\")\n}", "func (s *server) SayHello(ctx context.Context, req *helloworld.HelloRequest) (resp *helloworld.HelloReply, err error) {\n\treturn &helloworld.HelloReply{Message: \"Hello \" + req.Name}, nil\n}", "func HelloWorldHandler(status int) http.HandlerFunc {\n\treturn http.HandlerFunc(\n\t\tfunc(w http.ResponseWriter, r *http.Request) {\n\t\t\tif status >= 301 && status <= 303 {\n\t\t\t\tw.Header().Set(\"Location\", \"/somewhere\")\n\t\t\t}\n\t\t\tw.WriteHeader(status)\n\t\t\tio.WriteString(w, HelloWorldBody)\n\t\t},\n\t)\n}", "func handler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintf(w, \"<html><h3>Hi there, I love %s!</h3></html>\", r.URL.Path[1:])\n}", "func (s *Server) Hello(c context.Context, req *pb.HelloRequest) (res *pb.HelloResponse, err error) {\n\tclog.Info(c, \"context: %v\", c)\n\tres = &pb.HelloResponse{\n\t\tResult: Hello(req.Name),\n\t}\n\n\treturn res, nil\n}", "func handler(ctx iris.Context) {\n\toutputs, err := ctx.CallFunc(\"greet\", \"Gophers\")\n\tif err != nil {\n\t\tctx.StopWithError(iris.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tresponse := outputs[0].Interface().(string)\n\tctx.WriteString(response)\n}", "func (ctrl *Controller) Hello() {\n\tctrl.Ctx.Output.Body([]byte(\"Hello Serverless Beego\"))\n}", "func main() {\n\tfmt.Println(\"hello world\")\n\n\thttp.HandleFunc(\"/hello\", hello)\n\thttp.HandleFunc(\"/method\", method)\n\thttp.HandleFunc(\"/path/\", path)\n\thttp.HandleFunc(\"/query\", query)\n\thttp.HandleFunc(\"/headers\", headers)\n\thttp.HandleFunc(\"/\", index)\n\thttp.HandleFunc(\"/about\", about)\n\thttp.HandleFunc(\"/contact\", contact)\n\t// TODO: add /cookies page\n\t// TODO: new cookie page\n\t// TODO: delete cookie page\n\n\tlog.Panic(http.ListenAndServe(\"127.0.0.1:8000\", nil))\n}", "func GreetingHandler(resp http.ResponseWriter, req *http.Request) {\n\trest.SetOKResponse(resp, \"hello world\")\n}", "func (g *Greeter) Hello(ctx context.Context, req *greeter.HelloRequest, resp *greeter.HelloResponse) error {\n\thost, _ := os.Hostname()\n\tresp.Greeting = fmt.Sprintf(\"Hello %s from %s\", req.Name, host)\n\tfmt.Println(\"Responing with \" + resp.Greeting)\n\n\treturn nil\n}", "func handle(w http.ResponseWriter, req *http.Request) {\n\tw.Write([]byte(\"Hello, Forest.\"))\n}", "func Hello(w http.ResponseWriter, r *http.Request) {\n\tresp := ResponseMessage{Message: \"hello world\"}\n\tres_json, _ := json.Marshal(resp)\n\tio.WriteString(w, string(res_json))\n}", "func greet(w http.ResponseWriter, r *http.Request) {\n\t// this print hello world when someone vists the endpoint\n\tfmt.Fprint(w, \"Hello World\")\n}", "func HelloServer(w http.ResponseWriter, req *http.Request) {\n\t<-req.Context().Done()\n\tio.WriteString(w, \"hello, world!\\n\")\n}", "func HelloWorld() http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\terr := httpp.JSONEncoder(w, \"HelloWorld\")\n\t\tif err != nil {\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t}\n\t}\n}", "func HelloWorld(c *fiber.Ctx) error {\n\treturn c.Send([]byte(\"Hello World! Default Page\"))\n}", "func handler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintf(w, \"Hello, %q\", html.EscapeString(r.URL.Path))\n}", "func (h Hello) ServeHTTP(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprint(w, \"Hi there!\")\n}", "func main() {\n\tprefix := \"/api/v1/\"\n\thttp.HandleFunc(prefix+\"quote/\", handleQuote)\n\t// TODO: Register handler\n\thttp.HandleFunc(\"/\", hello)\n\n\terr := http.ListenAndServe(\"localhost:8000\", nil)\n\n\tif err != nil {\n\t\tlog.Fatalln(\"ListenAndServe:\", err)\n\t}\n}", "func (srv *server) Hello(ctx context.Context, request *pb.HelloRequest) (*pb.HelloResponse, error) {\n\tres := &pb.HelloResponse{\n\t\tMsg: \"Hello \" + request.GetName(),\n\t}\n\treturn res, nil\n}", "func handler(w http.ResponseWriter, r *http.Request) {\n\tlog.Print(\"handling /\\n\")\n\tif p, ok := w.(http.Pusher); ok {\n\t\tlog.Print(\"Pushing.\\n\")\n\t\tp.Push(\"/int/\", nil)\n\t} else {\n\t\tlog.Print(\"Push not available.\\n\")\n\t}\n\tio.WriteString(w, \"Hello there.\")\n}", "func (s *HelloWorldServiceImpl) HelloWorld(helloReq *proto.HelloWorldRequest, srv proto.HelloWorldService_HelloWorldServer) error {\n\tlog.Println(\"Server received an rpc request with the following parameter \" + helloReq.GetName())\n\tresp := &proto.HelloWorldResponse{\n\t\tMessage: fmt.Sprintf(\"Hello \" + helloReq.GetName()),\n\t}\n\tsrv.SendMsg(resp)\n\treturn nil\n}", "func hello(w http.ResponseWriter, r *http.Request) {\n\t// log-it\n\tfmt.Printf(\"[%s] from %s \\n\", r.Method, r.RemoteAddr)\n\n\t// - Create some simple validation for the name parameter with the following rules\n\t// 1. Check the name is present. Return an error message informing the client if not\n\t// 2. The name must greater the one character long\n\tvar requestName = r.FormValue(\"name\")\n\n\tswitch {\n\tcase requestName == \"\":\n\t\tissueResponse(w, http.StatusBadRequest, \"The 'name' parameter is required\")\n\tcase len(requestName) < 2:\n\t\tissueResponse(w, http.StatusBadRequest, \"The 'name' parameter must be greater than one character\")\n\tdefault:\n\t\tissueResponse(w, http.StatusOK, fmt.Sprintf(\"%s %s\", \"hello\", requestName))\n\t}\n}", "func hello(w http.ResponseWriter, r *http.Request) {\n\t// configure http response\n\tw.Header().Add(\"Content-Type\", \"text/html\")\n\tw.WriteHeader(http.StatusOK)\n\n\tpd := PageData{\n\t\tMessage: \"Go is awesome!\",\n\t\tTime: time.Now().Format(time.Kitchen),\n\t}\n\n\t// parse templated HTML file with data\n\tt, err := template.ParseFiles(\"hello.html\")\n\n\t// if error, stop and return error immediately\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// execute and return the template\n\terr = t.Execute(w, pd)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t}\n}", "func ExampleHandler(cmd string) {\n\tfmt.Printf(\"Received %s\\n\", cmd)\n}", "func index_handler(w http.ResponseWriter, r *http.Request){ \n // the w parameter is of the http.ResponseWriter type\n // it's *http.Request, we're reading through the value of the request. \n\n // let's just put some text on the screen.\n fmt.Fprintf(w, \"Whoa, go is neat!\")\n }", "func indexHandler(w http.ResponseWriter, r *http.Request) {\n\tif r.URL.Path != \"/\" {\n\t\thttp.NotFound(w, r)\n\t\treturn\n\t}\n\n\tctx := r.Context()\n\n\tctx, span := trace.StartSpan(ctx, \"indexHandler\")\n\tdefer span.End()\n\n\tlog.Debugf(ctx, \"Hi, 1\")\n\tlog.Infof(ctx, \"Hi, 2\")\n\n\tfmt.Fprint(w, \"Hello, World!\")\n}", "func Hello(event functions.Event, context functions.Context) (string, error) {\n\tlogrus.Info(event.Data)\n\treturn \"Hello world!\", nil\n}", "func (r *Hello) SayHello(rw http.ResponseWriter) error {\n\tg := Hello{\n\t\tCmd: r.Cmd,\n\t\tText: r.Text,\n\t}\n\n\treturn web.JSONResponse(g, rw)\n}", "func (s *Service) HelloWorld(ctx context.Context, _ string) (string, error) {\n\treturn s.Hello(ctx, \"World\")\n}", "func defaultHandler(w http.ResponseWriter, r *http.Request) {\n fmt.Fprint(w, \"Hello!\");\n}", "func (u* UserCtr) HelloWorld(c *gin.Context) {\n\tc.JSON(http.StatusOK,gin.H{\n\t\t\"message\": \"Hello World!!\",\n\t})\n}", "func Handler(ctx context.Context, input Input) (Response, error) {\n\tvar buf bytes.Buffer\n\tToken := os.Getenv(\"BOT_KEY\")\n\tdg, err := discordgo.New(\"Bot \" + Token)\n\tif err != nil {\n\t\tfmt.Println(\"Error creating bot reason: \", err)\n\t}\n\n\tfmt.Println(input.ChannelID)\n\n\tclient := dg.Open()\n\tif client != nil {\n\t\tfmt.Println(\"Error opening client session. Reason: \", client)\n\t}\n\n\trandom, err := dg.ChannelMessageSend(input.ChannelID, input.Text)\n\tif err != nil {\n\t\tfmt.Println(\"Message send failed, readin: \", err)\n\t}\n\tfmt.Println(random)\n\tbody, err := json.Marshal(map[string]interface{}{\n\t\t\"message\": input.Text,\n\t})\n\tif err != nil {\n\t\treturn Response{StatusCode: 404}, err\n\t}\n\tjson.HTMLEscape(&buf, body)\n\n\tresp := Response{\n\t\tStatusCode: 200,\n\t\tIsBase64Encoded: false,\n\t\tBody: buf.String(),\n\t\tHeaders: map[string]string{\n\t\t\t\"Content-Type\": \"application/json\",\n\t\t\t\"X-MyCompany-Func-Reply\": \"hello-handler\",\n\t\t},\n\t}\n\n\treturn resp, nil\n}", "func HomeHandler(c buffalo.Context) error {\n\treturn c.Render(200, r.JSON(map[string]string{\"message\": \"Welcome to Buffalo!\"}))\n}", "func main() {\n\thandler := pb.NewHelloWorldServer(&HelloWorldServer{}, nil)\n\t// You can use any mux you like - NewHelloWorldServer gives you an http.Handler.\n\tmux := http.NewServeMux()\n\t// The generated code includes a const, <ServiceName>PathPrefix, which\n\t// can be used to mount your service on a mux.\n\tmux.Handle(pb.HelloWorldPathPrefix, handler)\n\thttp.ListenAndServe(\":8080\", mux)\n}", "func homePage(w http.ResponseWriter, r *http.Request) {\r\n\tfmt.Fprintf(w, \"Welcome!\")\r\n\tfmt.Println(\"Endpoint Hit: homePage\")\r\n}", "func HelloServer(w http.ResponseWriter, r *http.Request) {\n\t// Dummy return\n\tfmt.Fprintf(w, \"Hello TriFork !!\")\n}" ]
[ "0.82923084", "0.797484", "0.79525137", "0.791988", "0.7884872", "0.7826614", "0.76486695", "0.7432775", "0.73830587", "0.7333564", "0.7247973", "0.71227753", "0.71092606", "0.7105403", "0.71014464", "0.70943534", "0.70818865", "0.70558745", "0.69753855", "0.6950919", "0.6936075", "0.69295394", "0.6909049", "0.6906792", "0.6859424", "0.68579125", "0.6770349", "0.6770349", "0.67539185", "0.67372453", "0.6716655", "0.67091286", "0.669578", "0.6662177", "0.6625302", "0.66176176", "0.66130847", "0.66039217", "0.65992683", "0.6590489", "0.65471303", "0.65310687", "0.65298736", "0.65271723", "0.65169907", "0.6509622", "0.65047914", "0.64848113", "0.64718074", "0.64684653", "0.64680505", "0.64579284", "0.6439848", "0.64287215", "0.6424644", "0.64176846", "0.6413706", "0.64060956", "0.6404373", "0.6400339", "0.63973117", "0.6390931", "0.63874584", "0.63776183", "0.6377596", "0.63738656", "0.6365787", "0.6364964", "0.63604915", "0.6350677", "0.6326059", "0.63255394", "0.63247097", "0.6304801", "0.62973535", "0.628833", "0.6284672", "0.6270132", "0.6267657", "0.62584347", "0.62569517", "0.6250666", "0.6245253", "0.6239382", "0.6226281", "0.6218148", "0.6215865", "0.62103045", "0.62056834", "0.6197997", "0.61863256", "0.61703336", "0.6169815", "0.61560196", "0.6145319", "0.6134893", "0.6123845", "0.6113593", "0.61093843", "0.61016375" ]
0.70019233
18
get posts from database file
func getAllPosts(year int) ([]model.RedditPost, error) { posts := []model.RedditPost{} err := conn.View(func(tx *bolt.Tx) error { dailyBucket := tx.Bucket([]byte("daily_bucket")) return dailyBucket.ForEach(func(key, val []byte) error { b := dailyBucket.Bucket(key) return b.ForEach(func(k, v []byte) error { var post model.RedditPost err := json.Unmarshal(b.Get(k), &post) if err != nil { return err } postTime := time.Unix(int64(post.Created), 0) if postTime.Year() == year { posts = append(posts, post) } return nil }) }) }) return posts, err }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (s *ServerState) getPosts(c *gin.Context) {\n\tquery := `select u.name, u.username , p.description, p.timestamp, p.total_campaign_snapshot, co.name, co.cost, sc.name\n\tfrom ht.post p, ht.campaign ca, ht.course co, ht.organisation sc, ht.user u\n\twhere p.campaign_id = ca.id AND ca.course_id = co.id AND co.organisation_id = sc.id AND ca.user_id = u.id;`\n\n\t//curl --header \"Content-Type: application/json\" --request GET http://localhost:8080/posts/\n\n\tvar posts []Post\n\n\terr := s.DB.Select(&posts, query)\n\tif err != nil {\n\t\tc.JSON(500, gin.H{\"status\": err})\n\t\treturn\n\t}\n\tfmt.Println(posts)\n\n\tc.JSON(http.StatusOK, gin.H{\"status\": posts})\n}", "func ReadPostsPublish() []models.PostsModel {\n\tdb, err := driver.Connect()\n\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil\n\t}\n\n\tdefer db.Close()\n\n\tvar result []models.PostsModel\n\n\titems, err := db.Query(\"select id, title, content, category, status from posts where status='publish'\")\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil\n\t}\n\n\tfmt.Printf(\"%T\\n\", items)\n\n\tfor items.Next() {\n\t\tvar each = models.PostsModel{}\n\t\tvar err = items.Scan(&each.Id, &each.Title, &each.Content, &each.Category, &each.Status)\n\n\t\tif err != nil {\n\t\t\tfmt.Println(err.Error())\n\t\t\treturn nil\n\t\t}\n\n\t\tresult = append(result, each)\n\n\t}\n\n\tif err = items.Err(); err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil\n\t}\n\n\treturn result\n}", "func (pr postRepository) Read() ([]Post, error) {\n\tvar posts []Post\n\tif err := pr.getCollection().Find(bson.M{}).All(&posts); err != nil {\n\t\treturn nil, err\n\t}\n\treturn posts, nil\n}", "func getPosts(w http.ResponseWriter, r *http.Request) {\n\tif err := json.NewEncoder(w).Encode(db); err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n}", "func (n *OpenBazaarNode) GetPosts() ([]byte, error) {\n\tindexPath := path.Join(n.RepoPath, \"root\", \"posts.json\")\n\tfile, err := ioutil.ReadFile(indexPath)\n\tif os.IsNotExist(err) {\n\t\treturn []byte(\"[]\"), nil\n\t} else if err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Unmarshal the index to check if file contains valid json\n\tvar index []postData\n\terr = json.Unmarshal(file, &index)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Return bytes read from file\n\treturn file, nil\n}", "func getPosts() ([]Post, error) {\n\tpostsAsJson, err := ioutil.ReadFile(\"posts.json\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tposts := []Post{}\n\tif err := json.Unmarshal(postsAsJson, &posts); err != nil {\n\t\treturn nil, err\n\t}\n\tsort.Sort(ByDate(posts))\n\treturn posts, nil\n}", "func ReadPostsById(Id int) []models.PostsModel {\n\tdb, err := driver.Connect()\n\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil\n\t}\n\n\tdefer db.Close()\n\n\tvar result []models.PostsModel\n\n\titems, err := db.Query(\"select title, content, category, status from posts where id=?\", Id)\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil\n\t}\n\n\tfmt.Printf(\"%T\\n\", items)\n\n\tfor items.Next() {\n\t\tvar each = models.PostsModel{}\n\t\tvar err = items.Scan(&each.Title, &each.Content, &each.Category, &each.Status)\n\n\t\tif err != nil {\n\t\t\tfmt.Println(err.Error())\n\t\t\treturn nil\n\t\t}\n\n\t\tresult = append(result, each)\n\n\t}\n\n\tif err = items.Err(); err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil\n\t}\n\n\treturn result\n}", "func GetPosts(w http.ResponseWriter, r *http.Request) {\n\n\tposts := []m.Post{}\n\n\tdb, err := sqlx.Connect(\"postgres\", connStr)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\tdb.Select(&posts, \"select id, title, content, created from posts\")\n\n\tjson.NewEncoder(w).Encode(posts)\n}", "func readPosts() ([]string, []string, error) {\n\t//first we read the file\n\tfiles, err := getPosts()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tfrontMatter := []string{}\n\tmdContent := []string{}\n\n\tfor _, file := range files {\n\n\t\tf, err := os.Open(filepath.Join(postsDir(), file))\n\t\tif err != nil {\n\t\t\treturn nil, nil, fmt.Errorf(\"readposts: %v\", err)\n\t\t}\n\t\tdefer f.Close()\n\n\t\tscanner := bufio.NewScanner(f)\n\t\tvar delimCount int\n\n\t\tfor scanner.Scan() {\n\t\t\tline := strings.TrimSpace(scanner.Text())\n\n\t\t\tif line == \"---\" {\n\t\t\t\tdelimCount++\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif delimCount == 2 {\n\t\t\t\tif len(line) != 0 {\n\t\t\t\t\tmdContent = append(mdContent, line)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tif len(line) != 0 {\n\t\t\t\t\tfrontMatter = append(frontMatter, line)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn frontMatter, mdContent, nil\n}", "func (n *OpenBazaarNode) getPostIndex() ([]postData, error) {\n\tindexPath := path.Join(n.RepoPath, \"root\", \"posts.json\")\n\n\tvar index []postData\n\n\t_, ferr := os.Stat(indexPath)\n\tif !os.IsNotExist(ferr) {\n\t\t// Read existing file\n\t\tfile, err := ioutil.ReadFile(indexPath)\n\t\tif err != nil {\n\t\t\treturn index, err\n\t\t}\n\t\terr = json.Unmarshal(file, &index)\n\t\tif err != nil {\n\t\t\treturn index, err\n\t\t}\n\t}\n\treturn index, nil\n}", "func GetPost(idString string, w http.ResponseWriter) {\r\n\tfmt.Println(\"inside GetPost\")\r\n\t//Connect Mongodb\r\n\tclient, err := mongo.NewClient(options.Client().ApplyURI(\"mongodb://127.0.0.1:27017\"))\r\n\tif err != nil {\r\n\t\tlog.Fatal(err)\r\n\t}\r\n\tctx, _ := context.WithTimeout(context.Background(), 10*time.Second)\r\n\terr = client.Connect(ctx)\r\n\tif err != nil {\r\n\t\tlog.Fatal(err)\r\n\t}\r\n\tdefer client.Disconnect(ctx)\r\n\r\n\t//Post Inside Database\r\n\tcollection := client.Database(\"inShotsDB\").Collection(\"posts\")\r\n\tid, err := primitive.ObjectIDFromHex(idString)\r\n\tfilter := bson.M{\"_id\": id}\r\n\tvar post Article\r\n\terr2 := collection.FindOne(context.TODO(), filter).Decode(&post)\r\n\tif err2 != nil {\r\n\t\tlog.Fatal(err2)\r\n\t}\r\n\tfmt.Println(\"Found Post\", post.Title)\r\n\tfmt.Fprintf(w, post.Title, post.Subtitle, post.Content)\r\n}", "func (env *Env) GetPosts(w http.ResponseWriter, r *http.Request) {\n\tstart, err := strconv.Atoi(r.URL.Query().Get(\"s\"))\n\tif err != nil {\n\t\tstart = 0\n\t}\n\tend, err := strconv.Atoi(r.URL.Query().Get(\"e\"))\n\tif err != nil {\n\t\tend = 10\n\t}\n\tp, err := env.DB.GetPosts(start, end)\n\tif err != nil {\n\t\tenv.log(r, err)\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\treturn\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\tjson.NewEncoder(w).Encode(p)\n}", "func posts(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {\n\tdb, err := db()\n\tif err != nil {\n\t\tlog.Println(\"Database was not properly opened\")\n\t\tsendErr(w, err, \"Database was not properly opened\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\trows, err := db.Query(`\nSELECT p.id, p.name, p.content, p.permalink, p.visible, p.created_at, IFNULL(likes.likes, 0), p.cover\nFROM post p LEFT OUTER JOIN (SELECT post_id, COUNT(ip) AS likes\n FROM liker\n GROUP BY post_id) likes ON p.id = likes.post_id\nORDER BY created_at;\n\t`)\n\tif err != nil {\n\t\tlog.Println(\"Error in statement\")\n\t\tsendErr(w, err, \"Error in query blog\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tvar posts []Post\n\tfor rows.Next() {\n\t\tvar post Post\n\t\t// getting a post\n\t\tvar coverID sql.NullInt64\n\t\terr = rows.Scan(&post.ID, &post.Name, &post.Content, &post.Permalink,\n\t\t\t&post.Visible, &post.CreatedAt, &post.Likes, &coverID)\n\t\tif err != nil {\n\t\t\tlog.Println(\"Error while scanning at home handler\")\n\t\t\tsendErr(w, err, \"Error while scanning blog\", http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\t// Adding a cover if neded\n\t\tif coverID.Valid {\n\t\t\trow := db.QueryRow(`\nSELECT id, url\nFROM image\nWHERE id = ?\n`, coverID)\n\t\t\tvar image Image\n\t\t\terr := row.Scan(&image.ID, &image.Url)\n\t\t\tif err != nil {\n\t\t\t\tsendErr(w, err, \"Error while trying to get an image for a post\", http.StatusInternalServerError)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tpost.Cover = image\n\t\t}\n\n\t\t// Adding tags\n\t\ttagRows, err := db.Query(`\nSELECT t.id, t.name \nFROM post_tag pt INNER JOIN tag t ON pt.tag_id = t.id\nWHERE pt.post_id = ?;\n\t\t`, post.ID)\n\t\tif err != nil {\n\t\t\tlog.Println(\"Error while scanning at home handler\")\n\t\t\tsendErr(w, err, \"Error while scanning blog\", http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\tvar tagsIDs []string\n\t\tvar tags []Tag\n\t\tfor tagRows.Next() {\n\t\t\tvar tag Tag\n\t\t\ttagRows.Scan(&tag.ID, &tag.Name)\n\t\t\ttags = append(tags, tag)\n\t\t\ttagsIDs = append(tagsIDs, tag.ID)\n\t\t}\n\t\tpost.TagsIDs = tagsIDs\n\t\tpost.Tags = tags\n\t\t// Append to []Post\n\t\tposts = append(posts, post)\n\t}\n\tdb.Close()\n\tjsn, err := jsonapi.Marshal(posts)\n\tsend(w, jsn)\n}", "func ReadPostsDraft() []models.PostsModel {\n\tdb, err := driver.Connect()\n\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil\n\t}\n\n\tdefer db.Close()\n\n\tvar result []models.PostsModel\n\n\titems, err := db.Query(\"select id, title, content, category, status from posts where status='Draft'\")\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil\n\t}\n\n\tfmt.Printf(\"%T\\n\", items)\n\n\tfor items.Next() {\n\t\tvar each = models.PostsModel{}\n\t\tvar err = items.Scan(&each.Id, &each.Title, &each.Content, &each.Category, &each.Status)\n\n\t\tif err != nil {\n\t\t\tfmt.Println(err.Error())\n\t\t\treturn nil\n\t\t}\n\n\t\tresult = append(result, each)\n\n\t}\n\n\tif err = items.Err(); err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil\n\t}\n\n\treturn result\n}", "func ReadPosts(res render.Render) {\n\tvar post Post\n\tpublished := make([]Post, 0)\n\tposts, err := post.GetAll()\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tres.JSON(500, map[string]interface{}{\"error\": \"Internal server error\"})\n\t\treturn\n\t}\n\tfor _, post := range posts {\n\t\tif post.Published {\n\t\t\tpublished = append(published, post)\n\t\t}\n\t}\n\tres.JSON(200, published)\n}", "func (a App) Posts(res http.ResponseWriter, req *http.Request, _ httprouter.Params) {\n\n\t// easier to do\n\ttmpl := buildView(\"posts\")\n\n\t// Loop through rows using only one struct\n\trows, err := db.Query(\"SELECT * FROM posts\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\t\tvar p Post\n\n\t\tif err := rows.Scan(&p.Id, &p.Title, &p.Body); err != nil {\n\t\t\tlog.Println(err.Error())\n\t\t}\n\n\t\tposts = append(posts, p)\n\t}\n\n\t//////\n\tpd := PageData{\n\t\tPageTitle: \"Hello Gophercon!\",\n\t\tPosts: posts,\n\t}\n\n\t// easier to understand what's going on??\n\terr = tmpl.ExecuteTemplate(res, \"layout\", pd)\n\tif err != nil {\n\t\thttp.Error(res, err.Error(), http.StatusInternalServerError)\n\t}\n\n}", "func getPosts() ([]string, error) {\n\tpDir := postsDir()\n\tfiles, err := ioutil.ReadDir(pDir)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"readposts: %v\", err)\n\t}\n\n\tfilenames := []string{}\n\tfor _, file := range files {\n\t\t//check that file is a markdown file\n\t\tif !strings.HasSuffix(file.Name(), \".md\") {\n\t\t\treturn nil, fmt.Errorf(\"readposts: '.%s' unknown file extension\", strings.Split(file.Name(), \".\")[1])\n\t\t}\n\n\t\tfilenames = append(filenames, file.Name())\n\t}\n\n\treturn filenames, nil\n}", "func (r Repository) Posts(categoryName string, topic string) ([]DbPost, string) {\n\tthreads := r.Threads(categoryName)\n\tthread := filter(threads, func(t DbThread) bool {\n\t\treturn t.Topic == topic\n\t})\n\treturn thread[0].Posts, thread[0].Description\n}", "func getPosts(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.Header().Set(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, PUT, DELETE\")\n\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Accept, Content-Type, Content-Length, Accept-Encoding, X-CSRF-Token, Authorization\")\n\tvar posts []Post\n\tresult, err := db.Query(\"SELECT id, title, text from posts\")\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\tdefer result.Close()\n\tfor result.Next() {\n\t\tvar post Post\n\t\terr := result.Scan(&post.ID, &post.Title, &post.Text)\n\t\tif err != nil {\n\t\t\tpanic(err.Error())\n\t\t}\n\t\tposts = append(posts, post)\n\t}\n\tjson.NewEncoder(w).Encode(posts)\n}", "func Posts(c *gin.Context) {\r\n\tlimit, _ := strconv.Atoi(c.DefaultQuery(\"limit\", \"10\"))\r\n\toffset, _ := strconv.Atoi(c.DefaultQuery(\"offset\", \"0\"))\r\n\r\n\tvar posts []Post\r\n\tdb.Limit(limit).Offset(offset).Find(&posts)\r\n\tc.JSON(http.StatusOK, gin.H{\r\n\t\t\"messege\": \"\",\r\n\t\t\"data\": posts,\r\n\t})\r\n}", "func SelectAllFromPost() []Post {\n\tdb := MysqlConnect()\n\tdefer db.Close()\n\n\tresults, err := db.Query(\"SELECT * FROM post\")\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\n\tvar result []Post\n\n\tfor results.Next() {\n\n\t\tvar post Post\n\n\t\terr = results.Scan(&post.ID, &post.Title, &post.Description, &post.Post,\n\t\t\t&post.Date, &post.Author, &post.Thumbnail, &post.Categories)\n\n\t\tif err != nil {\n\t\t\tpanic(err.Error())\n\t\t}\n\t\tresult = append(result, post)\n\t}\n\n\treturn result\n}", "func ReadPostsLimit(Offset int, Limit int) []models.PostsModel {\n\tdb, err := driver.Connect()\n\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil\n\t}\n\n\tdefer db.Close()\n\n\tvar result []models.PostsModel\n\n\titems, err := db.Query(\"select title, content, category, status from posts Limit ?, ?\", Offset, Limit)\n\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil\n\t}\n\n\tfmt.Printf(\"%T\\n\", items)\n\n\tfor items.Next() {\n\t\tvar each = models.PostsModel{}\n\t\tvar err = items.Scan(&each.Title, &each.Content, &each.Category, &each.Status)\n\n\t\tif err != nil {\n\t\t\tfmt.Println(err.Error())\n\t\t\treturn nil\n\t\t}\n\n\t\tresult = append(result, each)\n\n\t}\n\n\tif err = items.Err(); err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil\n\t}\n\n\treturn result\n}", "func GetAllPosts() ([]Post, error) {\n\tvar res []Post\n\tdb := DBCon()\n\n\t// Execute the query which takes all posts from Wordpress database and order by New to Old\n\tresults, err := db.Query(\"SELECT post.ID as post_id, post.post_title as post_title, post.guid as post_url, \" +\n\t\t\"p.guid as post_poster, post.post_excerpt as post_description, post.post_modified_gmt \" +\n\t\t\"FROM wp_posts AS post JOIN wp_postmeta AS postmeta ON postmeta.post_id = post.ID \" +\n\t\t\"JOIN wp_posts AS p ON p.ID = postmeta.meta_value \" +\n\t\t\"WHERE post.post_type = 'post' AND post.post_status = 'publish' AND postmeta.meta_key = '_thumbnail_id' \" +\n\t\t\"ORDER BY post.post_modified DESC;\")\n\tif err != nil {\n\t\tlog.Fatal(\"(ERR) Cannot query the database: \", err)\n\t}\n\n\t// Iterate through results\n\tfor results.Next() {\n\t\tvar eachRes = new(Post)\n\t\t// for each row of the data, scan into structure\n\t\terr = results.Scan(&eachRes.PostID, &eachRes.PostTitle, &eachRes.PostUrl, &eachRes.PostPoster,\n\t\t\t&eachRes.PostDescription, &eachRes.PostModifiedGMT)\n\t\tif err != nil {\n\t\t\tlog.Println(\"(ERR) Problem while reading data from database: \", err)\n\t\t}\n\n\t\tres = append(res, *eachRes)\n\t}\n\tdefer db.Close()\n\n\treturn res, err\n}", "func (u *User)GetPosts()(e error){\n\trows,e := db.Query(\"select * from posts where user_id = ? order by date desc \",u.Id)\n\tif e != nil {\n\t\treturn\n\t}\n\tfor rows.Next() {\n\t\tc := &Post{}\n\t\trows.Scan(&c.Id,&c.Title,&c.Topic,&c.Content,&c.Date,&c.CommunityId,&c.UserId)\n\t\tu.posts = append(u.posts,c)\n\t}\n\treturn\n}", "func (pc PostsController) getPosts(response http.ResponseWriter, request *http.Request, parameters httprouter.Params) {\n\tresponse.Header().Add(\"content-type\", \"application/json\")\n\tvar postArray []Posts\n\tctx, _ := context.WithTimeout(context.Background(), 10*time.Second)\n\tcursor, err := pc.postscollection.Find(ctx, bson.M{})\n\tif err != nil {\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\n\t\tresponse.Write([]byte(`{\"message: \"` + err.Error() + `\"}\"`))\n\t\treturn\n\t}\n\tdefer cursor.Close(ctx)\n\n\tfor cursor.Next(ctx) {\n\t\tvar post Posts\n\t\tcursor.Decode(&post)\n\t\tpostArray = append(postArray, post)\n\t}\n\n\tif err := cursor.Err(); err != nil {\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\n\t\tresponse.Write([]byte(`{\"message: \"` + err.Error() + `\"}\"`))\n\t\treturn\n\t}\n\tjson.NewEncoder(response).Encode(postArray)\n}", "func read_post(filename string, conf Configuration) Post {\n\tvar buffer bytes.Buffer\n\tvar p Post\n\tvar err error = nil\n\tvar onlyonce bool = true\n\tvar titleline, dateline, tagline, authorline, line string\n\tflag := false\n\tf, err := os.Open(filename)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn p\n\t}\n\tdefer f.Close()\n\tr := bufio.NewReader(f)\n\tfor err == nil {\n\t\tline, err = r.ReadString('\\n')\n\t\tbuffer.WriteString(line)\n\t\tif onlyonce && strings.HasPrefix(line, \"<!--\") {\n\t\t\tonlyonce = false\n\t\t\tflag = true\n\t\t\tcontinue\n\t\t}\n\t\tif !onlyonce && strings.HasPrefix(line, \"-->\") {\n\t\t\tflag = false\n\t\t\tcontinue\n\t\t}\n\t\tif flag {\n\t\t\ti := strings.Index(line, \".. title:\")\n\t\t\tif i != -1 {\n\t\t\t\ttitleline = line[i+9:]\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ti = strings.Index(line, \".. date:\")\n\t\t\tif i != -1 {\n\t\t\t\tdateline = line[i+8:]\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ti = strings.Index(line, \".. tags:\")\n\t\t\tif i != -1 {\n\t\t\t\ttagline = strings.TrimSpace(line[i+8:])\n\t\t\t\tif tagline == \"\" {\n\t\t\t\t\ttagline = \"Uncategorized\"\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ti = strings.Index(line, \".. author:\")\n\t\t\tif i != -1 {\n\t\t\t\tauthorline = line[i+10:]\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t}\n\n\tif err == io.EOF {\n\t\tif authorline == \"\" {\n\t\t\tauthorline = conf.Author\n\t\t}\n\t\ttitle := strings.TrimSpace(titleline)\n\t\tdate := strings.TrimSpace(dateline)\n\t\tauthor := strings.TrimSpace(authorline)\n\t\ttagsnonstripped := strings.Split(tagline, \",\")\n\t\ttags := make(map[string]string, 0)\n\t\tfor i := range tagsnonstripped {\n\t\t\tword := strings.TrimSpace(tagsnonstripped[i])\n\t\t\ttags[get_slug(word)] = word\n\t\t}\n\n\t\tp.Title = title\n\t\tslug := filepath.Base(filename)\n\t\tlength := len(slug)\n\t\tp.Slug = slug[:length-3]\n\t\tbody := MD(buffer.Bytes())\n\t\tp.Body = template.HTML(string(body))\n\t\tp.Date = get_time(date)\n\t\tp.S_Date = date\n\t\tp.Tags = tags\n\t\tp.Changed = false\n\t\tp.Url = fmt.Sprintf(\"%sposts/%s.html\", conf.URL, p.Slug)\n\t\tp.Durl = template.JSStr(p.Url)\n\t\tp.Logo = conf.Logo\n\t\tp.Links = conf.Links\n\t\tp.Disqus = conf.Disqus\n\t\tp.Author = author\n\n\t\t// Let us add any extra data for the themes.\n\t\tvar edata ExtraData\n\t\tedata.BrokenDate = p.Date.Format(\"Jan 02, 2006\")\n\t\tedata.BrokenTime = p.Date.Format(\"15:04\")\n\t\tp.EData = edata\n\n\t}\n\treturn p\n}", "func GetPosts() (posts []Post, err error) {\n\trows, err := Db.Query(\"select * from posts\")\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor rows.Next() {\n\t\tpost := Post{}\n\t\terr = rows.Scan(&post.ID, &post.Title, &post.Body, &post.CreatedAt)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tposts = append(posts, post)\n\t}\n\trows.Close()\n\treturn\n}", "func (ps *PostStorage) Read(id string) (socialnet.Post, error) {\n\tfor _, p := range ps.posts {\n\t\tif p.ID == id {\n\t\t\treturn p, nil\n\t\t}\n\t}\n\treturn socialnet.Post{}, fmt.Errorf(\n\t\t\"could not find post with ID %s\",\n\t\tid,\n\t)\n}", "func parsePost(path string) (Post, error) {\n\tf, err := os.Open(path)\n\tif err != nil {\n\t\treturn Post{}, err\n\t}\n\tdefer f.Close()\n\n\tsource, err := io.ReadAll(f)\n\tif err != nil {\n\t\treturn Post{}, err\n\t}\n\n\tvar buf bytes.Buffer\n\tmd := goldmark.New(goldmark.WithExtensions(meta.Meta))\n\n\tcontext := parser.NewContext()\n\terr = md.Convert(source, &buf, parser.WithContext(context))\n\tif err != nil {\n\t\treturn Post{}, err\n\t}\n\n\tmetadata := meta.Get(context)\n\tpost := Post{\n\t\tTitle: metadata[\"title\"].(string),\n\t\tDate: metadata[\"date\"].(string),\n\t\tBody: buf.String(),\n\t\tPath: path,\n\t}\n\n\treturn post, nil\n}", "func (pc PostsController) getPostByUser(response http.ResponseWriter, request *http.Request, parameters httprouter.Params) {\n\tresponse.Header().Add(\"content-type\", \"application/json\")\n\tid_string := parameters.ByName(\"id\")\n\n\tid, _ := primitive.ObjectIDFromHex(id_string)\n\tvar postArray []Posts\n\tctx, _ := context.WithTimeout(context.Background(), 10*time.Second)\n\tcursor, err := pc.postscollection.Find(ctx, bson.M{\"accountid\": id})\n\n\tif err != nil {\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\n\t\tresponse.Write([]byte(`{\"message: \"` + err.Error() + `\"}\"`))\n\t\treturn\n\t}\n\tdefer cursor.Close(ctx)\n\n\tfor cursor.Next(ctx) {\n\t\tvar post Posts\n\t\tcursor.Decode(&post)\n\t\tpostArray = append(postArray, post)\n\t}\n\n\tif err := cursor.Err(); err != nil {\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\n\t\tresponse.Write([]byte(`{\"message: \"` + err.Error() + `\"}\"`))\n\t\treturn\n\t}\n\tjson.NewEncoder(response).Encode(postArray)\n}", "func (db *MysqlDB) GetPosts(num, offset int) ([]Post, error) {\n\n\tposts := make([]Post, 0, 10)\n\n\trows, err := db.Conn.Query(\n\t\t`SELECT p.id, p.Title, p.Description, p.ImageURL, p.Annotation, p.PostText,\n u.Name AS AuthorName,\n p.CreatedAt, p.UpdatedAt\n FROM Posts p INNER JOIN Users u ON p.Author = u.id\n ORDER BY id desc\n LIMIT ? OFFSET ?;`,\n\t\tnum, offset)\n\tif err != nil {\n\t\treturn posts, err\n\t}\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\t\tvar ID int64\n\t\tvar Title string\n\t\tvar Description string\n\t\tvar ImageURL string\n\t\tvar Annotation string\n\t\tvar Text string\n\t\tvar Author string\n\t\tvar CreatedAt time.Time\n\t\tvar UpdatedAt time.Time\n\n\t\terr = rows.Scan(&ID, &Title, &Description, &ImageURL, &Annotation, &Text, &Author, &CreatedAt, &UpdatedAt)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Error in row scan inside DBGetPosts: %v\\n\", err)\n\t\t}\n\t\tpost := &Post{ID: ID,\n\t\t\tTitle: template.HTML(Title),\n\t\t\tDescription: template.HTML(Description),\n\t\t\tImageURL: ImageURL,\n\t\t\tAnnotation: template.HTML(Annotation),\n\t\t\tText: template.HTML(Text),\n\t\t\tAuthor: Author,\n\t\t\tCreatedAt: CreatedAt,\n\t\t\tUpdatedAt: UpdatedAt}\n\n\t\tposts = append(posts, *post)\n\t}\n\n\treturn posts, nil\n}", "func getPostAddresses(author string, context ServerContext) ([]string, error) {\n\t// Read posts directory for user\n\tfiles, err := ioutil.ReadDir(prefix(context, author+\"/\"))\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\taddresses := []string{}\n\n\t// Build addresses slice\n\tfor _, file := range files {\n\t\t// Get address from filename\n\t\tstamp := strings.SplitN(file.Name(), \"_\", 2)[0]\n\t\taddresses = append(addresses, author+\"/\"+stamp[:len(stamp)-5])\n\t}\n\n\tlog.Printf(\"Collated post addresses for \\\"%s\\\"\", author)\n\n\treturn addresses, nil\n}", "func getPost(w http.ResponseWriter, r *http.Request) {\n\tparams := mux.Vars(r)\n\tid, err := strconv.Atoi(params[\"id\"])\n\tif err != nil {\n\t\tjson.NewEncoder(w).Encode(\"yeet\")\n\t}\n\n\tfor _, item := range posts {\n\t\tif item.ID == id {\n\t\t\tjson.NewEncoder(w).Encode(item)\n\t\t}\n\t}\n}", "func retrieve(id int) (post Post, err error){\n\tpost = Post{}\n\terr = Db.QueryRow(\"select id, content, author from posts where id = $1\", id).Scan(&post.Id, &post.Content, &post.Author)\n\treturn\n}", "func (mgr *ConverterManager) ReadPosts() ([]os.FileInfo, error) {\n\tfiles, err := ioutil.ReadDir(mgr.MediumPostsPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn files, nil\n}", "func GetPosts(index, number int) []blog.Post {\n\tstmt, err := db.Prepare(\"SELECT id, post, author, title, timestamp FROM blogposts ORDER BY id DESC LIMIT ? OFFSET ?\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\trows, err := stmt.Query(number, index)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t} else {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t}\n\tdefer rows.Close()\n\n\tposts := make([]blog.Post, 0)\n\tfor rows.Next() {\n\t\tvar post blog.Post\n\t\terr := rows.Scan(&post.ID, &post.Post, &post.Author, &post.Title, &post.Timestamp)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t\tcontinue\n\t\t}\n\t\tpost.Tags = GetTagsByPostId(post.ID)\n\t\tposts = append(posts, post)\n\t}\n\treturn posts\n}", "func ReadPostsTrash() []models.PostsModel {\n\tdb, err := driver.Connect()\n\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil\n\t}\n\n\tdefer db.Close()\n\n\tvar result []models.PostsModel\n\n\titems, err := db.Query(\"select id, title, content, category, status from posts where status='Trash'\")\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil\n\t}\n\n\tfmt.Printf(\"%T\\n\", items)\n\n\tfor items.Next() {\n\t\tvar each = models.PostsModel{}\n\t\tvar err = items.Scan(&each.Id, &each.Title, &each.Content, &each.Category, &each.Status)\n\n\t\tif err != nil {\n\t\t\tfmt.Println(err.Error())\n\t\t\treturn nil\n\t\t}\n\n\t\tresult = append(result, each)\n\n\t}\n\n\tif err = items.Err(); err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil\n\t}\n\n\treturn result\n}", "func GetUserPost(w http.ResponseWriter, r *http.Request) {\n\tdb, err := gorm.Open(DatabaseName, DatabaseURL)\n\tif err != nil {\n\t\tpanic(\"We can't open database!(GetTimeLine)\")\n\t}\n\tdefer db.Close()\n\n\tlog.Println(\"GET : GetUserPost\")\n\n\tvars := mux.Vars(r)\n\tuserID := vars[\"userID\"]\n\tvar posts []model.Post\n\tdb.Where(&model.Post{UserID: userID}).Find(&posts)\n\t//その後データベースからユーザーデータを取ってくる\n\tvar user model.User\n\t//postのデータをすべて取った後userデータ総当り\n\tvar sendPosts []model.SendPost\n\tif len(posts) != 0 {\n\t\tdb.Where(&model.User{ID: posts[0].UserID}).First(&user)\n\t\tfor i := 0; i < len(posts); i++ {\n\t\t\tvar sendPost model.SendPost\n\t\t\tsendPost.PostID = posts[i].ID\n\t\t\tsendPost.Sentence = posts[i].Sentence\n\t\t\tsendPost.Date = posts[i].Date\n\t\t\tsendPost.UserID = posts[i].UserID\n\t\t\tsendPost.RoomID = posts[i].RoomID\n\t\t\tsendPost.UserPhotoURL = user.PhotoURL\n\t\t\tsendPost.UserName = user.DisplayName\n\t\t\tsendPosts = append(sendPosts, sendPost)\n\t\t}\n\t}\n\tjson.NewEncoder(w).Encode(sendPosts)\n}", "func ReturnALLPosts(response http.ResponseWriter, request *http.Request){\n\tvar posts []Post\n\t \n\trequest.ParseForm()\n\tvar u string = request.URL.Path\n\tquery := request.URL.Query()\n\tindex,_ := strconv.Atoi(query.Get(\"index\")) // Getting Cursor value from user to implement cursor paggination\n\tuid := u[13:]\n\t\n \n\n\t\tcollection := client.Database(\"Go_task\").Collection(\"posts\")\n\t\tctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)\n\t\tdefer cancel()\n\t\tcursor, err := collection.Find(ctx, bson.M{\"uid\":uid})\n\t\tif err != nil {\n\t\t\tresponse.WriteHeader(http.StatusInternalServerError)\n\t\t\tresponse.Write([]byte(`{ \"message\": \"` + err.Error() + `\" }`))\n\t\t\treturn\n\t\t}\n\t\tdefer cursor.Close(ctx)\n\t\tfor cursor.Next(ctx) {\n\t\t\tvar post Post\n\t\t\tcursor.Decode(&post)\n\t\t\n\t\t\tposts = append(posts, post)\n\n\t\t}\n\t\t\n\t\tif err = cursor.Err(); err != nil {\n\t\t\tresponse.WriteHeader(http.StatusInternalServerError)\n\t\t\tresponse.Write([]byte(`{ \"message\": \"` + err.Error() + `\" }`))\n\t\t\treturn\n\t\t}\n\t\t\n\t\tjson.NewEncoder(response).Encode(posts[index:])\n}", "func (p *DBPosts) GetPosts(id string) error {\n\tvar rows *sql.Rows\n\tvar err error\n\tif id != \"\" {\n\t\trows, err = p.DB.Query(p.QGetOnePost, id)\n\t} else {\n\t\trows, err = p.DB.Query(p.QGetAllPosts)\n\t}\n\tdefer rows.Close()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error in db.query: %v\", err)\n\t}\n\tfor rows.Next() {\n\t\tpost := Post{}\n\t\terr = rows.Scan(&post.ID, &post.Title, &post.Summary, &post.Body, &post.Date)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error in row.scan: %v\", err)\n\t\t}\n\t\tp.Posts = append(p.Posts, post)\n\t}\n\tif len(p.Posts) == 0 {\n\t\treturn fmt.Errorf(\"post not found: %s\", id)\n\t}\n\treturn nil\n}", "func (db *Database) GetAllPosts() ([]models.Post, error) {\n\tvar posts []models.Post\n\terr := db.DB.Model(&posts).Select()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn posts, nil\n}", "func (env *Env) GetPublishedPosts(w http.ResponseWriter, r *http.Request) {\n\tstart, err := strconv.Atoi(r.URL.Query().Get(\"s\"))\n\tif err != nil {\n\t\tstart = 0\n\t}\n\tend, err := strconv.Atoi(r.URL.Query().Get(\"e\"))\n\tif err != nil {\n\t\tend = 10\n\t}\n\tp, err := env.DB.PublishedPosts(start, end)\n\tif err != nil {\n\t\tenv.log(r, err)\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\treturn\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\tjson.NewEncoder(w).Encode(p)\n}", "func (ps *PostStorage) List(username string) ([]socialnet.Post, error) {\n\tvar pp []socialnet.Post\n\n\tfor _, p := range ps.posts {\n\t\tif p.Author == username {\n\t\t\tpp = append(pp, p)\n\t\t}\n\t}\n\n\treturn pp, nil\n}", "func LoadAll() ([]*BlogPost, error) {\n\tfiles, err := ioutil.ReadDir(\"www/posts/\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tposts := make([]*BlogPost, 0, len(files))\n\tfor _, file := range files {\n\t\tif !file.IsDir() {\n\t\t\tpost, err := Load(\"www/posts/\" + file.Name())\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t} else {\n\t\t\t\tposts = append(posts, post)\n\t\t\t}\n\t\t}\n\t}\n\treturn posts, nil\n}", "func fetchPosts(c appengine.Context, n int, user *datastore.Key) ([]Post, error) {\n\tp := make([]Post, 0, n)\n\tq := datastore.NewQuery(\"Post\").\n\t\tOrder(\"-Creation\").\n\t\tLimit(n)\n\tif user != nil {\n\t\tq = q.Ancestor(user)\n\t} else {\n\t\tmk := \"posts\"\n\t\t_, err := memcache.JSON.Get(c, mk, &p)\n\t\tif err == nil {\n\t\t\treturn p, nil\n\t\t}\n\t\tdefer func() {\n\t\t\tmemcache.JSON.Set(c, &memcache.Item{\n\t\t\t\tKey: mk,\n\t\t\t\tObject: &p,\n\t\t\t\tExpiration: 5 * time.Second,\n\t\t\t})\n\t\t}()\n\t}\n\tks, err := q.GetAll(c, &p)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"query posts: %v\", err)\n\t}\n\tfor i, k := range ks {\n\t\tp[i].Key = k.Encode()\n\t}\n\treturn p, nil\n}", "func getPost(w http.ResponseWriter, r *http.Request) {\r\n\tw.Header().Set(\"Content-Type\", \"application/json\")\r\n\tparams := mux.Vars(r)\r\n\tfor _, item := range posts {\r\n\t\tif item.ID == params[\"id\"] {\r\n\r\n\t\t\tjson.NewEncoder(w).Encode(item)\r\n\t\t\tbreak\r\n\t\t}\r\n\t\treturn\r\n\t}\r\n\tjson.NewEncoder(w).Encode(&Post{})\r\n}", "func getPosts(subreddit string) ([]Post, error) {\n\turl := fmt.Sprintf(\"http://reddit.com/r/%s/top.json?limit=%dx&t=week\", subreddit, Limit)\n\tfmt.Printf(\"fetching %s\\n\", url)\n\n\t// Create a request and add the proper headers.\n\treq, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Header.Set(\"User-Agent\", UserAgent)\n\n\t// Handle the request\n\tresp, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn nil, errors.New(resp.Status)\n\t}\n\n\t// Decode the JSON into the response struct\n\tdata := new(redditResponseJSON)\n\n\tif err = json.NewDecoder(resp.Body).Decode(data); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Put the response in a slice of Posts\n\tposts := make([]Post, len(data.Data.Children))\n\tfor i, child := range data.Data.Children {\n\t\tposts[i] = child.Data\n\t}\n\n\treturn posts, err\n}", "func GetAllPost(w http.ResponseWriter, r *http.Request) {\n\tpage := r.URL.Query()[\"page\"]\n\tuserID := r.URL.Query()[\"user\"]\n\n\tfilter := bson.M{}\n\tfilter[\"status\"] = bson.M{\n\t\t\"$ne\": poststatus.Deleted,\n\t}\n\n\tif len(userID) > 0 {\n\t\tuID, err := primitive.ObjectIDFromHex(userID[0])\n\t\tif err != nil {\n\t\t\tresponse.Error(w, http.StatusUnprocessableEntity, err.Error())\n\t\t\treturn\n\t\t}\n\t\tfilter[\"user_id\"] = uID\n\t}\n\n\tvar count int\n\n\tif len(page) > 0 {\n\t\tfmt.Println(\"STUFF\", len(page))\n\t\tnum, err := strconv.Atoi(page[0])\n\t\tif err != nil {\n\t\t\tresponse.Error(w, http.StatusUnprocessableEntity, err.Error())\n\t\t\treturn\n\t\t}\n\t\tcount = num\n\t} else {\n\t\tcount = 0\n\t}\n\n\tposts, err := GetAll(filter, count)\n\n\tif err != nil {\n\t\tresponse.Error(w, http.StatusUnprocessableEntity, err.Error())\n\t\treturn\n\t}\n\n\tif posts == nil {\n\t\tposts = []GetPostStruct{}\n\t}\n\n\tresponse.Success(w, r,\n\t\thttp.StatusOK,\n\t\tposts,\n\t)\n\treturn\n}", "func (bav *UtxoView) GetAllPosts() (_corePosts []*PostEntry, _commentsByPostHash map[BlockHash][]*PostEntry, _err error) {\n\t// Start by fetching all the posts we have in the db.\n\t//\n\t// TODO(performance): This currently fetches all posts. We should implement\n\t// some kind of pagination instead though.\n\t_, _, dbPostEntries, err := DBGetAllPostsByTstamp(bav.Handle, true /*fetchEntries*/)\n\tif err != nil {\n\t\treturn nil, nil, errors.Wrapf(err, \"GetAllPosts: Problem fetching PostEntry's from db: \")\n\t}\n\n\t// Iterate through the entries found in the db and force the view to load them.\n\t// This fills in any gaps in the view so that, after this, the view should contain\n\t// the union of what it had before plus what was in the db.\n\tfor _, dbPostEntry := range dbPostEntries {\n\t\tbav.GetPostEntryForPostHash(dbPostEntry.PostHash)\n\t}\n\n\t// Do one more pass to load all the comments from the DB.\n\tfor _, postEntry := range bav.PostHashToPostEntry {\n\t\t// Ignore deleted or rolled-back posts.\n\t\tif postEntry.isDeleted {\n\t\t\tcontinue\n\t\t}\n\n\t\t// If we have a post in the view and if that post is not a comment\n\t\t// then fetch its attached comments from the db. We need to do this\n\t\t// because the tstamp index above only fetches \"core\" posts not\n\t\t// comments.\n\n\t\tif len(postEntry.ParentStakeID) == 0 {\n\t\t\t_, dbCommentHashes, _, err := DBGetCommentPostHashesForParentStakeID(\n\t\t\t\tbav.Handle, postEntry.ParentStakeID, false /*fetchEntries*/)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, nil, errors.Wrapf(err, \"GetAllPosts: Problem fetching comment PostEntry's from db: \")\n\t\t\t}\n\t\t\tfor _, commentHash := range dbCommentHashes {\n\t\t\t\tbav.GetPostEntryForPostHash(commentHash)\n\t\t\t}\n\t\t}\n\t}\n\n\tallCorePosts := []*PostEntry{}\n\tcommentsByPostHash := make(map[BlockHash][]*PostEntry)\n\tfor _, postEntry := range bav.PostHashToPostEntry {\n\t\t// Ignore deleted or rolled-back posts.\n\t\tif postEntry.isDeleted {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Every post is either a core post or a comment. If it has a stake ID\n\t\t// its a comment, and if it doesn't then it's a core post.\n\t\tif len(postEntry.ParentStakeID) == 0 {\n\t\t\tallCorePosts = append(allCorePosts, postEntry)\n\t\t} else {\n\t\t\t// Add the comment to our map.\n\t\t\tcommentsForPost := commentsByPostHash[*StakeIDToHash(postEntry.ParentStakeID)]\n\t\t\tcommentsForPost = append(commentsForPost, postEntry)\n\t\t\tcommentsByPostHash[*StakeIDToHash(postEntry.ParentStakeID)] = commentsForPost\n\t\t}\n\t}\n\t// Sort all the comment lists as well. Here we put the latest comment at the\n\t// end.\n\tfor _, commentList := range commentsByPostHash {\n\t\tsort.Slice(commentList, func(ii, jj int) bool {\n\t\t\treturn commentList[ii].TimestampNanos < commentList[jj].TimestampNanos\n\t\t})\n\t}\n\n\treturn allCorePosts, commentsByPostHash, nil\n}", "func (repo *feedRepository) GetPosts(f *feed.Feed, sort feed.Sorting, limit, offset int) ([]*feed.Post, error) {\n\tvar err error\n\n\tvar rows *sql.Rows\n\tswitch sort {\n\t// TODO test queries with actual posts\n\tcase feed.SortNew:\n\t\trows, err = repo.db.Query(`\n\t\tSELECT id\n\t\tFROM\t(SELECT id, creation_time\n\t\t\t\t FROM (\n\t\t\t\t SELECT channel_username\n\t\t\t\t FROM feed_subscriptions\n\t\t\t\t WHERE feed_id = $1\n\t\t\t\t ) AS C (channel_from)\n\t\t\t\t NATURAL JOIN\n\t\t\t\t posts\n\t\t\t\t ) AS P\n\t\tORDER BY creation_time DESC NULLS LAST LIMIT $2 OFFSET $3`, f.ID, limit, offset)\n\tcase feed.SortHot:\n\t\trows, err = repo.db.Query(`\n\t\tSELECT post_id\n\t\tFROM(SELECT LP.post_id, comment_count\n\t\t\tFROM(\n\t\t\t SELECT *\n\t\t\t\tFROM (SELECT id, creation_time\n\t\t\t\t FROM (\n\t\t\t\t SELECT channel_username\n\t\t\t\t FROM feed_subscriptions\n\t\t\t\t WHERE feed_id = $1\n\t\t\t\t ) AS C (channel_from)\n\t\t\t\t NATURAL JOIN\n\t\t\t\t posts\n\t\t\t\t ) AS P\n\t\t\t\tORDER BY creation_time DESC NULLS LAST\n\t\t\t\t) AS LP (post_id)\n\t\t\t\tLEFT JOIN\n\t\t\t\t(SELECT post_from, COALESCE(COUNT(*), 0)\n\t\t\t\t FROM comments\n\t\t\t\t GROUP BY post_from\n\t\t\t\t) AS PS (post_id, comment_count) ON LP.post_id = PS.post_id\n\t\t\tORDER BY creation_time DESC\n\t\t) AS F ORDER BY comment_count DESC NULLS LAST \n\t\tLIMIT $2 OFFSET $3`, f.ID, limit, offset)\n\tcase feed.NotSet:\n\t\tfallthrough\n\tcase feed.SortTop:\n\t\tfallthrough\n\tdefault:\n\t\trows, err = repo.db.Query(`\n\t\tSELECT post_id\n\t\tFROM(SELECT Lp.post_id, total_star_count\n\t\t\tFROM(\n\t\t\t SELECT *\n\t\t\t\tFROM (SELECT id, creation_time\n\t\t\t\t FROM (\n\t\t\t\t SELECT channel_username\n\t\t\t\t FROM feed_subscriptions\n\t\t\t\t WHERE feed_id = $1\n\t\t\t\t ) AS C (channel_from)\n\t\t\t\t NATURAL JOIN\n\t\t\t\t posts\n\t\t\t\t ) AS P\n\t\t\t\tORDER BY creation_time DESC NULLS LAST\n\t\t\t\t) AS LP (post_id)\n\t\t\t\tLEFT JOIN\n\t\t\t\t(SELECT post_id,SUM(star_count)\n\t\t\t\t FROM post_stars\n\t\t\t\t GROUP BY post_id\n\t\t\t\t) AS PS (post_id, total_star_count) ON LP.post_id = PS.post_id\n\t\t\tORDER BY creation_time DESC\n\t\t) AS F ORDER BY total_star_count DESC NULLS LAST \n\t\tLIMIT $2 OFFSET $3`, f.ID, limit, offset)\n\t}\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"querying for feed_subscriptions failed because of: %s\", err.Error())\n\t}\n\tdefer rows.Close()\n\n\tvar id int\n\tposts := make([]*feed.Post, 0)\n\n\tfor rows.Next() {\n\t\terr := rows.Scan(&id)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"scanning from rows failed because: %s\", err.Error())\n\t\t}\n\t\tposts = append(posts, &feed.Post{ID: id})\n\t}\n\terr = rows.Err()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"scanning from rows faulty because: %s\", err.Error())\n\t}\n\n\treturn posts, nil\n}", "func (cc *CleanupCommand) listPosts() ([]store.PostInfo, error) {\n\tlistURL := fmt.Sprintf(\"%s/api/v1/list?site=%s&limit=10000\", cc.RemarkURL, cc.Site)\n\tclient := http.Client{Timeout: 30 * time.Second}\n\tdefer client.CloseIdleConnections()\n\tr, err := client.Get(listURL)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"get request failed for list of posts, site %s: %w\", cc.Site, err)\n\t}\n\tdefer func() { _ = r.Body.Close() }()\n\n\tif r.StatusCode != 200 {\n\t\treturn nil, fmt.Errorf(\"request %s failed with status %d\", listURL, r.StatusCode)\n\t}\n\n\tlist := []store.PostInfo{}\n\tif err = json.NewDecoder(r.Body).Decode(&list); err != nil {\n\t\treturn nil, fmt.Errorf(\"can't decode list of posts for site %s: %w\", cc.Site, err)\n\t}\n\treturn list, nil\n}", "func GetRoomPost(w http.ResponseWriter, r *http.Request) {\n\tdb, err := gorm.Open(DatabaseName, DatabaseURL)\n\tif err != nil {\n\t\tpanic(\"We can't open database!(GetRoomPost)\")\n\t}\n\tdefer db.Close()\n\tlog.Println(\"GET : GetRoomPost\")\n\tvars := mux.Vars(r)\n\troomID := vars[\"roomID\"]\n\tvar posts []model.Post\n\tdb.Where(&model.Post{RoomID: roomID}).Find(&posts)\n\t//その後データベースからユーザーデータを取ってくる\n\tvar user model.User\n\t//postのデータをすべて取った後userデータ総当り\n\tvar sendPosts []model.SendPost\n\tif len(posts) != 0 {\n\t\tdb.Where(&model.User{ID: posts[0].UserID}).First(&user)\n\t\tfor i := 0; i < len(posts); i++ {\n\t\t\tvar sendPost model.SendPost\n\t\t\tsendPost.PostID = posts[i].ID\n\t\t\tsendPost.Sentence = posts[i].Sentence\n\t\t\tsendPost.Date = posts[i].Date\n\t\t\tsendPost.UserID = posts[i].UserID\n\t\t\tsendPost.RoomID = posts[i].RoomID\n\t\t\tsendPost.UserPhotoURL = user.PhotoURL\n\t\t\tsendPost.UserName = user.DisplayName\n\t\t\tsendPosts = append(sendPosts, sendPost)\n\t\t}\n\t}\n\tjson.NewEncoder(w).Encode(sendPosts)\n}", "func (repo *Posts) Post(id graphql.ID) *models.Post {\n\treturn repo.posts[id]\n}", "func AllPosts() ([]*PostMessage, error) {\n\trows, err := db.Query(\"SELECT * FROM posts\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tposts := make([]*PostMessage, 0)\n\tfor rows.Next() {\n\t\tpost := new(PostMessage)\n\t\terr := rows.Scan(&post.URL, &post.Text)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tposts = append(posts, post)\n\t}\n\tif err = rows.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn posts, nil\n}", "func getUserPostsHandler(res http.ResponseWriter, req *http.Request) {\n\tres.Header().Add(\"content-type\", \"application/json\")\n\tparams := mux.Vars(req)\n\tid, _ := primitive.ObjectIDFromHex(params[\"id\"])\n\tfmt.Println(id)\n\tvar posts []MongoPostSchema\n\tpostsCol := client.Database(\"Aviroop_Nandy_Appointy\").Collection(\"posts\")\n\tctx, _ := context.WithTimeout(context.Background(), 10*time.Second)\n\tcursor, err := postsCol.Find(ctx, bson.M{})\n\n\tif err != nil {\n\t\tres.WriteHeader(http.StatusInternalServerError)\n\t\tres.Write([]byte(`{\"Error message\":\"` + err.Error() + `\"}`))\n\t\treturn\n\t}\n\n\tdefer cursor.Close(ctx)\n\tfor cursor.Next(ctx) {\n\t\tvar post MongoPostSchema\n\t\tcursor.Decode(&post)\n\t\tposts = append(posts, post)\n\t}\n\n\tif err := cursor.Err(); err != nil {\n\t\tres.WriteHeader(http.StatusInternalServerError)\n\t\tres.Write([]byte(`{\"message\":\"` + err.Error() + `\"}`))\n\t\treturn\n\t}\n\tjson.NewEncoder(res).Encode(posts)\n}", "func getPostsForUser(user, viewer *models.User) (*models.PostMetaDataList, error) {\n\tvar posts models.PostList\n\tif _, err := models.Posts().Filter(\"user\", user).OrderBy(\"-Date\").RelatedSel().All(&posts); err != nil {\n\t\treturn nil, err\n\t}\n\tmetas := posts.ToMetaData()\n\tfor _, p := range *metas {\n\t\tp.ReadVoteData(viewer)\n\t}\n\treturn metas, nil\n}", "func (b *_Blogs) GetPosts(ctx context.Context, db database.DB, model *Blog, relationFieldset ...string) ([]*Post, error) {\n\tif model == nil {\n\t\treturn nil, errors.Wrap(query.ErrNoModels, \"provided nil model\")\n\t}\n\t// Check if primary key has zero value.\n\tif model.IsPrimaryKeyZero() {\n\t\treturn nil, errors.Wrap(mapping.ErrFieldValue, \"model's: 'Blog' primary key value has zero value\")\n\t}\n\trelationField, err := b.Model.RelationByIndex(3)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar fields []*mapping.StructField\n\trelationModel := relationField.Relationship().RelatedModelStruct()\n\tif len(relationFieldset) == 0 {\n\t\tfields = relationModel.Fields()\n\t} else {\n\t\tfor _, field := range relationFieldset {\n\t\t\tsField, ok := relationModel.FieldByName(field)\n\t\t\tif !ok {\n\t\t\t\treturn nil, errors.Wrapf(mapping.ErrInvalidModelField, \"no field: '%s' found for the model: 'Post'\", field)\n\t\t\t}\n\t\t\tfields = append(fields, sField)\n\t\t}\n\t}\n\n\trelations, err := db.GetRelations(ctx, b.Model, []mapping.Model{model}, relationField, fields...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(relations) == 0 {\n\t\treturn []*Post{}, nil\n\t}\n\tresult := make([]*Post, len(relations))\n\tfor i, relation := range relations {\n\t\tresult[i] = relation.(*Post)\n\t}\n\treturn result, nil\n}", "func (*controller) GetPosts(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-type\", \"application/json\")\n\tposts, err := postService.FindAll()\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tjson.NewEncoder(w).Encode(errors.ServiceError{Message: \"Failed to load posts\"})\n\t\treturn\n\t}\n\tw.WriteHeader(http.StatusOK)\n\tjson.NewEncoder(w).Encode(posts)\n\n}", "func ListPost(c buffalo.Context) error {\n\n\tdb := c.Value(\"tx\").(*pop.Connection)\n\n\tposts := &models.Posts{}\n\n\tquery := db.PaginateFromParams(c.Params())\n\n\tif err := query.Order(\"created_at desc\").Eager().All(posts); err != nil {\n\n\t\terrorResponse := utils.NewErrorResponse(http.StatusInternalServerError, \"user\", \"There is a problem while loading the relationship user\")\n\t\treturn c.Render(http.StatusInternalServerError, r.JSON(errorResponse))\n\t}\n\n\tresponse := PostsResponse{\n\t\tCode: fmt.Sprintf(\"%d\", http.StatusOK),\n\t\tData: *posts,\n\t\tMeta: *query.Paginator,\n\t}\n\tc.Logger().Debug(c.Value(\"email\"))\n\treturn c.Render(http.StatusOK, r.JSON(response))\n}", "func (self PostgresDatabase) GetAllArticles() (articles []ArticleEntry) {\n rows, err := self.conn.Query(\"SELECT message_id, newsgroup FROM ArticlePosts\")\n if err == nil {\n for rows.Next() {\n var entry ArticleEntry\n rows.Scan(&entry[0], &entry[1])\n articles = append(articles, entry)\n }\n rows.Close()\n } else {\n log.Println(\"failed to get all articles\", err)\n }\n return articles\n}", "func AllPosts(db *gorm.DB) ([]model.PostOutput, string) {\n\n\tvar posts []model.Post\n\terr := db.Preload(\"Author\").Preload(\"Comments\").Preload(\"Comments.Author\").Preload(\"Likes\").Preload(\"Likes.Author\").Find(&posts).Error\n\tuser := true\n\tcomment := 1\n\tresult := postsToPostOutput(posts, user, comment)\n\n\tif err == nil {\n\t\treturn result, \"\"\n\t}\n\treturn result, err.Error()\n}", "func getPost(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tparams := mux.Vars(r)\n\tresult, err := db.Query(\"select client_id, client_email, client_timezone, client_user_email, client_user_timezone FROM ClientUserEmail WHERE client_id = ?\", params[\"client_id\"])\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\tdefer result.Close()\n\tvar post Post\n\tfor result.Next() {\n\t\terr := result.Scan(&post.Client_Id, &post.Client_Email, &post.Client_Timezone, &post.Client_User_Email, &post.Client_User_TimeZone)\n\t\tif err != nil {\n\t\t\tpanic(err.Error())\n\t\t}\n\t}\n\tjson.NewEncoder(w).Encode(post)\n}", "func UserPostsList(userID int) []dto.Article {\n\tlogfile, er := os.OpenFile(utils.LogFile, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0666)\n\tif er != nil {\n\t\tpanic(er.Error())\n\t}\n\tdefer logfile.Close()\n\t// Initalize DB Connection\n\tsql, sqlErr := utils.DBInit()\n\tif sqlErr != nil {\n\t\tlog.SetOutput(io.MultiWriter(logfile, os.Stdout))\n\t\tlog.SetFlags(log.Ldate | log.Ltime)\n\t\tlog.Fatal(sqlErr)\n\t}\n\t// Close DB connection at the end.\n\tdefer sql.Close()\n\t// SQL syntax\n\tgetPosts := `SELECT \n\t\t\t\t\t\tarticle_table.user_id,\n\t\t\t\t\t\tarticle_table.article_id, \n\t\t\t\t\tCOALESCE(\n\t\t\t\t\t\tCOUNT(liked_table.user_id), 0) \n\t\t\t\t\tAS \n\t\t\t\t\t\tliked_sum, \n\t\t\t\t\t\tuser_table.user_name, \n\t\t\t\t\t\tarticle_table.title, \n\t\t\t\t\t\tarticle_table.content, \n\t\t\t\t\t\tarticle_table.created_time, \n\t\t\t\t\t\tarticle_table.modified_time \n\t\t\t\t\tFROM (\n\t\t\t\t\t\t\tarticle_table \n\t\t\t\t\t\tINNER JOIN \n\t\t\t\t\t\t\tuser_table \n\t\t\t\t\t\tON \n\t\t\t\t\t\t\tarticle_table.user_id = user_table.user_id\n\t\t\t\t\t\t) \n\t\t\t\t\tLEFT JOIN \n\t\t\t\t\t\tliked_table \n\t\t\t\t\tON \n\t\t\t\t\t\tarticle_table.article_id = liked_table.article_id \n\t\t\t\t\tWHERE \n\t\t\t\t\t\tuser_table.user_id = ? \n\t\t\t\t\tGROUP BY \n\t\t\t\t\t\tarticle_table.article_id;`\n\n\trow, err := sql.Query(getPosts, userID)\n\n\tif err != nil {\n\t\tlog.SetOutput(io.MultiWriter(logfile, os.Stdout))\n\t\tlog.SetFlags(log.Ldate | log.Ltime)\n\t\tlog.Fatal(err)\n\t}\n\t// Prepare an array which save JSON results.\n\tvar postArray []dto.Article\n\n\tfor row.Next() {\n\t\tposts := dto.Article{}\n\t\tif err := row.Scan(&posts.UserID, &posts.ArticleID, &posts.LikedSum, &posts.UserName, &posts.Title, &posts.Content, &posts.CreatedTime, &posts.ModifiedTime); err != nil {\n\t\t\tlog.SetOutput(io.MultiWriter(logfile, os.Stdout))\n\t\t\tlog.SetFlags(log.Ldate | log.Ltime)\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\t// Appending JSON in array.\n\t\tpostArray = append(postArray, posts)\n\t}\n\n\treturn postArray\n}", "func (h *userHandler) ListPost(w http.ResponseWriter, r *http.Request) {\r\n\th.store.RLock()\r\n\tposts := make([]post, 0, len(h.store.m))\r\n\tfor _, v := range h.store.m {\r\n\t\tposts = append(users, v)\r\n\t}\r\n\th.store.RUnlock()\r\n\tjsonBytes, err := json.Marshal(posts)\r\n\tif err != nil {\r\n\t\tinternalServerError(w, r)\r\n\t\treturn\r\n\t}\r\n\tw.WriteHeader(http.StatusOK)\r\n\tw.Write(jsonBytes)\r\n}", "func GetPost(id int) (post Post, err error) {\n\tpost = Post{}\n\terr = Db.QueryRow(\"select * from posts where id = $1\", id).Scan(&post.ID, &post.Title, &post.Body, &post.CreatedAt)\n\treturn\n}", "func getPostHandler(res http.ResponseWriter, req *http.Request) {\n\tres.Header().Add(\"content-type\", \"application.json\")\n\tparams := mux.Vars(req)\n\tid, _ := primitive.ObjectIDFromHex(params[\"id\"])\n\tvar post MongoPostSchema\n\n\tpostsCol := client.Database(\"Aviroop_Nandy_Appointy\").Collection(\"posts\")\n\tctx, _ := context.WithTimeout(context.Background(), 15*time.Second)\n\terr := postsCol.FindOne(ctx, MongoPostSchema{ID: id}).Decode(&post)\n\n\tif err != nil {\n\t\tres.WriteHeader(http.StatusInternalServerError)\n\t\tres.Write([]byte(`{\"Error message\":\"` + err.Error() + `\"}`))\n\t\treturn\n\t}\n\tjson.NewEncoder(res).Encode(post)\n}", "func (p *PostsController) GetPosts(limit int, cursor string, userId int) ([]models.Post, bool) {\n\tvar posts []models.Post\n\tif limit > 50 {\n\t\tlimit = 50\n\t}\n\tlimit++\n\n\tif cursor != \"\" {\n\t\tp.db.Raw(`\n\t\t\tSELECT p.*,\n\t\t\t(SELECT \"value\" from \"likes\" \n\t\t\tWHERE \"user_id\" = ? and \"post_id\" = p.id) as \"StateValue\",\n\t\t\t(SELECT username FROM \"profiles\"\n\t\t\tWHERE user_id = p.user_id) as \"Creator\"\n\t\t\tFROM posts p\n\t\t\tWHERE p.created_at < ?\n\t\t\tORDER BY p.created_at DESC\n\t\t\tLIMIT ?\n\t\t`, userId, cursor, limit).Find(&posts)\n\t} else {\n\t\tp.db.Raw(`\n\t\t\tSELECT p.*,\n\t\t\t( SELECT \"value\" from \"likes\" \n\t\t\tWHERE \"user_id\" = ? and \"post_id\" = p.id) as \"StateValue\",\n\t\t\t(SELECT \"username\" FROM \"profiles\"\n\t\t\tWHERE user_id = p.user_id) as \"Creator\"\n\t\t\tFROM posts p\n\t\t\tORDER BY p.created_at DESC\n\t\t\tLIMIT ?\n\t\t`, userId, limit).Find(&posts)\n\t}\n\tif len(posts) == 0 {\n\t\treturn nil, false\n\t}\n\tif len(posts) == limit {\n\t\treturn posts[0 : limit-1], true\n\t}\n\n\treturn posts, false\n}", "func (r *queryResolver) Posts(ctx context.Context, after *entgql.Cursor[int], first *int, before *entgql.Cursor[int], last *int, orderBy *ent.PostOrder, where *ent.PostWhereInput) (*ent.PostConnection, error) {\n\tconn, err := ent.FromContext(ctx).Post.Query().Paginate(\n\t\tctx, after, first, before, last,\n\t\tent.WithPostOrder(orderBy),\n\t\tent.WithPostFilter(where.Filter),\n\t)\n\n\tif err == nil && conn.TotalCount == 1 {\n\t\tpost := conn.Edges[0].Node\n\n\t\tif post.ContentHTML == \"\" {\n\t\t\treturn conn, nil\n\t\t}\n\n\t\tgo database.PostViewCounter(ctx, post)\n\t}\n\n\treturn conn, err\n}", "func newPost(fullPath string) (*Post, error) {\n\tf, err := os.Open(fullPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefer f.Close()\n\n\t// Load the HTML document\n\tdom, err := goquery.NewDocumentFromReader(f)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tp := &Post{\n\t\tDOM: dom,\n\t\tHTMLFileName: filepath.Base(f.Name()),\n\t\tImages: make([]*Image, 0),\n\t\tTags: make([]string, 0),\n\t\tLastmod: time.Now().Format(time.RFC3339),\n\t}\n\n\t// draft is prefixed in filename\n\tp.Draft = strings.HasPrefix(p.HTMLFileName, DraftPrefix)\n\n\treturn p, nil\n}", "func (handler Handler) handlePostGetMany(w http.ResponseWriter, r *http.Request) {\n\tkeys := r.URL.Query()\n\tlimitStr := keys.Get(\"limit\")\n\n\tvar limit int\n\tvar err error\n\tif len(limitStr) != 0 {\n\t\tlimit, err = strconv.Atoi(limitStr)\n\t\tif err != nil {\n\t\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\t\treturn\n\t\t}\n\t}\n\n\tdb := repository.NewPostRepository(handler.DB)\n\n\tposts, err := db.FindMany(limit)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tresponses.JSON(w, http.StatusOK, posts)\n}", "func Get(tags []string, databaseFile string) ([]string, error) {\n\t// Open DB File\n\traw, err := ioutil.ReadFile(databaseFile)\n\tif err != nil {\n\t\treturn []string{}, err\n\t}\n\n\tvar data []object\n\tjson.Unmarshal(raw, &data)\n\n\tfileList := []string{}\n\n\tfor _, d := range data {\n\t\tif len(tags) == 0 { // tags are empty\n\t\t\tfileList = append(fileList, d.FilePath)\n\t\t} else {\n\t\t\t// append result if tags in data contains all of request tags\n\t\t\tmatched := true\n\t\t\tfor _, tag := range tags {\n\t\t\t\tif !contains(d.Tags, tag) {\n\t\t\t\t\tmatched = false\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif matched {\n\t\t\t\tfileList = append(fileList, d.FilePath)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn fileList, nil\n}", "func getPersistedRequests(filename string) DB {\n\tplan, err := ioutil.ReadFile(filename)\n\tif err != nil {\n\t\tlog.Print(err)\n\t}\n\n\tvar db DB\n\terr = json.Unmarshal(plan, &db)\n\tif err != nil {\n\t\tlog.Print(err)\n\t}\n\n\treturn db\n}", "func (repository *RepositoryPostCRUD) FindAll() ([]models.Post, error) {\n\tvar posts []models.Post\n\tdone := make(chan bool) //crea un canal que comunica valores boleanos\n\tctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)\n\tdefer cancel()\n\t//go function\n\t//Se encarga de recuperar todos los posts de la base de datos, y transmite el resultado por medio de un canal boleano\n\tgo func(ch chan<- bool) {\n\t\tdefer cancel()\n\t\tcursor, err := repository.db.Collection(\"Posts\").Find(ctx, bson.M{})\n\t\tdefer cursor.Close(ctx)\n\t\tif err != nil {\n\t\t\tch <- false\n\t\t\treturn\n\t\t}\n\t\tfor cursor.Next(ctx) { //for each element in the database\n\t\t\tvar post models.Post\n\t\t\tcursor.Decode(&post)\n\t\t\tposts = append(posts, post) //lo acgrega al slice de posts\n\t\t}\n\t\tif len(posts) > 0 {\n\t\t\tch <- true\n\t\t}\n\t}(done)\n\n\tif channels.OK(done) {\n\t\treturn posts, nil\n\t}\n\treturn []models.Post{}, nil\n}", "func retrieve(id int) (post Post, err error) {\n\tpost = Post{}\n\tstmt := \"SELECT id, title, body, author FROM posts WHERE id = $1\"\n\terr = Db.QueryRow(stmt, id).Scan(&post.Id, &post.Title, &post.Body, &post.Author)\n\treturn\n}", "func FetchPosts(c *gin.Context) {\n\tid, err := utils.GetSessionID(c)\n\tif err != nil || id != \"CEO\" {\n\t\tc.String(http.StatusForbidden, \"Only the CEO can access this.\")\n\t\treturn\n\t}\n\n\tposts, err := ElectionDb.GetPosts()\n\tif err != nil {\n\t\tc.String(http.StatusInternalServerError, \"Error while fetching posts.\")\n\t\treturn\n\t}\n\tc.JSON(http.StatusOK, &posts)\n}", "func GetPost(w http.ResponseWriter, r *http.Request, app api.AppServicer) (interface{}, error) {\n\tenv := app.(api.AppService)\n\tvars := mux.Vars(r)\n\tid, _ := strconv.Atoi(vars[\"id\"])\n\tpost := &models.Post{ID: id}\n\n\terr := post.GetPost(env.DB)\n\treturn post, err\n}", "func FindAllPosts() ([]models.Post, error) {\n\tvar data []models.Post\n\tctx := context.Background()\n\tclient, err := firestore.NewClient(ctx, os.Getenv(\"PROJECT_ID\"))\n\tif err != nil {\n\t\tlog.Fatalf(\"Failed to create a Firestore Client: %v\", err)\n\t\treturn nil, err\n\t}\n\n\tdefer client.Close()\n\n\titer := client.Collection(collectionPosts).Documents(ctx)\n\tfor {\n\t\tdoc, err := iter.Next()\n\t\tif err == iterator.Done {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult := models.Post{\n\t\t\tID: doc.Ref.ID,\n\t\t\tTitle: doc.Data()[\"title\"].(string),\n\t\t\tText: doc.Data()[\"text\"].(string),\n\t\t\tDate: doc.Data()[\"date\"].(time.Time),\n\t\t\tPrice: doc.Data()[\"price\"].(int64),\n\t\t\tAuthors: doc.Data()[\"authors\"].([]interface{}),\n\t\t\tPublished: doc.Data()[\"published\"].(bool),\n\t\t}\n\n\t\tdata = append(data, result)\n\t}\n\treturn data, nil\n}", "func Files(dir string) ([]Parsed, error) {\n\tposts := []Parsed{}\n\t// Find post files in specified dir\n\tpostFiles, err := readMDFiles(dir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// Sort the files by the date in the title\n\tpostFiles, err = sortFilesChronological(postFiles)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, f := range postFiles {\n\t\tmeta, body, err := extractYAMLFrontmatter(f.bytes)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Could not extract frontmatter for %s (%s)\", f.filename, err.Error())\n\t\t\tcontinue\n\t\t}\n\t\tbodyHTML := parseBodyHTML([]byte(body))\n\t\tpost := Parsed{\n\t\t\tTitle: meta[\"title\"],\n\t\t\tDate: f.date,\n\t\t\tSlug: f.slug,\n\t\t\tBodyPlain: body,\n\t\t\tBodyHTML: string(bodyHTML)}\n\t\tposts = append(posts, post)\n\t}\n\treturn posts, nil\n}", "func (c *Client) GetMultiple(ctx context.Context, skip uint64, take uint64) ([]domain.Post, error) {\n\tvar pst = domain.Post{}\n\tvar img = pb.Image{}\n\tr, err := c.service.GetMultiplePosts(\n\t\tctx,\n\t\t&pb.GetMultiplePostsRequest{\n\t\t\tSkip: skip,\n\t\t\tTake: take,\n\t\t},\n\t)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tposts := []domain.Post{}\n\tfor _, a := range r.Posts {\n\t\timg = *a.ContentPhoto\n\t\tpst.ContentPhoto.Name = img.Name\n\t\tposts = append(posts, domain.Post{\n\t\t\tID: bson.ObjectIdHex(a.Id),\n\t\t\tAuthor: bson.ObjectIdHex(a.Author),\n\t\t\tTopic: a.Topic,\n\t\t\tCategory: a.Category,\n\t\t\tContentText: a.ContentText,\n\t\t\tContentPhoto: pst.ContentPhoto,\n\t\t})\n\t}\n\treturn posts, nil\n}", "func ReadPost(req *http.Request, s sessions.Session, params martini.Params, res render.Render) {\n\tvar post Post\n\tif params[\"slug\"] == \"new\" {\n\t\tres.JSON(400, map[string]interface{}{\"error\": \"There can't be a post called 'new'.\"})\n\t\treturn\n\t}\n\tpost.Slug = params[\"slug\"]\n\tpost, err := post.Get()\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tif err.Error() == \"not found\" {\n\t\t\tres.JSON(404, NotFound())\n\t\t\treturn\n\t\t}\n\t\tres.JSON(500, map[string]interface{}{\"error\": \"Internal server error\"})\n\t\treturn\n\t}\n\tgo post.Increment()\n\tswitch Root(req) {\n\tcase \"api\":\n\t\tres.JSON(200, post)\n\t\treturn\n\tcase \"post\":\n\t\tres.HTML(200, \"post/display\", post)\n\t\treturn\n\t}\n}", "func (d *DynamoDB)GetPost(id string) (models.Post, error){\n\tfmt.Printf(logRoot + \"Searching %v table for post with id:%v\\n\", postTable, id)\n\tfmt.Println(\"UNIMPLEMENTED\")\n\treturn models.Post{}, nil\n}", "func (pc PostsController) getSinglePost(response http.ResponseWriter, request *http.Request, parameters httprouter.Params) {\n\tresponse.Header().Add(\"content-type\", \"application/json\")\n\tid_string := parameters.ByName(\"id\")\n\n\tid, _ := primitive.ObjectIDFromHex(id_string)\n\tvar post Posts\n\tctx, _ := context.WithTimeout(context.Background(), 10*time.Second)\n\terr := pc.postscollection.FindOne(ctx, bson.M{\"_id\": id}).Decode(&post)\n\n\tif err != nil {\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\n\t\tresponse.Write([]byte(`{\"message: \"` + err.Error() + `\"}\"`))\n\t\treturn\n\t}\n\tjson.NewEncoder(response).Encode(post)\n}", "func (u *App) List(c echo.Context, p *model.Pagination) ([]model.Post, string, string, int64, int64, error) {\n\tau := u.rbac.User(c)\n\tq, err := query.List(au, model.ResourcePost)\n\tif err != nil {\n\t\treturn nil, \"\", \"\", 0, 0, err\n\t}\n\n\tif c.QueryString() != \"\" {\n\t\tp.PostQuery = &model.Post{}\n\t\tparams := c.QueryParams()\n\n\t\tp.PostQuery.Status = params.Get(\"status\")\n\t\tp.SearchQuery = params.Get(\"s\")\n\t}\n\n\treturn u.udb.List(u.db, q, p)\n}", "func ReadPost(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\tdata, err := newPostData(ps.ByName(\"title\"))\n\tif err != nil {\n\t\thttp.NotFound(w, r)\n\t}\n\terr = t.ExecuteTemplate(w, \"post\", data)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "func GetAllByPostID(db *sql.DB, postID string) ([]string, error) {\n\tvar tags []string\n\n\trows, err := db.Query(\"select tag from tags inner join post_tags ON tags.tag_id=post_tags.tag_id where post_id = $1\",\n\t\tpostID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor rows.Next() {\n\t\tvar tag string\n\t\tif err = rows.Scan(&tag); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttags = append(tags, tag)\n\t}\n\n\treturn tags, nil\n}", "func GetPostsWithOptionsHandler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Println(r.RequestURI)\n\ttemp := strings.Split(r.RequestURI, \"/\")\n\tfmt.Println(temp)\n\tgetOption := temp[2]\n\tcoPosts := mdbSession.DB(\"test\").C(\"Posts\")\n\tvar res []breezyPost\n\tvar resErr error\n\tswitch getOption {\n\tcase \"created\":\n\t\ttimeQuery, err := time.Parse(time.RFC3339, temp[3])\n\t\tfmt.Println(timeQuery)\n\t\t_ = err\n\t\tresErr = coPosts.Find(bson.M{\"created\": bson.M{\"$gte\": timeQuery.Add(-time.Duration(timeQuery.Hour()) * time.Hour), \"$lt\": timeQuery.Add(time.Duration(24-timeQuery.Hour()) * time.Hour)}}).All(&res)\n\t\tif resErr != nil {\n\t\t\tpanic(resErr)\n\t\t}\n\t\tjsRes, err2 := json.Marshal(res)\n\t\tif err2 != nil {\n\t\t\tpanic(err2)\n\t\t}\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.Write(jsRes)\n\n\t\tfmt.Println(len(res))\n\t\tbreak\n\tcase \"creator\":\n\t\tcreator := temp[3]\n\t\tresErr = coPosts.Find(bson.M{\"creator\": creator}).One(&res)\n\t\tif resErr != nil {\n\t\t\tpanic(resErr)\n\t\t}\n\t\tjsRes, err2 := json.Marshal(res)\n\t\tif err2 != nil {\n\t\t\tpanic(err2)\n\t\t}\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.Write(jsRes)\n\t\tfmt.Println(len(res))\n\t\tbreak\n\tcase \"between\":\n\t\tindexes := strings.Split(temp[3], \"-\")\n\t\tlower, err := strconv.Atoi(indexes[0])\n\t\thigher, err3 := strconv.Atoi(indexes[1])\n\t\t_ = err\n\t\t_ = err3\n\t\tresErr = coPosts.Find(nil).Sort(\"-created\").Limit(higher).Skip(lower).All(&res)\n\t\t_ = resErr\n\t\tjsRes, err2 := json.Marshal(res)\n\t\tif err2 != nil {\n\t\t\tpanic(err2)\n\t\t}\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.Write(jsRes)\n\t\tfmt.Println(len(res))\n\t\tbreak\n\t}\n\t_ = resErr\n}", "func showPost(w http.ResponseWriter, r *http.Request) {\n\n\tw.Header().Set(\"cache-control\", \"no-store, no-cache, must-revalidate\")\n\tsession := sessions.Start(w, r)\n\n\tif len(session.GetString(\"username\")) == 0 {\n\t\thttp.Redirect(w, r, \"/login\", 301)\n\t}\n\n\tcurrentUser := QueryUser(session.GetString(\"username\"))\n\tvars := mux.Vars(r)\n\tpost_id := vars[\"id\"]\n\n\tvar posts = post{}\n\tvar timestamp time.Time\n\tvar yeahed string\n\n\tdb.QueryRow(\"SELECT posts.id, created_by, community_id, created_at, body, image, username, nickname, avatar, online FROM posts LEFT JOIN users ON users.id = created_by WHERE posts.id = ?\", post_id).\n\t\tScan(&posts.ID, &posts.CreatedBy, &posts.CommunityID, &timestamp, &posts.Body, &posts.Image, &posts.PosterUsername, &posts.PosterNickname, &posts.PosterIcon, &posts.PosterOnline)\n\tposts.CreatedAt = humanTiming(timestamp)\n\n\tdb.QueryRow(\"SELECT id FROM yeahs WHERE yeah_post = ? AND yeah_by = ? AND on_comment=0\", posts.ID, currentUser.ID).Scan(&yeahed)\n\tif yeahed != \"\" {\n\t\tposts.Yeahed = true\n\t}\n\n\tdb.QueryRow(\"SELECT COUNT(id) FROM yeahs WHERE yeah_post = ? AND on_comment=0\", post_id).Scan(&posts.YeahCount)\n\tdb.QueryRow(\"SELECT COUNT(id) FROM comments WHERE post = ?\", post_id).Scan(&posts.CommentCount)\n\n\tyeah_rows, _ := db.Query(\"SELECT yeahs.id, username, avatar FROM yeahs LEFT JOIN users ON users.id = yeah_by WHERE yeah_post = ? AND yeah_by != ? AND on_comment=0 ORDER BY yeahs.id DESC\", post_id, currentUser.ID)\n\tvar yeahs []yeah\n\n\tfor yeah_rows.Next() {\n\n\t\tvar row = yeah{}\n\n\t\terr = yeah_rows.Scan(&row.ID, &row.Username, &row.Avatar)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t}\n\t\tyeahs = append(yeahs, row)\n\n\t}\n\tyeah_rows.Close()\n\n\tcomment_rows, _ := db.Query(\"SELECT comments.id, created_by, created_at, body, image, username, nickname, avatar, online FROM comments LEFT JOIN users ON users.id = created_by WHERE post = ? ORDER BY created_at ASC\", post_id)\n\tvar comments []comment\n\n\tfor comment_rows.Next() {\n\n\t\tvar row = comment{}\n\t\tvar timestamp time.Time\n\n\t\terr = comment_rows.Scan(&row.ID, &row.CreatedBy, &timestamp, &row.Body, &row.Image, &row.CommenterUsername, &row.CommenterNickname, &row.CommenterIcon, &row.CommenterOnline)\n\t\trow.CreatedAt = humanTiming(timestamp)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t}\n\n\t\tdb.QueryRow(\"SELECT 1 FROM yeahs WHERE yeah_post = ? AND yeah_by = ? AND on_comment=1\", row.ID, currentUser.ID).Scan(&row.Yeahed)\n\n\t\tdb.QueryRow(\"SELECT COUNT(id) FROM yeahs WHERE yeah_post = ? AND on_comment=1\", row.ID).Scan(&row.YeahCount)\n\n\t\tcomments = append(comments, row)\n\n\t}\n\tcomment_rows.Close()\n\n\tcommunity := QueryCommunity(strconv.Itoa(posts.CommunityID))\n\tpjax := r.Header.Get(\"X-PJAX\") == \"\"\n\n\tvar data = map[string]interface{}{\n\t\t\"Title\": posts.PosterNickname + \"'s post\",\n\t\t\"Pjax\": pjax,\n\t\t\"CurrentUser\": currentUser,\n\t\t\"Community\": community,\n\t\t\"Post\": posts,\n\t\t\"Yeahs\": yeahs,\n\t\t\"Comments\": comments,\n\t}\n\n\terr := templates.ExecuteTemplate(w, \"post.html\", data)\n\tif err != nil {\n\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\n\t}\n\n\treturn\n\n}", "func (ms *MongoStore) FetchAllShort(drafts bool) ([]*PostShort, error) {\n\tlongPost := &TextPost{}\n\tshortSlice := make([]*PostShort, 0)\n\tcol := ms.session.DB(ms.dbname).C(ms.colname)\n\titerVal := col.Find(bson.M{}).Iter()\n\tfor iterVal.Next(longPost) {\n\t\tpostShort := &PostShort{\n\t\t\tID: longPost.ID,\n\t\t\tAuthor: longPost.Author,\n\t\t\tTitle: longPost.Title,\n\t\t\tCreated: longPost.Created,\n\t\t\tEdited: longPost.Edited,\n\t\t\tPublish: longPost.Publish,\n\t\t\tDraftMode: longPost.DraftMode,\n\t\t\tTags: longPost.Tags,\n\t\t\tViews: longPost.Views,\n\t\t}\n\t\t// if drafts == true, add everything\n\t\tif drafts {\n\t\t\tshortSlice = append(shortSlice, postShort)\n\t\t} else if !postShort.DraftMode {\n\t\t\tshortSlice = append(shortSlice, postShort)\n\t\t}\n\t}\n\tif err := iterVal.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn shortSlice, nil\n}", "func (postL) LoadPostReads(ctx context.Context, e boil.ContextExecutor, singular bool, maybePost interface{}, mods queries.Applicator) error {\n\tvar slice []*Post\n\tvar object *Post\n\n\tif singular {\n\t\tobject = maybePost.(*Post)\n\t} else {\n\t\tslice = *maybePost.(*[]*Post)\n\t}\n\n\targs := make([]interface{}, 0, 1)\n\tif singular {\n\t\tif object.R == nil {\n\t\t\tobject.R = &postR{}\n\t\t}\n\t\targs = append(args, object.ID)\n\t} else {\n\tOuter:\n\t\tfor _, obj := range slice {\n\t\t\tif obj.R == nil {\n\t\t\t\tobj.R = &postR{}\n\t\t\t}\n\n\t\t\tfor _, a := range args {\n\t\t\t\tif a == obj.ID {\n\t\t\t\t\tcontinue Outer\n\t\t\t\t}\n\t\t\t}\n\n\t\t\targs = append(args, obj.ID)\n\t\t}\n\t}\n\n\tquery := NewQuery(qm.From(`post_reads`), qm.WhereIn(`post_id in ?`, args...))\n\tif mods != nil {\n\t\tmods.Apply(query)\n\t}\n\n\tresults, err := query.QueryContext(ctx, e)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to eager load post_reads\")\n\t}\n\n\tvar resultSlice []*PostRead\n\tif err = queries.Bind(results, &resultSlice); err != nil {\n\t\treturn errors.Wrap(err, \"failed to bind eager loaded slice post_reads\")\n\t}\n\n\tif err = results.Close(); err != nil {\n\t\treturn errors.Wrap(err, \"failed to close results in eager load on post_reads\")\n\t}\n\tif err = results.Err(); err != nil {\n\t\treturn errors.Wrap(err, \"error occurred during iteration of eager loaded relations for post_reads\")\n\t}\n\n\tif len(postReadAfterSelectHooks) != 0 {\n\t\tfor _, obj := range resultSlice {\n\t\t\tif err := obj.doAfterSelectHooks(ctx, e); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\tif singular {\n\t\tobject.R.PostReads = resultSlice\n\t\tfor _, foreign := range resultSlice {\n\t\t\tif foreign.R == nil {\n\t\t\t\tforeign.R = &postReadR{}\n\t\t\t}\n\t\t\tforeign.R.Post = object\n\t\t}\n\t\treturn nil\n\t}\n\n\tfor _, foreign := range resultSlice {\n\t\tfor _, local := range slice {\n\t\t\tif local.ID == foreign.PostID {\n\t\t\t\tlocal.R.PostReads = append(local.R.PostReads, foreign)\n\t\t\t\tif foreign.R == nil {\n\t\t\t\t\tforeign.R = &postReadR{}\n\t\t\t\t}\n\t\t\t\tforeign.R.Post = local\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func (s *service) PostList(params map[string][]string) ([]*model.Post, int64, error) {\n\tfilters, options, err := s.BuildFiltersAndOptions(params)\n\tif err != nil {\n\t\treturn nil, -1, err\n\t}\n\n\titems, totalItems, err := s.db.PostList(filters, options)\n\tif err != nil {\n\t\treturn nil, -1, err\n\t}\n\n\treturn items, totalItems, nil\n}", "func (s *BlugService) GetPost(ctx context.Context, id int) (post *models.Post, err error) {\n\tdefer func(begin time.Time) {\n\t\ts.Logger.Info(\n\t\t\t\"blug\",\n\t\t\tzap.String(\"method\", \"getpost\"),\n\t\t\tzap.Int(\"id\", id),\n\t\t\tzap.NamedError(\"err\", err),\n\t\t\tzap.Duration(\"took\", time.Since(begin)),\n\t\t)\n\t}(time.Now())\n\n\tpost, err = s.DB.GetPost(id)\n\n\treturn post, err\n}", "func NewPost(w http.ResponseWriter, r *http.Request) {\n\n\tdb, err := sqlx.Connect(\"postgres\", connStr)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\tvar post m.PostIn\n\t_ = json.NewDecoder(r.Body).Decode(&post)\n\n\tquery := `insert into posts(title, content)\n\t\t\t\t\t\t\t\t\t\t\t values(:title, :content)`\n\n\t_, err = db.NamedExec(query, post)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n}", "func (ps PostStorage) GetPost(ctx sdk.Context, permlink linotypes.Permlink) (*Post, sdk.Error) {\n\tstore := ctx.KVStore(ps.key)\n\tkey := GetPostInfoKey(permlink)\n\tinfoByte := store.Get(key)\n\tif infoByte == nil {\n\t\treturn nil, types.ErrPostNotFound(permlink)\n\t}\n\tpostInfo := new(Post)\n\tps.cdc.MustUnmarshalBinaryLengthPrefixed(infoByte, postInfo)\n\treturn postInfo, nil\n}", "func (u *User)Posts() Posts{\n\treturn u.posts\n}", "func AddPost(post blog.Post) {\n\ttx, _ := db.Begin()\n\tpost.SetDateToNow()\n\tstmt, err := tx.Prepare(\"INSERT INTO blogposts (post, author, title, timestamp) VALUES(?, ?, ?, ?)\")\n\tdefer stmt.Close()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\t_, err = stmt.Exec(post.Post, post.Author, post.Title, post.Timestamp)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tvar postID int\n\terr = tx.QueryRow(fmt.Sprintf(\"SELECT id FROM blogposts WHERE timestamp=%d\", post.Timestamp)).Scan(&postID)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\taddTagStmt, _ := tx.Prepare(\"INSERT INTO tags (tag) VALUES (?)\")\n\tgetTagIDStmt, _ := tx.Prepare(\"SELECT id FROM tags WHERE tag = ?\")\n\taddBlogTagStmt, _ := tx.Prepare(\"INSERT INTO blogtags (tag, post) VALUES (?, ?)\")\n\n\tfor _, tag := range post.Tags {\n\t\tvar tagID int\n\t\terr := getTagIDStmt.QueryRow(tag).Scan(&tagID)\n\t\tif err != nil {\n\t\t\tif err == sql.ErrNoRows {\n\t\t\t\t_, _ = addTagStmt.Exec(tag)\n\t\t\t\t_ = getTagIDStmt.QueryRow(tag).Scan(&tagID)\n\t\t\t} else {\n\t\t\t\tlog.Fatal(err)\n\t\t\t}\n\t\t}\n\t\taddBlogTagStmt.Exec(tagID, postID)\n\t\tfmt.Println(tag)\n\t}\n\n\ttx.Commit()\n\tfmt.Print(\"Added to database:\")\n\tfmt.Println(post)\n}", "func (bl *postBusiness) GetAll() (*models.Posts, *apperror.AppError) {\n\treturn bl.service.GetAll()\n}", "func GetGroupFeed(groupid int, myuserid int) ([]models.Post, error) {\n\tstmt := `\n\t\tMATCH(me:User) WHERE ID(me) = {myuserid}\n\t\tMATCH (g:Group)-[:HAD]->(s:Post)<-[:POST]-(u:User)\n\t\tWHERE ID(g) = {groupid}\n\t\tRETURN\n\t\t\tID(s) AS id, s.message AS message, s.created_at AS created_at, s.updated_at AS updated_at,\n\t\t\tcase s.photo when null then \"\" else s.photo end AS photo,\n\t\t\tcase s.privacy when null then 1 else s.privacy end AS privacy, case s.status when null then 1 else s.status end AS status,\n\t\t\tID(u) AS userid, u.username AS username, u.full_name AS full_name, u.avatar AS avatar,\n\t\t\ts.likes AS likes, s.comments AS comments, s.shares AS shares,\n\t\t\texists((me)-[:LIKE]->(s)) AS is_liked,\n\t\t\tCASE WHEN ID(u) = {myuserid} THEN true ELSE false END AS can_edit,\n\t\t\tCASE WHEN ID(u) = {myuserid} THEN true ELSE false END AS can_delete\n\t\t`\n\tparams := map[string]interface{}{\"groupid\": groupid, \"myuserid\": myuserid}\n\tres := []models.Post{}\n\tcq := neoism.CypherQuery{\n\t\tStatement: stmt,\n\t\tParameters: params,\n\t\tResult: &res,\n\t}\n\terr := conn.Cypher(&cq)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(res) > 0 && res[0].PostID >= 0 {\n\t\treturn res, nil\n\n\t}\n\n\treturn nil, errors.New(\"ERROR in GetUserPost service: Groupid <0\")\n}", "func GetAllContent() []Content {\n\t// Do the connection and select database.\n\tdb := MongoDBConnect()\n\n\t// Do the query to a collection on database.\n\tc, err := db.Collection(\"sample_content\").Find(nil, bson.D{})\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tdefer c.Close(nil)\n\n\tvar content []Content\n\n\t// Start looping on the query result.\n\tfor c.Next(context.TODO()) {\n\t\teachContent := Content{}\n\n\t\terr := c.Decode(&eachContent)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\tcontent = append(content, eachContent)\n\t}\n\n\treturn content\n}", "func ShowPost(c buffalo.Context) error {\n\tdatabase := c.Value(\"tx\").(*pop.Connection)\n\n\tpost := &models.Post{}\n\n\tif txErr := database.Eager().Find(post, c.Param(\"post_id\")); txErr != nil {\n\n\t\tnotFoundResponse := utils.NewErrorResponse(\n\t\t\thttp.StatusNotFound,\n\t\t\t\"post_id\",\n\t\t\tfmt.Sprintf(\"The requested post %s is removed or move to somewhere else.\", c.Param(\"post_id\")),\n\t\t)\n\t\treturn c.Render(http.StatusNotFound, r.JSON(notFoundResponse))\n\t}\n\n\tpostResponse := PostResponse{\n\t\tCode: fmt.Sprintf(\"%d\", http.StatusOK),\n\t\tData: post,\n\t}\n\treturn c.Render(http.StatusOK, r.JSON(postResponse))\n}", "func (n *OpenBazaarNode) GetPostCount() int {\n\tindexPath := path.Join(n.RepoPath, \"root\", \"posts.json\")\n\n\t// Read existing file\n\tfile, err := ioutil.ReadFile(indexPath)\n\tif err != nil {\n\t\treturn 0\n\t}\n\n\tvar index []postData\n\terr = json.Unmarshal(file, &index)\n\tif err != nil {\n\t\treturn 0\n\t}\n\treturn len(index)\n}" ]
[ "0.6873103", "0.6634007", "0.6563274", "0.6447149", "0.6413185", "0.63853973", "0.6301873", "0.6243833", "0.624383", "0.62438124", "0.6240126", "0.6230459", "0.6229238", "0.6172653", "0.60914624", "0.6085014", "0.6078611", "0.6030997", "0.598633", "0.5944074", "0.59149647", "0.5904107", "0.589831", "0.5873507", "0.5868206", "0.58433706", "0.58066595", "0.5798908", "0.57185686", "0.57156026", "0.57057744", "0.5666171", "0.56551725", "0.5625248", "0.56204927", "0.5610761", "0.55981773", "0.5594948", "0.5586831", "0.55632603", "0.55583525", "0.55560803", "0.55432725", "0.55272454", "0.5512546", "0.5493923", "0.54855585", "0.5472676", "0.54642415", "0.5459813", "0.54587084", "0.54546124", "0.54525155", "0.54497963", "0.5446241", "0.5445272", "0.5434455", "0.54160404", "0.5410824", "0.5393567", "0.5389857", "0.5383505", "0.536266", "0.53486127", "0.5345738", "0.5336048", "0.53100884", "0.5300684", "0.5299101", "0.52827895", "0.52719575", "0.5269693", "0.5269157", "0.52678716", "0.52631277", "0.5257251", "0.52481925", "0.52209824", "0.52046037", "0.5198198", "0.5190342", "0.51876783", "0.5182433", "0.514675", "0.5129059", "0.5121716", "0.5098891", "0.50933206", "0.50821054", "0.50787556", "0.5075995", "0.50713", "0.5068404", "0.50406945", "0.503798", "0.5037023", "0.5035797", "0.50297356", "0.5027195", "0.50225115" ]
0.579896
27
write subreddits to file for the word cloud generator
func writeSubredditListToFile(posts []model.RedditPost) error { for _, post := range posts { err := appendFile("subreddits.txt", post.Subreddit) if err != nil { return err } } return nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func WriteScaffolding(scaffolding []string, path string) error {\n\n\tout, err := os.Create(path)\n\tif err != nil {\n\t\tfmt.Printf(\"Couldn't open output file (%s) for writing: %s\\n\", path, err)\n\t}\n\tdefer out.Close()\n\n\tfor _, v := range scaffolding {\n\t\t//fmt.Println(v)\n\t\tout.WriteString(v + \"\\n\")\n\t}\n\n\treturn err\n\n}", "func (c *Collection) writeFile(out string) {\n\tf, _ := os.Create(c.Config.OutputFile)\n\n\tw := bufio.NewWriter(f)\n\tw.WriteString(out)\n\n\tw.Flush()\n}", "func saveDocToFile(o string, in <-chan []map[string]string) error {\n\tvar f *os.File\n\n\t_, err := os.Stat(o)\n\tif os.IsNotExist(err) {\n\t\tf, err = os.OpenFile(o, os.O_WRONLY|os.O_CREATE|os.O_EXCL, 0666)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer f.Close()\n\t} else {\n\t\tf, err = os.OpenFile(o, os.O_WRONLY|os.O_APPEND, 0666)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer f.Close()\n\t}\n\n\tfor docs := range in {\n\t\tvar cnt int\n\t\tvar buf bytes.Buffer\n\n\t\tfor _, doc := range docs {\n\t\t\tcnt++\n\t\t\tbuf.WriteString(doc[\"index\"])\n\t\t\tbuf.WriteString(saveLineFeedPrefix)\n\t\t\tbuf.WriteString(doc[\"doc\"])\n\t\t\tbuf.WriteString(saveLineFeedPrefix)\n\t\t}\n\t\t_, err := f.WriteString(buf.String())\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tmsg := processing.StringConcat([]interface{}{\n\t\t\tsaveLogPrefix1,\n\t\t\tcnt,\n\t\t\tsaveLogPrefix2,\n\t\t})\n\t\tlog.Println(msg)\n\t}\n\n\treturn nil\n}", "func writeStatsToFile(posts []model.RedditPost) error {\n\n\tgroupedPosts := groupBySubreddit(posts)\n\n\tcountList := [][]model.RedditPost{}\n\n\t// convert to list\n\tfor _, v := range groupedPosts {\n\t\tcountList = append(countList, v)\n\t}\n\n\t// sort by post count\n\tsort.Slice(countList, func(i, j int) bool {\n\t\treturn len(countList[i]) > len(countList[j])\n\t})\n\n\tdata := [][]string{}\n\n\tfor _, v := range countList {\n\t\tescapedTitle := strings.ReplaceAll(v[0].Title, \"|\", \"\\\\|\")\n\t\ttitle := \"[\" + escapedTitle + \"]\" + \"(https://www.reddit.com\" + v[0].Permalink + \")\"\n\t\tdata = append(data, []string{v[0].Subreddit, strconv.Itoa(len(v)), title, strconv.Itoa(v[0].Score)})\n\t}\n\n\tfile, _ := os.Create(\"README.md\")\n\n\ttable := tablewriter.NewWriter(file)\n\ttable.SetAutoWrapText(false)\n\ttable.SetHeader([]string{\"Subreddit\", \"Total\", \"Top Post\", \"Score\"})\n\ttable.SetBorders(tablewriter.Border{Left: true, Top: false, Right: true, Bottom: false})\n\ttable.SetCenterSeparator(\"|\")\n\ttable.AppendBulk(data) // Add Bulk Data\n\ttable.Render()\n\n\treturn nil\n}", "func writeFile(path string, occ []occurrence) error {\n\t// First write to temp file, then move to final destination.\n\t// Not doing this runs the risk of overwriting an existing\n\t// file with half a file due to a crash.\n\ttmp, err := ioutil.TempFile(filepath.Dir(path), \"annotator\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer func() {\n\t\ttmp.Close()\n\t\tif err == nil {\n\t\t\terr = os.Rename(tmp.Name(), path)\n\t\t}\n\t\tif err != nil {\n\t\t\tos.Remove(tmp.Name())\n\t\t}\n\t}()\n\n\tvar w io.WriteCloser = tmp\n\tif filepath.Ext(path) == \".gz\" {\n\t\tw, _ = gzip.NewWriterLevel(tmp, gzip.BestCompression)\n\t\tdefer w.Close()\n\t}\n\n\tfor i := range occ {\n\t\tif err = json.NewEncoder(w).Encode(&occ[i]); err != nil {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn err\n}", "func Write(key string, keywords *slice.Slice) error {\n\terr := os.MkdirAll(directory.Keywords, os.ModePerm)\n\tif err != nil {\n\t\treturn err\n\t}\n\tcontent, err := json.Marshal(keywords)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfilepath := filepath.Join(directory.Keywords, fmt.Sprintf(\"%s.json\", key))\n\treturn ioutil.WriteFile(filepath, content, os.ModePerm)\n}", "func (gn *Gen) WriteShuffles() {\n\tvar list []string // list of the files we are writing\n\tfor _, s := range gn.SylsShuf {\n\t\tl := s\n\t\tl = strings.Replace(l, \" \", \"\", -1) // this will be the file name without the path (same as an ls command)\n\t\tlist = append(list, l)\n\t\tfn := \"/Users/rohrlich/go/src/github.com/ccnlab/lang-acq/cvShuffles/\" + s\n\t\tfn = strings.Replace(fn, \" \", \"\", -1) // remove space from file name\n\t\ts = strings.Replace(s, \" \", \", \", -1) // add a comma after each CV in the sequence itself\n\t\tf, err := os.Create(fn)\n\t\tcheck(err)\n\t\t_, err = f.Write([]byte(s))\n\t\tcheck(err)\n\t}\n\t// create a file that lists the individual files just written\n\tfn := \"/Users/rohrlich/go/src/github.com/ccnlab/lang-acq/cvShuffles/\" + \"ls\"\n\tf, err := os.Create(fn)\n\tcheck(err)\n\ts := \"\"\n\tfor _, l := range list {\n\t\ts += l\n\t\ts += \"\\n\"\n\t}\n\t_, err = f.Write([]byte(s))\n\tcheck(err)\n}", "func writeOut(review []*Review, outputFile string) error {\n\tfile, err := os.Create(outputFile)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer file.Close()\n\n\tw := bufio.NewWriter(file)\n\t_, err = w.WriteString(\"star\\treview\\n\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tw.Flush()\n\n\tfor _, r := range review {\n\t\ttext := removeNewlines(r.Text)\n\t\ttext = removeTabs(text)\n\t\tstar := normaliseStars(r.Stars)\n\t\trow := fmt.Sprintf(\"%d\\t%s\\n\", star, strings.ToLower(text))\n\t\t_, err := w.WriteString(row)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tw.Flush()\n\t}\n\n\treturn nil\n}", "func createFile(words []string) error {\n\tf, err := os.Create(\"ipsum/dictionary.go\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer f.Close()\n\n\tfor _, v := range []string{\n\t\t\"package ipsum\\n\",\n\t\t\"\\n\",\n\t\t\"// Code generated by gen.go. DO NOT EDIT.\\n\",\n\t\tfmt.Sprintf(\"// Word count: %d\\n\", len(words)),\n\t\tfmt.Sprintf(\"// Timestamp: %s\\n\", time.Now().UTC()),\n\t\t\"\\n\",\n\t\t\"var dictionary = []string{\\n\",\n\t} {\n\t\t_, err := f.WriteString(v)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tfor _, v := range words {\n\t\t_, err := f.WriteString(fmt.Sprintf(\"\\t%q,\\n\", v))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t_, err = f.WriteString(\"}\\n\")\n\treturn err\n}", "func saveCrawls(tweets [][]string) {\n\tfile, err := os.Open(cfg.TweetsFileName)\n\tif err != nil {\n\t\tlog.Println(\"Error: \", err)\n\t\treturn\n\t}\n\n\treader := csv.NewReader(file)\n\tlines, err := reader.ReadAll()\n\tif err != nil {\n\t\tlog.Println(\"Error reading all lines: %v\", err)\n\t}\n\n\tfile.Close()\n\n\tlines = append(tweets, lines...)\n\n\tfile, err = os.Create(cfg.TweetsFileName)\n\tif err != nil {\n\t\tlog.Println(\"Error: \", err)\n\t\treturn\n\t}\n\n\t// withHeader := make([][]string, len(lines) + 1)\n\t// withHeader = append(withHeader, []string{\"id\", \"text\", \"createdAt\"})\n\t// withHeader = append(withHeader, lines...)\n\n\twriter := csv.NewWriter(file)\n\twriter.WriteAll(lines)\n\tif err := writer.Error(); err != nil {\n\t\tlog.Println(\"Error Writing CSV: \", err)\n\t}\n\tfile.Close()\n}", "func (c *cgroupTestUtil) writeFileContents(fileContents map[string]string) {\n\tfor file, contents := range fileContents {\n\t\terr := cgroups.WriteFile(c.CgroupPath, file, contents)\n\t\tif err != nil {\n\t\t\tc.t.Fatal(err)\n\t\t}\n\t}\n}", "func writeCountCollections(fileName string, countCollections map[string]countCollection) error {\n\t// Take the countCollections and export it into a YAML file\n\tcountCollectionsYaml, err := yaml.Marshal(&countCollections)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Create and open the counts YAML file\n\tcountCollectionsFile, err := os.Create(fileName)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer countCollectionsFile.Close()\n\n\t// Output the generated YAML into the file\n\tfmt.Fprintf(countCollectionsFile, string(countCollectionsYaml))\n\n\t// Assuming no errors, return nil\n\treturn nil\n}", "func recordCRs(namespaceDir string, namespace string) error {\n\tcrds, err := kubeList(namespace, \"crd\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// record all unique CRs floating about\n\tfor _, crd := range crds {\n\t\t// consider all installed CRDs that are solo-managed\n\t\tif !strings.Contains(crd, \"solo.io\") {\n\t\t\tcontinue\n\t\t}\n\n\t\t// if there are any existing CRs corresponding to this CRD\n\t\tcrs, err := kubeList(namespace, crd)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif len(crs) == 0 {\n\t\t\tcontinue\n\t\t}\n\t\tcrdDir := filepath.Join(namespaceDir, crd)\n\t\tif err := os.MkdirAll(crdDir, os.ModePerm); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// we record each one in its own .yaml representation\n\t\tfor _, cr := range crs {\n\t\t\tf := fileAtPath(filepath.Join(crdDir, cr+\".yaml\"))\n\t\t\tcrDetails, err := kubeGet(namespace, crd, cr)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tf.WriteString(crDetails)\n\t\t\tf.Close()\n\t\t}\n\t}\n\n\treturn nil\n}", "func ( crawler *SingleCrawler ) Print() error {\n\n if err1 := IsOk(crawler); err1 != nil{\n return err1\n }\n\n stdout := os.Stdout\n outfile := stdout\n duped := true\n\n outfile, err := os.OpenFile( crawler.Filename, os.O_WRONLY | os.O_CREATE, 0644 )\n if err != nil {\n glog.Error(\"Unable to open requested file for writing. Defaulting to std out.\")\n duped = false\n } else{\n os.Stdout = outfile\n }\n\n fmt.Printf(\"SiteMap from starting URL %s, total pages found %d.\\n\\n\\n\", crawler.Site.String(), crawler.NumPages )\n for i := 0; i < crawler.NumPages; i++ {\n crawler.Sitemap[i].Print(crawler.PRINT_LIMIT)\n }\n\n if duped == true {\n outfile.Close()\n os.Stdout = stdout\n }\n\n return nil\n\n}", "func WriteScrapeResults(visitedMap map[string]struct{}, repos []GoRepo, filename string) {\n\tfile, err := os.OpenFile(filename, os.O_WRONLY|os.O_APPEND|os.O_RDWR, 0666)\n\tdefer file.Close()\n\tif err != nil {\n\t\tlog.Fatalf(\"could not open file %v\", err)\n\t}\n\toutput := csv.NewWriter(file)\n\tvar results [][]string\n\tfor _, repo := range repos {\n\t\tif _, ok := visitedMap[repo.ID()]; ok {\n\t\t\tcontinue\n\t\t}\n\t\tresults = append(results, []string{\n\t\t\trepo.Owner,\n\t\t\trepo.Repo,\n\t\t\tfmt.Sprintf(\"%s\", repo.CreatedAt.Format(time.RFC3339)),\n\t\t})\n\t\tvisitedMap[repo.ID()] = struct{}{}\n\t}\n\terr = output.WriteAll(results)\n\tif err != nil {\n\t\tlog.Fatalf(\"Could not write to file %s: %v\", filename, err)\n\t}\n}", "func writeEntries(file string, all map[string]entry) error {\n\n\tdb, err := bolt.Open(file, 0600, nil)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdefer db.Close()\n\n\terr = db.Update(func(tx *bolt.Tx) error {\n\t\ttx.DeleteBucket(hgcbucket)\n\t\tbucket, err := tx.CreateBucketIfNotExists(hgcbucket)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfor _, v := range all {\n\t\t\t// v.id should be same a k\n\t\t\t//fmt.Printf(\"WRiting %v = %v\\n\", v.id, v.data)\n\t\t\terr = bucket.Put([]byte(v.id), []byte(v.data))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t})\n\n\treturn err\n}", "func downloadToFolder(folder string, posts []reddit.Post, config SubredditConfig, wg *sync.WaitGroup) {\n fmt.Println(\"Go routine to download\", len(posts), \"posts\")\n defer wg.Done()\n\n for _, post := range posts {\n\n // Get the post data\n downloadPost := reddit.GetDownloadPost(post)\n\n if downloadPost.Score < config.MinScore && config.MinScore > 0 {\n continue\n }\n\n // Determine output location\n outputFile := folder + downloadPost.Title + downloadPost.FileType\n\n // Download the file\n err := http.DownloadFile(outputFile, downloadPost.Url, nil)\n util.CheckWarn(err)\n\n fmt.Println(\"Downloaded:\", downloadPost.Title, \"\\n\\tID:\", downloadPost.Id, \"\\tScore:\", downloadPost.Score)\n }\n}", "func (g *Glove) Save(outputPath string) error {\n\textractDir := func(path string) string {\n\t\te := strings.Split(path, \"/\")\n\t\treturn strings.Join(e[:len(e)-1], \"/\")\n\t}\n\n\tdir := extractDir(outputPath)\n\n\tif err := os.MkdirAll(\".\"+string(filepath.Separator)+dir, 0777); err != nil {\n\t\treturn err\n\t}\n\n\tfile, err := os.Create(outputPath)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\tw := bufio.NewWriter(file)\n\n\tdefer func() {\n\t\tw.Flush()\n\t\tfile.Close()\n\t}()\n\n\tvar buf bytes.Buffer\n\tfor i := 0; i < g.Corpus.Size(); i++ {\n\t\tword, _ := g.Word(i)\n\t\tfmt.Fprintf(&buf, \"%v \", word)\n\t\tfor j := 0; j < g.Dimension; j++ {\n\t\t\tl1 := i * (g.Dimension + 1)\n\t\t\tl2 := (i + g.Corpus.Size()) * (g.Dimension + 1)\n\t\t\tfmt.Fprintf(&buf, \"%v \", g.weight[l1+j]+g.weight[l2+j])\n\t\t}\n\t\tfmt.Fprintln(&buf)\n\t}\n\tw.WriteString(fmt.Sprintf(\"%v\", buf.String()))\n\treturn nil\n}", "func (yt Youtube) WriteAllSongsToFile() error {\n\n\tfile, err := os.Create(TempFileName)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// get all playlists of mine\n\tcall := yt.Service.Playlists.List(snippetContentDetails)\n\tcall = call.MaxResults(50).Mine(true)\n\tresponse, err := call.Do()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// goes through all playlists\n\tfor _, pl := range response.Items {\n\t\tfile.WriteString(fmt.Sprintf(\"___%s\\n\", pl.Snippet.Title))\n\n\t\tpageToken := \"\"\n\t\tfor {\n\t\t\tcall := yt.Service.PlaylistItems.List(snippetContentDetails)\n\t\t\tcall = call.PlaylistId(pl.Id).MaxResults(50)\n\t\t\tresponse, err := call.PageToken(pageToken).Do()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// move pageToken to another page\n\t\t\tpageToken = response.NextPageToken\n\n\t\t\tfor _, item := range response.Items {\n\t\t\t\tfile.WriteString(fmt.Sprintf(\"%s\\n\", item.Snippet.Title))\n\t\t\t}\n\t\t\t// if there are no pages\n\t\t\tif pageToken == \"\" {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func writeUsersToFile(sshUsers []githubUser, authorizedKeysFile string) {\n allUsersStr := \"\"\n for _, user := range sshUsers {\n if user.hasKeys() {\n allUsersStr = allUsersStr + user.formatOut()\n }\n }\n ioutil.WriteFile(authorizedKeysFile, []byte(allUsersStr) ,0)\n}", "func writeToFile() {\n\tplayers := team{\"Messi\", \"Pele\", \"Maradona\", \"Zidane\", \"Platini\"}\n\n\terr := ioutil.WriteFile(fileName, []byte(players.toString()), 0666)\n\n\tif err != nil {\n\t\tfmt.Println(\"Error:\", err)\n\t} else {\n\t\tfmt.Printf(\"Wrote the following to file: %v \\n\", players.toString())\n\t}\n}", "func (sm *ShardMaster) clearFiles(){\n\tos.Remove(sm.configFile)\n\tos.Remove(sm.scoreFile)\n\n\tf, err := os.OpenFile(sm.configFile, os.O_WRONLY|os.O_CREATE, 0666)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn\n\t}\n\tf.Close()\n\n\tvar scores [NShards]int\n\tfor i:=0; i<NShards; i++{\n\t\tscores[i] = 1\n\t}\n\t\n\tnewHeard := make(map[string]int)\n\ttoWrite := JSONScore{Scores: scores, Heard: newHeard}\n\tb, _ := json.Marshal(toWrite)\n\n\tf, err = os.OpenFile(sm.scoreFile, os.O_WRONLY|os.O_CREATE, 0666)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn\n\t}\n\t_, err = f.WriteString(string(b) + \"\\n\")\n\tf.Close()\n}", "func writeFile(w [samp_len]int) {\r\n\r\n var s string = \"\"\r\n var tmp string\r\n\r\n data, err := ioutil.ReadFile(fileName)\r\n check(err)\r\n tmp = string(data)\r\n\r\n for _, value := range w {\r\n s += fmt.Sprintf(\"%d\\n\", value)\r\n }\r\n\r\n tmp = s + tmp\r\n\r\n f, err := os.OpenFile(fileName,os.O_CREATE|os.O_WRONLY, 0755) // Opens file with permission and appends new values\r\n check(err)\r\n defer f.Close()\r\n\r\n _, err = f.WriteString(tmp)\r\n check(err)\r\n\r\n\r\n\r\n}", "func writeSRT(fileName string, timeMarkers []string, transcript []string) {\n\tf, err := os.OpenFile(\".\"+string(filepath.Separator)+createdDir+string(filepath.Separator)+fileName, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\tdefer f.Close()\n\n\tfor i, marker := range timeMarkers {\n\t\tif _, err := f.WriteString(strconv.Itoa(i+1) + LineBreak + marker + LineBreak); err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\t\tif _, err := f.WriteString(transcript[i] + LineBreak + LineBreak); err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\t}\n}", "func writer(ch <-chan Word, index *sync.Map, wg *sync.WaitGroup) {\n\tfor {\n\t\tif word, more := <-ch; more {\n\t\t\t// fmt.Printf(\"Writing: %s\\n\", word)\n\t\t\tseen, loaded := index.LoadOrStore(word.word, []int{word.index})\n\t\t\tif loaded && !contains(seen.([]int), word.index) {\n\t\t\t\tseen = append(seen.([]int), word.index)\n\t\t\t\tindex.Store(word.word, seen)\n\t\t\t}\n\t\t} else {\n\t\t\twg.Done()\n\t\t\treturn\n\t\t}\n\t}\n}", "func writeOutput(f *os.File, lines []string) {\n\tfor _, item := range lines {\n\t\tn3, err := f.WriteString(baseURL + item + \"\\n\")\n\t\tif err != nil {\n\t\t\tlog.Println(\"failed to write\")\n\t\t}\n\t\tlog.Println(baseURL + item)\n\t\tlog.Printf(\"wrote %d bytes\", n3)\n\t}\n\tf.Sync()\n}", "func (a assets) write() error {\n\tfor dir := range a.dirs {\n\t\tif err := os.MkdirAll(dir, os.ModePerm); err != nil {\n\t\t\treturn fmt.Errorf(\"create dir %q: %w\", dir, err)\n\t\t}\n\t}\n\tfor path, content := range a.files {\n\t\tif err := os.WriteFile(path, content, 0644); err != nil {\n\t\t\treturn fmt.Errorf(\"write file %q: %w\", path, err)\n\t\t}\n\t}\n\treturn nil\n}", "func writeFile(path string, data []byte) {\n\tfile, _ := os.Create(path)\n\tdefer file.Close()\n\tfile.Write(data)\n\tfmt.Println(\"JSON generate to \" + path + \" complete.\")\n\tfmt.Println()\n}", "func writeToRevisionFile(strSlice []string, filename string) error {\n\tfile, err := os.Create(filename)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer file.Close()\n\tfor idx, str := range strSlice {\n\t\tif idx == len(strSlice)-1 {\n\t\t\t// do not add new line to last line\n\t\t\tfile.WriteString(str)\n\t\t} else {\n\t\t\tfile.WriteString(str + \"\\n\")\n\t\t}\n\t}\n\n\treturn nil\n}", "func SaveWords() error {\n\tfile, err := os.Create(filename)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer file.Close()\n\n\tdictSlice := make([]string, len(dictionary))\n\ti := 0\n\tfor k, v := range dictionary {\n\t\tline := k + \"\\t\" + v + \"\\n\"\n\t\tdictSlice[i] = line\n\t\ti++\n\t}\n\tsort.Slice(dictSlice, func(i, j int) bool { return dictSlice[i] < dictSlice[j] })\n\n\tfor i := range dictSlice {\n\t\t_, err := file.WriteString(dictSlice[i])\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func doit(prefix, filename string) {\n\tconst maxLines = 1 << 31\n\tconst suffix = \"-body.json.gz\"\n\t// generate outputfile name\n\t// blah/RC_2015-06-body.json.gz --> RC_2015-06-counts.csv.gz\n\tbase := filepath.Base(filename)\n\tbase = base[0:len(base)-len(suffix)] + \"-counts.csv.gz\"\n\n\tlog.Printf(\"[%s] starting. Output file %s\", prefix, base)\n\tcounts := newFreqCount()\n\tfi, err := os.Open(filename)\n\tif err != nil {\n\t\tlog.Fatalf(\"[%s]: %s\", prefix, err)\n\t}\n\n\tfizip, err := gzip.NewReader(fi)\n\tif err != nil {\n\t\tlog.Fatalf(\"[%s]: gzip error %s\", prefix, err)\n\t}\n\n\t// no need to buffer this since raw network and bzip2 will\n\t// naturally buffer the input\n\tjsonin := json.NewDecoder(fizip)\n\tobj := Reddit{}\n\tlines := 0\n\ttotal := 0\n\tfor jsonin.More() && lines < maxLines {\n\t\tlines++\n\t\t// decode an array value (Message)\n\t\terr := jsonin.Decode(&obj)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"[%s] unable to unmarshal object: %s\", prefix, err)\n\t\t}\n\n\t\t// turn into words\n\t\twords := text2words(obj.Body)\n\n\t\t// take only ones that are reasonable\n\t\t// and add to counts\n\t\tfor _, word := range words {\n\t\t\tif len(word) > 4 && len(word) < 21 {\n\t\t\t\tcounts[word]++\n\t\t\t\ttotal++\n\t\t\t}\n\t\t}\n\n\t}\n\tfizip.Close()\n\tfi.Close()\n\n\tfo, err := os.Create(base)\n\tif err != nil {\n\t\tlog.Fatalf(\"OH NO, unable to write: %s\", err)\n\t}\n\tfout := gzip.NewWriter(fo)\n\n\tkeys := make([]string, 0, len(counts))\n\tfor k := range counts {\n\t\tkeys = append(keys, k)\n\t}\n\tsort.Strings(keys)\n\tfor _, k := range keys {\n\t\tfout.Write([]byte(fmt.Sprintf(\"%s,%d\\n\", k, counts[k])))\n\t}\n\tfout.Close()\n\tfo.Close()\n\tlog.Printf(\"[%s] DONE: wrote %s got %d unique words from %d\", prefix, base, len(counts), total)\n}", "func WriteDataToFile(data FriendsCollection, filePath string) {\n\tfile, err := os.OpenFile(filePath, os.O_WRONLY, os.ModePerm)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\tdefer file.Close()\n\n\tjsonData, err := json.MarshalIndent(data, \"\", \" \")\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\n\t_, err = file.Write(jsonData)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n}", "func WriteFile(d *defs, fileName string, objName string, bflags attrVal) {\n objType, attrLen := getMaxAttr(objName)\n f, err := os.Create(fileName); if err != nil {\n fmt.Println(err)\n f.Close()\n return\n }\n defer func(){\n err := f.Close(); if err != nil {\n fmt.Println(\"Failed to close file \", err)\n }\n if bflags.Has(\"color\"){\n fmt.Printf(\"%vWrite%v: created a new config file '%v'\\n\",Green,RST,fileName)\n }else {\n fmt.Printf(\"Write: created a new config file '%v'\\n\",fileName)\n }\n }()\n // write nagios objects to a file\n for _, def := range *d {\n formatDef := formatObjDef(def, objType, attrLen)\n f.WriteString(formatDef)\n }\n}", "func writeDiscoCache(indexData []byte, absolutePath string, directory os.FileInfo) (updated map[string]bool, errors errorlist.Errors) {\n\tfmt.Printf(\"Updating local Discovery docs in %v ...\\n\", absolutePath)\n\t// Make Discovery doc file permissions like parent directory (no execute)\n\tperm := directory.Mode() & 0666\n\n\tfmt.Println(\"Parsing and writing Discovery doc index ...\")\n\tindex := &apiIndex{}\n\terr := json.Unmarshal(indexData, index)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"Error parsing Discovery doc index: %v\", err)\n\t\terrors.Add(err)\n\t\treturn\n\t}\n\tsize := len(index.Items)\n\n\tindexFilepath := path.Join(absolutePath, \"index.json\")\n\tif err := ioutil.WriteFile(indexFilepath, indexData, perm); err != nil {\n\t\terr = fmt.Errorf(\"Error writing Discovery index to %v: %v\", indexFilepath, err)\n\t\terrors.Add(err)\n\t}\n\n\tvar collect sync.WaitGroup\n\terrChan := make(chan error, size)\n\tcollect.Add(1)\n\tgo func() {\n\t\tdefer collect.Done()\n\t\tfor err := range errChan {\n\t\t\tfmt.Println(err)\n\t\t\terrors.Add(err)\n\t\t}\n\t}()\n\n\tupdated = make(map[string]bool, size)\n\tupdateChan := make(chan string, size)\n\tcollect.Add(1)\n\tgo func() {\n\t\tdefer collect.Done()\n\t\tfor file := range updateChan {\n\t\t\tupdated[file] = true\n\t\t}\n\t}()\n\n\tvar update sync.WaitGroup\n\tfor _, api := range index.Items {\n\t\tupdate.Add(1)\n\t\tgo func(api apiInfo) {\n\t\t\tdefer update.Done()\n\t\t\tif err := UpdateAPI(api, absolutePath, perm, updateChan); err != nil {\n\t\t\t\terrChan <- fmt.Errorf(\"Error updating %v %v: %v\", api.Name, api.Version, err)\n\t\t\t}\n\t\t}(api)\n\t}\n\tupdate.Wait()\n\tclose(errChan)\n\tclose(updateChan)\n\tcollect.Wait()\n\treturn\n}", "func writeList(prefix string, patterns []string) (string, error) {\n\tvar w *os.File\n\tvar err error\n\n\tif w, err = ioutil.TempFile(\"/tmp\", prefix); err != nil {\n\t\treturn \"\", fmt.Errorf(\"Error creating pattern file for %s list: %v\", prefix, err)\n\t}\n\tdefer w.Close()\n\tfor _, v := range patterns {\n\t\tfmt.Fprintln(w, v)\n\t}\n\treturn w.Name(), nil\n}", "func (t *trs80) writeWords() {\n\tfor i := 0; i < int(t.pb.Header.NumWords); i++ {\n\t\tt.writeWord(t.pb.Verbs[i])\n\t\tt.writeWord(t.pb.Nouns[i])\n\t}\n}", "func (s Subtitles) Write(dst string) (err error) {\n\t// Create the file\n\tvar f *os.File\n\tif f, err = os.Create(dst); err != nil {\n\t\treturn\n\t}\n\tdefer f.Close()\n\n\t// Write the content\n\tswitch filepath.Ext(dst) {\n\tcase \".srt\":\n\t\terr = s.WriteToSRT(f)\n\tcase \".tml\":\n\t\terr = s.WriteToTTML(f)\n\tdefault:\n\t\terr = ErrInvalidExtension\n\t}\n\treturn\n}", "func generateRandUrlFile(output string, baseUrl string, count int) error {\n\tfile, err := os.Create(output)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer file.Close()\n\n\tnow := time.Now().Unix()\n\tfor i := 0; i < count; i++ {\n\t\tfile.WriteString(fmt.Sprintf(\"%s/%d_%s\\n\", baseUrl, now, randString(16)))\n\t}\n\n\treturn nil\n}", "func (x *Indexer) writeFiles() error {\n\tdocPath := x.config.FnamesPath()\n\tf, e := os.OpenFile(docPath, os.O_CREATE|os.O_WRONLY|os.O_TRUNC, 0644)\n\tif e != nil {\n\t\treturn e\n\t}\n\tdefer f.Close()\n\treturn x.fnames.write(f)\n}", "func (restorer *APTRestorer) writeBagitFile(restoreState *models.RestoreState) {\n\tbagitPath := filepath.Join(restoreState.LocalBagDir, \"bagit.txt\")\n\tbagitFile, err := os.Create(bagitPath)\n\tif err != nil {\n\t\trestoreState.PackageSummary.AddError(\"Cannot create bagit.txt file %s: %v\",\n\t\t\tbagitPath, err)\n\t\treturn\n\t}\n\tfmt.Fprintln(bagitFile, \"BagIt-Version:\", restorer.Context.Config.BagItVersion)\n\tfmt.Fprintln(bagitFile, \"Tag-File-Character-Encoding:\", restorer.Context.Config.BagItEncoding)\n\tbagitFile.Close()\n\trestorer.addFile(restoreState, bagitPath, \"bagit.txt\")\n}", "func (paste pasteType) WritePaste() { //this just appends the paste to the file\n\tbc, err := json.Marshal(&paste)\n\tErrHandle(err, \"json.Marshal\")\n\tf, err := os.OpenFile(\"pastes.json\", os.O_WRONLY, os.ModePerm)\n\tErrHandle(err, \"OpenFile\")\n\n\tdefer f.Close()\n\n\tfi, _ := f.Stat()\n\t_, err = f.WriteAt([]byte{'}', ','}, fi.Size()-3)\n\tErrHandle(err, \"WriteAt\") //it overwrites the '}' character so we need to put it back hehe 😹 ;;\n\t_, err = f.WriteAt(bc, fi.Size()-1)\n\tErrHandle(err, \"WriteAt\")\n\t_, err = f.WriteAt([]byte{'\\n', ']'}, fi.Size()-1+int64(len(bc)))\n\tErrHandle(err, \"WriteAt\") //ends the json\n\n\tPasteHolder = append(PasteHolder, paste) //to include (match!) in backup\n}", "func (p *Page) save() error {\n\tbody := fmt.Sprintf(\"<!-- Ingredients -->\\n%s\\n<!-- Instructions -->\\n%s\", p.Ingredients, p.Instructions)\n\treturn ioutil.WriteFile(filepath.Join(pagesDir, p.Filename+\".txt\"), []byte(body), 0600)\n}", "func writeFile(values *[]*model.SampleStream, fileNum uint) error {\n\tif len(*values) == 0 {\n\t\treturn nil\n\t}\n\tfilename := fmt.Sprintf(\"%s.%05d\", *out, fileNum)\n\tvaluesJSON, err := json.Marshal(values)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn ioutil.WriteFile(filename, valuesJSON, 0644)\n}", "func writeout() {\n\tworden := \"test, test\" // temporary\n\n\tfmt.Println(bar)\n\tfmt.Printf(\"%v\\n%v %s %v\\n%v\", bar, sd, worden, sd, bar)\n\t/* file io should replace prints */\n}", "func (f *FileStore) Write(collection, id, value string) error {\n\tbase := filepath.Join(f.Base, collection)\n\terr := os.MkdirAll(base, 0755)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn ioutil.WriteFile(filepath.Join(base, id+\".txt\"), []byte(value), 0660)\n}", "func main() {\n\t// We place each set of stories in a new buffer\n\thnStories := newHnStories()\n\tredditStories := newRedditStories()\n\t// And we need a buffer to contain all stories\n\tvar stories []Story\n\n\t// Now we check that each source actually did return some stories\n\tif hnStories != nil {\n\t\t// If so, we'll append those to the list\n\t\tstories = append(stories, hnStories...)\n\t}\n\tif redditStories != nil {\n\t\tstories = append(stories, redditStories...)\n\t}\n\n\t// Now let's write these stories to a file, stories.txt\n\t// First we open the file\n\tfile, err := os.Create(\"stories.txt\")\n\t// If there's a problem opening the file, abort\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(1)\n\t}\n\t// And we'll defer closing the file\n\tdefer file.Close()\n\t// Now we'll write the stories out to the file\n\tfor _, s := range stories {\n\t\tfmt.Fprintf(file, \"%s: %s\\nby %s on %s\\n\\n\", s.title, s.url, s.author, s.source)\n\t}\n\n\t// Finally, we'll print out all the stories we received\n\tfor _, s := range stories {\n\t\tfmt.Printf(\"%s: %s\\nby %s on %s\\n\\n\", s.title, s.url, s.author, s.source)\n\t}\n}", "func writeIndexEntries(p []*post, o string, t postListing) error {\n\tvar m string\n\tswitch t {\n\tcase index:\n\t\tm = \"index_template.html\"\n\tcase rss:\n\t\tm = \"rss_template.rss\"\n\tcase archive:\n\t\tm = \"archive_template.html\"\n\t}\n\te, err := template.ParseFiles(filepath.Join(templatesrc, m))\n\tif checkError(err) {\n\t\treturn err\n\t}\n\n\tf, err := os.Create(o)\n\tif checkError(err) {\n\t\treturn err\n\t}\n\terr = e.Execute(f, p)\n\tif checkError(err) {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func writeTemplate(path string, lines []string) {\n delErr := os.Remove(path)\n checkErr(delErr)\n f, crtErr := os.Create(path)\n checkErr(crtErr)\n\n for _, line := range lines {\n fmt.Fprintln(f, line)\n }\n}", "func worker(idx int, url string) {\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(fmt.Sprintf(\"url: %[1]s\\n\", url))\n\tres := wordCount(getContent(url))\n\tfor k, v := range res {\n\t\tbuffer.WriteString(fmt.Sprintf(\"\\t%[1]s: %[2]d\\n\", k, v))\n\t}\n\twriteToFile(fmt.Sprintf(\"url%[1]d.txt\", idx + 1), buffer.Bytes())\n\tfinishChan <- finishSignal\n}", "func (c *Collection) writeBatch(b *Batch) (err error) {\n\terr = c.putSendToWriteAndWaitForResponse(b.tr)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn c.putLoopForIndexes(b.tr)\n}", "func writeKotlinMapFiles(rootValue *StringKeys, values []*StringKeys, config *StringCheeseConfig) error {\n\tpathToKotlinFile := config.pathToKotlinFolderMap + getKotlinMapFileName(config)\n\n\t_ = os.Remove(pathToKotlinFile) //ignore error\n\t//if err != nil {\n\t//\treturn err\n\t//}\n\tfile, err := os.Create(pathToKotlinFile)\n\tif err != nil {\n\t\treturn err\n\t}\n\twriteKotlinMapFileHeader(file, rootValue, values, config)\n\n\tfor _, value := range values {\n\t\twriteKotlinMap(file,value,config)\n\t}\n\n\tfile.WriteString(\"}\")\n\tfile.Close()\n\treturn nil\n}", "func writeToSpace(t *testing.T, c *zqd.Core, spaceName, src string) {\n\ts, err := space.Open(c.Root, spaceName)\n\trequire.NoError(t, err)\n\tf, err := s.CreateFile(\"all.bzng\")\n\trequire.NoError(t, err)\n\tdefer f.Close()\n\t// write zng\n\tw := bzngio.NewWriter(f)\n\tr := zngio.NewReader(strings.NewReader(src), resolver.NewContext())\n\trequire.NoError(t, zbuf.Copy(zbuf.NopFlusher(w), r))\n}", "func writeJSFiles(rootValue *StringKeys, values []*StringKeys, config *StringCheeseConfig) error {\n\tpathToJSFile := config.pathToJSFolder + getJSFileName(config)\n\n\t_ = os.Remove(pathToJSFile) //ignore error\n\t//if err != nil {\n\t//\treturn err\n\t//}\n\tfile, err := os.Create(pathToJSFile)\n\tif err != nil {\n\t\treturn err\n\t}\n\twriteJSFileHeader(file, rootValue, values, config)\n\n\tfor _, value := range values {\n\t\twriteJSClass(file,value,config)\n\t}\n\n\tfile.Close()\n\treturn nil\n}", "func write(name string, content []byte) {\n\terr := ioutil.WriteFile(name, content, 0644)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n}", "func WriteSwaggerToDisk(name string, apidoc string, svchost string, swaggerStore string, hugoStore string) error {\n\t// Unmarshal the string into a proper document\n\tvar swagger map[string]interface{}\n\tif err := json.Unmarshal([]byte(apidoc), &swagger); err != nil {\n\t\tlog.Printf(\"error while unmarshaling JSON: %s\", err.Error())\n\t\treturn fmt.Errorf(\"error while unmarshaling JSON: %s\", err.Error())\n\t}\n\n\t// Update the host information\n\tif _, ok := swagger[\"host\"]; ok {\n\t\tswagger[\"host\"] = svchost\n\t}\n\n\t// Determine where to save the file\n\tfilename := filepath.Join(swaggerStore, fmt.Sprintf(\"%s.json\", strings.Replace(strings.ToLower(name), \" \", \"-\", -1)))\n\tlog.Printf(\"Preparing to write %s to disk\", filename)\n\tos.Remove(filename)\n\n\t// Create a file on disk\n\tfile, err := os.Create(filename)\n\tif err != nil {\n\t\tlog.Printf(\"error while creating file: %s\", err.Error())\n\t\treturn fmt.Errorf(\"error while creating file: %s\", err.Error())\n\t}\n\tdefer file.Close()\n\n\t// Open the file to write\n\tfile, err = os.OpenFile(filename, os.O_APPEND|os.O_WRONLY, 0600)\n\tif err != nil {\n\t\tlog.Printf(\"error while opening file: %s\", err.Error())\n\t\treturn fmt.Errorf(\"error while opening file: %s\", err.Error())\n\t}\n\n\t// Serialize the OpenAPI doc\n\tapibytes, err := json.Marshal(swagger)\n\tif err != nil {\n\t\tlog.Printf(\"error while marshaling API: %s\", err.Error())\n\t\treturn fmt.Errorf(\"error while marshaling API: %s\", err.Error())\n\t}\n\n\t// Write the OpenAPI doc to disk\n\t_, err = file.Write(apibytes)\n\tif err != nil {\n\t\tlog.Printf(\"error while writing OpenAPI to disk: %s\", err.Error())\n\t\treturn fmt.Errorf(\"error while writing OpenAPI to disk: %s\", err.Error())\n\t}\n\n\t// Prepare the Markdown file for Hugo\n\tvar title string\n\tif val, ok := swagger[\"info\"].(map[string]interface{})[\"title\"]; ok {\n\t\ttitle = val.(string)\n\t}\n\n\tdataMap := make(map[string]interface{})\n\tdataMap[\"title\"] = title\n\tdataMap[\"json\"] = fmt.Sprintf(\"{{< oas3 url=\\\"../../../swaggerdocs/%s.json\\\" >}}\", strings.Replace(strings.ToLower(name), \" \", \"-\", -1))\n\n\t// Render the Markdown file based on the template\n\tt := template.Must(template.New(\"top\").Parse(markdown))\n\tbuf := &bytes.Buffer{}\n\tif err := t.Execute(buf, dataMap); err != nil {\n\t\tlog.Printf(\"error while rendering Markdown file: %s\", err.Error())\n\t\treturn fmt.Errorf(\"error while rendering Markdown file: %s\", err.Error())\n\t}\n\ts := buf.String()\n\n\t// Determine where to save the file\n\tfilename = filepath.Join(hugoStore, fmt.Sprintf(\"%s.md\", strings.Replace(strings.ToLower(name), \" \", \"-\", -1)))\n\tlog.Printf(\"Preparing to write %s to disk\", filename)\n\tos.Remove(filename)\n\n\t// Create a file on disk\n\tfile, err = os.Create(filename)\n\tif err != nil {\n\t\tlog.Printf(\"error while creating file: %s\", err.Error())\n\t\treturn fmt.Errorf(\"error while creating file: %s\", err.Error())\n\t}\n\tdefer file.Close()\n\n\t// Open the file to write\n\tfile, err = os.OpenFile(filename, os.O_APPEND|os.O_WRONLY, 0600)\n\tif err != nil {\n\t\tlog.Printf(\"error while opening file: %s\", err.Error())\n\t\treturn fmt.Errorf(\"error while opening file: %s\", err.Error())\n\t}\n\n\t// Write the Markdown doc to disk\n\t_, err = file.Write([]byte(s))\n\tif err != nil {\n\t\tlog.Printf(\"error while writing Markdown to disk: %s\", err.Error())\n\t\treturn fmt.Errorf(\"error while writing Markdown to disk: %s\", err.Error())\n\t}\n\n\treturn nil\n}", "func writeDict(d testDict) (string, error) {\n\tpath, err := ioutil.TempDir(\"\", \"stardict\")\n\tif err != nil {\n\t\treturn \"\", nil\n\t}\n\n\tif err := ioutil.WriteFile(filepath.Join(path, \"dictionary.ifo\"), []byte(d.ifo), 0600); err != nil {\n\t\treturn \"\", err\n\t}\n\tif err := ioutil.WriteFile(filepath.Join(path, \"dictionary.idx\"), idx.MakeIndex(d.idx, 32), 0600); err != nil {\n\t\treturn \"\", err\n\t}\n\tif err := ioutil.WriteFile(filepath.Join(path, \"dictionary.dict\"), dict.MakeDict(d.dict, nil), 0600); err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn path, nil\n}", "func writeGenFile(file io.Reader, path string) error {\n\terr := os.MkdirAll(filepath.Dir(path), 0777)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\toutFile, err := os.Create(path)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"cannot create file %v\", path)\n\t}\n\n\t_, err = io.Copy(outFile, file)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"cannot write to %v\", path)\n\t}\n\treturn outFile.Close()\n}", "func writeRevisions(dw printers.PrefixWriter, revisions []*revisionDesc, printDetails bool) {\n\trevSection := dw.WriteAttribute(\"Revisions\", \"\")\n\tdw.Flush()\n\tfor _, revisionDesc := range revisions {\n\t\tready := apis.Condition{\n\t\t\tType: apis.ConditionReady,\n\t\t\tStatus: corev1.ConditionUnknown,\n\t\t}\n\t\tfor _, cond := range revisionDesc.revision.Status.Conditions {\n\t\t\tif cond.Type == apis.ConditionReady {\n\t\t\t\tready = cond\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tsection := revSection.WriteColsLn(formatBullet(revisionDesc.percent, ready.Status), revisionHeader(revisionDesc))\n\t\tif ready.Status == corev1.ConditionFalse {\n\t\t\tsection.WriteAttribute(\"Error\", ready.Reason)\n\t\t}\n\t\trevision.WriteImage(section, revisionDesc.revision)\n\t\trevision.WriteReplicas(section, revisionDesc.revision)\n\t\tif printDetails {\n\t\t\trevision.WritePort(section, revisionDesc.revision)\n\t\t\trevision.WriteEnv(section, revisionDesc.revision, printDetails)\n\t\t\trevision.WriteEnvFrom(section, revisionDesc.revision, printDetails)\n\t\t\trevision.WriteScale(section, revisionDesc.revision)\n\t\t\trevision.WriteConcurrencyOptions(section, revisionDesc.revision)\n\t\t\trevision.WriteResources(section, revisionDesc.revision)\n\t\t}\n\t}\n}", "func vizFileWrite(v *VizceralGraph) {\n\tvJson, _ := json.Marshal(*v)\n\tsJson := fmt.Sprintf(\"%s\", vJson)\n\n\tdf := os.Getenv(\"TRAFFIC_URL\")\n\tdataFile := string(\"/usr/src/app/dist/\" + df)\n\tcreateFile(dataFile)\n\tWriteFile(dataFile, sJson)\n}", "func MultiRefWriteToFile(p string, refToImage map[name.Reference]v1.Image, opts ...WriteOption) error {\n\tw, err := os.Create(p)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer w.Close()\n\n\treturn MultiRefWrite(refToImage, w, opts...)\n}", "func CombineSessionsToFile(client string, items *s3.ListObjectsV2Output) error {\n\tnewFileName := \"conversations/\" + client + \".txt\"\n\tos.Remove(newFileName)\n\tnewFile, err := os.OpenFile(newFileName, os.O_WRONLY|os.O_APPEND|os.O_CREATE, 0644)\n\tdefer newFile.Close()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to create file %q: %v\", newFileName, err)\n\t}\n\t// Iterate over session files and append them to the combined one\n\tfor _, item := range items.Contents {\n\t\t// Open session file\n\t\tpieceFile, err := os.Open(*item.Key)\n\t\tif err != nil {\n\t\t\tlog.Warnf(\"Failed to open piece file for reading: %v\", err)\n\t\t}\n\t\tdefer pieceFile.Close()\n\n\t\t// Append session file\n\t\tn, err := io.Copy(newFile, pieceFile)\n\t\tif err != nil {\n\t\t\tlog.Warnf(\"Failed to append piece file to big file: %v\", err)\n\t\t}\n\t\tlog.Infof(\"Wrote %d bytes of %s to the end of %s\\n\", n, *item.Key, newFileName)\n\n\t\t// Delete session file\n\t\tpieceFile.Close()\n\t\tif err := os.Remove(*item.Key); err != nil {\n\t\t\tlog.Errorf(\"Failed to remove piece file %s: %v\", *item.Key, err)\n\t\t}\n\t}\n\tnewFile.Close()\n\treturn nil\n}", "func writeFiles(ctx android.PathContext, outputDir android.OutputPath, files []BazelFile) {\n\tfor _, f := range files {\n\t\tp := getOrCreateOutputDir(outputDir, ctx, f.Dir).Join(ctx, f.Basename)\n\t\tif err := writeFile(ctx, p, f.Contents); err != nil {\n\t\t\tpanic(fmt.Errorf(\"Failed to write %q (dir %q) due to %q\", f.Basename, f.Dir, err))\n\t\t}\n\t}\n}", "func MultiWriteToFile(p string, tagToImage map[name.Tag]v1.Image, opts ...WriteOption) error {\n\trefToImage := make(map[name.Reference]v1.Image, len(tagToImage))\n\tfor i, d := range tagToImage {\n\t\trefToImage[i] = d\n\t}\n\treturn MultiRefWriteToFile(p, refToImage, opts...)\n}", "func SaveFormatedText(wordList *[][]rune, fileResult string) {\r\n\tvar wordListInBytes []rune\r\n\r\n\tfor a := 0; a < len(*wordList); a++ {\r\n\t\tfor b := 0; b < len((*wordList)[a]); b++ {\r\n\t\t\twordListInBytes = append(wordListInBytes, (*wordList)[a][b])\r\n\t\t}\r\n\t}\r\n\r\n\tfinalTextInBytes := converters.TranslateToByteSlice(wordListInBytes)\r\n\r\n\terrorTwo := ioutil.WriteFile(fileResult, finalTextInBytes, 0)\r\n\tCheckFile(errorTwo, fileResult)\r\n}", "func (api *api) save() {\n\tr := map[string]string{}\n\tfor k, v := range api.Manager.pathes {\n\t\tr[k] = v.content\n\t}\n\tdata, err := json.MarshalIndent(r, \"\", \" \")\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn\n\t}\n\terr = ioutil.WriteFile(api.ConfigFile, data, 0755)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n}", "func (s *Site) writeStatic() error {\n\n\tfor _, file := range s.files {\n\t\tfrom := filepath.Join(s.Src, file)\n\t\tto := filepath.Join(s.Dest, file)\n\t\tlogf(MsgCopyingFile, file)\n\t\tif err := copyTo(from, to); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "func (seq *Sequence) writeTo(filePath string) {\n\n\tconst width = 80\n\n\tfile, err := os.OpenFile(filePath, os.O_RDWR|os.O_CREATE, 0755)\n\tcheck(err)\n\tdefer file.Close()\n\n\tfile.WriteString(seq.header + newline)\n\n\traw := seq.rawSequence\n\tlimit := width\n\tfor ; limit < len(seq.rawSequence); limit += width {\n\n\t\tfile.WriteString(raw[limit-width:width] + newline)\n\t}\n\tfile.WriteString(raw[limit-width:] + newline)\n}", "func (e *Epub) writeCSSFiles(tempDir string) error {\n\terr := e.writeMedia(tempDir, e.css, CSSFolderName)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Clean up the cover temp file if one was created\n\tos.Remove(e.cover.cssTempFile)\n\n\treturn nil\n}", "func (self templateEngine) genBoard(prefix, frontend, newsgroup, outdir string, db Database) {\n // get the board model\n board := self.obtainBoard(prefix, frontend, newsgroup, db)\n // update the entire board model\n board = board.UpdateAll(db)\n // save the model\n self.groups[newsgroup] = board\n updateLinkCache()\n \n pages := len(board)\n for page := 0 ; page < pages ; page ++ {\n outfile := filepath.Join(outdir, fmt.Sprintf(\"%s-%d.html\", newsgroup, page))\n wr, err := OpenFileWriter(outfile)\n if err == nil {\n board[page].RenderTo(wr)\n wr.Close()\n log.Println(\"wrote file\", outfile)\n } else {\n log.Println(\"error generating board page\", page, \"for\", newsgroup, err)\n }\n }\n}", "func writeHostMap(hostMap map[string]string) {\n\tif host_list_file == \"\" {\n\t\treturn\n\t}\n\tf, err := os.Create(host_list_file)\n\tif err != nil {\n\t\tlogr.LogLine(logr.Lerror, ltagsrc, err.Error())\n\t}\n\tdefer f.Close()\n\n\tfor host := range hostMap {\n\t\tf.WriteString(fmt.Sprintf(\"%s\\n\", host))\n\t}\n}", "func (r *FileRepository) WriteFileSlice(path string, data []string) (string, error) {\n\t// crate directory if not exisiting\n\tr.createDir(path)\n\n\tts := strconv.FormatInt(time.Now().UnixNano(), 10)\n\tfileName := path + ts\n\n\tfile, err := os.OpenFile(fileName, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644)\n\tif err != nil {\n\t\treturn \"\", errors.Wrapf(err, \"fail to call os.OpenFile(%s)\", fileName)\n\t}\n\twriter := bufio.NewWriter(file)\n\n\tfor _, d := range data {\n\t\t_, _ = writer.WriteString(d + \"\\n\")\n\t}\n\n\twriter.Flush()\n\tfile.Close()\n\n\treturn fileName, nil\n}", "func writeFile(iptvline string){\n\n\t//check if file exists\n\tif _, err := os.Stat(path); os.IsNotExist(err) {\n\t\t// create file if not exists\n\t\tif os.IsNotExist(err) {\n\t\t\tvar file, err = os.Create(path)\n\t\t\tif isError(err) { return }\n\t\t\tdefer file.Close()\n\t\t}\n\t}\n\n\n\tfileHandle, _ := os.OpenFile(path, os.O_APPEND, 0666)\n\twriter := bufio.NewWriter(fileHandle)\n\tdefer fileHandle.Close()\n\n\tfmt.Fprintln(writer, iptvline)\n\twriter.Flush()\n}", "func ToFile(in chan string, filename string) int {\n\tn := 0\n\tcandy.WithCreated(filename, func(w io.Writer) {\n\t\tfor l := range in {\n\t\t\tfmt.Fprintf(w, \"%s\\n\", l)\n\t\t\tn++\n\t\t}\n\t})\n\treturn n\n}", "func writeToStore() {\n\tf, err := os.OpenFile(DBFile, os.O_APPEND|os.O_WRONLY, 0600)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdefer f.Close()\n\tif _, err := f.WriteString(strings.Join(passGenerator(), \"\") + \",\" + createSecrets() + \"\\n\"); err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "func writeFakeCopyResults(fn string, cr *fakeCopyResults) error {\n\tvar err error\n\tvar f *os.File\n\n\tf, err = os.OpenFile(fn, os.O_CREATE|os.O_WRONLY|os.O_TRUNC, 0666)\n\tif err != nil {\n\t\treturn err\n\t}\n\tb, _ := json.Marshal(cr)\n\tbuf := bytes.NewBuffer(b)\n\tio.Copy(f, buf)\n\tf.Close()\n\n\treturn nil\n}", "func writeFile(v string) {\n\t// 打开文件\n\tfilePtr, err := os.OpenFile(\"mqtt.json\", os.O_CREATE|os.O_WRONLY, os.ModePerm)\n\tif err != nil {\n\t\tmqtt.ERROR.Println(err)\n\t}\n\n\tdefer filePtr.Close()\n\n\ttype Data struct {\n\t\tDeviceID string `JSON:\"deviceID\"` //设备id\n\t\tTimestamp string `JSON:\"timestamp\"` //时间戳\n\t\tFields map[string]string `JSON:\"fields\"` //标签\n\t}\n\tvar data Data\n\tif err := json.Unmarshal([]byte(v), &data); err == nil {\n\n\t\t// 创建Json编码器\n\t\tencoder := json.NewEncoder(filePtr)\n\t\terr = encoder.Encode(data)\n\t\tif err != nil {\n\t\t\tmqtt.ERROR.Println(\"writeFile failed\", err.Error())\n\t\t} else {\n\t\t\tmqtt.ERROR.Println(\"writeFile success\")\n\t\t}\n\t} else {\n\t\tmqtt.ERROR.Println(err)\n\t}\n\n}", "func (c Sub) Write(w *bufio.Writer) (err error) {\n\tfor _, s := range [...]string{\n\t\t\"SUB \",\n\t\tc.Topic,\n\t\t\" \",\n\t\tc.Channel,\n\t\t\"\\n\",\n\t} {\n\t\tif _, err = w.WriteString(s); err != nil {\n\t\t\terr = errors.Wrap(err, \"writing SUB command\")\n\t\t\treturn\n\t\t}\n\t}\n\treturn\n}", "func writeFile(contents []byte, filename string) {\n\terr := ioutil.WriteFile(filename, contents, 0644)\n\tcheckIfError(err)\n}", "func writeBibJSON(path string, metadata data.CollectionMetadata) error {\n\tbib, err := json.MarshalIndent(metadata, \"\", \" \")\n\tif err != nil {\n\t\tfmt.Println(\"Couldn't convert object to JSON\")\n\t\tos.Exit(1)\n\t}\n\treturn ioutil.WriteFile(\"bib.json\", bib, os.FileMode(0666))\n}", "func (builder *OnDiskBuilder) finish() {\n\t// Write the docID to path map\n\tgo builder.index.WriteDocIDToFilePath(\"./saved/meta/idToPath\")\n\t// Find out which terms are in memory, on disk or both\n\tonDiskOnly, inMemoryOnly, onDiskAndInMemory := builder.index.CategorizeTerms()\n\t// Get from frequency scores to tf-idf\n\tvar wg sync.WaitGroup\n\twg.Add(3)\n\tgo builder.writeTfIdfInMemoryTerms(inMemoryOnly, &wg)\n\tgo builder.tfIdfOnDiskTerms(onDiskOnly, &wg)\n\tgo builder.mergeDiskMemoryThenTfIdfTerms(onDiskAndInMemory, &wg)\n\twg.Wait()\n\tclose(builder.writingChannel)\n}", "func write_file(outFile, contents string) error {\n\n\terr := ioutil.WriteFile(outFile, []byte(contents), 0644)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn nil\n}", "func writeConnections(cmd *cobra.Command, connectionName string) error {\n\tfmt.Fprintf(cmd.OutOrStdout(), \"writing connections to base directory [%s]\\n\", landscapeDir)\n\n\toutput := strings.ToUpper(bite.GetOutPutFlag(cmd))\n\n\tif connectionName != \"\" {\n\t\tconnection, err := config.Client.GetConnection(connectionName)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tfileName := fmt.Sprintf(\"connection-%s-%s.%s\", strings.ToLower(strings.ReplaceAll(connection.Name, \" \", \"_\")), connection.Name, strings.ToLower(output))\n\t\treturn utils.WriteFile(landscapeDir, pkg.ConnectionsFilePath, fileName, output, connection)\n\t}\n\n\tconnections, err := config.Client.GetConnections()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, connection := range connections {\n\t\tconnectionComplete, err := config.Client.GetConnection(connection.Name)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tfileName := fmt.Sprintf(\"connection-%s-%s.%s\", strings.ToLower(strings.ReplaceAll(connection.Name, \" \", \"_\")), connection.Name, strings.ToLower(output))\n\t\terr = utils.WriteFile(landscapeDir, pkg.ConnectionsFilePath, fileName, output, connectionComplete)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"could not export connection to file %s\", fileName)\n\t\t}\n\t}\n\n\treturn nil\n}", "func writeJSONFile(t tree, filename string) {\n\t// marshal data retrieved into JSON\n\tdata, err := json.Marshal(t)\n\tif err != nil {\n\t\tlog.Fatalf(\"Error marshaling data for JSON => {%s}\", err)\n\t}\n\n\t// write data into file\n\terr = ioutil.WriteFile(filename, data, os.ModePerm)\n\tif err != nil {\n\t\tlog.Fatalf(\"Failed to write json data to file, %s => {%s}\", destJSON, err)\n\t}\n}", "func (c *Collection) writeStdout() {\n\tfor _, s := range c.Services {\n\t\tfmt.Println(s.Name)\n\t\tfor _, h := range s.Endpoint.Host {\n\t\t\tfmt.Println(h)\n\t\t}\n\t\tfmt.Println(\"\")\n\t}\n}", "func sampleWrite() {\n\toutput, err := os.Create(\"output.txt\")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer func() {\n\t\tif err := output.Close(); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}()\n\n\t// write sth into output\n}", "func (ctx *storyReadCtx) writeShutdown() {\n\tvar log = ctx.logger.Info().\n\t\tStr(\"story\", ctx.story).\n\t\tUint64(\"connId\", ctx.httpCtx.ConnID())\n\tvar msg strings.Builder\n\tmsgId := ctx.uuidSupplier()\n\tmsg.WriteString(\"id: \")\n\tmsg.WriteString(msgId)\n\tmsg.WriteString(\"\\nevent: shutdown\\ndata: 0\\n\\n\")\n\tlog.Msg(\"Closing connection\")\n\tif ctx.httpWriter != nil {\n\t\tctx.httpWriter.WriteString(msg.String())\n\t}\n}", "func outputWriter(filename string, results <-chan DomainInfo, done chan<- bool) {\n\tdefer func() { done <- true }()\n\tf, err := os.Create(filename)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdefer f.Close()\n\t_, err = f.WriteString(\"domain,ip,org,ok\\n\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tlog.Println(\"Writer: Waiting on results\")\n\tfor d := range results {\n\t\t// log.Println(\"Writer: got result\", d)\n\t\t_, err = f.WriteString(fmt.Sprintf(\"%s,%s,%s,%t\\n\", d.domain, d.ip, d.org, d.ok))\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t}\n\tlog.Println(\"Writer: exiting\")\n}", "func (e *Entry) writeToDisk() error {\n\ttmpName := fmt.Sprintf(\"%s.tmp\", e.responseFilename)\n\terr := ioutil.WriteFile(tmpName, e.response, os.ModePerm)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Rename(tmpName, e.responseFilename)\n\tif err != nil {\n\t\treturn err\n\t}\n\te.info(\"Written new response to %s\", e.responseFilename)\n\treturn nil\n}", "func WriteContributors(authors []string, reviewers []string, directory string) error {\n\n\tfilePath := directory + \"./Contributors.csv\"\n\t// Creating CSV file\n\terr := CreateFile(filePath)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcontributors := mergeContributors(authors, reviewers)\n\n\terr = writeMap(filePath, contributors)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func writeFile(path, contents string) error {\n\tdir := filepath.Dir(path)\n\tif err := os.MkdirAll(dir, 0755); err != nil {\n\t\treturn err\n\t}\n\treturn ioutil.WriteFile(path, []byte(contents), 0644)\n}", "func statsToFile(stats string, dir string) error {\n\n\t// Create a directory using current date\n\t// get current date\n\tdt := time.Now()\n\n\t// forge base dir\n\tbasedir := fmt.Sprintf(\"%s/%s\", dir, dt.Format(\"2006-01-02\"))\n\t// create base dir if not exists\n\tif _, err := os.Stat(basedir); os.IsNotExist(err) {\n\t\tos.Mkdir(basedir, 0755)\n\t}\n\n\t// Create file\n\tf, err := os.Create(fmt.Sprintf(\"%s/stats\", basedir))\n\tif err != nil {\n\t\treturn err\n\t}\n\t// Ensure file is closed at the end of the func\n\tdefer f.Close()\n\n\t// Write stuff and return err\n\t_, err = f.WriteString(stats)\n\n\treturn err\n\n}", "func (f *fsDocWriter) write(file string, data []byte, mode os.FileMode) error {\n\treturn ioutil.WriteFile(file, data, mode)\n}", "func writeAPIFile(g *generateInfo) error {\n\treturn writeGoFile(filepath.Join(g.PackageDir, \"api.go\"),\n\t\tcodeLayout,\n\t\t\"\",\n\t\tg.API.PackageName(),\n\t\tg.API.APIGoCode(),\n\t)\n}", "func writeSeedsAndPlacements(url, n string) {\n\tr := getTournament(url)\n\tvar d strings.Builder\n\td.WriteString(\"Name Seed Placement\\n\")\n\n\tfor _, s := range r.Participants {\n\t\td.WriteString(fmt.Sprintf(\"%s %d %d\\n\", s.Participant.Name, s.Participant.Seed, s.Participant.Placement))\n\t}\n\n\twriteTestResults(n, []byte(d.String()))\n}", "func writeTeam(codec Codec, t Team, dir string) error {\n\tt.Children = nil\n\n\tbuf, err := codec.Encode(&t)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err := ioutil.WriteFile(filepath.Join(dir, teamFile), buf, 0644); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func spewFile(path string, data string, perm os.FileMode) {\n\t_ = os.WriteFile(path, []byte(data+\"\\n\"), perm)\n}", "func writeKubeconfig(cfg *rest.Config) {\n\ttemplate := `# Kubeconfig file for Calico CNI plugin. Installed by calico/node.\napiVersion: v1\nkind: Config\nclusters:\n- name: local\n cluster:\n server: %s\n certificate-authority-data: \"%s\"\nusers:\n- name: calico\n user:\n token: %s\ncontexts:\n- name: calico-context\n context:\n cluster: local\n user: calico\ncurrent-context: calico-context`\n\n\t// Replace the placeholders.\n\tdata := fmt.Sprintf(template, cfg.Host, string(base64.StdEncoding.EncodeToString(cfg.CAData)), cfg.BearerToken)\n\n\t// Write the filled out config to disk.\n\tif err := ioutil.WriteFile(kubeconfigPath, []byte(data), 0600); err != nil {\n\t\tlogrus.WithError(err).Error(\"Failed to write CNI plugin kubeconfig file\")\n\t\treturn\n\t}\n\tlogrus.WithField(\"path\", kubeconfigPath).Info(\"Wrote updated CNI kubeconfig file.\")\n}", "func (r *Recipe) Save(fname string) (err error) {\n\tb, err := json.MarshalIndent(r, \"\", \" \")\n\tif err != nil {\n\t\treturn\n\t}\n\terr = ioutil.WriteFile(fname, b, 0644)\n\treturn\n}", "func (c Client) saveSliceToRetry(metrics []string, carbonAddr string) error {\n\t// If size of file is bigger, than max size we will remove lines from this file,\n\t// and will call this function again to check result and write to the file.\n\t// Recursion:)\n\n\tc.Lc.lg.Printf(\"Resaving %d metrics back to the retry-file\", len(metrics))\n\n\tretFile := path.Join(c.Conf.RetryDir, carbonAddr)\n\tf, err := os.OpenFile(retFile, os.O_RDWR|os.O_CREATE|os.O_APPEND, 0600)\n\tif err != nil {\n\t\tc.Lc.lg.Println(err)\n\t\tc.Mon.Increase(&c.Mon.clientStat[carbonAddr].dropped, len(metrics))\n\t\treturn err\n\t}\n\tdefer f.Close()\n\n\tdropped := 0\n\tfor _, metric := range metrics {\n\t\t_, err = f.WriteString(metric + \"\\n\")\n\t\tif err != nil {\n\t\t\tc.Lc.lg.Println(err)\n\t\t\tdropped++\n\t\t}\n\t}\n\tif dropped > 0 {\n\t\tc.Mon.Increase(&c.Mon.clientStat[carbonAddr].dropped, dropped)\n\t}\n\treturn c.removeOldDataFromRetryFile(carbonAddr)\n}", "func (index *ind) writeIndexFile() {\n\tif _, err := os.Stat(index.name); os.IsNotExist(err) {\n\t\tindexFile, err := os.Create(index.name)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t}\n\t\tindexFile.Close()\n\t}\n\n\tb := new(bytes.Buffer)\n\te := gob.NewEncoder(b)\n\n\terr := e.Encode(index)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tioutil.WriteFile(index.name, b.Bytes(), 7777)\n}" ]
[ "0.55863464", "0.5469895", "0.54434097", "0.5431", "0.53760487", "0.53694284", "0.52719694", "0.5235746", "0.51904577", "0.5181571", "0.5126275", "0.51013273", "0.5013156", "0.49837732", "0.49763706", "0.4975956", "0.49709514", "0.49566558", "0.49233288", "0.48834196", "0.4866701", "0.48299506", "0.4828175", "0.48118222", "0.48017412", "0.4801375", "0.48003864", "0.47722903", "0.47668016", "0.47620058", "0.47569966", "0.47498283", "0.4736702", "0.47351557", "0.47325933", "0.47233355", "0.47227252", "0.46973634", "0.4696616", "0.46660334", "0.4626349", "0.4625071", "0.46228927", "0.4610216", "0.4573502", "0.4566968", "0.4564592", "0.45373917", "0.45202205", "0.45142505", "0.45121533", "0.44986805", "0.4495953", "0.44856435", "0.44823325", "0.4480704", "0.4458889", "0.4453323", "0.44502765", "0.44494772", "0.44472057", "0.44450712", "0.44314215", "0.44301316", "0.44264916", "0.44208091", "0.44185096", "0.4415819", "0.44107097", "0.44041976", "0.44024673", "0.4398195", "0.43939427", "0.43875724", "0.43872026", "0.43841898", "0.43836337", "0.43736076", "0.43700632", "0.4367781", "0.43674105", "0.43620607", "0.4360639", "0.4356061", "0.4355741", "0.43508875", "0.43501398", "0.434992", "0.43414572", "0.4340428", "0.4337442", "0.43361193", "0.43353683", "0.43327206", "0.43320405", "0.43309078", "0.43263468", "0.43211645", "0.4320393", "0.4319035" ]
0.68240505
0
create markdown table with subreddit stats
func writeStatsToFile(posts []model.RedditPost) error { groupedPosts := groupBySubreddit(posts) countList := [][]model.RedditPost{} // convert to list for _, v := range groupedPosts { countList = append(countList, v) } // sort by post count sort.Slice(countList, func(i, j int) bool { return len(countList[i]) > len(countList[j]) }) data := [][]string{} for _, v := range countList { escapedTitle := strings.ReplaceAll(v[0].Title, "|", "\\|") title := "[" + escapedTitle + "]" + "(https://www.reddit.com" + v[0].Permalink + ")" data = append(data, []string{v[0].Subreddit, strconv.Itoa(len(v)), title, strconv.Itoa(v[0].Score)}) } file, _ := os.Create("README.md") table := tablewriter.NewWriter(file) table.SetAutoWrapText(false) table.SetHeader([]string{"Subreddit", "Total", "Top Post", "Score"}) table.SetBorders(tablewriter.Border{Left: true, Top: false, Right: true, Bottom: false}) table.SetCenterSeparator("|") table.AppendBulk(data) // Add Bulk Data table.Render() return nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func renderTable(repos []*github.Repository, writer io.Writer) {\n\ttable := tablewriter.NewWriter(writer)\n\ttable.SetHeader(headers)\n\n\tfor _, repo := range repos {\n\t\tr := newRepo(repo)\n\t\ttable.Append(r.RepoString())\n\t}\n\n\ttable.Render()\n}", "func printTabularDetails(datasets *maintenance.ListDatasetResponse, output io.Writer) {\n\tcolorOutput := colorWriter{out: output}\n\twriter := tabwriter.NewWriter(colorOutput, 15, 0, 2, ' ', tabwriter.FilterHTML)\n\tdefer writer.Flush()\n\n\tfmt.Fprintln(writer,\n\t\t\"<bold>Name</>\\t\"+\n\t\t\t\"<bold>Author</>\\t\"+\n\t\t\t\"<bold>Created</>\\t\"+\n\t\t\t\"<bold>Type</>\\t\"+\n\t\t\t\"<bold>Valuation</>\\t\"+\n\t\t\t\"<bold>State</>\\t\")\n\tfor _, dataset := range *datasets {\n\t\tif dataset.IsFolder() {\n\t\t\tfmt.Fprintln(writer,\n\t\t\t\t//color.WrapTag(dataset.Path, \"blue\")+\"/\", \"\\t\",\n\t\t\t\tdataset.Path+\"/\", \"\\t\",\n\t\t\t\tdataset.CreatedBy+\"\\t\",\n\t\t\t\tdataset.CreatedAt.Format(time.RFC3339), \"\\t\",\n\t\t\t\tdataset.Type, \"\\t\",\n\t\t\t\tdataset.Valuation, \"\\t\",\n\t\t\t\tdataset.State, \"\\t\")\n\t\t} else {\n\t\t\tfmt.Fprintln(writer,\n\t\t\t\tdataset.Path, \"\\t\",\n\t\t\t\tdataset.CreatedBy, \"\\t\",\n\t\t\t\tdataset.CreatedAt.Format(time.RFC3339), \"\\t\",\n\t\t\t\tdataset.Type, \"\\t\",\n\t\t\t\tdataset.Valuation, \"\\t\",\n\t\t\t\tdataset.State, \"\\t\")\n\t\t}\n\t}\n}", "func renderStatTable(Table [][]string) {\n\tg := widgets.NewTable()\n\tg.SetRect(0, 5, 75, 26)\n\tg.TextAlignment = ui.AlignCenter\n\tg.ColumnWidths = []int{6, 34, 10, 10, 10}\n\tg.Rows = Table\n\tui.Render(g)\n}", "func createStat(votes *Vote) string {\n\n\tstats := NewStatistics(votes)\n\n\tstr := \"Total: \" + strconv.Itoa(stats.Total) + \"\\n\"\n\tfor value, users := range stats.Transformed {\n\t\tstr += value + \" (\" + strconv.Itoa(len(users)) + \"): \" + strings.Join(users, \", \") + \"\\n\"\n\t}\n\n\treturn str\n\n}", "func (c *Counter) PrintAsTable(highlight bool) {\n\tif c == nil || len(c.topicStats) == 0 {\n\t\treturn\n\t}\n\ttable := tabular.NewTable(highlight,\n\t\ttabular.C(\"Topic\").Align(tabular.AlignLeft),\n\t\ttabular.C(\"Succeeded\"),\n\t\ttabular.C(\"Failed\"))\n\n\tfor topic, s := range c.topicStats {\n\t\tfailed := format.RedIfTrue(humanize.Comma(s.failure), func() bool {\n\t\t\treturn s.failure > 0\n\t\t}, highlight)\n\n\t\tsucceeded := format.GreenIfTrue(humanize.Comma(s.success), func() bool {\n\t\t\treturn s.success > 0\n\t\t}, highlight)\n\t\ttable.AddRow(topic, succeeded, failed)\n\t}\n\ttable.SetTitle(\"SUMMARY\")\n\ttable.TitleAlignment(tabular.AlignCenter)\n\ttable.Render()\n}", "func (r renderer) Table(out *bytes.Buffer, header []byte, body []byte, columnData []int) {}", "func (nt *NodeTable) Stats() string {\n\treturn fmt.Sprintf(\"{\\n\"+\n\t\t`\"FastHTCount\": %d,`+\"\\n\"+\n\t\t`\"SlowHTCount\": %d,`+\"\\n\"+\n\t\t`\"Conflicts\": %d,`+\"\\n\"+\n\t\t`\"MemoryInUse\": %d`+\"\\n}\",\n\t\tnt.fastHTCount, nt.slowHTCount, nt.conflicts, nt.MemoryInUse())\n}", "func (ulw Wrapper) content(row, totals userlatency.Row) string {\n\treturn fmt.Sprintf(\"%10s %6s|%10s %6s|%4s %4s|%5s %3s|%3s %3s %3s %3s %3s|%s\",\n\t\tformatSeconds(row.Runtime),\n\t\tlib.FormatPct(lib.Divide(row.Runtime, totals.Runtime)),\n\t\tformatSeconds(row.Sleeptime),\n\t\tlib.FormatPct(lib.Divide(row.Sleeptime, totals.Sleeptime)),\n\t\tlib.FormatCounter(int(row.Connections), 4),\n\t\tlib.FormatCounter(int(row.Active), 4),\n\t\tlib.FormatCounter(int(row.Hosts), 5),\n\t\tlib.FormatCounter(int(row.Dbs), 3),\n\t\tlib.FormatCounter(int(row.Selects), 3),\n\t\tlib.FormatCounter(int(row.Inserts), 3),\n\t\tlib.FormatCounter(int(row.Updates), 3),\n\t\tlib.FormatCounter(int(row.Deletes), 3),\n\t\tlib.FormatCounter(int(row.Other), 3),\n\t\trow.Username)\n}", "func PrintTable(outputs []core.Output, mirror io.Writer) {\n\tcolorReset := \"\\033[0m\"\n\tcolorRed := \"\\033[31m\"\n\tcolorGreen := \"\\033[32m\"\n\tcolorYellow := \"\\033[33m\"\n\tcolorCyan := \"\\033[36m\"\n\tt := table.NewWriter()\n\tt.SetOutputMirror(mirror)\n\tt.AppendHeader(table.Row{\"URL\", \"Endpoint\", \"Severity\", \"Plugin\", \"Remediation\"})\n\tfor _, output := range outputs {\n\t\tseverity := \"\"\n\t\tif output.Severity == \"High\" {\n\t\t\tseverity = fmt.Sprint(string(colorRed), \"High\", string(colorReset))\n\t\t} else if output.Severity == \"Medium\" {\n\t\t\tseverity = fmt.Sprint(string(colorYellow), \"Medium\", string(colorReset))\n\t\t} else if output.Severity == \"Low\" {\n\t\t\tseverity = fmt.Sprint(string(colorGreen), \"Low\", string(colorReset))\n\t\t} else {\n\t\t\tseverity = fmt.Sprint(string(colorCyan), \"Informational\", string(colorReset))\n\t\t}\n\t\tt.AppendRow([]interface{}{\n\t\t\toutput.URL,\n\t\t\toutput.Endpoint,\n\t\t\tseverity,\n\t\t\toutput.Name,\n\t\t\toutput.Remediation,\n\t\t})\n\t}\n\tt.SortBy([]table.SortBy{\n\t\t{Name: \"Severity\", Mode: table.Asc},\n\t})\n\tt.Render()\n}", "func printStats(stats []statisic, hash string) {\n\tw := tabwriter.NewWriter(os.Stdout, 0, 0, 1, ' ', tabwriter.AlignRight|tabwriter.Debug)\n\n\tfmt.Fprintf(w, \"%s(w=%d):\\n\", hash, sketchWidth)\n\tfmt.Fprintf(w, \"data set\\tmax. abs.\\tavg. abs.\\tmax. rel.\\tavg. rel.\\t# exact\\n\")\n\n\tfor i := 0; i < len(stats); i++ {\n\t\tstat := stats[i]\n\t\tfmt.Fprintf(w, \"%s\\t%d\\t%d\\t%.2f\\t%.2f\\t%d\\n\", filePaths[i], stat.maxAbs, stat.avgAbs, stat.maxRel, stat.avgRel, 100-stat.misses)\n\t}\n\tfmt.Fprintln(w)\n\tw.Flush()\n}", "func RenderStats(uiView View, timeframe int) {\n\tif !uiView.UIEnabled {\n\t\tRenderStatsNoUI(uiView, timeframe)\n\t\treturn\n\t}\n\tif timeframe != uiView.ActiveTimeframe {\n\t\t// The updated timeframe is not to be updated\n\t\treturn\n\t}\n\trenderStatisticsLayout(uiView)\n\n\t// Processing the general stats table headers\n\tstatsHeaders := []string{\n\t\t\"Id\",\n\t\t\"Website\",\n\t\t\"Avg (ms)\",\n\t\t\"Max (ms)\",\n\t\t\"Availability\",\n\t}\n\tTable := [][]string{statsHeaders}\n\t// For each URL\n\tvar urlStatistic *statistics.Statistic\n\tfor id, url := range uiView.Urls {\n\t\turlStatistic = uiView.URLStatistics[url][uiView.ActiveTimeframe]\n\t\tif !math.IsNaN(urlStatistic.Average()) {\n\t\t\t// Append Statistics\n\t\t\tTable = append(Table, []string{\n\t\t\t\tfmt.Sprint(id),\n\t\t\t\tShorten(url),\n\t\t\t\tfmt.Sprintf(\"%.0f\", urlStatistic.Average()),\n\t\t\t\tfmt.Sprintf(\"%v\", urlStatistic.MaxResponseTime()),\n\t\t\t\tfmt.Sprintf(\"%.0f%%\", urlStatistic.Availability()*100.0),\n\t\t\t})\n\t\t}\n\t}\n\t// Rendering the updated table\n\trenderStatTable(Table)\n\n\t// Processing the detailed view\n\tdetailedStatistics := uiView.URLStatistics[uiView.Urls[uiView.ActiveWebsite]]\n\tdetailedHeaders := []string{\n\t\t\"TimeFrame\",\n\t\t\"Avg (ms)\",\n\t\t\"Max (ms)\",\n\t\t\"Availability\",\n\t\t\"Codes\",\n\t}\n\tdetailTable := [][]string{detailedHeaders}\n\tfor id, statistic := range detailedStatistics {\n\t\tif !math.IsNaN(urlStatistic.Average()) {\n\t\t\t// Append Statistics\n\t\t\tdetailTable = append(detailTable, []string{\n\t\t\t\tuiView.TimeframeRepr[id],\n\t\t\t\tfmt.Sprintf(\"%.0f\", statistic.Average()),\n\t\t\t\tfmt.Sprintf(\"%v\", statistic.MaxResponseTime()),\n\t\t\t\tfmt.Sprintf(\"%.0f%%\", statistic.Availability()*100.0),\n\t\t\t\tStatusCodeMapToString(statistic.StatusCodeCount),\n\t\t\t})\n\t\t}\n\t}\n\t// Processing the sparkline graph\n\tplotValues := detailedStatistics[2].RecentResponseTime()\n\n\t// Rendering the detailed view\n\trenderStatDetails(uiView, detailTable, plotValues)\n}", "func (t toc) toHTMLStr() (htmlStr string) {\n\thtmlStr = `<!DOCTYPE html>\n<html>\n<head>\n<meta charset=\"UTF-8\" />\n<title>Redis in Action: Table Of Content</title>\n</head>\n<body>\n<h1 style=\"margin-top:20px; margin-left:30px; font-size:48px;\">Redis in Action</h1>\n`\n\n\thtmlStr += \"<div style=\\\"margin-left:auto; margin-right:auto; margin-top:80px; margin-bottom:40px;\\\">\\n<ul>\\n\"\n\tcurrentLevel := 1\n\tfor _, v := range t {\n\t\tif v.level > currentLevel {\n\t\t\thtmlStr += \"<ul>\\n\"\n\t\t\tcurrentLevel = v.level\n\t\t} else if v.level < currentLevel {\n\t\t\tfor i := v.level; i < currentLevel; i++ {\n\t\t\t\thtmlStr += \"</ul>\\n\"\n\t\t\t}\n\t\t\tcurrentLevel = v.level\n\t\t}\n\n\t\thtmlStr += fmt.Sprintf(\"<li><a href=\\\"./%03d.html\\\">%s</a></li>\\n\", v.value, v.title)\n\t}\n\thtmlStr += \"</ul>\\n</div>\\n</body>\\n</html>\"\n\treturn htmlStr\n}", "func RenderTableForSlack(log logr.Logger, items TableItems) (string, error) {\n\twriter := &strings.Builder{}\n\ttable := tablewriter.NewWriter(writer)\n\theaderKeys := make(map[string]int) // maps the header values to their index\n\theader := []string{\"\"}\n\n\tfor _, item := range items {\n\t\tif _, ok := headerKeys[item.Meta.CloudProvider]; !ok {\n\t\t\theader = append(header, item.Meta.CloudProvider)\n\t\t\theaderKeys[item.Meta.CloudProvider] = len(header) - 1\n\t\t}\n\t}\n\n\tres := results{\n\t\theader: headerKeys,\n\t\tcontent: make(map[string]resultRow),\n\t}\n\n\tfor _, item := range items {\n\t\tmeta := item.Meta\n\t\tif meta.CloudProvider == \"\" {\n\t\t\tlog.V(5).Info(\"skipped testrun\", \"id\", meta.TestrunID)\n\t\t\tcontinue\n\t\t}\n\t\tres.AddResult(meta, item.StatusSymbol)\n\t}\n\tif res.Len() == 0 {\n\t\treturn \"\", nil\n\t}\n\n\ttable.SetAutoWrapText(false)\n\ttable.SetHeader(header)\n\ttable.AppendBulk(res.GetContent())\n\ttable.SetHeaderAlignment(tablewriter.ALIGN_CENTER)\n\ttable.SetAlignment(tablewriter.ALIGN_LEFT)\n\ttable.Render()\n\treturn writer.String(), nil\n}", "func renderStatDetails(uiView View, detailTable [][]string, plotValues []float64) {\n\t// Detailed table\n\tg := widgets.NewTable()\n\tg.SetRect(0, 28, 75, 37)\n\tg.TextAlignment = ui.AlignCenter\n\tg.ColumnWidths = []int{10, 10, 10, 10, 30}\n\tg.Rows = detailTable\n\n\t// Detailed sparkline\n\tslc := widgets.NewSparkline()\n\tslc.Data = plotValues\n\tslc.LineColor = ui.ColorGreen\n\n\tlc := widgets.NewSparklineGroup(slc)\n\tlc.Title = \" Recent Response Time \"\n\n\tlc.SetRect(1, 37, 75, 49)\n\n\tui.Render(g, lc)\n}", "func RenderSummaryStats(w io.Writer, stats SummaryStats) error {\n\tvar err error\n\t_, err = fmt.Fprintf(w, \"Your total expenses: %.7f DASH\\n\\n\", stats.TotalCost)\n\tif err != nil {\n\t\treturn err\n\t}\n\ttw := tabwriter.NewWriter(w, 8, 8, 1, '\\t', tabwriter.Debug|tabwriter.AlignRight)\n\tvar (\n\t\trequestStats []Stats\n\t\tnetworkStats []Stats\n\t)\n\tfor _, stats := range stats.GroupedStats.Slice() {\n\t\tswitch stats.Type {\n\t\tcase RequestStatsType:\n\t\t\trequestStats = append(requestStats, stats)\n\t\tcase NetworkStatsType:\n\t\t\tnetworkStats = append(networkStats, stats)\n\t\t}\n\t}\n\tif len(requestStats) > 0 {\n\t\t_, err := io.WriteString(w, \"Summary statistics for all performed requests\\n\")\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\terr = writeTable(tw, []string{\"Request URL\", \"Size/bytes\", \"Elapsed/ms\", \"Cost/dash\"}, requestStats)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\t_, err = fmt.Fprintf(w, \"\\n\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tif len(networkStats) > 0 {\n\t\t_, err := io.WriteString(w, \"Summary statistics for all used networks\\n\")\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\terr = writeTable(tw, []string{\"Network\", \"Size/bytes\", \"Elapsed/ms\", \"Cost/dash\"}, networkStats)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func print_table(chunks []Chunk) {\n\tfmt.Println()\n\tfmt.Println(\" Tag | Payload | Pos1 | Pos2\")\n\tfmt.Println(\"------------------|----------------------------------------------------------------\")\n\tfor i := range chunks {\n\t\tpayload := chunks[i].payload\n\t\tn := 40\n\t\tif len(payload) < 40 {\n\t\t\tn = len(payload)\n\t\t}\n\t\tif len(payload) > 0 {\n\t\t\ttag := chunks[i].tag\n\t\t\tif tag == \"\" {\n\t\t\t\ttag = \"...\"\n\t\t\t}\n\t\t\tfmt.Printf(\" %-16s | %-40s | %-8d | %-8d\\n\", tag, payload[:n],\n\t\t\t\tchunks[i].pos1, chunks[i].pos2)\n\t\t}\n\t}\n\tfmt.Println()\n}", "func print_stats(){\nfmt.Print(\"\\nMemory usage statistics:\\n\")\nfmt.Printf(\"%v names\\n\",len(name_dir))\nfmt.Printf(\"%v replacement texts\\n\",len(text_info))\n}", "func (gist Gist) Markdown() template.HTML {\n\treturn template.HTML(string(blackfriday.MarkdownCommon([]byte(gist.Content))))\n}", "func (tw TableWriter) write(result Result) {\n\ttable := tablewriter.NewWriter(tw.Output)\n\theader := []string{\"Library\", \"Vulnerability ID\", \"Severity\", \"Installed Version\", \"Fixed Version\"}\n\tif !tw.Light {\n\t\theader = append(header, \"Title\")\n\t}\n\ttable.SetHeader(header)\n\n\tseverityCount := map[string]int{}\n\tfor _, v := range result.Vulnerabilities {\n\t\tseverityCount[v.Severity]++\n\n\t\ttitle := v.Title\n\t\tif title == \"\" {\n\t\t\ttitle = v.Description\n\t\t}\n\t\tsplittedTitle := strings.Split(title, \" \")\n\t\tif len(splittedTitle) >= 12 {\n\t\t\ttitle = strings.Join(splittedTitle[:12], \" \") + \"...\"\n\t\t}\n\n\t\tif len(v.PrimaryURL) > 0 {\n\t\t\tr := strings.NewReplacer(\"https://\", \"\", \"http://\", \"\")\n\t\t\ttitle = fmt.Sprintf(\"%s -->%s\", title, r.Replace(v.PrimaryURL))\n\t\t}\n\n\t\tvar row []string\n\t\tif tw.Output == os.Stdout {\n\t\t\trow = []string{v.PkgName, v.VulnerabilityID, dbTypes.ColorizeSeverity(v.Severity),\n\t\t\t\tv.InstalledVersion, v.FixedVersion}\n\t\t} else {\n\t\t\trow = []string{v.PkgName, v.VulnerabilityID, v.Severity, v.InstalledVersion, v.FixedVersion}\n\t\t}\n\n\t\tif !tw.Light {\n\t\t\trow = append(row, strings.TrimSpace(title))\n\t\t}\n\t\ttable.Append(row)\n\t}\n\n\tvar results []string\n\n\tvar severities []string\n\tfor _, sev := range tw.Severities {\n\t\tseverities = append(severities, sev.String())\n\t}\n\n\tfor _, severity := range dbTypes.SeverityNames {\n\t\tif !utils.StringInSlice(severity, severities) {\n\t\t\tcontinue\n\t\t}\n\t\tr := fmt.Sprintf(\"%s: %d\", severity, severityCount[severity])\n\t\tresults = append(results, r)\n\t}\n\n\tfmt.Printf(\"\\n%s\\n\", result.Target)\n\tfmt.Println(strings.Repeat(\"=\", len(result.Target)))\n\tfmt.Printf(\"Total: %d (%s)\\n\\n\", len(result.Vulnerabilities), strings.Join(results, \", \"))\n\n\tif len(result.Vulnerabilities) == 0 {\n\t\treturn\n\t}\n\n\ttable.SetAutoMergeCells(true)\n\ttable.SetRowLine(true)\n\ttable.Render()\n\treturn\n}", "func newStats(code, comment, blank int) *Stats {\n\ttotal := code + comment + blank\n\tif total == 0 {\n\t\ttotal = 1\n\t}\n\treturn &Stats{\n\t\tcode,\n\t\tcomment,\n\t\tblank,\n\t\tcode + comment + blank,\n\t\tfloat64(code) / float64(total) * 100,\n\t\tfloat64(comment) / float64(total) * 100,\n\t\tfloat64(blank) / float64(total) * 100,\n\t}\n}", "func markdownStr(pixelChrs string, ncommits int) string {\n\ts := \"```\\n\" + pixelChrs\n\tif ncommits > 1 {\n\t\ts += strings.Repeat(\"<\", ncommits-1)\n\t}\n\treturn s + \"\\n```\\n\"\n}", "func main() {\n\ts := awk.NewScript()\n\n\ts.Begin = func(s *awk.Script) {\n\t\ts.SetFS(\"[][ ]\")\n\t}\n\ts.State = s.NewValue(\"\")\n\n\t// NR == 1 & $0 ~ /^# +/ { State = $0 }\n\ts.AppendStmt(func(s *awk.Script) bool { return s.NR == 1 && s.F(0).Match(\"^# +\") },\n\t\tfunc(s *awk.Script) {\n\t\t\ts.State = s.F(0)\n\t\t\ts.Next()\n\t\t})\n\n\t// /^\\[category/ { convert meta data format }\n\ts.AppendStmt(func(s *awk.Script) bool { return s.F(0).Match(\"^\\\\[category\") },\n\t\tfunc(s *awk.Script) {\n\t\t\tre := regexp.MustCompile(\"^# +(.*)$\")\n\t\t\tfmt.Println(re.ReplaceAllString(s.State.(*awk.Value).String(),\n\t\t\t\t\"---\\ntitle: \\\"$1\\\"\"))\n\t\t\tfmt.Printf(\"date: \\\"%s\\\"\\n\", time.Now().Format(time.RFC3339))\n\t\t\tfmt.Printf(\"categories: [\\\"%s\\\"]\\n\", s.F(3))\n\t\t\tfmt.Printf(\"%s: [%s]\\n\", s.F(5), quoteEach(s.F(6).String()))\n\t\t\tfmt.Println(\"---\\n\")\n\t\t\t//s.Exit()\n\t\t\ts.Next()\n\t\t})\n\n\t// 1; # i.e., print all\n\ts.AppendStmt(nil, nil)\n\n\tif err := s.Run(os.Stdin); err != nil {\n\t\tpanic(err)\n\t}\n}", "func printDataTable(table string) {\n\t// Open database\n\tdb, err := sql.Open(\"sqlite3\", \"./src/goRepoDB.db\")\n\tcheckError(err)\n\n\tdefer db.Close()\n\n\t// Select everything from the table\n\tquery := fmt.Sprintf(\"SELECT * FROM %s\", table)\n\trows, err := db.Query(query)\n\tcheckError(err)\n\n\t// Data to be saved into\n\tvar number int\n\tvar url string\n\tvar title string\n\tvar user string\n\tvar mile_name string\n\tvar mile_desc string\n\tvar tags string\n\n\t// For each row\n\tfor rows.Next() {\n\t\t// Save the info into our variables\n\t\terr = rows.Scan(&number, &url, &title, &user, &mile_name, &mile_desc, &tags)\n\t\tcheckError(err)\n\n\t\t// Print them\n\t\tfmt.Printf(\"\\nIssue #%d\\n\", number)\n\t\tfmt.Printf(\"- URL: %s\\n\", url)\n\t\tfmt.Printf(\"- Nombre: %s\\n\", title)\n\t\tfmt.Printf(\"- Autor: %s\\n\", user)\n\t\tfmt.Printf(\"- Tags: %s\\n\", tags)\n\t\tfmt.Printf(\"- Milestone\\n - Nombre: %s\\n\", mile_name)\n\t\tfmt.Printf(\" - Desc: %s\\n\", mile_desc)\n\t}\n\n}", "func printResults(body []byte) {\n\tvar i Issues\n\terr := json.Unmarshal(body, &i)\n\tif err != nil {\n\t\tfmt.Println(\"[ERROR] Cannot unmarshal data. %s\", err)\n\t}\n\tdata := [][]string{}\n\tfor _, value := range i.Items {\n\t\tif value.Score >= 0.500 {\n\t\t\tscore := strconv.FormatFloat(value.Score, 'f', 4, 32)\n\t\t\tissueValue := []string{value.Title, value.State, value.HtmlUrl, score}\n\t\t\tdata = append(data, issueValue)\n\t\t}\n\t}\n\t// Creating table for stdout.\n\ttable := tablewriter.NewWriter(os.Stdout)\n\ttable.SetHeader([]string{\"Title\", \"State\", \"URL\", \"Search score\"})\n\n\tfor _, v := range data {\n\t\ttable.Append(v)\n\t}\n\ttable.SetRowLine(true)\n\ttotal := strconv.Itoa(i.TotalCount)\n\ttable.SetFooter([]string{\"\", \"\", \"Found total:\", total})\n\ttable.Render()\n}", "func (p *ReminderPlugin) Stats(bot *bruxism.Bot, service bruxism.Service, message bruxism.Message) []string {\n\treturn []string{fmt.Sprintf(\"Reminders: \\t%s\\n\", humanize.Comma(int64(p.TotalReminders)))}\n}", "func Report(stat Textstat) error {\r\n stat.CharactersCount()\r\n stat.HistogramOfWords()\r\n stat.TheTopTen()\r\n \r\n \treturn print(report{\r\n\t\tTotalWords: stat.TotalWords(),\r\n\t\tUniqueWords: stat.UniqueWords(),\r\n\t\tAverageWordLength: stat.AverageWordLength(),\r\n ListOfWords: strings.Join(stat.ListOfWords(),\",\"),\r\n\t\t\r\n\t})\r\n}", "func templateHTML(releases []models.HelmRelease, w io.Writer) error {\n\n\tsum := internalSummery{\n\t\tOutdatedReleases: make(map[string][]uiHelmRelease),\n\t\tDeprecatedReleases: make(map[string][]uiHelmRelease),\n\t\tGoodReleases: make(map[string][]uiHelmRelease),\n\t}\n\n\tfor _, c := range releases {\n\t\tuiC := uiHelmRelease{\n\t\t\tName: c.Name,\n\t\t\tNamespace: c.Namespace,\n\t\t\tDeprecated: c.Deprecated,\n\t\t\tInstalledVersion: c.InstalledVersion,\n\t\t\tLatestVersion: c.LatestVersion,\n\t\t\tOutdated: c.InstalledVersion != c.LatestVersion,\n\t\t}\n\n\t\tif uiC.Deprecated {\n\t\t\tsum.DeprecatedReleases[uiC.Namespace] = append(sum.DeprecatedReleases[uiC.Namespace], uiC)\n\t\t} else if uiC.Outdated {\n\t\t\tsum.OutdatedReleases[uiC.Namespace] = append(sum.OutdatedReleases[uiC.Namespace], uiC)\n\t\t} else {\n\t\t\tsum.GoodReleases[uiC.Namespace] = append(sum.GoodReleases[uiC.Namespace], uiC)\n\t\t}\n\t}\n\n\tfor i, v := range sum.DeprecatedReleases {\n\t\tsort.Sort(ByName(v))\n\t\tsum.DeprecatedReleases[i] = v\n\t}\n\n\tfor i, v := range sum.OutdatedReleases {\n\t\tsort.Sort(ByName(v))\n\t\tsum.OutdatedReleases[i] = v\n\t}\n\n\tfor i, v := range sum.GoodReleases {\n\t\tsort.Sort(ByName(v))\n\t\tsum.GoodReleases[i] = v\n\t}\n\n\tt := template.Must(template.New(\"index.html\").Funcs(getFunctions()).ParseFS(views, \"views/*\"))\n\terr := t.Execute(w, sum)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func Table(nextSlide func()) (title string, info string, content cview.Primitive) {\n\ttable := cview.NewTable()\n\ttable.SetFixed(1, 1)\n\tfor row, line := range strings.Split(tableData, \"\\n\") {\n\t\tfor column, cell := range strings.Split(line, \"|\") {\n\t\t\tcolor := cview.Styles.PrimaryTextColor\n\t\t\tif row == 0 {\n\t\t\t\tcolor = cview.Styles.SecondaryTextColor\n\t\t\t} else if column == 0 {\n\t\t\t\tcolor = cview.Styles.TertiaryTextColor\n\t\t\t}\n\t\t\talign := cview.AlignLeft\n\t\t\tif row == 0 {\n\t\t\t\talign = cview.AlignCenter\n\t\t\t} else if column == 0 || column >= 4 {\n\t\t\t\talign = cview.AlignRight\n\t\t\t}\n\t\t\ttableCell := cview.NewTableCell(cell)\n\t\t\ttableCell.SetTextColor(color)\n\t\t\ttableCell.SetAlign(align)\n\t\t\ttableCell.SetSelectable(row != 0 && column != 0)\n\t\t\tif column >= 1 && column <= 3 {\n\t\t\t\ttableCell.SetExpansion(1)\n\t\t\t}\n\t\t\ttable.SetCell(row, column, tableCell)\n\t\t}\n\t}\n\ttable.SetBorder(true)\n\ttable.SetTitle(\"Table\")\n\n\tcode := cview.NewTextView()\n\tcode.SetWrap(false)\n\tcode.SetDynamicColors(true)\n\tcode.SetPadding(1, 1, 2, 0)\n\n\tlist := cview.NewList()\n\n\tbasic := func() {\n\t\ttable.SetBorders(false)\n\t\ttable.SetSelectable(false, false)\n\t\ttable.SetSeparator(' ')\n\t\tcode.Clear()\n\t\tfmt.Fprint(code, tableBasic)\n\t}\n\n\tseparator := func() {\n\t\ttable.SetBorders(false)\n\t\ttable.SetSelectable(false, false)\n\t\ttable.SetSeparator(cview.Borders.Vertical)\n\t\tcode.Clear()\n\t\tfmt.Fprint(code, tableSeparator)\n\t}\n\n\tborders := func() {\n\t\ttable.SetBorders(true)\n\t\ttable.SetSelectable(false, false)\n\t\tcode.Clear()\n\t\tfmt.Fprint(code, tableBorders)\n\t}\n\n\tselectRow := func() {\n\t\ttable.SetBorders(false)\n\t\ttable.SetSelectable(true, false)\n\t\ttable.SetSeparator(' ')\n\t\tcode.Clear()\n\t\tfmt.Fprint(code, tableSelectRow)\n\t}\n\n\tselectColumn := func() {\n\t\ttable.SetBorders(false)\n\t\ttable.SetSelectable(false, true)\n\t\ttable.SetSeparator(' ')\n\t\tcode.Clear()\n\t\tfmt.Fprint(code, tableSelectColumn)\n\t}\n\n\tselectCell := func() {\n\t\ttable.SetBorders(false)\n\t\ttable.SetSelectable(true, true)\n\t\ttable.SetSeparator(' ')\n\t\tcode.Clear()\n\t\tfmt.Fprint(code, tableSelectCell)\n\t}\n\n\tnavigate := func() {\n\t\tapp.SetFocus(table)\n\t\ttable.SetDoneFunc(func(key tcell.Key) {\n\t\t\tapp.SetFocus(list)\n\t\t})\n\t\ttable.SetSelectedFunc(func(row int, column int) {\n\t\t\tapp.SetFocus(list)\n\t\t})\n\t}\n\n\tlist.ShowSecondaryText(false)\n\tlist.SetPadding(1, 1, 2, 2)\n\n\tvar demoTableText = []struct {\n\t\ttext string\n\t\tshortcut rune\n\t\tselected func()\n\t}{\n\t\t{\"Basic table\", 'b', basic},\n\t\t{\"Table with separator\", 's', separator},\n\t\t{\"Table with borders\", 'o', borders},\n\t\t{\"Selectable rows\", 'r', selectRow},\n\t\t{\"Selectable columns\", 'c', selectColumn},\n\t\t{\"Selectable cells\", 'l', selectCell},\n\t\t{\"Navigate\", 'n', navigate},\n\t\t{\"Next slide\", 'x', nextSlide},\n\t}\n\n\tfor _, tableText := range demoTableText {\n\t\titem := cview.NewListItem(tableText.text)\n\t\titem.SetShortcut(tableText.shortcut)\n\t\titem.SetSelectedFunc(tableText.selected)\n\t\tlist.AddItem(item)\n\t}\n\n\tbasic()\n\n\tsubFlex := cview.NewFlex()\n\tsubFlex.SetDirection(cview.FlexRow)\n\tsubFlex.AddItem(list, 10, 1, true)\n\tsubFlex.AddItem(table, 0, 1, false)\n\n\tflex := cview.NewFlex()\n\tflex.AddItem(subFlex, 0, 1, true)\n\tflex.AddItem(code, codeWidth, 1, false)\n\n\treturn \"Table\", \"\", flex\n}", "func descriptionContents(shuffledData *ClipJSON) string {\n\tcontents := `\\n\\n` // Start with new line to seperate message at top\n\tcurrentTime := 0\n\n\tfor _, clip := range shuffledData.Clips {\n\t\tcontents += fmt.Sprintf(\"Title: %s\\nVod: %s\\nTime: %s\\n\\n\", clip.Title, clip.Vod.URL, youtubeTimify(currentTime))\n\t\t// Convert clip.Duration to milliseconds, then round in to the nearest millisecond\n\t\tcurrentTime += int(math.Floor(clip.Duration + 0.5))\n\t}\n\n\treturn contents\n}", "func AssignmentTable(assignments []models.Assignment) *simpletable.Table {\n\n\ttable := simpletable.New()\n\ttable.Header = assignmentHeader()\n\n\thusdTotal, _ := eos.NewAssetFromString(\"0.00 HUSD\")\n\thvoiceTotal, _ := eos.NewAssetFromString(\"0.00 HVOICE\")\n\thyphaTotal, _ := eos.NewAssetFromString(\"0.00 HYPHA\")\n\tseedsLiquidTotal, _ := eos.NewAssetFromString(\"0.0000 SEEDS\")\n\tseedsEscrowTotal, _ := eos.NewAssetFromString(\"0.0000 SEEDS\")\n\n\tfor index := range assignments {\n\n\t\tif assignments[index].HusdPerPhase.Symbol.Symbol == \"USD\" {\n\t\t\tassignments[index].HusdPerPhase.Symbol.Symbol = \"HUSD\"\n\t\t}\n\t\thusdTotal = husdTotal.Add(assignments[index].HusdPerPhase)\n\t\thyphaTotal = hyphaTotal.Add(assignments[index].HyphaPerPhase)\n\t\thvoiceTotal = hvoiceTotal.Add(assignments[index].HvoicePerPhase)\n\t\tseedsLiquidTotal = seedsLiquidTotal.Add(assignments[index].SeedsLiquidPerPhase)\n\t\tseedsEscrowTotal = seedsEscrowTotal.Add(assignments[index].SeedsEscrowPerPhase)\n\n\t\tr := []*simpletable.Cell{\n\t\t\t{Align: simpletable.AlignCenter, Text: strconv.Itoa(int(assignments[index].ID))},\n\t\t\t{Align: simpletable.AlignRight, Text: string(assignments[index].Assigned)},\n\t\t\t{Align: simpletable.AlignLeft, Text: string(assignments[index].Role.Title)},\n\t\t\t{Align: simpletable.AlignRight, Text: util.FormatAsset(&assignments[index].Role.AnnualUSDSalary, 0)},\n\t\t\t{Align: simpletable.AlignRight, Text: strconv.FormatFloat(assignments[index].TimeShare*100, 'f', -1, 64)},\n\t\t\t{Align: simpletable.AlignRight, Text: strconv.FormatFloat(assignments[index].DeferredPay*100, 'f', 0, 64)},\n\t\t\t{Align: simpletable.AlignRight, Text: strconv.FormatFloat(assignments[index].InstantHusdPerc*100, 'f', -1, 64)},\n\t\t\t{Align: simpletable.AlignRight, Text: util.FormatAsset(&assignments[index].HusdPerPhase, 0)},\n\t\t\t{Align: simpletable.AlignRight, Text: util.FormatAsset(&assignments[index].HyphaPerPhase, 0)},\n\t\t\t{Align: simpletable.AlignRight, Text: util.FormatAsset(&assignments[index].HvoicePerPhase, 0)},\n\t\t\t{Align: simpletable.AlignRight, Text: util.FormatAsset(&assignments[index].SeedsEscrowPerPhase, 0)},\n\t\t\t{Align: simpletable.AlignRight, Text: util.FormatAsset(&assignments[index].SeedsLiquidPerPhase, 0)},\n\t\t\t{Align: simpletable.AlignRight, Text: assignments[index].StartPeriod.StartTime.Time.Format(\"2006 Jan 02\")},\n\t\t\t{Align: simpletable.AlignRight, Text: assignments[index].EndPeriod.EndTime.Time.Format(\"2006 Jan 02\")},\n\t\t\t{Align: simpletable.AlignRight, Text: string(assignments[index].BallotName)[10:]},\n\t\t}\n\t\ttable.Body.Cells = append(table.Body.Cells, r)\n\t}\n\n\ttable.Footer = &simpletable.Footer{\n\t\tCells: []*simpletable.Cell{\n\t\t\t{},\n\t\t\t{},\n\t\t\t{}, {}, {}, {},\n\t\t\t{Align: simpletable.AlignRight, Text: \"Subtotal\"},\n\t\t\t{Align: simpletable.AlignRight, Text: util.FormatAsset(&husdTotal, 0)},\n\t\t\t{Align: simpletable.AlignRight, Text: util.FormatAsset(&hyphaTotal, 0)},\n\t\t\t{Align: simpletable.AlignRight, Text: util.FormatAsset(&hvoiceTotal, 0)},\n\t\t\t{Align: simpletable.AlignRight, Text: util.FormatAsset(&seedsEscrowTotal, 0)},\n\t\t\t{Align: simpletable.AlignRight, Text: util.FormatAsset(&seedsLiquidTotal, 0)},\n\t\t\t{}, {}, {},\n\t\t},\n\t}\n\n\treturn table\n}", "func renderTable(v *gocui.View, columns []string, resultSet [][]string) {\n\ttable := tablewriter.NewWriter(v)\n\ttable.SetBorders(tablewriter.Border{Left: true, Top: false, Right: true, Bottom: true})\n\ttable.SetHeader(columns)\n\t// Add Bulk Data.\n\ttable.AppendBulk(resultSet)\n\ttable.Render()\n}", "func (r Describe) run(ctx context.Context, out io.Writer, opts describeOptions) error {\n\tkubectl, err := GetK8sClientset(ctx, r.Driver, *r.Driver.Namespace())\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar render string\n\ttable := tablewriter.NewWriter(out)\n\ttable.SetHeader([]string{\"Name\", \"Version\", \"Kind\", \"Results\"})\n\ttable.SetAutoWrapText(false)\n\n\tsort.Sort(*r.Driver.Releases())\n\tfor _, rel := range *r.Driver.Releases() {\n\t\tif opts.Name != \"\" && rel.Name != opts.Name ||\n\t\t\t(!opts.Version.EQ(semver.Version{}) &&\n\t\t\t\t!rel.Version.Equals(opts.Version)) {\n\t\t\tcontinue\n\t\t}\n\n\t\ttables := map[string]*EmbeddedTable{}\n\t\tfor _, manifest := range rel.Manifests {\n\t\t\tif m, ok := manifest.(runtime.Object); ok && opts.Resource != \"\" {\n\t\t\t\tresource := m.GetObjectKind().GroupVersionKind().Kind\n\t\t\t\tif !strings.EqualFold(resource, opts.Resource) {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tswitch manifest := manifest.(type) {\n\t\t\tcase *v1core.Namespace:\n\t\t\t\ttbl, ok := tables[manifest.Kind]\n\t\t\t\tif !ok {\n\t\t\t\t\ttbl = NewEmbeddedTable()\n\t\t\t\t\ttbl.Table.SetHeader([]string{\"\", \"NAME\", \"STATUS\", \"AGE\"})\n\t\t\t\t\ttables[manifest.Kind] = tbl\n\t\t\t\t}\n\n\t\t\t\tresult, err := kubectl.CoreV1().\n\t\t\t\t\tNamespaces().\n\t\t\t\t\tGet(ctx, manifest.Name, v1meta.GetOptions{})\n\t\t\t\tif v1err.IsNotFound(err) {\n\t\t\t\t\ttbl.Table.Append([]string{\"✗\", manifest.Name, \"\"})\n\t\t\t\t\tbreak\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ttbl.Results = append(tbl.Results, result)\n\n\t\t\t\tdiffTime := time.Since(result.ObjectMeta.CreationTimestamp.Time)\n\t\t\t\ttbl.Table.Append([]string{\n\t\t\t\t\t\"✓\",\n\t\t\t\t\tresult.ObjectMeta.Name,\n\t\t\t\t\tstring(result.Status.Phase),\n\t\t\t\t\tfmt.Sprintf(\"%.2fm\", diffTime.Minutes()),\n\t\t\t\t})\n\t\t\tcase *v1core.Pod:\n\t\t\t\ttbl, ok := tables[manifest.Kind]\n\t\t\t\tif !ok {\n\t\t\t\t\ttbl = NewEmbeddedTable()\n\t\t\t\t\ttbl.Table.SetHeader([]string{\"\", \"NAMESPACE\", \"NAME\", \"READY\", \"STATUS\", \"RESTARTS\", \"AGE\"})\n\t\t\t\t\ttables[manifest.Kind] = tbl\n\t\t\t\t}\n\n\t\t\t\tnamespace := FallBackNS(manifest.Namespace, *r.Driver.Namespace())\n\t\t\t\tresult, err := kubectl.CoreV1().\n\t\t\t\t\tPods(namespace).\n\t\t\t\t\tGet(ctx, manifest.Name, v1meta.GetOptions{})\n\t\t\t\tif v1err.IsNotFound(err) {\n\t\t\t\t\ttbl.Table.Append([]string{\"✗\", namespace, manifest.Name, \"\"})\n\t\t\t\t\tbreak\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ttbl.Results = append(tbl.Results, result)\n\n\t\t\t\treadyCount := 0\n\t\t\t\trestartCount := 0\n\t\t\t\tfor _, stat := range result.Status.ContainerStatuses {\n\t\t\t\t\trestartCount += int(stat.RestartCount)\n\t\t\t\t\tif stat.Ready {\n\t\t\t\t\t\treadyCount++\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tdiffTime := time.Since(result.ObjectMeta.CreationTimestamp.Time)\n\t\t\t\ttbl.Table.Append([]string{\n\t\t\t\t\t\"✓\",\n\t\t\t\t\tresult.ObjectMeta.Namespace,\n\t\t\t\t\tresult.ObjectMeta.Name,\n\t\t\t\t\tfmt.Sprintf(\"%d/%d\", readyCount, len(result.Status.ContainerStatuses)),\n\t\t\t\t\tstring(result.Status.Phase),\n\t\t\t\t\tfmt.Sprintf(\"%d\", restartCount),\n\t\t\t\t\tfmt.Sprintf(\"%.2fm\", diffTime.Minutes()),\n\t\t\t\t})\n\t\t\tcase *v1core.ServiceAccount:\n\t\t\t\ttbl, ok := tables[manifest.Kind]\n\t\t\t\tif !ok {\n\t\t\t\t\ttbl = NewEmbeddedTable()\n\t\t\t\t\ttbl.Table.SetHeader([]string{\"\", \"NAMESPACE\", \"NAME\", \"SECRETS\", \"AGE\"})\n\t\t\t\t\ttables[manifest.Kind] = tbl\n\t\t\t\t}\n\n\t\t\t\tnamespace := FallBackNS(manifest.Namespace, *r.Driver.Namespace())\n\t\t\t\tresult, err := kubectl.CoreV1().\n\t\t\t\t\tServiceAccounts(namespace).\n\t\t\t\t\tGet(ctx, manifest.Name, v1meta.GetOptions{})\n\t\t\t\tif v1err.IsNotFound(err) {\n\t\t\t\t\ttbl.Table.Append([]string{\"✗\", namespace, manifest.Name, \"\"})\n\t\t\t\t\tbreak\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ttbl.Results = append(tbl.Results, result)\n\n\t\t\t\tdiffTime := time.Since(result.ObjectMeta.CreationTimestamp.Time)\n\t\t\t\ttbl.Table.Append([]string{\n\t\t\t\t\t\"✓\",\n\t\t\t\t\tresult.ObjectMeta.Namespace,\n\t\t\t\t\tresult.ObjectMeta.Name,\n\t\t\t\t\tfmt.Sprintf(\"%d\", len(result.Secrets)),\n\t\t\t\t\tfmt.Sprintf(\"%.2fm\", diffTime.Minutes()),\n\t\t\t\t})\n\t\t\tcase *v1core.ConfigMap:\n\t\t\t\ttbl, ok := tables[manifest.Kind]\n\t\t\t\tif !ok {\n\t\t\t\t\ttbl = NewEmbeddedTable()\n\t\t\t\t\ttbl.Table.SetHeader([]string{\"\", \"NAMESPACE\", \"NAME\", \"DATA\", \"AGE\"})\n\t\t\t\t\ttables[manifest.Kind] = tbl\n\t\t\t\t}\n\n\t\t\t\tnamespace := FallBackNS(manifest.Namespace, *r.Driver.Namespace())\n\t\t\t\tresult, err := kubectl.CoreV1().\n\t\t\t\t\tConfigMaps(namespace).\n\t\t\t\t\tGet(ctx, manifest.Name, v1meta.GetOptions{})\n\t\t\t\tif v1err.IsNotFound(err) {\n\t\t\t\t\ttbl.Table.Append([]string{\"✗\", namespace, manifest.Name, \"\"})\n\t\t\t\t\tbreak\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ttbl.Results = append(tbl.Results, result)\n\n\t\t\t\tvar rbytes []byte\n\t\t\t\tfor _, data := range result.Data {\n\t\t\t\t\trbytes = append(rbytes, []byte(data)...)\n\t\t\t\t}\n\t\t\t\tfor _, binary := range result.BinaryData {\n\t\t\t\t\trbytes = append(rbytes, binary...)\n\t\t\t\t}\n\n\t\t\t\tdiffTime := time.Since(result.ObjectMeta.CreationTimestamp.Time)\n\t\t\t\ttbl.Table.Append([]string{\n\t\t\t\t\t\"✓\",\n\t\t\t\t\tresult.ObjectMeta.Namespace,\n\t\t\t\t\tresult.ObjectMeta.Name,\n\t\t\t\t\tfmt.Sprintf(\"%dB\", len(rbytes)),\n\t\t\t\t\tfmt.Sprintf(\"%.2fm\", diffTime.Minutes()),\n\t\t\t\t})\n\t\t\tcase *v1core.Endpoints:\n\t\t\t\ttbl, ok := tables[manifest.Kind]\n\t\t\t\tif !ok {\n\t\t\t\t\ttbl = NewEmbeddedTable()\n\t\t\t\t\ttbl.Table.SetHeader([]string{\"\", \"NAMESPACE\", \"NAME\", \"ENDPOINTS\", \"AGE\"})\n\t\t\t\t\ttables[manifest.Kind] = tbl\n\t\t\t\t}\n\n\t\t\t\tnamespace := FallBackNS(manifest.Namespace, *r.Driver.Namespace())\n\t\t\t\tresult, err := kubectl.CoreV1().\n\t\t\t\t\tEndpoints(namespace).\n\t\t\t\t\tGet(ctx, manifest.Name, v1meta.GetOptions{})\n\t\t\t\tif v1err.IsNotFound(err) {\n\t\t\t\t\ttbl.Table.Append([]string{\"✗\", namespace, manifest.Name, \"\"})\n\t\t\t\t\tbreak\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ttbl.Results = append(tbl.Results, result)\n\n\t\t\t\tendpoints := make([]string, 0)\n\t\t\t\tfor _, subset := range result.Subsets {\n\t\t\t\t\tfor _, address := range subset.Addresses {\n\t\t\t\t\t\tfor _, ports := range subset.Ports {\n\t\t\t\t\t\t\tendpoints = append(endpoints, fmt.Sprintf(\"%s:%d\", address.IP, ports.Port))\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tif len(endpoints) > 3 {\n\t\t\t\t\tendpoints = append(endpoints[:3], fmt.Sprintf(\"+ %d more...\", len(endpoints[3:])))\n\t\t\t\t}\n\n\t\t\t\tdiffTime := time.Since(result.ObjectMeta.CreationTimestamp.Time)\n\t\t\t\ttbl.Table.Append([]string{\n\t\t\t\t\t\"✓\",\n\t\t\t\t\tresult.ObjectMeta.Namespace,\n\t\t\t\t\tresult.ObjectMeta.Name,\n\t\t\t\t\tstrings.Join(endpoints, \",\"),\n\t\t\t\t\tfmt.Sprintf(\"%.2fm\", diffTime.Minutes()),\n\t\t\t\t})\n\t\t\tcase *v1core.Service:\n\t\t\t\ttbl, ok := tables[manifest.Kind]\n\t\t\t\tif !ok {\n\t\t\t\t\ttbl = NewEmbeddedTable()\n\t\t\t\t\ttbl.Table.SetHeader([]string{\"\", \"NAMESPACE\", \"NAME\", \"TYPE\", \"CLUSTER-IP\", \"EXTERNAL-IP\", \"PORT(s)\", \"AGE\"})\n\t\t\t\t\ttables[manifest.Kind] = tbl\n\t\t\t\t}\n\n\t\t\t\tnamespace := FallBackNS(manifest.Namespace, *r.Driver.Namespace())\n\t\t\t\tresult, err := kubectl.CoreV1().\n\t\t\t\t\tServices(namespace).\n\t\t\t\t\tGet(ctx, manifest.Name, v1meta.GetOptions{})\n\t\t\t\tif v1err.IsNotFound(err) {\n\t\t\t\t\ttbl.Table.Append([]string{\"✗\", namespace, manifest.Name, \"\"})\n\t\t\t\t\tbreak\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ttbl.Results = append(tbl.Results, result)\n\n\t\t\t\texternalIP := \"<none>\"\n\t\t\t\tif len(result.Status.LoadBalancer.Ingress) > 0 {\n\t\t\t\t\texternalIP = result.Status.LoadBalancer.Ingress[0].IP\n\t\t\t\t}\n\n\t\t\t\tvar ports []string\n\t\t\t\tfor _, port := range result.Spec.Ports {\n\t\t\t\t\tportStr := fmt.Sprintf(\"%d\", port.Port)\n\t\t\t\t\tif port.NodePort != 0 {\n\t\t\t\t\t\tportStr += fmt.Sprintf(\":%d\", port.NodePort)\n\t\t\t\t\t}\n\t\t\t\t\tportStr += \"/\" + string(port.Protocol)\n\t\t\t\t\tports = append(ports, portStr)\n\t\t\t\t}\n\n\t\t\t\tdiffTime := time.Since(result.ObjectMeta.CreationTimestamp.Time)\n\t\t\t\ttbl.Table.Append([]string{\n\t\t\t\t\t\"✓\",\n\t\t\t\t\tresult.ObjectMeta.Namespace,\n\t\t\t\t\tresult.ObjectMeta.Name,\n\t\t\t\t\tstring(result.Spec.Type),\n\t\t\t\t\tresult.Spec.ClusterIP,\n\t\t\t\t\texternalIP,\n\t\t\t\t\tstrings.Join(ports, \",\"),\n\t\t\t\t\tfmt.Sprintf(\"%.2fm\", diffTime.Minutes()),\n\t\t\t\t})\n\t\t\tcase *v1core.Secret:\n\t\t\t\ttbl, ok := tables[manifest.Kind]\n\t\t\t\tif !ok {\n\t\t\t\t\ttbl = NewEmbeddedTable()\n\t\t\t\t\ttbl.Table.SetHeader([]string{\"\", \"NAMESPACE\", \"NAME\", \"TYPE\", \"DATA\", \"AGE\"})\n\t\t\t\t\ttables[manifest.Kind] = tbl\n\t\t\t\t}\n\n\t\t\t\tnamespace := FallBackNS(manifest.Namespace, *r.Driver.Namespace())\n\t\t\t\tresult, err := kubectl.CoreV1().\n\t\t\t\t\tSecrets(namespace).\n\t\t\t\t\tGet(ctx, manifest.Name, v1meta.GetOptions{})\n\t\t\t\tif v1err.IsNotFound(err) {\n\t\t\t\t\ttbl.Table.Append([]string{\"✗\", namespace, manifest.Name, \"\"})\n\t\t\t\t\tbreak\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ttbl.Results = append(tbl.Results, result)\n\n\t\t\t\tvar rbytes []byte\n\t\t\t\tfor _, data := range result.StringData {\n\t\t\t\t\trbytes = append(rbytes, []byte(data)...)\n\t\t\t\t}\n\t\t\t\tfor _, binary := range result.Data {\n\t\t\t\t\trbytes = append(rbytes, binary...)\n\t\t\t\t}\n\n\t\t\t\tdiffTime := time.Since(result.ObjectMeta.CreationTimestamp.Time)\n\t\t\t\ttbl.Table.Append([]string{\n\t\t\t\t\t\"✓\",\n\t\t\t\t\tresult.ObjectMeta.Namespace,\n\t\t\t\t\tresult.ObjectMeta.Name,\n\t\t\t\t\tstring(result.Type),\n\t\t\t\t\tfmt.Sprintf(\"%dB\", len(rbytes)),\n\t\t\t\t\tfmt.Sprintf(\"%.2fm\", diffTime.Minutes()),\n\t\t\t\t})\n\t\t\tcase *v1rbac.Role:\n\t\t\t\ttbl, ok := tables[manifest.Kind]\n\t\t\t\tif !ok {\n\t\t\t\t\ttbl = NewEmbeddedTable()\n\t\t\t\t\ttbl.Table.SetHeader([]string{\"\", \"NAMESPACE\", \"NAME\", \"AGE\"})\n\t\t\t\t\ttables[manifest.Kind] = tbl\n\t\t\t\t}\n\n\t\t\t\tnamespace := FallBackNS(manifest.Namespace, *r.Driver.Namespace())\n\t\t\t\tresult, err := kubectl.RbacV1().\n\t\t\t\t\tRoles(namespace).\n\t\t\t\t\tGet(ctx, manifest.Name, v1meta.GetOptions{})\n\t\t\t\tif v1err.IsNotFound(err) {\n\t\t\t\t\ttbl.Table.Append([]string{\"✗\", namespace, manifest.Name, \"\"})\n\t\t\t\t\tbreak\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ttbl.Results = append(tbl.Results, result)\n\n\t\t\t\tdiffTime := time.Since(result.ObjectMeta.CreationTimestamp.Time)\n\t\t\t\ttbl.Table.Append([]string{\n\t\t\t\t\t\"✓\",\n\t\t\t\t\tresult.ObjectMeta.Namespace,\n\t\t\t\t\tresult.ObjectMeta.Name,\n\t\t\t\t\tfmt.Sprintf(\"%.2fm\", diffTime.Minutes()),\n\t\t\t\t})\n\t\t\tcase *v1rbac.RoleBinding:\n\t\t\t\ttbl, ok := tables[manifest.Kind]\n\t\t\t\tif !ok {\n\t\t\t\t\ttbl = NewEmbeddedTable()\n\t\t\t\t\ttbl.Table.SetHeader([]string{\"\", \"NAMESPACE\", \"NAME\", \"AGE\"})\n\t\t\t\t\ttables[manifest.Kind] = tbl\n\t\t\t\t}\n\n\t\t\t\tnamespace := FallBackNS(manifest.Namespace, *r.Driver.Namespace())\n\t\t\t\tresult, err := kubectl.RbacV1().\n\t\t\t\t\tRoleBindings(namespace).\n\t\t\t\t\tGet(ctx, manifest.Name, v1meta.GetOptions{})\n\t\t\t\tif v1err.IsNotFound(err) {\n\t\t\t\t\ttbl.Table.Append([]string{\"✗\", namespace, manifest.Name, \"\"})\n\t\t\t\t\tbreak\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ttbl.Results = append(tbl.Results, result)\n\n\t\t\t\tdiffTime := time.Since(result.ObjectMeta.CreationTimestamp.Time)\n\t\t\t\ttbl.Table.Append([]string{\n\t\t\t\t\t\"✓\",\n\t\t\t\t\tresult.ObjectMeta.Namespace,\n\t\t\t\t\tresult.ObjectMeta.Name,\n\t\t\t\t\tfmt.Sprintf(\"%.2fm\", diffTime.Minutes()),\n\t\t\t\t})\n\t\t\tcase *v1rbac.ClusterRole:\n\t\t\t\ttbl, ok := tables[manifest.Kind]\n\t\t\t\tif !ok {\n\t\t\t\t\ttbl = NewEmbeddedTable()\n\t\t\t\t\ttbl.Table.SetHeader([]string{\"\", \"NAME\", \"AGE\"})\n\t\t\t\t\ttables[manifest.Kind] = tbl\n\t\t\t\t}\n\n\t\t\t\tresult, err := kubectl.RbacV1().\n\t\t\t\t\tClusterRoles().\n\t\t\t\t\tGet(ctx, manifest.Name, v1meta.GetOptions{})\n\t\t\t\tif v1err.IsNotFound(err) {\n\t\t\t\t\ttbl.Table.Append([]string{\"✗\", manifest.Name, \"\"})\n\t\t\t\t\tbreak\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ttbl.Results = append(tbl.Results, result)\n\n\t\t\t\tdiffTime := time.Since(result.ObjectMeta.CreationTimestamp.Time)\n\t\t\t\ttbl.Table.Append([]string{\n\t\t\t\t\t\"✓\",\n\t\t\t\t\tresult.ObjectMeta.Name,\n\t\t\t\t\tfmt.Sprintf(\"%.2fm\", diffTime.Minutes()),\n\t\t\t\t})\n\t\t\tcase *v1rbac.ClusterRoleBinding:\n\t\t\t\ttbl, ok := tables[manifest.Kind]\n\t\t\t\tif !ok {\n\t\t\t\t\ttbl = NewEmbeddedTable()\n\t\t\t\t\ttbl.Table.SetHeader([]string{\"\", \"NAME\", \"AGE\"})\n\t\t\t\t\ttables[manifest.Kind] = tbl\n\t\t\t\t}\n\n\t\t\t\tresult, err := kubectl.RbacV1().\n\t\t\t\t\tClusterRoleBindings().\n\t\t\t\t\tGet(ctx, manifest.Name, v1meta.GetOptions{})\n\t\t\t\tif v1err.IsNotFound(err) {\n\t\t\t\t\ttbl.Table.Append([]string{\"✗\", manifest.Name, \"\"})\n\t\t\t\t\tbreak\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ttbl.Results = append(tbl.Results, result)\n\n\t\t\t\tdiffTime := time.Since(result.ObjectMeta.CreationTimestamp.Time)\n\t\t\t\ttbl.Table.Append([]string{\n\t\t\t\t\t\"✓\",\n\t\t\t\t\tresult.ObjectMeta.Name,\n\t\t\t\t\tfmt.Sprintf(\"%.2fm\", diffTime.Minutes()),\n\t\t\t\t})\n\t\t\tcase *v1policy.PodSecurityPolicy:\n\t\t\t\ttbl, ok := tables[manifest.Kind]\n\t\t\t\tif !ok {\n\t\t\t\t\ttbl = NewEmbeddedTable()\n\t\t\t\t\ttbl.Table.SetHeader([]string{\"\", \"NAME\", \"PRIV\", \"CAPS\", \"VOLUMES\"})\n\t\t\t\t\ttables[manifest.Kind] = tbl\n\t\t\t\t}\n\n\t\t\t\tresult, err := kubectl.PolicyV1beta1().\n\t\t\t\t\tPodSecurityPolicies().\n\t\t\t\t\tGet(ctx, manifest.Name, v1meta.GetOptions{})\n\t\t\t\tif v1err.IsNotFound(err) {\n\t\t\t\t\ttbl.Table.Append([]string{\"✗\", manifest.Name, \"\"})\n\t\t\t\t\tbreak\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ttbl.Results = append(tbl.Results, result)\n\n\t\t\t\tvar caps []string\n\t\t\t\tfor _, capability := range result.Spec.AllowedCapabilities {\n\t\t\t\t\tcaps = append(caps, string(capability))\n\t\t\t\t}\n\n\t\t\t\tvar volumes []string\n\t\t\t\tfor _, volume := range result.Spec.Volumes {\n\t\t\t\t\tvolumes = append(volumes, string(volume))\n\t\t\t\t}\n\n\t\t\t\tdiffTime := time.Since(result.ObjectMeta.CreationTimestamp.Time)\n\t\t\t\ttbl.Table.Append([]string{\n\t\t\t\t\t\"✓\",\n\t\t\t\t\tresult.ObjectMeta.Name,\n\t\t\t\t\tstrconv.FormatBool(result.Spec.Privileged),\n\t\t\t\t\tstrings.Join(caps, \",\"),\n\t\t\t\t\tstrings.Join(volumes, \",\"),\n\t\t\t\t\tfmt.Sprintf(\"%.2fm\", diffTime.Minutes()),\n\t\t\t\t})\n\t\t\tcase *v1apps.DaemonSet:\n\t\t\t\ttbl, ok := tables[manifest.Kind]\n\t\t\t\tif !ok {\n\t\t\t\t\ttbl = NewEmbeddedTable()\n\t\t\t\t\ttbl.Table.SetHeader([]string{\"\", \"NAMESPACE\", \"NAME\", \"DESIRED\", \"CURRENT\", \"READY\", \"UP-TO-DATE\", \"AVAILABLE\", \"AGE\"})\n\t\t\t\t\ttables[manifest.Kind] = tbl\n\t\t\t\t}\n\n\t\t\t\tnamespace := FallBackNS(manifest.Namespace, *r.Driver.Namespace())\n\t\t\t\tresult, err := kubectl.AppsV1().\n\t\t\t\t\tDaemonSets(namespace).\n\t\t\t\t\tGet(ctx, manifest.Name, v1meta.GetOptions{})\n\t\t\t\tif v1err.IsNotFound(err) {\n\t\t\t\t\ttbl.Table.Append([]string{\"✗\", namespace, manifest.Name, \"\"})\n\t\t\t\t\tbreak\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ttbl.Results = append(tbl.Results, result)\n\n\t\t\t\tdiffTime := time.Since(result.ObjectMeta.CreationTimestamp.Time)\n\t\t\t\ttbl.Table.Append([]string{\n\t\t\t\t\t\"✓\",\n\t\t\t\t\tresult.ObjectMeta.Namespace,\n\t\t\t\t\tresult.ObjectMeta.Name,\n\t\t\t\t\tfmt.Sprintf(\"%d\", result.Status.DesiredNumberScheduled),\n\t\t\t\t\tfmt.Sprintf(\"%d\", result.Status.CurrentNumberScheduled),\n\t\t\t\t\tfmt.Sprintf(\"%d\", result.Status.NumberReady),\n\t\t\t\t\tfmt.Sprintf(\"%d\", result.Status.UpdatedNumberScheduled),\n\t\t\t\t\tfmt.Sprintf(\"%d\", result.Status.NumberAvailable),\n\t\t\t\t\tfmt.Sprintf(\"%.2fm\", diffTime.Minutes()),\n\t\t\t\t})\n\t\t\tcase *v1apps.Deployment:\n\t\t\t\ttbl, ok := tables[manifest.Kind]\n\t\t\t\tif !ok {\n\t\t\t\t\ttbl = NewEmbeddedTable()\n\t\t\t\t\ttbl.Table.SetHeader([]string{\"\", \"NAMESPACE\", \"NAME\", \"READY\", \"STATUS\", \"RESTARTS\", \"AGE\"})\n\t\t\t\t\ttables[manifest.Kind] = tbl\n\t\t\t\t}\n\n\t\t\t\tnamespace := FallBackNS(manifest.Namespace, *r.Driver.Namespace())\n\t\t\t\tresult, err := kubectl.AppsV1().\n\t\t\t\t\tDeployments(namespace).\n\t\t\t\t\tGet(ctx, manifest.Name, v1meta.GetOptions{})\n\t\t\t\tif v1err.IsNotFound(err) {\n\t\t\t\t\ttbl.Table.Append([]string{\"✗\", namespace, manifest.Name, \"\"})\n\t\t\t\t\tbreak\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ttbl.Results = append(tbl.Results, result)\n\n\t\t\t\tdiffTime := time.Since(result.ObjectMeta.CreationTimestamp.Time)\n\t\t\t\ttbl.Table.Append([]string{\n\t\t\t\t\t\"✓\",\n\t\t\t\t\tresult.ObjectMeta.Namespace,\n\t\t\t\t\tresult.ObjectMeta.Name,\n\t\t\t\t\tfmt.Sprintf(\"%d/%d\", result.Status.ReadyReplicas, result.Status.Replicas),\n\t\t\t\t\tfmt.Sprintf(\"%d\", result.Status.UpdatedReplicas),\n\t\t\t\t\tfmt.Sprintf(\"%d\", result.Status.AvailableReplicas),\n\t\t\t\t\tfmt.Sprintf(\"%.2fm\", diffTime.Minutes()),\n\t\t\t\t})\n\t\t\tcase *v1apps.StatefulSet:\n\t\t\t\ttbl, ok := tables[manifest.Kind]\n\t\t\t\tif !ok {\n\t\t\t\t\ttbl = NewEmbeddedTable()\n\t\t\t\t\ttbl.Table.SetHeader([]string{\"\", \"NAMESPACE\", \"NAME\", \"DESIRED\", \"CURRENT\", \"AGE\"})\n\t\t\t\t\ttables[manifest.Kind] = tbl\n\t\t\t\t}\n\n\t\t\t\tnamespace := FallBackNS(manifest.Namespace, *r.Driver.Namespace())\n\t\t\t\tresult, err := kubectl.AppsV1().\n\t\t\t\t\tStatefulSets(namespace).\n\t\t\t\t\tGet(ctx, manifest.Name, v1meta.GetOptions{})\n\t\t\t\tif v1err.IsNotFound(err) {\n\t\t\t\t\ttbl.Table.Append([]string{\"✗\", namespace, manifest.Name, \"\"})\n\t\t\t\t\tbreak\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ttbl.Results = append(tbl.Results, result)\n\n\t\t\t\tdiffTime := time.Since(result.ObjectMeta.CreationTimestamp.Time)\n\t\t\t\ttbl.Table.Append([]string{\n\t\t\t\t\t\"✓\",\n\t\t\t\t\tresult.ObjectMeta.Namespace,\n\t\t\t\t\tresult.ObjectMeta.Name,\n\t\t\t\t\tfmt.Sprintf(\"%d\", result.Status.Replicas),\n\t\t\t\t\tfmt.Sprintf(\"%d\", result.Status.ReadyReplicas),\n\t\t\t\t\tfmt.Sprintf(\"%.2fm\", diffTime.Minutes()),\n\t\t\t\t})\n\t\t\tcase *v1ext.Ingress:\n\t\t\t\ttbl, ok := tables[manifest.Kind]\n\t\t\t\tif !ok {\n\t\t\t\t\ttbl = NewEmbeddedTable()\n\t\t\t\t\ttbl.Table.SetHeader([]string{\"\", \"NAMESPACE\", \"NAME\", \"HOST\", \"PATH\", \"PORT\", \"AGE\"})\n\t\t\t\t\ttables[manifest.Kind] = tbl\n\t\t\t\t}\n\n\t\t\t\tnamespace := FallBackNS(manifest.Namespace, *r.Driver.Namespace())\n\t\t\t\tresult, err := kubectl.ExtensionsV1beta1().\n\t\t\t\t\tIngresses(namespace).\n\t\t\t\t\tGet(ctx, manifest.Name, v1meta.GetOptions{})\n\t\t\t\tif v1err.IsNotFound(err) {\n\t\t\t\t\ttbl.Table.Append([]string{\"✗\", namespace, manifest.Name, \"\"})\n\t\t\t\t\tbreak\n\t\t\t\t} else if err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ttbl.Results = append(tbl.Results, result)\n\n\t\t\t\tdiffTime := time.Since(result.ObjectMeta.CreationTimestamp.Time)\n\t\t\t\tname := result.ObjectMeta.Name\n\t\t\t\tage := fmt.Sprintf(\"%.2fm\", diffTime.Minutes())\n\t\t\t\tcheck := \"✓\"\n\t\t\t\tfor i := range result.Spec.Rules {\n\t\t\t\t\tif i != 0 {\n\t\t\t\t\t\tcheck = \"\"\n\t\t\t\t\t\tnamespace = \"\"\n\t\t\t\t\t\tname = \"\"\n\t\t\t\t\t\tage = \"\"\n\t\t\t\t\t}\n\t\t\t\t\thost := result.Spec.Rules[i].Host\n\t\t\t\t\tfor j := range result.Spec.Rules[i].HTTP.Paths {\n\t\t\t\t\t\tif j != 0 {\n\t\t\t\t\t\t\thost = \"\"\n\t\t\t\t\t\t}\n\t\t\t\t\t\tpath := result.Spec.Rules[i].HTTP.Paths[j].Path\n\t\t\t\t\t\tif path == \"\" {\n\t\t\t\t\t\t\tpath = \"/\"\n\t\t\t\t\t\t}\n\t\t\t\t\t\tport := result.Spec.Rules[i].HTTP.Paths[j].Backend.ServicePort.String()\n\t\t\t\t\t\ttbl.Table.Append([]string{check, namespace, name, host, path, port, age})\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\treturn fmt.Errorf(\"unsupported manifest type %T\", manifest)\n\t\t\t}\n\t\t}\n\n\t\tvar j int\n\t\tfor kind, tbl := range tables {\n\t\t\tif opts.Filter != \"\" {\n\t\t\t\trender, err = FilterResult(map[string]interface{}{\n\t\t\t\t\t\"name\": rel.Name,\n\t\t\t\t\t\"version\": rel.Version,\n\t\t\t\t\t\"kind\": kind,\n\t\t\t\t\t\"results\": tbl.Results,\n\t\t\t\t}, opts.Filter)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\ttbl.Table.Render()\n\t\t\t\tlines := strings.Split(tbl.Buffer.String(), \"\\n\")\n\t\t\t\tif j == 0 {\n\t\t\t\t\tfor k, line := range lines {\n\t\t\t\t\t\tif k == 0 {\n\t\t\t\t\t\t\ttable.Append([]string{\n\t\t\t\t\t\t\t\trel.Name,\n\t\t\t\t\t\t\t\trel.Version.String(),\n\t\t\t\t\t\t\t\tkind,\n\t\t\t\t\t\t\t\tline,\n\t\t\t\t\t\t\t})\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\ttable.Append([]string{\"\", \"\", \"\", line})\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tfor k, line := range lines {\n\t\t\t\t\t\tif k == 0 {\n\t\t\t\t\t\t\ttable.Append([]string{\"\", \"\", kind, line})\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\ttable.Append([]string{\"\", \"\", \"\", line})\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tj++\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(*r.Driver.Releases()) > 0 {\n\t\tif opts.Filter != \"\" {\n\t\t\tfmt.Fprintf(out, \"%s\", render)\n\t\t} else {\n\t\t\ttable.Render()\n\t\t}\n\t}\n\n\treturn nil\n}", "func Stats(font *sfnt.Font) error {\n\tfor _, tag := range font.Tags() {\n\t\ttable, err := font.Table(tag)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tfmt.Printf(\"%6d %q %s\\n\", len(table.Bytes()), tag, table.Name())\n\t}\n\treturn nil\n}", "func printStatHeader(v *gocui.View, s stat.Stat, config *config) error {\n\tvar pname string\n\tfor i := 0; i < s.Result.Ncols; i++ {\n\t\tname := s.Result.Cols[i]\n\n\t\t// mark filtered column\n\t\tif config.view.Filters[i] != nil && config.view.Filters[i].String() != \"\" {\n\t\t\tpname = \"*\" + name\n\t\t} else {\n\t\t\tpname = name\n\t\t}\n\n\t\t// mark ordered column with foreground color\n\t\tif i != config.view.OrderKey {\n\t\t\t_, err := fmt.Fprintf(v, \"\\033[%d;%dm%-*s\\033[0m\", 30, 47, config.view.ColsWidth[i]+2, pname)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\t_, err := fmt.Fprintf(v, \"\\033[%d;%dm%-*s\\033[0m\", 47, 1, config.view.ColsWidth[i]+2, pname)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\t_, err := fmt.Fprintf(v, \"\\n\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (s TableSummarizer) Display(group stevedore.GroupedResponses) {\n\tchangedFilesTable := createTable(s.writer, []string{\"FILENAME\", \"ADDITIONS\", \"MODIFICATIONS\", \"DESTRUCTIONS\"}, false)\n\thelmReleaseTable := createTable(s.writer, []string{\"RELEASE\", \"MANIFEST CHANGES\"}, true)\n\n\tfor _, file := range group.SortedFileNames() {\n\t\tresponses := group[file]\n\t\tfileName := getFormattedFileName(file)\n\t\tresponses.SortByReleaseName()\n\n\t\tfileHasDiff := false\n\t\tadditions := 0\n\t\tmodifications := 0\n\t\tdeletions := 0\n\n\t\tfor _, response := range responses {\n\t\t\tfileHasDiff = fileHasDiff || response.HasDiff\n\n\t\t\tsummary := response.Summary()\n\t\t\tadditions += len(summary.Added)\n\t\t\tmodifications += len(summary.Modified)\n\t\t\tdeletions += len(summary.Destroyed)\n\n\t\t\tif response.HasDiff {\n\t\t\t\treleaseDetail := nocolor(\"%s\\n(%s)\", response.ReleaseName, fileName)\n\t\t\t\thelmReleaseTable.Append(append([]string{releaseDetail}, formatRelease(summary)))\n\t\t\t}\n\t\t}\n\n\t\tif fileHasDiff {\n\t\t\tchangedFilesTable.Append([]string{\n\t\t\t\tfileName,\n\t\t\t\tnocolor(\"%d\", additions),\n\t\t\t\tnocolor(\"%d\", modifications),\n\t\t\t\tnocolor(\"%d\", deletions),\n\t\t\t})\n\t\t}\n\t}\n\n\trenderTable(s.writer, \"Release changes:\", helmReleaseTable)\n\trenderTable(s.writer, \"File changes:\", changedFilesTable)\n\n}", "func (udb *urlDB) statsHandler(w http.ResponseWriter, r *http.Request) {\n\tvar rws []Rows\n\tvar cols = []Columns{\n\t\t{\n\t\t\tLabel: \"X\",\n\t\t\tColumnType: \"date\",\n\t\t},\n\t\t{\n\t\t\tLabel: \"Daily Total\",\n\t\t\tColumnType: \"number\",\n\t\t},\n\t}\n\n\t// Select all records from the database, split the datetime into a date and group by days. Count the number of requests per day.\n\t// This needs to be changed soon to allow a date range, and possibly to also to fill in empty days if they exist.\n\trows, err := udb.db.Query(\"SELECT COUNT(*) as count, t_stamp::DATE as ts FROM url_map GROUP BY ts ORDER BY ts\")\n\tcheckDBErr(err)\n\n\tfor rows.Next() {\n\t\tvar t time.Time\n\t\tvar count int\n\t\terr := rows.Scan(&count, &t)\n\t\tcheckDBErr(err)\n\t\tconst layout = \"Jan 2, 2006\"\n\t\tdate := t.Format(layout)\n\n\t\t// Convert the date into a string for the JS structure: \"Date(YYYY,M,D)\".\n\t\t// Javascript months are zero indexed (stupid) so we must subtract one. Thanks to my lovely wife for catching that bug\n\t\tdatestr := fmt.Sprintf(\"Date(%d,%d,%d)\", t.Year(), t.Month()-1, t.Day())\n\t\tdailytotal := strconv.FormatInt(int64(count), 10)\n\n\t\trws = append(rws, Rows{\n\t\t\tC: []C2{\n\t\t\t\t{\n\t\t\t\t\tV: datestr,\n\t\t\t\t\tF: date,\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tV: dailytotal,\n\t\t\t\t\tF: dailytotal,\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t}\n\n\t// Finish building our data structure\n\tchart := &Charts{Cols: cols, Rws: rws}\n\n\t// Encode into JSON and pass to our stats.html template\n\tcht, _ := json.Marshal(chart)\n\n\t// Build template data structure\n\tp := &Page{\n\t\tTitle: \"Stats\",\n\t\tContent: struct {\n\t\t\tJS interface{}\n\t\t}{\n\t\t\ttemplate.HTML(string(cht)),\n\t\t},\n\t}\n\n\trenderTemplate(w, \"stats\", p)\n}", "func printResults() {\n\n\t// collect stats\n\ttotalLines := 0\n\ttotalCode := 0\n\ttotalComments := 0\n\tfor _, file := range filesStats {\n\t\ttotalLines = totalLines + file.TotalLines\n\t\ttotalCode = totalCode + file.CodeLines\n\t\ttotalComments = totalComments + file.CommentLines\n\t}\n\tfmt.Println(\"Overall stats:\")\n\tfmt.Printf(\" Number of files: %v\\n\", len(filesStats))\n\tfmt.Printf(\" Total lines: %v\\n\", totalLines)\n\tfmt.Printf(\" Code lines: %v\\n\", totalCode)\n\tfmt.Printf(\" Comment lines: %v\\n\", totalComments)\n\n\t// statistics for extensions\n\tif printExts == true {\n\t\t// NOTE: Sadly colprint accepts only slice, not map\n\t\t// thus conversion is needed.\n\t\ts := []*models.ExtensionStats{}\n\t\tfor _, e := range extensionStats {\n\t\t\ts = append(s, e)\n\t\t}\n\t\tfmt.Println(\"\\nStats by extensions\")\n\t\tcolprint.Print(s)\n\t\tfmt.Println()\n\t}\n\n\t// statistics for individual files\n\tif printFiles == true {\n\t\tfmt.Println(\"\\nStats by files:\")\n\t\tcolprint.Print(filesStats)\n\t}\n\tfmt.Println()\n}", "func newRedditStories() []Story {\n\t// Again, we need a buffer to hold stories\n\tvar stories []Story\n\t// First we decide on some options. We want the most recent posts\n\tsort := geddit.PopularitySort(geddit.NewSubmissions)\n\t// and we'll use the default listing options\n\tvar listingOptions geddit.ListingOptions\n\t// Now we can call the Subreddit Submissions method to get the submissions\n\tsubmissions, err := redditSession.SubredditSubmissions(\"programming\", sort, listingOptions)\n\t// In case of an error, we'll print it and return nil\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn nil\n\t}\n\t// Unlike HackerNews, this single network operation will give us all the data we need.\n\tfor _, s := range submissions {\n\t\t// As we did for HackerNews, we'll create new stories and add them\n\t\t// to the list\n\t\tnewStory := Story{\n\t\t\ttitle: s.Title,\n\t\t\turl: s.URL,\n\t\t\tauthor: s.Author,\n\t\t\tsource: \"Reddit /r/programming\",\n\t\t}\n\t\tstories = append(stories, newStory)\n\t}\n\n\t// Then finally we'll return the list\n\treturn stories\n}", "func (r Result) String() string { return r.Title + \"\\n\" }", "func (d *TestDoc) toMarkdown() string {\n\tb := &strings.Builder{}\n\tif d.isSubTest {\n\t\tb.WriteString(\"#### \" + d.name + \"\\n\")\n\t} else {\n\t\tb.WriteString(\"## \" + d.name + \"\\n\")\n\t}\n\n\tb.WriteString(d.description + \"\\n\")\n\tif len(d.steps) > 0 {\n\t\tb.WriteString(\"Steps:\\n\")\n\t\tfor _, s := range d.steps {\n\t\t\tb.WriteString(\"- \" + s + \"\\n\")\n\t\t}\n\t\tb.WriteString(\"\\n\")\n\t}\n\n\tif len(d.specialCases) > 0 {\n\t\tb.WriteString(\"Special cases:\\n\")\n\t\tfor _, s := range d.specialCases {\n\t\t\tb.WriteString(\"- \" + s + \"\\n\")\n\t\t}\n\t\tb.WriteString(\"\\n\")\n\t}\n\n\tif len(d.skips) > 0 {\n\t\tb.WriteString(\"Skips:\\n\")\n\t\tfor _, s := range d.skips {\n\t\t\tb.WriteString(\"- \" + s + \"\\n\")\n\t\t}\n\t\tb.WriteString(\"\\n\")\n\t}\n\treturn b.String()\n}", "func renderStatisticsLayout(uiView View) {\n\tp1 := widgets.NewParagraph()\n\tp1.Title = fmt.Sprintf(\" Statistics : last %v \", uiView.TimeframeRepr[uiView.ActiveTimeframe])\n\tp1.Text = fmt.Sprintf(\"Press s to switch to a %v timeframe.\\n\\n Statistics are loading ...\", uiView.TimeframeRepr[3-uiView.ActiveTimeframe])\n\tp1.TextStyle.Fg = ui.ColorYellow\n\tp1.SetRect(0, 3, 75, 26)\n\tp1.BorderStyle.Fg = ui.ColorCyan\n\n\tp2 := widgets.NewParagraph()\n\tp2.Title = fmt.Sprintf(\" Details %v \", Shorten(uiView.Urls[uiView.ActiveWebsite]))\n\tp2.Text = \"Press a website's id to view details\"\n\tp2.TextStyle.Fg = ui.ColorYellow\n\tp2.SetRect(0, 26, 75, 50)\n\tp2.BorderStyle.Fg = ui.ColorCyan\n\tui.Render(p1, p2)\n}", "func main() {\n// \tfmt.Println(os.Args[0])\n\t// Read the file and dump into the slice of structs\n\tdm := SummaryReport.ReadFile(infile)\n// \tfor _, v := range dm {\n\t\tfmt.Println(*dm[0])\n// \t}\n\t\n// \tCompute number of subjects by treatment group\n\t\t\n// \tTurn values into strings\n\t\t\n// \tCompute number of non-mising Age values by TG\n\t\t\n// \tTurn values into strings\n\t\t\n// \tCompute mean of age by TG and SD by TG\n\t\t\n// \tTurn Mean and SD values into strings\n\t\t\n// \tCompute median values of Age by TG\n\t\t\n// \tTurn median values into strings\n\t\t\n// \tCompute min values of Age by TG\n\t\t\n// \tTurn min values into strings\n\t\t\n// \tCompute max values of Age by TG\n\t\t\n// \tTurn max values into strings\n\t\n// \tNew Report \n\t\n\th := titles()\n\terr := SummaryReport.WriteReport(outfile, h)\n\n\tfmt.Println(err)\n// \t\n// \t\n// \t\n// \tpdf.AddPage()\n// // \tbasicTable()\n// \n// \terr := pdf.OutputFileAndClose(*outputFile)\n// \tfmt.Println(err)\n}", "func (m *stashModel) markdownIndex() int {\n\treturn m.paginator().Page*m.paginator().PerPage + m.cursor()\n}", "func Title(){\n fmt.Printf(\"\\n\\n\\n\\n\\n\")\n\n fmt.Printf(\" ████████╗██╗ ██╗███████╗ ███████╗███████╗██╗ ██╗███████╗██████╗\\n\")\n fmt.Printf(\" ╚══██╔══╝██║ ██║██╔════╝ ██╔════╝██╔════╝██║ ██║██╔════╝██╔══██╗\\n\")\n fmt.Printf(\" ██║ ███████║█████╗ ███████╗█████╗ ██║ █╗ ██║█████╗ ██████╔╝\\n\")\n fmt.Printf(\" ██║ ██╔══██║██╔══╝ ╚════██║██╔══╝ ██║███╗██║██╔══╝ ██╔══██╗\\n\")\n fmt.Printf(\" ██║ ██║ ██║███████╗ ███████║███████╗╚███╔███╔╝███████╗██║ ██║\\n\")\n fmt.Printf(\" ╚═╝ ╚═╝ ╚═╝╚══════╝ ╚══════╝╚══════╝ ╚══╝╚══╝ ╚══════╝╚═╝ ╚═╝\\n\")\n\n\n}", "func work(reader io.Reader, app_data AppData) string {\n content_markdown := ReaderToString(reader)\n content_title := \"\"\n \n //look for an H1 title, break it out for use in the HTML title tag\n first_newline := strings.Index(content_markdown, \"\\n\")\n if first_newline > -1{\n if strings.HasPrefix(content_markdown[0:first_newline], \"# \") {\n content_title = content_markdown[2:first_newline]\n content_markdown = content_markdown[first_newline:]\n }\n }\n\n //get the content\n var content_html string\n if app_data.Markdown {\n content_html = MarkdownToHTML(content_markdown)\n } else {\n content_html = content_markdown\n }\n\n //set up reporting time/date\n now := time.Now()\n formated_date := now.Format(\"2006-01-02 03:04 PM\")\n\n //expose data to template\n data := TemplateData{\n Title: content_title,\n Content: content_html,\n Date: formated_date,\n }\n \n //get template file\n template_file_path := FindTemplate(app_data.Template, app_data.Limit)\n var template_content string\n if template_file_path == \"\" {\n template_content = FILE_TEMPLATE\n } else {\n template_content = readFile(template_file_path)\n }\n \n return render(template_content, data)\n}", "func printRepositoryInfo(i *index.Index) {\n\tfmtutil.Separator(false, \"REPOSITORY INFO\")\n\n\tupdated := timeutil.Format(time.Unix(i.Meta.Created, 0), \"%Y/%m/%d %H:%M:%S\")\n\n\tfmtc.Printf(\" {*}UUID{!}: %s\\n\", i.UUID)\n\tfmtc.Printf(\" {*}Updated{!}: %s\\n\\n\", updated)\n\n\tfor _, distName := range i.Data.Keys() {\n\t\tsize, items := int64(0), 0\n\t\tfor archName, arch := range i.Data[distName] {\n\t\t\tfor _, category := range arch {\n\t\t\t\tfor _, version := range category {\n\t\t\t\t\tsize += version.Size\n\t\t\t\t\titems++\n\n\t\t\t\t\tif len(version.Variations) != 0 {\n\t\t\t\t\t\tfor _, variation := range version.Variations {\n\t\t\t\t\t\t\titems++\n\t\t\t\t\t\t\tsize += variation.Size\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tfmtc.Printf(\n\t\t\t\t\" {c*}%s{!}{c}/%s:{!} %3s {s-}|{!} %s\\n\", distName, archName,\n\t\t\t\tfmtutil.PrettyNum(items), fmtutil.PrettySize(size, \" \"),\n\t\t\t)\n\t\t}\n\t}\n\n\tfmtc.NewLine()\n\tfmtc.Printf(\n\t\t\" {*}Total:{!} %s {s-}|{!} %s\\n\",\n\t\tfmtutil.PrettyNum(i.Meta.Items),\n\t\tfmtutil.PrettySize(i.Meta.Size, \" \"),\n\t)\n\n\tfmtutil.Separator(false)\n}", "func (c *client) PRTitleBody() (string, string, error) {\n\treturn \"Update index.md\", \"\", nil\n}", "func markdownToHTML(s string) string {\n\ts = strings.Replace(s, \"_blank\", \"________\", -1)\n\ts = strings.Replace(s, \"\\\\kh\", \"( )\", -1)\n\ts = strings.Replace(s, \"~\", \" \", -1)\n\tresult := \"\"\n\troot := Parse(s)\n\tfor node := root.FirstChild; node != nil; node = node.NextSibling {\n\t\tif node.Type == NodePara {\n\t\t\tresult += fmt.Sprintf(\"<p> %s </p>\", node.Data)\n\t\t} else if node.Type == NodeImag {\n\t\t\tresult += fmt.Sprintf(\"<p> <img src=\\\"%s\\\" width=\\\"%s\\\" align=\\\"top\\\" /> </p>\", node.Data, node.Attr)\n\t\t} else if node.Type == NodeOl {\n\t\t\tresult += \"<ol>\"\n\t\t\tfor linode := node.FirstChild; linode != nil; linode = linode.NextSibling {\n\t\t\t\tresult += fmt.Sprintf(\"<li %s>\\n\", linode.Attr)\n\t\t\t\tfor p := linode.FirstChild; p != nil; p = p.NextSibling {\n\t\t\t\t\tif p.Type == NodePara {\n\t\t\t\t\t\tresult += fmt.Sprintf(\"<p>%s</p>\", p.Data)\n\t\t\t\t\t} else if p.Type == NodeImag {\n\t\t\t\t\t\tresult += fmt.Sprintf(\"<p> <img src=\\\"%s\\\" width=\\\"%s\\\" align=\\\"top\\\" /> </p>\", p.Data, p.Attr)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tresult += fmt.Sprintf(\"</li>\\n\")\n\t\t\t}\n\t\t\tresult += \"</ol>\"\n\t\t}\n\t}\n\treturn result\n}", "func NewMarkdownTable(settings *print.Settings) print.Engine {\n\titems := readTemplateItems(markdownTableFS, \"markdown_table\")\n\n\ttt := template.New(settings, items...)\n\ttt.CustomFunc(gotemplate.FuncMap{\n\t\t\"type\": func(t string) string {\n\t\t\tinputType, _ := printFencedCodeBlock(t, \"\")\n\t\t\treturn inputType\n\t\t},\n\t\t\"value\": func(v string) string {\n\t\t\tvar result = \"n/a\"\n\t\t\tif v != \"\" {\n\t\t\t\tresult, _ = printFencedCodeBlock(v, \"\")\n\t\t\t}\n\t\t\treturn result\n\t\t},\n\t})\n\treturn &MarkdownTable{\n\t\ttemplate: tt,\n\t\tsettings: settings,\n\t}\n}", "func ShortStats(tokenFile string) {\n\tDashboard(tokenFile)\n\n\tdashboard := jbody.(map[string]interface{})[\"dashboard\"].(map[string]interface{})\n\tdays := dashboard[\"days\"].([]interface{})\n\ttodayName := \"today\"\n\tfor i := 0; i < len(days); i++ {\n\t\tday := days[i].(map[string]interface{})\n\t\tif day[\"is_today\"].(bool) {\n\t\t\ttodayName = day[\"abbr\"].(string)\n\t\t\tbreak\n\t\t}\n\t}\n\ttodaySteps := prettyNumber(dashboard[\"today_steps\"].(float64))\n\ttodayPct := prettyPct(100 * dashboard[\"today_steps\"].(float64) / (dashboard[\"weekly_step_goal\"].(float64) / 7.0))\n\tweekNumber := dashboard[\"week_number\"].(float64)\n\tweekSteps := prettyNumber(dashboard[\"current_steps\"].(float64))\n\tweekPct := prettyPct(dashboard[\"week_full_pct\"].(float64))\n\n\tfmt.Printf(\"H2W - %v: %v (%v%%); week %v: %v (%v%%)\", todayName, todaySteps, todayPct, weekNumber, weekSteps, weekPct)\n}", "func drawTable(w io.Writer, report []URL) {\n\ttable := tablewriter.NewWriter(w)\n\ttable.SetHeader([]string{\"No\", \"URL\", \"Status\"})\n\tfor i, url := range report {\n\t\trow := []string{strconv.Itoa(i + 1), url.Loc, strconv.Itoa(url.StatusCode)}\n\t\ttable.Append(row)\n\t}\n\ttable.Render()\n}", "func RRARTable(ctx context.Context, ri *ReporterInfo) gotable.Table {\n\tconst funcname = \"RRARTable\"\n\tvar (\n\t\terr error\n\t\tbid = ri.Bid\n\t\t// d1 = ri.D1\n\t\t// d2 = ri.D2\n\t)\n\n\t// rlib.Console(\"Entered %s\\n\", funcname)\n\n\tri.RptHeaderD1 = true\n\tri.RptHeaderD2 = true\n\tri.BlankLineAfterRptName = true\n\n\t// initialize table for assessments report\n\ttbl := getRRTable()\n\n\tconst (\n\t\tBUD = 0\n\t\tName = iota\n\t\tARType = iota\n\t\tDebitLID = iota\n\t\tCreditLID = iota\n\t\tAllocated = iota\n\t\tShowOnRA = iota\n\t\tRAIDRequired = iota\n\t\tSubARSpec = iota\n\t\tDescription = iota\n\t)\n\n\ttbl.AddColumn(\"BUD\", 10, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"Name\", 50, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"ARType\", 20, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"Debit\", 35, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"Credit\", 35, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"Allocated\", 5, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"ShowOnRA\", 5, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"RAIDRequired\", 5, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"SubARSpec\", 20, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"Description\", 50, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\n\t// prepare table's title, section1, section2, section3 if there are any error\n\terr = TableReportHeaderBlock(ctx, &tbl, \"Account Rules\", funcname, ri)\n\tif err != nil {\n\t\trlib.LogAndPrintError(funcname, err)\n\t\t// set errors in section3 and return\n\t\ttbl.SetSection3(err.Error())\n\t\treturn tbl\n\t}\n\n\t// rlib.Console(\"%s: bid = %d\\n\", funcname, bid)\n\trlib.Console(\"InitBusinessFields\\n\")\n\tvar b rlib.XBusiness\n\terr = rlib.InitBizInternals(bid, &b)\n\tif err != nil {\n\t\t// set errors in section3 and return\n\t\ttbl.SetSection3(err.Error())\n\t\treturn tbl\n\t}\n\trlib.Console(\"After InitBizInternals, len(rlib.RRdb.BizTypes[%d].AR) = %d\\n\", bid, len(rlib.RRdb.BizTypes[bid].AR))\n\n\t// rlib.Console(\"GetAllARs\\n\")\n\tm, err := rlib.GetAllARs(ctx, bid)\n\tif err != nil {\n\t\t// set errors in section3 and return\n\t\ttbl.SetSection3(err.Error())\n\t\treturn tbl\n\t}\n\n\t// rlib.Console(\"Number of records: %d\\n\", len(m))\n\t// fit records in table row one by one\n\tfor i := 0; i < len(m); i++ {\n\t\t//-------------------\n\t\t// init some indeces\n\t\t//-------------------\n\t\tart := m[i].ARType\n\t\tif art < 0 {\n\t\t\tart = 0\n\t\t}\n\t\tif art > rlib.ARSUBASSESSMENT {\n\t\t\tart = rlib.ARASSESSMENT\n\t\t}\n\t\talloc := int64(0)\n\t\tif m[i].FLAGS&0x1 > 0 {\n\t\t\talloc = 1\n\t\t}\n\t\tshow := int64(0)\n\t\tif m[i].FLAGS&0x2 > 0 {\n\t\t\tshow = 1\n\t\t}\n\t\traidrqd := int64(0)\n\t\tif m[i].FLAGS&0x2 > 0 {\n\t\t\traidrqd = 1\n\t\t}\n\t\tsubar := \"\"\n\t\tfor j := 0; j < len(m[i].SubARs); j++ {\n\t\t\tsubarid := m[i].SubARs[j].ARID\n\t\t\tif subarid > 0 {\n\t\t\t\tif len(subar) > 0 {\n\t\t\t\t\tsubar += \", \"\n\t\t\t\t}\n\t\t\t\tsubar += rlib.RRdb.BizTypes[bid].AR[subarid].Name\n\t\t\t}\n\t\t}\n\n\t\t//-----------------------\n\t\t// Now emit the columns\n\t\t//-----------------------\n\t\ttbl.AddRow()\n\t\ttbl.Puts(-1, BUD, b.P.Designation)\n\t\ttbl.Puts(-1, Name, m[i].Name)\n\t\ttbl.Puts(-1, ARType, rlib.ARTypesList[art])\n\t\ttbl.Puts(-1, DebitLID, rlib.RRdb.BizTypes[bid].GLAccounts[m[i].DebitLID].Name)\n\t\ttbl.Puts(-1, CreditLID, rlib.RRdb.BizTypes[bid].GLAccounts[m[i].CreditLID].Name)\n\t\ttbl.Puts(-1, Allocated, rlib.YesNoToString(alloc))\n\t\ttbl.Puts(-1, ShowOnRA, rlib.YesNoToString(show))\n\t\ttbl.Puts(-1, RAIDRequired, rlib.YesNoToString(raidrqd))\n\t\ttbl.Puts(-1, SubARSpec, subar)\n\t\ttbl.Puts(-1, Description, m[i].Description)\n\t}\n\n\ttbl.TightenColumns()\n\treturn tbl\n}", "func markDowner(content []byte) template.HTML {\n\ts := blackfriday.MarkdownCommon(content)\n\treturn template.HTML(s)\n}", "func PrettyPrint(rt *RTable, sub []string) string {\n\tvar buf bytes.Buffer\n\n\tif rt.Size() == 0 {\n\t\treturn \"\"\n\t}\n\ts, m := getStringTab(rt)\n\tlength := rt.Size()\n\n\tbuf.WriteString(\"+\" + strings.Repeat(\"-\",\n\t\t(m+1)*length-1) + \"+\\n\")\n\tfor row := 0; row < length; row++ {\n\t\tl := 1\n\t\tfor tok := 0; tok < l; tok++ {\n\t\t\tbuf.WriteString(strings.Repeat(\" \", (m+1)*row) + \"|\")\n\t\t\tfor col := row; col < length; col++ {\n\t\t\t\tif len((*s)[col][row]) == 0 {\n\t\t\t\t\tprintToken(\"\", m, &buf)\n\t\t\t\t} else if tok == 0 {\n\t\t\t\t\tl = max(len((*s)[col][row]), l)\n\t\t\t\t\tprintToken((*s)[col][row][0], m, &buf)\n\t\t\t\t} else if tok < len((*s)[col][row]) {\n\t\t\t\t\tprintToken((*s)[col][row][tok], m, &buf)\n\t\t\t\t} else {\n\t\t\t\t\tprintToken(\"\", m, &buf)\n\t\t\t\t}\n\t\t\t\tbuf.WriteString(\"|\")\n\t\t\t}\n\t\t\tbuf.WriteString(\"\\n\")\n\t\t}\n\t\tbuf.WriteString(strings.Repeat(\" \",\n\t\t\t(m+1)*row) + \"+\" + strings.Repeat(\"-\",\n\t\t\t(m+1)*(length-row)-1))\n\t\tif row+1 == length {\n\t\t\tbuf.WriteString(\"+\\n\")\n\t\t} else {\n\t\t\tbuf.WriteString(\"|\\n\")\n\t\t}\n\t}\n\n\tprintSub(sub, m, &buf)\n\n\treturn buf.String()\n}", "func DescriptTable(db *sql.DB, tab string) error {\n rows, err := db.Query(\"DESC \"+tab)\n if err != nil {\n return err\n }\n defer rows.Close()\n cols, err := rows.Columns()\n if err != nil {\n return err\n }\n if cols == nil {\n return nil\n }\n\n // Make header for description:\n vals := make([]interface{}, len(cols))\n for i := 0; i < len(cols); i++ {\n vals[i] = new(interface{})\n if i != 0 {\n fmt.Print(\"\\t\\t\")\n }\n fmt.Print(cols[i])\n }\n fmt.Println()\n\n // Make description table:\n for rows.Next() {\n err = rows.Scan(vals...)\n if err != nil {\n fmt.Println(err)\n continue\n }\n for i := 0; i < len(vals); i++ {\n if i != 0 {\n fmt.Print(\"\\t\\t\")\n }\n printRawValue(vals[i].(*interface{}))\n }\n fmt.Println()\n\n }\n if rows.Err() != nil {\n return rows.Err()\n }\n return nil\n}", "func DescriptTable(db *sql.DB, tab string) error {\n rows, err := db.Query(\"DESC \"+tab)\n if err != nil {\n return err\n }\n defer rows.Close()\n cols, err := rows.Columns()\n if err != nil {\n return err\n }\n if cols == nil {\n return nil\n }\n\n // Make header for description:\n vals := make([]interface{}, len(cols))\n for i := 0; i < len(cols); i++ {\n vals[i] = new(interface{})\n if i != 0 {\n fmt.Print(\"\\t\\t\")\n }\n fmt.Print(cols[i])\n }\n fmt.Println()\n\n // Make description table:\n for rows.Next() {\n err = rows.Scan(vals...)\n if err != nil {\n fmt.Println(err)\n continue\n }\n for i := 0; i < len(vals); i++ {\n if i != 0 {\n fmt.Print(\"\\t\\t\")\n }\n printRawValue(vals[i].(*interface{}))\n }\n fmt.Println()\n\n }\n if rows.Err() != nil {\n return rows.Err()\n }\n return nil\n}", "func printStatData(v *gocui.View, s stat.Stat, config *config, filter bool) error {\n\tvar doPrint bool\n\tfor colnum, rownum := 0, 0; rownum < s.Result.Nrows; rownum, colnum = rownum+1, 0 {\n\t\t// be optimistic, we want to print the row.\n\t\tdoPrint = true\n\n\t\t// apply filters using regexp\n\t\tif filter {\n\t\t\tfor i := 0; i < s.Result.Ncols; i++ {\n\t\t\t\tif config.view.Filters[i] != nil {\n\t\t\t\t\tif config.view.Filters[i].MatchString(s.Result.Values[rownum][i].String) {\n\t\t\t\t\t\tdoPrint = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t} else {\n\t\t\t\t\t\tdoPrint = false\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t// print values\n\t\tfor i := range s.Result.Cols {\n\t\t\tif doPrint {\n\t\t\t\t// truncate values that longer than column width\n\t\t\t\tvaluelen := len(s.Result.Values[rownum][colnum].String)\n\t\t\t\tif valuelen > config.view.ColsWidth[i] {\n\t\t\t\t\twidth := config.view.ColsWidth[i]\n\t\t\t\t\tif width <= 0 {\n\t\t\t\t\t\treturn fmt.Errorf(\"zero or negative width, skip\")\n\t\t\t\t\t}\n\n\t\t\t\t\t// truncate value up to column width and replace last character with '~' symbol\n\t\t\t\t\ts.Result.Values[rownum][colnum].String = s.Result.Values[rownum][colnum].String[:width-1] + \"~\"\n\t\t\t\t}\n\n\t\t\t\t// print value\n\t\t\t\t_, err := fmt.Fprintf(v, \"%-*s\", config.view.ColsWidth[i]+2, s.Result.Values[rownum][colnum].String)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tcolnum++\n\t\t\t}\n\t\t}\n\t\tif doPrint {\n\t\t\t_, err := fmt.Fprintf(v, \"\\n\")\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func WriteSummary(index_name string, fields []string) {\n\n // Setting font as needed\n pdf.SetFont(\"Helvetica\",\"\",10)\n\n // a slice of Summary{} that will hold Summary{} structure for each field\n response_struct := []Summary{}\n\n // Looping through each fields requestd\n for index := range fields {\n url := fmt.Sprintf(`https://127.0.0.1:9200/%s/_search?`, index_name)\n queries := fmt.Sprintf(`\n {\n \"size\":\"0\",\n \"aggs\" : {\n \"uniq_gender\" : {\n \"terms\" : { \"field\" : \"%s.keyword\" }\n }\n }\n }`, fields[index])\n\n p, err := es.Query(\"GET\", url, queries)\n if err != nil {\n fmt.Println(\"Report Generation error ERROR: Could not get response from Elasticsearch server \", err, \"Trying to connect again\")\n return\n }\n\n temp := Summary{}\n\n err = json.Unmarshal(p, &temp)\n if (err != nil) {\n fmt.Println(\"Error unmarshalling json\",err);\n }\n\n response_struct = append(response_struct,temp);\n }\n for i :=0; i < len(response_struct); i++ {\n pdf.Write(10,fmt.Sprintf(`%s Count\\n`,fields[i]))\n //DrawLine();\n for _, v := range(response_struct[i].Aggregations.Uniq.Buck){\n pdf.Write(10,fmt.Sprintf(`%s %d\\n`,v.Key,v.Count))\n }\n }\n}", "func (h *Home) SetHtmlFromPosts(html []byte, summ []byte, posts Posts) {\n var summaries []byte\n\n // Sort the Posts\n sort.Sort(posts)\n\n // Loop through Post collection\n for _, post := range posts {\n html := summ\n\n // Replace summary template variables\n html = bytes.Replace(html, []byte(\"{{ path }}\"), []byte(post.path), -1)\n html = bytes.Replace(html, []byte(\"{{ name }}\"), []byte(post.name), -1)\n\n summaries = append(summaries, html...)\n }\n\n // Replace base template variables\n html = bytes.Replace(html, []byte(\"{{ posts }}\"), summaries, -1)\n\n h.html = html\n}", "func printTally(wrapped, dropped int64) {\n\tfmt.Println(\"\\n--------------------------------------\")\n\tfmt.Printf(\"%-10s : %02d\\n\", \"Total\", chocolateCount)\n\tfmt.Printf(\"%-10s : %02d\\n\", \"Wrapped\", wrapped)\n\tfmt.Printf(\"%-10s : %02d\\n\", \"Dropped\", dropped)\n\tfmt.Println(\"--------------------------------------\")\n}", "func Summary(journal *Journal) string {\n\tbox := packr.New(\"data\", \"./data\")\n\n\tf, err := box.FindString(\"SUMMARY.md\")\n\tif err != nil {\n\t\tlogger.Fatalf(\"Cannot get embedded 'SUMMARY.md' asset: %v\", err)\n\t}\n\n\ttmpl, err := template.New(\"SUMMARY.md\").Parse(f)\n\tif err != nil {\n\t\tlogger.Fatalf(\"Cannot get parsed template for embedded 'SUMMARY.md' asset: %v\", err)\n\t}\n\n\ttype group struct {\n\t\tMonth string\n\t\tLink string\n\t\tEntries []*Entry\n\t}\n\n\tentries := []group{}\n\n\tvar curr string\n\tfor _, entry := range journal.Entries {\n\t\tif len(entries) == 0 || curr != entry.Date.Format(\"January 2006\") {\n\t\t\tentries = append(entries, group{\n\t\t\t\tentry.Date.Format(\"January 2006\"),\n\t\t\t\t\"entries/\" + entry.FileDate() + \".md\",\n\t\t\t\t[]*Entry{},\n\t\t\t})\n\n\t\t\tcurr = entry.Date.Format(\"January 2006\")\n\t\t}\n\n\t\tentries[len(entries)-1].Entries = append(entries[len(entries)-1].Entries, entry)\n\t}\n\n\tvar out bytes.Buffer\n\ttmpl.Execute(&out, entries)\n\n\treturn out.String()\n}", "func Table(z *html.Tokenizer) renderer.Table {\n\treturn renderer.Table{\n\t\tContent: parseTable(z),\n\t}\n}", "func Markdown(raw []byte) []byte {\n\thtmlFlags := 0 |\n\t\tblackfriday.HTML_USE_XHTML |\n\t\tblackfriday.HTML_USE_SMARTYPANTS |\n\t\tblackfriday.HTML_SMARTYPANTS_FRACTIONS |\n\t\tblackfriday.HTML_SMARTYPANTS_LATEX_DASHES\n\n\trenderer := &markdownRender{\n\t\tRenderer: blackfriday.HtmlRenderer(htmlFlags, \"\", \"\"),\n\t}\n\n\textensions := 0 |\n\t\tblackfriday.EXTENSION_NO_INTRA_EMPHASIS |\n\t\tblackfriday.EXTENSION_TABLES |\n\t\tblackfriday.EXTENSION_FENCED_CODE |\n\t\tblackfriday.EXTENSION_AUTOLINK |\n\t\tblackfriday.EXTENSION_STRIKETHROUGH |\n\t\tblackfriday.EXTENSION_AUTO_HEADER_IDS |\n\t\tblackfriday.EXTENSION_HEADER_IDS\n\n\treturn blackfriday.Markdown(raw, renderer, extensions)\n}", "func printDbstat(v *gocui.View, config *config, s stat.Stat) error {\n\t// If reading stats failed, print the error occurred and return.\n\tif s.Error != nil {\n\t\t_, err := fmt.Fprint(v, formatError(s.Error))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ts.Error = nil\n\t\treturn nil\n\t}\n\n\t// Align values within columns, use fixed aligning instead of dynamic.\n\tif !config.view.Aligned {\n\t\twidthes, cols := align.SetAlign(s.Result, 1000, false) // use high limit (1000) to avoid truncating last value.\n\t\tconfig.view.Cols = cols\n\t\tconfig.view.ColsWidth = widthes\n\t\tconfig.view.Aligned = true\n\t}\n\n\t// Print header.\n\terr := printStatHeader(v, s, config)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Print data.\n\terr = printStatData(v, s, config, isFilterRequired(config.view.Filters))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func Table_(children ...HTML) HTML {\n return Table(nil, children...)\n}", "func printNewPostsAndComments(groupURL string, wall *Resp) {\n\tfmt.Println(\"\\n...\")\n\tnewWall, err := getJson(groupURL)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tj := 0\n\tfor i, post := range newWall.Response.Items {\n\t\tif j < (newWall.Response.Count - wall.Response.Count) {\n\t\t\tprintPostAndComments(post, 0, \"Новый пост\")\n\t\t\tj++\n\t\t} else if post.Comments.Count > wall.Response.Items[i-j].Comments.Count {\n\t\t\tprintPostAndComments(post, wall.Response.Items[i-j].Comments.Count, \"Старый пост\")\n\t\t}\n\t}\n\t*wall = newWall\n}", "func TestRenderMarkdown(t *testing.T) {\n\tfor _, name := range names {\n\t\tr, err := os.Open(\"testdata/\" + name + \".json\")\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\n\t\tw := new(bytes.Buffer)\n\t\ttable := NewTable(r, w)\n\t\ttable.SetModeMarkdown()\n\n\t\terr = table.Render()\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\tr.Close()\n\n\t\texpect, err := os.ReadFile(\"testdata/\" + name + \".md\")\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\n\t\tif !bytes.Equal(expect, w.Bytes()) {\n\t\t\tt.Errorf(\"Expecting:\\n%sgot:\\n%s\", expect, w.Bytes())\n\t\t}\n\t}\n}", "func DumpPrettyTable(w io.Writer, title string, data []byte) {\n\tconst ncol = 8\n\n\tfmt.Fprintf(w, \"%s\\n\", title)\n\tfmt.Fprint(w, \" | 0 1 2 3 4 5 6 7 | 01234567 | 0 1 2 3 4 5 6 7 |\\n\")\n\tfmt.Fprint(w, \" | 8 9 A B C D E F | 89ABCDEF | 8 9 A B C D E F |\\n\")\n\n\tvar (\n\t\tchunks = SplitEach(data, ncol)\n\t\tchunk []byte\n\t\tx int\n\t\ty int\n\t\tc byte\n\t)\n\tfor x, chunk = range chunks {\n\t\tfmt.Fprintf(w, `%#08x|`, x*ncol)\n\n\t\t// Print as hex.\n\t\tfor y, c = range chunk {\n\t\t\tfmt.Fprintf(w, ` %02x`, c)\n\t\t}\n\t\tfor y++; y < ncol; y++ {\n\t\t\tfmt.Fprint(w, ` `)\n\t\t}\n\n\t\t// Print as char.\n\t\tfmt.Fprint(w, ` | `)\n\t\tfor y, c = range chunk {\n\t\t\tif c >= 33 && c <= 126 {\n\t\t\t\tfmt.Fprintf(w, `%c`, c)\n\t\t\t} else {\n\t\t\t\tfmt.Fprint(w, `.`)\n\t\t\t}\n\t\t}\n\t\tfor y++; y < ncol; y++ {\n\t\t\tfmt.Fprint(w, ` `)\n\t\t}\n\n\t\t// Print as integer.\n\t\tfmt.Fprint(w, ` |`)\n\t\tfor y, c = range chunk {\n\t\t\tfmt.Fprintf(w, ` %3d`, c)\n\t\t}\n\t\tfor y++; y < ncol; y++ {\n\t\t\tfmt.Fprint(w, ` `)\n\t\t}\n\t\tfmt.Fprintf(w, \" |%d\\n\", x*ncol)\n\t}\n}", "func RenderReportForTaskList(taskList TL) string {\n\n\t// Monday:\n\t// #communication :35\n\t// #meetings 2:35\n\t// total 3:05\n\tb := new(bytes.Buffer)\n\tw := tabwriter.NewWriter(b, 16, 0, 2, ' ', tabwriter.FilterHTML)\n\n\t// TODO: Sort by value (duration) with longest at top\n\tkeys := make([]string, 0, len(taskList.tagStats))\n\tfor k := range taskList.tagStats {\n\t\tkeys = append(keys, k)\n\t}\n\tsort.Strings(keys)\n\n\tfor _, tag := range keys {\n\t\tfmt.Fprintln(w, strings.Join([]string{\n\t\t\t\" \" + tag,\n\t\t\tformatMinutes(taskList.tagStats[tag])}, \"\\t\")+\"\\t\")\n\t}\n\tw.Flush()\n\ttotalDurationFormatted := formatMinutes(taskList.duration)\n\treturn strings.Join([]string{taskList.title + \" \" + totalDurationFormatted, b.String()}, \"\\n\")\n}", "func tabulate() {\n\n\tw := new(tabwriter.Writer)\n\tw.Init(os.Stdout, 8, 8, 0, '\\t', 0)\n\tdefer w.Flush()\n\n\tfmt.Fprintf(w, \"\\n \")\n\tfor _, each := range configJSON.Columns {\n\t\tfmt.Fprintf(w, \"%s\\t\\t\", each)\n\t}\n\tfmt.Fprintf(w, \"\\n\")\n\n\tfor _, each := range allAlertData {\n\t\tif filteredAlerts[each.Name] == 1 {\n\t\t\tfmt.Fprintf(w, \" %s\\t\\t%s\\t\\t%s\\t\\t%s\\t\\t%s\",\n\t\t\t\teach.Name,\n\t\t\t\teach.Service,\n\t\t\t\teach.Tag,\n\t\t\t\teach.Severity,\n\t\t\t\ttimeDiff(time.Now(), each.StartsAt, 0),\n\t\t\t)\n\t\t\tif each.EndsAt == time.Unix(maxtstmp, 0).UTC() {\n\t\t\t\tfmt.Fprintf(w, \"\\t\\t%s\", \"Undefined\")\n\t\t\t\tfmt.Fprintf(w, \"\\t\\t%s\\n\", \"Undefined\")\n\t\t\t} else {\n\t\t\t\tfmt.Fprintf(w, \"\\t\\t%s\", timeDiff(time.Now(), each.EndsAt, 0))\n\t\t\t\tfmt.Fprintf(w, \"\\t\\t%s\\n\", timeDiff(each.StartsAt, each.EndsAt, 1))\n\t\t\t}\n\n\t\t}\n\t}\n}", "func SanitizeMarkdownTable(s string, escape bool, html bool) string {\n\tif s == \"\" {\n\t\treturn \"n/a\"\n\t}\n\tresult := processSegments(\n\t\ts,\n\t\t\"```\",\n\t\tfunc(segment string, first bool, last bool) string {\n\t\t\tsegment = EscapeCharacters(segment, escape, true)\n\t\t\tsegment = ConvertMultiLineText(segment, true, false, html)\n\t\t\tsegment = NormalizeURLs(segment, escape)\n\t\t\treturn segment\n\t\t},\n\t\tfunc(segment string, first bool, last bool) string {\n\t\t\tlinebreak := \"<br>\"\n\t\t\tcodestart := \"<pre>\"\n\t\t\tcodeend := \"</pre>\"\n\n\t\t\tsegment = strings.TrimSpace(segment)\n\n\t\t\tif !html {\n\t\t\t\tlinebreak = \"\"\n\t\t\t\tcodestart = \" ```\"\n\t\t\t\tcodeend = \"``` \"\n\n\t\t\t\tif first {\n\t\t\t\t\tcodestart = codestart[1:]\n\t\t\t\t}\n\t\t\t\tif last {\n\t\t\t\t\tcodeend = codeend[:3]\n\t\t\t\t}\n\n\t\t\t\tsegment = ConvertOneLineCodeBlock(segment)\n\t\t\t}\n\n\t\t\tsegment = strings.ReplaceAll(segment, \"\\n\", linebreak)\n\t\t\tsegment = strings.ReplaceAll(segment, \"\\r\", \"\")\n\t\t\tsegment = fmt.Sprintf(\"%s%s%s\", codestart, segment, codeend)\n\t\t\treturn segment\n\t\t},\n\t)\n\treturn result\n}", "func RRReceiptsTable(ctx context.Context, ri *ReporterInfo) gotable.Table {\n\tconst funcname = \"RRReceiptsTable\"\n\tconst (\n\t\tDate = 0\n\t\tRCPTID = iota\n\t\tPRCPTID = iota\n\t\tPMTID = iota\n\t\tDocNo = iota\n\t\tAmount = iota\n\t\tPayor = iota\n\t\tReceivedBy = iota\n\t\tReversal = iota\n\t\tComment = iota\n\t\t// AccountRule = iota\n\t)\n\n\t// init and prepare some values before table init\n\tri.RptHeaderD1 = true\n\tri.RptHeaderD2 = true\n\tri.BlankLineAfterRptName = true\n\n\tn, _ := rlib.GetPaymentTypesByBusiness(ctx, ri.Bid) // get the payment types for this business\n\n\t// table init\n\ttbl := getRRTable()\n\n\ttbl.AddColumn(\"Date\", 10, gotable.CELLDATE, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"RCPTID\", 12, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"Parent RCPTID\", 12, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"PMTID\", 11, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"Doc No\", 25, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"Amount\", 10, gotable.CELLFLOAT, gotable.COLJUSTIFYRIGHT)\n\ttbl.AddColumn(\"Payor\", 25, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"Received By\", 25, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"Flags\", 8, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\ttbl.AddColumn(\"Comment\", 50, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\t// tbl.AddColumn(\"Account Rule\", 50, gotable.CELLSTRING, gotable.COLJUSTIFYLEFT)\n\n\t// set table title, sections\n\terr := TableReportHeaderBlock(ctx, &tbl, \"Tendered Payment Log\", funcname, ri)\n\tif err != nil {\n\t\trlib.LogAndPrintError(funcname, err)\n\t\ttbl.SetSection3(err.Error())\n\t\treturn tbl\n\t}\n\n\tm, err := rlib.GetReceipts(ctx, ri.Bid, &ri.D1, &ri.D2)\n\tif err != nil {\n\t\trlib.LogAndPrintError(funcname, err)\n\t\ttbl.SetSection3(err.Error())\n\t\treturn tbl\n\t}\n\n\tfor _, a := range m {\n\t\t_, comment := rlib.ROCExtractRentableName(a.Comment)\n\t\trev := \"\"\n\t\tif a.FLAGS&rlib.RCPTREVERSED != 0 {\n\t\t\trev = \"REVERSAL\"\n\t\t}\n\n\t\ttbl.AddRow()\n\t\ttbl.Putd(-1, Date, a.Dt)\n\t\ttbl.Puts(-1, RCPTID, a.IDtoString())\n\t\ttbl.Puts(-1, PRCPTID, rlib.IDtoString(\"RCPT\", a.PRCPTID))\n\t\ttbl.Puts(-1, PMTID, n[a.PMTID].Name)\n\t\ttbl.Puts(-1, DocNo, a.DocNo)\n\t\ttbl.Putf(-1, Amount, a.Amount)\n\t\ttbl.Puts(-1, Payor, a.OtherPayorName)\n\t\ttbl.Puts(-1, ReceivedBy, rlib.GetNameForUID(ctx, a.CreateBy))\n\t\ttbl.Puts(-1, Reversal, rev)\n\t\ttbl.Puts(-1, Comment, comment)\n\t\t// tbl.Puts(-1, 6, rlib.GetReceiptAccountRuleText(&a))\n\t}\n\ttbl.TightenColumns()\n\ttbl.AddLineAfter(len(tbl.Row) - 1)\n\ttbl.InsertSumRow(len(tbl.Row), 0, len(tbl.Row)-1, []int{Amount}) // insert @ len essentially adds a row. Only want to sum Amount column\n\treturn tbl\n}", "func formatPostsSlackResp(posts *Posts) (string, error) {\n\tbuf := new(bytes.Buffer)\n\tt := template.New(\"PHPosts\")\n\tt, err := t.Parse(slackPostsRespTmpl)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\terr = t.Execute(buf, posts)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn buf.String(), nil\n}", "func GenerateHTMLReport(totalTestTime, testDate string, testSummary []TestOverview, testSuiteDetails map[string]TestSuiteDetails) {\n\ttotalPassedTests := 0\n\ttotalFailedTests := 0\n\ttotalSkippedTests := 0\n\ttemplates := make([]template.HTML, 0)\n\tfor _, testSuite := range testSuiteDetails {\n\t\ttotalPassedTests = totalPassedTests + testSuite.PassedTests\n\t\ttotalFailedTests = totalFailedTests + testSuite.FailedTests\n\t\ttotalSkippedTests = totalSkippedTests + testSuite.SkippedTests\n\t\t// display testSuiteName\n\t\thtmlString := template.HTML(\"<div type=\\\"button\\\" class=\\\"collapsible\\\">\\n\")\n\t\tpackageInfoTemplateString := template.HTML(\"\")\n\n\t\tpackageInfoTemplateString = \"<div>{{.testsuiteName}}</div>\" + \"\\n\" + \"<div>Run Time: {{.elapsedTime}}m</div> \" + \"\\n\"\n\t\tpackageInfoTemplate, err := template.New(\"packageInfoTemplate\").Parse(string(packageInfoTemplateString))\n\t\tif err != nil {\n\t\t\tlog.Println(\"error parsing package info template\", err)\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\tvar processedPackageTemplate bytes.Buffer\n\t\terr = packageInfoTemplate.Execute(&processedPackageTemplate, map[string]string{\n\t\t\t\"testsuiteName\": testSuite.TestSuiteName + \"_\" + OS,\n\t\t\t\"elapsedTime\": fmt.Sprintf(\"%.2f\", testSuite.ElapsedTime),\n\t\t})\n\t\tif err != nil {\n\t\t\tlog.Println(\"error applying package info template: \", err)\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\tif testSuite.Status == \"pass\" {\n\t\t\tpackageInfoTemplateString = \"<div class=\\\"collapsibleHeading packageCardLayout successBackgroundColor \\\">\" +\n\t\t\t\ttemplate.HTML(processedPackageTemplate.Bytes()) + \"</div>\"\n\t\t} else if testSuite.Status == \"fail\" {\n\t\t\tpackageInfoTemplateString = \"<div class=\\\"collapsibleHeading packageCardLayout failBackgroundColor \\\">\" +\n\t\t\t\ttemplate.HTML(processedPackageTemplate.Bytes()) + \"</div>\"\n\t\t} else {\n\t\t\tpackageInfoTemplateString = \"<div class=\\\"collapsibleHeading packageCardLayout skipBackgroundColor \\\">\" +\n\t\t\t\ttemplate.HTML(processedPackageTemplate.Bytes()) + \"</div>\"\n\t\t}\n\n\t\thtmlString = htmlString + \"\\n\" + packageInfoTemplateString\n\t\ttestInfoTemplateString := template.HTML(\"\")\n\n\t\t// display testCases\n\t\tfor _, pt := range testSummary {\n\t\t\ttestHTMLTemplateString := template.HTML(\"\")\n\t\t\tif len(pt.TestCases) == 0 {\n\t\t\t\tlog.Println(\"Test run failed for \", pt.TestSuiteName, \"no testcases were executed\")\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif pt.TestSuiteName == testSuite.TestSuiteName {\n\t\t\t\tif testSuite.FailedTests == 0 {\n\t\t\t\t\ttestHTMLTemplateString = \"<div type=\\\"button\\\" class=\\\"collapsible \\\">\" +\n\t\t\t\t\t\t\"\\n\" + \"<div class=\\\"collapsibleHeading testCardLayout successBackgroundColor \\\">\" +\n\t\t\t\t\t\t\"<div>+ {{.testName}}</div>\" + \"\\n\" + \"<div>{{.elapsedTime}}</div>\" + \"\\n\" +\n\t\t\t\t\t\t\"</div>\" + \"\\n\" +\n\t\t\t\t\t\t\"<div class=\\\"collapsibleHeadingContent\\\">\"\n\t\t\t\t} else if testSuite.FailedTests > 0 {\n\t\t\t\t\ttestHTMLTemplateString = \"<div type=\\\"button\\\" class=\\\"collapsible \\\">\" +\n\t\t\t\t\t\t\"\\n\" + \"<div class=\\\"collapsibleHeading testCardLayout failBackgroundColor \\\">\" +\n\t\t\t\t\t\t\"<div>+ {{.testName}}</div>\" + \"\\n\" + \"<div>{{.elapsedTime}}</div>\" + \"\\n\" +\n\t\t\t\t\t\t\"</div>\" + \"\\n\" +\n\t\t\t\t\t\t\"<div class=\\\"collapsibleHeadingContent\\\">\"\n\t\t\t\t} else if testSuite.SkippedTests > 0 {\n\t\t\t\t\ttestHTMLTemplateString = \"<div type=\\\"button\\\" class=\\\"collapsible \\\">\" +\n\t\t\t\t\t\t\"\\n\" + \"<div class=\\\"collapsibleHeading testCardLayout skipBackgroundColor \\\">\" +\n\t\t\t\t\t\t\"<div>+ {{.testName}}</div>\" + \"\\n\" + \"<div>{{.elapsedTime}}</div>\" + \"\\n\" +\n\t\t\t\t\t\t\"</div>\" + \"\\n\" +\n\t\t\t\t\t\t\"<div class=\\\"collapsibleHeadingContent\\\">\"\n\t\t\t\t}\n\t\t\t\ttestTemplate, err := template.New(\"Test\").Parse(string(testHTMLTemplateString))\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Println(\"error parsing tests template: \", err)\n\t\t\t\t\tos.Exit(1)\n\t\t\t\t}\n\t\t\t\tvar processedTestTemplate bytes.Buffer\n\t\t\t\terr = testTemplate.Execute(&processedTestTemplate, map[string]string{\n\t\t\t\t\t\"testName\": \"TestCases\",\n\t\t\t\t})\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Println(\"error applying test template: \", err)\n\t\t\t\t\tos.Exit(1)\n\t\t\t\t}\n\n\t\t\t\ttestHTMLTemplateString = template.HTML(processedTestTemplate.Bytes())\n\t\t\t\ttestCaseHTMLTemplateString := template.HTML(\"\")\n\n\t\t\t\tfor _, tC := range pt.TestCases {\n\t\t\t\t\ttestCaseHTMLTemplateString = \"<div>{{.testName}}</div>\" + \"\\n\" + \"<div>{{.elapsedTime}}m</div>\"\n\t\t\t\t\ttestCaseTemplate, err := template.New(\"testCase\").Parse(string(testCaseHTMLTemplateString))\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.Println(\"error parsing test case template: \", err)\n\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t}\n\n\t\t\t\t\tvar processedTestCaseTemplate bytes.Buffer\n\t\t\t\t\terr = testCaseTemplate.Execute(&processedTestCaseTemplate, map[string]string{\n\t\t\t\t\t\t\"testName\": tC.TestCaseName,\n\t\t\t\t\t\t\"elapsedTime\": fmt.Sprintf(\"%f\", tC.ElapsedTime),\n\t\t\t\t\t})\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.Println(\"error applying test case template: \", err)\n\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t}\n\n\t\t\t\t\tif tC.Status == \"passed\" {\n\t\t\t\t\t\ttestCaseHTMLTemplateString = \"<div class=\\\"testCardLayout successBackgroundColor \\\">\" + template.HTML(processedTestCaseTemplate.Bytes()) + \"</div>\"\n\n\t\t\t\t\t} else if tC.Status == \"failed\" {\n\t\t\t\t\t\ttestCaseHTMLTemplateString = \"<div class=\\\"testCardLayout failBackgroundColor \\\">\" + template.HTML(processedTestCaseTemplate.Bytes()) + \"</div>\"\n\n\t\t\t\t\t} else {\n\t\t\t\t\t\ttestCaseHTMLTemplateString = \"<div class=\\\"testCardLayout skipBackgroundColor \\\">\" + template.HTML(processedTestCaseTemplate.Bytes()) + \"</div>\"\n\t\t\t\t\t}\n\t\t\t\t\ttestHTMLTemplateString = testHTMLTemplateString + \"\\n\" + testCaseHTMLTemplateString\n\t\t\t\t}\n\t\t\t\ttestHTMLTemplateString = testHTMLTemplateString + \"\\n\" + \"</div>\" + \"\\n\" + \"</div>\"\n\t\t\t\ttestInfoTemplateString = testInfoTemplateString + \"\\n\" + testHTMLTemplateString\n\t\t\t}\n\t\t}\n\t\thtmlString = htmlString + \"\\n\" + \"<div class=\\\"collapsibleHeadingContent\\\">\\n\" + testInfoTemplateString + \"\\n\" + \"</div>\"\n\t\thtmlString = htmlString + \"\\n\" + \"</div>\"\n\t\ttemplates = append(templates, htmlString)\n\t}\n\treportTemplate := template.New(\"report-template.html\")\n\treportTemplateData, err := Asset(\"report-template.html\")\n\tif err != nil {\n\t\tlog.Println(\"error retrieving report-template.html: \", err)\n\t\tos.Exit(1)\n\t}\n\n\treport, err := reportTemplate.Parse(string(reportTemplateData))\n\tif err != nil {\n\t\tlog.Println(\"error parsing report-template.html: \", err)\n\t\tos.Exit(1)\n\t}\n\n\tvar processedTemplate bytes.Buffer\n\ttype templateData struct {\n\t\tHTMLElements []template.HTML\n\t\tFailedTests int\n\t\tPassedTests int\n\t\tSkippedTests int\n\t\tTotalTestTime string\n\t\tTestDate string\n\t}\n\n\terr = report.Execute(&processedTemplate,\n\t\t&templateData{\n\t\t\tHTMLElements: templates,\n\t\t\tFailedTests: totalFailedTests,\n\t\t\tPassedTests: totalPassedTests,\n\t\t\tSkippedTests: totalSkippedTests,\n\t\t\tTotalTestTime: totalTestTime,\n\t\t\tTestDate: testDate,\n\t\t},\n\t)\n\tif err != nil {\n\t\tlog.Println(\"error applying report-template.html: \", err)\n\t\tos.Exit(1)\n\t}\n\thtmlReport = strings.Split(fileName, \".\")[0] + \"_results.html\"\n\tbucketName = strings.Split(htmlReport, \"_\")[0] + \"-results\"\n\tfmt.Println(bucketName)\n\terr = ioutil.WriteFile(htmlReport, processedTemplate.Bytes(), 0644)\n\tif err != nil {\n\t\tlog.Println(\"error writing report.html file: \", err)\n\t\tos.Exit(1)\n\t}\n}", "func printTitle(datas []*model.InputMetric) {\n\tvar title string\n\t// print title.\n\tfor _, data := range datas {\n\t\ttitle += fmt.Sprintf(\"%-*s\", 33, data.Type)\n\t}\n\tfmt.Printf(\"%c[7;40;36m%s%c[0m\\n\", 0x1B, strings.ToUpper(title), 0x1B)\n}", "func (m *Measurement) PrintStats(w io.Writer) {\n\ttype Hist struct {\n\t\t*Result\n\t\t*hrtime.Histogram\n\t}\n\n\thists := []Hist{}\n\tfor _, result := range m.Results {\n\t\thists = append(hists, Hist{\n\t\t\tResult: result,\n\t\t\tHistogram: hrtime.NewDurationHistogram(result.Durations, &hrtime.HistogramOptions{\n\t\t\t\tBinCount: 10,\n\t\t\t\tNiceRange: true,\n\t\t\t\tClampMaximum: 0,\n\t\t\t\tClampPercentile: 0.999,\n\t\t\t}),\n\t\t})\n\t}\n\n\tmsec := func(ns float64) string {\n\t\treturn fmt.Sprintf(\"%.2f\", ns/1e6)\n\t}\n\n\tfor _, hist := range hists {\n\t\tfmt.Fprintf(w, \"%v\\t%v\\t%v\\t%v\\t%v\\t%v\\t%v\\t%v\\n\",\n\t\t\tm.Parts, m.Segments, hist.Name,\n\t\t\tmsec(hist.Average),\n\t\t\tmsec(hist.Maximum),\n\t\t\tmsec(hist.P50),\n\t\t\tmsec(hist.P90),\n\t\t\tmsec(hist.P99),\n\t\t)\n\t}\n}", "func (v *InvoiceCollection) Table() string {\n\t// vheads := []string{\"項次\", \"表頭\", \"發票狀態\", \"發票號碼\", \"發票日期\",\n\t// \t\"商店統編\", \"商店店名\", \"載具名稱\", \"載具號碼\", \"總金額\"}\n\t// dheads := []string{\"項次\", \"表頭\", \"發票號碼\", \"小計\", \"品項名稱\"}\n\n\t// nv := len(pinvs)\n\tvheads := append([]string{\"項次\"}, invoiceCtagNames...)\n\tdheads := append([]string{\"項次\"}, detailCtagNames...)\n\tvsizes, dsizes := util.GetSizes(vheads), util.GetSizes(dheads)\n\tvnf, dnf := len(vheads), len(dheads)\n\n\tvdata, vsizes, ddata, dsizes := v.stringSlice(vsizes, dsizes)\n\n\tvar b bytes.Buffer\n\tbws := b.WriteString\n\n\tvn := util.Isum(vsizes...) + 2*vnf // + vnf + (vnf - 1) + 1\n\ttitle := \"發票清單\"\n\t_, _, vl := util.CountChars(title)\n\tvm := (vn - vl) / 2\n\tbws(util.StrSpaces(vm) + title + \"\\n\")\n\n\tisleft := true\n\tvheads[vnf-1] = util.AlignToRight(vheads[vnf-1], vsizes[vnf-1]) // Title\n\tvhtab := util.StrThickLine(vn)\n\tvhtab += sliceToString(\"\", &vheads, vsizes, isleft)\n\tvhtab += \"\\n\" + util.StrThinLine(vn)\n\n\tlspaces := util.StrSpaces(5)\n\tdn := util.Isum(dsizes...) + dnf*2 //+ dnf + (dnf - 1) + 1\n\tdheads[dnf-2] = util.AlignToRight(dheads[dnf-2], dsizes[dnf-2]) // SubTitle\n\tdhtab := lspaces + util.StrThickLine(dn)\n\tdhtab += sliceToString(lspaces, &dheads, dsizes, isleft)\n\tdhtab += \"\\n\" + lspaces + util.StrThinLine(dn)\n\n\tfor i := 0; i < len(vdata); i++ {\n\t\tbws(vhtab)\n\t\tbws(getInvoiceTableRowString(&vdata[i], \"\", i+1, vsizes, isleft))\n\t\tbws(\"\\n\")\n\n\t\tbws(dhtab)\n\t\tfor j := 0; j < len(ddata[i]); j++ {\n\t\t\tbws(getDeailTableRowString(&ddata[i][j], lspaces, j+1, dsizes, isleft))\n\t\t\tbws(\"\\n\")\n\t\t}\n\t\tbws(lspaces + util.StrThickLine(dn))\n\t}\n\n\treturn b.String()\n\n}", "func spawnredditor(sr subreddit) {\t\n\t// Log start\n\tlog.Printf(\"Started listening to subreddit %s\",sr.Name)\n\n\t// Unwrap JSON\n\ttype structure struct {\n\t Data struct {\n\t \tChildren []struct {\n\t \t\tData struct {\n\t \t\t\tId \t\t\tstring\n\t \t\t\tSelf \t\tbool\t\t`json:\"is_self\"`\t\n\t \t\t\tUrl \t\tstring\n\t \t\t\tTs\t\t\tfloat64\t\t`json:\"created_utc\"`\n\t \t\t\tAuthor \t\tstring\n\t \t\t\tTitle \t\tstring\n\t \t\t\tSelftext\tstring\n\t \t\t\tPermalink\tstring\n\t \t\t}\n\t \t}\n\t }\n\t}\t\n\n\t// Define URI\n\turi := redditbaseurl + \"/r/\" + sr.Name + redditchannel\n\n\t// Loop endlessly\n\tfor {\t\n\t\t// Fetch JSON\n\t\traw, _ := fetchurl(uri)\t\t \t\t\n\n\t\t// Instantiate new structure\n\t\tvar s structure\n\n\t\t// Decode JSON\n\t\tjson.NewDecoder(raw.Body).Decode(&s)\t\t\t\t\t\n\n\t\t// Iterate through items\n\t\tfor _, child := range s.Data.Children {\n\t\t\t// See if it's newer than the last we knew\n\t\t\tif child.Data.Ts <= sr.Latest { continue }\n\n\t\t\t// Build proper item, map fields\n\t\t\titem := Item{\n\t\t\t\tid:\t\t\tchild.Data.Id,\n\t\t\t\tkind:\t\t\"reddit\",\t\t\n\t\t\t\tauthor:\t\tchild.Data.Author,\n\t\t\t\tpublished: \ttime.Unix(int64(child.Data.Ts),0),\n\t\t\t\ttitle:\t\tchild.Data.Title,\t\t\t\t\t\n\t\t\t\tbody: \t\tchild.Data.Selftext,\n\t\t\t}\n\n\t\t\t// If it's a posting instead of a link, start working on creating an Item\t\t\t\t\n\t\t\tif child.Data.Self {\n\t\t\t\t// Set Post URL\n\t\t\t\titem.url = child.Data.Url\t\t\t\n\n\t\t\t\t// Build post\n\t\t\t\tpost := Post{\n\t\t\t\t\titem: item,\n\t\t\t\t}\t\t\n\n\t\t\t\t// Send it off for processing\n\t\t\t\tgo AddPost(post)\t\t\t\t\n\n\t\t\t} else {\n\t\t\t\t// Set mention post url\n\t\t\t\titem.url = redditbaseurl + child.Data.Permalink\n\n\t\t\t\t// Build proper Mention\n\t\t\t\tmention := Mention{\n\t\t\t\t\titem: item,\n\t\t\t\t\ttarget: child.Data.Url,\t\t\t\n\t\t\t\t}\t\t\n\n\t\t\t\t// Send it off for processing\n\t\t\t\tgo AddMention(mention)\t\t\t\t\n\t\t\t}\n\t\t} \n\n\t\t// Set the timestamp to the newest we processed\n\t\tsr.Latest = s.Data.Children[0].Data.Ts\n\n\t\t// Wait until next update\n\t\ttime.Sleep(time.Minute)\n\t}\t\n}", "func formatTable(h, c, o string) []byte {\n\ttbl, err := prettytable.NewTable([]prettytable.Column{\n\t\t{Header: \"Host\", MinWidth: 10},\n\t\t{Header: \"Check\", MinWidth: 8},\n\t\t{Header: \"Output\"},\n\t}...)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\ttbl.Separator = \" | \"\n\ttbl.AddRow(h, c, o)\n\treturn tbl.Bytes()\n}", "func createSearchGenreInfo(ctx context.Context, w http.ResponseWriter, r *http.Request) {\n result := createSearchGenreInfoDA()\n fmt.Fprintf(w, result)\n}", "func renderSummary(r *check.Report) {\n\tcategories := map[uint8][]check.Alert{\n\t\tcheck.LEVEL_NOTICE: r.Notices,\n\t\tcheck.LEVEL_WARNING: r.Warnings,\n\t\tcheck.LEVEL_ERROR: r.Errors,\n\t\tcheck.LEVEL_CRITICAL: r.Criticals,\n\t}\n\n\tlevels := []uint8{\n\t\tcheck.LEVEL_NOTICE,\n\t\tcheck.LEVEL_WARNING,\n\t\tcheck.LEVEL_ERROR,\n\t\tcheck.LEVEL_CRITICAL,\n\t}\n\n\tvar result []string\n\n\tfmtc.Printf(\"{*}Summary:{!} \")\n\n\tfor _, level := range levels {\n\t\talerts := categories[level]\n\n\t\tif len(alerts) == 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\tactual, absolved := splitAlertsCount(alerts)\n\n\t\tif absolved != 0 {\n\t\t\tresult = append(result,\n\t\t\t\tfgColor[level]+headers[level]+\": \"+strconv.Itoa(actual)+\"{s-}/\"+strconv.Itoa(absolved)+\"{!}\",\n\t\t\t)\n\t\t} else {\n\t\t\tresult = append(result,\n\t\t\t\tfgColor[level]+headers[level]+\": \"+strconv.Itoa(actual)+\"{!}\",\n\t\t\t)\n\t\t}\n\t}\n\n\tfmtc.Println(strings.Join(result, \"{s-} • {!}\"))\n}", "func Table(dataHeader []string, data [][]string) {\n\ttable := tablewriter.NewWriter(os.Stdout)\n\ttable.SetHeader(dataHeader)\n\tfor _, v := range data {\n\t\ttable.Append(v)\n\t}\n\ttable.Render()\n}", "func makeSummary(draconResult map[string]string) (string, string) {\n\tsummary := filepath.Base(draconResult[\"target\"]) + \" \" + draconResult[\"title\"]\n\n\tif len(summary) > 255 { // jira summary field supports up to 255 chars\n\t\ttobytes := bytes.Runes([]byte(summary))\n\t\tsummary = string(tobytes[:254])\n\t\textra := string(tobytes[255:])\n\t\treturn summary, extra\n\t}\n\treturn summary, \"\"\n}", "func (i *Index) ToMarkdown() (s string) {\n\tvar b strings.Builder\n\n\tfmt.Fprintln(&b, \"Notenindex\")\n\tfmt.Fprintf(&b, \"erstellt am %s\\n\", time.Now().Format(\"02.01.2006 um 15:04 Uhr\"))\n\tfmt.Fprintln(&b)\n\n\tfmt.Fprintln(&b, \"# Liste\")\n\tfmt.Fprintln(&b)\n\tfor _, sheet := range i.List {\n\t\tfmt.Fprintf(&b, \"(%d) %s\\n\", sheet.Index, sheet.Name)\n\t}\n\n\tfmt.Fprintln(&b)\n\tfmt.Fprintln(&b, \"# Nach Name\")\n\tfmt.Fprintln(&b)\n\tfor _, key := range i.SortedNames() {\n\t\tsheets := i.ByName[key]\n\t\tlist := strings.Join(sheetStrings(sheets), \",\")\n\t\tfmt.Fprintf(&b, \"%s:\\n\", key)\n\t\tfmt.Fprintln(&b, \" \"+list)\n\t}\n\n\t// fmt.Fprintln(&b)\n\t// fmt.Fprintln(&b, \"# Nach Wort\")\n\t// fmt.Fprintln(&b)\n\t// for _, word := range i.SortedWords() {\n\t// \tsheets := i.ByWord[word]\n\t// \tlist := strings.Join(sheetStrings(sheets), \",\")\n\t// \tfmt.Fprintln(&b, word+\":\")\n\t// \tfmt.Fprintln(&b, \" \"+list)\n\t// }\n\t// fmt.Fprintln(&b)\n\n\treturn b.String()\n}", "func printBugsStats(frontEndBugs int, backEndBugs int, totalBugs int) {\r\n\tfmt.Println(\"Number of Frontend bugs: \", frontEndBugs)\r\n\tfmt.Println(\"Number of Backend bugs: \", backEndBugs)\r\n\tfmt.Println(\"Number of bugs yet to be classified: \", totalBugs-(frontEndBugs+backEndBugs))\r\n}", "func Render(md string) (html string, err error) {\n\tclient := getClient()\n\topt := &gh.MarkdownOptions{Mode: \"gfm\", Context: \"google/go-github\"}\n\n\toutput, _, err := client.Markdown(md, opt)\n\tif _, ok := err.(*gh.RateLimitError); ok {\n\t\tlog.Println(\"EXITING:\", err)\n\t\tos.Exit(-1)\n\t}\n\treturn output, err\n}", "func showTotals(w http.ResponseWriter, r *http.Request, app *app) error {\n\t// get total votes for each artist\n\tartist := r.URL.Query().Get(\"artist\")\n\tif artist == \"\" {\n\t\treturn fmt.Errorf(\"artist property missing from form submission\")\n\t}\n\tvideoID := r.URL.Query().Get(\"videoId\")\n\tif videoID == \"\" {\n\t\treturn fmt.Errorf(\"videoId property missing from form submission\")\n\t}\n\tsqlSelect := \"SELECT tag_id FROM votes WHERE artist_name=$1 AND video_id=$2 \"\n\trows, err := app.db.Query(sqlSelect, artist, videoID)\n\n\tvoteCount := make(map[string]int)\n\n\tfor rows.Next() {\n\t\tvar tag string\n\t\tif err := rows.Scan(&tag); err != nil {\n\t\t\t// do something with error\n\t\t} else {\n\t\t\tvoteCount[tag]++\n\t\t}\n\t}\n\tjs, err := json.Marshal(voteCount)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Write(js)\n\treturn nil\n}", "func getHTML(str string) template.HTML {\n\tmarkdown := string(blackfriday.Run([]byte(str)))\n\treturn template.HTML(markdown)\n}", "func getSimpleTOC(res http.ResponseWriter, req *http.Request, params httprouter.Params) {\n\tpu, _ := GetUserFromSession(res, req)\n\n\tscreenOutput := struct {\n\t\tName string\n\t\tEmail string\n\t\tPermission int\n\t\tID string\n\t}{\n\t\tpu.Name,\n\t\tpu.Email,\n\t\tpu.Permission,\n\t\tparams.ByName(\"ID\"),\n\t}\n\n\tServeTemplateWithParams(res, \"toc.html\", screenOutput)\n}", "func displayTable(m *TuiModel) string {\n\tvar builder []string\n\tcolumnNamesToInterfaceArray := m.GetSchemaData()\n\n\t// go through all columns\n\tfor c, columnName := range m.GetHeaders() {\n\t\tif m.expandColumn > -1 && m.expandColumn != c {\n\t\t\tcontinue\n\t\t}\n\n\t\tvar rowBuilder []string\n\t\tcolumnValues := columnNamesToInterfaceArray[columnName]\n\n\t\tfor r, val := range columnValues {\n\t\t\tbase := m.GetBaseStyle()\n\t\t\t// handle highlighting\n\t\t\tif c == m.GetColumn() && r == m.GetRow() {\n\t\t\t\tbase.Foreground(lipgloss.Color(highlight))\n\t\t\t}\n\t\t\t// display text based on type\n\t\t\trow := func() string {\n\t\t\t\tswitch v := val.(type) {\n\t\t\t\tcase string:\n\t\t\t\t\treturn TruncateIfApplicable(m, v)\n\t\t\t\tcase int64:\n\t\t\t\t\treturn fmt.Sprintf(\"%d\", v)\n\t\t\t\tcase float64:\n\t\t\t\t\treturn fmt.Sprintf(\"%.2f\", v)\n\t\t\t\tcase time.Time:\n\t\t\t\t\tcw := m.CellWidth()\n\t\t\t\t\tstr := v.String()\n\t\t\t\t\tminVal := int(math.Min(float64(len(str)), float64(cw)))\n\t\t\t\t\ts := str[:minVal]\n\t\t\t\t\tif len(s) == cw {\n\t\t\t\t\t\ts = s[:len(s)-3] + \"...\"\n\t\t\t\t\t}\n\t\t\t\t\treturn s\n\t\t\t\tcase nil:\n\t\t\t\t\treturn \"NULL\"\n\t\t\t\tdefault:\n\t\t\t\t\treturn \"\"\n\t\t\t\t}\n\t\t\t}()\n\t\t\trowBuilder = append(rowBuilder, base.Render(row))\n\t\t}\n\n\t\t// get a list of columns\n\t\tbuilder = append(builder, lipgloss.JoinVertical(lipgloss.Left, rowBuilder...))\n\t}\n\n\t// join them into rows\n\treturn lipgloss.JoinHorizontal(lipgloss.Left, builder...)\n}", "func (mlw Wrapper) content(row, totals mutexlatency.Row) string {\n\tname := row.Name\n\tif row.CountStar == 0 && name != \"Totals\" {\n\t\tname = \"\"\n\t}\n\n\treturn fmt.Sprintf(\"%10s %8s %8s|%s\",\n\t\tlib.FormatTime(row.SumTimerWait),\n\t\tlib.FormatAmount(row.CountStar),\n\t\tlib.FormatPct(lib.Divide(row.SumTimerWait, totals.SumTimerWait)),\n\t\tname)\n}", "func printDistroWatchNews(m map[string]string) string {\n\trelease := parseUrlforStu(m[\"news\"])\n\tvar output string\n\tfor _, thing := range release.Items {\n\t\tif strings.Contains(thing.Title, \"DistroWatch Weekly\") {\n\t\t\toutput += strFormatOut(thing)\n\t\t\toutput += \"\\n\"\n\t\t}\n\t}\n\treturn output\n}", "func inspectTableWithCustomHotword(w io.Writer, projectID, hotwordRegexPattern string) error {\n\t// projectID := \"your-project-id\"\n\t// hotwordRegexPattern := \"(Fake Social Security Number)\"\n\n\ttableToInspect := &dlppb.Table{\n\t\tHeaders: []*dlppb.FieldId{\n\t\t\t{Name: \"Fake Social Security Number\"},\n\t\t\t{Name: \"Real Social Security Number\"},\n\t\t},\n\t\tRows: []*dlppb.Table_Row{\n\t\t\t{\n\t\t\t\tValues: []*dlppb.Value{\n\t\t\t\t\t{\n\t\t\t\t\t\tType: &dlppb.Value_StringValue{StringValue: \"111-11-1111\"},\n\t\t\t\t\t},\n\t\t\t\t\t{\n\t\t\t\t\t\tType: &dlppb.Value_StringValue{StringValue: \"222-22-2222\"},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\tctx := context.Background()\n\n\t// Initialize a client once and reuse it to send multiple requests. Clients\n\t// are safe to use across goroutines. When the client is no longer needed,\n\t// call the Close method to cleanup its resources.\n\tclient, err := dlp.NewClient(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Closing the client safely cleans up background resources.\n\tdefer client.Close()\n\n\t// Specify what content you want the service to de-identify.\n\tcontentItem := &dlppb.ContentItem_Table{\n\t\tTable: tableToInspect,\n\t}\n\n\t// Specify the likelihood adjustment to adjust the match likelihood for your detection rule\n\t// based on your needs and desired level of sensitivity in data analysis.\n\tlikelihoodAdjustment := &dlppb.CustomInfoType_DetectionRule_LikelihoodAdjustment{\n\t\tAdjustment: &dlppb.CustomInfoType_DetectionRule_LikelihoodAdjustment_FixedLikelihood{\n\t\t\tFixedLikelihood: dlppb.Likelihood_VERY_UNLIKELY,\n\t\t},\n\t}\n\n\t// Specify the type of info the inspection will look for.\n\t// See https://cloud.google.com/dlp/docs/infotypes-reference for complete list of info types.\n\tinfoTypes := []*dlppb.InfoType{\n\t\t{Name: \"US_SOCIAL_SECURITY_NUMBER\"},\n\t}\n\n\t// Specify the proximity so that It helps identify sensitive information\n\t// occurring near other data points, enabling more context-aware analysis.\n\tproximity := &dlppb.CustomInfoType_DetectionRule_Proximity{\n\t\tWindowBefore: 5,\n\t}\n\n\t// Construct hotWord rule.\n\thotwordRule := &dlppb.CustomInfoType_DetectionRule_HotwordRule{\n\t\tHotwordRegex: &dlppb.CustomInfoType_Regex{\n\t\t\tPattern: hotwordRegexPattern,\n\t\t},\n\t\tProximity: proximity,\n\t\tLikelihoodAdjustment: likelihoodAdjustment,\n\t}\n\n\t// Construct rule set for the inspect config.\n\tinspectionRuleSet := &dlppb.InspectionRuleSet{\n\t\tInfoTypes: infoTypes,\n\t\tRules: []*dlppb.InspectionRule{\n\t\t\t{\n\t\t\t\tType: &dlppb.InspectionRule_HotwordRule{\n\t\t\t\t\tHotwordRule: hotwordRule,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\t// Construct the configuration for the Inspect request.\n\tconfig := &dlppb.InspectConfig{\n\t\tIncludeQuote: true,\n\t\tInfoTypes: infoTypes,\n\t\tMinLikelihood: dlppb.Likelihood_POSSIBLE,\n\t\tRuleSet: []*dlppb.InspectionRuleSet{\n\t\t\tinspectionRuleSet,\n\t\t},\n\t}\n\n\t// Construct the Inspect request to be sent by the client.\n\treq := &dlppb.InspectContentRequest{\n\t\tParent: fmt.Sprintf(\"projects/%s/locations/global\", projectID),\n\t\tItem: &dlppb.ContentItem{\n\t\t\tDataItem: contentItem,\n\t\t},\n\t\tInspectConfig: config,\n\t}\n\t// Send the request.\n\tresp, err := client.InspectContent(ctx, req)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Parse the response and process results.\n\tfmt.Fprintf(w, \"Findings: %v\\n\", len(resp.Result.Findings))\n\tfor _, v := range resp.GetResult().Findings {\n\t\tfmt.Fprintf(w, \"Quote: %v\\n\", v.GetQuote())\n\t\tfmt.Fprintf(w, \"Infotype Name: %v\\n\", v.GetInfoType().GetName())\n\t\tfmt.Fprintf(w, \"Likelihood: %v\\n\", v.GetLikelihood())\n\t}\n\treturn nil\n}", "func (w *workTally) Print() {\n\ttable := tablewriter.NewWriter(os.Stdout)\n\ttable.SetHeader([]string{\"Issue ID\", \"Summary\", \"Time Spent\"})\n\ttable.SetFooter([]string{\"\", \"Total\", w.total.String()})\n\ttable.SetBorder(false)\n\tfor _, key := range w.sortedKeys() {\n\t\tentry := w.durationMap[key]\n\t\ttable.Append([]string{\n\t\t\tkey,\n\t\t\ttruncateString(entry.summary, 64),\n\t\t\tentry.duration.String(),\n\t\t})\n\t}\n\tfmt.Println(\"\")\n\ttable.Render()\n}", "func printTable() {\n\trows, err := db.Query(\"SELECT id, VideoTitle, DownloadStatus, Activity, ErrorMsg, Timestamp FROM vlog\")\n\terrorHandler(err)\n\n\tvar id int\n\tvar VideoTitle, DownloadStatus, ErrorMsg, Activity, Timestamp string\n\n\tfor rows.Next() {\n\t\trows.Scan(&id, &VideoTitle, &DownloadStatus, &Activity, &ErrorMsg, &Timestamp)\n\t\tfmt.Println(strconv.Itoa(id) + \": \" + VideoTitle + \" \" + DownloadStatus + \" \" + Activity + \" \" + ErrorMsg + \" \" + Timestamp)\n\t}\n}", "func RenderStatusTable(writer io.Writer, steps []*tmv1beta1.StepStatus) {\n\torderSteps(steps)\n\n\ttable := tablewriter.NewWriter(writer)\n\ttable.SetHeader([]string{\"Name\", \"Step\", \"Phase\", \"Duration\"})\n\n\ttable.AppendBulk(GetStatusTableRows(steps))\n\ttable.Render()\n}", "func exercise1() {\n\tfmt.Println(\"exercise1\")\n\tfmt.Printf(\"%10s | %8s | %8s | %8s | %8s\\n\",\n\t\t\"Name\", \"Score 1\", \"Score 2\", \"Score 3\", \"Average\")\n\tfmt.Println(\"------------------------------------------------------\")\n\tscoreSummary(\"Jermaine\", 95.4, 82.3, 74.6)\n\tscoreSummary(\"Jessie\", 79.3, 99.1, 82.5)\n\tscoreSummary(\"Lamar\", 82.2, 95.4, 77.6)\n}", "func RenderStatsNoUI(uiView View, timeframe int) {\n\t// Called at every refresh ticker,\n\tfmt.Printf(\"Stats refreshed for %v timeframe :\\n\", uiView.TimeframeRepr[timeframe])\n\tvar urlStatistic *statistics.Statistic\n\tfor _, url := range uiView.Urls {\n\t\turlStatistic = uiView.URLStatistics[url][timeframe]\n\t\tfmt.Printf(\"\\tWebsite : %v\\n\", Shorten(url))\n\t\tfmt.Printf(\"\\t\\tAverage : %.0f\\n\", urlStatistic.Average())\n\t\tfmt.Printf(\"\\t\\tMax : %v\\n\", urlStatistic.MaxResponseTime())\n\t\tfmt.Printf(\"\\t\\tAvailability : %.0f%%\\n\", urlStatistic.Availability()*100.0)\n\t\tfmt.Println(\"\\t\\t\" + StatusCodeMapToString(urlStatistic.StatusCodeCount))\n\t}\n}", "func ShowPRs(name string, prds []*stats.PullRequestDetails, withDescription bool) {\n\tif len(prds) == 0 {\n\t\treturn\n\t}\n\tfmt.Printf(\"\\n### %s Enhancements\\n\", name)\n\n\tfmt.Printf(\"\\n*&lt;PR ID&gt;: (activity this week / total activity) summary*\\n\")\n\n\tif len(prds) == 1 {\n\t\tfmt.Printf(\"\\nThere was 1 %s pull request:\\n\\n\", name)\n\t} else {\n\t\tfmt.Printf(\"\\nThere were %d %s pull requests:\\n\\n\", len(prds), name)\n\t}\n\tfor _, prd := range prds {\n\t\tauthor := \"\"\n\t\tif prd.Pull.User != nil {\n\t\t\tfor _, option := range []*string{prd.Pull.User.Name, prd.Pull.User.Login} {\n\t\t\t\tif option != nil {\n\t\t\t\t\tauthor = *option\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tgroup, isEnhancement, err := enhancements.GetGroup(*prd.Pull.Number)\n\t\tif err != nil {\n\t\t\tfmt.Fprintf(os.Stderr, \"WARNING: failed to get group of PR %d: %s\\n\",\n\t\t\t\t*prd.Pull.Number, err)\n\t\t\tgroup = \"uncategorized\"\n\t\t}\n\n\t\tgroupPrefix := fmt.Sprintf(\"%s: \", group)\n\t\tif strings.HasPrefix(*prd.Pull.Title, groupPrefix) {\n\t\t\t// avoid redundant group prefix\n\t\t\tgroupPrefix = \"\"\n\t\t}\n\n\t\ttitle := enhancements.CleanTitle(*prd.Pull.Title)\n\n\t\tfmt.Printf(\"- [%d](%s): (%d/%d) %s%s (%s)\\n\",\n\t\t\t*prd.Pull.Number,\n\t\t\t*prd.Pull.HTMLURL,\n\t\t\tprd.RecentActivityCount,\n\t\t\tprd.AllActivityCount,\n\t\t\tgroupPrefix,\n\t\t\ttitle,\n\t\t\tauthor,\n\t\t)\n\t\tif withDescription {\n\t\t\tvar summary string\n\t\t\tif isEnhancement {\n\t\t\t\tsummary, err = enhancements.GetSummary(*prd.Pull.Number)\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Fprintf(os.Stderr, \"WARNING: failed to get summary of PR %d: %s\\n\",\n\t\t\t\t\t\t*prd.Pull.Number, err)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tif prd.Pull.Body != nil {\n\t\t\t\t\tsummary = *prd.Pull.Body\n\t\t\t\t}\n\t\t\t}\n\t\t\tif summary != \"\" {\n\t\t\t\tfmt.Printf(\"\\n%s\\n\\n\", formatDescription(summary, descriptionIndent))\n\t\t\t}\n\t\t}\n\t}\n}", "func pretty(c ResultChunk, snap *mockstore.Snapshot) string {\n\tformatKID := func(kid uint64) string {\n\t\txid := snap.ExternalID(kid)\n\t\treturn fmt.Sprintf(\"#%d:%s\", kid, xid)\n\t}\n\ts := strings.Builder{}\n\tfor rowIdx, row := range c.Facts {\n\t\tfor _, f := range row.Facts {\n\t\t\tfmtObj := f.Object.String()\n\t\t\tif f.Object.IsType(rpc.KtKID) {\n\t\t\t\tfmtObj = formatKID(f.Object.ValKID())\n\t\t\t}\n\t\t\tfmt.Fprintf(&s, \"row:%3d subject:%-20s predicate:%-20s object:%-20s\\n\",\n\t\t\t\trowIdx, formatKID(f.Subject), formatKID(f.Predicate), fmtObj)\n\t\t}\n\t\ts.WriteByte('\\n')\n\t}\n\treturn s.String()\n}" ]
[ "0.54133934", "0.52223605", "0.5079302", "0.49928555", "0.49154523", "0.48659167", "0.48610547", "0.48326147", "0.47588196", "0.47471067", "0.47334325", "0.4728389", "0.4723114", "0.46884465", "0.46614045", "0.4648578", "0.46359795", "0.4628921", "0.46136716", "0.45937616", "0.45901197", "0.45771348", "0.45595014", "0.45467275", "0.45446616", "0.45446146", "0.45362923", "0.4521505", "0.450889", "0.45030063", "0.4502973", "0.44939125", "0.4489944", "0.44887644", "0.44593638", "0.4457915", "0.4453376", "0.44477895", "0.44377726", "0.4437655", "0.4435136", "0.44268754", "0.44260547", "0.44260067", "0.4423233", "0.4422225", "0.44206905", "0.44071224", "0.44008547", "0.43894672", "0.4385555", "0.4380867", "0.43747634", "0.43621093", "0.43559054", "0.43559054", "0.43505266", "0.4330456", "0.43151972", "0.4305833", "0.43036124", "0.4275036", "0.42666182", "0.42607746", "0.42603067", "0.42588943", "0.42570674", "0.4253608", "0.42510986", "0.42485857", "0.42480308", "0.4237758", "0.4234154", "0.423402", "0.42326704", "0.4228544", "0.4225942", "0.42207345", "0.42130584", "0.42103586", "0.42045566", "0.4201793", "0.42014953", "0.42007235", "0.41892412", "0.4180194", "0.41781643", "0.41724333", "0.41601035", "0.41571367", "0.41486034", "0.41457853", "0.4145098", "0.41396978", "0.4138181", "0.41301823", "0.4115236", "0.4109716", "0.41042358", "0.4100191" ]
0.5804883
0
ruled base access control
func rbacConfig() *any.Any { conf := &filterNetworkRbac.RBAC{ StatPrefix: "ip_restrictions.", Rules: &rbac.RBAC{ Action: rbac.RBAC_ALLOW, Policies: map[string]*rbac.Policy{ "allow_host": { Permissions: []*rbac.Permission{{ Rule: &rbac.Permission_Any{Any: true}, }}, Principals: []*rbac.Principal{{ Identifier: &rbac.Principal_SourceIp{SourceIp: &core.CidrRange{ AddressPrefix: "1.1.1.1", PrefixLen: &wrappers.UInt32Value{Value: 16}, }}, }}, }, }, }, } rbacConf, err := ptypes.MarshalAny(conf) if err != nil { panic(err) } return rbacConf }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (m *publicAuth) ValidResAccess(pathArr []string, c *gin.Context) bool {\n\tvar userName string\n\tsession := sessions.Default(c)\n\trole := session.Get(\"role\")\n\tpathStr := c.Request.URL.Path\n\tmethod := c.Request.Method\n\n\t//admin have full privilege\n\tif nil != role {\n\t\tirole := role.(string)\n\t\tif \"1\" == irole {\n\t\t\treturn true\n\t\t}\n\t}\n\tiuserName := session.Get(common.WEBSessionUinKey)\n\tif nil == iuserName {\n\t\tblog.Error(\"user name error\")\n\t\treturn false\n\t}\n\n\tuserName = iuserName.(string)\n\n\t//index page or static page\n\tif 0 == len(pathArr) || \"\" == pathArr[1] || \"static\" == pathArr[1] {\n\t\treturn true\n\t}\n\n\t//valid privilege url must match session\n\tif strings.Contains(pathStr, types.BK_CC_PRIVI_PATTERN) {\n\t\tif pathArr[len(pathArr)-1] == userName {\n\t\t\treturn true\n\t\t}\n\t\tblog.Error(\"privilege user name error\")\n\t\treturn false\n\t}\n\t//search classfication return true\n\tif strings.Contains(pathStr, types.BK_CC_CLASSIFIC) && method == common.HTTPSelectPost {\n\t\treturn true\n\t}\n\n\t//search object attr return true\n\tif strings.Contains(pathStr, types.BK_CC_OBJECT_ATTR) && method == common.HTTPSelectPost {\n\t\treturn true\n\t}\n\n\t//usercustom return true\n\tif strings.Contains(pathStr, types.BK_CC_USER_CUSTOM) {\n\t\treturn true\n\t}\n\n\t//objectatt group return true\n\tif strings.Contains(pathStr, types.BK_OBJECT_ATT_GROUP) {\n\t\treturn true\n\t}\n\n\t//favorites return true\n\tif strings.Contains(pathStr, types.BK_CC_HOST_FAVORITES) {\n\t\treturn true\n\t}\n\n\t//search object return true\n\tif types.ObjectPatternRegexp.MatchString(pathStr) {\n\t\treturn true\n\t}\n\n\t//biz search privilege, return true\n\tif strings.Contains(pathStr, types.BK_APP_SEARCH) || strings.Contains(pathStr, types.BK_SET_SEARCH) || strings.Contains(pathStr, types.BK_MODULE_SEARCH) || strings.Contains(pathStr, types.BK_INST_SEARCH) || strings.Contains(pathStr, types.BK_HOSTS_SEARCH) {\n\t\treturn true\n\t}\n\tif strings.Contains(pathStr, types.BK_HOSTS_SNAP) || strings.Contains(pathStr, types.BK_HOSTS_HIS) {\n\t\treturn true\n\t}\n\tif strings.Contains(pathStr, types.BK_TOPO_MODEL) {\n\t\treturn true\n\t}\n\tif strings.Contains(pathStr, types.BK_INST_SEARCH_OWNER) && strings.Contains(pathStr, types.BK_OBJECT_PLAT) {\n\t\treturn true\n\t}\n\tif types.SearchPatternRegexp.MatchString(pathStr) {\n\t\treturn true\n\t}\n\tif strings.Contains(pathStr, types.BK_INST_ASSOCIATION_TOPO_SEARCH) {\n\t\treturn true\n\t}\n\tif strings.Contains(pathStr, types.BK_INST_ASSOCIATION_OWNER_SEARCH) {\n\t\treturn true\n\t}\n\t//valid resource config\n\tif types.ResPatternRegexp.MatchString(pathStr) {\n\t\tblog.Debug(\"valid resource config: %v\", pathStr)\n\t\tsysPrivi := session.Get(\"sysPrivi\")\n\t\treturn validSysConfigPrivi(sysPrivi, types.BK_CC_RESOURCE)\n\n\t}\n\n\t//valid inst privilege op\n\tif strings.Contains(pathStr, types.BK_INSTS) && !strings.Contains(pathStr, types.BK_TOPO) {\n\t\test := c.GetHeader(common.BKAppIDField)\n\t\tif \"\" == est {\n\t\t\t//common inst op valid\n\t\t\tmodelPrivi := session.Get(\"modelPrivi\").(string)\n\t\t\tif 0 == len(modelPrivi) {\n\t\t\t\tblog.Error(\"get model privilege json error\")\n\t\t\t\treturn false\n\t\t\t}\n\t\t\treturn validModelConfigPrivi(modelPrivi, method, pathArr)\n\t\t} else {\n\t\t\t//mainline inst op valid\n\t\t\tvar objName string\n\t\t\tvar mainLineObjIDArr []string\n\t\t\tif method == common.HTTPCreate {\n\t\t\t\tobjName = pathArr[len(pathArr)-1]\n\t\t\t} else {\n\t\t\t\tobjName = pathArr[len(pathArr)-2]\n\t\t\t}\n\t\t\tmainLineObjIDStr := session.Get(\"mainLineObjID\").(string)\n\t\t\terr := json.Unmarshal([]byte(mainLineObjIDStr), &mainLineObjIDArr)\n\t\t\tif nil != err {\n\t\t\t\tblog.Error(\"get main line object id array false\")\n\t\t\t\treturn false\n\t\t\t}\n\t\t\tif util.InStrArr(mainLineObjIDArr, objName) {\n\t\t\t\t//goo main line common object valid\n\t\t\t\tgoto appvalid\n\t\t\t}\n\n\t\t}\n\n\t\tblog.Error(\"valid inst error\")\n\t\treturn false\n\n\t}\n\n\t//valid inst import privilege\n\tif strings.Contains(pathStr, types.BK_INSTSI) && !strings.Contains(pathStr, types.BK_IMPORT) {\n\t\test := c.GetHeader(common.BKAppIDField)\n\t\tif \"\" == est {\n\t\t\tmodelPrivi := session.Get(\"modelPrivi\").(string)\n\t\t\tif 0 == len(modelPrivi) {\n\t\t\t\tblog.Error(\"get model privilege json error\")\n\t\t\t\treturn false\n\t\t\t}\n\t\t\treturn validInstsOpPrivi(modelPrivi, method, pathArr)\n\t\t}\n\t\tblog.Error(\"valid inst error\")\n\t\treturn false\n\n\t}\n\n\tif len(pathArr) > 3 {\n\t\t//valid system config exclude resource\n\t\tpath3 := pathArr[3]\n\t\tif util.InArray(path3, types.BK_CC_MODEL_PRE) {\n\t\t\t//only admin config model privilege\n\t\t\tif \"1\" == role {\n\t\t\t\treturn true\n\t\t\t} else {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\t\tif util.InArray(path3, types.BK_CC_EVENT_PRE) {\n\t\t\t//valid event config privilege\n\t\t\tsysPrivi := session.Get(\"sysPrivi\")\n\t\t\treturn validSysConfigPrivi(sysPrivi, types.BK_CC_EVENT)\n\t\t}\n\t\tif util.InArray(path3, types.BK_CC_AUDIT_PRE) {\n\t\t\t//valid event config privilege\n\t\t\treturn true\n\t\t\t//\t\t\tsysPrivi := session.Get(\"sysPrivi\")\n\t\t\t//\t\t\treturn validSysConfigPrivi(sysPrivi, BK_CC_AUDIT)\n\t\t}\n\n\t}\n\n\t//valid biz operation privilege\nappvalid:\n\treturn validAppConfigPrivi(c, method, pathStr)\n\n}", "func (c *Command) canAccess(r *http.Request, user *userState) accessResult {\n\tif c.AdminOnly && (c.UserOK || c.GuestOK || c.UntrustedOK) {\n\t\tlogger.Panicf(\"internal error: command cannot have AdminOnly together with any *OK flag\")\n\t}\n\n\tif user != nil && !c.AdminOnly {\n\t\t// Authenticated users do anything not requiring explicit admin.\n\t\treturn accessOK\n\t}\n\n\t// isUser means we have a UID for the request\n\tisUser := false\n\tpid, uid, socket, err := ucrednetGet(r.RemoteAddr)\n\tif err == nil {\n\t\tisUser = true\n\t} else if err != errNoID {\n\t\tlogger.Noticef(\"unexpected error when attempting to get UID: %s\", err)\n\t\treturn accessForbidden\n\t}\n\n\tisUntrusted := (socket == c.d.untrustedSocketPath)\n\n\t_ = pid\n\t_ = uid\n\n\tif isUntrusted {\n\t\tif c.UntrustedOK {\n\t\t\treturn accessOK\n\t\t}\n\t\treturn accessUnauthorized\n\t}\n\n\t// the !AdminOnly check is redundant, but belt-and-suspenders\n\tif r.Method == \"GET\" && !c.AdminOnly {\n\t\t// Guest and user access restricted to GET requests\n\t\tif c.GuestOK {\n\t\t\treturn accessOK\n\t\t}\n\n\t\tif isUser && c.UserOK {\n\t\t\treturn accessOK\n\t\t}\n\t}\n\n\t// Remaining admin checks rely on identifying peer uid\n\tif !isUser {\n\t\treturn accessUnauthorized\n\t}\n\n\tif uid == 0 || sys.UserID(uid) == sysGetuid() {\n\t\t// Superuser and process owner can do anything.\n\t\treturn accessOK\n\t}\n\n\tif c.AdminOnly {\n\t\treturn accessUnauthorized\n\t}\n\n\treturn accessUnauthorized\n}", "func (r *REST) isAllowed(user user.Info, sar *authorizationapi.SubjectAccessReview) error {\n\tvar localSARAttributes kauthorizer.AttributesRecord\n\t// if they are running a personalSAR, create synthentic check for selfSAR\n\tif authorizer.IsPersonalAccessReviewFromSAR(sar) {\n\t\tlocalSARAttributes = kauthorizer.AttributesRecord{\n\t\t\tUser: user,\n\t\t\tVerb: \"create\",\n\t\t\tNamespace: sar.Action.Namespace,\n\t\t\tAPIGroup: \"authorization.k8s.io\",\n\t\t\tResource: \"selfsubjectaccessreviews\",\n\t\t\tResourceRequest: true,\n\t\t}\n\t} else {\n\t\tlocalSARAttributes = kauthorizer.AttributesRecord{\n\t\t\tUser: user,\n\t\t\tVerb: \"create\",\n\t\t\tNamespace: sar.Action.Namespace,\n\t\t\tResource: \"localsubjectaccessreviews\",\n\t\t\tResourceRequest: true,\n\t\t}\n\t}\n\n\tauthorized, reason, err := r.authorizer.Authorize(localSARAttributes)\n\n\tif err != nil {\n\t\treturn kapierrors.NewForbidden(authorization.Resource(localSARAttributes.GetResource()), localSARAttributes.GetName(), err)\n\t}\n\tif authorized != kauthorizer.DecisionAllow {\n\t\tforbiddenError := kapierrors.NewForbidden(authorization.Resource(localSARAttributes.GetResource()), localSARAttributes.GetName(), errors.New(\"\") /*discarded*/)\n\t\tforbiddenError.ErrStatus.Message = reason\n\t\treturn forbiddenError\n\t}\n\n\treturn nil\n}", "func baseDispatcher(res http.ResponseWriter, req *http.Request) {\n\tsession, err := SessionStore().Get(req, S_PROXY)\n\tif err != nil {\n\t\thttp.Error(res, \"baseDispatcher#1\"+err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tuser := session.Values[\"user\"]\n\tredirect := session.Values[\"redirect\"]\n\tage := session.Options.MaxAge\n\tif age > -1 && user != nil && redirect != nil {\n\t\tdispatch(redirect.(string), res, req)\n\t} else {\n\t\tif isStealth {\n\t\t\treturn\n\t\t}\n\t\thttp.Error(res, \"\", http.StatusMovedPermanently)\n\t\treturn\n\t}\n}", "func (s *Service) Permit(c context.Context, username string, rule string) (err error) {\n\tfor _, man := range s.c.Superman {\n\t\tif username == man {\n\t\t\treturn\n\t\t}\n\t}\n\tusr := &user.User{}\n\tif err = s.DB.Where(\"username=?\", username).First(usr).Error; err != nil {\n\t\tlog.Error(\"s.DB.User(%s) user error(%v)\", username, err)\n\t\terr = ecode.AccessDenied\n\t\treturn\n\t}\n\tif user.Rules[rule].Permit == user.PermitDefault {\n\t\treturn\n\t}\n\tcnt := 0\n\tif err = s.DB.Model(&user.Rule{}).Where(\"user_id=? AND rule=?\", usr.ID, rule).Count(&cnt).Error; err != nil {\n\t\tlog.Error(\"s.DB.User(%s) count error(%v)\", username, err)\n\t\terr = ecode.AccessDenied\n\t\treturn\n\t}\n\tif cnt == 0 {\n\t\tlog.Warn(\"s.DB.User(%s) count=0\", username)\n\t\terr = ecode.AccessDenied\n\t}\n\treturn\n}", "func (s *server) can(name upspin.PathName, right access.Right) (bool, error) {\n\tp, err := path.Parse(name)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\tvar accessEntry *upspin.DirEntry\n\n\t// Creating/Deleting a root is special, don't even bother with\n\t// WhichAccess.\n\tif p.NElem() > 0 {\n\t\t// Talk to myself to determine which Access to use.\n\t\taccessEntry, err = s.WhichAccess(name)\n\t\tif err != nil {\n\t\t\tif err != upspin.ErrFollowLink {\n\t\t\t\treturn false, err\n\t\t\t}\n\t\t\t// Put or Delete Access for a link is the same as for\n\t\t\t// its containing directory.\n\t\t\taccessEntry, err = s.WhichAccess(p.Drop(1).Path())\n\t\t\tif err != nil {\n\t\t\t\treturn false, err\n\t\t\t}\n\t\t}\n\t}\n\tif accessEntry == nil {\n\t\t// No Access file. If this is the owner,\n\t\t// allow any access, otherwise no access.\n\t\tif p.User() != s.uncachedCfg.UserName() {\n\t\t\treturn false, errors.E(\"not owner\")\n\t\t}\n\t\treturn true, nil\n\t}\n\n\t// Get a parsed version of it.\n\tacc, err := s.readAndParseAccess(accessEntry)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\t// Can we access?\n\treturn acc.Can(s.uncachedCfg.UserName(), right, name, s.loadThroughCache)\n}", "func PermissionProxy(in interface{}, out interface{}) {\n\tra := reflect.ValueOf(in)\n\touts := proxy.GetInternalStructs(out)\n\tfor _, out := range outs {\n\t\trint := reflect.ValueOf(out).Elem()\n\t\tfor i := 0; i < ra.NumMethod(); i++ {\n\t\t\tmethodName := ra.Type().Method(i).Name\n\t\t\tfield, exists := rint.Type().FieldByName(methodName)\n\t\t\tif !exists {\n\t\t\t\t// log.Printf(\"exclude method %s from fullNode\", methodName)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\trequiredPerm := field.Tag.Get(\"perm\")\n\t\t\tif requiredPerm == \"\" {\n\t\t\t\tpanic(\"missing 'perm' tag on \" + field.Name) // ok\n\t\t\t}\n\t\t\tcurule := defaultRule()\n\t\t\tcurule.Perm = requiredPerm\n\n\t\t\tfn := ra.Method(i)\n\t\t\trint.FieldByName(methodName).Set(reflect.MakeFunc(field.Type, func(args []reflect.Value) (results []reflect.Value) {\n\t\t\t\tctx := args[0].Interface().(context.Context)\n\t\t\t\terrNum := 0\n\t\t\t\tif !auth.HasPerm(ctx, defaultPerms, curule.Perm) {\n\t\t\t\t\terrNum++\n\t\t\t\t\tgoto ABORT\n\t\t\t\t}\n\t\t\t\treturn fn.Call(args)\n\t\t\tABORT:\n\t\t\t\terr := xerrors.Errorf(\"missing permission to invoke '%s'\", methodName)\n\t\t\t\tif errNum&1 == 1 {\n\t\t\t\t\terr = xerrors.Errorf(\"%s (need '%s')\", err, curule.Perm)\n\t\t\t\t}\n\t\t\t\trerr := reflect.ValueOf(&err).Elem()\n\t\t\t\tif fn.Type().NumOut() == 2 {\n\t\t\t\t\treturn []reflect.Value{\n\t\t\t\t\t\treflect.Zero(fn.Type().Out(0)),\n\t\t\t\t\t\trerr,\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\treturn []reflect.Value{rerr}\n\t\t\t}))\n\t\t}\n\t}\n\n}", "func (a Authz) CheckAuthz(w http.ResponseWriter, r * http.Request){\n\tw.Header().Set(\"Content-type\",\"applicaiton/json\")\n\t\n\trequest := SubjectAccessReview{}\n\tresponse :=SubjectAccessReview{}\n\t_ = json.NewDecoder(r.Body).Decode(&request)//Retrieve body\n\tusername := request.Spec.User \n\tgroups := request.Spec.Groups\n\taction := request.Spec.ResourceAttributes.Verb\n\tlog.Println(\"REQUEST : \",request)\n\t\n if(request.Spec.ResourceAttributes.Namespace == \"webhook\"){\n\t\tif (contains(groups,\"admin\")){// admin can do anything\n\t\t\tresponse.Status.Allowed = true\n\t\t}else if (contains(groups,\"dev\")){\n\t\t\tif (action != \"get\" && action != \"list\"){ //dev can read data only\n\t\t\t\tresponse.Status.Allowed = false\n\t\t\t}else{\n\t\t\t\tresponse.Status.Allowed = true\n\t\t\t}\n\t\t}else{\n\t\t\tresponse.Status.Allowed = false\n\t\t}\n\t\tlog.Printf(\"%s in group %s perform %s on resource %s is allowed == \",username,groups,action,request.Spec.ResourceAttributes.Resource,response.Status.Allowed)\n\t}else{\n\t\tresponse.Status.Allowed = false\n\t}\n\tw.Header().Set(\"Content-type\",\"application/json\")\n\tjson.NewEncoder(w).Encode(response)\n\n}", "func CheckAccess(permissionGroup string, hasRole string, makerChecker bool, requestedMethod string, requestedEndpoint string) (bool, error) {\n\n\tp := authPermissions.Permissions()\n\t// permissionsByte, err := ioutil.ReadFile(\"../permissions.json\")\n\tvar permissions Permissions\n\t// if err != nil {\n\t// \tpanic(err)\n\t// }\n\terr := json.Unmarshal([]byte(p), &permissions)\n\t// fmt.Print(string(permissionsByte))\n\n\tif err != nil {\n\t\tLOGGER.Error(\"Error while parsing JSON\")\n\t\treturn false, errors.New(\"not authorized, no matching permissions\")\n\t}\n\n\tif permissionGroup == \"Jwt\" {\n\n\t\t// endpoints requiring JWT\n\t\t// fmt.Print(\"\\n\\n\" + requestedMethod + \" | jwt endpoints:\\n\")\n\t\tjwtEndp := permissions.Permissions.Jwt.Default.Method[requestedMethod].Endpoint\n\t\tfor key, value := range jwtEndp {\n\t\t\t// fmt.Println(key+\" - Allow: \", value.Role.Allow)\n\t\t\tif hasRole == \"allow\" && value.Role.Allow == true && authutility.ComparePaths(key, requestedEndpoint) {\n\t\t\t\t// fmt.Println(\"Permissions Succeeded! \"+key+\" - Allow: \", value.Role.Allow)\n\t\t\t\treturn true, nil\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif permissionGroup == \"Super_permissions\" && makerChecker == false {\n\n\t\t// super user endpoints\n\t\t// fmt.Print(\"\\n\\n\" + requestedMethod + \" | super user endpoints:\\n\")\n\t\tsuperEndpDef := permissions.Permissions.Super_permissions.Default.Method[requestedMethod].Endpoint\n\t\tfor key, value := range superEndpDef {\n\t\t\t// fmt.Println(key+\" - Admin: \", value.Role.Admin)\n\t\t\t// fmt.Println(key+\" - Manager: \", value.Role.Manager)\n\t\t\tif hasRole == \"admin\" && value.Role.Admin == true && authutility.ComparePaths(key, requestedEndpoint) {\n\t\t\t\t// fmt.Println(\"\\nPermissions Succeeded! \"+key+\" - Admin: \", value.Role.Admin)\n\t\t\t\treturn true, nil\n\t\t\t}\n\t\t\tif hasRole == \"manager\" && value.Role.Manager == true && authutility.ComparePaths(key, requestedEndpoint) {\n\t\t\t\t// fmt.Println(\"\\nPermissions Succeeded! \"+key+\" - Manager: \", value.Role.Manager)\n\t\t\t\treturn true, nil\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif permissionGroup == \"Super_permissions\" && makerChecker == true {\n\n\t\t// super user endpoints requiring maker/checker\n\t\t// fmt.Print(\"\\n\\n\" + requestedMethod + \" | super user + maker/checker endpoints:\\n\")\n\t\tsuperEndpMC := permissions.Permissions.Super_permissions.Maker_checker.Method[requestedMethod].Endpoint\n\t\tfor key, value := range superEndpMC {\n\t\t\t// fmt.Println(key+\" - Admin: \", value.Role.Admin)\n\t\t\t// fmt.Println(key+\" - Manager: \", value.Role.Manager)\n\t\t\tif hasRole == \"admin\" && value.Role.Admin == true && authutility.ComparePaths(key, requestedEndpoint) {\n\t\t\t\t// fmt.Println(\"\\nPermissions Succeeded! \"+key+\" - Admin: \", value.Role.Admin)\n\t\t\t\treturn true, nil\n\t\t\t}\n\t\t\tif hasRole == \"manager\" && value.Role.Manager == true && authutility.ComparePaths(key, requestedEndpoint) {\n\t\t\t\t// fmt.Println(\"\\nPermissions Succeeded! \"+key+\" - Manager: \", value.Role.Manager)\n\t\t\t\treturn true, nil\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif permissionGroup == \"Participant_permissions\" && makerChecker == false {\n\n\t\t// participant user endpoints\n\t\t// fmt.Print(\"\\n\\n\" + requestedMethod + \" | participant endpoints:\\n\")\n\t\tparticipantEndpDef := permissions.Permissions.Participant_permissions.Default.Method[requestedMethod].Endpoint\n\t\tfor key, value := range participantEndpDef {\n\t\t\t// fmt.Println(key+\" - Admin: \", value.Role.Admin)\n\t\t\t// fmt.Println(key+\" - Manager: \", value.Role.Manager)\n\t\t\tif hasRole == \"admin\" && value.Role.Admin == true && authutility.ComparePaths(key, requestedEndpoint) {\n\t\t\t\t// fmt.Println(\"\\nPermissions Succeeded! \"+key+\" - Admin: \", value.Role.Admin)\n\t\t\t\treturn true, nil\n\t\t\t}\n\t\t\tif hasRole == \"manager\" && value.Role.Manager == true && authutility.ComparePaths(key, requestedEndpoint) {\n\t\t\t\t// fmt.Println(\"\\nPermissions Succeeded! \"+key+\" - Manager: \", value.Role.Manager)\n\t\t\t\treturn true, nil\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif permissionGroup == \"Participant_permissions\" && makerChecker == true {\n\n\t\t// participant user endpoints requiring maker/checker\n\t\t// fmt.Print(\"\\n\\n\" + requestedMethod + \" | participant + maker/checker endpoints:\\n\")\n\t\tparticipantEndpMC := permissions.Permissions.Participant_permissions.Maker_checker.Method[requestedMethod].Endpoint\n\t\tfor key, value := range participantEndpMC {\n\t\t\t// fmt.Println(key+\" - Admin: \", value.Role.Admin)\n\t\t\t// fmt.Println(key+\" - Manager: \", value.Role.Manager)\n\t\t\tif hasRole == \"admin\" && value.Role.Admin == true && authutility.ComparePaths(key, requestedEndpoint) {\n\t\t\t\t// fmt.Println(\"\\nPermissions Succeeded! \"+key+\" - Admin: \", value.Role.Admin)\n\t\t\t\treturn true, nil\n\t\t\t}\n\t\t\tif hasRole == \"manager\" && value.Role.Manager == true && authutility.ComparePaths(key, requestedEndpoint) {\n\t\t\t\t// fmt.Println(\"\\nPermissions Succeeded! \"+key+\" - Manager: \", value.Role.Manager)\n\t\t\t\treturn true, nil\n\t\t\t}\n\t\t}\n\n\t}\n\n\treturn false, errors.New(\"not authorized, no matching permissions\")\n\n}", "func RBACCheck(group, permission string) Interceptor {\n\n\t// Create a new Middleware\n\treturn func(f PrizmHandler) PrizmHandler {\n\n\t\t// Define the http.HandlerFunc\n\t\treturn func(s *model.SessionContext, w http.ResponseWriter, r *http.Request) {\n\n\t\t\tvar isAllowed = false\n\t\t\tif group == utils.GenericMenuPermissionKey {\n\t\t\t\t// Common API no permission check...\n\t\t\t\tisAllowed = true\n\t\t\t} else {\n\t\t\t\tuserPermission := s.User.Permission\n\t\t\t\tval, ok := userPermission[group]\n\t\t\t\tif ok {\n\t\t\t\t\tisAllowed = checkPermissions(s, permission, val)\n\t\t\t\t} else {\n\t\t\t\t\tlogutil.Errorf(s, \"RBAC check failed..\"+\n\t\t\t\t\t\t\"Unable to fetch permission for group - %s permission - %v\", group, userPermission)\n\t\t\t\t}\n\t\t\t}\n\t\t\t// If not allowed then throw HTTP 403\n\t\t\tif isAllowed == false {\n\t\t\t\t// Permission and group not matching...\n\t\t\t\tlogutil.Errorf(s, \"RBAC check failed for URL - %s\", r.URL)\n\t\t\t\ts.Err = &model.AppError{Type: utils.AccessError, Message: \"Forbidden: Access is denied\", Code: http.StatusForbidden}\n\t\t\t\treturn\n\t\t\t}\n\t\t\t// Call the next middleware/handler in chain\n\t\t\tlogutil.Debugf(s, \"RBAC check passed for URL - %s\", r.URL)\n\t\t\tf(s, w, r)\n\t\t}\n\t}\n}", "func (s *sqlStore) getAccess(key string) (Access, error) {\n\taci, err := s.getACI(key)\n\tif err != nil {\n\t\tlog.Debugf(\"failed to get aci for key %s: %s\", key, err)\n\t\treturn DefaultAccess, err\n\t}\n\n\tuid := aci.Uid()\n\tgid := aci.Gid()\n\n\tif uid == -1 {\n\t\tuname, _ := aci.Uname()\n\t\tuid = int64(s.lookUpUser(uname))\n\t}\n\n\tif gid == -1 {\n\t\tgname, _ := aci.Gname()\n\t\tgid = int64(s.lookUpGroup(gname))\n\t}\n\n\tmode := uint32(aci.Mode())\n\treturn Access{\n\t\tMode: uint32(os.ModePerm) & mode,\n\t\tUID: uint32(uid),\n\t\tGID: uint32(gid),\n\t}, nil\n}", "func (c *authorizer) Admit(ctx context.Context, cx *api.Context) field.ErrorList {\n\tvar errs field.ErrorList\n\n\t// @step: decode the object into an object\n\t// @TODO there probably a better way of doing the, perhaps just passing the object??\n\terr := func() error {\n\t\tobj, err := marshal(cx.Object)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// @note: a somewhat hacky but's its due to the fact the groupkind is omitted\n\t\tif _, found := obj[\"apiVersion\"]; !found {\n\t\t\tobj[\"apiVersion\"] = fmt.Sprintf(\"%s/%s\", cx.Group.Group, cx.Group.Version)\n\t\t}\n\t\tif _, found := obj[\"kind\"]; !found {\n\t\t\tobj[\"kind\"] = cx.Group.Kind\n\t\t}\n\n\t\t// @step: create the runtime\n\t\tvm := otto.New()\n\t\tfor k, v := range c.config.Options {\n\t\t\tvm.Set(k, v)\n\t\t}\n\t\tvm.Set(\"cache\", cx.Cache)\n\t\tvm.Set(\"object\", obj)\n\n\t\tif cx.Object.GetNamespace() != \"\" {\n\t\t\t// @step: get namespace for this object\n\t\t\tnamespace, err := utils.GetCachedNamespace(cx.Client, cx.Cache, cx.Object.GetNamespace())\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tns, err := marshal(namespace)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tvm.Set(\"namespace\", ns)\n\t\t}\n\n\t\t// @step: setup some functions\n\t\tvm.Set(\"log\", func(call otto.FunctionCall) otto.Value {\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"scripts\": c.config.Name,\n\t\t\t}).Info(call.Argument(0).String())\n\n\t\t\treturn otto.Value{}\n\t\t})\n\n\t\tvm.Set(\"hasPrefix\", hasPrefix)\n\t\tvm.Set(\"hasSuffix\", hasSuffix)\n\t\tvm.Set(\"inDomain\", inDomain)\n\n\t\tvm.Set(\"deny\", func(call otto.FunctionCall) otto.Value {\n\t\t\tpath := call.Argument(0).String()\n\t\t\tmessage := call.Argument(1).String()\n\t\t\tvalue := call.Argument(2).String()\n\t\t\terrs = append(errs, field.Invalid(field.NewPath(path), value, message))\n\n\t\t\treturn otto.Value{}\n\t\t})\n\n\t\treturn c.runSafely(ctx, vm, c.config.Script, c.config.Timeout)\n\t}()\n\tif err != nil {\n\t\treturn append(errs, field.InternalError(field.NewPath(\"\"), err))\n\t}\n\n\treturn errs\n}", "func AuthAdminAccess(context *gin.Context, db int, tokenSecret string, needs []string, release bool) {\n\tif !release {\n\t\tcontext.Next()\n\t\treturn\n\t}\n\n\troles, err := GetRequestTokenRole(context, db, tokenSecret)\n\tif err != nil {\n\t\tcommon.ResponseError(context, code.SpawnErrNeedPerm())\n\t\tlog.Debug(\"authorization role access error:%+v\", err)\n\t\treturn\n\t}\n\n\tfor _, need := range needs {\n\t\tfor _, role := range roles {\n\t\t\tif strings.ToLower(need) == strings.ToLower(role) {\n\t\t\t\tgoto next\n\t\t\t}\n\t\t}\n\t}\n\n\tcommon.ResponseError(context, code.SpawnErrNeedPerm())\n\tlog.Debug(\"authorization profile access %s need access\",\n\t\tcontext.Request.RequestURI)\n\treturn\nnext:\n\tcontext.Next()\n}", "func (h *BackupHandler) requireOperPermissions(next http.Handler) http.HandlerFunc {\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\tctx := r.Context()\n\n\t\tif err := authorizer.IsAllowedAll(ctx, influxdb.OperPermissions()); err != nil {\n\t\t\th.HandleHTTPError(ctx, err, w)\n\t\t\treturn\n\t\t}\n\t\tnext.ServeHTTP(w, r)\n\t}\n\treturn http.HandlerFunc(fn)\n}", "func (mid *Middleware) AccessControl(next http.HandlerFunc) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tauth := strings.Fields(r.Header.Get(\"Authorization\"))\n\t\tif len(auth) > 1 && auth[0] == \"Bearer\" {\n\t\t\t// Found token\n\n\t\t\t// Check that token is not in redis\n\t\t\tloggedOut, _ := mid.RedisClient.ExistsKey(\"blacklist:\" + auth[1])\n\n\t\t\tif loggedOut {\n\t\t\t\tw.WriteHeader(401)\n\t\t\t\t// TODO: Change this to return a JSON object\n\t\t\t\tfmt.Fprintf(w, \"Invalid token\")\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tclaims, err := VerifyJWT(auth[1])\n\n\t\t\tif err != nil {\n\t\t\t\tw.WriteHeader(401)\n\t\t\t\t// TODO: Change this to return a JSON object\n\t\t\t\tfmt.Fprintf(w, \"Invalid token\")\n\t\t\t} else {\n\t\t\t\tuserID := claims[\"userId\"].(string)\n\t\t\t\texp := claims[\"exp\"].(float64)\n\t\t\t\texpS := strconv.FormatFloat(exp, 'E', -1, 64)\n\t\t\t\tr.Header.Add(\"uid\", userID)\n\t\t\t\tr.Header.Add(\"exp\", expS)\n\t\t\t\tr.Header.Add(\"token\", auth[1])\n\t\t\t\tnext.ServeHTTP(w, r)\n\t\t\t}\n\t\t} else {\n\t\t\tw.WriteHeader(401)\n\t\t\t// TODO: Change this to return a JSON object\n\t\t\tfmt.Fprintf(w, \"Invalid token\")\n\t\t}\n\t})\n}", "func (ace *ActiveContainerError) Forbidden() {}", "func requiresPermission(eh endpointHandler, permissionNames []string) endpointHandler {\n\tlog.Trace(\"resource/service:requiresPermission() Entering\")\n\tdefer log.Trace(\"resource/service:requiresPermission() Leaving\")\n\treturn func(w http.ResponseWriter, r *http.Request) error {\n\t\tprivileges, err := commContext.GetUserPermissions(r)\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tw.Header().Add(\"Strict-Transport-Security\", \"max-age=63072000; includeSubDomains\")\n\t\t\t_, writeErr := w.Write([]byte(\"Could not get user roles from http context\"))\n\t\t\tif writeErr != nil {\n\t\t\t\tlog.WithError(writeErr).Warn(\"resource/service:requiresPermission() Error while writing response\")\n\t\t\t}\n\t\t\tsecLog.Errorf(\"resource/service:requiresPermission() %s Roles: %v | Context: %v\", message.AuthenticationFailed, permissionNames, r.Context())\n\t\t\treturn errors.Wrap(err, \"resource/service:requiresPermission() Could not get user roles from http context\")\n\t\t}\n\t\treqPermissions := ct.PermissionInfo{Service: constants.TAServiceName, Rules: permissionNames}\n\n\t\t_, foundMatchingPermission := auth.ValidatePermissionAndGetPermissionsContext(privileges, reqPermissions,\n\t\t\ttrue)\n\t\tif !foundMatchingPermission {\n\t\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\t\tsecLog.Errorf(\"resource/service:requiresPermission() %s Insufficient privileges to access %s\", message.UnauthorizedAccess, r.RequestURI)\n\t\t\treturn &privilegeError{Message: \"Insufficient privileges to access \" + r.RequestURI, StatusCode: http.StatusUnauthorized}\n\t\t}\n\t\tw.Header().Add(\"Strict-Transport-Security\", \"max-age=63072000; includeSubDomains\")\n\t\tsecLog.Debugf(\"resource/service:requiresPermission() %s - %s\", message.AuthorizedAccess, r.RequestURI)\n\t\treturn eh(w, r)\n\t}\n}", "func AuthoriserAllowAll(id, key string) bool {\n\treturn true\n}", "func (v RightsFilter) Pre(c Context) (statusCode int, err error) {\n // 检查用户是否有权限\n conf := util.GetConfigCenterInstance()\n accessToken := c.GetProxyOuterRequest().URI().QueryArgs().Peek(\"access_token\")\n\n log.Println(\"accessToken=\"+string(accessToken))\n res, err := http.Get(conf.ConfProperties[\"oauth_center\"][\"oauth_addr\"]+\"/user/getUser?access_token=\"+ string(accessToken))\n body, _ := ioutil.ReadAll(res.Body)\n\n thriftreq := server.NewRequest()\n thriftreq.ServiceName = \"PermissionValidate\"\n thriftreq.Operation = \"validate\"\n\n params := make(map[string]interface{})\n var f = func(k []byte, v []byte) {\n params[string(k)] = string(v)\n }\n\n if nil != c.GetProxyOuterRequest().Body() {\n if err = json.Unmarshal(c.GetProxyOuterRequest().Body(), &params); nil != err {\n log.Println(\"body json parse error\")\n }\n }\n\n c.GetProxyOuterRequest().URI().QueryArgs().VisitAll(f)\n c.GetProxyOuterRequest().PostArgs().VisitAll(f)\n\n // 转化成json\n delete(params, \"access_token\")\n requestParam , _ := json.Marshal(params)\n bodyStr := string(body)\n bodyStr = bodyStr[:len(bodyStr)-1]+\",\\\"params\\\":\"+string(requestParam)+\",\\\"path\\\":\\\"\"+string(c.GetOriginRequestCtx().Path())+\"\\\"}\"\n\n println(\"bodyStr=\"+bodyStr)\n thriftreq.ParamJSON = []byte(bodyStr)\n\n Pool := thriftserver.GetPool(conf.ConfProperties[\"oauth_center\"][\"permission_thrift\"])\n pooledClient, err := Pool.Get()\n if err != nil {\n log.Println(\"Thrift pool get client error\")\n return http.StatusInternalServerError,err\n }\n\n defer Pool.Put(pooledClient, false)\n rawClient, ok := pooledClient.(*server.MyServiceClient)\n if !ok {\n log.Println(\"convert to raw client failed\")\n return http.StatusInternalServerError,errors.New(\"convert to raw client failed\")\n }\n\n println(\"thirftreq=\"+string(thriftreq.ParamJSON))\n thriftres, err := rawClient.Send(thriftreq)\n if err != nil {\n log.Println(\"处理thrift请求失败 \")\n return http.StatusInternalServerError,err\n }\n\n js, err := simplejson.NewJson(thriftres.ResponseJSON)\n thriftresValue := js.Get(\"success\")\n Checked ,_:= thriftresValue.Bool()\n\n if Checked {\n return http.StatusOK,nil\n }\n\n return http.StatusForbidden,errors.New(\"you don't have permission\")\n\n}", "func (p *DefaultPolicy) AllowAccess() bool {\n\treturn p.Effect == AllowAccess\n}", "func Restrict(roDirs, roFiles, rwDirs, rwFiles []string) error {\n\trulesetAttr := ll.RulesetAttr{\n\t\tHandledAccessFs: uint64(accessFSRoughlyRead | accessFSRoughlyWrite),\n\t}\n\tfd, err := ll.LandlockCreateRuleset(&rulesetAttr, 0)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer syscall.Close(fd)\n\n\tif err := populateRuleset(fd, roDirs, accessFSRoughlyRead); err != nil {\n\t\treturn err\n\t}\n\tif err := populateRuleset(fd, roFiles, accessFSRoughlyRead&accessFile); err != nil {\n\t\treturn err\n\t}\n\tif err := populateRuleset(fd, rwDirs, accessFSRoughlyWrite); err != nil {\n\t\treturn err\n\t}\n\tif err := populateRuleset(fd, rwFiles, accessFSRoughlyWrite&accessFile); err != nil {\n\t\treturn err\n\t}\n\n\tif err := unix.Prctl(unix.PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); err != nil {\n\t\treturn err\n\t}\n\n\tif err := ll.LandlockRestrictSelf(fd, 0); err != nil {\n\t\treturn err\n\t}\n\t// xxx enable\n\treturn nil\n}", "func (authService *AuthService) authorized(dbClient DBClient, sessionToken *apitypes.SessionToken,\n\tactionMask []bool, resourceId string) (bool, error) {\n\n\t/* Rules:\n\t\n\tA party can access a resource if the party,\n\t\thas an ACL entry for the resource; or,\n\t\tthe resource belongs to a repo or realm for which the party has an ACL entry.\n\t\n\tIn this context, a user is a party if the user is explicitly the party or if\n\tthe user belongs to a group that is explicitly the party.\n\t\n\tGroups may not belong to other groups.\n\t\n\tThe user must have the required access mode (CreateIn, Read, Write, Exec, Delete).\n\tNo access mode implies any other access mode.\n\tThe access modes have the following meanings:\n\t\tCreateIn - The party can create resources that will be owned by the target resource.\n\t\tRead - The party can obtain the contents of the target resource.\n\t\tWrite - The party can modify the contents of the target resource.\n\t\tExec - The party can compel SafeHarbor to perform the actions specified by\n\t\t\tthe target resource (e.g., execute a Dockerfile).\n\t\tDelete - The party can Delete the target resource.\n\t*/\n\t\n\tif sessionToken == nil { return false, utilities.ConstructServerError(\"No session token\") }\n\t\n\t// Identify the user.\n\tvar userId string = sessionToken.AuthenticatedUserid\n\tfmt.Println(\"userid=\", userId)\n\tvar user User\n\tvar err error\n\tuser, err = dbClient.dbGetUserByUserId(userId)\n\tif user == nil {\n\t\treturn false, utilities.ConstructServerError(\"user object cannot be identified from user id \" + userId)\n\t}\n\t\n\t// Special case: Allow user all capabilities for their own user object.\n\tif user.getId() == resourceId { return true, nil }\n\n\t// Verify that at most one field of the actionMask is true.\n\tvar nTrue = 0\n\tfor _, b := range actionMask {\n\t\tif b {\n\t\t\tif nTrue == 1 {\n\t\t\t\treturn false, utilities.ConstructUserError(\"More than one field in mask may not be true\")\n\t\t\t}\n\t\t\tnTrue++\n\t\t}\n\t}\n\t\n\t// Check if the user or a group that the user belongs to has the permission\n\t// that is specified by the actionMask.\n\tvar party Party = user // start with the user.\n\tvar resource Resource\n\tresource, err = dbClient.getResource(resourceId)\n\tif err != nil { return false, err }\n\tif resource == nil {\n\t\treturn false, utilities.ConstructUserError(\"Resource with Id \" + resourceId + \" not found\")\n\t}\n\tvar groupIds []string = user.getGroupIds()\n\tvar groupIndex = -1\n\tfor { // the user, and then each group that the user belongs to...\n\t\t// See if the party (user or group) has an ACL entry for the resource.\n\t\tvar partyCanAccessResourceDirectoy bool\n\t\tpartyCanAccessResourceDirectoy, err =\n\t\t\tauthService.partyHasAccess(dbClient, party, actionMask, resource)\n\t\tif err != nil { return false, err }\n\t\tif partyCanAccessResourceDirectoy { return true, nil }\n\t\t\n\t\t// See if any of the party's parent resources have access.\n\t\tvar parentId string = resource.getParentId()\n\t\tif parentId != \"\" {\n\t\t\tvar parent Resource\n\t\t\tparent, err = dbClient.getResource(parentId)\n\t\t\tif err != nil { return false, err }\n\t\t\tvar parentHasAccess bool\n\t\t\tparentHasAccess, err = authService.partyHasAccess(dbClient, party, actionMask, parent)\n\t\t\tif err != nil { return false, err }\n\t\t\tif parentHasAccess { return true, nil }\n\t\t}\n\t\t\n\t\tgroupIndex++\n\t\tif groupIndex == len(groupIds) { return false, nil }\n\t\tvar err error\n\t\tparty, err = dbClient.getParty(groupIds[groupIndex]) // check next group\n\t\tif err != nil { return false, err }\n\t}\n\treturn false, nil // no access rights found\n}", "func hasAccess(rc *router.Context, next router.Handler) {\n\tc := rc.Context\n\tisMember, err := auth.IsMember(c, config.Get(c).AccessGroup)\n\tif err != nil {\n\t\tutil.ErrStatus(rc, http.StatusInternalServerError, err.Error())\n\t\treturn\n\t} else if !isMember {\n\t\turl, err := auth.LoginURL(c, rc.Request.URL.RequestURI())\n\t\tif err != nil {\n\t\t\tutil.ErrStatus(\n\t\t\t\trc, http.StatusForbidden,\n\t\t\t\t\"Access denied err:\"+err.Error())\n\t\t\treturn\n\t\t}\n\t\thttp.Redirect(rc.Writer, rc.Request, url, http.StatusFound)\n\t\treturn\n\t}\n\n\tnext(rc)\n}", "func (s *services) getAccessAllowed(\n\tw http.ResponseWriter,\n\tr *http.Request) bool {\n\terr := r.ParseForm()\n\tif err != nil {\n\t\treturnAPIError(&s.config, w, err, http.StatusInternalServerError)\n\t\treturn false\n\t}\n\tv, err := s.access.GetAllowed(r.FormValue(\"accessKey\"))\n\tif v == false || err != nil {\n\t\treturnAPIError(&s.config, w,\n\t\t\tfmt.Errorf(\"Access denied\"),\n\t\t\thttp.StatusNetworkAuthenticationRequired)\n\t\treturn false\n\t}\n\treturn true\n}", "func IsAllowedAccess(a, b int8) bool {\n\treturn a >= b\n}", "func visForAccess(r *http.Request) internal.Visibility {\n\tvis := visForBrowsing(r)\n\tif vis == internal.VisPublic {\n\t\treturn internal.VisUnlisted\n\t}\n\treturn vis\n}", "func doSetAccess(targetURL string, targetPERMS accessPerms) *probe.Error {\n\tclnt, err := newClient(targetURL)\n\tif err != nil {\n\t\treturn err.Trace(targetURL)\n\t}\n\tpolicy := accessPermToString(targetPERMS)\n\tif err = clnt.SetAccess(policy, false); err != nil {\n\t\treturn err.Trace(targetURL, string(targetPERMS))\n\t}\n\treturn nil\n}", "func TestAccessGranted(t *testing.T) {\n\trunTest(t, func(s *Session) {\n\t\ts.Handle(\"model\", res.Access(func(r res.AccessRequest) {\n\t\t\tr.AccessGranted()\n\t\t}))\n\t}, func(s *Session) {\n\t\tinb := s.Request(\"access.test.model\", nil)\n\t\ts.GetMsg(t).Equals(t, inb, json.RawMessage(`{\"result\":{\"get\":true,\"call\":\"*\"}}`))\n\t})\n}", "func (w *wrapper) Access(path string, mask uint32) int {\n\treturn -fuse.ENOSYS\n}", "func TestRessourceAccess(t *testing.T) {\n\tdb.InitDB()\n\tvar router *gin.Engine = routes.SetupRouter()\n\n\tvar user models.UserCreate = utils.CreateUser(\"Tom\", \"qwerty1234\", t, router)\n\tuser.Token = utils.ConnectUser(\"Tom\", \"qwerty1234\", t, router)\n\n\tvar url string = \"/v1/user/\" + strconv.Itoa(user.ID+1)\n\tvar bearer = \"Bearer \" + user.Token\n\trecord := httptest.NewRecorder()\n\trequest, _ := http.NewRequest(\"GET\", url, nil)\n\trequest.Header.Add(\"Content-Type\", \"application/json\")\n\trequest.Header.Add(\"Authorization\", bearer)\n\n\trouter.ServeHTTP(record, request)\n\n\tvar message Message\n\terr := json.Unmarshal([]byte(record.Body.String()), &message)\n\tif err != nil {\n\t\tlog.Fatal(\"Bad output: \", err.Error())\n\t\tt.Fail()\n\t}\n\n\tassert.Equal(t, record.Code, 403)\n\tassert.Equal(t, message.Message, \"Forbidden.\")\n\n\tutils.CleanUser(user.ID, user.Token, t, router)\n\tdb.CloseDB()\n}", "func (h *Handler) Provision(ctx caddy.Context) error {\n\th.logger = ctx.Logger(h)\n\n\tif h.DialTimeout <= 0 {\n\t\th.DialTimeout = caddy.Duration(30 * time.Second)\n\t}\n\n\th.httpTransport = &http.Transport{\n\t\tProxy: http.ProxyFromEnvironment,\n\t\tMaxIdleConns: 50,\n\t\tIdleConnTimeout: 60 * time.Second,\n\t\tTLSHandshakeTimeout: 10 * time.Second,\n\t}\n\n\t// TODO: temporary, in an effort to get the tests to pass\n\tif h.BasicauthUser != \"\" && h.BasicauthPass != \"\" {\n\t\tbasicAuthBuf := make([]byte, base64.StdEncoding.EncodedLen(len(h.BasicauthUser)+1+len(h.BasicauthPass)))\n\t\tbase64.StdEncoding.Encode(basicAuthBuf, []byte(h.BasicauthUser+\":\"+h.BasicauthPass))\n\t\th.authRequired = true\n\t\th.authCredentials = [][]byte{basicAuthBuf}\n\t}\n\n\t// access control lists\n\tfor _, rule := range h.ACL {\n\t\tfor _, subj := range rule.Subjects {\n\t\t\tar, err := newACLRule(subj, rule.Allow)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\th.aclRules = append(h.aclRules, ar)\n\t\t}\n\t}\n\tfor _, ipDeny := range []string{\n\t\t\"10.0.0.0/8\",\n\t\t\"127.0.0.0/8\",\n\t\t\"172.16.0.0/12\",\n\t\t\"192.168.0.0/16\",\n\t\t\"::1/128\",\n\t\t\"fe80::/10\",\n\t} {\n\t\tar, err := newACLRule(ipDeny, false)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\th.aclRules = append(h.aclRules, ar)\n\t}\n\th.aclRules = append(h.aclRules, &aclAllRule{allow: true})\n\n\tif h.ProbeResistance != nil {\n\t\tif !h.authRequired {\n\t\t\treturn fmt.Errorf(\"probe resistance requires authentication\")\n\t\t}\n\t\tif len(h.ProbeResistance.Domain) > 0 {\n\t\t\th.logger.Info(\"Secret domain used to connect to proxy: \" + h.ProbeResistance.Domain)\n\t\t}\n\t}\n\n\tdialer := &net.Dialer{\n\t\tTimeout: time.Duration(h.DialTimeout),\n\t\tKeepAlive: 30 * time.Second,\n\t\tDualStack: true,\n\t}\n\th.dialContext = dialer.DialContext\n\th.httpTransport.DialContext = func(ctx context.Context, network string, address string) (net.Conn, error) {\n\t\treturn h.dialContextCheckACL(ctx, network, address)\n\t}\n\n\tif h.Upstream != \"\" {\n\t\tupstreamURL, err := url.Parse(h.Upstream)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"bad upstream URL: %v\", err)\n\t\t}\n\t\th.upstream = upstreamURL\n\n\t\tif !isLocalhost(h.upstream.Hostname()) && h.upstream.Scheme != \"https\" {\n\t\t\treturn errors.New(\"insecure schemes are only allowed to localhost upstreams\")\n\t\t}\n\n\t\tregisterHTTPDialer := func(u *url.URL, _ proxy.Dialer) (proxy.Dialer, error) {\n\t\t\t// CONNECT request is proxied as-is, so we don't care about target url, but it could be\n\t\t\t// useful in future to implement policies of choosing between multiple upstream servers.\n\t\t\t// Given dialer is not used, since it's the same dialer provided by us.\n\t\t\td, err := httpclient.NewHTTPConnectDialer(h.upstream.String())\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\td.Dialer = *dialer\n\t\t\tif isLocalhost(h.upstream.Hostname()) && h.upstream.Scheme == \"https\" {\n\t\t\t\t// disabling verification helps with testing the package and setups\n\t\t\t\t// either way, it's impossible to have a legit TLS certificate for \"127.0.0.1\" - TODO: not true anymore\n\t\t\t\th.logger.Info(\"Localhost upstream detected, disabling verification of TLS certificate\")\n\t\t\t\td.DialTLS = func(network string, address string) (net.Conn, string, error) {\n\t\t\t\t\tconn, err := tls.Dial(network, address, &tls.Config{InsecureSkipVerify: true})\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn nil, \"\", err\n\t\t\t\t\t}\n\t\t\t\t\treturn conn, conn.ConnectionState().NegotiatedProtocol, nil\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn d, nil\n\t\t}\n\t\tproxy.RegisterDialerType(\"https\", registerHTTPDialer)\n\t\tproxy.RegisterDialerType(\"http\", registerHTTPDialer)\n\n\t\tupstreamDialer, err := proxy.FromURL(h.upstream, dialer)\n\t\tif err != nil {\n\t\t\treturn errors.New(\"failed to create proxy to upstream: \" + err.Error())\n\t\t}\n\n\t\tif ctxDialer, ok := upstreamDialer.(dialContexter); ok {\n\t\t\t// upstreamDialer has DialContext - use it\n\t\t\th.dialContext = ctxDialer.DialContext\n\t\t} else {\n\t\t\t// upstreamDialer does not have DialContext - ignore the context :(\n\t\t\th.dialContext = func(ctx context.Context, network string, address string) (net.Conn, error) {\n\t\t\t\treturn upstreamDialer.Dial(network, address)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func (srv *targetServiceHandler) auth(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {\n\t\tctx := httpbakery.ContextWithRequest(context.TODO(), req)\n\t\tops, err := opsForRequest(req)\n\t\tif err != nil {\n\t\t\tfail(w, http.StatusInternalServerError, \"%v\", err)\n\t\t\treturn\n\t\t}\n\t\tauthChecker := srv.checker.Auth(httpbakery.RequestMacaroons(req)...)\n\t\tif _, err = authChecker.Allow(ctx, ops...); err != nil {\n\t\t\thttpbakery.WriteError(ctx, w, srv.oven.Error(ctx, req, err))\n\t\t\treturn\n\t\t}\n\t\th.ServeHTTP(w, req)\n\t})\n}", "func forbidden(rw http.ResponseWriter, r *http.Request) {\n\n}", "func (*FileSystemBase) Access(path string, mask uint32) int {\n\treturn -ENOSYS\n}", "func TestAccess(t *testing.T) {\n\tif testing.Short() {\n\t\tt.Skip()\n\t}\n\tc := NewCtx(t)\n\tdefer c.Close()\n\n\t// entity describes pages/bugs/texts/etc.\n\ttype entity struct {\n\t\tlevel AccessLevel // level on which this entity must be visible.\n\t\tref string // a unique entity reference id.\n\t\turl string // url at which this entity can be requested.\n\t}\n\tentities := []entity{\n\t\t// Main pages.\n\t\t{\n\t\t\tlevel: AccessAdmin,\n\t\t\turl: \"/admin\",\n\t\t},\n\t\t{\n\t\t\tlevel: AccessPublic,\n\t\t\turl: \"/access-public\",\n\t\t},\n\t\t{\n\t\t\tlevel: AccessPublic,\n\t\t\turl: \"/access-public/fixed\",\n\t\t},\n\t\t{\n\t\t\tlevel: AccessUser,\n\t\t\turl: \"/access-user\",\n\t\t},\n\t\t{\n\t\t\tlevel: AccessUser,\n\t\t\turl: \"/access-user/fixed\",\n\t\t},\n\t\t{\n\t\t\tlevel: AccessAdmin,\n\t\t\turl: \"/access-admin\",\n\t\t},\n\t\t{\n\t\t\tlevel: AccessAdmin,\n\t\t\turl: \"/access-admin/fixed\",\n\t\t},\n\t\t{\n\t\t\t// Any references to namespace, reporting, links, etc.\n\t\t\tlevel: AccessUser,\n\t\t\tref: \"access-user\",\n\t\t},\n\t\t{\n\t\t\t// Any references to namespace, reporting, links, etc.\n\t\t\tlevel: AccessAdmin,\n\t\t\tref: \"access-admin\",\n\t\t},\n\t}\n\n\t// noteBugAccessLevel collects all entities associated with the extID bug.\n\tnoteBugAccessLevel := func(extID string, level AccessLevel) {\n\t\tbug, _, err := findBugByReportingID(c.ctx, extID)\n\t\tc.expectOK(err)\n\t\tcrash, _, err := findCrashForBug(c.ctx, bug)\n\t\tc.expectOK(err)\n\t\tbugID := bug.keyHash()\n\t\tentities = append(entities, []entity{\n\t\t\t{\n\t\t\t\tlevel: level,\n\t\t\t\tref: bugID,\n\t\t\t\turl: fmt.Sprintf(\"/bug?id=%v\", bugID),\n\t\t\t},\n\t\t\t{\n\t\t\t\tlevel: level,\n\t\t\t\tref: bug.Reporting[0].ID,\n\t\t\t\turl: fmt.Sprintf(\"/bug?extid=%v\", bug.Reporting[0].ID),\n\t\t\t},\n\t\t\t{\n\t\t\t\tlevel: level,\n\t\t\t\tref: bug.Reporting[1].ID,\n\t\t\t\turl: fmt.Sprintf(\"/bug?extid=%v\", bug.Reporting[1].ID),\n\t\t\t},\n\t\t\t{\n\t\t\t\tlevel: level,\n\t\t\t\tref: fmt.Sprint(crash.Log),\n\t\t\t\turl: fmt.Sprintf(\"/text?tag=CrashLog&id=%v\", crash.Log),\n\t\t\t},\n\t\t\t{\n\t\t\t\tlevel: level,\n\t\t\t\tref: fmt.Sprint(crash.Log),\n\t\t\t\turl: fmt.Sprintf(\"/text?tag=CrashLog&x=%v\",\n\t\t\t\t\tstrconv.FormatUint(uint64(crash.Log), 16)),\n\t\t\t},\n\t\t\t{\n\t\t\t\tlevel: level,\n\t\t\t\tref: fmt.Sprint(crash.Report),\n\t\t\t\turl: fmt.Sprintf(\"/text?tag=CrashReport&id=%v\", crash.Report),\n\t\t\t},\n\t\t\t{\n\t\t\t\tlevel: level,\n\t\t\t\tref: fmt.Sprint(crash.Report),\n\t\t\t\turl: fmt.Sprintf(\"/text?tag=CrashReport&x=%v\",\n\t\t\t\t\tstrconv.FormatUint(uint64(crash.Report), 16)),\n\t\t\t},\n\t\t\t{\n\t\t\t\tlevel: level,\n\t\t\t\tref: fmt.Sprint(crash.ReproC),\n\t\t\t\turl: fmt.Sprintf(\"/text?tag=ReproC&id=%v\", crash.ReproC),\n\t\t\t},\n\t\t\t{\n\t\t\t\tlevel: level,\n\t\t\t\tref: fmt.Sprint(crash.ReproC),\n\t\t\t\turl: fmt.Sprintf(\"/text?tag=ReproC&x=%v\",\n\t\t\t\t\tstrconv.FormatUint(uint64(crash.ReproC), 16)),\n\t\t\t},\n\t\t\t{\n\t\t\t\tlevel: level,\n\t\t\t\tref: fmt.Sprint(crash.ReproSyz),\n\t\t\t\turl: fmt.Sprintf(\"/text?tag=ReproSyz&id=%v\", crash.ReproSyz),\n\t\t\t},\n\t\t\t{\n\t\t\t\tlevel: level,\n\t\t\t\tref: fmt.Sprint(crash.ReproSyz),\n\t\t\t\turl: fmt.Sprintf(\"/text?tag=ReproSyz&x=%v\",\n\t\t\t\t\tstrconv.FormatUint(uint64(crash.ReproSyz), 16)),\n\t\t\t},\n\t\t}...)\n\t}\n\n\t// noteBuildccessLevel collects all entities associated with the kernel build buildID.\n\tnoteBuildccessLevel := func(ns, buildID string) {\n\t\tbuild, err := loadBuild(c.ctx, ns, buildID)\n\t\tc.expectOK(err)\n\t\tentities = append(entities, entity{\n\t\t\tlevel: config.Namespaces[ns].AccessLevel,\n\t\t\tref: build.ID,\n\t\t\turl: fmt.Sprintf(\"/text?tag=KernelConfig&id=%v\", build.KernelConfig),\n\t\t})\n\t}\n\n\t// These strings are put into crash log/report, kernel config, etc.\n\t// If a request at level UserPublic sees a page containing \"access-user\",\n\t// that will be flagged as error.\n\taccessLevelPrefix := func(level AccessLevel) string {\n\t\tswitch level {\n\t\tcase AccessPublic:\n\t\t\treturn \"access-public-\"\n\t\tcase AccessUser:\n\t\t\treturn \"access-user-\"\n\t\tdefault:\n\t\t\treturn \"access-admin-\"\n\t\t}\n\t}\n\n\t// For each namespace we create 8 bugs:\n\t// invalid, dup, fixed and open for both reportings.\n\t// Bugs are setup in such a way that there are lots of\n\t// duplicate/similar cross-references.\n\tfor _, ns := range []string{\"access-admin\", \"access-user\", \"access-public\"} {\n\t\tclientName, clientKey := \"\", \"\"\n\t\tfor k, v := range config.Namespaces[ns].Clients {\n\t\t\tclientName, clientKey = k, v\n\t\t}\n\t\tnamespaceAccessPrefix := accessLevelPrefix(config.Namespaces[ns].AccessLevel)\n\t\tclient := c.makeClient(clientName, clientKey, true)\n\t\tbuild := testBuild(1)\n\t\tbuild.KernelConfig = []byte(namespaceAccessPrefix + \"build\")\n\t\tclient.UploadBuild(build)\n\t\tnoteBuildccessLevel(ns, build.ID)\n\n\t\tfor reportingIdx := 0; reportingIdx < 2; reportingIdx++ {\n\t\t\taccessLevel := config.Namespaces[ns].Reporting[reportingIdx].AccessLevel\n\t\t\taccessPrefix := accessLevelPrefix(accessLevel)\n\n\t\t\tcrashInvalid := testCrashWithRepro(build, reportingIdx*10+0)\n\t\t\tclient.ReportCrash(crashInvalid)\n\t\t\trepInvalid := client.pollBug()\n\t\t\tif reportingIdx != 0 {\n\t\t\t\tclient.updateBug(repInvalid.ID, dashapi.BugStatusUpstream, \"\")\n\t\t\t\trepInvalid = client.pollBug()\n\t\t\t}\n\t\t\tclient.updateBug(repInvalid.ID, dashapi.BugStatusInvalid, \"\")\n\t\t\tnoteBugAccessLevel(repInvalid.ID, accessLevel)\n\n\t\t\tcrashFixed := testCrashWithRepro(build, reportingIdx*10+0)\n\t\t\tclient.ReportCrash(crashFixed)\n\t\t\trepFixed := client.pollBug()\n\t\t\tif reportingIdx != 0 {\n\t\t\t\tclient.updateBug(repFixed.ID, dashapi.BugStatusUpstream, \"\")\n\t\t\t\trepFixed = client.pollBug()\n\t\t\t}\n\t\t\treply, _ := client.ReportingUpdate(&dashapi.BugUpdate{\n\t\t\t\tID: repFixed.ID,\n\t\t\t\tStatus: dashapi.BugStatusOpen,\n\t\t\t\tFixCommits: []string{ns + \"-patch0\"},\n\t\t\t\tExtID: accessPrefix + \"reporting-ext-id\",\n\t\t\t\tLink: accessPrefix + \"reporting-link\",\n\t\t\t})\n\t\t\tc.expectEQ(reply.OK, true)\n\t\t\tbuildFixing := testBuild(reportingIdx*10 + 2)\n\t\t\tbuildFixing.Manager = build.Manager\n\t\t\tbuildFixing.Commits = []string{ns + \"-patch0\"}\n\t\t\tclient.UploadBuild(buildFixing)\n\t\t\tnoteBuildccessLevel(ns, buildFixing.ID)\n\t\t\t// Fixed bugs become visible up to the last reporting.\n\t\t\tfinalLevel := config.Namespaces[ns].\n\t\t\t\tReporting[len(config.Namespaces[ns].Reporting)-1].AccessLevel\n\t\t\tnoteBugAccessLevel(repFixed.ID, finalLevel)\n\n\t\t\tcrashOpen := testCrashWithRepro(build, reportingIdx*10+0)\n\t\t\tcrashOpen.Log = []byte(accessPrefix + \"log\")\n\t\t\tcrashOpen.Report = []byte(accessPrefix + \"report\")\n\t\t\tcrashOpen.ReproC = []byte(accessPrefix + \"repro c\")\n\t\t\tcrashOpen.ReproSyz = []byte(accessPrefix + \"repro syz\")\n\t\t\tclient.ReportCrash(crashOpen)\n\t\t\trepOpen := client.pollBug()\n\t\t\tif reportingIdx != 0 {\n\t\t\t\tclient.updateBug(repOpen.ID, dashapi.BugStatusUpstream, \"\")\n\t\t\t\trepOpen = client.pollBug()\n\t\t\t}\n\t\t\tnoteBugAccessLevel(repOpen.ID, accessLevel)\n\n\t\t\tcrashPatched := testCrashWithRepro(build, reportingIdx*10+1)\n\t\t\tclient.ReportCrash(crashPatched)\n\t\t\trepPatched := client.pollBug()\n\t\t\tif reportingIdx != 0 {\n\t\t\t\tclient.updateBug(repPatched.ID, dashapi.BugStatusUpstream, \"\")\n\t\t\t\trepPatched = client.pollBug()\n\t\t\t}\n\t\t\treply, _ = client.ReportingUpdate(&dashapi.BugUpdate{\n\t\t\t\tID: repPatched.ID,\n\t\t\t\tStatus: dashapi.BugStatusOpen,\n\t\t\t\tFixCommits: []string{ns + \"-patch0\"},\n\t\t\t\tExtID: accessPrefix + \"reporting-ext-id\",\n\t\t\t\tLink: accessPrefix + \"reporting-link\",\n\t\t\t})\n\t\t\tc.expectEQ(reply.OK, true)\n\t\t\t// Patched bugs are also visible up to the last reporting.\n\t\t\tnoteBugAccessLevel(repPatched.ID, finalLevel)\n\n\t\t\tcrashDup := testCrashWithRepro(build, reportingIdx*10+2)\n\t\t\tclient.ReportCrash(crashDup)\n\t\t\trepDup := client.pollBug()\n\t\t\tif reportingIdx != 0 {\n\t\t\t\tclient.updateBug(repDup.ID, dashapi.BugStatusUpstream, \"\")\n\t\t\t\trepDup = client.pollBug()\n\t\t\t}\n\t\t\tclient.updateBug(repDup.ID, dashapi.BugStatusDup, repOpen.ID)\n\t\t\tnoteBugAccessLevel(repDup.ID, accessLevel)\n\t\t}\n\t}\n\n\t// checkReferences checks that page contents do not contain\n\t// references to entities that must not be visible.\n\tcheckReferences := func(url string, requestLevel AccessLevel, reply []byte) {\n\t\tfor _, ent := range entities {\n\t\t\tif requestLevel >= ent.level || ent.ref == \"\" {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif bytes.Contains(reply, []byte(ent.ref)) {\n\t\t\t\tt.Errorf(\"request %v at level %v contains ref %v at level %v:\\n%s\\n\\n\",\n\t\t\t\t\turl, requestLevel, ent.ref, ent.level, reply)\n\t\t\t}\n\t\t}\n\t}\n\n\t// checkPage checks that the page at url is accessible/not accessible as required.\n\tcheckPage := func(requestLevel, pageLevel AccessLevel, url string) []byte {\n\t\treply, err := c.AuthGET(requestLevel, url)\n\t\tif requestLevel >= pageLevel {\n\t\t\tc.expectOK(err)\n\t\t} else if requestLevel == AccessPublic {\n\t\t\tloginURL, err1 := user.LoginURL(c.ctx, url)\n\t\t\tif err1 != nil {\n\t\t\t\tt.Fatal(err1)\n\t\t\t}\n\t\t\tc.expectNE(err, nil)\n\t\t\thttpErr, ok := err.(HttpError)\n\t\t\tc.expectTrue(ok)\n\t\t\tc.expectEQ(httpErr.Code, http.StatusTemporaryRedirect)\n\t\t\tc.expectEQ(httpErr.Headers[\"Location\"], []string{loginURL})\n\t\t} else {\n\t\t\tc.expectForbidden(err)\n\t\t}\n\t\treturn reply\n\t}\n\n\t// Finally, request all entities at all access levels and\n\t// check that we see only what we need to see.\n\tfor requestLevel := AccessPublic; requestLevel < AccessAdmin; requestLevel++ {\n\t\tfor _, ent := range entities {\n\t\t\tif ent.url == \"\" {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\treply := checkPage(requestLevel, ent.level, ent.url)\n\t\t\tcheckReferences(ent.url, requestLevel, reply)\n\t\t}\n\t}\n}", "func prpcBase() router.MiddlewareChain {\n\t// OAuth 2.0 with email scope is registered as a default authenticator\n\t// by importing \"github.com/luci/luci-go/appengine/gaeauth/server\".\n\t// No need to setup an authenticator here.\n\t//\n\t// Authorization is checked in checkAuthorizationPrpc using a\n\t// service decorator.\n\treturn gaemiddleware.BaseProd().Extend(addDbToContext)\n}", "func TestAccessGrantedHandler(t *testing.T) {\n\trunTest(t, func(s *Session) {\n\t\ts.Handle(\"model\", res.Access(res.AccessGranted))\n\t}, func(s *Session) {\n\t\tinb := s.Request(\"access.test.model\", nil)\n\t\ts.GetMsg(t).Equals(t, inb, json.RawMessage(`{\"result\":{\"get\":true,\"call\":\"*\"}}`))\n\t})\n}", "func (ctx *AppContext) AccessControl(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(writer http.ResponseWriter, request *http.Request) {\n\t\twriter.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\twriter.Header().Set(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, PUT, DELETE, HEAD\")\n\t\twriter.Header().Set(\"Access-Control-Allow-Headers\", \"Content-Type, Content-Length, Accept-Encoding, X-CRSF-Token, Authorization, If-None-Match\")\n\n\t\th.ServeHTTP(writer, request)\n\t})\n}", "func (s *BaseMySqlParserListener) EnterPrivilegesBase(ctx *PrivilegesBaseContext) {}", "func withRights() adapter {\n\treturn func(h http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\t// No authentification to check\n\t\t\th.ServeHTTP(w, r)\n\t\t})\n\t}\n}", "func (s *Services) getAccessAllowed(\n\tw http.ResponseWriter,\n\tr *http.Request) bool {\n\terr := r.ParseForm()\n\tif err != nil {\n\t\treturnAPIError(s, w, err, http.StatusInternalServerError)\n\t\treturn false\n\t}\n\tv, err := s.access.GetAllowed(r.FormValue(\"accessKey\"))\n\tif v == false || err != nil {\n\t\treturnAPIError(\n\t\t\ts,\n\t\t\tw,\n\t\t\tfmt.Errorf(\"Access denied\"),\n\t\t\thttp.StatusNetworkAuthenticationRequired)\n\t\treturn false\n\t}\n\treturn true\n}", "func (aee *ActiveEndpointsError) Forbidden() {}", "func (me *Prometheus) denyAccess(w http.ResponseWriter, r *http.Request) {\n\n\tme.Logger.Debug().Msgf(\"(httpd) denied request [%s] (%s)\", r.RequestURI, r.RemoteAddr)\n\tw.WriteHeader(403)\n\tw.Header().Set(\"content-type\", \"text/plain\")\n\t_, err := w.Write([]byte(\"403 Forbidden\"))\n\tif err != nil {\n\t\tme.Logger.Error().Stack().Err(err).Msg(\"error\")\n\t}\n}", "func (c *Client) access(path upspin.PathName, dir upspin.DirServer) (*access.Access, error) {\n\twhichAccess, err := dir.WhichAccess(path)\n\tif err != nil || whichAccess == nil {\n\t\treturn nil, err\n\t}\n\terr = validateWhichAccess(path, whichAccess)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\taccessData, err := c.Get(whichAccess.Name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn access.Parse(whichAccess.Name, accessData)\n}", "func (a *authorizer) Authorize(method string, r model.Role) bool {\n\tswitch method {\n\tcase \"/pipe.api.service.webservice.WebService/AddEnvironment\":\n\t\treturn isAdmin(r)\n\tcase \"/pipe.api.service.webservice.WebService/UpdateEnvironmentDesc\":\n\t\treturn isAdmin(r)\n\tcase \"/pipe.api.service.webservice.WebService/RegisterPiped\":\n\t\treturn isAdmin(r)\n\tcase \"/pipe.api.service.webservice.WebService/RecreatePipedKey\":\n\t\treturn isAdmin(r)\n\tcase \"/pipe.api.service.webservice.WebService/EnablePiped\":\n\t\treturn isAdmin(r)\n\tcase \"/pipe.api.service.webservice.WebService/DisablePiped\":\n\t\treturn isAdmin(r)\n\tcase \"/pipe.api.service.webservice.WebService/AddApplication\":\n\t\treturn isAdmin(r)\n\tcase \"/pipe.api.service.webservice.WebService/EnableApplication\":\n\t\treturn isAdmin(r)\n\tcase \"/pipe.api.service.webservice.WebService/DisableApplication\":\n\t\treturn isAdmin(r)\n\tcase \"/pipe.api.service.webservice.WebService/UpdateProjectStaticAdmin\":\n\t\treturn isAdmin(r)\n\tcase \"/pipe.api.service.webservice.WebService/EnableStaticAdmin\":\n\t\treturn isAdmin(r)\n\tcase \"/pipe.api.service.webservice.WebService/DisableStaticAdmin\":\n\t\treturn isAdmin(r)\n\tcase \"/pipe.api.service.webservice.WebService/UpdateProjectSSOConfig\":\n\t\treturn isAdmin(r)\n\tcase \"/pipe.api.service.webservice.WebService/UpdateProjectRBACConfig\":\n\t\treturn isAdmin(r)\n\tcase \"/pipe.api.service.webservice.WebService/SyncApplication\":\n\t\treturn isAdmin(r) || isEditor(r)\n\tcase \"/pipe.api.service.webservice.WebService/CancelDeployment\":\n\t\treturn isAdmin(r) || isEditor(r)\n\tcase \"/pipe.api.service.webservice.WebService/ApproveStage\":\n\t\treturn isAdmin(r) || isEditor(r)\n\tcase \"/pipe.api.service.webservice.WebService/GenerateApplicationSealedSecret\":\n\t\treturn isAdmin(r) || isEditor(r)\n\tcase \"/pipe.api.service.webservice.WebService/GetApplicationLiveState\":\n\t\treturn isAdmin(r) || isEditor(r) || isViewer(r)\n\tcase \"/pipe.api.service.webservice.WebService/GetProject\":\n\t\treturn isAdmin(r) || isEditor(r) || isViewer(r)\n\tcase \"/pipe.api.service.webservice.WebService/GetCommand\":\n\t\treturn isAdmin(r) || isEditor(r) || isViewer(r)\n\tcase \"/pipe.api.service.webservice.WebService/ListDeploymentConfigTemplates\":\n\t\treturn isAdmin(r) || isEditor(r) || isViewer(r)\n\tcase \"/pipe.api.service.webservice.WebService/ListEnvironments\":\n\t\treturn isAdmin(r) || isEditor(r) || isViewer(r)\n\tcase \"/pipe.api.service.webservice.WebService/ListPipeds\":\n\t\treturn isAdmin(r) || isEditor(r) || isViewer(r)\n\tcase \"/pipe.api.service.webservice.WebService/GetPiped\":\n\t\treturn isAdmin(r) || isEditor(r) || isViewer(r)\n\tcase \"/pipe.api.service.webservice.WebService/ListApplications\":\n\t\treturn isAdmin(r) || isEditor(r) || isViewer(r)\n\tcase \"/pipe.api.service.webservice.WebService/GetApplication\":\n\t\treturn isAdmin(r) || isEditor(r) || isViewer(r)\n\tcase \"/pipe.api.service.webservice.WebService/ListDeployments\":\n\t\treturn isAdmin(r) || isEditor(r) || isViewer(r)\n\tcase \"/pipe.api.service.webservice.WebService/GetDeployment\":\n\t\treturn isAdmin(r) || isEditor(r) || isViewer(r)\n\tcase \"/pipe.api.service.webservice.WebService/GetStageLog\":\n\t\treturn isAdmin(r) || isEditor(r) || isViewer(r)\n\tcase \"/pipe.api.service.webservice.WebService/GetMe\":\n\t\treturn isAdmin(r) || isEditor(r) || isViewer(r)\n\t}\n\treturn false\n}", "func doGetAccessRules(targetURL string) (r map[string]string, err *probe.Error) {\n\tclnt, err := newClient(targetURL)\n\tif err != nil {\n\t\treturn map[string]string{}, err.Trace(targetURL)\n\t}\n\treturn clnt.GetAccessRules()\n}", "func TestAccess(t *testing.T) {\n\trunTest(t, func(s *Session) {\n\t\ts.Handle(\"model\", res.Access(func(r res.AccessRequest) {\n\t\t\tr.Access(true, \"bar\")\n\t\t}))\n\t}, func(s *Session) {\n\t\tinb := s.Request(\"access.test.model\", nil)\n\t\ts.GetMsg(t).Equals(t, inb, json.RawMessage(`{\"result\":{\"get\":true,\"call\":\"bar\"}}`))\n\t})\n}", "func (mr ManagerRedirectError) Maskable() {}", "func accessControl(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, POST, OPTIONS, PUT, DELETE, UPDATE, PATCH\")\n\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Origin, Content-Type, Authorization\")\n\n\t\tif r.Method == \"OPTIONS\" {\n\t\t\treturn\n\t\t}\n\n\t\th.ServeHTTP(w, r)\n\t})\n}", "func (p *proxyTransport) restrictedOperation(request *http.Request, resourceID string) (*http.Response, error) {\n\tvar err error\n\ttokenData, err := security.RetrieveTokenData(request)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif tokenData.Role != portainer.AdministratorRole {\n\n\t\tteamMemberships, err := p.TeamMembershipService.TeamMembershipsByUserID(tokenData.ID)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tuserTeamIDs := make([]portainer.TeamID, 0)\n\t\tfor _, membership := range teamMemberships {\n\t\t\tuserTeamIDs = append(userTeamIDs, membership.TeamID)\n\t\t}\n\n\t\tresourceControls, err := p.ResourceControlService.ResourceControls()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tresourceControl := getResourceControlByResourceID(resourceID, resourceControls)\n\t\tif resourceControl != nil && !canUserAccessResource(tokenData.ID, userTeamIDs, resourceControl) {\n\t\t\treturn writeAccessDeniedResponse()\n\t\t}\n\t}\n\n\treturn p.executeDockerRequest(request)\n}", "func HasAccess(callerUid, callerGid, fileUid, fileGid uint32, perm uint32, mask uint32) bool {\n\tif callerUid == 0 {\n\t\t// root can do anything.\n\t\treturn true\n\t}\n\tmask = mask & 7\n\tif mask == 0 {\n\t\treturn true\n\t}\n\n\tif callerUid == fileUid {\n\t\tif perm&(mask<<6) != 0 {\n\t\t\treturn true\n\t\t}\n\t}\n\tif callerGid == fileGid {\n\t\tif perm&(mask<<3) != 0 {\n\t\t\treturn true\n\t\t}\n\t}\n\tif perm&mask != 0 {\n\t\treturn true\n\t}\n\n\t// Check other groups.\n\tif perm&(mask<<3) == 0 {\n\t\t// avoid expensive lookup if it's not allowed anyway\n\t\treturn false\n\t}\n\n\tu, err := user.LookupId(strconv.Itoa(int(callerUid)))\n\tif err != nil {\n\t\treturn false\n\t}\n\tgs, err := u.GroupIds()\n\tif err != nil {\n\t\treturn false\n\t}\n\n\tfileGidStr := strconv.Itoa(int(fileGid))\n\tfor _, gidStr := range gs {\n\t\tif gidStr == fileGidStr {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (n *notificationJobAPI) requirePolicyAccess(ctx context.Context, projectNameIrID interface{}, policy *policyModel.Policy) error {\n\tp, err := n.projectMgr.Get(ctx, projectNameIrID)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// check the projectID whether match with the projectID in policy\n\tif p.ProjectID != policy.ProjectID {\n\t\treturn errors.NotFoundError(errors.Errorf(\"project id %d does not match\", p.ProjectID))\n\t}\n\n\treturn nil\n}", "func (z *zfsctl) Allow1(ctx context.Context, name string) *execute {\n\targs := []string{\"allow\", name}\n\treturn &execute{ctx: ctx, name: z.cmd, args: args}\n}", "func authorize(name string) error {\n\tif distro.Get() == distro.Synology {\n\t\treturn authorizeSynology(name)\n\t}\n\treturn nil\n}", "func (a CasbinAuthorizer) Authorize(lgr zerolog.Logger, sub user.User, obj string, act string) error {\n\n\tconst (\n\t\tmoviesPath string = \"/api/v1/movies\"\n\t\tloggerPath string = \"/api/v1/logger\"\n\t)\n\n\tif strings.HasPrefix(obj, moviesPath) {\n\t\tobj = moviesPath\n\t} else if strings.HasPrefix(obj, loggerPath) {\n\t\tobj = loggerPath\n\t} else {\n\t\treturn errs.NewUnauthorizedError(errors.New(fmt.Sprintf(\"user %s does not have %s permission for %s\", sub.Email, act, obj)))\n\t}\n\n\tif (act == http.MethodGet) {\n\t\tact = \"read\"\n\t} else {\n\t\tact = \"write\"\n\t}\n\tauthorized := a.Enforcer.Enforce(sub.Email, obj, act)\n\tif authorized {\n\t\tlgr.Debug().Str(\"sub\", sub.Email).Str(\"obj\", obj).Str(\"act\", act).Msgf(\"Authorized (sub: %s, obj: %s, act: %s)\", sub.Email, obj, act)\n\t\treturn nil\n\t}\n\n\tlgr.Info().Str(\"sub\", sub.Email).Str(\"obj\", obj).Str(\"act\", act).Msgf(\"Unauthorized (sub: %s, obj: %s, act: %s)\", sub.Email, obj, act)\n\n\t// \"In summary, a 401 Unauthorized response should be used for missing or\n\t// bad authentication, and a 403 Forbidden response should be used afterwards,\n\t// when the user is authenticated but isn’t authorized to perform the\n\t// requested operation on the given resource.\"\n\t// If the user has gotten here, they have gotten through authentication\n\t// but do have the right access, this they are Unauthorized\n\treturn errs.NewUnauthorizedError(errors.New(fmt.Sprintf(\"user %s does not have %s permission for %s\", sub.Email, act, obj)))\n}", "func (c *clusterCache) checkPermission(ctx context.Context, reviewInterface authType1.SelfSubjectAccessReviewInterface, api kube.APIResourceInfo) (keep bool, err error) {\n\tsar := &authorizationv1.SelfSubjectAccessReview{\n\t\tSpec: authorizationv1.SelfSubjectAccessReviewSpec{\n\t\t\tResourceAttributes: &authorizationv1.ResourceAttributes{\n\t\t\t\tNamespace: \"*\",\n\t\t\t\tVerb: \"list\", // uses list verb to check for permissions\n\t\t\t\tResource: api.GroupVersionResource.Resource,\n\t\t\t},\n\t\t},\n\t}\n\n\tswitch {\n\t// if manage whole cluster or resource is cluster level and cluster resources enabled\n\tcase len(c.namespaces) == 0 || (!api.Meta.Namespaced && c.clusterResources):\n\t\tresp, err := reviewInterface.Create(ctx, sar, metav1.CreateOptions{})\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\t\tif resp != nil && resp.Status.Allowed {\n\t\t\treturn true, nil\n\t\t}\n\t\t// unsupported, remove from watch list\n\t\treturn false, nil\n\t// if manage some namespaces and resource is namespaced\n\tcase len(c.namespaces) != 0 && api.Meta.Namespaced:\n\t\tfor _, ns := range c.namespaces {\n\t\t\tsar.Spec.ResourceAttributes.Namespace = ns\n\t\t\tresp, err := reviewInterface.Create(ctx, sar, metav1.CreateOptions{})\n\t\t\tif err != nil {\n\t\t\t\treturn false, err\n\t\t\t}\n\t\t\tif resp != nil && resp.Status.Allowed {\n\t\t\t\treturn true, nil\n\t\t\t} else {\n\t\t\t\t// unsupported, remove from watch list\n\t\t\t\treturn false, nil\n\t\t\t}\n\t\t}\n\t}\n\t// checkPermission follows the same logic of determining namespace/cluster resource as the processApi function\n\t// so if neither of the cases match it means the controller will not watch for it so it is safe to return true.\n\treturn true, nil\n}", "func CalculateBasePermissions(guildID int64, ownerID int64, guildRoles []discordgo.Role, memberID int64, roles []int64) (perms int64) {\n\tif ownerID == memberID {\n\t\treturn AllPermissions\n\t}\n\n\t// everyone role first\n\tfor _, role := range guildRoles {\n\t\tif role.ID == guildID {\n\t\t\tperms |= int64(role.Permissions)\n\t\t\tbreak\n\t\t}\n\t}\n\n\t// member roles\n\tfor _, role := range guildRoles {\n\t\tfor _, roleID := range roles {\n\t\t\tif role.ID == roleID {\n\t\t\t\tperms |= int64(role.Permissions)\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\t// Administrator bypasses channel overrides\n\tif perms&discordgo.PermissionAdministrator == discordgo.PermissionAdministrator {\n\t\treturn AllPermissions\n\t}\n\n\treturn perms\n}", "func (s *Server) requestAuthorized(c echo.Context, perm, tgtOwner string) error {\n\tclaims := getClaims(c)\n\treqOwner := claims[\"user\"].(string)\n\n\tpset := make(map[string]struct{})\n\tfor _, p := range claims[\"permissions\"].([]interface{}) {\n\t\tpset[strings.ToLower(p.(string))] = struct{}{}\n\t}\n\n\tnet := c.Param(\"id\")\n\n\t// Make checks for the individual nodes of the permissions\n\t// checks below. This still winds up being O(N) and is much\n\t// easier to read than a clever loop.\n\t_, netAny := pset[net+\":*\"]\n\t_, netExact := pset[net+\":\"+perm]\n\t_, netSudo := pset[net+\":sudo\"]\n\t_, anyAny := pset[\"*:*\"]\n\t_, anyExact := pset[\"*:\"+perm]\n\t_, anySudo := pset[\"*:sudo\"]\n\n\thasPerm := netAny || netExact || anyAny || anyExact\n\thasSudo := netAny || anyAny || netSudo || anySudo\n\n\t// Now we can perform the permissions check. If the user has\n\t// any permission on any network, or any on the specific one\n\t// that satisfies the check right away. Failing that we check\n\t// that they have the permission and optionally if they\n\t// require sudo.\n\tif hasPerm && (reqOwner == tgtOwner || hasSudo) {\n\t\treturn nil\n\t}\n\n\t// Anything but the above and the request isn't authorized.\n\treturn errors.New(\"requestor unqualified\")\n}", "func (m pCheckAccessRights) Extend(fnct func(m.UserSet, webtypes.CheckAccessRightsArgs) bool) pCheckAccessRights {\n\treturn pCheckAccessRights{\n\t\tMethod: m.Method.Extend(fnct),\n\t}\n}", "func (s *NamespaceWebhook) authorized(request admissionctl.Request) admissionctl.Response {\n\tvar ret admissionctl.Response\n\n\t// Picking OldObject or Object will suffice for most validation concerns\n\tns, err := s.renderNamespace(request)\n\tif err != nil {\n\t\tlog.Error(err, \"Couldn't render a Namespace from the incoming request\")\n\t\treturn admissionctl.Errored(http.StatusBadRequest, err)\n\t}\n\t// service accounts making requests will include their name in the group\n\tfor _, group := range request.UserInfo.Groups {\n\t\tif privilegedServiceAccountsRe.Match([]byte(group)) {\n\t\t\tret = admissionctl.Allowed(\"Privileged service accounts may access\")\n\t\t\tret.UID = request.AdmissionRequest.UID\n\t\t\treturn ret\n\t\t}\n\t}\n\t// This must be prior to privileged namespace check\n\tif utils.SliceContains(layeredProductAdminGroupName, request.UserInfo.Groups) &&\n\t\tlayeredProductNamespaceRe.Match([]byte(ns.GetName())) {\n\t\tret = admissionctl.Allowed(\"Layered product admins may access\")\n\t\tret.UID = request.AdmissionRequest.UID\n\t\treturn ret\n\t}\n\n\t// L64-73\n\tif hookconfig.IsPrivilegedNamespace(ns.GetName()) {\n\n\t\tif amIAdmin(request) {\n\t\t\tret = admissionctl.Allowed(\"Cluster and SRE admins may access\")\n\t\t\tret.UID = request.AdmissionRequest.UID\n\t\t\treturn ret\n\t\t}\n\t\tlog.Info(\"Non-admin attempted to access a privileged namespace matching a regex from this list\", \"list\", hookconfig.PrivilegedNamespaces, \"request\", request.AdmissionRequest)\n\t\tret = admissionctl.Denied(fmt.Sprintf(\"Prevented from accessing Red Hat managed namespaces. Customer workloads should be placed in customer namespaces, and should not match an entry in this list of regular expressions: %v\", hookconfig.PrivilegedNamespaces))\n\t\tret.UID = request.AdmissionRequest.UID\n\t\treturn ret\n\t}\n\tif BadNamespaceRe.Match([]byte(ns.GetName())) {\n\n\t\tif amIAdmin(request) {\n\t\t\tret = admissionctl.Allowed(\"Cluster and SRE admins may access\")\n\t\t\tret.UID = request.AdmissionRequest.UID\n\t\t\treturn ret\n\t\t}\n\t\tlog.Info(\"Non-admin attempted to access a potentially harmful namespace (eg matching this regex)\", \"regex\", badNamespace, \"request\", request.AdmissionRequest)\n\t\tret = admissionctl.Denied(fmt.Sprintf(\"Prevented from creating a potentially harmful namespace. Customer namespaces should not match this regular expression, as this would impact DNS resolution: %s\", badNamespace))\n\t\tret.UID = request.AdmissionRequest.UID\n\t\treturn ret\n\t}\n\t// Check labels.\n\tunauthorized, err := s.unauthorizedLabelChanges(request)\n\tif !amIAdmin(request) && unauthorized {\n\t\tret = admissionctl.Denied(fmt.Sprintf(\"Denied. Err %+v\", err))\n\t\tret.UID = request.AdmissionRequest.UID\n\t\treturn ret\n\t}\n\t// L75-L77\n\tret = admissionctl.Allowed(\"RBAC allowed\")\n\tret.UID = request.AdmissionRequest.UID\n\treturn ret\n}", "func checkPermissions(s *model.SessionContext, methodPermission, userPermission string) bool {\n\t// Blocked permission no access.\n\tif userPermission == utils.BlockPermission {\n\t\tlogutil.Errorf(s, \"RBAC check failed... Permission is set to blocked...\")\n\t\treturn false\n\t}\n\n\t// Lower permission Deny access. \"Read vs Modify\" case\n\tif userPermission == utils.ReadPermission &&\n\t\tmethodPermission == utils.ModifyPermission {\n\t\tlogutil.Errorf(s, \"RBAC check failed...\"+\n\t\t\t\"Method permission - %s & User Permission - %s \", methodPermission, userPermission)\n\t\treturn false\n\t}\n\n\t// Matching permission allow access.\n\t// Higher permission allow access. \"Modify vs Read\" case\n\treturn true\n}", "func (c C) CheckAccess(o types.Owner, dbConnection database.Database, extra ...string) (bool, error) {\n\tswitch c.Type {\n\tcase OWNER:\n\t\toid, err := types.DecodeOwnerIDString(c.ID)\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\t\tO, err := dbConnection.Owner().Get(oid)\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\t\treturn O.Match(o), nil\n\tcase FILE:\n\t\tfid, err := types.DecodeFileID(c.ID)\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\t\tfile, err := dbConnection.File().Get(fid)\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\t\taccess := file.GetOwner().Match(o)\n\t\tfor _, ex := range extra {\n\t\t\taccess = access || file.CheckPerm(o, ex)\n\t\t}\n\t\treturn access, nil\n\tdefault:\n\t\treturn false, errors.New(\"unrecognized context type\")\n\t}\n}", "func (_DelegatableDai *DelegatableDaiCallerSession) Allowed(arg0 common.Address, arg1 common.Address) (*big.Int, error) {\n\treturn _DelegatableDai.Contract.Allowed(&_DelegatableDai.CallOpts, arg0, arg1)\n}", "func (c KubernetesDefaultRouter) isOwnedByCanary(obj interface{}, name string) (bool, bool) {\n\tobject, ok := obj.(metav1.Object)\n\tif !ok {\n\t\treturn false, false\n\t}\n\n\townerRef := metav1.GetControllerOf(object)\n\tif ownerRef == nil {\n\t\treturn false, false\n\t}\n\n\tif ownerRef.Kind != flaggerv1.CanaryKind {\n\t\treturn false, false\n\t}\n\n\treturn true, ownerRef.Name == name\n}", "func checkPermission(c *gin.Context, enforcer *casbin.Enforcer, d *gorm.DB, user *db.User, roles []string) bool {\n\tr := c.Request\n\tmethod := r.Method\n\tpath := r.URL.Path\n\tusergroup := db.UserGroup{}\n\td.First(&usergroup, user.UserGroupID)\n\tfor _, role := range roles {\n\t\treturn enforcer.Enforce(usergroup.GroupName, role, path, method)\n\t}\n\treturn false\n}", "func Db_access_list(w http.ResponseWriter, r *http.Request) {\n\n///\n/// show d.b. access list inf. on web\n///\n\n process3.Db_access_list(w , r )\n\n}", "func SuperrewardsAuthRequired(whitelistIPs string) gin.HandlerFunc {\n\tips := make(map[string]struct{})\n\tfor _, v := range strings.Split(whitelistIPs, \",\") {\n\t\tips[v] = struct{}{}\n\t}\n\n\treturn func(c *gin.Context) {\n\t\tif _, ok := ips[c.ClientIP()]; !ok {\n\t\t\tc.AbortWithStatus(http.StatusForbidden)\n\t\t\treturn\n\t\t}\n\n\t\tc.Next()\n\t}\n}", "func webBase() router.MiddlewareChain {\n\treturn base().Extend(requireAuthWeb)\n}", "func reviewSCCAccess(namespace string, kubeClient kubernetes.Interface) bool {\n\tfor _, review := range util.GetSelfSubjectAccessReviews(namespace) {\n\t\tpermission, err := kubeClient.AuthorizationV1().SelfSubjectAccessReviews().Create(context.TODO(), &review, metav1.CreateOptions{})\n\t\tif err != nil {\n\t\t\tglog.Errorf(\"Error reviewing kubeturbo permissions: %v. Kubeturbo cannot\"+\n\t\t\t\t\"use appropriate SCC levels while restarting pods.\", err)\n\t\t\treturn false\n\t\t}\n\t\tif permission.Status.Allowed != true {\n\t\t\tglog.Errorf(\"Kubeturbo does not have \\\"%s\\\" permission for \\\"%s\\\". Kubeturbo cannot\"+\n\t\t\t\t\"use appropriate SCC levels while restarting pods.\", review.Spec.ResourceAttributes.Verb,\n\t\t\t\treview.Spec.ResourceAttributes.Resource)\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "func (db *Database) checkDDocAccess(ddocName string) error {\n\tif db.user != nil || isInternalDDoc(ddocName) {\n\t\treturn base.HTTPErrorf(http.StatusForbidden, \"forbidden\")\n\t}\n\treturn nil\n}", "func (c *readOnlyAuthorizationCache) Run() {\n\tc.readOnlyPolicyCache.Run()\n\tc.readOnlyClusterPolicyCache.Run()\n\tc.readOnlyPolicyBindingCache.Run()\n\tc.readOnlyClusterPolicyBindingCache.Run()\n}", "func doGetAccess(targetURL string) (perms accessPerms, policyStr string, err *probe.Error) {\n\tclnt, err := newClient(targetURL)\n\tif err != nil {\n\t\treturn \"\", \"\", err.Trace(targetURL)\n\t}\n\tperm, policyJSON, err := clnt.GetAccess()\n\tif err != nil {\n\t\treturn \"\", \"\", err.Trace(targetURL)\n\t}\n\treturn stringToAccessPerm(perm), policyJSON, nil\n}", "func (_DelegatableDai *DelegatableDaiSession) Allowed(arg0 common.Address, arg1 common.Address) (*big.Int, error) {\n\treturn _DelegatableDai.Contract.Allowed(&_DelegatableDai.CallOpts, arg0, arg1)\n}", "func accessLogin(mail string) bool {\n\tif len(Cfg.Access) == 0 {\n\t\treturn true\n\t}\n\tfor _, a := range Cfg.Access {\n\t\tif a.all {\n\t\t\treturn a.Allow\n\t\t}\n\t\tfor _, re := range a.re {\n\t\t\tif re.MatchString(mail) {\n\t\t\t\treturn a.Allow\n\t\t\t}\n\t\t}\n\t}\n\treturn true\n}", "func checkViewPermission(us user.User, r *http.Request) bool {\n\n\tloggedIn, loggedInMat := loggedIn(r)\n\tif !loggedIn {\n\t\treturn false\n\t}\n\n\trequester, err := user.FromMatrikel(loggedInMat)\n\tif err != nil {\n\t\treturn false\n\t}\n\n\tif requester.Matrikel == us.Matrikel || courseconfig.GetConfig().Open_course || requester.IsAuthorized() {\n\t\treturn true\n\t}\n\n\tif us.IsAuthorized() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (a *Access) AccessHandler(next http.Handler) http.Handler {\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\t// Timings\n\t\tt := timings.Tracker{}\n\t\tt.Start()\n\n\t\t// Assumes r.RemoteAddr has been vetted by e.g. RealAddr()\n\t\tif !a.Validate(r.RemoteAddr) {\n\t\t\tDebugOut.Printf(\"%s\\n\", ErrRequestError{r, fmt.Sprintf(\"Access not allowed for '%s'\", r.RemoteAddr)})\n\t\t\t//http.Error(w, ErrRequestError{r, \"Access not allowed\"}.Error(), http.StatusForbidden)\n\t\t\tRequestErrorResponse(r, w, \"Access not allowed\", http.StatusForbidden)\n\t\t\treturn\n\t\t}\n\t\tTimingOut.Printf(\"Access handler took %s\\n\", t.Since().String())\n\t\tnext.ServeHTTP(w, r)\n\t}\n\treturn http.HandlerFunc(fn)\n}", "func CheckAuth(c *gin.Context) {\n\n}", "func AllowAPI(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t// Get session\n\t\tsess := session.Instance(r)\n\n\t\t// If user is not authenticated, don't allow them to access the page\n\t\tif sess.Values[\"id\"] == nil {\n\t\t\t//printf(w, \"Invalid authentication\", http.StatusBadRequest)\n\t\t\tfmt.Println(\"Bunk API Request.\")\n\t\t\treturn\n\t\t}\n\n\t\t// If user is not authenticated, don't allow them to access the page\n\t\tif sess.Values[\"membership\"] != 0 {\n\t\t\t//http.Redirect(w, r, \"/login\", http.StatusFound)\n\t\t\tfmt.Println(\"Bunk API Request.\")\n\t\t\treturn\n\t\t}\n\n\t\th.ServeHTTP(w, r)\n\t})\n}", "func RestrictToAdmin(c *gae.Context) bool {\n\tif c == nil {\n\t\tc.HTTPContext.ReturnStatus = http.StatusInternalServerError\n\t\tlog.Printf(\"Could not retrieve context.\")\n\t\treturn false\n\t}\n\n\tif u := user.Current(c); u != nil {\n\t\treturn user.IsAdmin(c)\n\t} else {\n\t\tc.HTTPContext.ReturnStatus = http.StatusForbidden\n\t\treturn false\n\t}\n}", "func gwAuthChecker(urls []conf.AllowUrl) gin.HandlerFunc {\n\tvar allowUrls = make(map[string]bool)\n\tfor _, url := range urls {\n\t\tfor _, p := range url.Urls {\n\t\t\ts := p\n\t\t\tallowUrls[s] = true\n\t\t}\n\t}\n\treturn func(c *gin.Context) {\n\t\ts := getHostServer(c)\n\t\tuser := getUser(c)\n\t\tpath := fmt.Sprintf(\"%s:%s\", c.Request.Method, c.Request.URL.Path)\n\t\trequestId := getRequestId(s, c)\n\t\t//\n\t\t// No auth and request URI not in allowed urls.\n\t\t// UnAuthorized\n\t\t//\n\t\tif (user.IsEmpty() || !user.IsAuth()) && !allowUrls[path] {\n\t\t\tauth := s.conf.Security.AuthServer\n\t\t\t// Check url are allow dict.\n\t\t\tpayload := gin.H{\n\t\t\t\t\"Auth\": gin.H{\n\t\t\t\t\t\"LogIn\": gin.H{\n\t\t\t\t\t\t\"Url\": fmt.Sprintf(\"%s/%s\",\n\t\t\t\t\t\t\tstrings.TrimRight(auth.Addr, \"/\"), strings.TrimLeft(auth.LogIn.Url, \"/\")),\n\t\t\t\t\t\t\"Methods\": auth.LogIn.Methods,\n\t\t\t\t\t\t\"AuthTypes\": auth.LogIn.AuthTypes,\n\t\t\t\t\t},\n\t\t\t\t\t\"LogOut\": gin.H{\n\t\t\t\t\t\t\"Url\": fmt.Sprintf(\"%s/%s\",\n\t\t\t\t\t\t\tstrings.TrimRight(auth.Addr, \"/\"), strings.TrimLeft(auth.LogOut.Url, \"/\")),\n\t\t\t\t\t\t\"Methods\": auth.LogOut.Methods,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t}\n\t\t\tbody := s.RespBodyBuildFunc(http.StatusUnauthorized, requestId, errDefault401Msg, payload)\n\t\t\tc.JSON(http.StatusUnauthorized, body)\n\t\t\tc.Abort()\n\t\t\treturn\n\t\t}\n\t\tc.Next()\n\t}\n}", "func ruleAllows(attrs *authorization.Attributes, rule types.Rule) (bool, string) {\n\tif matches := rule.VerbMatches(attrs.Verb); !matches {\n\t\treturn false, \"forbidden verb\"\n\t}\n\n\tif matches := rule.ResourceMatches(attrs.Resource); !matches {\n\t\treturn false, \"forbidden resource\"\n\t}\n\n\tif matches := rule.ResourceNameMatches(attrs.ResourceName); !matches {\n\t\treturn false, \"forbidden resource name\"\n\t}\n\n\treturn true, \"\"\n}", "func (c *Create) AccessValidate() error {\n\tif !c.Role.FileAccess.Can(data.AccessWrite) {\n\t\treturn apperr.Access{Where: \"File\", Permission: string(data.AccessWrite)}\n\t}\n\n\treturn nil\n}", "func (c *Admission) authorize(ctx context.Context, review *admission.AdmissionReview) error {\n\t// @check if the review is for something we can process\n\tobject, err := decodeObject(review.Request.Kind.Kind, review)\n\tif err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"error\": err.Error(),\n\t\t\t\"id\": utils.GetTRX(ctx),\n\t\t\t\"name\": review.Request.Name,\n\t\t\t\"namespace\": review.Request.Namespace,\n\t\t}).Errorf(\"unable to decode object for review\")\n\n\t\treturn err\n\t}\n\n\t// @step: attempt to get the object authorized\n\tdenied, reason, err := c.authorizeResource(ctx, object, review.Request.Kind)\n\tif err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"error\": err.Error(),\n\t\t\t\"id\": utils.GetTRX(ctx),\n\t\t\t\"name\": review.Request.Name,\n\t\t\t\"namespace\": review.Request.Namespace,\n\t\t}).Errorf(\"unable to handle admission review\")\n\n\t\treturn err\n\t}\n\n\t// @check if the object was rejected\n\tif denied {\n\t\tadmissionTotalMetric.WithLabelValues(actionDenied).Inc()\n\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"error\": reason,\n\t\t\t\"group\": review.Request.Kind.Group,\n\t\t\t\"id\": utils.GetTRX(ctx),\n\t\t\t\"kind\": review.Request.Kind.Kind,\n\t\t\t\"name\": review.Request.Name,\n\t\t\t\"namespace\": review.Request.Namespace,\n\t\t\t\"uid\": review.Request.UserInfo.UID,\n\t\t\t\"user\": review.Request.UserInfo.Username,\n\t\t\t\"version\": review.Request.Kind.Version,\n\t\t}).Warn(\"authorization for object execution denied\")\n\n\t\treview.Response = &admission.AdmissionResponse{\n\t\t\tAllowed: false,\n\t\t\tResult: &metav1.Status{\n\t\t\t\tCode: http.StatusForbidden,\n\t\t\t\tMessage: reason,\n\t\t\t\tReason: metav1.StatusReasonForbidden,\n\t\t\t\tStatus: metav1.StatusFailure,\n\t\t\t},\n\t\t}\n\n\t\t// @step: log the denial is required\n\t\tgo c.events.Send(&api.Event{\n\t\t\tDetail: reason,\n\t\t\tObject: object,\n\t\t\tReview: review.Request,\n\t\t})\n\n\t\treturn nil\n\t}\n\n\tadmissionTotalMetric.WithLabelValues(actionAccepted).Inc()\n\n\treview.Response = &admission.AdmissionResponse{Allowed: true}\n\n\tlog.WithFields(log.Fields{\n\t\t\"group\": review.Request.Kind.Group,\n\t\t\"id\": utils.GetTRX(ctx),\n\t\t\"kind\": review.Request.Kind.Kind,\n\t\t\"name\": review.Request.Name,\n\t\t\"namespace\": review.Request.Namespace,\n\t\t\"uid\": review.Request.UserInfo.UID,\n\t\t\"user\": review.Request.UserInfo.Username,\n\t\t\"version\": review.Request.Kind.Version,\n\t}).Info(\"object has been authorized for execution\")\n\n\treturn nil\n}", "func (iam *IdentityAccessManagement) authRequest(r *http.Request, action Action) ErrorCode {\n\tvar identity *Identity\n\tvar s3Err ErrorCode\n\tswitch getRequestAuthType(r) {\n\tcase authTypeStreamingSigned:\n\t\treturn ErrNone\n\tcase authTypeUnknown:\n\t\tglog.V(3).Infof(\"unknown auth type\")\n\t\treturn ErrAccessDenied\n\tcase authTypePresignedV2, authTypeSignedV2:\n\t\tglog.V(3).Infof(\"v2 auth type\")\n\t\tidentity, s3Err = iam.isReqAuthenticatedV2(r)\n\tcase authTypeSigned, authTypePresigned:\n\t\tglog.V(3).Infof(\"v4 auth type\")\n\t\tidentity, s3Err = iam.reqSignatureV4Verify(r)\n\tcase authTypePostPolicy:\n\t\tglog.V(3).Infof(\"post policy auth type\")\n\t\treturn ErrNotImplemented\n\tcase authTypeJWT:\n\t\tglog.V(3).Infof(\"jwt auth type\")\n\t\treturn ErrNotImplemented\n\tcase authTypeAnonymous:\n\t\treturn ErrAccessDenied\n\tdefault:\n\t\treturn ErrNotImplemented\n\t}\n\n\tglog.V(3).Infof(\"auth error: %v\", s3Err)\n\tif s3Err != ErrNone {\n\t\treturn s3Err\n\t}\n\n\tglog.V(3).Infof(\"user name: %v actions: %v\", identity.Name, identity.Actions)\n\n\tvars := mux.Vars(r)\n\tbucket := vars[\"bucket\"]\n\n\tif !identity.canDo(action, bucket) {\n\t\treturn ErrAccessDenied\n\t}\n\n\treturn ErrNone\n\n}", "func RunAccessCheck(client *kubernetes.Clientset, namespace string, resource GroupResource, verb string) (bool, string, error) {\n\tvar sar *authorizationv1.SelfSubjectAccessReview\n\t// Todo for non resource url\n\tsar = &authorizationv1.SelfSubjectAccessReview{\n\t\tSpec: authorizationv1.SelfSubjectAccessReviewSpec{\n\t\t\tResourceAttributes: &authorizationv1.ResourceAttributes{\n\t\t\t\tNamespace: namespace,\n\t\t\t\tVerb: verb,\n\t\t\t\tGroup: resource.APIGroup,\n\t\t\t\tResource: resource.APIResource.Name,\n\t\t\t\tSubresource: \"\",\n\t\t\t\tName: resource.ResourceName,\n\t\t\t},\n\t\t},\n\t}\n\n\tresponse, err := client.AuthorizationV1().SelfSubjectAccessReviews().Create(context.TODO(), sar, metav1.CreateOptions{DryRun: []string{metav1.DryRunAll}})\n\tif err != nil {\n\t\treturn false, \"\", err\n\t}\n\n\tif response.Status.Allowed {\n\t\treturn true, fmt.Sprintf(\"User can %s %s\", verb, resource.APIResource.Name), nil\n\t}\n\n\treturn false, fmt.Sprintf(\"User cannot %s %s\", verb, resource.APIResource.Name), nil\n}", "func TestGranter_groupAccesses_startStopHandling(t *testing.T) {\n\tvar (\n\t\tnow = time.Date(2020, 4, 30, 13, 0, 0, 0, time.UTC)\n\t\tpast1Hour = now.Add(-1 * time.Hour)\n\t\tpast2Hours = now.Add(-2 * time.Hour)\n\t\tfuture1Hour = now.Add(1 * time.Hour)\n\t\tfuture2Hours = now.Add(2 * time.Hour)\n\n\t\t// dummy values for access instances\n\t\thost = \"localhost:5432\"\n\t\tdatabase = \"database\"\n\t\tprivilige = postgres.PrivilegeRead\n\t\treason = \"A good reason\"\n\t)\n\n\taccessSpec := func(start, stop time.Time) lunarwayv1alpha1.AccessSpec {\n\t\tstartTime := v1.NewTime(start)\n\t\tstopTime := v1.NewTime(stop)\n\t\treturn lunarwayv1alpha1.AccessSpec{\n\t\t\tHost: lunarwayv1alpha1.ResourceVar{\n\t\t\t\tValue: host,\n\t\t\t},\n\t\t\tDatabase: lunarwayv1alpha1.ResourceVar{\n\t\t\t\tValue: database,\n\t\t\t},\n\t\t\tSchema: lunarwayv1alpha1.ResourceVar{\n\t\t\t\tValue: database,\n\t\t\t},\n\t\t\tReason: reason,\n\t\t\tStart: &startTime,\n\t\t\tStop: &stopTime,\n\t\t}\n\t}\n\n\taccess := func(start, stop time.Time) *ReadWriteAccess {\n\t\treturn &ReadWriteAccess{\n\t\t\tHost: host,\n\t\t\tDatabase: postgres.DatabaseSchema{\n\t\t\t\tName: database,\n\t\t\t\tSchema: database,\n\t\t\t\tPrivileges: privilige,\n\t\t\t},\n\t\t\tAccess: accessSpec(start, stop),\n\t\t}\n\t}\n\ttt := []struct {\n\t\tname string\n\t\taccess lunarwayv1alpha1.AccessSpec\n\t\toutput *ReadWriteAccess\n\t}{\n\t\t{\n\t\t\tname: \"read starting in the future\",\n\t\t\taccess: accessSpec(future1Hour, future2Hours),\n\t\t\toutput: nil,\n\t\t},\n\t\t{\n\t\t\tname: \"read started and ends in the future\",\n\t\t\taccess: accessSpec(past1Hour, future1Hour),\n\t\t\toutput: access(past1Hour, future1Hour),\n\t\t},\n\t\t{\n\t\t\tname: \"read started and ends in the past\",\n\t\t\taccess: accessSpec(past2Hours, past1Hour),\n\t\t\toutput: nil,\n\t\t},\n\t\t{\n\t\t\tname: \"empty start time\",\n\t\t\taccess: accessSpec(time.Time{}, future1Hour),\n\t\t\toutput: access(time.Time{}, future1Hour),\n\t\t},\n\t\t{\n\t\t\tname: \"empty stop time\",\n\t\t\taccess: accessSpec(past1Hour, time.Time{}),\n\t\t\toutput: access(past1Hour, time.Time{}),\n\t\t},\n\t}\n\tfor _, tc := range tt {\n\t\tt.Run(tc.name, func(t *testing.T) {\n\t\t\tlogger := test.NewLogger(t)\n\t\t\tr := Granter{\n\t\t\t\tNow: func() time.Time {\n\t\t\t\t\treturn now\n\t\t\t\t},\n\t\t\t\tResourceResolver: func(r lunarwayv1alpha1.ResourceVar, ns string) (string, error) {\n\t\t\t\t\treturn r.Value, nil\n\t\t\t\t},\n\t\t\t\tAllDatabases: func(namespace string) ([]lunarwayv1alpha1.PostgreSQLDatabase, error) {\n\t\t\t\t\tt.Fatalf(\"allDatabases was not expected to be used\")\n\t\t\t\t\treturn nil, nil\n\t\t\t\t},\n\t\t\t}\n\n\t\t\toutput, err := r.groupAccesses(logger, \"namespace\", []lunarwayv1alpha1.AccessSpec{tc.access}, nil)\n\n\t\t\tassert.NoError(t, err, \"unexpected output error\")\n\t\t\tvar hostAccess HostAccess\n\t\t\tif tc.output != nil {\n\t\t\t\thostAccess = HostAccess{\n\t\t\t\t\thost: []ReadWriteAccess{\n\t\t\t\t\t\t*tc.output,\n\t\t\t\t\t},\n\t\t\t\t}\n\t\t\t}\n\t\t\tassert.Equal(t, hostAccess, output, \"output map not as expected\")\n\t\t})\n\t}\n}", "func (u *User) Guard(right ...Right) {\n\tif !u.Check(right...) {\n\t\tpanic(\"Access denied\")\n\t}\n}", "func requireAuthWeb(c *router.Context, next router.Handler) {\n\tif auth.CurrentIdentity(c.Context) == identity.AnonymousIdentity {\n\t\tloginURL, err := auth.LoginURL(c.Context, \"/\")\n\t\tif err != nil {\n\t\t\tlogging.Errorf(c.Context, \"Failed to get login URL\")\n\t\t\thttp.Error(c.Writer, err.Error(), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\tlogging.Infof(c.Context, \"Redirecting to %s\", loginURL)\n\t\thttp.Redirect(c.Writer, c.Request, loginURL, 302)\n\t\treturn\n\t}\n\n\tisGoogler, err := auth.IsMember(c.Context, rwGroup)\n\tif err != nil {\n\t\tc.Writer.WriteHeader(http.StatusInternalServerError)\n\t\tlogging.Errorf(c.Context, \"Failed to get group membership.\")\n\t\treturn\n\t}\n\tif isGoogler {\n\t\tnext(c)\n\t\treturn\n\t}\n\n\ttemplates.MustRender(c.Context, c.Writer, \"pages/access_denied.html\", nil)\n}", "func (a authorizer) Authorize(ctx context.Context, id bakery.Identity, ops []bakery.Op) (allowed []bool, caveats []checkers.Caveat, err error) {\n\tallowed = make([]bool, len(ops))\n\tfor i := range allowed {\n\t\tallowed[i] = true\n\t}\n\tcaveats = []checkers.Caveat{{\n\t\tLocation: a.thirdPartyLocation,\n\t\tCondition: \"access-allowed\",\n\t}}\n\treturn\n}", "func mosquitto_auth_acl_check(cUserData unsafe.Pointer, cAccess C.int, cClient *C.const_mosquitto, cMsg *C.const_mosquitto_acl_msg) C.int {\n\tlogger.Println(\"enter - acl check\")\n\tif cUserData == nil {\n\t\tlogger.Println(\"Missing cUserData\")\n\t\treturn C.MOSQ_ERR_AUTH\n\t}\n\n\taccess := access(cAccess)\n\tallow, err := authorise(http.DefaultClient, (*userData)(cUserData), access, unsafe.Pointer(cClient),\n\t\tC.GoString(cMsg.topic))\n\tif err != nil {\n\t\tlogger.Printf(\"leave - acl check error, %s\", err)\n\t\treturn C.MOSQ_ERR_AUTH\n\t}\n\tif !allow {\n\t\tlogger.Printf(\"leave - acl check %s denied\", access)\n\t\treturn C.MOSQ_ERR_PLUGIN_DEFER\n\t}\n\tlogger.Printf(\"leave - acl check %s granted\", access)\n\treturn C.MOSQ_ERR_SUCCESS\n}", "func RunAccessCheck(client *kubernetes.Clientset, namespace string, resource GroupResource, verb string) (bool, string, error) {\n\tvar sar *authorizationv1.SelfSubjectAccessReview\n\n\t// Todo for non resource url\n\tsar = &authorizationv1.SelfSubjectAccessReview{\n\t\tSpec: authorizationv1.SelfSubjectAccessReviewSpec{\n\t\t\tResourceAttributes: &authorizationv1.ResourceAttributes{\n\t\t\t\tNamespace: namespace,\n\t\t\t\tVerb: verb,\n\t\t\t\tGroup: resource.APIGroup,\n\t\t\t\tResource: resource.APIResource.Name,\n\t\t\t\tSubresource: \"\",\n\t\t\t\tName: resource.ResourceName,\n\t\t\t},\n\t\t},\n\t}\n\n\tresponse, err := client.AuthorizationV1().SelfSubjectAccessReviews().Create(context.TODO(), sar, metav1.CreateOptions{DryRun: []string{metav1.DryRunAll}})\n\tif err != nil {\n\t\treturn false, \"\", err\n\t}\n\n\tif response.Status.Allowed {\n\t\treturn true, fmt.Sprintf(\"User can %s %s\", verb, resource.APIResource.Name), nil\n\t}\n\n\treturn false, fmt.Sprintf(\"User cannot %s %s\", verb, resource.APIResource.Name), nil\n}", "func (n *noopRules) Grant(rule *Rule) error {\n\treturn nil\n}", "func (p DirectHandler) AuthHandler(http.ResponseWriter, *http.Request) {}", "func (r *Responder) Forbidden() { r.write(http.StatusForbidden) }", "func (b *basicAuth) set(r *http.Request) { r.SetBasicAuth(b.username, b.password) }", "func (fsys *FS) Access(path string, mask uint32) (errc int) {\n\tdefer fs.Trace(path, \"mask=0%o\", mask)(\"errc=%d\", &errc)\n\t// This is a no-op for rclone\n\treturn 0\n}", "func (r *singleRule) allowVisit(key interface{}) bool {\n\treturn r.add(key) == nil\n}", "func (v *Global) tryApplyBase(base *Global) bool {\n\tif !v.addressBase.IsEmpty() {\n\t\treturn false\n\t}\n\n\tif !base.IsSelfScope() {\n\t\tswitch base.GetScope() {\n\t\tcase LocalDomainMember, GlobalDomainMember:\n\t\t\tbreak\n\t\tdefault:\n\t\t\treturn false\n\t\t}\n\t}\n\tv.addressBase = base.addressLocal\n\treturn true\n}", "func (h *HTTPGuard) Allowed(req *http.Request) error {\n\tif !h.NetworkEnabled {\n\t\treturn ErrNtwkDisabled\n\t}\n\treturn nil\n}", "func methodNotAllowed(rw http.ResponseWriter, r *http.Request) {\n\n}", "func unauthorized(rw http.ResponseWriter, r *http.Request) {\n\n}" ]
[ "0.610188", "0.58374774", "0.5796888", "0.559165", "0.5547429", "0.5455572", "0.5412831", "0.5396493", "0.53754574", "0.5363651", "0.5228847", "0.5221944", "0.5215357", "0.52128583", "0.51806116", "0.51699173", "0.5169516", "0.5151669", "0.5151014", "0.5146564", "0.5122484", "0.51209885", "0.5102152", "0.5097752", "0.5064766", "0.50608563", "0.5054823", "0.50532794", "0.50403357", "0.50364125", "0.50281715", "0.5022768", "0.50080174", "0.5007213", "0.49920017", "0.49915767", "0.497833", "0.4972797", "0.49541268", "0.49515542", "0.49472195", "0.4941292", "0.49358475", "0.49333557", "0.49185413", "0.49013805", "0.489596", "0.48886326", "0.48845127", "0.4868138", "0.48680964", "0.48635834", "0.48610327", "0.48510975", "0.48472112", "0.4840115", "0.48261377", "0.4825226", "0.4821628", "0.4819483", "0.48159084", "0.48025572", "0.47908086", "0.47879434", "0.4787204", "0.4786436", "0.4786435", "0.47805974", "0.47751808", "0.47701702", "0.47651228", "0.47639453", "0.47630882", "0.4759245", "0.47517142", "0.47497073", "0.47423154", "0.4738485", "0.47297847", "0.4725858", "0.47121987", "0.47101063", "0.47018483", "0.46992424", "0.46980637", "0.46964473", "0.46963724", "0.46913216", "0.4688102", "0.4686658", "0.46837035", "0.46834892", "0.46808332", "0.46786416", "0.46767023", "0.46715403", "0.4670569", "0.4669345", "0.46691495", "0.46649665", "0.4661922" ]
0.0
-1
WithSecretID returns a new context with a secret ID.
func WithSecretID(ctx workflow.Context, secretID string) workflow.Context { return workflow.WithValue(ctx, ContextSecretID, secretID) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (_options *CreateSecretVersionOptions) SetSecretID(secretID string) *CreateSecretVersionOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func (_options *GetSecretVersionOptions) SetSecretID(secretID string) *GetSecretVersionOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func (_options *CreateSecretVersionActionOptions) SetSecretID(secretID string) *CreateSecretVersionActionOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func (_options *GetSecretVersionMetadataOptions) SetSecretID(secretID string) *GetSecretVersionMetadataOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func (_options *ListSecretVersionLocksOptions) SetSecretID(secretID string) *ListSecretVersionLocksOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func (_options *UpdateSecretVersionMetadataOptions) SetSecretID(secretID string) *UpdateSecretVersionMetadataOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func (_options *DeleteSecretVersionDataOptions) SetSecretID(secretID string) *DeleteSecretVersionDataOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func (_options *ListSecretVersionsOptions) SetSecretID(secretID string) *ListSecretVersionsOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func WithSecret(secret string) Option {\n\treturn func(o *options) {\n\t\to.secret = secret\n\t}\n}", "func (c *Client) SetSecretID(secretID string) {\n\tc.config.SecretID = secretID\n}", "func NewSecret() *secret {\n\tid, err := randPathString()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn &secret{ID: id, time: time.Now()}\n}", "func (_options *CreateSecretVersionLocksBulkOptions) SetSecretID(secretID string) *CreateSecretVersionLocksBulkOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func SecretID(ctx context.Context) (string, bool) {\n\tsecretID, ok := ctx.Value(ContextSecretID).(string)\n\n\treturn secretID, ok\n}", "func (_options *DeleteSecretVersionLocksBulkOptions) SetSecretID(secretID string) *DeleteSecretVersionLocksBulkOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func NewSecretAPI() *SecretAPI {\n\treturn &SecretAPI{}\n}", "func NewContext(ctx context.Context, p *Passenger) context.Context {\n\treturn context.WithValue(ctx, passengerKey, p)\n}", "func WithContextID(ctx context.Context, id string) context.Context {\n\treturn context.WithValue(ctx, contextIDKey{}, id)\n}", "func WithSecret(secrets ...Secret) Option {\n\treturn WithTransform(\n\t\ttransformSecret(secrets...),\n\t)\n}", "func NewContext(ctx context.Context, id string) context.Context {\n\treturn context.WithValue(ctx, idContextKey, id)\n}", "func (c *SecretConverter) newSecret() *corev1.Secret {\n\tsecret := &corev1.Secret{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: c.keyvaultSecret.Name,\n\t\t\tNamespace: c.keyvaultSecret.Namespace,\n\t\t\tOwnerReferences: []metav1.OwnerReference{\n\t\t\t\t*metav1.NewControllerRef(c.keyvaultSecret, schema.GroupVersionKind{\n\t\t\t\t\tGroup: keyvaultsecretv1alpha1.SchemeGroupVersion.Group,\n\t\t\t\t\tVersion: keyvaultsecretv1alpha1.SchemeGroupVersion.Version,\n\t\t\t\t\tKind: \"KeyvaultSecret\",\n\t\t\t\t}),\n\t\t\t},\n\t\t},\n\t}\n\treturn secret\n}", "func NewShowSecretsContext(ctx context.Context, r *http.Request, service *goa.Service) (*ShowSecretsContext, error) {\n\tvar err error\n\tresp := goa.ContextResponse(ctx)\n\tresp.Service = service\n\treq := goa.ContextRequest(ctx)\n\treq.Request = r\n\trctx := ShowSecretsContext{Context: ctx, ResponseData: resp, RequestData: req}\n\tparamID := req.Params[\"id\"]\n\tif len(paramID) > 0 {\n\t\trawID := paramID[0]\n\t\tif id, err2 := uuid.FromString(rawID); err2 == nil {\n\t\t\trctx.ID = id\n\t\t} else {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidParamTypeError(\"id\", rawID, \"uuid\"))\n\t\t}\n\t}\n\treturn &rctx, err\n}", "func WithSessionID(ctx context.Context, sessionID string) context.Context {\n\treturn context.WithValue(ctx, sessionIDKey, sessionID)\n}", "func WithTenantID(ctx context.Context, tenantID string) context.Context {\n\tif ctx == nil {\n\t\tctx = context.Background()\n\t}\n\treturn context.WithValue(ctx, ctxTenantKey{}, tenantID)\n}", "func (b *BTT) WithSecret(s string) *BTT {\n\tb.secret = s\n\treturn b\n}", "func (tags Tags) WithSecret(label string, secret *corev1.Secret) Tags {\n\tif secret != nil {\n\t\tobj := make(map[string]interface{})\n\t\tfor n, v := range secret.Data {\n\t\t\tobj[n] = string(v)\n\t\t}\n\t\ttags = tags.With(label, obj)\n\t}\n\treturn tags\n}", "func WithSecretTemplate(t string) option {\n\treturn func(s *store) {\n\t\ts.secretTemplate = t\n\t}\n}", "func WithUserID(ctx context.Context, userID string) context.Context {\n\treturn context.WithValue(ctx, UserIDKey, userID)\n}", "func NewContext(parent context.Context, abilityID string) (context.Context, error) {\n\tid, err := strconv.Atoi(abilityID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn context.WithValue(parent, abilityIDKey, id), nil\n}", "func NewContext(ctx context.Context, userId int64) context.Context {\n\treturn context.WithValue(ctx, userKey{}, userId)\n}", "func NewContext(ctx context.Context, rights Rights) context.Context {\n\treturn context.WithValue(ctx, rightsKey, rights)\n}", "func (o *PartnerCustomerCreateRequest) SetSecret(v string) {\n\to.Secret = &v\n}", "func WithID(id guid.GUID) ProviderOpt {\n\treturn func(opts *providerOpts) {\n\t\topts.id = id\n\t}\n}", "func createSessionFromSecret(secret *corev1.Secret) *session.Session {\n\n accessKeyId := string(secret.Data[accessKeyIdPropName])\n secretAccessKey := string(secret.Data[secretAccessKeyPropName])\n\n\n log.Infof(\"Creating session from secret %q containing accessKeyId=%s\", *secret.Metadata.Name, accessKeyId)\n\n return createSession(accessKeyId, secretAccessKey, *secret.Metadata.Name + \"-\" +\"orig\")\n\n}", "func NewSecret(secret string, expireAfterViews, expireAfter int) (Secret, error) {\n\tvar result Secret\n\tresult.Hash = GenHashKey()\n\tresult.CreatedAt = time.Now()\n\n\tif secret == \"\" {\n\t\treturn Secret{}, ErrEmptySecret\n\t}\n\tresult.SecretText = secret\n\n\tif expireAfterViews < 1 {\n\t\treturn Secret{}, ErrInvalidExpireAfterViews\n\t}\n\tresult.RemainingViews = expireAfterViews\n\n\tif expireAfter < 0 {\n\t\treturn Secret{}, ErrInvalidExpireAfter\n\t}\n\n\tif expireAfter > 0 {\n\t\tresult.ExpiresAt = result.CreatedAt.Add(time.Duration(expireAfter) * time.Minute)\n\t}\n\n\treturn result, nil\n}", "func New(parent context.Context, id, language string) *Context {\n\treturn &Context{\n\t\tID: id,\n\t\tLanguage: language,\n\t\tContext: context.WithValue(parent, ContextIDKey, id),\n\t}\n}", "func NewSecretService(ctx *core.Context) *SecretService {\n\treturn &SecretService{\n\t\tlog: log.New(log.Writer(), \"[Secrets] \", 0),\n\t\terr: nil,\n\t\tctx: ctx,\n\t}\n}", "func (b *TokenBuilder) WithSecret(secret string) *TokenBuilder {\n\tb.secret = &secret\n\treturn b\n}", "func NewSecret(\n\tc client.Client,\n\tname, namespace string,\n\tlabels map[string]string,\n\tsecType corev1.SecretType,\n\tdata map[string][]byte) *Secret {\n\treturn &Secret{\n\t\tNamespacedName: types.NamespacedName{\n\t\t\tName: name,\n\t\t\tNamespace: namespace,\n\t\t},\n\t\tlabels: labels,\n\t\tclient: c,\n\t\tsecType: secType,\n\t\tdata: data,\n\t}\n}", "func NewSecret(client client.Client, namespace, name string, data map[string][]byte, secretNameWithPrefix bool) (string, *builder.Secret) {\n\tsecretName := SecretName(name, secretNameWithPrefix)\n\treturn secretName, builder.NewSecret(client).\n\t\tWithNamespacedName(namespace, secretName).\n\t\tWithKeyValues(data)\n}", "func WithContext(ctx context.Context) context.Context {\n\treturn context.WithValue(ctx, contextKey, uuid.New())\n}", "func (WebhookOptions) Secret(secret string) Option {\n\treturn func(hook *Webhook) error {\n\t\thook.secret = secret\n\t\treturn nil\n\t}\n}", "func WithSessionID(ctx context.Context, sessionID eh.UUID) context.Context {\n\treturn context.WithValue(ctx, sessionIDKey, sessionID)\n}", "func (o *AssetReportRefreshRequest) SetSecret(v string) {\n\to.Secret = &v\n}", "func (_options *GetSecretOptions) SetID(id string) *GetSecretOptions {\n\t_options.ID = core.StringPtr(id)\n\treturn _options\n}", "func (s *SecretAPI) GetSecret(secretID, versionID, versionStage string) (*Secret, error) {\n\n\tif s.err != nil {\n\t\treturn nil, s.err\n\t}\n\n\tcs := C.CString(secretID)\n\tcv := C.CString(versionID)\n\tct := C.CString(versionStage)\n\n\tdefer func() {\n\t\ts.close()\n\t\tC.free(unsafe.Pointer(cs))\n\t\tC.free(unsafe.Pointer(cv))\n\t\tC.free(unsafe.Pointer(ct))\n\t}()\n\n\tres := C.gg_request_result{}\n\n\ts.APIRequest.initialize()\n\n\te := GreenGrassCode(C.gg_get_secret_value(s.request, cs, cv, ct, &res))\n\n\ts.response = s.handleRequestResponse(\n\t\t\"Failed to get secret\",\n\t\te, RequestStatus(res.request_status),\n\t)\n\n\tif s.err != nil {\n\t\treturn nil, s.err\n\t}\n\n\tLog(LogLevelInfo, \"Got Secret: %s\", s.response)\n\n\tvar secret Secret\n\tif err := json.Unmarshal([]byte(s.response), &secret); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &secret, nil\n\n}", "func NewContext(config, secrets map[string]interface{}) *Context {\n\treturn &Context{\n\t\tresults: starlark.StringDict{},\n\t\tvalues: starlark.StringDict{},\n\t\tconfig: config,\n\t\tsecrets: secrets,\n\t}\n}", "func (o *ProcessorSignalDecisionReportRequest) SetSecret(v string) {\n\to.Secret = &v\n}", "func NewSecret() string {\n\treturn RandomWithMd5(32)\n}", "func NewContext(ctx context.Context, cfg *Config) context.Context {\n\treturn context.WithValue(ctx, cfgKey, cfg)\n}", "func NewSecret(l int) string {\n\treturn gotp.RandomSecret(l)\n}", "func (factory *secretClientFactory) NewSecretClient(ctx context.Context,\n\tconfig SecretConfig,\n\tlc loggingClient,\n\ttokenExpiredCallback tokenExpiredCallback) (pkg.SecretClient, error) {\n\tif ctx == nil {\n\t\treturn nil, pkg.NewErrSecretStore(\"background ctx is required and cannot be nil\")\n\t}\n\n\ttokenStr := config.Authentication.AuthToken\n\tif tokenStr == \"\" {\n\t\treturn nil, pkg.NewErrSecretStore(\"AuthToken is required in config\")\n\t}\n\n\thttpClient, err := createHTTPClient(config)\n\tif err != nil {\n\t\treturn Client{}, err\n\t}\n\n\tif config.RetryWaitPeriod != \"\" {\n\t\tretryTimeDuration, err := time.ParseDuration(config.RetryWaitPeriod)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tconfig.retryWaitPeriodTime = retryTimeDuration\n\t}\n\n\tsecretClient := Client{\n\t\tHttpConfig: config,\n\t\tHttpCaller: httpClient,\n\t\tlc: lc,\n\t}\n\n\tfactory.mapMutex.Lock()\n\t// if there is context already associated with the given token,\n\t// then we cancel it first\n\tif cancel, exists := factory.tokenCancelFunc[tokenStr]; exists {\n\t\tcancel()\n\t}\n\tfactory.mapMutex.Unlock()\n\n\tcCtx, cancel := context.WithCancel(ctx)\n\tif err = secretClient.refreshToken(cCtx, tokenExpiredCallback); err != nil {\n\t\tcancel()\n\t\tfactory.mapMutex.Lock()\n\t\tdelete(factory.tokenCancelFunc, tokenStr)\n\t\tfactory.mapMutex.Unlock()\n\t} else {\n\t\tfactory.mapMutex.Lock()\n\t\tfactory.tokenCancelFunc[tokenStr] = cancel\n\t\tfactory.mapMutex.Unlock()\n\t}\n\n\treturn secretClient, err\n}", "func (s *DBSecretsService) AddSecret(ctx context.Context, organizationID string, secret v1.Secret) (*v1.Secret, error) {\n\tspan, ctx := trace.Trace(ctx, \"\")\n\tdefer span.Finish()\n\n\t// TODO: encrypt secret's content\n\te := s.secretModelToEntity(&secret)\n\te.OrganizationID = organizationID\n\t_, err := s.EntityStore.Add(ctx, e)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn s.secretEntityToModel(e), nil\n}", "func newContext(wrapped context.Context, identifier int) Context {\n\treturn &contextImpl{wrapped, identifier, false, sync.Mutex{}}\n}", "func (dbm *DBManager) SetSecret(secret string) (err error) {\n\tdbm.secret = secret\n\tif secret == \"\" {\n\t\tdbm.cryptor = nil\n\t} else {\n\t\tdbm.cryptor, err = newAESCryptor([]byte(secret))\n\t}\n\n\treturn err\n}", "func Use(ctx context.Context, cfg *Config) context.Context {\n\treturn secrets.Use(ctx, New(cfg))\n}", "func (o GetResponsePlanIntegrationPagerdutyOutput) SecretId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetResponsePlanIntegrationPagerduty) string { return v.SecretId }).(pulumi.StringOutput)\n}", "func (secretsManager *SecretsManagerV2) GetSecretWithContext(ctx context.Context, getSecretOptions *GetSecretOptions) (result SecretIntf, response *core.DetailedResponse, err error) {\n\terr = core.ValidateNotNil(getSecretOptions, \"getSecretOptions cannot be nil\")\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.ValidateStruct(getSecretOptions, \"getSecretOptions\")\n\tif err != nil {\n\t\treturn\n\t}\n\n\tpathParamsMap := map[string]string{\n\t\t\"id\": *getSecretOptions.ID,\n\t}\n\n\tbuilder := core.NewRequestBuilder(core.GET)\n\tbuilder = builder.WithContext(ctx)\n\tbuilder.EnableGzipCompression = secretsManager.GetEnableGzipCompression()\n\t_, err = builder.ResolveRequestURL(secretsManager.Service.Options.URL, `/api/v2/secrets/{id}`, pathParamsMap)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor headerName, headerValue := range getSecretOptions.Headers {\n\t\tbuilder.AddHeader(headerName, headerValue)\n\t}\n\n\tsdkHeaders := common.GetSdkHeaders(\"secrets_manager\", \"V2\", \"GetSecret\")\n\tfor headerName, headerValue := range sdkHeaders {\n\t\tbuilder.AddHeader(headerName, headerValue)\n\t}\n\tbuilder.AddHeader(\"Accept\", \"application/json\")\n\n\trequest, err := builder.Build()\n\tif err != nil {\n\t\treturn\n\t}\n\n\tvar rawResponse map[string]json.RawMessage\n\tresponse, err = secretsManager.Service.Request(request, &rawResponse)\n\tif err != nil {\n\t\treturn\n\t}\n\tif rawResponse != nil {\n\t\terr = core.UnmarshalModel(rawResponse, \"\", &result, UnmarshalSecret)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tresponse.Result = result\n\t}\n\n\treturn\n}", "func Secret(s string) PinningOption {\n\treturn func(o *Pinning) {\n\t\to.Secret = s\n\t}\n}", "func NewSecretBackend() *SecretBackend {\n\treturn &SecretBackend{\n\t\tcmd: secretBackendCommand,\n\t\tcmdArgs: secretBackendArgs,\n\t\tcmdOutputMaxSize: defaultCmdOutputMaxSize,\n\t\tcmdTimeout: defaultCmdTimeout,\n\t}\n}", "func (context *handlerContext) CookieSecret() string {\n\treturn context.cookieSecret\n}", "func (cred *OAuth2Credential) WithAccountID(accountID string) *OAuth2Credential {\n\tif cred == nil {\n\t\treturn nil\n\t}\n\tcred.mu.Lock()\n\tdefer cred.mu.Unlock()\n\treturn &OAuth2Credential{\n\t\taccountID: accountID,\n\t\tbaseURI: nil,\n\t\tcachedToken: cred.cachedToken,\n\t\trefresher: cred.refresher,\n\t\tcacheFunc: cred.cacheFunc,\n\t\tisDemo: cred.isDemo,\n\t\tuserInfo: cred.userInfo,\n\t\tFunc: cred.Func,\n\t}\n}", "func InitFromSecret() {\n\t// FIXME(xnum): It shouldn't be used. This makes aes depend on secret\n\t// initialized.\n\tif len(keySecret.key) == 0 {\n\t\tkey := []byte(secret.Get(\"AES_KEY_SECRET\"))\n\t\tsetupKeySecret(key)\n\t}\n}", "func NewContext(ctx context.Context, md Metadata) context.Context {\n\tif ctx == nil {\n\t\tctx = context.Background()\n\t}\n\treturn context.WithValue(ctx, metadataKey{}, Copy(md))\n}", "func WithID(ctx context.Context, id string) context.Context {\n\treturn context.WithValue(ctx, correlationID, id)\n}", "func (o ResponsePlanIntegrationPagerdutyOutput) SecretId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ResponsePlanIntegrationPagerduty) string { return v.SecretId }).(pulumi.StringOutput)\n}", "func (r *LinkedSecretReconciler) NewLinkedSecret(ctx context.Context, linkedsecret *securityv1.LinkedSecret) error {\n\n\tlog := r.Log.WithValues(\"linkedsecret\", fmt.Sprintf(\"%s/%s\", linkedsecret.Namespace, linkedsecret.Name))\n\n\t// remove schedule if secret name was changed\n\tif linkedsecret.Status.CronJobID > 0 {\n\t\tif err := r.RemoveCronJob(ctx, linkedsecret); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// set default secret name if it was not informed\n\t// if linkedsecret.Spec.SecretName != \"\" {\n\t// \tlinkedsecret.Spec.SecretName = linkedsecret.Name\n\t// }\n\n\t// update provider status\n\tlinkedsecret.Status.CurrentProvider = linkedsecret.Spec.Provider\n\tlinkedsecret.Status.CurrentProviderOptions = linkedsecret.Spec.ProviderOptions\n\n\t// create secret with providerdata\n\tsecret, err := r.GetProviderSecret(linkedsecret)\n\n\tif err != nil {\n\t\tr.Recorder.Event(linkedsecret, \"Warning\", \"FailSynching\", err.Error())\n\t\tlinkedsecret.Status.CurrentSecretStatus = STATUSNOTSYNCHED\n\t\tif err := r.Status().Update(ctx, linkedsecret); err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn err\n\t}\n\n\t// always set the controller reference so that we know which object owns this.\n\tif err := ctrl.SetControllerReference(linkedsecret, &secret, r.Scheme); err != nil {\n\t\treturn err\n\t}\n\n\tcreateOptions := &client.CreateOptions{FieldManager: \"linkedsecret.Name\"}\n\n\tif err = r.Create(ctx, &secret, createOptions); err != nil {\n\t\tr.Recorder.Event(linkedsecret, \"Warning\", \"FailCreating\", err.Error())\n\t\tlinkedsecret.Status.CurrentSecretStatus = STATUSNOTSYNCHED\n\n\t\tif err := r.Status().Update(ctx, linkedsecret); err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn err\n\t}\n\n\tlog.V(1).Info(\"Synchronize secret data on creation\", \"secret\", fmt.Sprintf(\"%s/%s\", secret.Namespace, secret.Name))\n\n\t// update linkedsecret status\n\tlinkedsecret.Status.CurrentSecretStatus = STATUSSYNCHED\n\tlinkedsecret.Status.CreatedSecret = secret.Name\n\tlinkedsecret.Status.CreatedSecretNamespace = secret.Namespace\n\tlinkedsecret.Status.LastScheduleExecution = &metav1.Time{Time: time.Now()}\n\n\tif err := r.Status().Update(ctx, linkedsecret); err != nil {\n\t\treturn err\n\t}\n\n\t// Record secret created\n\tr.Recorder.Event(linkedsecret, \"Normal\", \"Created\", fmt.Sprintf(\"Secret %s/%s\", secret.Namespace, secret.Name))\n\n\t// create secret cronjob if a schedule was defined\n\tif linkedsecret.Spec.Schedule != \"\" && !linkedsecret.Spec.Suspended {\n\t\tr.AddCronjob(ctx, linkedsecret)\n\t}\n\n\treturn nil\n}", "func WithLogID(ctx context.Context, val interface{}) context.Context {\n\treturn context.WithValue(ctx, contextLogID, val)\n}", "func (gsc *GameServerCreate) SetSecret(s string) *GameServerCreate {\n\tgsc.mutation.SetSecret(s)\n\treturn gsc\n}", "func NewContext(ctx context.Context, requestID string) Context {\n\tif ctx == nil {\n\t\tctx = context.Background()\n\t}\n\treturn Context{context.WithValue(ctx, requestIDKey, requestID)}\n}", "func NewContext(ctx context.Context, span *Span) context.Context {\n\treturn context.WithValue(ctx, spanKey, span)\n}", "func NewContext(\n\tcfg *config.Config,\n\tbuildVersion string,\n\tresolver hostname.ResolverChangeNotifier,\n\tlookup host.IDLookup,\n\tsampleMatchFn sampler.IncludeSampleMatchFn,\n) *context {\n\tctx, cancel := context2.WithCancel(context2.Background())\n\n\tvar agentKey atomic.Value\n\tagentKey.Store(\"\")\n\treturn &context{\n\t\tcfg: cfg,\n\t\tCtx: ctx,\n\t\tCancelFn: cancel,\n\t\tid: id.NewContext(ctx),\n\t\treconnecting: new(sync.Map),\n\t\tversion: buildVersion,\n\t\tservicePidLock: &sync.RWMutex{},\n\t\tservicePids: make(map[string]map[int]string),\n\t\tresolver: resolver,\n\t\tidLookup: lookup,\n\t\tshouldIncludeEvent: sampleMatchFn,\n\t\tagentKey: agentKey,\n\t}\n}", "func (secretsDb *DB) GetSecret(id string) (*secrets.Secret, error) {\n\tvar secret secretSelect\n\terr := secretsDb.SelectOne(&secret, selectSecret, id)\n\tvar newSecret *secrets.Secret\n\tif err != nil {\n\t\treturn nil, errorutils.ProcessSQLNotFound(err, id, \"GetSecret\")\n\t}\n\n\tnewSecret, err = secretsDb.fromDBSelectSecret(&secret)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, fmt.Sprintf(\"GetSecret: unable to translate secret from db struct %+s\", id))\n\t}\n\treturn newSecret, nil\n}", "func (secretsManager *SecretsManagerV2) CreateSecretWithContext(ctx context.Context, createSecretOptions *CreateSecretOptions) (result SecretIntf, response *core.DetailedResponse, err error) {\n\terr = core.ValidateNotNil(createSecretOptions, \"createSecretOptions cannot be nil\")\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.ValidateStruct(createSecretOptions, \"createSecretOptions\")\n\tif err != nil {\n\t\treturn\n\t}\n\n\tbuilder := core.NewRequestBuilder(core.POST)\n\tbuilder = builder.WithContext(ctx)\n\tbuilder.EnableGzipCompression = secretsManager.GetEnableGzipCompression()\n\t_, err = builder.ResolveRequestURL(secretsManager.Service.Options.URL, `/api/v2/secrets`, nil)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor headerName, headerValue := range createSecretOptions.Headers {\n\t\tbuilder.AddHeader(headerName, headerValue)\n\t}\n\n\tsdkHeaders := common.GetSdkHeaders(\"secrets_manager\", \"V2\", \"CreateSecret\")\n\tfor headerName, headerValue := range sdkHeaders {\n\t\tbuilder.AddHeader(headerName, headerValue)\n\t}\n\tbuilder.AddHeader(\"Accept\", \"application/json\")\n\tbuilder.AddHeader(\"Content-Type\", \"application/json\")\n\n\t_, err = builder.SetBodyContentJSON(createSecretOptions.SecretPrototype)\n\tif err != nil {\n\t\treturn\n\t}\n\n\trequest, err := builder.Build()\n\tif err != nil {\n\t\treturn\n\t}\n\n\tvar rawResponse map[string]json.RawMessage\n\tresponse, err = secretsManager.Service.Request(request, &rawResponse)\n\tif err != nil {\n\t\treturn\n\t}\n\tif rawResponse != nil {\n\t\terr = core.UnmarshalModel(rawResponse, \"\", &result, UnmarshalSecret)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tresponse.Result = result\n\t}\n\n\treturn\n}", "func withAccessToken(ctx context.Context, accessToken string) context.Context {\n\treturn context.WithValue(ctx, bbapi.ContextAccessToken, accessToken)\n}", "func (p *PluginClient) Secret(secret corev1.Secret) OptionFunc {\n\treturn SecretOpts(secret)\n}", "func withToolID(id int) toolOption {\n\treturn func(m *ToolMutation) {\n\t\tvar (\n\t\t\terr error\n\t\t\tonce sync.Once\n\t\t\tvalue *Tool\n\t\t)\n\t\tm.oldValue = func(ctx context.Context) (*Tool, error) {\n\t\t\tonce.Do(func() {\n\t\t\t\tif m.done {\n\t\t\t\t\terr = fmt.Errorf(\"querying old values post mutation is not allowed\")\n\t\t\t\t} else {\n\t\t\t\t\tvalue, err = m.Client().Tool.Get(ctx, id)\n\t\t\t\t}\n\t\t\t})\n\t\t\treturn value, err\n\t\t}\n\t\tm.id = &id\n\t}\n}", "func NewIAMContext(parent context.Context, val *IAMConfig) context.Context {\n\treturn context.WithValue(parent, iamConfigKey{}, val)\n}", "func NewContext(id *ID, message string, root *json.Root) *Context {\n\treturn &Context{\n\t\tid: id,\n\t\tmessage: message,\n\t\troot: root,\n\t}\n}", "func newSecretClient(subID string, authorizer auth.Authorizer) (*client, error) {\n\tc, err := wssdcloudclient.GetSecretClient(&subID, authorizer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &client{c}, nil\n}", "func NewContext(ctx context.Context, txn Transaction) context.Context {\n\treturn context.WithValue(ctx, contextKey, txn)\n}", "func NewSecret(name, username, password, namespace string, isToken bool) (*Secret) {\n\tlog.Debugf(\"NewSecret(%v, %v, %v)\", username, strings.Repeat(\"*\", len(password)), namespace)\n\n\tvar s *Secret\n\ts = &Secret{\n\t\tName: name,\n\t\tPassword: password,\n\t\tNamespace: namespace,\n\t\tInterface: orch.ClientSet.CoreV1().Secrets(namespace),\n\t}\n\tif !isToken {\n\t\ts.Username = username\n\t}\n\n\treturn s\n}", "func SecretController(c *gin.Context) {\n\tc.JSON(200, &models.ResponsePayload{Success: true, Message: c.MustGet(\"id\").(string)})\n}", "func withTenantID(id int) tenantOption {\n\treturn func(m *TenantMutation) {\n\t\tvar (\n\t\t\terr error\n\t\t\tonce sync.Once\n\t\t\tvalue *Tenant\n\t\t)\n\t\tm.oldValue = func(ctx context.Context) (*Tenant, error) {\n\t\t\tonce.Do(func() {\n\t\t\t\tif m.done {\n\t\t\t\t\terr = fmt.Errorf(\"querying old values post mutation is not allowed\")\n\t\t\t\t} else {\n\t\t\t\t\tvalue, err = m.Client().Tenant.Get(ctx, id)\n\t\t\t\t}\n\t\t\t})\n\t\t\treturn value, err\n\t\t}\n\t\tm.id = &id\n\t}\n}", "func Secret(c *cli.Context) string {\n\tv := c.String(flagSecret)\n\tif v == \"\" {\n\t\treturn env.GetString(EnvBittrexSecret)\n\t}\n\n\treturn v\n}", "func NewSecretController(informerFactory informers.SharedInformerFactory, syncrule helpers.SyncRule, local bool) *SecretController {\n\tsecretInformer := informerFactory.Core().V1().Secrets()\n\n\tc := &SecretController{\n\t\tinformerFactory: informerFactory,\n\t\tsecretInformer: secretInformer,\n\t\tsyncrule: syncrule,\n\t}\n\tif local {\n\t\tsecretInformer.Informer().AddEventHandler(\n\t\t\t// Your custom resource event handlers.\n\t\t\tcache.ResourceEventHandlerFuncs{\n\t\t\t\t// Called on creation\n\t\t\t\tAddFunc: c.localSecretAdd,\n\t\t\t\t// Called on resource update and every resyncPeriod on existing resources.\n\t\t\t\tUpdateFunc: c.localSecretUpdate,\n\t\t\t\t// Called on resource deletion.\n\t\t\t\tDeleteFunc: c.localSecretDelete,\n\t\t\t},\n\t\t)\n\t\treturn c\n\t}\n\tsecretInformer.Informer().AddEventHandler(\n\t\t// Your custom resource event handlers.\n\t\tcache.ResourceEventHandlerFuncs{\n\t\t\t// Called on creation\n\t\t\tAddFunc: c.secretAdd,\n\t\t\t// Called on resource update and every resyncPeriod on existing resources.\n\t\t\tUpdateFunc: c.secretUpdate,\n\t\t\t// Called on resource deletion.\n\t\t\tDeleteFunc: c.secretDelete,\n\t\t},\n\t)\n\treturn c\n}", "func WithContext(ctx context.Context, fnctx Context) context.Context {\n\treturn context.WithValue(ctx, ctxKey, fnctx)\n}", "func ContextWithHeight(height int64) context.Context {\n\tif height == 0 {\n\t\treturn context.Background()\n\t}\n\n\treturn metadata.AppendToOutgoingContext(context.Background(), grpctypes.GRPCBlockHeightHeader, fmt.Sprintf(\"%d\", height))\n}", "func NewSecretObject(app *v3.Application) corev1.Secret {\n\tdockercfgJSONContent, err := handleDockerCfgJSONContent(app.Spec.OptTraits.ImagePullConfig.Username, app.Spec.OptTraits.ImagePullConfig.Password, \"\", app.Spec.OptTraits.ImagePullConfig.Registry)\n\tif err != nil {\n\t\tlog.Errorf(\"Create docker secret failed for %s\", app.Namespace)\n\t\treturn corev1.Secret{}\n\t}\n\tdatamap := map[string][]byte{}\n\tdatamap[corev1.DockerConfigJsonKey] = dockercfgJSONContent\n\tsecret := corev1.Secret{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tOwnerReferences: []metav1.OwnerReference{*metav1.NewControllerRef(app, v3.SchemeGroupVersion.WithKind(\"Application\"))},\n\t\t\tNamespace: app.Namespace,\n\t\t\tName: app.Name + \"-\" + \"registry-secret\",\n\t\t},\n\t\tData: datamap,\n\t\tType: corev1.SecretTypeDockerConfigJson,\n\t}\n\treturn secret\n}", "func WithTenantID(tenantID string) interface {\n\tAcquireByAuthCodeOption\n\tAcquireByDeviceCodeOption\n\tAcquireByUsernamePasswordOption\n\tAcquireInteractiveOption\n\tAcquireSilentOption\n\tAuthCodeURLOption\n\toptions.CallOption\n} {\n\treturn struct {\n\t\tAcquireByAuthCodeOption\n\t\tAcquireByDeviceCodeOption\n\t\tAcquireByUsernamePasswordOption\n\t\tAcquireInteractiveOption\n\t\tAcquireSilentOption\n\t\tAuthCodeURLOption\n\t\toptions.CallOption\n\t}{\n\t\tCallOption: options.NewCallOption(\n\t\t\tfunc(a any) error {\n\t\t\t\tswitch t := a.(type) {\n\t\t\t\tcase *acquireTokenByAuthCodeOptions:\n\t\t\t\t\tt.tenantID = tenantID\n\t\t\t\tcase *acquireTokenByDeviceCodeOptions:\n\t\t\t\t\tt.tenantID = tenantID\n\t\t\t\tcase *acquireTokenByUsernamePasswordOptions:\n\t\t\t\t\tt.tenantID = tenantID\n\t\t\t\tcase *acquireTokenSilentOptions:\n\t\t\t\t\tt.tenantID = tenantID\n\t\t\t\tcase *authCodeURLOptions:\n\t\t\t\t\tt.tenantID = tenantID\n\t\t\t\tcase *interactiveAuthOptions:\n\t\t\t\t\tt.tenantID = tenantID\n\t\t\t\tdefault:\n\t\t\t\t\treturn fmt.Errorf(\"unexpected options type %T\", a)\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t},\n\t\t),\n\t}\n}", "func ctxFromAuthToken(ctx context.Context, atv authTokenValue) context.Context {\n\treturn context.WithValue(ctx, authTokenKey{}, atv)\n}", "func newContextWithAuth(perms []weave.Condition) (weave.Context, x.Authenticator) {\n\tctx := context.Background()\n\t// Set current block height to 100\n\tctx = weave.WithHeight(ctx, 100)\n\tauth := &weavetest.CtxAuth{Key: \"authKey\"}\n\t// Create a new context and add addr to the list of signers\n\treturn auth.SetConditions(ctx, perms...), auth\n}", "func WithChainID(ctx Context, chainID string) Context {\n\tif ctx.Value(contextKeyChainID) != nil {\n\t\tpanic(\"Chain ID already set\")\n\t}\n\tif !IsValidChainID(chainID) {\n\t\tpanic(fmt.Sprintf(\"Invalid chain ID: %s\", chainID))\n\t}\n\treturn context.WithValue(ctx, contextKeyChainID, chainID)\n}", "func (a *API) SetSecret(secret string) {\n\ta.credMu.Lock()\n\tdefer a.credMu.Unlock()\n\tif a.credentials == nil {\n\t\ta.credentials = &Credentials{}\n\t}\n\ta.credentials.Secret = secret\n}", "func newContextWithSessionID(ctx context.Context, r *http.Request) context.Context {\n\tvar sessionID string\n\tsessionID = \"\"\n\tif r.Method == http.MethodPost {\n\t\tsessionID = checkBody(r)\n\t}\n\tif sessionID == \"\" {\n\t\tsessionID = checkGetParams(r)\n\t\tif sessionID == \"\" {\n\t\t\tsessionID = checkCookie(r)\n\t\t\tif sessionID == \"\" {\n\t\t\t\tttl := getSessionTTL(r)\n\t\t\t\tsessionID = createSession(ttl)\n\t\t\t\treturn context.WithValue(ctx, sessionIDKey, sessionID)\n\t\t\t}\n\t\t}\n\t}\n\n\t// Check the session is exists, if not create a new\n\tsess, err := GetSession(sessionID)\n\tif err != nil || sess == nil || len(sess.Values) == 0 {\n\t\tttl := getSessionTTL(r)\n\t\tsessionID = createSession(ttl)\n\t}\n\treturn context.WithValue(ctx, sessionIDKey, sessionID)\n}", "func (rc *Ctx) WithID(id string) *Ctx {\n\trc.id = id\n\treturn rc\n}", "func (s Keygen) Secret() *party.Secret {\n\treturn &party.Secret{\n\t\tID: s.selfID,\n\t}\n}", "func (l CMD) AddSecret(secret string) Logger {\n\tl.secrets = append(l.secrets, secret)\n\treturn l\n}", "func (gsu *GameServerUpdate) SetSecret(s string) *GameServerUpdate {\n\tgsu.mutation.SetSecret(s)\n\treturn gsu\n}", "func NewSpanContext(traceID TraceID, spanID, parentID SpanID, sampled bool, baggage map[string]string) SpanContext {\n\tsamplingState := &samplingState{}\n\tif sampled {\n\t\tsamplingState.setSampled()\n\t}\n\n\treturn SpanContext{\n\t\ttraceID: traceID,\n\t\tspanID: spanID,\n\t\tparentID: parentID,\n\t\tsamplingState: samplingState,\n\t\tbaggage: baggage}\n}", "func (backend *JwtBackend) secretLock(secretID string) *locksutil.LockEntry {\n\treturn locksutil.LockForKey(backend.secretLocks, secretID)\n}" ]
[ "0.6708743", "0.66795635", "0.6582763", "0.65325576", "0.6383518", "0.63085854", "0.6278933", "0.6258649", "0.61893237", "0.6098828", "0.6063498", "0.59297746", "0.58728474", "0.585543", "0.57596815", "0.5711089", "0.5705976", "0.57041556", "0.569213", "0.5647858", "0.5613637", "0.5515969", "0.5508679", "0.5488208", "0.5485655", "0.54723555", "0.5439777", "0.5386358", "0.53736067", "0.5316553", "0.53023624", "0.5298348", "0.5296974", "0.52757037", "0.527382", "0.5254402", "0.5249271", "0.52488303", "0.52374166", "0.52356136", "0.5231311", "0.52265126", "0.5222774", "0.52187854", "0.5206015", "0.52009106", "0.5196449", "0.5174897", "0.51715976", "0.516994", "0.5156606", "0.5148743", "0.5138976", "0.51355046", "0.51110065", "0.5093485", "0.50878227", "0.50755256", "0.50529456", "0.5051585", "0.5047134", "0.50444794", "0.5043147", "0.5031616", "0.5012619", "0.5009022", "0.50072175", "0.49992257", "0.49931273", "0.49860612", "0.49846426", "0.49694854", "0.4957949", "0.49573964", "0.49548337", "0.49459597", "0.49451184", "0.49401376", "0.49393722", "0.49386698", "0.4927697", "0.4920252", "0.4916097", "0.4913924", "0.49131018", "0.49056292", "0.48934996", "0.48914105", "0.48904896", "0.488732", "0.48851463", "0.48837686", "0.48783907", "0.4878119", "0.48770782", "0.48754454", "0.4874567", "0.48713607", "0.48699006", "0.4867227" ]
0.8187569
0
SecretID returns a secret ID from a context (if any).
func SecretID(ctx context.Context) (string, bool) { secretID, ok := ctx.Value(ContextSecretID).(string) return secretID, ok }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func WithSecretID(ctx workflow.Context, secretID string) workflow.Context {\n\treturn workflow.WithValue(ctx, ContextSecretID, secretID)\n}", "func (c *Context) GetSecret(thread *starlark.Thread, _ *starlark.Builtin, args starlark.Tuple, kwargs []starlark.Tuple) (starlark.Value, error) {\n\tif c.secrets == nil {\n\t\treturn starlark.None, fmt.Errorf(\"no secrets provided\")\n\t}\n\n\tvar key starlark.String\n\tif err := starlark.UnpackPositionalArgs(\"get_secret\", args, kwargs, 1, &key); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn util.Marshal(c.secrets[string(key)])\n}", "func (o GetResponsePlanIntegrationPagerdutyOutput) SecretId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetResponsePlanIntegrationPagerduty) string { return v.SecretId }).(pulumi.StringOutput)\n}", "func (o NamedValueValueFromKeyVaultOutput) SecretId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v NamedValueValueFromKeyVault) string { return v.SecretId }).(pulumi.StringOutput)\n}", "func Secret(c *cli.Context) string {\n\tv := c.String(flagSecret)\n\tif v == \"\" {\n\t\treturn env.GetString(EnvBittrexSecret)\n\t}\n\n\treturn v\n}", "func (o ResponsePlanIntegrationPagerdutyOutput) SecretId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ResponsePlanIntegrationPagerduty) string { return v.SecretId }).(pulumi.StringOutput)\n}", "func (context *handlerContext) CookieSecret() string {\n\treturn context.cookieSecret\n}", "func (s Secret) ID() string {\n\treturn s.Namespace\n}", "func (o NamedValueValueFromKeyVaultPtrOutput) SecretId() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *NamedValueValueFromKeyVault) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.SecretId\n\t}).(pulumi.StringPtrOutput)\n}", "func GetSecret(tid string) ([]byte, error) {\n\tvar token string\n\n\tif err := db.QueryRow(\"SELECT token FROM event_tasks WHERE id = $1\", tid).\n\t\tScan(&token); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn []byte(token), nil\n}", "func GetSecret() (string, string, error) {\n\tsecretMap := make(map[string]map[string]string)\n\tsecretCfg := os.Getenv(\"SQLFLOW_WORKFLOW_SECRET\")\n\tif secretCfg == \"\" {\n\t\treturn \"\", \"\", nil\n\t}\n\tif e := json.Unmarshal([]byte(secretCfg), &secretMap); e != nil {\n\t\treturn \"\", \"\", e\n\t}\n\tif len(secretMap) != 1 {\n\t\treturn \"\", \"\", fmt.Errorf(`SQLFLOW_WORKFLOW_SECRET should be a json string, e.g. {name: {key: value, ...}}`)\n\t}\n\tname := reflect.ValueOf(secretMap).MapKeys()[0].String()\n\tvalue, e := json.Marshal(secretMap[name])\n\tif e != nil {\n\t\treturn \"\", \"\", e\n\t}\n\treturn name, string(value), nil\n}", "func (s SecretsStub) SecretToken(ctx context.Context, id types.NamespacedName, key string) (string, error) {\n\ttoken, ok := s.secrets[stubKey(id, key)]\n\tif !ok {\n\t\treturn \"\", errors.New(\"not found\")\n\t}\n\treturn token, s.tokenErr\n}", "func (system *System) GetSecret() (string, error) {\n\tdb := GetGORMDbConnection()\n\tdefer Close(db)\n\n\tsecret := Secret{}\n\n\terr := db.Where(\"system_id = ?\", system.ID).First(&secret).Error\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"unable to get hashed secret for clientID %s: %s\", system.ClientID, err.Error())\n\t}\n\n\tif secret.Hash == \"\" {\n\t\treturn \"\", fmt.Errorf(\"stored hash of secret for clientID %s is blank\", system.ClientID)\n\t}\n\n\treturn secret.Hash, nil\n}", "func getSecret() (string, error) {\n\tlog.Println(prefixLog, os.Args)\n\tif len(os.Args) == 1 || len(os.Args[1]) < 10 {\n\t\treturn \"\", errors.New(\"worker secret key invalid\")\n\t}\n\treturn os.Args[1], nil\n}", "func (h WebHandlers) consumerID(ctx context.Context) string {\n\tv := ctx.Value(consumerCtxKey)\n\tswitch s := v.(type) {\n\tcase string:\n\t\treturn s\n\tdefault:\n\t\treturn \"\"\n\t}\n}", "func RandomSecret(ctx context.Context, name string) (Secret, error) {\n\tif store := CurrentStore(ctx); store != nil {\n\t\treturn store.RandomSecret(ctx, name)\n\t}\n\treturn Secret{}, ErrNoStoreConfigured\n}", "func GetContextID() int64 {\n\tmu.RLock()\n\tdefer mu.RUnlock()\n\treturn contextID\n}", "func SecretController(c *gin.Context) {\n\tc.JSON(200, &models.ResponsePayload{Success: true, Message: c.MustGet(\"id\").(string)})\n}", "func (s *Store) GetSecret(ctx context.Context, req secretstores.GetSecretRequest) (secretstores.GetSecretResponse, error) {\n\tres := secretstores.GetSecretResponse{Data: nil}\n\n\tif s.client == nil {\n\t\treturn res, fmt.Errorf(\"client is not initialized\")\n\t}\n\n\tif req.Name == \"\" {\n\t\treturn res, fmt.Errorf(\"missing secret name in request\")\n\t}\n\tsecretName := fmt.Sprintf(\"projects/%s/secrets/%s\", s.ProjectID, req.Name)\n\n\tversionID := \"latest\"\n\tif value, ok := req.Metadata[VersionID]; ok {\n\t\tversionID = value\n\t}\n\n\tsecret, err := s.getSecret(ctx, secretName, versionID)\n\tif err != nil {\n\t\treturn res, fmt.Errorf(\"failed to access secret version: %v\", err)\n\t}\n\n\treturn secretstores.GetSecretResponse{Data: map[string]string{req.Name: *secret}}, nil\n}", "func (s *SecretAPI) GetSecret(secretID, versionID, versionStage string) (*Secret, error) {\n\n\tif s.err != nil {\n\t\treturn nil, s.err\n\t}\n\n\tcs := C.CString(secretID)\n\tcv := C.CString(versionID)\n\tct := C.CString(versionStage)\n\n\tdefer func() {\n\t\ts.close()\n\t\tC.free(unsafe.Pointer(cs))\n\t\tC.free(unsafe.Pointer(cv))\n\t\tC.free(unsafe.Pointer(ct))\n\t}()\n\n\tres := C.gg_request_result{}\n\n\ts.APIRequest.initialize()\n\n\te := GreenGrassCode(C.gg_get_secret_value(s.request, cs, cv, ct, &res))\n\n\ts.response = s.handleRequestResponse(\n\t\t\"Failed to get secret\",\n\t\te, RequestStatus(res.request_status),\n\t)\n\n\tif s.err != nil {\n\t\treturn nil, s.err\n\t}\n\n\tLog(LogLevelInfo, \"Got Secret: %s\", s.response)\n\n\tvar secret Secret\n\tif err := json.Unmarshal([]byte(s.response), &secret); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &secret, nil\n\n}", "func (s *Secret) TokenID() (string, error) {\n\tif s == nil {\n\t\treturn \"\", nil\n\t}\n\n\tif s.Auth != nil && len(s.Auth.ClientToken) > 0 {\n\t\treturn s.Auth.ClientToken, nil\n\t}\n\n\tif s.Data == nil || s.Data[\"id\"] == nil {\n\t\treturn \"\", nil\n\t}\n\n\tid, ok := s.Data[\"id\"].(string)\n\tif !ok {\n\t\treturn \"\", fmt.Errorf(\"token found but in the wrong format\")\n\t}\n\n\treturn id, nil\n}", "func Secret(filename string) string {\n\treturn InGravity(SecretsDir, filename)\n}", "func (b Banai) GetSecret(secretID string) (SecretInfo, error) {\n\tv, ok := b.secrets[secretID]\n\tif !ok {\n\t\treturn nil, ErrSecretNotFound\n\t}\n\n\treturn v, nil\n}", "func (factory *Factory) GetSecretName() string {\n\treturn factory.singleton.certificate.Name\n}", "func (m *AuthenticationContext) GetId()(*string) {\n val, err := m.GetBackingStore().Get(\"id\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "func GetSecret(c *gin.Context) {\n\tvar (\n\t\trepo = session.Repo(c)\n\t\tname = c.Param(\"secret\")\n\t)\n\tsecret, err := Config.Services.Secrets.SecretFind(repo, name)\n\tif err != nil {\n\t\tc.String(404, \"Error getting secret %q. %s\", name, err)\n\t\treturn\n\t}\n\tc.JSON(200, secret.Copy())\n}", "func get_auth_secret(ps *persist.PersistService, auth_token string) string {\n\tt, found := ps.Get(auth_token);\n\tif found {\n\t\treturn t.Data[\"secret\"];\n\t}\n\telse {\n\t\treturn \"BAD_TOKEN\"; // TODO better handling\n\t}\n\tpanic(\"unreachable\");\n\t// for n := range tokens.Data() {\n\t// \tt := tokens.At(n);\n\t// \ttoken, _ := t.(AuthToken);\n\t// \tif token.Token == auth_token { return token.Secret };\n\t// }\n\t// return \"BAD_TOKEN\"; // TODO: better handling this is terrible\n}", "func (p *provider) GetSecret(ctx context.Context, name string) string {\n\tsecretPath := filepath.Join(\"projects\", p.projectID, \"secrets\", name, \"versions\", \"latest\")\n\treq := &secretmanagerpb.AccessSecretVersionRequest{\n\t\tName: secretPath,\n\t}\n\n\tres, err := p.client.AccessSecretVersion(ctx, req)\n\tif err != nil {\n\t\tlog.Fatalf(\"AccessSecretVersion error: %+v\", err)\n\t}\n\n\treturn string(res.Payload.Data)\n}", "func (s Keygen) Secret() *party.Secret {\n\treturn &party.Secret{\n\t\tID: s.selfID,\n\t}\n}", "func getSecret(environment string) string {\n\tsecret := envy.Get(\"SESSION_SECRET\", \"\")\n\t// In production a SESSION_SECRET must be set!\n\tif secret == \"\" {\n\t\tif environment == \"development\" || environment == \"test\" {\n\t\t\tsecret = strings.Repeat(\"x\", 32)\n\t\t} else {\n\t\t\tpanic(\"Unless you set SESSION_SECRET env variable, your session storage is not protected!\")\n\t\t}\n\t}\n\treturn secret\n}", "func (_options *GetSecretVersionOptions) SetSecretID(secretID string) *GetSecretVersionOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func SecretKey() (string, error) {\n\treturn keyProvider.Get(nil)\n}", "func (m *Manager) GetSecret() string {\n\treturn m.user.Secret\n}", "func (_options *CreateSecretVersionOptions) SetSecretID(secretID string) *CreateSecretVersionOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func (n NovaScheduler) GetSecret() string {\n\treturn n.Spec.Secret\n}", "func (o *ProcessorSignalDecisionReportRequest) GetSecret() string {\n\tif o == nil || o.Secret == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Secret\n}", "func (secretsDb *DB) GetSecret(id string) (*secrets.Secret, error) {\n\tvar secret secretSelect\n\terr := secretsDb.SelectOne(&secret, selectSecret, id)\n\tvar newSecret *secrets.Secret\n\tif err != nil {\n\t\treturn nil, errorutils.ProcessSQLNotFound(err, id, \"GetSecret\")\n\t}\n\n\tnewSecret, err = secretsDb.fromDBSelectSecret(&secret)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, fmt.Sprintf(\"GetSecret: unable to translate secret from db struct %+s\", id))\n\t}\n\treturn newSecret, nil\n}", "func (f *FileLocation) GetSecret() (value int64) {\n\treturn f.Secret\n}", "func GetSecret(secretName string) (secret string, err error) {\n\tdefVal := os.Getenv(secretName)\n\tif Context == ContextAWS {\n\t\tif defVal, err = getAwsSsmSecret(secretName); err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t} else if Context == ContextOpenfaas {\n\t\tif defVal, err = getOpenFaasSecret(secretName); err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t}\n\tif defVal == \"\" {\n\t\treturn \"\", errors.New(\"missing secret \" + secretName)\n\t}\n\treturn defVal, nil\n}", "func ClientSecret() string {\n\treturn clientSecret\n}", "func ClientSecret() string {\n\treturn clientSecret\n}", "func ClientSecret() string {\n\treturn clientSecret\n}", "func (o CertificateOutput) KeyVaultSecretId() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Certificate) pulumi.StringPtrOutput { return v.KeyVaultSecretId }).(pulumi.StringPtrOutput)\n}", "func (o *PartnerCustomerCreateRequest) GetSecret() string {\n\tif o == nil || o.Secret == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Secret\n}", "func CoreSecret() string {\n\treturn os.Getenv(\"CORE_SECRET\")\n}", "func MustGetSecret(secretName string) (secret string) {\n\tvar err error\n\tdefVal := os.Getenv(secretName)\n\tif Context == ContextAWS {\n\t\tif defVal, err = getAwsSsmSecret(secretName); err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t} else if Context == ContextOpenfaas {\n\t\tif defVal, err = getOpenFaasSecret(secretName); err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t}\n\tif defVal == \"\" {\n\t\tlog.Fatalf(\"missing secret %s\", secretName)\n\t}\n\treturn defVal\n}", "func GetSecretKey(ctx *pulumi.Context) string {\n\treturn config.Get(ctx, \"aws:secretKey\")\n}", "func (_options *GetSecretVersionMetadataOptions) SetSecretID(secretID string) *GetSecretVersionMetadataOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func (_options *CreateSecretVersionActionOptions) SetSecretID(secretID string) *CreateSecretVersionActionOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func (h *Handler) getSecret(secret *corev1.Secret) (*corev1.Secret, error) {\n\tnamespace := secret.GetNamespace()\n\tif len(namespace) == 0 {\n\t\tnamespace = h.namespace\n\t}\n\treturn h.clientset.CoreV1().Secrets(namespace).Get(h.ctx, secret.Name, h.Options.GetOptions)\n}", "func getSecret() ([]byte, error) {\n\tif err := godotenv.Load(\".env\"); err != nil {\n\t\treturn nil, err\n\t}\n\treturn []byte(os.Getenv(\"SIGKEY\")), nil\n}", "func StoredSecret(ctx context.Context, name string) (Secret, error) {\n\tif store := CurrentStore(ctx); store != nil {\n\t\treturn store.StoredSecret(ctx, name)\n\t}\n\treturn Secret{}, ErrNoStoreConfigured\n}", "func getSecret(name, namespace string, labels map[string]string) *corev1.Secret {\n\treturn &corev1.Secret{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: APIv1,\n\t\t\tKind: SecretKind,\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tNamespace: namespace,\n\t\t\tLabels: labels,\n\t\t},\n\t}\n}", "func getSecretPhrase() (secret string) {\n\tsecret = \"LORAXSNUGGLEGEORGEICE\"\n\treturn\n}", "func GetSecret(client client.Client, parentNamespace string, secretRef *corev1.ObjectReference) (secret *corev1.Secret, err error) {\n\tsrLogger := log.WithValues(\"package\", \"utils\", \"method\", \"getSecret\")\n\tif secretRef != nil {\n\t\tsrLogger.Info(\"Retreive secret\", \"parentNamespace\", parentNamespace, \"secretRef\", secretRef)\n\t\tns := secretRef.Namespace\n\t\tif ns == \"\" {\n\t\t\tns = parentNamespace\n\t\t}\n\t\tsecret = &corev1.Secret{}\n\t\terr = client.Get(context.TODO(), types.NamespacedName{Namespace: ns, Name: secretRef.Name}, secret)\n\t\tif err != nil {\n\t\t\tsrLogger.Error(err, \"Failed to get secret \", \"Name:\", secretRef.Name, \" on namespace: \", secretRef.Namespace)\n\t\t\treturn nil, err\n\t\t}\n\t\tsrLogger.Info(\"Secret found \", \"Name:\", secretRef.Name, \" on namespace: \", secretRef.Namespace)\n\t} else {\n\t\tsrLogger.Info(\"No secret defined\", \"parentNamespace\", parentNamespace)\n\t}\n\treturn secret, err\n}", "func GetContextID(ctx context.Context) string {\n\tif value := ctx.Value(contextIDKey{}); value != nil {\n\t\tif typed, ok := value.(string); ok {\n\t\t\treturn typed\n\t\t}\n\t}\n\treturn \"\"\n}", "func (d *KfDef) GetSecret(name string) (string, error) {\n\tfor _, s := range d.Spec.Secrets {\n\t\tif s.Name != name {\n\t\t\tcontinue\n\t\t}\n\t\tif s.SecretSource.LiteralSource != nil {\n\t\t\treturn s.SecretSource.LiteralSource.Value, nil\n\t\t}\n\t\tif s.SecretSource.HashedSource != nil {\n\t\t\treturn s.SecretSource.HashedSource.HashedValue, nil\n\t\t}\n\t\tif s.SecretSource.EnvSource != nil {\n\t\t\treturn os.Getenv(s.SecretSource.EnvSource.Name), nil\n\t\t}\n\n\t\treturn \"\", fmt.Errorf(\"No secret source provided for secret %v\", name)\n\t}\n\treturn \"\", NewSecretNotFound(name)\n}", "func (o *AssetReportRefreshRequest) GetSecret() string {\n\tif o == nil || o.Secret == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Secret\n}", "func (s *SCEP) GetTokenID(ott string) (string, error) {\n\treturn \"\", errors.New(\"scep provisioner does not implement GetTokenID\")\n}", "func (backend *JwtBackend) secretLock(secretID string) *locksutil.LockEntry {\n\treturn locksutil.LockForKey(backend.secretLocks, secretID)\n}", "func ContextSequenceId(ctx context.Context) (*uuid.UUID, error) {\n sequenceIdIn := ctx.Value(SequenceIdContextKey)\n if sequenceIdIn == nil {\n return nil, errors.New(\n \"SequenceId not in context. Is this call made via vial?\",\n )\n }\n\n sequenceIdString, ok := sequenceIdIn.(string)\n if !ok {\n return nil, errors.New(\n \"Value of SequenceId in context is not a string\",\n )\n }\n\n sequenceId, err := uuid.Parse(sequenceIdString)\n if err != nil {\n return nil, errors.Wrap(\n err,\n \"Value of SequenceId in context is not a proper UUID\",\n )\n }\n\n return &sequenceId, nil\n}", "func (_options *DeleteSecretVersionDataOptions) SetSecretID(secretID string) *DeleteSecretVersionDataOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func AppIDFromContext(ctx context.Context) string {\n\tr, _ := ctx.Value(ctxAppIDKey(api.AppID)).(string)\n\treturn r\n}", "func (p *EnvironmentProvider) GetSecret(secretName string) (string, bool) {\n\tname := strings.ToUpper(strings.Replace(secretName, \"/\", \"_\", -1))\n\treturn p.lookup(name)\n}", "func IntegrationSecret(i string) string {\n\treturn i\n}", "func (c *Client) GetSecret() string {\n\treturn c.Secret\n}", "func (f *FileLocationUnavailable) GetSecret() (value int64) {\n\treturn f.Secret\n}", "func (c VpnCredential) GetID() string { return c.ID }", "func (o SourceCodeTokenOutput) TokenSecret() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *SourceCodeToken) pulumi.StringPtrOutput { return v.TokenSecret }).(pulumi.StringPtrOutput)\n}", "func (t *Store) RandomSecret(ctx context.Context, k string) (secrets.Secret, error) {\n\treturn t.getSecret(ctx, k, true)\n}", "func (c *clusterApi) getSecret(w http.ResponseWriter, r *http.Request) {\n\tmethod := \"getSecret\"\n\tparams := r.URL.Query()\n\tsecretID := params[secrets.SecretKey]\n\n\tif len(secretID) == 0 || secretID[0] == \"\" {\n\t\tc.sendError(c.name, method, w, \"Missing secret ID\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tinst, err := clustermanager.Inst()\n\tif err != nil {\n\t\tc.sendError(c.name, method, w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tsecretValue, err := inst.SecretGet(secretID[0])\n\tif err != nil {\n\t\tc.sendError(c.name, method, w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tsecResp := &secrets.GetSecretResponse{\n\t\tSecretValue: secretValue,\n\t}\n\tjson.NewEncoder(w).Encode(secResp)\n}", "func (c *Context) GetSecret(secretKey string) *v1.Secret {\n\tsecretInterface, exist, err := c.Caches.Secret.GetByKey(secretKey)\n\n\tif err != nil {\n\t\tglog.V(1).Infof(\"unable to get secret from store, error occurred %s\", err.Error())\n\t\treturn nil\n\t}\n\n\tif !exist {\n\t\tglog.V(1).Infof(\"unable to get secret from store, no such service %s\", secretKey)\n\t\treturn nil\n\t}\n\n\tsecret := secretInterface.(*v1.Secret)\n\treturn secret\n}", "func validateAccountSecret(accountSecret string) (string, error) {\n\treturn accountSecret, nil\n}", "func (s *DBSecretsService) GetSecret(ctx context.Context, organizationID string, name string, opts entitystore.Options) (*v1.Secret, error) {\n\tspan, ctx := trace.Trace(ctx, \"\")\n\tdefer span.Finish()\n\n\tif opts.Filter == nil {\n\t\topts.Filter = entitystore.FilterEverything()\n\t}\n\topts.Filter.Add(entitystore.FilterStat{\n\t\tScope: entitystore.FilterScopeField,\n\t\tSubject: \"Name\",\n\t\tVerb: entitystore.FilterVerbEqual,\n\t\tObject: name,\n\t})\n\n\tsecrets, err := s.GetSecrets(ctx, organizationID, opts)\n\tif err != nil {\n\t\treturn nil, err\n\t} else if len(secrets) < 1 {\n\t\treturn nil, SecretNotFound{}\n\t}\n\n\treturn secrets[0], nil\n}", "func (p *ProxyTypeMtproto) GetSecret() (value string) {\n\tif p == nil {\n\t\treturn\n\t}\n\treturn p.Secret\n}", "func (c *configuration) Secret(clientSet ClientSet) *Secret {\n\tif clientSet != nil {\n\t\treturn NewSecret(clientSet)\n\t}\n\treturn nil\n\n}", "func NextContextID() int64 {\n\tmu.Lock()\n\tcontextID = contextID + 1\n\tdefer mu.Unlock()\n\treturn contextID\n}", "func LaunchIDFromContext(ctx context.Context) string {\n\tlaunchID := ctx.Value(GetLaunchContextKey())\n\tif launchID == nil {\n\t\treturn \"\"\n\t}\n\n\treturn launchID.(string)\n}", "func (ks *keystore) getSecret(input *secretsmanager.GetSecretValueInput) (string, error) {\n\tvar secret string\n\n\tresult, err := ks.manager.GetSecretValue(input)\n\n\tif err != nil {\n\t\treturn secret, err\n\t}\n\n\tif result.SecretString != nil {\n\t\tsecret = *result.SecretString\n\t} else {\n\t\tdecodedBinarySecretBytes := make([]byte, base64.StdEncoding.DecodedLen(len(result.SecretBinary)))\n\t\tlength, err := base64.StdEncoding.Decode(decodedBinarySecretBytes, result.SecretBinary)\n\t\tif err != nil {\n\t\t\treturn secret, err\n\t\t}\n\t\tsecret = string(decodedBinarySecretBytes[:length])\n\t}\n\n\treturn secret, nil\n}", "func GetSecret(apiURL, ak, potp, secretKey string) (string, string, error) {\n\ttk, err := authenticate(apiURL, ak, potp)\n\tif err != nil {\n\t\tStatus = StatusKO\n\t\treturn \"\", \"\", err\n\t}\n\n\tns, err := getAppNamespace(apiURL, tk)\n\tif err != nil {\n\t\tStatus = StatusKO\n\t\treturn \"\", \"\", err\n\t}\n\n\tsecrets, err := getSecrets(apiURL, tk, ns)\n\tif err != nil {\n\t\tStatus = StatusKO\n\t\treturn \"\", \"\", err\n\t}\n\tif s := secrets[secretKey]; s != \"\" {\n\t\tStatus = StatusOK\n\t\treturn secretKey, s, nil\n\t}\n\tlog.Warning(\"vault.GetSecret> Unable to find %s\\n\", secretKey)\n\tStatus = StatusKO\n\treturn \"\", \"\", err\n}", "func (k *Key) Secret() string {\n\tq := k.url.Query()\n\n\treturn q.Get(\"secret\")\n}", "func socketID(ctx context.Context) uuid.UUID {\n\tval := ctx.Value(socketIDKey)\n\tif val == nil {\n\t\treturn uuid.UUID{}\n\t}\n\treturn val.(uuid.UUID)\n}", "func NewSecret() *secret {\n\tid, err := randPathString()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn &secret{ID: id, time: time.Now()}\n}", "func (_options *ListSecretVersionLocksOptions) SetSecretID(secretID string) *ListSecretVersionLocksOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func SystemSecret() string {\n\n\tif flagSystemSecret == nil {\n\t\tpanic(\"SystemSecret called before init\")\n\t}\n\n\tif !flag.Parsed() {\n\t\tpanic(\"SystemSecret called before flag.Parse\")\n\t}\n\n\treturn *flagSystemSecret\n}", "func (k *Key) Secret() string {\n\treturn k.Query().Get(\"secret\")\n}", "func (_options *UpdateSecretVersionMetadataOptions) SetSecretID(secretID string) *UpdateSecretVersionMetadataOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func (s *storeImpl) RandomSecret(ctx context.Context, k string) (secrets.Secret, error) {\n\treturn s.getSecret(ctx, k, true)\n}", "func (o FunctionServiceConfigSecretEnvironmentVariableOutput) Secret() pulumi.StringOutput {\n\treturn o.ApplyT(func(v FunctionServiceConfigSecretEnvironmentVariable) string { return v.Secret }).(pulumi.StringOutput)\n}", "func UISecret() string {\n\treturn uiSecret\n}", "func getSecret(kubeClient client.Client, secretName, namespace string) (*corev1.Secret, error) {\n\ts := &corev1.Secret{}\n\n\terr := kubeClient.Get(context.TODO(), kubetypes.NamespacedName{Name: secretName, Namespace: namespace}, s)\n\n\tif err != nil {\n\t\treturn &corev1.Secret{}, err\n\t}\n\treturn s, nil\n}", "func (c *Client) DecodeSecret(encodeddata string) string {\n\tdecodeddata, _ := base32.StdEncoding.DecodeString(encodeddata)\n\treturn string(decodeddata)\n}", "func GetID(ctx context.Context) string {\n\tif ctx == nil {\n\t\tpanic(\"Can not get request ID from empty context\")\n\t}\n\n\tif requestID, ok := ctx.Value(requestIDKey).(string); ok {\n\t\treturn requestID\n\t}\n\n\treturn \"\"\n}", "func NewSecret() string {\n\treturn RandomWithMd5(32)\n}", "func (_options *ListSecretVersionsOptions) SetSecretID(secretID string) *ListSecretVersionsOptions {\n\t_options.SecretID = core.StringPtr(secretID)\n\treturn _options\n}", "func GetUserIDFromContext(ctx context.Context) int {\n\tuser := GetAuthFromContext(ctx)\n\tif user != nil {\n\t\treturn int(IDToBoiler(user.UserID))\n\t}\n\treturn 0\n}", "func (ci *auditInfo) SecretHash() dex.Bytes {\n\treturn ci.secretHash\n}", "func (ci *auditInfo) SecretHash() dex.Bytes {\n\treturn ci.secretHash\n}", "func (ci *auditInfo) SecretHash() dex.Bytes {\n\treturn ci.secretHash\n}", "func NewSecret(l int) string {\n\treturn gotp.RandomSecret(l)\n}" ]
[ "0.6627163", "0.6541916", "0.64703983", "0.63888824", "0.6382659", "0.63708276", "0.6271829", "0.62270975", "0.61752903", "0.61694103", "0.5979741", "0.59098184", "0.5899948", "0.5759201", "0.57452524", "0.5738493", "0.57297975", "0.56900966", "0.568041", "0.56752735", "0.5661435", "0.566011", "0.56597024", "0.5650679", "0.5643392", "0.5636484", "0.5621313", "0.56037426", "0.56017613", "0.5577071", "0.55767506", "0.55575323", "0.5554731", "0.55531317", "0.55452967", "0.55417913", "0.5539008", "0.5528761", "0.5525853", "0.5511661", "0.5511661", "0.5511661", "0.5501573", "0.5493681", "0.54859483", "0.5475547", "0.54689384", "0.54565185", "0.5440604", "0.5439255", "0.5433134", "0.54301345", "0.5405922", "0.5398986", "0.53876555", "0.5384152", "0.53756106", "0.53550196", "0.53444964", "0.53418183", "0.5330199", "0.53218734", "0.53203356", "0.5316086", "0.5314508", "0.5313648", "0.5313362", "0.53041345", "0.5300785", "0.5297828", "0.5289509", "0.52741015", "0.52707016", "0.5267158", "0.52601874", "0.5259648", "0.5257499", "0.52549905", "0.5254376", "0.52534866", "0.52467984", "0.52407795", "0.52389956", "0.52388805", "0.5238503", "0.5219458", "0.5211258", "0.5210056", "0.5208099", "0.52043134", "0.51967996", "0.51959807", "0.51896113", "0.5187662", "0.51857805", "0.51796347", "0.516055", "0.516055", "0.516055", "0.51597106" ]
0.80767787
0
WithRegion returns a new context with a secret ID.
func WithRegion(ctx workflow.Context, secretID string) workflow.Context { return workflow.WithValue(ctx, ContextRegion, secretID) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func WithRegion(with string) wrapping.Option {\n\treturn func() interface{} {\n\t\treturn OptionFunc(func(o *options) error {\n\t\t\to.withRegion = with\n\t\t\treturn nil\n\t\t})\n\t}\n}", "func Region(ctx context.Context) (string, bool) {\n\tsecretID, ok := ctx.Value(ContextRegion).(string)\n\n\treturn secretID, ok\n}", "func (f *Factory) WithRegion(region string) *Factory {\n\tf.region = region\n\treturn f\n}", "func WithRegion(region string) configurer {\n\treturn func(conf *config) {\n\t\tconf.region = region\n\t}\n}", "func WithRegion(region string) InstanceOpt {\n\treturn func(i *Instance) error {\n\t\ti.region = region\n\t\treturn nil\n\t}\n}", "func NewWlRegionWithID(c *wire.Conn, id wire.ID) *WlRegion {\n\to := &WlRegion{Base: Base{c, id}}\n\tc.RegisterObject(o)\n\treturn o\n}", "func (p *EC2Provisioner) WithRegion(region string) {\n\tp.client.Config.WithRegion(region)\n\tp.client = ec2.New(p.session, &p.client.Config)\n}", "func WithSecretID(ctx workflow.Context, secretID string) workflow.Context {\n\treturn workflow.WithValue(ctx, ContextSecretID, secretID)\n}", "func (t *Territory) Region(ctx context.Context, db DB) (*Region, error) {\n\treturn RegionByRegionID(ctx, db, t.RegionID)\n}", "func WithContext(ctx context.Context) context.Context {\n\treturn context.WithValue(ctx, contextKey, uuid.New())\n}", "func (tags Tags) WithSecret(label string, secret *corev1.Secret) Tags {\n\tif secret != nil {\n\t\tobj := make(map[string]interface{})\n\t\tfor n, v := range secret.Data {\n\t\t\tobj[n] = string(v)\n\t\t}\n\t\ttags = tags.With(label, obj)\n\t}\n\treturn tags\n}", "func WithSecret(secret string) Option {\n\treturn func(o *options) {\n\t\to.secret = secret\n\t}\n}", "func Use(ctx context.Context, cfg *Config) context.Context {\n\treturn secrets.Use(ctx, New(cfg))\n}", "func (r *Region) GetContext() *kvrpcpb.Context {\n\treturn &kvrpcpb.Context{\n\t\tRegionId: r.meta.Id,\n\t\tRegionEpoch: r.meta.RegionEpoch,\n\t\tPeer: r.peer,\n\t}\n}", "func RegisterRegion(updateFunc func()) *Region {\n\treturn (*Region)(newRegion(updateFunc))\n}", "func NewRegion(start, end []byte) *metapb.Region {\n\treturn &metapb.Region{\n\t\tStartKey: start,\n\t\tEndKey: end,\n\t\tRegionEpoch: &metapb.RegionEpoch{},\n\t}\n}", "func NewWlRegion(c *wire.Conn) *WlRegion {\n\treturn NewWlRegionWithID(c, c.NewID())\n}", "func (b *Backend) InjectRegion(region string) {\n\tb.gatewayStatus.Region = region\n}", "func (r DescribeThingShadowRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r SearchLogContextRequest) GetRegionId() string {\n return r.RegionId\n}", "func NewSessionWithRegion(region string) (*session.Session, error) {\n\treturn session.NewSession(&aws.Config{Region: aws.String(region)})\n}", "func WithRegistry(ctx context.Context, reg *Registry) context.Context {\n\treturn context.WithValue(ctx, registryContextKey{}, reg)\n}", "func ContextWithHeight(height int64) context.Context {\n\tif height == 0 {\n\t\treturn context.Background()\n\t}\n\n\treturn metadata.AppendToOutgoingContext(context.Background(), grpctypes.GRPCBlockHeightHeader, fmt.Sprintf(\"%d\", height))\n}", "func NewContext(ctx context.Context, span *Span) context.Context {\n\treturn context.WithValue(ctx, spanKey, span)\n}", "func WithSecretTemplate(t string) option {\n\treturn func(s *store) {\n\t\ts.secretTemplate = t\n\t}\n}", "func (r ModifyAppGeneralSettingByIdRequest) GetRegionId() string {\n return \"\"\n}", "func NewShowSecretsContext(ctx context.Context, r *http.Request, service *goa.Service) (*ShowSecretsContext, error) {\n\tvar err error\n\tresp := goa.ContextResponse(ctx)\n\tresp.Service = service\n\treq := goa.ContextRequest(ctx)\n\treq.Request = r\n\trctx := ShowSecretsContext{Context: ctx, ResponseData: resp, RequestData: req}\n\tparamID := req.Params[\"id\"]\n\tif len(paramID) > 0 {\n\t\trawID := paramID[0]\n\t\tif id, err2 := uuid.FromString(rawID); err2 == nil {\n\t\t\trctx.ID = id\n\t\t} else {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidParamTypeError(\"id\", rawID, \"uuid\"))\n\t\t}\n\t}\n\treturn &rctx, err\n}", "func WithContext(ctx context.Context) Option {\n\treturn func(o *Registry) { o.ctx = ctx }\n}", "func (r SetAuthConfigRequest) GetRegionId() string {\n return \"\"\n}", "func (r CreateBackupPlanRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r AuthPrivilegeRequest) GetRegionId() string {\n return \"\"\n}", "func newContextWithAuth(perms []weave.Condition) (weave.Context, x.Authenticator) {\n\tctx := context.Background()\n\t// Set current block height to 100\n\tctx = weave.WithHeight(ctx, 100)\n\tauth := &weavetest.CtxAuth{Key: \"authKey\"}\n\t// Create a new context and add addr to the list of signers\n\treturn auth.SetConditions(ctx, perms...), auth\n}", "func (a *Application) Region() *Region {\n\treturn a.makeRegion()\n}", "func withAccessToken(ctx context.Context, accessToken string) context.Context {\n\treturn context.WithValue(ctx, bbapi.ContextAccessToken, accessToken)\n}", "func WithContext(context string) StructuredLogger {\n\treturn factory.WithContext(context)\n}", "func New(accessKeyID, secretAccessKey, region string) (*Sign, *probe.Error) {\n\tif !isValidAccessKey.MatchString(accessKeyID) {\n\t\treturn nil, ErrInvalidAccessKeyID(\"Invalid access key id.\", accessKeyID).Trace(accessKeyID)\n\t}\n\tif !isValidSecretKey.MatchString(secretAccessKey) {\n\t\treturn nil, ErrInvalidAccessKeyID(\"Invalid secret key.\", secretAccessKey).Trace(secretAccessKey)\n\t}\n\tif region == \"\" {\n\t\treturn nil, ErrRegionISEmpty(\"Region is empty.\").Trace()\n\t}\n\tsignature := &Sign{\n\t\taccessKeyID: accessKeyID,\n\t\tsecretAccessKey: secretAccessKey,\n\t\tregion: region,\n\t}\n\treturn signature, nil\n}", "func (r AddTemplateRequest) GetRegionId() string {\n return r.RegionId\n}", "func (b *SubscriptionMetricsBuilder) Region(value string) *SubscriptionMetricsBuilder {\n\tb.region = value\n\tb.bitmap_ |= 8192\n\treturn b\n}", "func NewWithProvider(provider credentials.Provider, cfgs ...*aws.Config) (*session.Session, error) {\n\tcreds := credentials.NewCredentials(provider)\n\tcfg := aws.NewConfig().WithCredentials(creds).WithRegion(region)\n\tcfgs = append([]*aws.Config{cfg}, cfgs...)\n\treturn session.NewSession(cfgs...)\n}", "func NewContext(ctx context.Context, txn Transaction) context.Context {\n\treturn context.WithValue(ctx, transactionKey, txn)\n}", "func SetRegion(r string) {\n\tcurrentRegion = r\n}", "func withContext(key, value string) Adapter {\n\treturn func(client gokismet.Client) gokismet.Client {\n\t\treturn gokismet.ClientFunc(func(req *http.Request) (*http.Response, error) {\n\t\t\tctx := context.WithValue(req.Context(), contextKey(key), value)\n\t\t\treturn client.Do(req.WithContext(ctx))\n\t\t})\n\t}\n}", "func NewIAMContext(parent context.Context, val *IAMConfig) context.Context {\n\treturn context.WithValue(parent, iamConfigKey{}, val)\n}", "func (r *InvokeRequest) SetRegionId(regionId string) {\n r.RegionId = regionId\n}", "func (r CreateImageFromSnapshotsRequest) GetRegionId() string {\n return r.RegionId\n}", "func NewContext(ctx context.Context, txn Transaction) context.Context {\n\treturn context.WithValue(ctx, contextKey, txn)\n}", "func With(ctx context.Context, app *App) context.Context {\n\treturn context.WithValue(ctx, appContextKey, app)\n}", "func NewSecret() *secret {\n\tid, err := randPathString()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn &secret{ID: id, time: time.Now()}\n}", "func RegionGTE(v string) predicate.Location {\n\treturn predicate.Location(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldRegion), v))\n\t})\n}", "func NewSecret(client client.Client, namespace, name string, data map[string][]byte, secretNameWithPrefix bool) (string, *builder.Secret) {\n\tsecretName := SecretName(name, secretNameWithPrefix)\n\treturn secretName, builder.NewSecret(client).\n\t\tWithNamespacedName(namespace, secretName).\n\t\tWithKeyValues(data)\n}", "func WithHeight(ctx Context, height int64) Context {\n\tif _, ok := GetHeight(ctx); ok {\n\t\tpanic(\"Height already set\")\n\t}\n\treturn context.WithValue(ctx, contextKeyHeight, height)\n}", "func createSessionFromSecret(secret *corev1.Secret) *session.Session {\n\n accessKeyId := string(secret.Data[accessKeyIdPropName])\n secretAccessKey := string(secret.Data[secretAccessKeyPropName])\n\n\n log.Infof(\"Creating session from secret %q containing accessKeyId=%s\", *secret.Metadata.Name, accessKeyId)\n\n return createSession(accessKeyId, secretAccessKey, *secret.Metadata.Name + \"-\" +\"orig\")\n\n}", "func NewRegion(c *config.Config, client *api.Client, channels *RegionBroadcastChannels) (*Region, error) {\n\treturn &Region{\n\t\tConfig: c,\n\t\tClient: client,\n\t\tbroadcastChannels: channels,\n\t\tregions: make([]string, 0),\n\t\tservices: &InternalServices{},\n\t\tnodes: &InternalNodes{},\n\t}, nil\n}", "func (opts *Options) InContext(ctx context.Context) context.Context {\n\treturn context.WithValue(ctx, optionsKey, opts)\n}", "func (b *ServiceClusterBuilder) Region(value string) *ServiceClusterBuilder {\n\tb.region = value\n\tb.bitmap_ |= 128\n\treturn b\n}", "func (r DescribeAuditLogRequest) GetRegionId() string {\n return r.RegionId\n}", "func New(auth aws.Auth, region aws.Region) (*RDS, error) {\n\tservice, err := aws.NewService(auth, region.RDSEndpoint)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &RDS{\n\t\tService: service,\n\t}, nil\n}", "func (r OnlineSqlTaskQueryRequest) GetRegionId() string {\n return r.RegionId\n}", "func WithUUID(ctx context.Context, v string) context.Context {\n\treturn context.WithValue(ctx, keyUUID, v)\n}", "func WithSecret(secrets ...Secret) Option {\n\treturn WithTransform(\n\t\ttransformSecret(secrets...),\n\t)\n}", "func (r ModifyTaskRequest) GetRegionId() string {\n return r.RegionId\n}", "func NewSpanContext(traceID TraceID, spanID, parentID SpanID, sampled bool, baggage map[string]string) SpanContext {\n\tsamplingState := &samplingState{}\n\tif sampled {\n\t\tsamplingState.setSampled()\n\t}\n\n\treturn SpanContext{\n\t\ttraceID: traceID,\n\t\tspanID: spanID,\n\t\tparentID: parentID,\n\t\tsamplingState: samplingState,\n\t\tbaggage: baggage}\n}", "func (r InvokeRequest) GetRegionId() string {\n return r.RegionId\n}", "func (secretTemplateFactory) New(def client.ResourceDefinition, c client.Interface, gc interfaces.GraphContext) interfaces.Resource {\n\tsecret := parametrizeResource(def.Secret, gc, secretParamFields).(*v1.Secret)\n\treturn report.SimpleReporter{BaseResource: newSecret{Base: Base{def.Meta}, Secret: secret, Client: c.Secrets()}}\n}", "func (client *IdentityClient) SetRegion(region string) {\n\tclient.Host = common.StringToRegion(region).EndpointForTemplate(\"identity\", \"https://identity.{region}.oci.{secondLevelDomain}\")\n}", "func Use(c context.Context, s Client) context.Context {\n\treturn context.WithValue(c, &contextKey, s)\n}", "func (r DescribeSlowLogRequest) GetRegionId() string {\n return r.RegionId\n}", "func New(parent context.Context, id, language string) *Context {\n\treturn &Context{\n\t\tID: id,\n\t\tLanguage: language,\n\t\tContext: context.WithValue(parent, ContextIDKey, id),\n\t}\n}", "func (r InvokeCommandRequest) GetRegionId() string {\n return r.RegionId\n}", "func NewSplitRegionCommand() *cobra.Command {\n\tc := &cobra.Command{\n\t\tUse: \"split-region <region_id> [--policy=scan|approximate|usekey] [--keys]\",\n\t\tShort: \"split a region\",\n\t\tRun: splitRegionCommandFunc,\n\t}\n\tc.Flags().String(\"policy\", \"scan\", \"the policy to get region split key\")\n\tc.Flags().String(\"keys\", \"\", \"the split key, hex encoded\")\n\treturn c\n}", "func WithRoute(ctx context.Context, r *Route) context.Context {\n\treturn context.WithValue(ctx, routeKey, r)\n}", "func (r CreateClusterRequest) GetRegionId() string {\n return r.RegionId\n}", "func (c *Client) SetRegion(region Region) {\n\tc.region = region\n\n\tswitch region {\n\tcase CN:\n\t\tc.oauthHost = \"https://www.battlenet.com.cn\"\n\t\tc.apiHost = \"https://gateway.battlenet.com.cn\"\n\t\tc.dynamicNamespace = \"dynamic-zh\"\n\t\tc.dynamicClassicNamespace = \"dynamic-classic-zh\"\n\t\tc.profileNamespace = \"profile-zh\"\n\t\tc.staticNamespace = \"static-zh\"\n\t\tc.staticClassicNamespace = \"static-classic-zh\"\n\tdefault:\n\t\tc.oauthHost = fmt.Sprintf(\"https://%s.battle.net\", region)\n\t\tc.apiHost = fmt.Sprintf(\"https://%s.api.blizzard.com\", region)\n\t\tc.dynamicNamespace = fmt.Sprintf(\"dynamic-%s\", region)\n\t\tc.dynamicClassicNamespace = fmt.Sprintf(\"dynamic-classic-%s\", region)\n\t\tc.profileNamespace = fmt.Sprintf(\"profile-%s\", region)\n\t\tc.staticNamespace = fmt.Sprintf(\"static-%s\", region)\n\t\tc.staticClassicNamespace = fmt.Sprintf(\"static-classic-%s\", region)\n\t}\n\n\tc.cfg.TokenURL = c.oauthHost + \"/oauth/token\"\n\tc.httpClient = c.cfg.Client(context.Background())\n}", "func PutSpanInContext(ctx context.Context, span *Span) context.Context {\n\treturn context.WithValue(ctx, honeySpanContextKey, span)\n}", "func PutSpanInContext(ctx context.Context, span *Span) context.Context {\n\treturn context.WithValue(ctx, honeySpanContextKey, span)\n}", "func NewClient(accessKeyID, secretAccessKey, region string) (*Client, error) {\n\tvar (\n\t\tawsConfig = &aws.Config{\n\t\t\tCredentials: credentials.NewStaticCredentials(accessKeyID, secretAccessKey, \"\"),\n\t\t}\n\t\tconfig = &aws.Config{Region: aws.String(region)}\n\t)\n\n\ts, err := session.NewSession(awsConfig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Client{\n\t\tEC2: ec2.New(s, config),\n\t\tELB: elb.New(s, config),\n\t\tELBv2: elbv2.New(s, config),\n\t\tIAM: iam.New(s, config),\n\t\tSTS: sts.New(s, config),\n\t\tS3: s3.New(s, config),\n\t}, nil\n}", "func (r DescribeCacheInstancesRequest) GetRegionId() string {\n return r.RegionId\n}", "func GetRegion(ctx *pulumi.Context) string {\n\tv, err := config.Try(ctx, \"newrelic:region\")\n\tif err == nil {\n\t\treturn v\n\t}\n\tvar value string\n\tif d := internal.GetEnvOrDefault(\"US\", nil, \"NEW_RELIC_REGION\"); d != nil {\n\t\tvalue = d.(string)\n\t}\n\treturn value\n}", "func With(c context.Context, database *sql.DB) context.Context {\n\treturn context.WithValue(c, &dbKey, database)\n}", "func WithIdentity(wallet Wallet, label string) IdentityOption {\n\treturn func(gw *Gateway) error {\n\t\tmspClient, err := msp.New(gw.getSDK().Context(), msp.WithOrg(gw.getOrg()))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tcreds, err := wallet.Get(label)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tvar identity mspProvider.SigningIdentity\n\t\tswitch v := creds.(type) {\n\t\tcase *X509Identity:\n\t\t\tidentity, err = mspClient.CreateSigningIdentity(mspProvider.WithCert([]byte(v.Cert())), mspProvider.WithPrivateKey([]byte(v.Key())))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\tgw.options.Identity = identity\n\t\treturn nil\n\t}\n}", "func Secret(s string) PinningOption {\n\treturn func(o *Pinning) {\n\t\to.Secret = s\n\t}\n}", "func (this *BuoyController) Region() {\n\tbuoyBusiness.Region(&this.BaseController, this.GetString(\":region\"))\n}", "func (r CreateCollectInfoRequest) GetRegionId() string {\n return r.RegionId\n}", "func NewGetProviderRegionByIDBadRequest() *GetProviderRegionByIDBadRequest {\n\treturn &GetProviderRegionByIDBadRequest{}\n}", "func NewSecret(\n\tc client.Client,\n\tname, namespace string,\n\tlabels map[string]string,\n\tsecType corev1.SecretType,\n\tdata map[string][]byte) *Secret {\n\treturn &Secret{\n\t\tNamespacedName: types.NamespacedName{\n\t\t\tName: name,\n\t\t\tNamespace: namespace,\n\t\t},\n\t\tlabels: labels,\n\t\tclient: c,\n\t\tsecType: secType,\n\t\tdata: data,\n\t}\n}", "func (r AttachGroupPolicyRequest) GetRegionId() string {\n return \"\"\n}", "func (r LastDownsampleRequest) GetRegionId() string {\n return r.RegionId\n}", "func newContext(wrapped context.Context, identifier int) Context {\n\treturn &contextImpl{wrapped, identifier, false, sync.Mutex{}}\n}", "func FromContext(ctx context.Context) *Span {\n\treturn ctx.Value(spanKey).(*Span)\n}", "func (r DeleteCensorLibItemsRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r DeleteExtraCacheTimeRequest) GetRegionId() string {\n return \"\"\n}", "func NewContext(ctx context.Context, rights Rights) context.Context {\n\treturn context.WithValue(ctx, rightsKey, rights)\n}", "func WithContext(ctx context.Context, fnctx Context) context.Context {\n\treturn context.WithValue(ctx, ctxKey, fnctx)\n}", "func (r GetLargeScreenDataRequest) GetRegionId() string {\n return r.RegionId\n}", "func (e Endpoints) AddRegion(ctx context.Context, token string, region registry.Region) (err error) {\n\trequest := AddRegionRequest{\n\t\tRegion: region,\n\t\tToken: token,\n\t}\n\tresponse, err := e.AddRegionEndpoint(ctx, request)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn response.(AddRegionResponse).Err\n}", "func (ctx Context) WithHeight(height int64) Context {\n\tctx.Height = height\n\treturn ctx\n}", "func Use(ctx context.Context, s Store) context.Context {\n\treturn context.WithValue(ctx, &contextKey, s)\n}", "func NewConfigWithParams(accessKeyID, secretAccessKey, region string) *Config {\n\treturn &Config{\n\t\tCredentials: &Credentials{\n\t\t\tAccessKeyID: accessKeyID,\n\t\t\tSecretAccessKey: secretAccessKey,\n\t\t},\n\t\tRegion: Region[region],\n\t}\n}", "func (r ReportTaskRequest) GetRegionId() string {\n return r.RegionId\n}", "func NewContext(ctx context.Context, cfg *Config) context.Context {\n\treturn context.WithValue(ctx, cfgKey, cfg)\n}" ]
[ "0.6145007", "0.5989065", "0.5984874", "0.5810781", "0.5662362", "0.5543867", "0.5486738", "0.5344818", "0.5138282", "0.51322836", "0.49980804", "0.49698296", "0.4907282", "0.48648605", "0.48404807", "0.48404735", "0.4829503", "0.48034945", "0.47899893", "0.47813082", "0.47746754", "0.47732067", "0.47730315", "0.47706452", "0.4761965", "0.47532082", "0.4738043", "0.4718796", "0.4685812", "0.46843168", "0.46675873", "0.46439788", "0.46350297", "0.46336275", "0.462077", "0.46163958", "0.4609221", "0.45978105", "0.45942134", "0.4573665", "0.45663297", "0.4559036", "0.45546305", "0.45543438", "0.45449877", "0.45404005", "0.45348057", "0.4531234", "0.45293993", "0.45292374", "0.45149174", "0.4513662", "0.44964746", "0.44910842", "0.44802502", "0.44768724", "0.4469552", "0.44673905", "0.44503626", "0.4445159", "0.444407", "0.4437187", "0.44188383", "0.4418013", "0.44173542", "0.44127828", "0.4407259", "0.43990585", "0.43951726", "0.43911415", "0.4388501", "0.43824327", "0.43745944", "0.43646908", "0.43646908", "0.43519902", "0.43518445", "0.43497938", "0.4344408", "0.43415114", "0.43398917", "0.43395045", "0.43320006", "0.4328852", "0.43276456", "0.43273345", "0.43265092", "0.4325583", "0.43170306", "0.4307603", "0.42938703", "0.42783207", "0.42781615", "0.42737287", "0.42710793", "0.4269635", "0.42644727", "0.42644665", "0.4261601", "0.42567077" ]
0.8142779
0
Region returns a secret ID from a context (if any).
func Region(ctx context.Context) (string, bool) { secretID, ok := ctx.Value(ContextRegion).(string) return secretID, ok }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func SecretID(ctx context.Context) (string, bool) {\n\tsecretID, ok := ctx.Value(ContextSecretID).(string)\n\n\treturn secretID, ok\n}", "func (r SearchLogContextRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r InvokeRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r InvokeCommandRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r AddTemplateRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r AuthPrivilegeRequest) GetRegionId() string {\n return \"\"\n}", "func (r DescribeCacheInstancesRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r DescribeThingShadowRequest) GetRegionId() string {\n return r.RegionId\n}", "func WithRegion(ctx workflow.Context, secretID string) workflow.Context {\n\treturn workflow.WithValue(ctx, ContextRegion, secretID)\n}", "func (r CreateImageFromSnapshotsRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r ModifyTaskRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r DeleteCensorLibItemsRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r LastDownsampleRequest) GetRegionId() string {\n return r.RegionId\n}", "func (s Secret) ID() string {\n\treturn s.Namespace\n}", "func (r ModifyAppGeneralSettingByIdRequest) GetRegionId() string {\n return \"\"\n}", "func (r OnlineSqlTaskQueryRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r SetAuthConfigRequest) GetRegionId() string {\n return \"\"\n}", "func (r DeleteExtraCacheTimeRequest) GetRegionId() string {\n return \"\"\n}", "func (r DescribeAuditLogRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r CreateBackupPlanRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r GetLargeScreenDataRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r DeployRequest) GetRegionId() string {\n return \"\"\n}", "func (r ReportTaskRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r DescribeSlowLogRequest) GetRegionId() string {\n return r.RegionId\n}", "func (c *Context) GetSecret(thread *starlark.Thread, _ *starlark.Builtin, args starlark.Tuple, kwargs []starlark.Tuple) (starlark.Value, error) {\n\tif c.secrets == nil {\n\t\treturn starlark.None, fmt.Errorf(\"no secrets provided\")\n\t}\n\n\tvar key starlark.String\n\tif err := starlark.UnpackPositionalArgs(\"get_secret\", args, kwargs, 1, &key); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn util.Marshal(c.secrets[string(key)])\n}", "func (r CreateClusterRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r UpdateAsCronRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r UpdateListenerRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r CreateCollectInfoRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r QueryForbiddenInfoListRequest) GetRegionId() string {\n return \"\"\n}", "func (r SendMessagesByPinUsingPOSTRequest) GetRegionId() string {\n return \"\"\n}", "func (r GeneralAlterEventRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r CreateVideoUploadTaskRequest) GetRegionId() string {\n return \"\"\n}", "func (r AttachGroupPolicyRequest) GetRegionId() string {\n return \"\"\n}", "func (r StatusReportRequest) GetRegionId() string {\n return r.RegionId\n}", "func ByID(c *gin.Context) {\n\n}", "func (r *Region) GetContext() *kvrpcpb.Context {\n\treturn &kvrpcpb.Context{\n\t\tRegionId: r.meta.Id,\n\t\tRegionEpoch: r.meta.RegionEpoch,\n\t\tPeer: r.peer,\n\t}\n}", "func Secret(c *cli.Context) string {\n\tv := c.String(flagSecret)\n\tif v == \"\" {\n\t\treturn env.GetString(EnvBittrexSecret)\n\t}\n\n\treturn v\n}", "func SecretController(c *gin.Context) {\n\tc.JSON(200, &models.ResponsePayload{Success: true, Message: c.MustGet(\"id\").(string)})\n}", "func (r DeleteVeditProjectRequest) GetRegionId() string {\n return \"\"\n}", "func GetSecret(tid string) ([]byte, error) {\n\tvar token string\n\n\tif err := db.QueryRow(\"SELECT token FROM event_tasks WHERE id = $1\", tid).\n\t\tScan(&token); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn []byte(token), nil\n}", "func (r GetBucketFilesRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r DescribeBillSummarysRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r VerifyContractRequest) GetRegionId() string {\n return \"\"\n}", "func (r DescribeAlarmHistoryRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r DelSubDeviceWithCoreRequest) GetRegionId() string {\n return r.RegionId\n}", "func (t *Toon) RegionID() int64 {\n\treturn t.Int(\"region\")\n}", "func (o GetResponsePlanIntegrationPagerdutyOutput) SecretId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetResponsePlanIntegrationPagerduty) string { return v.SecretId }).(pulumi.StringOutput)\n}", "func (r DescribeBandwidthsRequest) GetRegionId() string {\n return \"\"\n}", "func GetRegion(kpp string) int {\n\ti, _ := strconv.Atoi(kpp[:2])\n\treturn i\n}", "func GetSecretKey(ctx *pulumi.Context) string {\n\treturn config.Get(ctx, \"aws:secretKey\")\n}", "func (system *System) GetSecret() (string, error) {\n\tdb := GetGORMDbConnection()\n\tdefer Close(db)\n\n\tsecret := Secret{}\n\n\terr := db.Where(\"system_id = ?\", system.ID).First(&secret).Error\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"unable to get hashed secret for clientID %s: %s\", system.ClientID, err.Error())\n\t}\n\n\tif secret.Hash == \"\" {\n\t\treturn \"\", fmt.Errorf(\"stored hash of secret for clientID %s is blank\", system.ClientID)\n\t}\n\n\treturn secret.Hash, nil\n}", "func (o ResponsePlanIntegrationPagerdutyOutput) SecretId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ResponsePlanIntegrationPagerduty) string { return v.SecretId }).(pulumi.StringOutput)\n}", "func (o NamedValueValueFromKeyVaultOutput) SecretId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v NamedValueValueFromKeyVault) string { return v.SecretId }).(pulumi.StringOutput)\n}", "func GetRegion(ctx *pulumi.Context) string {\n\tv, err := config.Try(ctx, \"newrelic:region\")\n\tif err == nil {\n\t\treturn v\n\t}\n\tvar value string\n\tif d := internal.GetEnvOrDefault(\"US\", nil, \"NEW_RELIC_REGION\"); d != nil {\n\t\tvalue = d.(string)\n\t}\n\treturn value\n}", "func (r AddPushStreamRuleRequest) GetRegionId() string {\n return \"\"\n}", "func Secret(filename string) string {\n\treturn InGravity(SecretsDir, filename)\n}", "func (context *handlerContext) CookieSecret() string {\n\treturn context.cookieSecret\n}", "func (o *Operator) RegionID() uint64 {\n\treturn o.regionID\n}", "func GetShardIDFromRegion(region string) string {\n\treturn regionByShards[region]\n}", "func (s *Store) GetSecret(ctx context.Context, req secretstores.GetSecretRequest) (secretstores.GetSecretResponse, error) {\n\tres := secretstores.GetSecretResponse{Data: nil}\n\n\tif s.client == nil {\n\t\treturn res, fmt.Errorf(\"client is not initialized\")\n\t}\n\n\tif req.Name == \"\" {\n\t\treturn res, fmt.Errorf(\"missing secret name in request\")\n\t}\n\tsecretName := fmt.Sprintf(\"projects/%s/secrets/%s\", s.ProjectID, req.Name)\n\n\tversionID := \"latest\"\n\tif value, ok := req.Metadata[VersionID]; ok {\n\t\tversionID = value\n\t}\n\n\tsecret, err := s.getSecret(ctx, secretName, versionID)\n\tif err != nil {\n\t\treturn res, fmt.Errorf(\"failed to access secret version: %v\", err)\n\t}\n\n\treturn secretstores.GetSecretResponse{Data: map[string]string{req.Name: *secret}}, nil\n}", "func (t *Territory) Region(ctx context.Context, db DB) (*Region, error) {\n\treturn RegionByRegionID(ctx, db, t.RegionID)\n}", "func (r DescribeSnapshotPolicyDiskRelationsRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r QueryDeviceStatusForPCdnRequest) GetRegionId() string {\n return \"\"\n}", "func GetSecret(c *gin.Context) {\n\tvar (\n\t\trepo = session.Repo(c)\n\t\tname = c.Param(\"secret\")\n\t)\n\tsecret, err := Config.Services.Secrets.SecretFind(repo, name)\n\tif err != nil {\n\t\tc.String(404, \"Error getting secret %q. %s\", name, err)\n\t\treturn\n\t}\n\tc.JSON(200, secret.Copy())\n}", "func (n NovaScheduler) GetSecret() string {\n\treturn n.Spec.Secret\n}", "func ServiceID(awsPartition endpoints.Partition, awsRegion endpoints.Region, awsAccountID string) string {\n\treturn \"arn:\" + awsPartition.ID() + \":codecommit:\" + awsRegion.ID() + \":\" + awsAccountID + \":\"\n}", "func getSecret(name, namespace string, labels map[string]string) *corev1.Secret {\n\treturn &corev1.Secret{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: APIv1,\n\t\t\tKind: SecretKind,\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tNamespace: namespace,\n\t\t\tLabels: labels,\n\t\t},\n\t}\n}", "func IntegrationSecret(i string) string {\n\treturn i\n}", "func (r SetDevicePropertyRequest) GetRegionId() string {\n return r.RegionId\n}", "func GetRegion(svc *ec2metadata.EC2Metadata) (string, error) {\n\tdoc, err := svc.GetInstanceIdentityDocument()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn doc.Region, nil\n}", "func GetSecret() (string, string, error) {\n\tsecretMap := make(map[string]map[string]string)\n\tsecretCfg := os.Getenv(\"SQLFLOW_WORKFLOW_SECRET\")\n\tif secretCfg == \"\" {\n\t\treturn \"\", \"\", nil\n\t}\n\tif e := json.Unmarshal([]byte(secretCfg), &secretMap); e != nil {\n\t\treturn \"\", \"\", e\n\t}\n\tif len(secretMap) != 1 {\n\t\treturn \"\", \"\", fmt.Errorf(`SQLFLOW_WORKFLOW_SECRET should be a json string, e.g. {name: {key: value, ...}}`)\n\t}\n\tname := reflect.ValueOf(secretMap).MapKeys()[0].String()\n\tvalue, e := json.Marshal(secretMap[name])\n\tif e != nil {\n\t\treturn \"\", \"\", e\n\t}\n\treturn name, string(value), nil\n}", "func (r ListDNSRecordsRequest) GetRegionId() string {\n return \"\"\n}", "func GetRegion(configuredRegion string) (string, error) {\n\tif configuredRegion != \"\" {\n\t\treturn configuredRegion, nil\n\t}\n\n\tsess, err := session.NewSessionWithOptions(session.Options{\n\t\tSharedConfigState: session.SharedConfigEnable,\n\t})\n\tif err != nil {\n\t\treturn \"\", errwrap.Wrapf(\"got error when starting session: {{err}}\", err)\n\t}\n\n\tregion := aws.StringValue(sess.Config.Region)\n\tif region != \"\" {\n\t\treturn region, nil\n\t}\n\n\tmetadata := ec2metadata.New(sess, &aws.Config{\n\t\tEndpoint: ec2Endpoint,\n\t\tEC2MetadataDisableTimeoutOverride: aws.Bool(true),\n\t\tHTTPClient: &http.Client{\n\t\t\tTimeout: time.Second,\n\t\t},\n\t})\n\tif !metadata.Available() {\n\t\treturn DefaultRegion, nil\n\t}\n\n\tregion, err = metadata.Region()\n\tif err != nil {\n\t\treturn \"\", errwrap.Wrapf(\"unable to retrieve region from instance metadata: {{err}}\", err)\n\t}\n\n\treturn region, nil\n}", "func getInstanceID(providerID string) string {\n\tproviderTokens := strings.Split(providerID, \"/\")\n\treturn providerTokens[len(providerTokens)-1]\n}", "func getInstanceID(providerID string) string {\n\tproviderTokens := strings.Split(providerID, \"/\")\n\treturn providerTokens[len(providerTokens)-1]\n}", "func (p *provider) GetSecret(ctx context.Context, name string) string {\n\tsecretPath := filepath.Join(\"projects\", p.projectID, \"secrets\", name, \"versions\", \"latest\")\n\treq := &secretmanagerpb.AccessSecretVersionRequest{\n\t\tName: secretPath,\n\t}\n\n\tres, err := p.client.AccessSecretVersion(ctx, req)\n\tif err != nil {\n\t\tlog.Fatalf(\"AccessSecretVersion error: %+v\", err)\n\t}\n\n\treturn string(res.Payload.Data)\n}", "func (s Keygen) Secret() *party.Secret {\n\treturn &party.Secret{\n\t\tID: s.selfID,\n\t}\n}", "func GetRegion(ctx *pulumi.Context) string {\n\tv, err := config.Try(ctx, \"aws:region\")\n\tif err == nil {\n\t\treturn v\n\t}\n\tif dv, ok := getEnvOrDefault(\"\", nil, \"AWS_REGION\", \"AWS_DEFAULT_REGION\").(string); ok {\n\t\treturn dv\n\t}\n\treturn v\n}", "func getSecret(kubeClient client.Client, secretName, namespace string) (*corev1.Secret, error) {\n\ts := &corev1.Secret{}\n\n\terr := kubeClient.Get(context.TODO(), kubetypes.NamespacedName{Name: secretName, Namespace: namespace}, s)\n\n\tif err != nil {\n\t\treturn &corev1.Secret{}, err\n\t}\n\treturn s, nil\n}", "func (m *SocialIdentityProvider) GetClientSecret()(*string) {\n return m.clientSecret\n}", "func instanceID(resourceSpec *runtime.RawExtension) (string, error) {\n\tif resourceSpec == nil {\n\t\treturn \"\", nil\n\t}\n\n\tspec := partialSpec{}\n\terr := json.Unmarshal(resourceSpec.Raw, &spec)\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"unmarshalling StateResource spec failed\")\n\t}\n\n\treturn spec.InstanceID, nil\n}", "func (m *AuthenticationContext) GetId()(*string) {\n val, err := m.GetBackingStore().Get(\"id\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "func ClientSecret() string {\n\treturn clientSecret\n}", "func ClientSecret() string {\n\treturn clientSecret\n}", "func ClientSecret() string {\n\treturn clientSecret\n}", "func (r DescribeDomainOnlineStreamRequest) GetRegionId() string {\n return \"\"\n}", "func (postgres *PostgreSQLReconciler) GetSecret(secretName string) (map[string][]byte, error) {\n\tsecret := &corev1.Secret{}\n\terr := postgres.Client.Get(types.NamespacedName{Name: secretName, Namespace: postgres.HarborCluster.Namespace}, secret)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdata := secret.Data\n\treturn data, nil\n}", "func (h *Handler) getSecret(secret *corev1.Secret) (*corev1.Secret, error) {\n\tnamespace := secret.GetNamespace()\n\tif len(namespace) == 0 {\n\t\tnamespace = h.namespace\n\t}\n\treturn h.clientset.CoreV1().Secrets(namespace).Get(h.ctx, secret.Name, h.Options.GetOptions)\n}", "func RandomSecret(ctx context.Context, name string) (Secret, error) {\n\tif store := CurrentStore(ctx); store != nil {\n\t\treturn store.RandomSecret(ctx, name)\n\t}\n\treturn Secret{}, ErrNoStoreConfigured\n}", "func (p *EnvironmentProvider) GetSecret(secretName string) (string, bool) {\n\tname := strings.ToUpper(strings.Replace(secretName, \"/\", \"_\", -1))\n\treturn p.lookup(name)\n}", "func SecretKey() (string, error) {\n\treturn keyProvider.Get(nil)\n}", "func (f *FileLocation) GetSecret() (value int64) {\n\treturn f.Secret\n}", "func (s *SecretAPI) GetSecret(secretID, versionID, versionStage string) (*Secret, error) {\n\n\tif s.err != nil {\n\t\treturn nil, s.err\n\t}\n\n\tcs := C.CString(secretID)\n\tcv := C.CString(versionID)\n\tct := C.CString(versionStage)\n\n\tdefer func() {\n\t\ts.close()\n\t\tC.free(unsafe.Pointer(cs))\n\t\tC.free(unsafe.Pointer(cv))\n\t\tC.free(unsafe.Pointer(ct))\n\t}()\n\n\tres := C.gg_request_result{}\n\n\ts.APIRequest.initialize()\n\n\te := GreenGrassCode(C.gg_get_secret_value(s.request, cs, cv, ct, &res))\n\n\ts.response = s.handleRequestResponse(\n\t\t\"Failed to get secret\",\n\t\te, RequestStatus(res.request_status),\n\t)\n\n\tif s.err != nil {\n\t\treturn nil, s.err\n\t}\n\n\tLog(LogLevelInfo, \"Got Secret: %s\", s.response)\n\n\tvar secret Secret\n\tif err := json.Unmarshal([]byte(s.response), &secret); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &secret, nil\n\n}", "func GetSecret(client client.Client, parentNamespace string, secretRef *corev1.ObjectReference) (secret *corev1.Secret, err error) {\n\tsrLogger := log.WithValues(\"package\", \"utils\", \"method\", \"getSecret\")\n\tif secretRef != nil {\n\t\tsrLogger.Info(\"Retreive secret\", \"parentNamespace\", parentNamespace, \"secretRef\", secretRef)\n\t\tns := secretRef.Namespace\n\t\tif ns == \"\" {\n\t\t\tns = parentNamespace\n\t\t}\n\t\tsecret = &corev1.Secret{}\n\t\terr = client.Get(context.TODO(), types.NamespacedName{Namespace: ns, Name: secretRef.Name}, secret)\n\t\tif err != nil {\n\t\t\tsrLogger.Error(err, \"Failed to get secret \", \"Name:\", secretRef.Name, \" on namespace: \", secretRef.Namespace)\n\t\t\treturn nil, err\n\t\t}\n\t\tsrLogger.Info(\"Secret found \", \"Name:\", secretRef.Name, \" on namespace: \", secretRef.Namespace)\n\t} else {\n\t\tsrLogger.Info(\"No secret defined\", \"parentNamespace\", parentNamespace)\n\t}\n\treturn secret, err\n}", "func (d *KfDef) GetSecret(name string) (string, error) {\n\tfor _, s := range d.Spec.Secrets {\n\t\tif s.Name != name {\n\t\t\tcontinue\n\t\t}\n\t\tif s.SecretSource.LiteralSource != nil {\n\t\t\treturn s.SecretSource.LiteralSource.Value, nil\n\t\t}\n\t\tif s.SecretSource.HashedSource != nil {\n\t\t\treturn s.SecretSource.HashedSource.HashedValue, nil\n\t\t}\n\t\tif s.SecretSource.EnvSource != nil {\n\t\t\treturn os.Getenv(s.SecretSource.EnvSource.Name), nil\n\t\t}\n\n\t\treturn \"\", fmt.Errorf(\"No secret source provided for secret %v\", name)\n\t}\n\treturn \"\", NewSecretNotFound(name)\n}", "func (factory *Factory) GetSecretName() string {\n\treturn factory.singleton.certificate.Name\n}", "func (self *Secret) GetIdentifier(key string) string {\n\tif key == \"uri\" {\n\t\treturn self.uri\n\t} else if strings.HasPrefix(key, \"tags.\") {\n\t\tname := strings.ToLower(key[5:])\n\t\tfor _, tag := range self.tags {\n\t\t\tif strings.ToLower(tag.Name) == name {\n\t\t\t\treturn tag.Value\n\t\t\t}\n\t\t}\n\t}\n\treturn \"\"\n}", "func (c *configuration) Secret(clientSet ClientSet) *Secret {\n\tif clientSet != nil {\n\t\treturn NewSecret(clientSet)\n\t}\n\treturn nil\n\n}", "func (f *CredentialsFile) GetUsedID() (string, error) {\n\td, _ := f.GetProfileBy(\"default\")\n\tif len(d.AccessKeyID) == 0 { // empty default section\n\t\treturn \"\", fmt.Errorf(\"AWS_ACCESS_KEY_ID is not set inside the default section\")\n\t}\n\treturn d.AccessKeyID, nil\n}" ]
[ "0.6457897", "0.6192949", "0.6147299", "0.6136234", "0.60608804", "0.60570693", "0.5995437", "0.59767574", "0.59624624", "0.596075", "0.59511817", "0.59247166", "0.59244645", "0.58979803", "0.5877675", "0.5873456", "0.58518547", "0.58320653", "0.5824291", "0.5812901", "0.5767411", "0.57458663", "0.57417625", "0.5733768", "0.5720761", "0.567751", "0.5648195", "0.56298524", "0.5582543", "0.55819356", "0.55546093", "0.5553845", "0.5530946", "0.5529452", "0.5520112", "0.55173004", "0.5491829", "0.5489268", "0.5484989", "0.5478571", "0.5466203", "0.54640263", "0.5450836", "0.5449787", "0.5430489", "0.54238707", "0.5386484", "0.5368772", "0.53659856", "0.5354893", "0.5330423", "0.52964455", "0.5280523", "0.527027", "0.52345043", "0.5230618", "0.5228584", "0.5218819", "0.5211796", "0.52096874", "0.5207866", "0.5197766", "0.5187782", "0.51830417", "0.5178944", "0.51706195", "0.51701194", "0.5166984", "0.5166225", "0.51299244", "0.5121827", "0.5114431", "0.510737", "0.50934887", "0.5090662", "0.5090662", "0.50861305", "0.50858474", "0.5055652", "0.50480115", "0.50436884", "0.5038156", "0.5033851", "0.502881", "0.502881", "0.502881", "0.50230646", "0.49980375", "0.4992866", "0.4990354", "0.49763292", "0.4975498", "0.4968986", "0.49664116", "0.49477565", "0.49426305", "0.4938051", "0.49374673", "0.49212444", "0.49062607" ]
0.7669666
0
/Execute will execute the Stype instruction
func (ex *ExecutorS) Execute() { immediate := uint32(ex.Result.TwelveBitImmediate) src := uint(ex.Result.FiveBitRegister2) base := uint(ex.Result.FiveBitRegister1) func3 := validOperationS(ex.Result.Funct3) decision := map[Parser.OpCode](map[validOperationS](executionFunctionS)){ Parser.Store: map[validOperationS](executionFunctionS){ StoreWord: (RiscVExecutor).storeWord, StoreHalfWord: (RiscVExecutor).storeHalfWord, StoreByte: (RiscVExecutor).storeByte, }, } if m, ok := decision[ex.Result.OpCode]; ok { if f, ok := m[func3]; ok { f(ex.Executor, base, src, immediate) } else { panic(fmt.Sprintf("executionFunctionS: %d operation not found", func3)) } } else { panic(fmt.Sprintf("executionFunctionS: %d opcode not found", ex.Result.OpCode)) } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (opcode Sum) Execute() {\n\tfmt.Println(\"Execute Sum\")\n}", "func execTypeString(_ int, p *gop.Context) {\n\targs := p.GetArgs(2)\n\tret := types.TypeString(args[0].(types.Type), args[1].(types.Qualifier))\n\tp.Ret(2, ret)\n}", "func (cpu *CPU) Execute(i *Insn) (err error) {\r\n\tif i.family == ItCondJump {\r\n\t\tjmp := false\r\n\r\n\t\tswitch i.condition {\r\n\t\tcase CondJnz:\r\n\t\t\tif cpu.S_Z() == 0 {\r\n\t\t\t\tjmp = true\r\n\t\t\t}\t\t\t\t\t\t\t\t\r\n\t\tcase CondJz:\r\n\t\t\tif cpu.S_Z() != 0 {\r\n\t\t\t\tjmp = true\r\n\t\t\t}\r\n\t\tcase CondJnc:\r\n\t\t\tif cpu.S_C() == 0 {\r\n\t\t\t\tjmp = true\r\n\t\t\t}\r\n\t\tcase CondJc:\r\n\t\t\tif cpu.S_C() != 0 {\r\n\t\t\t\tjmp = true\r\n\t\t\t}\r\n\t\tcase CondJn:\r\n\t\t\tif cpu.S_N() != 0 {\r\n\t\t\t\tjmp = true\r\n\t\t\t}\r\n\t\tcase CondJge:\r\n\t\t\tif cpu.S_N() ^ cpu.S_V() == 0 {\r\n\t\t\t\tjmp = true\r\n\t\t\t}\r\n\t\tcase CondJl:\r\n\t\t\tif cpu.S_N() ^ cpu.S_V() != 0 {\r\n\t\t\t\tjmp = true\r\n\t\t\t}\r\n\t\tcase CondJmp:\r\n\t\t\tjmp = true\r\n\t\t}\r\n\r\n\t\tif jmp == true {\r\n\t\t\tcpu.regs[0] += uint16(i.offset)\r\n\t\t}\r\n\t} else {\r\n\t\tvar src, dst, tmp uint16\r\n\r\n\t\tswitch i.family {\r\n\t\tcase ItSingleOperand:\r\n\t\t\t// S1: LOAD\r\n\r\n\t\t\tif src, err = cpu.src_operand(i); err != nil {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\r\n\t\t\t// S2: EVAL\r\n\t\t\tswitch i.opcode {\r\n\t\t\tcase Op1Rrc:\r\n\t\t\t\tif i.Byte() { \r\n\t\t\t\t\tx := src & 1\r\n\t\t\t\t\ttmp = uint16(uint8(cpu.S_C()) << 7 | uint8(src >> 1))\r\n\t\t\t\t\tcpu.set_C(x)\r\n\t\t\t\t} else {\r\n\t\t\t\t\tx := src & 1\r\n\t\t\t\t\ttmp = uint16(cpu.S_C()) << 15\r\n\t\t\t\t\ttmp |= src >> 1\r\n\t\t\t\t\tcpu.set_C(x)\r\n\t\t\t\t}\r\n\t\t\tcase Op1Swpb:\r\n\t\t\t\ttmp = (src >> 8) | ((src & 0xff) << 8)\r\n\r\n\t\t\tcase Op1Rra:\r\n\t\t\t\tif i.Byte() { \r\n\t\t\t\t\tx := src & 1\r\n\t\t\t\t\ty := (src >> 7) & 1\r\n\t\t\t\t\ttmp = src >> 1\r\n\t\t\t\t\ttmp = uint16(uint8((tmp & 0x40) | (y << 7)))\r\n\t\t\t\t\tcpu.set_C(x)\r\n\t\t\t\t} else {\r\n\t\t\t\t\tx := src & 1\r\n\t\t\t\t\ty := (src >> 15) & 1\r\n\t\t\t\t\ttmp = src >> 1\r\n\t\t\t\t\ttmp = uint16((tmp & 0x4000) | (y << 15))\r\n\t\t\t\t\tcpu.set_C(x)\r\n\t\t\t\t}\r\n\t\t\tcase Op1Sxt:\r\n\t\t\t\tif src & 0x80 != 0 {\r\n\t\t\t\t\ttmp = (0xff<<8) | src\r\n\t\t\t\t} else {\r\n\t\t\t\t\ttmp = src & 0xff\r\n\t\t\t\t}\r\n\r\n\t\t\tcase Op1Push: \r\n\t\t\t\tcpu.regs[1] -= 2\r\n\t\t\t\tif i.Byte() {\r\n\t\t\t\t\tcpu.memory.StoreByte(cpu.regs[1], uint8(src))\r\n\t\t\t\t} else {\r\n\t\t\t\t\tcpu.memory.StoreWord(cpu.regs[1], src)\r\n\t\t\t\t}\r\n\r\n\t\t\tcase Op1Call:\r\n\t\t\t\tcpu.regs[1] -= 2\r\n\t\t\t\tcpu.memory.StoreWord(cpu.regs[1], cpu.regs[0])\r\n\t\t\t\tcpu.regs[0] = src\r\n\r\n\t\t\tcase Op1Reti:\r\n\t\t\t\t// OK OK OK GRAHAM \r\n\t\t\t\t// panic(\"Not implemented RETI\")\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\r\n\t\t\t// S3 FLAGS\r\n\t\t\t\r\n\t\t\t// C\r\n\t\t\tif i.opcode == Op1Sxt {\r\n\t\t\t\tif tmp == 0 { \r\n\t\t\t\t\tcpu.set_C(0)\r\n\t\t\t\t} else {\r\n\t\t\t\t\tcpu.set_C(1)\r\n\t\t\t\t}\r\n\t\t\t}\r\n\r\n\t\t\t// V\r\n\t\t\t\r\n\t\t\tswitch i.opcode {\r\n\t\t\tcase Op1Rrc:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op1Rra:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op1Sxt:\r\n\t\t\t\tcpu.set_V(0)\r\n\t\t\t}\r\n\r\n\t\t\t// Z\r\n\r\n\t\t\tswitch i.opcode {\r\n\t\t\tcase Op1Rrc:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op1Rra:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op1Sxt:\r\n\t\t\t\tif tmp == 0 {\r\n\t\t\t\t\tcpu.set_Z(1)\r\n\t\t\t\t} else {\r\n\t\t\t\t\tcpu.set_Z(0)\r\n\t\t\t\t}\r\n\t\t\t}\t\t\t\r\n\r\n\t\t\t// N\r\n\t\t\t\r\n\t\t\tswitch i.opcode {\r\n\t\t\tcase Op1Rrc:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op1Rra:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op1Sxt:\r\n\t\t\t\tif i.Byte() { \r\n\t\t\t\t\tif int8(tmp) < 0 {\r\n\t\t\t\t\t\tcpu.set_N(1)\r\n\t\t\t\t\t} else {\r\n\t\t\t\t\t\tcpu.set_Z(0)\r\n\t\t\t\t\t}\r\n\t\t\t\t} else {\r\n\t\t\t\t\tif int16(tmp) < 0 {\r\n\t\t\t\t\t\tcpu.set_N(1)\r\n\t\t\t\t\t} else {\r\n\t\t\t\t\t\tcpu.set_Z(0)\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\t\t\t\r\n\t\t\r\n\t\t\t// S4 STORE\r\n\r\n\t\t\tswitch i.opcode {\r\n\t\t\tcase Op1Push:\r\n\t\t\tcase Op1Call:\r\n\t\t\tcase Op1Reti:\r\n\t\t\t\t// these don't do anything\r\n\t\t\tdefault:\r\n\t\t\t\terr = cpu.src_operand_store(i, tmp)\r\n\t\t\t\tif err != nil { \r\n\t\t\t\t\treturn\r\n\t\t\t\t}\r\n\t\t\t}\r\n\r\n\t\tcase ItDoubleOperand:\r\n\t\t\t// S1 LOAD\r\n\r\n\t\t\tif src, err = cpu.src_operand(i); err != nil {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\r\n\t\t\tif dst, err = cpu.dst_operand(i); err != nil {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\r\n\t\t\t// S2 EVAL\r\n\r\n\t\t\tswitch i.opcode {\r\n\t\t\tcase Op2Mov:\r\n\t\t\t\tif i.Byte() {\r\n\t\t\t\t\ttmp = src & 0xff\r\n\t\t\t\t} else {\r\n\t\t\t\t\ttmp = src\r\n\t\t\t\t}\r\n\r\n\t\t\tcase Op2Add:\r\n\t\t\t\tif i.Byte() {\r\n\t\t\t\t\tx := uint8(src) + uint8(dst)\r\n\t\t\t\t\ttmp = uint16(x)\r\n\t\t\t\t} else {\r\n\t\t\t\t\ttmp = src + dst\r\n\t\t\t\t}\r\n\t\t\tcase Op2Addc:\r\n\t\t\t\tif i.Byte() {\r\n\t\t\t\t\tx := uint8(src) + uint8(dst)\r\n\t\t\t\t\tif(cpu.S_C() != 0) {\r\n\t\t\t\t\t\tx += 1\r\n\t\t\t\t\t}\r\n\t\t\t\t\ttmp = uint16(x)\t\t\t\t\r\n\t\t\t\t} else {\r\n\t\t\t\t\ttmp = src + dst\r\n\t\t\t\t\tif(cpu.S_C() != 0) {\r\n\t\t\t\t\t\ttmp += 1\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\tcase Op2Cmp:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Sub:\r\n\t\t\t\tif i.Byte() {\r\n\t\t\t\t\tx := uint8(dst) + uint8((^src)+1)\r\n\t\t\t\t\ttmp = uint16(x)\r\n\t\t\t\t} else {\r\n\t\t\t\t\ttmp = dst + ((^src) + 1)\r\n\t\t\t\t}\r\n\t\t\tcase Op2Subc:\r\n\t\t\t\tif i.Byte() {\r\n\t\t\t\t\tx := uint8(dst) + uint8((^src)+1) + uint8(cpu.S_C())\r\n\t\t\t\t\ttmp = uint16(x)\r\n\t\t\t\t} else {\r\n\t\t\t\t\ttmp = dst + ((^src) + 1) + uint16(cpu.S_C())\r\n\t\t\t\t}\r\n\t\t\tcase Op2Dadd:\r\n\t\t\t\t// NOT IMPLEMENTED\r\n\r\n\t\t\tcase Op2Bis:\r\n\t\t\t\tif i.Byte() {\r\n\t\t\t\t\ttmp = uint16(uint8(src) | uint8(dst))\r\n\t\t\t\t} else {\r\n\t\t\t\t\ttmp = src | dst\r\n\t\t\t\t}\r\n\t\t\tcase Op2Xor:\r\n\t\t\t\tif i.Byte() {\r\n\t\t\t\t\ttmp = uint16(uint8(src) ^ uint8(dst))\r\n\t\t\t\t} else {\r\n\t\t\t\t\ttmp = src ^ dst\r\n\t\t\t\t}\r\n\t\t\tcase Op2Bic:\r\n\t\t\t\tsrc = ^src\r\n\t\t\tcase Op2Bit:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2And:\r\n\t\t\t\tif i.Byte() {\r\n\t\t\t\t\ttmp = uint16(uint8(src) & uint8(dst))\r\n\t\t\t\t} else {\r\n\t\t\t\t\ttmp = src & dst\r\n\t\t\t\t}\r\n\t\t\t}\r\n\r\n\t\t\t// S3 FLAGS\r\n\t\t\t\r\n\t\t\t// C\r\n\t\t\tswitch i.opcode {\r\n\t\t\tcase Op2Add:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Addc:\r\n\t\t\t\tif i.Byte() { \r\n\t\t\t\t\tif int32(src) + int32(dst) > 0xff {\t\r\n\t\t\t\t\t\tcpu.set_C(1)\r\n\t\t\t\t\t} else {\r\n\t\t\t\t\t\tcpu.set_C(0)\r\n\t\t\t\t\t}\r\n\t\t\t\t} else {\r\n\t\t\t\t\tif int32(src) + int32(dst) > 0xffff {\t\r\n\t\t\t\t\t\tcpu.set_C(1)\r\n\t\t\t\t\t} else { \r\n\t\t\t\t\t\tcpu.set_C(0)\r\n\t\t\t\t\t}\r\n\t\t\t\t}\t\t\r\n\t\t\tcase Op2Sub:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Subc:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Cmp:\r\n\t\t\t\tif dst >= src {\r\n\t\t\t\t\tcpu.set_C(1)\r\n\t\t\t\t} else {\r\n\t\t\t\t\tcpu.set_C(0)\r\n\t\t\t\t}\r\n\t\t\tcase Op2Bit:\r\n\t\t\t\tif tmp == 0 {\r\n\t\t\t\t\tcpu.set_C(0)\r\n\t\t\t\t} else {\r\n\t\t\t\t\tcpu.set_C(1)\r\n\t\t\t\t}\r\n\t\t\tcase Op2Xor:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2And:\r\n\t\t\t\tif tmp != 0 {\r\n\t\t\t\t\tcpu.set_C(1)\r\n\t\t\t\t} else {\r\n\t\t\t\t\tcpu.set_C(0)\r\n\t\t\t\t}\r\n\t\t\t}\t\t\t\r\n\r\n\t\t\t// V\r\n\t\t\tswitch i.opcode {\r\n\t\t\tcase Op2Add:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Addc:\r\n\t\t\t\tif (int16(src) > 0 && int16(dst) > 0 && int16(tmp) < 0) ||\r\n\t\t\t\t\t(int16(src) < 0 && int16(dst) < 0 && int16(tmp) > 0) {\r\n\t\t\t\t\tcpu.set_V(1)\r\n\t\t\t\t} else {\r\n\t\t\t\t\tcpu.set_V(0)\r\n\t\t\t\t}\r\n\t\t\tcase Op2Sub:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Subc:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Cmp:\r\n\t\t\t\tif (int16(src) > 0 && int16(dst) < 0 && int16(tmp) < 0) ||\r\n\t\t\t\t\t(int16(src) < 0 && int16(dst) > 0 && int16(tmp) > 0) {\r\n\t\t\t\t\tcpu.set_V(1)\r\n\t\t\t\t} else {\r\n\t\t\t\t\tcpu.set_V(0)\r\n\t\t\t\t}\t\t\t\t\r\n\t\t\tcase Op2Bit:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2And:\r\n\t\t\t\tcpu.set_V(0)\r\n\t\t\tcase Op2Xor:\r\n\t\t\t\tif int16(dst) < 0 && int16(src) < 0 { \r\n\t\t\t\t\tcpu.set_V(1)\r\n\t\t\t\t} else {\r\n\t\t\t\t\tcpu.set_V(0)\r\n\t\t\t\t}\r\n\t\t\t}\r\n\r\n\t\t\t// N\r\n\t\t\tswitch i.opcode {\r\n\t\t\tcase Op2Add:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Addc:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Sub:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Subc:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Cmp:\r\n\t\t\t\tif int16(tmp) < 0 {\r\n\t\t\t\t\tcpu.set_N(1)\r\n \t\t\t\t} else {\r\n\t\t\t\t\tcpu.set_N(0)\r\n\t\t\t\t}\r\n\t\t\tcase Op2Xor:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Bit:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2And:\r\n\t\t\t\tif i.Byte() {\r\n\t\t\t\t\tif tmp & 0x80 != 0 {\r\n\t\t\t\t\t\tcpu.set_N(1)\r\n\t\t\t\t\t} else {\r\n\t\t\t\t\t\tcpu.set_N(0)\r\n\t\t\t\t\t}\r\n\t\t\t\t} else {\r\n\t\t\t\t\tif tmp & 0x8000 != 0 {\r\n\t\t\t\t\t\tcpu.set_N(1)\r\n\t\t\t\t\t} else {\r\n\t\t\t\t\t\tcpu.set_N(0)\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\t\r\n\r\n\t\t\t// Z\r\n\t\t\tswitch i.opcode {\r\n\t\t\tcase Op2Add:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Addc:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Sub:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Subc:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Cmp:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Bit:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2Xor:\r\n\t\t\t\tfallthrough\r\n\t\t\tcase Op2And:\r\n\t\t\t\tif tmp == 0 {\r\n\t\t\t\t\tcpu.set_Z(1)\r\n\t\t\t\t} else {\r\n\t\t\t\t\tcpu.set_Z(0)\r\n\t\t\t\t}\r\n\t\t\t}\r\n\r\n\t\t\t// S4 STORE\r\n\r\n\t\t\tif(i.opcode != Op2Bit && i.opcode != Op2Cmp) {\r\n\t\t\t\terr = cpu.dst_operand_store(i, tmp)\r\n\t\t\t\tif err != nil {\r\n\t\t\t\t\treturn\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\r\n\tif cpu.Sr() & 16 != 0 {\r\n\t\treturn newError(E_Halted, \"CPUOFF set\")\r\n\t}\r\n\r\n\treturn \r\n}", "func (s Spec) Type() string {\n\treturn \"exec\"\n}", "func (s *serverRegistry) Execute(frame []byte) error {\n\ttr := &thrift.TMemoryBuffer{Buffer: bytes.NewBuffer(frame)}\n\treturn s.processor.Process(s.inputProtocolFactory.GetProtocol(tr), s.outputProtocol)\n}", "func (o SpriteLocationOp) Execute(vm *system.VirtualMachine) {\n\t// Each character is 5 bytes wide and starts at memory location 0\n\tvm.IndexRegister = uint16(vm.Registers[o.register]) * 5\n}", "func (tu *TypetreatmentUpdate) Exec(ctx context.Context) error {\n\t_, err := tu.Save(ctx)\n\treturn err\n}", "func (i *Interpreter) Execute(p *ir.Program) error {\n\tfor _, inst := range p.Instructions {\n\t\tif err := i.instruction(inst); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func (n *scalarNode) Execute(ctx context.Context) error {\n\tbounds := n.timespec.Bounds()\n\n\tblock := block.NewScalar(n.op.val, bounds)\n\tif n.debug {\n\t\t// Ignore any errors\n\t\titer, _ := block.StepIter()\n\t\tif iter != nil {\n\t\t\tlogging.WithContext(ctx).Info(\"scalar node\", zap.Any(\"meta\", iter.Meta()))\n\t\t}\n\t}\n\n\tif err := n.controller.Process(block); err != nil {\n\t\tblock.Close()\n\t\t// Fail on first error\n\t\treturn err\n\t}\n\n\tblock.Close()\n\treturn nil\n}", "func (validationType *ValidationType) Execute(user builder.Person) {\n\n\tif user.ValidationTypeDone {\n\t\tlog.Println(\"Validation type already done \" + user.Type)\n\t\tvalidationType.Next.Execute(user)\n\t\treturn\n\t}\n\n\tlog.Println(\"Validation type user starting \" + user.Type)\n\tuser.ValidationTypeDone = true\n\tlog.Println(\"Execute next validation\")\n\tvalidationType.Next.Execute(user)\n}", "func (t *TypeSystem) Evaluate(typename string, object interface{}, op string, value string) (bool, error) {\n\tswitch typename {\n\tcase String:\n\t\treturn t.stringts.Evaluate(object, op, value)\n\tcase Number:\n\t\treturn t.numberts.Evaluate(object, op, value)\n\tcase Boolean:\n\t\treturn t.boolts.Evaluate(object, op, value)\n\tcase Strings:\n\t\treturn t.stringsts.Evaluate(object, op, value)\n\tcase Date:\n\t\treturn t.datets.Evaluate(object, op, value)\n\tdefault:\n\t\treturn false, fmt.Errorf(\"type/golang/type.go: unsupport type, %s, %v, %s, %s\", typename, object, op, value)\n\t}\n}", "func (e *SoracomExecutor) Execute(s string) {\n\tfmt.Printf(\"%s\", e.worker.Execute(s))\n}", "func (scs *SubCommandStruct) Execute(ctx context.Context, in io.Reader, out, outErr io.Writer) error {\n\tif scs.ExecuteValue != nil {\n\t\treturn scs.ExecuteValue(ctx, in, out, outErr)\n\t}\n\treturn nil\n}", "func (t *Template) Execute(i *ExecuteInput) (*ExecuteResult, error) {\n\tif i == nil {\n\t\ti = &ExecuteInput{}\n\t}\n\n\tvar used, missing dep.Set\n\n\ttmpl := template.New(\"\")\n\ttmpl.Delims(t.leftDelim, t.rightDelim)\n\n\ttmpl.Funcs(funcMap(&funcMapInput{\n\t\tt: tmpl,\n\t\tbrain: i.Brain,\n\t\tenv: i.Env,\n\t\tused: &used,\n\t\tmissing: &missing,\n\t\tfunctionBlacklist: t.functionBlacklist,\n\t\tsandboxPath: t.sandboxPath,\n\t}))\n\n\tif t.errMissingKey {\n\t\ttmpl.Option(\"missingkey=error\")\n\t} else {\n\t\ttmpl.Option(\"missingkey=zero\")\n\t}\n\n\ttmpl, err := tmpl.Parse(t.contents)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"parse\")\n\t}\n\n\t// Execute the template into the writer\n\tvar b bytes.Buffer\n\tif err := tmpl.Execute(&b, nil); err != nil {\n\t\treturn nil, errors.Wrap(err, \"execute\")\n\t}\n\n\treturn &ExecuteResult{\n\t\tUsed: &used,\n\t\tMissing: &missing,\n\t\tOutput: b.Bytes(),\n\t}, nil\n}", "func (ins *Return) Execute(registers map[string]*ast.Literal, _ *int, vm *VM) error {\n\tvm.Return = ins.Results\n\n\treturn nil\n}", "func (vm *EVM) Execute(st acmstate.ReaderWriter, blockchain engine.Blockchain, eventSink exec.EventSink,\n\tparams engine.CallParams, code []byte) ([]byte, error) {\n\n\t// Make it appear as if natives are stored in state\n\tst = native.NewState(vm.options.Natives, st)\n\n\tstate := engine.State{\n\t\tCallFrame: engine.NewCallFrame(st).WithMaxCallStackDepth(vm.options.CallStackMaxDepth),\n\t\tBlockchain: blockchain,\n\t\tEventSink: eventSink,\n\t}\n\n\toutput, err := vm.Contract(code).Call(state, params)\n\tif err == nil {\n\t\t// Only sync back when there was no exception\n\t\terr = state.CallFrame.Sync()\n\t}\n\t// Always return output - we may have a reverted exception for which the return is meaningful\n\treturn output, err\n}", "func (o AssignConstantOp) Execute(vm *system.VirtualMachine) {\n\tvm.Registers[o.register] = o.value\n}", "func (r ExecuteServiceRequest) Type() RequestType {\n\treturn Execute\n}", "func (f Function) Execute(i Instruction, e Environment, dryRun bool) error {\n\tif err := f.Check(i); err != nil {\n\t\treturn err\n\t}\n\treturn f.Func(i, e, dryRun)\n}", "func (tuo *TypetreatmentUpdateOne) Exec(ctx context.Context) error {\n\t_, err := tuo.Save(ctx)\n\treturn err\n}", "func (s *executionServer) Execute(\n\treq *remoteexecution.ExecuteRequest, execServer remoteexecution.Execution_ExecuteServer) error {\n\tlog.Debugf(\"Received Execute request: %s\", req)\n\n\tif !s.IsInitialized() {\n\t\treturn status.Error(codes.Internal, \"Server not initialized\")\n\t}\n\n\tvar err error = nil\n\n\t// Record metrics based on final error condition\n\tdefer func() {\n\t\tif err == nil {\n\t\t\ts.stat.Counter(stats.BzExecSuccessCounter).Inc(1)\n\t\t} else {\n\t\t\ts.stat.Counter(stats.BzExecFailureCounter).Inc(1)\n\t\t}\n\t}()\n\tdefer s.stat.Latency(stats.BzExecLatency_ms).Time().Stop()\n\n\t// Transform ExecuteRequest into Scoot Job, validate and schedule\n\t// If we encounter an error here, assume it was due to an InvalidArgument\n\tjob, err := execReqToScoot(req)\n\tif err != nil {\n\t\tlog.Errorf(\"Failed to convert request to Scoot JobDefinition: %s\", err)\n\t\treturn status.Error(codes.InvalidArgument, fmt.Sprintf(\"Error converting request to internal definition: %s\", err))\n\t}\n\n\terr = domain.ValidateJob(job)\n\tif err != nil {\n\t\tlog.Errorf(\"Scoot Job generated from request invalid: %s\", err)\n\t\treturn status.Error(codes.Internal, fmt.Sprintf(\"Internal job definition invalid: %s\", err))\n\t}\n\n\tid, err := s.scheduler.ScheduleJob(job)\n\tif err != nil {\n\t\tlog.Errorf(\"Failed to schedule Scoot job: %s\", err)\n\t\treturn status.Error(codes.Internal, fmt.Sprintf(\"Failed to schedule Scoot job: %s\", err))\n\t}\n\tlog.WithFields(\n\t\tlog.Fields{\n\t\t\t\"jobID\": id,\n\t\t}).Info(\"Scheduled execute request as Scoot job\")\n\n\teom := &remoteexecution.ExecuteOperationMetadata{\n\t\tStage: remoteexecution.ExecuteOperationMetadata_QUEUED,\n\t\tActionDigest: req.GetActionDigest(),\n\t}\n\n\t// Marshal ExecuteActionMetadata to protobuf.Any format\n\teomAsPBAny, err := marshalAny(eom)\n\tif err != nil {\n\t\treturn status.Error(codes.Internal, err.Error())\n\t}\n\n\t// Include the response message in the longrunning operation message\n\top := &longrunning.Operation{\n\t\tName: id,\n\t\tMetadata: eomAsPBAny,\n\t\tDone: false,\n\t}\n\n\t// Send the initial operation on the exec server stream\n\terr = execServer.Send(op)\n\tif err != nil {\n\t\treturn status.Error(codes.Internal, err.Error())\n\t}\n\n\tlog.Debug(\"ExecuteRequest completed successfully\")\n\treturn nil\n}", "func (_Transactable *TransactableTransactor) Execute(opts *bind.TransactOpts, _guarantor common.Address, _v uint8, _r [32]byte, _s [32]byte, _dest common.Address, _value *big.Int, _ts *big.Int) (*types.Transaction, error) {\n\treturn _Transactable.contract.Transact(opts, \"execute\", _guarantor, _v, _r, _s, _dest, _value, _ts)\n}", "func (c *CPU) Execute(ins Instruction, l, h byte) (int, error) {\n\tc.InCycle = true\n\tdefer func() { c.InCycle = false }()\n\tif ins.Func == nil {\n\t\treturn 0, fmt.Errorf(\"no function defined for %s\", ins.Name)\n\t}\n\n\tc.PC += uint16(ins.Length)\n\tc.Cycle += int(ins.Cycles)\n\tins.Func(c, l, h)\n\n\treturn int(ins.Cycles), nil\n}", "func (ins *Concat) Execute(registers map[string]*ast.Literal, _ *int, _ *VM) error {\n\tregisters[ins.Result] = asttest.NewLiteralString(\n\t\tregisters[ins.Left].Value + registers[ins.Right].Value)\n\n\treturn nil\n}", "func Execute() {\n\tAddCommands()\n\tIpvanishCmd.Execute()\n\t//\tutils.StopOnErr(IpvanishCmd.Execute())\n}", "func execWriteType(_ int, p *gop.Context) {\n\targs := p.GetArgs(3)\n\ttypes.WriteType(args[0].(*bytes.Buffer), args[1].(types.Type), args[2].(types.Qualifier))\n}", "func (e *ExprShl) Type() types.Type {\n\treturn e.X.Type()\n}", "func (ss *SousServer) Execute(args []string) cmdr.Result {\n\tif err := ensureGDMExists(ss.flags.gdmRepo, ss.Config.StateLocation, ss.Log.Info.Printf); err != nil {\n\t\treturn EnsureErrorResult(err)\n\t}\n\tss.Log.Info.Println(\"Starting scheduled GDM resolution.\")\n\tss.AutoResolver.Kickoff()\n\tss.Log.Info.Printf(\"Sous Server v%s running at %s\", ss.Sous.Version, ss.flags.laddr)\n\treturn EnsureErrorResult(server.RunServer(ss.Verbosity, ss.flags.laddr)) //always non-nil\n}", "func (self *IOR) Execute(frame *rtarea.Frame) {\n\tstack := frame.OperandStack()\n\tvalue1 := stack.PopInt()\n\tvalue2 := stack.PopInt()\n\tresult := value1 | value2\n\tstack.PushInt(result)\n}", "func (ins *StringIndex) Execute(_ *int, vm *VM) error {\n\tindex := number.Int64(number.NewNumber(vm.Get(ins.Index).Value))\n\n\t// TODO(elliot): This won't work with multibyte characters.\n\tvm.Set(ins.Result, asttest.NewLiteralChar([]rune(vm.Get(ins.Str).Value)[index]))\n\n\treturn nil\n}", "func (b *basic) Execute(root *ecsgen.Root) error {\n\tkeys := []string{}\n\n\t// enumerate through for all implied objects\n\t// and sort them so the generation is deterministic\n\tfor p, node := range root.Index {\n\t\tif node.IsObject() {\n\t\t\tkeys = append(keys, p)\n\t\t}\n\t}\n\n\tsort.Strings(keys)\n\n\t// Create a buffer to write the source code to as we generate it\n\t// Using a bytes.Buffer over a strings.Builder because the go/parser\n\t// uses []byte in the parser.ParseFile function to parse sourcecode.\n\tbuf := new(bytes.Buffer)\n\n\t// Add the generated comment and the package definition\n\tbuf.WriteString(\"// Code generated by ecsgen; DO NOT EDIT.\\n\")\n\tbuf.WriteString(fmt.Sprintf(\"package %s\\n\\n\", b.PackageName))\n\n\t// Add the top level Base type definition at the top of the file\n\tbaseDef, err := b.CreateBase(root)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error generating Base type definition: %v\", err)\n\t}\n\n\tbuf.WriteString(baseDef)\n\tbuf.WriteString(\"\\n\")\n\n\t// Enumerate through all the objects, sorted by name alphabetically\n\t// and add their type definitions to the buffer\n\tfor _, k := range keys {\n\t\tobj := root.Branch(k)\n\t\tcode, err := b.ToGoCode(obj)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error generating go code for %s: %v\", k, err)\n\t\t}\n\t\tbuf.WriteString(code)\n\t}\n\n\t// Create a new fileset and parse the generated Go code\n\t// this should catch any compile-time syntax errors we might have\n\tfs := token.NewFileSet()\n\tastFile, err := parser.ParseFile(fs, b.Filename, buf.Bytes(), parser.ParseComments)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error parsing generated go code: %v\", err)\n\t}\n\n\t// Format the Go code - this step is redundant, because the imports.Process\n\t// call below will also \"pretty print\", but I prefer to do it because\n\t// I'd rather have the formatted code have be validated by parser.ParseFile\n\t// first, before trying to format it.\n\tdstBuf := new(bytes.Buffer)\n\terr = format.Node(dstBuf, fs, astFile)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error formatting generated go code: %v\", err)\n\t}\n\n\t// Now we will handle the imports\n\timported, err := imports.Process(b.Filename, dstBuf.Bytes(), nil)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error adding imports to generated go code: %v\", err)\n\t}\n\n\t// Now write the resulting Go code to a file\n\terr = ioutil.WriteFile(filepath.Join(b.OutputDir, b.Filename), imported, 0644)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error writing go code to file: %v\", err)\n\t}\n\n\treturn nil\n}", "func (_SimpleMultiSig *SimpleMultiSigTransactor) Execute(opts *bind.TransactOpts, bucketIdx uint16, expireTime *big.Int, sigV []uint8, sigR [][32]byte, sigS [][32]byte, destination common.Address, value *big.Int, data []byte, executor common.Address, gasLimit *big.Int) (*types.Transaction, error) {\n\treturn _SimpleMultiSig.contract.Transact(opts, \"execute\", bucketIdx, expireTime, sigV, sigR, sigS, destination, value, data, executor, gasLimit)\n}", "func (app *application) Execute(script linkers.Script) (middle.Program, error) {\n\tlangRef := script.Language()\n\tlang := langRef.Language()\n\tlangApp := lang.Application()\n\tinVariable := langRef.Input()\n\toutVariable := langRef.Output()\n\tcode := script.Code()\n\n\tcodeValue, err := app.computableBuilder.Create().WithString(code).Now()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tinput := map[string]computable.Value{\n\t\tinVariable: codeValue,\n\t}\n\n\tlinkedProgram, err := app.programBuilder.Create().WithApplication(langApp).Now()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tinterpreter, err := app.interpreterBuilder.Create().WithProgram(linkedProgram).Now()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif !interpreter.IsApplication() {\n\t\treturn nil, errors.New(\"the interpreter was expected to be an application interpreter\")\n\t}\n\n\tstackFrame, err := interpreter.Application().Execute(input)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcomputedCodeValue, err := stackFrame.Current().Fetch(outVariable)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif !computedCodeValue.IsString() {\n\t\tstr := fmt.Sprintf(\"the output variable (%s) was expected to contain code and therefore be a string\", outVariable)\n\t\treturn nil, errors.New(str)\n\t}\n\n\tpOutputCode := computedCodeValue.String()\n\tprogramIns, err := app.parser.ExecuteScript(*pOutputCode)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif parsedProgram, ok := programIns.(parsers.Program); ok {\n\t\treturn app.middleAdapter.ToProgram(parsedProgram)\n\t}\n\n\treturn nil, errors.New(\"the parsed compiled output was expected to contain a parsers.Program instance\")\n}", "func (s *Set) Execute(vcursor VCursor, bindVars map[string]*querypb.BindVariable, wantfields bool) (*sqltypes.Result, error) {\n\tfor _, setOp := range s.Ops {\n\t\terr := setOp.Execute(vcursor, bindVars)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn &sqltypes.Result{}, nil\n}", "func (expr *ExprShl) Type() types.Type {\n\treturn expr.X.Type()\n}", "func (cli *SeesawCLI) Execute(cmdline string) error {\n\tcmd, subcmds, _, args := FindCommand(cmdline)\n\tif cmd != nil {\n\t\treturn cmd.function(cli, args)\n\t}\n\tif subcmds != nil {\n\t\treturn errors.New(\"Incomplete command.\")\n\t}\n\treturn errors.New(\"Unknown command.\")\n}", "func (s *SpecFile) Execute(args []string) error {\n\tinput, err := loadSpec(string(s.Input))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tswspec, err := scan.Application(s.BasePath, input, nil, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn writeToFile(swspec, string(s.Output))\n}", "func (s *Set) StreamExecute(vcursor VCursor, bindVars map[string]*querypb.BindVariable, wantields bool, callback func(*sqltypes.Result) error) error {\n\tpanic(\"implement me\")\n}", "func (*FunctionLike) TypeAsm() byte {\n\tpanic(\"interpreter.types.Functionlike.TypeAsm: cannot make a function into a literal\")\n}", "func (d *Device) Execute(op string, payload string) (result ExecuteResult, err *dbus.Error) {\n\td.logger.Print(\"Device.Execute() not implemented\")\n\treturn result, err\n}", "func (_e *handler_Expecter) Execute(req interface{}, s interface{}) *handler_Execute_Call {\n\treturn &handler_Execute_Call{Call: _e.mock.On(\"Execute\", req, s)}\n}", "func (h *Handler) Execute(name string, args []string) {\n\tlog.Warn(\"generic doesn't support command execution\")\n}", "func (sb *ServerChangeBean) Execute(stringArgs []string, env *map[string]interface{}) error{\n\tif len(stringArgs) != 7 {\n\t\treturn fmt.Errorf(\"arguement error\")\n\t}\n\titerId, _ := strconv.Atoi(stringArgs[4])\n\tst, _ := strconv.Atoi(stringArgs[5])\n\tserverType := db.ServerType(st)\n\treturn sb.change(stringArgs[0], stringArgs[1], stringArgs[2], stringArgs[3], int64(iterId), serverType, env)\n}", "func Execute(a *Action) error {\n\tseen := make(map[*Action]error)\n\treturn execute(seen, a)\n}", "func (ins *ArrayGet) Execute(registers map[string]*ast.Literal, _ *int, _ *VM) error {\n\tindex := number.Int64(number.NewNumber(registers[ins.Index].Value))\n\tregisters[ins.Result] = registers[ins.Array].Array[index]\n\n\treturn nil\n}", "func (reflectFunction) TypeAsm() byte {\n\treturn 6\n}", "func (tmpl *Template) Execute(data interface{}) (string, error) {\n\ttmpl.setVars(data)\n\n\tvar buf bytes.Buffer\n\tif err := tmpl.template.Execute(&buf, nil); err != nil {\n\t\treturn \"\", fmt.Errorf(\"execute template: %w\", err)\n\t}\n\n\treturn buf.String(), nil\n}", "func (e SetoptionElem) Execute(o *Options) error {\n\treturn o.ExecuteSetOption(fmt.Sprintf(\"name %s value %s\", e.Name, e.StrVal))\n}", "func (settings SetScriptSettings) Execute(sessionState *session.State,\n\tactionState *action.State, connectionSettings *connection.ConnectionSettings, label string, reset func()) {\n\n\tif sessionState.Connection == nil || sessionState.Connection.Sense() == nil {\n\t\tactionState.AddErrors(errors.New(\"Not connected to a Sense environment\"))\n\t\treturn\n\t}\n\tconnection := sessionState.Connection.Sense()\n\n\tapp := connection.CurrentApp\n\tif app == nil {\n\t\tactionState.AddErrors(errors.New(\"Not connected to a Sense app\"))\n\t\treturn\n\t}\n\n\tdoSet := func(ctx context.Context) error {\n\t\terr := app.Doc.SetScript(ctx, settings.Script)\n\t\treturn err\n\t}\n\tif err := sessionState.SendRequest(actionState, doSet); err != nil {\n\t\tactionState.AddErrors(errors.Wrap(err, \"failed to set script\"))\n\t\treturn\n\t}\n\n\tif err := sessionState.SendRequest(actionState, func(ctx context.Context) error { return app.Doc.DoSave(ctx, \"\") }); err != nil {\n\t\tactionState.AddErrors(errors.Wrap(err, \"failed to save app\"))\n\t\treturn\n\t}\n\n\tsessionState.Wait(actionState)\n}", "func (e *Engine) Execute(_ context.Context, _ string, _ *enginetypes.ExecConfig) (execID string, stdout io.ReadCloser, stderr io.ReadCloser, writer io.WriteCloser, err error) {\n\terr = types.ErrEngineNotImplemented\n\treturn\n}", "func (t *tpl) Execute(template string) string {\n\treturn ft.ExecuteFuncString(template, t.startTag, t.endTag, t.tagFunc)\n}", "func (state *State) Run(script *Script, code *Value) (ret *Value, err error) {\n\tscript.Host = state\n\n\terr = nil\n\tdefer state.trapErrorRuntime(script, &err, script.ClearMost)\n\t\n\tif code.Type != TypCode {\n\t\tRaiseError(\"Attempt to run non-executable Value.\")\n\t}\n\tblock := code.Data.(*Code)\n\t\n\tscript.Locals.Add(state, block)\n\tscript.Exec(block)\n\tret = script.RetVal\n\tscript.Locals.Remove()\n\treturn\n}", "func (s *StatementExecutor) ExecuteStatement(stmt influxql.Statement) *influxql.Result {\n\tswitch stmt := stmt.(type) {\n\tcase *influxql.ShowStatsStatement:\n\t\treturn s.executeShowStatistics()\n\tcase *influxql.ShowDiagnosticsStatement:\n\t\treturn s.executeShowDiagnostics()\n\tdefault:\n\t\tpanic(fmt.Sprintf(\"unsupported statement type: %T\", stmt))\n\t}\n}", "func (sc *systemCommand) Execute(name string, arg ...string) (string, error) {\n\tcmdOutput, err := exec.Command(name, arg...).Output()\n\tif err != nil {\n\t\treturn emptyString, err\n\t}\n\toutputString := string(cmdOutput)\n\treturn outputString, nil\n}", "func (s *Script) Type(typ string) *Script {\n\ts.typ = typ\n\treturn s\n}", "func (h *handler) Exec(host core.Host, method uint8, args scale.Encodable) error {\n\tif method != core.MethodSpend {\n\t\treturn fmt.Errorf(\"%w: unknown method %d\", core.ErrMalformed, method)\n\t}\n\tspend := args.(*SpendArguments)\n\treturn host.Template().(*Vault).Spend(host, spend.Destination, spend.Amount)\n}", "func (opcode Print) Execute() {\n\tfmt.Println(\"Execute Print\")\n}", "func (atu *ActivityTypeUpdate) Exec(ctx context.Context) error {\n\t_, err := atu.Save(ctx)\n\treturn err\n}", "func (self *SWAP) Execute(frame *rtdata.Frame) {\n\tstack := frame.OperandStack()\n\tslot1 := stack.PopSlot()\n\tslot2 := stack.PopSlot()\n\tstack.PushSlot(slot1)\n\tstack.PushSlot(slot2)\n}", "func (sc gloomList) Execute(i *Interpreter) error {\n\tfmt.Printf(\"Stack: %v\\n\", i.Stack)\n\n\t// Count the number of arguments in the list\n\tnumArgs, err := sc.countArgs()\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Printf(\"NumArgs = %d\\n\", numArgs)\n\n\t// Extract all arguments from the stack\n\targs := make([]evaluable, numArgs)\n\tfor count := 0; count < numArgs; count++ {\n\t\tval, err := i.Stack.Pop()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\targs[count] = val\n\t}\n\tfmt.Printf(\"Args = %v\\n\", args)\n\n\t// Replace the arguments in the list with the popped items\n\tevalElems := make([]evaluable, len(sc.Elems))\n\tfor idx, elem := range sc.Elems {\n\t\tif v, ok := sc.Elems[idx].(argument); ok {\n\t\t\tevalElems[idx] = args[int(v)-1]\n\t\t} else {\n\t\t\tevalElems[idx] = elem\n\t\t}\n\t}\n\n\t// Evaluate the individual elements\n\tfor _, node := range evalElems {\n\t\terr := node.eval(i)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "func (o UnknownOp) Execute(machine *system.VirtualMachine) {\n\tpanic(o.String())\n}", "func Execute(\n\tctx context.Context,\n\tpayload gapir.Payload,\n\thandlePost builder.PostDataHandler,\n\thandleNotification builder.NotificationHandler,\n\tconnection *gapir.Connection,\n\tmemoryLayout *device.MemoryLayout,\n\tos *device.OS) error {\n\n\tctx = status.Start(ctx, \"Execute\")\n\tdefer status.Finish(ctx)\n\n\t// The memoryLayout is specific to the ABI of the requested capture,\n\t// while the OS is not. Thus a device.Configuration is not applicable here.\n\treturn executor{\n\t\tpayload: payload,\n\t\thandlePost: handlePost,\n\t\thandleNotification: handleNotification,\n\t\tmemoryLayout: memoryLayout,\n\t\tOS: os,\n\t}.execute(ctx, connection)\n}", "func (_SimpleMultiSig *SimpleMultiSigSession) Execute(bucketIdx uint16, expireTime *big.Int, sigV []uint8, sigR [][32]byte, sigS [][32]byte, destination common.Address, value *big.Int, data []byte, executor common.Address, gasLimit *big.Int) (*types.Transaction, error) {\n\treturn _SimpleMultiSig.Contract.Execute(&_SimpleMultiSig.TransactOpts, bucketIdx, expireTime, sigV, sigR, sigS, destination, value, data, executor, gasLimit)\n}", "func (a *DefaultApiService) ShowSourceTypeExecute(r ApiShowSourceTypeRequest) (SourceType, *_nethttp.Response, GenericOpenAPIError) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\texecutionError GenericOpenAPIError\n\t\tlocalVarReturnValue SourceType\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"DefaultApiService.ShowSourceType\")\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarPath := localBasePath + \"/source_types/{id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"id\"+\"}\", _neturl.PathEscape(parameterToString(r.id, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, nil, executionError\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = _ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\texecutionError.error = err.Error()\n\t\treturn localVarReturnValue, localVarHTTPResponse, executionError\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v ErrorNotFound\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, executionError\n}", "func Execute() {\n\tmainCmd.Execute()\n}", "func (s *fnSignature) Execute(ctx context.Context) ([]reflect.Value, error) {\n\tglobalBackendStatsClient().TaskExecutionCount().Inc(1)\n\ttargetArgs := make([]reflect.Value, 0, len(s.Args)+1)\n\ttargetArgs = append(targetArgs, reflect.ValueOf(ctx))\n\tfor _, arg := range s.Args {\n\t\ttargetArgs = append(targetArgs, reflect.ValueOf(arg))\n\t}\n\tif fn, ok := fnLookup.getFn(s.FnName); ok {\n\t\tfnValue := reflect.ValueOf(fn)\n\t\treturn fnValue.Call(targetArgs), nil\n\t}\n\treturn nil, fmt.Errorf(\"function: %q not found. Did you forget to register?\", s.FnName)\n}", "func (h StmtHandle) Exec(ctx context.Context, args ...interface{}) (pgx.CommandTag, error) {\n\th.check()\n\tp := h.s.sr.mcp.Get()\n\tswitch h.s.sr.method {\n\tcase prepare:\n\t\treturn p.ExecEx(ctx, h.s.prepared.Name, nil /* options */, args...)\n\n\tcase noprepare:\n\t\treturn p.ExecEx(ctx, h.s.sql, nil /* options */, args...)\n\n\tcase simple:\n\t\treturn p.ExecEx(ctx, h.s.sql, simpleProtocolOpt, args...)\n\n\tdefault:\n\t\tpanic(\"invalid method\")\n\t}\n}", "func (vk VK) Execute(Code string) (response []byte, vkErr Error) {\n\tp := make(map[string]string)\n\tp[\"code\"] = Code\n\tresponse, vkErr = vk.Request(\"execute\", p)\n\n\treturn\n}", "func (ins *ArrayAlloc) Execute(_ *int, vm *VM) error {\n\tsize := number.Int64(number.NewNumber(vm.Get(ins.Size).Value))\n\tkind := vm.Types[ins.Kind]\n\n\tvm.Set(ins.Result, &ast.Literal{\n\t\tKind: kind,\n\t\tArray: make([]*ast.Literal, size),\n\t})\n\n\treturn nil\n}", "func (_SimpleMultiSig *SimpleMultiSigTransactorSession) Execute(bucketIdx uint16, expireTime *big.Int, sigV []uint8, sigR [][32]byte, sigS [][32]byte, destination common.Address, value *big.Int, data []byte, executor common.Address, gasLimit *big.Int) (*types.Transaction, error) {\n\treturn _SimpleMultiSig.Contract.Execute(&_SimpleMultiSig.TransactOpts, bucketIdx, expireTime, sigV, sigR, sigS, destination, value, data, executor, gasLimit)\n}", "func (execution *Execution) GetType() (execType string) {\n\tswitch strings.ToLower(execution.Type) {\n\tcase \"\":\n\t\tfallthrough\n\tcase \"local\":\n\t\texecType = \"local\"\n\tcase \"remote\":\n\t\texecType = \"remote\"\n\tdefault:\n\t\tpanic(execution)\n\t}\n\n\treturn\n}", "func (cmd *storageScanCmd) Execute(args []string) error {\n\tout, err := scanCmdDisplay(cmd.conns.StorageScan(nil), !cmd.Verbose)\n\tif err != nil {\n\t\treturn err\n\t}\n\tcmd.log.Info(out)\n\n\treturn nil\n}", "func ExecuteSingularity() {\n\tif cmd, err := SingularityCmd.ExecuteC(); err != nil {\n\t\tif str := err.Error(); strings.Contains(str, \"unknown flag: \") {\n\t\t\tflag := strings.TrimPrefix(str, \"unknown flag: \")\n\t\t\tSingularityCmd.Printf(\"Invalid flag %q for command %q.\\n\\nOptions:\\n\\n%s\\n\",\n\t\t\t\tflag,\n\t\t\t\tcmd.Name(),\n\t\t\t\tcmd.Flags().FlagUsagesWrapped(getColumns()))\n\t\t} else {\n\t\t\tSingularityCmd.Println(cmd.UsageString())\n\t\t}\n\t\tSingularityCmd.Printf(\"Run '%s --help' for more detailed usage information.\\n\",\n\t\t\tcmd.CommandPath())\n\t\tos.Exit(1)\n\t}\n}", "func (inst *InstSDiv) Type() types.Type {\n\t// Cache type if not present.\n\tif inst.Typ == nil {\n\t\tinst.Typ = inst.X.Type()\n\t}\n\treturn inst.Typ\n}", "func (s Status) Execute() (stdOut string, stdErr string, err error) {\n\tvar cmdOut []byte\n\terr = nil\n\tcmdArgs := []string{\"status\"}\n\tcmdOut, err = exec.Command(cmdName, cmdArgs...).Output()\n\t// FIXME: cant get correct error output\n\tif err != nil {\n\t\tstdErr = err.Error()\n\t}\n\t// TODO: get return code?\n\treturn string(cmdOut), stdErr, err\n}", "func (o LoadRegistersOp) Execute(vm *system.VirtualMachine) {\n\tfor i := byte(0); i <= o.topRegister; i++ {\n\t\tvm.Registers[i] = vm.Memory[vm.IndexRegister+uint16(i)]\n\t}\n}", "func Execute() error {\n\treturn cmd.Execute()\n}", "func (s *server) Execute(args ExecuteArgs, resp *string) error {\n\tr, err := s.impl.Execute(args)\n\t*resp = r\n\treturn err\n}", "func (tpl *Template) Execute(wr io.Writer, data interface{}) error {\n\treturn tpl.Run(wr, data)\n}", "func (command *SpecCommand) Execute() error {\n\tlog.Debug(\"Generating RAML specification\")\n\treturn nil\n}", "func (e *StatementExecutor) ExecuteStatement(stmt influxql.Statement) *influxql.Result {\n\tswitch stmt := stmt.(type) {\n\tcase *influxql.CreateDatabaseStatement:\n\t\treturn e.executeCreateDatabaseStatement(stmt)\n\tcase *influxql.DropDatabaseStatement:\n\t\treturn e.executeDropDatabaseStatement(stmt)\n\tcase *influxql.ShowDatabasesStatement:\n\t\treturn e.executeShowDatabasesStatement(stmt)\n\tcase *influxql.ShowGrantsForUserStatement:\n\t\treturn e.executeShowGrantsForUserStatement(stmt)\n\tcase *influxql.ShowServersStatement:\n\t\treturn e.executeShowServersStatement(stmt)\n\tcase *influxql.CreateUserStatement:\n\t\treturn e.executeCreateUserStatement(stmt)\n\tcase *influxql.SetPasswordUserStatement:\n\t\treturn e.executeSetPasswordUserStatement(stmt)\n\tcase *influxql.DropUserStatement:\n\t\treturn e.executeDropUserStatement(stmt)\n\tcase *influxql.ShowUsersStatement:\n\t\treturn e.executeShowUsersStatement(stmt)\n\tcase *influxql.GrantStatement:\n\t\treturn e.executeGrantStatement(stmt)\n\tcase *influxql.GrantAdminStatement:\n\t\treturn e.executeGrantAdminStatement(stmt)\n\tcase *influxql.RevokeStatement:\n\t\treturn e.executeRevokeStatement(stmt)\n\tcase *influxql.RevokeAdminStatement:\n\t\treturn e.executeRevokeAdminStatement(stmt)\n\tcase *influxql.CreateRetentionPolicyStatement:\n\t\treturn e.executeCreateRetentionPolicyStatement(stmt)\n\tcase *influxql.AlterRetentionPolicyStatement:\n\t\treturn e.executeAlterRetentionPolicyStatement(stmt)\n\tcase *influxql.DropRetentionPolicyStatement:\n\t\treturn e.executeDropRetentionPolicyStatement(stmt)\n\tcase *influxql.ShowRetentionPoliciesStatement:\n\t\treturn e.executeShowRetentionPoliciesStatement(stmt)\n\tcase *influxql.CreateContinuousQueryStatement:\n\t\treturn e.executeCreateContinuousQueryStatement(stmt)\n\tcase *influxql.DropContinuousQueryStatement:\n\t\treturn e.executeDropContinuousQueryStatement(stmt)\n\tcase *influxql.ShowContinuousQueriesStatement:\n\t\treturn e.executeShowContinuousQueriesStatement(stmt)\n\tcase *influxql.ShowStatsStatement:\n\t\treturn e.executeShowStatsStatement(stmt)\n\tdefault:\n\t\tpanic(fmt.Sprintf(\"unsupported statement type: %T\", stmt))\n\t}\n}", "func (e *varnishExecuter) Execute(command string, args []string) ([]byte, error) {\n\treturn exec.Command(command, args...).Output()\n}", "func (self *LOR) Execute(frame *rtarea.Frame) {\n\tstack := frame.OperandStack()\n\tvalue1 := stack.PopLong()\n\tvalue2 := stack.PopLong()\n\tresult := value1 | value2\n\tstack.PushLong(result)\n}", "func (u *UserDefinedVariable) Execute(vcursor VCursor, bindVars map[string]*querypb.BindVariable) error {\n\tvalue, err := u.PlanValue.ResolveValue(bindVars)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn vcursor.SetUDV(u.Name, value)\n}", "func (eptu *EquipmentPortTypeUpdate) Exec(ctx context.Context) error {\n\t_, err := eptu.Save(ctx)\n\treturn err\n}", "func (eptu *EquipmentPortTypeUpdate) Exec(ctx context.Context) error {\n\t_, err := eptu.Save(ctx)\n\treturn err\n}", "func (svc *CommandInput) Type(typ models.CommandInputTypes) *CommandInput {\n\tsvc.typ = typ\n\treturn svc\n}", "func resetType(inst value.Value) {\n\tswitch inst := inst.(type) {\n\t// Unary instructions\n\tcase *ir.InstFNeg:\n\t\tinst.Typ = nil\n\t// Binary instructions\n\tcase *ir.InstAdd:\n\t\tinst.Typ = nil\n\tcase *ir.InstFAdd:\n\t\tinst.Typ = nil\n\tcase *ir.InstSub:\n\t\tinst.Typ = nil\n\tcase *ir.InstFSub:\n\t\tinst.Typ = nil\n\tcase *ir.InstMul:\n\t\tinst.Typ = nil\n\tcase *ir.InstFMul:\n\t\tinst.Typ = nil\n\tcase *ir.InstUDiv:\n\t\tinst.Typ = nil\n\tcase *ir.InstSDiv:\n\t\tinst.Typ = nil\n\tcase *ir.InstFDiv:\n\t\tinst.Typ = nil\n\tcase *ir.InstURem:\n\t\tinst.Typ = nil\n\tcase *ir.InstSRem:\n\t\tinst.Typ = nil\n\tcase *ir.InstFRem:\n\t\tinst.Typ = nil\n\t// Bitwise instructions\n\tcase *ir.InstShl:\n\t\tinst.Typ = nil\n\tcase *ir.InstLShr:\n\t\tinst.Typ = nil\n\tcase *ir.InstAShr:\n\t\tinst.Typ = nil\n\tcase *ir.InstAnd:\n\t\tinst.Typ = nil\n\tcase *ir.InstOr:\n\t\tinst.Typ = nil\n\tcase *ir.InstXor:\n\t\tinst.Typ = nil\n\t// Vector instructions\n\tcase *ir.InstExtractElement:\n\t\tinst.Typ = nil\n\tcase *ir.InstInsertElement:\n\t\tinst.Typ = nil\n\tcase *ir.InstShuffleVector:\n\t\tinst.Typ = nil\n\t// Aggregate instructions\n\tcase *ir.InstExtractValue:\n\t\tinst.Typ = nil\n\tcase *ir.InstInsertValue:\n\t\tinst.Typ = nil\n\t// Memory instructions\n\tcase *ir.InstAlloca:\n\t\tinst.Typ = nil\n\tcase *ir.InstLoad:\n\t\t// type not cached.\n\tcase *ir.InstCmpXchg:\n\t\tinst.Typ = nil\n\tcase *ir.InstAtomicRMW:\n\t\tinst.Typ = nil\n\tcase *ir.InstGetElementPtr:\n\t\tinst.Typ = nil\n\t// Conversion instructions\n\tcase *ir.InstTrunc:\n\t\t// type not cached.\n\tcase *ir.InstZExt:\n\t\t// type not cached.\n\tcase *ir.InstSExt:\n\t\t// type not cached.\n\tcase *ir.InstFPTrunc:\n\t\t// type not cached.\n\tcase *ir.InstFPExt:\n\t\t// type not cached.\n\tcase *ir.InstFPToUI:\n\t\t// type not cached.\n\tcase *ir.InstFPToSI:\n\t\t// type not cached.\n\tcase *ir.InstUIToFP:\n\t\t// type not cached.\n\tcase *ir.InstSIToFP:\n\t\t// type not cached.\n\tcase *ir.InstPtrToInt:\n\t\t// type not cached.\n\tcase *ir.InstIntToPtr:\n\t\t// type not cached.\n\tcase *ir.InstBitCast:\n\t\t// type not cached.\n\tcase *ir.InstAddrSpaceCast:\n\t\t// type not cached.\n\t// Other instructions\n\tcase *ir.InstICmp:\n\t\tinst.Typ = nil\n\tcase *ir.InstFCmp:\n\t\tinst.Typ = nil\n\tcase *ir.InstPhi:\n\t\tinst.Typ = nil\n\tcase *ir.InstSelect:\n\t\tinst.Typ = nil\n\tcase *ir.InstCall:\n\t\tinst.Typ = nil\n\tcase *ir.InstVAArg:\n\t\t// type not cached.\n\tcase *ir.InstLandingPad:\n\t\t// type not cached.\n\tcase *ir.InstCatchPad:\n\t\t// type not cached.\n\tcase *ir.InstCleanupPad:\n\t\t// type not cached.\n\tdefault:\n\t\tpanic(fmt.Errorf(\"support for instruction type %T not yet implemented\", inst))\n\t}\n}", "func (c *Chip8) Execute() {\n\tc.Decode()\n\tfmt.Println(c.ToString())\n\tif c.inst == 0x0 {\n\t\tos.Exit(0)\n\t}\n\ttop := topNibble(c.inst)\n\tx := c.GetXReg()\n\ty := c.GetYReg()\n\tswitch top {\n\tcase 0x0:\n\t\tswitch bottomNibble(c.inst) {\n\t\t// CLR\n\t\tcase 0x0:\n\t\t\tfmt.Println(\"clear screen\")\n\t\t// RET\n\t\tcase 0xE:\n\t\t\tfmt.Println(\"ret\")\n\t\t}\n\t\tc.IncPC()\n\t// JUMP\n\tcase 0x1:\n\t\tc.SetPC(targetAddr(c.inst))\n\t// CALL\n\tcase 0x2:\n\t\tc.SetPC(targetAddr(c.inst))\n\t// SKE\n\tcase 0x3:\n\t\timm := c.GetImm(2)\n\t\tc.IncPC()\n\t\tif imm == c.v[x] {\n\t\t\tc.IncPC() // skip inst\n\t\t}\n\t// SKNE\n\tcase 0x4:\n\t\timm := c.GetImm(2)\n\t\tc.IncPC()\n\t\tif imm != c.v[x] {\n\t\t\tc.IncPC()\n\t\t}\n\t// SKRE\n\tcase 0x5:\n\t\tc.IncPC()\n\t\tif c.v[x] == c.v[y] {\n\t\t\tc.IncPC()\n\t\t}\n\t// LOAD\n\tcase 0x6:\n\t\timm := c.GetImm(2)\n\t\tc.v[x] = imm\n\t\tc.IncPC()\n\t// ADD\n\tcase 0x7:\n\t\timm := c.GetImm(2)\n\t\tc.v[x] += imm\n\t\tc.IncPC()\n\t// OR | AND | XOR | ADDR | SUB | SHR | SHL\n\tcase 0x8:\n\t\tc.Math8()\n\t\tc.IncPC()\n\t// SKNRE\n\tcase 0x9:\n\t\tc.IncPC()\n\t\tif c.v[x] != c.v[y] {\n\t\t\tc.IncPC()\n\t\t}\n\t// LOADI\n\tcase 0xA:\n\t\tc.SetIndex()\n\t\tc.IncPC()\n\tcase 0xF:\n\t\tbottom := bottomByte(c.inst)\n\t\tswitch bottom {\n\t\t// STOR\n\t\tcase 0x55:\n\t\t\tc.memory[c.index] = c.v[x]\n\t\t\tc.IncPC()\n\t\t// READ\n\t\tcase 0x65:\n\t\t\tc.v[x] = c.memory[c.index]\n\t\t\tc.IncPC()\n\t\t}\n\n\t}\n\n}", "func (*Execute) Frontend() {}", "func (f *FunctionExpression) Execute(ctx *Context, args *Values) Value {\n\tf.params.BindArguments(ctx, args.values...)\n\tf.body.Execute(ctx)\n\tif ctx.hasret {\n\t\treturn ctx.retval\n\t}\n\treturn ValueFromNil()\n}", "func (sc *StatusCommand) Execute(args []string) error {\n\tctlCommand.status(ctlCommand.createRPCClient(), args)\n\treturn nil\n}", "func (templateManager *TemplateManager) Execute(templateName string, writer io.Writer, data interface{}) (err error) {\n\ttpl, err := templateManager.GetTemplate(templateName)\n\n\tif err == nil {\n\t\terr = tpl.Execute(writer, data)\n\t}\n\treturn\n}", "func (self *ILOAD) Execute(frame *runtime.Frame) {\n\t_iload(frame, uint(self.Index))\n}", "func (_BaseAccessWallet *BaseAccessWalletTransactor) Execute(opts *bind.TransactOpts, _guarantor common.Address, _v uint8, _r [32]byte, _s [32]byte, _dest common.Address, _value *big.Int, _ts *big.Int) (*types.Transaction, error) {\n\treturn _BaseAccessWallet.contract.Transact(opts, \"execute\", _guarantor, _v, _r, _s, _dest, _value, _ts)\n}", "func Execute(contents []byte, process int, httpAddr string, store fsm.Store) bool {\n done := make(chan bool)\n switch process {\n case 0:\n go executeLang(contents, done, httpAddr, store)\n case 1:\n go executeYaml(string(contents), done, httpAddr, store)\n }\n return <-done\n}", "func (tu *TypetreatmentUpdate) ExecX(ctx context.Context) {\n\tif err := tu.Exec(ctx); err != nil {\n\t\tpanic(err)\n\t}\n}", "func Execute(anyType Executable, command string) ([]reflect.Value, error) {\n\tcommandSplit := strings.Split(command, \" \")\n\tcommandName := commandSplit[0]\n\tcommandArgs := commandSplit[1:]\n\n\tmethod := reflect.ValueOf(anyType).MethodByName(strings.Title(commandName))\n\tif !method.IsValid() {\n\t\terrorMessage := commandName + \" is not a valid action\"\n\t\treturn []reflect.Value{},\n\t\t\terrors.New(errorMessage)\n\t}\n\texpectedArgsCnt := method.Type().NumIn()\n\tgivenArgsCnt := len(commandArgs)\n\tif givenArgsCnt != expectedArgsCnt {\n\t\terrorMessage := fmt.Sprintf(\n\t\t\t\"wrong number of arguments passed to %s, expected %d, got %d\",\n\t\t\tcommandName, expectedArgsCnt, givenArgsCnt)\n\t\treturn []reflect.Value{}, errors.New(errorMessage)\n\t}\n\n\tmethodArgs := make([]reflect.Value, givenArgsCnt)\n\tfor idx, _ := range commandArgs {\n\t\tmethodArgs[idx] = reflect.ValueOf(commandArgs[idx])\n\t}\n\n\treturn method.Call(methodArgs), nil\n}", "func Execute(script []byte, starting [][]byte) {\n\t// TODO: Check for CHECKSIGS and complain.\n\tmsgTx := NewMsgTx(1)\n\tmsgTx.AddTxOut(&TxOut{\n\t\tValue: 0,\n\t\tPkScript: script\n\t})\n\tmsgTx.LockTime = 0\n\n\treturn txscript.NewEngine(script, msgTx, 0, nil, nil, 1).Execute()\n}", "func Execute(t *template.Template, data interface{}) (string, error) {\n\tvar b bytes.Buffer\n\tif err := t.Execute(&b, data); err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn b.String(), nil\n}" ]
[ "0.61311996", "0.6051716", "0.5811697", "0.58088446", "0.57947206", "0.56657565", "0.5660786", "0.5624602", "0.5615025", "0.5567811", "0.5555589", "0.55393714", "0.55195254", "0.54964864", "0.5495361", "0.5488454", "0.54460466", "0.5422011", "0.5412693", "0.5405947", "0.5361959", "0.5353715", "0.53341335", "0.5328992", "0.532622", "0.5311677", "0.52991253", "0.5294042", "0.5277062", "0.52633315", "0.5258109", "0.52524227", "0.5243764", "0.5241889", "0.5236897", "0.52216685", "0.5218002", "0.52136993", "0.52101755", "0.5201987", "0.5195896", "0.5181968", "0.5171171", "0.5170594", "0.5170486", "0.5165986", "0.51656604", "0.51632184", "0.51516753", "0.51452243", "0.5138843", "0.5132585", "0.51253533", "0.5124918", "0.5124855", "0.5116624", "0.5099285", "0.50977564", "0.509752", "0.509681", "0.50925636", "0.5090355", "0.50750095", "0.50696015", "0.5066443", "0.50635594", "0.50557077", "0.5042477", "0.50358766", "0.5026738", "0.50252753", "0.5024376", "0.5023099", "0.50199676", "0.5014961", "0.5014381", "0.50142026", "0.5006282", "0.5004106", "0.4988289", "0.49856335", "0.49845365", "0.49824274", "0.49808714", "0.49805397", "0.49805397", "0.4973588", "0.49692062", "0.49619526", "0.49519962", "0.4951317", "0.49507186", "0.4936544", "0.49346918", "0.49279982", "0.49249193", "0.49198323", "0.49158084", "0.49151444", "0.49134815" ]
0.66630864
0
buildPayload parses the information from the Payload of the job history entry
func (job *ScanCloseJob) buildPayload(pjson string) (err error) { if len(pjson) > 0 { job.Payload = &ScanClosePayload{} err = json.Unmarshal([]byte(pjson), job.Payload) } else { err = fmt.Errorf("empty json string passed to ScanCloseJob") } return err }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (s *SlcLogger) buildPayload(slackChannel, color, message string, titleParam []string) ([]byte, error) {\n\n\tvar title string\n\tif len(titleParam) == 0 {\n\t\ttitle = s.DefaultTitle\n\t} else {\n\t\ttitle = titleParam[0]\n\t}\n\n\ta := &attachment{Text: message, Title: title, Color: color}\n\tattachments := []attachment{*a}\n\n\treturn json.Marshal(payload{\n\t\tChannel: slackChannel,\n\t\tUserName: s.UserName,\n\t\tIconURL: s.IconURL,\n\t\tAttachments: attachments,\n\t})\n}", "func processPayloadBuildResponse(msg amqp.Delivery) {\n\tlogging.LogInfo(\"got message\", \"routingKey\", msg.RoutingKey)\n\tpayloadBuildResponse := PayloadBuildResponse{}\n\tif err := json.Unmarshal(msg.Body, &payloadBuildResponse); err != nil {\n\t\tlogging.LogError(err, \"Failed to process payload build response message\")\n\t} else {\n\t\t//logging.LogInfo(\"got build response\", \"buildMsg\", payloadBuildResponse)\n\t\tdatabasePayload := databaseStructs.Payload{}\n\t\tif err := database.DB.Get(&databasePayload, `SELECT \n\t\t\tpayload.build_message, payload.build_stderr, payload.build_stdout, payload.id, payload.build_phase,\n\t\t\tfilemeta.filename \"filemeta.filename\",\n\t\t\tfilemeta.id \"filemeta.id\"\n\t\t\tFROM payload \n\t\t\tJOIN filemeta ON payload.file_id = filemeta.id\n\t\t\tWHERE uuid=$1 \n\t\t\tLIMIT 1`, payloadBuildResponse.PayloadUUID); err != nil {\n\t\t\tlogging.LogError(err, \"Failed to get payload from the database\")\n\t\t} else {\n\t\t\tdatabasePayload.BuildMessage += payloadBuildResponse.BuildMessage\n\t\t\tdatabasePayload.BuildStderr += payloadBuildResponse.BuildStdErr\n\t\t\tdatabasePayload.BuildStdout += payloadBuildResponse.BuildStdOut\n\t\t\tif payloadBuildResponse.Success {\n\t\t\t\tdatabasePayload.BuildPhase = PAYLOAD_BUILD_STATUS_SUCCESS\n\t\t\t} else {\n\t\t\t\tdatabasePayload.BuildPhase = PAYLOAD_BUILD_STATUS_ERROR\n\t\t\t}\n\t\t\tif payloadBuildResponse.UpdatedFilename != nil {\n\t\t\t\tdatabasePayload.Filemeta.Filename = []byte(*payloadBuildResponse.UpdatedFilename)\n\t\t\t\tif _, err := database.DB.NamedExec(`UPDATE filemeta SET \n filename=:filename\n WHERE id=:id`, databasePayload.Filemeta); err != nil {\n\t\t\t\t\tlogging.LogError(err, \"Failed to update filename for payload\")\n\t\t\t\t}\n\t\t\t}\n\t\t\t/* Payload should be uploaded separately\n\t\t\tif payloadBuildResponse.Payload != nil && len(*payloadBuildResponse.Payload) > 0 {\n\t\t\t\tif err := os.WriteFile(databasePayload.Filemeta.Path, *payloadBuildResponse.Payload, 0600); err != nil {\n\t\t\t\t\tdatabasePayload.BuildStderr += \"\\nFailed to write file to disk\"\n\t\t\t\t\tlogging.LogError(err, \"Failed to write payload to disk\")\n\t\t\t\t} else {\n\t\t\t\t\tsha1Sum := sha1.Sum(*payloadBuildResponse.Payload)\n\t\t\t\t\tdatabasePayload.Filemeta.Sha1 = fmt.Sprintf(\"%x\", sha1Sum)\n\t\t\t\t\tmd5Sum := md5.Sum(*payloadBuildResponse.Payload)\n\t\t\t\t\tdatabasePayload.Filemeta.Md5 = fmt.Sprintf(\"%x\", md5Sum)\n\t\t\t\t\tdatabasePayload.Filemeta.ChunkSize = len(*payloadBuildResponse.Payload)\n\t\t\t\t\tdatabasePayload.Filemeta.TotalChunks = 1\n\t\t\t\t\tdatabasePayload.Filemeta.ChunksReceived = 1\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t*/\n\t\t\t// update the payload in the database\n\t\t\tif _, updateError := database.DB.NamedExec(`UPDATE payload SET \n\t\t\t\tbuild_phase=:build_phase, build_stderr=:build_stderr, build_message=:build_message, build_stdout=:build_stdout\n\t\t\t\tWHERE id=:id`, databasePayload,\n\t\t\t); updateError != nil {\n\t\t\t\tlogging.LogError(updateError, \"Failed to update payload's build status\")\n\t\t\t\treturn\n\t\t\t}\n\t\t\tdatabase.UpdateRemainingBuildSteps(databasePayload)\n\t\t\t/* Payload should be uploaded separately\n\t\t\tif databasePayload.BuildPhase == PAYLOAD_BUILD_STATUS_SUCCESS {\n\t\t\t\tif _, updateError := database.DB.NamedExec(`UPDATE filemeta SET\n\t\t\t\t\tsha1=:sha1, md5=:md5, chunk_size=:chunk_size, total_chunks=:total_chunks, chunks_received=:chunks_received\n\t\t\t\t\tWHERE id=:id`, databasePayload.Filemeta,\n\t\t\t\t); updateError != nil {\n\t\t\t\t\tlogging.LogError(updateError, \"Failed to update payload's file hashes\")\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t*/\n\t\t\tif databasePayload.BuildPhase == PAYLOAD_BUILD_STATUS_SUCCESS {\n\t\t\t\t// process the additional UpdatedCommands\n\t\t\t\tif err := updateLoadedCommandsFromPayloadBuild(databasePayload, payloadBuildResponse.UpdatedCommandList); err != nil {\n\t\t\t\t\tdatabase.UpdatePayloadWithError(databasePayload, err)\n\t\t\t\t\tdatabase.UpdateRemainingBuildSteps(databasePayload)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tlogging.LogDebug(\"Finished processing payload build response message\")\n\t}\n}", "func (v GithubVCS) ParsePayload(ctx context.Context, log *zap.SugaredLogger, eventType, triggerTarget, payload string) (*RunInfo, error) {\n\tvar runinfo RunInfo\n\tpayload = payloadFix(payload)\n\tevent, err := github.ParseWebHook(eventType, []byte(payloadFix(payload)))\n\tif err != nil {\n\t\treturn &runinfo, err\n\t}\n\terr = json.Unmarshal([]byte(payload), &event)\n\tif err != nil {\n\t\treturn &runinfo, err\n\t}\n\n\tswitch event := event.(type) {\n\tcase *github.CheckRunEvent:\n\t\tif triggerTarget == \"issue-recheck\" {\n\t\t\truninfo, err = v.handleReRequestEvent(ctx, log, event)\n\t\t\tif err != nil {\n\t\t\t\treturn &runinfo, err\n\t\t\t}\n\t\t}\n\tcase *github.IssueCommentEvent:\n\t\truninfo, err = v.handleIssueCommentEvent(ctx, log, event)\n\t\tif err != nil {\n\t\t\treturn &runinfo, err\n\t\t}\n\tcase *github.PushEvent:\n\t\truninfo = RunInfo{\n\t\t\tOwner: event.GetRepo().GetOwner().GetLogin(),\n\t\t\tRepository: event.GetRepo().GetName(),\n\t\t\tDefaultBranch: event.GetRepo().GetDefaultBranch(),\n\t\t\tURL: event.GetRepo().GetHTMLURL(),\n\t\t\tSHA: event.GetHeadCommit().GetID(),\n\t\t\tSHAURL: event.GetHeadCommit().GetURL(),\n\t\t\tSHATitle: event.GetHeadCommit().GetMessage(),\n\t\t\tSender: event.GetSender().GetLogin(),\n\t\t\tBaseBranch: event.GetRef(),\n\t\t\tEventType: eventType,\n\t\t}\n\n\t\truninfo.HeadBranch = runinfo.BaseBranch // in push events Head Branch is the same as Basebranch\n\tcase *github.PullRequestEvent:\n\t\truninfo = RunInfo{\n\t\t\tOwner: event.GetRepo().Owner.GetLogin(),\n\t\t\tRepository: event.GetRepo().GetName(),\n\t\t\tDefaultBranch: event.GetRepo().GetDefaultBranch(),\n\t\t\tSHA: event.GetPullRequest().Head.GetSHA(),\n\t\t\tURL: event.GetRepo().GetHTMLURL(),\n\t\t\tBaseBranch: event.GetPullRequest().Base.GetRef(),\n\t\t\tHeadBranch: event.GetPullRequest().Head.GetRef(),\n\t\t\tSender: event.GetPullRequest().GetUser().GetLogin(),\n\t\t\tEventType: eventType,\n\t\t}\n\tdefault:\n\t\treturn &runinfo, errors.New(\"this event is not supported\")\n\t}\n\n\terr = v.populateCommitInfo(ctx, &runinfo)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\truninfo.Event = event\n\truninfo.TriggerTarget = triggerTarget\n\treturn &runinfo, nil\n}", "func BuildSubmitPayload(batchSubmitBody string) (*batch.SubmitPayload, error) {\n\tvar err error\n\tvar body SubmitRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(batchSubmitBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"completed_dir\\\": \\\"abc123\\\",\\n \\\"path\\\": \\\"abc123\\\",\\n \\\"pipeline\\\": \\\"abc123\\\",\\n \\\"process_name_metadata\\\": false,\\n \\\"processing_config\\\": \\\"abc123\\\",\\n \\\"reject_duplicates\\\": false,\\n \\\"retention_period\\\": \\\"abc123\\\",\\n \\\"transfer_type\\\": \\\"abc123\\\"\\n }'\")\n\t\t}\n\t}\n\tv := &batch.SubmitPayload{\n\t\tPath: body.Path,\n\t\tPipeline: body.Pipeline,\n\t\tProcessingConfig: body.ProcessingConfig,\n\t\tCompletedDir: body.CompletedDir,\n\t\tRetentionPeriod: body.RetentionPeriod,\n\t\tRejectDuplicates: body.RejectDuplicates,\n\t\tTransferType: body.TransferType,\n\t\tProcessNameMetadata: body.ProcessNameMetadata,\n\t}\n\t{\n\t\tvar zero bool\n\t\tif v.RejectDuplicates == zero {\n\t\t\tv.RejectDuplicates = false\n\t\t}\n\t}\n\t{\n\t\tvar zero bool\n\t\tif v.ProcessNameMetadata == zero {\n\t\t\tv.ProcessNameMetadata = false\n\t\t}\n\t}\n\n\treturn v, nil\n}", "func EventFromPayload(eventId int, data interface{}) *swf.HistoryEvent {\n\tevent := &swf.HistoryEvent{}\n\tevent.EventId = I(eventId)\n\tswitch t := data.(type) {\n\tcase *swf.ActivityTaskCancelRequestedEventAttributes:\n\t\tevent.ActivityTaskCancelRequestedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeActivityTaskCancelRequested)\n\tcase *swf.ActivityTaskCanceledEventAttributes:\n\t\tevent.ActivityTaskCanceledEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeActivityTaskCanceled)\n\tcase *swf.ActivityTaskCompletedEventAttributes:\n\t\tevent.ActivityTaskCompletedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeActivityTaskCompleted)\n\tcase *swf.ActivityTaskFailedEventAttributes:\n\t\tevent.ActivityTaskFailedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeActivityTaskFailed)\n\tcase *swf.ActivityTaskScheduledEventAttributes:\n\t\tevent.ActivityTaskScheduledEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeActivityTaskScheduled)\n\tcase *swf.ActivityTaskStartedEventAttributes:\n\t\tevent.ActivityTaskStartedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeActivityTaskStarted)\n\tcase *swf.ActivityTaskTimedOutEventAttributes:\n\t\tevent.ActivityTaskTimedOutEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeActivityTaskTimedOut)\n\tcase *swf.CancelTimerFailedEventAttributes:\n\t\tevent.CancelTimerFailedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeCancelTimerFailed)\n\tcase *swf.CancelWorkflowExecutionFailedEventAttributes:\n\t\tevent.CancelWorkflowExecutionFailedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeCancelWorkflowExecutionFailed)\n\tcase *swf.ChildWorkflowExecutionCanceledEventAttributes:\n\t\tevent.ChildWorkflowExecutionCanceledEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeChildWorkflowExecutionCanceled)\n\tcase *swf.ChildWorkflowExecutionCompletedEventAttributes:\n\t\tevent.ChildWorkflowExecutionCompletedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeChildWorkflowExecutionCompleted)\n\tcase *swf.ChildWorkflowExecutionFailedEventAttributes:\n\t\tevent.ChildWorkflowExecutionFailedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeChildWorkflowExecutionFailed)\n\tcase *swf.ChildWorkflowExecutionStartedEventAttributes:\n\t\tevent.ChildWorkflowExecutionStartedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeChildWorkflowExecutionStarted)\n\tcase *swf.ChildWorkflowExecutionTerminatedEventAttributes:\n\t\tevent.ChildWorkflowExecutionTerminatedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeChildWorkflowExecutionTerminated)\n\tcase *swf.ChildWorkflowExecutionTimedOutEventAttributes:\n\t\tevent.ChildWorkflowExecutionTimedOutEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeChildWorkflowExecutionTimedOut)\n\tcase *swf.CompleteWorkflowExecutionFailedEventAttributes:\n\t\tevent.CompleteWorkflowExecutionFailedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeCompleteWorkflowExecutionFailed)\n\tcase *swf.ContinueAsNewWorkflowExecutionFailedEventAttributes:\n\t\tevent.ContinueAsNewWorkflowExecutionFailedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeContinueAsNewWorkflowExecutionFailed)\n\tcase *swf.DecisionTaskCompletedEventAttributes:\n\t\tevent.DecisionTaskCompletedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeDecisionTaskCompleted)\n\tcase *swf.DecisionTaskScheduledEventAttributes:\n\t\tevent.DecisionTaskScheduledEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeDecisionTaskScheduled)\n\tcase *swf.DecisionTaskStartedEventAttributes:\n\t\tevent.DecisionTaskStartedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeDecisionTaskStarted)\n\tcase *swf.DecisionTaskTimedOutEventAttributes:\n\t\tevent.DecisionTaskTimedOutEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeDecisionTaskTimedOut)\n\tcase *swf.ExternalWorkflowExecutionCancelRequestedEventAttributes:\n\t\tevent.ExternalWorkflowExecutionCancelRequestedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeExternalWorkflowExecutionCancelRequested)\n\tcase *swf.ExternalWorkflowExecutionSignaledEventAttributes:\n\t\tevent.ExternalWorkflowExecutionSignaledEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeExternalWorkflowExecutionSignaled)\n\tcase *swf.FailWorkflowExecutionFailedEventAttributes:\n\t\tevent.FailWorkflowExecutionFailedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeFailWorkflowExecutionFailed)\n\tcase *swf.MarkerRecordedEventAttributes:\n\t\tevent.MarkerRecordedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeMarkerRecorded)\n\tcase *swf.RecordMarkerFailedEventAttributes:\n\t\tevent.RecordMarkerFailedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeRecordMarkerFailed)\n\tcase *swf.RequestCancelActivityTaskFailedEventAttributes:\n\t\tevent.RequestCancelActivityTaskFailedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeRequestCancelActivityTaskFailed)\n\tcase *swf.RequestCancelExternalWorkflowExecutionFailedEventAttributes:\n\t\tevent.RequestCancelExternalWorkflowExecutionFailedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeRequestCancelExternalWorkflowExecutionFailed)\n\tcase *swf.RequestCancelExternalWorkflowExecutionInitiatedEventAttributes:\n\t\tevent.RequestCancelExternalWorkflowExecutionInitiatedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeRequestCancelExternalWorkflowExecutionInitiated)\n\tcase *swf.ScheduleActivityTaskFailedEventAttributes:\n\t\tevent.ScheduleActivityTaskFailedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeScheduleActivityTaskFailed)\n\tcase *swf.SignalExternalWorkflowExecutionFailedEventAttributes:\n\t\tevent.SignalExternalWorkflowExecutionFailedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeSignalExternalWorkflowExecutionFailed)\n\tcase *swf.SignalExternalWorkflowExecutionInitiatedEventAttributes:\n\t\tevent.SignalExternalWorkflowExecutionInitiatedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeSignalExternalWorkflowExecutionInitiated)\n\tcase *swf.StartChildWorkflowExecutionFailedEventAttributes:\n\t\tevent.StartChildWorkflowExecutionFailedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeStartChildWorkflowExecutionFailed)\n\tcase *swf.StartChildWorkflowExecutionInitiatedEventAttributes:\n\t\tevent.StartChildWorkflowExecutionInitiatedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeStartChildWorkflowExecutionInitiated)\n\tcase *swf.StartTimerFailedEventAttributes:\n\t\tevent.StartTimerFailedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeStartTimerFailed)\n\tcase *swf.TimerCanceledEventAttributes:\n\t\tevent.TimerCanceledEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeTimerCanceled)\n\tcase *swf.TimerFiredEventAttributes:\n\t\tevent.TimerFiredEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeTimerFired)\n\tcase *swf.TimerStartedEventAttributes:\n\t\tevent.TimerStartedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeTimerStarted)\n\tcase *swf.WorkflowExecutionCancelRequestedEventAttributes:\n\t\tevent.WorkflowExecutionCancelRequestedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeWorkflowExecutionCancelRequested)\n\tcase *swf.WorkflowExecutionCanceledEventAttributes:\n\t\tevent.WorkflowExecutionCanceledEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeWorkflowExecutionCanceled)\n\tcase *swf.WorkflowExecutionCompletedEventAttributes:\n\t\tevent.WorkflowExecutionCompletedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeWorkflowExecutionCompleted)\n\tcase *swf.WorkflowExecutionContinuedAsNewEventAttributes:\n\t\tevent.WorkflowExecutionContinuedAsNewEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeWorkflowExecutionContinuedAsNew)\n\tcase *swf.WorkflowExecutionFailedEventAttributes:\n\t\tevent.WorkflowExecutionFailedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeWorkflowExecutionFailed)\n\tcase *swf.WorkflowExecutionSignaledEventAttributes:\n\t\tevent.WorkflowExecutionSignaledEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeWorkflowExecutionSignaled)\n\tcase *swf.WorkflowExecutionStartedEventAttributes:\n\t\tevent.WorkflowExecutionStartedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeWorkflowExecutionStarted)\n\tcase *swf.WorkflowExecutionTerminatedEventAttributes:\n\t\tevent.WorkflowExecutionTerminatedEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeWorkflowExecutionTerminated)\n\tcase *swf.WorkflowExecutionTimedOutEventAttributes:\n\t\tevent.WorkflowExecutionTimedOutEventAttributes = t\n\t\tevent.EventType = S(swf.EventTypeWorkflowExecutionTimedOut)\n\t}\n\treturn event\n}", "func Payload(payload *config.Payload) (*config.Payload, error) {\n\n\t// Must have job_type and the appropriate urls\n\tswitch payload.JobType {\n\tcase \"load\":\n\t\tif payload.LoadURL == \"\" {\n\t\t\treturn nil, fmt.Errorf(\"Payload must contain 'load_url' if job_type is load\")\n\t\t}\n\tcase \"correctness\":\n\t\tif payload.ExperimentURL == \"\" || payload.ControlURL == \"\" {\n\t\t\treturn nil, fmt.Errorf(\"Payload must contain 'experiment_url' and 'control_url' if job_type is correctness\")\n\t\t}\n\t\tif payload.DiffLoc == \"\" {\n\t\t\treturn nil, fmt.Errorf(\"Payload must contain 'diff_loc' if job_type is correctness\")\n\t\t}\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"Payload.job_type must be 'load' or 'correctness', got %s\", payload.JobType)\n\t}\n\n\t// s3 bucket required, and must just be the bucket\n\tif payload.S3Bucket == \"\" {\n\t\treturn nil, fmt.Errorf(\"Payload must contain 's3_bucket'\")\n\t}\n\tmatch, err := regexp.MatchString(\"/\", payload.S3Bucket)\n\tif err != nil {\n\t\treturn nil, err\n\t} else if match {\n\t\treturn nil, fmt.Errorf(\"s3_bucket should not contain /. Just want the bucket name. Got: %s\", payload.S3Bucket)\n\t}\n\n\t// file prefix should not start or end with /\n\tif payload.FilePrefix != \"\" && (payload.FilePrefix[0] == '/' || payload.FilePrefix[len(payload.FilePrefix)-1] == '/') {\n\t\treturn nil, fmt.Errorf(\"file_prefix should not start or end with slash if used with 's3_bucket'\")\n\t}\n\n\t// Set speed and reqs to defaults if not specified\n\tif payload.Speed == 0 {\n\t\tpayload.Speed = 100\n\t}\n\tif payload.Reqs == 0 {\n\t\tpayload.Reqs = 1000\n\t}\n\t// Only replay GETs unless specified\n\tif payload.Methods == \"\" {\n\t\tpayload.Methods = \"GET\"\n\t}\n\n\t// Set job_number and total_jobs to 1 if they are unset, return an error if one is set and the other not\n\tif (payload.JobNumber == 0) != (payload.TotalJobs == 0) {\n\t\treturn nil, fmt.Errorf(\"Can't have JobNumber without TotalJobs and viceVersa: JobNumber %d, TotalJobs %d\",\n\t\t\tpayload.JobNumber, payload.TotalJobs)\n\t} else if payload.JobNumber == 0 {\n\t\tpayload.JobNumber = 1\n\t\tpayload.TotalJobs = 1\n\t}\n\n\t// Set StartBefore to the future if not set, return error if not in the correct format\n\tif payload.StartBefore == \"\" {\n\t\tpayload.StartBefore = \"9999/99/99:99\"\n\t}\n\tmatch, err = regexp.MatchString(\"^[0-9]{4}/[0-9]{2}/[0-9]{2}:[0-9]{2}$\", payload.StartBefore)\n\tif err != nil {\n\t\treturn nil, err\n\t} else if !match {\n\t\treturn nil, fmt.Errorf(\"start_before not in correct format. Expected 'yyyy/mm/dd:hh', got: %s\", payload.StartBefore)\n\t}\n\n\t// If email set, need mandrill key\n\tif payload.Email != \"\" && os.Getenv(\"MANDRILL_KEY\") == \"\" {\n\t\treturn nil, fmt.Errorf(\"email given but no MANDRILL_KEY\")\n\t}\n\n\tif payload.WeakCompare {\n\t\tconfig.WeakCompare = true\n\t}\n\treturn payload, nil\n}", "func (pe *ProwJobEvent) FromPayload(data []byte) error {\n\tif err := json.Unmarshal(data, pe); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func BuildProgressPayload(stationProgressStationID string, stationProgressAuth string) (*station.ProgressPayload, error) {\n\tvar err error\n\tvar stationID int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(stationProgressStationID, 10, 32)\n\t\tstationID = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for stationID, must be INT32\")\n\t\t}\n\t}\n\tvar auth string\n\t{\n\t\tauth = stationProgressAuth\n\t}\n\tv := &station.ProgressPayload{}\n\tv.StationID = stationID\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func (k *KeepassXDatabase) parsePayload(payload []byte) (map[uint32][]Entry, error) {\n\tgroups, offset, err := k.parseGroups(payload)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor i := 0; i < len(groups); i++ {\n\t\tk.groupIdx[groups[i].id] = &groups[i]\n\t}\n\tentries, err := k.parseEntries(payload[offset:])\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresults := make(map[uint32][]Entry)\n\tfor _, entry := range entries {\n\t\tresults[entry.groupid] = append(results[entry.groupid], entry)\n\t}\n\treturn results, nil\n}", "func BuildAddPayload(stationAddBody string, stationAddAuth string) (*station.AddPayload, error) {\n\tvar err error\n\tvar body AddRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(stationAddBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, example of valid JSON:\\n%s\", \"'{\\n \\\"device_id\\\": \\\"Aliquam tempora ullam temporibus similique vel in.\\\",\\n \\\"location_name\\\": \\\"Et enim labore.\\\",\\n \\\"name\\\": \\\"Nemo corrupti et non suscipit similique aut.\\\",\\n \\\"status_json\\\": {\\n \\\"Aliquid expedita veniam voluptatem ad.\\\": \\\"Facere atque quam eum recusandae.\\\",\\n \\\"Voluptas amet sint hic accusamus.\\\": \\\"Temporibus a facilis earum ut non accusantium.\\\"\\n },\\n \\\"status_pb\\\": \\\"Exercitationem explicabo quis et omnis delectus sed.\\\"\\n }'\")\n\t\t}\n\t\tif body.StatusJSON == nil {\n\t\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"status_json\", \"body\"))\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tvar auth string\n\t{\n\t\tauth = stationAddAuth\n\t}\n\tv := &station.AddPayload{\n\t\tName: body.Name,\n\t\tDeviceID: body.DeviceID,\n\t\tLocationName: body.LocationName,\n\t\tStatusPb: body.StatusPb,\n\t}\n\tif body.StatusJSON != nil {\n\t\tv.StatusJSON = make(map[string]interface{}, len(body.StatusJSON))\n\t\tfor key, val := range body.StatusJSON {\n\t\t\ttk := key\n\t\t\ttv := val\n\t\t\tv.StatusJSON[tk] = tv\n\t\t}\n\t}\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func BuildLookupInvitePayload(projectLookupInviteToken string, projectLookupInviteAuth string) (*project.LookupInvitePayload, error) {\n\tvar token string\n\t{\n\t\ttoken = projectLookupInviteToken\n\t}\n\tvar auth string\n\t{\n\t\tauth = projectLookupInviteAuth\n\t}\n\tv := &project.LookupInvitePayload{}\n\tv.Token = token\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func BuildWorkflowPayload(collectionWorkflowID string) (*collection.WorkflowPayload, error) {\n\tvar err error\n\tvar id uint\n\t{\n\t\tvar v uint64\n\t\tv, err = strconv.ParseUint(collectionWorkflowID, 10, strconv.IntSize)\n\t\tid = uint(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for id, must be UINT\")\n\t\t}\n\t}\n\tv := &collection.WorkflowPayload{}\n\tv.ID = id\n\n\treturn v, nil\n}", "func parseWebhook(r *http.Request) (payload interface{}, err error) {\n\teventType := r.Header.Get(EventTypeHeader)\n\tswitch eventType {\n\tcase PostCommitEvent:\n\t\tpayload = &PostCommit{}\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"event type %v not support\", eventType)\n\t}\n\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"fail to read request body\")\n\t}\n\n\tif err := json.Unmarshal(body, &payload); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn payload, nil\n}", "func BuildAddPayload(goaStarterAddMessage string) (*goastarter.AddPayload, error) {\n\tvar err error\n\tvar message goa_starterpb.AddRequest\n\t{\n\t\tif goaStarterAddMessage != \"\" {\n\t\t\terr = json.Unmarshal([]byte(goaStarterAddMessage), &message)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"invalid JSON for message, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"a\\\": 4835525598530742500,\\n \\\"b\\\": 3683037965649525407\\n }'\")\n\t\t\t}\n\t\t}\n\t}\n\tv := &goastarter.AddPayload{\n\t\tA: int(message.A),\n\t\tB: int(message.B),\n\t}\n\n\treturn v, nil\n}", "func CreatePayload(tr *v1beta1.TaskRun) in_toto.Link {\n\tl := in_toto.Link{\n\t\tType: \"_link\",\n\t}\n\n\tl.Materials = map[string]interface{}{}\n\tfor _, r := range tr.Spec.Resources.Inputs {\n\t\tfor _, rr := range tr.Status.ResourcesResult {\n\t\t\tif r.Name == rr.ResourceName {\n\t\t\t\tl.Materials[rr.ResourceName] = rr\n\t\t\t}\n\t\t}\n\t}\n\n\tl.Products = map[string]interface{}{}\n\tfor _, r := range tr.Spec.Resources.Outputs {\n\t\tfor _, rr := range tr.Status.ResourcesResult {\n\t\t\tif r.Name == rr.ResourceName {\n\t\t\t\tl.Products[rr.ResourceName] = rr\n\t\t\t}\n\t\t}\n\t}\n\n\tl.Environment = map[string]interface{}{}\n\t// Add Tekton release info here\n\tl.Environment[\"tekton\"] = tr.Status\n\treturn l\n}", "func (pl *Payload) push(x interface{}) {\n\tmetadata, err := getHostMetadata()\n\tif err != nil {\n\t\ttelemetryLogger.Printf(\"Error getting metadata %v\", err)\n\t} else {\n\t\terr = saveHostMetadata(metadata)\n\t\tif err != nil {\n\t\t\ttelemetryLogger.Printf(\"saving host metadata failed with :%v\", err)\n\t\t}\n\t}\n\n\tif pl.len() < MaxPayloadSize {\n\t\tswitch x.(type) {\n\t\tcase DNCReport:\n\t\t\tdncReport := x.(DNCReport)\n\t\t\tdncReport.Metadata = metadata\n\t\t\tpl.DNCReports = append(pl.DNCReports, dncReport)\n\t\tcase CNIReport:\n\t\t\tcniReport := x.(CNIReport)\n\t\t\tcniReport.Metadata = metadata\n\t\t\tpl.CNIReports = append(pl.CNIReports, cniReport)\n\t\tcase NPMReport:\n\t\t\tnpmReport := x.(NPMReport)\n\t\t\tnpmReport.Metadata = metadata\n\t\t\tpl.NPMReports = append(pl.NPMReports, npmReport)\n\t\tcase CNSReport:\n\t\t\tcnsReport := x.(CNSReport)\n\t\t\tcnsReport.Metadata = metadata\n\t\t\tpl.CNSReports = append(pl.CNSReports, cnsReport)\n\t\t}\n\t}\n}", "func BuildAddPayload(stationAddBody string, stationAddAuth string) (*station.AddPayload, error) {\n\tvar err error\n\tvar body AddRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(stationAddBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"description\\\": \\\"Provident delectus commodi in.\\\",\\n \\\"deviceId\\\": \\\"Aut nisi iusto architecto.\\\",\\n \\\"locationName\\\": \\\"Ab corrupti dicta est.\\\",\\n \\\"name\\\": \\\"Quas ipsum mollitia laudantium.\\\",\\n \\\"statusPb\\\": \\\"Ex consequatur ipsam.\\\"\\n }'\")\n\t\t}\n\t}\n\tvar auth string\n\t{\n\t\tauth = stationAddAuth\n\t}\n\tv := &station.AddPayload{\n\t\tName: body.Name,\n\t\tDeviceID: body.DeviceID,\n\t\tLocationName: body.LocationName,\n\t\tStatusPb: body.StatusPb,\n\t\tDescription: body.Description,\n\t}\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func BuildUpdateModulePayload(stationUpdateModuleBody string, stationUpdateModuleID string, stationUpdateModuleModuleID string, stationUpdateModuleAuth string) (*station.UpdateModulePayload, error) {\n\tvar err error\n\tvar body UpdateModuleRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(stationUpdateModuleBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"label\\\": \\\"Non placeat aliquam sit.\\\"\\n }'\")\n\t\t}\n\t}\n\tvar id int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(stationUpdateModuleID, 10, 32)\n\t\tid = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for id, must be INT32\")\n\t\t}\n\t}\n\tvar moduleID int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(stationUpdateModuleModuleID, 10, 32)\n\t\tmoduleID = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for moduleID, must be INT32\")\n\t\t}\n\t}\n\tvar auth string\n\t{\n\t\tauth = stationUpdateModuleAuth\n\t}\n\tv := &station.UpdateModulePayload{\n\t\tLabel: body.Label,\n\t}\n\tv.ID = id\n\tv.ModuleID = moduleID\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func NewHistoryPayload(view *string, token string) *chatter.HistoryPayload {\n\tv := &chatter.HistoryPayload{}\n\tv.View = view\n\tv.Token = token\n\treturn v\n}", "func BuildListPayload(collectionListName string, collectionListOriginalID string, collectionListTransferID string, collectionListAipID string, collectionListPipelineID string, collectionListEarliestCreatedTime string, collectionListLatestCreatedTime string, collectionListStatus string, collectionListCursor string) (*collection.ListPayload, error) {\n\tvar err error\n\tvar name *string\n\t{\n\t\tif collectionListName != \"\" {\n\t\t\tname = &collectionListName\n\t\t}\n\t}\n\tvar originalID *string\n\t{\n\t\tif collectionListOriginalID != \"\" {\n\t\t\toriginalID = &collectionListOriginalID\n\t\t}\n\t}\n\tvar transferID *string\n\t{\n\t\tif collectionListTransferID != \"\" {\n\t\t\ttransferID = &collectionListTransferID\n\t\t\terr = goa.MergeErrors(err, goa.ValidateFormat(\"transfer_id\", *transferID, goa.FormatUUID))\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t}\n\tvar aipID *string\n\t{\n\t\tif collectionListAipID != \"\" {\n\t\t\taipID = &collectionListAipID\n\t\t\terr = goa.MergeErrors(err, goa.ValidateFormat(\"aip_id\", *aipID, goa.FormatUUID))\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t}\n\tvar pipelineID *string\n\t{\n\t\tif collectionListPipelineID != \"\" {\n\t\t\tpipelineID = &collectionListPipelineID\n\t\t\terr = goa.MergeErrors(err, goa.ValidateFormat(\"pipeline_id\", *pipelineID, goa.FormatUUID))\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t}\n\tvar earliestCreatedTime *string\n\t{\n\t\tif collectionListEarliestCreatedTime != \"\" {\n\t\t\tearliestCreatedTime = &collectionListEarliestCreatedTime\n\t\t\terr = goa.MergeErrors(err, goa.ValidateFormat(\"earliest_created_time\", *earliestCreatedTime, goa.FormatDateTime))\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t}\n\tvar latestCreatedTime *string\n\t{\n\t\tif collectionListLatestCreatedTime != \"\" {\n\t\t\tlatestCreatedTime = &collectionListLatestCreatedTime\n\t\t\terr = goa.MergeErrors(err, goa.ValidateFormat(\"latest_created_time\", *latestCreatedTime, goa.FormatDateTime))\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t}\n\tvar status *string\n\t{\n\t\tif collectionListStatus != \"\" {\n\t\t\tstatus = &collectionListStatus\n\t\t\tif !(*status == \"new\" || *status == \"in progress\" || *status == \"done\" || *status == \"error\" || *status == \"unknown\" || *status == \"queued\" || *status == \"pending\" || *status == \"abandoned\") {\n\t\t\t\terr = goa.MergeErrors(err, goa.InvalidEnumValueError(\"status\", *status, []any{\"new\", \"in progress\", \"done\", \"error\", \"unknown\", \"queued\", \"pending\", \"abandoned\"}))\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t}\n\tvar cursor *string\n\t{\n\t\tif collectionListCursor != \"\" {\n\t\t\tcursor = &collectionListCursor\n\t\t}\n\t}\n\tv := &collection.ListPayload{}\n\tv.Name = name\n\tv.OriginalID = originalID\n\tv.TransferID = transferID\n\tv.AipID = aipID\n\tv.PipelineID = pipelineID\n\tv.EarliestCreatedTime = earliestCreatedTime\n\tv.LatestCreatedTime = latestCreatedTime\n\tv.Status = status\n\tv.Cursor = cursor\n\n\treturn v, nil\n}", "func buildExamplePayload(rules Rules, filter Filter, list bool, version string) string {\n\trules = rules.ForVersion(version).Filter(filter)\n\tif rules.Size() == 0 {\n\t\treturn \"\"\n\t}\n\n\tdata := map[string]interface{}{}\n\tfor _, r := range rules.Contents() {\n\t\tdata[r.Name()] = getExampleValue(r, version)\n\t}\n\n\tvar payload interface{}\n\tpayload = data\n\tif list {\n\t\tpayload = []interface{}{data}\n\t}\n\n\tserialized, err := json.MarshalIndent(payload, \"\", \" \")\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\n\treturn string(serialized)\n}", "func BuildAddPayload(tasksAddMessage string) (*tasks.Task, error) {\n\tvar err error\n\tvar message taskspb.AddRequest\n\t{\n\t\tif tasksAddMessage != \"\" {\n\t\t\terr = json.Unmarshal([]byte(tasksAddMessage), &message)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"invalid JSON for message, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"assignee\\\": {\\n \\\"email\\\": \\\"[email protected]\\\",\\n \\\"firstname\\\": \\\"Ehab\\\",\\n \\\"isactive\\\": false,\\n \\\"lastname\\\": \\\"Terra\\\",\\n \\\"role\\\": \\\"admin\\\"\\n },\\n \\\"created_date\\\": \\\"1995-12-15T01:16:46Z\\\",\\n \\\"description\\\": \\\"Task description\\\",\\n \\\"due_date\\\": \\\"2004-07-22T01:49:19Z\\\",\\n \\\"owner\\\": {\\n \\\"email\\\": \\\"[email protected]\\\",\\n \\\"firstname\\\": \\\"Ehab\\\",\\n \\\"isactive\\\": false,\\n \\\"lastname\\\": \\\"Terra\\\",\\n \\\"role\\\": \\\"admin\\\"\\n },\\n \\\"status\\\": \\\"Pending\\\",\\n \\\"title\\\": \\\"New task title\\\",\\n \\\"updated_date\\\": \\\"1994-02-15T11:22:43Z\\\"\\n }'\")\n\t\t\t}\n\t\t}\n\t}\n\tv := &tasks.Task{\n\t\tTitle: message.Title,\n\t\tDescription: message.Description,\n\t\tCreatedDate: message.CreatedDate,\n\t\tUpdatedDate: message.UpdatedDate,\n\t\tStatus: message.Status,\n\t}\n\tif message.DueDate != \"\" {\n\t\tv.DueDate = &message.DueDate\n\t}\n\tif message.Owner != nil {\n\t\tv.Owner = protobufTaskspbStoredUserToTasksStoredUser(message.Owner)\n\t}\n\tif message.Assignee != nil {\n\t\tv.Assignee = protobufTaskspbStoredUserToTasksStoredUser(message.Assignee)\n\t}\n\n\treturn v, nil\n}", "func toPayload(in interface{}, pretty bool) ([]byte, error) {\n\tvar b []byte\n\tvar err error\n\tif b, err = json.Marshal(in); err != nil {\n\t\treturn nil, err\n\t}\n\tvar m map[string]interface{}\n\tif err := json.Unmarshal(b, &m); err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar marshaller func(m map[string]interface{})\n\tmarshaller = func(m map[string]interface{}) {\n\t\tfor k, v := range m {\n\t\t\tif child, ok := v.(map[string]interface{}); ok {\n\t\t\t\tmarshaller(child)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif s, ok := v.(string); ok {\n\t\t\t\tif t, e := time.Parse(time.RFC3339Nano, s); e == nil {\n\t\t\t\t\tif t.IsZero() {\n\t\t\t\t\t\tdelete(m, k)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tmarshaller(m)\n\tif pretty {\n\t\tjson.MarshalIndent(m, \"\", \" \")\n\t}\n\treturn json.Marshal(m)\n}", "func BuildUpdatePayload(stationUpdateBody string, stationUpdateID string, stationUpdateAuth string) (*station.UpdatePayload, error) {\n\tvar err error\n\tvar body UpdateRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(stationUpdateBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, example of valid JSON:\\n%s\", \"'{\\n \\\"location_name\\\": \\\"Et deserunt sequi est sunt qui.\\\",\\n \\\"name\\\": \\\"Facilis hic ea incidunt saepe et.\\\",\\n \\\"status_json\\\": {\\n \\\"Sapiente tempore a dicta culpa aperiam incidunt.\\\": \\\"Repudiandae nam delectus quasi explicabo adipisci sunt.\\\"\\n },\\n \\\"status_pb\\\": \\\"Ut quae sunt in officia perspiciatis maiores.\\\"\\n }'\")\n\t\t}\n\t\tif body.StatusJSON == nil {\n\t\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"status_json\", \"body\"))\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tvar id int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(stationUpdateID, 10, 32)\n\t\tid = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for id, must be INT32\")\n\t\t}\n\t}\n\tvar auth string\n\t{\n\t\tauth = stationUpdateAuth\n\t}\n\tv := &station.UpdatePayload{\n\t\tName: body.Name,\n\t\tLocationName: body.LocationName,\n\t\tStatusPb: body.StatusPb,\n\t}\n\tif body.StatusJSON != nil {\n\t\tv.StatusJSON = make(map[string]interface{}, len(body.StatusJSON))\n\t\tfor key, val := range body.StatusJSON {\n\t\t\ttk := key\n\t\t\ttv := val\n\t\t\tv.StatusJSON[tk] = tv\n\t\t}\n\t}\n\tv.ID = id\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func BuildTestPayload(sourceID, eventType, eventTypeVersion, eventID, eventTime, data string) string {\n\tbuilder := new(eventBuilder).\n\t\tbuild(sourceIDFormat, sourceID).\n\t\tbuild(eventTypeFormat, eventType).\n\t\tbuild(eventTypeVersionFormat, eventTypeVersion).\n\t\tbuild(eventIDFormat, eventID).\n\t\tbuild(eventTimeFormat, eventTime).\n\t\tbuild(dataFormat, data)\n\tpayload := builder.String()\n\treturn payload\n}", "func (rlman *RlManifest) Payload(generator string) []string {\n var payload []string\n\n for _,auditgenerator := range rlman.Audits {\n if auditgenerator.Generator == generator {\n for _,p := range auditgenerator.AuditResults {\n // Only append the files without issue. We are going to ignore issue file\n if !strings.Contains(p.Payload, \"issue\") {\n payload = append(payload, p.Payload)\n }\n }\n }\n }\n return payload\n}", "func BuildSigninPayload(userSigninMessage string) (*user.Signin, error) {\n\tvar err error\n\tvar message userpb.SigninRequest\n\t{\n\t\tif userSigninMessage != \"\" {\n\t\t\terr = json.Unmarshal([]byte(userSigninMessage), &message)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"invalid JSON for message, example of valid JSON:\\n%s\", \"'{\\n \\\"email\\\": \\\"[email protected]\\\",\\n \\\"password\\\": \\\"123456\\\"\\n }'\")\n\t\t\t}\n\t\t}\n\t}\n\tv := &user.Signin{\n\t\tEmail: message.Email,\n\t\tPassword: message.Password,\n\t}\n\treturn v, nil\n}", "func storePayload(payloadContent string, hh *HookHandler) (string, error) {\n\tif hh.Josuke.Store == \"\" {\n\t\treturn \"\", nil\n\t}\n\n\tt := time.Now().UTC()\n\tdt := strings.ReplaceAll(t.Format(time.RFC3339), \":\", \"\")\n\tpayloadPath := hh.Josuke.Store + \"/\" + hh.Hook.Name + \".\" + dt + \".\" + randomString(6) + \".json\"\n\terr := ioutil.WriteFile(payloadPath, []byte(payloadContent), 0664)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"cannot write the payload: %s\", err)\n\t}\n\tlog.Printf(\"[INFO] store payload to %s\\n\", payloadPath)\n\treturn payloadPath, nil\n}", "func BuildChangeInfoPayload(userMethodChangeInfoMessage string, userMethodChangeInfoToken string) (*usermethod.ChangeInfoPayload, error) {\n\tvar err error\n\tvar message user_methodpb.ChangeInfoRequest\n\t{\n\t\tif userMethodChangeInfoMessage != \"\" {\n\t\t\terr = json.Unmarshal([]byte(userMethodChangeInfoMessage), &message)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"invalid JSON for message, example of valid JSON:\\n%s\", \"'{\\n \\\"icon\\\": \\\"Sequi et sint quos culpa doloribus voluptatem.\\\",\\n \\\"name\\\": \\\"Alias architecto voluptatem minus neque id.\\\"\\n }'\")\n\t\t\t}\n\t\t}\n\t}\n\tvar token string\n\t{\n\t\ttoken = userMethodChangeInfoToken\n\t}\n\tv := &usermethod.ChangeInfoPayload{\n\t\tName: message.Name,\n\t\tIcon: message.Icon,\n\t}\n\tv.Token = token\n\treturn v, nil\n}", "func unmarshalCreateShortenerPayload(ctx context.Context, service *goa.Service, req *http.Request) error {\n\tpayload := &createLinkPayload{}\n\tif err := service.DecodeRequest(req, payload); err != nil {\n\t\treturn err\n\t}\n\tif err := payload.Validate(); err != nil {\n\t\t// Initialize payload with private data structure so it can be logged\n\t\tgoa.ContextRequest(ctx).Payload = payload\n\t\treturn err\n\t}\n\tgoa.ContextRequest(ctx).Payload = payload.Publicize()\n\treturn nil\n}", "func BuildInvitePayload(projectInviteBody string, projectInviteProjectID string, projectInviteAuth string) (*project.InvitePayload, error) {\n\tvar err error\n\tvar body InviteRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(projectInviteBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"email\\\": \\\"Dicta voluptatem numquam impedit.\\\",\\n \\\"role\\\": 978769797\\n }'\")\n\t\t}\n\t}\n\tvar projectID int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(projectInviteProjectID, 10, 32)\n\t\tprojectID = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for projectID, must be INT32\")\n\t\t}\n\t}\n\tvar auth string\n\t{\n\t\tauth = projectInviteAuth\n\t}\n\tv := &project.InviteUserFields{\n\t\tEmail: body.Email,\n\t\tRole: body.Role,\n\t}\n\tres := &project.InvitePayload{\n\t\tInvite: v,\n\t}\n\tres.ProjectID = projectID\n\tres.Auth = auth\n\n\treturn res, nil\n}", "func BuildUpdatePayload(productUpdateBody string, productUpdateToken string) (*product.UpdatePayload, error) {\n\tvar err error\n\tvar body UpdateRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(productUpdateBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"cost_price\\\": 123,\\n \\\"id\\\": \\\"519151ca-6250-4eec-8016-1e14a68dc448\\\",\\n \\\"image\\\": \\\"/images/123.jpg\\\",\\n \\\"is_shelves\\\": false,\\n \\\"market_price\\\": 123,\\n \\\"name\\\": \\\"灌装辣椒\\\",\\n \\\"note\\\": \\\"备注\\\",\\n \\\"size\\\": \\\"瓶\\\",\\n \\\"type\\\": 1,\\n \\\"unit\\\": 1\\n }'\")\n\t\t}\n\t\tif body.Unit != nil {\n\t\t\tif !(*body.Unit == 1 || *body.Unit == 2 || *body.Unit == 3 || *body.Unit == 4 || *body.Unit == 5 || *body.Unit == 6 || *body.Unit == 7 || *body.Unit == 8) {\n\t\t\t\terr = goa.MergeErrors(err, goa.InvalidEnumValueError(\"body.unit\", *body.Unit, []interface{}{1, 2, 3, 4, 5, 6, 7, 8}))\n\t\t\t}\n\t\t}\n\t\tif body.Type != nil {\n\t\t\tif !(*body.Type == 1 || *body.Type == 2 || *body.Type == 3 || *body.Type == 4 || *body.Type == 5 || *body.Type == 6 || *body.Type == 7 || *body.Type == 8) {\n\t\t\t\terr = goa.MergeErrors(err, goa.InvalidEnumValueError(\"body.type\", *body.Type, []interface{}{1, 2, 3, 4, 5, 6, 7, 8}))\n\t\t\t}\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tvar token string\n\t{\n\t\ttoken = productUpdateToken\n\t}\n\tv := &product.UpdatePayload{\n\t\tID: body.ID,\n\t\tName: body.Name,\n\t\tUnit: body.Unit,\n\t\tCostPrice: body.CostPrice,\n\t\tMarketPrice: body.MarketPrice,\n\t\tNote: body.Note,\n\t\tImage: body.Image,\n\t\tSize: body.Size,\n\t\tType: body.Type,\n\t\tIsShelves: body.IsShelves,\n\t}\n\tv.Token = token\n\n\treturn v, nil\n}", "func BuildMultiplyPayload(calcMultiplyA string, calcMultiplyB string) (*calc.MultiplyPayload, error) {\n\tvar err error\n\tvar a int\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(calcMultiplyA, 10, strconv.IntSize)\n\t\ta = int(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for a, must be INT\")\n\t\t}\n\t}\n\tvar b int\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(calcMultiplyB, 10, strconv.IntSize)\n\t\tb = int(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for b, must be INT\")\n\t\t}\n\t}\n\tv := &calc.MultiplyPayload{}\n\tv.A = a\n\tv.B = b\n\n\treturn v, nil\n}", "func (data *DaerahPayload) setPayload(r *http.Request) (err error) {\n\tif err := helper.DecodeJson(r,&data);err != nil {\n\t\treturn errors.New(\"invalid payload\")\n\t}\n\tif err := helper.ValidateData(data);err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func unmarshalUpdateShortenerPayload(ctx context.Context, service *goa.Service, req *http.Request) error {\n\tpayload := &updateLinkPayload{}\n\tif err := service.DecodeRequest(req, payload); err != nil {\n\t\treturn err\n\t}\n\tif err := payload.Validate(); err != nil {\n\t\t// Initialize payload with private data structure so it can be logged\n\t\tgoa.ContextRequest(ctx).Payload = payload\n\t\treturn err\n\t}\n\tgoa.ContextRequest(ctx).Payload = payload.Publicize()\n\treturn nil\n}", "func BuildUpdatePayload(stationUpdateBody string, stationUpdateID string, stationUpdateAuth string) (*station.UpdatePayload, error) {\n\tvar err error\n\tvar body UpdateRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(stationUpdateBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"description\\\": \\\"Dignissimos qui nihil commodi veritatis necessitatibus.\\\",\\n \\\"locationName\\\": \\\"Eum ex ut aperiam.\\\",\\n \\\"name\\\": \\\"Omnis beatae in error deserunt.\\\",\\n \\\"statusPb\\\": \\\"Qui similique nobis.\\\"\\n }'\")\n\t\t}\n\t}\n\tvar id int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(stationUpdateID, 10, 32)\n\t\tid = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for id, must be INT32\")\n\t\t}\n\t}\n\tvar auth string\n\t{\n\t\tauth = stationUpdateAuth\n\t}\n\tv := &station.UpdatePayload{\n\t\tName: body.Name,\n\t\tLocationName: body.LocationName,\n\t\tStatusPb: body.StatusPb,\n\t\tDescription: body.Description,\n\t}\n\tv.ID = id\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func BuildUpdatePayload(groupUpdateBody string, groupUpdateToken string) (*group.UpdatePayload, error) {\n\tvar err error\n\tvar body UpdateRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(groupUpdateBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"id\\\": \\\"519151ca-6250-4eec-8016-1e14a68dc448\\\",\\n \\\"name\\\": \\\"管理员\\\"\\n }'\")\n\t\t}\n\t}\n\tvar token string\n\t{\n\t\ttoken = groupUpdateToken\n\t}\n\tv := &group.UpdatePayload{\n\t\tID: body.ID,\n\t\tName: body.Name,\n\t}\n\tv.Token = token\n\n\treturn v, nil\n}", "func BuildAddPayload(projectAddBody string, projectAddAuth string) (*project.AddPayload, error) {\n\tvar err error\n\tvar body AddRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(projectAddBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"etag\\\": \\\"Sed et maxime dolore.\\\",\\n \\\"logicalAddress\\\": 5463365086455930586,\\n \\\"meta\\\": \\\"Praesentium atque quibusdam tempora assumenda sed eos.\\\",\\n \\\"module\\\": \\\"Distinctio nesciunt aut.\\\",\\n \\\"profile\\\": \\\"Cupiditate qui repudiandae et blanditiis dolor mollitia.\\\",\\n \\\"url\\\": \\\"Quo hic a molestias culpa a pariatur.\\\"\\n }'\")\n\t\t}\n\t}\n\tvar auth string\n\t{\n\t\tauth = projectAddAuth\n\t}\n\tv := &project.AddProjectFields{\n\t\tName: body.Name,\n\t\tDescription: body.Description,\n\t\tGoal: body.Goal,\n\t\tLocation: body.Location,\n\t\tTags: body.Tags,\n\t\tPrivacy: body.Privacy,\n\t\tStartTime: body.StartTime,\n\t\tEndTime: body.EndTime,\n\t}\n\tres := &project.AddPayload{\n\t\tProject: v,\n\t}\n\tres.Auth = auth\n\n\treturn res, nil\n}", "func BuildPhotoPayload(stationPhotoID string, stationPhotoAuth string) (*station.PhotoPayload, error) {\n\tvar err error\n\tvar id int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(stationPhotoID, 10, 32)\n\t\tid = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for id, must be INT32\")\n\t\t}\n\t}\n\tvar auth string\n\t{\n\t\tauth = stationPhotoAuth\n\t}\n\tv := &station.PhotoPayload{}\n\tv.ID = id\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func (hook Webhook) ParsePayload(w http.ResponseWriter, r *http.Request) {\n\twebhooks.DefaultLog.Info(\"Parsing Payload...\")\n\n\tevent := r.Header.Get(\"X-Gogs-Event\")\n\tif len(event) == 0 {\n\t\twebhooks.DefaultLog.Error(\"Missing X-Gogs-Event Header\")\n\t\thttp.Error(w, \"400 Bad Request - Missing X-Gogs-Event Header\", http.StatusBadRequest)\n\t\treturn\n\t}\n\twebhooks.DefaultLog.Debug(fmt.Sprintf(\"X-Gogs-Event:%s\", event))\n\n\tgogsEvent := Event(event)\n\n\tfn, ok := hook.eventFuncs[gogsEvent]\n\t// if no event registered\n\tif !ok {\n\t\twebhooks.DefaultLog.Info(fmt.Sprintf(\"Webhook Event %s not registered, it is recommended to setup only events in gogs that will be registered in the webhook to avoid unnecessary traffic and reduce potential attack vectors.\", event))\n\t\treturn\n\t}\n\n\tpayload, err := ioutil.ReadAll(r.Body)\n\tif err != nil || len(payload) == 0 {\n\t\twebhooks.DefaultLog.Error(\"Issue reading Payload\")\n\t\thttp.Error(w, \"Issue reading Payload\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\twebhooks.DefaultLog.Debug(fmt.Sprintf(\"Payload:%s\", string(payload)))\n\n\t// If we have a Secret set, we should check the MAC\n\tif len(hook.secret) > 0 {\n\t\twebhooks.DefaultLog.Info(\"Checking secret\")\n\t\tsignature := r.Header.Get(\"X-Gogs-Signature\")\n\t\tif len(signature) == 0 {\n\t\t\twebhooks.DefaultLog.Error(\"Missing X-Gogs-Signature required for HMAC verification\")\n\t\t\thttp.Error(w, \"403 Forbidden - Missing X-Gogs-Signature required for HMAC verification\", http.StatusForbidden)\n\t\t\treturn\n\t\t}\n\t\twebhooks.DefaultLog.Debug(fmt.Sprintf(\"X-Gogs-Signature:%s\", signature))\n\n\t\tmac := hmac.New(sha256.New, []byte(hook.secret))\n\t\tmac.Write(payload)\n\n\t\texpectedMAC := hex.EncodeToString(mac.Sum(nil))\n\n\t\tif !hmac.Equal([]byte(signature), []byte(expectedMAC)) {\n\t\t\twebhooks.DefaultLog.Debug(string(payload))\n\t\t\thttp.Error(w, \"403 Forbidden - HMAC verification failed\", http.StatusForbidden)\n\t\t\treturn\n\t\t}\n\t}\n\n\t// Make headers available to ProcessPayloadFunc as a webhooks type\n\thd := webhooks.Header(r.Header)\n\n\tswitch gogsEvent {\n\tcase CreateEvent:\n\t\tvar pe client.CreatePayload\n\t\tjson.Unmarshal([]byte(payload), &pe)\n\t\thook.runProcessPayloadFunc(fn, pe, hd)\n\n\tcase ReleaseEvent:\n\t\tvar re client.ReleasePayload\n\t\tjson.Unmarshal([]byte(payload), &re)\n\t\thook.runProcessPayloadFunc(fn, re, hd)\n\n\tcase PushEvent:\n\t\tvar pe client.PushPayload\n\t\tjson.Unmarshal([]byte(payload), &pe)\n\t\thook.runProcessPayloadFunc(fn, pe, hd)\n\n\tcase DeleteEvent:\n\t\tvar de client.DeletePayload\n\t\tjson.Unmarshal([]byte(payload), &de)\n\t\thook.runProcessPayloadFunc(fn, de, hd)\n\n\tcase ForkEvent:\n\t\tvar fe client.ForkPayload\n\t\tjson.Unmarshal([]byte(payload), &fe)\n\t\thook.runProcessPayloadFunc(fn, fe, hd)\n\n\tcase IssuesEvent:\n\t\tvar ie client.IssuesPayload\n\t\tjson.Unmarshal([]byte(payload), &ie)\n\t\thook.runProcessPayloadFunc(fn, ie, hd)\n\n\tcase IssueCommentEvent:\n\t\tvar ice client.IssueCommentPayload\n\t\tjson.Unmarshal([]byte(payload), &ice)\n\t\thook.runProcessPayloadFunc(fn, ice, hd)\n\n\tcase PullRequestEvent:\n\t\tvar pre client.PullRequestPayload\n\t\tjson.Unmarshal([]byte(payload), &pre)\n\t\thook.runProcessPayloadFunc(fn, pre, hd)\n\t}\n}", "func createPayloadFromPacket(packetReader io.Reader) (*payload, error) {\n\t//read packet length\n\tvar packetLength int32\n\terr := binary.Read(packetReader, binary.LittleEndian, &packetLength)\n\tif err != nil {\n\t\treturn nil, errors.New(\"Unable to read packet length\")\n\t}\n\tbuf := make([]byte, packetLength)\n\terr = binary.Read(packetReader, binary.LittleEndian, &buf)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"read packet body fail: %v\", err)\n\t\treturn nil, err\n\t}\n\t// check length\n\tif packetLength < 4+4+2 {\n\t\terr = errors.New(\"packet too short\")\n\t\treturn nil, err\n\t}\n\tresult := new(payload)\n\tresult.packetID = int32(binary.LittleEndian.Uint32(buf[:4]))\n\tresult.packetType = int32(binary.LittleEndian.Uint32(buf[4:8]))\n\tresult.packetBody = buf[8 : packetLength-2]\n\n\treturn result, nil\n}", "func unmarshalPayload(r *http.Request) ([]interface{}, error) {\n\tif r.ContentLength > 0 {\n\t\tinterfaceSlice := []interface{}{}\n\t\tdata := make([]byte, r.ContentLength)\n\t\tr.Body.Read(data)\n\t\t// [][]byte\n\t\tsplittedByteData := bytes.SplitAfter(data, []byte(\"},\"))\n\t\tfor _, single := range splittedByteData {\n\t\t\tvar mData interface{}\n\t\t\tsingle = bytes.TrimRight(single, \",\")\n\t\t\terr := json.Unmarshal(single, &mData)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tinterfaceSlice = append(interfaceSlice, mData)\n\t\t}\n\t\treturn interfaceSlice, nil\n\t}\n\treturn nil, nil\n}", "func BuildGetPayload(salesGetID string, salesGetToken string) (*sales.GetPayload, error) {\n\tvar id string\n\t{\n\t\tid = salesGetID\n\t}\n\tvar token string\n\t{\n\t\ttoken = salesGetToken\n\t}\n\tv := &sales.GetPayload{}\n\tv.ID = id\n\tv.Token = token\n\n\treturn v, nil\n}", "func createMiragePayload(matcher string, request *http.Request, response *http.Response, body []byte) (Mirage) {\n\t// defining payload\n\tvar mirageObj Mirage\n\n\t// formatting request part\n\t// assigning headers\n\t// headers := getHeaders(request)\n\t// mirageObj.Request.Headers = headers\n\t// assigning request method\n\t//\tmirageObj.Request.Method = request.Method\n\tmirageObj.Request.Method = \"POST\"\n\t// getting contains matcher\n\tbodyPatterns := make(map[string][]string)\n\tmatchers := []string{matcher}\n\tbodyPatterns[\"contains\"] = matchers\n\n\t// assigning matcher to body patterns\n\tmirageObj.Request.BodyPatterns = []map[string][]string{bodyPatterns}\n\n\t// formatting response part\n\tmirageObj.Response.Status = response.StatusCode\n\t// getting response headers\n\tmirageObj.Response.Headers = getHeadersMap(response.Header)\n\t// adding external service response body\n\tmirageObj.Response.Body = body\n\tlog.WithFields(log.Fields{\n\t\t\"content-length\": len(body),\n\t}).Info(\"Original response body length\")\n\n\n\treturn mirageObj\n\n}", "func makeRouterPayload(payloadTemplateFile string, args TestContext) []byte {\n\tdata, err := ioutil.ReadFile(payloadTemplateFile)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\ttmpl, err := template.New(\"new router payload\").Parse(string(data))\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tvar buf bytes.Buffer\n\tif err = tmpl.Execute(&buf, args); err != nil {\n\t\tpanic(err)\n\t}\n\treturn buf.Bytes()\n}", "func (rs *Restake) Payload() []byte { return rs.payload }", "func BuildSigninPayload(securedServiceSigninUsername string, securedServiceSigninPassword string) (*securedservice.SigninPayload, error) {\n\tvar username string\n\t{\n\t\tusername = securedServiceSigninUsername\n\t}\n\tvar password string\n\t{\n\t\tpassword = securedServiceSigninPassword\n\t}\n\tv := &securedservice.SigninPayload{}\n\tv.Username = username\n\tv.Password = password\n\treturn v, nil\n}", "func transformLogMessage(cfEvent *events.Envelope, nrEvent map[string]interface{}) {\n\t// event: origin:\"rep\" eventType:LogMessage timestamp:1497038366041617814 deployment:\"cf\" job:\"diego_cell\" index:\"0f4dc7bd-c941-42bf-a835-7c29445ddf8b\" ip:\"192.168.16.24\" logMessage:<message:\"[{\\\"DatasetName\\\":\\\"Metric Messages\\\",\\\"FirehoseEventType\\\":\\\"CounterEvent\\\",\\\"ceDelta\\\":166908,\\\"ceName\\\":\\\"dropsondeListener.receivedByteCount\\\",\\\"ceTotal\\\":25664179951,\\\"deployment\\\":\\\"cf\\\",\\\"eventType\\\":\\\"FirehoseEventTest\\\",\\\"index\\\":\\\"ca858dc5-2a09-465a-831d-c31fa5fb8802\\\",\\\"ip\\\":\\\"192.168.16.26\\\",\\\"job\\\":\\\"doppler\\\",\\\"origin\\\":\\\"DopplerServer\\\",\\\"timestamp\\\":1497038161107}]\" message_type:OUT timestamp:1497038366041615818 app_id:\"f22aac70-c5a9-47a9-b74c-355dd99abbe2\" source_type:\"APP/PROC/WEB\" source_instance:\"0\" >\n\tmessage := cfEvent.LogMessage\n\t// if debug {\n\t// \tlogger.Printf(\">>>>> raw log message: %v\\n\", cfEvent)\n\t// }\n\tprefix := \"log\"\n\tif message.Message != nil {\n\t\tmsgContent := message.GetMessage()\n\t\tif len(msgContent) > 4096 {\n\t\t\tmsgContent = msgContent[0:4095]\n\t\t}\n\t\t// re := regexp.MustCompile(\"=>\")\n\t\t// payload := string([]byte(`payload: {\"instance\"=>\"a305bf1e-f869-4307-5bdc-7f7b\", \"index\"=>0, \"reason\"=>\"CRASHED\", \"exit_description\"=>\"Instance never healthy after 1m0s: Failed to make TCP connection to port 8080: connection refused\", \"crash_count\"=>2, \"crash_timestamp\"=>1522812923161363839, \"version\"=>\"68a457a6-2f43-4ed7-af5f-038f2e1da1fc\"}`))\n\t\t// fmt.Println(re.ReplaceAllString(payload, \": \"))\n\t\t// logger.Printf(\">>>>> log message payload: %v\\n\", string(msgContent))\n\t\tnrEvent[prefix+\"Message\"] = string(msgContent)\n\t\tparsedContent := make(map[string]interface{})\n\t\tif err := json.Unmarshal(msgContent, &parsedContent); err == nil {\n\t\t\tfor k, v := range parsedContent {\n\t\t\t\tnrEvent[prefix+\"Message\"+k] = v\n\t\t\t}\n\t\t}\n\t\taddAppDetailInfo(nrEvent, message.GetAppId()) // add app detail info to Insights LogMessage event\n\t}\n\tif message.MessageType != nil {\n\t\tnrEvent[prefix+\"MessageType\"] = message.GetMessageType().String()\n\t}\n\tif message.Timestamp != nil {\n\t\tnrEvent[prefix+\"Timestamp\"] = time.Unix(0, message.GetTimestamp())\n\t}\n\tif message.AppId != nil {\n\t\tnrEvent[prefix+\"AppId\"] = message.GetAppId()\n\t}\n\tif message.SourceType != nil {\n\t\tnrEvent[prefix+\"SourceType\"] = message.GetSourceType()\n\t}\n\tif message.SourceInstance != nil {\n\t\tnrEvent[prefix+\"SourceInstance\"] = message.GetSourceInstance()\n\t}\n}", "func copyJobToHookQueueJob(src common.Job) (dst HookQueueOrderJobData) {\n\tdst.ID = src.UUID\n\tdst.Name = src.Name\n\tdst.Status = src.Status\n\tdst.Owner = src.Owner\n\tdst.StartTime = src.StartTime\n\tdst.CrackedHashes = src.CrackedHashes\n\tdst.TotalHashes = src.TotalHashes\n\tdst.Progress = src.Progress\n\n\treturn dst\n}", "func buildBody(level, title string) map[string]interface{} {\n\ttimestamp := time.Now().Unix()\n\thostname, _ := os.Hostname()\n\n\treturn map[string]interface{}{\n\t\t\"access_token\": Token,\n\t\t\"data\": map[string]interface{}{\n\t\t\t\"environment\": Environment,\n\t\t\t\"title\": title,\n\t\t\t\"level\": level,\n\t\t\t\"timestamp\": timestamp,\n\t\t\t\"platform\": runtime.GOOS,\n\t\t\t\"language\": \"go\",\n\t\t\t\"server\": map[string]interface{}{\n\t\t\t\t\"host\": hostname,\n\t\t\t},\n\t\t\t\"notifier\": map[string]interface{}{\n\t\t\t\t\"name\": NAME,\n\t\t\t\t\"version\": VERSION,\n\t\t\t},\n\t\t},\n\t}\n}", "func BuildUpdatePayload(salesUpdateBody string, salesUpdateToken string) (*sales.UpdatePayload, error) {\n\tvar err error\n\tvar body UpdateRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(salesUpdateBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"consignment_date\\\": \\\"2021-01-01\\\",\\n \\\"customer_id\\\": \\\"519151ca-6250-4eec-8016-1e14a68dc448\\\",\\n \\\"head_id\\\": \\\"519151ca-6250-4eec-8016-1e14a68dc448\\\",\\n \\\"id\\\": \\\"519151ca-6250-4eec-8016-1e14a68dc448\\\",\\n \\\"is_sales_return\\\": false,\\n \\\"money\\\": 123,\\n \\\"name\\\": \\\"xx销售\\\",\\n \\\"note\\\": \\\"备注\\\"\\n }'\")\n\t\t}\n\t\tif body.IsSalesReturn != nil {\n\t\t\tif !(*body.IsSalesReturn == false || *body.IsSalesReturn == true) {\n\t\t\t\terr = goa.MergeErrors(err, goa.InvalidEnumValueError(\"body.is_sales_return\", *body.IsSalesReturn, []interface{}{false, true}))\n\t\t\t}\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tvar token string\n\t{\n\t\ttoken = salesUpdateToken\n\t}\n\tv := &sales.UpdatePayload{\n\t\tID: body.ID,\n\t\tName: body.Name,\n\t\tCustomerID: body.CustomerID,\n\t\tMoney: body.Money,\n\t\tConsignmentDate: body.ConsignmentDate,\n\t\tIsSalesReturn: body.IsSalesReturn,\n\t\tNote: body.Note,\n\t\tHeadID: body.HeadID,\n\t}\n\tv.Token = token\n\n\treturn v, nil\n}", "func DecodePayload(data []byte) Payload {\n\te := Payload{}\n\te.Length = binary.LittleEndian.Uint32(data[0:4])\n\te.Op = data[4]\n\te.Channel = binary.LittleEndian.Uint32(data[5:9])\n\te.Data = make([]byte, len(data[9:]))\n\tcopy(e.Data, data[9:])\n\treturn e\n}", "func BuildByTypeNameVersionPayload(resourceByTypeNameVersionType string, resourceByTypeNameVersionName string, resourceByTypeNameVersionVersion string) (*resource.ByTypeNameVersionPayload, error) {\n\tvar err error\n\tvar type_ string\n\t{\n\t\ttype_ = resourceByTypeNameVersionType\n\t\tif !(type_ == \"task\" || type_ == \"pipeline\") {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidEnumValueError(\"type_\", type_, []interface{}{\"task\", \"pipeline\"}))\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tvar name string\n\t{\n\t\tname = resourceByTypeNameVersionName\n\t}\n\tvar version string\n\t{\n\t\tversion = resourceByTypeNameVersionVersion\n\t}\n\tv := &resource.ByTypeNameVersionPayload{}\n\tv.Type = type_\n\tv.Name = name\n\tv.Version = version\n\n\treturn v, nil\n}", "func unmarshalReportResultsPayload(ctx context.Context, service *goa.Service, req *http.Request) error {\n\tpayload := &reportPayload{}\n\tif err := service.DecodeRequest(req, payload); err != nil {\n\t\treturn err\n\t}\n\tif err := payload.Validate(); err != nil {\n\t\t// Initialize payload with private data structure so it can be logged\n\t\tgoa.ContextRequest(ctx).Payload = payload\n\t\treturn err\n\t}\n\tgoa.ContextRequest(ctx).Payload = payload.Publicize()\n\treturn nil\n}", "func BuildUpdatePayload(projectUpdateBody string, projectUpdateProjectID string, projectUpdateAuth string) (*project.UpdatePayload, error) {\n\tvar err error\n\tvar body UpdateRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(projectUpdateBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"description\\\": \\\"Voluptatem adipisci dicta recusandae dolores assumenda.\\\",\\n \\\"endTime\\\": \\\"Consequuntur totam impedit nobis inventore nesciunt.\\\",\\n \\\"goal\\\": \\\"Qui doloremque nemo similique fuga voluptatem.\\\",\\n \\\"location\\\": \\\"Non quae voluptatem.\\\",\\n \\\"name\\\": \\\"Corporis enim harum.\\\",\\n \\\"privacy\\\": 2011573778,\\n \\\"startTime\\\": \\\"Optio qui architecto perspiciatis nulla inventore ut.\\\",\\n \\\"tags\\\": \\\"Eius aut.\\\"\\n }'\")\n\t\t}\n\t}\n\tvar projectID int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(projectUpdateProjectID, 10, 32)\n\t\tprojectID = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for projectID, must be INT32\")\n\t\t}\n\t}\n\tvar auth string\n\t{\n\t\tauth = projectUpdateAuth\n\t}\n\tv := &project.AddProjectFields{\n\t\tName: body.Name,\n\t\tDescription: body.Description,\n\t\tGoal: body.Goal,\n\t\tLocation: body.Location,\n\t\tTags: body.Tags,\n\t\tPrivacy: body.Privacy,\n\t\tStartTime: body.StartTime,\n\t\tEndTime: body.EndTime,\n\t}\n\tres := &project.UpdatePayload{\n\t\tProject: v,\n\t}\n\tres.ProjectID = projectID\n\tres.Auth = auth\n\n\treturn res, nil\n}", "func (l *Loader) newPayload(name string, ver int) int {\n\tpi := len(l.payloads)\n\tpp := l.allocPayload()\n\tpp.name = name\n\tpp.ver = ver\n\tl.payloads = append(l.payloads, pp)\n\tl.growExtAttrBitmaps()\n\treturn pi\n}", "func (s *AliCloudSlsLogstorage) parseLog(req *bindings.InvokeRequest) (*sls.Log, error) {\n\tvar logInfo map[string]string\n\terr := json.Unmarshal(req.Data, &logInfo)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn producer.GenerateLog(uint32(time.Now().Unix()), logInfo), nil\n}", "func (state *AggregateRoot) BuildFromHistory(a aggregate, events []Event) {\n\tfor _, event := range events {\n\t\ta.Transition(event)\n\t\t//Set the aggregate id\n\t\tstate.AggregateID = event.AggregateRootID\n\t\t// Make sure the aggregate is in the correct version (the last event)\n\t\tstate.AggregateVersion = event.Version\n\t}\n}", "func createJSONPayload(data map[string]any, msg *models.Message) (string, error) {\n\tdataNice := utils.MakeNiceJSON(data)\n\n\tstr, err := json.Marshal(dataNice)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tpayload, err := utils.Substitute(string(str), msg.Vars)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn payload, nil\n}", "func extractCreateTokenPayload(resWriter *http.ResponseWriter, req *http.Request) (*createTokenPayload, error) {\n\n\tbody, err := ioutil.ReadAll(req.Body)\n\tif err != nil {\n\t\tlog.Printf(\"Error reading body: %v\", err)\n\t\treturn nil, errors.New(\"failed to read request body json\")\n\t}\n\tvar payload createTokenPayload\n\tjson.Unmarshal(body, &payload)\n\n\tx, err := json.Marshal(&payload)\n\tlog.Info(string(x))\n\n\t// validate\n\t_, err = govalidator.ValidateStruct(&payload)\n\tif err != nil {\n\t\treturn nil, errors.New(\"JSON payload failed validation: \" + err.Error())\n\t}\n\n\treturn &payload, nil\n\n}", "func (cm *CallManager) EncodePayload(rpc *RPC) []byte {\n\tbuf := bytes.NewBuffer(nil)\n\n\t//cm.logger.Logf(\"encoding payload of call %d\\n\", rpc.Header.Call)\n\n\tbencode.Marshal(buf, rpc.Payload)\n\tb := buf.Bytes()\n\t/*if len(b) == 0 {\n\t\tb = make([]byte, 2)\n\t\tb[0] = 'l'\n\t\tb[1] = 'e'\n\t}*/\n\treturn b\n}", "func BuildGetPayload(groupGetID string, groupGetToken string) (*group.GetPayload, error) {\n\tvar id string\n\t{\n\t\tid = groupGetID\n\t}\n\tvar token string\n\t{\n\t\ttoken = groupGetToken\n\t}\n\tv := &group.GetPayload{}\n\tv.ID = id\n\tv.Token = token\n\n\treturn v, nil\n}", "func BuildListPayload(productListCursor string, productListLimit string, productListToken string) (*product.ListPayload, error) {\n\tvar err error\n\tvar cursor *int\n\t{\n\t\tif productListCursor != \"\" {\n\t\t\tvar v int64\n\t\t\tv, err = strconv.ParseInt(productListCursor, 10, 64)\n\t\t\tval := int(v)\n\t\t\tcursor = &val\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"invalid value for cursor, must be INT\")\n\t\t\t}\n\t\t}\n\t}\n\tvar limit *int\n\t{\n\t\tif productListLimit != \"\" {\n\t\t\tvar v int64\n\t\t\tv, err = strconv.ParseInt(productListLimit, 10, 64)\n\t\t\tval := int(v)\n\t\t\tlimit = &val\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"invalid value for limit, must be INT\")\n\t\t\t}\n\t\t}\n\t}\n\tvar token string\n\t{\n\t\ttoken = productListToken\n\t}\n\tv := &product.ListPayload{}\n\tv.Cursor = cursor\n\tv.Limit = limit\n\tv.Token = token\n\n\treturn v, nil\n}", "func BuildByVersionIDPayload(resourceByVersionIDVersionID string) (*resource.ByVersionIDPayload, error) {\n\tvar err error\n\tvar versionID uint\n\t{\n\t\tvar v uint64\n\t\tv, err = strconv.ParseUint(resourceByVersionIDVersionID, 10, 64)\n\t\tversionID = uint(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for versionID, must be UINT\")\n\t\t}\n\t}\n\tv := &resource.ByVersionIDPayload{}\n\tv.VersionID = versionID\n\n\treturn v, nil\n}", "func buildMessageStruct(message string) interface{} {\n\tvar data map[string]interface{}\n\terr := json.Unmarshal([]byte(message), &data)\n\n\tif err == nil {\n\t\t// Save parsed json\n\t\tdata[\"datetime\"] = time.Now().UTC()\n\t\treturn data\n\t} else {\n\t\t// Could not parse json, save entire message.\n\t\treturn common.LogRecord{\n\t\t\tMessage: message,\n\t\t\tDatetime: time.Now().UTC(),\n\t\t}\n\t}\n}", "func BuildRemoveStationPayload(projectRemoveStationProjectID string, projectRemoveStationStationID string, projectRemoveStationAuth string) (*project.RemoveStationPayload, error) {\n\tvar err error\n\tvar projectID int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(projectRemoveStationProjectID, 10, 32)\n\t\tprojectID = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for projectID, must be INT32\")\n\t\t}\n\t}\n\tvar stationID int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(projectRemoveStationStationID, 10, 32)\n\t\tstationID = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for stationID, must be INT32\")\n\t\t}\n\t}\n\tvar auth string\n\t{\n\t\tauth = projectRemoveStationAuth\n\t}\n\tv := &project.RemoveStationPayload{}\n\tv.ProjectID = projectID\n\tv.StationID = stationID\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func appendUFATransactionHistory(stub shim.ChaincodeStubInterface, ufanumber string, payload string) error {\r\n\tvar recordList []string\r\n\r\n\tlogger.Info(\"Appending to transaction history \" + ufanumber)\r\n\trecBytes, _ := stub.GetState(UFA_TRXN_PREFIX + ufanumber)\r\n\r\n\tif recBytes == nil {\r\n\t\tlogger.Info(\"Updating the transaction history for the first time\")\r\n\t\trecordList = make([]string, 0)\r\n\t} else {\r\n\t\terr := json.Unmarshal(recBytes, &recordList)\r\n\t\tif err != nil {\r\n\t\t\treturn errors.New(\"Failed to unmarshal appendUFATransactionHistory \")\r\n\t\t}\r\n\t}\r\n\trecordList = append(recordList, payload)\r\n\tbytesToStore, _ := json.Marshal(recordList)\r\n\tlogger.Info(\"After updating the transaction history\" + string(bytesToStore))\r\n\tstub.PutState(UFA_TRXN_PREFIX+ufanumber, bytesToStore)\r\n\tlogger.Info(\"Appending to transaction history \" + ufanumber + \" Done!!\")\r\n\treturn nil\r\n}", "func BuildCreatePayload(productCreateBody string, productCreateToken string) (*product.CreatePayload, error) {\n\tvar err error\n\tvar body CreateRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(productCreateBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"code\\\": \\\"123asd123123asd\\\",\\n \\\"cost_price\\\": 123,\\n \\\"founder_id\\\": \\\"519151ca-6250-4eec-8016-1e14a68dc448\\\",\\n \\\"image\\\": \\\"/images/123.jpg\\\",\\n \\\"is_shelves\\\": false,\\n \\\"market_price\\\": 123,\\n \\\"name\\\": \\\"灌装辣椒\\\",\\n \\\"note\\\": \\\"备注\\\",\\n \\\"size\\\": \\\"瓶\\\",\\n \\\"type\\\": 1,\\n \\\"unit\\\": 1\\n }'\")\n\t\t}\n\t\tif !(body.Unit == 1 || body.Unit == 2 || body.Unit == 3 || body.Unit == 4 || body.Unit == 5 || body.Unit == 6 || body.Unit == 7 || body.Unit == 8) {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidEnumValueError(\"body.unit\", body.Unit, []interface{}{1, 2, 3, 4, 5, 6, 7, 8}))\n\t\t}\n\t\tif !(body.Type == 1 || body.Type == 2 || body.Type == 3 || body.Type == 4 || body.Type == 5 || body.Type == 6 || body.Type == 7 || body.Type == 8) {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidEnumValueError(\"body.type\", body.Type, []interface{}{1, 2, 3, 4, 5, 6, 7, 8}))\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tvar token string\n\t{\n\t\ttoken = productCreateToken\n\t}\n\tv := &product.CreatePayload{\n\t\tName: body.Name,\n\t\tUnit: body.Unit,\n\t\tCostPrice: body.CostPrice,\n\t\tMarketPrice: body.MarketPrice,\n\t\tNote: body.Note,\n\t\tImage: body.Image,\n\t\tCode: body.Code,\n\t\tSize: body.Size,\n\t\tType: body.Type,\n\t\tIsShelves: body.IsShelves,\n\t\tFounderID: body.FounderID,\n\t}\n\tv.Token = token\n\n\treturn v, nil\n}", "func BuildGetPayload(stationGetID string, stationGetAuth string) (*station.GetPayload, error) {\n\tvar err error\n\tvar id int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(stationGetID, 10, 32)\n\t\tid = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for id, must be INT32\")\n\t\t}\n\t}\n\tvar auth *string\n\t{\n\t\tif stationGetAuth != \"\" {\n\t\t\tauth = &stationGetAuth\n\t\t}\n\t}\n\tv := &station.GetPayload{}\n\tv.ID = id\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func (p *Payload) InitPayload(TimeStamp string) {\n\tvar paraValue int64\n\n\tif len(TimeStamp) > 0 {\n\t\tparaValue, _ := strconv.ParseInt(TimeStamp, 10, 64) //\n\t\tp.Add(\"dtm\", paraValue)\n\t} else {\n\t\t// TODO(alexanderdean): what is http.Server.ReadTimeout?\n\t\tparaValue = time.Now().Unix() //- http.Server.ReadTimeout) * 1000\n\t\tp.Add(\"dtm\", paraValue)\n\t}\n\n}", "func (h *WebhookHandler) getPayload(r *http.Request) ([]byte, error) {\n\tswitch {\n\tcase h.Config.WebHookSecret != \"\":\n\t\treturn github.ValidatePayload(r, []byte(h.Config.WebHookSecret))\n\tdefault:\n\t\treturn ioutil.ReadAll(r.Body)\n\t}\n}", "func BuildListMinePayload(stationListMineAuth string) (*station.ListMinePayload, error) {\n\tvar auth string\n\t{\n\t\tauth = stationListMineAuth\n\t}\n\tv := &station.ListMinePayload{}\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func BuildListMinePayload(stationListMineAuth string) (*station.ListMinePayload, error) {\n\tvar auth string\n\t{\n\t\tauth = stationListMineAuth\n\t}\n\tv := &station.ListMinePayload{}\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func BuildAddStationPayload(projectAddStationProjectID string, projectAddStationStationID string, projectAddStationAuth string) (*project.AddStationPayload, error) {\n\tvar err error\n\tvar projectID int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(projectAddStationProjectID, 10, 32)\n\t\tprojectID = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for projectID, must be INT32\")\n\t\t}\n\t}\n\tvar stationID int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(projectAddStationStationID, 10, 32)\n\t\tstationID = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for stationID, must be INT32\")\n\t\t}\n\t}\n\tvar auth string\n\t{\n\t\tauth = projectAddStationAuth\n\t}\n\tv := &project.AddStationPayload{}\n\tv.ProjectID = projectID\n\tv.StationID = stationID\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func BuildRetryPayload(collectionRetryID string) (*collection.RetryPayload, error) {\n\tvar err error\n\tvar id uint\n\t{\n\t\tvar v uint64\n\t\tv, err = strconv.ParseUint(collectionRetryID, 10, strconv.IntSize)\n\t\tid = uint(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for id, must be UINT\")\n\t\t}\n\t}\n\tv := &collection.RetryPayload{}\n\tv.ID = id\n\n\treturn v, nil\n}", "func appendUFATransactionHistory(stub shim.ChaincodeStubInterface, ufanumber string, payload string) error {\n\tvar recordList []string\n\n\tlogger.Info(\"Appending to transaction history \" + ufanumber)\n\trecBytes, _ := stub.GetState(UFA_TRXN_PREFIX + ufanumber)\n\n\tif recBytes == nil {\n\t\tlogger.Info(\"Updating the transaction history for the first time\")\n\t\trecordList = make([]string, 0)\n\t} else {\n\t\terr := json.Unmarshal(recBytes, &recordList)\n\t\tif err != nil {\n\t\t\treturn errors.New(\"Failed to unmarshal appendUFATransactionHistory \")\n\t\t}\n\t}\n\trecordList = append(recordList, payload)\n\tbytesToStore, _ := json.Marshal(recordList)\n\tlogger.Info(\"After updating the transaction history\" + string(bytesToStore))\n\tstub.PutState(UFA_TRXN_PREFIX+ufanumber, bytesToStore)\n\tlogger.Info(\"Appending to transaction history \" + ufanumber + \" Done!!\")\n\treturn nil\n}", "func createPayload() *client.CreateWorkItemPayload {\n\treturn &client.CreateWorkItemPayload{\n\t\tType: \"system.bug\",\n\t\tFields: map[string]interface{}{\n\t\t\t\"system.title\": \"remove this TEST workitem PLEASE - OK\",\n\t\t\t\"system.owner\": \"BobbyOrr\",\n\t\t\t\"system.state\": \"open\",\n\t\t\t\"system.creator\": \"GordieHowe\",\n\t\t\t\"system.assignee\": \"WayneGretzky\",\n\t\t},\n\t}\n}", "func BuildStatusPayload(tasksStatusMessage string) (*tasks.StatusPayload, error) {\n\tvar err error\n\tvar message taskspb.StatusRequest\n\t{\n\t\tif tasksStatusMessage != \"\" {\n\t\t\terr = json.Unmarshal([]byte(tasksStatusMessage), &message)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"invalid JSON for message, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"id\\\": \\\"Rem assumenda deserunt doloremque.\\\",\\n \\\"status\\\": \\\"Closed\\\"\\n }'\")\n\t\t\t}\n\t\t}\n\t}\n\tv := &tasks.StatusPayload{\n\t\tID: message.Id,\n\t\tStatus: message.Status,\n\t}\n\n\treturn v, nil\n}", "func BuildTransferPayload(stationTransferID string, stationTransferOwnerID string, stationTransferAuth string) (*station.TransferPayload, error) {\n\tvar err error\n\tvar id int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(stationTransferID, 10, 32)\n\t\tid = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for id, must be INT32\")\n\t\t}\n\t}\n\tvar ownerID int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(stationTransferOwnerID, 10, 32)\n\t\townerID = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for ownerID, must be INT32\")\n\t\t}\n\t}\n\tvar auth string\n\t{\n\t\tauth = stationTransferAuth\n\t}\n\tv := &station.TransferPayload{}\n\tv.ID = id\n\tv.OwnerID = ownerID\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func BuildGetPayload(stationGetID string, stationGetAuth string) (*station.GetPayload, error) {\n\tvar err error\n\tvar id int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(stationGetID, 10, 32)\n\t\tid = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for id, must be INT32\")\n\t\t}\n\t}\n\tvar auth string\n\t{\n\t\tauth = stationGetAuth\n\t}\n\tv := &station.GetPayload{}\n\tv.ID = id\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func BuildModifyUpdatePayload(projectModifyUpdateBody string, projectModifyUpdateProjectID string, projectModifyUpdateUpdateID string, projectModifyUpdateAuth string) (*project.ModifyUpdatePayload, error) {\n\tvar err error\n\tvar body ModifyUpdateRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(projectModifyUpdateBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"body\\\": \\\"Quia atque est debitis earum a.\\\"\\n }'\")\n\t\t}\n\t}\n\tvar projectID int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(projectModifyUpdateProjectID, 10, 32)\n\t\tprojectID = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for projectID, must be INT32\")\n\t\t}\n\t}\n\tvar updateID int64\n\t{\n\t\tupdateID, err = strconv.ParseInt(projectModifyUpdateUpdateID, 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for updateID, must be INT64\")\n\t\t}\n\t}\n\tvar auth string\n\t{\n\t\tauth = projectModifyUpdateAuth\n\t}\n\tv := &project.ModifyUpdatePayload{\n\t\tBody: body.Body,\n\t}\n\tv.ProjectID = projectID\n\tv.UpdateID = updateID\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func (w *StatsWriter) buildPayloads(sp *pb.StatsPayload, maxEntriesPerPayload int) []*pb.StatsPayload {\n\tsplit := splitPayloads(sp.Stats, maxEntriesPerPayload)\n\tgrouped := make([]*pb.StatsPayload, 0, len(sp.Stats))\n\tcurrent := &pb.StatsPayload{\n\t\tAgentHostname: sp.AgentHostname,\n\t\tAgentEnv: sp.AgentEnv,\n\t\tAgentVersion: sp.AgentVersion,\n\t\tClientComputed: sp.ClientComputed,\n\t}\n\tvar nbEntries, nbBuckets int\n\taddPayload := func() {\n\t\tlog.Debugf(\"Flushing %d entries (buckets=%d client_payloads=%d)\", nbEntries, nbBuckets, len(current.Stats))\n\t\tw.stats.StatsBuckets.Add(int64(nbBuckets))\n\t\tw.stats.ClientPayloads.Add(int64(len(current.Stats)))\n\t\tw.stats.StatsEntries.Add(int64(nbEntries))\n\t\tgrouped = append(grouped, current)\n\t\tnbEntries = 0\n\t\tnbBuckets = 0\n\t\tcurrent = &pb.StatsPayload{\n\t\t\tAgentHostname: sp.AgentHostname,\n\t\t\tAgentEnv: sp.AgentEnv,\n\t\t\tAgentVersion: sp.AgentVersion,\n\t\t\tClientComputed: sp.ClientComputed,\n\t\t}\n\t}\n\tfor _, p := range split {\n\t\tif nbEntries+p.nbEntries > maxEntriesPerPayload {\n\t\t\taddPayload()\n\t\t}\n\t\tnbEntries += p.nbEntries\n\t\tnbBuckets += len(p.Stats)\n\t\tw.resolveContainerTags(p.ClientStatsPayload)\n\t\tcurrent.Stats = append(current.Stats, p.ClientStatsPayload)\n\t}\n\tif nbEntries > 0 {\n\t\taddPayload()\n\t}\n\tif len(grouped) > 1 {\n\t\tw.stats.Splits.Inc()\n\t}\n\treturn grouped\n}", "func parseHookPush(payload githubWebhook.PushPayload, client *authentication.Client) (*GeneralizedResult, error) {\n\tvar result = GeneralizedResult{}\n\n\tresult.AddedOrModifiedFiles = lookForYamlInArray(payload.HeadCommit.Added)\n\tmodifiedFiles := lookForYamlInArray(payload.HeadCommit.Modified)\n\n\tresult.AddedOrModifiedFiles = append(result.AddedOrModifiedFiles, modifiedFiles...)\n\n\tif len(result.AddedOrModifiedFiles) == 0 {\n\t\treturn nil, nil\n\t} else {\n\t\tcommitSha := payload.HeadCommit.ID\n\t\tbranchRef := payload.Ref\n\n\t\tresult.RepoName = payload.Repository.Name\n\t\tresult.OwnerName = payload.Repository.Owner.Login\n\t\tresult.UserName = payload.Pusher.Name\n\t\tresult.Sha = commitSha\n\t\tresult.Branch = branchRef\n\n\t\treturn &result, nil\n\t}\n}", "func BuildUpdatePayload(userUpdateMessage string, userUpdateToken string) (*user.UpdateUser, error) {\n\tvar err error\n\tvar message userpb.UpdateRequest\n\t{\n\t\tif userUpdateMessage != \"\" {\n\t\t\terr = json.Unmarshal([]byte(userUpdateMessage), &message)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"invalid JSON for message, example of valid JSON:\\n%s\", \"'{\\n \\\"avatar\\\": \\\"https://www.baidu.com/img/bd_logo1.png?where=super\\\",\\n \\\"nickname\\\": \\\"Bobby\\\"\\n }'\")\n\t\t\t}\n\t\t}\n\t}\n\tvar token string\n\t{\n\t\ttoken = userUpdateToken\n\t}\n\tv := &user.UpdateUser{\n\t\tAvatar: message.Avatar,\n\t\tNickname: message.Nickname,\n\t}\n\tv.Token = token\n\treturn v, nil\n}", "func BuildListPayload(groupListCursor string, groupListLimit string, groupListToken string) (*group.ListPayload, error) {\n\tvar err error\n\tvar cursor *int\n\t{\n\t\tif groupListCursor != \"\" {\n\t\t\tvar v int64\n\t\t\tv, err = strconv.ParseInt(groupListCursor, 10, 64)\n\t\t\tval := int(v)\n\t\t\tcursor = &val\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"invalid value for cursor, must be INT\")\n\t\t\t}\n\t\t}\n\t}\n\tvar limit *int\n\t{\n\t\tif groupListLimit != \"\" {\n\t\t\tvar v int64\n\t\t\tv, err = strconv.ParseInt(groupListLimit, 10, 64)\n\t\t\tval := int(v)\n\t\t\tlimit = &val\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"invalid value for limit, must be INT\")\n\t\t\t}\n\t\t}\n\t}\n\tvar token string\n\t{\n\t\ttoken = groupListToken\n\t}\n\tv := &group.ListPayload{}\n\tv.Cursor = cursor\n\tv.Limit = limit\n\tv.Token = token\n\n\treturn v, nil\n}", "func generateVersionFromPushData(payload api.WebhookGithub) (name string, description string,\n\tcommitID string) {\n\tcommit := payload[api.GithubWebhookFlagCommit].(map[string]interface{})\n\tref := payload[api.GithubWebhookFlagRef].(string)\n\n\t// generate name\n\tvar namePrefix string\n\tvar tagName string\n\tif isReleaseTag(api.GithubWebhookPush, payload) {\n\t\tnamePrefix = \"tag_\"\n\t\t// e.g. refs/tags/v0.12\n\t\ttagName = strings.SplitN(ref, \"/\", -1)[2]\n\t} else {\n\t\tnamePrefix = \"ci_\"\n\t}\n\n\tif nil != commit[\"id\"] {\n\t\tif \"\" != tagName && canBeUsedInImageTag(tagName) {\n\t\t\tname = namePrefix + tagName\n\t\t} else {\n\t\t\tname = namePrefix + commit[\"id\"].(string)\n\t\t}\n\t} else {\n\t\tname = namePrefix + uuid.NewV4().String()\n\t}\n\n\t// generate description\n\tif nil != commit[\"message\"] {\n\t\tdescription = commit[\"message\"].(string)\n\t} else {\n\t\tdescription = \"\"\n\t}\n\tif nil != commit[\"id\"] {\n\t\tcommitID = commit[\"id\"].(string)\n\t\tdescription = description + \"\\r\\n\" + commit[\"id\"].(string)\n\t}\n\n\tlog.Infof(\"webhook push event: name[%s] description[%s] commit[%s]\", name, description, commitID)\n\treturn name, description, commitID\n}", "func BuildGetPayload(productGetID string, productGetToken string) (*product.GetPayload, error) {\n\tvar id string\n\t{\n\t\tid = productGetID\n\t}\n\tvar token string\n\t{\n\t\ttoken = productGetToken\n\t}\n\tv := &product.GetPayload{}\n\tv.ID = id\n\tv.Token = token\n\n\treturn v, nil\n}", "func (j *JobDetails) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", j, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"actions\":\n\t\t\terr = unpopulate(val, \"Actions\", &j.Actions)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"chainOfCustodySasKey\":\n\t\t\terr = unpopulate(val, \"ChainOfCustodySasKey\", &j.ChainOfCustodySasKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"contactDetails\":\n\t\t\terr = unpopulate(val, \"ContactDetails\", &j.ContactDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"copyLogDetails\":\n\t\t\tj.CopyLogDetails, err = unmarshalCopyLogDetailsClassificationArray(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"copyProgress\":\n\t\t\terr = unpopulate(val, \"CopyProgress\", &j.CopyProgress)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataCenterCode\":\n\t\t\terr = unpopulate(val, \"DataCenterCode\", &j.DataCenterCode)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataExportDetails\":\n\t\t\terr = unpopulate(val, \"DataExportDetails\", &j.DataExportDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dataImportDetails\":\n\t\t\terr = unpopulate(val, \"DataImportDetails\", &j.DataImportDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"datacenterAddress\":\n\t\t\tj.DatacenterAddress, err = unmarshalDatacenterAddressResponseClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"deliveryPackage\":\n\t\t\terr = unpopulate(val, \"DeliveryPackage\", &j.DeliveryPackage)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"deviceErasureDetails\":\n\t\t\terr = unpopulate(val, \"DeviceErasureDetails\", &j.DeviceErasureDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"devicePassword\":\n\t\t\terr = unpopulate(val, \"DevicePassword\", &j.DevicePassword)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"expectedDataSizeInTeraBytes\":\n\t\t\terr = unpopulate(val, \"ExpectedDataSizeInTeraBytes\", &j.ExpectedDataSizeInTeraBytes)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"jobDetailsType\":\n\t\t\terr = unpopulate(val, \"JobDetailsType\", &j.JobDetailsType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"jobStages\":\n\t\t\terr = unpopulate(val, \"JobStages\", &j.JobStages)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"keyEncryptionKey\":\n\t\t\terr = unpopulate(val, \"KeyEncryptionKey\", &j.KeyEncryptionKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"lastMitigationActionOnJob\":\n\t\t\terr = unpopulate(val, \"LastMitigationActionOnJob\", &j.LastMitigationActionOnJob)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"preferences\":\n\t\t\terr = unpopulate(val, \"Preferences\", &j.Preferences)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"returnPackage\":\n\t\t\terr = unpopulate(val, \"ReturnPackage\", &j.ReturnPackage)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"reverseShipmentLabelSasKey\":\n\t\t\terr = unpopulate(val, \"ReverseShipmentLabelSasKey\", &j.ReverseShipmentLabelSasKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"shippingAddress\":\n\t\t\terr = unpopulate(val, \"ShippingAddress\", &j.ShippingAddress)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", j, err)\n\t\t}\n\t}\n\treturn nil\n}", "func BuildCreatePayload(salesCreateBody string, salesCreateToken string) (*sales.CreatePayload, error) {\n\tvar err error\n\tvar body CreateRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(salesCreateBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"code\\\": \\\"123asd123123asd\\\",\\n \\\"consignment_date\\\": \\\"2021-01-01\\\",\\n \\\"customer_id\\\": \\\"519151ca-6250-4eec-8016-1e14a68dc448\\\",\\n \\\"founder_id\\\": \\\"519151ca-6250-4eec-8016-1e14a68dc448\\\",\\n \\\"head_id\\\": \\\"519151ca-6250-4eec-8016-1e14a68dc448\\\",\\n \\\"is_sales_return\\\": false,\\n \\\"money\\\": 123,\\n \\\"name\\\": \\\"xx销售\\\",\\n \\\"note\\\": \\\"备注\\\"\\n }'\")\n\t\t}\n\t\tif !(body.IsSalesReturn == false || body.IsSalesReturn == true) {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidEnumValueError(\"body.is_sales_return\", body.IsSalesReturn, []interface{}{false, true}))\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tvar token string\n\t{\n\t\ttoken = salesCreateToken\n\t}\n\tv := &sales.CreatePayload{\n\t\tName: body.Name,\n\t\tCode: body.Code,\n\t\tCustomerID: body.CustomerID,\n\t\tMoney: body.Money,\n\t\tConsignmentDate: body.ConsignmentDate,\n\t\tIsSalesReturn: body.IsSalesReturn,\n\t\tNote: body.Note,\n\t\tHeadID: body.HeadID,\n\t\tFounderID: body.FounderID,\n\t}\n\tv.Token = token\n\n\treturn v, nil\n}", "func updateStepFromBuild(step *bbpb.Step, build *bbpb.Build) {\n\tif protoutil.IsEnded(step.Status) {\n\t\treturn\n\t}\n\tstep.SummaryMarkdown = build.SummaryMarkdown\n\tstep.Status = build.Status\n\tstep.EndTime = build.EndTime\n\tfor _, log := range build.Output.GetLogs() {\n\t\tstep.Logs = append(step.Logs, log)\n\t}\n}", "func BuildAddUpdatePayload(projectAddUpdateBody string, projectAddUpdateProjectID string, projectAddUpdateAuth string) (*project.AddUpdatePayload, error) {\n\tvar err error\n\tvar body AddUpdateRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(projectAddUpdateBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"body\\\": \\\"Amet cumque non dolorem deleniti consectetur ducimus.\\\"\\n }'\")\n\t\t}\n\t}\n\tvar projectID int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(projectAddUpdateProjectID, 10, 32)\n\t\tprojectID = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for projectID, must be INT32\")\n\t\t}\n\t}\n\tvar auth string\n\t{\n\t\tauth = projectAddUpdateAuth\n\t}\n\tv := &project.AddUpdatePayload{\n\t\tBody: body.Body,\n\t}\n\tv.ProjectID = projectID\n\tv.Auth = auth\n\n\treturn v, nil\n}", "func UnmarshalJob(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(Job)\n\terr = core.UnmarshalPrimitive(m, \"command_object\", &obj.CommandObject)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_object_id\", &obj.CommandObjectID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_name\", &obj.CommandName)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_parameter\", &obj.CommandParameter)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"command_options\", &obj.CommandOptions)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"inputs\", &obj.Inputs, UnmarshalVariableData)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"settings\", &obj.Settings, UnmarshalVariableData)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"tags\", &obj.Tags)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"id\", &obj.ID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"name\", &obj.Name)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"description\", &obj.Description)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"location\", &obj.Location)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"resource_group\", &obj.ResourceGroup)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"submitted_at\", &obj.SubmittedAt)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"submitted_by\", &obj.SubmittedBy)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"start_at\", &obj.StartAt)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"end_at\", &obj.EndAt)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"duration\", &obj.Duration)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"status\", &obj.Status, UnmarshalJobStatus)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"data\", &obj.Data, UnmarshalJobData)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"targets_ini\", &obj.TargetsIni)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"bastion\", &obj.Bastion, UnmarshalTargetResourceset)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"log_summary\", &obj.LogSummary, UnmarshalJobLogSummary)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"log_store_url\", &obj.LogStoreURL)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"state_store_url\", &obj.StateStoreURL)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"results_url\", &obj.ResultsURL)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"updated_at\", &obj.UpdatedAt)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func BuildRemovePayload(tasksRemoveMessage string) (*tasks.RemovePayload, error) {\n\tvar err error\n\tvar message taskspb.RemoveRequest\n\t{\n\t\tif tasksRemoveMessage != \"\" {\n\t\t\terr = json.Unmarshal([]byte(tasksRemoveMessage), &message)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"invalid JSON for message, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"id\\\": \\\"Vel veritatis ea assumenda vitae.\\\"\\n }'\")\n\t\t\t}\n\t\t}\n\t}\n\tv := &tasks.RemovePayload{\n\t\tID: message.Id,\n\t}\n\n\treturn v, nil\n}", "func BuildQueryPayload(resourceQueryName string, resourceQueryType string, resourceQueryLimit string) (*resource.QueryPayload, error) {\n\tvar err error\n\tvar name string\n\t{\n\t\tif resourceQueryName != \"\" {\n\t\t\tname = resourceQueryName\n\t\t}\n\t}\n\tvar type_ string\n\t{\n\t\tif resourceQueryType != \"\" {\n\t\t\ttype_ = resourceQueryType\n\t\t\tif !(type_ == \"task\" || type_ == \"pipeline\" || type_ == \"\") {\n\t\t\t\terr = goa.MergeErrors(err, goa.InvalidEnumValueError(\"type_\", type_, []interface{}{\"task\", \"pipeline\", \"\"}))\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t}\n\tvar limit uint\n\t{\n\t\tif resourceQueryLimit != \"\" {\n\t\t\tvar v uint64\n\t\t\tv, err = strconv.ParseUint(resourceQueryLimit, 10, 64)\n\t\t\tlimit = uint(v)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"invalid value for limit, must be UINT\")\n\t\t\t}\n\t\t}\n\t}\n\tv := &resource.QueryPayload{}\n\tv.Name = name\n\tv.Type = type_\n\tv.Limit = limit\n\n\treturn v, nil\n}", "func (s *Service) TogetherHistory(c context.Context, res []*hismodle.Resource, mid, build int64, platform string, plat int8) (data []*history.ListRes) {\n\tvar (\n\t\taids []int64\n\t\tepids []int64\n\t\tarticleIDs []int64\n\t\troomIDs []int64\n\t\tarchive map[int64]*arcmdl.View3\n\t\tpgcInfo map[int64]*history.PGCRes\n\t\tarticle map[int64]*artmodle.Meta\n\t\tlive map[int64]*livemdl.RoomInfo\n\t)\n\ti := 0\n\tfor _, his := range res {\n\t\ti++\n\t\t//由于出现过history吐出数量无限制,限制请求archive的数量逻辑保留\n\t\tif i > 80 {\n\t\t\tbreak\n\t\t}\n\t\tswitch his.TP {\n\t\tcase _tpOld, _tpOffline, _tpArchive:\n\t\t\taids = append(aids, his.Oid)\n\t\tcase _tpPGC:\n\t\t\taids = append(aids, his.Oid) //用cid拿时长duration\n\t\t\tepids = append(epids, his.Epid)\n\t\tcase _tpArticle:\n\t\t\tarticleIDs = append(articleIDs, his.Oid)\n\t\tcase _tpLive:\n\t\t\troomIDs = append(roomIDs, his.Oid)\n\t\tcase _tpCorpus:\n\t\t\tarticleIDs = append(articleIDs, his.Cid)\n\t\tdefault:\n\t\t\tlog.Warn(\"unknow history type(%d) msg(%+v)\", his.TP, his)\n\t\t}\n\t}\n\teg, ctx := errgroup.WithContext(c)\n\tif len(aids) > 0 {\n\t\teg.Go(func() (err error) {\n\t\t\tarchive, err = s.historyDao.Archive(ctx, aids)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(\"%+v\", err)\n\t\t\t\terr = nil\n\t\t\t}\n\t\t\treturn\n\t\t})\n\t}\n\tif len(epids) > 0 {\n\t\teg.Go(func() (err error) {\n\t\t\tpgcInfo, err = s.historyDao.PGC(ctx, xstr.JoinInts(epids), platform, build, mid)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(\"%+v\", err)\n\t\t\t\terr = nil\n\t\t\t}\n\t\t\treturn\n\t\t})\n\t}\n\tif len(articleIDs) > 0 {\n\t\teg.Go(func() (err error) {\n\t\t\tarticle, err = s.historyDao.Article(ctx, articleIDs)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(\"%+v\", err)\n\t\t\t\terr = nil\n\t\t\t}\n\t\t\treturn\n\t\t})\n\t}\n\tif len(roomIDs) > 0 {\n\t\teg.Go(func() (err error) {\n\t\t\tlive, err = s.liveDao.LiveByRIDs(ctx, roomIDs)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(\"%+v\", err)\n\t\t\t\terr = nil\n\t\t\t}\n\t\t\treturn\n\t\t})\n\t}\n\teg.Wait()\n\tfor _, his := range res {\n\t\t// 国际版不出直播\n\t\tif plat == model.PlatAndroidI && his.TP == _tpLive {\n\t\t\tcontinue\n\t\t}\n\t\ttmpInfo := &history.ListRes{\n\t\t\tGoto: gotoDesc[his.TP],\n\t\t\tViewAt: his.Unix,\n\t\t}\n\t\ttmpInfo.History.Oid = his.Oid\n\t\ttmpInfo.History.Tp = his.TP\n\t\ttmpInfo.History.Business = his.Business\n\t\tswitch his.TP {\n\t\tcase _tpOld, _tpOffline, _tpArchive:\n\t\t\tarc, ok := archive[his.Oid]\n\t\t\tif !ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ttmpInfo.Title = arc.Title\n\t\t\ttmpInfo.Cover = arc.Pic\n\t\t\ttmpInfo.Mid = arc.Author.Mid\n\t\t\ttmpInfo.Name = arc.Author.Name\n\t\t\ttmpInfo.Progress = his.Pro\n\t\t\ttmpInfo.Videos = arc.Videos\n\t\t\tfor _, p := range arc.Pages {\n\t\t\t\tif p.Cid == his.Cid {\n\t\t\t\t\ttmpInfo.Duration = p.Duration\n\t\t\t\t\ttmpInfo.History.Cid = p.Cid\n\t\t\t\t\ttmpInfo.History.Page = p.Page\n\t\t\t\t\ttmpInfo.History.Part = p.Part\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\ttmpInfo.URI = model.FillURI(tmpInfo.Goto, strconv.FormatInt(his.Oid, 10), model.AvHandler(arc.Archive3))\n\t\tcase _tpPGC:\n\t\t\tpgc, okPGC := pgcInfo[his.Epid]\n\t\t\tarc, okArc := archive[his.Oid]\n\t\t\tif !okPGC || !okArc {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ttmpInfo.Title = pgc.Title\n\t\t\ttmpInfo.ShowTitle = pgc.ShowTitle\n\t\t\ttmpInfo.Cover = pgc.Cover\n\t\t\ttmpInfo.Badge = badge[his.STP]\n\t\t\ttmpInfo.Progress = his.Pro\n\t\t\ttmpInfo.URI = model.FillURI(tmpInfo.Goto, strconv.FormatInt(his.Sid, 10), nil)\n\t\t\tfor _, p := range arc.Pages {\n\t\t\t\tif p.Cid == his.Cid {\n\t\t\t\t\ttmpInfo.Duration = p.Duration\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\tcase _tpArticle:\n\t\t\tart, ok := article[his.Oid]\n\t\t\tif !ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ttmpInfo.Title = art.Title\n\t\t\ttmpInfo.Covers = art.ImageURLs\n\t\t\ttmpInfo.Mid = art.Author.Mid\n\t\t\ttmpInfo.Name = art.Author.Name\n\t\t\ttmpInfo.Badge = \"专栏\"\n\t\t\ttmpInfo.URI = model.FillURI(tmpInfo.Goto, strconv.FormatInt(his.Oid, 10), nil)\n\t\tcase _tpLive:\n\t\t\tlv, ok := live[his.Oid]\n\t\t\tif !ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ttmpInfo.Title = lv.Title\n\t\t\ttmpInfo.Cover = lv.UserCover\n\t\t\tif lv.UserCover == \"\" {\n\t\t\t\ttmpInfo.Cover = lv.Cover\n\t\t\t}\n\t\t\ttmpInfo.Mid = lv.Mid\n\t\t\ttmpInfo.Name = lv.Name\n\t\t\ttmpInfo.TagName = lv.TagName\n\t\t\tif lv.Status == 1 { //1是直播中,0、2是未开播\n\t\t\t\ttmpInfo.LiveStatus = 1\n\t\t\t}\n\t\t\tif model.IsAndroid(plat) && build < _androidBroadcast {\n\t\t\t\tlv = nil\n\t\t\t}\n\t\t\ttmpInfo.URI = model.FillURI(tmpInfo.Goto, strconv.FormatInt(his.Oid, 10), model.LiveHandler(lv))\n\t\tcase _tpCorpus:\n\t\t\tart, ok := article[his.Cid]\n\t\t\tif !ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ttmpInfo.Title = art.Title\n\t\t\ttmpInfo.Covers = art.ImageURLs\n\t\t\ttmpInfo.Mid = art.Author.Mid\n\t\t\ttmpInfo.Name = art.Author.Name\n\t\t\ttmpInfo.Badge = \"专栏\"\n\t\t\ttmpInfo.URI = model.FillURI(\"article\", strconv.FormatInt(his.Cid, 10), nil)\n\t\tdefault:\n\t\t\tcontinue\n\t\t}\n\t\tdata = append(data, tmpInfo)\n\t}\n\treturn\n}", "func (b *Bot) parseData(data map[string]interface{}) *eventPayload {\n\treturn data[\"payload\"].(*eventPayload)\n}", "func (rlman *RlManifest) Payloads(session_dir string) []string {\n var payload []string \n var w32system_file string \n\n for _,ag := range rlman.Audits {\n for _,p := range ag.AuditResults {\n if !strings.Contains(p.Payload, \"issue\") {\n payload = append(payload, p.Payload)\n\n if ag.Generator == \"w32system\" {\n w32system_file = p.Payload\n }\n }\n }\n }\n \n xmlData,_ := ioutil.ReadFile(filepath.Join(session_dir, w32system_file))\n xml.Unmarshal(xmlData, &rlman.SysInfo)\n\n return payload\n}", "func BuildCreatePayload(groupCreateBody string, groupCreateToken string) (*group.CreatePayload, error) {\n\tvar err error\n\tvar body CreateRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(groupCreateBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"name\\\": \\\"张三\\\"\\n }'\")\n\t\t}\n\t}\n\tvar token string\n\t{\n\t\ttoken = groupCreateToken\n\t}\n\tv := &group.CreatePayload{\n\t\tName: body.Name,\n\t}\n\tv.Token = token\n\n\treturn v, nil\n}", "func BuildUpdatePayload(tasksUpdateMessage string) (*tasks.UpdatePayload, error) {\n\tvar err error\n\tvar message taskspb.UpdateRequest\n\t{\n\t\tif tasksUpdateMessage != \"\" {\n\t\t\terr = json.Unmarshal([]byte(tasksUpdateMessage), &message)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"invalid JSON for message, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"id\\\": \\\"Et unde velit sapiente voluptatum.\\\",\\n \\\"task\\\": {\\n \\\"assignee\\\": {\\n \\\"email\\\": \\\"[email protected]\\\",\\n \\\"firstname\\\": \\\"Ehab\\\",\\n \\\"isactive\\\": false,\\n \\\"lastname\\\": \\\"Terra\\\",\\n \\\"role\\\": \\\"admin\\\"\\n },\\n \\\"created_date\\\": \\\"1977-08-23T17:31:33Z\\\",\\n \\\"description\\\": \\\"Task description\\\",\\n \\\"due_date\\\": \\\"1994-02-04T20:22:05Z\\\",\\n \\\"id\\\": \\\"Dolor eos dolorem numquam odio aspernatur et.\\\",\\n \\\"owner\\\": {\\n \\\"email\\\": \\\"[email protected]\\\",\\n \\\"firstname\\\": \\\"Ehab\\\",\\n \\\"isactive\\\": false,\\n \\\"lastname\\\": \\\"Terra\\\",\\n \\\"role\\\": \\\"admin\\\"\\n },\\n \\\"status\\\": \\\"Pending\\\",\\n \\\"title\\\": \\\"New task title\\\",\\n \\\"updated_date\\\": \\\"1994-11-14T18:35:02Z\\\"\\n }\\n }'\")\n\t\t\t}\n\t\t}\n\t}\n\tv := &tasks.UpdatePayload{\n\t\tID: message.Id,\n\t}\n\tif message.Task != nil {\n\t\tv.Task = protobufTaskspbStoredTaskToTasksStoredTask(message.Task)\n\t}\n\n\treturn v, nil\n}", "func BuildDownloadPhotoPayload(stationDownloadPhotoStationID string, stationDownloadPhotoSize string, stationDownloadPhotoIfNoneMatch string, stationDownloadPhotoAuth string) (*station.DownloadPhotoPayload, error) {\n\tvar err error\n\tvar stationID int32\n\t{\n\t\tvar v int64\n\t\tv, err = strconv.ParseInt(stationDownloadPhotoStationID, 10, 32)\n\t\tstationID = int32(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid value for stationID, must be INT32\")\n\t\t}\n\t}\n\tvar size *int32\n\t{\n\t\tif stationDownloadPhotoSize != \"\" {\n\t\t\tvar v int64\n\t\t\tv, err = strconv.ParseInt(stationDownloadPhotoSize, 10, 32)\n\t\t\tval := int32(v)\n\t\t\tsize = &val\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"invalid value for size, must be INT32\")\n\t\t\t}\n\t\t}\n\t}\n\tvar ifNoneMatch *string\n\t{\n\t\tif stationDownloadPhotoIfNoneMatch != \"\" {\n\t\t\tifNoneMatch = &stationDownloadPhotoIfNoneMatch\n\t\t}\n\t}\n\tvar auth *string\n\t{\n\t\tif stationDownloadPhotoAuth != \"\" {\n\t\t\tauth = &stationDownloadPhotoAuth\n\t\t}\n\t}\n\tv := &station.DownloadPhotoPayload{}\n\tv.StationID = stationID\n\tv.Size = size\n\tv.IfNoneMatch = ifNoneMatch\n\tv.Auth = auth\n\n\treturn v, nil\n}" ]
[ "0.6444598", "0.61195797", "0.591153", "0.5564126", "0.553522", "0.5510273", "0.54956645", "0.5443481", "0.5432882", "0.54325616", "0.5371446", "0.53668666", "0.53651106", "0.5333969", "0.53111106", "0.530556", "0.5295336", "0.5268609", "0.52394277", "0.5233409", "0.5230188", "0.52196693", "0.52035135", "0.51950806", "0.51873547", "0.51843715", "0.51644456", "0.5149501", "0.5141285", "0.5138226", "0.5106107", "0.5103162", "0.50943077", "0.5090898", "0.5081356", "0.5067284", "0.5051328", "0.5042203", "0.50394493", "0.5034541", "0.5001101", "0.49883932", "0.49846444", "0.49808055", "0.49684143", "0.49629787", "0.49612054", "0.49581426", "0.49556774", "0.4954114", "0.49495438", "0.49486896", "0.49467954", "0.4938986", "0.4936336", "0.49359953", "0.49297073", "0.49240923", "0.4921025", "0.49127993", "0.49050638", "0.4902976", "0.4888763", "0.48881444", "0.48813438", "0.48775932", "0.48767313", "0.48744136", "0.4868776", "0.48650688", "0.48642105", "0.4862239", "0.4862239", "0.48614022", "0.48609313", "0.48578897", "0.48554248", "0.48547283", "0.4853214", "0.48460647", "0.48389786", "0.48374885", "0.48371637", "0.4836676", "0.48294798", "0.4825782", "0.4822377", "0.4819786", "0.4815638", "0.48138675", "0.48103464", "0.47972777", "0.47963673", "0.47895148", "0.4788089", "0.47860095", "0.47761515", "0.4772893", "0.4767712", "0.47666344" ]
0.63964427
1
Process loads and processes the results from the scanner. This includes updating the status of the associated JIRA ticket as well as creating exceptions in the ignore table if the asset is discovered to be decommissioned
func (job *ScanCloseJob) Process(ctx context.Context, id string, appconfig domain.Config, db domain.DatabaseConnection, lstream log.Logger, payload string, jobConfig domain.JobConfig, inSource []domain.SourceConfig, outSource []domain.SourceConfig) (err error) { var ok bool if job.ctx, job.id, job.appconfig, job.db, job.lstream, job.payloadJSON, job.config, job.insource, job.outsource, ok = validInputs(ctx, id, appconfig, db, lstream, payload, jobConfig, inSource, outSource); ok { if err = job.buildPayload(job.payloadJSON); err == nil { var vscanner integrations.Vscanner if vscanner, err = integrations.NewVulnScanner(job.ctx, job.insource.Source(), job.db, job.lstream, job.appconfig, job.insource); err == nil { job.lstream.Send(log.Debug("Scanning Engine Connection Initialized")) var engine integrations.TicketingEngine if engine, err = integrations.GetEngine(job.ctx, job.outsource.Source(), job.db, job.lstream, job.appconfig, job.outsource); err == nil { job.lstream.Send(log.Debug("Ticketing Engine Connection Initialized")) var tickets []domain.Ticket if tickets, err = loadTickets(job.lstream, engine, job.Payload.Tickets); err == nil { var additionalTickets []domain.Ticket if additionalTickets, err = job.loadAdditionalTickets(engine, tickets); err == nil { tickets = append(tickets, additionalTickets...) job.lstream.Send(log.Debugf("Loading scan [Id: %v] details.", job.Payload.ScanID)) var scan domain.ScanSummary if scan, err = job.getScanFromPayload(); err == nil { job.processScanDetections(engine, vscanner, tickets, scan) } else { job.lstream.Send(log.Error("error while grabbing scan information from the database", err)) } } else { job.lstream.Send(log.Errorf(err, "error while loading additional tickets for the scan")) } } else { job.lstream.Send(log.Errorf(err, "error while loading tickets for the scan")) } } else { job.lstream.Send(log.Errorf(err, "error while creating the ticketing connection")) } } else { job.lstream.Send(log.Errorf(err, "error while creating the vulnerability scanner")) } } else { err = fmt.Errorf("error while building payload - %s", err.Error()) } } else { err = fmt.Errorf("input validation failed") } return err }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func handleResults(result hooks.InternalMessage) {\n\tres, ok := result.Results.(TableRow)\n\tmanager.Status.AddCurrentScans(-1)\n\n\tif !ok {\n\t\tmanager.Logger.Errorf(\"Couldn't assert type of result for %v\", result.Domain.DomainName)\n\t\tres = TableRow{}\n\t\tresult.StatusCode = hooks.InternalFatalError\n\t}\n\n\tswitch result.StatusCode {\n\tcase hooks.InternalFatalError:\n\t\tres.ScanStatus = hooks.StatusError\n\t\tmanager.Status.AddFatalErrorScans(1)\n\t\tmanager.Logger.Infof(\"Assessment of %v failed ultimately\", result.Domain.DomainName)\n\tcase hooks.InternalSuccess:\n\t\tres.ScanStatus = hooks.StatusDone\n\t\tmanager.Logger.Debugf(\"Assessment of %v was successful\", result.Domain.DomainName)\n\t\tmanager.Status.AddFinishedScans(1)\n\t}\n\twhere := hooks.ScanWhereCond{\n\t\tDomainID: result.Domain.DomainID,\n\t\tScanID: manager.ScanID,\n\t\tTestWithSSL: result.Domain.TestWithSSL}\n\terr := backend.SaveResults(manager.GetTableName(), structs.New(where), structs.New(res))\n\tif err != nil {\n\t\tmanager.Logger.Errorf(\"Couldn't save results for %v: %v\", result.Domain.DomainName, err)\n\t\treturn\n\t}\n\tmanager.Logger.Debugf(\"Results for %v saved\", result.Domain.DomainName)\n\n}", "func (job *JOB) Process(ctx context.Context, rsp *http.Response) error {\n\tif rsp.StatusCode != http.StatusOK {\n\t\treturn errors.New(rsp.Status)\n\t}\n\tdefer rsp.Body.Close()\n\n\tvar result Result\n\tif err := json.NewDecoder(rsp.Body).Decode(&result); err != nil {\n\t\treturn errors.Annotate(err, \"json decode\")\n\t}\n\tlog.Println(\"Parks count:\", len(result.Items[0].Parks))\n\tfor _, item := range result.Items {\n\t\tfor _, park := range item.Parks {\n\t\t\tif err := job.updateParkStatus(ctx, park); err != nil {\n\t\t\t\tlog.Println(\"WARN: park status refresh failed: \", err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "func (job *ScanCloseJob) modifyJiraTicketAccordingToVulnerabilityStatus(engine integrations.TicketingEngine, ticket domain.Ticket, scan domain.ScanSummary, deadHostIPToProofMap map[string]string, deviceIDToVulnIDToDetection map[string]map[string]domain.Detection) {\n\tvar detectionsFoundForDevice = deviceIDToVulnIDToDetection[ticket.DeviceID()] != nil\n\tvar deviceReportedAsDead = len(deadHostIPToProofMap[sord(ticket.IPAddress())]) > 0 && len(sord(ticket.IPAddress())) > 0\n\n\tvar detection domain.Detection\n\tif detectionsFoundForDevice {\n\t\tdetection = deviceIDToVulnIDToDetection[ticket.DeviceID()][combineVulnerabilityIDAndServicePortTicket(ticket)]\n\t}\n\n\tvar err error\n\tvar status string\n\tvar inactiveKernel bool\n\tif detection != nil {\n\t\tstatus = detection.Status()\n\t\tinactiveKernel = iord(detection.ActiveKernel()) > 0\n\n\t\tif detection.LastFound() != nil && !detection.LastFound().IsZero() && detection.LastFound().After(tord1970(ticket.AlertDate())) {\n\t\t\tticket = &lastUpdatedTicket{\n\t\t\t\tTicket: ticket,\n\t\t\t\tlastUpdated: *detection.LastFound(),\n\t\t\t}\n\n\t\t\t_, _, err := engine.UpdateTicket(ticket, \"\")\n\t\t\tif err != nil {\n\t\t\t\tjob.lstream.Send(log.Errorf(err, \"error while setting last found date of %s to [%s]\", ticket.Title(), detection.LastFound().String()))\n\t\t\t}\n\t\t}\n\t}\n\n\tif detectionsFoundForDevice || deviceReportedAsDead {\n\t\tswitch job.Payload.Type {\n\t\tcase domain.RescanNormal:\n\t\t\tjob.processTicketForNormalRescan(deadHostIPToProofMap, ticket, detection, err, engine, status, inactiveKernel, scan)\n\t\tcase domain.RescanDecommission:\n\t\t\tjob.processTicketForDecommRescan(deadHostIPToProofMap, ticket, detection, err, engine, scan, status)\n\t\tcase domain.RescanExceptions:\n\t\t\tjob.processTicketForPassiveOrExceptionRescan(deadHostIPToProofMap, ticket, detection, err, engine, status, inactiveKernel, scan)\n\t\tcase domain.RescanPassive:\n\t\t\tjob.processTicketForPassiveOrExceptionRescan(deadHostIPToProofMap, ticket, detection, err, engine, status, inactiveKernel, scan)\n\t\tdefault:\n\t\t\tjob.lstream.Send(log.Critical(fmt.Sprintf(\"Unrecognized scan type [%s]\", job.Payload.Type), nil))\n\t\t}\n\t} else {\n\t\tjob.lstream.Send(log.Errorf(err, \"scan [%s] did not seem to cover the device %v - scanner did not report any data for device\", job.Payload.ScanID, ticket.DeviceID()))\n\t\terr = engine.Transition(ticket, engine.GetStatusMap(domain.StatusScanError), fmt.Sprintf(\"scan [%s] did not cover the device %v. Please make sure this asset is still in-scope and associated with an asset group. If this asset is out of scope, please move this ticket to NOTAVRR status or alert the vulnerability management team.\", job.Payload.ScanID, ticket.DeviceID()), sord(ticket.AssignedTo()))\n\t\tif err != nil {\n\t\t\tjob.lstream.Send(log.Errorf(err, \"error while adding comment to ticket [%s]\", ticket.Title()))\n\t\t}\n\t}\n\n}", "func (s *scanner) Execute(ctx context.Context) error {\n\tissReqs, err := s.scan()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tn := len(issReqs)\n\tif n > 0 {\n\t\tlog.Printf(\"%d new errors detected\\n\", n)\n\n\t\tfor _, issReq := range issReqs {\n\t\t\t_, _, err = s.client.Issues.Create(ctx, s.service.repoOwner, s.service.repoName, issReq)\n\t\t\tif err != nil {\n\t\t\t\tlog.Printf(\"%s\\n\", err.Error())\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func Process(ctx context.Context, userId int, resourceTypeString string) ([]utils.TaggingReportDocument, error) {\n\tlogger := jsonlog.LoggerFromContextOrDefault(ctx)\n\tlogger.Info(\"Processing reports.\", map[string]interface{}{\n\t\t\"type\": resourceTypeString,\n\t})\n\n\thits, err := fetchReports(ctx, userId)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar documents []utils.TaggingReportDocument\n\tfor _, hit := range hits {\n\t\tdocument, success := processHit(ctx, hit, resourceTypeString)\n\t\tif success {\n\t\t\tdocuments = append(documents, document)\n\t\t}\n\t}\n\n\tlogger.Info(\"Reports processed.\", map[string]interface{}{\n\t\t\"type\": resourceTypeString,\n\t\t\"count\": len(documents),\n\t})\n\treturn documents, nil\n}", "func (s *Server) processScanFile(msg message.Message, db *database.DataStore) {\n\tlog.Debugf(\"[%s] Processing ScanFile response\", msg.ULID)\n\tif s.checkMsgErr(msg, models.Failed, db) {\n\t\t// TODO: Can I recover this? Should I ignore?\n\t\tmsg.Result = \"KO\"\n\t} else {\n\t\tif s.saveResult(msg, db) {\n\t\t\tmsg.Result = \"OK\"\n\t\t} else {\n\t\t\t// TODO: Request a new scan due errors while saving the report\n\t\t\tlog.Errorf(\"[%s] Error on processScanFile\", msg.ULID)\n\t\t}\n\t}\n\t// TODO:\n\t// - check error\n\t// - save the result\n\t// - send a message back\n\ts.w.Encode(msg)\n}", "func main() {\n\n\tvar url string\n\tvar username string\n\tvar path string\n\tfmt.Printf(\"Path to csv file: \")\n\tfmt.Scanln(&path)\n\tfmt.Printf(\"Enter Jira URL: \")\n\tfmt.Scanln(&url)\n\tfmt.Printf(\"Enter Username: \")\n\tfmt.Scanln(&username)\n\tfmt.Printf(\"Enter Password: \")\n\tpasswd, _ := terminal.ReadPassword(int(syscall.Stdin))\n\tpassword := string(passwd)\n\ttp := jira.BasicAuthTransport{\n\t\tUsername: username,\n\t\tPassword: password,\n\t}\n\n\tjiraClient, err := jira.NewClient(tp.Client(), url)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// todo: As a foundation to batch operations, create a new function to return rows grouped by action type.\n\trecords, err := parseFile(path)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\tpanic(err)\n\t}\n\tfor _, record := range records {\n\t\tvar response *jira.Issue\n\t\tvar actionStr string\n\t\tswitch record.action {\n\t\tcase create:\n\t\t\tresponse, err = createIssue(record.issue, jiraClient)\n\t\t\tactionStr = \"Created\"\n\t\tcase get:\n\t\t\tresponse, err = getIssueByKey(record.issue.Key, jiraClient)\n\t\t\tactionStr = \"Fetched\"\n\t\tdefault:\n\t\t\tresponse, err = nil, fmt.Errorf(\"Invalid TransactionType: %s\", record.action.string())\n\t\t}\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\tpayload, _ := record.issue.Fields.MarshalJSON()\n\t\t\tfmt.Printf(\"Payload: %s - %s \\n %s\\n\", record.issue.Self, record.issue.Key, string(payload[:]))\n\t\t} else {\n\t\t\tfmt.Printf(\"Successfully %s issue. Key: %s\\n\", actionStr, response.Key)\n\t\t}\n\t}\n}", "func (m *importer) processExportedEquipment(w http.ResponseWriter, r *http.Request) {\n\tctx := r.Context()\n\tlog := m.log.For(ctx)\n\tclient := m.ClientFrom(ctx)\n\n\tlog.Debug(\"Exported Equipment - started\")\n\tif err := r.ParseMultipartForm(maxFormSize); err != nil {\n\t\tlog.Warn(\"parsing multipart form\", zap.Error(err))\n\t\thttp.Error(w, \"cannot parse form\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\tcount, numRows := 0, 0\n\n\tfor fileName := range r.MultipartForm.File {\n\t\tfirst, reader, err := m.newReader(fileName, r)\n\t\timportHeader := NewImportHeader(first, ImportEntityEquipment)\n\t\tif err != nil {\n\t\t\terrorReturn(w, fmt.Sprintf(\"cannot handle file: %q\", fileName), log, err)\n\t\t\treturn\n\t\t}\n\t\t//\n\t\t//\tpopulating:\n\t\t//\tindexToLocationTypeID\n\t\t//\n\t\tif err = m.inputValidations(ctx, importHeader); err != nil {\n\t\t\terrorReturn(w, \"first line validation error\", log, err)\n\t\t\treturn\n\t\t}\n\t\t//\n\t\t//\tpopulating:\n\t\t//\tequipmentTypeNameToID\n\t\t//\tpropNameToIndex\n\t\t//\tequipmentTypeIDToProperties\n\t\t//\n\t\terr = m.populateEquipmentTypeNameToIDMap(ctx, importHeader, true)\n\t\tif err != nil {\n\t\t\terrorReturn(w, \"data fetching error\", log, err)\n\t\t\treturn\n\t\t}\n\t\tic := getImportContext(ctx)\n\t\tfor {\n\t\t\tuntrimmedLine, err := reader.Read()\n\t\t\tif err != nil {\n\t\t\t\tif err == io.EOF {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\tlog.Warn(\"cannot read row\", zap.Error(err))\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tnumRows++\n\t\t\timportLine := NewImportRecord(m.trimLine(untrimmedLine), importHeader)\n\t\t\tname := importLine.Name()\n\t\t\tequipTypName := importLine.TypeName()\n\t\t\tequipType, err := client.EquipmentType.Query().Where(equipmenttype.Name(equipTypName)).Only(ctx)\n\t\t\tif err != nil {\n\t\t\t\terrorReturn(w, fmt.Sprintf(\"couldn't find equipment type %q (row #%d) \", equipTypName, numRows), log, err)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\texternalID := importLine.ExternalID()\n\t\t\tid := importLine.ID()\n\t\t\tif id == \"\" {\n\t\t\t\t// new equip\n\t\t\t\tparentLoc, err := m.verifyOrCreateLocationHierarchy(ctx, importLine)\n\t\t\t\tif err != nil {\n\t\t\t\t\terrorReturn(w, fmt.Sprintf(\"creating location hierarchy (row #%d).\", numRows), log, err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tparentEquipmentID, positionDefinitionID, err := m.getPositionDetailsIfExists(ctx, parentLoc, importLine)\n\t\t\t\tif err != nil {\n\t\t\t\t\terrorReturn(w, fmt.Sprintf(\"creating equipment hierarchy (row #%d)\", numRows), log, err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tif parentEquipmentID != nil && positionDefinitionID != nil {\n\t\t\t\t\tparentLoc = nil\n\t\t\t\t}\n\t\t\t\tvar propInputs []*models.PropertyInput\n\t\t\t\tif importLine.Len() > importHeader.PropertyStartIdx() {\n\t\t\t\t\tpropInputs, err = m.validatePropertiesForEquipmentType(ctx, importLine, equipType)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\terrorReturn(w, fmt.Sprintf(\"validating property for type %q (row #%d)\", equipType.Name, numRows), log, err)\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tpos, err := resolverutil.GetOrCreatePosition(ctx, m.ClientFrom(ctx), parentEquipmentID, positionDefinitionID)\n\t\t\t\tif err != nil {\n\t\t\t\t\terrorReturn(w, fmt.Sprintf(\"creating equipment position (row #%d)\", numRows), log, err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tequip, created, err := m.getOrCreateEquipment(ctx, m.r.Mutation(), name, equipType, &externalID, parentLoc, pos, propInputs)\n\t\t\t\tif err != nil {\n\t\t\t\t\terrorReturn(w, fmt.Sprintf(\"creating/fetching equipment (row #%d)\", numRows), log, err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tif created {\n\t\t\t\t\tcount++\n\t\t\t\t\tlog.Warn(fmt.Sprintf(\"(row #%d) creating equipment\", numRows), zap.String(\"name\", equip.Name), zap.String(\"id\", equip.ID))\n\t\t\t\t} else {\n\t\t\t\t\terrorReturn(w, \"Equipment \"+equip.Name+\" already exists under location/position\", log, nil)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\t// existingEquip\n\t\t\t\tequipment, err := m.validateLineForExistingEquipment(ctx, id, importLine)\n\t\t\t\tif err != nil {\n\t\t\t\t\terrorReturn(w, fmt.Sprintf(\"validating existing equipment: id %q (row #%d)\", id, numRows), log, nil)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\ttyp := equipment.QueryType().OnlyX(ctx)\n\t\t\t\tprops := ic.equipmentTypeIDToProperties[typ.ID]\n\t\t\t\tvar inputs []*models.PropertyInput\n\t\t\t\tfor _, propName := range props {\n\t\t\t\t\tinp, err := importLine.GetPropertyInput(m.ClientFrom(ctx), ctx, typ, propName)\n\t\t\t\t\tpropType := typ.QueryPropertyTypes().Where(propertytype.Name(propName)).OnlyX(ctx)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\terrorReturn(w, fmt.Sprintf(\"getting property input: prop %q (row #%d)\", propName, numRows), log, nil)\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\t\t\t\t\tpropID, err := equipment.QueryProperties().Where(property.HasTypeWith(propertytype.ID(propType.ID))).OnlyID(ctx)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tif !ent.IsNotFound(err) {\n\t\t\t\t\t\t\terrorReturn(w, fmt.Sprintf(\"property fetching error: property name %q (row #%d)\", propName, numRows), log, nil)\n\t\t\t\t\t\t\treturn\n\t\t\t\t\t\t}\n\t\t\t\t\t} else {\n\t\t\t\t\t\tinp.ID = &propID\n\t\t\t\t\t}\n\t\t\t\t\tinputs = append(inputs, inp)\n\t\t\t\t}\n\t\t\t\tcount++\n\t\t\t\t_, err = m.r.Mutation().EditEquipment(ctx, models.EditEquipmentInput{ID: id, Name: name, Properties: inputs, ExternalID: &externalID})\n\t\t\t\tif err != nil {\n\t\t\t\t\terrorReturn(w, fmt.Sprintf(\"editing equipment: id %q (row #%d)\", id, numRows), log, nil)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tlog.Debug(\"Exported Equipment - Done\")\n\tw.WriteHeader(http.StatusOK)\n\terr := writeSuccessMessage(w, count, numRows)\n\tif err != nil {\n\t\terrorReturn(w, \"cannot marshal message\", log, err)\n\t\treturn\n\t}\n}", "func (i *Ingester) processResult(ctx context.Context, resultLocation ResultFileLocation) {\n\tresultMD5 := resultLocation.MD5()\n\tif i.inProcessedFiles(resultMD5) {\n\t\treturn\n\t}\n\n\terr := i.processor.Process(ctx, resultLocation)\n\tif err != nil {\n\t\tif err != IgnoreResultsFileErr {\n\t\t\tsklog.Errorf(\"Failed to ingest %s: %s\", resultLocation.Name(), err)\n\t\t\treturn\n\t\t}\n\t}\n\ti.addToProcessedFiles(resultMD5)\n\ti.eventProcessMetrics.liveness.Reset()\n}", "func ProcessTickets(batchCount int) (int, error) {\n\tif batchCount > MaxBatchSize {\n\t\treturn -1, fmt.Errorf(\"requested batch size [%d] bigger than allowed limit [%d]\", batchCount, MaxBatchSize)\n\t}\n\n\tcount, err := processLoop(batchCount)\n\tif err != nil {\n\t\treturn -1, tracerr.Wrap(err)\n\t}\n\n\tif count < batchCount {\n\t\tlog.Printf(\"Read all the issues up to date...\")\n\t} else {\n\t\tlog.Printf(\"More issues most likely to be read on next execution...\")\n\t}\n\n\treturn count, nil\n}", "func (f *JiraFinder) Search() error {\n\toutput := [][]string{f.Config.FieldsToRetrieve}\n\n\terr, out := f.produceFields()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfilters, fields := f.processFields(out)\n\terr, response := f.search(filters, fields)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tissues := f.prepareIssueObjects(response, fields)\n\tissueCh := f.processIssues(issues)\n\n\tcount := 0\n\tfor i := range issueCh {\n\t\tif i != nil {\n\t\t\tif f := download(*i); f != nil {\n\t\t\t\toutput = append(output, f)\n\t\t\t}\n\t\t}\n\n\t\tcount++\n\t\tif count == response.Total {\n\t\t\tclose(issueCh)\n\t\t}\n\t}\n\n\treturn writeToCsv(output, f.Config.DownloadPath)\n}", "func handleJira(j *v1alpha1.Jira) (err error) {\n\tlog.Debug(\"handle jira\")\n\tj.SetDefaults()\n\n\tif err = newJiraConfigMap(j); err != nil {\n\t\treturn\n\t}\n\tif err = newJiraPVC(j); err != nil {\n\t\treturn\n\t}\n\tif err = newJiraPod(j); err != nil {\n\t\treturn\n\t}\n\tif err = newJiraService(j); err != nil {\n\t\treturn\n\t}\n\treturn nil\n}", "func (h *HauserService) ProcessFilesIndividually(exports []client.ExportMeta) (int, error) {\n\tfor _, e := range exports {\n\t\terr := func() error {\n\t\t\tlog.Printf(\"Processing bundle %d (start: %s, end: %s)\", e.ID, e.Start.UTC(), e.Stop.UTC())\n\t\t\tmark := time.Now()\n\t\t\tvar filename string\n\t\t\tvar statusMessage string\n\t\t\tif h.config.SaveAsJson {\n\t\t\t\tfilename = filepath.Join(h.config.TmpDir, fmt.Sprintf(\"%d.json\", e.ID))\n\t\t\t\tdefer os.Remove(filename)\n\t\t\t\twrittenCount, err := h.WriteBundleToJson(e.ID, filename)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Printf(\"Failed to create tmp json file: %s\", err)\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tstatusMessage = fmt.Sprintf(\"Processing of bundle %d (%d bytes)\", e.ID, writtenCount)\n\t\t\t} else {\n\t\t\t\tfilename = filepath.Join(h.config.TmpDir, fmt.Sprintf(\"%d.csv\", e.ID))\n\t\t\t\toutfile, err := os.Create(filename)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Printf(\"Failed to create tmp csv file: %s\", err)\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdefer os.Remove(filename)\n\t\t\t\tdefer outfile.Close()\n\t\t\t\tcsvOut := csv.NewWriter(outfile)\n\n\t\t\t\trecordCount, err := h.WriteBundleToCSV(e.ID, h.tableColumns, csvOut)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tstatusMessage = fmt.Sprintf(\"Processing of bundle %d (%d records)\", e.ID, recordCount)\n\t\t\t}\n\n\t\t\tif err := h.LoadBundles(filename, e); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tlog.Printf(\"%s took %s\", statusMessage, time.Since(mark))\n\t\t\treturn nil\n\t\t}()\n\t\tif err != nil {\n\t\t\treturn 0, errors.Errorf(\"Failed to process bundle: %s\", err)\n\t\t}\n\t}\n\n\t// return how many files were processed\n\treturn len(exports), nil\n}", "func ProcessRentable(ctx context.Context, xbiz *XBusiness, d1, d2 *time.Time, r *Rentable) (int, error) {\n\tconst funcname = \"ProcessRentable\"\n\n\tvar (\n\t\tnr = 0\n\t\terr error\n\t)\n\n\tm, err := VacancyDetect(ctx, xbiz, d1, d2, r.RID)\n\tif err != nil {\n\t\treturn nr, err\n\t}\n\n\t// fmt.Printf(\"ProcessRentable: r = %s (%d), period=(%s - %s) len(m) = %d\\n\", r.Name, r.RID, d1.Format(\"Jan 2\"), d2.Format(\"Jan 2\"), len(m))\n\tfor i := 0; i < len(m); i++ {\n\t\t// the umr rate is in cost/accrualDuration. The duration of the VacancyMarkers\n\t\t// are in integral multiples of rangeIncDur. We need to prorate the amount of\n\t\t// each entry accordingly\n\t\tvar j Journal\n\t\tj.BID = xbiz.P.BID\n\t\tj.Amount = RoundToCent(m[i].Amount)\n\t\t// TODO: fix the next line\n\t\tj.Dt = m[i].DtStop.AddDate(0, 0, -1) // associated date is period end - 1 proration cycle (or 1 sec if no proration)\n\t\tj.Type = JNLTYPEUNAS // this is an unassociated entry\n\t\t// j.RAID = 0 // we really mean it, it is unassociated\n\t\tj.ID = r.RID // mark the associated Rentable\n\t\tj.Comment = m[i].Comment // this will note consecutive days for vacancy\n\t\t// fmt.Printf(\"ProcessRentable: insert journal entry: %s - %s, %8.2f\\n\", j.Dt.Format(RRDATEINPFMT), j.Comment, j.Amount)\n\n\t\t// TODO: this check must be more thorough. Examine the RentCycle, query over the time of the rent cycle\n\t\t// to see if other records were generated and handle.\n\t\t// By convention, the period for Vacancy detection is: supplied range, date/time of journal entry =\n\t\t// rentcycle - 1 prorationcycle (or one second whichever is larger)\n\t\t// These entries must be idempotent. Make sure it does not already exist.\n\t\tjv, err := GetJournalVacancy(ctx, r.RID, &j.Dt, &m[i].DtStop)\n\t\tif err != nil {\n\t\t\treturn nr, err\n\t\t}\n\n\t\tif jv.JID != 0 { // if the JID >0 ..\n\t\t\tcontinue // then this entry was already generated, keep going\n\t\t}\n\n\t\tjid, err := InsertJournal(ctx, &j)\n\t\tif err != nil {\n\t\t\tErrlog(err)\n\t\t\treturn nr, err\n\t\t}\n\n\t\tnr++\n\t\tif jid > 0 {\n\t\t\tvar ja JournalAllocation\n\t\t\tja.JID = jid\n\t\t\tja.Amount = j.Amount\n\t\t\tja.ASMID = 0 // it's unassociated\n\n\t\t\tja.AcctRule = temporaryGetLTLAR(xbiz.P.BID)\n\t\t\tja.RID = r.RID\n\t\t\tja.BID = r.BID\n\t\t\t// fmt.Printf(\"VACANCY: inserting journalAllocation entry: %#v\\n\", ja)\n\t\t\t_, err := InsertJournalAllocationEntry(ctx, &ja)\n\t\t\tif err != nil {\n\t\t\t\tUlog(\"%s: Error while inserting journalAllocation entry: %s\\n\", funcname, err.Error())\n\t\t\t\t// TODO(Steve): ignore error?\n\t\t\t}\n\t\t\tj.JA = append(j.JA, ja)\n\t\t}\n\t\tInitLedgerCache()\n\t\t_, err = GenerateLedgerEntriesFromJournal(ctx, xbiz, &j, d1, d2)\n\t\tif err != nil {\n\t\t\treturn nr, err\n\t\t}\n\t}\n\n\treturn nr, err\n}", "func HandleResultsUpload(a AppEngineAPI, w http.ResponseWriter, r *http.Request) {\n\tvar uploader string\n\tif !a.IsAdmin() {\n\t\tusername, password, ok := r.BasicAuth()\n\t\tif !ok || !a.authenticateUploader(username, password) {\n\t\t\thttp.Error(w, \"Authentication error\", http.StatusUnauthorized)\n\t\t\treturn\n\t\t}\n\t\tuploader = username\n\t}\n\n\t// Most form methods (e.g. FormValue) will call ParseMultipartForm and\n\t// ParseForm if necessary; forms with either enctype can be parsed.\n\t// FormValue gets either query params or form body entries, favoring\n\t// the latter.\n\t// The default maximum form size is 32MB, which is also the max request\n\t// size on AppEngine.\n\n\tif uploader == \"\" {\n\t\tuploader = r.FormValue(\"user\")\n\t\tif uploader == \"\" {\n\t\t\thttp.Error(w, \"Cannot identify uploader\", http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\t}\n\n\t// Non-existent keys will have empty values, which will later be\n\t// filtered out by scheduleResultsTask.\n\textraParams := map[string]string{\n\t\t\"labels\": r.FormValue(\"labels\"),\n\t\t\"callback_url\": r.FormValue(\"callback_url\"),\n\t\t// The following fields will be deprecated when all runners embed metadata in the report.\n\t\t\"revision\": r.FormValue(\"revision\"),\n\t\t\"browser_name\": r.FormValue(\"browser_name\"),\n\t\t\"browser_version\": r.FormValue(\"browser_version\"),\n\t\t\"os_name\": r.FormValue(\"os_name\"),\n\t\t\"os_version\": r.FormValue(\"os_version\"),\n\t}\n\n\tlog := shared.GetLogger(a.Context())\n\tvar results int\n\tvar getFile func(i int) (io.ReadCloser, error)\n\tif r.MultipartForm != nil && r.MultipartForm.File != nil && len(r.MultipartForm.File[\"result_file\"]) > 0 {\n\t\t// result_file[] payload\n\t\tfiles := r.MultipartForm.File[\"result_file\"]\n\t\tlog.Debugf(\"Found %v multipart form files\", len(files))\n\t\tresults = len(files)\n\t\tgetFile = func(i int) (io.ReadCloser, error) {\n\t\t\treturn files[i].Open()\n\t\t}\n\t} else {\n\t\t// result_url payload\n\t\turls := r.PostForm[\"result_url\"]\n\t\tresults = len(urls)\n\t\tlog.Debugf(\"Found %v urls\", results)\n\t\tgetFile = func(i int) (io.ReadCloser, error) {\n\t\t\treturn fetchFile(a, urls[i])\n\t\t}\n\t\t// Check for azure artifact URL, for unzipping.\n\t\tif results == 1 {\n\t\t\tartifactName := getAzureArtifactName(urls[0])\n\t\t\tif artifactName != \"\" {\n\t\t\t\tvar err error\n\t\t\t\tresults, getFile, err = handleAzureArtifact(a, artifactName, urls[0])\n\t\t\t\tif err != nil {\n\t\t\t\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tt, err := sendResultsToProcessor(a, uploader, results, getFile, extraParams)\n\tif err != nil {\n\t\tlog.Errorf(\"%s\", err.Error())\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tlog.Debugf(\"Task %s added to queue\", t.Name)\n\tfmt.Fprintf(w, \"Task %s added to queue\\n\", t.Name)\n}", "func Process(repository string) ResultSet {\n\tresults := make([]Result, 0)\n\tfor _, file := range []string{\"app-config.yaml\", \"app-config-sbs.yaml\", \"app-config-fss.yaml\"} {\n\t\tpath := path.Join(repository, file)\n\t\tresult := ProcessFile(path)\n\t\tif result == nil {\n\t\t\tcontinue\n\t\t}\n\t\tresult.Description = fmt.Sprintf(\"%s: %s\", file, result.Description)\n\t\tresults = append(results, *result)\n\t}\n\treturn results\n}", "func (r *retriever) Process() {\n\tvar wg sync.WaitGroup\n\n\tfor url := range r.In {\n\t\twg.Add(1)\n\t\t// For now the goroutines will be unbounded\n\t\tgo func(url string) {\n\t\t\tdefer wg.Done()\n\t\t\t// TODO: Add an error process\n\t\t\tif html, err := r.getter(url); err == nil {\n\t\t\t\tr.Out <- NewPage(url, html)\n\t\t\t} else {\n\t\t\t\tr.Err <- err\n\t\t\t}\n\t\t}(url)\n\t}\n\n\twg.Wait()\n}", "func process(settings *Settings) {\n\n\t// Create a channel queue that is as large as the number of threads we have.\n\tuptimes := make(chan UptimeResponse, len(settings.UptimeRequestList))\n\tloglines := make(chan LogLine, 100)\n\tsysinfos := make(chan SysMonitorInfo)\n\tbackups := make(chan BackupInfo)\n\n\t// Reset the results structure and set the base things from the settings\n\tvar results Results\n\tResetResult(settings, &results)\n\n\t// Start all the monitoring services\n\n\t// Monitor specified endpoints to make sure they are up and running\n\tStartEndpointMonitoring(settings, uptimes)\n\n\t// Monitor the specified log files and send the log lines to this thread\n\t// for further processing\n\tStartLogMonitoring(settings, loglines)\n\n\t// Monitor the system - CPU, Ram and Diskspace on specified directories\n\tStartSystemMonitoring(settings, sysinfos)\n\n\t// Monitor backups\n\tStartBackupsMonitoring(settings, backups)\n\n\tgo PromPublish()\n\n\t// Watch for messages from the channels and add them to the results structure\n\t// We need to handle the case that logs are filled faster than this function\n\t// clears the results. Use extra timer / channel for this\n\tfor {\n\n\t\tselect {\n\t\tcase logline := <-loglines:\n\t\t\t// Add logline to the result. The logline contains enough info for it to later\n\t\t\t// know which particular log it came from\n\t\t\tvar description = logline.Description\n\n\t\t\tif len(logline.Description) > 19 {\n\t\t\t\tlogline.Description = logline.Description[0:20]\n\t\t\t}\n\n\t\t\tlLog.Print(\"Time: %s Error Level: %s Description: %s\\n\", logline.TimeStamp, logline.Severity, description)\n\t\t\tresults.LoglineList = append(results.LoglineList, logline)\n\t\t\tUpdateMetrics(&results)\n\t\tcase uptime := <-uptimes:\n\n\t\t\t// Add this new uptime result to the list\n\t\t\tresults.UptimeList = append(results.UptimeList, uptime)\n\t\t\t// UpdateMetrics(&results)\n\n\t\tcase sysinfo := <-sysinfos:\n\t\t\tresults.SysMonitorInfo = sysinfo\n\t\t\tUpdateMetrics(&results)\n\n\t\tcase backupInfo := <-backups:\n\t\t\tresults.BackupInfoList = append(results.BackupInfoList, backupInfo)\n\t\t\t// UpdateMetrics(&results)\n\n\t\tcase <-time.After(time.Second * 5): // does this do what we think it does? Check.\n\t\tdefault:\n\n\t\t\ts, _ := json.Marshal(results)\n\t\t\tlLog.Print(string(s))\n\t\t\ttime.Sleep(5 * time.Second)\n\n\t\t\tResetResult(settings, &results)\n\t\t}\n\n\t}\n\n\tStopEndpointMonitoring()\n}", "func (d *Requests) StartHandler(w http.ResponseWriter, r *http.Request) {\n\t// Do not use r.Context() since this kicks off a background process.\n\tctx := context.Background()\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\treq := regression.NewRegressionDetectionRequest()\n\tif err := json.NewDecoder(r.Body).Decode(req); err != nil {\n\t\thttputils.ReportError(w, err, \"Could not decode POST body.\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\tauditlog.LogWithUser(r, \"\", \"dryrun\", req)\n\td.tracker.Add(req.Progress)\n\n\tif req.Alert.Query == \"\" {\n\t\treq.Progress.Error(\"Query must not be empty.\")\n\t\tif err := req.Progress.JSON(w); err != nil {\n\t\t\tsklog.Errorf(\"Failed to encode paramset: %s\", err)\n\t\t}\n\t\treturn\n\t}\n\tif err := req.Alert.Validate(); err != nil {\n\t\treq.Progress.Error(err.Error())\n\t\tif err := req.Progress.JSON(w); err != nil {\n\t\t\tsklog.Errorf(\"Failed to encode paramset: %s\", err)\n\t\t}\n\t\treturn\n\t}\n\n\tfoundRegressions := map[types.CommitNumber]*regression.Regression{}\n\n\t// Create a callback that will be passed each found Regression. It will\n\t// update the Progress after each new regression is found.\n\tdetectorResponseProcessor := func(queryRequest *regression.RegressionDetectionRequest, clusterResponse []*regression.RegressionDetectionResponse, message string) {\n\t\t// Loop over clusterResponse, convert each one to a regression, and merge with running.Regressions.\n\t\tfor _, cr := range clusterResponse {\n\t\t\tc, reg, err := regression.RegressionFromClusterResponse(ctx, cr, req.Alert, d.perfGit)\n\t\t\tif err != nil {\n\t\t\t\tsklog.Errorf(\"Failed to convert to Regression: %s\", err)\n\t\t\t\treturn\n\t\t\t}\n\t\t\treq.Progress.Message(\"Step\", fmt.Sprintf(\"%d/%d\", queryRequest.Step+1, queryRequest.TotalQueries))\n\t\t\treq.Progress.Message(\"Query\", fmt.Sprintf(\"%q\", queryRequest.Query()))\n\t\t\treq.Progress.Message(\"Stage\", \"Looking for regressions in query results.\")\n\t\t\treq.Progress.Message(\"Commit\", fmt.Sprintf(\"%d\", c.CommitNumber))\n\t\t\treq.Progress.Message(\"Details\", message)\n\t\t\t// We might not have found any regressions.\n\t\t\tif reg.Low == nil && reg.High == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif origReg, ok := foundRegressions[c.CommitNumber]; !ok {\n\t\t\t\tfoundRegressions[c.CommitNumber] = reg\n\t\t\t} else {\n\t\t\t\tfoundRegressions[c.CommitNumber] = origReg.Merge(reg)\n\t\t\t}\n\n\t\t}\n\n\t\t// Now update the Progress.\n\t\tregressions := []*RegressionAtCommit{}\n\n\t\tcommitNumbers := []types.CommitNumber{}\n\t\tfor id := range foundRegressions {\n\t\t\tcommitNumbers = append(commitNumbers, id)\n\t\t}\n\t\tsort.Sort(types.CommitNumberSlice(commitNumbers))\n\n\t\tfor _, commitNumber := range commitNumbers {\n\t\t\tdetails, err := d.perfGit.CommitFromCommitNumber(ctx, commitNumber)\n\t\t\tif err != nil {\n\t\t\t\tsklog.Errorf(\"Failed to look up commit %d: %s\", commitNumber, err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tregressions = append(regressions, &RegressionAtCommit{\n\t\t\t\tCID: details,\n\t\t\t\tRegression: foundRegressions[commitNumber],\n\t\t\t})\n\t\t}\n\t\treq.Progress.Results(regressions)\n\t}\n\n\tgo func() {\n\t\terr := regression.ProcessRegressions(ctx, req, detectorResponseProcessor, d.perfGit, d.shortcutStore, d.dfBuilder, d.paramsProvier(), regression.ExpandBaseAlertByGroupBy, regression.ContinueOnError, config.Config.AnomalyConfig)\n\t\tif err != nil {\n\t\t\treq.Progress.Error(err.Error())\n\t\t} else {\n\t\t\treq.Progress.Finished()\n\t\t}\n\t}()\n\n\tif err := req.Progress.JSON(w); err != nil {\n\t\tsklog.Errorf(\"Failed to encode paramset: %s\", err)\n\t}\n}", "func HandleResultsCreate(a API, s checks.API, w http.ResponseWriter, r *http.Request) {\n\tlogger := shared.GetLogger(a.Context())\n\n\tif AuthenticateUploader(a, r) != InternalUsername {\n\t\thttp.Error(w, \"This is a private API.\", http.StatusUnauthorized)\n\n\t\treturn\n\t}\n\tbody, err := io.ReadAll(r.Body)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\n\t\treturn\n\t}\n\n\tvar testRun shared.TestRun\n\tif err := json.Unmarshal(body, &testRun); err != nil {\n\t\thttp.Error(w, \"Failed to parse JSON: \"+err.Error(), http.StatusBadRequest)\n\n\t\treturn\n\t}\n\n\tif testRun.TimeStart.IsZero() {\n\t\ttestRun.TimeStart = time.Now()\n\t}\n\tif testRun.TimeEnd.IsZero() {\n\t\ttestRun.TimeEnd = testRun.TimeStart\n\t}\n\ttestRun.CreatedAt = time.Now()\n\n\t// nolint:staticcheck // TODO: Fix staticcheck lint error (SA1019).\n\tif len(testRun.FullRevisionHash) != 40 {\n\t\thttp.Error(w, \"full_revision_hash must be the full SHA (40 chars)\", http.StatusBadRequest)\n\n\t\treturn\n\t} else if testRun.Revision != \"\" && strings.Index(testRun.FullRevisionHash, testRun.Revision) != 0 {\n\t\thttp.Error(w,\n\t\t\tfmt.Sprintf(\n\t\t\t\t\"Mismatch of full_revision_hash and revision fields: %s vs %s\",\n\t\t\t\ttestRun.FullRevisionHash,\n\t\t\t\ttestRun.Revision,\n\t\t\t),\n\t\t\thttp.StatusBadRequest)\n\n\t\treturn\n\t}\n\t// nolint:staticcheck // TODO: Fix staticcheck lint error (SA1019).\n\ttestRun.Revision = testRun.FullRevisionHash[:10]\n\n\tkey, err := a.AddTestRun(&testRun)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\n\t\treturn\n\t}\n\t// Copy int64 representation of key into TestRun.ID so that clients can\n\t// inspect/use key value.\n\ttestRun.ID = key.IntID()\n\n\t// Do not schedule on pr_base to avoid redundancy with pr_head.\n\tif !testRun.LabelsSet().Contains(shared.PRBaseLabel) {\n\t\tspec := shared.ProductSpec{} // nolint:exhaustruct // TODO: Fix exhaustruct lint error\n\t\tspec.BrowserName = testRun.BrowserName\n\t\tspec.Labels = mapset.NewSet(testRun.Channel())\n\t\terr = s.ScheduleResultsProcessing(testRun.FullRevisionHash, spec)\n\t\tif err != nil {\n\t\t\tlogger.Warningf(\"Failed to schedule results: %s\", err.Error())\n\t\t}\n\t}\n\n\t// nolint:exhaustruct // TODO: Fix exhaustruct lint error.\n\tpendingRun := shared.PendingTestRun{\n\t\tID: testRun.ID,\n\t\tStage: shared.StageValid,\n\t\tProductAtRevision: testRun.ProductAtRevision,\n\t}\n\tif err := a.UpdatePendingTestRun(pendingRun); err != nil {\n\t\t// This is a non-fatal error; don't return.\n\t\tlogger.Errorf(\"Failed to update pending test run: %s\", err.Error())\n\t}\n\n\tjsonOutput, err := json.Marshal(testRun)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\n\t\treturn\n\t}\n\tlogger.Infof(\"Successfully created run %v (%s)\", testRun.ID, testRun.String())\n\tw.WriteHeader(http.StatusCreated)\n\t_, err = w.Write(jsonOutput)\n\tif err != nil {\n\t\tlogger.Warningf(\"Failed to write data in api/results/create handler: %s\", err.Error())\n\t}\n}", "func processHit(ctx context.Context, hit *elastic.SearchHit, resourceTypeString string) (utils.TaggingReportDocument, bool) {\n\tlogger := jsonlog.LoggerFromContextOrDefault(ctx)\n\tvar source indexSource.ReservationReport\n\terr := json.Unmarshal(*hit.Source, &source)\n\tif err != nil {\n\t\tlogger.Error(\"Could not process report.\", map[string]interface{}{\n\t\t\t\"type\": resourceTypeString,\n\t\t})\n\t\treturn utils.TaggingReportDocument{}, false\n\t}\n\n\tregionForURL := utils.GetRegionForURL(source.Reservation.Region)\n\n\tdocument := utils.TaggingReportDocument{\n\t\tAccount: source.Account,\n\t\tResourceID: source.Reservation.Id,\n\t\tResourceType: resourceTypeString,\n\t\tRegion: source.Reservation.Region,\n\t\tURL: fmt.Sprintf(urlFormat, regionForURL, source.Reservation.Id),\n\t\tTags: source.Reservation.Tags,\n\t}\n\n\treturn document, true\n}", "func (action *provisionLogsAction) Process() error {\n\treturn nil\n}", "func (a *ArchiveReader) Process() error {\n\tvar cOK, cErr, cSkipped int // blob counts\n\n\tfor _, f := range a.reader.File {\n\t\t// rc can be used to read the content\n\t\trc, err := f.Open()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tzrs := ZipReadSeeker{\n\t\t\tReadCloser: rc,\n\t\t\tf: f,\n\t\t}\n\n\t\tdefer zrs.Close()\n\n\t\terr = nil\n\t\tswitch f.Name {\n\t\tcase \"data.json\":\n\t\t\tif a.indexHandler != nil {\n\t\t\t\terr = a.indexHandler(zrs)\n\t\t\t}\n\t\tdefault:\n\t\t\tif a.blobHandler == nil {\n\t\t\t\tcSkipped++\n\t\t\t} else {\n\t\t\t\terr = a.blobHandler(f.Name, zrs)\n\n\t\t\t\tif err == nil {\n\t\t\t\t\tcOK++\n\t\t\t\t} else {\n\t\t\t\t\tcErr++\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif err != nil {\n\t\t\tlogging.Logger().WithError(err).Errorf(\"Handling file %s\", f.Name)\n\t\t}\n\t}\n\n\tlogging.Logger().Infof(\"Processed %d media blobs, %d skipped, %d errors\", cOK, cSkipped, cErr)\n\n\treturn nil\n}", "func (z *ResultSet) execute(cert *x509.Certificate, registry lint.Registry) {\n\tz.Results = make(map[string]*lint.LintResult, len(registry.Names()))\n\t// Run each lints from the registry.\n\tfor _, name := range registry.Names() {\n\t\tres := registry.ByName(name).Execute(cert)\n\t\tz.Results[name] = res\n\t\tz.updateErrorStatePresent(res)\n\t}\n}", "func run(c config.Config, initializeScanner InitializeScanner) error {\n\tif err := log.InitLogger(c.Debug, c.Quiet); err != nil {\n\t\tl.Fatal(err)\n\t}\n\n\t// configure cache dir\n\tutils.SetCacheDir(c.CacheDir)\n\tcache, err := operation.NewCache(c.CacheBackend)\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"unable to initialize the cache: %w\", err)\n\t}\n\tdefer cache.Close()\n\tlog.Logger.Debugf(\"cache dir: %s\", utils.CacheDir())\n\n\tif c.Reset {\n\t\treturn cache.Reset()\n\t}\n\tif c.ClearCache {\n\t\treturn cache.ClearImages()\n\t}\n\n\t// download the database file\n\tnoProgress := c.Quiet || c.NoProgress\n\tif err = operation.DownloadDB(c.AppVersion, c.CacheDir, noProgress, c.Light, c.SkipUpdate); err != nil {\n\t\treturn err\n\t}\n\n\tif c.DownloadDBOnly {\n\t\treturn nil\n\t}\n\n\tif err = db.Init(c.CacheDir); err != nil {\n\t\treturn xerrors.Errorf(\"error in vulnerability DB initialize: %w\", err)\n\t}\n\tdefer db.Close()\n\n\ttarget := c.Target\n\tif c.Input != \"\" {\n\t\ttarget = c.Input\n\t}\n\n\tctx, cancel := context.WithTimeout(context.Background(), c.Timeout)\n\tdefer cancel()\n\tscanner, cleanup, err := initializeScanner(ctx, target, cache, cache, c.Timeout)\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"unable to initialize a scanner: %w\", err)\n\t}\n\tdefer cleanup()\n\n\tscanOptions := types.ScanOptions{\n\t\tVulnType: c.VulnType,\n\t\tScanRemovedPackages: c.ScanRemovedPkgs, // this is valid only for image subcommand\n\t\tListAllPackages: c.ListAllPkgs,\n\t\tSkipFiles: c.SkipFiles,\n\t\tSkipDirectories: c.SkipDirectories,\n\t}\n\tlog.Logger.Debugf(\"Vulnerability type: %s\", scanOptions.VulnType)\n\n\tresults, err := scanner.ScanArtifact(ctx, scanOptions)\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"error in image scan: %w\", err)\n\t}\n\n\tvulnClient := initializeVulnerabilityClient()\n\tfor i := range results {\n\t\tvulnClient.FillInfo(results[i].Vulnerabilities, results[i].Type)\n\t\tvulns, err := vulnClient.Filter(ctx, results[i].Vulnerabilities,\n\t\t\tc.Severities, c.IgnoreUnfixed, c.IgnoreFile, c.IgnorePolicy)\n\t\tif err != nil {\n\t\t\treturn xerrors.Errorf(\"unable to filter vulnerabilities: %w\", err)\n\t\t}\n\t\tresults[i].Vulnerabilities = vulns\n\t}\n\n\tif err = report.WriteResults(c.Format, c.Output, c.Severities, results, c.Template, c.Light); err != nil {\n\t\treturn xerrors.Errorf(\"unable to write results: %w\", err)\n\t}\n\n\tif c.ExitCode != 0 {\n\t\tfor _, result := range results {\n\t\t\tif len(result.Vulnerabilities) > 0 {\n\t\t\t\tos.Exit(c.ExitCode)\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "func runReport() error {\n\trepoList, err := ghammer.GetRepoList(ghammer.RepoListOptions{Limit: listLimit, IncludeArchived: includeArchived})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// populate codeowners\n\tfor i := 0; i < len(repoList); i++ {\n\t\trepoList[i].CodeOwners, err = ghammer.GetCodeOwners(repoList[i].Name, repoList[i].OwnerLogin)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// display the report\n\tfor _, repo := range repoList {\n\t\trepoDetail(repo)\n\t}\n\n\treturn nil\n}", "func (b *Base) Process() error {\n\tif b.Exchange == \"\" {\n\t\treturn errExchangeNameUnset\n\t}\n\n\tif b.Pair.IsEmpty() {\n\t\treturn errPairNotSet\n\t}\n\n\tif b.Asset.String() == \"\" {\n\t\treturn errAssetTypeNotSet\n\t}\n\n\tif b.LastUpdated.IsZero() {\n\t\tb.LastUpdated = time.Now()\n\t}\n\n\tif err := b.Verify(); err != nil {\n\t\treturn err\n\t}\n\treturn service.Update(b)\n}", "func processAlerts(data template.Alerts, get getItem, put putItem, partition string) error {\n\t// sort the incoming alerts by StartsAt time\n\talerts := NewTimeSortedAlerts(data)\n\tsort.Sort(alerts)\n\tlog.Debug().Msgf(\"* alerts have been sorted\")\n\t// creates a map to keep track of existing items and values\n\titems := make(map[string]*oxc.Item)\n\t// loops through tha alerts\n\tfor _, alert := range alerts {\n\t\t// extract values from the alert\n\t\tv, err := values(alert)\n\t\t// if the alert did not have all required information\n\t\tif err != nil {\n\t\t\t// stops any processing\n\t\t\treturn err\n\t\t}\n\t\t// write debug info about successful data extraction\n\t\tlog.Debug().Msgf(\"* extracted values for alert with fingerprint '%s'\", alert.Fingerprint)\n\t\tlog.Debug().Msgf(\"* platform value = '%s'\", v[\"platform\"])\n\t\tlog.Debug().Msgf(\"* service value = '%s'\", v[\"service\"])\n\t\tlog.Debug().Msgf(\"* facet value = '%s'\", v[\"facet\"])\n\n\t\tlocation := v[\"location\"]\n\t\t// if the alert does not have a specific location\n\t\tif len(location) == 0 {\n\t\t\t// fill the blank\n\t\t\tlocation = \"_\"\n\t\t}\n\t\t// build the natural key for the service item\n\t\tserviceKey := key(v[\"platform\"], v[\"service\"], v[\"facet\"], location)\n\t\tlog.Debug().Msgf(\"* service key '%s' created\", serviceKey)\n\n\t\t// check if there is a previous record of the service item in the tracking map\n\t\tserviceItem := items[serviceKey]\n\t\t// if the item is not in the map\n\t\tif serviceItem == nil {\n\t\t\t// try and fetch it from Onix\n\t\t\tserviceItem, err = get(&oxc.Item{Key: serviceKey})\n\t\t\t// if there is an item\n\t\t\tif err == nil && serviceItem != nil {\n\t\t\t\t// add it to the tracking map\n\t\t\t\titems[serviceKey] = serviceItem\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\tlog.Debug().Msgf(\"* fail to fetch information for item with key '%s': '%s'\", serviceKey, err)\n\t\t\t}\n\t\t}\n\t\tvar startsAt time.Time\n\t\tvar shouldRegisterEvent bool\n\n\t\t// if there is a pre-existing item\n\t\tif serviceItem != nil {\n\t\t\t// extract the event time\n\t\t\tif startsAtStr, ok := serviceItem.Attribute[\"time\"].(string); ok {\n\t\t\t\tstartsAt, err = time.Parse(time.RFC3339Nano, startsAtStr)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Warn().Msgf(\"failed to parse startsAt time '%s': %s\", startsAtStr, err)\n\t\t\t\t}\n\t\t\t} else if startsAt, ok = serviceItem.Attribute[\"time\"].(time.Time); !ok {\n\t\t\t\t// cannot parse time!\n\t\t\t\tlog.Warn().Msgf(\"failed to parse startsAt time for event %s\", serviceKey)\n\t\t\t}\n\t\t}\n\n\t\t// Decides if the event should be registered in Onix using the logic below:\n\t\t// 1) there is not a record of the event in Onix; or\n\t\t// 2) the event registered in Onix has a status that is different from the status in the received alert; and\n\t\t// 3) the received alert has occurred after the last event registered in Onix\n\t\tshouldRegisterEvent = (serviceItem == nil || (serviceItem != nil && serviceItem.Attribute[\"status\"].(string) != v[\"status\"])) && startsAt.Before(alert.StartsAt)\n\t\tlog.Debug().Msgf(\"* event for item '%s' should be registered?: %t\", serviceKey, shouldRegisterEvent)\n\n\t\t// if the item already recorded occurred before the current alert\n\t\t// or the no item recorded yet (startsAt = beginning of time)\n\t\tif shouldRegisterEvent {\n\t\t\t// then record the new alert\n\t\t\tlog.Info().Msgf(\"recording event => %s:%s:%s:%s\", v[\"service\"], v[\"facet\"], location, v[\"status\"])\n\t\t\tserviceItem = &oxc.Item{\n\t\t\t\tKey: serviceKey,\n\t\t\t\tName: fmt.Sprintf(\"%s Service\", v[\"service\"]),\n\t\t\t\tDescription: v[\"description\"],\n\t\t\t\tType: SeSServiceItemType,\n\t\t\t\tAttribute: map[string]interface{}{\n\t\t\t\t\t\"service\": v[\"service\"],\n\t\t\t\t\t\"status\": v[\"status\"],\n\t\t\t\t\t\"description\": v[\"description\"],\n\t\t\t\t\t\"location\": v[\"location\"],\n\t\t\t\t\t\"time\": alert.StartsAt,\n\t\t\t\t\t\"platform\": v[\"platform\"],\n\t\t\t\t\t\"facet\": v[\"facet\"],\n\t\t\t\t},\n\t\t\t\tPartition: partition,\n\t\t\t}\n\t\t\tresult, err := put(serviceItem)\n\t\t\t// do we have a business error?\n\t\t\tif result != nil && result.Error {\n\t\t\t\treturn errors.New(fmt.Sprintf(\"Onix http put failed: %s\", result.Message))\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\treturn errors.New(fmt.Sprintf(\"Onix http put failed: %s\", err))\n\t\t\t}\n\t\t\t// update the internal cache\n\t\t\titems[serviceKey] = serviceItem\n\t\t} else {\n\t\t\tlog.Trace().Msgf(\"discarding event => %s:%s:%s:%s\", v[\"service\"], v[\"facet\"], location, v[\"status\"])\n\t\t}\n\t}\n\treturn nil\n}", "func Report(result result.Result, anchoreDetails config.AnchoreInfo, appConfig *config.Application) error {\n\tlog.Debug(\"Reporting results to Anchore\")\n\ttr := &http.Transport{\n\t\tTLSClientConfig: &tls.Config{InsecureSkipVerify: anchoreDetails.HTTP.Insecure},\n\t}\n\tclient := &http.Client{\n\t\tTransport: tr,\n\t\tTimeout: time.Duration(anchoreDetails.HTTP.TimeoutSeconds) * time.Second,\n\t}\n\n\tanchoreURL, err := buildURL(anchoreDetails)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to build url: %w\", err)\n\t}\n\n\tfor i, image := range NewImageReport(result) {\n\t\tlog.Debug(\"Reporting image \", i)\n\t\treqBody, err := json.Marshal(image)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to serialize results as JSON: %w\", err)\n\t\t}\n\n\t\treq, err := http.NewRequest(\"POST\", anchoreURL, bytes.NewBuffer(reqBody))\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to build request to report data to Anchore: %w\", err)\n\t\t}\n\t\treq.SetBasicAuth(anchoreDetails.User, anchoreDetails.Password)\n\t\treq.Header.Set(\"Content-Type\", \"application/json\")\n\t\t//req.Header.Set(\"x-anchore-account\", anchoreDetails.Account)\n\t\tresp, err := client.Do(req)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to report data to Anchore: %w\", err)\n\t\t}\n\t\tdefer resp.Body.Close()\n\t\tif resp.StatusCode != 200 {\n\t\t\treturn fmt.Errorf(\"failed to report data to Anchore: %+v\", resp)\n\t\t}\n\t}\n\tlog.Debug(\"Successfully reported results to Anchore\")\n\treturn nil\n}", "func Invoke(FlowData map[string]interface{}) (flowResult map[string]interface{}, activityResult *context.ActivityContext) {\n\n\t//creating new instance of context.ActivityContext\n\tvar activityContext = new(context.ActivityContext)\n\n\t//creating new instance of context.ActivityError\n\tvar activityError context.ActivityError\n\n\t//setting activityError proprty values\n\tactivityError.Encrypt = false\n\tactivityError.ErrorString = \"exception\"\n\tactivityError.Forward = false\n\tactivityError.SeverityLevel = context.Info\n\n\tvar err error\n\tInSessionID := FlowData[\"InSessionID\"].(string)\n\thttpServiceInput := make(map[string]interface{})\n\n\tlogger.Log_ACT(\"Executing JIRA_GetIssue Activity.\", logger.Debug, InSessionID)\n\n\tif FlowData[\"JiraHost\"] != nil && FlowData[\"JiraAuthToken\"] != nil && FlowData[\"JiraIssueID\"] != nil {\n\n\t\tjiraAuthToken := FlowData[\"JiraAuthToken\"].(string)\n\n\t\tif jiraAuthToken != \"Unauthorized\" {\n\t\t\tjiraHostID := FlowData[\"JiraHost\"].(string)\n\t\t\tjiraHostID = strings.TrimSpace(jiraHostID)\n\t\t\tjiraHostID = strings.TrimSuffix(jiraHostID, \"/\")\n\t\t\tcompleteurl := jiraHostID + \"/rest/api/2/issue/\" + FlowData[\"JiraIssueID\"].(string)\n\n\t\t\thttpServiceInput[\"InSessionID\"] = InSessionID\n\t\t\thttpServiceInput[\"URL\"] = completeurl\n\t\t\thttpServiceInput[\"Method\"] = \"GET\"\n\t\t\thttpServiceInput[\"Body\"] = \"\"\n\n\t\t\theaderTokens := make(map[string]string)\n\t\t\theaderTokens[\"Content-Type\"] = \"application/json\"\n\n\t\t\tif strings.Contains(jiraAuthToken, \".\") {\n\t\t\t\theaderTokens[\"Authorization\"] = \"Bearer \" + jiraAuthToken\n\t\t\t} else {\n\t\t\t\theaderTokens[\"Authorization\"] = \"Basic \" + jiraAuthToken\n\t\t\t}\n\n\t\t\thttpServiceInput[\"headerTokens\"] = headerTokens\n\t\t} else {\n\t\t\terr = errors.New(\"Error! JIRA Authentication Failed.\")\n\t\t}\n\n\t} else {\n\t\terr = errors.New(\"Error! Required Fields Error. Check all fields.\")\n\t}\n\n\tif err == nil {\n\t\thttpFlowResult, httpActivityResult := httpservice.Invoke(httpServiceInput)\n\t\tif !httpActivityResult.ActivityStatus {\n\t\t\terr = errors.New(httpActivityResult.ErrorState.ErrorString)\n\t\t\tactivityError.ErrorString = \"Exception \" + err.Error()\n\t\t} else {\n\t\t\tvar data map[string]interface{}\n\t\t\t_ = json.Unmarshal([]byte(httpFlowResult[\"Response\"].(string)), &data)\n\t\t\tFlowData[\"JiraIssueDetails\"] = data\n\t\t}\n\t}\n\n\tif err == nil {\n\t\tmsg := \"Successfully Retrieved Issue Details!\"\n\t\tactivityContext.ActivityStatus = true\n\t\tactivityContext.Message = msg\n\t\tactivityContext.ErrorState = activityError\n\t\tlogger.Log_ACT(msg, logger.Debug, InSessionID)\n\t} else {\n\t\tmsg := \"Error : \" + err.Error()\n\t\tactivityContext.ActivityStatus = false\n\t\tactivityContext.Message = msg\n\t\tactivityContext.ErrorState = activityError\n\t\tlogger.Log_ACT(msg, logger.Debug, InSessionID)\n\t}\n\n\tlogger.Log_ACT(\"Finished Executing JIRA_GetIssue Activity. Returning to Work Flow.\", logger.Debug, InSessionID)\n\n\treturn FlowData, activityContext\n}", "func (c *Collection) Process() error {\n\tfor _, a := range c.assets {\n\t\tif err := c.ProcessAsset(a, c.filters); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func processSingleFile(ctx context.Context, store *btts.BigTableTraceStore, vcs vcsinfo.VCS, filename string, r io.Reader, timestamp time.Time, branches []string) error {\n\tbenchData, err := ingestcommon.ParseBenchDataFromReader(r)\n\tif err != nil {\n\t\tsklog.Errorf(\"Failed to read or parse data: %s\", err)\n\t\treturn NonRecoverableError\n\t}\n\n\tbranch, ok := benchData.Key[\"branch\"]\n\tif ok {\n\t\tif len(branches) > 0 {\n\t\t\tif !util.In(branch, branches) {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t} else {\n\t\tsklog.Infof(\"No branch name.\")\n\t}\n\n\tparams, values, paramset := getParamsAndValues(benchData)\n\t// Don't do any more work if there's no data to ingest.\n\tif len(params) == 0 {\n\t\tmetrics2.GetCounter(\"perf_ingest_no_data_in_file\", map[string]string{\"branch\": branch}).Inc(1)\n\t\tsklog.Infof(\"No data in: %q\", filename)\n\t\treturn nil\n\t}\n\tsklog.Infof(\"Processing %q\", filename)\n\tindex, ok := indexFromCache(benchData.Hash)\n\tif !ok {\n\t\tvar err error\n\t\tindex, err = vcs.IndexOf(ctx, benchData.Hash)\n\t\tif err != nil {\n\t\t\tif err := vcs.Update(context.Background(), true, false); err != nil {\n\t\t\t\treturn fmt.Errorf(\"Could not ingest, failed to pull: %s\", err)\n\t\t\t}\n\t\t\tindex, err = vcs.IndexOf(ctx, benchData.Hash)\n\t\t\tif err != nil {\n\t\t\t\tsklog.Errorf(\"Could not ingest, hash not found even after pulling %q: %s\", benchData.Hash, err)\n\t\t\t\treturn NonRecoverableError\n\t\t\t}\n\t\t}\n\t\tindexToCache(benchData.Hash, index)\n\t}\n\terr = store.WriteTraces(int32(index), params, values, paramset, filename, timestamp)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn sendPubSubEvent(params, paramset, filename)\n}", "func (gr *ActivityReport) Run() error {\n\n\t// create a client (safe to share across requests)\n\tctx := context.Background()\n\ttokenSource := oauth2.StaticTokenSource(\n\t\t&oauth2.Token{AccessToken: gr.gitHubToken},\n\t)\n\thttpClient := oauth2.NewClient(ctx, tokenSource)\n\tclient := graphql.NewClient(\"https://api.github.com/graphql\", graphql.WithHTTPClient(httpClient), graphql.UseInlineJSON())\n\t//client.Log = func(s string) { fmt.Println(s) }\n\n\tnow := time.Now()\n\tsince := now.AddDate(0, 0, -gr.Duration)\n\n\tgr.ReportDate = now\n\n\trepositories, err := gr.listRepositories(ctx, client, gr.Organization, \"\")\n\tif err != nil {\n\t\treturn errors.New(fmt.Sprintf(\"An error occured during repositories listing %v\\n\", err))\n\t} else {\n\t\tfor _, repoName := range repositories {\n\t\t\treport, err2 := gr.reportRepository(ctx, client, gr.Organization, repoName, since)\n\t\t\tif err2 != nil {\n\t\t\t\treturn errors.New(fmt.Sprintf(\"An error occured during report for %s: %v\\n\", repoName, err2))\n\t\t\t} else {\n\t\t\t\t// Build report\n\n\t\t\t\t// Extract Merged PR (keep the ones merged during last 7 days)\n\t\t\t\tfor _, pullrequest := range report.Repository.MergedPR.Nodes {\n\t\t\t\t\tt, _ := time.Parse(ISO_FORM, pullrequest.MergedAt)\n\t\t\t\t\tif t.After(since) {\n\t\t\t\t\t\tpullrequest.Repository = repoName\n\t\t\t\t\t\tgr.Result.MergedPRs = append(gr.Result.MergedPRs, pullrequest)\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\t// Extract Open PR with and without activity\n\t\t\t\tfor _, pullrequest := range report.Repository.OpenPR.Nodes {\n\t\t\t\t\tpullrequest.Repository = repoName\n\t\t\t\t\tif pullrequest.Timeline.TotalCount > 0 {\n\t\t\t\t\t\tgr.Result.OpenPRsWithActivity = append(gr.Result.OpenPRsWithActivity, pullrequest)\n\t\t\t\t\t} else {\n\t\t\t\t\t\tgr.Result.OpenPRsWithoutActivity = append(gr.Result.OpenPRsWithoutActivity, pullrequest)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tgr.logf(\"Nb merged pr:%d\\n\", len(gr.Result.MergedPRs))\n\t\tgr.logf(\"Nb open pr with activity:%d\\n\", len(gr.Result.OpenPRsWithActivity))\n\t\tgr.logf(\"Nb open pr without activity:%d\\n\", len(gr.Result.OpenPRsWithoutActivity))\n\t\treturn nil\n\t}\n}", "func (bi *blockImporter) statusHandler(resultsChan chan *importResults) {\n\tselect {\n\t// An error from either of the goroutines means we're done so signal\n\t// caller with the error and signal all goroutines to quit.\n\tcase err := <-bi.errChan:\n\t\tresultsChan <- &importResults{\n\t\t\tblocksProcessed: bi.blocksProcessed,\n\t\t\tblocksImported: bi.blocksImported,\n\t\t\terr: err,\n\t\t}\n\t\tclose(bi.quit)\n\n\t// The import finished normally.\n\tcase <-bi.doneChan:\n\t\tresultsChan <- &importResults{\n\t\t\tblocksProcessed: bi.blocksProcessed,\n\t\t\tblocksImported: bi.blocksImported,\n\t\t\terr: nil,\n\t\t}\n\t}\n}", "func ProcessAlert(reading *models.Reading) (RRSAlert, error) {\n\tmAlertReceived := metrics.GetOrRegisterGaugeCollection(\"Inventory.ProcessAlert.AlertReceived\", nil)\n\tmAlertDetails := metrics.GetOrRegisterGaugeCollection(\"Inventory.ProcessAlert.AlertDetails\", nil)\n\n\tmAlertReceived.Add(1) // Have to let metrics system know an alert occurred even if we can't provide details below\n\n\talert := RRSAlert{}\n\n\tdecoder := json.NewDecoder(strings.NewReader(reading.Value))\n\tif err := decoder.Decode(&alert); err != nil {\n\t\treturn RRSAlert{}, errors.Wrap(err, \"unable to Decode data\")\n\t}\n\n\tif alert.DeviceId == \"\" {\n\t\treturn RRSAlert{}, errors.New(\"Missing device_id Field\")\n\t}\n\tif alert.Number == 0 {\n\t\treturn RRSAlert{}, errors.New(\"Missing alert_number Field\")\n\t}\n\n\ttag := metrics.Tag{\n\t\tName: \"DeviceId\",\n\t\tValue: alert.DeviceId,\n\t}\n\t// Use tag version to flag the Alert with more details\n\tmAlertDetails.AddWithTag(int64(alert.Number), tag)\n\n\treturn alert, nil\n}", "func (r *backgroundResolver) processWorkItem(item workItem) {\n\tdefer r.queue.Done(item)\n\tr.logger.Debugf(\"Processing image %q from revision %q (depth: %d)\", item.image, item.revision, r.queue.Len())\n\n\t// We need to acquire the result under lock since it's theoretically possible\n\t// for a Clear to race with this and try to delete the result from the map.\n\tr.mu.RLock()\n\tresult := r.results[item.revision]\n\tr.mu.RUnlock()\n\n\tif result == nil {\n\t\treturn\n\t}\n\n\tctx, cancel := context.WithTimeout(context.Background(), item.timeout)\n\tdefer cancel()\n\n\tr.logger.Debugf(\"Resolving image %q from revision %q to digest\", item.image, item.revision)\n\tresolvedDigest, resolveErr := r.resolver.Resolve(ctx, item.image, result.opt, result.registriesToSkip)\n\tr.logger.Debugf(\"Resolved image %q from revision %q to digest %q, %v\", item.image, item.revision, resolvedDigest, resolveErr)\n\n\t// lock after the resolve because we don't want to block parallel resolves,\n\t// just storing the result.\n\tr.mu.Lock()\n\tdefer r.mu.Unlock()\n\n\t// If we succeeded we can stop remembering the item for back-off purposes.\n\tif resolveErr == nil {\n\t\tr.queue.Forget(item)\n\t}\n\n\t// If we're already ready we don't want to callback twice.\n\t// This can happen if an image resolve completes but we've already reported\n\t// an error from another image in the result.\n\tif result.ready() {\n\t\treturn\n\t}\n\n\tif resolveErr != nil {\n\t\tresult.err = fmt.Errorf(\"%s: %w\", v1.RevisionContainerMissingMessage(item.image, \"failed to resolve image to digest\"), resolveErr)\n\t\tresult.completionCallback()\n\t\treturn\n\t}\n\n\tresult.imagesResolved[item.image] = resolvedDigest\n\n\tif result.ready() {\n\t\tresult.completionCallback()\n\t}\n}", "func (r *ReconciliationTask) processVisibilities() {\n\tlogger := log.C(r.runContext)\n\tif r.platformClient.Visibility() == nil {\n\t\tlogger.Debug(\"Platform client cannot handle visibilities. Visibility reconciliation will be skipped.\")\n\t\treturn\n\t}\n\n\tplans, err := r.getSMPlans()\n\tif err != nil {\n\t\tlogger.WithError(err).Error(\"An error occurred while obtaining plans from Service Manager\")\n\t\treturn\n\t}\n\tvar platformVisibilities []*platform.ServiceVisibilityEntity\n\tif r.options.VisibilityCache && r.areSMPlansSame(plans) {\n\t\tplatformVisibilities = r.getPlatformVisibilitiesFromCache()\n\t}\n\n\tvisibilityCacheUsed := platformVisibilities != nil\n\tif !visibilityCacheUsed {\n\t\tplatformVisibilities, err = r.loadPlatformVisibilities(plans)\n\t\tif err != nil {\n\t\t\tlogger.WithError(err).Error(\"An error occurred while loading visibilities from platform\")\n\t\t\treturn\n\t\t}\n\t}\n\n\tplansMap := smPlansToMap(plans)\n\tsmVisibilities, err := r.getSMVisibilities(plansMap)\n\tif err != nil {\n\t\tlogger.WithError(err).Error(\"An error occurred while obtaining SM visibilities\")\n\t\treturn\n\t}\n\n\terrorOccured := r.reconcileServiceVisibilities(platformVisibilities, smVisibilities)\n\n\tif r.options.VisibilityCache {\n\t\tif errorOccured {\n\t\t\tr.cache.Delete(platformVisibilityCacheKey)\n\t\t\tr.cache.Delete(smPlansCacheKey)\n\t\t} else {\n\t\t\tr.updateVisibilityCache(visibilityCacheUsed, plansMap, smVisibilities)\n\t\t}\n\t}\n}", "func (bi *blockImporter) processHandler() {\nout:\n\tfor {\n\t\tselect {\n\t\tcase serializedBlock, ok := <-bi.processQueue:\n\t\t\t// We're done when the channel is closed.\n\t\t\tif !ok {\n\t\t\t\tbreak out\n\t\t\t}\n\n\t\t\tbi.blocksProcessed++\n\t\t\tbi.lastHeight++\n\t\t\timported, err := bi.processBlock(serializedBlock)\n\t\t\tif err != nil {\n\t\t\t\tbi.errChan <- err\n\t\t\t\tbreak out\n\t\t\t}\n\n\t\t\tif imported {\n\t\t\t\tbi.blocksImported++\n\t\t\t}\n\n\t\t\tbi.logProgress()\n\n\t\tcase <-bi.quit:\n\t\t\tbreak out\n\t\t}\n\t}\n\tbi.wg.Done()\n}", "func Process(inputFile string, outputFile string, db *Store) error {\n\tin, err := os.Open(inputFile)\n\tif err != nil {\n\t\treturn err\n\t}\n\tout, err := os.Create(outputFile)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer in.Close()\n\tdefer out.Close()\n\n\tscanner := bufio.NewScanner(in)\n\twriter := bufio.NewWriter(out)\n\tfor scanner.Scan() {\n\t\t// Parse the request\n\t\treq, err := NewRequest(scanner.Text())\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Check if it's already processed\n\t\tif db.IsDupTxn(req.ID, req.CustID) {\n\t\t\tlog.Println(\"Ignoring duplicate txn: \", req.ID)\n\t\t\tcontinue\n\t\t}\n\t\t// Fetch the account from DB\n\t\taccount := db.GetAccount(req.CustID)\n\t\t// Act on the request (if velocity limits agree)\n\t\taccepted := account.LoadFunds(req)\n\t\tresponse := NewResponse(req.ID, req.CustID, accepted)\n\t\tresBytes, err := json.Marshal(response)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Record the response\n\t\tif _, err = writer.WriteString(string(resBytes) + \"\\n\"); err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Record the transaction in DB\n\t\tdb.AddTxn(req.ID, req.CustID)\n\t}\n\t// Check if there were any errors while reading the input file\n\tif err := scanner.Err(); err != nil {\n\t\treturn err\n\t}\n\t// Flush any pending writes\n\twriter.Flush()\n\treturn nil\n}", "func main() {\n\tapex.HandleFunc(func(event json.RawMessage, ctx *apex.Context) (interface{}, error) {\n\t\tsvc := cloudwatch.New(session.New())\n\n\t\tvar conf Config\n\t\tif err := json.Unmarshal(event, &conf); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tif conf.BuildkiteApiAccessToken == \"\" {\n\t\t\treturn nil, errors.New(\"No BuildkiteApiAccessToken provided\")\n\t\t}\n\n\t\tif conf.BuildkiteOrgSlug == \"\" {\n\t\t\treturn nil, errors.New(\"No BuildkiteOrgSlug provided\")\n\t\t}\n\n\t\tlog.Printf(\"Querying buildkite for builds for org %s for past 5 mins\", conf.BuildkiteOrgSlug)\n\t\tbuilds, err := recentBuildkiteBuilds(conf.BuildkiteOrgSlug, conf.BuildkiteApiAccessToken)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tvar res Result = Result{\n\t\t\tQueues: map[string]Counts{},\n\t\t\tPipelines: map[string]Counts{},\n\t\t}\n\n\t\tlog.Printf(\"Aggregating results from %d builds\", len(builds))\n\t\tfor _, build := range builds {\n\t\t\tres.Counts = res.Counts.addBuild(build)\n\t\t\tres.Pipelines[build.Pipeline.Name] = res.Pipelines[build.Pipeline.Name].addBuild(build)\n\n\t\t\tvar buildQueues = map[string]int{}\n\t\t\tfor _, job := range build.Jobs {\n\t\t\t\tres.Counts = res.Counts.addJob(job)\n\t\t\t\tres.Pipelines[build.Pipeline.Name] = res.Pipelines[build.Pipeline.Name].addJob(job)\n\t\t\t\tres.Queues[job.Queue()] = res.Queues[job.Queue()].addJob(job)\n\t\t\t\tbuildQueues[job.Queue()]++\n\t\t\t}\n\n\t\t\tfor queue := range buildQueues {\n\t\t\t\tres.Queues[queue] = res.Queues[queue].addBuild(build)\n\t\t\t}\n\t\t}\n\n\t\tlog.Printf(\"Extracting cloudwatch metrics from results\")\n\t\tmetrics := res.extractMetricData()\n\n\t\tfor _, chunk := range chunkMetricData(10, metrics) {\n\t\t\tlog.Printf(\"Submitting chunk of %d metrics to Cloudwatch\", len(chunk))\n\t\t\tif err = putMetricData(svc, chunk); err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\n\t\treturn res, nil\n\t})\n}", "func (s *DNSSeeder) processResult(r *result) {\n\n\tvar nd *node\n\n\ts.mtx.Lock()\n\tdefer s.mtx.Unlock()\n\n\tif _, ok := s.nodes[r.node]; ok {\n\t\tnd = s.nodes[r.node]\n\t} else {\n\t\ts.log.Warnf(\"Ignoring results from unknown node: %s\", r.node)\n\t\treturn\n\t}\n\n\t// now nd has been set to a valid pointer we can use it in a defer\n\tdefer crawlEnd(nd)\n\n\t// msg is a crawlerror or nil\n\tif r.msg != nil {\n\t\t// update the fact that we have not connected to this node\n\t\tnd.lastTry = time.Now()\n\t\tnd.connectFails++\n\n\t\t// update the status of this failed node\n\t\tswitch nd.status {\n\t\tcase statusRG:\n\t\t\t// if we are full then any RG failures will skip directly to NG\n\t\t\tif len(s.nodes) > s.maxSize {\n\t\t\t\tnd.status = statusNG // not able to connect to this node so ignore\n\t\t\t} else {\n\t\t\t\tif nd.rating += 25; nd.rating > 30 {\n\t\t\t\t\tnd.status = statusWG\n\t\t\t\t}\n\t\t\t}\n\t\tcase statusCG:\n\t\t\tif nd.rating += 25; nd.rating >= 50 {\n\t\t\t\tnd.status = statusWG\n\t\t\t}\n\t\tcase statusWG:\n\t\t\tif nd.rating += 15; nd.rating >= 100 {\n\t\t\t\tnd.status = statusNG // not able to connect to this node so ignore\n\t\t\t}\n\t\t}\n\t\t// no more to do so return which will shutdown the goroutine & call\n\t\t// the deffered cleanup\n\t\ts.log.Debugf(\"Failed crawl node %s: %v\", nd.na.IP, r.msg)\n\n\t\treturn\n\t}\n\n\t// succesful connection and addresses received so mark status\n\tnd.status = statusCG\n\tnd.rating = 0\n\tnd.connectFails = 0\n\tnd.na.Timestamp = time.Now()\n\tnd.lastTry = nd.na.Timestamp\n\tnd.na.Services = r.services\n\n\tadded := 0\n\n\t// if we are full then skip adding more possible clients\n\tif len(s.nodes) < s.maxSize {\n\t\t// do not accept more than one third of maxSize addresses from one node\n\t\toneThird := int(float64(s.maxSize / 3))\n\n\t\t// loop through all the received network addresses and add to thelist if not present\n\t\tfor _, na := range r.nas {\n\t\t\t// a new network address so add to the system\n\t\t\tif x := s.addNa(na); x == true {\n\t\t\t\tif added++; added > oneThird {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\ts.log.Debugf(\"Crawl %s done: added %d nodes\", nd.na.IP, added)\n}", "func (s *Server) processScanPID(msg message.Message, db *database.DataStore) {\n\tlog.Debugf(\"[%s] Processing ScanPID response\", msg.ULID)\n\tif s.checkMsgErr(msg, models.Failed, db) {\n\t\t// TODO: Can I recover this? Should I ignore?\n\t\tmsg.Result = \"KO\"\n\t} else {\n\t\tif s.saveResult(msg, db) {\n\t\t\tmsg.Result = \"OK\"\n\t\t} else {\n\t\t\t// TODO: Request a new scan due errors while saving the report\n\t\t\tlog.Errorf(\"[%s] Error on processScanPID\", msg.ULID)\n\t\t}\n\t}\n\t// TODO:\n\t// - check error\n\t// - save the result\n\t// - send a message back\n\ts.w.Encode(msg)\n}", "func (lambda *Lambda) Execute(reconciliationMetaData *models.ReconciliationMetaData) error {\n\tif reconciliationMetaData.ReconciliationDate == \"\" {\n\n\t\treconciliationDateTime := time.Now()\n\t\treconciliationMetaData.ReconciliationDate = reconciliationDateTime.Format(dateFormat)\n\n\t\tstartTime := reconciliationDateTime.Truncate(24 * time.Hour)\n\t\treconciliationMetaData.StartTime = startTime\n\t\treconciliationMetaData.EndTime = startTime.Add(24 * time.Hour)\n\t} else {\n\n\t\tstartTime, err := time.Parse(dateFormat, reconciliationMetaData.ReconciliationDate)\n\t\tif err != nil {\n\t\t\tlog.Error(err)\n\t\t\treturn err\n\t\t}\n\n\t\treconciliationMetaData.StartTime = startTime\n\t\treconciliationMetaData.EndTime = startTime.Add(24 * time.Hour)\n\t}\n\n\tlog.Info(\"LFP error reporting lambda executing. Getting penalties with e5 errors for date: \" + reconciliationMetaData.ReconciliationDate + \". Creating lfp CSV.\")\n\n\tlfpCSV, err := lambda.Service.GetLFPCSV(reconciliationMetaData)\n\tif err != nil {\n\t\tlog.Error(err)\n\t\treturn err\n\t}\n\n\tlog.Info(\"LFP CSV constructed.\")\n\tlog.Trace(\"LFP CSV\", log.Data{\"lfp_csv\": lfpCSV})\n\n\terr = lambda.FileTransfer.UploadCSVFiles([]models.CSV{lfpCSV})\n\tif err != nil {\n\t\tlog.Error(err)\n\t\treturn err\n\t}\n\n\tlog.Info(\"CSV's successfully uploaded. Lambda execution finished.\")\n\n\treturn nil\n}", "func (s ConfigSync) process(ctx context.Context, action string) error {\n\tvar retErr error\n\tswitch s.Type {\n\tcase \"registry\":\n\t\tsRepos, err := rc.RepoList(ctx, s.Source)\n\t\tif err != nil {\n\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\"source\": s.Source,\n\t\t\t\t\"error\": err,\n\t\t\t}).Error(\"Failed to list source repositories\")\n\t\t\treturn err\n\t\t}\n\t\tsRepoList, err := sRepos.GetRepos()\n\t\tif err != nil {\n\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\"source\": s.Source,\n\t\t\t\t\"error\": err,\n\t\t\t}).Error(\"Failed to list source repositories\")\n\t\t\treturn err\n\t\t}\n\t\tfor _, repo := range sRepoList {\n\t\t\tsRepoRef, err := types.NewRef(fmt.Sprintf(\"%s/%s\", s.Source, repo))\n\t\t\tif err != nil {\n\t\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\t\"source\": s.Source,\n\t\t\t\t\t\"repo\": repo,\n\t\t\t\t\t\"error\": err,\n\t\t\t\t}).Error(\"Failed to define source reference\")\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tsTags, err := rc.TagList(ctx, sRepoRef)\n\t\t\tif err != nil {\n\t\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\t\"source\": sRepoRef.CommonName(),\n\t\t\t\t\t\"error\": err,\n\t\t\t\t}).Error(\"Failed getting source tags\")\n\t\t\t\tretErr = err\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tsTagsList, err := sTags.GetTags()\n\t\t\tif err != nil {\n\t\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\t\"source\": sRepoRef.CommonName(),\n\t\t\t\t\t\"error\": err,\n\t\t\t\t}).Error(\"Failed getting source tags\")\n\t\t\t\tretErr = err\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tsTagList, err := s.filterTags(sTagsList)\n\t\t\tif err != nil {\n\t\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\t\"source\": sRepoRef.CommonName(),\n\t\t\t\t\t\"allow\": s.Tags.Allow,\n\t\t\t\t\t\"deny\": s.Tags.Deny,\n\t\t\t\t\t\"error\": err,\n\t\t\t\t}).Error(\"Failed processing tag filters\")\n\t\t\t\tretErr = err\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif len(sTagList) == 0 {\n\t\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\t\"source\": sRepoRef.CommonName(),\n\t\t\t\t\t\"allow\": s.Tags.Allow,\n\t\t\t\t\t\"deny\": s.Tags.Deny,\n\t\t\t\t\t\"available\": sTagsList,\n\t\t\t\t}).Info(\"No matching tags found\")\n\t\t\t\tretErr = err\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ttRepoRef, err := types.NewRef(fmt.Sprintf(\"%s/%s\", s.Target, repo))\n\t\t\tif err != nil {\n\t\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\t\"target\": s.Target,\n\t\t\t\t\t\"repo\": repo,\n\t\t\t\t\t\"error\": err,\n\t\t\t\t}).Error(\"Failed parsing target\")\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tfor _, tag := range sTagList {\n\t\t\t\tsRef := sRepoRef\n\t\t\t\tsRef.Tag = tag\n\t\t\t\ttRef := tRepoRef\n\t\t\t\ttRef.Tag = tag\n\t\t\t\terr = s.processRef(ctx, sRef, tRef, action)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\t\t\"target\": tRef.CommonName(),\n\t\t\t\t\t\t\"source\": sRef.CommonName(),\n\t\t\t\t\t\t\"error\": err,\n\t\t\t\t\t}).Error(\"Failed to sync\")\n\t\t\t\t\tretErr = err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\tcase \"repository\":\n\t\tsRepoRef, err := types.NewRef(s.Source)\n\t\tif err != nil {\n\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\"source\": s.Source,\n\t\t\t\t\"error\": err,\n\t\t\t}).Error(\"Failed parsing source\")\n\t\t\treturn err\n\t\t}\n\t\tsTags, err := rc.TagList(ctx, sRepoRef)\n\t\tif err != nil {\n\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\"source\": sRepoRef.CommonName(),\n\t\t\t\t\"error\": err,\n\t\t\t}).Error(\"Failed getting source tags\")\n\t\t\treturn err\n\t\t}\n\t\tsTagsList, err := sTags.GetTags()\n\t\tif err != nil {\n\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\"source\": sRepoRef.CommonName(),\n\t\t\t\t\"error\": err,\n\t\t\t}).Error(\"Failed getting source tags\")\n\t\t\treturn err\n\t\t}\n\t\tsTagList, err := s.filterTags(sTagsList)\n\t\tif err != nil {\n\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\"source\": sRepoRef.CommonName(),\n\t\t\t\t\"allow\": s.Tags.Allow,\n\t\t\t\t\"deny\": s.Tags.Deny,\n\t\t\t\t\"error\": err,\n\t\t\t}).Error(\"Failed processing tag filters\")\n\t\t\treturn err\n\t\t}\n\t\tif len(sTagList) == 0 {\n\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\"source\": sRepoRef.CommonName(),\n\t\t\t\t\"allow\": s.Tags.Allow,\n\t\t\t\t\"deny\": s.Tags.Deny,\n\t\t\t\t\"available\": sTagsList,\n\t\t\t}).Warn(\"No matching tags found\")\n\t\t\treturn nil\n\t\t}\n\t\ttRepoRef, err := types.NewRef(s.Target)\n\t\tif err != nil {\n\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\"target\": s.Target,\n\t\t\t\t\"error\": err,\n\t\t\t}).Error(\"Failed parsing target\")\n\t\t\treturn err\n\t\t}\n\t\tfor _, tag := range sTagList {\n\t\t\tsRef := sRepoRef\n\t\t\tsRef.Tag = tag\n\t\t\ttRef := tRepoRef\n\t\t\ttRef.Tag = tag\n\t\t\terr = s.processRef(ctx, sRef, tRef, action)\n\t\t\tif err != nil {\n\t\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\t\"target\": tRef.CommonName(),\n\t\t\t\t\t\"source\": sRef.CommonName(),\n\t\t\t\t\t\"error\": err,\n\t\t\t\t}).Error(\"Failed to sync\")\n\t\t\t\tretErr = err\n\t\t\t}\n\t\t}\n\n\tcase \"image\":\n\t\tsRef, err := types.NewRef(s.Source)\n\t\tif err != nil {\n\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\"source\": s.Source,\n\t\t\t\t\"error\": err,\n\t\t\t}).Error(\"Failed parsing source\")\n\t\t\treturn err\n\t\t}\n\t\ttRef, err := types.NewRef(s.Target)\n\t\tif err != nil {\n\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\"target\": s.Target,\n\t\t\t\t\"error\": err,\n\t\t\t}).Error(\"Failed parsing target\")\n\t\t\treturn err\n\t\t}\n\t\terr = s.processRef(ctx, sRef, tRef, action)\n\t\tif err != nil {\n\t\t\tlog.WithFields(logrus.Fields{\n\t\t\t\t\"target\": tRef.CommonName(),\n\t\t\t\t\"source\": sRef.CommonName(),\n\t\t\t\t\"error\": err,\n\t\t\t}).Error(\"Failed to sync\")\n\t\t\tretErr = err\n\t\t}\n\n\tdefault:\n\t\tlog.WithFields(logrus.Fields{\n\t\t\t\"step\": s,\n\t\t\t\"type\": s.Type,\n\t\t}).Error(\"Type not recognized, must be one of: registry, repository, or image\")\n\t\treturn ErrInvalidInput\n\t}\n\treturn retErr\n}", "func (w *ServiceAnnotatorProcessor) Process(ctx context.Context, inObj cache.Delta) error {\n\tif inObj.Type != cache.Added {\n\t\treturn nil\n\t}\n\n\tobj, ok := inObj.Object.(*corev1.Service)\n\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tctx, cancel := context.WithTimeout(context.Background(), 20*time.Second)\n\tdefer cancel()\n\n\tlist := monitoringv1.ServiceMonitorList{}\n\terr := w.kubeClient.List(ctx, &list, client.MatchingFields{\n\t\trhmclient.IndexOwnerRefContains: string(obj.UID),\n\t})\n\n\tif err != nil && k8serrors.IsNotFound(err) {\n\t\treturn nil\n\t} else if err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\tfor i := range list.Items {\n\t\tretry.RetryOnConflict(retry.DefaultBackoff, func() error {\n\t\t\tsm := list.Items[i]\n\t\t\tkey, _ := client.ObjectKeyFromObject(sm)\n\n\t\t\tserviceMonitor := monitoringv1.ServiceMonitor{}\n\t\t\terr := w.kubeClient.Get(ctx, key, &serviceMonitor)\n\n\t\t\tif err != nil {\n\t\t\t\treturn errors.WithStack(err)\n\t\t\t}\n\n\t\t\tif utils.HasMapKey(serviceMonitor.ObjectMeta.Labels, utils.MeteredAnnotation) {\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tif serviceMonitor.ObjectMeta.Labels == nil {\n\t\t\t\tserviceMonitor.ObjectMeta.Labels = make(map[string]string)\n\t\t\t}\n\n\t\t\tutils.SetMapKeyValue(serviceMonitor.ObjectMeta.Labels, utils.MeteredAnnotation)\n\n\t\t\tw.log.Info(\"found servicemonitor to label\", \"sm\", serviceMonitor, \"labels\", sm.Labels)\n\t\t\treturn w.kubeClient.Update(ctx, &serviceMonitor)\n\t\t})\n\t}\n\n\treturn nil\n}", "func main() {\n\targs := os.Args[1:]\n\tif len(args) < 2 {\n\t\tpanic(fmt.Errorf(\"Usage: jira <source_id> <board_id>\"))\n\t}\n\tsourceId, err := strconv.ParseUint(args[0], 10, 64)\n\tif err != nil {\n\t\tpanic(fmt.Errorf(\"error paring source_id: %w\", err))\n\t}\n\tboardId, err := strconv.ParseUint(args[1], 10, 64)\n\tif err != nil {\n\t\tpanic(fmt.Errorf(\"error paring board_id: %w\", err))\n\t}\n\n\tPluginEntry.Init()\n\tprogress := make(chan float32)\n\tgo func() {\n\t\terr := PluginEntry.Execute(\n\t\t\tmap[string]interface{}{\n\t\t\t\t\"sourceId\": sourceId,\n\t\t\t\t\"boardId\": boardId,\n\t\t\t\t//\"tasks\": []string{\"enrichIssues\"},\n\t\t\t},\n\t\t\tprogress,\n\t\t\tcontext.Background(),\n\t\t)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}()\n\tfor p := range progress {\n\t\tfmt.Println(p)\n\t}\n}", "func (res *Results) Finalize() {\n res.Replies = len(res.Took)\n res.min()\n res.max()\n res.avg()\n res.med()\n res.pct()\n\n // Code counts\n for _, code := range res.Code {\n if code < 100 { // ignore\n } else if code < 200 {\n res.Code1xx++\n } else if code < 300 {\n res.Code2xx++\n } else if code < 400 {\n res.Code3xx++\n } else if code < 500 {\n res.Code4xx++\n } else if code < 600 {\n res.Code5xx++\n }\n }\n\n // Error counts\n res.ErrorsTotal = len(res.Errors)\n\n for _, err := range res.Errors {\n e := err.(*url.Error).Err.(*net.OpError).Error()\n if strings.Contains(e, \"connection refused\") {\n res.ErrorsConnRefused++\n } else if strings.Contains(e, \"connection reset\") {\n res.ErrorsConnReset++\n } else if strings.Contains(e, \"connection timed out\") {\n res.ErrorsConnTimeout++\n } else if strings.Contains(e, \"no free file descriptors\") {\n res.ErrorsFdUnavail++\n } else if strings.Contains(e, \"no such host\") {\n res.ErrorsAddrUnavail++\n } else {\n res.ErrorsOther++\n }\n }\n}", "func (rh *ReceiverHandler) processAlert(msg *webhook.Message) error {\n\t// TODO(dev): Cache list results.\n\t// List known issues from github.\n\tissues, err := rh.Client.ListOpenIssues()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Search for an issue that matches the notification message from AM.\n\tmsgTitle, err := rh.formatTitle(msg)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"format title for %q: %s\", msg.GroupKey, err)\n\t}\n\tvar foundIssue *github.Issue\n\tfor _, issue := range issues {\n\t\tif msgTitle == *issue.Title {\n\t\t\tlog.Printf(\"Found matching issue: %s\\n\", msgTitle)\n\t\t\tfoundIssue = issue\n\t\t\tbreak\n\t\t}\n\t}\n\n\tvar alertName = msg.Data.GroupLabels[\"alertname\"]\n\treceivedAlerts.WithLabelValues(alertName, msg.Data.Status).Inc()\n\n\t// The message is currently firing and we did not find a matching\n\t// issue from github, so create a new issue.\n\tif msg.Data.Status == \"firing\" {\n\t\tif foundIssue == nil {\n\t\t\tmsgBody, err := rh.formatIssueBody(msg)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"format body for %q: %s\", msg.GroupKey, err)\n\t\t\t}\n\t\t\t_, err = rh.Client.CreateIssue(rh.getTargetRepo(msg), msgTitle, msgBody, rh.ExtraLabels)\n\t\t\tif err == nil {\n\t\t\t\tcreatedIssues.WithLabelValues(alertName).Inc()\n\t\t\t}\n\t\t} else {\n\t\t\terr = rh.Client.LabelIssue(foundIssue, rh.ResolvedLabel, false)\n\t\t}\n\t\treturn err\n\t}\n\n\t// The message is resolved and we found a matching open issue from github.\n\t// If AutoClose is true, then close the issue.\n\tif msg.Data.Status == \"resolved\" && foundIssue != nil {\n\t\t// NOTE: there can be multiple \"resolved\" messages for the same\n\t\t// alert. Prometheus evaluates rules every `evaluation_interval`.\n\t\t// And, alertmanager preserves an alert until `resolve_timeout`. So\n\t\t// expect (resolve_timeout / evaluation_interval) messages.\n\t\terr := rh.Client.LabelIssue(foundIssue, rh.ResolvedLabel, true)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif rh.AutoClose {\n\t\t\t_, err := rh.Client.CloseIssue(foundIssue)\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// log.Printf(\"Unsupported WebhookMessage.Data.Status: %s\", msg.Data.Status)\n\treturn nil\n}", "func (f *coprocessorFetcher) fetch() {\n\tfor {\n\t\tresp, region, err := f.next()\n\t\tif err != nil {\n\t\t\tif err != ErrDeadline {\n\t\t\t\t// if the context of the scan rpc wasn't cancelled (same as calling Close()),\n\t\t\t\t// return the error to client\n\t\t\t\tf.trySend(nil, err)\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t\tf.update( region)\n\t\tif f.trySend(resp.Value,nil ){\n\t\t\tbreak\n\t\t}\n\t\t// check whether we should close the scanner before making next request\n\t\tif f.shouldClose(resp, region) {\n\t\t\tbreak\n\t\t}\n\t}\n\n\tclose(f.resultsCh)\n\n}", "func handleScan(domains []hooks.DomainsReachable, internalChannel chan hooks.InternalMessage) []hooks.DomainsReachable {\n\tfor (len(manager.Errors) > 0 || len(domains) > 0) && int(manager.Status.GetCurrentScans()) < manager.MaxParallelScans {\n\t\tmanager.FirstScan = true\n\t\tvar scanMsg hooks.InternalMessage\n\t\tvar retDom = domains\n\t\tvar scan hooks.DomainsReachable\n\t\t// pop fist domain\n\t\tif manager.CheckDoError() && len(manager.Errors) != 0 {\n\t\t\tscanMsg, manager.Errors = manager.Errors[0], manager.Errors[1:]\n\t\t\tmanager.Logger.Tracef(\"Retrying failed assessment next: %v\", scanMsg.Domain.DomainName)\n\t\t} else if len(domains) != 0 {\n\t\t\tscan, retDom = domains[0], domains[1:]\n\t\t\tscanMsg = hooks.InternalMessage{\n\t\t\t\tDomain: scan,\n\t\t\t\tResults: nil,\n\t\t\t\tRetries: 0,\n\t\t\t\tStatusCode: hooks.InternalNew,\n\t\t\t}\n\t\t\tmanager.Logger.Tracef(\"Trying new assessment next: %v\", scanMsg.Domain.DomainName)\n\t\t} else {\n\t\t\tmanager.Logger.Tracef(\"No new assessment started\")\n\t\t\treturn domains\n\t\t}\n\t\tmanager.Logger.Debugf(\"Started assessment for %v\", scanMsg.Domain.DomainName)\n\t\tgo assessment(scanMsg, internalChannel)\n\t\tmanager.Status.AddCurrentScans(1)\n\t\treturn retDom\n\t}\n\tmanager.Logger.Tracef(\"no new Assessment started\")\n\treturn domains\n}", "func ProcessRegressions(ctx context.Context,\n\treq *RegressionDetectionRequest,\n\tdetectorResponseProcessor DetectorResponseProcessor,\n\tperfGit *perfgit.Git,\n\tshortcutStore shortcut.Store,\n\tdfBuilder dataframe.DataFrameBuilder,\n\tps paramtools.ReadOnlyParamSet,\n\texpandBaseRequest BaseAlertHandling,\n\titeration Iteration,\n\tanomalyConfig config.AnomalyConfig,\n) error {\n\tctx, span := trace.StartSpan(ctx, \"ProcessRegressions\")\n\tdefer span.End()\n\n\tallRequests := allRequestsFromBaseRequest(req, ps, expandBaseRequest)\n\tspan.AddAttributes(trace.Int64Attribute(\"num_requests\", int64(len(allRequests))))\n\tsklog.Infof(\"Single request expanded into %d requests.\", len(allRequests))\n\n\tmetrics2.GetCounter(\"perf_regression_detection_requests\").Inc(1)\n\n\tfor index, req := range allRequests {\n\t\treq.Progress.Message(\"Requests\", fmt.Sprintf(\"Processing request %d/%d\", index, len(allRequests)))\n\t\treq.Progress.Message(\"Stage\", \"Loading data to analyze\")\n\t\t// Create a single large dataframe then chop it into 2*radius+1 length sub-dataframes in the iterator.\n\t\tsklog.Infof(\"Building DataFrameIterator for %q\", req.Query())\n\t\treq.Progress.Message(\"Query\", req.Query())\n\t\titerErrorCallback := func(msg string) {\n\t\t\treq.Progress.Message(\"Iteration\", msg)\n\t\t}\n\t\titer, err := dfiter.NewDataFrameIterator(ctx, req.Progress, dfBuilder, perfGit, iterErrorCallback, req.Query(), req.Domain, req.Alert, anomalyConfig)\n\t\tif err != nil {\n\t\t\tif iteration == ContinueOnError {\n\t\t\t\t// Don't log if we just didn't get enough data.\n\t\t\t\tif err != dfiter.ErrInsufficientData {\n\t\t\t\t\tsklog.Warning(err)\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\treturn err\n\t\t}\n\t\treq.Progress.Message(\"Info\", \"Data loaded.\")\n\t\tdetectionProcess := &regressionDetectionProcess{\n\t\t\trequest: req,\n\t\t\tperfGit: perfGit,\n\t\t\tdetectorResponseProcessor: detectorResponseProcessor,\n\t\t\tshortcutStore: shortcutStore,\n\t\t\titer: iter,\n\t\t}\n\t\tdetectionProcess.iter = iter\n\t\tif err := detectionProcess.run(ctx); err != nil {\n\t\t\treturn skerr.Wrapf(err, \"Failed to run a sub-query: %q\", req.Query())\n\t\t}\n\t}\n\treturn nil\n}", "func (m *ProcessImportResult) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateCheckExistenceResult(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validatePromoteJobID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateValidationResults(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func (s *Client) ProcessImportJob(job *params.ImportJob) (client.Response, error) {\n\tjob.Job = \"import\"\n\treturn s.c.Post(job.GetEndpoint(), job)\n}", "func (ScrapeStatusAccount) Scrape(ctx context.Context, db *sql.DB, ch chan<- prometheus.Metric, logger log.Logger) error {\n\tglobalStatusRows, err := db.QueryContext(ctx, statusAccountQuery)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer globalStatusRows.Close()\n\n\tvar user, host, key string\n\tvar val uint64\n\n\tfor globalStatusRows.Next() {\n\t\tif err := globalStatusRows.Scan(&user, &host, &key, &val); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tch <- prometheus.MustNewConstMetric(StatusAccountDesc, prometheus.CounterValue, float64(val), user, host, strings.ToLower(key))\n\t}\n\n\treturn nil\n}", "func loadInspections() {\n\tesv := enigmaSearchVal{\n\t\tkey: \"zipcode\",\n\t\tvalues: []string{\"11222\", \"11211\"},\n\t}\n\n\t// Call enigma until no more results\n\tpageInt := 1\n\tfor {\n\t\tenigmaURL := getEnigmaURL(\n\t\t\t`us.states.ny.cities.nyc.dohmh.restaurants.inspections`,\n\t\t\t[]enigmaSearchVal{esv},\n\t\t\tfmt.Sprint(pageInt),\n\t\t\t// Sort by ascending date, so the final values are most recent\n\t\t\t\"inspdate+\",\n\t\t)\n\n\t\tlog.Println(enigmaURL)\n\n\t\tiResp := inspectionResponse{}\n\t\terr := getJSON(enigmaURL, &iResp)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\t// If no results, stop the loop\n\t\tif len(iResp.Result) < 1 {\n\t\t\tbreak\n\t\t}\n\n\t\t// Go over each result and update new values\n\t\tfor _, resp := range iResp.Result {\n\t\t\t// The key is the addresss\n\t\t\tkey := fmt.Sprint(resp.Building, \" \", resp.Street)\n\n\t\t\tif cachedLicenses[key] != nil {\n\t\t\t\tlog.Printf(\"%+v\", resp)\n\t\t\t\tcachedLicenses[key].CurrentGrade = resp.CurrentGrade\n\t\t\t\tcachedLicenses[key].BusinessName = resp.BusinessName\n\t\t\t\tcachedLicenses[key].InspectionDate = resp.InspectionDate\n\t\t\t}\n\t\t}\n\n\t\tpageInt++\n\n\t}\n\n}", "func processStatResults(\n\tresults []cache.Result,\n\tstatInfoHistoryThreadsafe threadsafe.ResultInfoHistory,\n\tstatResultHistoryThreadsafe threadsafe.ResultStatHistory,\n\tstatMaxKbpsesThreadsafe threadsafe.CacheKbpses,\n\tcombinedStatesThreadsafe peer.CRStatesThreadsafe,\n\tlastStats threadsafe.LastStats,\n\ttoData todata.TOData,\n\terrorCount threadsafe.Uint,\n\tdsStats threadsafe.DSStats,\n\tlastStatEndTimes map[enum.CacheName]time.Time,\n\tlastStatDurationsThreadsafe threadsafe.DurationMap,\n\tunpolledCaches threadsafe.UnpolledCaches,\n\tmc to.TrafficMonitorConfigMap,\n\tprecomputedData map[enum.CacheName]cache.PrecomputedData,\n\tlastResults map[enum.CacheName]cache.Result,\n\tlocalStates peer.CRStatesThreadsafe,\n\tevents health.ThreadsafeEvents,\n\tlocalCacheStatusThreadsafe threadsafe.CacheAvailableStatus,\n\toverrideMap map[enum.CacheName]bool,\n\tcombineState func(),\n) {\n\tif len(results) == 0 {\n\t\treturn\n\t}\n\tcombinedStates := combinedStatesThreadsafe.Get()\n\tdefer func() {\n\t\tfor _, r := range results {\n\t\t\t// log.Debugf(\"poll %v %v statfinish\\n\", result.PollID, endTime)\n\t\t\tr.PollFinished <- r.PollID\n\t\t}\n\t}()\n\n\t// setting the statHistory could be put in a goroutine concurrent with `ds.CreateStats`, if it were slow\n\tstatInfoHistory := statInfoHistoryThreadsafe.Get().Copy()\n\tstatResultHistory := statResultHistoryThreadsafe.Get().Copy()\n\tstatMaxKbpses := statMaxKbpsesThreadsafe.Get().Copy()\n\n\tfor i, result := range results {\n\t\tmaxStats := uint64(mc.Profile[mc.TrafficServer[string(result.ID)].Profile].Parameters.HistoryCount)\n\t\tif maxStats < 1 {\n\t\t\tlog.Infof(\"processStatResults got history count %v for %v, setting to 1\\n\", maxStats, result.ID)\n\t\t\tmaxStats = 1\n\t\t}\n\n\t\t// TODO determine if we want to add results with errors, or just print the errors now and don't add them.\n\t\tif lastResult, ok := lastResults[result.ID]; ok && result.Error == nil {\n\t\t\thealth.GetVitals(&result, &lastResult, &mc) // TODO precompute\n\t\t\tif result.Error == nil {\n\t\t\t\tresults[i] = result\n\t\t\t} else {\n\t\t\t\tlog.Errorf(\"stat poll getting vitals for %v: %v\\n\", result.ID, result.Error)\n\t\t\t}\n\t\t}\n\t\tstatInfoHistory.Add(result, maxStats)\n\t\tstatResultHistory.Add(result, maxStats)\n\t\t// Don't add errored maxes or precomputed DSStats\n\t\tif result.Error == nil {\n\t\t\t// max and precomputed always contain the latest result from each cache\n\t\t\tstatMaxKbpses.AddMax(result)\n\t\t\t// if we failed to compute the OutBytes, keep the outbytes of the last result.\n\t\t\tif result.PrecomputedData.OutBytes == 0 {\n\t\t\t\tresult.PrecomputedData.OutBytes = precomputedData[result.ID].OutBytes\n\t\t\t}\n\t\t\tprecomputedData[result.ID] = result.PrecomputedData\n\n\t\t}\n\t\tlastResults[result.ID] = result\n\t}\n\tstatInfoHistoryThreadsafe.Set(statInfoHistory)\n\tstatResultHistoryThreadsafe.Set(statResultHistory)\n\tstatMaxKbpsesThreadsafe.Set(statMaxKbpses)\n\n\tnewDsStats, newLastStats, err := ds.CreateStats(precomputedData, toData, combinedStates, lastStats.Get().Copy(), time.Now(), mc, events, localStates)\n\tif err != nil {\n\t\terrorCount.Inc()\n\t\tlog.Errorf(\"getting deliveryservice: %v\\n\", err)\n\t} else {\n\t\tdsStats.Set(newDsStats)\n\t\tlastStats.Set(newLastStats)\n\t}\n\n\thealth.CalcAvailability(results, \"stat\", statResultHistory, mc, toData, localCacheStatusThreadsafe, localStates, events)\n\tcombineState()\n\n\tendTime := time.Now()\n\tlastStatDurations := threadsafe.CopyDurationMap(lastStatDurationsThreadsafe.Get())\n\tfor _, result := range results {\n\t\tif lastStatStart, ok := lastStatEndTimes[result.ID]; ok {\n\t\t\td := time.Since(lastStatStart)\n\t\t\tlastStatDurations[result.ID] = d\n\t\t}\n\t\tlastStatEndTimes[result.ID] = endTime\n\t}\n\tlastStatDurationsThreadsafe.Set(lastStatDurations)\n\tunpolledCaches.SetPolled(results, lastStats.Get())\n}", "func (j *DSGitHub) FetchItemsIssue(ctx *Ctx) (err error) {\n\t// Process issues (possibly in threads)\n\tvar (\n\t\tch chan error\n\t\tallIssues []interface{}\n\t\tallIssuesMtx *sync.Mutex\n\t\tescha []chan error\n\t\teschaMtx *sync.Mutex\n\t)\n\tif j.ThrN > 1 {\n\t\tch = make(chan error)\n\t\tallIssuesMtx = &sync.Mutex{}\n\t\teschaMtx = &sync.Mutex{}\n\t}\n\tnThreads, nIss, issProcessed := 0, 0, 0\n\tprocessIssue := func(c chan error, issue map[string]interface{}) (wch chan error, e error) {\n\t\tdefer func() {\n\t\t\tif c != nil {\n\t\t\t\tc <- e\n\t\t\t}\n\t\t}()\n\t\titem, err := j.ProcessIssue(ctx, issue)\n\t\tFatalOnError(err)\n\t\tesItem := j.AddMetadata(ctx, item)\n\t\tif ctx.Project != \"\" {\n\t\t\titem[\"project\"] = ctx.Project\n\t\t}\n\t\tesItem[\"data\"] = item\n\t\tif issProcessed%ItemsPerPage == 0 {\n\t\t\tPrintf(\"%s/%s: processed %d/%d issues\\n\", j.URL, j.Category, issProcessed, nIss)\n\t\t}\n\t\tif allIssuesMtx != nil {\n\t\t\tallIssuesMtx.Lock()\n\t\t}\n\t\tallIssues = append(allIssues, esItem)\n\t\tnIssues := len(allIssues)\n\t\tif nIssues >= ctx.ESBulkSize {\n\t\t\tsendToElastic := func(c chan error) (ee error) {\n\t\t\t\tdefer func() {\n\t\t\t\t\tif c != nil {\n\t\t\t\t\t\tc <- ee\n\t\t\t\t\t}\n\t\t\t\t}()\n\t\t\t\tee = SendToElastic(ctx, j, true, UUID, allIssues)\n\t\t\t\tif ee != nil {\n\t\t\t\t\tPrintf(\"%s/%s: error %v sending %d issues to ElasticSearch\\n\", j.URL, j.Category, ee, len(allIssues))\n\t\t\t\t}\n\t\t\t\tallIssues = []interface{}{}\n\t\t\t\tif allIssuesMtx != nil {\n\t\t\t\t\tallIssuesMtx.Unlock()\n\t\t\t\t}\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif j.ThrN > 1 {\n\t\t\t\twch = make(chan error)\n\t\t\t\tgo func() {\n\t\t\t\t\t_ = sendToElastic(wch)\n\t\t\t\t}()\n\t\t\t} else {\n\t\t\t\te = sendToElastic(nil)\n\t\t\t\tif e != nil {\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\tif allIssuesMtx != nil {\n\t\t\t\tallIssuesMtx.Unlock()\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tissues, err := j.githubIssues(ctx, j.Org, j.Repo, ctx.DateFrom)\n\tFatalOnError(err)\n\truntime.GC()\n\tnIss = len(issues)\n\tPrintf(\"%s/%s: got %d issues\\n\", j.URL, j.Category, nIss)\n\tif j.ThrN > 1 {\n\t\tfor _, issue := range issues {\n\t\t\tgo func(iss map[string]interface{}) {\n\t\t\t\tvar (\n\t\t\t\t\te error\n\t\t\t\t\tesch chan error\n\t\t\t\t)\n\t\t\t\tesch, e = processIssue(ch, iss)\n\t\t\t\tif e != nil {\n\t\t\t\t\tPrintf(\"%s/%s: issues process error: %v\\n\", j.URL, j.Category, e)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tif esch != nil {\n\t\t\t\t\tif eschaMtx != nil {\n\t\t\t\t\t\teschaMtx.Lock()\n\t\t\t\t\t}\n\t\t\t\t\tescha = append(escha, esch)\n\t\t\t\t\tif eschaMtx != nil {\n\t\t\t\t\t\teschaMtx.Unlock()\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}(issue)\n\t\t\tnThreads++\n\t\t\tif nThreads == j.ThrN {\n\t\t\t\terr = <-ch\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tissProcessed++\n\t\t\t\tnThreads--\n\t\t\t}\n\t\t}\n\t\tfor nThreads > 0 {\n\t\t\terr = <-ch\n\t\t\tnThreads--\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tissProcessed++\n\t\t}\n\t} else {\n\t\tfor _, issue := range issues {\n\t\t\t_, err = processIssue(nil, issue)\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tissProcessed++\n\t\t}\n\t}\n\tif eschaMtx != nil {\n\t\teschaMtx.Lock()\n\t}\n\tfor _, esch := range escha {\n\t\terr = <-esch\n\t\tif err != nil {\n\t\t\tif eschaMtx != nil {\n\t\t\t\teschaMtx.Unlock()\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t}\n\tif eschaMtx != nil {\n\t\teschaMtx.Unlock()\n\t}\n\tnIssues := len(allIssues)\n\tif ctx.Debug > 0 {\n\t\tPrintf(\"%d remaining issues to send to ES\\n\", nIssues)\n\t}\n\tif nIssues > 0 {\n\t\terr = SendToElastic(ctx, j, true, UUID, allIssues)\n\t\tif err != nil {\n\t\t\tPrintf(\"%s/%s: error %v sending %d issues to ES\\n\", j.URL, j.Category, err, len(allIssues))\n\t\t}\n\t}\n\treturn\n}", "func (c *Controller) syncJira(key queueKey) error {\n\tdefer func() {\n\t\tif err := recover(); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}()\n\n\trelease, err := c.loadReleaseForSync(key.namespace, key.name)\n\tif err != nil || release == nil {\n\t\tklog.V(6).Infof(\"jira: could not load release for sync for %s/%s\", key.namespace, key.name)\n\t\treturn err\n\t}\n\n\tklog.V(6).Infof(\"checking if %v (%s) has verifyIssues set\", key, release.Config.Name)\n\n\t// check if verifyIssues publish step is enabled for release\n\tvar verifyIssues *releasecontroller.PublishVerifyIssues\n\tfor _, publishType := range release.Config.Publish {\n\t\tif publishType.Disabled {\n\t\t\tcontinue\n\t\t}\n\t\tswitch {\n\t\tcase publishType.VerifyIssues != nil:\n\t\t\tverifyIssues = publishType.VerifyIssues\n\t\t}\n\t\tif verifyIssues != nil {\n\t\t\tbreak\n\t\t}\n\t}\n\tif verifyIssues == nil {\n\t\tklog.V(6).Infof(\"%v (%s) does not have verifyIssues set\", key, release.Config.Name)\n\t\treturn nil\n\t}\n\n\tklog.V(4).Infof(\"Verifying fixed issues in %s\", release.Config.Name)\n\n\t// get accepted tags\n\tacceptedTags := releasecontroller.SortedRawReleaseTags(release, releasecontroller.ReleasePhaseAccepted)\n\ttag, prevTag := getNonVerifiedTagsJira(acceptedTags)\n\tif tag == nil {\n\t\tklog.V(6).Infof(\"jira: All accepted tags for %s have already been verified\", release.Config.Name)\n\t\treturn nil\n\t}\n\tif prevTag == nil {\n\t\tif verifyIssues.PreviousReleaseTag == nil {\n\t\t\tklog.V(2).Infof(\"jira error: previous release unset for %s\", release.Config.Name)\n\t\t\tc.jiraErrorMetrics.WithLabelValues(jiraPrevReleaseUnset).Inc()\n\t\t\treturn fmt.Errorf(\"jira error: previous release unset for %s\", release.Config.Name)\n\t\t}\n\t\tstream, err := c.imageClient.ImageStreams(verifyIssues.PreviousReleaseTag.Namespace).Get(context.TODO(), verifyIssues.PreviousReleaseTag.Name, meta.GetOptions{})\n\t\tif err != nil {\n\t\t\tklog.V(2).Infof(\"jira: failed to get imagestream (%s/%s) when getting previous release for %s: %v\", verifyIssues.PreviousReleaseTag.Namespace, verifyIssues.PreviousReleaseTag.Name, release.Config.Name, err)\n\t\t\tc.jiraErrorMetrics.WithLabelValues(jiraPrevImagestreamGetErr).Inc()\n\t\t\treturn err\n\t\t}\n\t\tprevTag = releasecontroller.FindTagReference(stream, verifyIssues.PreviousReleaseTag.Tag)\n\t\tif prevTag == nil {\n\t\t\tklog.V(2).Infof(\"jira: failed to get tag %s in imagestream (%s/%s) when getting previous release for %s\", verifyIssues.PreviousReleaseTag.Tag, verifyIssues.PreviousReleaseTag.Namespace, verifyIssues.PreviousReleaseTag.Name, release.Config.Name)\n\t\t\tc.jiraErrorMetrics.WithLabelValues(jiraMissingTag).Inc()\n\t\t\treturn fmt.Errorf(\"failed to find tag %s in imagestream %s/%s\", verifyIssues.PreviousReleaseTag.Tag, verifyIssues.PreviousReleaseTag.Namespace, verifyIssues.PreviousReleaseTag.Name)\n\t\t}\n\t}\n\t// To make sure all tags are up-to-date, requeue when non-verified tags are found; this allows us to make\n\t// sure tags that may not have been passed to this function (such as older tags) get processed,\n\t// and it also allows us to handle the case where the imagestream fails to update below.\n\tdefer c.queue.AddAfter(key, time.Second)\n\n\tdockerRepo := release.Target.Status.PublicDockerImageRepository\n\tif len(dockerRepo) == 0 {\n\t\tklog.V(4).Infof(\"jira: release target %s does not have a configured registry\", release.Target.Name)\n\t\tc.jiraErrorMetrics.WithLabelValues(jiraNoRegistry).Inc()\n\t\treturn fmt.Errorf(\"jira: release target %s does not have a configured registry\", release.Target.Name)\n\t}\n\n\tissues, err := c.releaseInfo.Bugs(dockerRepo+\":\"+prevTag.Name, dockerRepo+\":\"+tag.Name)\n\tvar issueList []string\n\tfor _, issue := range issues {\n\t\tif issue.Source == 1 {\n\t\t\tissueList = append(issueList, issue.ID)\n\t\t}\n\t}\n\tif err != nil {\n\t\tklog.V(4).Infof(\"Jira: Unable to generate bug list from %s to %s: %v\", prevTag.Name, tag.Name, err)\n\t\tc.jiraErrorMetrics.WithLabelValues(jiraUnableToGenerateBuglist).Inc()\n\t\treturn fmt.Errorf(\"jira: unable to generate bug list from %s to %s: %w\", prevTag.Name, tag.Name, err)\n\t}\n\tvar errs []error\n\tif errs := append(errs, c.jiraVerifier.VerifyIssues(issueList, tag.Name)...); len(errs) != 0 {\n\t\tklog.V(4).Infof(\"Error(s) in jira verifier: %v\", utilerrors.NewAggregate(errs))\n\t\tc.jiraErrorMetrics.WithLabelValues(jiraVerifier).Inc()\n\t\treturn utilerrors.NewAggregate(errs)\n\t}\n\n\tvar lastErr error\n\terr = wait.PollImmediate(15*time.Second, 1*time.Minute, func() (bool, error) {\n\t\t// Get the latest version of ImageStream before trying to update annotations\n\t\ttarget, err := c.imageClient.ImageStreams(release.Target.Namespace).Get(context.TODO(), release.Target.Name, meta.GetOptions{})\n\t\tif err != nil {\n\t\t\tklog.V(4).Infof(\"Failed to get latest version of target release stream %s: %v\", release.Target.Name, err)\n\t\t\tc.jiraErrorMetrics.WithLabelValues(jiraImagestreamGetErr).Inc()\n\t\t\treturn false, err\n\t\t}\n\t\ttagToBeUpdated := releasecontroller.FindTagReference(target, tag.Name)\n\t\tif tagToBeUpdated == nil {\n\t\t\tklog.V(6).Infof(\"release %s no longer exists, cannot set annotation %s=true\", tag.Name, releasecontroller.ReleaseAnnotationIssuesVerified)\n\t\t\treturn false, fmt.Errorf(\"release %s no longer exists, cannot set annotation %s=true\", tag.Name, releasecontroller.ReleaseAnnotationIssuesVerified)\n\t\t}\n\t\tif tagToBeUpdated.Annotations == nil {\n\t\t\ttagToBeUpdated.Annotations = make(map[string]string)\n\t\t}\n\t\ttagToBeUpdated.Annotations[releasecontroller.ReleaseAnnotationIssuesVerified] = \"true\"\n\t\tklog.V(6).Infof(\"Setting %s annotation to \\\"true\\\" for %s in imagestream %s/%s\", releasecontroller.ReleaseAnnotationIssuesVerified, tag.Name, target.GetNamespace(), target.GetName())\n\t\tif _, err := c.imageClient.ImageStreams(target.Namespace).Update(context.TODO(), target, meta.UpdateOptions{}); err != nil {\n\t\t\tklog.V(4).Infof(\"Failed to update Jira annotation for tag %s in imagestream %s/%s: %v\", tag.Name, target.GetNamespace(), target.GetName(), err)\n\t\t\tlastErr = err\n\t\t\treturn false, nil\n\t\t}\n\t\treturn true, nil\n\t})\n\tif err != nil {\n\t\tif lastErr != nil && errors.Is(err, wait.ErrWaitTimeout) {\n\t\t\terr = lastErr\n\t\t}\n\t\tc.jiraErrorMetrics.WithLabelValues(jiraFailedAnnotation).Inc()\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (c *Collection) Process(outdir string) error {\n\tfor _, a := range c.assets {\n\t\tif err := c.ProcessAsset(a, c.filters, outdir); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func (c *Client) ProcessUnprocessedTickets(ctx context.Context, tickets []*chainhash.Hash) {\n\tvar wg sync.WaitGroup\n\n\tfor _, hash := range tickets {\n\t\tc.mu.Lock()\n\t\tfp := c.jobs[*hash]\n\t\tc.mu.Unlock()\n\t\tif fp != nil {\n\t\t\t// Already processing this ticket with the VSP.\n\t\t\tcontinue\n\t\t}\n\n\t\t// Start processing in the background.\n\t\twg.Add(1)\n\t\tgo func(ticketHash *chainhash.Hash) {\n\t\t\tdefer wg.Done()\n\t\t\terr := c.Process(ctx, ticketHash, nil)\n\t\t\tif err != nil {\n\t\t\t\tc.log.Error(err)\n\t\t\t}\n\t\t}(hash)\n\t}\n\n\twg.Wait()\n}", "func (ix *Reindexer) Do() (*ReindexerResponse, error) {\n\tif ix.sourceClient == nil {\n\t\treturn nil, errors.New(\"no source client\")\n\t}\n\tif ix.sourceIndex == \"\" {\n\t\treturn nil, errors.New(\"no source index\")\n\t}\n\tif ix.targetClient == nil {\n\t\tix.targetClient = ix.sourceClient\n\t}\n\tif ix.scanFields == nil {\n\t\tix.scanFields = []string{\"_source\", \"_parent\", \"_routing\"}\n\t}\n\tif ix.bulkSize <= 0 {\n\t\tix.bulkSize = 500\n\t}\n\tif ix.scroll == \"\" {\n\t\tix.scroll = \"5m\"\n\t}\n\n\t// Count total to report progress (if necessary)\n\tvar err error\n\tvar current, total int64\n\tif ix.progress != nil {\n\t\ttotal, err = ix.count()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t// Prepare scan and scroll to iterate through the source index\n\tscanner := ix.sourceClient.Scan(ix.sourceIndex).Scroll(ix.scroll).Fields(ix.scanFields...)\n\tif ix.query != nil {\n\t\tscanner = scanner.Query(ix.query)\n\t}\n\tif ix.size > 0 {\n\t\tscanner = scanner.Size(ix.size)\n\t}\n\tcursor, err := scanner.Do()\n\n\tbulk := ix.targetClient.Bulk()\n\n\tret := &ReindexerResponse{\n\t\tErrors: make([]*BulkResponseItem, 0),\n\t}\n\n\t// Main loop iterates through the source index and bulk indexes into target.\n\tfor {\n\t\tdocs, err := cursor.Next()\n\t\tif err == EOS {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn ret, err\n\t\t}\n\n\t\tif docs.TotalHits() > 0 {\n\t\t\tfor _, hit := range docs.Hits.Hits {\n\t\t\t\tif ix.progress != nil {\n\t\t\t\t\tcurrent++\n\t\t\t\t\tix.progress(current, total)\n\t\t\t\t}\n\n\t\t\t\terr := ix.reindexerFunc(hit, bulk)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn ret, err\n\t\t\t\t}\n\n\t\t\t\tif bulk.NumberOfActions() >= ix.bulkSize {\n\t\t\t\t\tbulk, err = ix.commit(bulk, ret)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn ret, err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t// Final flush\n\tif bulk.NumberOfActions() > 0 {\n\t\tbulk, err = ix.commit(bulk, ret)\n\t\tif err != nil {\n\t\t\treturn ret, err\n\t\t}\n\t\tbulk = nil\n\t}\n\n\treturn ret, nil\n}", "func (v *Vulnerability) PrepareFromGCRImageScan(gcpVulnerability *grafeaspb.Occurrence) {\n\tvul := gcpVulnerability.GetVulnerability()\n\tv.Type = vul.GetType()\n\tpkgIssue := vul.GetPackageIssue()\n\tfor _, pkg := range pkgIssue {\n\t\tv.PkgName = pkg.GetAffectedPackage()\n\t\tv.InstalledVersion = pkg.GetAffectedVersion().GetFullName()\n\t\tv.FixedVersion = pkg.GetFixedVersion().GetFullName()\n\t}\n\n\tv.Severity = strings.ToUpper(vul.GetSeverity().String())\n\tv.Description = vul.GetLongDescription()\n\tnoteURL := gcpVulnerability.GetNoteName()\n\tnoteURLSlice := strings.Split(noteURL, \"/\")\n\tif len(noteURLSlice) > 0 {\n\t\tv.VulnerabilityID = noteURLSlice[len(noteURLSlice)-1]\n\t}\n\tfor _, url := range vul.GetRelatedUrls() {\n\t\tv.References = append(v.References, url.GetUrl())\n\t}\n\tif v.PrimaryURL == \"\" {\n\t\tv.PrimaryURL = primaryURL + v.VulnerabilityID\n\t}\n\tcvss := CVSS{\n\t\tV2Score: float64(vul.GetCvssScore()),\n\t}\n\tvendorCVSS := make(VendorCVSS)\n\tvendorCVSS[nvd] = cvss\n\tv.CVSS = vendorCVSS\n}", "func (proc *Processor) Process(ctx context.Context, man gdbi.Manager, in gdbi.InPipe, out gdbi.OutPipe) context.Context {\n\tplog := log.WithFields(log.Fields{\"query_id\": util.UUID(), \"query\": proc.query, \"query_collection\": proc.startCollection})\n\tplog.Debug(\"Running Mongo Processor\")\n\n\tgo func() {\n\t\tdefer close(out)\n\n\t\tinitCol := proc.db.ar.client.Database(proc.db.ar.database).Collection(proc.startCollection)\n\t\tfor t := range in {\n\t\t\tnResults := 0\n\t\t\t//plog.Infof(\"Running: %#v\", proc.query)\n\t\t\ttrueVal := true\n\t\t\tcursor, err := initCol.Aggregate(ctx, proc.query, &options.AggregateOptions{AllowDiskUse: &trueVal})\n\t\t\tif err != nil {\n\t\t\t\tplog.Errorf(\"Query Error (%s) : %s\", proc.query, err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t//defer cursor.Close(context.TODO())\n\t\t\tresult := map[string]interface{}{}\n\t\t\tfor cursor.Next(ctx) {\n\t\t\t\tnResults++\n\t\t\t\tselect {\n\t\t\t\tcase <-ctx.Done():\n\t\t\t\t\treturn\n\t\t\t\tdefault:\n\t\t\t\t}\n\t\t\t\tif nil != cursor.Decode(&result) {\n\t\t\t\t\tplog.Errorf(\"Result Error : %s\", err)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\t//fmt.Printf(\"Data: %s\\n\", result)\n\t\t\t\tswitch proc.dataType {\n\t\t\t\tcase gdbi.CountData:\n\t\t\t\t\teo := &gdbi.BaseTraveler{}\n\t\t\t\t\tif x, ok := result[\"count\"]; ok {\n\t\t\t\t\t\teo.Count = uint32(x.(int32))\n\t\t\t\t\t}\n\t\t\t\t\tout <- eo\n\n\t\t\t\tcase gdbi.SelectionData:\n\t\t\t\t\tselections := map[string]*gdbi.DataElement{}\n\t\t\t\t\tif marks, ok := result[\"marks\"]; ok {\n\t\t\t\t\t\tif marks, ok := marks.(map[string]interface{}); ok {\n\t\t\t\t\t\t\tfor k, v := range marks {\n\t\t\t\t\t\t\t\tif v, ok := v.(map[string]interface{}); ok {\n\t\t\t\t\t\t\t\t\tde := getDataElement(v)\n\t\t\t\t\t\t\t\t\tselections[k] = de\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tout <- &gdbi.BaseTraveler{Selections: selections}\n\n\t\t\t\tcase gdbi.AggregationData:\n\n\t\t\t\t\tfor k, v := range result {\n\t\t\t\t\t\tbuckets, ok := v.(bson.A)\n\t\t\t\t\t\tif !ok {\n\t\t\t\t\t\t\tplog.Errorf(\"Failed to convert Mongo aggregation result (%s): %+v\", k, v)\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tvar lastBucket float64\n\t\t\t\t\t\tfor i, bucket := range buckets {\n\t\t\t\t\t\t\tbucket, ok := bucket.(map[string]interface{})\n\t\t\t\t\t\t\tif !ok {\n\t\t\t\t\t\t\t\tplog.Errorf(\"Failed to convert Mongo aggregation result bucket: %+v\", bucket)\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tvar term interface{}\n\t\t\t\t\t\t\tswitch proc.aggTypes[k].GetAggregation().(type) {\n\t\t\t\t\t\t\tcase *gripql.Aggregate_Term:\n\t\t\t\t\t\t\t\tterm = bucket[\"_id\"]\n\t\t\t\t\t\t\tcase *gripql.Aggregate_Histogram:\n\t\t\t\t\t\t\t\tterm = bucket[\"_id\"]\n\t\t\t\t\t\t\t\tcurPos := bucket[\"_id\"].(float64)\n\t\t\t\t\t\t\t\tstepSize := float64(proc.aggTypes[k].GetHistogram().Interval)\n\t\t\t\t\t\t\t\tif i != 0 {\n\t\t\t\t\t\t\t\t\tfor nv := lastBucket + stepSize; nv < curPos; nv += stepSize {\n\t\t\t\t\t\t\t\t\t\tout <- &gdbi.BaseTraveler{Aggregation: &gdbi.Aggregate{Name: k, Key: nv, Value: float64(0.0)}}\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\tlastBucket = curPos\n\n\t\t\t\t\t\t\tcase *gripql.Aggregate_Percentile:\n\t\t\t\t\t\t\t\tbid := strings.Replace(bucket[\"_id\"].(string), \"_\", \".\", -1)\n\t\t\t\t\t\t\t\tf, err := strconv.ParseFloat(bid, 64)\n\t\t\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\t\t\tplog.Errorf(\"failed to parse percentile aggregation result key: %v\", err)\n\t\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\tterm = f\n\t\t\t\t\t\t\tcase *gripql.Aggregate_Field:\n\t\t\t\t\t\t\t\tterm = bucket[\"_id\"]\n\t\t\t\t\t\t\tcase *gripql.Aggregate_Count:\n\t\t\t\t\t\t\t\tterm = bucket[\"_id\"]\n\t\t\t\t\t\t\tcase *gripql.Aggregate_Type:\n\t\t\t\t\t\t\t\tswitch bucket[\"_id\"] {\n\t\t\t\t\t\t\t\tcase \"double\":\n\t\t\t\t\t\t\t\t\tterm = \"NUMERIC\"\n\t\t\t\t\t\t\t\tcase \"null\":\n\t\t\t\t\t\t\t\t\tterm = \"UNKNOWN\"\n\t\t\t\t\t\t\t\tcase \"string\":\n\t\t\t\t\t\t\t\t\tterm = \"STRING\"\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tdefault:\n\t\t\t\t\t\t\t\tplog.Errorf(\"unknown aggregation result type\")\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t//fmt.Printf(\"term: %s %s\", term, count)\n\t\t\t\t\t\t\tswitch bucket[\"count\"].(type) {\n\t\t\t\t\t\t\tcase int:\n\t\t\t\t\t\t\t\tcount := bucket[\"count\"].(int)\n\t\t\t\t\t\t\t\tout <- &gdbi.BaseTraveler{Aggregation: &gdbi.Aggregate{Name: k, Key: term, Value: float64(count)}}\n\t\t\t\t\t\t\tcase int32:\n\t\t\t\t\t\t\t\tcount := bucket[\"count\"].(int32)\n\t\t\t\t\t\t\t\tout <- &gdbi.BaseTraveler{Aggregation: &gdbi.Aggregate{Name: k, Key: term, Value: float64(count)}}\n\t\t\t\t\t\t\tcase float64:\n\t\t\t\t\t\t\t\tcount := bucket[\"count\"].(float64)\n\t\t\t\t\t\t\t\tout <- &gdbi.BaseTraveler{Aggregation: &gdbi.Aggregate{Name: k, Key: term, Value: float64(count)}}\n\t\t\t\t\t\t\tdefault:\n\t\t\t\t\t\t\t\tplog.Errorf(\"unexpected aggregation result type: %T\", bucket[\"count\"])\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\tdefault:\n\t\t\t\t\tif path, ok := result[\"path\"]; ok {\n\t\t\t\t\t\tif pathA, ok := path.(bson.A); ok {\n\t\t\t\t\t\t\to := make([]gdbi.DataElementID, len(pathA))\n\t\t\t\t\t\t\tfor i := range pathA {\n\t\t\t\t\t\t\t\tif elem, ok := pathA[i].(map[string]interface{}); ok {\n\t\t\t\t\t\t\t\t\tif v, ok := elem[\"vertex\"]; ok {\n\t\t\t\t\t\t\t\t\t\to[i] = gdbi.DataElementID{Vertex: removePrimatives(v).(string)}\n\t\t\t\t\t\t\t\t\t} else if v, ok := elem[\"edge\"]; ok {\n\t\t\t\t\t\t\t\t\t\to[i] = gdbi.DataElementID{Edge: removePrimatives(v).(string)}\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t//t.Path = o\n\t\t\t\t\t\t\tt = &gdbi.BaseTraveler{Path: o}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tif marks, ok := result[\"marks\"]; ok {\n\t\t\t\t\t\tif marks, ok := marks.(map[string]interface{}); ok {\n\t\t\t\t\t\t\tfor k, v := range marks {\n\t\t\t\t\t\t\t\tif v, ok := v.(map[string]interface{}); ok {\n\t\t\t\t\t\t\t\t\tde := getDataElement(v)\n\t\t\t\t\t\t\t\t\tt = t.AddMark(k, de)\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t\tde := &gdbi.DataElement{}\n\t\t\t\t\tif x, ok := result[\"_id\"]; ok {\n\t\t\t\t\t\tde.ID = removePrimatives(x).(string)\n\t\t\t\t\t}\n\t\t\t\t\tif x, ok := result[\"label\"]; ok {\n\t\t\t\t\t\tde.Label = x.(string)\n\t\t\t\t\t}\n\t\t\t\t\tif x, ok := result[\"data\"]; ok {\n\t\t\t\t\t\tde.Data = removePrimatives(x).(map[string]interface{})\n\t\t\t\t\t\tde.Loaded = true\n\t\t\t\t\t}\n\t\t\t\t\tif x, ok := result[\"to\"]; ok {\n\t\t\t\t\t\tde.To = x.(string)\n\t\t\t\t\t}\n\t\t\t\t\tif x, ok := result[\"from\"]; ok {\n\t\t\t\t\t\tde.From = x.(string)\n\t\t\t\t\t}\n\t\t\t\t\tout <- t.AddCurrent(de)\n\t\t\t\t}\n\t\t\t}\n\t\t\tif err := cursor.Close(context.TODO()); err != nil {\n\t\t\t\tplog.WithFields(log.Fields{\"error\": err}).Error(\"MongoDb: iterating results\")\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif nResults == 0 && proc.dataType == gdbi.CountData {\n\t\t\t\tout <- &gdbi.BaseTraveler{Count: 0}\n\t\t\t}\n\t\t}\n\t\tplog.Debug(\"Mongo Processor Finished\")\n\t}()\n\treturn ctx\n}", "func (ta *TruAPI) HandleInvitesMetrics(w http.ResponseWriter, r *http.Request) {\n\tclient := db.NewDBClient(ta.APIContext.Config)\n\tmetrics := InvitesMetricsResponse{}\n\tvar count int\n\n\t// Invites Unlocked\n\t_, err := client.Model(nil).QueryOne(pg.Scan(&count),\n\t\t`select sum(amount) from reward_ledger_entries where direction = ? and currency = ?;`,\n\t\tdb.RewardLedgerEntryDirectionCredit,\n\t\tdb.RewardLedgerEntryCurrencyInvite,\n\t)\n\tif err != nil {\n\t\trender.Error(w, r, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tmetrics.InvitesUnlocked = int64(count)\n\n\t// Invites Unlocked 7 Days\n\t_, err = client.Model(nil).QueryOne(pg.Scan(&count),\n\t\t`select sum(amount) from reward_ledger_entries where direction = ? and currency = ? and created_at > NOW() - interval '7 days';`,\n\t\tdb.RewardLedgerEntryDirectionCredit,\n\t\tdb.RewardLedgerEntryCurrencyInvite,\n\t)\n\tif err != nil {\n\t\trender.Error(w, r, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tmetrics.InvitesUnlocked7Days = int64(count)\n\n\t// Invites Unlocked 24 Hours\n\t_, err = client.Model(nil).QueryOne(pg.Scan(&count),\n\t\t`select sum(amount) from reward_ledger_entries where direction = ? and currency = ? and created_at > NOW() - interval '24 hours';`,\n\t\tdb.RewardLedgerEntryDirectionCredit,\n\t\tdb.RewardLedgerEntryCurrencyInvite,\n\t)\n\tif err != nil {\n\t\trender.Error(w, r, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tmetrics.InvitesUnlocked24Hours = int64(count)\n\n\t// Invites Used Percentage\n\t_, err = client.Model(nil).QueryOne(pg.Scan(&count),\n\t\t`select sum(amount) from reward_ledger_entries where direction = ? and currency = ?;`,\n\t\tdb.RewardLedgerEntryDirectionDebit,\n\t\tdb.RewardLedgerEntryCurrencyInvite,\n\t)\n\tif err != nil {\n\t\trender.Error(w, r, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tmetrics.InvitesUsedPercentage = (float64(count) / float64(metrics.InvitesUnlocked)) * 100\n\n\t// Users Completed Signed Up\n\t_, err = client.Model(nil).QueryOne(pg.Scan(&count),\n\t\t`select count(*) from users where meta->'journey' @> ? and deleted_at is null;`,\n\t\tfmt.Sprintf(\"[\\\"%s\\\"]\", db.JourneyStepSignedUp),\n\t)\n\tif err != nil {\n\t\trender.Error(w, r, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tmetrics.UsersCompletedSignedUp = int64(count)\n\n\t// Users Completed One Argument\n\t_, err = client.Model(nil).QueryOne(pg.Scan(&count),\n\t\t`select count(*) from users where meta->'journey' @> ? and deleted_at is null;`,\n\t\tfmt.Sprintf(\"[\\\"%s\\\"]\", db.JourneyStepOneArgument),\n\t)\n\tif err != nil {\n\t\trender.Error(w, r, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tmetrics.UsersCompletedOneArgument = int64(count)\n\n\t// Users Completed Given One Agree\n\t_, err = client.Model(nil).QueryOne(pg.Scan(&count),\n\t\t`select count(*) from users where meta->'journey' @> ? and deleted_at is null;`,\n\t\tfmt.Sprintf(\"[\\\"%s\\\"]\", db.JourneyStepGivenOneAgree),\n\t)\n\tif err != nil {\n\t\trender.Error(w, r, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tmetrics.UsersCompletedGivenOneAgree = int64(count)\n\n\t// Users Completed Receive Five Agrees\n\t_, err = client.Model(nil).QueryOne(pg.Scan(&count),\n\t\t`select count(*) from users where meta->'journey' @> ? and deleted_at is null;`,\n\t\tfmt.Sprintf(\"[\\\"%s\\\"]\", db.JourneyStepReceiveFiveAgrees),\n\t)\n\tif err != nil {\n\t\trender.Error(w, r, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tmetrics.UsersCompletedReceivedFiveAgrees = int64(count)\n\n\t// Invites Graph\n\t_, err = client.Model(nil).Query(&metrics.InvitesGraph,\n\t\t`select \n\t\t\tdate(created_at) as as_on,\n\t\t\tsum(case direction when ? then amount else 0 end) as credits,\n\t\t\tsum(case direction when ? then amount else 0 end) as debits\n\t\tfrom \n\t\t\treward_ledger_entries where currency = ?\n\t\tgroup by \n\t\t\tas_on\n\t\torder by \n\t\t\tas_on;`,\n\t\tdb.RewardLedgerEntryDirectionCredit,\n\t\tdb.RewardLedgerEntryDirectionDebit,\n\t\tdb.RewardLedgerEntryCurrencyInvite,\n\t)\n\tif err != nil {\n\t\trender.Error(w, r, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// Users\n\tusers := make([]db.User, 0)\n\terr = client.FindAll(&users)\n\tif err != nil {\n\t\trender.Error(w, r, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tfor _, user := range users {\n\t\tmUser := metricUser{\n\t\t\tID: user.ID,\n\t\t\tFullName: user.FullName,\n\t\t\tUsername: user.Username,\n\t\t\tEmail: user.Email,\n\t\t\tInvitesLeft: user.InvitesLeft,\n\t\t\tJourneyCompleted: user.Meta.Journey,\n\t\t}\n\n\t\tif user.ReferredBy != 0 {\n\t\t\treferrer, err := client.UserByID(user.ReferredBy)\n\t\t\tif err != nil {\n\t\t\t\trender.Error(w, r, err.Error(), http.StatusInternalServerError)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tmUser.ReferrerUsername = referrer.Username\n\t\t\tmUser.ReferredEmail = referrer.Email\n\t\t}\n\n\t\tmetrics.Users = append(metrics.Users, mUser)\n\t}\n\n\trender.Response(w, r, metrics, http.StatusOK)\n}", "func (s *OrderServer) processReport() {\n\tlcs := make(map[int32]*orderpb.LocalCut) // all local cuts\n\tticker := time.NewTicker(s.batchingInterval)\n\tfor {\n\t\tselect {\n\t\tcase e := <-s.forwardC:\n\t\t\tlog.Debugf(\"processReport forwardC\")\n\t\t\tif s.isLeader { // store local cuts\n\t\t\t\tfor _, lc := range e.Cuts {\n\t\t\t\t\tid := lc.ShardID*s.dataNumReplica + lc.LocalReplicaID\n\t\t\t\t\tvalid := true\n\t\t\t\t\t// check if the received cut is up-to-date\n\t\t\t\t\tif cut, ok := lcs[id]; ok {\n\t\t\t\t\t\tfor i := int32(0); i < s.dataNumReplica; i++ {\n\t\t\t\t\t\t\tif lc.Cut[i] < cut.Cut[i] {\n\t\t\t\t\t\t\t\tvalid = false\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tif valid {\n\t\t\t\t\t\tlcs[id] = lc\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\t// TODO: forward to the leader\n\t\t\t\tlog.Debugf(\"Cuts forward to the leader\")\n\t\t\t}\n\t\tcase <-ticker.C:\n\t\t\t// TODO: check to make sure the key in lcs exist\n\t\t\tlog.Debugf(\"processReport ticker\")\n\t\t\tif s.isLeader { // compute committedCut\n\t\t\t\tccut := s.computeCommittedCut(lcs)\n\t\t\t\tvid := atomic.LoadInt32(&s.viewID)\n\t\t\t\tce := &orderpb.CommittedEntry{Seq: 0, ViewID: vid, CommittedCut: &orderpb.CommittedCut{StartGSN: s.startGSN, Cut: ccut}, FinalizeShards: nil}\n\t\t\t\ts.proposeC <- ce\n\t\t\t\ts.startGSN += s.computeCutDiff(s.prevCut, ccut)\n\t\t\t\ts.prevCut = ccut\n\t\t\t}\n\t\t}\n\t}\n}", "func (v *Vulnerability) PrepareFromACRImageScan(acrResponse ACRResponse) {\n\tif acrResponse.Properties.ID == \"\" {\n\t\treturn\n\t}\n\tv.Description = acrResponse.Properties.Description\n\tif acrResponse.Properties.AdditionalData.Cve != nil && len(acrResponse.Properties.AdditionalData.Cve) >= 1 {\n\t\tv.VulnerabilityID = acrResponse.Properties.AdditionalData.Cve[0].Title\n\t\tv.PrimaryURL = acrResponse.Properties.AdditionalData.Cve[0].Link\n\t}\n\tif v.PrimaryURL == \"\" {\n\t\tv.PrimaryURL = primaryURL + v.VulnerabilityID\n\t}\n\n\tv.Severity = strings.ToUpper(acrResponse.Properties.Status.Severity)\n\tvendorCVSS := make(VendorCVSS)\n\tcvss := CVSS{\n\t\tV2Score: acrResponse.Properties.AdditionalData.Cvss.V2.Base,\n\t\tV3Score: acrResponse.Properties.AdditionalData.Cvss.V3.Base,\n\t}\n\tvendorCVSS[nvd] = cvss\n\tv.CVSS = vendorCVSS\n}", "func (f ProcessInstanceIDFetcher) Fetch(logger lager.Logger, appGUID string) (map[int]string, error) {\n\tlogger = logger.Session(\"process-instance-id-fetch\", lager.Data{\"app-guid\": appGUID})\n\tlogger.Info(\"start\")\n\tdefer logger.Info(\"end\")\n\n\tstart := time.Now().Add(-30 * time.Second)\n\tend := time.Now()\n\n\tprocessInstanceIDs := map[int]string{}\n\n\tfor i := 0; i < maxReadTries; i++ {\n\t\tenvelopes, err := f.client.Read(context.Background(), appGUID, start,\n\t\t\tlogcache.WithDescending(),\n\t\t\tlogcache.WithEnvelopeTypes(logcache_v1.EnvelopeType_GAUGE),\n\t\t\tlogcache.WithNameFilter(\"absolute_entitlement\"),\n\t\t\tlogcache.WithEndTime(end),\n\t\t\tlogcache.WithLimit(f.limit),\n\t\t)\n\n\t\tif err != nil {\n\t\t\tlogger.Error(\"log-cache-read-failed\", err)\n\t\t\treturn nil, err\n\t\t}\n\n\t\tfor _, envelope := range envelopes {\n\t\t\tinstanceID, err := strconv.Atoi(envelope.InstanceId)\n\t\t\tif err != nil {\n\t\t\t\tlogger.Info(\"ignoring-corrupt-instance-id\", lager.Data{\"envelope\": envelope})\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tprocessInstanceID := envelope.Tags[\"process_instance_id\"]\n\t\t\tif len(processInstanceID) == 0 {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif _, exists := processInstanceIDs[instanceID]; !exists {\n\t\t\t\tprocessInstanceIDs[instanceID] = processInstanceID\n\t\t\t}\n\t\t}\n\n\t\tif len(envelopes) < f.limit {\n\t\t\tbreak\n\t\t}\n\n\t\tlogger.Info(\"more-metrics-to-fetch\", lager.Data{\"iteration\": i, \"max-iterations\": maxReadTries, \"page-size\": f.limit})\n\t\tend = time.Unix(0, envelopes[len(envelopes)-1].Timestamp)\n\t}\n\n\treturn processInstanceIDs, nil\n}", "func (jf JobFactory) Process(schedules []Schedule) {\n\tfor _, item := range schedules {\n\t\tif item.Api.Url != \"\" {\n\t\t\tlocalItem := item\n\t\t\tAddJob(item.Schedule, func() {\n\t\t\t\tlog.Printf(\"executing %s at %s\", localItem.Name, localItem.Api.Url)\n\t\t\t\toptions := restful.Options{}\n\t\t\t\toptions.Method = localItem.Api.Method\n\t\t\t\toptions.Headers = make(map[string]string)\n\t\t\t\toptions.Headers[\"Content-Type\"] = \"application/json\"\n\t\t\t\tif localItem.Api.Authorization != \"\" {\n\t\t\t\t\toptions.Headers[\"Authorization\"] = localItem.Api.Authorization\n\t\t\t\t}\n\t\t\t\toptions.Transformer = localItem.Api.Transform\n\t\t\t\toptions.Payload = localItem.Api.Body\n\t\t\t\tmessage, _ := restful.Call(localItem.Api.Url, &options)\n\t\t\t\tevent := EventData{}\n\t\t\t\tjson.Unmarshal([]byte(message), &event)\n\t\t\t\tGetEventsManager().Notify(event)\n\t\t\t})\n\t\t\tcontinue\n\t\t}\n\t\tvalue, ok := advertisedJobs[item.Name]\n\t\tif ok {\n\t\t\tlog.Printf(\"%s, %s\", item.Schedule, item.Name)\n\t\t\tAddJob(item.Schedule, value)\n\t\t}\n\t}\n\tInitJobs()\n}", "func (j BaseJob) Process(ctx context.Context) error {\n\treturn nil\n}", "func (j *DSGitHub) ProcessIssue(ctx *Ctx, inIssue map[string]interface{}) (issue map[string]interface{}, err error) {\n\tissue = inIssue\n\tissue[\"user_data\"] = map[string]interface{}{}\n\tissue[\"assignee_data\"] = map[string]interface{}{}\n\tissue[\"assignees_data\"] = []interface{}{}\n\tissue[\"comments_data\"] = []interface{}{}\n\tissue[\"reactions_data\"] = []interface{}{}\n\t// [\"user\", \"assignee\", \"assignees\", \"comments\", \"reactions\"]\n\tuserLogin, ok := Dig(issue, []string{\"user\", \"login\"}, false, true)\n\tif ok {\n\t\tissue[\"user_data\"], _, err = j.githubUser(ctx, userLogin.(string))\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t}\n\tassigneeLogin, ok := Dig(issue, []string{\"assignee\", \"login\"}, false, true)\n\tif ok {\n\t\tissue[\"assignee_data\"], _, err = j.githubUser(ctx, assigneeLogin.(string))\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t}\n\tiAssignees, ok := Dig(issue, []string{\"assignees\"}, false, true)\n\tif ok {\n\t\tassignees, _ := iAssignees.([]interface{})\n\t\tassigneesAry := []map[string]interface{}{}\n\t\tfor _, assignee := range assignees {\n\t\t\taLogin, ok := Dig(assignee, []string{\"login\"}, false, true)\n\t\t\tif ok {\n\t\t\t\tassigneeData, _, e := j.githubUser(ctx, aLogin.(string))\n\t\t\t\tif e != nil {\n\t\t\t\t\terr = e\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tassigneesAry = append(assigneesAry, assigneeData)\n\t\t\t}\n\t\t}\n\t\tissue[\"assignees_data\"] = assigneesAry\n\t}\n\tnumber, ok := Dig(issue, []string{\"number\"}, false, true)\n\tif ok {\n\t\tissue[\"comments_data\"], err = j.githubIssueComments(ctx, j.Org, j.Repo, int(number.(float64)))\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tiCnt, ok := Dig(issue, []string{\"reactions\", \"total_count\"}, false, true)\n\t\tif ok {\n\t\t\tissue[\"reactions_data\"] = []interface{}{}\n\t\t\tcnt := int(iCnt.(float64))\n\t\t\tif cnt > 0 {\n\t\t\t\tissue[\"reactions_data\"], err = j.githubIssueReactions(ctx, j.Org, j.Repo, int(number.(float64)))\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "func (u *usecase) Update() error {\n\t// Time execution\n\tstart := time.Now()\n\n\t// Creating context with timeout duration process\n\tctx, cancel := context.WithTimeout(context.Background(), 20*time.Minute)\n\tdefer cancel()\n\n\t// Get all archieve from scrapper repository\n\tarchieves, err := u.scrapperRepo.GetAllArchieve()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Create array (slice) of archieve object\n\tvar newArchieves []*model.Archieve\n\n\t// Check if archieve is exist in DB\n\tfor _, archieve := range archieves {\n\t\t// Get archieve from DB by archieve code\n\t\t_, err := u.mysqlRepo.GetArchieveByCode(ctx, archieve.Code)\n\n\t\t// if archieve not exist then add to newArchieve array (slice)\n\t\tif err == model.ErrDataNotFound {\n\t\t\t// Add archieve\n\t\t\tnewArchieves = append(newArchieves, archieve)\n\t\t\tlog.Printf(\"New archieve: %v\", archieve.Code)\n\t\t} else if err != nil && err != model.ErrDataNotFound {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Counter new journal from archieves\n\tvar totalNewJournal int\n\n\t// Get new archieves journals\n\tfor _, newArchieve := range newArchieves {\n\t\t// Get all journal from scrapper repository based on archieve\n\t\tjournals, err := u.scrapperRepo.GetAllJournalByArchieveObject(newArchieve)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// Append Journals into archieve object\n\t\tnewArchieve.Journals = journals\n\t\ttotalNewJournal += len(newArchieve.Journals)\n\t}\n\n\t// Check if there's new archieve then saved new archieve into DB\n\tif len(newArchieves) > 0 {\n\t\t// Insert new archieves into DB\n\t\tif err := u.mysqlRepo.BatchArchieves(ctx, newArchieves); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tlog.Printf(\"Added %v archieve and %v journal (%v)m\", len(newArchieves), totalNewJournal, time.Since(start).Minutes())\n\n\t// if there's no update then do nothing or finish pull data from archieve scrapper\n\treturn nil\n}", "func monitor(ctx context.Context, repoNames []string, uploads []uploadMeta) error {\n\tvar oldState map[string]repoState\n\twaitMessageDisplayed := make(map[string]struct{}, len(repoNames))\n\tfinishedMessageDisplayed := make(map[string]struct{}, len(repoNames))\n\n\tfmt.Printf(\"[%5s] %s Waiting for uploads to finish processing\\n\", internal.TimeSince(start), internal.EmojiLightbulb)\n\n\tfor {\n\t\tstate, err := queryRepoState(ctx, repoNames, uploads)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif verbose {\n\t\t\tparts := make([]string, 0, len(repoNames))\n\t\t\tfor _, repoName := range repoNames {\n\t\t\t\tstates := make([]string, 0, len(state[repoName].uploadStates))\n\t\t\t\tfor _, uploadState := range state[repoName].uploadStates {\n\t\t\t\t\tstates = append(states, fmt.Sprintf(\"%s=%-10s\", uploadState.upload.commit[:7], uploadState.state))\n\t\t\t\t}\n\t\t\t\tsort.Strings(states)\n\n\t\t\t\tparts = append(parts, fmt.Sprintf(\"%s\\tstale=%v\\t%s\", repoName, state[repoName].stale, strings.Join(states, \"\\t\")))\n\t\t\t}\n\n\t\t\tfmt.Printf(\"[%5s] %s\\n\", internal.TimeSince(start), strings.Join(parts, \"\\n\\t\"))\n\t\t}\n\n\t\tnumReposCompleted := 0\n\n\t\tfor repoName, data := range state {\n\t\t\toldData := oldState[repoName]\n\n\t\t\tnumUploadsCompleted := 0\n\t\t\tfor _, uploadState := range data.uploadStates {\n\t\t\t\tif uploadState.state == \"ERRORED\" {\n\t\t\t\t\treturn fmt.Errorf(\"failed to process (%s)\", uploadState.failure)\n\t\t\t\t}\n\n\t\t\t\tif uploadState.state == \"COMPLETED\" {\n\t\t\t\t\tnumUploadsCompleted++\n\n\t\t\t\t\tvar oldState string\n\t\t\t\t\tfor _, oldUploadState := range oldData.uploadStates {\n\t\t\t\t\t\tif oldUploadState.upload.id == uploadState.upload.id {\n\t\t\t\t\t\t\toldState = oldUploadState.state\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t\tif oldState != \"COMPLETED\" {\n\t\t\t\t\t\tfmt.Printf(\"[%5s] %s Finished processing index for %s@%s\\n\", internal.TimeSince(start), internal.EmojiSuccess, repoName, uploadState.upload.commit[:7])\n\t\t\t\t\t}\n\t\t\t\t} else if uploadState.state != \"QUEUED\" && uploadState.state != \"PROCESSING\" {\n\t\t\t\t\treturn fmt.Errorf(\"unexpected state '%s'\", uploadState.state)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif numUploadsCompleted == len(data.uploadStates) {\n\t\t\t\tif !data.stale {\n\t\t\t\t\tnumReposCompleted++\n\n\t\t\t\t\tif _, ok := finishedMessageDisplayed[repoName]; !ok {\n\t\t\t\t\t\tfinishedMessageDisplayed[repoName] = struct{}{}\n\t\t\t\t\t\tfmt.Printf(\"[%5s] %s Commit graph refreshed for %s\\n\", internal.TimeSince(start), internal.EmojiSuccess, repoName)\n\t\t\t\t\t}\n\t\t\t\t} else if _, ok := waitMessageDisplayed[repoName]; !ok {\n\t\t\t\t\twaitMessageDisplayed[repoName] = struct{}{}\n\t\t\t\t\tfmt.Printf(\"[%5s] %s Waiting for commit graph to refresh for %s\\n\", internal.TimeSince(start), internal.EmojiLightbulb, repoName)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif numReposCompleted == len(repoNames) {\n\t\t\tbreak\n\t\t}\n\n\t\toldState = state\n\n\t\tselect {\n\t\tcase <-time.After(pollInterval):\n\t\tcase <-ctx.Done():\n\t\t\treturn ctx.Err()\n\t\t}\n\t}\n\n\tfmt.Printf(\"[%5s] %s All uploads processed\\n\", internal.TimeSince(start), internal.EmojiSuccess)\n\treturn nil\n}", "func (ce *Extractor) Process(target, apiKey string) (*ArticleWrapper, error) {\n\tdata, status, err := ce.Fetcher.Fetch(target + \"?apiKey=\" + apiKey)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"%d: %v\", status, err)\n\t}\n\treturn ce.ExtractArticle(data)\n}", "func processSubmissionHandler(filer jira.IssueFiler, updater modals.ViewUpdater) interactions.Handler {\n\treturn modals.ToJiraIssue(issueParameters(), filer, updater)\n}", "func (sa *ScanAPI) Prepare() {\n\t// Call super prepare method\n\tsa.BaseController.Prepare()\n\n\t// Parse parameters\n\trepoName := sa.GetString(\":splat\")\n\ttag := sa.GetString(\":tag\")\n\tprojectName, _ := utils.ParseRepository(repoName)\n\n\tpro, err := sa.ProjectMgr.Get(projectName)\n\tif err != nil {\n\t\tsa.SendInternalServerError(errors.Wrap(err, \"scan API: prepare\"))\n\t\treturn\n\t}\n\tif pro == nil {\n\t\tsa.SendNotFoundError(errors.Errorf(\"project %s not found\", projectName))\n\t\treturn\n\t}\n\tsa.pro = pro\n\n\t// Check authentication\n\tif !sa.RequireAuthenticated() {\n\t\treturn\n\t}\n\n\t// Assemble artifact object\n\tdigest, err := digestFunc(repoName, tag, sa.SecurityCtx.GetUsername())\n\tif err != nil {\n\t\tsa.SendInternalServerError(errors.Wrap(err, \"scan API: prepare\"))\n\t\treturn\n\t}\n\n\tsa.artifact = &v1.Artifact{\n\t\tNamespaceID: pro.ProjectID,\n\t\tRepository: repoName,\n\t\tTag: tag,\n\t\tDigest: digest,\n\t\tMimeType: v1.MimeTypeDockerArtifact,\n\t}\n\n\tlogger.Debugf(\"Scan API receives artifact: %#v\", sa.artifact)\n}", "func (s *Server) processScanDir(msg message.Message, db *database.DataStore) {\n\tlog.Debugf(\"[%s] Processing ScanDir response\", msg.ULID)\n\tif s.checkMsgErr(msg, models.Failed, db) {\n\t\t// TODO: Can I recover this? Should I ignore?\n\t\tmsg.Result = \"KO\"\n\t} else {\n\t\tif s.saveResult(msg, db) {\n\t\t\tmsg.Result = \"OK\"\n\t\t} else {\n\t\t\t// TODO: Request a new scan due errors while saving the report\n\t\t\tlog.Errorf(\"[%s] Error on processScanDir\", msg.ULID)\n\t\t}\n\t}\n\t// TODO:\n\t// - check error\n\t// - save the result\n\t// - send a message back\n\ts.w.Encode(msg)\n}", "func (e *Exporter) ExportResultPipeline() error {\n\trows, err := e.sqliteDB.Query(\"SELECT * FROM active_scans ORDER BY request_id DESC;\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer rows.Close()\n\n\twg := new(sync.WaitGroup)\n\terrCh := make(chan error)\n\n\tvar requestIDs []int\n\tfor rows.Next() {\n\t\twg.Add(1)\n\t\tvar launchedScanRow launchedScanDBRow\n\t\trows.Scan(&launchedScanRow.requestID, &launchedScanRow.method, &launchedScanRow.scanUUID, &launchedScanRow.scanID, &launchedScanRow.scanStartTime)\n\t\tgo func(wg *sync.WaitGroup, e *Exporter, launchedScanRow launchedScanDBRow, requestIDs []int) {\n\t\t\tdetails, forLoopErr := e.apiClient.ScanDetails(e.httpClient, launchedScanRow.scanID)\n\t\t\tif forLoopErr != nil {\n\t\t\t\terrCh <- forLoopErr\n\t\t\t\twg.Done()\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tfor details.Info.Status == \"running\" {\n\t\t\t\ttime.Sleep(10000)\n\t\t\t\tdetails, forLoopErr = e.apiClient.ScanDetails(e.httpClient, launchedScanRow.scanID)\n\t\t\t\tif forLoopErr != nil {\n\t\t\t\t\terrCh <- forLoopErr\n\t\t\t\t\twg.Done()\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\n\t\t\texportedFileResponse, forLoopErr := e.apiClient.ExportScan(e.httpClient, launchedScanRow.scanID, `{\"format\":\"csv\"}`)\n\t\t\tif forLoopErr != nil {\n\t\t\t\terrCh <- forLoopErr\n\t\t\t\twg.Done()\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\treadyToExport := false\n\t\t\tfor readyToExport {\n\t\t\t\tstatus, forErr := e.apiClient.ScanExportStatus(e.httpClient, launchedScanRow.scanID, exportedFileResponse.File)\n\t\t\t\tif forErr != nil {\n\t\t\t\t\terrCh <- forErr\n\t\t\t\t\twg.Done()\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tif status.Status == \"ready\" {\n\t\t\t\t\treadyToExport = true\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\ttime.Sleep(10000)\n\t\t\t}\n\n\t\t\tscanResults, forLoopErr := e.apiClient.DownloadScan(e.httpClient, launchedScanRow.scanID, exportedFileResponse.File)\n\t\t\tif forLoopErr != nil {\n\t\t\t\terrCh <- forLoopErr\n\t\t\t\twg.Done()\n\t\t\t\treturn\n\t\t\t}\n\t\t\tfilename := fmt.Sprintf(\"Scanner_%s-RequestID_%d-Method_%s-ScanId_%d-Time_%s.csv\", getLocalIPAddress(), launchedScanRow.requestID, launchedScanRow.method, launchedScanRow.scanID, launchedScanRow.scanStartTime)\n\t\t\tfilepath := fmt.Sprintf(\"%s/%s\", e.fileLocations.resultsDirectory, filename)\n\t\t\tforLoopErr = ioutil.WriteFile(filepath, []byte(scanResults), 0644)\n\t\t\tif forLoopErr != nil {\n\t\t\t\terrCh <- forLoopErr\n\t\t\t\twg.Done()\n\t\t\t\treturn\n\t\t\t}\n\t\t\trequestIDs = append(requestIDs, launchedScanRow.scanID)\n\t\t\twg.Done()\n\t\t}(wg, e, launchedScanRow, requestIDs)\n\t}\n\n\tif err := rows.Err(); err != nil {\n\t\treturn err\n\t}\n\n\twg.Wait()\n\tclose(errCh)\n\n\tfor err := range errCh {\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tfor _, requestID := range requestIDs {\n\t\t_, err = e.sqliteDB.Exec(\"DELETE FROM active_scans WHERE scan_id = $a;\", requestID)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "func doScan(a []interface{}) (numProcessed int, err error) {\n\tdefer errorHandler(&err)\n\treturn\n}", "func (esc *BgMetadataElasticSearchConnector) updateInternalMetrics(res *esapi.Response) {\n\tdefer func() {\n\t\tif err := recover(); err != nil {\n\t\t\tesc.logger.Warn(\"malformed bulk response\", zap.Error(err.(error)))\n\t\t}\n\t}()\n\tvar mapResp map[string]interface{}\n\tjson.NewDecoder(res.Body).Decode(&mapResp)\n\tesc.WriteDurationMs.Observe(mapResp[\"took\"].(float64))\n\tfor _, item := range mapResp[\"items\"].([]interface{}) {\n\t\tmapCreate := item.(map[string]interface{})[\"create\"].(map[string]interface{})\n\t\t// protected by esc.Mux currentIndex may not change while looping\n\t\tif int(mapCreate[\"status\"].(float64)) == http.StatusCreated {\n\t\t\tif strings.HasPrefix(mapCreate[\"_index\"].(string), esc.currentIndex) {\n\t\t\t\tesc.UpdatedDocuments.WithLabelValues(\"created\", \"metric\").Inc()\n\t\t\t} else {\n\t\t\t\tesc.UpdatedDocuments.WithLabelValues(\"created\", \"directory\").Inc()\n\t\t\t}\n\t\t}\n\t}\n}", "func run(c config.Config) (err error) {\n\tif err = log.InitLogger(c.Debug, c.Quiet); err != nil {\n\t\treturn xerrors.Errorf(\"failed to initialize a logger: %w\", err)\n\t}\n\n\t// initialize config\n\tif err = c.Init(); err != nil {\n\t\treturn xerrors.Errorf(\"failed to initialize options: %w\", err)\n\t}\n\n\t// configure cache dir\n\tutils.SetCacheDir(c.CacheDir)\n\tlog.Logger.Debugf(\"cache dir: %s\", utils.CacheDir())\n\n\tif c.ClearCache {\n\t\tlog.Logger.Warn(\"A client doesn't have image cache\")\n\t\treturn nil\n\t}\n\n\tvar scanner scanner.Scanner\n\tctx, cancel := context.WithTimeout(context.Background(), c.Timeout)\n\tdefer cancel()\n\tremoteCache := cache.NewRemoteCache(cache.RemoteURL(c.RemoteAddr), c.CustomHeaders)\n\n\tcleanup := func() {}\n\tif c.Input != \"\" {\n\t\t// scan tar file\n\t\tscanner, err = initializeArchiveScanner(ctx, c.Input, remoteCache,\n\t\t\tclient.CustomHeaders(c.CustomHeaders), client.RemoteURL(c.RemoteAddr), c.Timeout)\n\t\tif err != nil {\n\t\t\treturn xerrors.Errorf(\"unable to initialize the archive scanner: %w\", err)\n\t\t}\n\t} else {\n\t\t// scan an image in Docker Engine or Docker Registry\n\t\tscanner, cleanup, err = initializeDockerScanner(ctx, c.Target, remoteCache,\n\t\t\tclient.CustomHeaders(c.CustomHeaders), client.RemoteURL(c.RemoteAddr), c.Timeout)\n\t\tif err != nil {\n\t\t\treturn xerrors.Errorf(\"unable to initialize the docker scanner: %w\", err)\n\t\t}\n\t}\n\tdefer cleanup()\n\n\tscanOptions := types.ScanOptions{\n\t\tVulnType: c.VulnType,\n\t\tScanRemovedPackages: c.ScanRemovedPkgs,\n\t}\n\tlog.Logger.Debugf(\"Vulnerability type: %s\", scanOptions.VulnType)\n\n\tresults, err := scanner.ScanArtifact(ctx, scanOptions)\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"error in image scan: %w\", err)\n\t}\n\n\tvulnClient := initializeVulnerabilityClient()\n\tfor i := range results {\n\t\tvulns, err := vulnClient.Filter(ctx, results[i].Vulnerabilities,\n\t\t\tc.Severities, c.IgnoreUnfixed, c.IgnoreFile, c.IgnorePolicy)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tresults[i].Vulnerabilities = vulns\n\t}\n\n\tif err = report.WriteResults(c.Format, c.Output, c.Severities, results, c.Template, false); err != nil {\n\t\treturn xerrors.Errorf(\"unable to write results: %w\", err)\n\t}\n\n\tif c.ExitCode != 0 {\n\t\tfor _, result := range results {\n\t\t\tif len(result.Vulnerabilities) > 0 {\n\t\t\t\tos.Exit(c.ExitCode)\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "func Handle(rp *RuntimePipeline) error{\n\tdb.UpdateIterationAction(rp.ID, rp.Status.ToString())\n\tfor i := 0; i < len(rp.Buckets); i++ {\n\t\tif rp.Buckets[i].State.CanUpdate() && rp.Buckets[i].NeedUpdate {\n\t\t\tdb.UpdateStageExecState(rp.Buckets[i].Id, rp.Buckets[i].State.ToString())\n\t\t\trp.Buckets[i].NeedUpdate = false\n\t\t}\n\t\tfor j:=0; j < len(rp.Buckets[i].Steps); j++ {\n\t\t\tif rp.Buckets[i].Steps[j].NeedUpdate{\n\t\t\t\tdb.UpdateStepExecState(rp.Buckets[i].Steps[j].Id, rp.Buckets[i].Steps[j].State.ToString())\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "func (w *Work) Process(accountID string) {\n\tlocation, _ = time.LoadLocation(\"America/Los_Angeles\")\n\tt, err := w.db.GetToken(\"dropbox\", accountID)\n\tif err != nil {\n\t\tlog.Error(err.Error())\n\t\treturn\n\t}\n\n\tlog.Infof(\"processing=%s\", accountID)\n\n\tdbxCfg := dropbox.Config{Token: string(t.AccessToken)}\n\tdbx := files.New(dbxCfg)\n\n\tlistFolderArg := files.NewListFolderArg(\"\")\n\tfolderRes, err := dbx.ListFolder(listFolderArg)\n\tif err != nil {\n\t\tlog.Error(err.Error())\n\t\tw.ErrChan <- err\n\t}\n\n\tfor _, entry := range folderRes.Entries {\n\t\t_, reader, err := dbx.Download(&files.DownloadArg{Path: entry.(*files.FileMetadata).Metadata.PathLower})\n\t\tif err != nil {\n\t\t\tlog.Error(err.Error())\n\t\t\tw.ErrChan <- err\n\t\t}\n\n\t\tcontent, err := ioutil.ReadAll(reader)\n\t\tif err != nil {\n\t\t\tw.ErrChan <- err\n\t\t}\n\n\t\tw.CalendarChan <- w.ParseEntries(content, accountID)\n\t}\n}", "func (mtbulk *MTbulk) ResponseCollector(ctx context.Context) {\n\thostsErrors := make(map[entities.Host][]error)\n\ncollectorLooop:\n\tfor {\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\tbreak collectorLooop\n\t\tcase result, ok := <-mtbulk.Results:\n\t\t\tif !ok {\n\t\t\t\tbreak collectorLooop\n\t\t\t}\n\t\t\tif result.Errors != nil {\n\t\t\t\thostsErrors[result.Job.Host] = append(hostsErrors[result.Job.Host], result.Errors...)\n\t\t\t}\n\n\t\t\tif (mtbulk.Verbose && result.Job.Host != entities.Host{}) {\n\t\t\t\tfmt.Printf(\"%s > /// job: \\\"%s\\\"\\n\", result.Job.Host, result.Job.Kind)\n\t\t\t\tfor _, commandResult := range result.Results {\n\t\t\t\t\tfor _, response := range commandResult.Responses {\n\t\t\t\t\t\tfor _, line := range strings.Split(response, \"\\n\") {\n\t\t\t\t\t\t\tif line != \"\" {\n\t\t\t\t\t\t\t\tfmt.Printf(\"%s > %s\\n\", result.Job.Host, line)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tif len(hostsErrors) == 0 {\n\t\treturn\n\t}\n\n\tmtbulk.Status.SetCode(1)\n\n\tif mtbulk.SkipSummary {\n\t\treturn\n\t}\n\n\tvulnerabilitiesDetected := false\n\n\tfmt.Println()\n\tfmt.Println(\"Errors list:\")\n\tfor host, errors := range hostsErrors {\n\t\tif host.IP != \"\" {\n\t\t\tfmt.Printf(\"Device: %s:%s\\n\", host.IP, host.Port)\n\t\t} else {\n\t\t\tfmt.Println(\"Generic:\")\n\t\t}\n\n\t\tfor _, err := range errors {\n\t\t\tif err == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tfmt.Printf(\"\\t%s\\n\", err)\n\t\t\tif vul, ok := err.(vulnerabilities.VulnerabilityError); ok && vul.Vulnerabilities != nil {\n\t\t\t\tvulnerabilitiesDetected = true\n\t\t\t}\n\t\t}\n\t}\n\n\tif vulnerabilitiesDetected {\n\t\tcves := ExtractCVEs(hostsErrors)\n\n\t\tfmt.Println()\n\t\tfmt.Println(\"Deetected CVE:\")\n\t\tfor _, cve := range cves {\n\t\t\tfmt.Printf(\"%s\\n\", cve)\n\t\t}\n\t}\n}", "func APIProjectExecutorHandler(er *Errorly) http.HandlerFunc {\n\treturn func(rw http.ResponseWriter, r *http.Request) {\n\t\tsession, _ := er.Store.Get(r, sessionName)\n\t\tdefer er.SaveSession(session, r, rw)\n\n\t\tvars := mux.Vars(r)\n\n\t\tif err := r.ParseForm(); err != nil {\n\t\t\ter.Logger.Error().Err(err).Msg(\"Failed to parse form\")\n\t\t\tpassResponse(rw, \"Failed to parse form\", false, http.StatusBadRequest)\n\n\t\t\treturn\n\t\t}\n\n\t\t// Check if an action has been passed\n\t\taction, err := structs.ParseActionType(r.FormValue(\"action\"))\n\t\tif err != nil {\n\t\t\tpassResponse(rw, \"Action argument is not valid\", false, http.StatusBadRequest)\n\n\t\t\treturn\n\t\t}\n\n\t\t_issueIDs, err := qs.Unmarshal(r.FormValue(\"issues\"))\n\t\tif err != nil {\n\t\t\tpassResponse(rw, \"IssueIDs argument is not valid\", false, http.StatusBadRequest)\n\n\t\t\treturn\n\t\t}\n\n\t\tissueIDs := make([]int64, 0, len(_issueIDs))\n\n\t\tfor _, _id := range _issueIDs {\n\t\t\tif _id, ok := _id.(string); ok {\n\t\t\t\tid, err := strconv.ParseInt(_id, 10, 64)\n\t\t\t\tif err == nil {\n\t\t\t\t\tissueIDs = append(issueIDs, id)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t// Star\n\t\tvar starring bool\n\t\t// Assign\n\t\tvar assigning bool\n\n\t\tvar assigneeID int64\n\t\t// LockComments\n\t\tvar locking bool\n\t\t// MarkStatus\n\t\tvar markType structs.EntryType\n\n\t\tswitch action {\n\t\tcase structs.ActionStar:\n\t\t\tstarring, err = strconv.ParseBool(r.FormValue(\"starring\"))\n\t\t\tif err != nil {\n\t\t\t\tpassResponse(rw, \"Starring argument is not valid\", false, http.StatusBadRequest)\n\n\t\t\t\treturn\n\t\t\t}\n\t\tcase structs.ActionAssign:\n\t\t\tassigning, err = strconv.ParseBool(r.FormValue(\"assigning\"))\n\t\t\tif err != nil {\n\t\t\t\tpassResponse(rw, \"Assigning argument is not valid\", false, http.StatusBadRequest)\n\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tassigneeID, err = strconv.ParseInt(r.FormValue(\"assignee_id\"), 10, 64)\n\t\t\tif err != nil {\n\t\t\t\tpassResponse(rw, \"AssigneeID argument is not valid\", false, http.StatusBadRequest)\n\n\t\t\t\treturn\n\t\t\t}\n\t\tcase structs.ActionLockComments:\n\t\t\tlocking, err = strconv.ParseBool(r.FormValue(\"locking\"))\n\t\t\tif err != nil {\n\t\t\t\tpassResponse(rw, \"Locking argument is not valid\", false, http.StatusBadRequest)\n\n\t\t\t\treturn\n\t\t\t}\n\t\tcase structs.ActionMarkStatus:\n\t\t\tmarkType, err = structs.ParseEntryType(r.FormValue(\"mark_type\"))\n\t\t\tif err != nil {\n\t\t\t\tpassResponse(rw, \"MarkType argument is not valid\", false, http.StatusBadRequest)\n\n\t\t\t\treturn\n\t\t\t}\n\t\tdefault:\n\t\t\tpassResponse(rw, \"Action argument is not valid\", false, http.StatusBadRequest)\n\n\t\t\treturn\n\t\t}\n\n\t\t// Authenticate the user\n\t\tauth, user := er.AuthenticateSession(session)\n\t\tif !auth {\n\t\t\tpassResponse(rw, \"You must be logged in to do this\", false, http.StatusForbidden)\n\n\t\t\treturn\n\t\t}\n\n\t\t// Retrieve project and user permissions\n\t\tproject, viewable, elevated, ok := verifyProjectVisibility(er, rw, vars, user, auth, true)\n\t\tif !ok {\n\t\t\t// If ok is False, an error has already been provided to the ResponseWriter so we should just return\n\t\t\treturn\n\t\t}\n\n\t\tif !viewable {\n\t\t\t// No permission to view project. We will treat like the project\n\t\t\t// does not exist.\n\t\t\tpassResponse(rw, \"Could not find this project\", false, http.StatusBadRequest)\n\n\t\t\treturn\n\t\t}\n\n\t\tif !elevated {\n\t\t\t// No permission to execute on project. We will simply tell them\n\t\t\t// they cannot do this.\n\t\t\tpassResponse(rw, \"Guests to a project cannot do this\", false, http.StatusForbidden)\n\n\t\t\treturn\n\t\t}\n\n\t\tunavailable := make([]int64, 0)\n\t\tissues := make([]structs.IssueEntry, 0)\n\n\t\tnow := time.Now().UTC()\n\n\t\tfor _, issueID := range issueIDs {\n\t\t\t// Fetch the request\n\t\t\tissue := structs.IssueEntry{}\n\t\t\torigionalIssue := structs.IssueEntry{}\n\n\t\t\terr = er.Postgres.Model(&issue).\n\t\t\t\tWhere(\"issue_entry.project_id = ?\", project.ID).\n\t\t\t\tWhere(\"issue_entry.id = ?\", issueID).\n\t\t\t\tRelation(\"Assignee\").\n\t\t\t\tSelect() // TODO: convert this to a single request\n\t\t\tif err != nil {\n\t\t\t\tif errors.Is(err, pg.ErrNoRows) {\n\t\t\t\t\t// Invalid issue ID\n\t\t\t\t\tunavailable = append(unavailable, issueID)\n\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tpassResponse(rw, err.Error(), false, http.StatusInternalServerError)\n\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tbytes, err := json.Marshal(issue)\n\t\t\tif err != nil {\n\t\t\t\tpassResponse(rw, err.Error(), false, http.StatusInternalServerError)\n\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\terr = json.Unmarshal(bytes, &origionalIssue)\n\t\t\tif err != nil {\n\t\t\t\tpassResponse(rw, err.Error(), false, http.StatusInternalServerError)\n\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tprintln(\"B\", issue.AssigneeID, origionalIssue.AssigneeID)\n\n\t\t\t// Handle action passed\n\t\t\tswitch action {\n\t\t\tcase structs.ActionStar:\n\t\t\t\tchange := false\n\n\t\t\t\tif issue.Starred {\n\t\t\t\t\tproject.StarredIssues--\n\n\t\t\t\t\tchange = true\n\t\t\t\t}\n\n\t\t\t\tissue.Starred = starring\n\t\t\t\tif issue.Starred {\n\t\t\t\t\tproject.StarredIssues++\n\n\t\t\t\t\tchange = true\n\t\t\t\t}\n\n\t\t\t\tif change {\n\t\t\t\t\t// Update starred issue counter on project\n\t\t\t\t\t_, err = er.Postgres.Model(project).\n\t\t\t\t\t\tWherePK().\n\t\t\t\t\t\tUpdate()\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tpassResponse(rw, err.Error(), false, http.StatusInternalServerError)\n\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\tcase structs.ActionAssign:\n\t\t\t\tif assigning {\n\t\t\t\t\tissue.AssigneeID = assigneeID\n\t\t\t\t} else if issue.AssigneeID == assigneeID {\n\t\t\t\t\tissue.AssigneeID = 0\n\t\t\t\t}\n\n\t\t\t\tif issue.AssigneeID == 0 {\n\t\t\t\t\tissue.Assignee = nil\n\t\t\t\t} else {\n\t\t\t\t\tassignee := &structs.User{}\n\n\t\t\t\t\terr = er.Postgres.Model(assignee).\n\t\t\t\t\t\tWhere(\"id = ?\", issue.AssigneeID).\n\t\t\t\t\t\tSelect()\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tif xerrors.Is(err, pg.ErrNoRows) {\n\t\t\t\t\t\t\tissue.Assignee = &structs.User{\n\t\t\t\t\t\t\t\tName: \"Unknown\",\n\t\t\t\t\t\t\t\tID: issue.AssigneeID,\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tpassResponse(rw, err.Error(), false, http.StatusInternalServerError)\n\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\n\t\t\t\t\tissue.Assignee = assignee\n\t\t\t\t}\n\t\t\tcase structs.ActionLockComments:\n\t\t\t\tissue.CommentsLocked = locking\n\n\t\t\t\t// Create comment\n\t\t\t\tcomment := structs.Comment{\n\t\t\t\t\tID: er.IDGen.GenerateID(),\n\t\t\t\t\tIssueID: issue.ID,\n\t\t\t\t\tCreatedAt: now,\n\t\t\t\t\tCreatedByID: user.ID,\n\t\t\t\t\tType: structs.CommentsLocked,\n\t\t\t\t\tCommentsOpened: &locking,\n\t\t\t\t}\n\n\t\t\t\t_, err = er.Postgres.Model(&comment).Insert()\n\t\t\t\tif err != nil {\n\t\t\t\t\tpassResponse(rw, err.Error(), false, http.StatusInternalServerError)\n\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tissue.CommentCount++\n\n\t\t\tcase structs.ActionMarkStatus:\n\t\t\t\tswitch issue.Type {\n\t\t\t\tcase structs.EntryActive:\n\t\t\t\t\tproject.ActiveIssues--\n\t\t\t\tcase structs.EntryOpen:\n\t\t\t\t\tproject.OpenIssues--\n\t\t\t\tcase structs.EntryResolved:\n\t\t\t\t\tproject.ResolvedIssues--\n\t\t\t\tcase structs.EntryInvalid:\n\t\t\t\t}\n\n\t\t\t\tissue.Type = markType\n\n\t\t\t\tswitch issue.Type {\n\t\t\t\tcase structs.EntryActive:\n\t\t\t\t\tproject.ActiveIssues++\n\t\t\t\tcase structs.EntryOpen:\n\t\t\t\t\tproject.OpenIssues++\n\t\t\t\tcase structs.EntryResolved:\n\t\t\t\t\tproject.ResolvedIssues++\n\t\t\t\tcase structs.EntryInvalid:\n\t\t\t\t}\n\n\t\t\t\t// Update issues cache counter on project\n\t\t\t\t_, err = er.Postgres.Model(project).\n\t\t\t\t\tWherePK().\n\t\t\t\t\tUpdate()\n\t\t\t\tif err != nil {\n\t\t\t\t\tpassResponse(rw, err.Error(), false, http.StatusInternalServerError)\n\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\t// Create comment\n\t\t\t\tcomment := structs.Comment{\n\t\t\t\t\tID: er.IDGen.GenerateID(),\n\t\t\t\t\tIssueID: issue.ID,\n\t\t\t\t\tCreatedAt: now,\n\t\t\t\t\tCreatedByID: user.ID,\n\t\t\t\t\tType: structs.IssueMarked,\n\t\t\t\t\tIssueMarked: &markType,\n\t\t\t\t}\n\n\t\t\t\t_, err = er.Postgres.Model(&comment).Insert()\n\t\t\t\tif err != nil {\n\t\t\t\t\tpassResponse(rw, err.Error(), false, http.StatusInternalServerError)\n\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tissue.CommentCount++\n\t\t\t}\n\n\t\t\tissue.LastModified = now\n\n\t\t\t_, err = er.Postgres.Model(&issue).\n\t\t\t\tWherePK().\n\t\t\t\tUpdate()\n\t\t\tif err != nil {\n\t\t\t\tpassResponse(rw, err.Error(), false, http.StatusInternalServerError)\n\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tif issue.Starred != origionalIssue.Starred {\n\t\t\t\terr = er.HandleProjectWebhook(project, structs.WebhookMessage{\n\t\t\t\t\tType: structs.IssueStarred,\n\t\t\t\t\tProject: project,\n\t\t\t\t\tIssue: &issue,\n\t\t\t\t\tAuthor: user,\n\t\t\t\t})\n\t\t\t\tif err != nil {\n\t\t\t\t\ter.Logger.Warn().Err(err).Msg(\"Failed to handle project webhook\")\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif issue.AssigneeID != origionalIssue.AssigneeID {\n\t\t\t\terr = er.HandleProjectWebhook(project, structs.WebhookMessage{\n\t\t\t\t\tType: structs.IssueAssigned,\n\t\t\t\t\tProject: project,\n\t\t\t\t\tIssue: &issue,\n\t\t\t\t\tAuthor: user,\n\t\t\t\t})\n\t\t\t\tif err != nil {\n\t\t\t\t\ter.Logger.Warn().Err(err).Msg(\"Failed to handle project webhook\")\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif issue.CommentsLocked != origionalIssue.CommentsLocked {\n\t\t\t\terr = er.HandleProjectWebhook(project, structs.WebhookMessage{\n\t\t\t\t\tType: structs.IssueLocked,\n\t\t\t\t\tProject: project,\n\t\t\t\t\tIssue: &issue,\n\t\t\t\t\tAuthor: user,\n\t\t\t\t})\n\t\t\t\tif err != nil {\n\t\t\t\t\ter.Logger.Warn().Err(err).Msg(\"Failed to handle project webhook\")\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif issue.Type != origionalIssue.Type {\n\t\t\t\terr = er.HandleProjectWebhook(project, structs.WebhookMessage{\n\t\t\t\t\tType: structs.IssueMarkStatus,\n\t\t\t\t\tProject: project,\n\t\t\t\t\tIssue: &issue,\n\t\t\t\t\tAuthor: user,\n\t\t\t\t})\n\t\t\t\tif err != nil {\n\t\t\t\t\ter.Logger.Warn().Err(err).Msg(\"Failed to handle project webhook\")\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tissues = append(issues, issue)\n\t\t}\n\n\t\tpassResponse(rw, structs.APIProjectExecutor{\n\t\t\tIssues: issues,\n\t\t\tUnavailable: unavailable,\n\t\t\tProject: project,\n\t\t}, true, http.StatusOK)\n\t}\n}", "func Process (config config.Config) cache.Cache {\n\tscanner := scanner.Scanner {\n\t\t Config: config,\n\t}\n\tscripts := scanner.Scan()\n\treturn scanner.LoadInCache(scripts)\n}", "func (agg *aggregator) Run() {\n\t// Get unprocessed pageviews\n\tpageviews, err := agg.database.GetProcessablePageviews()\n\tif err != nil && err != datastore.ErrNoResults {\n\t\tlog.Error(err)\n\t\treturn\n\t}\n\n\t// Do we have anything to process?\n\tif len(pageviews) == 0 {\n\t\treturn\n\t}\n\n\tresults := agg.Process(pageviews)\n\n\t// update stats\n\tfor _, site := range results.Sites {\n\t\terr = agg.database.UpdateSiteStats(site)\n\t\tif err != nil {\n\t\t\tlog.Error(err)\n\t\t}\n\t}\n\n\tfor _, pageStats := range results.Pages {\n\t\terr = agg.database.UpdatePageStats(pageStats)\n\t\tif err != nil {\n\t\t\tlog.Error(err)\n\t\t}\n\t}\n\n\tfor _, referrerStats := range results.Referrers {\n\t\terr = agg.database.UpdateReferrerStats(referrerStats)\n\t\tif err != nil {\n\t\t\tlog.Error(err)\n\t\t}\n\t}\n\n\t// finally, remove pageviews that we just processed\n\terr = agg.database.DeletePageviews(pageviews)\n\tif err != nil {\n\t\tlog.Error(err)\n\t}\n}", "func process(module, version string, args worker.Args, w worker.Worker) error {\n\t// decrementing avoids endless loop of entries with missing trycount\n\ttrycount, ok := args[workerTryCountKey].(int)\n\tif !ok {\n\t\treturn fmt.Errorf(\"Trycount missing or invalid\")\n\t}\n\n\tif trycount <= 0 {\n\t\treturn fmt.Errorf(\"Max trycount for %s %s reached\", module, version)\n\t}\n\n\treturn w.Perform(worker.Job{\n\t\tQueue: workerQueue,\n\t\tHandler: FetcherWorkerName,\n\t\tArgs: worker.Args{\n\t\t\tworkerModuleKey: module,\n\t\t\tworkerVersionKey: version,\n\t\t\tworkerTryCountKey: trycount - 1,\n\t\t},\n\t})\n}", "func ImportIssues(db *sqlx.DB, repository string, inIssues []github.Issue) error {\n\ttx, err := db.Begin()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"import issue failure\")\n\t}\n\n\tdefer func() {\n\t\tif err != nil {\n\t\t\ttx.Rollback()\n\t\t\treturn\n\t\t}\n\n\t\terr = tx.Commit()\n\t}()\n\n\tlog.Info(\"updating or importing issues\")\n\tfor _, in := range inIssues {\n\t\tissue := ConvertIssue(repository, in)\n\n\t\tif _, err := tx.Exec(insertIssueSQL, issue.Number, issue.State, issue.Title, issue.Body,\n\t\t\tissue.User, issue.Labels, issue.Assignee, issue.ClosedAt, issue.CreatedAt,\n\t\t\tissue.UpdatedAt, issue.Milestone, issue.Repository); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tlog.Info(\"analyzing labels\")\n\tlabels := map[string]Label{}\n\n\tissue := Issue{}\n\trows, err := db.Queryx(activeIssuesSQL)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"query open issues failure\")\n\t}\n\tfor rows.Next() {\n\t\terr := rows.StructScan(&issue)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"scan issue into struct failure\")\n\t\t}\n\n\t\tfor _, label := range issue.Labels {\n\t\t\tlabels[label.Name] = label\n\t\t}\n\t}\n\n\tfor _, label := range labels {\n\t\tif _, err := tx.Exec(insertLabelSQL, label.Name, label.URL, label.Color); err != nil {\n\t\t\treturn errors.Wrap(err, \"insert label\")\n\t\t}\n\t}\n\n\treturn nil\n}", "func (j job) run() bool {\n\n // ignore data file processed by this job in case of a panic\n defer func() bool {\n if r := recover(); r != nil {\n log.Printf(\"Warning: Failed to parse file %s. Ignoring file. \" +\n \"Did you pick the correct column??\", j.fileName)\n }\n return false\n }()\n\n // main processing\n file, err := os.Open(j.fileName)\n if err != nil {\n log.Printf(\"Warning: Failed to open file %s. Ignoring file.\\n\",\n j.fileName)\n return false\n }\n defer file.Close()\n\n scanner := bufio.NewScanner(file)\n output := make([]float64,0)\n for scanner.Scan() {\n col, err := strconv.ParseFloat(strings.Fields(scanner.Text())[j.colID], 64)\n if err != nil {\n log.Printf(\"Warning: Failed to parse file %s. Ignoring file.\\n\",\n j.fileName)\n return false\n }\n\n output = append(output, col)\n }\n\n j.results <- output\n return true\n}", "func upsertRecord(reportRecord map[string]string, report reportStruct, counters *counterStruct) {\n\tnamedData := make(map[string]interface{})\n\tsqlQuery := \"\"\n\t//Build Query\n\tif apiCallConfig.Database.Driver == \"mssql\" {\n\t\t//does record exist?\n\t\trecordExists := doesRecordExist(reportRecord, report)\n\t\tif recordExists {\n\t\t\tsqlQuery, namedData = buildMSSQLUpdate(reportRecord, report)\n\t\t} else {\n\t\t\tsqlQuery, namedData = buildMSSQLInsert(reportRecord, report)\n\t\t}\n\t} else {\n\t\t//No need to check if record exists in MySQL, just do an INSERT...ON DUPLICATE KEY\n\t\tsqlQuery, namedData = buildMySQLQuery(reportRecord, report)\n\t}\n\n\tif len(namedData) == 0 {\n\t\tcounters.failed++\n\t\thornbillHelpers.Logger(4, \"Unable to map any values from the returned record:\", false, logFile)\n\t\tjsonRecord, _ := json.Marshal(reportRecord)\n\t\thornbillHelpers.Logger(3, \"[RECORD] \"+string(jsonRecord), false, logFile)\n\t\tjsonMapping, _ := json.Marshal(report.Table.Mapping)\n\t\thornbillHelpers.Logger(3, \"[MAPPINGS] \"+string(jsonMapping), false, logFile)\n\n\t\treturn\n\t}\n\n\tif configDebug {\n\t\t//Add query & params to log\n\t\thornbillHelpers.Logger(3, \"[DATABASE] Query:\"+sqlQuery, false, logFile)\n\t\thornbillHelpers.Logger(3, \"[DATABASE] Binding:\", false, logFile)\n\t\tfor k, v := range namedData {\n\t\t\thornbillHelpers.Logger(3, \"[DATABASE] :\"+k+\" = \"+fmt.Sprintf(\"%v\", v), false, logFile)\n\t\t}\n\t}\n\n\tresults, err := db.NamedExec(sqlQuery, namedData)\n\tif err != nil {\n\t\thornbillHelpers.Logger(4, \" [DATABASE] NamedExec Error: \"+fmt.Sprintf(\"%v\", err), true, logFile)\n\t\tcounters.failed++\n\t\treturn\n\t}\n\tif configDebug {\n\t\thornbillHelpers.Logger(3, \"[DATABASE] NamedExec Success\", false, logFile)\n\t}\n\tcounters.success++\n\n\taffectedCount, err := results.RowsAffected()\n\tif err != nil {\n\t\thornbillHelpers.Logger(4, \" [DATABASE] RowsAffected Error: \"+fmt.Sprintf(\"%v\", err), false, logFile)\n\t\treturn\n\t}\n\tif configDebug {\n\t\thornbillHelpers.Logger(3, \"[DATABASE] RowsAffected: \"+strconv.FormatInt(affectedCount, 10), false, logFile)\n\t}\n\n\tcounters.rowsaffected += int(affectedCount)\n}", "func (agg *aggregator) Process(pageviews []*models.Pageview) *results {\n\tlog.Debugf(\"processing %d pageviews\", len(pageviews))\n\tresults := newResults()\n\n\tfor _, p := range pageviews {\n\t\tsite, err := agg.getSiteStats(results, p.Timestamp)\n\t\tif err != nil {\n\t\t\tlog.Error(err)\n\t\t\tcontinue\n\t\t}\n\n\t\tsite.Pageviews += 1\n\n\t\tif p.Duration > 0.00 {\n\t\t\tsite.KnownDurations += 1\n\t\t\tsite.AvgDuration = site.AvgDuration + ((float64(p.Duration) - site.AvgDuration) * 1 / float64(site.KnownDurations))\n\t\t}\n\n\t\tif p.IsNewVisitor {\n\t\t\tsite.Visitors += 1\n\t\t}\n\n\t\tif p.IsNewSession {\n\t\t\tsite.Sessions += 1\n\n\t\t\tif p.IsBounce {\n\t\t\t\tsite.BounceRate = ((float64(site.Sessions-1) * site.BounceRate) + 1) / (float64(site.Sessions))\n\t\t\t} else {\n\t\t\t\tsite.BounceRate = ((float64(site.Sessions-1) * site.BounceRate) + 0) / (float64(site.Sessions))\n\t\t\t}\n\t\t}\n\n\t\tpageStats, err := agg.getPageStats(results, p.Timestamp, p.Hostname, p.Pathname)\n\t\tif err != nil {\n\t\t\tlog.Error(err)\n\t\t\tcontinue\n\t\t}\n\n\t\tpageStats.Pageviews += 1\n\t\tif p.IsUnique {\n\t\t\tpageStats.Visitors += 1\n\t\t}\n\n\t\tif p.Duration > 0.00 {\n\t\t\tpageStats.KnownDurations += 1\n\t\t\tpageStats.AvgDuration = pageStats.AvgDuration + ((float64(p.Duration) - pageStats.AvgDuration) * 1 / float64(pageStats.KnownDurations))\n\t\t}\n\n\t\tif p.IsNewSession {\n\t\t\tpageStats.Entries += 1\n\n\t\t\tif p.IsBounce {\n\t\t\t\tpageStats.BounceRate = ((float64(pageStats.Entries-1) * pageStats.BounceRate) + 1.00) / (float64(pageStats.Entries))\n\t\t\t} else {\n\t\t\t\tpageStats.BounceRate = ((float64(pageStats.Entries-1) * pageStats.BounceRate) + 0.00) / (float64(pageStats.Entries))\n\t\t\t}\n\t\t}\n\n\t\t// referrer stats\n\t\tif p.Referrer != \"\" {\n\t\t\treferrerStats, err := agg.getReferrerStats(results, p.Timestamp, p.Referrer)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(err)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\treferrerStats.Pageviews += 1\n\n\t\t\tif p.IsNewVisitor {\n\t\t\t\treferrerStats.Visitors += 1\n\t\t\t}\n\n\t\t\tif p.IsBounce {\n\t\t\t\treferrerStats.BounceRate = ((float64(referrerStats.Pageviews-1) * referrerStats.BounceRate) + 1.00) / (float64(referrerStats.Pageviews))\n\t\t\t} else {\n\t\t\t\treferrerStats.BounceRate = ((float64(referrerStats.Pageviews-1) * referrerStats.BounceRate) + 0.00) / (float64(referrerStats.Pageviews))\n\t\t\t}\n\n\t\t\tif p.Duration > 0.00 {\n\t\t\t\treferrerStats.KnownDurations += 1\n\t\t\t\treferrerStats.AvgDuration = referrerStats.AvgDuration + ((float64(p.Duration) - referrerStats.AvgDuration) * 1 / float64(referrerStats.KnownDurations))\n\t\t\t}\n\n\t\t}\n\n\t}\n\n\treturn results\n}", "func (p *MockCSVProcessor) Process(requestId string, r io.Reader, w io.Writer, d map[string][]string) {\n\tmutex.Lock()\n\tdefer mutex.Unlock()\n\tp.invocations++\n\tif p.shouldPanic {\n\t\tpanic(PANIC_MESSAGE)\n\t}\n}", "func (v *Vulnerability) PrepareFromECRImageScan(imageScanFinding *ecr.ImageScanFinding) {\n\tif imageScanFinding.Severity != nil {\n\t\tv.Severity = strings.ToUpper(*imageScanFinding.Severity)\n\t}\n\tif imageScanFinding.Description != nil {\n\t\tv.Description = *imageScanFinding.Description\n\t}\n\tif imageScanFinding.Name != nil {\n\t\tv.VulnerabilityID = *imageScanFinding.Name\n\t}\n\tif imageScanFinding.Uri != nil {\n\t\tv.PrimaryURL = *imageScanFinding.Uri\n\t}\n\tif v.PrimaryURL == \"\" {\n\t\tv.PrimaryURL = primaryURL + v.VulnerabilityID\n\t}\n\tcvss := CVSS{}\n\tfor _, attr := range imageScanFinding.Attributes {\n\t\tif attr.Key == nil || attr.Value == nil {\n\t\t\tcontinue\n\t\t} else if strings.EqualFold(*attr.Key, ecrPackageName) {\n\t\t\tv.PkgName = *attr.Value\n\t\t} else if strings.EqualFold(*attr.Key, ecrPackageVersion) {\n\t\t\tv.InstalledVersion = *attr.Value\n\t\t} else {\n\t\t\tcvss.PrepareFromECRImageScanAttribute(attr)\n\t\t\tvendorCVSS := make(VendorCVSS)\n\t\t\tvendorCVSS[nvd] = cvss\n\t\t\tv.CVSS = vendorCVSS\n\t\t}\n\t}\n}", "func processSuccess(ctx context.Context, output []byte, pipelineId uuid.UUID, cacheService cache.Cache, status pb.Status) {\n\tswitch status {\n\tcase pb.Status_STATUS_PREPARING:\n\t\tlogger.Infof(\"%s: Validate() finish\\n\", pipelineId)\n\n\t\tsetToCache(ctx, cacheService, pipelineId, cache.Status, pb.Status_STATUS_PREPARING)\n\tcase pb.Status_STATUS_COMPILING:\n\t\tlogger.Infof(\"%s: Prepare() finish\\n\", pipelineId)\n\n\t\tsetToCache(ctx, cacheService, pipelineId, cache.Status, pb.Status_STATUS_COMPILING)\n\tcase pb.Status_STATUS_EXECUTING:\n\t\tlogger.Infof(\"%s: Compile() finish\\n\", pipelineId)\n\n\t\tsetToCache(ctx, cacheService, pipelineId, cache.CompileOutput, string(output))\n\n\t\tsetToCache(ctx, cacheService, pipelineId, cache.Status, pb.Status_STATUS_EXECUTING)\n\tcase pb.Status_STATUS_FINISHED:\n\t\tlogger.Infof(\"%s: Run() finish\\n\", pipelineId)\n\n\t\tsetToCache(ctx, cacheService, pipelineId, cache.RunOutput, string(output))\n\n\t\tsetToCache(ctx, cacheService, pipelineId, cache.Status, pb.Status_STATUS_FINISHED)\n\t}\n}", "func (db *IndexerDb) processAccount(account *generated.Account) {\n\tif !db.hasTotalRewardsSupport() {\n\t\taccount.Rewards = 0\n\t}\n}", "func (h *JiraHandler) Handle(ctx context.Context, event sdk.Event) error {\n\tlog.Debug(\"handle event\")\n\tswitch o := event.Object.(type) {\n\tcase *v1alpha1.Jira:\n\t\terr := handleJira(o)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Failed to handle jira: %v\", err)\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func (ew *Eyewitness) Investigate(status whodunit.AssetStatus) {\n\ttotalCount := 0\n\ttable := whodunit.NewStatusTable(whodunit.AssetTypeRecognition, status)\n\tjep := ew.jobEpisodeMap()\n\tfor season := 1; season <= whodunit.SeasonCount; season++ {\n\t\ts := whodunit.NewSeason(season)\n\t\tif err := s.PopulateEpisodes(); err != nil {\n\t\t\tpanic(\"Could not get season episodes\")\n\t\t}\n\n\t\tfor _, ep := range s.AllEpisodes() {\n\t\t\tje := jep[ep.Name()]\n\t\t\tif je != nil {\n\t\t\t\tep.SetAssetStatus(je.AssetStatus(whodunit.AssetTypeRecognition))\n\t\t\t}\n\n\t\t\tif table.AddRow(ep) {\n\t\t\t\ttotalCount++\n\t\t\t}\n\t\t}\n\t}\n\n\ttable.RenderTable(totalCount)\n}", "func (psr *PSRTracker) Exec(ctx context.Context) error {\n\t//TODO: retrieve github updates of psr config file. For now, we'll just pull\n\t//PSR's as defined by psr.json file\n\tvar syncGroup sync.WaitGroup\n\tvar doneGroup sync.WaitGroup\n\tctx = context.WithValue(ctx, psrWaitGroupKey, &syncGroup)\n\terrorCh := make(chan error)\n\tdoneGroup.Add(1)\n\tgo func() {\n\t\tdefer doneGroup.Done()\n\t\tfor {\n\t\t\te := <-errorCh\n\t\t\tif e != nil {\n\t\t\t\tpsrLog.Error(\"Problem in PSR fetch: %v]\\n\", e)\n\t\t\t} else {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}()\n\n\tfor i := 0; i < len(psr.Requests); i++ {\n\t\tp := psr.Requests[i]\n\t\tsyncGroup.Add(1)\n\t\tgo p.fetch(ctx, errorCh)\n\t}\n\tsyncGroup.Wait()\n\terrorCh <- nil\n\tdoneGroup.Wait()\n\tpsrLog.Info(\"PSR Tracker cycle complete\")\n\treturn nil\n}", "func (e *AnalyzeExec) Next(ctx context.Context, req *chunk.Chunk) error {\n\tconcurrency, err := getBuildStatsConcurrency(e.ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\ttaskCh := make(chan *analyzeTask, len(e.tasks))\n\tresultCh := make(chan analyzeResult, len(e.tasks))\n\te.wg.Add(concurrency)\n\tfor i := 0; i < concurrency; i++ {\n\t\tgo e.analyzeWorker(taskCh, resultCh, i == 0)\n\t}\n\tfor _, task := range e.tasks {\n\t\tstatistics.AddNewAnalyzeJob(task.job)\n\t}\n\tfor _, task := range e.tasks {\n\t\ttaskCh <- task\n\t}\n\tclose(taskCh)\n\tstatsHandle := domain.GetDomain(e.ctx).StatsHandle()\n\tpanicCnt := 0\n\tfor panicCnt < concurrency {\n\t\tresult, ok := <-resultCh\n\t\tif !ok {\n\t\t\tbreak\n\t\t}\n\t\tif result.Err != nil {\n\t\t\terr = result.Err\n\t\t\tif err == errAnalyzeWorkerPanic {\n\t\t\t\tpanicCnt++\n\t\t\t} else {\n\t\t\t\tlogutil.Logger(ctx).Error(\"analyze failed\", zap.Error(err))\n\t\t\t}\n\t\t\tresult.job.Finish(true)\n\t\t\tcontinue\n\t\t}\n\t\tfor i, hg := range result.Hist {\n\t\t\terr1 := statsHandle.SaveStatsToStorage(result.PhysicalTableID, result.Count, result.IsIndex, hg, result.Cms[i], 1)\n\t\t\tif err1 != nil {\n\t\t\t\terr = err1\n\t\t\t\tlogutil.Logger(ctx).Error(\"save stats to storage failed\", zap.Error(err))\n\t\t\t\tresult.job.Finish(true)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t\tresult.job.Finish(false)\n\t}\n\tfor _, task := range e.tasks {\n\t\tstatistics.MoveToHistory(task.job)\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn statsHandle.Update(GetInfoSchema(e.ctx))\n}", "func (collector *Metrics) Collect(ch chan<- prometheus.Metric) {\n\n\tcollectedIssues, err := fetchJiraIssues()\n\tif err != nil {\n\t\tlog.Error(err)\n\t\treturn\n\t}\n\n\tfor _, issue := range collectedIssues.Issues {\n\t\tcreatedTimestamp := convertToUnixTime(issue.Fields.Created)\n\t\tch <- prometheus.MustNewConstMetric(collector.issue, prometheus.CounterValue, createdTimestamp, issue.Fields.Status.Name, issue.Fields.Project.Name, issue.Key, issue.Fields.Assignee.Name, issue.Fields.Location.Name, issue.Fields.Priority.Name, issue.Fields.Level.Name, issue.Fields.RequestType.Name, issue.Fields.Feedback, issue.Fields.Urgency.Name, issue.Fields.IssueType.Name, issue.Fields.Reporter.Name, issue.Fields.Satisfaction)\n\t}\n}" ]
[ "0.582558", "0.55696946", "0.53461516", "0.5315644", "0.5294726", "0.5188366", "0.5123911", "0.5095219", "0.5033211", "0.49473912", "0.48569843", "0.47691157", "0.47371596", "0.472961", "0.4720181", "0.46678436", "0.46399495", "0.46330613", "0.45968518", "0.45703912", "0.45629534", "0.45628196", "0.45604184", "0.45512003", "0.454964", "0.45372215", "0.45304728", "0.45219606", "0.45178294", "0.4509802", "0.44897905", "0.448468", "0.44843552", "0.44842067", "0.44789818", "0.44771194", "0.44748512", "0.44640827", "0.44632208", "0.44576463", "0.44528598", "0.44462115", "0.4442376", "0.4442297", "0.44245023", "0.44194847", "0.43994194", "0.43973258", "0.43965137", "0.43920237", "0.43729323", "0.43659994", "0.43658268", "0.4362009", "0.43581685", "0.43528372", "0.4351543", "0.43469682", "0.43365183", "0.4330583", "0.43287778", "0.43284836", "0.43255568", "0.4321956", "0.43201151", "0.43200967", "0.43180552", "0.43139666", "0.42932415", "0.42906585", "0.42856878", "0.4279277", "0.42761478", "0.42745462", "0.42726228", "0.42661777", "0.42601734", "0.42583445", "0.4257293", "0.42517552", "0.42491695", "0.42479753", "0.4241819", "0.42377323", "0.42368218", "0.4236113", "0.4233742", "0.42261845", "0.4223915", "0.42111468", "0.42073932", "0.42027807", "0.42017242", "0.41981557", "0.41954044", "0.4193624", "0.4192198", "0.4191247", "0.41867593", "0.4185149" ]
0.5919486
0
transitions the status of the JIRA ticket if necessary
func (job *ScanCloseJob) modifyJiraTicketAccordingToVulnerabilityStatus(engine integrations.TicketingEngine, ticket domain.Ticket, scan domain.ScanSummary, deadHostIPToProofMap map[string]string, deviceIDToVulnIDToDetection map[string]map[string]domain.Detection) { var detectionsFoundForDevice = deviceIDToVulnIDToDetection[ticket.DeviceID()] != nil var deviceReportedAsDead = len(deadHostIPToProofMap[sord(ticket.IPAddress())]) > 0 && len(sord(ticket.IPAddress())) > 0 var detection domain.Detection if detectionsFoundForDevice { detection = deviceIDToVulnIDToDetection[ticket.DeviceID()][combineVulnerabilityIDAndServicePortTicket(ticket)] } var err error var status string var inactiveKernel bool if detection != nil { status = detection.Status() inactiveKernel = iord(detection.ActiveKernel()) > 0 if detection.LastFound() != nil && !detection.LastFound().IsZero() && detection.LastFound().After(tord1970(ticket.AlertDate())) { ticket = &lastUpdatedTicket{ Ticket: ticket, lastUpdated: *detection.LastFound(), } _, _, err := engine.UpdateTicket(ticket, "") if err != nil { job.lstream.Send(log.Errorf(err, "error while setting last found date of %s to [%s]", ticket.Title(), detection.LastFound().String())) } } } if detectionsFoundForDevice || deviceReportedAsDead { switch job.Payload.Type { case domain.RescanNormal: job.processTicketForNormalRescan(deadHostIPToProofMap, ticket, detection, err, engine, status, inactiveKernel, scan) case domain.RescanDecommission: job.processTicketForDecommRescan(deadHostIPToProofMap, ticket, detection, err, engine, scan, status) case domain.RescanExceptions: job.processTicketForPassiveOrExceptionRescan(deadHostIPToProofMap, ticket, detection, err, engine, status, inactiveKernel, scan) case domain.RescanPassive: job.processTicketForPassiveOrExceptionRescan(deadHostIPToProofMap, ticket, detection, err, engine, status, inactiveKernel, scan) default: job.lstream.Send(log.Critical(fmt.Sprintf("Unrecognized scan type [%s]", job.Payload.Type), nil)) } } else { job.lstream.Send(log.Errorf(err, "scan [%s] did not seem to cover the device %v - scanner did not report any data for device", job.Payload.ScanID, ticket.DeviceID())) err = engine.Transition(ticket, engine.GetStatusMap(domain.StatusScanError), fmt.Sprintf("scan [%s] did not cover the device %v. Please make sure this asset is still in-scope and associated with an asset group. If this asset is out of scope, please move this ticket to NOTAVRR status or alert the vulnerability management team.", job.Payload.ScanID, ticket.DeviceID()), sord(ticket.AssignedTo())) if err != nil { job.lstream.Send(log.Errorf(err, "error while adding comment to ticket [%s]", ticket.Title())) } } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func changeTicketStatus(ticket *jira.Issue, status string, transitions []jira.Transition, fields map[string]jira.TransitionField) error {\n\tfmt.Printf(\"Changing %s status to %s with fields %s\\n\", ticket.Key, status, fields)\n\tvar found *jira.Transition\n\n\tfor _, transition := range transitions {\n\t\tif status == transition.Name {\n\t\t\tfound = &transition\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif found == nil {\n\t\treturn fmt.Errorf(\"Transition for %s to %s not found\", ticket.Key, status)\n\t}\n\n\tjiraClient.Transition.Create(ticket.ID, found.ID, fields)\n\n\treturn nil\n}", "func ChangeJiraStatus(ticket *Task) {\n\n\tjiraURL := \"http://jira.verf.io:8080\"\n\tjiraUsername := \"brian\"\n\tjiraPassword := \"P@ssw0rd\"\n\n\ttp := jira.BasicAuthTransport{\n\t\tUsername: strings.TrimSpace(jiraUsername),\n\t\tPassword: strings.TrimSpace(jiraPassword),\n\t}\n\n\tclient, err := jira.NewClient(tp.Client(), strings.TrimSpace(jiraURL))\n\tif err != nil {\n\t\tfmt.Printf(\"\\nerror with Jira connection: %v\\n\", err)\n\t\treturn\n\t}\n\n\tclientIssue := client.Issue\n\n\tissue, _, err := clientIssue.Get(ticket.SourceID, nil)\n\tfmt.Println(\"Update status in Jira to \\\"DONE\\\" for Issue:\", issue.ID)\n\t// 11 - from TO DO to IN PROGRESS\n\t// 21 - from TO DO to DONE\n\n\t// 31 - from IN PROGRESS to TO DO\n\t// 41 - from IN PROGRESS to DONE\n\n\t// 51 - from DONE to TO DO\n\t// 61 - from DONE to IN PROGRESS\n\t//update status to \"DONE\"\n\t_, err = clientIssue.DoTransition(issue.ID, \"21\")\n\tif err != nil {\n\t\tfmt.Printf(\"\\nerror: %v\\n\", err)\n\t\treturn\n\t}\n\n\tchangeStatus(ticket, \"Closed\")\n\tissue, _, err = clientIssue.Get(ticket.SourceID, nil)\n\tfmt.Println(\"Status of Issue\", issue.ID, \"was successfully updated to:\", issue.Fields.Status.Name)\n}", "func ChangeMilestoneStatus(ctx *context.Context) {\n\ttoClose := false\n\tswitch ctx.Params(\":action\") {\n\tcase \"open\":\n\t\ttoClose = false\n\tcase \"close\":\n\t\ttoClose = true\n\tdefault:\n\t\tctx.Redirect(ctx.Repo.RepoLink + \"/milestones\")\n\t}\n\tid := ctx.ParamsInt64(\":id\")\n\n\tif err := issues_model.ChangeMilestoneStatusByRepoIDAndID(ctx.Repo.Repository.ID, id, toClose); err != nil {\n\t\tif issues_model.IsErrMilestoneNotExist(err) {\n\t\t\tctx.NotFound(\"\", err)\n\t\t} else {\n\t\t\tctx.ServerError(\"ChangeMilestoneStatusByIDAndRepoID\", err)\n\t\t}\n\t\treturn\n\t}\n\tctx.Redirect(ctx.Repo.RepoLink + \"/milestones?state=\" + url.QueryEscape(ctx.Params(\":action\")))\n}", "func ChangeStatus(issue *models.Issue, doer *models.User, isClosed bool) (err error) {\n\tcomment, err := issue.ChangeStatus(doer, isClosed)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tnotification.NotifyIssueChangeStatus(doer, issue, comment, isClosed)\n\treturn nil\n}", "func (j *TrainingJob) updateTPRStatus() error {\n\t// If the status hasn't changed then there's no reason to update the TPR.\n\tif reflect.DeepEqual(j.job.Status, j.status) {\n\t\treturn nil\n\t}\n\n\tnewJob := j.job\n\tnewJob.Status = j.status\n\tnewJob, err := j.mxJobClient.Update(j.job.Metadata.Namespace, newJob)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tj.job = newJob\n\n\treturn nil\n}", "func (ts *TechStoryService) setStatus (w http.ResponseWriter, r *http.Request) {\n\tvar techStory model.TechStory\n\tmodel.ReadJsonBody(r, &techStory)\n\ttechStory.Key = mux.Vars(r)[\"id\"]\n\n\tWithTechStoryDao(func(dao techStoryDao) {\n\t\tuser := model.GetUserFromRequest(w, r)\n\t\tentity, err := dao.SetStatus(&techStory, techStory.Status, user)\n\t\tmodel.CheckErr(err)\n\t\tmodel.WriteResponse(true, nil, entity, w)\n\t})\n}", "func (e *entry) setStatus(status int) {\n\te.mu.Lock()\n\tdefer e.mu.Unlock()\n\te.status = status\n}", "func ChangeMilestoneStatus(m *Milestone, isClosed bool) (err error) {\n\tctx, committer, err := db.TxContext(db.DefaultContext)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer committer.Close()\n\n\tif err := changeMilestoneStatus(ctx, m, isClosed); err != nil {\n\t\treturn err\n\t}\n\n\treturn committer.Commit()\n}", "func (c *autoRollStatusCache) set(s *AutoRollStatus) error {\n\tif !util.In(string(s.Status), VALID_STATUSES) {\n\t\treturn fmt.Errorf(\"Invalid status: %s\", s.Status)\n\t}\n\tif s.Status == STATUS_ERROR {\n\t\tif s.Error == \"\" {\n\t\t\treturn fmt.Errorf(\"Cannot set error status without an error!\")\n\t\t}\n\t} else if s.Error != \"\" {\n\t\treturn fmt.Errorf(\"Cannot be in any status other than error when an error occurred.\")\n\t}\n\n\tc.mtx.Lock()\n\tdefer c.mtx.Unlock()\n\trecent := make([]*autoroll.AutoRollIssue, 0, len(s.Recent))\n\tfor _, r := range s.Recent {\n\t\trecent = append(recent, r.Copy())\n\t}\n\tc.currentRoll = nil\n\tif s.CurrentRoll != nil {\n\t\tc.currentRoll = s.CurrentRoll.Copy()\n\t}\n\tc.lastRoll = nil\n\tif s.LastRoll != nil {\n\t\tc.lastRoll = s.LastRoll.Copy()\n\t}\n\tc.gerritUrl = s.GerritUrl\n\tc.lastRollRev = s.LastRollRev\n\tc.mode = s.Mode.Copy()\n\tc.recent = recent\n\tc.status = s.Status\n\n\treturn nil\n}", "func (clt *client) setStatus(newStatus Status) {\n\tclt.statusLock.Lock()\n\tclt.status = newStatus\n\tclt.statusLock.Unlock()\n}", "func toggleStatus(writer http.ResponseWriter, req *http.Request) {\n\tvars := mux.Vars(req)\n\tcreatedAt, err := time.Parse(time.RFC3339, vars[\"createdAt\"]) //converts requested time into correct format\n\tif err != nil {\n\t\tlog.Print(\"error:\", err)\n\t\thttp.Error(writer, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tdatabase, err := loadJsonFile()\n\tif err != nil {\n\t\tlog.Print(\"error:\", err)\n\t\thttp.Error(writer, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tfor i, _ := range database.Tasks {\n\t\tif database.Tasks[i].CreatedAt.Equal(createdAt) {\n\t\t\tdatabase.Tasks[i].Completed = !database.Tasks[i].Completed\n\t\t\treturnJson(database, writer)\n\t\t\treturn\n\t\t}\n\t}\n\t//this code runs only if no taks was found with the correct createdAt timestamp\n\thttp.Error(writer, err.Error(), http.StatusBadRequest)\n}", "func (h *HTTP) issueTollTicket(w http.ResponseWriter, r *http.Request) {\n\trequestData := toll.TicketToll{}\n\n\t// decode the data from request body\n\tif err := json.NewDecoder(r.Body).Decode(&requestData); err != nil {\n\t\tlog.Error(err)\n\t\twebgo.SendError(\n\t\t\tw,\n\t\t\terrors.ErrUnprocessableEntity,\n\t\t\thttp.StatusUnprocessableEntity,\n\t\t)\n\t\treturn\n\t}\n\n\t// validates the mandatory fields for issuing a toll\n\tif err := validator.New().Struct(requestData); err != nil {\n\t\tlog.Error(err)\n\t\twebgo.R400(w, errors.ErrMissingFields)\n\t\treturn\n\t}\n\n\t// issues a new toll\n\terr := h.APIHandler.TollHandler.IssueTollTicket(r.Context(), &requestData)\n\tif err != nil {\n\t\twebgo.R400(w, err)\n\t\treturn\n\t}\n\twebgo.R200(w, requestData)\n}", "func (m *SynchronizationJob) SetStatus(value SynchronizationStatusable)() {\n err := m.GetBackingStore().Set(\"status\", value)\n if err != nil {\n panic(err)\n }\n}", "func ChangeStatus(w http.ResponseWriter, req *http.Request) {\n\t//log\n\tnow, userIP := globalPkg.SetLogObj(req)\n\tlogobj := logpkg.LogStruct{\"_\", now, userIP, \"macAdress\", \"ChangeStatus\", \"AccountModule\", \"_\", \"_\", \"_\", 0}\n\n\tDeactivationData := deactivateInfo{}\n\tdecoder := json.NewDecoder(req.Body)\n\tdecoder.DisallowUnknownFields()\n\terr := decoder.Decode(&DeactivationData)\n\n\tif err != nil {\n\t\tglobalPkg.SendError(w, \"please enter your correct request \")\n\t\tglobalPkg.WriteLog(logobj, \"please enter your correct request \", \"failed\")\n\t\treturn\n\t}\n\n\t//approve username is lowercase and trim\n\tDeactivationData.UserName = convertStringTolowerCaseAndtrimspace(DeactivationData.UserName)\n\taccountObjByPK := accountdb.FindAccountByAccountPublicKey(DeactivationData.PublicKey)\n\tif accountObjByPK.AccountPublicKey == \"\" {\n\t\tglobalPkg.SendError(w, \"Invalid PublicKey\")\n\t\tglobalPkg.WriteLog(logobj, \"invalid public key\", \"failed\")\n\t\treturn\n\t}\n\n\tif DeactivationData.UserName != accountObjByPK.AccountName || DeactivationData.Password != accountObjByPK.AccountPassword {\n\t\tglobalPkg.SendNotFound(w, \"invalid UserName or Passsword \")\n\t\tglobalPkg.WriteLog(logobj, \"invalid UserName or Passsword \", \"failed\")\n\t\treturn\n\t}\n\n\taccountObjByPK.AccountStatus = !accountObjByPK.AccountStatus\n\taccountObjByPK.AccountDeactivatedReason = DeactivationData.DeactivationReason\n\n\tbroadcastTcp.BoardcastingTCP(accountObjByPK, \"update2\", \"account\")\n\tsendJson, _ := json.Marshal(accountObjByPK)\n\tglobalPkg.SendResponse(w, sendJson)\n\tlogobj.OutputData = \"update status successful \"\n\tlogobj.Process = \"success\"\n\tglobalPkg.WriteLog(logobj, \"update status successful\", \"success\")\n\n}", "func ChangeStatus(r *request.R) error {\n\tif e := r.Valid(); e != nil {\n\t\treturn e\n\t}\n\ts, e := StatusChanger(amqpURI)\n\tif e != nil {\n\t\treturn e\n\t}\n\tm, e := json.Marshal(r)\n\tif e != nil {\n\t\treturn e\n\t}\n\treturn s.Produce(m)\n}", "func (m *Myself) setStatus(stat int) {\n\tm.mutex.Lock()\n\tm.status = stat\n\tm.mutex.Unlock()\n}", "func (m *ScheduleItem) SetStatus(value *FreeBusyStatus)() {\n err := m.GetBackingStore().Set(\"status\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *SecurityActionState) SetStatus(value *OperationStatus)() {\n err := m.GetBackingStore().Set(\"status\", value)\n if err != nil {\n panic(err)\n }\n}", "func (ros *RolloutState) issueServiceRollout() (bool, error) {\n\tsm := ros.Statemgr\n\tversion := ros.Spec.Version\n\n\tserviceRollouts, err := sm.ListServiceRollouts()\n\tif err != nil {\n\t\tlog.Errorf(\"Error %v listing ServiceRollouts\", err)\n\t\treturn false, err\n\t}\n\tif len(serviceRollouts) != 0 {\n\t\tv := serviceRollouts[0]\n\t\tfound := false\n\t\tfor _, ops := range v.Spec.Ops {\n\t\t\tif ops.Op == protos.ServiceOp_ServiceRunVersion && ops.Version == version {\n\t\t\t\tfound = true\n\t\t\t}\n\t\t}\n\n\t\tstatusFound := false\n\t\tif v.status[protos.ServiceOp_ServiceRunVersion].OpStatus != \"\" {\n\t\t\tstatusFound = true\n\t\t}\n\n\t\tif !found {\n\t\t\tv.Spec.Ops = append(v.Spec.Ops, protos.ServiceOpSpec{Op: protos.ServiceOp_ServiceRunVersion, Version: version})\n\t\t\tlog.Infof(\"setting serviceRollout with version %v\", version)\n\t\t\terr = sm.memDB.UpdateObject(v)\n\t\t\treturn true, err // return pending servicerollout with err\n\t\t}\n\t\tif statusFound {\n\t\t\tlog.Infof(\"Spec and Status found. no pending serviceRollout\")\n\t\t\treturn false, nil // spec and status found. no pending servicerollout\n\t\t}\n\t\tlog.Infof(\"Spec found but no Status. pending serviceRollout\")\n\t\treturn true, nil // spec found but status not found. return pending servicerollout\n\t}\n\n\t// the servicerollout object not found - create one\n\tserviceRollout := protos.ServiceRollout{\n\t\tTypeMeta: api.TypeMeta{\n\t\t\tKind: kindServiceRollout,\n\t\t},\n\t\tObjectMeta: api.ObjectMeta{\n\t\t\tName: \"serviceRollout\",\n\t\t},\n\t\tSpec: protos.ServiceRolloutSpec{\n\t\t\tOps: []protos.ServiceOpSpec{\n\t\t\t\t{\n\t\t\t\t\tOp: protos.ServiceOp_ServiceRunVersion,\n\t\t\t\t\tVersion: version,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\tlog.Infof(\"Creating serviceRollout\")\n\terr = sm.CreateServiceRolloutState(&serviceRollout, ros, nil)\n\tif err != nil {\n\t\tlog.Errorf(\"Error %v creating service rollout state\", err)\n\t}\n\treturn true, err\n}", "func (w *WaitTask) StatusUpdate(taskContext *TaskContext, id object.ObjMetadata) {\n\tw.mu.Lock()\n\tdefer w.mu.Unlock()\n\n\tif klog.V(5).Enabled() {\n\t\tstatus := taskContext.ResourceCache().Get(id).Status\n\t\tklog.Infof(\"status update (object: %q, status: %q)\", id, status)\n\t}\n\n\tswitch {\n\tcase w.pending.Contains(id):\n\t\tswitch {\n\t\tcase w.changedUID(taskContext, id):\n\t\t\t// replaced\n\t\t\tw.handleChangedUID(taskContext, id)\n\t\t\tw.pending = w.pending.Remove(id)\n\t\tcase w.reconciledByID(taskContext, id):\n\t\t\t// reconciled - remove from pending & send event\n\t\t\terr := taskContext.InventoryManager().SetSuccessfulReconcile(id)\n\t\t\tif err != nil {\n\t\t\t\t// Object never applied or deleted!\n\t\t\t\tklog.Errorf(\"Failed to mark object as successful reconcile: %v\", err)\n\t\t\t}\n\t\t\tw.pending = w.pending.Remove(id)\n\t\t\tw.sendEvent(taskContext, id, event.ReconcileSuccessful)\n\t\tcase w.failedByID(taskContext, id):\n\t\t\t// failed - remove from pending & send event\n\t\t\terr := taskContext.InventoryManager().SetFailedReconcile(id)\n\t\t\tif err != nil {\n\t\t\t\t// Object never applied or deleted!\n\t\t\t\tklog.Errorf(\"Failed to mark object as failed reconcile: %v\", err)\n\t\t\t}\n\t\t\tw.pending = w.pending.Remove(id)\n\t\t\tw.failed = append(w.failed, id)\n\t\t\tw.sendEvent(taskContext, id, event.ReconcileFailed)\n\t\t\t// default - still pending\n\t\t}\n\tcase !w.Ids.Contains(id):\n\t\t// not in wait group - ignore\n\t\treturn\n\tcase w.skipped(taskContext, id):\n\t\t// skipped - ignore\n\t\treturn\n\tcase w.failed.Contains(id):\n\t\t// If a failed resource becomes current before other\n\t\t// resources have completed/timed out, we consider it\n\t\t// current.\n\t\tif w.reconciledByID(taskContext, id) {\n\t\t\t// reconciled - remove from pending & send event\n\t\t\terr := taskContext.InventoryManager().SetSuccessfulReconcile(id)\n\t\t\tif err != nil {\n\t\t\t\t// Object never applied or deleted!\n\t\t\t\tklog.Errorf(\"Failed to mark object as successful reconcile: %v\", err)\n\t\t\t}\n\t\t\tw.failed = w.failed.Remove(id)\n\t\t\tw.sendEvent(taskContext, id, event.ReconcileSuccessful)\n\t\t} else if !w.failedByID(taskContext, id) {\n\t\t\t// If a resource is no longer reported as Failed and is not Reconciled,\n\t\t\t// they should just go back to InProgress.\n\t\t\terr := taskContext.InventoryManager().SetPendingReconcile(id)\n\t\t\tif err != nil {\n\t\t\t\t// Object never applied or deleted!\n\t\t\t\tklog.Errorf(\"Failed to mark object as pending reconcile: %v\", err)\n\t\t\t}\n\t\t\tw.failed = w.failed.Remove(id)\n\t\t\tw.pending = append(w.pending, id)\n\t\t\tw.sendEvent(taskContext, id, event.ReconcilePending)\n\t\t}\n\t\t// else - still failed\n\tdefault:\n\t\t// reconciled - check if unreconciled\n\t\tif !w.reconciledByID(taskContext, id) {\n\t\t\t// unreconciled - add to pending & send event\n\t\t\terr := taskContext.InventoryManager().SetPendingReconcile(id)\n\t\t\tif err != nil {\n\t\t\t\t// Object never applied or deleted!\n\t\t\t\tklog.Errorf(\"Failed to mark object as pending reconcile: %v\", err)\n\t\t\t}\n\t\t\tw.pending = append(w.pending, id)\n\t\t\tw.sendEvent(taskContext, id, event.ReconcilePending)\n\t\t}\n\t\t// else - still reconciled\n\t}\n\n\tklog.V(3).Infof(\"wait task progress: %d/%d\", len(w.Ids)-len(w.pending), len(w.Ids))\n\n\t// If we no longer have any pending resources, the WaitTask\n\t// can be completed.\n\tif len(w.pending) == 0 {\n\t\t// all reconciled, so exit\n\t\tklog.V(3).Infof(\"all objects reconciled or skipped (name: %q)\", w.TaskName)\n\t\tw.cancelFunc()\n\t}\n}", "func (t *txLookUp) SwitchStatus(h common.Hash, status TxStatus) {\n\tt.mu.Lock()\n\tdefer t.mu.Unlock()\n\n\tt.switchstatus(h, status)\n}", "func (g *goldTryjobProcessor) setTryjobToStatus(tryjob *tryjobstore.Tryjob, minStatus tryjobstore.TryjobStatus, newStatus tryjobstore.TryjobStatus) error {\n\treturn g.tryjobStore.UpdateTryjob(tryjob.BuildBucketID, nil, func(curr interface{}) interface{} {\n\t\ttryjob := curr.(*tryjobstore.Tryjob)\n\t\t// Only update if it is at the minimum status level and the status increases.\n\t\tif (tryjob.Status < minStatus) || (tryjob.Status >= newStatus) {\n\t\t\treturn nil\n\t\t}\n\n\t\ttryjob.Status = newStatus\n\t\treturn tryjob\n\t})\n}", "func (c *Controller) syncJira(key queueKey) error {\n\tdefer func() {\n\t\tif err := recover(); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}()\n\n\trelease, err := c.loadReleaseForSync(key.namespace, key.name)\n\tif err != nil || release == nil {\n\t\tklog.V(6).Infof(\"jira: could not load release for sync for %s/%s\", key.namespace, key.name)\n\t\treturn err\n\t}\n\n\tklog.V(6).Infof(\"checking if %v (%s) has verifyIssues set\", key, release.Config.Name)\n\n\t// check if verifyIssues publish step is enabled for release\n\tvar verifyIssues *releasecontroller.PublishVerifyIssues\n\tfor _, publishType := range release.Config.Publish {\n\t\tif publishType.Disabled {\n\t\t\tcontinue\n\t\t}\n\t\tswitch {\n\t\tcase publishType.VerifyIssues != nil:\n\t\t\tverifyIssues = publishType.VerifyIssues\n\t\t}\n\t\tif verifyIssues != nil {\n\t\t\tbreak\n\t\t}\n\t}\n\tif verifyIssues == nil {\n\t\tklog.V(6).Infof(\"%v (%s) does not have verifyIssues set\", key, release.Config.Name)\n\t\treturn nil\n\t}\n\n\tklog.V(4).Infof(\"Verifying fixed issues in %s\", release.Config.Name)\n\n\t// get accepted tags\n\tacceptedTags := releasecontroller.SortedRawReleaseTags(release, releasecontroller.ReleasePhaseAccepted)\n\ttag, prevTag := getNonVerifiedTagsJira(acceptedTags)\n\tif tag == nil {\n\t\tklog.V(6).Infof(\"jira: All accepted tags for %s have already been verified\", release.Config.Name)\n\t\treturn nil\n\t}\n\tif prevTag == nil {\n\t\tif verifyIssues.PreviousReleaseTag == nil {\n\t\t\tklog.V(2).Infof(\"jira error: previous release unset for %s\", release.Config.Name)\n\t\t\tc.jiraErrorMetrics.WithLabelValues(jiraPrevReleaseUnset).Inc()\n\t\t\treturn fmt.Errorf(\"jira error: previous release unset for %s\", release.Config.Name)\n\t\t}\n\t\tstream, err := c.imageClient.ImageStreams(verifyIssues.PreviousReleaseTag.Namespace).Get(context.TODO(), verifyIssues.PreviousReleaseTag.Name, meta.GetOptions{})\n\t\tif err != nil {\n\t\t\tklog.V(2).Infof(\"jira: failed to get imagestream (%s/%s) when getting previous release for %s: %v\", verifyIssues.PreviousReleaseTag.Namespace, verifyIssues.PreviousReleaseTag.Name, release.Config.Name, err)\n\t\t\tc.jiraErrorMetrics.WithLabelValues(jiraPrevImagestreamGetErr).Inc()\n\t\t\treturn err\n\t\t}\n\t\tprevTag = releasecontroller.FindTagReference(stream, verifyIssues.PreviousReleaseTag.Tag)\n\t\tif prevTag == nil {\n\t\t\tklog.V(2).Infof(\"jira: failed to get tag %s in imagestream (%s/%s) when getting previous release for %s\", verifyIssues.PreviousReleaseTag.Tag, verifyIssues.PreviousReleaseTag.Namespace, verifyIssues.PreviousReleaseTag.Name, release.Config.Name)\n\t\t\tc.jiraErrorMetrics.WithLabelValues(jiraMissingTag).Inc()\n\t\t\treturn fmt.Errorf(\"failed to find tag %s in imagestream %s/%s\", verifyIssues.PreviousReleaseTag.Tag, verifyIssues.PreviousReleaseTag.Namespace, verifyIssues.PreviousReleaseTag.Name)\n\t\t}\n\t}\n\t// To make sure all tags are up-to-date, requeue when non-verified tags are found; this allows us to make\n\t// sure tags that may not have been passed to this function (such as older tags) get processed,\n\t// and it also allows us to handle the case where the imagestream fails to update below.\n\tdefer c.queue.AddAfter(key, time.Second)\n\n\tdockerRepo := release.Target.Status.PublicDockerImageRepository\n\tif len(dockerRepo) == 0 {\n\t\tklog.V(4).Infof(\"jira: release target %s does not have a configured registry\", release.Target.Name)\n\t\tc.jiraErrorMetrics.WithLabelValues(jiraNoRegistry).Inc()\n\t\treturn fmt.Errorf(\"jira: release target %s does not have a configured registry\", release.Target.Name)\n\t}\n\n\tissues, err := c.releaseInfo.Bugs(dockerRepo+\":\"+prevTag.Name, dockerRepo+\":\"+tag.Name)\n\tvar issueList []string\n\tfor _, issue := range issues {\n\t\tif issue.Source == 1 {\n\t\t\tissueList = append(issueList, issue.ID)\n\t\t}\n\t}\n\tif err != nil {\n\t\tklog.V(4).Infof(\"Jira: Unable to generate bug list from %s to %s: %v\", prevTag.Name, tag.Name, err)\n\t\tc.jiraErrorMetrics.WithLabelValues(jiraUnableToGenerateBuglist).Inc()\n\t\treturn fmt.Errorf(\"jira: unable to generate bug list from %s to %s: %w\", prevTag.Name, tag.Name, err)\n\t}\n\tvar errs []error\n\tif errs := append(errs, c.jiraVerifier.VerifyIssues(issueList, tag.Name)...); len(errs) != 0 {\n\t\tklog.V(4).Infof(\"Error(s) in jira verifier: %v\", utilerrors.NewAggregate(errs))\n\t\tc.jiraErrorMetrics.WithLabelValues(jiraVerifier).Inc()\n\t\treturn utilerrors.NewAggregate(errs)\n\t}\n\n\tvar lastErr error\n\terr = wait.PollImmediate(15*time.Second, 1*time.Minute, func() (bool, error) {\n\t\t// Get the latest version of ImageStream before trying to update annotations\n\t\ttarget, err := c.imageClient.ImageStreams(release.Target.Namespace).Get(context.TODO(), release.Target.Name, meta.GetOptions{})\n\t\tif err != nil {\n\t\t\tklog.V(4).Infof(\"Failed to get latest version of target release stream %s: %v\", release.Target.Name, err)\n\t\t\tc.jiraErrorMetrics.WithLabelValues(jiraImagestreamGetErr).Inc()\n\t\t\treturn false, err\n\t\t}\n\t\ttagToBeUpdated := releasecontroller.FindTagReference(target, tag.Name)\n\t\tif tagToBeUpdated == nil {\n\t\t\tklog.V(6).Infof(\"release %s no longer exists, cannot set annotation %s=true\", tag.Name, releasecontroller.ReleaseAnnotationIssuesVerified)\n\t\t\treturn false, fmt.Errorf(\"release %s no longer exists, cannot set annotation %s=true\", tag.Name, releasecontroller.ReleaseAnnotationIssuesVerified)\n\t\t}\n\t\tif tagToBeUpdated.Annotations == nil {\n\t\t\ttagToBeUpdated.Annotations = make(map[string]string)\n\t\t}\n\t\ttagToBeUpdated.Annotations[releasecontroller.ReleaseAnnotationIssuesVerified] = \"true\"\n\t\tklog.V(6).Infof(\"Setting %s annotation to \\\"true\\\" for %s in imagestream %s/%s\", releasecontroller.ReleaseAnnotationIssuesVerified, tag.Name, target.GetNamespace(), target.GetName())\n\t\tif _, err := c.imageClient.ImageStreams(target.Namespace).Update(context.TODO(), target, meta.UpdateOptions{}); err != nil {\n\t\t\tklog.V(4).Infof(\"Failed to update Jira annotation for tag %s in imagestream %s/%s: %v\", tag.Name, target.GetNamespace(), target.GetName(), err)\n\t\t\tlastErr = err\n\t\t\treturn false, nil\n\t\t}\n\t\treturn true, nil\n\t})\n\tif err != nil {\n\t\tif lastErr != nil && errors.Is(err, wait.ErrWaitTimeout) {\n\t\t\terr = lastErr\n\t\t}\n\t\tc.jiraErrorMetrics.WithLabelValues(jiraFailedAnnotation).Inc()\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func MarkActive(r *v1alpha1.Revision) {\n\tr.Status.MarkActive()\n}", "func ChangeStatus(ID string) {\n\tvalue, _ := table.Load(ID)\n\tnewvalue := value.(membership)\n\ttable.Store(ID, membership{\n\t\tCounter: newvalue.Counter,\n\t\tTime: newvalue.Time,\n\t\tStatus: false,\n\t})\n}", "func (manager *Manager) updateStatus(jobStatus ingestic.JobStatus) {\n\tmanager.estimatedEndTimeInSec = jobStatus.EstimatedEndTimeInSec\n\tmanager.percentageComplete = jobStatus.PercentageComplete\n\n\tevent := &automate_event.EventMsg{\n\t\tEventID: createEventUUID(),\n\t\tType: &automate_event.EventType{Name: automate_event_type.ProjectRulesUpdateStatus},\n\t\tPublished: ptypes.TimestampNow(),\n\t\tProducer: &automate_event.Producer{\n\t\t\tID: event_ids.ComplianceInspecReportProducerID,\n\t\t},\n\t\tData: &_struct.Struct{\n\t\t\tFields: map[string]*_struct.Value{\n\t\t\t\t\"Completed\": {\n\t\t\t\t\tKind: &_struct.Value_BoolValue{\n\t\t\t\t\t\tBoolValue: jobStatus.Completed,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\"PercentageComplete\": {\n\t\t\t\t\tKind: &_struct.Value_NumberValue{\n\t\t\t\t\t\tNumberValue: float64(jobStatus.PercentageComplete),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\"EstimatedTimeCompeleteInSec\": {\n\t\t\t\t\tKind: &_struct.Value_NumberValue{\n\t\t\t\t\t\tNumberValue: float64(jobStatus.EstimatedEndTimeInSec),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tproject_update_tags.ProjectUpdateIDTag: {\n\t\t\t\t\tKind: &_struct.Value_StringValue{\n\t\t\t\t\t\tStringValue: manager.projectUpdateID,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\tpubReq := &automate_event.PublishRequest{Msg: event}\n\t_, err := manager.eventServiceClient.Publish(context.Background(), pubReq)\n\tif err != nil {\n\t\tlogrus.Warnf(\"Publishing Failed event %v\", err)\n\t}\n}", "func (t *Task) ChangeStatus(s int) {\n\tt.Status = s\n}", "func (jiraHandler *JiraHandler) UpdateTicket(key string, fields map[string]interface{}) error {\n\tapiEndpoint := fmt.Sprintf(\"%s/rest/api/2/issue/%v\", jiraHandler.JiraHost(), url.QueryEscape(key))\n\tputArgs := struct {\n\t\tFields map[string]interface{} `json:\"fields\"`\n\t}{fields}\n\tbody := &bytes.Buffer{}\n\tif err := json.NewEncoder(body).Encode(putArgs); err != nil {\n\t\treturn errors.Wrap(err, \"unable to serialize ticket body\")\n\t}\n\treq, err := http.NewRequest(http.MethodPut, apiEndpoint, body)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"unable to form update ticket request\")\n\t}\n\treq.Header.Add(\"Content-Type\", \"application/json\")\n\tif jiraHandler.opts.BasicAuthOpts.Username != \"\" {\n\t\treq.SetBasicAuth(jiraHandler.opts.BasicAuthOpts.Username, jiraHandler.opts.BasicAuthOpts.Password)\n\t}\n\tres, err := jiraHandler.client.Do(req)\n\tif res != nil {\n\t\tdefer res.Body.Close()\n\t}\n\tif err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\tif res.StatusCode >= 300 || res.StatusCode < 200 {\n\t\tmsg, _ := io.ReadAll(res.Body)\n\t\treturn errors.Errorf(\"HTTP request returned unexpected status `%v`: %v\", res.Status, string(msg))\n\t}\n\n\treturn nil\n}", "func (m *ThreatAssessmentRequest) SetStatus(value *ThreatAssessmentStatus)() {\n err := m.GetBackingStore().Set(\"status\", value)\n if err != nil {\n panic(err)\n }\n}", "func (thread *CommentThread) updateResolvedStatus() {\n\tresolved := updateThreadsStatus(thread.Children)\n\tif resolved == nil {\n\t\tthread.Resolved = thread.Comment.Resolved\n\t\treturn\n\t}\n\n\tif !*resolved {\n\t\tthread.Resolved = resolved\n\t\treturn\n\t}\n\n\tif thread.Comment.Resolved == nil || !*thread.Comment.Resolved {\n\t\tthread.Resolved = nil\n\t\treturn\n\t}\n\n\tthread.Resolved = resolved\n}", "func (am *appManager) setStatus(ctx context.Context, app *v1alpha1.FLApp) error {\n\t_, err := am.appStatusUpdater.UpdateStatusWithRetry(ctx, app, func(mutatingApp *v1alpha1.FLApp) bool {\n\t\tif apiequality.Semantic.DeepEqual(app.Status, mutatingApp.Status) {\n\t\t\treturn false\n\t\t}\n\t\tapp.Status.DeepCopyInto(&mutatingApp.Status)\n\t\treturn true\n\t})\n\treturn err\n}", "func (t *TaskBox[T, U, C, CT, TF]) SetStatus(s int32) {\n\tt.status.Store(s)\n}", "func JudgeContestStatus(cst *models.Contest, t time.Time) int {\n\tif t.Before(cst.StartTime) {\n\t\treturn -1\n\t}\n\tif t.After(cst.EndTime) {\n\t\treturn 1\n\t}\n\treturn 0\n}", "func (m *IndustryDataRunActivity) SetStatus(value *IndustryDataActivityStatus)() {\n err := m.GetBackingStore().Set(\"status\", value)\n if err != nil {\n panic(err)\n }\n}", "func (c *Client) doWaitForStatus(eniID string, checkNum, checkInterval int, finalStatus string) error {\n\tfor i := 0; i < checkNum; i++ {\n\t\ttime.Sleep(time.Second * time.Duration(checkInterval))\n\t\tenis, err := c.queryENI(eniID, \"\", \"\")\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfor _, eni := range enis {\n\t\t\tif *eni.NetworkInterfaceId == eniID {\n\t\t\t\tswitch *eni.State {\n\t\t\t\tcase ENI_STATUS_AVAILABLE:\n\t\t\t\t\tswitch finalStatus {\n\t\t\t\t\tcase ENI_STATUS_ATTACHED:\n\t\t\t\t\t\tif eni.Attachment != nil && eni.Attachment.InstanceId != nil {\n\t\t\t\t\t\t\tblog.Infof(\"eni %s is attached\", eniID)\n\t\t\t\t\t\t\treturn nil\n\t\t\t\t\t\t}\n\t\t\t\t\t\tblog.Infof(\"eni %s is not attached\", eniID)\n\t\t\t\t\tcase ENI_STATUS_DETACHED:\n\t\t\t\t\t\tif eni.Attachment == nil {\n\t\t\t\t\t\t\tblog.Infof(\"eni %s is detached\", eniID)\n\t\t\t\t\t\t\treturn nil\n\t\t\t\t\t\t}\n\t\t\t\t\t\tblog.Infof(\"eni %s is not detached\", eniID)\n\t\t\t\t\tdefault:\n\t\t\t\t\t\tblog.Infof(\"eni %s is %s now\", eniID, *eni.State)\n\t\t\t\t\t\treturn nil\n\t\t\t\t\t}\n\t\t\t\t\tbreak\n\t\t\t\tcase ENI_STATUS_PENDING, ENI_STATUS_ATTACHING, ENI_STATUS_DETACHING, ENI_STATUS_DELETING:\n\t\t\t\t\tblog.Infof(\"eni %s is %s\", eniID, *eni.State)\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tblog.Errorf(\"timeout when wait for eni %s\", eniID)\n\treturn fmt.Errorf(\"timeout when wait for eni %s\", eniID)\n}", "func (ros *RolloutState) startNextVeniceRollout() (int, error) {\n\tsm := ros.Statemgr\n\tversion := ros.Spec.Version\n\n\tpendingStatus := ros.getVenicePendingRolloutStatus()\n\tif len(pendingStatus) > 0 {\n\t\t// some node has been issued rollout spec and we are waiting for status update.\n\t\t// nothing to do now\n\t\treturn len(pendingStatus), nil\n\t}\n\n\t// all nodes which have been issued the request so far have responded.\n\t// if there is any node which has not yet been issued, issue it now\n\n\tveniceROs, err := sm.ListVeniceRollouts()\n\tif err != nil {\n\t\tlog.Errorf(\"Error %v listing VeniceRollouts\", err)\n\t\treturn len(pendingStatus), err\n\t}\n\tpendingVenice := getVenicePendingRolloutIssue(version, veniceROs)\n\tif len(pendingVenice) == 0 {\n\t\treturn 0, nil\n\t}\n\n\tselectedVenice := pendingVenice[0]\n\tfor _, v := range veniceROs {\n\t\tif v.Name != selectedVenice {\n\t\t\tcontinue\n\t\t}\n\t\tv.Spec.Ops = append(v.Spec.Ops, protos.VeniceOpSpec{Op: protos.VeniceOp_VeniceRunVersion, Version: version})\n\n\t\tlog.Debugf(\"setting VeniceRollout for %v with version %v\", v.Name, version)\n\t\terr = sm.memDB.UpdateObject(v)\n\t\tif err == nil {\n\t\t\tlog.Infof(\"Setting Rollout Status %#v\", v.status[protos.VeniceOp_VenicePreCheck])\n\t\t\tros.setVenicePhase(v.Name, v.status[protos.VeniceOp_VenicePreCheck].OpStatus, v.status[protos.VeniceOp_VenicePreCheck].Message, roproto.RolloutPhase_PROGRESSING)\n\t\t}\n\t\treturn 1, err\n\n\t}\n\treturn 0, fmt.Errorf(\"unexpected error - unknown venice %s selected for next rollout\", selectedVenice)\n}", "func (s *Server) updateTaskStatus(msg message.Message, status models.State, db *database.DataStore) error {\n\tselector := bson.M{\"$and\": []bson.M{\n\t\tbson.M{\"ulid\": msg.ULID},\n\t\tbson.M{\"tasks\": bson.M{\"$elemMatch\": bson.M{\"task_id\": msg.TaskID}}}}}\n\tupdate := bson.M{\"$set\": bson.M{\"tasks.$.status\": status}}\n\tif status == models.Failed {\n\t\tlog.Errorf(\"[%s] %s\", msg.ULID, errors.Errors[msg.ErrorID])\n\t\ts.saveErr(msg.ULID, msg.TaskID, msg.ErrorID, db)\n\t}\n\treturn db.C(models.Schedules).Update(selector, update)\n}", "func (t *Transaction) Failed() {\n\terr := Transactions.UpdateId(t.ID, bson.M{\"$set\": bson.M{\"status\": \"failed\"}})\n\tif err != nil {\n\t\tlog.Println(\"[MONGO] ERROR SETTING STATUS AS FAILED:\", err.Error())\n\t}\n\tt.Log(\"FAILED\")\n}", "func (me TReviewActionStatus) IsFailed() bool { return me.String() == \"Failed\" }", "func (r *Reconciler) setStatus(\n\tctx context.Context,\n\tinstance *v1alpha1.ServiceBindingRequest,\n\tstatus string,\n) error {\n\tinstance.Status.BindingStatus = status\n\treturn r.client.Status().Update(ctx, instance)\n}", "func (handler *BotHandler) updateStatus() {\n\thandler.McRunner.WaitGroup.Add(1)\n\tdefer handler.McRunner.WaitGroup.Done()\n\tfor {\n\t\tselect {\n\t\tcase <-time.After(60 * time.Second):\n\t\t\thandler.McRunner.StatusRequestChannel <- true\n\n\t\t\tselect {\n\t\t\tcase status := <-handler.McRunner.StatusChannel:\n\t\t\t\tstatusJSON, _ := json.Marshal(status)\n\t\t\t\theader := header{Type: \"status\", Data: statusJSON}\n\t\t\t\thandler.sock.WriteJSON(header)\n\t\t\tcase <-time.After(10 * time.Second):\n\t\t\t\tfmt.Println(\"Failed to receive status update from runner, might be deadlocked.\")\n\t\t\t}\n\t\tcase <-handler.killChannel:\n\t\t\treturn\n\t\t}\n\n\t}\n}", "func (m *SimulationAutomationRun) SetStatus(value *SimulationAutomationRunStatus)() {\n err := m.GetBackingStore().Set(\"status\", value)\n if err != nil {\n panic(err)\n }\n}", "func (i *DeleteOrUpdateInvTask) StatusUpdate(_ *taskrunner.TaskContext, _ object.ObjMetadata) {}", "func (c *Controller) fail(j weles.JobID, msg string) {\n\t// errors logged in the SetStatusAndInfo.\n\t_ = c.jobs.SetStatusAndInfo(j, weles.JobStatusFAILED, msg) // nolint:gosec\n\tc.dryader.CancelJob(j)\n\tc.boruter.Release(j)\n}", "func (pb *Problem) updateStatus(nbClauses int) {\n\tpb.Clauses = pb.Clauses[:nbClauses]\n\tif pb.Status == Undetermined && nbClauses == 0 {\n\t\tpb.Status = Sat\n\t}\n}", "func (m *Manager) currentShouldChange(milestonePayload *iotago.Milestone) bool {\n\tm.pendingLock.RLock()\n\tdefer m.pendingLock.RUnlock()\n\n\tif len(m.pending) == 0 {\n\t\treturn false\n\t}\n\n\tnext := m.pending[0]\n\n\tswitch {\n\tcase next.TargetMilestoneIndex == milestonePayload.Index+1:\n\t\tif !m.SupportedVersions().Supports(next.ProtocolVersion) {\n\t\t\tm.Events.NextMilestoneUnsupported.Trigger(next)\n\t\t}\n\n\t\treturn false\n\tcase next.TargetMilestoneIndex > milestonePayload.Index:\n\t\treturn false\n\tdefault:\n\t\treturn true\n\t}\n}", "func (m *TeamsAsyncOperation) SetStatus(value *TeamsAsyncOperationStatus)() {\n m.status = value\n}", "func (p POJStatusInterface)requestStatus(session string, runId string) (*TaskResult, error) {\n\treq := httplib.Get(\"http://poj.org/showsource?solution_id=\" + runId)\n\treq.Header(\"Cookie\", session)\n\tbody, err := req.String()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(body) >= 50 {\n\t\tif (strings.Contains(body[:50], `\"Pragma\"`)) {\n\t\t\treturn nil, errors.New(\"not login\")\n\t\t} else {\n\t\t\t_, po := utils.FindMatchString(body, \"<tr><td><b>\", \"</td>\", \"</tr>\")\n\t\t\tif po != -1 && po < len(body) {\n\t\t\t\tbody = body[po:]\n\t\t\t}\n\t\t\tmem, po := utils.FindMatchString(body, \"<tr><td><b>\", \"</b>\", \"</td>\")\n\t\t\tif po != -1 && po < len(body) {\n\t\t\t\tbody = body[po:]\n\t\t\t}\n\n\t\t\ttime, po := utils.FindMatchString(body, \"<td><b>\", \"</b>\", \"</td></tr>\")\n\t\t\tif po != -1 && po < len(body) {\n\t\t\t\tbody = body[po:]\n\t\t\t}\n\n\t\t\tstatusName, po := utils.FindMatchString(body, \"color=\", \">\", \"</font></td></tr>\")\n\n\t\t\treturn &TaskResult{Memory:mem, ExecuteTime:time, StatusCode:GetStatusByOJType(utils.POJ - 1,statusName)}, nil\n\t\t}\n\t}\n\treturn nil, errors.New(\"unkonwn reason\")\n}", "func NewJiraIssue(from jira.Issue) (JiraIssue, error) {\n\t// Parse assignee\n\tassnKey := \"\"\n\tvar assn *JiraUser = nil\n\n\tif from.Fields.Assignee != nil {\n\t\tassnKey = from.Fields.Assignee.Key\n\n\t\tuser := NewJiraUser(*from.Fields.Assignee)\n\t\tassn = &user\n\t}\n\n\t// Parse resolution\n\tres := \"\"\n\tif from.Fields.Resolution != nil {\n\t\tres = from.Fields.Resolution.Name\n\t}\n\n\t// Parse progress\n\tvar prog float32\n\n\tif from.Fields.Progress.Total != 0 {\n\t\tprog = float32(from.Fields.Progress.Progress) / float32(from.Fields.Progress.Total)\n\t}\n\n\t// Parse links\n\tlinks := []JiraIssueLink{}\n\tfor _, jLink := range from.Fields.IssueLinks {\n\t\tlinks = append(links, NewJiraIssueLink(*jLink))\n\t}\n\n\t// Parse comments\n\tcomments := []JiraIssueComment{}\n\n\tif from.Fields.Comments != nil {\n\t\tfor _, jCom := range from.Fields.Comments.Comments {\n\t\t\tcomments = append(comments, NewJiraIssueComment(*jCom))\n\t\t}\n\t}\n\n\t// Parse updated\n\t/*var updated *time.Time = nil\n\n\tt, err := time.Parse(JiraDateFormat, from.Fields.Updated)\n\tif err != nil {\n\t\treturn JiraIssue{}, fmt.Errorf(\"error parsing issue updated \"+\n\t\t\t\"field into date: %s\", err.Error())\n\t}\n\tupdated = &t*/\n\n\treturn JiraIssue{\n\t\tID: from.ID,\n\t\tType: from.Fields.Type.Name,\n\t\tAssigneeKey: assnKey,\n\t\tAssignee: assn,\n\t\tProjectID: from.Fields.Project.ID,\n\t\tResolution: res,\n\t\tPriority: from.Fields.Priority.Name,\n\t\tStatus: from.Fields.Status.Name,\n\t\tTitle: from.Fields.Summary,\n\t\tDescription: from.Fields.Description,\n\t\tProgress: prog,\n\t\tLinks: links,\n\t\tComments: comments,\n\t\tLabels: from.Fields.Labels,\n\t\t//Updated: updated,\n\t}, nil\n}", "func (m *ThreatAssessmentRequest) SetStatus(value *ThreatAssessmentStatus)() {\n m.status = value\n}", "func (h *HTTP) getTicketIssueList(w http.ResponseWriter, r *http.Request) {\n\tparams := toll.TicketListRequest{\n\t\tTollID: r.URL.Query().Get(\"tollId\"),\n\t\tRegistrationNo: r.URL.Query().Get(\"registrationNo\"),\n\t\tStatus: func() string {\n\t\t\tstatus := strings.TrimSpace(r.URL.Query().Get(\"status\"))\n\t\t\tif len(status) == 0 {\n\t\t\t\tstatus = toll.IssuedStatus\n\t\t\t}\n\t\t\treturn status\n\t\t}(),\n\t}\n\n\t// validates the mandatory fields for listing all the toll tickets\n\tif err := validator.New().Struct(params); err != nil {\n\t\tlog.Error(err)\n\t\twebgo.R400(w, errors.ErrMissingFields)\n\t\treturn\n\t}\n\n\t// checks for the pagination. if the values are not provide, it will set to default\n\tparams.Start, params.Limit = getPagination(r)\n\n\t// gets the list of toll tickets\n\tlist := h.APIHandler.TollHandler.GetTicketIssueList(r.Context(), &params)\n\twebgo.R200(w, list)\n}", "func (m *ConnectorStatusDetails) SetStatus(value *ConnectorHealthState)() {\n err := m.GetBackingStore().Set(\"status\", value)\n if err != nil {\n panic(err)\n }\n}", "func (c *Controller) updateCHIObjectStatus(ctx context.Context, chi *chiV1.ClickHouseInstallation, opts UpdateCHIStatusOptions) (err error) {\n\tif util.IsContextDone(ctx) {\n\t\tlog.V(2).Info(\"task is done\")\n\t\treturn nil\n\t}\n\n\tfor retry, attempt := true, 1; retry; attempt++ {\n\t\tif attempt >= 5 {\n\t\t\tretry = false\n\t\t}\n\n\t\terr = c.doUpdateCHIObjectStatus(ctx, chi, opts)\n\t\tif err == nil {\n\t\t\treturn nil\n\t\t}\n\n\t\tif retry {\n\t\t\tlog.V(2).M(chi).F().Warning(\"got error, will retry. err: %q\", err)\n\t\t\ttime.Sleep(1 * time.Second)\n\t\t} else {\n\t\t\tlog.V(1).M(chi).F().Error(\"got error, all retries are exhausted. err: %q\", err)\n\t\t}\n\t}\n\treturn\n}", "func handleStatus(session fnet.Session) {\n\tlog.Println(\"Handling status\")\n\n\twm, err := buildStatusMessage()\n\tif checkError(session, err, EvtStatus) {\n\t\treturn\n\t}\n\tsession.Conn.Send(wm)\n}", "func updateIssue (issueNumber string, updateType string){\n\n\tres, err := github.GetIssueDetails(issueNumber)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\tos.Exit(1)\n\t}\n\tselectedIssue := *res\n\tswitch updateType {\n\tcase\t\"state\":\n\t fmt.Printf(\"Issue %s current status: %s enter open | closed to set state.\\n\", issueNumber, selectedIssue.State)\n reader := bufio.NewReader(os.Stdin)\n status, _ := reader.ReadString('\\n')\n fmt.Println(status)\n\tdefault:\n\t\t//Should not be possible but crash out\n\t\tlog.Fatalf(\"Invalid update type reached update command.\")\n\t\tos.Exit(1)\n\t}\n\n}", "func (_LvRecording *LvRecordingTransactor) RunStatusChange(opts *bind.TransactOpts, proposed_status_code *big.Int) (*types.Transaction, error) {\n\treturn _LvRecording.contract.Transact(opts, \"runStatusChange\", proposed_status_code)\n}", "func (c *client) ReopenIssue(org, repo string, number int) error {\n\tdurationLogger := c.log(\"ReopenIssue\", org, repo, number)\n\tdefer durationLogger()\n\n\t_, err := c.request(&request{\n\t\tmethod: http.MethodPatch,\n\t\tpath: fmt.Sprintf(\"/repos/%s/%s/issues/%d\", org, repo, number),\n\t\torg: org,\n\t\trequestBody: map[string]string{\"state\": \"open\"},\n\t\texitCodes: []int{200},\n\t}, nil)\n\treturn stateCannotBeChangedOrOriginalError(err)\n}", "func (p *Package) ChangeStatus(initialRepo *abaputils.Repository) {\n\tinitialRepo.Status = string(p.Status)\n}", "func (t *Task) updateStatus() {\n\tb, err := json.Marshal(&map[string]interface{}{\n\t\t\"type\": \"update\",\n\t\t\"start\": t.Desc.Start,\n\t\t\"end\": t.Desc.End,\n\t\t\"status\": t.Desc.Status,\n\t})\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\torm.UpdateTask(&t.Desc)\n\tsockets.Message(t.Desc.ID, b)\n}", "func (m *LongRunningOperation) SetStatus(value *LongRunningOperationStatus)() {\n err := m.GetBackingStore().Set(\"status\", value)\n if err != nil {\n panic(err)\n }\n}", "func (r *Client) PatchStatus(ctx context.Context, obj client.Object, patch client.Patch, state alertmanagerv1alpha1.State, requeueTime ...float64) (ctrl.Result, error) {\n\tlog := log.Logger(ctx, \"controllers.common\", \"common\", \"PatchStatus\")\n\n\tif err := r.Status().Patch(ctx, obj, patch); err != nil {\n\t\tlog.Error(err, \"Unable to patch the status\", \"status\", state)\n\t\tr.Recorder.Event(obj, v1.EventTypeWarning, string(alertmanagerv1alpha1.Error), \"Unable to patch status due to error \"+err.Error())\n\t\treturn ctrl.Result{RequeueAfter: 30 * time.Second}, nil\n\t}\n\n\tif state != alertmanagerv1alpha1.Error {\n\t\treturn ctrl.Result{}, nil\n\t}\n\n\t//if wait time is specified, requeue it after provided time\n\tif len(requeueTime) == 0 {\n\t\trequeueTime[0] = 0\n\t}\n\n\tlog.Info(\"Requeue time\", \"time\", requeueTime[0])\n\treturn ctrl.Result{RequeueAfter: time.Duration(requeueTime[0]) * time.Millisecond}, nil\n}", "func (r *ReconcileSubscription) SetStatus(s *appv1alpha1.HelmChartSubscription, issue error) (reconcile.Result, error) {\n\t//Success\n\tif issue == nil {\n\t\ts.Status.Message = \"\"\n\t\ts.Status.Status = appv1alpha1.HelmChartSubscriptionSuccess\n\t\ts.Status.Reason = \"\"\n\t\ts.Status.LastUpdateTime = metav1.Now()\n\n\t\terr := r.client.Status().Update(context.Background(), s)\n\t\tif err != nil {\n\t\t\tklog.Error(err, \"- unable to update status\")\n\n\t\t\treturn reconcile.Result{\n\t\t\t\tRequeueAfter: time.Second,\n\t\t\t}, nil\n\t\t}\n\n\t\treturn reconcile.Result{}, nil\n\t}\n\n\tvar retryInterval time.Duration\n\n\tlastUpdate := s.Status.LastUpdateTime.Time\n\tlastPhase := s.Status.Status\n\ts.Status.Message = \"Error, retrying later\"\n\ts.Status.Reason = issue.Error()\n\ts.Status.Status = appv1alpha1.HelmChartSubscriptionFailed\n\ts.Status.LastUpdateTime = metav1.Now()\n\n\terr := r.client.Status().Update(context.Background(), s)\n\tif err != nil {\n\t\tklog.Error(err, \" - unable to update status\")\n\n\t\treturn reconcile.Result{\n\t\t\tRequeueAfter: time.Second,\n\t\t}, nil\n\t}\n\n\tif lastUpdate.IsZero() || lastPhase != appv1alpha1.HelmChartSubscriptionFailed {\n\t\tretryInterval = time.Second\n\t} else {\n\t\tretryInterval = time.Duration(math.Max(float64(time.Second.Nanoseconds()*2), float64(metav1.Now().Sub(lastUpdate).Round(time.Second).Nanoseconds())))\n\t}\n\n\trequeueAfter := time.Duration(math.Min(float64(retryInterval.Nanoseconds()*2), float64(time.Minute.Nanoseconds()*2)))\n\tklog.V(5).Info(\"requeueAfter: \", requeueAfter)\n\n\treturn reconcile.Result{\n\t\tRequeueAfter: requeueAfter,\n\t}, nil\n}", "func (m *RemoteAssistancePartner) SetOnboardingStatus(value *RemoteAssistanceOnboardingStatus)() {\n m.onboardingStatus = value\n}", "func (c *FakeClient) ReleaseStatus(rlsName string, version int) (*hapi.GetReleaseStatusResponse, error) {\n\tfor _, rel := range c.Rels {\n\t\tif rel.Name == rlsName {\n\t\t\treturn &hapi.GetReleaseStatusResponse{\n\t\t\t\tName: rel.Name,\n\t\t\t\tInfo: rel.Info,\n\t\t\t\tNamespace: rel.Namespace,\n\t\t\t}, nil\n\t\t}\n\t}\n\treturn nil, errors.Errorf(\"no such release: %s\", rlsName)\n}", "func (impl *dagserviceImpl) TransferChannelStatus(x ChannelID) Status { return ChannelNotFoundError }", "func (c *client) Status(u *model.User, r *model.Repo, b *model.Build, link string) error {\n\tclient := c.newClientToken(u.Token)\n\n\tstatus := getStatus(b.Status)\n\tdesc := getDesc(b.Status)\n\n\t_, err := client.CreateStatus(\n\t\tr.Owner,\n\t\tr.Name,\n\t\tb.Commit,\n\t\tgitea.CreateStatusOption{\n\t\t\tState: status,\n\t\t\tTargetURL: link,\n\t\t\tDescription: desc,\n\t\t\tContext: c.Context,\n\t\t},\n\t)\n\n\treturn err\n}", "func (s *githubHook) buildStatus(eventType, commit string, payload []byte, proj *brigade.Project, status *github.RepoStatus) {\n\t// If we need an SSH key, set it here\n\tif proj.Repo.SSHKey != \"\" {\n\t\tkey, err := ioutil.TempFile(\"\", \"\")\n\t\tif err != nil {\n\t\t\tlog.Printf(\"error creating ssh key cache: %s\", err)\n\t\t\treturn\n\t\t}\n\t\tkeyfile := key.Name()\n\t\tdefer os.Remove(keyfile)\n\t\tif _, err := key.WriteString(proj.Repo.SSHKey); err != nil {\n\t\t\tlog.Printf(\"error writing ssh key cache: %s\", err)\n\t\t\treturn\n\t\t}\n\t\tos.Setenv(\"BRIGADE_REPO_KEY\", keyfile)\n\t\tdefer os.Unsetenv(\"BRIGADE_REPO_KEY\") // purely defensive... not really necessary\n\t}\n\n\tmsg := \"Building\"\n\tsvc := StatusContext\n\tstatus.State = &StatePending\n\tstatus.Description = &msg\n\tstatus.Context = &svc\n\tif err := s.createStatus(commit, proj, status); err != nil {\n\t\t// For this one, we just log an error and continue.\n\t\tlog.Printf(\"Error setting status to %s: %s\", *status.State, err)\n\t}\n\tif err := s.build(eventType, commit, payload, proj); err != nil {\n\t\tlog.Printf(\"Build failed: %s\", err)\n\t\tmsg = truncAt(err.Error(), 140)\n\t\tstatus.State = &StateFailure\n\t\tstatus.Description = &msg\n\t} else {\n\t\tmsg = \"Brigade build passed\"\n\t\tstatus.State = &StateSuccess\n\t\tstatus.Description = &msg\n\t}\n\tif err := s.createStatus(commit, proj, status); err != nil {\n\t\t// For this one, we just log an error and continue.\n\t\tlog.Printf(\"After build, error setting status to %s: %s\", *status.State, err)\n\t}\n}", "func checkrequestStatus(d *schema.ResourceData, config Config, requestID string, timeOut int) error {\n\ttimeout := time.After(time.Duration(timeOut) * time.Second)\n\tfor {\n\t\tselect {\n\t\tcase <-time.After(1 * time.Second):\n\t\t\tstatus, state, err := checkServiceRequestStatus(config, requestID)\n\t\t\tif err == nil {\n\t\t\t\tif state == \"finished\" && status == \"Ok\" {\n\t\t\t\t\tlog.Println(\"[DEBUG] Service order added SUCCESSFULLY\")\n\t\t\t\t\td.SetId(requestID)\n\t\t\t\t\treturn nil\n\t\t\t\t} else if status == \"Error\" {\n\t\t\t\t\tlog.Println(\"[ERROR] Failed\")\n\t\t\t\t\treturn fmt.Errorf(\"[Error] Failed execution\")\n\t\t\t\t} else {\n\t\t\t\t\tlog.Println(\"[DEBUG] Request state is :\", state)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\treturn err\n\t\t\t}\n\t\tcase <-timeout:\n\t\t\tlog.Println(\"[DEBUG] Timeout occured\")\n\t\t\treturn fmt.Errorf(\"[ERROR] Timeout\")\n\t\t}\n\t}\n}", "func createKttTicket(jiraIssue JiraIssue, kttClient *KttClient, cfg *Config) KttTicketID {\n\t//Will store ID of created KTT ticket\n\tvar kttTicketID string\n\n\t//Construct ticket structure\n\tkttIssue := constructKttIssueFromJiraIssue(jiraIssue)\n\n\t//Prepare HTTP request\n\treq := constructHTTPRequest(kttIssue, kttClient)\n\n\t//Send HTTP request\n\tkttResponse := sendHTTPRequestToKTT(kttClient, req)\n\tif kttResponse != \"\" {\n\t\t//Parse response body\n\t\tkttTicketID = getTicketID(kttResponse)\n\t\tlog.Printf(\"For Jira issue %v ticket created in KTT: %v\", jiraIssue.Key, kttTicketID)\n\n\t} else {\n\t\tlog.Printf(\"For Jira issue %v ticket not created in KTT\", jiraIssue.Key)\n\t}\n\n\treturn KttTicketID(kttTicketID)\n\n}", "func (w *Work) setStatusAndLogToSDK(ns string, alarm m.Alarm, hostname, ip, level string, receives []string, eventData models.EventData) error {\n\tnow := time.Now().Local()\n\talarmLevel, _ := alarmLevelMap[alarm.Level]\n\tnewStatus := models.Status{\n\t\tUpdateTime: now,\n\t\tCreateTime: now,\n\t\tAlarm: alarmLevel,\n\t\tAlarmVersion: alarm.Version,\n\t\tName: alarm.Name,\n\t\tMeasurement: alarm.Measurement,\n\t\tHost: hostname,\n\t\tIp: ip,\n\t\tNs: ns,\n\t\tLevel: level,\n\n\t\tValue: common.SetPrecision((*eventData.Data.Series[0]).Values[0][1].(float64), 2),\n\t\tTags: (*eventData.Data.Series[0]).Tags,\n\t\tReciever: loda.GetUserSurmary(receives),\n\t}\n\n\t// Set the createtime of status by previous if the status is the same as previous.\n\t// Otherwise log the status change via sdkLog.\n\tif oldStatus, err := w.Status.GetStatusFromCluster(ns, alarm.Version, hostname, encodeTags(eventData.Tag())); err != nil {\n\t\tif err := sdkLog.NewStatus(alarm.Name, ns, alarm.Measurement, alarm.Level, hostname, level, receives, newStatus.Value); err != nil {\n\t\t\tlog.Errorf(\"log status fail: %s\", err.Error())\n\t\t}\n\t} else {\n\t\tif oldStatus.Level == newStatus.Level {\n\t\t\tnewStatus.CreateTime = oldStatus.CreateTime\n\t\t} else {\n\t\t\tif err := sdkLog.StatusChange(alarm.Name, ns, alarm.Measurement, alarm.Level, hostname, oldStatus.Level, receives, newStatus.Value, oldStatus.CreateTime); err != nil {\n\t\t\t\tlog.Errorf(\"log status fail: %s\", err.Error())\n\t\t\t}\n\t\t\t// We need to record a new status if level changed from \"*\" -> !OK\n\t\t\tif newStatus.Level != \"OK\" {\n\t\t\t\tif err := sdkLog.NewStatus(alarm.Name, ns, alarm.Measurement, alarm.Level, hostname, level, receives, newStatus.Value); err != nil {\n\t\t\t\t\tlog.Errorf(\"log status fail: %s\", err.Error())\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn w.Status.SetStatus(ns, alarm, hostname, encodeTags(eventData.Tag()), newStatus)\n}", "func (fd *FailureDetector) fail() {\n\tfd.curr.Status = statusFailMap[fd.curr.Status.(string)]\n\tfd.ring.UpdateStatus(fd.curr)\n\tif fd.curr.Status.(string) == FAULTY {\n\t\tfd.ring.RemoveSync(fd.curr)\n\t}\n}", "func (expStatus *ExperimentStatus) InitialExperimentStatus(experimentDetails *ExperimentDetails) {\n\texpStatus.Name = experimentDetails.JobName\n\texpStatus.Status = \"Waiting for Job Creation\"\n\texpStatus.Verdict = \"Waiting\"\n\texpStatus.LastUpdateTime = metav1.Now()\n}", "func (o *Orders) UpdateLateStatus(db *gorm.DB, order_id int) error {\n\tif o.Total_days > o.Estimated_days {\n\t\terr := db.Debug().Model(&Orders{}).Where(\"id = ?\", order_id).Update(\"status\", \"yes\").Error\n\t\treturn err\n\t}\n\terr := db.Debug().Model(&Orders{}).Where(\"id = ?\", order_id).Update(\"status\", \"no\").Error\n\treturn err\n}", "func (api *API) setTicketHeader(t ticket.Ticket) {\n\tapi.ticket = &t\n}", "func (o *outlet)changeOutletStatus(isBusy bool) {\n\to.outletMutex.Lock()\n\tdefer o.outletMutex.Unlock()\n\n\to.isBusy = isBusy\n}", "func (_Content *ContentTransactor) RunStatusChange(opts *bind.TransactOpts, proposed_status_code *big.Int) (*types.Transaction, error) {\n\treturn _Content.contract.Transact(opts, \"runStatusChange\", proposed_status_code)\n}", "func (m *WorkbookOperation) SetStatus(value *WorkbookOperationStatus)() {\n m.status = value\n}", "func checkJobStatus(jobQueue *jobqueue.Client, t *jobqueue.Task) (bool, error) {\n\tif t.Job.Status != jobqueue.JobStatusNew {\n\t\treturn true, fmt.Errorf(\"bad job status: %s\", t.Job.Status)\n\t}\n\tif t.Job.Action != \"select-hypervisor\" {\n\t\treturn true, fmt.Errorf(\"bad action: %s\", t.Job.Action)\n\t}\n\treturn false, nil\n}", "func (c *CLAChecker) postStatus(ctx context.Context, owner, repo, sha, state string) (*github.RepoStatus, error) {\n\tsr := &github.RepoStatus{\n\t\tState: github.String(state),\n\t\tContext: github.String(\"cla-bot\"),\n\t}\n\tswitch state {\n\tcase \"failure\":\n\t\tsr.Description = github.String(\"Contributor has not signed the CLA\")\n\t\tsr.TargetURL = github.String(c.claURL)\n\tcase \"unnecessary\":\n\t\tsr.Description = github.String(\"Changes do not require CLA submission\")\n\t\tsr.State = github.String(\"success\")\n\tcase \"success\":\n\t\tsr.Description = github.String(\"Contributor has signed the CLA\")\n\tdefault:\n\t\tpanic(\"unknown state \" + state)\n\t}\n\tstatus, _, err := c.ghc.Repositories.CreateStatus(ctx, owner, repo, sha, sr)\n\treturn status, err\n}", "func ChangeStatus(c *server.Context) error {\n\tvar (\n\t\terr error\n\t\tchangeReq struct {\n\t\t\tIDs []uint32 `json:\"ids\" validate:\"required,min=1\"`\n\t\t\tStatus int8 `json:\"status\" validate:\"required,eq=-1|eq=1|eq=2|eq=3\"`\n\t\t}\n\t)\n\n\tisAdmin := c.Request().Context().Value(\"user\").(jwtgo.MapClaims)[util.IsAdmin].(bool)\n\tif !isAdmin {\n\t\tlogger.Error(\"You don't have access\")\n\t\treturn core.WriteStatusAndDataJSON(c, constants.ErrToken, nil)\n\t}\n\n\terr = c.JSONBody(&changeReq)\n\tif err != nil {\n\t\tlogger.Error(err)\n\t\treturn core.WriteStatusAndDataJSON(c, constants.ErrInvalidParam, nil)\n\t}\n\n\terr = c.Validate(changeReq)\n\tif err != nil {\n\t\tlogger.Error(err)\n\t\treturn core.WriteStatusAndDataJSON(c, constants.ErrInvalidParam, nil)\n\t}\n\n\tconn, err := mysql.Pool.Get()\n\tdefer mysql.Pool.Release(conn)\n\tif err != nil {\n\t\tlogger.Error(err)\n\t\treturn core.WriteStatusAndDataJSON(c, constants.ErrMysql, nil)\n\t}\n\n\t// status: -1 -> delete or sold out\n\t// 1 -> common\n\t// 2 -> promotion\n\t// 3 -> today new wares\n\terr = ware.Service.ChangeStatus(conn, changeReq.IDs, changeReq.Status)\n\tif err != nil {\n\t\tlogger.Error(err)\n\t\treturn core.WriteStatusAndDataJSON(c, constants.ErrMysql, nil)\n\t}\n\n\tlogger.Info(\"change ware status success\")\n\treturn core.WriteStatusAndDataJSON(c, constants.ErrSucceed, nil)\n}", "func switchBranchWithRollback(config *gctsDeployOptions, httpClient piperhttp.Sender, currentBranch string, targetBranch string, repoState string, repoMetadataInitState *getRepositoryResponseBody) (*switchBranchResponseBody, error) {\n\tvar response *switchBranchResponseBody\n\tresponse, switchBranchErr := switchBranch(config, httpClient, currentBranch, targetBranch)\n\tif switchBranchErr != nil {\n\t\tlog.Entry().WithError(switchBranchErr).Error(\"step execution failed at Switch Branch\")\n\t\tif repoState == repoStateNew && config.Rollback {\n\t\t\t// Rollback branch. Resetting branches\n\t\t\ttargetBranch = repoMetadataInitState.Result.Branch\n\t\t\tcurrentBranch = config.Branch\n\t\t\tlog.Entry().WithError(switchBranchErr).Errorf(\"Rolling Back from %v to %v\", currentBranch, targetBranch)\n\t\t\tswitchBranch(config, httpClient, currentBranch, targetBranch)\n\t\t}\n\t\treturn nil, switchBranchErr\n\t}\n\treturn response, nil\n}", "func (jiraHandler *JiraHandler) CreateTicket(fields map[string]interface{}) (*JiraCreateTicketResponse, error) {\n\tpostArgs := struct {\n\t\tFields map[string]interface{} `json:\"fields\"`\n\t}{fields}\n\tapiEndpoint := fmt.Sprintf(\"%s/rest/api/2/issue\", jiraHandler.JiraHost())\n\tbody := &bytes.Buffer{}\n\tif err := json.NewEncoder(body).Encode(postArgs); err != nil {\n\t\treturn nil, errors.Wrap(err, \"unable to serialize ticket body\")\n\t}\n\treq, err := http.NewRequest(http.MethodPost, apiEndpoint, body)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"unable to form create ticket request\")\n\t}\n\treq.Header.Add(\"Content-Type\", \"application/json\")\n\tif jiraHandler.opts.BasicAuthOpts.Username != \"\" {\n\t\treq.SetBasicAuth(jiraHandler.opts.BasicAuthOpts.Username, jiraHandler.opts.BasicAuthOpts.Password)\n\t}\n\tres, err := jiraHandler.client.Do(req)\n\tif res != nil {\n\t\tdefer res.Body.Close()\n\t}\n\tif err != nil {\n\t\treturn nil, errors.WithStack(err)\n\t}\n\tif res.StatusCode >= 300 || res.StatusCode < 200 {\n\t\tmsg, _ := io.ReadAll(res.Body)\n\t\treturn nil, errors.Errorf(\"HTTP request returned unexpected status `%v`: %v\", res.Status, string(msg))\n\t}\n\n\tticketInfo := &JiraCreateTicketResponse{}\n\tif err := json.NewDecoder(res.Body).Decode(ticketInfo); err != nil {\n\t\treturn nil, errors.Wrap(err, \"Unable to decode http body\")\n\t}\n\treturn ticketInfo, nil\n}", "func (enterprise *RedisEnterprise_STATUS) ConvertStatusFrom(source genruntime.ConvertibleStatus) error {\n\tsrc, ok := source.(*v20210301s.RedisEnterprise_STATUS)\n\tif ok {\n\t\t// Populate our instance from source\n\t\treturn enterprise.AssignProperties_From_RedisEnterprise_STATUS(src)\n\t}\n\n\t// Convert to an intermediate form\n\tsrc = &v20210301s.RedisEnterprise_STATUS{}\n\terr := src.ConvertStatusFrom(source)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"initial step of conversion in ConvertStatusFrom()\")\n\t}\n\n\t// Update our instance from src\n\terr = enterprise.AssignProperties_From_RedisEnterprise_STATUS(src)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"final step of conversion in ConvertStatusFrom()\")\n\t}\n\n\treturn nil\n}", "func updateThreadsStatus(threads []CommentThread) *bool {\n\tsort.Stable(byTimestamp(threads))\n\tnoUnresolved := true\n\tvar result *bool\n\tfor i := range threads {\n\t\tthread := &threads[i]\n\t\tthread.updateResolvedStatus()\n\t\tif thread.Resolved != nil {\n\t\t\tnoUnresolved = noUnresolved && *thread.Resolved\n\t\t\tresult = &noUnresolved\n\t\t}\n\t}\n\treturn result\n}", "func TestTrunkENI_Reconcile_NoStateChange(t *testing.T) {\n\ttrunkENI := getMockTrunk()\n\ttrunkENI.uidToBranchENIMap[PodUID] = []*ENIDetails{EniDetails1, EniDetails2}\n\n\tpodList := []v1.Pod{*MockPod1, *MockPod2}\n\n\terr := trunkENI.Reconcile(podList)\n\tassert.NoError(t, err)\n\n\t_, isPresent := trunkENI.uidToBranchENIMap[PodUID]\n\tassert.Zero(t, trunkENI.deleteQueue)\n\tassert.True(t, isPresent)\n}", "func (px *Paxos) Status(seq int) (Fate, interface{}) {\n\t// Your code here\n\n\t//log.Printf(\"judge status of %d\\n\", seq)\n\tif seq < px.Min() {\n\t\t//\tlog.Printf(\"forgotten\\n\")\n\t\treturn Forgotten, nil\n\t}\n\t//log.Printf(\"no forgotten\\n\")\n\tpx.mu.Lock()\n\tdefer px.mu.Unlock()\n\n\t_, exist := px.acceptor[seq]\n\n\tif exist {\n\t\treturn px.acceptor[seq].state, px.acceptor[seq].decided.Value\n\t}\n\treturn Pending, nil\n}", "func (c *Controller) doUpdateCHIObjectStatus(ctx context.Context, chi *chiV1.ClickHouseInstallation, opts UpdateCHIStatusOptions) error {\n\tif util.IsContextDone(ctx) {\n\t\tlog.V(2).Info(\"task is done\")\n\t\treturn nil\n\t}\n\n\tnamespace, name := util.NamespaceName(chi.ObjectMeta)\n\tlog.V(2).M(chi).F().Info(\"Update CHI status\")\n\n\tpodIPs := c.getPodsIPs(chi)\n\n\tcur, err := c.chopClient.ClickhouseV1().ClickHouseInstallations(namespace).Get(ctx, name, newGetOptions())\n\tif err != nil {\n\t\tif opts.TolerateAbsence {\n\t\t\treturn nil\n\t\t}\n\t\tlog.V(1).M(chi).F().Error(\"%q\", err)\n\t\treturn err\n\t}\n\tif cur == nil {\n\t\tif opts.TolerateAbsence {\n\t\t\treturn nil\n\t\t}\n\t\tlog.V(1).M(chi).F().Error(\"NULL returned\")\n\t\treturn fmt.Errorf(\"ERROR GetCHI (%s/%s): NULL returned\", namespace, name)\n\t}\n\n\t// Update status of a real object.\n\tcur.EnsureStatus().CopyFrom(chi.Status, opts.CopyCHIStatusOptions)\n\tcur.EnsureStatus().SetPodIPs(podIPs)\n\n\t_new, err := c.chopClient.ClickhouseV1().ClickHouseInstallations(chi.Namespace).UpdateStatus(ctx, cur, newUpdateOptions())\n\tif err != nil {\n\t\t// Error update\n\t\tlog.V(2).M(chi).F().Info(\"Got error upon update, may retry. err: %q\", err)\n\t\treturn err\n\t}\n\n\t// Propagate updated ResourceVersion into chiV1\n\tif chi.ObjectMeta.ResourceVersion != _new.ObjectMeta.ResourceVersion {\n\t\tlog.V(2).M(chi).F().Info(\"ResourceVersion change: %s to %s\", chi.ObjectMeta.ResourceVersion, _new.ObjectMeta.ResourceVersion)\n\t\tchi.ObjectMeta.ResourceVersion = _new.ObjectMeta.ResourceVersion\n\t\treturn nil\n\t}\n\n\t// ResourceVersion not changed - no update performed?\n\n\treturn nil\n}", "func (tc *MXController) updateStatusSingle(mxjob *mxv1.MXJob, rtype mxv1.MXReplicaType, replicas int, restart, schedulerCompleted bool) error {\n\tmxjobKey, err := KeyFunc(mxjob)\n\tif err != nil {\n\t\tutilruntime.HandleError(fmt.Errorf(\"couldn't get key for mxjob object %#v: %v\", mxjob, err))\n\t\treturn err\n\t}\n\n\t// Expect to have `replicas - succeeded` pods alive.\n\texpected := replicas - int(mxjob.Status.MXReplicaStatuses[rtype].Succeeded)\n\trunning := int(mxjob.Status.MXReplicaStatuses[rtype].Active)\n\tfailed := int(mxjob.Status.MXReplicaStatuses[rtype].Failed)\n\n\tmxlogger.LoggerForJob(mxjob).Infof(\"MXJob=%s, ReplicaType=%s expected=%d, running=%d, failed=%d\",\n\t\tmxjob.Name, rtype, expected, running, failed)\n\t// set StartTime.\n\tif mxjob.Status.StartTime == nil {\n\t\tnow := metav1.Now()\n\t\tmxjob.Status.StartTime = &now\n\t\t// enqueue a sync to check if job past ActiveDeadlineSeconds\n\t\tif mxjob.Spec.ActiveDeadlineSeconds != nil {\n\t\t\tmxlogger.LoggerForJob(mxjob).Infof(\"Job with ActiveDeadlineSeconds will sync after %d seconds\", *mxjob.Spec.ActiveDeadlineSeconds)\n\t\t\ttc.WorkQueue.AddAfter(mxjobKey, time.Duration(*mxjob.Spec.ActiveDeadlineSeconds)*time.Second)\n\t\t}\n\t}\n\n\tif ContainSchedulerSpec(mxjob) {\n\t\tif rtype == mxv1.MXReplicaTypeScheduler {\n\t\t\tif running > 0 {\n\t\t\t\tmsg := fmt.Sprintf(\"MXJob %s is running.\", mxjob.Name)\n\t\t\t\terr := updateMXJobConditions(mxjob, mxv1.MXJobRunning, mxJobRunningReason, msg)\n\t\t\t\tif err != nil {\n\t\t\t\t\tmxlogger.LoggerForJob(mxjob).Infof(\"Append mxjob condition error: %v\", err)\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\t\t\tif expected == 0 {\n\t\t\t\tmsg := fmt.Sprintf(\"MXJob %s is successfully completed.\", mxjob.Name)\n\t\t\t\tif mxjob.Status.CompletionTime == nil {\n\t\t\t\t\tnow := metav1.Now()\n\t\t\t\t\tmxjob.Status.CompletionTime = &now\n\t\t\t\t}\n\t\t\t\terr := updateMXJobConditions(mxjob, mxv1.MXJobSucceeded, mxJobSucceededReason, msg)\n\t\t\t\tif err != nil {\n\t\t\t\t\tmxlogger.LoggerForJob(mxjob).Infof(\"Append mxjob condition error: %v\", err)\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t} else {\n\t\tif rtype == mxv1.MXReplicaTypeWorker || rtype == mxv1.MXReplicaTypeTuner {\n\t\t\t// All workers are succeeded or scheduler completed, leave a succeeded condition.\n\t\t\tif expected == 0 || schedulerCompleted {\n\t\t\t\tmsg := fmt.Sprintf(\"MXJob %s is successfully completed.\", mxjob.Name)\n\t\t\t\tif mxjob.Status.CompletionTime == nil {\n\t\t\t\t\tnow := metav1.Now()\n\t\t\t\t\tmxjob.Status.CompletionTime = &now\n\t\t\t\t}\n\t\t\t\terr := updateMXJobConditions(mxjob, mxv1.MXJobSucceeded, mxJobSucceededReason, msg)\n\t\t\t\tif err != nil {\n\t\t\t\t\tmxlogger.LoggerForJob(mxjob).Infof(\"Append mxjob condition error: %v\", err)\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t} else if running > 0 {\n\t\t\t\t// Some workers are still running, leave a running condition.\n\t\t\t\tmsg := fmt.Sprintf(\"MXJob %s is running.\", mxjob.Name)\n\t\t\t\terr := updateMXJobConditions(mxjob, mxv1.MXJobRunning, mxJobRunningReason, msg)\n\t\t\t\tif err != nil {\n\t\t\t\t\tmxlogger.LoggerForJob(mxjob).Infof(\"Append mxjob condition error: %v\", err)\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tif failed > 0 {\n\t\tif restart {\n\t\t\tmsg := fmt.Sprintf(\"MXJob %s is restarting.\", mxjob.Name)\n\t\t\terr := updateMXJobConditions(mxjob, mxv1.MXJobRestarting, mxJobRestartingReason, msg)\n\t\t\tif err != nil {\n\t\t\t\tmxlogger.LoggerForJob(mxjob).Infof(\"Append mxjob condition error: %v\", err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\tmsg := fmt.Sprintf(\"MXJob %s is failed.\", mxjob.Name)\n\t\t\tif mxjob.Status.CompletionTime == nil {\n\t\t\t\tnow := metav1.Now()\n\t\t\t\tmxjob.Status.CompletionTime = &now\n\t\t\t}\n\t\t\terr := updateMXJobConditions(mxjob, mxv1.MXJobFailed, mxJobFailedReason, msg)\n\t\t\tif err != nil {\n\t\t\t\tmxlogger.LoggerForJob(mxjob).Infof(\"Append mxjob condition error: %v\", err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "func (r *ReconcileWavefrontProxy) updateCRStatus(instance *wfv1.WavefrontProxy, desiredIp *InternalWavefrontProxy, reqLogger logr.Logger) error {\n\treqLogger.Info(\"Updating WavefrontProxy CR Status :\")\n\tinstance.Status = desiredIp.instance.Status\n\tinstance.Status.UpdatedTimestamp = metav1.Now()\n\n\treturn r.client.Status().Update(context.TODO(), instance)\n}", "func (r *AWSAccountBindingApprovalReconciler) updateStatus(ctx context.Context) (*ctrl.Result, error) {\n\tlgr := r.Log.WithValues(\"task\", \"updateStatus\")\n\tlgr.Info(\"starting reconciliation\")\n\tdefer lgr.Info(\"ending reconciliation\")\n\n\tst, result, err := r.DetermineState(ctx)\n\tif reconc.ShouldHaltOrRequeue(result, err) {\n\t\treturn result, err\n\t}\n\n\tinst := st.Instance()\n\tcrStatus := inst.Status\n\tstatus := st.CurrentStatus()\n\tif status != crStatus {\n\t\tlgr.Info(fmt.Sprintf(\"updating status for resources %s\", inst.GetName()))\n\t\tupdated := inst.DeepCopy()\n\t\tupdated.Status = status\n\t\tif err := r.Status().Update(ctx, updated); err != nil {\n\t\t\tlgr.Error(err, \"instance patching error\", \"resource\", inst.GetName())\n\t\t\treturn reconc.RequeueWithError(err)\n\t\t}\n\t}\n\treturn reconc.ContinueReconciling()\n}", "func StatefulSetRolloutStatus(sts *appsv1.StatefulSet) (string, bool, error) {\n\tif sts.Spec.UpdateStrategy.Type != appsv1.RollingUpdateStatefulSetStrategyType {\n\t\treturn \"\", true, fmt.Errorf(\"rollout status is only available for %s strategy type\", appsv1.RollingUpdateStatefulSetStrategyType)\n\t}\n\tif sts.Status.ObservedGeneration == 0 || sts.Generation > sts.Status.ObservedGeneration {\n\t\treturn \"Waiting for statefulset spec update to be observed...\\n\", false, nil\n\t}\n\tif sts.Spec.Replicas != nil && sts.Status.ReadyReplicas < *sts.Spec.Replicas {\n\t\treturn fmt.Sprintf(\"Waiting for %d pods to be ready...\\n\", *sts.Spec.Replicas-sts.Status.ReadyReplicas), false, nil\n\t}\n\tif sts.Spec.UpdateStrategy.Type == appsv1.RollingUpdateStatefulSetStrategyType && sts.Spec.UpdateStrategy.RollingUpdate != nil {\n\t\tif sts.Spec.Replicas != nil && sts.Spec.UpdateStrategy.RollingUpdate.Partition != nil {\n\t\t\tif sts.Status.UpdatedReplicas < (*sts.Spec.Replicas - *sts.Spec.UpdateStrategy.RollingUpdate.Partition) {\n\t\t\t\treturn fmt.Sprintf(\"Waiting for partitioned roll out to finish: %d out of %d new pods have been updated...\\n\",\n\t\t\t\t\tsts.Status.UpdatedReplicas, *sts.Spec.Replicas-*sts.Spec.UpdateStrategy.RollingUpdate.Partition), false, nil\n\t\t\t}\n\t\t}\n\t\treturn fmt.Sprintf(\"partitioned roll out complete: %d new pods have been updated...\\n\",\n\t\t\tsts.Status.UpdatedReplicas), true, nil\n\t}\n\tif sts.Status.UpdateRevision != sts.Status.CurrentRevision {\n\t\treturn fmt.Sprintf(\"waiting for statefulset rolling update to complete %d pods at revision %s...\\n\",\n\t\t\tsts.Status.UpdatedReplicas, sts.Status.UpdateRevision), false, nil\n\t}\n\treturn fmt.Sprintf(\"statefulset rolling update complete %d pods at revision %s...\\n\", sts.Status.CurrentReplicas, sts.Status.CurrentRevision), true, nil\n}", "func (c *PumpsClient) watchStatus(revision int64) {\n\trch := c.EtcdRegistry.WatchNode(c.ctx, c.nodePath, revision)\n\n\tfor {\n\t\tselect {\n\t\tcase <-c.ctx.Done():\n\t\t\tlog.Info(\"watch status finished\", zap.String(\"category\", \"pumps client\"))\n\t\t\treturn\n\t\tcase wresp := <-rch:\n\t\t\tif wresp.Err() != nil {\n\t\t\t\t// meet error, watch from the latest revision.\n\t\t\t\t// pump will update the key periodly, it's ok for we to lost some event here\n\t\t\t\tlog.Warn(\"watch status meet error\", zap.String(\"category\", \"pumps client\"), zap.Error(wresp.Err()))\n\t\t\t\trch = c.EtcdRegistry.WatchNode(c.ctx, c.nodePath, 0)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tfor _, ev := range wresp.Events {\n\t\t\t\tstatus := &node.Status{}\n\t\t\t\terr := json.Unmarshal(ev.Kv.Value, &status)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Error(\"unmarshal pump status failed\", zap.String(\"category\", \"pumps client\"), zap.ByteString(\"value\", ev.Kv.Value), zap.Error(err))\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tswitch ev.Type {\n\t\t\t\tcase mvccpb.PUT:\n\t\t\t\t\tif !c.exist(status.NodeID) {\n\t\t\t\t\t\tlog.Info(\"find a new pump\", zap.String(\"category\", \"pumps client\"), zap.String(\"NodeID\", status.NodeID))\n\t\t\t\t\t\tc.addPump(NewPumpStatus(status, c.Security), true)\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\n\t\t\t\t\tpump, availableChanged, available := c.updatePump(status)\n\t\t\t\t\tif availableChanged {\n\t\t\t\t\t\tlog.Info(\"pump's state is changed\", zap.String(\"category\", \"pumps client\"), zap.String(\"NodeID\", pump.Status.NodeID), zap.String(\"state\", status.State))\n\t\t\t\t\t\tc.setPumpAvailable(pump, available)\n\t\t\t\t\t}\n\n\t\t\t\tcase mvccpb.DELETE:\n\t\t\t\t\t// now will not delete pump node in fact, just for compatibility.\n\t\t\t\t\tnodeID := node.AnalyzeNodeID(string(ev.Kv.Key))\n\t\t\t\t\tlog.Info(\"remove pump\", zap.String(\"category\", \"pumps client\"), zap.String(\"NodeID\", nodeID))\n\t\t\t\t\tc.removePump(nodeID)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "func statusReporter(chatID int64, action string) chan struct{} {\n\tdoneChan := make(chan struct{}, 1)\n\tgo statusReporterGoroutine(chatID, action, doneChan)\n\treturn doneChan\n}", "func updateStatus(args []string) {\n\tdata, klocworkURL := formBaseRequest(\"update_status\")\n\tdata.Set(\"project\", args[0])\n\tdata.Set(\"ids\", args[1])\n\tdata.Set(\"status\", args[2])\n\n\tsendRequest(klocworkURL, data)\n\n}", "func (_SmartTgStats *SmartTgStatsTransactor) CEORenewStatus(opts *bind.TransactOpts, _isOn bool) (*types.Transaction, error) {\n\treturn _SmartTgStats.contract.Transact(opts, \"CEORenewStatus\", _isOn)\n}", "func RotateStatuses(s *discordgo.Session, l []string, t int64) {\n for true {\n time.Sleep(time.Duration(t) * time.Second)\n\n n := l[util.RandomRange(0, len(l))]\n\n err := s.UpdateStatus(0, n)\n if err != nil {\n logrus.WithFields(logrus.Fields{\n \"err\": err,\n }).Error(\"Unable to change status\")\n }\n\n logrus.Info(\"Changed status to \" + n)\n }\n}", "func getJiraIssue(issueKey string, jiraClient *jira.Client) (JiraIssue, error) {\n\n\tvar jiraIssue JiraIssue\n\n\tissue, _, err := jiraClient.Issue.Get(issueKey, nil)\n\tif err != nil {\n\t\tlog.Printf(\"Cannot find %v\", issueKey)\n\t\treturn jiraIssue, err\n\t}\n\n\t//Fields from ticket itself\n\tjiraIssue.Key = issue.Key //Task key\n\tjiraIssue.Summary = issue.Fields.Summary //Task name\n\tjiraIssue.Estimation = issue.Fields.TimeTracking.OriginalEstimate //Estimation\n\n\tif issue.Fields.Parent != nil {\n\t\tjiraIssue.ParentKey = issue.Fields.Parent.Key //Parent task key\n\t}\n\n\t//Fields from parent ticket\n\tif jiraIssue.ParentKey == \"\" {\n\t\treturn jiraIssue, fmt.Errorf(\"issue %v does not have parent ticket, do nothing\", issueKey)\n\t}\n\tissue, _, err = jiraClient.Issue.Get(jiraIssue.ParentKey, nil)\n\tif err != nil {\n\t\tlog.Printf(\"Cannot find parent ticket %v\", issueKey)\n\t\treturn jiraIssue, err\n\t}\n\n\tjiraIssue.ParentSummary = issue.Fields.Summary //Parent task summary\n\tjiraIssue.ParentDescription = issue.Fields.Description\n\n\t//Example of issue.Fields.Unknowns[\"customfield_10416\"]:\n\t//customfield_10416:map[id:12016 self:https://inchcapeglobal.atlassian.net/rest/api/2/customFieldOption/12016 value:IMP_22]\n\tbudgetMap := issue.Fields.Unknowns[\"customfield_10416\"] //Budget\n\tbudgetMap2, ok := budgetMap.(map[string]interface{})\n\tif ok {\n\t\tjiraIssue.ParentBudget = budgetMap2[\"value\"].(string)\n\t}\n\n\treturn jiraIssue, nil\n\n}", "func (r *Resource) setStatus(ctx context.Context, obj interface{}) error {\n\tif !r.route53Enabled {\n\t\tr.logger.LogCtx(ctx, \"level\", \"debug\", \"message\", \"route53 disabled, skipping execution\")\n\t\treturn nil\n\t}\n\n\tcustomObject, err := key.ToCustomObject(obj)\n\tif err != nil {\n\t\treturn microerror.Mask(err)\n\t}\n\n\tcontrollerCtx, err := controllercontext.FromContext(ctx)\n\tif err != nil {\n\t\treturn microerror.Mask(err)\n\t}\n\n\tr.logger.LogCtx(ctx, \"level\", \"debug\", \"message\", \"looking for host cluster hosted zone IDs in AWS API\")\n\n\tvar (\n\t\tapiFound = false\n\t\tetcdFound = false\n\t\tingressFound = false\n\n\t\tapiZone = strings.TrimSuffix(key.HostedZoneNameAPI(customObject), \".\")\n\t\tetcdZone = strings.TrimSuffix(key.HostedZoneNameEtcd(customObject), \".\")\n\t\tingressZone = strings.TrimSuffix(key.HostedZoneNameIngress(customObject), \".\")\n\t)\n\n\tvar marker *string\n\tfor {\n\t\tin := &route53.ListHostedZonesInput{\n\t\t\tMarker: marker,\n\t\t}\n\n\t\tout, err := r.hostRoute53.ListHostedZones(in)\n\t\tif err != nil {\n\t\t\treturn microerror.Mask(err)\n\t\t}\n\n\t\tfor _, hz := range out.HostedZones {\n\t\t\tif hz.Name == nil || hz.Id == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\thzName := *hz.Name\n\t\t\thzName = strings.TrimSuffix(hzName, \".\")\n\t\t\thzID := *hz.Id\n\n\t\t\tif hzName == apiZone {\n\t\t\t\tr.logger.LogCtx(ctx, \"level\", \"debug\", \"message\", fmt.Sprintf(\"found api hosted zone ID %q for domain %q\", hzID, hzName))\n\t\t\t\tcontrollerCtx.Status.Cluster.HostedZones.API.ID = hzID\n\t\t\t\tapiFound = true\n\t\t\t}\n\t\t\tif hzName == etcdZone {\n\t\t\t\tr.logger.LogCtx(ctx, \"level\", \"debug\", \"message\", fmt.Sprintf(\"found etcd hosted zone ID %q for domain %q\", hzID, hzName))\n\t\t\t\tcontrollerCtx.Status.Cluster.HostedZones.Etcd.ID = hzID\n\t\t\t\tetcdFound = true\n\t\t\t}\n\t\t\tif hzName == ingressZone {\n\t\t\t\tr.logger.LogCtx(ctx, \"level\", \"debug\", \"message\", fmt.Sprintf(\"found ingress hosted zone ID %q for domain %q\", hzID, hzName))\n\t\t\t\tcontrollerCtx.Status.Cluster.HostedZones.Ingress.ID = hzID\n\t\t\t\tingressFound = true\n\t\t\t}\n\t\t}\n\n\t\t// If all IDs are found stop here.\n\t\tallFound := apiFound && etcdFound && ingressFound\n\t\tif allFound {\n\t\t\tbreak\n\t\t}\n\n\t\t// If not all IDs are found, try to search next page.\n\t\tif out.IsTruncated == nil || !*out.IsTruncated {\n\t\t\tbreak\n\t\t}\n\t\tmarker = out.Marker\n\t}\n\n\tif !apiFound {\n\t\treturn microerror.Maskf(hostedZoneNotFoundError, \"zone = %q\", apiZone)\n\t}\n\tif !etcdFound {\n\t\treturn microerror.Maskf(hostedZoneNotFoundError, \"zone = %q\", etcdZone)\n\t}\n\tif !ingressFound {\n\t\treturn microerror.Maskf(hostedZoneNotFoundError, \"zone = %q\", ingressZone)\n\t}\n\n\tr.logger.LogCtx(ctx, \"level\", \"debug\", \"message\", \"found all host cluster hosted zone IDs\")\n\treturn nil\n}", "func poll(transport *HTTPTransport, initialStatus ServerStatus, statuschan chan ServerStatus, errorchan chan error) {\n\tstatus := initialStatus\n\tstatuschanPolling := make(chan ServerStatus)\n\terrorchanPolling := make(chan error)\n\tgo pollUntilChange(transport, status, statuschanPolling, errorchanPolling)\n\tfor {\n\t\tselect {\n\t\tcase status = <-statuschanPolling:\n\t\t\tstatuschan <- status\n\t\t\tif status.Finished() {\n\t\t\t\terrorchan <- nil\n\t\t\t\treturn\n\t\t\t}\n\t\tcase err := <-errorchanPolling:\n\t\t\tif err != nil {\n\t\t\t\terrorchan <- err\n\t\t\t\treturn\n\t\t\t}\n\t\t\tgo pollUntilChange(transport, status, statuschanPolling, errorchanPolling)\n\t\t}\n\t}\n}", "func (tc *MXController) updateMXJobStatus(mxjob *mxv1.MXJob) error {\n\t_, err := tc.mxJobClientSet.KubeflowV1().MXJobs(mxjob.Namespace).UpdateStatus(mxjob)\n\treturn err\n}" ]
[ "0.7549348", "0.7346647", "0.55045396", "0.53491646", "0.5251128", "0.52342236", "0.5203524", "0.519578", "0.5180755", "0.51676965", "0.50834537", "0.5040092", "0.5018887", "0.5012412", "0.50122964", "0.49443483", "0.4939245", "0.49319598", "0.4864558", "0.48642474", "0.4862574", "0.4851332", "0.48507893", "0.48502752", "0.4839117", "0.47542897", "0.47448084", "0.4732394", "0.4709671", "0.47087473", "0.46986905", "0.46977988", "0.4693842", "0.46916083", "0.46642599", "0.46612713", "0.46486723", "0.4633812", "0.4618608", "0.46057704", "0.46000603", "0.45880106", "0.45826092", "0.4581718", "0.45783642", "0.45768726", "0.45754564", "0.45718285", "0.45664755", "0.45647407", "0.4560243", "0.45570844", "0.4550071", "0.45471153", "0.454295", "0.45421693", "0.4541508", "0.45389888", "0.45379046", "0.45347035", "0.45293647", "0.45270273", "0.45263302", "0.452045", "0.45201406", "0.4517772", "0.450797", "0.45031753", "0.4501734", "0.44972274", "0.44947112", "0.44939834", "0.4484758", "0.44839483", "0.4482552", "0.4480888", "0.4474678", "0.44702265", "0.44656613", "0.4462818", "0.44623578", "0.4459027", "0.44588333", "0.44587484", "0.44502085", "0.44495583", "0.44338226", "0.44320634", "0.4428441", "0.4425405", "0.44130307", "0.44057912", "0.4405554", "0.4404543", "0.4403061", "0.44030398", "0.44027552", "0.4399375", "0.43975827", "0.43972144" ]
0.5931405
2
we ask the scanning engine to look for a series of vulnerabilities across a series of devices. If we search for a vulnerability on a single device in a scan, we check for that vulnerability on all the devices in the scan. here we check to see if the devices have any tickets for vulnerabilities that they are being checked for that might not have been included in the original scan we only do this check in normal rescans and decommission rescans
func (job *ScanCloseJob) loadAdditionalTickets(ticketing integrations.TicketingEngine, tickets []domain.Ticket) (additionalTickets []domain.Ticket, err error) { additionalTickets = make([]domain.Ticket, 0) var additionalTicketsChan <-chan domain.Ticket if strings.ToLower(job.Payload.Type) == strings.ToLower(domain.RescanDecommission) { additionalTicketsChan, err = ticketing.GetAdditionalTicketsForDecomDevices(tickets) } else if strings.ToLower(job.Payload.Type) == strings.ToLower(domain.RescanNormal) { additionalTicketsChan, err = ticketing.GetAdditionalTicketsForVulnPerDevice(tickets) } var seen = make(map[string]bool) for _, tic := range tickets { seen[tic.Title()] = true } if err == nil && additionalTicketsChan != nil { for { if ticket, ok := <-additionalTicketsChan; ok { if !seen[ticket.Title()] { seen[ticket.Title()] = true additionalTickets = append(additionalTickets, ticket) } } else { break } } } return additionalTickets, err }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func checkSecurityViolations(config *ScanOptions, sys whitesource) error {\n\t// convert config.CvssSeverityLimit to float64\n\tcvssSeverityLimit, err := strconv.ParseFloat(config.CvssSeverityLimit, 64)\n\tif err != nil {\n\t\tlog.SetErrorCategory(log.ErrorConfiguration)\n\t\treturn fmt.Errorf(\"failed to parse parameter cvssSeverityLimit (%s) \"+\n\t\t\t\"as floating point number: %w\", config.CvssSeverityLimit, err)\n\t}\n\n\t// get project alerts (vulnerabilities)\n\talerts, err := sys.GetProjectAlerts(config.ProjectToken)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to retrieve project alerts from Whitesource: %w\", err)\n\t}\n\n\tsevereVulnerabilities := 0\n\t// https://github.com/SAP/jenkins-library/blob/master/vars/whitesourceExecuteScan.groovy#L537\n\tfor _, alert := range alerts {\n\t\tvuln := alert.Vulnerability\n\t\tif (vuln.Score >= cvssSeverityLimit || vuln.CVSS3Score >= cvssSeverityLimit) && cvssSeverityLimit >= 0 {\n\t\t\tlog.Entry().Infof(\"Vulnerability with Score %v / CVSS3Score %v treated as severe\",\n\t\t\t\tvuln.Score, vuln.CVSS3Score)\n\t\t\tsevereVulnerabilities++\n\t\t} else {\n\t\t\tlog.Entry().Infof(\"Ignoring vulnerability with Score %v / CVSS3Score %v\",\n\t\t\t\tvuln.Score, vuln.CVSS3Score)\n\t\t}\n\t}\n\n\t//https://github.com/SAP/jenkins-library/blob/master/vars/whitesourceExecuteScan.groovy#L547\n\tnonSevereVulnerabilities := len(alerts) - severeVulnerabilities\n\tif nonSevereVulnerabilities > 0 {\n\t\tlog.Entry().Warnf(\"WARNING: %v Open Source Software Security vulnerabilities with \"+\n\t\t\t\"CVSS score below threshold %s detected in project %s.\", nonSevereVulnerabilities,\n\t\t\tconfig.CvssSeverityLimit, config.ProjectName)\n\t} else if len(alerts) == 0 {\n\t\tlog.Entry().Infof(\"No Open Source Software Security vulnerabilities detected in project %s\",\n\t\t\tconfig.ProjectName)\n\t}\n\n\t// https://github.com/SAP/jenkins-library/blob/master/vars/whitesourceExecuteScan.groovy#L558\n\tif severeVulnerabilities > 0 {\n\t\treturn fmt.Errorf(\"%v Open Source Software Security vulnerabilities with CVSS score greater \"+\n\t\t\t\"or equal to %s detected in project %s\",\n\t\t\tsevereVulnerabilities, config.CvssSeverityLimit, config.ProjectName)\n\t}\n\treturn nil\n}", "func (job *ScanCloseJob) modifyJiraTicketAccordingToVulnerabilityStatus(engine integrations.TicketingEngine, ticket domain.Ticket, scan domain.ScanSummary, deadHostIPToProofMap map[string]string, deviceIDToVulnIDToDetection map[string]map[string]domain.Detection) {\n\tvar detectionsFoundForDevice = deviceIDToVulnIDToDetection[ticket.DeviceID()] != nil\n\tvar deviceReportedAsDead = len(deadHostIPToProofMap[sord(ticket.IPAddress())]) > 0 && len(sord(ticket.IPAddress())) > 0\n\n\tvar detection domain.Detection\n\tif detectionsFoundForDevice {\n\t\tdetection = deviceIDToVulnIDToDetection[ticket.DeviceID()][combineVulnerabilityIDAndServicePortTicket(ticket)]\n\t}\n\n\tvar err error\n\tvar status string\n\tvar inactiveKernel bool\n\tif detection != nil {\n\t\tstatus = detection.Status()\n\t\tinactiveKernel = iord(detection.ActiveKernel()) > 0\n\n\t\tif detection.LastFound() != nil && !detection.LastFound().IsZero() && detection.LastFound().After(tord1970(ticket.AlertDate())) {\n\t\t\tticket = &lastUpdatedTicket{\n\t\t\t\tTicket: ticket,\n\t\t\t\tlastUpdated: *detection.LastFound(),\n\t\t\t}\n\n\t\t\t_, _, err := engine.UpdateTicket(ticket, \"\")\n\t\t\tif err != nil {\n\t\t\t\tjob.lstream.Send(log.Errorf(err, \"error while setting last found date of %s to [%s]\", ticket.Title(), detection.LastFound().String()))\n\t\t\t}\n\t\t}\n\t}\n\n\tif detectionsFoundForDevice || deviceReportedAsDead {\n\t\tswitch job.Payload.Type {\n\t\tcase domain.RescanNormal:\n\t\t\tjob.processTicketForNormalRescan(deadHostIPToProofMap, ticket, detection, err, engine, status, inactiveKernel, scan)\n\t\tcase domain.RescanDecommission:\n\t\t\tjob.processTicketForDecommRescan(deadHostIPToProofMap, ticket, detection, err, engine, scan, status)\n\t\tcase domain.RescanExceptions:\n\t\t\tjob.processTicketForPassiveOrExceptionRescan(deadHostIPToProofMap, ticket, detection, err, engine, status, inactiveKernel, scan)\n\t\tcase domain.RescanPassive:\n\t\t\tjob.processTicketForPassiveOrExceptionRescan(deadHostIPToProofMap, ticket, detection, err, engine, status, inactiveKernel, scan)\n\t\tdefault:\n\t\t\tjob.lstream.Send(log.Critical(fmt.Sprintf(\"Unrecognized scan type [%s]\", job.Payload.Type), nil))\n\t\t}\n\t} else {\n\t\tjob.lstream.Send(log.Errorf(err, \"scan [%s] did not seem to cover the device %v - scanner did not report any data for device\", job.Payload.ScanID, ticket.DeviceID()))\n\t\terr = engine.Transition(ticket, engine.GetStatusMap(domain.StatusScanError), fmt.Sprintf(\"scan [%s] did not cover the device %v. Please make sure this asset is still in-scope and associated with an asset group. If this asset is out of scope, please move this ticket to NOTAVRR status or alert the vulnerability management team.\", job.Payload.ScanID, ticket.DeviceID()), sord(ticket.AssignedTo()))\n\t\tif err != nil {\n\t\t\tjob.lstream.Send(log.Errorf(err, \"error while adding comment to ticket [%s]\", ticket.Title()))\n\t\t}\n\t}\n\n}", "func (s *Scanner) Detect(osVer string, _ *ftypes.Repository, pkgs []ftypes.Package) ([]types.DetectedVulnerability, error) {\n\tlog.Logger.Info(\"Detecting CBL-Mariner vulnerabilities...\")\n\n\t// e.g. 1.0.20210127\n\tif strings.Count(osVer, \".\") > 1 {\n\t\tosVer = osVer[:strings.LastIndex(osVer, \".\")]\n\t}\n\n\tlog.Logger.Debugf(\"CBL-Mariner: os version: %s\", osVer)\n\tlog.Logger.Debugf(\"CBL-Mariner: the number of packages: %d\", len(pkgs))\n\n\tvar vulns []types.DetectedVulnerability\n\tfor _, pkg := range pkgs {\n\t\t// CBL Mariner OVAL contains source package names only.\n\t\tadvisories, err := s.vs.Get(osVer, pkg.SrcName)\n\t\tif err != nil {\n\t\t\treturn nil, xerrors.Errorf(\"failed to get CBL-Mariner advisories: %w\", err)\n\t\t}\n\n\t\tsourceVersion := version.NewVersion(utils.FormatSrcVersion(pkg))\n\n\t\tfor _, adv := range advisories {\n\t\t\tvuln := types.DetectedVulnerability{\n\t\t\t\tVulnerabilityID: adv.VulnerabilityID,\n\t\t\t\tPkgName: pkg.Name,\n\t\t\t\tInstalledVersion: utils.FormatVersion(pkg),\n\t\t\t\tPkgRef: pkg.Ref,\n\t\t\t\tLayer: pkg.Layer,\n\t\t\t\tDataSource: adv.DataSource,\n\t\t\t}\n\n\t\t\t// Unpatched vulnerabilities\n\t\t\tif adv.FixedVersion == \"\" {\n\t\t\t\tvulns = append(vulns, vuln)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// Patched vulnerabilities\n\t\t\tfixedVersion := version.NewVersion(adv.FixedVersion)\n\t\t\tif sourceVersion.LessThan(fixedVersion) {\n\t\t\t\tvuln.FixedVersion = fixedVersion.String()\n\t\t\t\tvulns = append(vulns, vuln)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn vulns, nil\n}", "func (s *Scanner) Detect(osVer string, _ *ftypes.Repository, pkgs []ftypes.Package) ([]types.DetectedVulnerability, error) {\n\tlog.Logger.Info(\"Detecting Photon Linux vulnerabilities...\")\n\tlog.Logger.Debugf(\"Photon Linux: os version: %s\", osVer)\n\tlog.Logger.Debugf(\"Photon Linux: the number of packages: %d\", len(pkgs))\n\n\tvar vulns []types.DetectedVulnerability\n\tfor _, pkg := range pkgs {\n\t\tadvisories, err := s.vs.Get(osVer, pkg.SrcName)\n\t\tif err != nil {\n\t\t\treturn nil, xerrors.Errorf(\"failed to get Photon Linux advisory: %w\", err)\n\t\t}\n\n\t\tinstalled := utils.FormatVersion(pkg)\n\t\tinstalledVersion := version.NewVersion(installed)\n\t\tfor _, adv := range advisories {\n\t\t\tfixedVersion := version.NewVersion(adv.FixedVersion)\n\t\t\tvuln := types.DetectedVulnerability{\n\t\t\t\tVulnerabilityID: adv.VulnerabilityID,\n\t\t\t\tPkgID: pkg.ID,\n\t\t\t\tPkgName: pkg.Name,\n\t\t\t\tInstalledVersion: installed,\n\t\t\t\tPkgRef: pkg.Ref,\n\t\t\t\tLayer: pkg.Layer,\n\t\t\t\tCustom: adv.Custom,\n\t\t\t\tDataSource: adv.DataSource,\n\t\t\t}\n\t\t\tif installedVersion.LessThan(fixedVersion) {\n\t\t\t\tvuln.FixedVersion = adv.FixedVersion\n\t\t\t\tvulns = append(vulns, vuln)\n\t\t\t}\n\t\t}\n\t}\n\treturn vulns, nil\n}", "func (d *Driver) DetectVulnerabilities(pkgID, pkgName, pkgVer string) ([]types.DetectedVulnerability, error) {\n\t// e.g. \"pip::\", \"npm::\"\n\tprefix := fmt.Sprintf(\"%s::\", d.ecosystem)\n\tadvisories, err := d.dbc.GetAdvisories(prefix, vulnerability.NormalizePkgName(d.ecosystem, pkgName))\n\tif err != nil {\n\t\treturn nil, xerrors.Errorf(\"failed to get %s advisories: %w\", d.ecosystem, err)\n\t}\n\n\tvar vulns []types.DetectedVulnerability\n\tfor _, adv := range advisories {\n\t\tif !d.comparer.IsVulnerable(pkgVer, adv) {\n\t\t\tcontinue\n\t\t}\n\n\t\tvuln := types.DetectedVulnerability{\n\t\t\tVulnerabilityID: adv.VulnerabilityID,\n\t\t\tPkgID: pkgID,\n\t\t\tPkgName: pkgName,\n\t\t\tInstalledVersion: pkgVer,\n\t\t\tFixedVersion: createFixedVersions(adv),\n\t\t\tDataSource: adv.DataSource,\n\t\t}\n\t\tvulns = append(vulns, vuln)\n\t}\n\n\treturn vulns, nil\n}", "func (s *Scanner) Detect(osVer string, pkgs []ftypes.Package) ([]types.DetectedVulnerability, error) {\n\tlog.Logger.Info(\"Detecting Photon Linux vulnerabilities...\")\n\tlog.Logger.Debugf(\"Photon Linux: os version: %s\", osVer)\n\tlog.Logger.Debugf(\"Photon Linux: the number of packages: %d\", len(pkgs))\n\n\tvar vulns []types.DetectedVulnerability\n\tfor _, pkg := range pkgs {\n\t\tadvisories, err := s.vs.Get(osVer, pkg.SrcName)\n\t\tif err != nil {\n\t\t\treturn nil, xerrors.Errorf(\"failed to get Photon Linux advisory: %w\", err)\n\t\t}\n\n\t\tinstalled := utils.FormatVersion(pkg)\n\t\tinstalledVersion := version.NewVersion(installed)\n\t\tfor _, adv := range advisories {\n\t\t\tfixedVersion := version.NewVersion(adv.FixedVersion)\n\t\t\tvuln := types.DetectedVulnerability{\n\t\t\t\tVulnerabilityID: adv.VulnerabilityID,\n\t\t\t\tPkgName: pkg.Name,\n\t\t\t\tInstalledVersion: installed,\n\t\t\t\tLayer: pkg.Layer,\n\t\t\t}\n\t\t\tif installedVersion.LessThan(fixedVersion) {\n\t\t\t\tvuln.FixedVersion = adv.FixedVersion\n\t\t\t\tvulns = append(vulns, vuln)\n\t\t\t}\n\t\t}\n\t}\n\treturn vulns, nil\n}", "func GetImageVulnerabilities(c *gin.Context) {\n\n\tendPoint := imagscanEndPoint\n\timageDigest := c.Param(\"imagedigest\")\n\tif len(imageDigest) != 0 {\n\t\tendPoint = path.Join(endPoint, imageDigest)\n\t} else {\n\t\tlog.Error(\"Missing imageDigest\")\n\t\thttpStatusCode := http.StatusNotFound\n\t\tc.JSON(httpStatusCode, common.ErrorResponse{\n\t\t\tCode: httpStatusCode,\n\t\t\tMessage: \"Error\",\n\t\t\tError: \"Missing imageDigest\",\n\t\t})\n\t\treturn\n\t}\n\tendPoint = path.Join(endPoint, \"/vuln/all\")\n\tdoAnchoreGetRequest(c, endPoint)\n}", "func FindVulnerability(data []int, target int) (int, bool) {\n\tif len(data) < 2 {\n\t\treturn 0, false\n\t}\n\tfor size := 2; size < len(data); size++ {\n\t\tfor start := 0; start+size-1 < len(data); start++ {\n\t\t\tsubset := data[start : start+size]\n\t\t\tsum := 0\n\t\t\tfor _, v := range subset {\n\t\t\t\tsum += v\n\t\t\t}\n\t\t\tif sum == target {\n\t\t\t\tvar clone = make([]int, size)\n\t\t\t\tcopy(clone, subset)\n\t\t\t\tsort.Ints(clone)\n\t\t\t\treturn clone[0] + clone[size-1], true\n\t\t\t}\n\t\t}\n\t}\n\treturn 0, false\n}", "func checkScanResults(t *testing.T, spans [][]string, results []client.Result, expResults [][]string, expCount int) {\n\tcheckSpanResults(t, spans, results, expResults, expCount)\n\tcheckResumeSpanScanResults(t, spans, results, expResults, expCount)\n}", "func (s *Advisory) DetectVulnerabilities(pkgName, pkgVer string) ([]types.DetectedVulnerability, error) {\n\tref := fmt.Sprintf(\"composer://%s\", pkgName)\n\tadvisories, err := s.vs.Get(ref)\n\tif err != nil {\n\t\treturn nil, xerrors.Errorf(\"failed to get composer advisories: %w\", err)\n\t}\n\n\tvar vulns []types.DetectedVulnerability\n\tfor _, advisory := range advisories {\n\t\tvar affectedVersions []string\n\t\tvar patchedVersions []string\n\t\tfor _, branch := range advisory.Branches {\n\t\t\tfor _, version := range branch.Versions {\n\t\t\t\tif !strings.HasPrefix(version, \"<=\") && strings.HasPrefix(version, \"<\") {\n\t\t\t\t\tpatchedVersions = append(patchedVersions, strings.Trim(version, \"<\"))\n\t\t\t\t}\n\t\t\t}\n\t\t\taffectedVersions = append(affectedVersions, strings.Join(branch.Versions, \", \"))\n\t\t}\n\n\t\tadv := dbTypes.Advisory{VulnerableVersions: affectedVersions}\n\t\tif !s.comparer.IsVulnerable(pkgVer, adv) {\n\t\t\tcontinue\n\t\t}\n\n\t\tvuln := types.DetectedVulnerability{\n\t\t\tVulnerabilityID: advisory.VulnerabilityID,\n\t\t\tPkgName: pkgName,\n\t\t\tInstalledVersion: pkgVer,\n\t\t\tFixedVersion: strings.Join(patchedVersions, \", \"),\n\t\t}\n\t\tvulns = append(vulns, vuln)\n\t}\n\treturn vulns, nil\n}", "func CheckAllPodsAtATime(unsortedEntries []*InstanceEntry) []InstanceEntry {\n\tvar entriesByWastedRam = NewSortedEntriesByWastedRAM(unsortedEntries)\n\tvar res = make([]InstanceEntry, 0)\n\n\tfor _, maxWastedRamEntry := range entriesByWastedRam {\n\t\tmaxWastedRamEntry.WorkerNode.RefreshTotals()\n\n\t\tfor i := len(entriesByWastedRam) - 1; i > 0; i-- {\n\t\t\tvar instanceWithMinimumWastedRam = entriesByWastedRam[i]\n\t\t\tinstanceWithMinimumWastedRam.WorkerNode.RefreshTotals()\n\t\t\t// check that all requested memory of instance can be moved to another instance\n\t\t\tvar wastedRam = instanceWithMinimumWastedRam.RAMWasted()\n\t\t\tvar wastedCpu = instanceWithMinimumWastedRam.CPUWasted()\n\t\t\tif maxWastedRamEntry.WorkerNode.MemoryReqs() <= wastedRam && maxWastedRamEntry.WorkerNode.CpuReqs() <= wastedCpu {\n\t\t\t\t//sunset this instance\n\t\t\t\tres = append(res, *maxWastedRamEntry)\n\t\t\t\t//change memory requests of node which receive all workload\n\t\t\t\tinstanceWithMinimumWastedRam.WorkerNode.PodsResourceRequirements = append(instanceWithMinimumWastedRam.WorkerNode.PodsResourceRequirements, maxWastedRamEntry.WorkerNode.PodsResourceRequirements...)\n\t\t\t\tinstanceWithMinimumWastedRam.WorkerNode.RefreshTotals()\n\n\t\t\t\tmaxWastedRamEntry.WorkerNode.PodsResourceRequirements = nil\n\t\t\t\tmaxWastedRamEntry.WorkerNode.RefreshTotals()\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\treturn res\n}", "func TestCheckVulnerabilitiesForNextManifest(t *testing.T) {\n\ttest.WithRoundTripper(func(_ *test.RoundTripper) {\n\t\tj, s := setup(t, test.WithTrivyDouble)\n\t\ts.Clock.StepBy(1 * time.Hour)\n\n\t\t//setup two image manifests with just one content layer (we don't really care about\n\t\t//the content since our Trivy double doesn't care either)\n\t\timages := make([]test.Image, 3)\n\t\tfor idx := range images {\n\t\t\timages[idx] = test.GenerateImage(test.GenerateExampleLayer(int64(idx)))\n\t\t\timages[idx].MustUpload(t, s, fooRepoRef, \"\")\n\t\t}\n\t\t// generate a 2 MiB big image to run into blobUncompressedSizeTooBigGiB\n\t\timages = append(images, test.GenerateImage(test.GenerateExampleLayerSize(int64(2), 2)))\n\t\timages[3].MustUpload(t, s, fooRepoRef, \"\")\n\n\t\t//also setup an image list manifest containing those images (so that we have\n\t\t//some manifest-manifest refs to play with)\n\t\timageList := test.GenerateImageList(images[0], images[1])\n\t\timageList.MustUpload(t, s, fooRepoRef, \"\")\n\n\t\t//adjust too big values down to make testing easier\n\t\tblobUncompressedSizeTooBigGiB = 0.001\n\n\t\ttr, tr0 := easypg.NewTracker(t, s.DB.DbMap.Db)\n\t\ttr0.AssertEqualToFile(\"fixtures/vulnerability-check-setup.sql\")\n\n\t\ttrivyJob := j.CheckTrivySecurityStatusJob(s.Registry)\n\n\t\t//check that security check updates vulnerability status\n\t\ts.TrivyDouble.ReportFixtures[images[0].ImageRef(s, fooRepoRef)] = \"fixtures/trivy/report-vulnerable.json\"\n\t\ts.TrivyDouble.ReportFixtures[images[1].ImageRef(s, fooRepoRef)] = \"fixtures/trivy/report-clean.json\"\n\t\ts.TrivyDouble.ReportFixtures[images[2].ImageRef(s, fooRepoRef)] = \"fixtures/trivy/report-vulnerable.json\"\n\t\ts.TrivyDouble.ReportFixtures[images[3].ImageRef(s, fooRepoRef)] = \"fixtures/trivy/report-clean.json\"\n\t\ts.Clock.StepBy(5 * time.Minute)\n\t\texpectSuccess(t, trivyJob.ProcessOne(s.Ctx))\n\t\texpectError(t, sql.ErrNoRows.Error(), trivyJob.ProcessOne(s.Ctx))\n\t\ttr.DBChanges().AssertEqualf(`\n\t\t\tUPDATE blobs SET blocks_vuln_scanning = FALSE WHERE id = 1 AND account_name = 'test1' AND digest = '%[10]s';\n\t\t\tUPDATE blobs SET blocks_vuln_scanning = FALSE WHERE id = 3 AND account_name = 'test1' AND digest = '%[11]s';\n\t\t\tUPDATE blobs SET blocks_vuln_scanning = FALSE WHERE id = 5 AND account_name = 'test1' AND digest = '%[12]s';\n\t\t\tUPDATE blobs SET blocks_vuln_scanning = TRUE WHERE id = 7 AND account_name = 'test1' AND digest = '%[13]s';\n\t\t\tUPDATE trivy_security_info SET vuln_status = 'Critical', next_check_at = %[7]d, checked_at = %[6]d, check_duration_secs = 0 WHERE repo_id = 1 AND digest = '%[1]s';\n\t\t\tUPDATE trivy_security_info SET next_check_at = %[7]d, checked_at = %[6]d, check_duration_secs = 0 WHERE repo_id = 1 AND digest = '%[2]s';\n\t\t\tUPDATE trivy_security_info SET vuln_status = 'Critical', next_check_at = %[7]d, checked_at = %[6]d, check_duration_secs = 0 WHERE repo_id = 1 AND digest = '%[3]s';\n\t\t\tUPDATE trivy_security_info SET vuln_status = 'Unsupported', message = 'vulnerability scanning is not supported for uncompressed image layers above %[9]g GiB', next_check_at = %[8]d WHERE repo_id = 1 AND digest = '%[4]s';\n\t\t\tUPDATE trivy_security_info SET vuln_status = 'Clean', next_check_at = %[7]d, checked_at = %[6]d, check_duration_secs = 0 WHERE repo_id = 1 AND digest = '%[5]s';\n\t\t`, images[0].Manifest.Digest, imageList.Manifest.Digest, images[2].Manifest.Digest, images[3].Manifest.Digest, images[1].Manifest.Digest,\n\t\t\ts.Clock.Now().Unix(), s.Clock.Now().Add(60*time.Minute).Unix(), s.Clock.Now().Add(24*time.Hour).Unix(), blobUncompressedSizeTooBigGiB,\n\t\t\timages[0].Layers[0].Digest, images[1].Layers[0].Digest, images[2].Layers[0].Digest, images[3].Layers[0].Digest)\n\n\t\t// check that a changed vulnerability status does not have side effects\n\t\ts.TrivyDouble.ReportFixtures[images[1].ImageRef(s, fooRepoRef)] = \"fixtures/trivy/report-vulnerable.json\"\n\t\ts.Clock.StepBy(1 * time.Hour)\n\t\texpectSuccess(t, trivyJob.ProcessOne(s.Ctx))\n\t\texpectError(t, sql.ErrNoRows.Error(), trivyJob.ProcessOne(s.Ctx))\n\t\ttr.DBChanges().AssertEqualf(`\n\t\t\tUPDATE trivy_security_info SET next_check_at = %[6]d, checked_at = %[5]d WHERE repo_id = 1 AND digest = '%[1]s';\n\t\t\tUPDATE trivy_security_info SET vuln_status = 'Critical', next_check_at = %[6]d, checked_at = %[5]d WHERE repo_id = 1 AND digest = '%[2]s';\n\t\t\tUPDATE trivy_security_info SET next_check_at = %[6]d, checked_at = %[5]d WHERE repo_id = 1 AND digest = '%[3]s';\n\t\t\tUPDATE trivy_security_info SET vuln_status = 'Critical', next_check_at = %[6]d, checked_at = %[5]d WHERE repo_id = 1 AND digest = '%[4]s';\n\t\t`, images[0].Manifest.Digest, imageList.Manifest.Digest, images[2].Manifest.Digest, images[1].Manifest.Digest,\n\t\t\ts.Clock.Now().Unix(), s.Clock.Now().Add(1*time.Hour).Unix(),\n\t\t)\n\t})\n}", "func TicketScanningError(tickets []string, rules Rules) int {\n\tsum := 0\n\tfor _, ticketString := range tickets {\n\t\tticket := ParseTicket(ticketString)\n\t\tfor _, v := range ticket {\n\t\t\tif len(rules.ruleMatches(v)) == 0 {\n\t\t\t\tsum += v\n\t\t\t}\n\t\t}\n\t}\n\n\treturn sum\n}", "func (s *Advisory) DetectVulnerabilities(pkgName, pkgVer string) ([]types.DetectedVulnerability, error) {\n\tadvisories, err := s.vs.Get(pkgName)\n\tif err != nil {\n\t\treturn nil, xerrors.Errorf(\"failed to get ghsa advisories: %w\", err)\n\t}\n\n\tvar vulns []types.DetectedVulnerability\n\tfor _, advisory := range advisories {\n\t\tadv := dbTypes.Advisory{VulnerableVersions: advisory.VulnerableVersions}\n\t\tif !s.comparer.IsVulnerable(pkgVer, adv) {\n\t\t\tcontinue\n\t\t}\n\n\t\tvuln := types.DetectedVulnerability{\n\t\t\tVulnerabilityID: advisory.VulnerabilityID,\n\t\t\tPkgName: pkgName,\n\t\t\tInstalledVersion: pkgVer,\n\t\t\tFixedVersion: strings.Join(advisory.PatchedVersions, \", \"),\n\t\t}\n\t\tvulns = append(vulns, vuln)\n\t}\n\n\treturn vulns, nil\n}", "func (c CurrectConnections) checkForPortScans(referenceTime time.Time) []PortScan {\n\ttype portsWithTimestamp struct {\n\t\tPorts []int\n\t\tTimestamp time.Time\n\t}\n\n\tscanMap := make(map[string]map[string]portsWithTimestamp, 0)\n\n\t// For each local address, build a map of remote addresses and the port they connected to.\n\tfor _, connection := range c.connections {\n\t\t// Ignore connections outside the detection period\n\t\tif referenceTime.Sub(connection.timestamp) > portScanDetectionPeriod {\n\t\t\tcontinue\n\t\t}\n\t\t_, ok := scanMap[connection.localAddress]\n\t\tif !ok {\n\t\t\tscanMap[connection.localAddress] = map[string]portsWithTimestamp{\n\t\t\t\tconnection.remoteAddress: {Ports: make([]int, 0), Timestamp: connection.timestamp},\n\t\t\t}\n\t\t}\n\t\tpwt := scanMap[connection.localAddress][connection.remoteAddress]\n\t\tpwt.Ports = append(pwt.Ports, int(connection.localPort))\n\t\t// update timestamp to match latest connection attempt\n\t\tif connection.timestamp.After(pwt.Timestamp) {\n\t\t\tpwt.Timestamp = connection.timestamp\n\t\t}\n\n\t\tscanMap[connection.localAddress][connection.remoteAddress] = pwt\n\t}\n\n\t// Look through the map for local/remote address combinations that have mroe than 3 port connections.\n\tscans := make([]PortScan, 0)\n\tfor localAddress, remoteAddressMap := range scanMap {\n\t\tfor remoteAddress, pwt := range remoteAddressMap {\n\t\t\tif (len(pwt.Ports) >= portScanDetectionCount) && (pwt.Timestamp.Equal(referenceTime)) {\n\t\t\t\tscan := PortScan{\n\t\t\t\t\tlocalAddress: localAddress, remoteAddress: remoteAddress, ports: pwt.Ports, timestamp: referenceTime,\n\t\t\t\t}\n\t\t\t\tscans = append(scans, scan)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn scans\n}", "func (o ScanRunOutput) HasVulnerabilities() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ScanRun) *bool { return v.HasVulnerabilities }).(pulumi.BoolPtrOutput)\n}", "func (o ScanRunOutput) HasVulnerabilities() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ScanRun) *bool { return v.HasVulnerabilities }).(pulumi.BoolPtrOutput)\n}", "func (o ScanRunResponseOutput) HasVulnerabilities() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v ScanRunResponse) bool { return v.HasVulnerabilities }).(pulumi.BoolOutput)\n}", "func (o ScanRunResponseOutput) HasVulnerabilities() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v ScanRunResponse) bool { return v.HasVulnerabilities }).(pulumi.BoolOutput)\n}", "func Scan(ctx context.Context, packageJSON, packageLock []byte) ([]Vulnerability, error) {\n\tresult, err := Audit(ctx, packageJSON, packageLock)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpkg, err := parsePackage(packageJSON)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn transform(result, pkg), nil\n}", "func (p *preImpl) checkUsable(ctx context.Context, pkgs map[string]struct{}) error {\n\tctx, st := timing.Start(ctx, \"check_arc\")\n\tdefer st.End()\n\n\tctx, cancel := context.WithTimeout(ctx, 5*time.Second)\n\tdefer cancel()\n\n\t// Check that the init process is the same as before. Otherwise, ARC was probably restarted.\n\tif pid, err := InitPID(); err != nil {\n\t\treturn err\n\t} else if pid != p.origInitPID {\n\t\treturn errors.Errorf(\"init process changed from %v to %v; probably crashed\", p.origInitPID, pid)\n\t}\n\n\t// Check that the package manager service is running.\n\tconst pkg = \"android\"\n\tif _, ok := pkgs[pkg]; !ok {\n\t\treturn errors.Errorf(\"pm didn't list %q among %d package(s)\", pkg, len(pkgs))\n\t}\n\n\t// TODO(nya): Should we also check that p.cr is still usable?\n\treturn nil\n}", "func checkResults(max int, c chan string) {\n\tcurrent := 0\n\tfor {\n\t\tfmt.Print(<-c + \", \")\n\t\tcurrent++\n\t\tif current == max {\n\t\t\tfmt.Println(\"\\n\\nDone scanning, checking MACs...\")\n\t\t\tbreak\n\t\t}\n\t}\n\n\t// execute arp -a and grap output of it\n\toutput, _ := exec.Command(\"arp\", \"-a\").Output()\n\tsplitted := strings.Split(string(output), \"\\n\")\n\n\t// get lines with cockpit/a4w MACs\n\tfmt.Println(\"IPs matching Cockpit/A4W MAC:\")\n\tfor _, v := range splitted {\n\t\tmatch := strings.TrimSpace(arpPattern.FindString(v))\n\t\tif len(match) > 5{\n\t\t\tfmt.Println(strings.TrimSpace(arpPattern.FindString(match)))\t\t\n\t\t}\n\t}\n}", "func (dd *DynamoDBManager) Detect(metrics []config.MetricConfig) (interface{}, error) {\n\n\tlog.WithFields(log.Fields{\n\t\t\"region\": dd.awsManager.GetRegion(),\n\t\t\"resource\": \"dynamoDB\",\n\t}).Info(\"starting to analyze resource\")\n\n\tdd.awsManager.GetCollector().CollectStart(dd.Name)\n\n\tdetectedTables := []DetectedAWSDynamoDB{}\n\ttables, err := dd.describeTables(nil, nil)\n\n\tif err != nil {\n\t\tlog.WithField(\"error\", err).Error(\"could not describe dynamoDB tables\")\n\t\tdd.awsManager.GetCollector().CollectError(dd.Name, err)\n\t\treturn detectedTables, err\n\t}\n\n\twritePricePerHour, err := dd.awsManager.GetPricingClient().GetPrice(dd.getPricingWriteFilterInput(), dd.rateCode, dd.awsManager.GetRegion())\n\tif err != nil {\n\t\tlog.WithField(\"error\", err).Error(\"could not get write dynamoDB price\")\n\t\tdd.awsManager.GetCollector().CollectError(dd.Name, err)\n\t\treturn detectedTables, err\n\t}\n\n\treadPricePerHour, err := dd.awsManager.GetPricingClient().GetPrice(dd.getPricingReadFilterInput(), dd.rateCode, dd.awsManager.GetRegion())\n\tif err != nil {\n\t\tlog.WithField(\"error\", err).Error(\"could not get read dynamoDB price\")\n\t\tdd.awsManager.GetCollector().CollectError(dd.Name, err)\n\t\treturn detectedTables, err\n\t}\n\n\tnow := time.Now()\n\tfor _, table := range tables {\n\n\t\tlog.WithField(\"table_name\", *table.TableName).Debug(\"checking dynamodb table\")\n\n\t\tfor _, metric := range metrics {\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"table_name\": *table.TableName,\n\t\t\t\t\"metric_name\": metric.Description,\n\t\t\t}).Debug(\"check metric\")\n\n\t\t\tperiod := int64(metric.Period.Seconds())\n\t\t\tmetricEndTime := now.Add(time.Duration(-metric.StartTime))\n\n\t\t\tmetricInput := awsCloudwatch.GetMetricStatisticsInput{\n\t\t\t\tNamespace: &dd.namespace,\n\t\t\t\tMetricName: &metric.Description,\n\t\t\t\tPeriod: &period,\n\t\t\t\tStartTime: &metricEndTime,\n\t\t\t\tEndTime: &now,\n\t\t\t\tDimensions: []*awsCloudwatch.Dimension{\n\t\t\t\t\t{\n\t\t\t\t\t\tName: awsClient.String(\"TableName\"),\n\t\t\t\t\t\tValue: table.TableName,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t}\n\n\t\t\tformulaValue, metricsResponseValues, err := dd.awsManager.GetCloudWatchClient().GetMetric(&metricInput, metric)\n\t\t\tif err != nil {\n\t\t\t\tlog.WithError(err).WithFields(log.Fields{\n\t\t\t\t\t\"table_name\": *table.TableName,\n\t\t\t\t\t\"metric_name\": metric.Description,\n\t\t\t\t}).Error(\"Could not get cloudwatch metric data\")\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\texpression, err := expression.BoolExpression(formulaValue, metric.Constraint.Value, metric.Constraint.Operator)\n\t\t\tif err != nil {\n\t\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\t\"table_name\": *table.TableName,\n\t\t\t\t\t\"formula_value\": formulaValue,\n\t\t\t\t\t\"metric_constraint_value\": metric.Constraint.Value,\n\t\t\t\t\t\"metric_constraint_operator\": metric.Constraint.Operator,\n\t\t\t\t}).Error(\"bool expression error\")\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif expression {\n\n\t\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\t\"metric_name\": metric.Description,\n\t\t\t\t\t\"constraint_operator\": metric.Constraint.Operator,\n\t\t\t\t\t\"constraint_Value\": metric.Constraint.Value,\n\t\t\t\t\t\"formula_value\": formulaValue,\n\t\t\t\t\t\"name\": *table.TableName,\n\t\t\t\t\t\"region\": dd.awsManager.GetRegion(),\n\t\t\t\t}).Info(\"DynamoDB table detected as unutilized resource\")\n\n\t\t\t\tvar pricePerHour float64\n\t\t\t\tvar pricePerMonth float64\n\t\t\t\tif strings.Contains(metric.Description, \"write capacity\") {\n\t\t\t\t\tprovisionedWriteCapacityUnits := metricsResponseValues[\"ProvisionedWriteCapacityUnits\"].(float64)\n\t\t\t\t\tpricePerHour = writePricePerHour\n\t\t\t\t\tpricePerMonth = provisionedWriteCapacityUnits * pricePerHour * collector.TotalMonthHours\n\t\t\t\t} else if strings.Contains(metric.Description, \"read capacity\") {\n\t\t\t\t\tprovisionedReadCapacityUnits := metricsResponseValues[\"ProvisionedReadCapacityUnits\"].(float64)\n\t\t\t\t\tpricePerHour = readPricePerHour\n\t\t\t\t\tpricePerMonth = provisionedReadCapacityUnits * pricePerHour * collector.TotalMonthHours\n\t\t\t\t} else {\n\t\t\t\t\tlog.Warn(\"metric name not supported\")\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\ttags, err := dd.client.ListTagsOfResource(&dynamodb.ListTagsOfResourceInput{\n\t\t\t\t\tResourceArn: table.TableArn,\n\t\t\t\t})\n\n\t\t\t\ttagsData := map[string]string{}\n\t\t\t\tif err == nil {\n\t\t\t\t\tfor _, tag := range tags.Tags {\n\t\t\t\t\t\ttagsData[*tag.Key] = *tag.Value\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tdetectedDynamoDBTable := DetectedAWSDynamoDB{\n\t\t\t\t\tRegion: dd.awsManager.GetRegion(),\n\t\t\t\t\tMetric: metric.Description,\n\t\t\t\t\tName: *table.TableName,\n\t\t\t\t\tPriceDetectedFields: collector.PriceDetectedFields{\n\t\t\t\t\t\tResourceID: *table.TableArn,\n\t\t\t\t\t\tLaunchTime: *table.CreationDateTime,\n\t\t\t\t\t\tPricePerHour: pricePerHour,\n\t\t\t\t\t\tPricePerMonth: pricePerMonth,\n\t\t\t\t\t\tTag: tagsData,\n\t\t\t\t\t},\n\t\t\t\t}\n\n\t\t\t\tdd.awsManager.GetCollector().AddResource(collector.EventCollector{\n\t\t\t\t\tResourceName: dd.Name,\n\t\t\t\t\tData: detectedDynamoDBTable,\n\t\t\t\t})\n\n\t\t\t\tdetectedTables = append(detectedTables, detectedDynamoDBTable)\n\n\t\t\t}\n\t\t}\n\t}\n\n\tdd.awsManager.GetCollector().CollectFinish(dd.Name)\n\n\treturn detectedTables, nil\n\n}", "func (v *Vulnerability) PrepareFromACRImageScan(acrResponse ACRResponse) {\n\tif acrResponse.Properties.ID == \"\" {\n\t\treturn\n\t}\n\tv.Description = acrResponse.Properties.Description\n\tif acrResponse.Properties.AdditionalData.Cve != nil && len(acrResponse.Properties.AdditionalData.Cve) >= 1 {\n\t\tv.VulnerabilityID = acrResponse.Properties.AdditionalData.Cve[0].Title\n\t\tv.PrimaryURL = acrResponse.Properties.AdditionalData.Cve[0].Link\n\t}\n\tif v.PrimaryURL == \"\" {\n\t\tv.PrimaryURL = primaryURL + v.VulnerabilityID\n\t}\n\n\tv.Severity = strings.ToUpper(acrResponse.Properties.Status.Severity)\n\tvendorCVSS := make(VendorCVSS)\n\tcvss := CVSS{\n\t\tV2Score: acrResponse.Properties.AdditionalData.Cvss.V2.Base,\n\t\tV3Score: acrResponse.Properties.AdditionalData.Cvss.V3.Base,\n\t}\n\tvendorCVSS[nvd] = cvss\n\tv.CVSS = vendorCVSS\n}", "func (s *vulnerabilityLister) Vulnerabilities(namespace string) VulnerabilityNamespaceLister {\n\treturn vulnerabilityNamespaceLister{indexer: s.indexer, namespace: namespace}\n}", "func (m *Smart) scan() ([]string, error) {\n\tout, err := runCmd(m.UseSudo, m.Path, \"--scan\")\n\tif err != nil {\n\t\treturn []string{}, fmt.Errorf(\"failed to run command '%s --scan': %s - %s\", m.Path, err, string(out))\n\t}\n\n\tdevices := []string{}\n\tfor _, line := range strings.Split(string(out), \"\\n\") {\n\t\tdev := strings.Split(line, \" \")\n\t\tif len(dev) > 1 && !excludedDev(m.Excludes, strings.TrimSpace(dev[0])) {\n\t\t\tlog.Printf(\"D! [inputs.smart] adding device: %+#v\", dev)\n\t\t\tdevices = append(devices, strings.TrimSpace(dev[0]))\n\t\t} else {\n\t\t\tlog.Printf(\"D! [inputs.smart] skipping device: %+#v\", dev)\n\t\t}\n\t}\n\treturn devices, nil\n}", "func (s *Scanner) Scan() map[string][]string {\n\tif len(s.descriptionsByID) == 0 {\n\t\ts.log.Debug(\"scanner has no descriptions, ignoring scan\")\n\t\treturn map[string][]string{}\n\t}\n\n\ts.log.Debug(\"ip4v scanner beginning scan\", \"interfaces\", s.interfaces, \"target_descriptions\", s.descriptionsByID)\n\tfoundServices := make(map[string][]string)\n\tflock := sync.Mutex{} // protects foundServices\n\tvar wg sync.WaitGroup\n\tvar numChecked, numFound, numAlreadyInUse int\n\n\ts.ilock.RLock()\n\tdefer s.ilock.RUnlock()\n\tfor name, intf := range s.interfaces {\n\t\taddrs, err := intf.Addrs()\n\t\tif err != nil {\n\t\t\tpanic(\"could not get addresses from \" + name + \": \" + err.Error())\n\t\t}\n\t\ts.log.Debug(\"ip4v scanner scanning interface\", \"interface\", name, \"num_addrs\", len(addrs))\n\t\tfor _, a := range addrs {\n\t\t\tswitch v := a.(type) {\n\t\t\tcase *net.IPAddr:\n\t\t\t\ts.log.Warn(\"ipv4 scanner got a *net.IPAddr, which isn't useful and maybe shoudln't happen?\", \"interface\", intf.Name, \"*net.IPAddr\", v)\n\t\t\tcase *net.IPNet:\n\t\t\t\tif v.IP.DefaultMask() != nil { // ignore IPs without default mask (IPv6?)\n\t\t\t\t\tip := v.IP\n\n\t\t\t\t\tfor ip := ip.Mask(v.Mask); v.Contains(ip); incrementIP(ip) {\n\t\t\t\t\t\twg.Add(1)\n\t\t\t\t\t\tnumChecked++\n\n\t\t\t\t\t\t// To save space, try and only use 4 bytes\n\t\t\t\t\t\tif x := ip.To4(); x != nil {\n\t\t\t\t\t\t\tip = x\n\t\t\t\t\t\t}\n\t\t\t\t\t\tdup := make(net.IP, len(ip)) // make a copy of the IP ([]byte)\n\t\t\t\t\t\tcopy(dup, ip)\n\t\t\t\t\t\tgo func() {\n\t\t\t\t\t\t\tdefer wg.Done()\n\t\t\t\t\t\t\ts.slock.RLock()\n\t\t\t\t\t\t\t_, ok := s.activeServicesByIP[dup.String()] // ignore IPs already in use\n\t\t\t\t\t\t\ts.slock.RUnlock()\n\n\t\t\t\t\t\t\tif ok { // ignore IPs already in use\n\t\t\t\t\t\t\t\ts.log.Debug(\"scanner ignoring IP that is already in use\", \"ip\", dup.String())\n\t\t\t\t\t\t\t\tnumAlreadyInUse++\n\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\tids := s.getMatchingDescriptions(dup)\n\t\t\t\t\t\t\t\tif len(ids) > 0 { // At least one service matches\n\t\t\t\t\t\t\t\t\ts.log.Debug(\"found possible matches for ipv4 service\", \"num_matches\", len(ids), \"matching_ids\", ids)\n\t\t\t\t\t\t\t\t\tnumFound++\n\t\t\t\t\t\t\t\t\tflock.Lock()\n\t\t\t\t\t\t\t\t\tfoundServices[dup.String()] = ids\n\t\t\t\t\t\t\t\t\tflock.Unlock()\n\t\t\t\t\t\t\t\t\ts.slock.Lock()\n\t\t\t\t\t\t\t\t\ts.activeServicesByIP[dup.String()] = struct{}{} // mark IP as in use\n\t\t\t\t\t\t\t\t\ts.slock.Unlock()\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}()\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\ts.log.Warn(\"ipv4 scanner encountered address of unknown type\", \"type\", fmt.Sprintf(\"%T\", a))\n\t\t\t}\n\t\t}\n\t}\n\ts.log.Debug(\"ipv4 scanner waiting for waitgroup to finish\")\n\twg.Wait()\n\ts.log.Debug(\"ipv4 scanner done waiting (all waitgroup items completed)\")\n\ts.log.Info(\"ipv4 scan complete\", \"ips_checked\", numChecked, \"possibilities_found\", numFound, \"ips_already_in_use\", numAlreadyInUse)\n\treturn foundServices\n}", "func groomDiscoveredBdevs(reqDevs *hardware.PCIAddressSet, discovered storage.NvmeControllers, vmdEnabled bool) (storage.NvmeControllers, error) {\n\t// if the request does not specify a device filter, return all discovered controllers\n\tif reqDevs.IsEmpty() {\n\t\treturn discovered, nil\n\t}\n\n\tvar missing hardware.PCIAddressSet\n\tout := make(storage.NvmeControllers, 0)\n\n\tvar vmds map[string]storage.NvmeControllers\n\tif vmdEnabled {\n\t\tvmdMap, err := mapVMDToBackingDevs(discovered)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvmds = vmdMap\n\t}\n\n\tfor _, want := range reqDevs.Addresses() {\n\t\tfound := false\n\t\tfor _, got := range discovered {\n\t\t\t// check if discovered ctrlr is in device list\n\t\t\tif got.PciAddr == want.String() {\n\t\t\t\tout = append(out, got)\n\t\t\t\tfound = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\tif !found && vmdEnabled {\n\t\t\t// check if discovered ctrlr is backing devices for vmd in device list\n\t\t\tif backing, exists := vmds[want.String()]; exists {\n\t\t\t\tout = append(out, backing...)\n\t\t\t\tfound = true\n\t\t\t}\n\t\t}\n\n\t\tif !found {\n\t\t\tif err := missing.Add(want); err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t}\n\n\tif !missing.IsEmpty() {\n\t\treturn nil, storage.FaultBdevNotFound(missing.Strings()...)\n\t}\n\n\treturn out, nil\n}", "func (v *Vulnerability) PrepareFromGCRImageScan(gcpVulnerability *grafeaspb.Occurrence) {\n\tvul := gcpVulnerability.GetVulnerability()\n\tv.Type = vul.GetType()\n\tpkgIssue := vul.GetPackageIssue()\n\tfor _, pkg := range pkgIssue {\n\t\tv.PkgName = pkg.GetAffectedPackage()\n\t\tv.InstalledVersion = pkg.GetAffectedVersion().GetFullName()\n\t\tv.FixedVersion = pkg.GetFixedVersion().GetFullName()\n\t}\n\n\tv.Severity = strings.ToUpper(vul.GetSeverity().String())\n\tv.Description = vul.GetLongDescription()\n\tnoteURL := gcpVulnerability.GetNoteName()\n\tnoteURLSlice := strings.Split(noteURL, \"/\")\n\tif len(noteURLSlice) > 0 {\n\t\tv.VulnerabilityID = noteURLSlice[len(noteURLSlice)-1]\n\t}\n\tfor _, url := range vul.GetRelatedUrls() {\n\t\tv.References = append(v.References, url.GetUrl())\n\t}\n\tif v.PrimaryURL == \"\" {\n\t\tv.PrimaryURL = primaryURL + v.VulnerabilityID\n\t}\n\tcvss := CVSS{\n\t\tV2Score: float64(vul.GetCvssScore()),\n\t}\n\tvendorCVSS := make(VendorCVSS)\n\tvendorCVSS[nvd] = cvss\n\tv.CVSS = vendorCVSS\n}", "func handleScan(domains []hooks.DomainsReachable, internalChannel chan hooks.InternalMessage) []hooks.DomainsReachable {\n\tfor (len(manager.Errors) > 0 || len(domains) > 0) && int(manager.Status.GetCurrentScans()) < manager.MaxParallelScans {\n\t\tmanager.FirstScan = true\n\t\tvar scanMsg hooks.InternalMessage\n\t\tvar retDom = domains\n\t\tvar scan hooks.DomainsReachable\n\t\t// pop fist domain\n\t\tif manager.CheckDoError() && len(manager.Errors) != 0 {\n\t\t\tscanMsg, manager.Errors = manager.Errors[0], manager.Errors[1:]\n\t\t\tmanager.Logger.Tracef(\"Retrying failed assessment next: %v\", scanMsg.Domain.DomainName)\n\t\t} else if len(domains) != 0 {\n\t\t\tscan, retDom = domains[0], domains[1:]\n\t\t\tscanMsg = hooks.InternalMessage{\n\t\t\t\tDomain: scan,\n\t\t\t\tResults: nil,\n\t\t\t\tRetries: 0,\n\t\t\t\tStatusCode: hooks.InternalNew,\n\t\t\t}\n\t\t\tmanager.Logger.Tracef(\"Trying new assessment next: %v\", scanMsg.Domain.DomainName)\n\t\t} else {\n\t\t\tmanager.Logger.Tracef(\"No new assessment started\")\n\t\t\treturn domains\n\t\t}\n\t\tmanager.Logger.Debugf(\"Started assessment for %v\", scanMsg.Domain.DomainName)\n\t\tgo assessment(scanMsg, internalChannel)\n\t\tmanager.Status.AddCurrentScans(1)\n\t\treturn retDom\n\t}\n\tmanager.Logger.Tracef(\"no new Assessment started\")\n\treturn domains\n}", "func manifestScanned(ctx context.Context, db *sqlx.DB, hash claircore.Digest, scnrs indexer.VersionedScanners) (bool, error) {\n\tconst (\n\t\tselectScanner = `\n\t\tSELECT id\n\t\tFROM scanner\n\t\tWHERE name = $1\n\t\t AND version = $2\n\t\t AND kind = $3;\n\t\t`\n\t\tselectScanned = `SELECT scanner_id FROM scanned_manifest WHERE manifest_hash = $1;`\n\t)\n\n\t// TODO Use passed-in Context.\n\t// get the ids of the scanners we are testing for.\n\tvar expectedIDs []int64\n\tfor _, scnr := range scnrs {\n\t\tvar id int64\n\t\trow := db.QueryRowx(selectScanner, scnr.Name(), scnr.Version(), scnr.Kind())\n\t\terr := row.Scan(&id)\n\t\tif err != nil {\n\t\t\treturn false, fmt.Errorf(\"store:manifestScanned failed to retrieve expected scanner id for scnr %v: %v\", scnr, err)\n\t\t}\n\t\texpectedIDs = append(expectedIDs, id)\n\t}\n\n\t// get a map of the found ids which have scanned this package\n\tvar temp = []int64{}\n\tvar foundIDs = map[int64]struct{}{}\n\terr := db.Select(&temp, selectScanned, hash)\n\tif err != nil {\n\t\treturn false, fmt.Errorf(\"store:manifestScanned failed to select scanner IDs for manifest: %v\", err)\n\t}\n\n\t// if we are unable to find any scanner ids for this manifest hash, we have\n\t// never scanned this manifest.\n\tif len(temp) == 0 {\n\t\treturn false, nil\n\t}\n\n\t// create foundIDs map from temporary array\n\tfor _, id := range temp {\n\t\tfoundIDs[id] = struct{}{}\n\t}\n\n\t// compare the expectedIDs array with our foundIDs. if we get a lookup\n\t// miss we can say the manifest has not been scanned by all the layers provided\n\tfor _, id := range expectedIDs {\n\t\tif _, ok := foundIDs[id]; !ok {\n\t\t\treturn false, nil\n\t\t}\n\t}\n\n\treturn true, nil\n}", "func checkListeners(cli kube.CLIClient, namespace string) (diag.Messages, error) {\n\tpods, err := cli.Kube().CoreV1().Pods(namespace).List(context.Background(), metav1.ListOptions{\n\t\t// Find all running pods\n\t\tFieldSelector: \"status.phase=Running\",\n\t\t// Find all injected pods. We don't care about non-injected pods, because the new behavior\n\t\t// mirrors Kubernetes; this is only a breaking change for existing Istio users.\n\t\tLabelSelector: \"security.istio.io/tlsMode=istio\",\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar messages diag.Messages = make([]diag.Message, 0)\n\tg := errgroup.Group{}\n\n\tsem := semaphore.NewWeighted(25)\n\tfor _, pod := range pods.Items {\n\t\tpod := pod\n\t\tif !fromLegacyNetworkingVersion(pod) {\n\t\t\t// Skip check. This pod is already on a version where the change has been made; if they were going\n\t\t\t// to break they would already be broken.\n\t\t\tcontinue\n\t\t}\n\t\tg.Go(func() error {\n\t\t\t_ = sem.Acquire(context.Background(), 1)\n\t\t\tdefer sem.Release(1)\n\t\t\t// Fetch list of all clusters to get which ports we care about\n\t\t\tresp, err := cli.EnvoyDo(context.Background(), pod.Name, pod.Namespace, \"GET\", \"config_dump?resource=dynamic_active_clusters&mask=cluster.name\")\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(\"failed to get config dump: \", err)\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\tports, err := extractInboundPorts(resp)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(\"failed to get ports: \", err)\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\t// Next, look at what ports the pod is actually listening on\n\t\t\t// This requires parsing the output from ss; the version we use doesn't support JSON\n\t\t\tout, _, err := cli.PodExec(pod.Name, pod.Namespace, \"istio-proxy\", \"ss -ltnH\")\n\t\t\tif err != nil {\n\t\t\t\tif strings.Contains(err.Error(), \"executable file not found\") {\n\t\t\t\t\t// Likely distroless or other custom build without ss. Nothing we can do here...\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\t\t\t\tfmt.Println(\"failed to get listener state: \", err)\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\tfor _, ss := range strings.Split(out, \"\\n\") {\n\t\t\t\tif len(ss) == 0 {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tbind, port, err := net.SplitHostPort(getColumn(ss, 3))\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Println(\"failed to get parse state: \", err)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tip, _ := netip.ParseAddr(bind)\n\t\t\t\tportn, _ := strconv.Atoi(port)\n\t\t\t\tif _, f := ports[portn]; f {\n\t\t\t\t\tc := ports[portn]\n\t\t\t\t\tif bind == \"\" {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t} else if bind == \"*\" || ip.IsUnspecified() {\n\t\t\t\t\t\tc.Wildcard = true\n\t\t\t\t\t} else if ip.IsLoopback() {\n\t\t\t\t\t\tc.Lo = true\n\t\t\t\t\t} else {\n\t\t\t\t\t\tc.Explicit = true\n\t\t\t\t\t}\n\t\t\t\t\tports[portn] = c\n\t\t\t\t}\n\t\t\t}\n\n\t\t\torigin := &kube3.Origin{\n\t\t\t\tType: gvk.Pod,\n\t\t\t\tFullName: resource.FullName{\n\t\t\t\t\tNamespace: resource.Namespace(pod.Namespace),\n\t\t\t\t\tName: resource.LocalName(pod.Name),\n\t\t\t\t},\n\t\t\t\tResourceVersion: resource.Version(pod.ResourceVersion),\n\t\t\t}\n\t\t\tfor port, status := range ports {\n\t\t\t\t// Binding to localhost no longer works out of the box on Istio 1.10+, give them a warning.\n\t\t\t\tif status.Lo {\n\t\t\t\t\tmessages.Add(msg.NewLocalhostListener(&resource.Instance{Origin: origin}, fmt.Sprint(port)))\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn nil\n\t\t})\n\t}\n\tif err := g.Wait(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn messages, nil\n}", "func (a *Auditor) Check(tokenRequest *driver.TokenRequest, tokenRequestMetadata *driver.TokenRequestMetadata, inputTokens [][]*token.Token, txID string) error {\n\t// De-obfuscate issue requests\n\toutputsFromIssue, err := a.GetAuditInfoForIssuesFunc(tokenRequest.Issues, tokenRequestMetadata.Issues)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"failed getting audit info for issues\")\n\t}\n\t// check validity of issue requests\n\terr = a.CheckIssueRequests(outputsFromIssue, txID)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"failed checking issues\")\n\t}\n\t// De-odfuscate transfer requests\n\tauditableInputs, outputsFromTransfer, err := a.GetAuditInfoForTransfersFunc(tokenRequest.Transfers, tokenRequestMetadata.Transfers, inputTokens)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"failed getting audit info for transfers\")\n\t}\n\t// check validity of transfer requests\n\tif err := a.CheckTransferRequests(auditableInputs, outputsFromTransfer, txID); err != nil {\n\t\treturn errors.Wrapf(err, \"failed checking transfers\")\n\t}\n\n\treturn nil\n}", "func (o ScanRunPtrOutput) HasVulnerabilities() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ScanRun) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.HasVulnerabilities\n\t}).(pulumi.BoolPtrOutput)\n}", "func (o ScanRunPtrOutput) HasVulnerabilities() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ScanRun) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.HasVulnerabilities\n\t}).(pulumi.BoolPtrOutput)\n}", "func (s Scanner) Scan(ctx context.Context, target, artifactKey string, blobKeys []string, opts types.ScanOptions) (types.Results, ftypes.OS, error) {\n\tctx = WithCustomHeaders(ctx, s.customHeaders)\n\n\t// Convert to the rpc struct\n\tlicenseCategories := map[string]*rpc.Licenses{}\n\tfor category, names := range opts.LicenseCategories {\n\t\tlicenseCategories[string(category)] = &rpc.Licenses{Names: names}\n\t}\n\n\tvar res *rpc.ScanResponse\n\terr := r.Retry(func() error {\n\t\tvar err error\n\t\tres, err = s.client.Scan(ctx, &rpc.ScanRequest{\n\t\t\tTarget: target,\n\t\t\tArtifactId: artifactKey,\n\t\t\tBlobIds: blobKeys,\n\t\t\tOptions: &rpc.ScanOptions{\n\t\t\t\tVulnType: opts.VulnType,\n\t\t\t\tScanners: xstrings.ToStringSlice(opts.Scanners),\n\t\t\t\tListAllPackages: opts.ListAllPackages,\n\t\t\t\tLicenseCategories: licenseCategories,\n\t\t\t\tIncludeDevDeps: opts.IncludeDevDeps,\n\t\t\t},\n\t\t})\n\t\treturn err\n\t})\n\tif err != nil {\n\t\treturn nil, ftypes.OS{}, xerrors.Errorf(\"failed to detect vulnerabilities via RPC: %w\", err)\n\t}\n\n\treturn r.ConvertFromRPCResults(res.Results), r.ConvertFromRPCOS(res.Os), nil\n}", "func ScanDevices() []FoundDevice {\n\tctx := gousb.NewContext()\n\tctx.Debug(0)\n\tdefer ctx.Close()\n\t// Get the list of device that match TMK's vendor id\n\tdevs, _ := ctx.OpenDevices(isSupported)\n\tvar devices = []FoundDevice{}\n\tfor _, dev := range devs {\n\n\t\tmetadata, _ := getMetdata(dev.Desc)\n\t\tdevices = append(devices, FoundDevice{\n\t\t\tStatus: &DeviceStatus{isDfu: metadata.Name == \"dfu\"},\n\t\t\tDescription: dev.Desc,\n\t\t\tMetadata: metadata,\n\t\t})\n\t}\n\tfor _, d := range devs {\n\t\td.Close()\n\t}\n\treturn devices\n}", "func energyScanComplete() {\r\n\tcutoff := byte(0xFF)\r\n\tcandidateCount := byte(0)\r\n\tvar channelIndex byte\r\n\tvar i int\r\n\r\n\t// cutoff = min energy + ENERGY_SCAN_FUZZ\r\n\tfor i = 0; i < EMBER_NUM_802_15_4_CHANNELS; i++ {\r\n\t\tif channelEnergies[i] < cutoff-ENERGY_SCAN_FUZZ {\r\n\t\t\tcutoff = channelEnergies[i] + ENERGY_SCAN_FUZZ\r\n\t\t}\r\n\t}\r\n\r\n\t// There must be at least one channel,\r\n\t// so there will be at least one candidate.\r\n\t// 能量低于cutoff的频道比较适合创建新的网络\r\n\tfor i = 0; i < EMBER_NUM_802_15_4_CHANNELS; i++ {\r\n\t\tif channelEnergies[i] < cutoff {\r\n\t\t\tcandidateCount++\r\n\t\t}\r\n\t}\r\n\r\n\t// If for some reason we never got any energy scan results\r\n\t// then our candidateCount will be 0. We want to avoid that case and\r\n\t// bail out (since we will do a divide by 0 below)\r\n\tif candidateCount == 0 {\r\n\t\tformAndJoinScanType = FORM_AND_JOIN_NOT_SCANNING\r\n\t\tcommon.Log.Error(\"never got any energy scan results\")\r\n\t\treturn\r\n\t}\r\n\r\n\t// 在这些candidate中随机取第channelIndex个\r\n\tchannelIndex = byte(rand.Uint32()) % candidateCount\r\n\tncpFormTrace(\"cutoff=%d rand select %d\", cutoff, channelIndex)\r\n\r\n\tfor i = 0; i < EMBER_NUM_802_15_4_CHANNELS; i++ {\r\n\t\tif channelEnergies[i] < cutoff {\r\n\t\t\tif channelIndex == 0 {\r\n\t\t\t\tchannelCache = byte(EMBER_MIN_802_15_4_CHANNEL_NUMBER + i)\r\n\t\t\t\tbreak\r\n\t\t\t}\r\n\t\t\tchannelIndex--\r\n\t\t}\r\n\t}\r\n\r\n\tncpFormTrace(\"select channel %d, Start PANID Scan\", channelCache)\r\n\tstartPanIdScan()\r\n}", "func (v *Vulnerability) PrepareFromECRImageScan(imageScanFinding *ecr.ImageScanFinding) {\n\tif imageScanFinding.Severity != nil {\n\t\tv.Severity = strings.ToUpper(*imageScanFinding.Severity)\n\t}\n\tif imageScanFinding.Description != nil {\n\t\tv.Description = *imageScanFinding.Description\n\t}\n\tif imageScanFinding.Name != nil {\n\t\tv.VulnerabilityID = *imageScanFinding.Name\n\t}\n\tif imageScanFinding.Uri != nil {\n\t\tv.PrimaryURL = *imageScanFinding.Uri\n\t}\n\tif v.PrimaryURL == \"\" {\n\t\tv.PrimaryURL = primaryURL + v.VulnerabilityID\n\t}\n\tcvss := CVSS{}\n\tfor _, attr := range imageScanFinding.Attributes {\n\t\tif attr.Key == nil || attr.Value == nil {\n\t\t\tcontinue\n\t\t} else if strings.EqualFold(*attr.Key, ecrPackageName) {\n\t\t\tv.PkgName = *attr.Value\n\t\t} else if strings.EqualFold(*attr.Key, ecrPackageVersion) {\n\t\t\tv.InstalledVersion = *attr.Value\n\t\t} else {\n\t\t\tcvss.PrepareFromECRImageScanAttribute(attr)\n\t\t\tvendorCVSS := make(VendorCVSS)\n\t\t\tvendorCVSS[nvd] = cvss\n\t\t\tv.CVSS = vendorCVSS\n\t\t}\n\t}\n}", "func (bm *DockerBenchmarker) CheckSecretsInsideImage() {\n\tif bm.secretPatterns == nil {\n\t\treturn\n\t}\n\n\tviolationMap := map[string]bool{}\n\n\tfor file, df := range bm.dfiles {\n\t\tfor secretPattern := range bm.secretPatterns {\n\t\t\t// ENV\n\t\t\tidxs := df.LookupInstructionAndContent(dockerfile.ENV, secretPattern)\n\t\t\tif len(idxs) > 0 {\n\t\t\t\tviolation := createViolation(file, fmt.Sprintf(\"ENV contains '%s'\", secretPattern))\n\t\t\t\tviolationMap[violation] = true\n\t\t\t}\n\n\t\t\t// LABEL\n\t\t\tidxs = df.LookupInstructionAndContent(dockerfile.LABEL, secretPattern)\n\t\t\tif len(idxs) > 0 {\n\t\t\t\tviolation := createViolation(file, fmt.Sprintf(\"LABEL contains '%s'\", secretPattern))\n\t\t\t\tviolationMap[violation] = true\n\t\t\t}\n\t\t}\n\t}\n\n\tbm.violationReport.AddViolation(benchmark.CIS_4_10, utils.MapToArray(violationMap))\n}", "func (a *attack) validate(res interface{}) bool {\n\tswitch res.(type) {\n\tcase *discoV1resp:\n\t\tr := res.(*discoV1resp)\n\t\tif r.EnrollURL != \"\" {\n\t\t\tendp, _ := URL.Parse(r.EnrollURL)\n\t\t\ta.log.Successf([]interface{}{endp.Hostname()}, \"Endpoint Discovery\")\n\t\t} else if r.GreenboxURL != \"\" {\n\t\t\tendp, _ := URL.Parse(r.GreenboxURL)\n\t\t\ta.samlURL = endp.Hostname()\n\t\t\ta.log.Successf([]interface{}{endp.Hostname()}, \"SAML Endpoint Discovery\")\n\t\t\treturn true\n\t\t} else if r.MDM.ServiceURL != \"\" {\n\t\t\tendp, _ := URL.Parse(r.MDM.ServiceURL)\n\t\t\ta.log.Successf([]interface{}{endp.Hostname()}, \"Endpoint Discovery\")\n\t\t\treturn true\n\t\t}\n\t\tif r.GroupID != \"\" {\n\t\t\ta.log.Successf([]interface{}{r.GroupID}, \"GroupID Discovery\")\n\t\t\treturn true\n\t\t} else if r.TenantGroup != \"\" {\n\t\t\ta.log.Successf([]interface{}{r.TenantGroup}, \"Tenant Discovery\")\n\t\t\treturn true\n\t\t} else if r.MDM.GroupID != \"\" {\n\t\t\ta.log.Successf([]interface{}{r.MDM.GroupID}, \"GroupID Discovery\")\n\t\t\treturn true\n\t\t}\n\n\tcase int:\n\t\tswitch res.(int) {\n\t\tcase 1:\n\t\t\ta.log.Failf([]interface{}{a.user, a.pass, res.(int)}, \"Registration Disabled\")\n\t\tcase 2:\n\t\t\ta.log.Successf([]interface{}{a.user, a.pass, res.(int)}, \"AirWatch Single-Factor Registration\")\n\t\t\treturn true\n\t\tcase 4:\n\t\t\ta.log.Successf([]interface{}{a.user, a.pass, res.(int)}, \"Single-Factor Registration\")\n\t\t\treturn true\n\t\tcase 8:\n\t\t\ta.log.Successf([]interface{}{a.user, a.pass, res.(int)}, \"Token Registration\")\n\t\t\treturn true\n\t\tcase 18:\n\t\t\ta.log.Successf([]interface{}{a.user, a.pass, res.(int)}, \"SAML Registration\")\n\t\t\treturn true\n\t\tdefault:\n\t\t\ta.log.Errorf([]interface{}{a.user, a.pass, res.(int)}, \"Unknown Registration\")\n\t\t}\n\n\tcase status:\n\t\tswitch res.(status).Code {\n\t\tcase 1:\n\t\t\ta.log.Successf([]interface{}{a.user, a.pass}, \"Authentication Successful: %s\", res.(status).Notification)\n\t\t\treturn true\n\t\tcase 2:\n\t\t\ta.log.Failf([]interface{}{a.user, a.pass}, \"Authentication Failure: %s\", res.(status).Notification)\n\t\tdefault:\n\t\t\ta.log.Errorf([]interface{}{a.user, a.pass}, \"Unknown Response: %s\", res.(status).Notification)\n\t\t}\n\n\tcase string:\n\t\tswitch res.(string) {\n\t\tcase \"AUTH--1\":\n\t\t\ta.log.Failf([]interface{}{a.user, a.pass, res.(string)}, \"Invalid GroupID\")\n\t\tcase \"AUTH-1001\":\n\t\t\ta.log.Failf([]interface{}{a.user, a.pass, res.(string)}, \"Authentication Failure\")\n\t\tcase \"AUTH-1002\":\n\t\t\ta.log.Failf([]interface{}{a.user, a.pass, res.(string)}, \"Account Lockout\")\n\t\tcase \"AUTH-1003\":\n\t\t\ta.log.Failf([]interface{}{a.user, a.pass, res.(string)}, \"Account Disabled\")\n\t\tcase \"AUTH-1006\":\n\t\t\ta.log.Successf([]interface{}{a.user, a.pass, res.(string)}, \"Authentication Successful\")\n\t\t\treturn true\n\t\tdefault:\n\t\t\ta.log.Errorf([]interface{}{a.user, a.pass, res.(string)}, \"Unknown Response\")\n\t\t}\n\t}\n\treturn false\n}", "func runScanner(detector scanners.ScannerInterface, searchDir string) scannerOutput {\n\tvar detectorWarnings models.Warnings\n\tvar detectorErrors []string\n\n\tif isDetect, err := detector.DetectPlatform(searchDir); err != nil {\n\t\tdata := detectorErrorData(detector.Name(), err)\n\t\tanalytics.LogError(\"detect_platform_failed\", data, \"%s detector DetectPlatform failed\", detector.Name())\n\n\t\tlog.TErrorf(\"Scanner failed, error: %s\", err)\n\t\treturn scannerOutput{\n\t\t\tstatus: notDetected,\n\t\t\twarnings: models.Warnings{err.Error()},\n\t\t}\n\t} else if !isDetect {\n\t\treturn scannerOutput{\n\t\t\tstatus: notDetected,\n\t\t}\n\t}\n\n\toptions, projectWarnings, icons, err := detector.Options()\n\tdetectorWarnings = append(detectorWarnings, projectWarnings...)\n\n\tif err != nil {\n\t\tdata := detectorErrorData(detector.Name(), err)\n\t\tanalytics.LogError(\"options_failed\", data, \"%s detector Options failed\", detector.Name())\n\n\t\tlog.TErrorf(\"Analyzer failed, error: %s\", err)\n\t\t// Error returned as a warning\n\t\tdetectorWarnings = append(detectorWarnings, err.Error())\n\t\treturn scannerOutput{\n\t\t\tstatus: detectedWithErrors,\n\t\t\twarnings: detectorWarnings,\n\t\t}\n\t}\n\n\t// Generate configs\n\tconfigs, err := detector.Configs()\n\tif err != nil {\n\t\tdata := detectorErrorData(detector.Name(), err)\n\t\tanalytics.LogError(\"configs_failed\", data, \"%s detector Configs failed\", detector.Name())\n\n\t\tlog.TErrorf(\"Failed to generate config, error: %s\", err)\n\t\tdetectorErrors = append(detectorErrors, err.Error())\n\t\treturn scannerOutput{\n\t\t\tstatus: detectedWithErrors,\n\t\t\twarnings: detectorWarnings,\n\t\t\terrors: detectorErrors,\n\t\t}\n\t}\n\n\tscannerExcludedScanners := detector.ExcludedScannerNames()\n\tif len(scannerExcludedScanners) > 0 {\n\t\tlog.TWarnf(\"Scanner will exclude scanners: %v\", scannerExcludedScanners)\n\t}\n\n\treturn scannerOutput{\n\t\tstatus: detected,\n\t\twarnings: detectorWarnings,\n\t\terrors: detectorErrors,\n\t\toptions: options,\n\t\tconfigs: configs,\n\t\ticons: icons,\n\t\texcludedScanners: scannerExcludedScanners,\n\t}\n}", "func (o ScanRunResponsePtrOutput) HasVulnerabilities() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ScanRunResponse) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.HasVulnerabilities\n\t}).(pulumi.BoolPtrOutput)\n}", "func CheckDetector(ctx context.Context, detectorID string, sfx *client.SignalFx) ([]*types.Result, error) {\n\tdet := getGlobalCache().getDetector(detectorID)\n\tif det == nil {\n\t\tif sfx == nil {\n\t\t\treturn nil, types.ErrMissingClient\n\t\t}\n\t\td, err := sfx.GetDetectorByID(ctx, detectorID)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tgetGlobalCache().setDetector(detectorID, d)\n\t\tdet = d\n\t}\n\tresults := []*types.Result{\n\t\ttypes.CheckUserIssue(!det.OverMTSLimit, \"Over MTS limit\").\n\t\t\tWithMessage(\"Reduce the number of time series by applying further filtering\"),\n\t\t// Would like to follow up with their support to understand when a detector can be locked\n\t\ttypes.CheckSystemIssue(!det.Locked, \"Locked\").\n\t\t\tWithMessage(\"detector is locked by an unknown reason, detector can not be updated\"),\n\t\ttypes.CheckUserIssue(len(det.ProgramText) > 0, \"Has program text\").\n\t\t\tWithMessage(\"Ensure that there is Signalflow set for this detector\"),\n\t\ttypes.CheckUserIssue(len(det.Rules) > 0, \"Has alert rules\").\n\t\t\tWithMessage(\"Ensure that there is alerting rules set for this detector\"),\n\t}\n\tfor _, r := range det.Rules {\n\t\tresults = append(results,\n\t\t\ttypes.CheckUserIssue(!r.Disabled, \"disabled rule\").\n\t\t\t\tWithMessage(\"Ensuring rules are not disabled\"),\n\t\t\ttypes.CheckUserIssue(len(r.Notifications) > 0, \"Notification rules set\").\n\t\t\t\tWithMessage(\"Ensure that there is a notification path\"),\n\t\t)\n\t}\n\treturn results, nil\n}", "func cipherSuiteScan(addr, hostname string) (grade Grade, output Output, err error) {\n\tvar cvList cipherVersionList\n\tallCiphers := allCiphersIDs()\n\n\tvar vers uint16\n\tfor vers = tls.VersionTLS12; vers >= tls.VersionSSL30; vers-- {\n\t\tciphers := make([]uint16, len(allCiphers))\n\t\tcopy(ciphers, allCiphers)\n\t\tfor len(ciphers) > 0 {\n\t\t\tvar cipherIndex int\n\t\t\tcipherIndex, _, _, err = sayHello(addr, hostname, ciphers, nil, vers, nil)\n\t\t\tif err != nil {\n\t\t\t\tif err == errHelloFailed {\n\t\t\t\t\terr = nil\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif vers == tls.VersionSSL30 {\n\t\t\t\tgrade = Warning\n\t\t\t}\n\t\t\tcipherID := ciphers[cipherIndex]\n\n\t\t\t// If this is an EC cipher suite, do a second scan for curve support\n\t\t\tvar supportedCurves []tls.CurveID\n\t\t\tif tls.CipherSuites[cipherID].EllipticCurve {\n\t\t\t\tsupportedCurves, err = doCurveScan(addr, hostname, vers, cipherID, ciphers)\n\t\t\t\tif len(supportedCurves) == 0 {\n\t\t\t\t\terr = errors.New(\"couldn't negotiate any curves\")\n\t\t\t\t}\n\t\t\t}\n\t\t\tfor i, c := range cvList {\n\t\t\t\tif cipherID == c.cipherID {\n\t\t\t\t\tcvList[i].data = append(c.data, cipherDatum{vers, supportedCurves})\n\t\t\t\t\tgoto exists\n\t\t\t\t}\n\t\t\t}\n\t\t\tcvList = append(cvList, cipherVersions{cipherID, []cipherDatum{{vers, supportedCurves}}})\n\t\texists:\n\t\t\tciphers = append(ciphers[:cipherIndex], ciphers[cipherIndex+1:]...)\n\t\t}\n\t}\n\n\tif len(cvList) == 0 {\n\t\terr = errors.New(\"couldn't negotiate any cipher suites\")\n\t\treturn\n\t}\n\n\tif grade != Warning {\n\t\tgrade = Good\n\t}\n\n\toutput = cvList\n\treturn\n}", "func WaitForInfraServices(ctx context.Context, kc *kubernetes.Clientset) error {\n\tfor _, app := range daemonsetWhitelist {\n\t\tlog.Infof(\"checking daemonset %s/%s\", app.Namespace, app.Name)\n\n\t\terr := wait.PollImmediateUntil(time.Second, func() (bool, error) {\n\t\t\tds, err := kc.AppsV1().DaemonSets(app.Namespace).Get(app.Name, metav1.GetOptions{})\n\t\t\tswitch {\n\t\t\tcase kerrors.IsNotFound(err):\n\t\t\t\treturn false, nil\n\t\t\tcase err == nil:\n\t\t\t\treturn ds.Status.DesiredNumberScheduled == ds.Status.CurrentNumberScheduled &&\n\t\t\t\t\tds.Status.DesiredNumberScheduled == ds.Status.NumberReady &&\n\t\t\t\t\tds.Status.DesiredNumberScheduled == ds.Status.UpdatedNumberScheduled &&\n\t\t\t\t\tds.Generation == ds.Status.ObservedGeneration, nil\n\t\t\tdefault:\n\t\t\t\treturn false, err\n\t\t\t}\n\t\t}, ctx.Done())\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tfor _, app := range deploymentWhitelist {\n\t\tlog.Infof(\"checking deployment %s/%s\", app.Namespace, app.Name)\n\n\t\terr := wait.PollImmediateUntil(time.Second, func() (bool, error) {\n\t\t\td, err := kc.AppsV1().Deployments(app.Namespace).Get(app.Name, metav1.GetOptions{})\n\t\t\tswitch {\n\t\t\tcase kerrors.IsNotFound(err):\n\t\t\t\treturn false, nil\n\t\t\tcase err == nil:\n\t\t\t\tspecReplicas := int32(1)\n\t\t\t\tif d.Spec.Replicas != nil {\n\t\t\t\t\tspecReplicas = *d.Spec.Replicas\n\t\t\t\t}\n\n\t\t\t\treturn specReplicas == d.Status.Replicas &&\n\t\t\t\t\tspecReplicas == d.Status.ReadyReplicas &&\n\t\t\t\t\tspecReplicas == d.Status.AvailableReplicas &&\n\t\t\t\t\tspecReplicas == d.Status.UpdatedReplicas &&\n\t\t\t\t\td.Generation == d.Status.ObservedGeneration, nil\n\t\t\tdefault:\n\t\t\t\treturn false, err\n\t\t\t}\n\t\t}, ctx.Done())\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "func ReturnEachTypeOfVulnerability() []horusec.Vulnerability {\n\treturn []horusec.Vulnerability{\n\t\t{\n\t\t\tLine: \"\",\n\t\t\tColumn: \"\",\n\t\t\tConfidence: \"\",\n\t\t\tFile: \"\",\n\t\t\tCode: \"\",\n\t\t\tDetails: \"\",\n\t\t\tSecurityTool: tools.GoSec,\n\t\t\tLanguage: languages.Go,\n\t\t\tSeverity: severity.Low,\n\t\t},\n\t\t{\n\t\t\tLine: \"\",\n\t\t\tColumn: \"\",\n\t\t\tConfidence: \"\",\n\t\t\tFile: \"\",\n\t\t\tCode: \"\",\n\t\t\tDetails: \"\",\n\t\t\tSecurityTool: tools.SecurityCodeScan,\n\t\t\tLanguage: languages.DotNet,\n\t\t\tSeverity: severity.Low,\n\t\t},\n\t\t{\n\t\t\tLine: \"\",\n\t\t\tColumn: \"\",\n\t\t\tConfidence: \"\",\n\t\t\tFile: \"\",\n\t\t\tCode: \"\",\n\t\t\tDetails: \"\",\n\t\t\tSecurityTool: tools.Brakeman,\n\t\t\tLanguage: languages.Ruby,\n\t\t\tSeverity: severity.Low,\n\t\t},\n\t\t{\n\t\t\tLine: \"\",\n\t\t\tColumn: \"\",\n\t\t\tConfidence: \"\",\n\t\t\tFile: \"\",\n\t\t\tCode: \"\",\n\t\t\tDetails: \"\",\n\t\t\tSecurityTool: tools.NpmAudit,\n\t\t\tLanguage: languages.Javascript,\n\t\t\tSeverity: severity.Low,\n\t\t},\n\t\t{\n\t\t\tLine: \"\",\n\t\t\tColumn: \"\",\n\t\t\tConfidence: \"\",\n\t\t\tFile: \"\",\n\t\t\tCode: \"\",\n\t\t\tDetails: \"\",\n\t\t\tSecurityTool: tools.YarnAudit,\n\t\t\tLanguage: languages.Javascript,\n\t\t\tSeverity: severity.Low,\n\t\t},\n\t\t{\n\t\t\tLine: \"\",\n\t\t\tColumn: \"\",\n\t\t\tConfidence: \"\",\n\t\t\tFile: \"\",\n\t\t\tCode: \"\",\n\t\t\tDetails: \"\",\n\t\t\tSecurityTool: tools.Bandit,\n\t\t\tLanguage: languages.Python,\n\t\t\tSeverity: severity.Low,\n\t\t},\n\t\t{\n\t\t\tLine: \"\",\n\t\t\tColumn: \"\",\n\t\t\tConfidence: \"\",\n\t\t\tFile: \"\",\n\t\t\tCode: \"\",\n\t\t\tDetails: \"\",\n\t\t\tSecurityTool: tools.Bandit,\n\t\t\tLanguage: languages.Python,\n\t\t\tSeverity: severity.Low,\n\t\t},\n\t\t{\n\t\t\tLine: \"\",\n\t\t\tColumn: \"\",\n\t\t\tConfidence: \"\",\n\t\t\tFile: \"\",\n\t\t\tCode: \"\",\n\t\t\tDetails: \"\",\n\t\t\tLanguage: languages.Leaks,\n\t\t\tSeverity: severity.High,\n\t\t},\n\t\t{\n\t\t\tLine: \"\",\n\t\t\tColumn: \"\",\n\t\t\tConfidence: \"\",\n\t\t\tFile: \"\",\n\t\t\tCode: \"\",\n\t\t\tDetails: \"\",\n\t\t\tSecurityTool: tools.GitLeaks,\n\t\t\tLanguage: languages.Leaks,\n\t\t\tSeverity: severity.High,\n\t\t},\n\t\t{\n\t\t\tLine: \"\",\n\t\t\tColumn: \"\",\n\t\t\tConfidence: \"\",\n\t\t\tFile: \"\",\n\t\t\tCode: \"\",\n\t\t\tDetails: \"\",\n\t\t\tSecurityTool: tools.SpotBugs,\n\t\t\tLanguage: languages.Java,\n\t\t\tSeverity: severity.Low,\n\t\t},\n\t\t{\n\t\t\tLine: \"\",\n\t\t\tColumn: \"\",\n\t\t\tConfidence: \"\",\n\t\t\tFile: \"\",\n\t\t\tCode: \"\",\n\t\t\tDetails: \"\",\n\t\t\tSecurityTool: tools.SpotBugs,\n\t\t\tLanguage: languages.Kotlin,\n\t\t\tSeverity: severity.Low,\n\t\t},\n\t}\n}", "func main() {\n\trules, tickets := readTickets()\n\n\terrorRate := checkValidity(rules, tickets)\n\n\tfmt.Printf(\"Error Rate of scanned tickets: %d\\n\", errorRate)\n}", "func (el *ELBV2Manager) Detect(metrics []config.MetricConfig) (interface{}, error) {\n\n\tlog.WithFields(log.Fields{\n\t\t\"region\": el.awsManager.GetRegion(),\n\t\t\"resource\": \"elb_v2\",\n\t}).Info(\"starting to analyze resource\")\n\n\tel.awsManager.GetCollector().CollectStart(el.Name)\n\n\tdetectedELBV2 := []DetectedELBV2{}\n\n\tpricingRegionPrefix, err := el.awsManager.GetPricingClient().GetRegionPrefix(el.awsManager.GetRegion())\n\tif err != nil {\n\t\tlog.WithError(err).WithFields(log.Fields{\n\t\t\t\"region\": el.awsManager.GetRegion(),\n\t\t}).Error(\"Could not get pricing region prefix\")\n\t\tel.awsManager.GetCollector().CollectError(el.Name, err)\n\t\treturn detectedELBV2, err\n\t}\n\n\tinstances, err := el.describeLoadbalancers(nil, nil)\n\tif err != nil {\n\t\tel.awsManager.GetCollector().CollectError(el.Name, err)\n\t\treturn detectedELBV2, err\n\t}\n\n\tnow := time.Now()\n\n\tfor _, instance := range instances {\n\t\tvar cloudWatchNameSpace string\n\t\tvar price float64\n\t\tif loadBalancerConfig, found := loadBalancersConfig[*instance.Type]; found {\n\t\t\tcloudWatchNameSpace = loadBalancerConfig.cloudWatchNamespace\n\n\t\t\tlog.WithField(\"name\", *instance.LoadBalancerName).Debug(\"checking elbV2\")\n\n\t\t\tloadBalancerConfig.pricingfilters = append(\n\t\t\t\tloadBalancerConfig.pricingfilters, &pricing.Filter{\n\t\t\t\t\tType: awsClient.String(\"TERM_MATCH\"),\n\t\t\t\t\tField: awsClient.String(\"usagetype\"),\n\t\t\t\t\tValue: awsClient.String(fmt.Sprintf(\"%sLoadBalancerUsage\", pricingRegionPrefix)),\n\t\t\t\t})\n\t\t\tprice, _ = el.awsManager.GetPricingClient().GetPrice(el.getPricingFilterInput(loadBalancerConfig.pricingfilters), \"\", el.awsManager.GetRegion())\n\t\t}\n\t\tfor _, metric := range metrics {\n\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"name\": *instance.LoadBalancerName,\n\t\t\t\t\"metric_name\": metric.Description,\n\t\t\t}).Debug(\"check metric\")\n\n\t\t\tperiod := int64(metric.Period.Seconds())\n\n\t\t\tmetricEndTime := now.Add(time.Duration(-metric.StartTime))\n\n\t\t\tregx, _ := regexp.Compile(\".*loadbalancer/\")\n\n\t\t\telbv2Name := regx.ReplaceAllString(*instance.LoadBalancerArn, \"\")\n\n\t\t\tmetricInput := awsCloudwatch.GetMetricStatisticsInput{\n\t\t\t\tNamespace: &cloudWatchNameSpace,\n\t\t\t\tMetricName: &metric.Description,\n\t\t\t\tPeriod: &period,\n\t\t\t\tStartTime: &metricEndTime,\n\t\t\t\tEndTime: &now,\n\t\t\t\tDimensions: []*awsCloudwatch.Dimension{\n\t\t\t\t\t{\n\t\t\t\t\t\tName: awsClient.String(\"LoadBalancer\"),\n\t\t\t\t\t\tValue: &elbv2Name,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t}\n\n\t\t\tformulaValue, _, err := el.awsManager.GetCloudWatchClient().GetMetric(&metricInput, metric)\n\n\t\t\tif err != nil {\n\t\t\t\tlog.WithError(err).WithFields(log.Fields{\n\t\t\t\t\t\"name\": *instance.LoadBalancerName,\n\t\t\t\t\t\"metric_name\": metric.Description,\n\t\t\t\t}).Error(\"Could not get cloudwatch metric data\")\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\texpression, err := expression.BoolExpression(formulaValue, metric.Constraint.Value, metric.Constraint.Operator)\n\t\t\tif err != nil {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif expression {\n\n\t\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\t\"metric_name\": metric.Description,\n\t\t\t\t\t\"constraint_operator\": metric.Constraint.Operator,\n\t\t\t\t\t\"constraint_Value\": metric.Constraint.Value,\n\t\t\t\t\t\"formula_value\": formulaValue,\n\t\t\t\t\t\"name\": *instance.LoadBalancerName,\n\t\t\t\t\t\"region\": el.awsManager.GetRegion(),\n\t\t\t\t}).Info(\"LoadBalancer detected as unutilized resource\")\n\n\t\t\t\ttags, err := el.client.DescribeTags(&elbv2.DescribeTagsInput{\n\t\t\t\t\tResourceArns: []*string{instance.LoadBalancerArn},\n\t\t\t\t})\n\t\t\t\ttagsData := map[string]string{}\n\t\t\t\tif err == nil {\n\t\t\t\t\tfor _, tags := range tags.TagDescriptions {\n\t\t\t\t\t\tfor _, tag := range tags.Tags {\n\t\t\t\t\t\t\ttagsData[*tag.Key] = *tag.Value\n\t\t\t\t\t\t}\n\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\telbv2 := DetectedELBV2{\n\t\t\t\t\tRegion: el.awsManager.GetRegion(),\n\t\t\t\t\tMetric: metric.Description,\n\t\t\t\t\tType: *instance.Type,\n\t\t\t\t\tPriceDetectedFields: collector.PriceDetectedFields{\n\t\t\t\t\t\tResourceID: *instance.LoadBalancerName,\n\t\t\t\t\t\tLaunchTime: *instance.CreatedTime,\n\t\t\t\t\t\tPricePerHour: price,\n\t\t\t\t\t\tPricePerMonth: price * collector.TotalMonthHours,\n\t\t\t\t\t\tTag: tagsData,\n\t\t\t\t\t},\n\t\t\t\t}\n\n\t\t\t\tel.awsManager.GetCollector().AddResource(collector.EventCollector{\n\t\t\t\t\tResourceName: el.Name,\n\t\t\t\t\tData: elbv2,\n\t\t\t\t})\n\n\t\t\t\tdetectedELBV2 = append(detectedELBV2, elbv2)\n\t\t\t}\n\t\t}\n\t}\n\n\tel.awsManager.GetCollector().CollectFinish(el.Name)\n\n\treturn detectedELBV2, nil\n\n}", "func checkActionListForDevice(a []base.ActionStructure, d string, room string, building string) (index int) {\n\tfor i, curDevice := range a {\n\t\tif checkDevicesEqual(curDevice.Device, d, room, building) {\n\t\t\treturn i\n\t\t}\n\t}\n\treturn -1\n}", "func (sb *spdkBackend) Scan(req storage.BdevScanRequest) (*storage.BdevScanResponse, error) {\n\tsb.log.Debugf(\"spdk backend scan (bindings discover call): %+v\", req)\n\n\t// Only filter devices if all have a PCI address, avoid validating the presence of emulated\n\t// NVMe devices as they may not exist yet e.g. for SPDK AIO-file the devices are created on\n\t// format.\n\tneedDevs := req.DeviceList.PCIAddressSetPtr()\n\tspdkOpts := &spdk.EnvOptions{\n\t\tPCIAllowList: needDevs,\n\t\tEnableVMD: req.VMDEnabled,\n\t}\n\n\trestoreAfterInit, err := sb.binding.init(sb.log, spdkOpts)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to init nvme\")\n\t}\n\tdefer restoreAfterInit()\n\n\tfoundDevs, err := sb.binding.Discover(sb.log)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to discover nvme\")\n\t}\n\n\toutDevs, err := groomDiscoveredBdevs(needDevs, foundDevs, req.VMDEnabled)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(outDevs) != len(foundDevs) {\n\t\tsb.log.Debugf(\"scan bdevs filtered, in: %v, out: %v (requested %s)\", foundDevs,\n\t\t\toutDevs, needDevs)\n\t}\n\n\treturn &storage.BdevScanResponse{\n\t\tControllers: outDevs,\n\t\tVMDEnabled: req.VMDEnabled,\n\t}, nil\n}", "func (bm *DockerBenchmarker) CheckDisallowedPackages() {\n\t// no disallowed packages are provided\n\tif bm.disallowedPackages == nil {\n\t\treturn\n\t}\n\n\tviolationMap := map[string]bool{}\n\n\tfor file, df := range bm.dfiles {\n\t\tfor disallowedPkg := range bm.disallowedPackages {\n\t\t\t// apt\n\t\t\tidxs := df.LookupInstructionAndContent(dockerfile.Run, `apt\\s+install\\s+[^;|&]+`+disallowedPkg)\n\t\t\tif len(idxs) > 0 {\n\t\t\t\tviolation := createViolation(file, disallowedPkg)\n\t\t\t\tviolationMap[violation] = true\n\t\t\t}\n\n\t\t\t// apt-get\n\t\t\tidxs = df.LookupInstructionAndContent(dockerfile.Run, `apt-get\\s+install\\s+[^;|&]+`+disallowedPkg)\n\t\t\tif len(idxs) > 0 {\n\t\t\t\tviolation := createViolation(file, disallowedPkg)\n\t\t\t\tviolationMap[violation] = true\n\t\t\t}\n\n\t\t\t// apk\n\t\t\tidxs = df.LookupInstructionAndContent(dockerfile.Run, `apk\\s+add\\s+[^;|&]+`+disallowedPkg)\n\t\t\tif len(idxs) > 0 {\n\t\t\t\tviolation := createViolation(file, disallowedPkg)\n\t\t\t\tviolationMap[violation] = true\n\t\t\t}\n\t\t}\n\t}\n\n\tbm.violationReport.AddViolation(benchmark.CIS_4_3, utils.MapToArray(violationMap))\n}", "func (proxier *Proxier) CheckUnusedRule (activeServiceMap map[activeServiceKey]bool, activeBindIP map[string]int, dummylink netlink.Link){\n\t// check unused ipvs rules\n\toldSvcs, err := proxier.ipvsInterface.ListIpvsService()\n\tif err != nil{\n\t\tglog.Errorf(\"CheckUnusedRule: failed to list ipvs service: %v\", err)\n\t\treturn\n\t}\n\tfor _, oldSvc := range oldSvcs{\n\n\t\toldSvc_t, err := utilipvs.CreateInterService(oldSvc)\n\t\tserviceKey := activeServiceKey{\n\t\t\tip: oldSvc_t.ClusterIP.String(),\n\t\t\tport: oldSvc_t.Port,\n\t\t\tprotocol: oldSvc_t.Protocol,\n\t\t}\n\t\tglog.V(4).Infof(\"check active service: %s:%d:%s\",serviceKey.ip,serviceKey.port,serviceKey.protocol)\n\t\t_, ok := activeServiceMap[serviceKey]\n\n\t\t/* unused service info so remove ipvs config and dummy cluster ip*/\n\t\tif !ok{\n\t\t\tglog.V(3).Infof(\"delete unused ipvs service config and dummy cluster ip: %s:%d:%s\",serviceKey.ip,serviceKey.port,serviceKey.protocol)\n\n\t\t\terr = proxier.ipvsInterface.DeleteIpvsService(oldSvc_t)\n\n\t\t\tif err != nil{\n\t\t\t\tglog.Errorf(\"clean unused ipvs service failed: %s\",err)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t}\n\t}\n\n\t// check unused binded cluster ip\n\toldBindIPs, _ := proxier.ipvsInterface.ListDuumyClusterIp(dummylink)\n\tif err != nil{\n\t\tglog.Errorf(\"CheckUnusedRule: failed to list binded ip: %v\", err)\n\t\treturn\n\t}\n\n\tfor _, oldBindIP := range oldBindIPs{\n\t\t_, bind := activeBindIP[oldBindIP.IP.String()]\n\t\tif !bind{\n\t\t\tglog.V(3).Infof(\"unbinded unused ipvs dummy cluster ip: %s\",oldBindIP.IP.String())\n\n\t\t\terr = proxier.ipvsInterface.DeleteDummyClusterIp(oldBindIP.IP, dummylink)\n\t\t\tif err != nil{\n\t\t\t\tglog.Errorf(\"clean unused dummy cluster ip failed: %s\",err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t}\n}", "func checkAllProviders(e2eFile string) error {\n\tcheckFailed := false\n\tinConformanceCode := false\n\n\tregStartConformance := regexp.MustCompile(patternStartConformance)\n\tregEndConformance := regexp.MustCompile(patternEndConformance)\n\tregSkip := regexp.MustCompile(patternSkip)\n\n\tfileInput, err := os.ReadFile(e2eFile)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to read file %s: %w\", e2eFile, err)\n\t}\n\tscanner := bufio.NewScanner(bytes.NewReader(fileInput))\n\tscanner.Split(bufio.ScanLines)\n\n\tfor scanner.Scan() {\n\t\tline := scanner.Text()\n\t\tif regStartConformance.MatchString(line) {\n\t\t\tif inConformanceCode {\n\t\t\t\treturn errors.New(\"Missed the end of previous conformance test. There might be a bug in this script.\")\n\t\t\t}\n\t\t\tinConformanceCode = true\n\t\t}\n\t\tif inConformanceCode {\n\t\t\tif regSkip.MatchString(line) {\n\t\t\t\t// To list all invalid places in a single operation of this tool, here doesn't return error and continues checking.\n\t\t\t\tfmt.Fprintf(os.Stderr, \"%v: Conformance test should not call any e2eskipper.Skip*()\\n\", e2eFile)\n\t\t\t\tcheckFailed = true\n\t\t\t}\n\t\t\tif regEndConformance.MatchString(line) {\n\t\t\t\tinConformanceCode = false\n\t\t\t}\n\t\t}\n\t}\n\tif inConformanceCode {\n\t\treturn errors.New(\"Missed the end of previous conformance test. There might be a bug in this script.\")\n\t}\n\tif checkFailed {\n\t\treturn errors.New(\"We need to fix the above errors.\")\n\t}\n\treturn nil\n}", "func UpdateDevs(name string, checkTresHold bool) (ok bool) {\n\tok = false\n\trequest := RpcRequest{\"{\\\"command\\\":\\\"devs\\\"}\", make(chan []byte), name}\n\n\tminerInfo := miners[name]\n\n\tvar devs DevsResponse\n\n\t//Ignore the error at the moment since it not implement in the Send() yet\n\tresponse, _ := request.Send()\n\n\t//Parse the data into a DevsResponse\n\tdevs.Parse(response)\n\n\t//If we got data back\n\tif len(response) != 0 {\n\t\t//Set ok to true\n\t\tok = true\n\t\t//Should we do a treshold check?\n\t\tif checkTresHold == true {\n\t\t\t//Need to sum up the mhs5s to get the current total hashrate for the miner\n\t\t\tmhs5s := 0.0\n\t\t\tfor i := 0; i < len(devs.Devs); i++ {\n\t\t\t\tvar dev = &devs.Devs[i]\n\t\t\t\tmhs5s += dev.MHS5s\n\t\t\t}\n\t\t\tCheckMhsThresHold(mhs5s, devs.Status[0].When, minerInfo.Client)\n\t\t\t//If the threshold is checked then do a alive check as well\n\t\t\tCheckAliveStatus(devs, name)\n\t\t}\n\t}\n\n\t//Lock it\n\tminerInfo.DevsWrap.Mu.Lock()\n\t//Save the summary\n\tminerInfo.DevsWrap.Devs = devs\n\t//Now unlock\n\tminerInfo.DevsWrap.Mu.Unlock()\n\n\treturn\n}", "func CheckAliveStatus(devs DevsResponse, name string) {\n\tfor i := 0; i < len(devs.Devs); i++ {\n\t\tvar dev = &devs.Devs[i]\n\t\tif dev.Status != \"Alive\" {\n\t\t\t//Send the restart command\n\t\t\tlog.Printf(\"Dev #%s on %s got %s status so sending restart command\\n\", dev.GPU, name, dev.Status)\n\t\t\trestartMiner(name)\n\t\t}\n\t}\n}", "func (d *Deployment) Scan(ctx context.Context, gvr, fqn string, wait bool) (Refs, error) {\n\tns, n := client.Namespaced(fqn)\n\too, err := d.GetFactory().List(d.GVR(), ns, wait, labels.Everything())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\trefs := make(Refs, 0, len(oo))\n\tfor _, o := range oo {\n\t\tvar dp appsv1.Deployment\n\t\terr = runtime.DefaultUnstructuredConverter.FromUnstructured(o.(*unstructured.Unstructured).Object, &dp)\n\t\tif err != nil {\n\t\t\treturn nil, errors.New(\"expecting Deployment resource\")\n\t\t}\n\t\tswitch gvr {\n\t\tcase \"v1/configmaps\":\n\t\t\tif !hasConfigMap(&dp.Spec.Template.Spec, n) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\trefs = append(refs, Ref{\n\t\t\t\tGVR: d.GVR(),\n\t\t\t\tFQN: client.FQN(dp.Namespace, dp.Name),\n\t\t\t})\n\t\tcase \"v1/secrets\":\n\t\t\tfound, err := hasSecret(d.Factory, &dp.Spec.Template.Spec, dp.Namespace, n, wait)\n\t\t\tif err != nil {\n\t\t\t\tlog.Warn().Err(err).Msgf(\"scanning secret %q\", fqn)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif !found {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\trefs = append(refs, Ref{\n\t\t\t\tGVR: d.GVR(),\n\t\t\t\tFQN: client.FQN(dp.Namespace, dp.Name),\n\t\t\t})\n\t\tcase \"v1/persistentvolumeclaims\":\n\t\t\tif !hasPVC(&dp.Spec.Template.Spec, n) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\trefs = append(refs, Ref{\n\t\t\t\tGVR: d.GVR(),\n\t\t\t\tFQN: client.FQN(dp.Namespace, dp.Name),\n\t\t\t})\n\t\tcase \"scheduling.k8s.io/v1/priorityclasses\":\n\t\t\tif !hasPC(&dp.Spec.Template.Spec, n) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\trefs = append(refs, Ref{\n\t\t\t\tGVR: d.GVR(),\n\t\t\t\tFQN: client.FQN(dp.Namespace, dp.Name),\n\t\t\t})\n\t\t}\n\n\t}\n\n\treturn refs, nil\n}", "func rediscoverDevices(ipList []string) []string {\n\tvar rediscoveredDevices []string\n\tfor _, deviceIP := range ipList {\n\t\tbody, bodyErr := client.QueryAPI(fmt.Sprintf(gqlMutationQuery, deviceIP))\n\t\tif bodyErr != nil {\n\t\t\tstdErr.Printf(\"Could not mutate device %s: %s\\n\", deviceIP, bodyErr)\n\t\t\tcontinue\n\t\t}\n\t\tproactiveTokenRefresh()\n\n\t\tmutation := mutationMessage{}\n\t\tjsonErr := json.Unmarshal(body, &mutation)\n\t\tif jsonErr != nil {\n\t\t\tstdErr.Printf(\"Could not decode JSON: %s\\n\", jsonErr)\n\t\t\tcontinue\n\t\t}\n\n\t\tif mutation.Data.Network.RediscoverDevices.Status == \"SUCCESS\" {\n\t\t\tstdErr.Printf(\"Successfully triggered rediscover for %s.\\n\", deviceIP)\n\t\t\trediscoveredDevices = append(rediscoveredDevices, deviceIP)\n\t\t} else {\n\t\t\tstdErr.Printf(\"Rediscover for %s failed: %s\\n\", deviceIP, mutation.Data.Network.RediscoverDevices.Message)\n\t\t}\n\n\t\tstdErr.Printf(\"Waiting for %d second(s)...\\n\", config.RefreshInterval)\n\t\ttime.Sleep(time.Second * time.Duration(config.RefreshInterval))\n\t}\n\tfor i := config.RefreshWait; i > 0; i-- {\n\t\tproactiveTokenRefresh()\n\t\tstdErr.Printf(\"Waiting for %d minute(s) to finish rediscover...\\n\", i)\n\t\ttime.Sleep(time.Minute * time.Duration(1))\n\t}\n\treturn rediscoveredDevices\n}", "func checkFact(asset structs.UniqueSpaces, sku structs.SKU, lastVol int, lastFreePercent float64, lastSpillPercent float64) structs.AssignedSpaces {\n\tassetsVol := asset.Dimensions.Length * asset.Dimensions.Breadth * asset.Dimensions.Height\n\t// totalAvailAssetVol := assetsVol * asset.FreeCount\n\tassetFreePercent := roundTo((float64(asset.FreeCount) * 100 / float64(asset.TotalCount)), 2)\n\tskuVol := sku.Dimensions.Length * sku.Dimensions.Breadth * sku.Dimensions.Height\n\ttotalVol := float64(sku.Quantity) * float64(skuVol)\n\n\t/**\n\t * Checking\n\t * -- Total asset Required of one particular type to contain all items\n\t * -- Items that can fit in single asset of that particular type\n\t * -- Total Spillage in the assets after filling them\n\t */\n\n\tassetReq := math.Ceil(float64(totalVol) * 1.1 / float64(assetsVol))\n\tif sku.Quantity == 1 {\n\t\tassetReq = math.Ceil(float64(totalVol) / float64(assetsVol))\n\t}\n\titem_fit_single_asset := math.Floor(float64(assetsVol) / float64(skuVol))\n\tif sku.Quantity > 2 {\n\t\titem_fit_single_asset = math.Floor(float64(assetsVol) / (float64(skuVol) * 1.1))\n\t}\n\titem_in_single_asset := int64(item_fit_single_asset)\n\tif sku.Quantity <= int64(item_fit_single_asset) {\n\t\titem_in_single_asset = sku.Quantity\n\t}\n\tspill_in_one := roundTo(((1 - ((float64(item_in_single_asset) * float64(skuVol)) / float64(assetsVol))) * 100), 2)\n\tif item_in_single_asset > 2 {\n\t\tspill_in_one = roundTo(((1 - ((float64(item_in_single_asset) * float64(skuVol) * 1.10) / float64(assetsVol))) * 100), 2)\n\n\t\t// fmt.Println(\"Je lo asset Req\", item_in_single_asset, skuVol, assetsVol, spill_in_one, (1-((float64(item_in_single_asset)*float64(skuVol)*1.10)/float64(assetsVol)))*100)\n\t}\n\n\treqdQty := math.Ceil(float64(sku.Quantity) / float64(item_in_single_asset))\n\ttotal_spill := spill_in_one * reqdQty\n\n\tif (int32(assetReq) <= asset.FreeCount) && ((lastSpillPercent > total_spill || lastSpillPercent == -1) || (lastSpillPercent == total_spill && (lastFreePercent > assetFreePercent || (lastFreePercent == assetFreePercent && int32(lastVol) < assetsVol)))) {\n\t\treturn structs.AssignedSpaces{\n\t\t\tSuccess: true,\n\t\t\tSpillPercent: total_spill,\n\t\t\tQty: int32(reqdQty),\n\t\t\tItemInSingleAsset: int32(item_in_single_asset),\n\t\t\tFreePerc: assetFreePercent,\n\t\t\tVol: int64(assetsVol),\n\t\t}\n\t}\n\n\t// if int32(assetReq) <= asset.FreeCount {\n\t// \tfmt.Println(lastSpillPercent, total_spill)\n\t// \tif lastSpillPercent > total_spill || lastSpillPercent == -1 {\n\t// \t\tfmt.Println(\"yaha-------1\")\n\t// \t\treturn structs.AssignedSpaces{\n\t// \t\t\tSuccess: true,\n\t// \t\t\tSpillPercent: total_spill,\n\t// \t\t\tQty: int32(reqdQty),\n\t// \t\t\tItemInSingleAsset: int32(item_in_single_asset),\n\t// \t\t\tFreePerc: assetFreePercent,\n\t// \t\t\tVol: int64(assetsVol),\n\t// \t\t}\n\t// \t} else if lastSpillPercent == total_spill && lastFreePercent < assetFreePercent {\n\t// \t\tfmt.Println(\"yaha-------2\")\n\t// \t\treturn structs.AssignedSpaces{\n\t// \t\t\tSuccess: true,\n\t// \t\t\tSpillPercent: total_spill,\n\t// \t\t\tQty: int32(reqdQty),\n\t// \t\t\tItemInSingleAsset: int32(item_in_single_asset),\n\t// \t\t\tFreePerc: assetFreePercent,\n\t// \t\t\tVol: int64(assetsVol),\n\t// \t\t}\n\t// \t} else if lastSpillPercent == total_spill && lastFreePercent == assetFreePercent && int32(lastVol) < assetsVol {\n\t// \t\tfmt.Println(\"yaha-------3\")\n\t// \t\treturn structs.AssignedSpaces{\n\t// \t\t\tSuccess: true,\n\t// \t\t\tSpillPercent: total_spill,\n\t// \t\t\tQty: int32(reqdQty),\n\t// \t\t\tItemInSingleAsset: int32(item_in_single_asset),\n\t// \t\t\tFreePerc: assetFreePercent,\n\t// \t\t\tVol: int64(assetsVol),\n\t// \t\t}\n\t// \t}\n\t// }\n\treturn structs.AssignedSpaces{Success: false,\n\t\tSpillPercent: 0.00,\n\t\tQty: 0,\n\t\tItemInSingleAsset: 0,\n\t\tFreePerc: 0.00,\n\t\tVol: 0}\n\n}", "func calcTransmissionRisks(cycle Cycle) {\n\tfor i := 0; i < len(Inputs.People); i++ {\n\n\t\t//check people's ids line up\n\t\tthisPerson := Inputs.People[i]\n\t\tif uint(i) != thisPerson.Id {\n\t\t\tfmt.Println(\"Person Id doesn't make position in array\")\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\t// if uninfected\n\t\tunif_TB_state_id := Query.getStateByName(\"Uninfected TB\").Id\n\t\t// active_TB_state_id := Query.getStateByName(\"Active - untreated\").Id\n\t\t// active_treat_1_state_id := Query.getStateByName(\"Active Treated Month 1\").Id\n\t\t// active_treat_2_state_id := Query.getStateByName(\"Active Treated Month 2\").Id\n\t\ttb_chain := Query.getChainByName(\"TB disease and treatment\")\n\n\t\tthis_person_state_id := thisPerson.get_state_by_chain(tb_chain, cycle).Id\n\n\t\tisUsb := 0\n\t\tif thisPerson.get_state_by_chain(Inputs.Chains[BIRTHPLACE_CHAIN_ID], cycle).Name == \"United States\" {\n\t\t\tisUsb = 1\n\t\t}\n\n\t\trace_state_id := thisPerson.get_state_by_chain(Inputs.Chains[RACE_CHAIN_ID], cycle).Id\n\n\t\tif this_person_state_id == unif_TB_state_id {\n\t\t\tQuery.Num_susceptible_by_cycle_isUsb_and_race[cycle.Id][isUsb][race_state_id] += 1\n\t\t\tQuery.Total_susceptible_by_cycle[cycle.Id] += 1\n\t\t}\n\n\t\t// originally, all people in active + active treat m 1 + active treat m 2 were here\n\t\t// but it's 6 per CASE, not 6 per person. this is a more accurate way, since (almost) everyone\n\t\t// will eventually be treated, and this is only one month of contributing risk\n\t\t// if this_person_state_id == active_treat_1_state_id { //this_person_state_id == active_TB_state_id || || this_person_state_id == active_treat_2_state_id {\n\t\tQuery.Total_active_by_cycle[cycle.Id] += thisPerson.RiskOfProgression\n\n\t\tQuery.Num_active_cases_by_cycle_isUsb_and_race[cycle.Id][isUsb][race_state_id] += thisPerson.RiskOfProgression\n\n\t\t// }\n\n\t}\n\n\t//// -------------------------- NOTE I'VE TAKE OUT TRANSMISSION BY RACE AND BIRTHPLACE FOR NOW\n\n\tgeneralPopulationRisk := float64(Query.Total_active_by_cycle[cycle.Id]) / float64(Query.Total_susceptible_by_cycle[cycle.Id]) * 0.2\n\n\t// fmt.Println(\"In cycle \", cycle.Id, \" we have general population risk of: \", generalPopulationRisk)\n\n\t// calculate risk\n\tfor isUsb := 0; isUsb < 2; isUsb++ {\n\t\tfor r := 0; r < len(Inputs.States); r++ {\n\t\t\tnumSus := Query.Num_susceptible_by_cycle_isUsb_and_race[cycle.Id][isUsb][r]\n\t\t\tif numSus > 0 {\n\t\t\t\tnumActive := Query.Num_active_cases_by_cycle_isUsb_and_race[cycle.Id][isUsb][r]\n\t\t\t\t// todo make real\n\n\t\t\t\t//xyx\n\n\t\t\t\ttrans_adjustment := 0.0\n\t\t\t\tif cycle.Id <= 12 {\n\t\t\t\t\ttrans_adjustment = 1 //2.1\n\t\t\t\t} else if cycle.Id > 12 && cycle.Id <= 24 {\n\t\t\t\t\ttrans_adjustment = 1 //1.1\n\t\t\t\t} else if cycle.Id > 24 && cycle.Id <= 36 {\n\t\t\t\t\ttrans_adjustment = 1 //1.1\n\t\t\t\t} else {\n\t\t\t\t\ttrans_adjustment = 1.0\n\t\t\t\t}\n\n\t\t\t\trisk := ((float64(numActive)/float64(numSus))*0.8 + generalPopulationRisk) * trans_adjustment * NumberOfLtbiCasesCausedByOneActiveCase.Value\n\n\t\t\t\t// if float64(numActive)/float64(numSus) > 0 {\n\t\t\t\t// \tfmt.Println(\"risk in \", Inputs.States[b].Name, Inputs.States[r].Name, \" is \", float64(numActive)/float64(numSus))\n\t\t\t\t// }\n\n\t\t\t\tif risk > 1 {\n\t\t\t\t\trisk = 1\n\t\t\t\t}\n\t\t\t\tQuery.LTBI_risk_by_cycle_isUsb_and_race[cycle.Id][isUsb][r] = risk\n\t\t\t\t// fmt.Println(\"usb \", isUsb, \" race \", Inputs.States[r].Name, \" risk is \", numActive, \" / \", numSus, \" = \", risk)\n\n\t\t\t}\n\t\t}\n\t}\n\n}", "func filterBdevScanResponse(incBdevs *BdevDeviceList, resp *BdevScanResponse) (*BdevScanResponse, error) {\n\toldCtrlrRefs := resp.Controllers\n\tnewCtrlrRefs := make(NvmeControllers, 0, len(oldCtrlrRefs))\n\n\tfor _, oldCtrlrRef := range oldCtrlrRefs {\n\t\taddr, err := hardware.NewPCIAddress(oldCtrlrRef.PciAddr)\n\t\tif err != nil {\n\t\t\tcontinue // If we cannot parse the address, leave it out.\n\t\t}\n\n\t\tif addr.IsVMDBackingAddress() {\n\t\t\tvmdAddr, err := addr.BackingToVMDAddress()\n\t\t\tif err != nil {\n\t\t\t\treturn nil, errors.Wrap(err, \"convert pci address of vmd backing device\")\n\t\t\t}\n\t\t\t// If addr is a VMD backing address, use the VMD endpoint instead as that is the\n\t\t\t// address that will be in the config.\n\t\t\taddr = vmdAddr\n\t\t}\n\n\t\t// Retain controller details if address is in config.\n\t\tif incBdevs.Contains(addr) {\n\t\t\tnewCtrlrRef := &NvmeController{}\n\t\t\t*newCtrlrRef = *oldCtrlrRef\n\t\t\tnewCtrlrRefs = append(newCtrlrRefs, newCtrlrRef)\n\t\t}\n\t}\n\n\treturn &BdevScanResponse{\n\t\tControllers: newCtrlrRefs,\n\t\tVMDEnabled: resp.VMDEnabled,\n\t}, nil\n}", "func validateDevices(agentDevices, containerDevices []device.Device) bool {\n\tfor _, d := range containerDevices {\n\t\tif !slices.Contains(agentDevices, d) {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "func (agent *ecsAgent) checkCompatibility(engine engine.TaskEngine) error {\n\n\t// We don't need to do these checks if CPUMemLimit is disabled\n\tif !agent.cfg.TaskCPUMemLimit.Enabled() {\n\t\treturn nil\n\t}\n\n\ttasks, err := engine.ListTasks()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Loop over each task to determine if the state is compatible with the running version of agent and its options\n\tcompatible := true\n\tfor _, task := range tasks {\n\t\tif !task.MemoryCPULimitsEnabled {\n\t\t\tseelog.Warnf(\"App: task from state file is not compatible with TaskCPUMemLimit setting, because it is not using ecs' cgroup hierarchy: %s\", task.Arn)\n\t\t\tcompatible = false\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif compatible {\n\t\treturn nil\n\t}\n\n\tif agent.cfg.TaskCPUMemLimit.Value == config.ExplicitlyEnabled {\n\t\treturn errors.New(\"App: unable to load old tasks because TaskCPUMemLimits setting is incompatible with old state.\")\n\t}\n\n\tseelog.Warn(\"App: disabling TaskCPUMemLimit.\")\n\tagent.cfg.TaskCPUMemLimit.Value = config.ExplicitlyDisabled\n\n\treturn nil\n}", "func checkAppAndACL(ctx *zedrouterContext, instData *networkAttrs) {\n\tpub := ctx.pubAppNetworkStatus\n\titems := pub.GetAll()\n\tfor _, st := range items {\n\t\tstatus := st.(types.AppNetworkStatus)\n\t\tappID := status.UUIDandVersion.UUID\n\t\tfor i, ulStatus := range status.UnderlayNetworkList {\n\t\t\tlog.Tracef(\"===FlowStats: (index %d) AppNum %d, VifInfo %v, IP addr %v, Hostname %s\\n\",\n\t\t\t\ti, status.AppNum, ulStatus.VifInfo, ulStatus.AllocatedIPAddr, ulStatus.HostName)\n\n\t\t\tulconfig := ulStatus.UnderlayNetworkConfig\n\t\t\t// build an App-IPaddress/intfs cache indexed by App-number\n\t\t\ttmpAppInfo := appInfo{\n\t\t\t\tipaddr: net.ParseIP(ulStatus.AllocatedIPAddr),\n\t\t\t\tintf: ulStatus.Name,\n\t\t\t\tlocalintf: ulStatus.Bridge,\n\t\t\t}\n\t\t\tnetstatus := lookupNetworkInstanceStatus(ctx, ulconfig.Network.String())\n\t\t\tif netstatus != nil {\n\t\t\t\tif netstatus.Type == types.NetworkInstanceTypeSwitch {\n\t\t\t\t\tif _, ok := netstatus.IPAssignments[ulStatus.Mac]; ok {\n\t\t\t\t\t\ttmpAppInfo.ipaddr = netstatus.IPAssignments[ulStatus.Mac]\n\t\t\t\t\t\tlog.Tracef(\"===FlowStats: switchnet, get ip %v\\n\", tmpAppInfo.ipaddr)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tinstData.appIPinfo[status.AppNum] = append(instData.appIPinfo[status.AppNum], tmpAppInfo)\n\n\t\t\t// Fill in the bnNet indexed by bridge-name, used for loop through bridges, and Scope\n\t\t\tintfAttr := bridgeAttr{\n\t\t\t\tbridge: ulStatus.Bridge,\n\t\t\t\tnetUUID: ulconfig.Network,\n\t\t\t}\n\t\t\tinstData.bnNet[ulStatus.Bridge] = intfAttr\n\n\t\t\t// build an App list cache, used for loop through all the Apps\n\t\t\tif instData.appNet[status.AppNum] == nilUUID {\n\t\t\t\tinstData.appNet[status.AppNum] = status.UUIDandVersion.UUID\n\t\t\t\tlog.Tracef(\"===FlowStats: appNet appNum %d, uuid %v\\n\", status.AppNum, instData.appNet[status.AppNum])\n\t\t\t}\n\n\t\t\t// build an acl cache indexed by app/aclnum, from flow MARK, we can get this aclAttr info\n\t\t\ttmpMap := instData.ipaclattr[status.AppNum]\n\t\t\tif tmpMap == nil {\n\t\t\t\ttmpMap := make(map[int]aclAttr)\n\t\t\t\tinstData.ipaclattr[status.AppNum] = tmpMap\n\t\t\t}\n\t\t\trules := getNetworkACLRules(ctx, appID, ulStatus.Name)\n\t\t\tfor _, rule := range rules.ACLRules {\n\t\t\t\tif (rule.IsUserConfigured == false || rule.IsMarkingRule == true) &&\n\t\t\t\t\trule.IsDefaultDrop == false {\n\t\t\t\t\t// only include user defined rules and default drop rules\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tvar tempAttr aclAttr\n\t\t\t\ttempAttr.aclNum = uint32(rule.RuleID)\n\t\t\t\ttempAttr.chainName = rule.ActionChainName\n\t\t\t\ttempAttr.aclName = rule.RuleName\n\t\t\t\ttempAttr.tableName = rule.Table\n\t\t\t\ttempAttr.bridge = ulStatus.Bridge\n\t\t\t\ttempAttr.intfname = ulStatus.Name\n\n\t\t\t\tif _, ok := instData.ipaclattr[status.AppNum][int(rule.RuleID)]; !ok { // fake j as the aclNUM\n\t\t\t\t\tinstData.ipaclattr[status.AppNum][int(rule.RuleID)] = tempAttr\n\t\t\t\t} else {\n\t\t\t\t\tpreAttr := instData.ipaclattr[status.AppNum][int(rule.RuleID)]\n\t\t\t\t\t// the the entry exist, and already has the aclNum and bridge name, skip\n\t\t\t\t\tif preAttr.aclNum == 0 || preAttr.bridge == \"\" {\n\t\t\t\t\t\tinstData.ipaclattr[status.AppNum][int(rule.RuleID)] = tempAttr\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "func checkSite(config *pkg.Target) {\n\ttype Check struct {\n\t\tStatusCode int\n\t\tContent string\n\t}\n\n\tchecks := make([]Check, 3)\n\n\tfor i := 2; i >= 0; i-- {\n\t\tresp, err := config.MakeRequest()\n\n\t\tif err != nil {\n\t\t\tlog.Printf(\"There was an error checking %s, %s\\n\", config.URL, err.Error())\n\t\t\tcontinue\n\t\t}\n\t\tcontent := config.ParseContent(resp)\n\t\tlog.Printf(\"%s [%d]: %v\", config.URL, i, resp.Status)\n\n\t\tchecks[i] = Check{StatusCode: resp.StatusCode, Content: content}\n\t}\n\n\thealthyCount := 0\nresolution:\n\tfor i := 0; i <= 2; i++ {\n\t\tcheck := checks[i]\n\t\tisHealthy, err := config.IsHealthyCheck(pkg.Checker{\n\t\t\tStatusCode: check.StatusCode,\n\t\t\tContent: check.Content,\n\t\t})\n\t\tswitch {\n\t\tcase i == 0:\n\n\t\t\tif !isHealthy {\n\t\t\t\tlog.Println(err)\n\t\t\t\tbreak resolution\n\t\t\t}\n\t\t\thealthyCount++\n\t\tdefault:\n\t\t\tif isHealthy {\n\t\t\t\thealthyCount++\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err)\n\t\t\t}\n\t\t}\n\t}\n\tlog.Printf(\"finished checking %s, total checks %d, total healthy %d, total unhealthy %d \\n\", config.URL, len(checks), healthyCount, len(checks)-healthyCount)\n\n}", "func task_scan_and_notify() {\n t := time.NewTicker(time.Second*60) // Fixed for testing, configurable when done\n\n var htt []string\n\n for range t.C {\n // Dump the list of hosts\n rs, er := dbconn.Query(\"SELECT host from hosts ORDER BY host ASC\")\n if (er != nil) {\n log.Fatalf(\"Fatal compiling list for scan and notify\")\n }\n\n var hh string\n for rs.Next() {\n er = rs.Scan(&hh)\n if (er != nil) {\n log.Fatalf(\"Fatal compiling list for scan and notify\")\n }\n\n htt = append(htt, hh)\n }\n\n // For each host, run checks and send notifications\n\n for c, _ := range htt {\n rss, err := dbconn.Query(\"SELECT * FROM reports WHERE hostname = '\" + htt[c] + \"' ORDER BY timestamp DESC LIMIT 2\")\n if (err != nil) {\n log.Fatalf(\"Fatal attempting to scan and notify 1\")\n }\n\n var f0, f1, f2, f3, f4, f5, f6, f7, f8, f9, f10, f11 string\n var f0h, f1h, f2h, f3h, f4h, f5h, f6h, f7h, f8h, f9h, f10h, f11h string\n // Collect data point 1 for this host (most recent)\n rss.Next()\n err = rss.Scan(&f0, &f1, &f2, &f3, &f4, &f5, &f6, &f7, &f8, &f9, &f10, &f11)\n if (err != nil) {\n log.Printf(\"Skipping inconsistent host \" + htt[c] + \", host in hosts table but no reports found\")\n continue\n }\n\n log.Printf(\"#1: %s %s %s %s %s\", f0, f1, f2, f3, f4)\n\n // Collect data point 2 for this host (historical)\n rss.Next()\n err = rss.Scan(&f0h, &f1h, &f2h, &f3h, &f4h, &f5h, &f6h, &f7h, &f8h, &f9h, &f10h, &f11h)\n if (err != nil) {\n log.Printf(\"Only one record for host \" + htt[c])\n continue\n }\n\n log.Printf(\"#2: %s %s %s %s %s\", f0, f1, f2, f3, f4)\n\n lo, _ := strconv.ParseFloat(f7, 64)\n loh, _ := strconv.ParseFloat(f7h, 64)\n sw, _ := strconv.ParseFloat(f10, 64)\n swh, _ := strconv.ParseFloat(f10h, 64)\n\n dl := math.Abs(lo-loh)\n ds := math.Abs(sw-swh)\n\n log.Printf(\"%f %f\", dl, ds)\n\n // Look at system load and notify on positive differential exceeding Thresholds\n if (lo > loh) {\n if ((lo > g_loadThreshold) && (dl > g_loadFirstDThreshold)) {\n send_email_notification(\"Subject: System load warning on \" + htt[c], \"System load has reached \" + f7 + \" from \" + f7h)\n }\n }\n\n // Look at swap utilization and notify on positive differential exceeding thresholds\n if (sw > swh) {\n if ((sw > g_swapThreshold) && (ds > g_swapFirstDThreshold)) {\n send_email_notification(\"Subject: Swap utilization warning on \" + htt[c], \"Swap utilization has reached \" + f10 + \"% from \" + f10h + \"%\")\n }\n }\n\n // Look at disk report and notify on threshold exceeded\n diskReptComponents := strings.Fields(f11)\n\n for i := 0; i < len(diskReptComponents)-1; i++ {\n valueToTest, _ := strconv.ParseInt(diskReptComponents[i+1], 10, 64)\n\n if ((valueToTest >= g_diskThreshold) && (math.Abs(float64(time.Now().Unix() - lastDNotify[htt[c]])) >= float64(g_diskReportInterval))) {\n send_email_notification(\"Subject: Disk utilization warning on \" + htt[c], \"Disk utilization on \" + diskReptComponents[i] + \" has reached \" + diskReptComponents[i+1] + \"%\")\n lastDNotify[htt[c]] = time.Now().Unix()\n }\n }\n\n }\n\n //log.Printf(\"Host dump follows\")\n //for c, _ := range htt {\n // log.Printf(\" %s\", htt[c])\n //}\n\n htt = nil\n\n }\n}", "func (a *Antigua) Check(plateType, plateNumber string) ([]Ticket, error) {\n\tresp, err := a.Client.PostForm(antiguaURL, url.Values{\n\t\t\"placa_total\": {fmt.Sprintf(\"%s-%s\", plateType, plateNumber)},\n\t})\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdoc, err := goquery.NewDocumentFromResponse(resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar tickets []Ticket\n\n\tdoc.Find(`.main table:last-child tbody tr`).Each(func(idx int, sel *goquery.Selection) {\n\t\tif idx == 0 {\n\t\t\treturn\n\t\t}\n\t\tif sel.Children().Length() == 0 {\n\t\t\treturn\n\t\t}\n\t\tticket := Ticket{Entity: antiguaEntity}\n\t\tsel.Children().Each(func(cIdx int, cSel *goquery.Selection) {\n\t\t\tswitch cIdx {\n\t\t\tcase 0:\n\t\t\t\tticket.ID = CleanStrings(cSel.First().Text())\n\t\t\tcase 1:\n\t\t\t\tticket.Date = CleanStrings(cSel.First().Text())\n\t\t\tcase 2:\n\t\t\t\tticket.Location = CleanStrings(cSel.Text())\n\t\t\tcase 3:\n\t\t\t\tticket.Info = CleanStrings(cSel.Text())\n\t\t\tcase 5:\n\t\t\t\tticket.Amount = CleanStrings(cSel.Text())\n\t\t\tcase 7:\n\t\t\t\tticket.Total = CleanStrings(cSel.Text())\n\t\t\t\ttickets = append(tickets, ticket)\n\t\t\t}\n\t\t})\n\n\t})\n\n\treturn tickets, nil\n}", "func (a *attack) prof() {\n\tcheck := false\n\tfor i := 0; i < 2; i++ {\n\t\turls := []url{\n\t\t\turl{`validateGroupIdentifier`, fmt.Sprintf(validateGroupIdentifier, a.endpoint),\n\t\t\t\tfmt.Sprintf(POSTvalidateGroupIdentifier, a.udid, a.groupID), `POST`,\n\t\t\t\t&map[string]interface{}{\n\t\t\t\t\t\"Header\": map[string][]string{\n\t\t\t\t\t\t\"User-Agent\": []string{a.agent},\n\t\t\t\t\t\t\"Content-Type\": []string{\"application/json\"}}}},\n\t\t\turl{`validateGroupSelector`, fmt.Sprintf(validateGroupSelector, a.endpoint),\n\t\t\t\tfmt.Sprintf(POSTvalidateGroupSelector, a.sid, a.udid, a.subGroup, a.subGroupInt), `POST`,\n\t\t\t\t&map[string]interface{}{\n\t\t\t\t\t\"Header\": map[string][]string{\n\t\t\t\t\t\t\"User-Agent\": []string{a.agent},\n\t\t\t\t\t\t\"Content-Type\": []string{\"application/json\"}}}},\n\t\t}\n\n\t\tbodyBytes := a.webCall(&urls[i])\n\t\tif bodyBytes == nil {\n\t\t\tcontinue\n\t\t}\n\n\t\tbresp := &validate{}\n\t\terr := json.Unmarshal(bodyBytes, bresp)\n\t\tif err != nil {\n\t\t\ta.log.Errorf(nil, \"Response Marshall Error: %v\", err)\n\t\t}\n\t\ta.sid = bresp.Header.SID //Populate SID\n\t\ta.groups = bresp.Next.Groups //Populate SubGruops\n\t\tif a.method == \"auth-val\" {\n\t\t\treturn\n\t\t}\n\t\tif len(bresp.Next.Groups) > 0 && (a.subGroup != \"\" && a.subGroupInt != 0) {\n\t\t\tif a.method == \"auth-gid\" {\n\t\t\t\treturn\n\t\t\t}\n\t\t\ta.log.Infof([]interface{}{a.endpoint, len(bresp.Next.Groups)}, \"SubGroups Available\")\n\t\t\tfor k, v := range bresp.Next.Groups {\n\t\t\t\ta.log.Successf([]interface{}{k, v}, \"SubGroup Identified\")\n\t\t\t}\n\t\t} else if a.subGroup != \"\" && a.subGroupInt != 0 {\n\t\t\tcheck = a.validate(bresp.Next.Type)\n\t\t} else {\n\t\t\tcheck = a.validate(bresp.Next.Type)\n\t\t\treturn\n\t\t}\n\t}\n\tif !check {\n\t\ta.log.Failf(nil, \"Profiling Failed\")\n\t}\n}", "func (mtbulk *MTbulk) ResponseCollector(ctx context.Context) {\n\thostsErrors := make(map[entities.Host][]error)\n\ncollectorLooop:\n\tfor {\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\tbreak collectorLooop\n\t\tcase result, ok := <-mtbulk.Results:\n\t\t\tif !ok {\n\t\t\t\tbreak collectorLooop\n\t\t\t}\n\t\t\tif result.Errors != nil {\n\t\t\t\thostsErrors[result.Job.Host] = append(hostsErrors[result.Job.Host], result.Errors...)\n\t\t\t}\n\n\t\t\tif (mtbulk.Verbose && result.Job.Host != entities.Host{}) {\n\t\t\t\tfmt.Printf(\"%s > /// job: \\\"%s\\\"\\n\", result.Job.Host, result.Job.Kind)\n\t\t\t\tfor _, commandResult := range result.Results {\n\t\t\t\t\tfor _, response := range commandResult.Responses {\n\t\t\t\t\t\tfor _, line := range strings.Split(response, \"\\n\") {\n\t\t\t\t\t\t\tif line != \"\" {\n\t\t\t\t\t\t\t\tfmt.Printf(\"%s > %s\\n\", result.Job.Host, line)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tif len(hostsErrors) == 0 {\n\t\treturn\n\t}\n\n\tmtbulk.Status.SetCode(1)\n\n\tif mtbulk.SkipSummary {\n\t\treturn\n\t}\n\n\tvulnerabilitiesDetected := false\n\n\tfmt.Println()\n\tfmt.Println(\"Errors list:\")\n\tfor host, errors := range hostsErrors {\n\t\tif host.IP != \"\" {\n\t\t\tfmt.Printf(\"Device: %s:%s\\n\", host.IP, host.Port)\n\t\t} else {\n\t\t\tfmt.Println(\"Generic:\")\n\t\t}\n\n\t\tfor _, err := range errors {\n\t\t\tif err == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tfmt.Printf(\"\\t%s\\n\", err)\n\t\t\tif vul, ok := err.(vulnerabilities.VulnerabilityError); ok && vul.Vulnerabilities != nil {\n\t\t\t\tvulnerabilitiesDetected = true\n\t\t\t}\n\t\t}\n\t}\n\n\tif vulnerabilitiesDetected {\n\t\tcves := ExtractCVEs(hostsErrors)\n\n\t\tfmt.Println()\n\t\tfmt.Println(\"Deetected CVE:\")\n\t\tfor _, cve := range cves {\n\t\t\tfmt.Printf(\"%s\\n\", cve)\n\t\t}\n\t}\n}", "func VTMain(apiKey string, sleepTime int, scan bool) bool {\n\tlog.Println(\"VTMain Start\")\n\n\tvar latestIdx int\n\tvar latestSha256 string\n\n\tvtPath := \"config/vt.txt\"\n\n\tlatestIdx, latestSha256 = readFile(vtPath)\n\n\tlog.Println(\"latest Idx: \", latestIdx)\n\tlog.Println(\"latest sha256: \", latestSha256)\n\n\t// Initial\n\tif latestIdx == 0 {\n\t\tlatestIdx = 1\n\t}\n\n\tvar recovIdx int\n\tvar recovSha256 string\n\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\twriteFile(vtPath, recovIdx, recovSha256)\n\t\t\tlog.Fatalln(\"[ERR]API Run Error !!!\")\n\t\t\treturn\n\t\t}\n\t}()\n\n\tvar reportError bool\n\tvar status int\n\n\t_idx := 1\n\tlimitCnt := 51\n\tif latestSha256 == \"\" {\n\t\t_idx = 0\n\t\tlimitCnt = 50\n\t}\n\n\trows, err := pg.GetNoVTSamples(latestIdx, limitCnt)\n\tif rows == nil || err != nil {\n\t\tlog.Fatalln(\"[ERR] Please Check DB\")\n\t\treturn false\n\t}\n\trowCnt := len(rows)\n\n\tlog.Println(\"row count: \", rowCnt-_idx)\n\tif (rowCnt - _idx) <= 0 {\n\t\t//rowCnt = 0 or 1\n\t\tlog.Println(\"No Samples\")\n\t\treturn true\n\t}\n\n\tlog.Println(\"idx\", rows[0].Idx)\n\tlog.Println(\"sha256\", rows[0].Sha256)\n\n\tif latestSha256 != \"\" && (rows[0].Idx != latestIdx || rows[0].Sha256 != latestSha256) {\n\t\tlog.Fatalln(\"[ERR] Please Check malwares Table <-> config/vt.txt\")\n\t\treturn false\n\t}\n\n\t// recovery ---> 아래 for문에서 에러 발생 시 row.Idx, row.Sha256 저장.\n\tfor _, row := range rows[_idx:] {\n\n\t\tlog.Println(row.Idx)\n\t\tlog.Println(row.Sha256)\n\n\t\treport, status, err := GetFileReport(apiKey, row.Sha256, row.Idx)\n\t\tif report == nil || status != 200 {\n\t\t\t// status : -1 || 204 || 400 || 403\n\n\t\t\tlog.Println(\"No Report (idx, sha256)\", row.Idx, row.Sha256)\n\t\t\tlog.Println(err)\n\n\t\t\treportError = true\n\t\t\tbreak\n\t\t}\n\n\t\t// No report --> scan option check\n\t\tif report.VTResponse.ResponseCode != 1 {\n\t\t\tlog.Println(\"ResponseCode != 1, mal_idx: \", row.Idx)\n\t\t\tlog.Println(\"ResponseCode !=1 : \", report.VTResponse.ResponseCode)\n\t\t\t// if scan == true --> PostFileScan\n\t\t\t// status_code = 0 : not present in VirusTotal's dataset\n\t\t\t// -2 : is still queued for analysis\n\t\t\t// 1 : present\n\t\t\tif report.VTResponse.ResponseCode == 0 && scan == true {\n\t\t\t\tlog.Println(\"Scan File Start - status 0\")\n\t\t\t\tVTScanMain(apiKey, row.Idx, row.Sha256)\n\t\t\t\tlog.Println(\"Scan File End - status 0\")\n\t\t\t}\n\n\t\t\tif report.VTResponse.ResponseCode == -2 {\n\t\t\t\tlog.Println(\"Scan File Store Start - status -2\")\n\t\t\t\tStoreFileScan(row.Idx, row.Sha256)\n\t\t\t\tlog.Println(\"Scan File Store End - status -2\")\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\n\t\tif report.Sha256 != row.Sha256 {\n\t\t\tlog.Println(\"[ERR]VirusTotal Sha256 != DB Sha256, DB Sha256: \", row.Sha256)\n\t\t\tcontinue\n\t\t}\n\n\t\t// Parsing & Store DB\n\t\tParseVTReport(*report, row.Idx, row.Sha256)\n\n\t\trecovIdx = row.Idx\n\t\trecovSha256 = row.Sha256\n\n\t\ttime.Sleep(time.Duration(sleepTime) * time.Second)\n\t}\n\n\tif reportError == true {\n\t\t// report error return Main\n\t\t// return false\n\t\tlog.Println(\"reportError == true\")\n\t\tif recovIdx != 0 && recovSha256 != \"\" {\n\t\t\tlog.Println(\"Store Idx: \", recovIdx)\n\t\t\tlog.Println(\"Store Sha256: \", recovSha256)\n\t\t\twriteFile(vtPath, recovIdx, recovSha256)\n\t\t\tlog.Println(\"Store before idx, sha256 Complete\")\n\t\t}\n\n\t\tif status == -1 {\n\t\t\tlog.Println(\"Status -1, Return False\")\n\t\t\treturn false\n\t\t}\n\n\t\treturn true\n\t}\n\n\tlatestIdx = rows[rowCnt-1].Idx\n\tlatestSha256 = rows[rowCnt-1].Sha256\n\n\twriteFile(vtPath, latestIdx, latestSha256)\n\n\tlog.Println(\"VTMain End\")\n\treturn true\n}", "func (s *Shell) Scan(reader io.Reader) error {\n\tresp, err := s.clam.ScanReader(reader)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor _, v := range resp {\n\t\tif v.Status == \"FOUND\" {\n\t\t\treturn errors.New(\"virus found\")\n\t\t}\n\t}\n\treturn nil\n}", "func checkKVs(t *testing.T, kvs []client.KeyValue, expected ...interface{}) {\n\texpLen := len(expected) / 2\n\tif expLen != len(kvs) {\n\t\tt.Errorf(\"%s: expected %d scan results, got %d\", errInfo(), expLen, len(kvs))\n\t\treturn\n\t}\n\tfor i := 0; i < expLen; i++ {\n\t\texpKey := expected[2*i].(roachpb.Key)\n\t\tif key := kvs[i].Key; !key.Equal(expKey) {\n\t\t\tt.Errorf(\"%s: expected scan key %d to be %q; got %q\", errInfo(), i, expKey, key)\n\t\t}\n\t\tswitch expValue := expected[2*i+1].(type) {\n\t\tcase int:\n\t\t\tif value, err := kvs[i].Value.GetInt(); err != nil {\n\t\t\t\tt.Errorf(\"%s: non-integer scan value %d: %q\", errInfo(), i, kvs[i].Value)\n\t\t\t} else if value != int64(expValue) {\n\t\t\t\tt.Errorf(\"%s: expected scan value %d to be %d; got %d\",\n\t\t\t\t\terrInfo(), i, expValue, value)\n\t\t\t}\n\t\tcase string:\n\t\t\tif value := kvs[i].Value.String(); value != expValue {\n\t\t\t\tt.Errorf(\"%s: expected scan value %d to be %s; got %s\",\n\t\t\t\t\terrInfo(), i, expValue, value)\n\t\t\t}\n\t\tdefault:\n\t\t\tt.Fatalf(\"unsupported type %T\", expValue)\n\t\t}\n\t}\n}", "func analyzeTestResults(details scan.LabsEndpointDetails) map[string]string {\n\n\tscanTests := []string{\"VulnBeast\", \"RenegSupport\", \"ForwardSecrecy\", \"Heartbeat\", \"Heartbleed\",\n\t\t\"OpenSslCcs\", \"OpenSSLLuckyMinus20\", \"Ticketbleed\", \"Bleichenbacher\",\n\t\t\"Poodle\", \"PoodleTLS\", \"FallbackScsv\", \"Freak\", \"DhYsReuse\", \"Logjam\",\n\t\t\"DrownVulnerable\", \"SupportsRc4\"}\n\tscanDetails := reflect.ValueOf(&details).Elem()\n\tvulnRslts := make(map[string]string)\n\tfor _, test := range scanTests {\n\t\ttestValue := scanDetails.FieldByName(test)\n\t\t// valueType := testValue.Type().String()\n\t\tswitch reflect.TypeOf(testValue.Interface()).Kind() {\n\t\tcase reflect.Int:\n\t\t\tvulnRslts[test] = analyzeResultValue(test, testValue.Int())\n\t\tcase reflect.Bool:\n\t\t\tif testValue.Bool() {\n\t\t\t\tvulnRslts[test] = \"vulnerable\"\n\t\t\t} else {\n\t\t\t\tvulnRslts[test] = \"not vulnerable\"\n\t\t\t}\n\t\tdefault:\n\t\t\tvulnRslts[test] = testValue.String()\n\t\t}\n\t}\n\treturn vulnRslts\n}", "func Scan(target string, options model.Options, sid string) (model.Result, error) {\n\tvar scanResult model.Result\n\toptions.ScanResult = scanResult\n\tscanResult.StartTime = time.Now()\n\tif !(options.Silence || options.NoSpinner) {\n\t\ttime.Sleep(1 * time.Second) // Waiting log\n\t\ts.Prefix = \" \"\n\t\ts.Suffix = \"\"\n\t\tif !options.NoColor {\n\t\t\ts.Color(\"red\", \"bold\")\n\t\t}\n\t\toptions.SpinnerObject = s\n\t\ts.Start()\n\t}\n\n\tscanObject := model.Scan{\n\t\tScanID: sid,\n\t\tURL: target,\n\t}\n\tif !(options.Silence && options.MulticastMode) {\n\t\tprinting.DalLog(\"SYSTEM\", \"Start Scan 🦊\", options)\n\t\t//printing.DalLog(\"SYSTEM-M\", \"Start Scan 🦊\", options)\n\t\tif options.AllURLS > 0 {\n\t\t\tsnow, _ := strconv.Atoi(sid)\n\t\t\tpercent := fmt.Sprintf(\"%0.2f%%\", float64(snow)/float64(options.AllURLS)*100)\n\t\t\tprinting.DalLog(\"SYSTEM-M\", \"🦊 Start scan [SID:\"+sid+\"][\"+sid+\"/\"+strconv.Itoa(options.AllURLS)+\"][\"+percent+\"%] / URL: \"+target, options)\n\t\t} else {\n\t\t\tprinting.DalLog(\"SYSTEM-M\", \"🦊 Start scan [SID:\"+sid+\"] / URL: \"+target, options)\n\t\t}\n\t}\n\n\t// query is XSS payloads\n\tquery := make(map[*http.Request]map[string]string)\n\n\t// params is \"param name\":true (reflected?)\n\t// 1: non-reflected , 2: reflected , 3: reflected-with-sc\n\tparams := make(map[string][]string)\n\n\t// durls is url for dom xss\n\tvar durls []string\n\n\tvStatus := make(map[string]bool)\n\tvStatus[\"pleasedonthaveanamelikethis_plz_plz\"] = false\n\n\t// policy is \"CSP\":domain..\n\tpolicy := make(map[string]string)\n\n\t// set up a rate limit\n\trl := newRateLimiter(time.Duration(options.Delay * 1000000))\n\n\tparsedURL, err := url.Parse(target)\n\tif err != nil {\n\t\tprinting.DalLog(\"SYSTEM\", \"Not running \"+target+\" url\", options)\n\t\treturn scanResult, err\n\t}\n\ttreq := optimization.GenerateNewRequest(target, \"\", options)\n\t//treq, terr := http.NewRequest(\"GET\", target, nil)\n\tif treq == nil {\n\t} else {\n\t\ttransport := getTransport(options)\n\t\tt := options.Timeout\n\t\tclient := &http.Client{\n\t\t\tTimeout: time.Duration(t) * time.Second,\n\t\t\tTransport: transport,\n\t\t}\n\n\t\tif !options.FollowRedirect {\n\t\t\tclient.CheckRedirect = func(req *http.Request, via []*http.Request) error {\n\t\t\t\treturn http.ErrUseLastResponse\n\t\t\t}\n\t\t}\n\n\t\ttres, err := client.Do(treq)\n\t\tif err != nil {\n\t\t\tmsg := fmt.Sprintf(\"not running %v\", err)\n\t\t\tprinting.DalLog(\"ERROR\", msg, options)\n\t\t\treturn scanResult, err\n\t\t}\n\t\tif options.IgnoreReturn != \"\" {\n\t\t\trcode := strings.Split(options.IgnoreReturn, \",\")\n\t\t\ttcode := strconv.Itoa(tres.StatusCode)\n\t\t\tfor _, v := range rcode {\n\t\t\t\tif tcode == v {\n\t\t\t\t\tprinting.DalLog(\"SYSTEM\", \"Not running \"+target+\" url from --ignore-return option\", options)\n\t\t\t\t\treturn scanResult, nil\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tdefer tres.Body.Close()\n\t\tbody, err := ioutil.ReadAll(tres.Body)\n\t\tprinting.DalLog(\"SYSTEM\", \"Valid target [ code:\"+strconv.Itoa(tres.StatusCode)+\" / size:\"+strconv.Itoa(len(body))+\" ]\", options)\n\t}\n\n\tif options.Format == \"json\" {\n\t\tprinting.DalLog(\"PRINT\", \"[\", options)\n\t}\n\n\tvar wait sync.WaitGroup\n\ttask := 3\n\tsa := \"SA: ✓ \"\n\tpa := \"PA: ✓ \"\n\tbav := \"BAV: ✓ \"\n\tif options.NoBAV {\n\t\ttask = 2\n\t\tbav = \"\"\n\t}\n\n\twait.Add(task)\n\tprinting.DalLog(\"SYSTEM\", \"[\"+sa+pa+bav+\"] Waiting for analysis 🔍\", options)\n\tgo func() {\n\t\tdefer wait.Done()\n\t\tpolicy, options.PathReflection = StaticAnalysis(target, options, rl)\n\t\tsa = options.AuroraObject.Green(sa).String()\n\t\tprinting.DalLog(\"SYSTEM\", \"[\"+sa+pa+bav+\"] Waiting for analysis 🔍\", options)\n\t}()\n\tgo func() {\n\t\tdefer wait.Done()\n\t\tparams = ParameterAnalysis(target, options, rl)\n\t\tpa = options.AuroraObject.Green(pa).String()\n\t\tprinting.DalLog(\"SYSTEM\", \"[\"+sa+pa+bav+\"] Waiting for analysis 🔍\", options)\n\t}()\n\tif !options.NoBAV {\n\t\tgo func() {\n\t\t\tdefer wait.Done()\n\t\t\tvar bavWaitGroup sync.WaitGroup\n\t\t\tbavTask := 4\n\t\t\tbavWaitGroup.Add(bavTask)\n\t\t\tgo func() {\n\t\t\t\tdefer bavWaitGroup.Done()\n\t\t\t\tSqliAnalysis(target, options, rl)\n\t\t\t}()\n\t\t\tgo func() {\n\t\t\t\tdefer bavWaitGroup.Done()\n\t\t\t\tSSTIAnalysis(target, options, rl)\n\t\t\t}()\n\t\t\tgo func() {\n\t\t\t\tdefer bavWaitGroup.Done()\n\t\t\t\tOpenRedirectorAnalysis(target, options, rl)\n\t\t\t}()\n\t\t\tgo func() {\n\t\t\t\tdefer bavWaitGroup.Done()\n\t\t\t\tCRLFAnalysis(target, options, rl)\n\t\t\t}()\n\t\t\tbavWaitGroup.Wait()\n\t\t\tbav = options.AuroraObject.Green(bav).String()\n\t\t\tprinting.DalLog(\"SYSTEM\", \"[\"+sa+pa+bav+\"] Waiting for analysis 🔍\", options)\n\t\t}()\n\t}\n\n\tif options.NowURL != 0 && !options.Silence {\n\t\ts.Suffix = \" [\" + strconv.Itoa(options.NowURL) + \"/\" + strconv.Itoa(options.AllURLS) + \" Tasks] Scanning..\"\n\t}\n\n\tif !(options.Silence || options.NoSpinner) {\n\t\ttime.Sleep(1 * time.Second) // Waiting log\n\t\ts.Start() // Start the spinner\n\t\t//time.Sleep(3 * time.Second) // Run for some time to simulate work\n\t}\n\twait.Wait()\n\n\tif !(options.Silence || options.NoSpinner) {\n\t\ts.Stop()\n\t}\n\tfor k, v := range policy {\n\t\tif len(v) != 0 {\n\t\t\tif k == \"BypassCSP\" {\n\t\t\t\tprinting.DalLog(\"WEAK\", k+\": \"+v, options)\n\t\t\t} else {\n\t\t\t\tprinting.DalLog(\"INFO\", k+\" is \"+v, options)\n\t\t\t}\n\t\t}\n\t}\n\n\tfor k, v := range options.PathReflection {\n\t\tif len(parsedURL.Path) == 0 {\n\t\t\tstr := options.AuroraObject.Yellow(\"dalfoxpathtest\").String()\n\t\t\tprinting.DalLog(\"INFO\", \"Reflected PATH '/\"+str+\"' => \"+v+\"]\", options)\n\t\t} else {\n\t\t\tsplit := strings.Split(parsedURL.Path, \"/\")\n\t\t\tif len(split) > k+1 {\n\t\t\t\tsplit[k+1] = options.AuroraObject.Yellow(\"dalfoxpathtest\").String()\n\t\t\t\ttempURL := strings.Join(split, \"/\")\n\t\t\t\tprinting.DalLog(\"INFO\", \"Reflected PATH '\"+tempURL+\"' => \"+v+\"]\", options)\n\t\t\t}\n\t\t}\n\t}\n\n\tfor k, v := range params {\n\t\tif len(v) != 0 {\n\t\t\tcode, vv := v[len(v)-1], v[:len(v)-1]\n\t\t\tchar := strings.Join(vv, \" \")\n\t\t\t//x, a = a[len(a)-1], a[:len(a)-1]\n\t\t\tprinting.DalLog(\"INFO\", \"Reflected \"+k+\" param => \"+char, options)\n\t\t\tprinting.DalLog(\"CODE\", code, options)\n\t\t}\n\t}\n\n\tif !options.OnlyDiscovery {\n\t\t// XSS Scanning\n\t\tprinting.DalLog(\"SYSTEM\", \"Generate XSS payload and optimization.Optimization.. 🛠\", options)\n\t\t// optimization.Optimization..\n\n\t\t/*\n\t\t\tk: parama name\n\t\t\tv: pattern [injs, inhtml, ' < > ]\n\t\t\tav: reflected type, valid char\n\t\t*/\n\n\t\t// set path base XSS\n\t\tfor k, v := range options.PathReflection {\n\t\t\tif strings.Contains(v, \"Injected:\") {\n\t\t\t\t// Injected pattern\n\t\t\t\tinjectedPoint := strings.Split(v, \"/\")\n\t\t\t\tinjectedPoint = injectedPoint[1:]\n\n\t\t\t\tfor _, ip := range injectedPoint {\n\t\t\t\t\tvar arr []string\n\t\t\t\t\tif strings.Contains(ip, \"inJS\") {\n\t\t\t\t\t\tarr = optimization.SetPayloadValue(getInJsPayload(ip), options)\n\t\t\t\t\t}\n\t\t\t\t\tif strings.Contains(ip, \"inHTML\") {\n\t\t\t\t\t\tarr = optimization.SetPayloadValue(getHTMLPayload(ip), options)\n\t\t\t\t\t}\n\t\t\t\t\tif strings.Contains(ip, \"inATTR\") {\n\t\t\t\t\t\tarr = optimization.SetPayloadValue(getAttrPayload(ip), options)\n\t\t\t\t\t}\n\t\t\t\t\tfor _, avv := range arr {\n\t\t\t\t\t\tvar tempURL string\n\t\t\t\t\t\tif len(parsedURL.Path) == 0 {\n\t\t\t\t\t\t\ttempURL = target + \"/\" + avv\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\tsplit := strings.Split(target, \"/\")\n\t\t\t\t\t\t\tsplit[k+3] = split[k+3] + avv\n\t\t\t\t\t\t\ttempURL = strings.Join(split, \"/\")\n\t\t\t\t\t\t}\n\t\t\t\t\t\t// Add Path XSS Query\n\t\t\t\t\t\ttq, tm := optimization.MakeRequestQuery(tempURL, \"\", \"\", ip, \"toAppend\", \"NaN\", options)\n\t\t\t\t\t\ttm[\"payload\"] = avv\n\t\t\t\t\t\tquery[tq] = tm\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif isAllowType(policy[\"Content-Type\"]) && !options.OnlyCustomPayload {\n\t\t\t// Set common payloads\n\t\t\tcu, err := url.Parse(target)\n\t\t\tvar cp url.Values\n\t\t\tvar cpd url.Values\n\t\t\tvar cpArr []string\n\t\t\tvar cpdArr []string\n\t\t\thashParam := false\n\t\t\tif err == nil {\n\t\t\t\tif options.Data == \"\" {\n\t\t\t\t\tcp, _ = url.ParseQuery(cu.RawQuery)\n\t\t\t\t\tif len(cp) == 0 {\n\t\t\t\t\t\tcp, _ = url.ParseQuery(cu.Fragment)\n\t\t\t\t\t\thashParam = true\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tcp, _ = url.ParseQuery(cu.RawQuery)\n\t\t\t\t\tcpd, _ = url.ParseQuery(options.Data)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tfor v := range cp {\n\t\t\t\tif optimization.CheckUniqParam(options, v) {\n\t\t\t\t\tcpArr = append(cpArr, v)\n\t\t\t\t\tarc := optimization.SetPayloadValue(getCommonPayload(), options)\n\t\t\t\t\tfor _, avv := range arc {\n\t\t\t\t\t\t// Add plain XSS Query\n\t\t\t\t\t\ttq, tm := optimization.MakeRequestQuery(target, v, avv, \"inHTML-URL\", \"toAppend\", \"NaN\", options)\n\t\t\t\t\t\tquery[tq] = tm\n\t\t\t\t\t\t// Add URL encoded XSS Query\n\t\t\t\t\t\tetq, etm := optimization.MakeRequestQuery(target, v, avv, \"inHTML-URL\", \"toAppend\", \"urlEncode\", options)\n\t\t\t\t\t\tquery[etq] = etm\n\t\t\t\t\t\t// Add HTML Encoded XSS Query\n\t\t\t\t\t\thtq, htm := optimization.MakeRequestQuery(target, v, avv, \"inHTML-URL\", \"toAppend\", \"htmlEncode\", options)\n\t\t\t\t\t\tquery[htq] = htm\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tfor v := range cpd {\n\t\t\t\tif optimization.CheckUniqParam(options, v) {\n\t\t\t\t\tcpdArr = append(cpdArr, v)\n\t\t\t\t\tarc := optimization.SetPayloadValue(getCommonPayload(), options)\n\t\t\t\t\tfor _, avv := range arc {\n\t\t\t\t\t\t// Add plain XSS Query\n\t\t\t\t\t\ttq, tm := optimization.MakeRequestQuery(target, v, avv, \"inHTML-FORM\", \"toAppend\", \"NaN\", options)\n\t\t\t\t\t\tquery[tq] = tm\n\t\t\t\t\t\t// Add URL encoded XSS Query\n\t\t\t\t\t\tetq, etm := optimization.MakeRequestQuery(target, v, avv, \"inHTML-FORM\", \"toAppend\", \"urlEncode\", options)\n\t\t\t\t\t\tquery[etq] = etm\n\t\t\t\t\t\t// Add HTML Encoded XSS Query\n\t\t\t\t\t\thtq, htm := optimization.MakeRequestQuery(target, v, avv, \"inHTML-FORM\", \"toAppend\", \"htmlEncode\", options)\n\t\t\t\t\t\tquery[htq] = htm\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// DOM XSS payload\n\t\t\tvar dlst []string\n\t\t\tif options.UseHeadless {\n\t\t\t\tif options.UseDeepDXSS {\n\t\t\t\t\tdlst = getDeepDOMXSPayload()\n\t\t\t\t} else {\n\t\t\t\t\tdlst = getDOMXSSPayload()\n\t\t\t\t}\n\t\t\t\tdpayloads := optimization.SetPayloadValue(dlst, options)\n\t\t\t\tfor v := range cp {\n\t\t\t\t\tif optimization.CheckUniqParam(options, v) {\n\t\t\t\t\t\t// loop payload list\n\t\t\t\t\t\tif len(params[v]) == 0 {\n\t\t\t\t\t\t\tfor _, dpayload := range dpayloads {\n\t\t\t\t\t\t\t\tvar durl string\n\t\t\t\t\t\t\t\tu, _ := url.Parse(target)\n\t\t\t\t\t\t\t\tdp, _ := url.ParseQuery(u.RawQuery)\n\t\t\t\t\t\t\t\tif hashParam {\n\t\t\t\t\t\t\t\t\tdp, _ = url.ParseQuery(u.Fragment)\n\t\t\t\t\t\t\t\t\tdp.Set(v, dpayload)\n\t\t\t\t\t\t\t\t\tu.Fragment, _ = url.QueryUnescape(dp.Encode())\n\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\tdp.Set(v, dpayload)\n\t\t\t\t\t\t\t\t\tu.RawQuery = dp.Encode()\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\tdurl = u.String()\n\t\t\t\t\t\t\t\tdurls = append(durls, durl)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tfor v := range cpd {\n\t\t\t\t\tif optimization.CheckUniqParam(options, v) {\n\t\t\t\t\t\t// loop payload list\n\t\t\t\t\t\tif len(params[v]) == 0 {\n\t\t\t\t\t\t\tfor _, dpayload := range dpayloads {\n\t\t\t\t\t\t\t\tvar durl string\n\t\t\t\t\t\t\t\tu, _ := url.Parse(target)\n\t\t\t\t\t\t\t\tdp, _ := url.ParseQuery(u.RawQuery)\n\t\t\t\t\t\t\t\tif hashParam {\n\t\t\t\t\t\t\t\t\tdp, _ = url.ParseQuery(u.Fragment)\n\t\t\t\t\t\t\t\t\tdp.Set(v, dpayload)\n\t\t\t\t\t\t\t\t\tu.Fragment, _ = url.QueryUnescape(dp.Encode())\n\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\tdp.Set(v, dpayload)\n\t\t\t\t\t\t\t\t\tu.RawQuery = dp.Encode()\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\tdurl = u.String()\n\t\t\t\t\t\t\t\tdurls = append(durls, durl)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Set param base xss\n\t\t\tfor k, v := range params {\n\t\t\t\tif optimization.CheckUniqParam(options, k) {\n\t\t\t\t\tvStatus[k] = false\n\t\t\t\t\tptype := \"\"\n\t\t\t\t\tchars := GetSpecialChar()\n\t\t\t\t\tvar badchars []string\n\n\t\t\t\t\tfor _, av := range v {\n\t\t\t\t\t\tif indexOf(av, chars) == -1 {\n\t\t\t\t\t\t\tbadchars = append(badchars, av)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif strings.Contains(av, \"PTYPE:\") {\n\t\t\t\t\t\t\tptype = GetPType(av)\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tif strings.Contains(av, \"Injected:\") {\n\t\t\t\t\t\t\t// Injected pattern\n\t\t\t\t\t\t\tinjectedPoint := strings.Split(av, \"/\")\n\t\t\t\t\t\t\tinjectedPoint = injectedPoint[1:]\n\t\t\t\t\t\t\tfor _, ip := range injectedPoint {\n\t\t\t\t\t\t\t\tvar arr []string\n\t\t\t\t\t\t\t\tif strings.Contains(ip, \"inJS\") {\n\t\t\t\t\t\t\t\t\tarr = optimization.SetPayloadValue(getInJsPayload(ip), options)\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\tif strings.Contains(ip, \"inHTML\") {\n\t\t\t\t\t\t\t\t\tarr = optimization.SetPayloadValue(getHTMLPayload(ip), options)\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\tif strings.Contains(ip, \"inATTR\") {\n\t\t\t\t\t\t\t\t\tarr = optimization.SetPayloadValue(getAttrPayload(ip), options)\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\tfor _, avv := range arr {\n\t\t\t\t\t\t\t\t\tif optimization.Optimization(avv, badchars) {\n\t\t\t\t\t\t\t\t\t\t// Add plain XSS Query\n\t\t\t\t\t\t\t\t\t\ttq, tm := optimization.MakeRequestQuery(target, k, avv, ip+ptype, \"toAppend\", \"NaN\", options)\n\t\t\t\t\t\t\t\t\t\tquery[tq] = tm\n\t\t\t\t\t\t\t\t\t\t// Add URL Encoded XSS Query\n\t\t\t\t\t\t\t\t\t\tetq, etm := optimization.MakeRequestQuery(target, k, avv, ip+ptype, \"toAppend\", \"urlEncode\", options)\n\t\t\t\t\t\t\t\t\t\tquery[etq] = etm\n\t\t\t\t\t\t\t\t\t\t// Add HTML Encoded XSS Query\n\t\t\t\t\t\t\t\t\t\thtq, htm := optimization.MakeRequestQuery(target, k, avv, ip+ptype, \"toAppend\", \"htmlEncode\", options)\n\t\t\t\t\t\t\t\t\t\tquery[htq] = htm\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\t// common XSS for new param\n\t\t\t\t\tarc := optimization.SetPayloadValue(getCommonPayload(), options)\n\t\t\t\t\tfor _, avv := range arc {\n\t\t\t\t\t\tif !containsFromArray(cpArr, k) {\n\t\t\t\t\t\t\tif optimization.Optimization(avv, badchars) {\n\t\t\t\t\t\t\t\t// Add plain XSS Query\n\t\t\t\t\t\t\t\ttq, tm := optimization.MakeRequestQuery(target, k, avv, \"inHTML\"+ptype, \"toAppend\", \"NaN\", options)\n\t\t\t\t\t\t\t\tquery[tq] = tm\n\t\t\t\t\t\t\t\t// Add URL encoded XSS Query\n\t\t\t\t\t\t\t\tetq, etm := optimization.MakeRequestQuery(target, k, avv, \"inHTML\"+ptype, \"toAppend\", \"urlEncode\", options)\n\t\t\t\t\t\t\t\tquery[etq] = etm\n\t\t\t\t\t\t\t\t// Add HTML Encoded XSS Query\n\t\t\t\t\t\t\t\thtq, htm := optimization.MakeRequestQuery(target, k, avv, \"inHTML\"+ptype, \"toAppend\", \"htmlEncode\", options)\n\t\t\t\t\t\t\t\tquery[htq] = htm\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t}\n\t\t} else {\n\t\t\tprinting.DalLog(\"SYSTEM\", \"Type is '\"+policy[\"Content-Type\"]+\"', It does not test except customized payload (custom/blind).\", options)\n\t\t}\n\n\t\t// Blind payload\n\t\tif options.BlindURL != \"\" {\n\t\t\tbpayloads := getBlindPayload()\n\n\t\t\t//strings.HasPrefix(\"foobar\", \"foo\") // true\n\t\t\tvar bcallback string\n\n\t\t\tif strings.HasPrefix(options.BlindURL, \"https://\") || strings.HasPrefix(options.BlindURL, \"http://\") {\n\t\t\t\tbcallback = options.BlindURL\n\t\t\t} else {\n\t\t\t\tbcallback = \"//\" + options.BlindURL\n\t\t\t}\n\n\t\t\tfor _, bpayload := range bpayloads {\n\t\t\t\t// header base blind xss\n\t\t\t\tbp := strings.Replace(bpayload, \"CALLBACKURL\", bcallback, 10)\n\t\t\t\ttq, tm := optimization.MakeHeaderQuery(target, \"Referer\", bp, options)\n\t\t\t\ttm[\"payload\"] = \"toBlind\"\n\t\t\t\tquery[tq] = tm\n\t\t\t}\n\n\t\t\t// loop parameter list\n\t\t\tfor k, v := range params {\n\t\t\t\tif optimization.CheckUniqParam(options, k) {\n\t\t\t\t\tptype := \"\"\n\t\t\t\t\tfor _, av := range v {\n\t\t\t\t\t\tif strings.Contains(av, \"PTYPE:\") {\n\t\t\t\t\t\t\tptype = GetPType(av)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\t// loop payload list\n\t\t\t\t\tfor _, bpayload := range bpayloads {\n\t\t\t\t\t\t// Add plain XSS Query\n\t\t\t\t\t\tbp := strings.Replace(bpayload, \"CALLBACKURL\", bcallback, 10)\n\t\t\t\t\t\ttq, tm := optimization.MakeRequestQuery(target, k, bp, \"toBlind\"+ptype, \"toAppend\", \"NaN\", options)\n\t\t\t\t\t\ttm[\"payload\"] = \"toBlind\"\n\t\t\t\t\t\tquery[tq] = tm\n\t\t\t\t\t\t// Add URL encoded XSS Query\n\t\t\t\t\t\tetq, etm := optimization.MakeRequestQuery(target, k, bp, \"toBlind\"+ptype, \"toAppend\", \"urlEncode\", options)\n\t\t\t\t\t\tetm[\"payload\"] = \"toBlind\"\n\t\t\t\t\t\tquery[etq] = etm\n\t\t\t\t\t\t// Add HTML Encoded XSS Query\n\t\t\t\t\t\thtq, htm := optimization.MakeRequestQuery(target, k, bp, \"toBlind\"+ptype, \"toAppend\", \"htmlEncode\", options)\n\t\t\t\t\t\thtm[\"payload\"] = \"toBlind\"\n\t\t\t\t\t\tquery[htq] = htm\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tprinting.DalLog(\"SYSTEM\", \"Added your blind XSS (\"+options.BlindURL+\")\", options)\n\t\t}\n\n\t\t// Remote Payloads\n\t\tif options.RemotePayloads != \"\" {\n\t\t\trp := strings.Split(options.RemotePayloads, \",\")\n\t\t\tfor _, endpoint := range rp {\n\t\t\t\tvar payload []string\n\t\t\t\tvar line string\n\t\t\t\tvar size string\n\t\t\t\tif endpoint == \"portswigger\" {\n\t\t\t\t\tpayload, line, size = getPortswiggerPayload()\n\t\t\t\t}\n\t\t\t\tif endpoint == \"paylaodbox\" {\n\t\t\t\t\tpayload, line, size = getPayloadBoxPayload()\n\t\t\t\t}\n\t\t\t\tif line != \"\" {\n\t\t\t\t\tprinting.DalLog(\"INFO\", \"A '\"+endpoint+\"' payloads has been loaded [\"+line+\"L / \"+size+\"] \", options)\n\t\t\t\t\tfor _, customPayload := range payload {\n\t\t\t\t\t\tif customPayload != \"\" {\n\t\t\t\t\t\t\tfor k, v := range params {\n\t\t\t\t\t\t\t\tif optimization.CheckUniqParam(options, k) {\n\t\t\t\t\t\t\t\t\tptype := \"\"\n\t\t\t\t\t\t\t\t\tfor _, av := range v {\n\t\t\t\t\t\t\t\t\t\tif strings.Contains(av, \"PTYPE:\") {\n\t\t\t\t\t\t\t\t\t\t\tptype = GetPType(av)\n\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t// Add plain XSS Query\n\t\t\t\t\t\t\t\t\ttq, tm := optimization.MakeRequestQuery(target, k, customPayload, \"inHTML\"+ptype, \"toAppend\", \"NaN\", options)\n\t\t\t\t\t\t\t\t\tquery[tq] = tm\n\t\t\t\t\t\t\t\t\t// Add URL encoded XSS Query\n\t\t\t\t\t\t\t\t\tetq, etm := optimization.MakeRequestQuery(target, k, customPayload, \"inHTML\"+ptype, \"toAppend\", \"urlEncode\", options)\n\t\t\t\t\t\t\t\t\tquery[etq] = etm\n\t\t\t\t\t\t\t\t\t// Add HTML Encoded XSS Query\n\t\t\t\t\t\t\t\t\thtq, htm := optimization.MakeRequestQuery(target, k, customPayload, \"inHTML\"+ptype, \"toAppend\", \"htmlEncode\", options)\n\t\t\t\t\t\t\t\t\tquery[htq] = htm\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tprinting.DalLog(\"SYSTEM\", endpoint+\" payload load fail..\", options)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t// Custom Payload\n\t\tif options.CustomPayloadFile != \"\" {\n\t\t\tff, err := readLinesOrLiteral(options.CustomPayloadFile)\n\t\t\tif err != nil {\n\t\t\t\tprinting.DalLog(\"SYSTEM\", \"Custom XSS payload load fail..\", options)\n\t\t\t} else {\n\t\t\t\tfor _, customPayload := range ff {\n\t\t\t\t\tif customPayload != \"\" {\n\t\t\t\t\t\tfor k, v := range params {\n\t\t\t\t\t\t\tif optimization.CheckUniqParam(options, k) {\n\t\t\t\t\t\t\t\tptype := \"\"\n\t\t\t\t\t\t\t\tfor _, av := range v {\n\t\t\t\t\t\t\t\t\tif strings.Contains(av, \"PTYPE:\") {\n\t\t\t\t\t\t\t\t\t\tptype = GetPType(av)\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t// Add plain XSS Query\n\t\t\t\t\t\t\t\ttq, tm := optimization.MakeRequestQuery(target, k, customPayload, \"inHTML\"+ptype, \"toAppend\", \"NaN\", options)\n\t\t\t\t\t\t\t\tquery[tq] = tm\n\t\t\t\t\t\t\t\t// Add URL encoded XSS Query\n\t\t\t\t\t\t\t\tetq, etm := optimization.MakeRequestQuery(target, k, customPayload, \"inHTML\"+ptype, \"toAppend\", \"urlEncode\", options)\n\t\t\t\t\t\t\t\tquery[etq] = etm\n\t\t\t\t\t\t\t\t// Add HTML Encoded XSS Query\n\t\t\t\t\t\t\t\thtq, htm := optimization.MakeRequestQuery(target, k, customPayload, \"inHTML\"+ptype, \"toAppend\", \"htmlEncode\", options)\n\t\t\t\t\t\t\t\tquery[htq] = htm\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tprinting.DalLog(\"SYSTEM\", \"Added your \"+strconv.Itoa(len(ff))+\" custom xss payload\", options)\n\t\t\t}\n\t\t}\n\n\t\tprinting.DalLog(\"SYSTEM\", \"Start XSS Scanning.. with \"+strconv.Itoa(len(query))+\" queries 🗡\", options)\n\t\tmutex := &sync.Mutex{}\n\t\tqueryCount := 0\n\t\tprinting.DalLog(\"SYSTEM\", \"[ Make \"+strconv.Itoa(options.Concurrence)+\" workers ] [ Allocated \"+strconv.Itoa(len(query))+\" queries ]\", options)\n\n\t\tif !(options.Silence || options.NoSpinner) {\n\t\t\ts.Start() // Start the spinner\n\t\t\t//time.Sleep(3 * time.Second) // Run for some time to simulate work\n\t\t}\n\n\t\tshowR := false\n\t\tshowV := false\n\t\tif options.OnlyPoC != \"\" {\n\t\t\t_, showR, showV = printing.CheckToShowPoC(options.OnlyPoC)\n\t\t} else {\n\t\t\tshowR = true\n\t\t\tshowV = true\n\t\t}\n\n\t\t// make waiting group\n\t\tvar wg sync.WaitGroup\n\t\t// set concurrency\n\t\tconcurrency := options.Concurrence\n\t\t// make reqeust channel\n\t\tqueries := make(chan Queries)\n\n\t\tif options.UseHeadless {\n\t\t\t// start DOM XSS checker\n\t\t\twg.Add(1)\n\t\t\tgo func() {\n\t\t\t\tdconcurrency := options.Concurrence / 2\n\t\t\t\tif dconcurrency < 1 {\n\t\t\t\t\tdconcurrency = 1\n\t\t\t\t}\n\t\t\t\tdchan := make(chan string)\n\t\t\t\tvar wgg sync.WaitGroup\n\t\t\t\tfor i := 0; i < dconcurrency; i++ {\n\t\t\t\t\twgg.Add(1)\n\t\t\t\t\tgo func() {\n\t\t\t\t\t\tfor v := range dchan {\n\t\t\t\t\t\t\tif CheckXSSWithHeadless(v, options) {\n\t\t\t\t\t\t\t\tmutex.Lock()\n\t\t\t\t\t\t\t\tprinting.DalLog(\"VULN\", \"Triggered XSS Payload (found dialog in headless)\", options)\n\t\t\t\t\t\t\t\tif showV {\n\t\t\t\t\t\t\t\t\tif options.Format == \"json\" {\n\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"{\\\"type\\\":\\\"DOM\\\",\\\"evidence\\\":\\\"headless verify\\\",\\\"poc\\\":\\\"\"+v+\"\\\"},\", options)\n\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"[V][GET] \"+v, options)\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\tif options.FoundAction != \"\" {\n\t\t\t\t\t\t\t\t\tfoundAction(options, target, v, \"VULN\")\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\trst := &model.Issue{\n\t\t\t\t\t\t\t\t\tType: \"verify code\",\n\t\t\t\t\t\t\t\t\tParam: \"DOM\",\n\t\t\t\t\t\t\t\t\tPoC: v,\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\tscanObject.Results = append(scanObject.Results, *rst)\n\t\t\t\t\t\t\t\tmutex.Unlock()\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tqueryCount = queryCount + 1\n\t\t\t\t\t\t}\n\t\t\t\t\t\twgg.Done()\n\t\t\t\t\t}()\n\t\t\t\t}\n\t\t\t\tfor _, dchanData := range durls {\n\t\t\t\t\tdchan <- dchanData\n\t\t\t\t}\n\t\t\t\tclose(dchan)\n\t\t\t\twgg.Wait()\n\t\t\t\twg.Done()\n\t\t\t}()\n\t\t}\n\t\tfor i := 0; i < concurrency; i++ {\n\t\t\twg.Add(1)\n\t\t\tgo func() {\n\t\t\t\tfor reqJob := range queries {\n\t\t\t\t\t// quires.request : http.Request\n\t\t\t\t\t// queries.metadata : map[string]string\n\t\t\t\t\tk := reqJob.request\n\t\t\t\t\tv := reqJob.metadata\n\t\t\t\t\tcheckVtype := false\n\t\t\t\t\tif checkPType(v[\"type\"]) {\n\t\t\t\t\t\tcheckVtype = true\n\t\t\t\t\t}\n\n\t\t\t\t\tif vStatus[v[\"param\"]] == false || checkVtype {\n\t\t\t\t\t\trl.Block(k.Host)\n\t\t\t\t\t\tresbody, _, vds, vrs, err := SendReq(k, v[\"payload\"], options)\n\t\t\t\t\t\tabs := optimization.Abstraction(resbody, v[\"payload\"])\n\t\t\t\t\t\tif vrs {\n\t\t\t\t\t\t\tif !containsFromArray(abs, v[\"type\"]) && !strings.Contains(v[\"type\"], \"inHTML\") {\n\t\t\t\t\t\t\t\tvrs = false\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif err == nil {\n\t\t\t\t\t\t\tif checkPType(v[\"type\"]) {\n\t\t\t\t\t\t\t\tif strings.Contains(v[\"type\"], \"inJS\") {\n\t\t\t\t\t\t\t\t\tif vrs {\n\t\t\t\t\t\t\t\t\t\tprotected := false\n\t\t\t\t\t\t\t\t\t\tif verification.VerifyReflection(resbody, \"\\\\\"+v[\"payload\"]) {\n\t\t\t\t\t\t\t\t\t\t\tif !strings.Contains(v[\"payload\"], \"\\\\\") {\n\t\t\t\t\t\t\t\t\t\t\t\tprotected = true\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\tif !protected {\n\t\t\t\t\t\t\t\t\t\t\tif vStatus[v[\"param\"]] == false {\n\t\t\t\t\t\t\t\t\t\t\t\tif options.UseHeadless {\n\t\t\t\t\t\t\t\t\t\t\t\t\tif CheckXSSWithHeadless(k.URL.String(), options) {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmutex.Lock()\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"VULN\", \"Triggered XSS Payload (found dialog in headless)\", options)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tif showV {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tif options.Format == \"json\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"{\\\"type\\\":\\\"\"+v[\"type\"]+\"\\\",\\\"evidence\\\":\\\"headless verify\\\",\\\"poc\\\":\\\"\"+k.URL.String()+\"\\\"},\", options)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"[V][\"+k.Method+\"][\"+v[\"type\"]+\"] \"+k.URL.String(), options)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tvStatus[v[\"param\"]] = true\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tif options.FoundAction != \"\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tfoundAction(options, target, k.URL.String(), \"VULN\")\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\trst := &model.Issue{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: \"verify code\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tParam: v[\"param\"],\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tPoC: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tscanObject.Results = append(scanObject.Results, *rst)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmutex.Unlock()\n\t\t\t\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmutex.Lock()\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tif options.FoundAction != \"\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tfoundAction(options, target, k.URL.String(), \"WEAK\")\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\trst := &model.Issue{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: \"found code\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tParam: v[\"param\"],\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tPoC: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tscanObject.Results = append(scanObject.Results, *rst)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmutex.Unlock()\n\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\t\t\tmutex.Lock()\n\t\t\t\t\t\t\t\t\t\t\t\t\tcode := CodeView(resbody, v[\"payload\"])\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"WEAK\", \"Reflected Payload in JS: \"+v[\"param\"]+\"=\"+v[\"payload\"], options)\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"CODE\", code, options)\n\t\t\t\t\t\t\t\t\t\t\t\t\tif showR {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tif options.Format == \"json\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"{\\\"type\\\":\\\"\"+v[\"type\"]+\"\\\",\\\"evidence\\\":\\\"reflected\\\",\\\"poc\\\":\\\"\"+k.URL.String()+\"\\\"},\", options)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"[R][\"+k.Method+\"][\"+v[\"type\"]+\"] \"+k.URL.String(), options)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\tif options.FoundAction != \"\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tfoundAction(options, target, k.URL.String(), \"WEAK\")\n\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\trst := &model.Issue{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: \"found code\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tParam: v[\"param\"],\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tPoC: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\tscanObject.Results = append(scanObject.Results, *rst)\n\t\t\t\t\t\t\t\t\t\t\t\t\tmutex.Unlock()\n\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t} else if strings.Contains(v[\"type\"], \"inATTR\") {\n\t\t\t\t\t\t\t\t\tif vds {\n\t\t\t\t\t\t\t\t\t\tmutex.Lock()\n\t\t\t\t\t\t\t\t\t\tif vStatus[v[\"param\"]] == false {\n\t\t\t\t\t\t\t\t\t\t\tcode := CodeView(resbody, v[\"payload\"])\n\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"VULN\", \"Triggered XSS Payload (found DOM Object): \"+v[\"param\"]+\"=\"+v[\"payload\"], options)\n\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"CODE\", code, options)\n\t\t\t\t\t\t\t\t\t\t\tif showV {\n\t\t\t\t\t\t\t\t\t\t\t\tif options.Format == \"json\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"{\\\"type\\\":\\\"\"+v[\"type\"]+\"\\\",\\\"evidence\\\":\\\"dom verify\\\",\\\"poc\\\":\\\"\"+k.URL.String()+\"\\\"},\", options)\n\t\t\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"[V][\"+k.Method+\"][\"+v[\"type\"]+\"] \"+k.URL.String(), options)\n\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\tvStatus[v[\"param\"]] = true\n\t\t\t\t\t\t\t\t\t\t\tif options.FoundAction != \"\" {\n\t\t\t\t\t\t\t\t\t\t\t\tfoundAction(options, target, k.URL.String(), \"VULN\")\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\trst := &model.Issue{\n\t\t\t\t\t\t\t\t\t\t\t\tType: \"verify code\",\n\t\t\t\t\t\t\t\t\t\t\t\tParam: v[\"param\"],\n\t\t\t\t\t\t\t\t\t\t\t\tPoC: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\tscanObject.Results = append(scanObject.Results, *rst)\n\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\tmutex.Unlock()\n\t\t\t\t\t\t\t\t\t} else if vrs {\n\t\t\t\t\t\t\t\t\t\tmutex.Lock()\n\t\t\t\t\t\t\t\t\t\tif vStatus[v[\"param\"]] == false {\n\t\t\t\t\t\t\t\t\t\t\tcode := CodeView(resbody, v[\"payload\"])\n\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"WEAK\", \"Reflected Payload in Attribute: \"+v[\"param\"]+\"=\"+v[\"payload\"], options)\n\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"CODE\", code, options)\n\t\t\t\t\t\t\t\t\t\t\tif showR {\n\t\t\t\t\t\t\t\t\t\t\t\tif options.Format == \"json\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"{\\\"type\\\":\\\"\"+v[\"type\"]+\"\\\",\\\"evidence\\\":\\\"reflected\\\",\\\"poc\\\":\\\"\"+k.URL.String()+\"\\\"},\", options)\n\t\t\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\t\t\tpoc := model.PoC{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: \"R\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tMethod: k.Method,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tData: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\tscanResult.PoCs = append(scanResult.PoCs, poc)\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"[R][\"+k.Method+\"][\"+v[\"type\"]+\"] \"+k.URL.String(), options)\n\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\tif options.FoundAction != \"\" {\n\t\t\t\t\t\t\t\t\t\t\t\tfoundAction(options, target, k.URL.String(), \"WEAK\")\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\trst := &model.Issue{\n\t\t\t\t\t\t\t\t\t\t\t\tType: \"found code\",\n\t\t\t\t\t\t\t\t\t\t\t\tParam: v[\"param\"],\n\t\t\t\t\t\t\t\t\t\t\t\tPoC: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\tscanObject.Results = append(scanObject.Results, *rst)\n\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\tmutex.Unlock()\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\tif vds {\n\t\t\t\t\t\t\t\t\t\tmutex.Lock()\n\t\t\t\t\t\t\t\t\t\tif vStatus[v[\"param\"]] == false {\n\t\t\t\t\t\t\t\t\t\t\tcode := CodeView(resbody, v[\"payload\"])\n\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"VULN\", \"Triggered XSS Payload (found DOM Object): \"+v[\"param\"]+\"=\"+v[\"payload\"], options)\n\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"CODE\", code, options)\n\t\t\t\t\t\t\t\t\t\t\tif showV {\n\t\t\t\t\t\t\t\t\t\t\t\tif options.Format == \"json\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"{\\\"type\\\":\\\"\"+v[\"type\"]+\"\\\",\\\"evidence\\\":\\\"dom verify\\\",\\\"poc\\\":\\\"\"+k.URL.String()+\"\\\"},\", options)\n\t\t\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\t\t\tpoc := model.PoC{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: \"V\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tMethod: k.Method,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tData: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\tscanResult.PoCs = append(scanResult.PoCs, poc)\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"[V][\"+k.Method+\"][\"+v[\"type\"]+\"] \"+k.URL.String(), options)\n\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\tvStatus[v[\"param\"]] = true\n\t\t\t\t\t\t\t\t\t\t\tif options.FoundAction != \"\" {\n\t\t\t\t\t\t\t\t\t\t\t\tfoundAction(options, target, k.URL.String(), \"VULN\")\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\trst := &model.Issue{\n\t\t\t\t\t\t\t\t\t\t\t\tType: \"verify code\",\n\t\t\t\t\t\t\t\t\t\t\t\tParam: v[\"param\"],\n\t\t\t\t\t\t\t\t\t\t\t\tPoC: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\tscanObject.Results = append(scanObject.Results, *rst)\n\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\tmutex.Unlock()\n\t\t\t\t\t\t\t\t\t} else if vrs {\n\t\t\t\t\t\t\t\t\t\tmutex.Lock()\n\t\t\t\t\t\t\t\t\t\tif vStatus[v[\"param\"]] == false {\n\t\t\t\t\t\t\t\t\t\t\tcode := CodeView(resbody, v[\"payload\"])\n\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"WEAK\", \"Reflected Payload in HTML: \"+v[\"param\"]+\"=\"+v[\"payload\"], options)\n\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"CODE\", code, options)\n\t\t\t\t\t\t\t\t\t\t\tif showR {\n\t\t\t\t\t\t\t\t\t\t\t\tif options.Format == \"json\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"{\\\"type\\\":\\\"\"+v[\"type\"]+\"\\\",\\\"evidence\\\":\\\"reflected\\\",\\\"poc\\\":\\\"\"+k.URL.String()+\"\\\"},\", options)\n\t\t\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\t\t\tpoc := model.PoC{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: \"R\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tMethod: k.Method,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tData: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\tscanResult.PoCs = append(scanResult.PoCs, poc)\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"[R][\"+k.Method+\"][\"+v[\"type\"]+\"] \"+k.URL.String(), options)\n\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\tif options.FoundAction != \"\" {\n\t\t\t\t\t\t\t\t\t\t\t\tfoundAction(options, target, k.URL.String(), \"WEAK\")\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\trst := &model.Issue{\n\t\t\t\t\t\t\t\t\t\t\t\tType: \"found code\",\n\t\t\t\t\t\t\t\t\t\t\t\tParam: v[\"param\"],\n\t\t\t\t\t\t\t\t\t\t\t\tPoC: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\tscanObject.Results = append(scanObject.Results, *rst)\n\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\tmutex.Unlock()\n\t\t\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tmutex.Lock()\n\t\t\t\t\tqueryCount = queryCount + 1\n\n\t\t\t\t\tif !(options.Silence || options.NoSpinner) {\n\t\t\t\t\t\ts.Lock()\n\t\t\t\t\t\tvar msg string\n\t\t\t\t\t\tif vStatus[v[\"param\"]] == false {\n\t\t\t\t\t\t\tif options.UseHeadless {\n\t\t\t\t\t\t\t\tmsg = \"Testing \\\"\" + v[\"param\"] + \"\\\" param and waiting headless\"\n\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\tmsg = \"Testing \\\"\" + v[\"param\"] + \"\\\" param\"\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\tif options.UseHeadless {\n\t\t\t\t\t\t\t\tmsg = \"Passing \\\"\" + v[\"param\"] + \"\\\" param queries and waiting headless\"\n\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\tmsg = \"Passing \\\"\" + v[\"param\"] + \"\\\" param queries\"\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tpercent := fmt.Sprintf(\"%0.2f%%\", (float64(queryCount)/float64(len(query)+len(durls)))*100)\n\t\t\t\t\t\tif options.NowURL == 0 {\n\t\t\t\t\t\t\ts.Suffix = \" [\" + strconv.Itoa(queryCount) + \"/\" + strconv.Itoa(len(query)+len(durls)) + \" Queries][\" + percent + \"] \" + msg\n\t\t\t\t\t\t} else if !options.Silence {\n\t\t\t\t\t\t\tpercent2 := fmt.Sprintf(\"%0.2f%%\", (float64(options.NowURL) / float64(options.AllURLS) * 100))\n\t\t\t\t\t\t\ts.Suffix = \" [\" + strconv.Itoa(queryCount) + \"/\" + strconv.Itoa(len(query)+len(durls)) + \" Queries][\" + percent + \"][\" + strconv.Itoa(options.NowURL) + \"/\" + strconv.Itoa(options.AllURLS) + \" Tasks][\" + percent2 + \"] \" + msg\n\t\t\t\t\t\t}\n\t\t\t\t\t\t//s.Suffix = \" Waiting routines.. (\" + strconv.Itoa(queryCount) + \" / \" + strconv.Itoa(len(query)) + \") reqs\"\n\t\t\t\t\t\ts.Unlock()\n\t\t\t\t\t}\n\t\t\t\t\tmutex.Unlock()\n\t\t\t\t}\n\t\t\t\twg.Done()\n\t\t\t}()\n\t\t}\n\n\t\t// Send testing query to quires channel\n\t\tfor k, v := range query {\n\t\t\tqueries <- Queries{\n\t\t\t\trequest: k,\n\t\t\t\tmetadata: v,\n\t\t\t}\n\t\t}\n\t\tclose(queries)\n\t\twg.Wait()\n\t\tif !(options.Silence || options.NoSpinner) {\n\t\t\ts.Stop()\n\t\t}\n\t}\n\tif options.Format == \"json\" {\n\t\tprinting.DalLog(\"PRINT\", \"{}]\", options)\n\t}\n\toptions.Scan[sid] = scanObject\n\tscanResult.EndTime = time.Now()\n\tscanResult.Duration = scanResult.EndTime.Sub(scanResult.StartTime)\n\tif !(options.Silence && options.MulticastMode) {\n\t\tprinting.DalLog(\"SYSTEM-M\", \"Finish Scan\", options)\n\t}\n\treturn scanResult, nil\n}", "func (bm *DockerBenchmarker) CheckRunUpdateOnly() {\n\tdfiles := []string{}\n\n\tfor file, df := range bm.dfiles {\n\t\t// apt\n\t\tupdateIdxs := df.LookupInstructionAndContent(dockerfile.Run, `apt\\s+(-y\\s)?update`)\n\t\tinstallIdx := df.LookupInstructionAndContent(dockerfile.Run, `apt\\s+(-y\\s)?install`)\n\n\t\tupdateOnly, _ := diffArray(updateIdxs, installIdx)\n\t\tif len(updateOnly) > 0 {\n\t\t\tdfiles = append(dfiles, file)\n\t\t}\n\n\t\t// apt-get\n\t\tupdateIdxs = df.LookupInstructionAndContent(dockerfile.Run, `apt-get\\s+(-y\\s)?update`)\n\t\tinstallIdx = df.LookupInstructionAndContent(dockerfile.Run, `apt-get\\s+(-y\\s)?install`)\n\n\t\tupdateOnly, _ = diffArray(updateIdxs, installIdx)\n\t\tif len(updateOnly) > 0 {\n\t\t\tdfiles = append(dfiles, file)\n\t\t}\n\n\t\t// apk\n\t\tupdateIdxs = df.LookupInstructionAndContent(dockerfile.Run, `apk\\s+(-y\\s)?update`)\n\t\tinstallIdx = df.LookupInstructionAndContent(dockerfile.Run, `apk\\s+(-y\\s)?add`)\n\n\t\tupdateOnly, _ = diffArray(updateIdxs, installIdx)\n\t\tif len(updateOnly) > 0 {\n\t\t\tdfiles = append(dfiles, file)\n\t\t}\n\n\t}\n\n\tbm.violationReport.AddViolation(benchmark.CIS_4_7, dfiles)\n}", "func (discovery *DeviceDiscovery) discoverDevices() error {\n\t// List all the valid block devices on the node\n\tvalidDevices, err := getValidBlockDevices()\n\tif err != nil {\n\t\tmessage := \"failed to discover devices\"\n\t\te := diskmaker.NewEvent(diskmaker.ErrorListingBlockDevices, fmt.Sprintf(\"%s. Error: %+v\", message, err), \"\")\n\t\tdiscovery.eventSync.Report(e, discovery.localVolumeDiscovery)\n\t\treturn errors.Wrapf(err, message)\n\t}\n\n\tklog.Infof(\"valid block devices: %+v\", validDevices)\n\n\tdiscoveredDisks := getDiscoverdDevices(validDevices)\n\tklog.Infof(\"discovered devices: %+v\", discoveredDisks)\n\n\t// update discovered devices metric\n\tlocalmetrics.SetDiscoveredDevicesMetrics(os.Getenv(\"MY_NODE_NAME\"), len(discoveredDisks))\n\n\t// Update discovered devices in the LocalVolumeDiscoveryResult resource\n\tif !reflect.DeepEqual(discovery.disks, discoveredDisks) {\n\t\tklog.Info(\"device list updated. Updating LocalVolumeDiscoveryResult status...\")\n\t\tdiscovery.disks = discoveredDisks\n\t\terr = discovery.updateStatus()\n\t\tif err != nil {\n\t\t\tmessage := \"failed to update LocalVolumeDiscoveryResult status\"\n\t\t\te := diskmaker.NewEvent(diskmaker.ErrorUpdatingDiscoveryResultObject, fmt.Sprintf(\"%s. Error: %+v\", message, err), \"\")\n\t\t\tdiscovery.eventSync.Report(e, discovery.localVolumeDiscovery)\n\t\t\treturn errors.Wrapf(err, message)\n\t\t}\n\t\tmessage := \"successfully updated discovered device details in the LocalVolumeDiscoveryResult resource\"\n\t\te := diskmaker.NewSuccessEvent(diskmaker.UpdatedDiscoveredDeviceList, message, \"\")\n\t\tdiscovery.eventSync.Report(e, discovery.localVolumeDiscovery)\n\t}\n\n\treturn nil\n}", "func CheckSense(i *Hdr, s *[]byte) error {\n\tvar b bytes.Buffer\n\tif (i.Info & sgInfoOkMask) != sgInfoOk {\n\t\t_, err := b.WriteString(\n\t\t\tfmt.Sprintf(\"SCSI response not ok\\n\"+\n\t\t\t\t\"SCSI status: %v host status: %v driver status: %v\",\n\t\t\t\ti.Status, i.HostStatus, i.DriverStatus))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif i.SbLenWr > 0 {\n\t\t\t_, err := b.WriteString(\n\t\t\t\tfmt.Sprintf(\"\\nSENSE:\\n%v\\n%v\",\n\t\t\t\t\tdumpHex(*s), GetErrString((*s)[12], (*s)[13])))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\treturn fmt.Errorf(b.String())\n\t}\n\treturn nil\n}", "func (c *Client) getVulnerabilitiesForCpe(cpe string, maxVulnerabilities int) (result string, err error) {\n\ttype getCpeVulnMessage struct {\n\t\tSoftware string `json:\"software\"`\n\t\tVersion string `json:\"version\"`\n\t\tMaxVulnerabilities int `json:\"maxVulnerabilities\"`\n\t\tType string `json:\"type\"`\n\t\tAPIKey string `json:\"apiKey\"`\n\t}\n\n\t// Note that the APIs default behavior is to error out (402 - \"Too much results\") if\n\t// there are more than maxVulnerabilities. Sigh.\n\tif maxVulnerabilities < 0 {\n\t\treturn \"\", errors.New(\"Specify positive max vulnerabilities (use a large number if in doubt)\")\n\t}\n\tif len(strings.Split(cpe, \":\")) <= 4 {\n\t\treturn \"\", ErrCpeFormat\n\t}\n\tslicedCpe := strings.Split(cpe, \":\")\n\tversion := slicedCpe[4]\n\n\t// Now build the json payload\n\tmsg := getCpeVulnMessage{\n\t\tSoftware: cpe,\n\t\tVersion: version,\n\t\tMaxVulnerabilities: maxVulnerabilities,\n\t\tType: \"cpe\",\n\t\tAPIKey: c.apiKey,\n\t}\n\tjson, err := json.Marshal(msg)\n\n\tresp, _ := resty.R().\n\t\tSetHeader(\"Content-Type\", \"application/json\").\n\t\tSetBody(json).\n\t\tPost(fmt.Sprintf(\"%s/burp/software\", c.baseURL.String()))\n\n\treturn resp.String(), nil\n}", "func (list checkableList) check(env env.Env) (*compliance.Report, error) {\n\tvar (\n\t\tresult *compliance.Report\n\t\terr error\n\t)\n\n\tfor _, c := range list {\n\t\tresult, err = c.check(env)\n\t\tif err != nil || !result.Passed {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn result, err\n}", "func EnsureScanners(ctx context.Context, wantedScanners []scanner.Registration) (err error) {\n\tif len(wantedScanners) == 0 {\n\t\treturn\n\t}\n\tnames := make([]string, len(wantedScanners))\n\tfor i, ws := range wantedScanners {\n\t\tnames[i] = ws.Name\n\t}\n\n\tlist, err := scannerManager.List(ctx, q.New(q.KeyWords{\"name__in\": names}))\n\tif err != nil {\n\t\treturn errors.Errorf(\"listing scanners: %v\", err)\n\t}\n\texistingScanners := make(map[string]*scanner.Registration)\n\tfor _, li := range list {\n\t\texistingScanners[li.Name] = li\n\t}\n\n\tfor _, ws := range wantedScanners {\n\t\tscanner, exists := existingScanners[ws.Name]\n\t\tif !exists {\n\t\t\tif _, err := scannerManager.Create(ctx, &ws); err != nil {\n\t\t\t\treturn errors.Errorf(\"creating registration %s at %s failed: %v\", ws.Name, ws.URL, err)\n\t\t\t}\n\t\t\tlog.Infof(\"Successfully registered %s scanner at %s\", ws.Name, ws.URL)\n\t\t} else if scanner.URL != ws.URL {\n\t\t\tscanner.URL = ws.URL\n\t\t\tif err := scannerManager.Update(ctx, scanner); err != nil {\n\t\t\t\treturn errors.Errorf(\"updating registration %s to %s failed: %v\", ws.Name, ws.URL, err)\n\t\t\t}\n\t\t\tlog.Infof(\"Successfully updated %s scanner to %s\", ws.Name, ws.URL)\n\t\t} else {\n\t\t\tlog.Infof(\"Scanner registration already exists: %s\", ws.URL)\n\t\t}\n\t}\n\n\treturn\n}", "func (c *Client) GetVulnerabilitiesForPackages(os string, osVersion string, packages []string) (result *VulnResponse, err error) {\n\ttype getVulnForPkg struct {\n\t\tOS string `json:\"os\"`\n\t\tVersion string `json:\"version\"`\n\t\tPackage []string `json:\"package\"`\n\t\tAPIKey string `json:\"apiKey\"`\n\t}\n\tmsg := getVulnForPkg{\n\t\tOS: os,\n\t\tVersion: osVersion,\n\t\tPackage: packages,\n\t\tAPIKey: c.apiKey,\n\t}\n\tjson, err := json.Marshal(msg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Handy for debugging.\n\t//resty.SetDebug(true)\n\n\tresp, err := resty.R().\n\t\tSetHeader(\"Content-Type\", \"application/json\").\n\t\tSetBody(json).\n\t\tSetResult(&VulnResponse{}). // Throw the response directly in a JSON structure\n\t\tPost(fmt.Sprintf(\"%s/audit/audit\", c.baseURL.String()))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tr := resp.Result().(*VulnResponse)\n\tif r.Result == \"ERROR\" {\n\t\treturn nil, errors.New(\"ERROR response from API backend: \" + r.Data.Error)\n\t}\n\n\treturn r, nil\n}", "func queryDevice(deviceIP string) ([]resultSet, error) {\n\tvar deviceResult []resultSet\n\n\tbody, bodyErr := client.QueryAPI(fmt.Sprintf(gqlDeviceDataQuery, deviceIP, deviceIP))\n\tif bodyErr != nil {\n\t\treturn deviceResult, fmt.Errorf(\"Could not query device %s: %s\", deviceIP, bodyErr)\n\t}\n\tproactiveTokenRefresh()\n\n\tjsonData := deviceData{}\n\tjsonErr := json.Unmarshal(body, &jsonData)\n\tif jsonErr != nil {\n\t\treturn deviceResult, fmt.Errorf(\"Could not decode JSON: %s\", jsonErr)\n\t}\n\n\tdevice := jsonData.Data.Network.Device\n\tvlans := jsonData.Data.Network.DeviceVlans\n\tports := jsonData.Data.Network.Device.EntityData.AllPorts\n\n\tstdErr.Printf(\"Fetched data for %s: Got %d VLANs and %d ports.\\n\", device.IP, len(vlans), len(ports))\n\n\tsystemResult := resultSet{}\n\tsystemResult.ID = device.ID\n\tsystemResult.BaseMac = device.BaseMac\n\tsystemResult.IP = device.IP\n\tsystemResult.SysUpDown = \"down\"\n\tif device.Up {\n\t\tsystemResult.SysUpDown = \"up\"\n\t}\n\tsystemResult.SysName = device.SysName\n\tsystemResult.SysLocation = device.SysLocation\n\tsystemResult.IfName = \"SYSTEM\"\n\tsystemResult.IfStatus = \"N/A\"\n\tfor _, vlan := range vlans {\n\t\tsystemResult.Tagged = append(systemResult.Tagged, strconv.Itoa(vlan.Vid))\n\t}\n\tdeviceResult = append(deviceResult, systemResult)\n\n\tfor _, port := range ports {\n\t\tportResult := resultSet{}\n\t\tportResult.ID = device.ID\n\t\tportResult.BaseMac = device.BaseMac\n\t\tportResult.IP = device.IP\n\t\tportResult.SysUpDown = \"down\"\n\t\tif device.Up {\n\t\t\tportResult.SysUpDown = \"up\"\n\t\t}\n\t\tportResult.SysName = device.SysName\n\t\tportResult.SysLocation = device.SysLocation\n\t\tportResult.IfName = port.IfName\n\t\tportResult.IfStatus = port.IfOperStatus\n\t\tfor _, vlan := range port.VlanList {\n\t\t\tif strings.Contains(vlan, \"Untagged\") {\n\t\t\t\tportResult.Untagged = append(portResult.Untagged, strings.Split(vlan, \"[\")[0])\n\t\t\t} else if strings.Contains(vlan, \"Tagged\") {\n\t\t\t\tportResult.Tagged = append(portResult.Tagged, strings.Split(vlan, \"[\")[0])\n\t\t\t}\n\t\t}\n\t\tdeviceResult = append(deviceResult, portResult)\n\t}\n\n\treturn deviceResult, nil\n}", "func HPCompliance(ctx context.Context, s *testing.State) {\n\tif vendor, err := vendorutils.FetchVendor(ctx); err != nil {\n\t\ts.Error(\"Failed to read vendor name: \", err)\n\t} else if got, want := vendor, \"HP\"; got != want {\n\t\ts.Errorf(\"Unexpected vendor name = got %q, want %q\", got, want)\n\t}\n\n\tif oemDataBytes, err := testexec.CommandContext(ctx, \"/usr/share/cros/oemdata.sh\").Output(); err != nil {\n\t\ts.Error(\"Failed to get OEM data: \", err)\n\t} else if len(oemDataBytes) == 0 {\n\t\ts.Error(\"OEM data is empty\")\n\t}\n\n\tif activateDateBytes, err := ioutil.ReadFile(\"/sys/firmware/vpd/rw/ActivateDate\"); err != nil {\n\t\ts.Error(\"Failed to read ActivateDate VPD field: \", err)\n\t} else if len(activateDateBytes) == 0 {\n\t\ts.Error(\"ActivateDate VPD is empty\")\n\t}\n\n\tif modelNameBytes, err := ioutil.ReadFile(\"/sys/firmware/vpd/ro/model_name\"); err != nil {\n\t\ts.Error(\"Failed to read model_name VPD field: \", err)\n\t} else if len(modelNameBytes) == 0 {\n\t\ts.Error(\"model_name VPD is empty\")\n\t}\n\n\tif serialNumberBytes, err := ioutil.ReadFile(\"/sys/firmware/vpd/ro/serial_number\"); err != nil {\n\t\ts.Error(\"Failed to read serial_number VPD field: \", err)\n\t} else if len(serialNumberBytes) == 0 {\n\t\ts.Error(\"serial_number VPD is empty\")\n\t}\n\n\tif skuNumberBytes, err := ioutil.ReadFile(\"/sys/firmware/vpd/ro/sku_number\"); err != nil {\n\t\ts.Error(\"Failed to read sku_number VPD field: \", err)\n\t} else if len(skuNumberBytes) == 0 {\n\t\ts.Error(\"sku_number VPD is empty\")\n\t}\n\n\tif got, err := crosconfig.Get(ctx, \"/cros-healthd/cached-vpd\", \"has-sku-number\"); err != nil {\n\t\ts.Error(\"Failed to get has-sku-number value from cros config: \", err)\n\t} else if want := \"true\"; got != want {\n\t\ts.Errorf(\"Unexpected vendor name = got %q, want %q\", got, want)\n\t}\n}", "func handleHealthCheck(m *MicroService, d *net.Dialer) bool {\r\n\tchange := false\r\n\tfor i, inst := range m.Instances {\r\n\t\t_, err := d.Dial(\"tcp\", inst.Host)\r\n\t\tif err != nil {\r\n\t\t\tif !m.isBlacklisted(i) {\r\n\t\t\t\tm.blackList(i, true)\r\n\t\t\t\tlogInfo(\"Instance: \" + inst.Host + \" is now marked as DOWN\")\r\n\t\t\t\tchange = true\r\n\t\t\t}\r\n\t\t} else {\r\n\t\t\tif m.isBlacklisted(i) {\r\n\t\t\t\tm.blackList(i, false)\r\n\t\t\t\tlogInfo(\"Instance: \" + inst.Host + \" is now marked as UP\")\r\n\t\t\t\tchange = true\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn change\r\n}", "func (ctl *Ctl) CheckSpecFlags() error {\n\tfor _, registryJSON := range ctl.ScannerPodImageFacadeInternalRegistriesJSONSlice {\n\t\tregistry := &opssightv1.RegistryAuth{}\n\t\terr := json.Unmarshal([]byte(registryJSON), registry)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Invalid Registry Format\")\n\t\t}\n\t}\n\treturn nil\n}", "func (d *Device) Scan(ctx context.Context, allowDup bool, h ble.AdvHandler) error {\n\tif err := d.HCI.SetAdvHandler(h); err != nil {\n\t\treturn err\n\t}\n\tif err := d.HCI.Scan(allowDup); err != nil {\n\t\treturn err\n\t}\n\td.allowDup = allowDup\n\td.scanCtx, d.scanCancel = context.WithCancel(ctx)\n\tdefer d.scanCancel()\n\tselect {\n\tcase <-d.scanCtx.Done():\n\t\td.HCI.StopScanning()\n\t\treturn ctx.Err()\n\tcase <-d.HCI.Closed():\n\t\treturn d.HCI.Error()\n\t}\n}", "func (w *Watchdog) RunChecks() map[string][]string {\n\tfound := map[string][]string{}\n\n\tlog.Info(\"Running Watchdog Task\")\n\tfor _, v := range w.Detectors {\n\t\tl := log.WithField(\"detector\", v.Name())\n\n\t\tl.Debug(\"Checking for offline agents\")\n\n\t\tif offline, err := v.FindOfflineAgents(); err != nil {\n\t\t\tl.WithError(err).Error(\"Failed to check for offline agents\")\n\t\t} else if len(offline) > 0 {\n\t\t\tl.WithField(\"offline\", offline).Warn(\"One or more agents are offline\")\n\t\t\tfound[v.Name()] = offline\n\t\t}\n\n\t\tl.Debug(\"Check Complete\")\n\t}\n\n\treturn w.cache.Update(found)\n}", "func (a *Auditor) CheckIssueRequests(outputsFromIssue [][]*AuditableToken, txID string) error {\n\t// Inspect\n\tfor k, issued := range outputsFromIssue {\n\t\terr := a.InspectOutputs(issued)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"audit of %d th issue in tx [%s] failed\", k, txID)\n\t\t}\n\t}\n\treturn nil\n}", "func (c *CheckerAPI) Check(schedule *pduty.Schedule, calendars map[string]*gcal.Calendar, daysBetweenShifts int64) ([]*pduty.ScheduleEntry, error) {\n\tvar conflictsOrdered []*pduty.ScheduleEntry\n\n\tfor _, scheduleEntry := range schedule.Entries {\n\t\tscheduleUserID := scheduleEntry.User.ID\n\n\t\t// check schedule for \"minimum days between shifts\" violations\n\t\tconflict := c.checkMinimumDays(schedule, scheduleEntry, daysBetweenShifts)\n\t\tif conflict {\n\t\t\tconflictsOrdered = append(conflictsOrdered, scheduleEntry)\n\t\t\tcontinue\n\t\t}\n\n\t\t// check scheduled \"unavailable\" time\n\t\tcalendar := calendars[scheduleUserID]\n\t\tif calendar == nil {\n\t\t\t// not items\n\t\t\tcontinue\n\t\t}\n\n\t\tconflict = c.checkForConflict(scheduleEntry, calendar)\n\t\tif conflict {\n\t\t\tconflictsOrdered = append(conflictsOrdered, scheduleEntry)\n\t\t\tcontinue\n\t\t}\n\t}\n\n\treturn conflictsOrdered, nil\n}", "func scanUnitNo(a adapters.Adapter, _ ...string) {\n\tlog.Info().Msgf(\"[%s] started scanning for new units\", a.Code())\n\tdefer wg.Done()\n\n\tserials := make(chan string)\n\tgo adapters.AdapterConf(a).EmitSerials(serials)\n\n\tvar index int\n\tserialModels := models.ListSerials(a)\n\tfor serial := range serials {\n\t\t// skip existing serial numbers in the database\n\t\tfor index < len(serialModels) && serialModels[index].SerialNo < serial {\n\t\t\tindex++\n\t\t}\n\t\tif index < len(serialModels) && serialModels[index].SerialNo == serial {\n\t\t\tcontinue\n\t\t}\n\t\taddUnitBySerial(a, serial)\n\t}\n\tlog.Info().Msgf(\"[%s] finished scanning\", a.Code())\n}", "func (dru *DeviceRequestUpdate) check() error {\n\tif v, ok := dru.mutation.UserCode(); ok {\n\t\tif err := devicerequest.UserCodeValidator(v); err != nil {\n\t\t\treturn &ValidationError{Name: \"user_code\", err: fmt.Errorf(`db: validator failed for field \"DeviceRequest.user_code\": %w`, err)}\n\t\t}\n\t}\n\tif v, ok := dru.mutation.DeviceCode(); ok {\n\t\tif err := devicerequest.DeviceCodeValidator(v); err != nil {\n\t\t\treturn &ValidationError{Name: \"device_code\", err: fmt.Errorf(`db: validator failed for field \"DeviceRequest.device_code\": %w`, err)}\n\t\t}\n\t}\n\tif v, ok := dru.mutation.ClientID(); ok {\n\t\tif err := devicerequest.ClientIDValidator(v); err != nil {\n\t\t\treturn &ValidationError{Name: \"client_id\", err: fmt.Errorf(`db: validator failed for field \"DeviceRequest.client_id\": %w`, err)}\n\t\t}\n\t}\n\tif v, ok := dru.mutation.ClientSecret(); ok {\n\t\tif err := devicerequest.ClientSecretValidator(v); err != nil {\n\t\t\treturn &ValidationError{Name: \"client_secret\", err: fmt.Errorf(`db: validator failed for field \"DeviceRequest.client_secret\": %w`, err)}\n\t\t}\n\t}\n\treturn nil\n}", "func (r *RemoteList) unlockedCollect() {\n\taddrs := r.addrs[:0]\n\trelays := r.relays[:0]\n\n\tfor _, c := range r.cache {\n\t\tif c.v4 != nil {\n\t\t\tif c.v4.learned != nil {\n\t\t\t\tu := NewUDPAddrFromLH4(c.v4.learned)\n\t\t\t\tif !r.unlockedIsBad(u) {\n\t\t\t\t\taddrs = append(addrs, u)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tfor _, v := range c.v4.reported {\n\t\t\t\tu := NewUDPAddrFromLH4(v)\n\t\t\t\tif !r.unlockedIsBad(u) {\n\t\t\t\t\taddrs = append(addrs, u)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif c.v6 != nil {\n\t\t\tif c.v6.learned != nil {\n\t\t\t\tu := NewUDPAddrFromLH6(c.v6.learned)\n\t\t\t\tif !r.unlockedIsBad(u) {\n\t\t\t\t\taddrs = append(addrs, u)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tfor _, v := range c.v6.reported {\n\t\t\t\tu := NewUDPAddrFromLH6(v)\n\t\t\t\tif !r.unlockedIsBad(u) {\n\t\t\t\t\taddrs = append(addrs, u)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif c.relay != nil {\n\t\t\tfor _, v := range c.relay.relay {\n\t\t\t\tip := iputil.VpnIp(v)\n\t\t\t\trelays = append(relays, &ip)\n\t\t\t}\n\t\t}\n\t}\n\n\tdnsAddrs := r.hr.GetIPs()\n\tfor _, addr := range dnsAddrs {\n\t\tif r.shouldAdd == nil || r.shouldAdd(addr.Addr()) {\n\t\t\tv6 := addr.Addr().As16()\n\t\t\taddrs = append(addrs, &udp.Addr{\n\t\t\t\tIP: v6[:],\n\t\t\t\tPort: addr.Port(),\n\t\t\t})\n\t\t}\n\t}\n\n\tr.addrs = addrs\n\tr.relays = relays\n\n}", "func GenerateFullReport(conf config.Config, awsConfig *aws.Config, folder string, reportData *vulcan.ReportData, teamName string) (string, error) {\n\tmapVulnerabilitiesPerAsset := make(map[string][]vulcan.Vulnerability)\n\taggregatedVulnerabilities := []report.Vulnerability{}\n\n\tfor _, vuln := range reportData.Vulnerabilities {\n\t\tmapVulnerabilitiesPerAsset[vuln.Asset] = append(mapVulnerabilitiesPerAsset[vuln.Asset], vuln)\n\t\taggregatedVulnerabilities = append(aggregatedVulnerabilities, vuln.Vulnerability)\n\t}\n\taggregatedScore := report.AggregateScore(aggregatedVulnerabilities)\n\n\tvulnCount := 0\n\tassetVulnsSlice := []AssetVulns{}\n\tfor asset, vulns := range mapVulnerabilitiesPerAsset {\n\t\tvar count VulnsCount\n\t\tfor _, v := range vulns {\n\t\t\tswitch v.Vulnerability.Severity() {\n\t\t\tcase 0:\n\t\t\t\tcount.Info++\n\t\t\tcase 1:\n\t\t\t\tcount.Low++\n\t\t\t\tcount.Issues++\n\t\t\tcase 2:\n\t\t\t\tcount.Medium++\n\t\t\t\tcount.Issues++\n\t\t\tcase 3:\n\t\t\t\tcount.High++\n\t\t\t\tcount.Issues++\n\t\t\tcase 4:\n\t\t\t\tcount.Critical++\n\t\t\t\tcount.Issues++\n\t\t\t}\n\t\t}\n\t\tassetVulnsSlice = append(assetVulnsSlice, AssetVulns{Asset: asset, Count: count, Vulns: vulns})\n\t\tvulnCount += count.Low + count.Medium + count.High\n\t}\n\n\tsort.SliceStable(assetVulnsSlice, func(i, j int) bool {\n\t\tif maxScore(assetVulnsSlice[i].Vulns) == maxScore(assetVulnsSlice[j].Vulns) {\n\t\t\treturn assetVulnsSlice[i].Asset < assetVulnsSlice[j].Asset\n\t\t}\n\t\treturn maxScore(assetVulnsSlice[i].Vulns) > maxScore(assetVulnsSlice[j].Vulns)\n\t})\n\n\tscanTimeFmt, err := time.Parse(\"2006-01-02\", reportData.Date)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tassetVulnsSlice = convertToGroups(reportData, assetVulnsSlice)\n\n\tsort.SliceStable(assetVulnsSlice, func(i, j int) bool {\n\t\tif maxScore(assetVulnsSlice[i].Vulns) == maxScore(assetVulnsSlice[j].Vulns) {\n\t\t\treturn assetVulnsSlice[i].Asset < assetVulnsSlice[j].Asset\n\t\t}\n\t\treturn maxScore(assetVulnsSlice[i].Vulns) > maxScore(assetVulnsSlice[j].Vulns)\n\t})\n\tfullReport := FullReport{\n\t\tLocalTempDir: conf.General.LocalTempDir,\n\t\tHomeURL: conf.Endpoints.VulcanUI,\n\t\tManageAssetsURL: conf.Endpoints.VulcanUI + ManageAssetsPath,\n\t\tDetailsURL: conf.Endpoints.VulcanUI + DetailsPath,\n\t\tDashboardURL: conf.Endpoints.VulcanUI + DashboardPath,\n\t\tBucket: conf.S3.PrivateBucket,\n\t\tFolder: folder,\n\t\tFilename: reportData.ScanID + \"-full-report\",\n\t\tExtension: \".html\",\n\t\tProxy: conf.Proxy.Endpoint,\n\t\tUploadToS3: conf.S3.Upload,\n\t\tAWSConfig: awsConfig,\n\n\t\tRisk: report.RankSeverity(aggregatedScore),\n\t\tScanID: reportData.ScanID,\n\t\tScanTime: scanTimeFmt.Format(\"02/01/2006\"),\n\t\tTeamName: teamName,\n\t\tVulnerabilities: vulnCount,\n\t\tVulnerabilitiesPerAsset: assetVulnsSlice,\n\t\tGroups: generateGroups(reportData),\n\t\tDocumentationLink: conf.General.DocumentationLink,\n\t\tRoadmapLink: conf.General.RoadmapLink,\n\t\tJira: conf.General.Jira,\n\t\tContactEmail: conf.General.ContactEmail,\n\t\tContactChannel: conf.General.ContactChannel,\n\n\t\tGAID: conf.Analytics.GAID,\n\t}\n\n\treturn fullReport.Generate()\n}", "func (p *combined) NotHealthy(err error) {\n\tp.mu.Lock()\n\tdefer p.mu.Unlock()\n\n\tfor _, probe := range p.probes {\n\t\tprobe.NotHealthy(err)\n\t}\n}", "func canSoftlock(g graph.Graph) error {\n\tfor _, check := range softlockChecks {\n\t\tif err := check(g); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func scanIPonSwitch(macNumToFind string, switchIP string, switchCommunity string, switchDescription string, switchUplinks []int, IPscan SwitchScan) {\n\t// get ARP table of ports from a given switch\n\tarpTablePort := GetARPtablePort(switchIP, switchCommunity)\n\t// goDebug.Print(\"arpTablePort\", arpTablePort)\n\n\tvar isUplink bool\n\n\t// loop ARP table entries looking for the full scan MAC matching\n\t// if port found matches any uplink, it means that the switch does not have a direct connection to the device, so ignore it\n\tfor aMACnum, arpValues := range arpTablePort {\n\t\tif aMACnum == macNumToFind {\n\t\t\t// Loop switch uplinks to compare w/ port found\n\t\t\tfor _, uplink := range switchUplinks {\n\t\t\t\tif uplink == arpValues.Port {\n\t\t\t\t\tisUplink = true\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif !isUplink {\n\t\t\t\tfmt.Printf(\"*** Found IP at switch [%s, %s] w/ values [MAC_NUM: %s, PORT: %d]\\n\", switchIP, switchDescription, aMACnum, arpValues.Port)\n\t\t\t}\n\t\t\tIPscan[switchIP] = SwitchInfo{Description: switchDescription, MatchingPort: arpValues.Port, UplinkPort: isUplink}\n\t\t\tisUplink = false\n\t\t}\n\t}\n\n\t// Roger finished thread\n\tdefer wg.Done()\n}", "func ScanDeployableArtifacts(deployableArtifacts *Result, serverDetails *config.ServerDetails, threads int, format audit.OutputFormat) (*spec.SpecFiles, *spec.SpecFiles, error) {\n\tbinariesSpecFile := &spec.SpecFiles{}\n\tpomSpecFile := &spec.SpecFiles{}\n\tdeployableArtifacts.Reader().Reset()\n\tfor item := new(clientutils.FileTransferDetails); deployableArtifacts.Reader().NextRecord(item) == nil; item = new(clientutils.FileTransferDetails) {\n\t\tfile := spec.File{Pattern: item.SourcePath, Target: parseTargetPath(item.TargetPath, serverDetails.ArtifactoryUrl)}\n\t\tif strings.HasSuffix(item.SourcePath, \"pom.xml\") {\n\t\t\tpomSpecFile.Files = append(pomSpecFile.Files, file)\n\t\t} else {\n\t\t\tbinariesSpecFile.Files = append(binariesSpecFile.Files, file)\n\t\t}\n\t}\n\tif err := deployableArtifacts.Reader().GetError(); err != nil {\n\t\treturn nil, nil, err\n\t}\n\t// Only non pom.xml should be scanned\n\txrScanCmd := audit.NewScanCommand().SetServerDetails(serverDetails).SetSpec(binariesSpecFile).SetThreads(threads).SetOutputFormat(format)\n\terr := xrScanCmd.Run()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tif !xrScanCmd.IsScanPassed() {\n\t\tlog.Info(\"Violations were found by Xray. No artifacts will be deployed\")\n\t\treturn nil, nil, nil\n\t}\n\treturn binariesSpecFile, pomSpecFile, nil\n}", "func (d *decider) ShouldPowercycleDevice(bot *swarming.SwarmingRpcsBotInfo) bool {\n\tif !bot.Quarantined || bot.IsDead || bot.Deleted || !d.isEnabled(transformBotIDToDevice(bot.BotId)) {\n\t\treturn false\n\t}\n\n\ts := state{}\n\tif err := json.Unmarshal([]byte(bot.State), &s); err != nil {\n\t\tfmt.Printf(\"Could not read bot state %s\", err)\n\t\treturn false\n\t}\n\tif len(s.Devices) == 0 {\n\t\treturn true // no device attached and there should be, powercycle may fix it.\n\t}\n\tfor _, dev := range s.Devices {\n\t\tif status, ok := dev[\"state\"].(string); ok && status == \"too_hot\" {\n\t\t\treturn false\n\t\t} else if ok && (status == \"usb_failure\" || strings.Contains(status, \"booting\")) {\n\t\t\treturn true\n\t\t}\n\t\tbreak\n\t}\n\t// Possibly has more than one device attached or a state we can't handle\n\treturn false\n}", "func CheckUEFI() error {\n\tcmd := exec.Command(\"dmesg\")\n\n\tout, err := cmd.Output()\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tkernelRingBuffer := strings.Split(string(out),\"\\n\")\n\tkernelRingBuffer = kernelRingBuffer[:len(kernelRingBuffer)-1]\n\n\tfor _, line := range kernelRingBuffer {\n\t\tif strings.Contains(line, \"UEFI\") {\n\t\t\treturn nil\n\t\t}\n\t}\n\n\treturn fmt.Errorf(\"no entry in the kernel ring buffer refers to UEFI\")\n}", "func Check(h string, service string) []detect.TextBlock {\n\tcacheData := read()\n\n\tfor _, data := range cacheData {\n\t\tif h == data.Hash && data.Service == service {\n\t\t\tlog.Info(\"Image found in cache, skipping API requests.\")\n\t\t\treturn data.Blocks\n\t\t}\n\t}\n\n\tlog.Info(\"Image not found in cache, performing API requests.\")\n\treturn nil\n}", "func (m *DomainAPIVulnerabilityV2) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateAid(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateApp(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateApps(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateCid(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateCreatedTimestamp(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateCve(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateHostInfo(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateRemediation(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateStatus(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateUpdatedTimestamp(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}" ]
[ "0.58699965", "0.58335364", "0.5754463", "0.5488213", "0.5392516", "0.53654855", "0.5273391", "0.5128523", "0.51196986", "0.5086901", "0.50011945", "0.49646312", "0.49623922", "0.49210832", "0.4902714", "0.48990813", "0.48990813", "0.4883389", "0.4883389", "0.48721", "0.48658592", "0.48617497", "0.4859041", "0.4839659", "0.48201206", "0.47904342", "0.47829112", "0.47766218", "0.47763732", "0.47309497", "0.4725284", "0.47235575", "0.47105685", "0.47053227", "0.47053227", "0.47001916", "0.46755204", "0.4663313", "0.46617925", "0.46549767", "0.46547222", "0.4633645", "0.46311912", "0.46212906", "0.4617111", "0.4606666", "0.4603707", "0.46022627", "0.45926443", "0.4588615", "0.45862404", "0.45609817", "0.45550513", "0.4552519", "0.45507494", "0.45425776", "0.45412388", "0.4515129", "0.4510661", "0.4501602", "0.45007804", "0.4494388", "0.44814104", "0.44725454", "0.44647166", "0.44624996", "0.44619292", "0.44577736", "0.44551402", "0.4452608", "0.44505355", "0.4426686", "0.4426611", "0.44239482", "0.44211984", "0.44194967", "0.4417512", "0.44146553", "0.44128582", "0.44090703", "0.43964952", "0.4393429", "0.43925056", "0.4382255", "0.43782657", "0.43736714", "0.4362595", "0.4360988", "0.43517533", "0.4351308", "0.43449134", "0.43381488", "0.4332195", "0.43238997", "0.43234906", "0.4322527", "0.43188396", "0.43162954", "0.43153113", "0.43105337", "0.4309619" ]
0.0
-1
uses the scan id from the job history Payload to gather the scan summary from the database
func (job *ScanCloseJob) getScanFromPayload() (scan domain.ScanSummary, err error) { if len(job.Payload.ScanID) > 0 { scan, err = job.db.GetScanSummaryBySourceKey(job.Payload.ScanID) if err == nil { if scan == nil { err = fmt.Errorf("could not find scan in database for %v", job.Payload.ScanID) } } } else { err = errors.New("invalid ScanID given to ScanCloseJob") } return scan, err }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func getExistingScan(w http.ResponseWriter , r *http.Request) {\n\terr := verifyAuthenticity(r)\n\tif err != nil {\n\t\tnotifyClient(w,err.Error(),ERROR_CODE)\n\t\treturn\n\t}\n\turlParams := mux.Vars(r)\n\tscanId := urlParams[\"scanId\"]\n\tif len(scanId) <= 0 {\n\t\tlog.Log(SCANNER_NAME,fmt.Sprintf(\"Error in function (getExistingScan) Received an Empty ScanId\"))\n\t\terrorReturned := &rest.RestError{ErrorCode:ERROR_CODE,\n\t\t Message:fmt.Sprintf(\"Received an Empty ScanId ,Please Send a valid scanId.\"),\n\t\t SentTime:time.Now()}\n\t\tfmt.Fprintf(w,errorReturned.ToJson())\n\t\treturn\n\t}\n\t//get the scan entry by the scanId\n\tscan_Object_id := bson.ObjectIdHex(scanId)\n\t//search for the loaded scans , if it exists , just return it\n\texistingScan , err := searchInMemoryScans(scan_Object_id)\n\tif err == nil {\n\t\tfmt.Fprintf(w,MarshalInterface(existingScan))\n\t\treturn\n\t}\n\tfoundScanEntry , err := db.SearchEntries(bson.M{\"_id\":scan_Object_id},0,1)\n\tif err != nil || len(foundScanEntry) <= 0 || foundScanEntry == nil{\n\t\terrorReturned := &rest.RestError{ErrorCode:ERROR_CODE,\n\t\tMessage:fmt.Sprintf(\"Scan does not exist , Please send a valid ScanId or try again!\"),\n\t\tSentTime:time.Now()}\n\t\tfmt.Fprintf(w,errorReturned.ToJson())\n\t\treturn\n\t}\n\tfmt.Fprintf(w,MarshalInterface(foundScanEntry[0]))\n}", "func (job *ScanCloseJob) Process(ctx context.Context, id string, appconfig domain.Config, db domain.DatabaseConnection, lstream log.Logger, payload string, jobConfig domain.JobConfig, inSource []domain.SourceConfig, outSource []domain.SourceConfig) (err error) {\n\n\tvar ok bool\n\tif job.ctx, job.id, job.appconfig, job.db, job.lstream, job.payloadJSON, job.config, job.insource, job.outsource, ok = validInputs(ctx, id, appconfig, db, lstream, payload, jobConfig, inSource, outSource); ok {\n\n\t\tif err = job.buildPayload(job.payloadJSON); err == nil {\n\n\t\t\tvar vscanner integrations.Vscanner\n\t\t\tif vscanner, err = integrations.NewVulnScanner(job.ctx, job.insource.Source(), job.db, job.lstream, job.appconfig, job.insource); err == nil {\n\n\t\t\t\tjob.lstream.Send(log.Debug(\"Scanning Engine Connection Initialized\"))\n\t\t\t\tvar engine integrations.TicketingEngine\n\t\t\t\tif engine, err = integrations.GetEngine(job.ctx, job.outsource.Source(), job.db, job.lstream, job.appconfig, job.outsource); err == nil {\n\t\t\t\t\tjob.lstream.Send(log.Debug(\"Ticketing Engine Connection Initialized\"))\n\n\t\t\t\t\tvar tickets []domain.Ticket\n\t\t\t\t\tif tickets, err = loadTickets(job.lstream, engine, job.Payload.Tickets); err == nil {\n\n\t\t\t\t\t\tvar additionalTickets []domain.Ticket\n\t\t\t\t\t\tif additionalTickets, err = job.loadAdditionalTickets(engine, tickets); err == nil {\n\t\t\t\t\t\t\ttickets = append(tickets, additionalTickets...)\n\n\t\t\t\t\t\t\tjob.lstream.Send(log.Debugf(\"Loading scan [Id: %v] details.\", job.Payload.ScanID))\n\t\t\t\t\t\t\tvar scan domain.ScanSummary\n\t\t\t\t\t\t\tif scan, err = job.getScanFromPayload(); err == nil {\n\t\t\t\t\t\t\t\tjob.processScanDetections(engine, vscanner, tickets, scan)\n\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\tjob.lstream.Send(log.Error(\"error while grabbing scan information from the database\", err))\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\tjob.lstream.Send(log.Errorf(err, \"error while loading additional tickets for the scan\"))\n\t\t\t\t\t\t}\n\t\t\t\t\t} else {\n\t\t\t\t\t\tjob.lstream.Send(log.Errorf(err, \"error while loading tickets for the scan\"))\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tjob.lstream.Send(log.Errorf(err, \"error while creating the ticketing connection\"))\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tjob.lstream.Send(log.Errorf(err, \"error while creating the vulnerability scanner\"))\n\t\t\t}\n\t\t} else {\n\t\t\terr = fmt.Errorf(\"error while building payload - %s\", err.Error())\n\t\t}\n\t} else {\n\t\terr = fmt.Errorf(\"input validation failed\")\n\t}\n\n\treturn err\n}", "func UnmarshalJobLogSummaryActionJob(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(JobLogSummaryActionJob)\n\terr = core.UnmarshalPrimitive(m, \"target_count\", &obj.TargetCount)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"task_count\", &obj.TaskCount)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"play_count\", &obj.PlayCount)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"recap\", &obj.Recap, UnmarshalJobLogSummaryActionJobRecap)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func (d *Digest) Scan(src interface{}) error {\n\treturn json.Unmarshal(src.([]byte), d)\n}", "func (vm *VM) ScansDetail(cmd *cobra.Command, args []string) {\n\tlog := vm.setupLog()\n\tlog.Infof(\"tiogo scan detail command:\")\n\n\tcli := ui.NewCLI(vm.Config)\n\tcli.DrawGopher()\n\n\ta := client.NewAdapter(vm.Config, vm.Metrics)\n\n\tscans, err := a.Scans(true, true)\n\tif err != nil {\n\t\tlog.Errorf(\"error: couldn't scans list: %v\", err)\n\t\treturn\n\t}\n\n\tid := vm.Config.VM.ID\n\tuuid := vm.Config.VM.UUID\n\tname := vm.Config.VM.Name\n\tregex := vm.Config.VM.Regex\n\tif id != \"\" {\n\t\tscans = a.Filter.ScanByID(scans, id)\n\t} else if uuid != \"\" {\n\t\tscans = a.Filter.ScanByScheduleUUID(scans, uuid)\n\t} else if name != \"\" {\n\t\tscans = a.Filter.ScanByName(scans, name)\n\t} else if regex != \"\" {\n\t\tscans = a.Filter.ScanByRegex(scans, regex)\n\t}\n\n\tif len(scans) == 0 {\n\t\tlog.Errorf(\"error: couldn't match a scans\")\n\t\treturn\n\t}\n\n\tfor i := range scans {\n\t\tdetails, err := a.ScanDetails(&scans[i], true, true)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"error: couldn't retrieve details: %v: %+v\", scans[i], err)\n\t\t}\n\t\tcli.Println(fmt.Sprintf(\" Name:\\t\\t\\t%+v\", details.Scan.Name))\n\t\tcli.Println(fmt.Sprintf(\" Enabled:\\t\\t%+v\", details.Scan.Enabled))\n\t\tcli.Println(fmt.Sprintf(\" ScanID:\\t\\t%+v\", details.Scan.ScanID))\n\t\tcli.Println(fmt.Sprintf(\" ScheduleUUID:\\t\\t%+v\", details.Scan.ScheduleUUID))\n\t\tcli.Println(fmt.Sprintf(\" ScannerName:\\t\\t%+v\", details.ScannerName))\n\t\tcli.Println(fmt.Sprintf(\" ScanType:\\t\\t%+v\", details.ScanType))\n\t\tcli.Println(fmt.Sprintf(\" Target:\\t\\t%+v\", details.Targets))\n\t\tcli.Println(fmt.Sprintf(\" AgentGroups:\\t\\t%+v\", details.AgentGroup))\n\t\tcli.Println(fmt.Sprintf(\" HistoryCount:\\t\\t%+v\", details.HistoryCount))\n\t\tcli.Println(fmt.Sprintf(\" Last Status:\\t\\t%+v\", details.Status))\n\t\tcli.Println(fmt.Sprintf(\" Last StartTime:\\t%+v\", details.ScanStart))\n\t\tcli.Println(fmt.Sprintf(\" Last EndTime:\\t\\t%+v\", details.ScanEnd))\n\t\tcli.Println(fmt.Sprintf(\" Timestamp:\\t\\t%+v\", details.Timestamp))\n\t\tcli.Println(fmt.Sprintf(\" RRules:\\t\\t%+v\", details.Scan.RRules))\n\t\tcli.Println(fmt.Sprintf(\" Hosts Scanned:\\t\\t%+v\", details.HostCount))\n\t\tcli.Println(fmt.Sprintf(\" CriticalCount:\\t\\t%+v\", details.PluginCriticalCount))\n\t\tcli.Println(fmt.Sprintf(\" HighCount:\\t\\t%+v\", details.PluginHighCount))\n\t\tcli.Println(fmt.Sprintf(\" MediumCount:\\t\\t%+v\", details.PluginMediumCount))\n\t\tcli.Println(fmt.Sprintf(\" LowCount:\\t\\t%+v\", details.PluginLowCount))\n\t\tcli.Println(fmt.Sprintf(\" InfoCount:\\t\\t%+v\", details.PluginInfoCount))\n\t\tcli.Println(fmt.Sprintf(\" ====================================\\n\\t\\t\\t%+v total\", details.PluginTotalCount))\n\t\tcli.Println(fmt.Sprintf(\" \\n--------------------------------------------\\n\"))\n\t}\n\n\treturn\n}", "func UnmarshalJobLogSummary(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(JobLogSummary)\n\terr = core.UnmarshalPrimitive(m, \"job_id\", &obj.JobID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"job_type\", &obj.JobType)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"log_start_at\", &obj.LogStartAt)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"log_analyzed_till\", &obj.LogAnalyzedTill)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"elapsed_time\", &obj.ElapsedTime)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"log_errors\", &obj.LogErrors, UnmarshalJobLogSummaryLogErrorsItem)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"repo_download_job\", &obj.RepoDownloadJob, UnmarshalJobLogSummaryRepoDownloadJob)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"action_job\", &obj.ActionJob, UnmarshalJobLogSummaryActionJob)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func (mi *MeasureInfo) Scan(src interface{}) error {\n\treturn json.Unmarshal(src.([]byte), mi)\n}", "func (c *Client) ScanDetails(httpClient *http.Client, scanID int) (ScanDetails, error) {\n\tc.debugln(\"ScanDetails(): Building scan details URL.\")\n\turl := fmt.Sprintf(\"https://%s:%s/scans/%d\", c.ip, c.port, scanID)\n\n\tstatusCode, body, err := c.get(httpClient, url)\n\tif err != nil {\n\t\treturn ScanDetails{}, err\n\t}\n\n\tswitch statusCode {\n\tcase 200:\n\t\tvar scanDetails ScanDetails\n\t\terr = json.Unmarshal(body, &scanDetails)\n\t\tif err != nil {\n\t\t\treturn ScanDetails{}, err\n\t\t}\n\t\tc.debugln(\"ScanDetails(): Successfully retrieved scan details.\")\n\t\treturn scanDetails, nil\n\tdefault:\n\t\tvar err ErrorResponse\n\t\tunmarshalError := json.Unmarshal(body, &err)\n\t\tif unmarshalError != nil {\n\t\t\treturn ScanDetails{}, unmarshalError\n\t\t}\n\t\tc.debugln(\"ScanDetails(): Scan details not be retrieved.\")\n\t\treturn ScanDetails{}, fmt.Errorf(\"%s\", err.Error)\n\t}\n}", "func (target *Target) Summary(spaceGUID string) (summary *Summary, err error) {\n\turl := fmt.Sprintf(\"%s/v2/spaces/%s/summary\", target.TargetUrl, spaceGUID)\n\treq, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresp, err := target.sendRequest(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdecoder := json.NewDecoder(resp.Body)\n\terr = decoder.Decode(&summary)\n\treturn\n}", "func (bi *BridgerInfo) pushInstance(ins *zstypes.InsCacheInfo) (uint64, uint64, error) {\n\n\tmeta := dtypes.StFileMeta{\n\t\tAccount: ins.AName,\n\t\tFiletype: \"prometheus\",\n\t\tIid: ins.IName,\n\t\tIsCompressed: true,\n\t\tDTs: ins.DTs,\n\t\tOLabels: ins.OLabels,\n\t}\n\n\tif config.GlCfg.BrdigerNotifyStIngest {\n\t\tfor atomic.LoadInt32(&bi.stingestWorkerReady) == 0 {\n\t\t\tzlog.Info(\"Waiting for stingest req_q worker to be ready\")\n\t\t\ttime.Sleep(5 * time.Second)\n\t\t}\n\t}\n\n\tdmepoch := time.Now().UnixNano() / 1000\n\tdts := strconv.FormatInt(dmepoch, 10)\n\ttmpDir := path.Join(config.GlCfg.StatsReqsDir, ins.AName, strings.Replace(ins.IName, \":\", \"_\", 1), dts)\n\terr := os.MkdirAll(tmpDir, 0755)\n\tif err != nil {\n\t\tzlog.Error(\"Failed to create directory %s: %s\", tmpDir, err)\n\t\treturn uint64(0), uint64(0), err\n\t}\n\ttmpMFpath := filepath.Join(tmpDir, dts+\".json\")\n\ttmpDFpath := filepath.Join(tmpDir, dts+\".data.gz\")\n\n\tclblsMap, ntstamps, nbytes, err := bi.writeStatsFile(tmpDFpath, ins)\n\tif err != nil {\n\t\tzlog.Error(\"Failed to write to file %s, err %s\\n\", tmpDFpath, err)\n\t\treturn ntstamps, nbytes, err\n\t}\n\n\tif len(clblsMap) > 0 {\n\t\tmeta.Kvs = make([]dtypes.KvPair, 0, len(clblsMap))\n\t\tfor k, v := range clblsMap {\n\t\t\tmeta.Kvs = append(meta.Kvs, dtypes.KvPair{N: k, V: v})\n\t\t}\n\t}\n\tmjson, err := json.Marshal(meta)\n\tif err != nil {\n\t\tzlog.Error(\"Failed to marshal file metadata %v: %s\", meta, err)\n\t\treturn ntstamps, nbytes, err\n\t}\n\terr = ioutil.WriteFile(tmpMFpath, mjson, 0644)\n\tif err != nil {\n\t\tzlog.Error(\"Failed to write to file %s, err %s\\n\", tmpMFpath, err)\n\t\treturn ntstamps, nbytes, err\n\t}\n\n\t// If configured, send to the next stage for further processing.\n\tif config.GlCfg.BrdigerNotifyStIngest {\n\t\treq := stingestpb.StatsIngestRequest{\n\t\t\tAccount: ins.AName,\n\t\t\tDFpath: tmpDFpath,\n\t\t\tMFpath: tmpMFpath,\n\t\t\tInstanceId: ins.IName,\n\t\t\tType: meta.Filetype,\n\t\t\tDTs: ins.DTs,\n\t\t}\n\n\t\tsReq := &stiReq{tmpDir: tmpDir, req: &req}\n\t\tbi.stiReqCh <- sReq\n\t}\n\n\treturn ntstamps, nbytes, nil\n}", "func (l *DigestList) Scan(src interface{}) error {\n\treturn json.Unmarshal(src.([]byte), l)\n}", "func (d *defaultJobRepository) GetStatisticsForBackupID(ctxIn context.Context, backupID string) (JobStatistics, error) {\n _, span := trace.StartSpan(ctxIn, \"(*defaultJobRepository).GetStatisticsForBackupID\")\n defer span.End()\n\n var results []struct {\n Count uint64\n Status JobStatus\n }\n\n err := d.storageService.DB().\n Model((*Job)(nil)).\n ColumnExpr(\"count(*) AS count\").\n Column(\"status\").\n Where(\"backup_id = ?\", backupID).\n Group(\"status\").\n Select(&results)\n\n if err != nil {\n return nil, err\n }\n\n jobStatistics := make(JobStatistics)\n for _, result := range results {\n jobStatistics[result.Status] = result.Count\n }\n return jobStatistics, nil\n}", "func GetJobSummary(jobID common.JobID) common.ListJobSummaryResponse {\n\t// getJobPartMapFromJobPartInfoMap gives the map of partNo to JobPartPlanInfo Pointer for a given JobId\n\tjm, found := JobsAdmin.JobMgr(jobID)\n\tif !found {\n\t\t// Job with JobId does not exists\n\t\t// Search the plan files in Azcopy folder\n\t\t// and resurrect the Job\n\t\tif !JobsAdmin.ResurrectJob(jobID, EMPTY_SAS_STRING, EMPTY_SAS_STRING) {\n\t\t\treturn common.ListJobSummaryResponse{\n\t\t\t\tErrorMsg: fmt.Sprintf(\"no job with JobId %v exists\", jobID),\n\t\t\t}\n\t\t}\n\t\t// If the job manager was not found, then Job was resurrected\n\t\t// Get the Job manager again for given JobId\n\t\tjm, _ = JobsAdmin.JobMgr(jobID)\n\t}\n\n\tjs := jm.ListJobSummary()\n\tjs.Timestamp = time.Now().UTC()\n\tjs.JobID = jm.JobID()\n\tjs.ErrorMsg = \"\"\n\n\tpart0, ok := jm.JobPartMgr(0)\n\tif !ok {\n\t\treturn js\n\t}\n\tpart0PlanStatus := part0.Plan().JobStatus()\n\n\t// Add on byte count from files in flight, to get a more accurate running total\n\tjs.TotalBytesTransferred += jm.SuccessfulBytesInActiveFiles()\n\tif js.TotalBytesExpected == 0 {\n\t\t// if no bytes expected, and we should avoid dividing by 0 (which results in NaN)\n\t\tjs.PercentComplete = 100\n\t} else {\n\t\tjs.PercentComplete = 100 * float32(js.TotalBytesTransferred) / float32(js.TotalBytesExpected)\n\t}\n\n\t// This is added to let FE to continue fetching the Job Progress Summary\n\t// in case of resume. In case of resume, the Job is already completely\n\t// ordered so the progress summary should be fetched until all job parts\n\t// are iterated and have been scheduled\n\tjs.CompleteJobOrdered = js.CompleteJobOrdered || jm.AllTransfersScheduled()\n\n\tjs.BytesOverWire = uint64(JobsAdmin.BytesOverWire())\n\n\t// Get the number of active go routines performing the transfer or executing the chunk Func\n\t// TODO: added for debugging purpose. remove later (is covered by GetPerfInfo now anyway)\n\tjs.ActiveConnections = jm.ActiveConnections()\n\n\tjs.PerfStrings, js.PerfConstraint = jm.GetPerfInfo()\n\n\tpipeStats := jm.PipelineNetworkStats()\n\tif pipeStats != nil {\n\t\tjs.AverageIOPS = pipeStats.OperationsPerSecond()\n\t\tjs.AverageE2EMilliseconds = pipeStats.AverageE2EMilliseconds()\n\t\tjs.NetworkErrorPercentage = pipeStats.NetworkErrorPercentage()\n\t\tjs.ServerBusyPercentage = pipeStats.TotalServerBusyPercentage()\n\t}\n\n\t// If the status is cancelled, then no need to check for completerJobOrdered\n\t// since user must have provided the consent to cancel an incompleteJob if that\n\t// is the case.\n\tdir := jm.TransferDirection()\n\tp := jm.PipelineNetworkStats()\n\tif part0PlanStatus == common.EJobStatus.Cancelled() {\n\t\tjs.JobStatus = part0PlanStatus\n\t\tjs.PerformanceAdvice = JobsAdmin.TryGetPerformanceAdvice(js.TotalBytesExpected, js.TotalTransfers-js.TransfersSkipped, part0.Plan().FromTo, dir, p)\n\t} else {\n\t\t// Job is completed if Job order is complete AND ALL transfers are completed/failed\n\t\t// FIX: active or inactive state, then job order is said to be completed if final part of job has been ordered.\n\t\tif (js.CompleteJobOrdered) && (part0PlanStatus.IsJobDone()) {\n\t\t\tjs.JobStatus = part0PlanStatus\n\t\t}\n\n\t\tif js.JobStatus.IsJobDone() {\n\t\t\tjs.PerformanceAdvice = JobsAdmin.TryGetPerformanceAdvice(js.TotalBytesExpected, js.TotalTransfers-js.TransfersSkipped, part0.Plan().FromTo, dir, p)\n\t\t}\n\t}\n\n\treturn js\n}", "func (j Jumio) retrieveScanDetails(referenceID string) (response *DetailsResponse, errorCode *int, err error) {\n\tstatusCode, resp, err := http.Get(fmt.Sprintf(j.baseURL+scanDetailsEndpoint, referenceID), j.headers())\n\tif err != nil {\n\t\treturn\n\t}\n\tif statusCode != stdhttp.StatusOK {\n\t\terrorCode = &statusCode\n\t\te := ErrorResponse{}\n\t\tif err = json.Unmarshal(resp, &e); err != nil {\n\t\t\terr = errors.New(\"http error\")\n\t\t\treturn\n\t\t}\n\t\terr = e\n\t\treturn\n\t}\n\n\tresponse = &DetailsResponse{}\n\terr = json.Unmarshal(resp, response)\n\n\treturn\n}", "func manifestScanned(ctx context.Context, db *sqlx.DB, hash claircore.Digest, scnrs indexer.VersionedScanners) (bool, error) {\n\tconst (\n\t\tselectScanner = `\n\t\tSELECT id\n\t\tFROM scanner\n\t\tWHERE name = $1\n\t\t AND version = $2\n\t\t AND kind = $3;\n\t\t`\n\t\tselectScanned = `SELECT scanner_id FROM scanned_manifest WHERE manifest_hash = $1;`\n\t)\n\n\t// TODO Use passed-in Context.\n\t// get the ids of the scanners we are testing for.\n\tvar expectedIDs []int64\n\tfor _, scnr := range scnrs {\n\t\tvar id int64\n\t\trow := db.QueryRowx(selectScanner, scnr.Name(), scnr.Version(), scnr.Kind())\n\t\terr := row.Scan(&id)\n\t\tif err != nil {\n\t\t\treturn false, fmt.Errorf(\"store:manifestScanned failed to retrieve expected scanner id for scnr %v: %v\", scnr, err)\n\t\t}\n\t\texpectedIDs = append(expectedIDs, id)\n\t}\n\n\t// get a map of the found ids which have scanned this package\n\tvar temp = []int64{}\n\tvar foundIDs = map[int64]struct{}{}\n\terr := db.Select(&temp, selectScanned, hash)\n\tif err != nil {\n\t\treturn false, fmt.Errorf(\"store:manifestScanned failed to select scanner IDs for manifest: %v\", err)\n\t}\n\n\t// if we are unable to find any scanner ids for this manifest hash, we have\n\t// never scanned this manifest.\n\tif len(temp) == 0 {\n\t\treturn false, nil\n\t}\n\n\t// create foundIDs map from temporary array\n\tfor _, id := range temp {\n\t\tfoundIDs[id] = struct{}{}\n\t}\n\n\t// compare the expectedIDs array with our foundIDs. if we get a lookup\n\t// miss we can say the manifest has not been scanned by all the layers provided\n\tfor _, id := range expectedIDs {\n\t\tif _, ok := foundIDs[id]; !ok {\n\t\t\treturn false, nil\n\t\t}\n\t}\n\n\treturn true, nil\n}", "func Scan(target string, options model.Options, sid string) (model.Result, error) {\n\tvar scanResult model.Result\n\toptions.ScanResult = scanResult\n\tscanResult.StartTime = time.Now()\n\tif !(options.Silence || options.NoSpinner) {\n\t\ttime.Sleep(1 * time.Second) // Waiting log\n\t\ts.Prefix = \" \"\n\t\ts.Suffix = \"\"\n\t\tif !options.NoColor {\n\t\t\ts.Color(\"red\", \"bold\")\n\t\t}\n\t\toptions.SpinnerObject = s\n\t\ts.Start()\n\t}\n\n\tscanObject := model.Scan{\n\t\tScanID: sid,\n\t\tURL: target,\n\t}\n\tif !(options.Silence && options.MulticastMode) {\n\t\tprinting.DalLog(\"SYSTEM\", \"Start Scan 🦊\", options)\n\t\t//printing.DalLog(\"SYSTEM-M\", \"Start Scan 🦊\", options)\n\t\tif options.AllURLS > 0 {\n\t\t\tsnow, _ := strconv.Atoi(sid)\n\t\t\tpercent := fmt.Sprintf(\"%0.2f%%\", float64(snow)/float64(options.AllURLS)*100)\n\t\t\tprinting.DalLog(\"SYSTEM-M\", \"🦊 Start scan [SID:\"+sid+\"][\"+sid+\"/\"+strconv.Itoa(options.AllURLS)+\"][\"+percent+\"%] / URL: \"+target, options)\n\t\t} else {\n\t\t\tprinting.DalLog(\"SYSTEM-M\", \"🦊 Start scan [SID:\"+sid+\"] / URL: \"+target, options)\n\t\t}\n\t}\n\n\t// query is XSS payloads\n\tquery := make(map[*http.Request]map[string]string)\n\n\t// params is \"param name\":true (reflected?)\n\t// 1: non-reflected , 2: reflected , 3: reflected-with-sc\n\tparams := make(map[string][]string)\n\n\t// durls is url for dom xss\n\tvar durls []string\n\n\tvStatus := make(map[string]bool)\n\tvStatus[\"pleasedonthaveanamelikethis_plz_plz\"] = false\n\n\t// policy is \"CSP\":domain..\n\tpolicy := make(map[string]string)\n\n\t// set up a rate limit\n\trl := newRateLimiter(time.Duration(options.Delay * 1000000))\n\n\tparsedURL, err := url.Parse(target)\n\tif err != nil {\n\t\tprinting.DalLog(\"SYSTEM\", \"Not running \"+target+\" url\", options)\n\t\treturn scanResult, err\n\t}\n\ttreq := optimization.GenerateNewRequest(target, \"\", options)\n\t//treq, terr := http.NewRequest(\"GET\", target, nil)\n\tif treq == nil {\n\t} else {\n\t\ttransport := getTransport(options)\n\t\tt := options.Timeout\n\t\tclient := &http.Client{\n\t\t\tTimeout: time.Duration(t) * time.Second,\n\t\t\tTransport: transport,\n\t\t}\n\n\t\tif !options.FollowRedirect {\n\t\t\tclient.CheckRedirect = func(req *http.Request, via []*http.Request) error {\n\t\t\t\treturn http.ErrUseLastResponse\n\t\t\t}\n\t\t}\n\n\t\ttres, err := client.Do(treq)\n\t\tif err != nil {\n\t\t\tmsg := fmt.Sprintf(\"not running %v\", err)\n\t\t\tprinting.DalLog(\"ERROR\", msg, options)\n\t\t\treturn scanResult, err\n\t\t}\n\t\tif options.IgnoreReturn != \"\" {\n\t\t\trcode := strings.Split(options.IgnoreReturn, \",\")\n\t\t\ttcode := strconv.Itoa(tres.StatusCode)\n\t\t\tfor _, v := range rcode {\n\t\t\t\tif tcode == v {\n\t\t\t\t\tprinting.DalLog(\"SYSTEM\", \"Not running \"+target+\" url from --ignore-return option\", options)\n\t\t\t\t\treturn scanResult, nil\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tdefer tres.Body.Close()\n\t\tbody, err := ioutil.ReadAll(tres.Body)\n\t\tprinting.DalLog(\"SYSTEM\", \"Valid target [ code:\"+strconv.Itoa(tres.StatusCode)+\" / size:\"+strconv.Itoa(len(body))+\" ]\", options)\n\t}\n\n\tif options.Format == \"json\" {\n\t\tprinting.DalLog(\"PRINT\", \"[\", options)\n\t}\n\n\tvar wait sync.WaitGroup\n\ttask := 3\n\tsa := \"SA: ✓ \"\n\tpa := \"PA: ✓ \"\n\tbav := \"BAV: ✓ \"\n\tif options.NoBAV {\n\t\ttask = 2\n\t\tbav = \"\"\n\t}\n\n\twait.Add(task)\n\tprinting.DalLog(\"SYSTEM\", \"[\"+sa+pa+bav+\"] Waiting for analysis 🔍\", options)\n\tgo func() {\n\t\tdefer wait.Done()\n\t\tpolicy, options.PathReflection = StaticAnalysis(target, options, rl)\n\t\tsa = options.AuroraObject.Green(sa).String()\n\t\tprinting.DalLog(\"SYSTEM\", \"[\"+sa+pa+bav+\"] Waiting for analysis 🔍\", options)\n\t}()\n\tgo func() {\n\t\tdefer wait.Done()\n\t\tparams = ParameterAnalysis(target, options, rl)\n\t\tpa = options.AuroraObject.Green(pa).String()\n\t\tprinting.DalLog(\"SYSTEM\", \"[\"+sa+pa+bav+\"] Waiting for analysis 🔍\", options)\n\t}()\n\tif !options.NoBAV {\n\t\tgo func() {\n\t\t\tdefer wait.Done()\n\t\t\tvar bavWaitGroup sync.WaitGroup\n\t\t\tbavTask := 4\n\t\t\tbavWaitGroup.Add(bavTask)\n\t\t\tgo func() {\n\t\t\t\tdefer bavWaitGroup.Done()\n\t\t\t\tSqliAnalysis(target, options, rl)\n\t\t\t}()\n\t\t\tgo func() {\n\t\t\t\tdefer bavWaitGroup.Done()\n\t\t\t\tSSTIAnalysis(target, options, rl)\n\t\t\t}()\n\t\t\tgo func() {\n\t\t\t\tdefer bavWaitGroup.Done()\n\t\t\t\tOpenRedirectorAnalysis(target, options, rl)\n\t\t\t}()\n\t\t\tgo func() {\n\t\t\t\tdefer bavWaitGroup.Done()\n\t\t\t\tCRLFAnalysis(target, options, rl)\n\t\t\t}()\n\t\t\tbavWaitGroup.Wait()\n\t\t\tbav = options.AuroraObject.Green(bav).String()\n\t\t\tprinting.DalLog(\"SYSTEM\", \"[\"+sa+pa+bav+\"] Waiting for analysis 🔍\", options)\n\t\t}()\n\t}\n\n\tif options.NowURL != 0 && !options.Silence {\n\t\ts.Suffix = \" [\" + strconv.Itoa(options.NowURL) + \"/\" + strconv.Itoa(options.AllURLS) + \" Tasks] Scanning..\"\n\t}\n\n\tif !(options.Silence || options.NoSpinner) {\n\t\ttime.Sleep(1 * time.Second) // Waiting log\n\t\ts.Start() // Start the spinner\n\t\t//time.Sleep(3 * time.Second) // Run for some time to simulate work\n\t}\n\twait.Wait()\n\n\tif !(options.Silence || options.NoSpinner) {\n\t\ts.Stop()\n\t}\n\tfor k, v := range policy {\n\t\tif len(v) != 0 {\n\t\t\tif k == \"BypassCSP\" {\n\t\t\t\tprinting.DalLog(\"WEAK\", k+\": \"+v, options)\n\t\t\t} else {\n\t\t\t\tprinting.DalLog(\"INFO\", k+\" is \"+v, options)\n\t\t\t}\n\t\t}\n\t}\n\n\tfor k, v := range options.PathReflection {\n\t\tif len(parsedURL.Path) == 0 {\n\t\t\tstr := options.AuroraObject.Yellow(\"dalfoxpathtest\").String()\n\t\t\tprinting.DalLog(\"INFO\", \"Reflected PATH '/\"+str+\"' => \"+v+\"]\", options)\n\t\t} else {\n\t\t\tsplit := strings.Split(parsedURL.Path, \"/\")\n\t\t\tif len(split) > k+1 {\n\t\t\t\tsplit[k+1] = options.AuroraObject.Yellow(\"dalfoxpathtest\").String()\n\t\t\t\ttempURL := strings.Join(split, \"/\")\n\t\t\t\tprinting.DalLog(\"INFO\", \"Reflected PATH '\"+tempURL+\"' => \"+v+\"]\", options)\n\t\t\t}\n\t\t}\n\t}\n\n\tfor k, v := range params {\n\t\tif len(v) != 0 {\n\t\t\tcode, vv := v[len(v)-1], v[:len(v)-1]\n\t\t\tchar := strings.Join(vv, \" \")\n\t\t\t//x, a = a[len(a)-1], a[:len(a)-1]\n\t\t\tprinting.DalLog(\"INFO\", \"Reflected \"+k+\" param => \"+char, options)\n\t\t\tprinting.DalLog(\"CODE\", code, options)\n\t\t}\n\t}\n\n\tif !options.OnlyDiscovery {\n\t\t// XSS Scanning\n\t\tprinting.DalLog(\"SYSTEM\", \"Generate XSS payload and optimization.Optimization.. 🛠\", options)\n\t\t// optimization.Optimization..\n\n\t\t/*\n\t\t\tk: parama name\n\t\t\tv: pattern [injs, inhtml, ' < > ]\n\t\t\tav: reflected type, valid char\n\t\t*/\n\n\t\t// set path base XSS\n\t\tfor k, v := range options.PathReflection {\n\t\t\tif strings.Contains(v, \"Injected:\") {\n\t\t\t\t// Injected pattern\n\t\t\t\tinjectedPoint := strings.Split(v, \"/\")\n\t\t\t\tinjectedPoint = injectedPoint[1:]\n\n\t\t\t\tfor _, ip := range injectedPoint {\n\t\t\t\t\tvar arr []string\n\t\t\t\t\tif strings.Contains(ip, \"inJS\") {\n\t\t\t\t\t\tarr = optimization.SetPayloadValue(getInJsPayload(ip), options)\n\t\t\t\t\t}\n\t\t\t\t\tif strings.Contains(ip, \"inHTML\") {\n\t\t\t\t\t\tarr = optimization.SetPayloadValue(getHTMLPayload(ip), options)\n\t\t\t\t\t}\n\t\t\t\t\tif strings.Contains(ip, \"inATTR\") {\n\t\t\t\t\t\tarr = optimization.SetPayloadValue(getAttrPayload(ip), options)\n\t\t\t\t\t}\n\t\t\t\t\tfor _, avv := range arr {\n\t\t\t\t\t\tvar tempURL string\n\t\t\t\t\t\tif len(parsedURL.Path) == 0 {\n\t\t\t\t\t\t\ttempURL = target + \"/\" + avv\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\tsplit := strings.Split(target, \"/\")\n\t\t\t\t\t\t\tsplit[k+3] = split[k+3] + avv\n\t\t\t\t\t\t\ttempURL = strings.Join(split, \"/\")\n\t\t\t\t\t\t}\n\t\t\t\t\t\t// Add Path XSS Query\n\t\t\t\t\t\ttq, tm := optimization.MakeRequestQuery(tempURL, \"\", \"\", ip, \"toAppend\", \"NaN\", options)\n\t\t\t\t\t\ttm[\"payload\"] = avv\n\t\t\t\t\t\tquery[tq] = tm\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif isAllowType(policy[\"Content-Type\"]) && !options.OnlyCustomPayload {\n\t\t\t// Set common payloads\n\t\t\tcu, err := url.Parse(target)\n\t\t\tvar cp url.Values\n\t\t\tvar cpd url.Values\n\t\t\tvar cpArr []string\n\t\t\tvar cpdArr []string\n\t\t\thashParam := false\n\t\t\tif err == nil {\n\t\t\t\tif options.Data == \"\" {\n\t\t\t\t\tcp, _ = url.ParseQuery(cu.RawQuery)\n\t\t\t\t\tif len(cp) == 0 {\n\t\t\t\t\t\tcp, _ = url.ParseQuery(cu.Fragment)\n\t\t\t\t\t\thashParam = true\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tcp, _ = url.ParseQuery(cu.RawQuery)\n\t\t\t\t\tcpd, _ = url.ParseQuery(options.Data)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tfor v := range cp {\n\t\t\t\tif optimization.CheckUniqParam(options, v) {\n\t\t\t\t\tcpArr = append(cpArr, v)\n\t\t\t\t\tarc := optimization.SetPayloadValue(getCommonPayload(), options)\n\t\t\t\t\tfor _, avv := range arc {\n\t\t\t\t\t\t// Add plain XSS Query\n\t\t\t\t\t\ttq, tm := optimization.MakeRequestQuery(target, v, avv, \"inHTML-URL\", \"toAppend\", \"NaN\", options)\n\t\t\t\t\t\tquery[tq] = tm\n\t\t\t\t\t\t// Add URL encoded XSS Query\n\t\t\t\t\t\tetq, etm := optimization.MakeRequestQuery(target, v, avv, \"inHTML-URL\", \"toAppend\", \"urlEncode\", options)\n\t\t\t\t\t\tquery[etq] = etm\n\t\t\t\t\t\t// Add HTML Encoded XSS Query\n\t\t\t\t\t\thtq, htm := optimization.MakeRequestQuery(target, v, avv, \"inHTML-URL\", \"toAppend\", \"htmlEncode\", options)\n\t\t\t\t\t\tquery[htq] = htm\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tfor v := range cpd {\n\t\t\t\tif optimization.CheckUniqParam(options, v) {\n\t\t\t\t\tcpdArr = append(cpdArr, v)\n\t\t\t\t\tarc := optimization.SetPayloadValue(getCommonPayload(), options)\n\t\t\t\t\tfor _, avv := range arc {\n\t\t\t\t\t\t// Add plain XSS Query\n\t\t\t\t\t\ttq, tm := optimization.MakeRequestQuery(target, v, avv, \"inHTML-FORM\", \"toAppend\", \"NaN\", options)\n\t\t\t\t\t\tquery[tq] = tm\n\t\t\t\t\t\t// Add URL encoded XSS Query\n\t\t\t\t\t\tetq, etm := optimization.MakeRequestQuery(target, v, avv, \"inHTML-FORM\", \"toAppend\", \"urlEncode\", options)\n\t\t\t\t\t\tquery[etq] = etm\n\t\t\t\t\t\t// Add HTML Encoded XSS Query\n\t\t\t\t\t\thtq, htm := optimization.MakeRequestQuery(target, v, avv, \"inHTML-FORM\", \"toAppend\", \"htmlEncode\", options)\n\t\t\t\t\t\tquery[htq] = htm\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// DOM XSS payload\n\t\t\tvar dlst []string\n\t\t\tif options.UseHeadless {\n\t\t\t\tif options.UseDeepDXSS {\n\t\t\t\t\tdlst = getDeepDOMXSPayload()\n\t\t\t\t} else {\n\t\t\t\t\tdlst = getDOMXSSPayload()\n\t\t\t\t}\n\t\t\t\tdpayloads := optimization.SetPayloadValue(dlst, options)\n\t\t\t\tfor v := range cp {\n\t\t\t\t\tif optimization.CheckUniqParam(options, v) {\n\t\t\t\t\t\t// loop payload list\n\t\t\t\t\t\tif len(params[v]) == 0 {\n\t\t\t\t\t\t\tfor _, dpayload := range dpayloads {\n\t\t\t\t\t\t\t\tvar durl string\n\t\t\t\t\t\t\t\tu, _ := url.Parse(target)\n\t\t\t\t\t\t\t\tdp, _ := url.ParseQuery(u.RawQuery)\n\t\t\t\t\t\t\t\tif hashParam {\n\t\t\t\t\t\t\t\t\tdp, _ = url.ParseQuery(u.Fragment)\n\t\t\t\t\t\t\t\t\tdp.Set(v, dpayload)\n\t\t\t\t\t\t\t\t\tu.Fragment, _ = url.QueryUnescape(dp.Encode())\n\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\tdp.Set(v, dpayload)\n\t\t\t\t\t\t\t\t\tu.RawQuery = dp.Encode()\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\tdurl = u.String()\n\t\t\t\t\t\t\t\tdurls = append(durls, durl)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tfor v := range cpd {\n\t\t\t\t\tif optimization.CheckUniqParam(options, v) {\n\t\t\t\t\t\t// loop payload list\n\t\t\t\t\t\tif len(params[v]) == 0 {\n\t\t\t\t\t\t\tfor _, dpayload := range dpayloads {\n\t\t\t\t\t\t\t\tvar durl string\n\t\t\t\t\t\t\t\tu, _ := url.Parse(target)\n\t\t\t\t\t\t\t\tdp, _ := url.ParseQuery(u.RawQuery)\n\t\t\t\t\t\t\t\tif hashParam {\n\t\t\t\t\t\t\t\t\tdp, _ = url.ParseQuery(u.Fragment)\n\t\t\t\t\t\t\t\t\tdp.Set(v, dpayload)\n\t\t\t\t\t\t\t\t\tu.Fragment, _ = url.QueryUnescape(dp.Encode())\n\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\tdp.Set(v, dpayload)\n\t\t\t\t\t\t\t\t\tu.RawQuery = dp.Encode()\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\tdurl = u.String()\n\t\t\t\t\t\t\t\tdurls = append(durls, durl)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Set param base xss\n\t\t\tfor k, v := range params {\n\t\t\t\tif optimization.CheckUniqParam(options, k) {\n\t\t\t\t\tvStatus[k] = false\n\t\t\t\t\tptype := \"\"\n\t\t\t\t\tchars := GetSpecialChar()\n\t\t\t\t\tvar badchars []string\n\n\t\t\t\t\tfor _, av := range v {\n\t\t\t\t\t\tif indexOf(av, chars) == -1 {\n\t\t\t\t\t\t\tbadchars = append(badchars, av)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif strings.Contains(av, \"PTYPE:\") {\n\t\t\t\t\t\t\tptype = GetPType(av)\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tif strings.Contains(av, \"Injected:\") {\n\t\t\t\t\t\t\t// Injected pattern\n\t\t\t\t\t\t\tinjectedPoint := strings.Split(av, \"/\")\n\t\t\t\t\t\t\tinjectedPoint = injectedPoint[1:]\n\t\t\t\t\t\t\tfor _, ip := range injectedPoint {\n\t\t\t\t\t\t\t\tvar arr []string\n\t\t\t\t\t\t\t\tif strings.Contains(ip, \"inJS\") {\n\t\t\t\t\t\t\t\t\tarr = optimization.SetPayloadValue(getInJsPayload(ip), options)\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\tif strings.Contains(ip, \"inHTML\") {\n\t\t\t\t\t\t\t\t\tarr = optimization.SetPayloadValue(getHTMLPayload(ip), options)\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\tif strings.Contains(ip, \"inATTR\") {\n\t\t\t\t\t\t\t\t\tarr = optimization.SetPayloadValue(getAttrPayload(ip), options)\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\tfor _, avv := range arr {\n\t\t\t\t\t\t\t\t\tif optimization.Optimization(avv, badchars) {\n\t\t\t\t\t\t\t\t\t\t// Add plain XSS Query\n\t\t\t\t\t\t\t\t\t\ttq, tm := optimization.MakeRequestQuery(target, k, avv, ip+ptype, \"toAppend\", \"NaN\", options)\n\t\t\t\t\t\t\t\t\t\tquery[tq] = tm\n\t\t\t\t\t\t\t\t\t\t// Add URL Encoded XSS Query\n\t\t\t\t\t\t\t\t\t\tetq, etm := optimization.MakeRequestQuery(target, k, avv, ip+ptype, \"toAppend\", \"urlEncode\", options)\n\t\t\t\t\t\t\t\t\t\tquery[etq] = etm\n\t\t\t\t\t\t\t\t\t\t// Add HTML Encoded XSS Query\n\t\t\t\t\t\t\t\t\t\thtq, htm := optimization.MakeRequestQuery(target, k, avv, ip+ptype, \"toAppend\", \"htmlEncode\", options)\n\t\t\t\t\t\t\t\t\t\tquery[htq] = htm\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\t// common XSS for new param\n\t\t\t\t\tarc := optimization.SetPayloadValue(getCommonPayload(), options)\n\t\t\t\t\tfor _, avv := range arc {\n\t\t\t\t\t\tif !containsFromArray(cpArr, k) {\n\t\t\t\t\t\t\tif optimization.Optimization(avv, badchars) {\n\t\t\t\t\t\t\t\t// Add plain XSS Query\n\t\t\t\t\t\t\t\ttq, tm := optimization.MakeRequestQuery(target, k, avv, \"inHTML\"+ptype, \"toAppend\", \"NaN\", options)\n\t\t\t\t\t\t\t\tquery[tq] = tm\n\t\t\t\t\t\t\t\t// Add URL encoded XSS Query\n\t\t\t\t\t\t\t\tetq, etm := optimization.MakeRequestQuery(target, k, avv, \"inHTML\"+ptype, \"toAppend\", \"urlEncode\", options)\n\t\t\t\t\t\t\t\tquery[etq] = etm\n\t\t\t\t\t\t\t\t// Add HTML Encoded XSS Query\n\t\t\t\t\t\t\t\thtq, htm := optimization.MakeRequestQuery(target, k, avv, \"inHTML\"+ptype, \"toAppend\", \"htmlEncode\", options)\n\t\t\t\t\t\t\t\tquery[htq] = htm\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t}\n\t\t} else {\n\t\t\tprinting.DalLog(\"SYSTEM\", \"Type is '\"+policy[\"Content-Type\"]+\"', It does not test except customized payload (custom/blind).\", options)\n\t\t}\n\n\t\t// Blind payload\n\t\tif options.BlindURL != \"\" {\n\t\t\tbpayloads := getBlindPayload()\n\n\t\t\t//strings.HasPrefix(\"foobar\", \"foo\") // true\n\t\t\tvar bcallback string\n\n\t\t\tif strings.HasPrefix(options.BlindURL, \"https://\") || strings.HasPrefix(options.BlindURL, \"http://\") {\n\t\t\t\tbcallback = options.BlindURL\n\t\t\t} else {\n\t\t\t\tbcallback = \"//\" + options.BlindURL\n\t\t\t}\n\n\t\t\tfor _, bpayload := range bpayloads {\n\t\t\t\t// header base blind xss\n\t\t\t\tbp := strings.Replace(bpayload, \"CALLBACKURL\", bcallback, 10)\n\t\t\t\ttq, tm := optimization.MakeHeaderQuery(target, \"Referer\", bp, options)\n\t\t\t\ttm[\"payload\"] = \"toBlind\"\n\t\t\t\tquery[tq] = tm\n\t\t\t}\n\n\t\t\t// loop parameter list\n\t\t\tfor k, v := range params {\n\t\t\t\tif optimization.CheckUniqParam(options, k) {\n\t\t\t\t\tptype := \"\"\n\t\t\t\t\tfor _, av := range v {\n\t\t\t\t\t\tif strings.Contains(av, \"PTYPE:\") {\n\t\t\t\t\t\t\tptype = GetPType(av)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\t// loop payload list\n\t\t\t\t\tfor _, bpayload := range bpayloads {\n\t\t\t\t\t\t// Add plain XSS Query\n\t\t\t\t\t\tbp := strings.Replace(bpayload, \"CALLBACKURL\", bcallback, 10)\n\t\t\t\t\t\ttq, tm := optimization.MakeRequestQuery(target, k, bp, \"toBlind\"+ptype, \"toAppend\", \"NaN\", options)\n\t\t\t\t\t\ttm[\"payload\"] = \"toBlind\"\n\t\t\t\t\t\tquery[tq] = tm\n\t\t\t\t\t\t// Add URL encoded XSS Query\n\t\t\t\t\t\tetq, etm := optimization.MakeRequestQuery(target, k, bp, \"toBlind\"+ptype, \"toAppend\", \"urlEncode\", options)\n\t\t\t\t\t\tetm[\"payload\"] = \"toBlind\"\n\t\t\t\t\t\tquery[etq] = etm\n\t\t\t\t\t\t// Add HTML Encoded XSS Query\n\t\t\t\t\t\thtq, htm := optimization.MakeRequestQuery(target, k, bp, \"toBlind\"+ptype, \"toAppend\", \"htmlEncode\", options)\n\t\t\t\t\t\thtm[\"payload\"] = \"toBlind\"\n\t\t\t\t\t\tquery[htq] = htm\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tprinting.DalLog(\"SYSTEM\", \"Added your blind XSS (\"+options.BlindURL+\")\", options)\n\t\t}\n\n\t\t// Remote Payloads\n\t\tif options.RemotePayloads != \"\" {\n\t\t\trp := strings.Split(options.RemotePayloads, \",\")\n\t\t\tfor _, endpoint := range rp {\n\t\t\t\tvar payload []string\n\t\t\t\tvar line string\n\t\t\t\tvar size string\n\t\t\t\tif endpoint == \"portswigger\" {\n\t\t\t\t\tpayload, line, size = getPortswiggerPayload()\n\t\t\t\t}\n\t\t\t\tif endpoint == \"paylaodbox\" {\n\t\t\t\t\tpayload, line, size = getPayloadBoxPayload()\n\t\t\t\t}\n\t\t\t\tif line != \"\" {\n\t\t\t\t\tprinting.DalLog(\"INFO\", \"A '\"+endpoint+\"' payloads has been loaded [\"+line+\"L / \"+size+\"] \", options)\n\t\t\t\t\tfor _, customPayload := range payload {\n\t\t\t\t\t\tif customPayload != \"\" {\n\t\t\t\t\t\t\tfor k, v := range params {\n\t\t\t\t\t\t\t\tif optimization.CheckUniqParam(options, k) {\n\t\t\t\t\t\t\t\t\tptype := \"\"\n\t\t\t\t\t\t\t\t\tfor _, av := range v {\n\t\t\t\t\t\t\t\t\t\tif strings.Contains(av, \"PTYPE:\") {\n\t\t\t\t\t\t\t\t\t\t\tptype = GetPType(av)\n\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t// Add plain XSS Query\n\t\t\t\t\t\t\t\t\ttq, tm := optimization.MakeRequestQuery(target, k, customPayload, \"inHTML\"+ptype, \"toAppend\", \"NaN\", options)\n\t\t\t\t\t\t\t\t\tquery[tq] = tm\n\t\t\t\t\t\t\t\t\t// Add URL encoded XSS Query\n\t\t\t\t\t\t\t\t\tetq, etm := optimization.MakeRequestQuery(target, k, customPayload, \"inHTML\"+ptype, \"toAppend\", \"urlEncode\", options)\n\t\t\t\t\t\t\t\t\tquery[etq] = etm\n\t\t\t\t\t\t\t\t\t// Add HTML Encoded XSS Query\n\t\t\t\t\t\t\t\t\thtq, htm := optimization.MakeRequestQuery(target, k, customPayload, \"inHTML\"+ptype, \"toAppend\", \"htmlEncode\", options)\n\t\t\t\t\t\t\t\t\tquery[htq] = htm\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tprinting.DalLog(\"SYSTEM\", endpoint+\" payload load fail..\", options)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t// Custom Payload\n\t\tif options.CustomPayloadFile != \"\" {\n\t\t\tff, err := readLinesOrLiteral(options.CustomPayloadFile)\n\t\t\tif err != nil {\n\t\t\t\tprinting.DalLog(\"SYSTEM\", \"Custom XSS payload load fail..\", options)\n\t\t\t} else {\n\t\t\t\tfor _, customPayload := range ff {\n\t\t\t\t\tif customPayload != \"\" {\n\t\t\t\t\t\tfor k, v := range params {\n\t\t\t\t\t\t\tif optimization.CheckUniqParam(options, k) {\n\t\t\t\t\t\t\t\tptype := \"\"\n\t\t\t\t\t\t\t\tfor _, av := range v {\n\t\t\t\t\t\t\t\t\tif strings.Contains(av, \"PTYPE:\") {\n\t\t\t\t\t\t\t\t\t\tptype = GetPType(av)\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t// Add plain XSS Query\n\t\t\t\t\t\t\t\ttq, tm := optimization.MakeRequestQuery(target, k, customPayload, \"inHTML\"+ptype, \"toAppend\", \"NaN\", options)\n\t\t\t\t\t\t\t\tquery[tq] = tm\n\t\t\t\t\t\t\t\t// Add URL encoded XSS Query\n\t\t\t\t\t\t\t\tetq, etm := optimization.MakeRequestQuery(target, k, customPayload, \"inHTML\"+ptype, \"toAppend\", \"urlEncode\", options)\n\t\t\t\t\t\t\t\tquery[etq] = etm\n\t\t\t\t\t\t\t\t// Add HTML Encoded XSS Query\n\t\t\t\t\t\t\t\thtq, htm := optimization.MakeRequestQuery(target, k, customPayload, \"inHTML\"+ptype, \"toAppend\", \"htmlEncode\", options)\n\t\t\t\t\t\t\t\tquery[htq] = htm\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tprinting.DalLog(\"SYSTEM\", \"Added your \"+strconv.Itoa(len(ff))+\" custom xss payload\", options)\n\t\t\t}\n\t\t}\n\n\t\tprinting.DalLog(\"SYSTEM\", \"Start XSS Scanning.. with \"+strconv.Itoa(len(query))+\" queries 🗡\", options)\n\t\tmutex := &sync.Mutex{}\n\t\tqueryCount := 0\n\t\tprinting.DalLog(\"SYSTEM\", \"[ Make \"+strconv.Itoa(options.Concurrence)+\" workers ] [ Allocated \"+strconv.Itoa(len(query))+\" queries ]\", options)\n\n\t\tif !(options.Silence || options.NoSpinner) {\n\t\t\ts.Start() // Start the spinner\n\t\t\t//time.Sleep(3 * time.Second) // Run for some time to simulate work\n\t\t}\n\n\t\tshowR := false\n\t\tshowV := false\n\t\tif options.OnlyPoC != \"\" {\n\t\t\t_, showR, showV = printing.CheckToShowPoC(options.OnlyPoC)\n\t\t} else {\n\t\t\tshowR = true\n\t\t\tshowV = true\n\t\t}\n\n\t\t// make waiting group\n\t\tvar wg sync.WaitGroup\n\t\t// set concurrency\n\t\tconcurrency := options.Concurrence\n\t\t// make reqeust channel\n\t\tqueries := make(chan Queries)\n\n\t\tif options.UseHeadless {\n\t\t\t// start DOM XSS checker\n\t\t\twg.Add(1)\n\t\t\tgo func() {\n\t\t\t\tdconcurrency := options.Concurrence / 2\n\t\t\t\tif dconcurrency < 1 {\n\t\t\t\t\tdconcurrency = 1\n\t\t\t\t}\n\t\t\t\tdchan := make(chan string)\n\t\t\t\tvar wgg sync.WaitGroup\n\t\t\t\tfor i := 0; i < dconcurrency; i++ {\n\t\t\t\t\twgg.Add(1)\n\t\t\t\t\tgo func() {\n\t\t\t\t\t\tfor v := range dchan {\n\t\t\t\t\t\t\tif CheckXSSWithHeadless(v, options) {\n\t\t\t\t\t\t\t\tmutex.Lock()\n\t\t\t\t\t\t\t\tprinting.DalLog(\"VULN\", \"Triggered XSS Payload (found dialog in headless)\", options)\n\t\t\t\t\t\t\t\tif showV {\n\t\t\t\t\t\t\t\t\tif options.Format == \"json\" {\n\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"{\\\"type\\\":\\\"DOM\\\",\\\"evidence\\\":\\\"headless verify\\\",\\\"poc\\\":\\\"\"+v+\"\\\"},\", options)\n\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"[V][GET] \"+v, options)\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\tif options.FoundAction != \"\" {\n\t\t\t\t\t\t\t\t\tfoundAction(options, target, v, \"VULN\")\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\trst := &model.Issue{\n\t\t\t\t\t\t\t\t\tType: \"verify code\",\n\t\t\t\t\t\t\t\t\tParam: \"DOM\",\n\t\t\t\t\t\t\t\t\tPoC: v,\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\tscanObject.Results = append(scanObject.Results, *rst)\n\t\t\t\t\t\t\t\tmutex.Unlock()\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tqueryCount = queryCount + 1\n\t\t\t\t\t\t}\n\t\t\t\t\t\twgg.Done()\n\t\t\t\t\t}()\n\t\t\t\t}\n\t\t\t\tfor _, dchanData := range durls {\n\t\t\t\t\tdchan <- dchanData\n\t\t\t\t}\n\t\t\t\tclose(dchan)\n\t\t\t\twgg.Wait()\n\t\t\t\twg.Done()\n\t\t\t}()\n\t\t}\n\t\tfor i := 0; i < concurrency; i++ {\n\t\t\twg.Add(1)\n\t\t\tgo func() {\n\t\t\t\tfor reqJob := range queries {\n\t\t\t\t\t// quires.request : http.Request\n\t\t\t\t\t// queries.metadata : map[string]string\n\t\t\t\t\tk := reqJob.request\n\t\t\t\t\tv := reqJob.metadata\n\t\t\t\t\tcheckVtype := false\n\t\t\t\t\tif checkPType(v[\"type\"]) {\n\t\t\t\t\t\tcheckVtype = true\n\t\t\t\t\t}\n\n\t\t\t\t\tif vStatus[v[\"param\"]] == false || checkVtype {\n\t\t\t\t\t\trl.Block(k.Host)\n\t\t\t\t\t\tresbody, _, vds, vrs, err := SendReq(k, v[\"payload\"], options)\n\t\t\t\t\t\tabs := optimization.Abstraction(resbody, v[\"payload\"])\n\t\t\t\t\t\tif vrs {\n\t\t\t\t\t\t\tif !containsFromArray(abs, v[\"type\"]) && !strings.Contains(v[\"type\"], \"inHTML\") {\n\t\t\t\t\t\t\t\tvrs = false\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif err == nil {\n\t\t\t\t\t\t\tif checkPType(v[\"type\"]) {\n\t\t\t\t\t\t\t\tif strings.Contains(v[\"type\"], \"inJS\") {\n\t\t\t\t\t\t\t\t\tif vrs {\n\t\t\t\t\t\t\t\t\t\tprotected := false\n\t\t\t\t\t\t\t\t\t\tif verification.VerifyReflection(resbody, \"\\\\\"+v[\"payload\"]) {\n\t\t\t\t\t\t\t\t\t\t\tif !strings.Contains(v[\"payload\"], \"\\\\\") {\n\t\t\t\t\t\t\t\t\t\t\t\tprotected = true\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\tif !protected {\n\t\t\t\t\t\t\t\t\t\t\tif vStatus[v[\"param\"]] == false {\n\t\t\t\t\t\t\t\t\t\t\t\tif options.UseHeadless {\n\t\t\t\t\t\t\t\t\t\t\t\t\tif CheckXSSWithHeadless(k.URL.String(), options) {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmutex.Lock()\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"VULN\", \"Triggered XSS Payload (found dialog in headless)\", options)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tif showV {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tif options.Format == \"json\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"{\\\"type\\\":\\\"\"+v[\"type\"]+\"\\\",\\\"evidence\\\":\\\"headless verify\\\",\\\"poc\\\":\\\"\"+k.URL.String()+\"\\\"},\", options)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"[V][\"+k.Method+\"][\"+v[\"type\"]+\"] \"+k.URL.String(), options)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tvStatus[v[\"param\"]] = true\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tif options.FoundAction != \"\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tfoundAction(options, target, k.URL.String(), \"VULN\")\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\trst := &model.Issue{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: \"verify code\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tParam: v[\"param\"],\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tPoC: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tscanObject.Results = append(scanObject.Results, *rst)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmutex.Unlock()\n\t\t\t\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmutex.Lock()\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tif options.FoundAction != \"\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tfoundAction(options, target, k.URL.String(), \"WEAK\")\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\trst := &model.Issue{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: \"found code\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tParam: v[\"param\"],\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tPoC: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tscanObject.Results = append(scanObject.Results, *rst)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmutex.Unlock()\n\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\t\t\tmutex.Lock()\n\t\t\t\t\t\t\t\t\t\t\t\t\tcode := CodeView(resbody, v[\"payload\"])\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"WEAK\", \"Reflected Payload in JS: \"+v[\"param\"]+\"=\"+v[\"payload\"], options)\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"CODE\", code, options)\n\t\t\t\t\t\t\t\t\t\t\t\t\tif showR {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tif options.Format == \"json\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"{\\\"type\\\":\\\"\"+v[\"type\"]+\"\\\",\\\"evidence\\\":\\\"reflected\\\",\\\"poc\\\":\\\"\"+k.URL.String()+\"\\\"},\", options)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"[R][\"+k.Method+\"][\"+v[\"type\"]+\"] \"+k.URL.String(), options)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\tif options.FoundAction != \"\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tfoundAction(options, target, k.URL.String(), \"WEAK\")\n\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\trst := &model.Issue{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: \"found code\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tParam: v[\"param\"],\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tPoC: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\tscanObject.Results = append(scanObject.Results, *rst)\n\t\t\t\t\t\t\t\t\t\t\t\t\tmutex.Unlock()\n\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t} else if strings.Contains(v[\"type\"], \"inATTR\") {\n\t\t\t\t\t\t\t\t\tif vds {\n\t\t\t\t\t\t\t\t\t\tmutex.Lock()\n\t\t\t\t\t\t\t\t\t\tif vStatus[v[\"param\"]] == false {\n\t\t\t\t\t\t\t\t\t\t\tcode := CodeView(resbody, v[\"payload\"])\n\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"VULN\", \"Triggered XSS Payload (found DOM Object): \"+v[\"param\"]+\"=\"+v[\"payload\"], options)\n\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"CODE\", code, options)\n\t\t\t\t\t\t\t\t\t\t\tif showV {\n\t\t\t\t\t\t\t\t\t\t\t\tif options.Format == \"json\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"{\\\"type\\\":\\\"\"+v[\"type\"]+\"\\\",\\\"evidence\\\":\\\"dom verify\\\",\\\"poc\\\":\\\"\"+k.URL.String()+\"\\\"},\", options)\n\t\t\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"[V][\"+k.Method+\"][\"+v[\"type\"]+\"] \"+k.URL.String(), options)\n\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\tvStatus[v[\"param\"]] = true\n\t\t\t\t\t\t\t\t\t\t\tif options.FoundAction != \"\" {\n\t\t\t\t\t\t\t\t\t\t\t\tfoundAction(options, target, k.URL.String(), \"VULN\")\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\trst := &model.Issue{\n\t\t\t\t\t\t\t\t\t\t\t\tType: \"verify code\",\n\t\t\t\t\t\t\t\t\t\t\t\tParam: v[\"param\"],\n\t\t\t\t\t\t\t\t\t\t\t\tPoC: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\tscanObject.Results = append(scanObject.Results, *rst)\n\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\tmutex.Unlock()\n\t\t\t\t\t\t\t\t\t} else if vrs {\n\t\t\t\t\t\t\t\t\t\tmutex.Lock()\n\t\t\t\t\t\t\t\t\t\tif vStatus[v[\"param\"]] == false {\n\t\t\t\t\t\t\t\t\t\t\tcode := CodeView(resbody, v[\"payload\"])\n\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"WEAK\", \"Reflected Payload in Attribute: \"+v[\"param\"]+\"=\"+v[\"payload\"], options)\n\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"CODE\", code, options)\n\t\t\t\t\t\t\t\t\t\t\tif showR {\n\t\t\t\t\t\t\t\t\t\t\t\tif options.Format == \"json\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"{\\\"type\\\":\\\"\"+v[\"type\"]+\"\\\",\\\"evidence\\\":\\\"reflected\\\",\\\"poc\\\":\\\"\"+k.URL.String()+\"\\\"},\", options)\n\t\t\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\t\t\tpoc := model.PoC{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: \"R\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tMethod: k.Method,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tData: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\tscanResult.PoCs = append(scanResult.PoCs, poc)\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"[R][\"+k.Method+\"][\"+v[\"type\"]+\"] \"+k.URL.String(), options)\n\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\tif options.FoundAction != \"\" {\n\t\t\t\t\t\t\t\t\t\t\t\tfoundAction(options, target, k.URL.String(), \"WEAK\")\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\trst := &model.Issue{\n\t\t\t\t\t\t\t\t\t\t\t\tType: \"found code\",\n\t\t\t\t\t\t\t\t\t\t\t\tParam: v[\"param\"],\n\t\t\t\t\t\t\t\t\t\t\t\tPoC: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\tscanObject.Results = append(scanObject.Results, *rst)\n\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\tmutex.Unlock()\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\tif vds {\n\t\t\t\t\t\t\t\t\t\tmutex.Lock()\n\t\t\t\t\t\t\t\t\t\tif vStatus[v[\"param\"]] == false {\n\t\t\t\t\t\t\t\t\t\t\tcode := CodeView(resbody, v[\"payload\"])\n\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"VULN\", \"Triggered XSS Payload (found DOM Object): \"+v[\"param\"]+\"=\"+v[\"payload\"], options)\n\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"CODE\", code, options)\n\t\t\t\t\t\t\t\t\t\t\tif showV {\n\t\t\t\t\t\t\t\t\t\t\t\tif options.Format == \"json\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"{\\\"type\\\":\\\"\"+v[\"type\"]+\"\\\",\\\"evidence\\\":\\\"dom verify\\\",\\\"poc\\\":\\\"\"+k.URL.String()+\"\\\"},\", options)\n\t\t\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\t\t\tpoc := model.PoC{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: \"V\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tMethod: k.Method,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tData: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\tscanResult.PoCs = append(scanResult.PoCs, poc)\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"[V][\"+k.Method+\"][\"+v[\"type\"]+\"] \"+k.URL.String(), options)\n\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\tvStatus[v[\"param\"]] = true\n\t\t\t\t\t\t\t\t\t\t\tif options.FoundAction != \"\" {\n\t\t\t\t\t\t\t\t\t\t\t\tfoundAction(options, target, k.URL.String(), \"VULN\")\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\trst := &model.Issue{\n\t\t\t\t\t\t\t\t\t\t\t\tType: \"verify code\",\n\t\t\t\t\t\t\t\t\t\t\t\tParam: v[\"param\"],\n\t\t\t\t\t\t\t\t\t\t\t\tPoC: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\tscanObject.Results = append(scanObject.Results, *rst)\n\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\tmutex.Unlock()\n\t\t\t\t\t\t\t\t\t} else if vrs {\n\t\t\t\t\t\t\t\t\t\tmutex.Lock()\n\t\t\t\t\t\t\t\t\t\tif vStatus[v[\"param\"]] == false {\n\t\t\t\t\t\t\t\t\t\t\tcode := CodeView(resbody, v[\"payload\"])\n\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"WEAK\", \"Reflected Payload in HTML: \"+v[\"param\"]+\"=\"+v[\"payload\"], options)\n\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"CODE\", code, options)\n\t\t\t\t\t\t\t\t\t\t\tif showR {\n\t\t\t\t\t\t\t\t\t\t\t\tif options.Format == \"json\" {\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"{\\\"type\\\":\\\"\"+v[\"type\"]+\"\\\",\\\"evidence\\\":\\\"reflected\\\",\\\"poc\\\":\\\"\"+k.URL.String()+\"\\\"},\", options)\n\t\t\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\t\t\tpoc := model.PoC{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: \"R\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tMethod: k.Method,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tData: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\tscanResult.PoCs = append(scanResult.PoCs, poc)\n\t\t\t\t\t\t\t\t\t\t\t\t\tprinting.DalLog(\"PRINT\", \"[R][\"+k.Method+\"][\"+v[\"type\"]+\"] \"+k.URL.String(), options)\n\t\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\tif options.FoundAction != \"\" {\n\t\t\t\t\t\t\t\t\t\t\t\tfoundAction(options, target, k.URL.String(), \"WEAK\")\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\trst := &model.Issue{\n\t\t\t\t\t\t\t\t\t\t\t\tType: \"found code\",\n\t\t\t\t\t\t\t\t\t\t\t\tParam: v[\"param\"],\n\t\t\t\t\t\t\t\t\t\t\t\tPoC: k.URL.String(),\n\t\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\tscanObject.Results = append(scanObject.Results, *rst)\n\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\tmutex.Unlock()\n\t\t\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tmutex.Lock()\n\t\t\t\t\tqueryCount = queryCount + 1\n\n\t\t\t\t\tif !(options.Silence || options.NoSpinner) {\n\t\t\t\t\t\ts.Lock()\n\t\t\t\t\t\tvar msg string\n\t\t\t\t\t\tif vStatus[v[\"param\"]] == false {\n\t\t\t\t\t\t\tif options.UseHeadless {\n\t\t\t\t\t\t\t\tmsg = \"Testing \\\"\" + v[\"param\"] + \"\\\" param and waiting headless\"\n\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\tmsg = \"Testing \\\"\" + v[\"param\"] + \"\\\" param\"\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\tif options.UseHeadless {\n\t\t\t\t\t\t\t\tmsg = \"Passing \\\"\" + v[\"param\"] + \"\\\" param queries and waiting headless\"\n\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\tmsg = \"Passing \\\"\" + v[\"param\"] + \"\\\" param queries\"\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tpercent := fmt.Sprintf(\"%0.2f%%\", (float64(queryCount)/float64(len(query)+len(durls)))*100)\n\t\t\t\t\t\tif options.NowURL == 0 {\n\t\t\t\t\t\t\ts.Suffix = \" [\" + strconv.Itoa(queryCount) + \"/\" + strconv.Itoa(len(query)+len(durls)) + \" Queries][\" + percent + \"] \" + msg\n\t\t\t\t\t\t} else if !options.Silence {\n\t\t\t\t\t\t\tpercent2 := fmt.Sprintf(\"%0.2f%%\", (float64(options.NowURL) / float64(options.AllURLS) * 100))\n\t\t\t\t\t\t\ts.Suffix = \" [\" + strconv.Itoa(queryCount) + \"/\" + strconv.Itoa(len(query)+len(durls)) + \" Queries][\" + percent + \"][\" + strconv.Itoa(options.NowURL) + \"/\" + strconv.Itoa(options.AllURLS) + \" Tasks][\" + percent2 + \"] \" + msg\n\t\t\t\t\t\t}\n\t\t\t\t\t\t//s.Suffix = \" Waiting routines.. (\" + strconv.Itoa(queryCount) + \" / \" + strconv.Itoa(len(query)) + \") reqs\"\n\t\t\t\t\t\ts.Unlock()\n\t\t\t\t\t}\n\t\t\t\t\tmutex.Unlock()\n\t\t\t\t}\n\t\t\t\twg.Done()\n\t\t\t}()\n\t\t}\n\n\t\t// Send testing query to quires channel\n\t\tfor k, v := range query {\n\t\t\tqueries <- Queries{\n\t\t\t\trequest: k,\n\t\t\t\tmetadata: v,\n\t\t\t}\n\t\t}\n\t\tclose(queries)\n\t\twg.Wait()\n\t\tif !(options.Silence || options.NoSpinner) {\n\t\t\ts.Stop()\n\t\t}\n\t}\n\tif options.Format == \"json\" {\n\t\tprinting.DalLog(\"PRINT\", \"{}]\", options)\n\t}\n\toptions.Scan[sid] = scanObject\n\tscanResult.EndTime = time.Now()\n\tscanResult.Duration = scanResult.EndTime.Sub(scanResult.StartTime)\n\tif !(options.Silence && options.MulticastMode) {\n\t\tprinting.DalLog(\"SYSTEM-M\", \"Finish Scan\", options)\n\t}\n\treturn scanResult, nil\n}", "func NewInfo(job *bigquery.Job) *Info {\n\tstageInfo := activity.Parse(job.JobReference.JobId)\n\tstartTime := time.Unix(job.Statistics.StartTime/1000, 0)\n\tendTime := time.Unix(job.Statistics.EndTime/1000, 0)\n\tcreateTime := time.Unix(job.Statistics.CreationTime/1000, 0)\n\tinfo := &Info{\n\t\tProjectID: job.JobReference.ProjectId,\n\t\tJobID: job.Id,\n\t\tCreateTime: createTime,\n\t\tStartTime: startTime,\n\t\tEndTime: endTime,\n\t\tTimeTakenMs: int(job.Statistics.EndTime - job.Statistics.CreationTime),\n\t\tExecutionTimeMs: int(job.Statistics.EndTime - job.Statistics.StartTime),\n\t\tJobType: stageInfo.Action,\n\t\tDestinationTable: stageInfo.DestTable,\n\t}\n\tif job.Statistics.Load != nil {\n\t\tinfo.InputFileBytes = int(job.Statistics.Load.InputFileBytes)\n\t\tinfo.InputFiles = int(job.Statistics.Load.InputFiles)\n\t\tinfo.OutputBytes = int(job.Statistics.Load.OutputBytes)\n\t\tinfo.OutputRows = int(job.Statistics.Load.OutputRows)\n\t\tinfo.BadRecords = int(job.Statistics.Load.BadRecords)\n\t}\n\tinfo.TotalBytesProcessed = int(job.Statistics.TotalBytesProcessed)\n\tinfo.TotalSlotMs = int(job.Statistics.TotalSlotMs)\n\tif len(job.Statistics.ReservationUsage) > 0 {\n\t\tinfo.ReservationName = job.Statistics.ReservationUsage[0].Name\n\t}\n\tif job.Status != nil && len(job.Status.Errors) > 0 {\n\t\tif JSON, err := json.Marshal(job.Status.Errors); err == nil {\n\t\t\tinfo.Error = string(JSON)\n\t\t}\n\t}\n\tif job.Configuration != nil && job.Configuration.Load != nil {\n\t\tinfo.URIs = job.Configuration.Load.SourceUris\n\t\tif len(job.Configuration.Load.SourceUris) > 0 {\n\t\t\tinfo.URI = job.Configuration.Load.SourceUris[0]\n\t\t}\n\t}\n\n\treturn info\n}", "func displayTransferStatus(logFile string){\n _, err := os.Stat(logFile)\n if err != nil {\n if strings.Contains(err.Error(), \"no such file or directory\") {\n fmt.Println(\"No transfer logs available\")\n } else {\n fmt.Println(err)\n }\n return\n }\n\n // Read the capture0.log file from the agent logs directory\n outputLogFile, err := os.Open(logFile)\n if err != nil {\n fmt.Print(err)\n return\n }\n\n // defer the closing of our jsonFile so that we can parse it later on\n defer func(outputLogFile *os.File) {\n err := outputLogFile.Close()\n if err != nil {\n fmt.Printf(\"An error occurred while closing file %s. The error is: %v\\n\",outputLogFile.Name(), err)\n }\n }(outputLogFile)\n fi, err := outputLogFile.Stat()\n if err != nil {\n fmt.Printf(\"Error when finding capture0.log file. %v\\n\", err)\n return\n }\n\n scanner := backscanner.New(outputLogFile, int(fi.Size()))\n topicSystemFTELog := [] byte (\"SYSTEM.FTE/Log/\")\n // Variable to print header only once\n firstTime := true\n\n for {\n line, _, err := scanner.LineBytes()\n if err != nil {\n if err == io.EOF {\n fmt.Printf(\"\\nEnd of file reached.\\n\")\n } else {\n fmt.Println(\"Error:\", err)\n }\n break\n }\n\n // Consider only those lines in the capture0.log file that contain SYSTEM.FTE/Log/ string for parsing\n if bytes.Contains(line, topicSystemFTELog) {\n // Split the line on '!' and then parse to get the latest status\n tokens := strings.Split(string(line), \"!\")\n if len(tokens) > 1 {\n if firstTime {\n fmt.Println(\" Transfer ID \\tStatus\")\n fmt.Println(\"-------------------------------------------------\\t------------------\")\n firstTime = false\n }\n parseAndDisplay(tokens[len(tokens) - 1], displayTransferType)\n if displayCount > 0 {\n if counter == displayCount {\n // Displayed required number of records. Exit\n break\n }\n }\n } // Number of tokens more\n } // If line contains SYSTEM.FTE/Log\n } // For loop\n}", "func UnmarshalLogSummary(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(LogSummary)\n\terr = core.UnmarshalPrimitive(m, \"activity_status\", &obj.ActivityStatus)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"detected_template_type\", &obj.DetectedTemplateType)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"discarded_files\", &obj.DiscardedFiles)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"error\", &obj.Error)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"resources_added\", &obj.ResourcesAdded)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"resources_destroyed\", &obj.ResourcesDestroyed)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"resources_modified\", &obj.ResourcesModified)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"scanned_files\", &obj.ScannedFiles)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"template_variable_count\", &obj.TemplateVariableCount)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"time_taken\", &obj.TimeTaken)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func (m *ManagedEBooksManagedEBookItemRequestBuilder) UserStateSummaryById(id string)(*ManagedEBooksItemUserStateSummaryUserInstallStateSummaryItemRequestBuilder) {\n urlTplParams := make(map[string]string)\n for idx, item := range m.pathParameters {\n urlTplParams[idx] = item\n }\n if id != \"\" {\n urlTplParams[\"userInstallStateSummary%2Did\"] = id\n }\n return NewManagedEBooksItemUserStateSummaryUserInstallStateSummaryItemRequestBuilderInternal(urlTplParams, m.requestAdapter)\n}", "func (c *ci) JobDetails(job string) *format.LogResponse {\n\tj := c.jobs[job]\n\treturn &format.LogResponse{\n\t\tJob: j.Status(true, true),\n\t}\n}", "func (mi *Metadata) Scan(src interface{}) error {\n\treturn json.Unmarshal(src.([]byte), mi)\n}", "func (logstash *Logstash) gatherPipelineStats(address string, accumulator telegraf.Accumulator) error {\n\tpipelineStats := &PipelineStats{}\n\n\terr := logstash.gatherJSONData(address, pipelineStats)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttags := map[string]string{\n\t\t\"node_id\": pipelineStats.ID,\n\t\t\"node_name\": pipelineStats.Name,\n\t\t\"node_version\": pipelineStats.Version,\n\t\t\"source\": pipelineStats.Host,\n\t}\n\n\tflattener := jsonParser.JSONFlattener{}\n\terr = flattener.FlattenJSON(\"\", pipelineStats.Pipeline.Events)\n\tif err != nil {\n\t\treturn err\n\t}\n\taccumulator.AddFields(\"logstash_events\", flattener.Fields, tags)\n\n\terr = logstash.gatherPluginsStats(pipelineStats.Pipeline.Plugins.Inputs, \"input\", tags, accumulator)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = logstash.gatherPluginsStats(pipelineStats.Pipeline.Plugins.Filters, \"filter\", tags, accumulator)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = logstash.gatherPluginsStats(pipelineStats.Pipeline.Plugins.Outputs, \"output\", tags, accumulator)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = logstash.gatherQueueStats(&pipelineStats.Pipeline.Queue, tags, accumulator)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func GetScanReport(apiKey string, sleepTime int) {\n\tlog.Println(\"GetScanReport Start\")\n\n\tfileName := \"config/scan.txt\"\n\n\tfile, err := os.Open(fileName)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tlog.Println(\"No Scan file\")\n\t\treturn\n\t}\n\tdefer file.Close()\n\n\tvar scanList map[string]bool\n\n\tscanList = make(map[string]bool)\n\n\tscanFile := bufio.NewScanner(file)\n\tfor scanFile.Scan() {\n\t\tscanList[scanFile.Text()] = false\n\t}\n\n\tvar idx int\n\tvar sha256 string\n\n\tfor line, check := range scanList {\n\t\tlog.Println(line, check)\n\n\t\tfmt.Sscanf(line, \"%d,%s\", &idx, &sha256)\n\n\t\tlog.Println(idx, sha256)\n\n\t\treport, status, err := GetFileReport(apiKey, sha256, idx)\n\t\tif report == nil || status != 200 {\n\t\t\tlog.Println(\"GetFileReport Error\")\n\t\t\tlog.Println(err)\n\t\t\tbreak\n\t\t}\n\n\t\tif report.Sha256 != sha256 {\n\t\t\tlog.Println(\"[ERR]VirusTotal Sha256 != DB Sha256, DB Sha256: \", sha256)\n\t\t\tcontinue\n\t\t}\n\n\t\tif report.VTResponse.ResponseCode == 1 {\n\t\t\t// Parsing & Store DB\n\t\t\tstatus := ParseVTReport(*report, idx, sha256)\n\t\t\tif status == true {\n\t\t\t\tscanList[line] = true\n\t\t\t}\n\t\t}\n\n\t\ttime.Sleep(time.Duration(sleepTime) * time.Second)\n\n\t}\n\n\t// Store file\n\n\t//var buffer bytes.Buffer\n\tvar scan []byte\n\tfor line, check := range scanList {\n\t\tif check == false {\n\t\t\t//buffer.WriteString(line + \"\\n\")\n\t\t\tlog.Println(line)\n\t\t\tline = line + \"\\n\"\n\t\t\tscan = append(scan, line...)\n\t\t}\n\n\t}\n\t//log.Println(scan)\n\terr = ioutil.WriteFile(fileName, scan, 0644)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\tlog.Println(\"GetScanReport End\")\n}", "func (*AlertHistory) scanValues() []interface{} {\n\treturn []interface{}{\n\t\t&sql.NullInt64{}, // id\n\t\t&sql.NullInt64{}, // alert_id\n\t\t&sql.NullString{}, // alert_name\n\t\t&sub.AlertHistoryDetail{}, // detail\n\t\t&sql.NullTime{}, // createdAt\n\t\t&sql.NullTime{}, // updatedAt\n\t}\n}", "func (h FacebookMessenger) LogSummary(s string) error {\n\treturn nil\n}", "func (sr *scrutinyRepository) GetSummary(ctx context.Context) (map[string]*models.DeviceSummary, error) {\n\tdevices, err := sr.GetDevices(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsummaries := map[string]*models.DeviceSummary{}\n\n\tfor _, device := range devices {\n\t\tsummaries[device.WWN] = &models.DeviceSummary{Device: device}\n\t}\n\n\t// Get parser flux query result\n\t//appConfig.GetString(\"web.influxdb.bucket\")\n\tqueryStr := fmt.Sprintf(`\n \timport \"influxdata/influxdb/schema\"\n \tbucketBaseName = \"%s\"\n\n\tdailyData = from(bucket: bucketBaseName)\n\t|> range(start: -10y, stop: now())\n\t|> filter(fn: (r) => r[\"_measurement\"] == \"smart\" )\n\t|> filter(fn: (r) => r[\"_field\"] == \"temp\" or r[\"_field\"] == \"power_on_hours\" or r[\"_field\"] == \"date\")\n\t|> last()\n\t|> schema.fieldsAsCols()\n\t|> group(columns: [\"device_wwn\"])\n\t\n\tweeklyData = from(bucket: bucketBaseName + \"_weekly\")\n\t|> range(start: -10y, stop: now())\n\t|> filter(fn: (r) => r[\"_measurement\"] == \"smart\" )\n\t|> filter(fn: (r) => r[\"_field\"] == \"temp\" or r[\"_field\"] == \"power_on_hours\" or r[\"_field\"] == \"date\")\n\t|> last()\n\t|> schema.fieldsAsCols()\n\t|> group(columns: [\"device_wwn\"])\n\t\n\tmonthlyData = from(bucket: bucketBaseName + \"_monthly\")\n\t|> range(start: -10y, stop: now())\n\t|> filter(fn: (r) => r[\"_measurement\"] == \"smart\" )\n\t|> filter(fn: (r) => r[\"_field\"] == \"temp\" or r[\"_field\"] == \"power_on_hours\" or r[\"_field\"] == \"date\")\n\t|> last()\n\t|> schema.fieldsAsCols()\n\t|> group(columns: [\"device_wwn\"])\n\t\n\tyearlyData = from(bucket: bucketBaseName + \"_yearly\")\n\t|> range(start: -10y, stop: now())\n\t|> filter(fn: (r) => r[\"_measurement\"] == \"smart\" )\n\t|> filter(fn: (r) => r[\"_field\"] == \"temp\" or r[\"_field\"] == \"power_on_hours\" or r[\"_field\"] == \"date\")\n\t|> last()\n\t|> schema.fieldsAsCols()\n\t|> group(columns: [\"device_wwn\"])\n\t\n\tunion(tables: [dailyData, weeklyData, monthlyData, yearlyData])\n\t|> sort(columns: [\"_time\"], desc: false)\n\t|> group(columns: [\"device_wwn\"])\n\t|> last(column: \"device_wwn\")\n\t|> yield(name: \"last\")\n\t\t`,\n\t\tsr.appConfig.GetString(\"web.influxdb.bucket\"),\n\t)\n\n\tresult, err := sr.influxQueryApi.Query(ctx, queryStr)\n\tif err == nil {\n\t\t// Use Next() to iterate over query result lines\n\t\tfor result.Next() {\n\t\t\t// Observe when there is new grouping key producing new table\n\t\t\tif result.TableChanged() {\n\t\t\t\t//fmt.Printf(\"table: %s\\n\", result.TableMetadata().String())\n\t\t\t}\n\t\t\t// read result\n\n\t\t\t//get summary data from Influxdb.\n\t\t\t//result.Record().Values()\n\t\t\tif deviceWWN, ok := result.Record().Values()[\"device_wwn\"]; ok {\n\n\t\t\t\t//ensure summaries is intialized for this wwn\n\t\t\t\tif _, exists := summaries[deviceWWN.(string)]; !exists {\n\t\t\t\t\tsummaries[deviceWWN.(string)] = &models.DeviceSummary{}\n\t\t\t\t}\n\n\t\t\t\tsummaries[deviceWWN.(string)].SmartResults = &models.SmartSummary{\n\t\t\t\t\tTemp: result.Record().Values()[\"temp\"].(int64),\n\t\t\t\t\tPowerOnHours: result.Record().Values()[\"power_on_hours\"].(int64),\n\t\t\t\t\tCollectorDate: result.Record().Values()[\"_time\"].(time.Time),\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tif result.Err() != nil {\n\t\t\tfmt.Printf(\"Query error: %s\\n\", result.Err().Error())\n\t\t}\n\t} else {\n\t\treturn nil, err\n\t}\n\n\tdeviceTempHistory, err := sr.GetSmartTemperatureHistory(ctx, DURATION_KEY_FOREVER)\n\tif err != nil {\n\t\tsr.logger.Printf(\"========================>>>>>>>>======================\")\n\t\tsr.logger.Printf(\"========================>>>>>>>>======================\")\n\t\tsr.logger.Printf(\"========================>>>>>>>>======================\")\n\t\tsr.logger.Printf(\"========================>>>>>>>>======================\")\n\t\tsr.logger.Printf(\"========================>>>>>>>>======================\")\n\t\tsr.logger.Printf(\"Error: %v\", err)\n\t}\n\tfor wwn, tempHistory := range deviceTempHistory {\n\t\tsummaries[wwn].TempHistory = tempHistory\n\t}\n\n\treturn summaries, nil\n}", "func (m *DeviceManagementRequestBuilder) WindowsInformationProtectionAppLearningSummariesById(id string)(*ia6325065d45340cbac90dee05565ded24dc65b6c714bd5d8bf52762b7aa42658.WindowsInformationProtectionAppLearningSummaryItemRequestBuilder) {\n urlTplParams := make(map[string]string)\n for idx, item := range m.pathParameters {\n urlTplParams[idx] = item\n }\n if id != \"\" {\n urlTplParams[\"windowsInformationProtectionAppLearningSummary%2Did\"] = id\n }\n return ia6325065d45340cbac90dee05565ded24dc65b6c714bd5d8bf52762b7aa42658.NewWindowsInformationProtectionAppLearningSummaryItemRequestBuilderInternal(urlTplParams, m.requestAdapter);\n}", "func (s *Server) processScanPID(msg message.Message, db *database.DataStore) {\n\tlog.Debugf(\"[%s] Processing ScanPID response\", msg.ULID)\n\tif s.checkMsgErr(msg, models.Failed, db) {\n\t\t// TODO: Can I recover this? Should I ignore?\n\t\tmsg.Result = \"KO\"\n\t} else {\n\t\tif s.saveResult(msg, db) {\n\t\t\tmsg.Result = \"OK\"\n\t\t} else {\n\t\t\t// TODO: Request a new scan due errors while saving the report\n\t\t\tlog.Errorf(\"[%s] Error on processScanPID\", msg.ULID)\n\t\t}\n\t}\n\t// TODO:\n\t// - check error\n\t// - save the result\n\t// - send a message back\n\ts.w.Encode(msg)\n}", "func PrepareTestSummary(w http.ResponseWriter, r *http.Request) {\n\n\t// Read the request body\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\thttp.Error(w, fmt.Sprintf(\"failed to read request: %s\", err),\n\t\t\thttp.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// Get arguments from response body\n\targuments := strings.Split(string(body), \" \")\n\tif len(arguments) < 1 {\n\t\thttp.Error(w, fmt.Sprintf(\"error: request has not enough arguments\"),\n\t\t\thttp.StatusInternalServerError)\n\t\treturn\n\t}\n\n\ttestPeer := arguments[0]\n\tlog.Printf(\"PrepareTestSummary from %s: %v\\n\", testPeer, currentTestSummary)\n\n\tfor _, currentTestEval := range currentTestSummary {\n\t\tif currentTestEval.Peer == testPeer {\n\t\t\thttp.Error(w, fmt.Sprintf(\"error: summary of %s already processed\", testPeer),\n\t\t\t\thttp.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t}\n\n\tlog.Printf(\"currentTestResult: \\n%v\\n\", currentTestResult)\n\n\tfmt.Printf(\"GetTestSummary: %s\\n\", string(decodeJsonBytes(body)))\n\n\tfmt.Printf(\"currentTestResult.ID: %s\\n\", currentTestResult.ID)\n\tfmt.Printf(\"currentTestResult.Name: %s\\n\", currentTestResult.Name)\n\n\tfor i, result := range currentTestResult.CommandResults {\n\t\tif result.Peer == testPeer {\n\n\t\t\tcurrentTestEvaluation.ID = currentTestResult.ID\n\t\t\tcurrentTestEvaluation.Name = currentTestResult.Name\n\t\t\tcurrentTestEvaluation.Peer = testPeer\n\t\t\tcurrentTestEvaluation.Kind = \"command\"\n\t\t\tcurrentTestEvaluation.Status = result.Status\n\t\t\tcurrentTestEvaluation.Test = result.Data\n\t\t\tcurrentTestEvaluation.Result = result.Data\n\n\t\t\tcurrentTestSummary = append(currentTestSummary, currentTestEvaluation)\n\n\t\t\tif strings.Split(result.Data, \" \")[0] == \"testfilter\" {\n\n\t\t\t\tsource := strings.Split(result.Data, \" \")[1]\n\t\t\t\tfilter := strings.Join(strings.Split(result.Data, \" \")[3:], \" \")\n\n\t\t\t\tcurrentTestEvaluation.ID = currentTestResult.ID\n\t\t\t\tcurrentTestEvaluation.Name = currentTestResult.Name\n\t\t\t\tcurrentTestEvaluation.Peer = testPeer\n\t\t\t\tcurrentTestEvaluation.Kind = \"event\"\n\t\t\t\tcurrentTestEvaluation.Test = result.Data\n\n\t\t\t\tcurrentTestEvaluation.Status = \"FAILED\"\n\t\t\t\tfor _, eventFilter := range currentTestEventFilters {\n\n\t\t\t\t\tfmt.Printf(\"\\nXXX\\n eventFilter: %v\\n\\n\", eventFilter)\n\n\t\t\t\t\tfmt.Printf(\"NumExpectedEvents %d == NumReceivedEvents %d\\n\",\n\t\t\t\t\t\teventFilter.NumExpectedEvents, eventFilter.NumReceivedEvents)\n\n\t\t\t\t\tfmt.Printf(\"eventFilter.Peer %q == testPeer %q\\n\",\n\t\t\t\t\t\teventFilter.Peer, testPeer)\n\t\t\t\t\tfmt.Printf(\"eventFilter.Source %q == source %q\\n\",\n\t\t\t\t\t\teventFilter.Source, source)\n\t\t\t\t\tfmt.Printf(\"eventFilter.Filter %q == filter %q\\n\",\n\t\t\t\t\t\teventFilter.Filter, filter)\n\n\t\t\t\t\tcurrentTestEvaluation.Comment = fmt.Sprintf(\"NumExpectedEvents: %d, NumReceivedEvents: %d\",\n\t\t\t\t\t\teventFilter.NumExpectedEvents, eventFilter.NumReceivedEvents)\n\n\t\t\t\t\tif eventFilter.Peer == testPeer &&\n\t\t\t\t\t\teventFilter.Source == source &&\n\t\t\t\t\t\teventFilter.Filter == filter &&\n\t\t\t\t\t\teventFilter.NumExpectedEvents == eventFilter.NumReceivedEvents {\n\n\t\t\t\t\t\tcurrentTestEvaluation.Status = \"OK\"\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tcurrentTestEvaluation.Result = result.Data\n\t\t\t\tcurrentTestSummary = append(currentTestSummary, currentTestEvaluation)\n\t\t\t}\n\n\t\t\tfmt.Printf(\"%d result: %s\\n\", i, result)\n\t\t}\n\t}\n\n\tsaveTestJsonData(w)\n\n\t//currentTestRun.ID = \"\"\n\n\t_, err = fmt.Fprintf(w, \"\")\n\tif err != nil {\n\t\thttp.Error(w, fmt.Sprintf(\"failed to write response: %s\", err),\n\t\t\thttp.StatusInternalServerError)\n\t}\n}", "func (m *monitor) monitor(evalID string, allowPrefix bool) int {\n\t// Track if we encounter a scheduling failure. This can only be\n\t// detected while querying allocations, so we use this bool to\n\t// carry that status into the return code.\n\tvar schedFailure bool\n\n\t// The user may have specified a prefix as eval id. We need to lookup the\n\t// full id from the database first. Since we do this in a loop we need a\n\t// variable to keep track if we've already written the header message.\n\tvar headerWritten bool\n\n\t// Add the initial pending state\n\tm.update(newEvalState())\n\n\tfor {\n\t\t// Query the evaluation\n\t\teval, _, err := m.client.Evaluations().Info(evalID, nil)\n\t\tif err != nil {\n\t\t\tif !allowPrefix {\n\t\t\t\tm.ui.Error(fmt.Sprintf(\"No evaluation with id %q found\", evalID))\n\t\t\t\treturn 1\n\t\t\t}\n\t\t\tif len(evalID) == 1 {\n\t\t\t\tm.ui.Error(fmt.Sprintf(\"Identifier must contain at least two characters.\"))\n\t\t\t\treturn 1\n\t\t\t}\n\t\t\tif len(evalID)%2 == 1 {\n\t\t\t\t// Identifiers must be of even length, so we strip off the last byte\n\t\t\t\t// to provide a consistent user experience.\n\t\t\t\tevalID = evalID[:len(evalID)-1]\n\t\t\t}\n\n\t\t\tevals, _, err := m.client.Evaluations().PrefixList(evalID)\n\t\t\tif err != nil {\n\t\t\t\tm.ui.Error(fmt.Sprintf(\"Error reading evaluation: %s\", err))\n\t\t\t\treturn 1\n\t\t\t}\n\t\t\tif len(evals) == 0 {\n\t\t\t\tm.ui.Error(fmt.Sprintf(\"No evaluation(s) with prefix or id %q found\", evalID))\n\t\t\t\treturn 1\n\t\t\t}\n\t\t\tif len(evals) > 1 {\n\t\t\t\t// Format the evaluations\n\t\t\t\tout := make([]string, len(evals)+1)\n\t\t\t\tout[0] = \"ID|Priority|Type|Triggered By|Status\"\n\t\t\t\tfor i, eval := range evals {\n\t\t\t\t\tout[i+1] = fmt.Sprintf(\"%s|%d|%s|%s|%s\",\n\t\t\t\t\t\tlimit(eval.ID, m.length),\n\t\t\t\t\t\teval.Priority,\n\t\t\t\t\t\teval.Type,\n\t\t\t\t\t\teval.TriggeredBy,\n\t\t\t\t\t\teval.Status)\n\t\t\t\t}\n\t\t\t\tm.ui.Output(fmt.Sprintf(\"Prefix matched multiple evaluations\\n\\n%s\", formatList(out)))\n\t\t\t\treturn 0\n\t\t\t}\n\t\t\t// Prefix lookup matched a single evaluation\n\t\t\teval, _, err = m.client.Evaluations().Info(evals[0].ID, nil)\n\t\t\tif err != nil {\n\t\t\t\tm.ui.Error(fmt.Sprintf(\"Error reading evaluation: %s\", err))\n\t\t\t}\n\t\t}\n\n\t\tif !headerWritten {\n\t\t\tm.ui.Info(fmt.Sprintf(\"Monitoring evaluation %q\", limit(eval.ID, m.length)))\n\t\t\theaderWritten = true\n\t\t}\n\n\t\t// Create the new eval state.\n\t\tstate := newEvalState()\n\t\tstate.status = eval.Status\n\t\tstate.desc = eval.StatusDescription\n\t\tstate.node = eval.NodeID\n\t\tstate.job = eval.JobID\n\t\tstate.wait = eval.Wait\n\t\tstate.index = eval.CreateIndex\n\n\t\t// Query the allocations associated with the evaluation\n\t\tallocs, _, err := m.client.Evaluations().Allocations(eval.ID, nil)\n\t\tif err != nil {\n\t\t\tm.ui.Error(fmt.Sprintf(\"Error reading allocations: %s\", err))\n\t\t\treturn 1\n\t\t}\n\n\t\t// Add the allocs to the state\n\t\tfor _, alloc := range allocs {\n\t\t\tstate.allocs[alloc.ID] = &allocState{\n\t\t\t\tid: alloc.ID,\n\t\t\t\tgroup: alloc.TaskGroup,\n\t\t\t\tnode: alloc.NodeID,\n\t\t\t\tdesired: alloc.DesiredStatus,\n\t\t\t\tdesiredDesc: alloc.DesiredDescription,\n\t\t\t\tclient: alloc.ClientStatus,\n\t\t\t\tclientDesc: alloc.ClientDescription,\n\t\t\t\tindex: alloc.CreateIndex,\n\t\t\t}\n\t\t}\n\n\t\t// Update the state\n\t\tm.update(state)\n\n\t\tswitch eval.Status {\n\t\tcase structs.EvalStatusComplete, structs.EvalStatusFailed, structs.EvalStatusCancelled:\n\t\t\tif len(eval.FailedTGAllocs) == 0 {\n\t\t\t\tm.ui.Info(fmt.Sprintf(\"Evaluation %q finished with status %q\",\n\t\t\t\t\tlimit(eval.ID, m.length), eval.Status))\n\t\t\t} else {\n\t\t\t\t// There were failures making the allocations\n\t\t\t\tschedFailure = true\n\t\t\t\tm.ui.Info(fmt.Sprintf(\"Evaluation %q finished with status %q but failed to place all allocations:\",\n\t\t\t\t\tlimit(eval.ID, m.length), eval.Status))\n\n\t\t\t\t// Print the failures per task group\n\t\t\t\tfor tg, metrics := range eval.FailedTGAllocs {\n\t\t\t\t\tnoun := \"allocation\"\n\t\t\t\t\tif metrics.CoalescedFailures > 0 {\n\t\t\t\t\t\tnoun += \"s\"\n\t\t\t\t\t}\n\t\t\t\t\tm.ui.Output(fmt.Sprintf(\"Task Group %q (failed to place %d %s):\", tg, metrics.CoalescedFailures+1, noun))\n\t\t\t\t\tmetrics := formatAllocMetrics(metrics, false, \" \")\n\t\t\t\t\tfor _, line := range strings.Split(metrics, \"\\n\") {\n\t\t\t\t\t\tm.ui.Output(line)\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif eval.BlockedEval != \"\" {\n\t\t\t\t\tm.ui.Output(fmt.Sprintf(\"Evaluation %q waiting for additional capacity to place remainder\",\n\t\t\t\t\t\tlimit(eval.BlockedEval, m.length)))\n\t\t\t\t}\n\t\t\t}\n\t\tdefault:\n\t\t\t// Wait for the next update\n\t\t\ttime.Sleep(updateWait)\n\t\t\tcontinue\n\t\t}\n\n\t\t// Monitor the next eval in the chain, if present\n\t\tif eval.NextEval != \"\" {\n\t\t\tif eval.Wait.Nanoseconds() != 0 {\n\t\t\t\tm.ui.Info(fmt.Sprintf(\n\t\t\t\t\t\"Monitoring next evaluation %q in %s\",\n\t\t\t\t\tlimit(eval.NextEval, m.length), eval.Wait))\n\n\t\t\t\t// Skip some unnecessary polling\n\t\t\t\ttime.Sleep(eval.Wait)\n\t\t\t}\n\n\t\t\t// Reset the state and monitor the new eval\n\t\t\tm.state = newEvalState()\n\t\t\treturn m.monitor(eval.NextEval, allowPrefix)\n\t\t}\n\t\tbreak\n\t}\n\n\t// Treat scheduling failures specially using a dedicated exit code.\n\t// This makes it easier to detect failures from the CLI.\n\tif schedFailure {\n\t\treturn 2\n\t}\n\n\treturn 0\n}", "func (n *nessusImpl) StartScan(scanID int64) (string, error) {\n\tif n.verbose {\n\t\tlog.Println(\"Starting scan...\")\n\t}\n\n\tresp, err := n.Request(\"POST\", fmt.Sprintf(\"/scans/%d/launch\", scanID), nil, []int{http.StatusOK})\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdefer resp.Body.Close()\n\treply := &startScanResp{}\n\tif err = json.NewDecoder(resp.Body).Decode(&reply); err != nil {\n\t\treturn \"\", err\n\t}\n\treturn reply.UUID, nil\n}", "func (m *DataHistoryManager) GenerateJobSummary(nickname string) (*DataHistoryJobSummary, error) {\n\tif m == nil {\n\t\treturn nil, ErrNilSubsystem\n\t}\n\tif !m.IsRunning() {\n\t\treturn nil, ErrSubSystemNotStarted\n\t}\n\tjob, err := m.GetByNickname(nickname, false)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"job: %v %w\", nickname, err)\n\t}\n\n\terr = m.compareJobsToData(job)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &DataHistoryJobSummary{\n\t\tNickname: job.Nickname,\n\t\tExchange: job.Exchange,\n\t\tAsset: job.Asset,\n\t\tPair: job.Pair,\n\t\tStartDate: job.StartDate,\n\t\tEndDate: job.EndDate,\n\t\tInterval: job.Interval,\n\t\tStatus: job.Status,\n\t\tDataType: job.DataType,\n\t\tResultRanges: job.rangeHolder.DataSummary(true),\n\t}, nil\n}", "func (c *Client) LaunchScan(httpClient *http.Client, scanID int) (LaunchedScan, error) {\n\tc.debugln(\"LaunchScan(): Building launch scan URL\")\n\turl := fmt.Sprintf(\"https://%s:%s/scans/%d/launch\", c.ip, c.port, scanID)\n\n\tstatusCode, body, err := c.postWithJSON(httpClient, url, nil)\n\tif err != nil {\n\t\treturn LaunchedScan{}, err\n\t}\n\n\tswitch statusCode {\n\tcase 200:\n\t\tvar launchedScan LaunchedScan\n\t\terr = json.Unmarshal(body, &launchedScan)\n\t\tif err != nil {\n\t\t\treturn LaunchedScan{}, err\n\t\t}\n\t\tc.debugln(\"LaunchScan(): Successfully launched scan.\")\n\t\treturn launchedScan, nil\n\tdefault:\n\t\tvar err ErrorResponse\n\t\tunmarshalError := json.Unmarshal(body, &err)\n\t\tif unmarshalError != nil {\n\t\t\treturn LaunchedScan{}, unmarshalError\n\t\t}\n\t\tc.debugln(\"LaunchScan(): Scan could not be launched.\")\n\t\treturn LaunchedScan{}, fmt.Errorf(\"%s\", err.Error)\n\t}\n}", "func makeSummary(draconResult map[string]string) (string, string) {\n\tsummary := filepath.Base(draconResult[\"target\"]) + \" \" + draconResult[\"title\"]\n\n\tif len(summary) > 255 { // jira summary field supports up to 255 chars\n\t\ttobytes := bytes.Runes([]byte(summary))\n\t\tsummary = string(tobytes[:254])\n\t\textra := string(tobytes[255:])\n\t\treturn summary, extra\n\t}\n\treturn summary, \"\"\n}", "func (_this *RaftNode) ReportSnapshot(id uint64, status raft.SnapshotStatus) {}", "func insertNewScan (w http.ResponseWriter , r *http.Request) {\n\t err := verifyAuthenticity(r)\n\tif err != nil {\n\t\tnotifyClient(w,err.Error(),ERROR_CODE)\n\t\treturn\n\t}\n\t\t//Get the payload and convert it into object\n\t\tpayload , err := ioutil.ReadAll(r.Body)\n\t\tif err != nil {\n\t\t\tlog.Log(SCANNER_NAME , fmt.Sprintf(\" we Received an Error : %v\",err))\n\t\t\t//returning to the rest caller\n\t\t\trestError := &rest.RestError{Message:fmt.Sprintf(\"UnRecognized Request Format , Received this Error : %v\",err),SentTime:time.Now(),ErrorCode:ERROR_CODE}\n\t\t\tfmt.Fprintf(w,restError.ToJson())\n\t\t}\n\t\t//now unmarshal the received data back into json object\n\t\tvar newScan models.Reconn\n\t\terr = json.Unmarshal(payload,&newScan)\n\t\tif err != nil {\n\t\t\tlog.Log(SCANNER_NAME,fmt.Sprintf(\" We Received an Error : %v\",err))\n\t\t\trestError := &rest.RestError{Message:fmt.Sprintf(\"UnRecognized Payload sent during the request , Received this Error : %v\",err),SentTime:time.Now(),ErrorCode:ERROR_CODE}\n\t\t\tfmt.Fprintf(w,restError.ToJson())\n\t\t\treturn\n\t\t}\n\t\t//if everything went fine , just append that newScan into the newScans channel\n\t\t//add a new objectId into the new Scan\n\t\t//add the new scan into Scannerd for processing and insert it into the database\n\t\terr = appendNewScan(&newScan,true)\n\t//now add it to the channel at the end\n\t//add the new scan into the NewScans channel\n\tdefer addScanToChannel(&newScan)\n\tif err != nil {\n\n\t\tlog.Log(SCANNER_NAME,fmt.Sprintf(\" We Received anError : %v\",err))\n\t\trestError := &rest.RestError{Message:fmt.Sprintf(\"We received a problem during saving the new scan from rest interface \" +\n\t\t\t\" , Received this Error : %v\",err),SentTime:time.Now(),ErrorCode:ERROR_CODE}\n\t\tfmt.Fprintf(w,restError.ToJson())\n\t}else {\n\t\t//Generate a success message\n\t\tsuccess := &rest.RestSuccess{Message:\"Successfully Received The New Scan, It is under Processing\",\n\t\t ScanID:newScan.ScanId.Hex(),StatusCode:SUCCESS_CODE}\n\t\tlog.Log(SCANNER_NAME,\"Successfully Received the following scan Entry for processing : %v\",newScan.ScanId.Hex())\n\t\t//send the results back to the restful API\n\t\tfmt.Fprintf(w,success.ToJson())\n\t}\n}", "func SummaryHandler(res chan<- RpcRequest, minerInfo *MinerInformation, c *Client, wg *sync.WaitGroup) {\n\trequest := RpcRequest{\"{\\\"command\\\":\\\"summary\\\"}\", make(chan []byte), \"\"}\n\n\tvar response []byte\n\t//Creating an empty instance of everything\n\tsummary := SummaryResponse{[]StatusObject{StatusObject{}}, []SummaryObject{SummaryObject{}}, 0}\n\tsummaryRow := MinerRow{}\n\tsummaryRow.Name = c.Name\n\n\t//Save the default values\n\t//Lock it\n\tminerInfo.SumWrap.Mu.Lock()\n\t//Save the summary\n\tminerInfo.SumWrap.Summary = summary\n\tminerInfo.SumWrap.SummaryRow = summaryRow\n\t//Now unlock\n\tminerInfo.SumWrap.Mu.Unlock()\n\n\t//Signal that the thread is started\n\twg.Done()\n\n\tfor {\n\t\tsummary := SummaryResponse{[]StatusObject{StatusObject{}}, []SummaryObject{SummaryObject{}}, 0}\n\t\tres <- request\n\t\tresponse = <-request.ResultChan\n\n\t\t//If we got the response back unmarshal it\n\t\tif len(response) != 0 {\n\t\t\terr := json.Unmarshal(response, &summary)\n\n\t\t\t//Check for errors\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(err.Error())\n\t\t\t}\n\n\t\t\t//Update the summaryrow\n\t\t\tsummaryRow = MinerRow{c.Name, summary.Summary[0].Accepted, summary.Summary[0].Rejected, summary.Summary[0].MHSAv, summary.Summary[0].BestShare}\n\t\t} else {\n\t\t\t//No response so wait somee extra before try again\n\t\t\tlog.Println(\"Failed to fetch new data from \" + c.Name)\n\t\t\tsummaryRow = MinerRow{c.Name, 0, 0, 0, 0}\n\t\t}\n\t\t//Lock it\n\t\tminerInfo.SumWrap.Mu.Lock()\n\t\t//Save the summary\n\t\tminerInfo.SumWrap.Summary = summary\n\t\tminerInfo.SumWrap.SummaryRow = summaryRow\n\t\t//Now unlock\n\t\tminerInfo.SumWrap.Mu.Unlock()\n\n\t\t//Check if we should sleep some extra\n\t\tif(len(response) == 0){\n\t\t\ttime.Sleep(time.Duration(c.RefreshInterval*2) * time.Second)\t\n\t\t}\n\t\t//Now sleep\n\t\ttime.Sleep(time.Duration(c.RefreshInterval) * time.Second)\n\t}\n}", "func (m *DataHistoryManager) GenerateJobSummary(nickname string) (*DataHistoryJobSummary, error) {\n\tif m == nil {\n\t\treturn nil, ErrNilSubsystem\n\t}\n\tjob, err := m.GetByNickname(nickname, false)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"job: %v %w\", nickname, err)\n\t}\n\n\terr = m.compareJobsToData(job)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &DataHistoryJobSummary{\n\t\tNickname: job.Nickname,\n\t\tExchange: job.Exchange,\n\t\tAsset: job.Asset,\n\t\tPair: job.Pair,\n\t\tStartDate: job.StartDate,\n\t\tEndDate: job.EndDate,\n\t\tInterval: job.Interval,\n\t\tStatus: job.Status,\n\t\tDataType: job.DataType,\n\t\tResultRanges: job.rangeHolder.DataSummary(true),\n\t}, nil\n}", "func read_smart_history_table() {\r\n\tvar buffer string\r\n\r\n\tnum_hist = 0\r\n db, err := sql.Open(\"mysql\", mysql_connect_string)\r\n if err != nil {\r\n\t\tstatus_info.status_code = 1\r\n\t\tstatus_info.error_message = \"database error. failed to connect\"\r\n\t\tbuffer = fmt.Sprintf(\"%q\",err)\r\n\t\tstatus_info.error_details = buffer\r\n\t\tsend_response()\r\n }\r\n if err := db.Ping(); err != nil {\r\n\t\tstatus_info.status_code = 1\r\n\t\tstatus_info.error_message = \"database error. failed to ping\"\r\n\t\tbuffer = fmt.Sprintf(\"%q\",err)\r\n\t\tstatus_info.error_details = buffer\r\n\t\tsend_response()\r\n }\r\n\r\n\tquery := `select id,mod_date,user1,user1_balance bal1,user2,user2_balance bal2,operation,status,amount,void_date,\r\n(select username from smart_users where id = h.user1) name1,\r\n(select username from smart_users where id = h.user2) name2\r\nfrom smart_users_history h`\r\n\r\n\tresults, err := db.Query(query)\r\n if err != nil {\r\n\t\tstatus_info.status_code = 1\r\n\t\tstatus_info.error_message = \"database error. Query failed\"\r\n\t\tbuffer = fmt.Sprintf(\"%q\",err)\r\n\t\tstatus_info.error_details = buffer\r\n\t\tsend_response()\r\n\t}\r\n\r\n\tfor results.Next() {\r\n\t\tnum_hist += 1\r\n\t\terr = results.Scan(&trans_rec.id,&trans_rec.mod_date,&trans_rec.user1,&trans_rec.user1_balance,\r\n\t\t\t\t\t&trans_rec.user2,&trans_rec.user2_balance,&trans_rec.operation,&trans_rec.status,\r\n\t\t\t\t\t&trans_rec.amount,&trans_rec.void_date,&trans_rec.name1,&trans_rec.name2)\r\n\t\tif err != nil {\r\n\t\t\tstatus_info.status_code = 1\r\n\t\t\tstatus_info.error_message = \"database error. failed to scan record data\"\r\n\t\t\tbuffer = fmt.Sprintf(\"%q\",err)\r\n\t\t\tstatus_info.error_details = buffer\r\n\t\t\tsend_response()\r\n\t\t}\r\n\t\thistory = append(history,trans_rec)\r\n\t} // FOR\r\n\r\n\treturn\r\n}", "func transactionSummary(ctx *quorumContext, w http.ResponseWriter, r *http.Request) (int, error) {\n\tif ctx.conn == nil {\n\t\tfmt.Fprintf(w, \"Cannot get transaction before deploying contract\\n\")\n\t\treturn 400, nil\n\t}\n\n\t// parse hash from request URL\n\tkeys := r.URL.Query()[\"hash\"]\n\tif len(keys) < 1 {\n\t\tfmt.Fprintf(w, \"Invalid parameter, require 'hash'\")\n\t\treturn 400, nil\n\t}\n\tlog.Println(\"Hash supplied :\", keys[0])\n\thash := common.HexToHash(keys[0])\n\n\tbasic_context := context.Background()\n\ttx, pending, err := ctx.conn.TransactionByHash(basic_context, hash)\n\t//common.HexToHash(\"0x378674bebd1430d9ce63adc792c573da56e69b8d6c97174c93a43c5991ae0d61\"))\n\tif err != nil {\n\t\tfmt.Fprintf(w, \"Failed to get transaction details: %v\", err)\n\t\treturn 500, err\n\t}\n\tfmt.Fprintf(w, \"Transaction pending? %v; details: %v\\n\",\n\t\tpending, tx.String())\n\treturn 200, nil\n}", "func parseAndDisplayTransfer(captureLogFileName string, transferId string) {\n file, err := os.Open(captureLogFileName)\n if err != nil {\n fmt.Println(err)\n return\n }\n defer func(file *os.File) {\n err := file.Close()\n if err != nil {\n fmt.Println(err)\n return\n }\n }(file)\n\n topicSystemFTELog := \"SYSTEM.FTE/Log/\"\n scanner := bufio.NewScanner(file)\n // optionally, resize scanner's capacity for lines over 64K, see next example\n for scanner.Scan() {\n // Consider only those lines in the capture0.log file that contain SYSTEM.FTE/Log/ string for parsing\n if strings.Contains(scanner.Text(), topicSystemFTELog) {\n // Split the line on '!' and then parse to get the latest status\n tokens := strings.Split(scanner.Text(), \"!\")\n if len(tokens) > 1 {\n transferIdXml := getTransferId(tokens[len(tokens)-1])\n if strings.EqualFold(transferId, \"*\") {\n // Display details of all transfers\n displayTransferDetails(tokens[len(tokens)-1])\n } else {\n if transferId != \"\" {\n if strings.EqualFold(transferIdXml, transferId) {\n // Display details of specific transfer\n displayTransferDetails(tokens[len(tokens)-1])\n }\n }\n }\n }\n }\n }\n\n if err := scanner.Err(); err != nil {\n log.Fatal(err)\n }\n}", "func ProcessAlert(reading *models.Reading) (RRSAlert, error) {\n\tmAlertReceived := metrics.GetOrRegisterGaugeCollection(\"Inventory.ProcessAlert.AlertReceived\", nil)\n\tmAlertDetails := metrics.GetOrRegisterGaugeCollection(\"Inventory.ProcessAlert.AlertDetails\", nil)\n\n\tmAlertReceived.Add(1) // Have to let metrics system know an alert occurred even if we can't provide details below\n\n\talert := RRSAlert{}\n\n\tdecoder := json.NewDecoder(strings.NewReader(reading.Value))\n\tif err := decoder.Decode(&alert); err != nil {\n\t\treturn RRSAlert{}, errors.Wrap(err, \"unable to Decode data\")\n\t}\n\n\tif alert.DeviceId == \"\" {\n\t\treturn RRSAlert{}, errors.New(\"Missing device_id Field\")\n\t}\n\tif alert.Number == 0 {\n\t\treturn RRSAlert{}, errors.New(\"Missing alert_number Field\")\n\t}\n\n\ttag := metrics.Tag{\n\t\tName: \"DeviceId\",\n\t\tValue: alert.DeviceId,\n\t}\n\t// Use tag version to flag the Alert with more details\n\tmAlertDetails.AddWithTag(int64(alert.Number), tag)\n\n\treturn alert, nil\n}", "func UnmarshalJobLogSummaryActionJobRecap(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(JobLogSummaryActionJobRecap)\n\terr = core.UnmarshalPrimitive(m, \"target\", &obj.Target)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"ok\", &obj.Ok)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"changed\", &obj.Changed)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"failed\", &obj.Failed)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"skipped\", &obj.Skipped)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"unreachable\", &obj.Unreachable)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func (ScrapeSysUserSummary) Scrape(ctx context.Context, db *sql.DB, ch chan<- prometheus.Metric, logger log.Logger) error {\n\n\tuserSummaryRows, err := db.QueryContext(ctx, sysUserSummaryQuery)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer userSummaryRows.Close()\n\n\tvar (\n\t\tuser string\n\t\tstatements uint64\n\t\tstatement_latency float64\n\t\ttable_scans uint64\n\t\tfile_ios uint64\n\t\tfile_io_latency float64\n\t\tcurrent_connections uint64\n\t\ttotal_connections uint64\n\t\tunique_hosts uint64\n\t\tcurrent_memory uint64\n\t\ttotal_memory_allocated uint64\n\t)\n\n\tfor userSummaryRows.Next() {\n\t\terr = userSummaryRows.Scan(\n\t\t\t&user,\n\t\t\t&statements,\n\t\t\t&statement_latency,\n\t\t\t&table_scans,\n\t\t\t&file_ios,\n\t\t\t&file_io_latency,\n\t\t\t&current_connections,\n\t\t\t&total_connections,\n\t\t\t&unique_hosts,\n\t\t\t&current_memory,\n\t\t\t&total_memory_allocated,\n\t\t)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tch <- prometheus.MustNewConstMetric(sysUserSummaryStatements, prometheus.CounterValue, float64(statements), user)\n\t\tch <- prometheus.MustNewConstMetric(sysUserSummaryStatementLatency, prometheus.CounterValue, float64(statement_latency)/picoSeconds, user)\n\t\tch <- prometheus.MustNewConstMetric(sysUserSummaryTableScans, prometheus.CounterValue, float64(table_scans), user)\n\t\tch <- prometheus.MustNewConstMetric(sysUserSummaryFileIOs, prometheus.CounterValue, float64(file_ios), user)\n\t\tch <- prometheus.MustNewConstMetric(sysUserSummaryFileIOLatency, prometheus.CounterValue, float64(file_io_latency)/picoSeconds, user)\n\t\tch <- prometheus.MustNewConstMetric(sysUserSummaryCurrentConnections, prometheus.GaugeValue, float64(current_connections), user)\n\t\tch <- prometheus.MustNewConstMetric(sysUserSummaryTotalConnections, prometheus.CounterValue, float64(total_connections), user)\n\t\tch <- prometheus.MustNewConstMetric(sysUserSummaryUniqueHosts, prometheus.CounterValue, float64(unique_hosts), user)\n\t\tch <- prometheus.MustNewConstMetric(sysUserSummaryCurrentMemory, prometheus.GaugeValue, float64(current_memory), user)\n\t\tch <- prometheus.MustNewConstMetric(sysUserSummaryTotalMemoryAllocated, prometheus.CounterValue, float64(total_memory_allocated), user)\n\n\t}\n\treturn nil\n}", "func (c *ci) JobDetails(jobname string) *format.LogResponse {\n\tj := c.jobs[jobname]\n\treturn &format.LogResponse{\n\t\tJob: j.Status(true, true),\n\t}\n}", "func (u *Unmarshal) ScanDetails(uuid string, skipOnHit bool, writeOnReturn bool) ([]byte, error) {\n\ts := u.service(skipOnHit, writeOnReturn)\n\traw, err := s.ScanDetails(uuid)\n\treturn raw, err\n}", "func (s *scanCoordinator) handleStats(cmd Message) {\n\ts.supvCmdch <- &MsgSuccess{}\n\n\treq := cmd.(*MsgStatsRequest)\n\treplych := req.GetReplyChannel()\n\ts.mu.RLock()\n\tdefer s.mu.RUnlock()\n\n\tstats := s.stats.Get()\n\tst := s.serv.Statistics()\n\tstats.numConnections.Set(st.Connections)\n\n\t// Compute counts asynchronously and reply to stats request\n\tgo func() {\n\t\tfor id, idxStats := range stats.indexes {\n\t\t\terr := s.updateItemsCount(id, idxStats)\n\t\t\tif err != nil {\n\t\t\t\tlogging.Errorf(\"%v: Unable to compute index items_count for %v/%v/%v state %v (%v)\", s.logPrefix,\n\t\t\t\t\tidxStats.bucket, idxStats.name, id, idxStats.indexState.Value(), err)\n\t\t\t}\n\n\t\t\t// compute scan rate\n\t\t\tnow := time.Now().UnixNano()\n\t\t\telapsed := float64(now-idxStats.lastScanGatherTime.Value()) / float64(time.Second)\n\t\t\tif elapsed > 60 {\n\t\t\t\tpartitions := idxStats.getPartitions()\n\t\t\t\tfor _, pid := range partitions {\n\t\t\t\t\tpartnStats := idxStats.getPartitionStats(pid)\n\t\t\t\t\tnumRowsScanned := partnStats.numRowsScanned.Value()\n\t\t\t\t\tif idxStats.lastScanGatherTime.Value() != int64(0) {\n\t\t\t\t\t\tscanRate := float64(numRowsScanned-partnStats.lastNumRowsScanned.Value()) / elapsed\n\t\t\t\t\t\tpartnStats.avgScanRate.Set(int64((scanRate + float64(partnStats.avgScanRate.Value())) / 2))\n\t\t\t\t\t\tlogging.Debugf(\"scanCoordinator.handleStats: index %v partition %v numRowsScanned %v scan rate %v avg scan rate %v\",\n\t\t\t\t\t\t\tid, pid, numRowsScanned, scanRate, partnStats.avgScanRate.Value())\n\t\t\t\t\t}\n\t\t\t\t\tpartnStats.lastNumRowsScanned.Set(numRowsScanned)\n\t\t\t\t\tidxStats.lastScanGatherTime.Set(now)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\treplych <- true\n\t}()\n}", "func (logstash *Logstash) Gather(accumulator telegraf.Accumulator) error {\n\tif logstash.client == nil {\n\t\tclient, err := logstash.createHTTPClient()\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tlogstash.client = client\n\t}\n\n\tif choice.Contains(\"jvm\", logstash.Collect) {\n\t\tjvmURL, err := url.Parse(logstash.URL + jvmStats)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := logstash.gatherJVMStats(jvmURL.String(), accumulator); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif choice.Contains(\"process\", logstash.Collect) {\n\t\tprocessURL, err := url.Parse(logstash.URL + processStats)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := logstash.gatherProcessStats(processURL.String(), accumulator); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif choice.Contains(\"pipelines\", logstash.Collect) {\n\t\tif logstash.SinglePipeline {\n\t\t\tpipelineURL, err := url.Parse(logstash.URL + pipelineStats)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif err := logstash.gatherPipelineStats(pipelineURL.String(), accumulator); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\tpipelinesURL, err := url.Parse(logstash.URL + pipelinesStats)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif err := logstash.gatherPipelinesStats(pipelinesURL.String(), accumulator); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func (h HTTPInvalidRequestLine) LogSummary(s string) error {\n\treturn nil\n}", "func reportActivity(c *fiber.Ctx) error {\n\n\t// Obtain activity key from path parameter. Due to routing matching, it is impossible for the activityKey to be empty\n\tactivityKey := c.Params(\"key\")\n\n\t// Use struct to hold activity count since it can be returned as JSON by Go-Fiber\n\tactivity := activityMetric{}\n\n\t// Attempt to find matching cache using provided activity key\n\tactivityCache, found := activityMap[activityKey]\n\n\tif found {\n\n\t\tlog.Println(\"Found matching key entry for activityKey:\", activityKey)\n\n\t\t// Sum all activity counts present in the cache\n\t\tfor _, cacheKey := range activityCache.Keys() {\n\n\t\t\tcacheEntry, isPresent := activityCache.Get(cacheKey)\n\n\t\t\tif isPresent {\n\t\t\t\tactivity.Value += cacheEntry.(int)\n\t\t\t}\n\t\t}\n\n\t\tlog.Println(\"Completed summing activity counts for activityKey:\", activityKey)\n\n\t} else {\n\t\tlog.Println(\"Unable to find matching key entry for activityKey:\", activityKey)\n\t}\n\n\treturn c.JSON(activity)\n}", "func (m *Monitor) AnalyseData() {\n\t// look at the past few incidents\n\tnumDown := 0\n\tfor _, wasUp := range m.History {\n\t\tif wasUp == false {\n\t\t\tnumDown++\n\t\t}\n\t}\n\n\tt := (float32(numDown) / float32(len(m.History))) * 100\n\t// TODO cachet.Logger.Printf(\"%s %.2f%% Down at %v. Threshold: %.2f%%\\n\", m.URL, t, time.Now().UnixNano()/int64(time.Second), m.Threshold)\n\n\tif len(m.History) != 10 {\n\t\t// not enough data\n\t\treturn\n\t}\n\n\tif t > m.Threshold && m.Status != \"D\" {\n\t\t// is down, create an incident\n\t\tlogger.Infof(\"Monitor %s is down...\", m.Name)\n\t\tresp, _, err := MakeRequest(\"PATCH\", \"/api/monitors/\"+strconv.Itoa(int(m.ComponentID))+\"/\", []byte(\"{\\\"status\\\":\\\"D\\\"}\"))\n\t\tif err != nil || resp.StatusCode != 200 {\n\t\t\tlogger.Errorf(\"Could not set monitor down: (resp code %d) %v\", resp.StatusCode, err)\n\t\t}\n\n\t\theader := make(map[string]string)\n\t\theader[\"From\"] = \"notification@\" + Config.SystemName\n\t\theader[\"To\"] = Config.NotifEmail\n\t\theader[\"Subject\"] = \"Monitor \" + m.Name + \" is DOWN\"\n\t\theader[\"MIME-Version\"] = \"1.0\"\n\t\theader[\"Content-Type\"] = \"text/plain; charset=\\\"utf-8\\\"\"\n\t\theader[\"Content-Transfer-Encoding\"] = \"base64\"\n\n\t\tbody := time.Now().Format(\"Mon Jan 2 15:04:05 -0700 MST 2006\") + \"\\r\\n\" + m.LastFailReason\n\n\t\tmessage := \"\"\n\t\tfor k, v := range header {\n\t\t\tmessage += fmt.Sprintf(\"%s: %s\\r\\n\", k, v)\n\t\t}\n\t\tmessage += \"\\r\\n\" + base64.StdEncoding.EncodeToString([]byte(body))\n\t\tauth := smtp.PlainAuth(\"\", \"\", \"\", \"localhost\")\n\t\terr = smtp.SendMail(\n\t\t\t\"localhost:smtp\",\n\t\t\tauth,\n\t\t\t\"notification@\"+Config.SystemName,\n\t\t\tstrings.Split(Config.NotifEmail, \",\"),\n\t\t\t[]byte(message),\n\t\t)\n\t\tif err != nil {\n\t\t\tlogger.Errorf(\"Could not send email notification: %v\", err)\n\t\t}\n\n\t\tm.Status = \"D\"\n\n\t\t// TODO create Incident\n\t} else if t < m.Threshold && m.Status != \"U\" {\n\t\t// was down, created an incident, its now ok, make it resolved.\n\t\tlogger.Infof(\"Monitor %s is up...\", m.Name)\n\t\tresp, _, err := MakeRequest(\"PATCH\", \"/api/monitors/\"+strconv.Itoa(int(m.ComponentID))+\"/\", []byte(\"{\\\"status\\\":\\\"U\\\"}\"))\n\t\tif err != nil || resp.StatusCode != 200 {\n\t\t\tlogger.Errorf(\"Could not set monitor up: (resp code %d) %v\", resp.StatusCode, err)\n\t\t}\n\n\t\tm.Status = \"U\"\n\t\t// TODO create Incident\n\t}\n}", "func (d *JobManager) watchJobExecution(request *restful.Request, response *restful.Response) {\n\n}", "func (a *Agent) startReadingMetrics(ID string, data *ContainerData) {\n\tstream := data.metricsStream\n\tlog.Infof(\"start reading metrics on container: %s\\n\", data.name)\n\tdecoder := json.NewDecoder(stream)\n\tstatsData := new(types.StatsJSON)\n\tvar previous, now int64\n\tmetricsEntry := &data.squashedMetricsMessage\n\tdata.squashedMetricsMessage.ContainerId = ID\n\tdata.squashedMetricsMessage.ContainerName = data.name\n\tdata.squashedMetricsMessage.ContainerShortName = data.shortName\n\tdata.squashedMetricsMessage.ContainerState = data.state\n\tdata.squashedMetricsMessage.ServiceName = data.serviceName\n\tdata.squashedMetricsMessage.ServiceId = data.serviceID\n\tdata.squashedMetricsMessage.TaskId = data.taskID\n\tdata.squashedMetricsMessage.StackName = data.stackName\n\tdata.squashedMetricsMessage.NodeId = data.nodeID\n\tdata.squashedMetricsMessage.Labels = data.labels\n\tfor err := decoder.Decode(statsData); err != io.EOF; err = decoder.Decode(statsData) {\n\t\tif err != nil {\n\t\t\tif err.Error() == \"EOF\" {\n\t\t\t\tlog.Infof(\"Stream metrics EOF container terminated: %s\\n\", data.name)\n\t\t\t} else {\n\t\t\t\tlog.Errorf(\"error reading metrics, closing metrics stream on container %s (%v)\\n\", data.name, err)\n\t\t\t}\n\t\t\tdata.metricsReadError = true\n\t\t\t_ = stream.Close()\n\t\t\ta.removeContainer(ID)\n\t\t\treturn\n\t\t}\n\t\tnow = time.Now().UnixNano()\n\t\tif now <= previous {\n\t\t\tnow = previous + 1\n\t\t}\n\t\tprevious = now\n\t\tdata.squashedMetricsMessage.Timestamp = statsData.Read.Format(time.RFC3339Nano)\n\t\tdata.squashedMetricsMessage.TimeId = fmt.Sprintf(\"%016X\", now)\n\t\ta.setMemMetrics(statsData, metricsEntry)\n\t\ta.setIOMetrics(data, statsData, metricsEntry)\n\t\ta.setNetMetrics(data, statsData, metricsEntry)\n\t\ta.setCPUMetrics(statsData, metricsEntry)\n\t\tdata.squashedMetricsMessageNb++\n\t\ta.nbMetricsComputed++\n\t}\n}", "func upload() {\n\tnow := time.Now().In(loc)\n\tbefore := now.Add(-6e10)\n\n\tuplimit := now.Format(\"ipx.200601021504\")\n\tdownlimit := before.Format(\"ipx.200601021504\")\n\n\tif rs := ssdb.Cmd(\"scan\", downlimit, uplimit, 9999999); rs.State == hissdb.ReplyOK {\n\t\tfor _, v := range rs.Hash() {\n\t\t\tid, ip := getIdIp(v.Key)\n\t\t\tif dberr := db.Table(\"flows\").Where(\"user_id = ?\", id).Updates(map[string]interface{}{\n\t\t\t\t\"used\": gorm.Expr(\"used + ? * ?\", v.Value, config.Multiple),\n\t\t\t\t\"updated_at\": time.Now(),\n\t\t\t}).Error; dberr != nil {\n\t\t\t\tlogger.Printf(\"warn\", \"[upload]update mysql error: %v\", dberr.Error())\n\t\t\t}\n\n\t\t\t// Logs\n\t\t\tused, _ := strconv.ParseFloat(v.Value, 0)\n\t\t\tdb.Exec(\"INSERT INTO `logs_\"+logshash(id)+\"` (`user_id`, `flows`, `node`, `client_ip`, `used_at`) VALUES (?, ?, ?, ?, ?)\", id, float32(used)*config.Multiple, config.NodeName, ip, now.Format(\"2006/01/02 15:04:05\"))\n\n\t\t}\n\t} else {\n\t\tlogger.Printf(\"warn\", \"[ssdb]cmd error: scan %s %s 9999999\", downlimit, uplimit)\n\t}\n\n}", "func unmarshalReportResultsPayload(ctx context.Context, service *goa.Service, req *http.Request) error {\n\tpayload := &reportPayload{}\n\tif err := service.DecodeRequest(req, payload); err != nil {\n\t\treturn err\n\t}\n\tif err := payload.Validate(); err != nil {\n\t\t// Initialize payload with private data structure so it can be logged\n\t\tgoa.ContextRequest(ctx).Payload = payload\n\t\treturn err\n\t}\n\tgoa.ContextRequest(ctx).Payload = payload.Publicize()\n\treturn nil\n}", "func GetBuildSummary(c context.Context, id int64) (*model.BuildSummary, error) {\n\t// The host is set to prod because buildbot is hardcoded to talk to prod.\n\turi := fmt.Sprintf(\"buildbucket://cr-buildbucket.appspot.com/build/%d\", id)\n\tbs := make([]*model.BuildSummary, 0, 1)\n\tq := datastore.NewQuery(\"BuildSummary\").Eq(\"ContextURI\", uri).Limit(1)\n\tswitch err := datastore.GetAll(c, q, &bs); {\n\tcase err != nil:\n\t\treturn nil, utils.ReplaceNSEWith(err.(errors.MultiError), ErrNotFound)\n\tcase len(bs) == 0:\n\t\treturn nil, ErrNotFound\n\tdefault:\n\t\treturn bs[0], nil\n\t}\n}", "func WriteSummary(index_name string, fields []string) {\n\n // Setting font as needed\n pdf.SetFont(\"Helvetica\",\"\",10)\n\n // a slice of Summary{} that will hold Summary{} structure for each field\n response_struct := []Summary{}\n\n // Looping through each fields requestd\n for index := range fields {\n url := fmt.Sprintf(`https://127.0.0.1:9200/%s/_search?`, index_name)\n queries := fmt.Sprintf(`\n {\n \"size\":\"0\",\n \"aggs\" : {\n \"uniq_gender\" : {\n \"terms\" : { \"field\" : \"%s.keyword\" }\n }\n }\n }`, fields[index])\n\n p, err := es.Query(\"GET\", url, queries)\n if err != nil {\n fmt.Println(\"Report Generation error ERROR: Could not get response from Elasticsearch server \", err, \"Trying to connect again\")\n return\n }\n\n temp := Summary{}\n\n err = json.Unmarshal(p, &temp)\n if (err != nil) {\n fmt.Println(\"Error unmarshalling json\",err);\n }\n\n response_struct = append(response_struct,temp);\n }\n for i :=0; i < len(response_struct); i++ {\n pdf.Write(10,fmt.Sprintf(`%s Count\\n`,fields[i]))\n //DrawLine();\n for _, v := range(response_struct[i].Aggregations.Uniq.Buck){\n pdf.Write(10,fmt.Sprintf(`%s %d\\n`,v.Key,v.Count))\n }\n }\n}", "func (c *Client) IngestJob(ctx context.Context, jobID string, body interface{}) (*IngestBulkJobResponse, error) {\n\tjsonBody, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbytes, err := c.API.SendRequestWithBytes(ctx, \"POST\", \"/bulk/\"+jobID, jsonBody)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar data IngestBulkJobResponse\n\n\terr = json.Unmarshal(bytes, &data)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &data, nil\n}", "func (svcs *Services) ProcessSnapshotTaken(state *State, log types.Log) error {\n\n\teth := svcs.eth\n\tc := eth.Contracts()\n\tlogger := svcs.logger\n\tcallOpts := eth.GetCallOpts(context.TODO(), eth.GetDefaultAccount())\n\n\tevent, err := c.Validators.ParseSnapshotTaken(log)\n\tif err != nil {\n\t\treturn err // TODO consensus on side will stop\n\t}\n\n\tepoch := event.Epoch\n\tethDkgStarted := event.StartingETHDKG\n\n\tlogger.Infof(\"SnapshotTaken -> ChainID:%v Epoch:%v Height:%v Validator:%v StartingETHDKG:%v\", event.ChainId, epoch, event.Height, event.Validator.Hex(), event.StartingETHDKG)\n\n\trawBClaims, err := c.Validators.GetRawBlockClaimsSnapshot(callOpts, epoch)\n\tif err != nil {\n\t\treturn err // TODO consensus on side will stop\n\t}\n\n\trawSignature, err := c.Validators.GetRawSignatureSnapshot(callOpts, epoch)\n\tif err != nil {\n\t\treturn err // TODO consensus on side will stop\n\t}\n\n\t// put it back together\n\tbclaims := &objs.BClaims{}\n\terr = bclaims.UnmarshalBinary(rawBClaims)\n\tif err != nil {\n\t\treturn err\n\t}\n\theader := &objs.BlockHeader{}\n\theader.BClaims = bclaims\n\theader.SigGroup = rawSignature\n\n\t// send the reconstituted header to a handler\n\terr = svcs.ah.AddSnapshot(header, ethDkgStarted) // TODO must happen or things stuff\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (logstash *Logstash) gatherProcessStats(address string, accumulator telegraf.Accumulator) error {\n\tprocessStats := &ProcessStats{}\n\n\terr := logstash.gatherJSONData(address, processStats)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttags := map[string]string{\n\t\t\"node_id\": processStats.ID,\n\t\t\"node_name\": processStats.Name,\n\t\t\"node_version\": processStats.Version,\n\t\t\"source\": processStats.Host,\n\t}\n\n\tflattener := jsonParser.JSONFlattener{}\n\terr = flattener.FlattenJSON(\"\", processStats.Process)\n\tif err != nil {\n\t\treturn err\n\t}\n\taccumulator.AddFields(\"logstash_process\", flattener.Fields, tags)\n\n\treturn nil\n}", "func MonitorAnalysis(RID string) (types.Analysis, error) {\n\n\tanalysis := types.Analysis{}\n\ttimeout := time.After(60 * time.Minute)\n\tretryTick := time.NewTicker(60 * time.Second)\n\n\tfor {\n\t\tselect {\n\t\tcase <-timeout:\n\t\t\treturn analysis, errors.New(\"time out\")\n\t\tcase <-retryTick.C:\n\t\t\tanalysis, err := GetAnalysis(RID)\n\t\t\tif err != nil {\n\t\t\t\treturn analysis, err\n\t\t\t}\n\t\t\tif analysis.Status == \"finished\" {\n\t\t\t\treturn analysis, nil\n\t\t\t} else if analysis.Status == \"error running\" {\n\t\t\t\treturn analysis, fmt.Errorf(\"huskyCI encountered an error trying to execute this analysis: %v\", analysis.ErrorFound)\n\t\t\t}\n\t\t\tif !types.IsJSONoutput {\n\t\t\t\tfmt.Println(\"[HUSKYCI][!] Hold on! huskyCI is still running...\")\n\t\t\t}\n\t\t}\n\t}\n}", "func (s *Service) hdlVideoAuditCount() {\n\tvar (\n\t\terr error\n\t\treport *archive.Report\n\t\tctime = time.Now()\n\t\tmtime = ctime\n\t\tbs []byte\n\t)\n\tif report, err = s.arc.ReportLast(context.TODO(), archive.ReportTypeVideoAudit); err != nil {\n\t\tlog.Error(\"s.arc.ReportLast(%d) error(%v)\", archive.ReportTypeVideoAudit, err)\n\t\treturn\n\t}\n\tif report != nil && time.Now().Unix()-report.CTime.Unix() < 60*5 {\n\t\tlog.Info(\"s.arc.ReportLast(%d) 距离上一次写入还没过5分钟!\", archive.ReportTypeVideoAudit)\n\t\treturn\n\t}\n\ts.videoAuditCache.Lock()\n\tdefer s.videoAuditCache.Unlock()\n\tif bs, err = json.Marshal(s.videoAuditCache.Data); err != nil {\n\t\tlog.Error(\"json.Marshal(%v) error(%v)\", s.videoAuditCache.Data, err)\n\t\treturn\n\t}\n\tif _, err = s.arc.ReportAdd(context.TODO(), archive.ReportTypeVideoAudit, string(bs), ctime, mtime); err != nil {\n\t\tlog.Error(\"s.arc.ReportAdd(%d,%s,%v,%v) error(%v)\", archive.ReportTypeVideoAudit, string(bs), ctime, mtime, err)\n\t\treturn\n\t}\n\ts.videoAuditCache.Data = make(map[int16]map[string]int)\n}", "func (e *Exam) Scan(v interface{}) error {\n\tif v == nil {\n\t\treturn nil\n\t}\n\tif b, ok := v.([]byte); ok {\n\t\treturn json.Unmarshal(b, e)\n\t}\n\treturn errors.New(\"could not scan object\")\n}", "func (m *Monitoring) Summary(w http.ResponseWriter, r *http.Request) {\n\tb, err := stats.Summary()\n\tif err != nil {\n\t\tError(w, http.StatusNotFound, err, \"failed to get metrics\")\n\t\treturn\n\t}\n\tJSON(w, http.StatusOK, b)\n}", "func (e *Exporter) Describe(ch chan<- *prometheus.Desc) {\n\tch <- iqAirUp\n\tch <- e.totalScrapes.Desc()\n\tch <- e.jsonParseFailures.Desc()\n}", "func (v *johndictTasker) Status() common.Job {\n\tlog.WithField(\"task\", v.job.UUID).Debug(\"Gathering task status\")\n\tv.mux.Lock()\n\tdefer v.mux.Unlock()\n\n\t// Run john --status command\n\tstatusExec := exec.Command(config.BinPath, \"--status=\"+v.job.UUID)\n\tstatusExec.Dir = v.wd\n\tstatus, err := statusExec.CombinedOutput()\n\tif err != nil {\n\t\tv.job.Error = err.Error()\n\t\tlog.WithField(\"Error\", err.Error()).Debug(\"Error running john status command.\")\n\t\t// Do not return the job now. Keep running the check so the hashes will be parsed \n\t\t// even if the job has quit before a status was pulled.\n\t\t// return v.job \n\t}\n\n\tlog.WithField(\"StatusStdout\", string(status)).Debug(\"Stdout status return of john call\")\n\n\ttimestamp := fmt.Sprintf(\"%d\", time.Now().Unix())\n\n\tmatch := regStatusLine.FindStringSubmatch(string(status))\n\tlog.WithField(\"StatusMatch\", match).Debug(\"Regex match of john status call\")\n\n\tif len(match) == 7 {\n\t\t// Get # of cracked hashes\n\t\tcrackedHashes, err := strconv.ParseInt(match[1], 10, 64)\n\t\tif err == nil {\n\t\t\tv.job.CrackedHashes = crackedHashes\n\t\t}\n\n\t\t// Get % complete\n\t\tprogress, err := strconv.ParseFloat(match[3], 64)\n\t\tif err == nil {\n\t\t\tv.job.Progress = progress\n\t\t}\n\n\t\t// Get ETA\n\t\teta, err := parseJohnETA(match[4])\n\t\tif err == nil {\n\t\t\tv.job.ETC = printTimeUntil(eta)\n\t\t} else {\n\t\t\tv.job.ETC = \"Not Available\"\n\t\t}\n\n\t\t// Get guesses / second\n\t\tif v.job.PerformanceTitle == \"\" {\n\t\t\t// We need to set the units the first time\n\t\t\tv.job.PerformanceTitle = match[6]\n\t\t}\n\n\t\tvar mag float64\n\t\tswitch v.job.PerformanceTitle {\n\t\tcase \"C/s\":\n\t\t\tmag = speedMagH[match[6]]\n\t\tcase \"KC/s\":\n\t\t\tmag = speedMagK[match[6]]\n\t\tcase \"MC/s\":\n\t\t\tmag = speedMagM[match[6]]\n\t\tcase \"GC/s\":\n\t\t\tmag = speedMagG[match[6]]\n\t\t}\n\n\t\t// convert our string into a float\n\t\tspeed, err := strconv.ParseFloat(match[5], 64)\n\t\tif err == nil {\n\t\t\tv.job.PerformanceData[timestamp] = fmt.Sprintf(\"%f\", speed*mag)\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"speed\": speed,\n\t\t\t\t\"mag\": mag,\n\t\t\t}).Debug(\"Speed calculated.\")\n\t\t}\n\n\t} else {\n\t\tlog.WithField(\"MatchCount\", len(match)).Debug(\"Did not match enough items in the status\")\n\t}\n\n\t// Now get any hashes we might have cracked. Because of how John works we will\n\t// need to read in all the hashes provied and then search the .pot file in this\n\t// working directory to find any cracked passwords.\n\tvar hash2D [][]string\n\n\t// Read in hashes.txt file & pot file\n\thashFile, err := ioutil.ReadFile(filepath.Join(v.wd, \"hashes.txt\"))\n\tpotFile, err := ioutil.ReadFile(filepath.Join(v.wd, v.job.UUID+\".pot\"))\n\tpotHashes := strings.Split(string(potFile), \"\\n\")\n\tif err == nil {\n\t\thashes := strings.Split(string(hashFile), \"\\n\")\n\t\tfor _, hash := range hashes {\n\t\t\t// Check for existence in potHashes\n\t\t\tfor _, potHash := range potHashes {\n\t\t\t\tif strings.Contains(potHash, strings.ToLower(hash)) {\n\t\t\t\t\t// We have a hash match so let's add it to our output\n\t\t\t\t\thashIndex := strings.Index(potHash, strings.ToLower(hash))\n\t\t\t\t\tvar hashKeyPair []string\n\t\t\t\t\thashKeyPair = append(hashKeyPair, potHash[hashIndex+1:])\n\t\t\t\t\thashKeyPair = append(hashKeyPair, hash)\n\n\t\t\t\t\thash2D = append(hash2D, hashKeyPair)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tv.job.OutputData = hash2D\n\t}\n\n\tlog.WithFields(log.Fields{\n\t\t\"task\": v.job.UUID,\n\t\t\"status\": v.job.Status,\n\t}).Info(\"Ongoing task status\")\n\n\treturn v.job\n}", "func (s *Server) processScanFile(msg message.Message, db *database.DataStore) {\n\tlog.Debugf(\"[%s] Processing ScanFile response\", msg.ULID)\n\tif s.checkMsgErr(msg, models.Failed, db) {\n\t\t// TODO: Can I recover this? Should I ignore?\n\t\tmsg.Result = \"KO\"\n\t} else {\n\t\tif s.saveResult(msg, db) {\n\t\t\tmsg.Result = \"OK\"\n\t\t} else {\n\t\t\t// TODO: Request a new scan due errors while saving the report\n\t\t\tlog.Errorf(\"[%s] Error on processScanFile\", msg.ULID)\n\t\t}\n\t}\n\t// TODO:\n\t// - check error\n\t// - save the result\n\t// - send a message back\n\ts.w.Encode(msg)\n}", "func (c Client) captureTransaction(transactionID string, body io.Reader) (*Transaction, error) {\n\tpath := fmt.Sprintf(\"/transactions/%s/captures\", transactionID)\n\treq, err := http.NewRequest(\"POST\", c.getURL(path), body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar marshalled map[string]*Transaction\n\treturn marshalled[\"transaction\"], c.executeRequestAndMarshal(req, &marshalled)\n}", "func displayTransferDetails(xmlMessage string){\n // Replace all &quot; with single quote\n strings.ReplaceAll(xmlMessage, \"&quot;\", \"'\")\n // Create an parsed XML document\n doc, err := xmlquery.Parse(strings.NewReader(xmlMessage))\n if err != nil {\n panic(err)\n }\n\n // Get required 'transaction' element from Xml message\n transaction := xmlquery.FindOne(doc, \"//transaction\")\n if transaction != nil {\n transferId := transaction.SelectAttr(\"ID\")\n if action := transaction.SelectElement(\"action\"); action != nil {\n if strings.EqualFold(action.InnerText(),\"completed\") {\n // Process transfer complete Xml message\n var supplementMsg string\n status := transaction.SelectElement(\"status\")\n if status != nil {\n supplementMsg = status.SelectElement(\"supplement\").InnerText()\n fmt.Printf(\"\\n[%s] TransferID: %s Status: %s\\n \\tSupplement: %s\\n\",\n action.SelectAttr(\"time\"),\n strings.ToUpper(transferId),\n action.InnerText(),\n supplementMsg)\n }\n\n destAgent := transaction.SelectElement(\"destinationAgent\")\n statistics := transaction.SelectElement(\"statistics\")\n // Retrieve statistics\n var actualStartTimeText = \"\"\n var retryCount string\n var numFileFailures string\n var numFileWarnings string\n if statistics != nil {\n actualStartTime := statistics.SelectElement(\"actualStartTime\")\n if actualStartTime != nil {\n actualStartTimeText = actualStartTime.InnerText()\n }\n if statistics.SelectElement(\"retryCount\") != nil {\n retryCount = statistics.SelectElement(\"retryCount\").InnerText()\n }\n if statistics.SelectElement(\"numFileFailures\") != nil {\n numFileFailures = statistics.SelectElement(\"numFileFailures\").InnerText()\n }\n if statistics.SelectElement(\"numFileWarnings\") != nil {\n numFileWarnings = statistics.SelectElement(\"numFileWarnings\").InnerText()\n }\n }\n var elapsedTime time.Duration\n if actualStartTimeText != \"\" {\n startTime := getFormattedTime(actualStartTimeText)\n completePublishTIme := getFormattedTime(action.SelectAttr(\"time\"))\n elapsedTime = completePublishTIme.Sub(startTime)\n }\n\n fmt.Printf(\"\\tDestination Agent: %s\\n\\tStart time: %s\\n\\tCompletion Time: %s\\n\\tElapsed time: %s\\n\\tRetry Count: %s\\n\\tFailures:%s\\n\\tWarnings:%s\\n\\n\",\n destAgent.SelectAttr(\"agent\"),\n actualStartTimeText,\n action.SelectAttr(\"time\"),\n elapsedTime,\n retryCount,\n numFileFailures,\n numFileWarnings)\n } else if strings.EqualFold(action.InnerText(),\"progress\") {\n // Process transfer progress Xml message\n destAgent := transaction.SelectElement(\"destinationAgent\")\n progressPublishTimeText := action.SelectAttr(\"time\")\n fmt.Printf(\"\\n[%s] %s Status: %s Destination: %s \\n\", progressPublishTimeText,\n strings.ToUpper(transferId),\n action.InnerText(),\n destAgent.SelectAttr(\"agent\"))\n transferSet := transaction.SelectElement(\"transferSet\")\n startTimeText := transferSet.SelectAttr(\"startTime\")\n //startTime := getFormattedTime(startTimeText)\n //progressPublishTime := getFormattedTime(progressPublishTimeText)\n //elapsedTime := progressPublishTime.Sub(startTime)\n fmt.Printf(\"\\tStart time: %s\\n\\tTotal items in transfer request: %s\\n\\tBytes sent: %s\\n\",\n startTimeText,\n transferSet.SelectAttr(\"total\"),\n transferSet.SelectAttr(\"bytesSent\"))\n\n // Loop through all items in the progress message and display details.\n items := transferSet.SelectElements(\"item\")\n for i := 0 ; i < len(items); i++ {\n status := items[i].SelectElement(\"status\")\n resultCode := status.SelectAttr(\"resultCode\")\n var sourceName string\n var sourceSize = \"-1\"\n queueSource := items[i].SelectElement(\"source/queue\")\n if queueSource != nil {\n sourceName = queueSource.InnerText()\n } else {\n fileName := items[i].SelectElement(\"source/file\")\n if fileName != nil {\n sourceName = fileName.InnerText()\n sourceSize = fileName.SelectAttr(\"size\")\n }\n }\n\n var destinationName string\n queueDest := items[i].SelectElement(\"destination/queue\")\n var destinationSize = \"-1\"\n if queueDest != nil {\n destinationName = queueDest.InnerText()\n } else {\n fileName := items[i].SelectElement(\"destination/file\")\n if fileName != nil {\n destinationName = fileName.InnerText()\n destinationSize = fileName.SelectAttr(\"size\")\n }\n }\n\n // Display details of each item\n fmt.Printf(\"\\tItem # %d\\n\\t\\tSource: %s\\tSize: %s bytes\\n\\t\\tDestination: %s\\tSize: %s bytes\\n\",\n i+1,\n sourceName, sourceSize,\n destinationName, destinationSize)\n // Process result code and append any supplement\n if resultCode != \"0\" {\n supplement := status.SelectElement(\"supplement\")\n if supplement != nil {\n fmt.Printf(\"\\t\\tResult code %s Supplement %s\\n\", resultCode, supplement.InnerText())\n } else {\n fmt.Printf(\"\\t\\tResult code %s\\n\", resultCode)\n }\n } else {\n fmt.Printf(\"\\t\\tResult code %s\\n\", resultCode)\n }\n }\n } else if strings.EqualFold(action.InnerText(),\"started\") {\n // Process transfer started Xml message\n destAgent := transaction.SelectElement(\"destinationAgent\")\n destinationAgentName := destAgent.SelectAttr(\"agent\")\n transferSet := transaction.SelectElement(\"transferSet\")\n startTime := \"\"\n if transferSet != nil {\n startTime = transferSet.SelectAttr(\"startTime\")\n } else {\n startTime = action.SelectAttr(\"time\")\n }\n fmt.Printf(\"[%s] TransferID: %s Status: %s Destination: %s\\n\",\n startTime,\n strings.ToUpper(transferId),\n action.InnerText(),\n destinationAgentName)\n }\n }\n }\n}", "func (scanner *Scanner) Scan(target zgrab2.ScanTarget) (zgrab2.ScanStatus, interface{}, error) {\n\tconn, err := target.Open(&scanner.config.BaseFlags)\n\tif err != nil {\n\t\treturn zgrab2.TryGetScanStatus(err), nil, err\n\t}\n\tdefer conn.Close()\n\tresult := new(FoxLog)\n\n\terr = GetFoxBanner(result, conn)\n\tif !result.IsFox {\n\t\tresult = nil\n\t}\n\treturn zgrab2.TryGetScanStatus(err), result, err\n}", "func (l *Labels) Scan(src interface{}) error {\n\tif src == nil {\n\t\treturn nil\n\t}\n\n\tb := json.RawMessage(src.([]uint8))\n\treturn json.Unmarshal(b, l)\n}", "func (job *ScanCloseJob) buildPayload(pjson string) (err error) {\n\tif len(pjson) > 0 {\n\t\tjob.Payload = &ScanClosePayload{}\n\t\terr = json.Unmarshal([]byte(pjson), job.Payload)\n\t} else {\n\t\terr = fmt.Errorf(\"empty json string passed to ScanCloseJob\")\n\t}\n\treturn err\n}", "func (d *mongoDriver) JobInfo(ctx context.Context) <-chan amboy.JobInfo {\n\tinfos := make(chan amboy.JobInfo)\n\tgo func() {\n\t\tdefer close(infos)\n\t\tq := bson.M{}\n\t\td.modifyQueryForGroup(q)\n\n\t\titer, err := d.getCollection().Find(ctx,\n\t\t\tq,\n\t\t\t&options.FindOptions{\n\t\t\t\tSort: bson.M{\"status.mod_ts\": -1},\n\t\t\t\tProjection: bson.M{\n\t\t\t\t\t\"_id\": 1,\n\t\t\t\t\t\"status\": 1,\n\t\t\t\t\t\"retry_info\": 1,\n\t\t\t\t\t\"time_info\": 1,\n\t\t\t\t\t\"type\": 1,\n\t\t\t\t\t\"version\": 1,\n\t\t\t\t},\n\t\t\t})\n\t\tif err != nil {\n\t\t\tgrip.Warning(message.WrapError(err, message.Fields{\n\t\t\t\t\"message\": \"problem with query\",\n\t\t\t\t\"driver_id\": d.instanceID,\n\t\t\t\t\"service\": \"amboy.queue.mdb\",\n\t\t\t\t\"operation\": \"job info iterator\",\n\t\t\t\t\"is_group\": d.opts.UseGroups,\n\t\t\t\t\"group\": d.opts.GroupName,\n\t\t\t}))\n\t\t\treturn\n\t\t}\n\n\t\tfor iter.Next(ctx) {\n\t\t\tji := &registry.JobInterchange{}\n\t\t\tif err := iter.Decode(ji); err != nil {\n\t\t\t\tgrip.Warning(message.WrapError(err, message.Fields{\n\t\t\t\t\t\"message\": \"problem decoding job document into interchange job\",\n\t\t\t\t\t\"driver_id\": d.instanceID,\n\t\t\t\t\t\"service\": \"amboy.queue.mdb\",\n\t\t\t\t\t\"operation\": \"job info iterator\",\n\t\t\t\t\t\"is_group\": d.opts.UseGroups,\n\t\t\t\t\t\"group\": d.opts.GroupName,\n\t\t\t\t}))\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\td.removeMetadata(ji)\n\t\t\tinfo := amboy.JobInfo{\n\t\t\t\tID: ji.Name,\n\t\t\t\tStatus: ji.Status,\n\t\t\t\tTime: ji.TimeInfo,\n\t\t\t\tRetry: ji.RetryInfo,\n\t\t\t\tType: amboy.JobType{\n\t\t\t\t\tName: ji.Type,\n\t\t\t\t\tVersion: ji.Version,\n\t\t\t\t},\n\t\t\t}\n\n\t\t\tselect {\n\t\t\tcase <-ctx.Done():\n\t\t\t\treturn\n\t\t\tcase infos <- info:\n\t\t\t}\n\n\t\t}\n\t}()\n\n\treturn infos\n}", "func ExtractRequestIDFromJobRun(jobDecodeData client.RunsResponseData) ([]byte, error) {\n\tvar taskRun client.TaskRun\n\tfor _, tr := range jobDecodeData.Attributes.TaskRuns {\n\t\tif tr.Type == \"ethabidecodelog\" {\n\t\t\ttaskRun = tr\n\t\t}\n\t}\n\tvar decodeLogTaskRun *client.DecodeLogTaskRun\n\tif err := json.Unmarshal([]byte(taskRun.Output), &decodeLogTaskRun); err != nil {\n\t\treturn nil, err\n\t}\n\trqInts := decodeLogTaskRun.RequestID\n\treturn rqInts, nil\n}", "func (uplink *SenseUplink) LogMetric(invocation *enigma.Invocation, metrics *enigma.InvocationMetrics, result *enigma.InvocationResponse) {\n\trequestID := -1\n\tif result != nil {\n\t\trequestID = result.RequestID\n\t}\n\n\tvar method string\n\tvar params string\n\tif invocation != nil {\n\t\tmethod = invocation.Method\n\t\tif invocation.RemoteObject != nil && strings.TrimSpace(invocation.RemoteObject.GenericId) != \"\" {\n\t\t\tbuf := helpers.NewBuffer()\n\t\t\tbuf.WriteString(method)\n\t\t\tbuf.WriteString(\" [\")\n\t\t\tbuf.WriteString(invocation.RemoteObject.GenericId)\n\t\t\tbuf.WriteString(\"]\")\n\t\t\tif buf.Error == nil {\n\t\t\t\tmethod = buf.String()\n\t\t\t}\n\t\t}\n\t\tif invocation.Params != nil {\n\t\t\tif jB, err := json.Marshal(invocation.Params); err == nil && jB != nil {\n\t\t\t\tparams = string(jB)\n\t\t\t}\n\t\t}\n\t}\n\n\tif err := uplink.trafficMetrics.Update(metrics.SocketWriteTimestamp, metrics.SocketReadTimestamp,\n\t\tint64(metrics.RequestMessageSize), int64(metrics.ResponseMessageSize)); err != nil {\n\t\tuplink.logEntry.LogError(err)\n\t}\n\n\tif uplink.Traffic != nil {\n\t\tuplink.logEntry.LogTrafficMetric(metrics.SocketReadTimestamp.Sub(metrics.SocketWriteTimestamp).Nanoseconds(),\n\t\t\tuint64(metrics.RequestMessageSize), uint64(metrics.ResponseMessageSize), requestID, method, params, \"WS\", \"\")\n\t}\n\n\treqStall := metrics.SocketWriteTimestamp.Sub(metrics.InvocationRequestTimestamp)\n\tif reqStall > constant.MaxStallTime {\n\t\tuplink.logEntry.LogDetail(logger.WarningLevel, \"WS request stall\", strconv.FormatInt(reqStall.Nanoseconds(), 10))\n\t}\n\n\trespStall := metrics.InvocationResponseTimestamp.Sub(metrics.SocketReadTimestamp)\n\tif !metrics.InvocationRequestTimestamp.IsZero() && !metrics.SocketReadTimestamp.IsZero() && respStall > constant.MaxStallTime {\n\t\tuplink.logEntry.LogDetail(logger.WarningLevel, \"WS response stall\", strconv.FormatInt(respStall.Nanoseconds(), 10))\n\t}\n\n}", "func TriggerImageScan(repository string, tag string) error {\n\trepoClient, err := NewRepositoryClientForUI(\"harbor-core\", repository)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdigest, exist, err := repoClient.ManifestExist(tag)\n\tif !exist {\n\t\treturn fmt.Errorf(\"unable to perform scan: the manifest of image %s:%s does not exist\", repository, tag)\n\t}\n\tif err != nil {\n\t\tlog.Errorf(\"Failed to get Manifest for %s:%s\", repository, tag)\n\t\treturn err\n\t}\n\treturn triggerImageScan(repository, tag, digest, GetJobServiceClient())\n}", "func (c *Client) CopyScan(httpClient *http.Client, scanID int, copyScanJSON string) (Scan, error) {\n\tc.debugln(\"CopyScan(): Building copy scan URL\")\n\turl := fmt.Sprintf(\"https://%s:%s/scans/%d/copy\", c.ip, c.port, scanID)\n\n\tstatusCode, body, err := c.postWithJSON(httpClient, url, []byte(copyScanJSON))\n\tif err != nil {\n\t\treturn Scan{}, err\n\t}\n\n\tswitch statusCode {\n\tcase 200:\n\t\tvar createdScan Scan\n\t\terr = json.Unmarshal(body, &createdScan)\n\t\tif err != nil {\n\t\t\treturn Scan{}, err\n\t\t}\n\t\tc.debugln(\"CopyScan(): Successfully copied scan.\")\n\t\treturn createdScan, nil\n\tdefault:\n\t\tvar err ErrorResponse\n\t\tunmarshalError := json.Unmarshal(body, &err)\n\t\tif unmarshalError != nil {\n\t\t\treturn Scan{}, unmarshalError\n\t\t}\n\t\tc.debugln(\"CopyScan(): Could not copy scan.\")\n\t\treturn Scan{}, fmt.Errorf(\"%s\", err.Error)\n\t}\n}", "func (p *ReadOnlySchedulerClient) GetJobSummary(ctx context.Context, role string) (r *Response, err error) {\n var _args105 ReadOnlySchedulerGetJobSummaryArgs\n _args105.Role = role\n var _result106 ReadOnlySchedulerGetJobSummaryResult\n var meta thrift.ResponseMeta\n meta, err = p.Client_().Call(ctx, \"getJobSummary\", &_args105, &_result106)\n p.SetLastResponseMeta_(meta)\n if err != nil {\n return\n }\n return _result106.GetSuccess(), nil\n}", "func (w *WorklogItem) Summary() string {\n\treturn w.Details.Summary()\n}", "func Summary(jsonIn []byte) ([]byte, error) {\n\tvar s summary\n\tkeycache.Refresh()\n\n\tif err := json.Unmarshal(jsonIn, &s); err != nil {\n\t\treturn jsonStatusError(err)\n\t}\n\n\tif passvault.NumRecords() == 0 {\n\t\treturn jsonStatusError(errors.New(\"Vault is not created yet\"))\n\t}\n\n\tif err := validateAdmin(s.Name, s.Password); err != nil {\n\t\tlog.Printf(\"Error validating admin status of %s: %s\", s.Name, err)\n\t\treturn jsonStatusError(err)\n\t}\n\n\treturn jsonSummary()\n}", "func (ms *Ms) Hscan(key string, cursor int, options types.QueryOptions) (*HscanResponse, error) {\n\tresult := make(chan *types.KuzzleResponse)\n\n\tquery := &types.KuzzleRequest{\n\t\tController: \"ms\",\n\t\tAction: \"hscan\",\n\t\tId: key,\n\t\tCursor: cursor,\n\t}\n\n\tif options != nil {\n\t\tif options.Count() != 0 {\n\t\t\tquery.Count = options.Count()\n\t\t}\n\n\t\tif options.Match() != \"\" {\n\t\t\tquery.Match = options.Match()\n\t\t}\n\t}\n\n\tgo ms.Kuzzle.Query(query, options, result)\n\n\tres := <-result\n\n\tif res.Error.Error() != \"\" {\n\t\treturn nil, res.Error\n\t}\n\n\tvar stringResult []interface{}\n\tjson.Unmarshal(res.Result, &stringResult)\n\n\treturnedResult := &HscanResponse{}\n\n\ttmp, err := strconv.ParseInt(stringResult[0].(string), 10, 0)\n\tif err != nil {\n\t\treturn returnedResult, types.NewError(err.Error())\n\t}\n\treturnedResult.Cursor = int(tmp)\n\n\ttmpS := stringResult[1].([]interface{})\n\n\tfor _, value := range tmpS {\n\t\treturnedResult.Values = append(returnedResult.Values, value.(string))\n\t}\n\n\treturn returnedResult, nil\n}", "func (p *ReadOnlySchedulerClient) GetJobSummary(ctx context.Context, role string) (r *Response, err error) {\n var _args55 ReadOnlySchedulerGetJobSummaryArgs\n _args55.Role = role\n var _result56 ReadOnlySchedulerGetJobSummaryResult\n if err = p.Client_().Call(ctx, \"getJobSummary\", &_args55, &_result56); err != nil {\n return\n }\n return _result56.GetSuccess(), nil\n}", "func (m *DataHistoryManager) runDataJob(job *DataHistoryJob, exch exchange.IBotExchange) error {\n\tif !m.IsRunning() {\n\t\treturn ErrSubSystemNotStarted\n\t}\n\tvar intervalsProcessed int64\n\tvar err error\n\tvar result *DataHistoryJobResult\nranges:\n\tfor i := range job.rangeHolder.Ranges {\n\t\tskipProcessing := true\n\t\tfor j := range job.rangeHolder.Ranges[i].Intervals {\n\t\t\tif !job.rangeHolder.Ranges[i].Intervals[j].HasData {\n\t\t\t\tskipProcessing = false\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif skipProcessing {\n\t\t\t_, ok := job.Results[job.rangeHolder.Ranges[i].Start.Time.Unix()]\n\t\t\tif !ok && !job.OverwriteExistingData {\n\t\t\t\t// we have determined that data is there, however it is not reflected in\n\t\t\t\t// this specific job's results, which is required for a job to be complete\n\t\t\t\tvar id uuid.UUID\n\t\t\t\tid, err = uuid.NewV4()\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tjob.Results[job.rangeHolder.Ranges[i].Start.Time.Unix()] = []DataHistoryJobResult{\n\t\t\t\t\t{\n\t\t\t\t\t\tID: id,\n\t\t\t\t\t\tJobID: job.ID,\n\t\t\t\t\t\tIntervalStartDate: job.rangeHolder.Ranges[i].Start.Time,\n\t\t\t\t\t\tIntervalEndDate: job.rangeHolder.Ranges[i].End.Time,\n\t\t\t\t\t\tStatus: dataHistoryStatusComplete,\n\t\t\t\t\t\tDate: time.Now(),\n\t\t\t\t\t},\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !job.OverwriteExistingData {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t\tif intervalsProcessed >= job.RunBatchLimit {\n\t\t\tcontinue\n\t\t}\n\n\t\tif m.verbose {\n\t\t\tlog.Debugf(log.DataHistory, \"running data history job %v start: %s end: %s interval: %s datatype: %s\",\n\t\t\t\tjob.Nickname,\n\t\t\t\tjob.rangeHolder.Ranges[i].Start.Time,\n\t\t\t\tjob.rangeHolder.Ranges[i].End.Time,\n\t\t\t\tjob.Interval,\n\t\t\t\tjob.DataType)\n\t\t}\n\n\t\tvar failures int64\n\t\thasDataInRange := false\n\t\tresultLookup, ok := job.Results[job.rangeHolder.Ranges[i].Start.Time.Unix()]\n\t\tif ok {\n\t\t\tfor x := range resultLookup {\n\t\t\t\tswitch resultLookup[x].Status {\n\t\t\t\tcase dataHistoryIntervalIssuesFound:\n\t\t\t\t\tcontinue ranges\n\t\t\t\tcase dataHistoryStatusFailed:\n\t\t\t\t\tfailures++\n\t\t\t\tcase dataHistoryStatusComplete:\n\t\t\t\t\t// this can occur in the scenario where data is missing\n\t\t\t\t\t// however no errors were encountered when data is missing\n\t\t\t\t\t// eg an exchange only returns an empty slice\n\t\t\t\t\t// or the exchange is simply missing the data and does not have an error\n\t\t\t\t\thasDataInRange = true\n\t\t\t\t}\n\t\t\t}\n\t\t\tif failures >= job.MaxRetryAttempts {\n\t\t\t\t// failure threshold reached, we should not attempt\n\t\t\t\t// to check this interval again\n\t\t\t\tfor x := range resultLookup {\n\t\t\t\t\tresultLookup[x].Status = dataHistoryIntervalIssuesFound\n\t\t\t\t}\n\t\t\t\tjob.Results[job.rangeHolder.Ranges[i].Start.Time.Unix()] = resultLookup\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t\tif hasDataInRange {\n\t\t\tcontinue\n\t\t}\n\t\tif m.verbose {\n\t\t\tlog.Debugf(log.DataHistory, \"job %s processing range %v-%v\", job.Nickname, job.rangeHolder.Ranges[i].Start, job.rangeHolder.Ranges[i].End)\n\t\t}\n\t\tintervalsProcessed++\n\n\t\t// processing the job\n\t\tswitch job.DataType {\n\t\tcase dataHistoryCandleDataType:\n\t\t\tresult, err = m.processCandleData(job, exch, job.rangeHolder.Ranges[i].Start.Time, job.rangeHolder.Ranges[i].End.Time, int64(i))\n\t\tcase dataHistoryTradeDataType:\n\t\t\tresult, err = m.processTradeData(job, exch, job.rangeHolder.Ranges[i].Start.Time, job.rangeHolder.Ranges[i].End.Time, int64(i))\n\t\tcase dataHistoryConvertTradesDataType:\n\t\t\tresult, err = m.convertTradesToCandles(job, job.rangeHolder.Ranges[i].Start.Time, job.rangeHolder.Ranges[i].End.Time)\n\t\tcase dataHistoryConvertCandlesDataType:\n\t\t\tresult, err = m.convertCandleData(job, job.rangeHolder.Ranges[i].Start.Time, job.rangeHolder.Ranges[i].End.Time)\n\t\tdefault:\n\t\t\treturn errUnknownDataType\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif result == nil {\n\t\t\treturn errNilResult\n\t\t}\n\n\t\tlookup := job.Results[result.IntervalStartDate.Unix()]\n\t\tlookup = append(lookup, *result)\n\t\tjob.Results[result.IntervalStartDate.Unix()] = lookup\n\t}\n\tcompleted := true // nolint:ifshort,nolintlint // false positive and triggers only on Windows\n\tallResultsSuccessful := true\n\tallResultsFailed := true\ncompletionCheck:\n\tfor i := range job.rangeHolder.Ranges {\n\t\tresult, ok := job.Results[job.rangeHolder.Ranges[i].Start.Time.Unix()]\n\t\tif !ok {\n\t\t\tcompleted = false\n\t\t}\n\tresults:\n\t\tfor j := range result {\n\t\t\tswitch result[j].Status {\n\t\t\tcase dataHistoryIntervalIssuesFound:\n\t\t\t\tallResultsSuccessful = false\n\t\t\t\tbreak results\n\t\t\tcase dataHistoryStatusComplete:\n\t\t\t\tallResultsFailed = false\n\t\t\t\tbreak results\n\t\t\tdefault:\n\t\t\t\tcompleted = false\n\t\t\t\tbreak completionCheck\n\t\t\t}\n\t\t}\n\t}\n\tif completed {\n\t\terr := m.completeJob(job, allResultsSuccessful, allResultsFailed)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func (agg *FeatureUsageAggregator) IngestRecord(ctx *core.ExecutionContext, lineNumber int, op byte, fields []string) error {\n\tlog.Printf(\"Yo!\")\n\tif (ctx.Script != nil) && !ctx.Script.VisibleV8 && (ctx.Origin.Origin != \"\") {\n\t\tvar rcvr, name, fullName string\n\t\tswitch op {\n\t\tcase 'g':\n\t\t\trcvr, _ = core.StripCurlies(fields[1])\n\t\t\tname, _ = core.StripQuotes(fields[2])\n\t\tcase 'c':\n\t\t\trcvr, _ = core.StripCurlies(fields[2])\n\t\t\tname, _ = core.StripQuotes(fields[1])\n\t\t\t// Eliminate \"native\" prefix indicator from function names\n\t\t\tname = strings.TrimPrefix(name, \"%\")\n\t\tcase 's':\n\t\t\trcvr, _ = core.StripCurlies(fields[1])\n\t\t\tname, _ = core.StripQuotes(fields[2])\n\t\tcase 'n':\n\t\t\t// Radical experiment: ignore all \"new\" records!\n\t\t\treturn nil\n\t\tdefault:\n\t\t\t// Oops--what was this?\n\t\t\tlog.Printf(\"%d: wat? %c: %v\", lineNumber, op, fields)\n\t\t\treturn nil\n\t\t}\n\n\t\t// We have some names (V8 special cases, numeric indices) that are never useful\n\t\tif core.FilterName(name) {\n\t\t\treturn nil\n\t\t}\n\n\t\tif strings.Contains(rcvr, \",\") {\n\t\t\trcvr = strings.Split(rcvr, \",\")[1]\n\t\t}\n\n\t\t// Compensate for OOP-polymorphism by normalizing names to their base IDL interface\n\t\tfullName, err := agg.idl.NormalizeMember(rcvr, name)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// We log only IDL-normalized members\n\t\t// Stick it in our aggregation map\n\t\toriginSet, ok := agg.usage[ctx.Origin.Origin]\n\t\tif !ok {\n\t\t\toriginSet = make(map[string]bool)\n\t\t\tagg.usage[ctx.Origin.Origin] = originSet\n\t\t}\n\t\toriginSet[fullName] = true\n\t}\n\n\treturn nil\n}", "func (e *Eval) LogSummary(log *log.Logger) {\n\tvar n int\n\ttype aggregate struct {\n\t\tN, Ncache int\n\t\tRuntime stats\n\t\tCPU, Memory, Disk, Temp stats\n\t\tRequested reflow.Resources\n\t}\n\tstats := map[string]aggregate{}\n\n\tfor v := e.root.Visitor(); v.Walk(); v.Visit() {\n\t\tif v.Parent != nil {\n\t\t\tv.Push(v.Parent)\n\t\t}\n\t\t// Skip nodes that were skipped due to caching.\n\t\tif v.State < Done {\n\t\t\tcontinue\n\t\t}\n\t\tswitch v.Op {\n\t\tcase Exec, Intern, Extern:\n\t\tdefault:\n\t\t\tcontinue\n\t\t}\n\n\t\tident := v.Ident\n\t\tif ident == \"\" {\n\t\t\tident = \"?\"\n\t\t}\n\t\ta := stats[ident]\n\t\ta.N++\n\t\tif v.Cached {\n\t\t\ta.Ncache++\n\t\t}\n\t\tif len(v.RunInfo.Profile) == 0 {\n\t\t\tn++\n\t\t\tstats[ident] = a\n\t\t\tcontinue\n\t\t}\n\t\tif v.Op == Exec {\n\t\t\ta.CPU.Add(v.RunInfo.Profile[\"cpu\"].Mean)\n\t\t\ta.Memory.Add(v.RunInfo.Profile[\"mem\"].Max)\n\t\t\ta.Disk.Add(v.RunInfo.Profile[\"disk\"].Max)\n\t\t\ta.Temp.Add(v.RunInfo.Profile[\"tmp\"].Max)\n\t\t\ta.Requested = v.RunInfo.Resources\n\t\t}\n\t\tif d := v.RunInfo.Runtime.Minutes(); d > 0 {\n\t\t\ta.Runtime.Add(d)\n\t\t}\n\t\tn++\n\t\tstats[ident] = a\n\t}\n\tif n == 0 {\n\t\treturn\n\t}\n\tvar b bytes.Buffer\n\tfmt.Fprintf(&b, \"total n=%d time=%s\\n\", n, round(e.totalTime))\n\tvar tw tabwriter.Writer\n\ttw.Init(newPrefixWriter(&b, \"\\t\"), 4, 4, 1, ' ', 0)\n\tfmt.Fprintln(&tw, \"ident\\tn\\tncache\\truntime(m)\\tcpu\\tmem(GiB)\\tdisk(GiB)\\ttmp(GiB)\\trequested\")\n\tidents := make([]string, 0, len(stats))\n\tfor ident := range stats {\n\t\tidents = append(idents, ident)\n\t}\n\tsort.Strings(idents)\n\tvar warningIdents []string\n\tconst byteScale = 1.0 / (1 << 30)\n\tfor _, ident := range idents {\n\t\tstats := stats[ident]\n\t\tfmt.Fprintf(&tw, \"%s\\t%d\\t%d\", ident, stats.N, stats.Ncache)\n\t\tif stats.CPU.N() > 0 {\n\t\t\tfmt.Fprintf(&tw, \"\\t%s\\t%s\\t%s\\t%s\\t%s\\t%s\",\n\t\t\t\tstats.Runtime.Summary(\"%.0f\"),\n\t\t\t\tstats.CPU.Summary(\"%.1f\"),\n\t\t\t\tstats.Memory.SummaryScaled(\"%.1f\", byteScale),\n\t\t\t\tstats.Disk.SummaryScaled(\"%.1f\", byteScale),\n\t\t\t\tstats.Temp.SummaryScaled(\"%.1f\", byteScale),\n\t\t\t\tstats.Requested,\n\t\t\t)\n\t\t\treqMem, minMem := stats.Requested[\"mem\"], float64(minExecMemory)\n\t\t\tif memRatio := stats.Memory.Mean() / reqMem; memRatio <= memSuggestThreshold && reqMem > minMem {\n\t\t\t\twarningIdents = append(warningIdents, ident)\n\t\t\t}\n\t\t} else {\n\t\t\tfmt.Fprint(&tw, \"\\t\\t\\t\\t\\t\")\n\t\t}\n\t\tfmt.Fprint(&tw, \"\\n\")\n\t}\n\tif len(warningIdents) > 0 {\n\t\tfmt.Fprintf(&tw, \"warning: reduce memory requirements for over-allocating execs: %s\", strings.Join(warningIdents, \", \"))\n\t}\n\ttw.Flush()\n\tlog.Printf(b.String())\n}", "func (s *Server) HandleHistory(w http.ResponseWriter, r *http.Request) {\n\tpatientID := mux.Vars(r)[\"id\"]\n\t// Read data from the database\n\tdb := s.DB()\n\n\tselDB, err := db.Query(\"SELECT * FROM inspection_details WHERE ID=?\", patientID)\n if err != nil {\n panic(err.Error())\n }\n\n\ttype allInspections []shared.InspectionRequest\n\tvar inspections = allInspections{}\n\n for selDB.Next() {\n\t\tvar newInspection shared.InspectionRequest\n var id int\n var time, observations, medication, tests, notes string\n err = selDB.Scan(&id, &time, &observations, &medication, &tests, &notes)\n if err != nil {\n panic(err.Error())\n }\n newInspection.ID = id\n newInspection.Time = time\n newInspection.Observations = observations\n\t\tnewInspection.Medication = medication\n\t\tnewInspection.Tests = tests\n\t\tnewInspection.Notes = notes\n\t\tinspections = append(inspections, newInspection)\n }\n\n\tfmt.Println(inspections)\n\tjson.NewEncoder(w).Encode(inspections)\n}", "func (i *Info) Scan(src interface{}) error {\n\tvar source []byte\n\t// let's support string and []byte\n\tswitch src.(type) {\n\tcase string:\n\t\tsource = []byte(src.(string))\n\tcase []byte:\n\t\tsource = src.([]byte)\n\tdefault:\n\t\treturn errors.New(\"Incompatible type for Info\")\n\t}\n\treturn json.Unmarshal(source, i)\n}", "func extractJob(card *goquery.Selection,c chan<- extractedJob){\n\tid,_ := card.Attr(\"data-jk\")\n\ttitle := CleanStrings(card.Find(\".jobTitle>span\").Text())\n\tlocation := CleanStrings(card.Find(\".companyLocation\").Text())\n\tsalary := CleanStrings(card.Find(\".salary-snippet\").Text())\n\tsummary := CleanStrings(card.Find(\".summary\").Text())\n\tc <- extractedJob{\n\t\tid: id,\n\t\ttitle: title,\n\t\tlocation: location,\n\t\tsalary: salary,\n\t\tsummary: summary,\n\t}\n}", "func scanACount(count *db.Count, row rowScanner) error {\n\treturn row.Scan(&count.Time, &count.SessionID, &count.UserName, &count.Count)\n}", "func taskReceive() (string, string, string, uint8) {\n\n\tfor {\n\t\ttaskInfo := <-asrTaskQ\n\n\t\tb, err := json.Marshal(taskInfo)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t\tlog.Printf(\"skip one task %v\\n\", taskInfo)\n\t\t\tcontinue\n\t\t}\n\t\treturn string(b), taskInfo.ID, asrQueName, 0\n\t}\n\n}", "func (sa *ScanAPI) Log() {\n\t// Check access permissions\n\tif !sa.RequireProjectAccess(sa.pro.ProjectID, rbac.ActionRead, rbac.ResourceScan) {\n\t\treturn\n\t}\n\n\tuuid := sa.GetString(\":uuid\")\n\tbytes, err := scan.DefaultController.GetScanLog(uuid)\n\tif err != nil {\n\t\tsa.SendInternalServerError(errors.Wrap(err, \"scan API: log\"))\n\t\treturn\n\t}\n\n\tif bytes == nil {\n\t\t// Not found\n\t\tsa.SendNotFoundError(errors.Errorf(\"report with uuid %s does not exist\", uuid))\n\t\treturn\n\t}\n\n\tsa.Ctx.ResponseWriter.Header().Set(http.CanonicalHeaderKey(\"Content-Length\"), strconv.Itoa(len(bytes)))\n\tsa.Ctx.ResponseWriter.Header().Set(http.CanonicalHeaderKey(\"Content-Type\"), \"text/plain\")\n\t_, err = sa.Ctx.ResponseWriter.Write(bytes)\n\tif err != nil {\n\t\tsa.SendInternalServerError(errors.Wrap(err, \"scan API: log\"))\n\t}\n}", "func (cmd *JobLogs) Synopsis() string { return \"Return logs for a running job.\" }", "func(c *HermesClient) ObserveSummary(metricName string, labels map[string]string, observation float64) {\n log.Debug(fmt.Sprintf(\"setting observation on histogram %s\", metricName))\n packet := HermesSummaryPacket{\n MetricName: metricName,\n Payload: HermesSummaryPayload{\n SummaryLabels: labels,\n SummaryObservation: observation,\n },\n }\n c.SendUDPPacket(packet)\n}", "func (s *AliCloudSlsLogstorage) parseLog(req *bindings.InvokeRequest) (*sls.Log, error) {\n\tvar logInfo map[string]string\n\terr := json.Unmarshal(req.Data, &logInfo)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn producer.GenerateLog(uint32(time.Now().Unix()), logInfo), nil\n}", "func GetShotCount(countData data.CountObject) {\n\n\t// TODO: Stuff idToken in countData; right now idToken is in AccelerometerData which makes this difficult\n\temail := countData.Request.URL.Query().Get(\"email\")\n\n\t// Create DB session\n\tsession, err := mgo.Dial(\"mongodb://main_admin:abc123@mongodb-service\")\n\tdefer session.Close()\n\tif err != nil {\n\t\t// TODO: What do we return to the user here?\n\t\tfmt.Println(\"Error dialing mongodb: \" + err.Error())\n\t}\n\n\tcolQuerier := bson.M{\"email\": email}\n\tfmt.Println(colQuerier)\n\tuser := types.User{}\n\t// Error check here?? TODO: Stop using test database\n\n\tusersCollection := session.DB(\"test\").C(\"users\")\n\tif err != nil {\n\t\tfmt.Println(\"Error getting collection from db: \" + err.Error())\n\t} else {\n\t\terr = usersCollection.Find(colQuerier).One(&user)\n\t\tif err != nil {\n\t\t\tfmt.Println(\"Error finding user: \" + err.Error())\n\t\t\tcountData.Writer.WriteHeader(http.StatusNotFound)\n\t\t\ttypes.SetupAndroidResponse(countData.Writer, \"Error: email either not supplied or not found\", -1)\n\t\t\treturn\n\t\t}\n\n\t\tcountData.Writer.WriteHeader(http.StatusOK)\n\t\ttypes.SetupAndroidResponse(countData.Writer, \"\", user.DailyCount)\n\n\t}\n}", "func (c *analysisRunCollector) Describe(ch chan<- *prometheus.Desc) {\n\tch <- descAnalysisRunInfo\n}", "func (logstash *Logstash) gatherPipelinesStats(address string, accumulator telegraf.Accumulator) error {\n\tpipelinesStats := &PipelinesStats{}\n\n\terr := logstash.gatherJSONData(address, pipelinesStats)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor pipelineName, pipeline := range pipelinesStats.Pipelines {\n\t\ttags := map[string]string{\n\t\t\t\"node_id\": pipelinesStats.ID,\n\t\t\t\"node_name\": pipelinesStats.Name,\n\t\t\t\"node_version\": pipelinesStats.Version,\n\t\t\t\"pipeline\": pipelineName,\n\t\t\t\"source\": pipelinesStats.Host,\n\t\t}\n\n\t\tflattener := jsonParser.JSONFlattener{}\n\t\terr := flattener.FlattenJSON(\"\", pipeline.Events)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\taccumulator.AddFields(\"logstash_events\", flattener.Fields, tags)\n\n\t\terr = logstash.gatherPluginsStats(pipeline.Plugins.Inputs, \"input\", tags, accumulator)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\terr = logstash.gatherPluginsStats(pipeline.Plugins.Filters, \"filter\", tags, accumulator)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\terr = logstash.gatherPluginsStats(pipeline.Plugins.Outputs, \"output\", tags, accumulator)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\terr = logstash.gatherQueueStats(&pipeline.Queue, tags, accumulator)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "func (cc *Chaincode) addBriefReport(stub shim.ChaincodeStubInterface, params []string) sc.Response {\n\t// Check Access\n\tcreatorOrg, creatorCertIssuer, err := getTxCreatorInfo(stub)\n\tif !authenticatePolice(creatorOrg, creatorCertIssuer) {\n\t\treturn shim.Error(\"{\\\"Error\\\":\\\"Access Denied!\\\",\\\"Payload\\\":{\\\"MSP\\\":\\\"\" + creatorOrg + \"\\\",\\\"CA\\\":\\\"\" + creatorCertIssuer + \"\\\"}}\")\n\t}\n\n\t// Check if sufficient Params passed\n\tif len(params) < 2 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 2+!\")\n\t}\n\n\t// Check if Params are non-empty\n\tfor a := 0; a < len(params); a++ {\n\t\tif len(params[a]) <= 0 {\n\t\t\treturn shim.Error(\"Argument must be a non-empty string\")\n\t\t}\n\t}\n\n\t// Copy the Values from params[]\n\tID := params[0]\n\tContent := params[1]\n\tvar Documents []string\n\tfor a := 2; a < len(params); a++ {\n\t\tDocuments = append(Documents, params[a])\n\t}\n\n\tNewReport := briefReport{Content, Documents}\n\n\t// Check if ChargeSheet exists with Key => ID\n\tchargeSheetAsBytes, err := stub.GetState(ID)\n\tif err != nil {\n\t\treturn shim.Error(\"Failed to get ChargeSheet Details!\")\n\t} else if chargeSheetAsBytes == nil {\n\t\treturn shim.Error(\"Error: ChargeSheet Does NOT Exist!\")\n\t}\n\n\t// Create Update struct var\n\tchargeSheetToUpdate := chargeSheet{}\n\terr = json.Unmarshal(chargeSheetAsBytes, &chargeSheetToUpdate) //unmarshal it aka JSON.parse()\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\t// Check if Judgement is Complete or NOT\n\tif chargeSheetToUpdate.Complete {\n\t\treturn shim.Error(\"Error: ChargeSheet is Complete & Locked!\")\n\t}\n\n\t// Update ChargeSheet.BriefReport to append => NewReport\n\tchargeSheetToUpdate.BriefReport = append(chargeSheetToUpdate.BriefReport, NewReport)\n\n\t// Convert to JSON bytes\n\tchargeSheetJSONasBytes, err := json.Marshal(chargeSheetToUpdate)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\t// Put State of newly generated ChargeSheet with Key => ID\n\terr = stub.PutState(ID, chargeSheetJSONasBytes)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\t// Returned on successful execution of the function\n\treturn shim.Success(chargeSheetJSONasBytes)\n}", "func (d *Data)AddJob() int {\n id := d.nextJobId()\n mutex.Lock()\n d.hashMap[id] = \"\"\n d.inProgressCount++\n mutex.Unlock()\n return id\n}" ]
[ "0.520219", "0.5096066", "0.49444863", "0.49327755", "0.49029458", "0.48795292", "0.4843131", "0.4835675", "0.48325625", "0.48236704", "0.48206684", "0.48148066", "0.47791404", "0.47764066", "0.47386143", "0.47284365", "0.4715265", "0.45954895", "0.45950916", "0.45742205", "0.4549904", "0.45490095", "0.45379853", "0.45350677", "0.45208272", "0.4510638", "0.44907182", "0.4478261", "0.44766286", "0.44745326", "0.44665483", "0.44566256", "0.44539732", "0.4448574", "0.44466794", "0.4444996", "0.44420674", "0.44400916", "0.44233832", "0.44123757", "0.44089007", "0.43919554", "0.437023", "0.43682", "0.4362961", "0.43520224", "0.43425402", "0.4336873", "0.4329003", "0.4323968", "0.43179283", "0.43136016", "0.43095195", "0.43094614", "0.43059176", "0.43040907", "0.43036577", "0.43020737", "0.43018836", "0.4299984", "0.42982548", "0.4296025", "0.42886603", "0.42818785", "0.42749286", "0.42735463", "0.42731208", "0.42709258", "0.42650336", "0.4263804", "0.42626223", "0.42606023", "0.42526013", "0.42492276", "0.42473733", "0.42445737", "0.4240596", "0.4238747", "0.42362761", "0.42351657", "0.42328522", "0.42262384", "0.4224859", "0.4220108", "0.42163837", "0.4210999", "0.42090246", "0.41983354", "0.41967437", "0.41854966", "0.41850594", "0.4184263", "0.41825834", "0.41783512", "0.41623163", "0.41578418", "0.41544122", "0.41526347", "0.41513953", "0.41496694" ]
0.64499515
0
XXX_OneofWrappers is for the internal use of the proto package.
func (*Request) XXX_OneofWrappers() []interface{} { return []interface{}{ (*Request_Echo)(nil), (*Request_Flush)(nil), (*Request_Info)(nil), (*Request_SetOption)(nil), (*Request_InitChain)(nil), (*Request_Query)(nil), (*Request_BeginBlock)(nil), (*Request_CheckTx)(nil), (*Request_DeliverTx)(nil), (*Request_EndBlock)(nil), (*Request_Commit)(nil), } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (*DRB) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*DRB_NotUsed)(nil),\n\t\t(*DRB_Rohc)(nil),\n\t\t(*DRB_UplinkOnlyROHC)(nil),\n\t}\n}", "func (*Interface) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Interface_Sub)(nil),\n\t\t(*Interface_Memif)(nil),\n\t\t(*Interface_Afpacket)(nil),\n\t\t(*Interface_Tap)(nil),\n\t\t(*Interface_Vxlan)(nil),\n\t\t(*Interface_Ipsec)(nil),\n\t\t(*Interface_VmxNet3)(nil),\n\t\t(*Interface_Bond)(nil),\n\t\t(*Interface_Gre)(nil),\n\t\t(*Interface_Gtpu)(nil),\n\t}\n}", "func (*TwoOneofs) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TwoOneofs_Field1)(nil),\n\t\t(*TwoOneofs_Field2)(nil),\n\t\t(*TwoOneofs_Field3)(nil),\n\t\t(*TwoOneofs_Field34)(nil),\n\t\t(*TwoOneofs_Field35)(nil),\n\t\t(*TwoOneofs_SubMessage2)(nil),\n\t}\n}", "func (*TwoOneofs) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TwoOneofs_Field1)(nil),\n\t\t(*TwoOneofs_Field2)(nil),\n\t\t(*TwoOneofs_Field3)(nil),\n\t\t(*TwoOneofs_Field34)(nil),\n\t\t(*TwoOneofs_Field35)(nil),\n\t\t(*TwoOneofs_SubMessage2)(nil),\n\t}\n}", "func (*TwoOneofs) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TwoOneofs_Field1)(nil),\n\t\t(*TwoOneofs_Field2)(nil),\n\t\t(*TwoOneofs_Field3)(nil),\n\t\t(*TwoOneofs_Field34)(nil),\n\t\t(*TwoOneofs_Field35)(nil),\n\t\t(*TwoOneofs_SubMessage2)(nil),\n\t}\n}", "func (*TwoOneofs) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TwoOneofs_Field1)(nil),\n\t\t(*TwoOneofs_Field2)(nil),\n\t\t(*TwoOneofs_Field3)(nil),\n\t\t(*TwoOneofs_Field34)(nil),\n\t\t(*TwoOneofs_Field35)(nil),\n\t\t(*TwoOneofs_SubMessage2)(nil),\n\t}\n}", "func (*Layer7) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Layer7_Dns)(nil),\n\t\t(*Layer7_Http)(nil),\n\t\t(*Layer7_Kafka)(nil),\n\t}\n}", "func (*Layer7) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Layer7_Dns)(nil),\n\t\t(*Layer7_Http)(nil),\n\t\t(*Layer7_Kafka)(nil),\n\t}\n}", "func (*Message) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Message_NewRoundStep)(nil),\n\t\t(*Message_NewValidBlock)(nil),\n\t\t(*Message_Proposal)(nil),\n\t\t(*Message_ProposalPol)(nil),\n\t\t(*Message_BlockPart)(nil),\n\t\t(*Message_Vote)(nil),\n\t\t(*Message_HasVote)(nil),\n\t\t(*Message_VoteSetMaj23)(nil),\n\t\t(*Message_VoteSetBits)(nil),\n\t}\n}", "func (*GroupMod) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GroupMod_L2Iface)(nil),\n\t\t(*GroupMod_L3Unicast)(nil),\n\t\t(*GroupMod_MplsIface)(nil),\n\t\t(*GroupMod_MplsLabel)(nil),\n\t}\n}", "func (*Layer4) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Layer4_TCP)(nil),\n\t\t(*Layer4_UDP)(nil),\n\t\t(*Layer4_ICMPv4)(nil),\n\t\t(*Layer4_ICMPv6)(nil),\n\t}\n}", "func (*Layer4) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Layer4_TCP)(nil),\n\t\t(*Layer4_UDP)(nil),\n\t\t(*Layer4_ICMPv4)(nil),\n\t\t(*Layer4_ICMPv6)(nil),\n\t}\n}", "func (*Message) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Message_Init)(nil),\n\t\t(*Message_File)(nil),\n\t\t(*Message_Resize)(nil),\n\t\t(*Message_Signal)(nil),\n\t}\n}", "func (*Example) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Example_A)(nil),\n\t\t(*Example_BJk)(nil),\n\t}\n}", "func (*ExampleMsg) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ExampleMsg_SomeString)(nil),\n\t\t(*ExampleMsg_SomeNumber)(nil),\n\t\t(*ExampleMsg_SomeBool)(nil),\n\t}\n}", "func (*WALMessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*WALMessage_EventDataRoundState)(nil),\n\t\t(*WALMessage_MsgInfo)(nil),\n\t\t(*WALMessage_TimeoutInfo)(nil),\n\t\t(*WALMessage_EndHeight)(nil),\n\t}\n}", "func (*Modulation) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Modulation_Lora)(nil),\n\t\t(*Modulation_Fsk)(nil),\n\t\t(*Modulation_LrFhss)(nil),\n\t}\n}", "func (*TestVersion2) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TestVersion2_E)(nil),\n\t\t(*TestVersion2_F)(nil),\n\t}\n}", "func (*TestVersion1) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TestVersion1_E)(nil),\n\t\t(*TestVersion1_F)(nil),\n\t}\n}", "func (*CodebookType_Type1) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*CodebookType_Type1_TypeI_SinglePanel)(nil),\n\t\t(*CodebookType_Type1_TypeI_MultiPanell)(nil),\n\t}\n}", "func (*DRB_ToAddMod) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*DRB_ToAddMod_Eps_BearerIdentity)(nil),\n\t\t(*DRB_ToAddMod_Sdap_Config)(nil),\n\t}\n}", "func (*TestVersion3) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TestVersion3_E)(nil),\n\t\t(*TestVersion3_F)(nil),\n\t}\n}", "func (*Bitmaps) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Bitmaps_OneSlot)(nil),\n\t\t(*Bitmaps_TwoSlots)(nil),\n\t\t(*Bitmaps_N2)(nil),\n\t\t(*Bitmaps_N4)(nil),\n\t\t(*Bitmaps_N5)(nil),\n\t\t(*Bitmaps_N8)(nil),\n\t\t(*Bitmaps_N10)(nil),\n\t\t(*Bitmaps_N20)(nil),\n\t\t(*Bitmaps_N40)(nil),\n\t}\n}", "func (*Bit) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Bit_DecimalValue)(nil),\n\t\t(*Bit_LongValue)(nil),\n\t}\n}", "func (*SeldonMessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*SeldonMessage_Data)(nil),\n\t\t(*SeldonMessage_BinData)(nil),\n\t\t(*SeldonMessage_StrData)(nil),\n\t\t(*SeldonMessage_JsonData)(nil),\n\t\t(*SeldonMessage_CustomData)(nil),\n\t}\n}", "func (*TestVersionFD1) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TestVersionFD1_E)(nil),\n\t\t(*TestVersionFD1_F)(nil),\n\t}\n}", "func (*Message) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Message_Pubkey)(nil),\n\t\t(*Message_EncK)(nil),\n\t\t(*Message_Mta)(nil),\n\t\t(*Message_Delta)(nil),\n\t\t(*Message_ProofAi)(nil),\n\t\t(*Message_CommitViAi)(nil),\n\t\t(*Message_DecommitViAi)(nil),\n\t\t(*Message_CommitUiTi)(nil),\n\t\t(*Message_DecommitUiTi)(nil),\n\t\t(*Message_Si)(nil),\n\t}\n}", "func (*TestUnit) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TestUnit_GceTestCfg)(nil),\n\t\t(*TestUnit_HwTestCfg)(nil),\n\t\t(*TestUnit_MoblabVmTestCfg)(nil),\n\t\t(*TestUnit_TastVmTestCfg)(nil),\n\t\t(*TestUnit_VmTestCfg)(nil),\n\t}\n}", "func (*Tag) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Tag_DecimalValue)(nil),\n\t\t(*Tag_LongValue)(nil),\n\t\t(*Tag_StringValue)(nil),\n\t}\n}", "func (*Record) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Record_Local_)(nil),\n\t\t(*Record_Ledger_)(nil),\n\t\t(*Record_Multi_)(nil),\n\t\t(*Record_Offline_)(nil),\n\t}\n}", "func (*GeneratedObject) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GeneratedObject_DestinationRule)(nil),\n\t\t(*GeneratedObject_EnvoyFilter)(nil),\n\t\t(*GeneratedObject_ServiceEntry)(nil),\n\t\t(*GeneratedObject_VirtualService)(nil),\n\t}\n}", "func (*Packet) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Packet_Deal)(nil),\n\t\t(*Packet_Response)(nil),\n\t\t(*Packet_Justification)(nil),\n\t}\n}", "func (*Response) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Response_ImageVersion)(nil),\n\t\t(*Response_ErrorDescription)(nil),\n\t}\n}", "func (*FlowMod) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*FlowMod_Vlan)(nil),\n\t\t(*FlowMod_TermMac)(nil),\n\t\t(*FlowMod_Mpls1)(nil),\n\t\t(*FlowMod_Unicast)(nil),\n\t\t(*FlowMod_Bridging)(nil),\n\t\t(*FlowMod_Acl)(nil),\n\t}\n}", "func (*MFADevice) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*MFADevice_Totp)(nil),\n\t\t(*MFADevice_U2F)(nil),\n\t}\n}", "func (*MFADevice) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*MFADevice_Totp)(nil),\n\t\t(*MFADevice_U2F)(nil),\n\t}\n}", "func (*MFADevice) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*MFADevice_Totp)(nil),\n\t\t(*MFADevice_U2F)(nil),\n\t}\n}", "func (*P4Data) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*P4Data_Bitstring)(nil),\n\t\t(*P4Data_Varbit)(nil),\n\t\t(*P4Data_Bool)(nil),\n\t\t(*P4Data_Tuple)(nil),\n\t\t(*P4Data_Struct)(nil),\n\t\t(*P4Data_Header)(nil),\n\t\t(*P4Data_HeaderUnion)(nil),\n\t\t(*P4Data_HeaderStack)(nil),\n\t\t(*P4Data_HeaderUnionStack)(nil),\n\t\t(*P4Data_Enum)(nil),\n\t\t(*P4Data_Error)(nil),\n\t\t(*P4Data_EnumValue)(nil),\n\t}\n}", "func (*SSB_ConfigMobility) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*SSB_ConfigMobility_ReleaseSsb_ToMeasure)(nil),\n\t\t(*SSB_ConfigMobility_SetupSsb_ToMeasure)(nil),\n\t}\n}", "func (*SpCellConfig) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*SpCellConfig_ReleaseRlf_TimersAndConstants)(nil),\n\t\t(*SpCellConfig_SetupRlf_TimersAndConstants)(nil),\n\t}\n}", "func (*ServerMessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ServerMessage_State)(nil),\n\t\t(*ServerMessage_Runtime)(nil),\n\t\t(*ServerMessage_Event)(nil),\n\t\t(*ServerMessage_Response)(nil),\n\t\t(*ServerMessage_Notice)(nil),\n\t}\n}", "func (*ParaP2PSubMsg) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ParaP2PSubMsg_CommitTx)(nil),\n\t\t(*ParaP2PSubMsg_SyncMsg)(nil),\n\t}\n}", "func (*ServerAuctionMessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ServerAuctionMessage_Challenge)(nil),\n\t\t(*ServerAuctionMessage_Success)(nil),\n\t\t(*ServerAuctionMessage_Error)(nil),\n\t\t(*ServerAuctionMessage_Prepare)(nil),\n\t\t(*ServerAuctionMessage_Sign)(nil),\n\t\t(*ServerAuctionMessage_Finalize)(nil),\n\t\t(*ServerAuctionMessage_Account)(nil),\n\t}\n}", "func (*Body) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Body_AsBytes)(nil),\n\t\t(*Body_AsString)(nil),\n\t}\n}", "func (*TagField) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TagField_DoubleValue)(nil),\n\t\t(*TagField_StringValue)(nil),\n\t\t(*TagField_BoolValue)(nil),\n\t\t(*TagField_TimestampValue)(nil),\n\t\t(*TagField_EnumValue_)(nil),\n\t}\n}", "func (*DatasetVersion) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*DatasetVersion_RawDatasetVersionInfo)(nil),\n\t\t(*DatasetVersion_PathDatasetVersionInfo)(nil),\n\t\t(*DatasetVersion_QueryDatasetVersionInfo)(nil),\n\t}\n}", "func (*GatewayMsg) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GatewayMsg_Demand)(nil),\n\t\t(*GatewayMsg_Supply)(nil),\n\t\t(*GatewayMsg_Target)(nil),\n\t\t(*GatewayMsg_Mbus)(nil),\n\t\t(*GatewayMsg_MbusMsg)(nil),\n\t}\n}", "func (*Message) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Message_Chunk)(nil),\n\t\t(*Message_Status)(nil),\n\t\t(*Message_Response)(nil),\n\t}\n}", "func (*BlobDiff) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*BlobDiff_Dataset)(nil),\n\t\t(*BlobDiff_Environment)(nil),\n\t\t(*BlobDiff_Code)(nil),\n\t\t(*BlobDiff_Config)(nil),\n\t}\n}", "func (*BlobDiff) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*BlobDiff_Dataset)(nil),\n\t\t(*BlobDiff_Environment)(nil),\n\t\t(*BlobDiff_Code)(nil),\n\t\t(*BlobDiff_Config)(nil),\n\t}\n}", "func (*BlobDiff) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*BlobDiff_Dataset)(nil),\n\t\t(*BlobDiff_Environment)(nil),\n\t\t(*BlobDiff_Code)(nil),\n\t\t(*BlobDiff_Config)(nil),\n\t}\n}", "func (*DataType) XXX_OneofWrappers() []interface{} {\r\n\treturn []interface{}{\r\n\t\t(*DataType_ListElementType)(nil),\r\n\t\t(*DataType_StructType)(nil),\r\n\t\t(*DataType_TimeFormat)(nil),\r\n\t}\r\n}", "func (*Message) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Message_Prepare)(nil),\n\t\t(*Message_Promise)(nil),\n\t\t(*Message_Accept)(nil),\n\t\t(*Message_Accepted)(nil),\n\t\t(*Message_Alert)(nil),\n\t}\n}", "func (*BWP_DownlinkCommon) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*BWP_DownlinkCommon_ReleasePdcch_ConfigCommon)(nil),\n\t\t(*BWP_DownlinkCommon_SetupPdcch_ConfigCommon)(nil),\n\t\t(*BWP_DownlinkCommon_ReleasePdsch_ConfigCommon)(nil),\n\t\t(*BWP_DownlinkCommon_SetupPdsch_ConfigCommon)(nil),\n\t}\n}", "func (*Test) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Test_Get)(nil),\n\t\t(*Test_Create)(nil),\n\t\t(*Test_Set)(nil),\n\t\t(*Test_Update)(nil),\n\t\t(*Test_UpdatePaths)(nil),\n\t\t(*Test_Delete)(nil),\n\t\t(*Test_Query)(nil),\n\t\t(*Test_Listen)(nil),\n\t}\n}", "func (*DownlinkTXInfo) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*DownlinkTXInfo_LoraModulationInfo)(nil),\n\t\t(*DownlinkTXInfo_FskModulationInfo)(nil),\n\t\t(*DownlinkTXInfo_ImmediatelyTimingInfo)(nil),\n\t\t(*DownlinkTXInfo_DelayTimingInfo)(nil),\n\t\t(*DownlinkTXInfo_GpsEpochTimingInfo)(nil),\n\t}\n}", "func (*RpcMessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*RpcMessage_RequestHeader)(nil),\n\t\t(*RpcMessage_ResponseHeader)(nil),\n\t}\n}", "func (*Domain_Attribute) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Domain_Attribute_BoolValue)(nil),\n\t\t(*Domain_Attribute_IntValue)(nil),\n\t}\n}", "func (*CellStatusResp) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*CellStatusResp_CellStatus)(nil),\n\t\t(*CellStatusResp_ErrorMsg)(nil),\n\t}\n}", "func (*ClientAuctionMessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ClientAuctionMessage_Commit)(nil),\n\t\t(*ClientAuctionMessage_Subscribe)(nil),\n\t\t(*ClientAuctionMessage_Accept)(nil),\n\t\t(*ClientAuctionMessage_Reject)(nil),\n\t\t(*ClientAuctionMessage_Sign)(nil),\n\t\t(*ClientAuctionMessage_Recover)(nil),\n\t}\n}", "func (*GrpcService) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GrpcService_EnvoyGrpc_)(nil),\n\t\t(*GrpcService_GoogleGrpc_)(nil),\n\t}\n}", "func (*GrpcService) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GrpcService_EnvoyGrpc_)(nil),\n\t\t(*GrpcService_GoogleGrpc_)(nil),\n\t}\n}", "func (*GrpcService) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GrpcService_EnvoyGrpc_)(nil),\n\t\t(*GrpcService_GoogleGrpc_)(nil),\n\t}\n}", "func (*GrpcService) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GrpcService_EnvoyGrpc_)(nil),\n\t\t(*GrpcService_GoogleGrpc_)(nil),\n\t}\n}", "func (*GrpcService) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GrpcService_EnvoyGrpc_)(nil),\n\t\t(*GrpcService_GoogleGrpc_)(nil),\n\t}\n}", "func (*GrpcService) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GrpcService_EnvoyGrpc_)(nil),\n\t\t(*GrpcService_GoogleGrpc_)(nil),\n\t}\n}", "func (*Replay) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Replay_Http)(nil),\n\t\t(*Replay_Sqs)(nil),\n\t\t(*Replay_Amqp)(nil),\n\t\t(*Replay_Kafka)(nil),\n\t}\n}", "func (*ReportConfigInterRAT) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ReportConfigInterRAT_Periodical)(nil),\n\t\t(*ReportConfigInterRAT_EventTriggered)(nil),\n\t\t(*ReportConfigInterRAT_ReportCGI)(nil),\n\t}\n}", "func (*Class) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Class_PerInstance)(nil),\n\t\t(*Class_Lumpsum)(nil),\n\t}\n}", "func (*OneOfMessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*OneOfMessage_BinaryValue)(nil),\n\t\t(*OneOfMessage_StringValue)(nil),\n\t\t(*OneOfMessage_BooleanValue)(nil),\n\t\t(*OneOfMessage_IntValue)(nil),\n\t\t(*OneOfMessage_Int64Value)(nil),\n\t\t(*OneOfMessage_DoubleValue)(nil),\n\t\t(*OneOfMessage_FloatValue)(nil),\n\t\t(*OneOfMessage_MsgValue)(nil),\n\t}\n}", "func (*ServiceSpec) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ServiceSpec_Replicated)(nil),\n\t\t(*ServiceSpec_Global)(nil),\n\t\t(*ServiceSpec_ReplicatedJob)(nil),\n\t\t(*ServiceSpec_GlobalJob)(nil),\n\t}\n}", "func (*ReceiveReply) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ReceiveReply_Record_)(nil),\n\t\t(*ReceiveReply_LiiklusEventRecord_)(nil),\n\t}\n}", "func (*Message) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Message_PexRequest)(nil),\n\t\t(*Message_PexAddrs)(nil),\n\t}\n}", "func (*ChangeResponse) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ChangeResponse_Ok)(nil),\n\t\t(*ChangeResponse_Error)(nil),\n\t}\n}", "func (*Message) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Message_ExecStarted)(nil),\n\t\t(*Message_ExecCompleted)(nil),\n\t\t(*Message_ExecOutput)(nil),\n\t\t(*Message_LogEntry)(nil),\n\t\t(*Message_Error)(nil),\n\t}\n}", "func (*HealthCheck_Payload) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*HealthCheck_Payload_Text)(nil),\n\t\t(*HealthCheck_Payload_Binary)(nil),\n\t}\n}", "func (*HealthCheck_Payload) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*HealthCheck_Payload_Text)(nil),\n\t\t(*HealthCheck_Payload_Binary)(nil),\n\t}\n}", "func (*HealthCheck_Payload) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*HealthCheck_Payload_Text)(nil),\n\t\t(*HealthCheck_Payload_Binary)(nil),\n\t}\n}", "func (*HealthCheck_Payload) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*HealthCheck_Payload_Text)(nil),\n\t\t(*HealthCheck_Payload_Binary)(nil),\n\t}\n}", "func (*RequestCreateGame) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*RequestCreateGame_LocalMap)(nil),\n\t\t(*RequestCreateGame_BattlenetMapName)(nil),\n\t}\n}", "func (*CellStatusReq) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*CellStatusReq_IsPlayer)(nil),\n\t\t(*CellStatusReq_CellStatus)(nil),\n\t}\n}", "func (*Message) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Message_Request)(nil),\n\t\t(*Message_Response)(nil),\n\t}\n}", "func (*CreateDatasetVersion) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*CreateDatasetVersion_RawDatasetVersionInfo)(nil),\n\t\t(*CreateDatasetVersion_PathDatasetVersionInfo)(nil),\n\t\t(*CreateDatasetVersion_QueryDatasetVersionInfo)(nil),\n\t}\n}", "func (*InputMessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*InputMessage_Init)(nil),\n\t\t(*InputMessage_Data)(nil),\n\t}\n}", "func (*UplinkTXInfo) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*UplinkTXInfo_LoraModulationInfo)(nil),\n\t\t(*UplinkTXInfo_FskModulationInfo)(nil),\n\t\t(*UplinkTXInfo_LrFhssModulationInfo)(nil),\n\t}\n}", "func (*APool) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*APool_DisableHealthCheck)(nil),\n\t\t(*APool_HealthCheck)(nil),\n\t}\n}", "func (*BWP_UplinkCommon) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*BWP_UplinkCommon_ReleaseRach_ConfigCommon)(nil),\n\t\t(*BWP_UplinkCommon_SetupRach_ConfigCommon)(nil),\n\t\t(*BWP_UplinkCommon_ReleasePusch_ConfigCommon)(nil),\n\t\t(*BWP_UplinkCommon_SetupPusch_ConfigCommon)(nil),\n\t\t(*BWP_UplinkCommon_ReleasePucch_ConfigCommon)(nil),\n\t\t(*BWP_UplinkCommon_SetupPucch_ConfigCommon)(nil),\n\t}\n}", "func (*M) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*M_OneofInt32)(nil),\n\t\t(*M_OneofInt64)(nil),\n\t}\n}", "func (*LoadParams) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*LoadParams_ClosedLoop)(nil),\n\t\t(*LoadParams_Poisson)(nil),\n\t}\n}", "func (*TestnetPacketData) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TestnetPacketData_NoData)(nil),\n\t\t(*TestnetPacketData_FooPacket)(nil),\n\t}\n}", "func (*M_Submessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*M_Submessage_SubmessageOneofInt32)(nil),\n\t\t(*M_Submessage_SubmessageOneofInt64)(nil),\n\t}\n}", "func (*CodebookSubType_MultiPanel) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*CodebookSubType_MultiPanel_TwoTwoOne_TypeI_MultiPanel_Restriction)(nil),\n\t\t(*CodebookSubType_MultiPanel_TwoFourOne_TypeI_MultiPanel_Restriction)(nil),\n\t\t(*CodebookSubType_MultiPanel_FourTwoOne_TypeI_MultiPanel_Restriction)(nil),\n\t\t(*CodebookSubType_MultiPanel_TwoTwoTwo_TypeI_MultiPanel_Restriction)(nil),\n\t\t(*CodebookSubType_MultiPanel_TwoEightOne_TypeI_MultiPanel_Restriction)(nil),\n\t\t(*CodebookSubType_MultiPanel_FourFourOne_TypeI_MultiPanel_Restriction)(nil),\n\t\t(*CodebookSubType_MultiPanel_TwoFourTwo_TypeI_MultiPanel_Restriction)(nil),\n\t\t(*CodebookSubType_MultiPanel_FourTwoTwo_TypeI_MultiPanel_Restriction)(nil),\n\t}\n}", "func (*Packet) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Packet_PacketPing)(nil),\n\t\t(*Packet_PacketPong)(nil),\n\t\t(*Packet_PacketMsg)(nil),\n\t}\n}", "func (*MetricsData) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*MetricsData_BoolValue)(nil),\n\t\t(*MetricsData_StringValue)(nil),\n\t\t(*MetricsData_Int64Value)(nil),\n\t\t(*MetricsData_DoubleValue)(nil),\n\t\t(*MetricsData_DistributionValue)(nil),\n\t}\n}", "func (*FieldType) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*FieldType_PrimitiveType_)(nil),\n\t\t(*FieldType_EnumType_)(nil),\n\t}\n}", "func (*InstructionResponse) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*InstructionResponse_Register)(nil),\n\t\t(*InstructionResponse_ProcessBundle)(nil),\n\t\t(*InstructionResponse_ProcessBundleProgress)(nil),\n\t\t(*InstructionResponse_ProcessBundleSplit)(nil),\n\t\t(*InstructionResponse_FinalizeBundle)(nil),\n\t}\n}", "func (*OpenStatusUpdate) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*OpenStatusUpdate_ChanPending)(nil),\n\t\t(*OpenStatusUpdate_ChanOpen)(nil),\n\t\t(*OpenStatusUpdate_PsbtFund)(nil),\n\t}\n}", "func (*OpenStatusUpdate) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*OpenStatusUpdate_ChanPending)(nil),\n\t\t(*OpenStatusUpdate_ChanOpen)(nil),\n\t\t(*OpenStatusUpdate_PsbtFund)(nil),\n\t}\n}", "func (*OpenStatusUpdate) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*OpenStatusUpdate_ChanPending)(nil),\n\t\t(*OpenStatusUpdate_ChanOpen)(nil),\n\t\t(*OpenStatusUpdate_PsbtFund)(nil),\n\t}\n}", "func (*Tracing) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Tracing_Zipkin_)(nil),\n\t\t(*Tracing_Lightstep_)(nil),\n\t\t(*Tracing_Datadog_)(nil),\n\t\t(*Tracing_Stackdriver_)(nil),\n\t}\n}", "func (*DynamicReplay) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*DynamicReplay_AuthRequest)(nil),\n\t\t(*DynamicReplay_AuthResponse)(nil),\n\t\t(*DynamicReplay_OutboundMessage)(nil),\n\t\t(*DynamicReplay_ReplayMessage)(nil),\n\t}\n}" ]
[ "0.88214165", "0.88021713", "0.8743008", "0.8743008", "0.8743008", "0.8743008", "0.8717406", "0.8717406", "0.8714167", "0.8713824", "0.8700613", "0.8700613", "0.87001115", "0.86874217", "0.86787724", "0.8675455", "0.8672273", "0.86698306", "0.8665908", "0.86512536", "0.8646821", "0.86386365", "0.86342514", "0.86329716", "0.863169", "0.8628287", "0.86180717", "0.8614283", "0.86121434", "0.86077875", "0.86043906", "0.8599478", "0.8591721", "0.85891396", "0.8585715", "0.8585715", "0.8585715", "0.85808307", "0.85788", "0.8578621", "0.85712314", "0.85646266", "0.85642725", "0.8562125", "0.85597765", "0.85593873", "0.8556165", "0.855444", "0.85466284", "0.85466284", "0.85466284", "0.8544794", "0.8544425", "0.85434425", "0.8543189", "0.8542546", "0.8541232", "0.85399264", "0.85389084", "0.85375434", "0.8535147", "0.8535147", "0.8535147", "0.8535147", "0.8535147", "0.8535147", "0.85265565", "0.85229486", "0.85182756", "0.85167336", "0.8515576", "0.8515508", "0.85137737", "0.85115725", "0.85110307", "0.85106057", "0.85106057", "0.85106057", "0.85106057", "0.8505778", "0.8503764", "0.85026187", "0.8500881", "0.8497405", "0.84928215", "0.84917736", "0.84903145", "0.84880537", "0.84871894", "0.84863424", "0.8485251", "0.8484042", "0.8483205", "0.8482806", "0.84800684", "0.8479984", "0.847473", "0.847473", "0.847473", "0.8472139", "0.847054" ]
0.0
-1
XXX_OneofWrappers is for the internal use of the proto package.
func (*Response) XXX_OneofWrappers() []interface{} { return []interface{}{ (*Response_Exception)(nil), (*Response_Echo)(nil), (*Response_Flush)(nil), (*Response_Info)(nil), (*Response_SetOption)(nil), (*Response_InitChain)(nil), (*Response_Query)(nil), (*Response_BeginBlock)(nil), (*Response_CheckTx)(nil), (*Response_DeliverTx)(nil), (*Response_EndBlock)(nil), (*Response_Commit)(nil), } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (*DRB) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*DRB_NotUsed)(nil),\n\t\t(*DRB_Rohc)(nil),\n\t\t(*DRB_UplinkOnlyROHC)(nil),\n\t}\n}", "func (*Interface) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Interface_Sub)(nil),\n\t\t(*Interface_Memif)(nil),\n\t\t(*Interface_Afpacket)(nil),\n\t\t(*Interface_Tap)(nil),\n\t\t(*Interface_Vxlan)(nil),\n\t\t(*Interface_Ipsec)(nil),\n\t\t(*Interface_VmxNet3)(nil),\n\t\t(*Interface_Bond)(nil),\n\t\t(*Interface_Gre)(nil),\n\t\t(*Interface_Gtpu)(nil),\n\t}\n}", "func (*TwoOneofs) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TwoOneofs_Field1)(nil),\n\t\t(*TwoOneofs_Field2)(nil),\n\t\t(*TwoOneofs_Field3)(nil),\n\t\t(*TwoOneofs_Field34)(nil),\n\t\t(*TwoOneofs_Field35)(nil),\n\t\t(*TwoOneofs_SubMessage2)(nil),\n\t}\n}", "func (*TwoOneofs) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TwoOneofs_Field1)(nil),\n\t\t(*TwoOneofs_Field2)(nil),\n\t\t(*TwoOneofs_Field3)(nil),\n\t\t(*TwoOneofs_Field34)(nil),\n\t\t(*TwoOneofs_Field35)(nil),\n\t\t(*TwoOneofs_SubMessage2)(nil),\n\t}\n}", "func (*TwoOneofs) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TwoOneofs_Field1)(nil),\n\t\t(*TwoOneofs_Field2)(nil),\n\t\t(*TwoOneofs_Field3)(nil),\n\t\t(*TwoOneofs_Field34)(nil),\n\t\t(*TwoOneofs_Field35)(nil),\n\t\t(*TwoOneofs_SubMessage2)(nil),\n\t}\n}", "func (*TwoOneofs) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TwoOneofs_Field1)(nil),\n\t\t(*TwoOneofs_Field2)(nil),\n\t\t(*TwoOneofs_Field3)(nil),\n\t\t(*TwoOneofs_Field34)(nil),\n\t\t(*TwoOneofs_Field35)(nil),\n\t\t(*TwoOneofs_SubMessage2)(nil),\n\t}\n}", "func (*Layer7) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Layer7_Dns)(nil),\n\t\t(*Layer7_Http)(nil),\n\t\t(*Layer7_Kafka)(nil),\n\t}\n}", "func (*Layer7) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Layer7_Dns)(nil),\n\t\t(*Layer7_Http)(nil),\n\t\t(*Layer7_Kafka)(nil),\n\t}\n}", "func (*GroupMod) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GroupMod_L2Iface)(nil),\n\t\t(*GroupMod_L3Unicast)(nil),\n\t\t(*GroupMod_MplsIface)(nil),\n\t\t(*GroupMod_MplsLabel)(nil),\n\t}\n}", "func (*Message) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Message_NewRoundStep)(nil),\n\t\t(*Message_NewValidBlock)(nil),\n\t\t(*Message_Proposal)(nil),\n\t\t(*Message_ProposalPol)(nil),\n\t\t(*Message_BlockPart)(nil),\n\t\t(*Message_Vote)(nil),\n\t\t(*Message_HasVote)(nil),\n\t\t(*Message_VoteSetMaj23)(nil),\n\t\t(*Message_VoteSetBits)(nil),\n\t}\n}", "func (*Layer4) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Layer4_TCP)(nil),\n\t\t(*Layer4_UDP)(nil),\n\t\t(*Layer4_ICMPv4)(nil),\n\t\t(*Layer4_ICMPv6)(nil),\n\t}\n}", "func (*Layer4) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Layer4_TCP)(nil),\n\t\t(*Layer4_UDP)(nil),\n\t\t(*Layer4_ICMPv4)(nil),\n\t\t(*Layer4_ICMPv6)(nil),\n\t}\n}", "func (*Message) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Message_Init)(nil),\n\t\t(*Message_File)(nil),\n\t\t(*Message_Resize)(nil),\n\t\t(*Message_Signal)(nil),\n\t}\n}", "func (*Example) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Example_A)(nil),\n\t\t(*Example_BJk)(nil),\n\t}\n}", "func (*ExampleMsg) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ExampleMsg_SomeString)(nil),\n\t\t(*ExampleMsg_SomeNumber)(nil),\n\t\t(*ExampleMsg_SomeBool)(nil),\n\t}\n}", "func (*WALMessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*WALMessage_EventDataRoundState)(nil),\n\t\t(*WALMessage_MsgInfo)(nil),\n\t\t(*WALMessage_TimeoutInfo)(nil),\n\t\t(*WALMessage_EndHeight)(nil),\n\t}\n}", "func (*Modulation) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Modulation_Lora)(nil),\n\t\t(*Modulation_Fsk)(nil),\n\t\t(*Modulation_LrFhss)(nil),\n\t}\n}", "func (*TestVersion2) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TestVersion2_E)(nil),\n\t\t(*TestVersion2_F)(nil),\n\t}\n}", "func (*TestVersion1) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TestVersion1_E)(nil),\n\t\t(*TestVersion1_F)(nil),\n\t}\n}", "func (*CodebookType_Type1) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*CodebookType_Type1_TypeI_SinglePanel)(nil),\n\t\t(*CodebookType_Type1_TypeI_MultiPanell)(nil),\n\t}\n}", "func (*DRB_ToAddMod) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*DRB_ToAddMod_Eps_BearerIdentity)(nil),\n\t\t(*DRB_ToAddMod_Sdap_Config)(nil),\n\t}\n}", "func (*TestVersion3) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TestVersion3_E)(nil),\n\t\t(*TestVersion3_F)(nil),\n\t}\n}", "func (*Bitmaps) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Bitmaps_OneSlot)(nil),\n\t\t(*Bitmaps_TwoSlots)(nil),\n\t\t(*Bitmaps_N2)(nil),\n\t\t(*Bitmaps_N4)(nil),\n\t\t(*Bitmaps_N5)(nil),\n\t\t(*Bitmaps_N8)(nil),\n\t\t(*Bitmaps_N10)(nil),\n\t\t(*Bitmaps_N20)(nil),\n\t\t(*Bitmaps_N40)(nil),\n\t}\n}", "func (*Bit) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Bit_DecimalValue)(nil),\n\t\t(*Bit_LongValue)(nil),\n\t}\n}", "func (*SeldonMessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*SeldonMessage_Data)(nil),\n\t\t(*SeldonMessage_BinData)(nil),\n\t\t(*SeldonMessage_StrData)(nil),\n\t\t(*SeldonMessage_JsonData)(nil),\n\t\t(*SeldonMessage_CustomData)(nil),\n\t}\n}", "func (*TestVersionFD1) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TestVersionFD1_E)(nil),\n\t\t(*TestVersionFD1_F)(nil),\n\t}\n}", "func (*Message) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Message_Pubkey)(nil),\n\t\t(*Message_EncK)(nil),\n\t\t(*Message_Mta)(nil),\n\t\t(*Message_Delta)(nil),\n\t\t(*Message_ProofAi)(nil),\n\t\t(*Message_CommitViAi)(nil),\n\t\t(*Message_DecommitViAi)(nil),\n\t\t(*Message_CommitUiTi)(nil),\n\t\t(*Message_DecommitUiTi)(nil),\n\t\t(*Message_Si)(nil),\n\t}\n}", "func (*TestUnit) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TestUnit_GceTestCfg)(nil),\n\t\t(*TestUnit_HwTestCfg)(nil),\n\t\t(*TestUnit_MoblabVmTestCfg)(nil),\n\t\t(*TestUnit_TastVmTestCfg)(nil),\n\t\t(*TestUnit_VmTestCfg)(nil),\n\t}\n}", "func (*Tag) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Tag_DecimalValue)(nil),\n\t\t(*Tag_LongValue)(nil),\n\t\t(*Tag_StringValue)(nil),\n\t}\n}", "func (*Record) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Record_Local_)(nil),\n\t\t(*Record_Ledger_)(nil),\n\t\t(*Record_Multi_)(nil),\n\t\t(*Record_Offline_)(nil),\n\t}\n}", "func (*GeneratedObject) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GeneratedObject_DestinationRule)(nil),\n\t\t(*GeneratedObject_EnvoyFilter)(nil),\n\t\t(*GeneratedObject_ServiceEntry)(nil),\n\t\t(*GeneratedObject_VirtualService)(nil),\n\t}\n}", "func (*Packet) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Packet_Deal)(nil),\n\t\t(*Packet_Response)(nil),\n\t\t(*Packet_Justification)(nil),\n\t}\n}", "func (*Response) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Response_ImageVersion)(nil),\n\t\t(*Response_ErrorDescription)(nil),\n\t}\n}", "func (*FlowMod) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*FlowMod_Vlan)(nil),\n\t\t(*FlowMod_TermMac)(nil),\n\t\t(*FlowMod_Mpls1)(nil),\n\t\t(*FlowMod_Unicast)(nil),\n\t\t(*FlowMod_Bridging)(nil),\n\t\t(*FlowMod_Acl)(nil),\n\t}\n}", "func (*MFADevice) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*MFADevice_Totp)(nil),\n\t\t(*MFADevice_U2F)(nil),\n\t}\n}", "func (*MFADevice) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*MFADevice_Totp)(nil),\n\t\t(*MFADevice_U2F)(nil),\n\t}\n}", "func (*MFADevice) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*MFADevice_Totp)(nil),\n\t\t(*MFADevice_U2F)(nil),\n\t}\n}", "func (*P4Data) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*P4Data_Bitstring)(nil),\n\t\t(*P4Data_Varbit)(nil),\n\t\t(*P4Data_Bool)(nil),\n\t\t(*P4Data_Tuple)(nil),\n\t\t(*P4Data_Struct)(nil),\n\t\t(*P4Data_Header)(nil),\n\t\t(*P4Data_HeaderUnion)(nil),\n\t\t(*P4Data_HeaderStack)(nil),\n\t\t(*P4Data_HeaderUnionStack)(nil),\n\t\t(*P4Data_Enum)(nil),\n\t\t(*P4Data_Error)(nil),\n\t\t(*P4Data_EnumValue)(nil),\n\t}\n}", "func (*SSB_ConfigMobility) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*SSB_ConfigMobility_ReleaseSsb_ToMeasure)(nil),\n\t\t(*SSB_ConfigMobility_SetupSsb_ToMeasure)(nil),\n\t}\n}", "func (*SpCellConfig) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*SpCellConfig_ReleaseRlf_TimersAndConstants)(nil),\n\t\t(*SpCellConfig_SetupRlf_TimersAndConstants)(nil),\n\t}\n}", "func (*ServerMessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ServerMessage_State)(nil),\n\t\t(*ServerMessage_Runtime)(nil),\n\t\t(*ServerMessage_Event)(nil),\n\t\t(*ServerMessage_Response)(nil),\n\t\t(*ServerMessage_Notice)(nil),\n\t}\n}", "func (*ParaP2PSubMsg) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ParaP2PSubMsg_CommitTx)(nil),\n\t\t(*ParaP2PSubMsg_SyncMsg)(nil),\n\t}\n}", "func (*ServerAuctionMessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ServerAuctionMessage_Challenge)(nil),\n\t\t(*ServerAuctionMessage_Success)(nil),\n\t\t(*ServerAuctionMessage_Error)(nil),\n\t\t(*ServerAuctionMessage_Prepare)(nil),\n\t\t(*ServerAuctionMessage_Sign)(nil),\n\t\t(*ServerAuctionMessage_Finalize)(nil),\n\t\t(*ServerAuctionMessage_Account)(nil),\n\t}\n}", "func (*Body) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Body_AsBytes)(nil),\n\t\t(*Body_AsString)(nil),\n\t}\n}", "func (*TagField) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TagField_DoubleValue)(nil),\n\t\t(*TagField_StringValue)(nil),\n\t\t(*TagField_BoolValue)(nil),\n\t\t(*TagField_TimestampValue)(nil),\n\t\t(*TagField_EnumValue_)(nil),\n\t}\n}", "func (*DatasetVersion) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*DatasetVersion_RawDatasetVersionInfo)(nil),\n\t\t(*DatasetVersion_PathDatasetVersionInfo)(nil),\n\t\t(*DatasetVersion_QueryDatasetVersionInfo)(nil),\n\t}\n}", "func (*GatewayMsg) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GatewayMsg_Demand)(nil),\n\t\t(*GatewayMsg_Supply)(nil),\n\t\t(*GatewayMsg_Target)(nil),\n\t\t(*GatewayMsg_Mbus)(nil),\n\t\t(*GatewayMsg_MbusMsg)(nil),\n\t}\n}", "func (*Message) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Message_Chunk)(nil),\n\t\t(*Message_Status)(nil),\n\t\t(*Message_Response)(nil),\n\t}\n}", "func (*BlobDiff) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*BlobDiff_Dataset)(nil),\n\t\t(*BlobDiff_Environment)(nil),\n\t\t(*BlobDiff_Code)(nil),\n\t\t(*BlobDiff_Config)(nil),\n\t}\n}", "func (*BlobDiff) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*BlobDiff_Dataset)(nil),\n\t\t(*BlobDiff_Environment)(nil),\n\t\t(*BlobDiff_Code)(nil),\n\t\t(*BlobDiff_Config)(nil),\n\t}\n}", "func (*BlobDiff) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*BlobDiff_Dataset)(nil),\n\t\t(*BlobDiff_Environment)(nil),\n\t\t(*BlobDiff_Code)(nil),\n\t\t(*BlobDiff_Config)(nil),\n\t}\n}", "func (*DataType) XXX_OneofWrappers() []interface{} {\r\n\treturn []interface{}{\r\n\t\t(*DataType_ListElementType)(nil),\r\n\t\t(*DataType_StructType)(nil),\r\n\t\t(*DataType_TimeFormat)(nil),\r\n\t}\r\n}", "func (*Message) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Message_Prepare)(nil),\n\t\t(*Message_Promise)(nil),\n\t\t(*Message_Accept)(nil),\n\t\t(*Message_Accepted)(nil),\n\t\t(*Message_Alert)(nil),\n\t}\n}", "func (*BWP_DownlinkCommon) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*BWP_DownlinkCommon_ReleasePdcch_ConfigCommon)(nil),\n\t\t(*BWP_DownlinkCommon_SetupPdcch_ConfigCommon)(nil),\n\t\t(*BWP_DownlinkCommon_ReleasePdsch_ConfigCommon)(nil),\n\t\t(*BWP_DownlinkCommon_SetupPdsch_ConfigCommon)(nil),\n\t}\n}", "func (*Test) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Test_Get)(nil),\n\t\t(*Test_Create)(nil),\n\t\t(*Test_Set)(nil),\n\t\t(*Test_Update)(nil),\n\t\t(*Test_UpdatePaths)(nil),\n\t\t(*Test_Delete)(nil),\n\t\t(*Test_Query)(nil),\n\t\t(*Test_Listen)(nil),\n\t}\n}", "func (*DownlinkTXInfo) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*DownlinkTXInfo_LoraModulationInfo)(nil),\n\t\t(*DownlinkTXInfo_FskModulationInfo)(nil),\n\t\t(*DownlinkTXInfo_ImmediatelyTimingInfo)(nil),\n\t\t(*DownlinkTXInfo_DelayTimingInfo)(nil),\n\t\t(*DownlinkTXInfo_GpsEpochTimingInfo)(nil),\n\t}\n}", "func (*RpcMessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*RpcMessage_RequestHeader)(nil),\n\t\t(*RpcMessage_ResponseHeader)(nil),\n\t}\n}", "func (*Domain_Attribute) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Domain_Attribute_BoolValue)(nil),\n\t\t(*Domain_Attribute_IntValue)(nil),\n\t}\n}", "func (*CellStatusResp) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*CellStatusResp_CellStatus)(nil),\n\t\t(*CellStatusResp_ErrorMsg)(nil),\n\t}\n}", "func (*ClientAuctionMessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ClientAuctionMessage_Commit)(nil),\n\t\t(*ClientAuctionMessage_Subscribe)(nil),\n\t\t(*ClientAuctionMessage_Accept)(nil),\n\t\t(*ClientAuctionMessage_Reject)(nil),\n\t\t(*ClientAuctionMessage_Sign)(nil),\n\t\t(*ClientAuctionMessage_Recover)(nil),\n\t}\n}", "func (*GrpcService) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GrpcService_EnvoyGrpc_)(nil),\n\t\t(*GrpcService_GoogleGrpc_)(nil),\n\t}\n}", "func (*GrpcService) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GrpcService_EnvoyGrpc_)(nil),\n\t\t(*GrpcService_GoogleGrpc_)(nil),\n\t}\n}", "func (*GrpcService) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GrpcService_EnvoyGrpc_)(nil),\n\t\t(*GrpcService_GoogleGrpc_)(nil),\n\t}\n}", "func (*GrpcService) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GrpcService_EnvoyGrpc_)(nil),\n\t\t(*GrpcService_GoogleGrpc_)(nil),\n\t}\n}", "func (*GrpcService) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GrpcService_EnvoyGrpc_)(nil),\n\t\t(*GrpcService_GoogleGrpc_)(nil),\n\t}\n}", "func (*GrpcService) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*GrpcService_EnvoyGrpc_)(nil),\n\t\t(*GrpcService_GoogleGrpc_)(nil),\n\t}\n}", "func (*Replay) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Replay_Http)(nil),\n\t\t(*Replay_Sqs)(nil),\n\t\t(*Replay_Amqp)(nil),\n\t\t(*Replay_Kafka)(nil),\n\t}\n}", "func (*ReportConfigInterRAT) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ReportConfigInterRAT_Periodical)(nil),\n\t\t(*ReportConfigInterRAT_EventTriggered)(nil),\n\t\t(*ReportConfigInterRAT_ReportCGI)(nil),\n\t}\n}", "func (*Class) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Class_PerInstance)(nil),\n\t\t(*Class_Lumpsum)(nil),\n\t}\n}", "func (*OneOfMessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*OneOfMessage_BinaryValue)(nil),\n\t\t(*OneOfMessage_StringValue)(nil),\n\t\t(*OneOfMessage_BooleanValue)(nil),\n\t\t(*OneOfMessage_IntValue)(nil),\n\t\t(*OneOfMessage_Int64Value)(nil),\n\t\t(*OneOfMessage_DoubleValue)(nil),\n\t\t(*OneOfMessage_FloatValue)(nil),\n\t\t(*OneOfMessage_MsgValue)(nil),\n\t}\n}", "func (*ReceiveReply) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ReceiveReply_Record_)(nil),\n\t\t(*ReceiveReply_LiiklusEventRecord_)(nil),\n\t}\n}", "func (*ServiceSpec) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ServiceSpec_Replicated)(nil),\n\t\t(*ServiceSpec_Global)(nil),\n\t\t(*ServiceSpec_ReplicatedJob)(nil),\n\t\t(*ServiceSpec_GlobalJob)(nil),\n\t}\n}", "func (*Message) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Message_PexRequest)(nil),\n\t\t(*Message_PexAddrs)(nil),\n\t}\n}", "func (*HealthCheck_Payload) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*HealthCheck_Payload_Text)(nil),\n\t\t(*HealthCheck_Payload_Binary)(nil),\n\t}\n}", "func (*HealthCheck_Payload) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*HealthCheck_Payload_Text)(nil),\n\t\t(*HealthCheck_Payload_Binary)(nil),\n\t}\n}", "func (*HealthCheck_Payload) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*HealthCheck_Payload_Text)(nil),\n\t\t(*HealthCheck_Payload_Binary)(nil),\n\t}\n}", "func (*HealthCheck_Payload) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*HealthCheck_Payload_Text)(nil),\n\t\t(*HealthCheck_Payload_Binary)(nil),\n\t}\n}", "func (*ChangeResponse) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*ChangeResponse_Ok)(nil),\n\t\t(*ChangeResponse_Error)(nil),\n\t}\n}", "func (*Message) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Message_ExecStarted)(nil),\n\t\t(*Message_ExecCompleted)(nil),\n\t\t(*Message_ExecOutput)(nil),\n\t\t(*Message_LogEntry)(nil),\n\t\t(*Message_Error)(nil),\n\t}\n}", "func (*RequestCreateGame) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*RequestCreateGame_LocalMap)(nil),\n\t\t(*RequestCreateGame_BattlenetMapName)(nil),\n\t}\n}", "func (*CellStatusReq) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*CellStatusReq_IsPlayer)(nil),\n\t\t(*CellStatusReq_CellStatus)(nil),\n\t}\n}", "func (*Message) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Message_Request)(nil),\n\t\t(*Message_Response)(nil),\n\t}\n}", "func (*CreateDatasetVersion) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*CreateDatasetVersion_RawDatasetVersionInfo)(nil),\n\t\t(*CreateDatasetVersion_PathDatasetVersionInfo)(nil),\n\t\t(*CreateDatasetVersion_QueryDatasetVersionInfo)(nil),\n\t}\n}", "func (*InputMessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*InputMessage_Init)(nil),\n\t\t(*InputMessage_Data)(nil),\n\t}\n}", "func (*UplinkTXInfo) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*UplinkTXInfo_LoraModulationInfo)(nil),\n\t\t(*UplinkTXInfo_FskModulationInfo)(nil),\n\t\t(*UplinkTXInfo_LrFhssModulationInfo)(nil),\n\t}\n}", "func (*APool) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*APool_DisableHealthCheck)(nil),\n\t\t(*APool_HealthCheck)(nil),\n\t}\n}", "func (*BWP_UplinkCommon) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*BWP_UplinkCommon_ReleaseRach_ConfigCommon)(nil),\n\t\t(*BWP_UplinkCommon_SetupRach_ConfigCommon)(nil),\n\t\t(*BWP_UplinkCommon_ReleasePusch_ConfigCommon)(nil),\n\t\t(*BWP_UplinkCommon_SetupPusch_ConfigCommon)(nil),\n\t\t(*BWP_UplinkCommon_ReleasePucch_ConfigCommon)(nil),\n\t\t(*BWP_UplinkCommon_SetupPucch_ConfigCommon)(nil),\n\t}\n}", "func (*M) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*M_OneofInt32)(nil),\n\t\t(*M_OneofInt64)(nil),\n\t}\n}", "func (*LoadParams) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*LoadParams_ClosedLoop)(nil),\n\t\t(*LoadParams_Poisson)(nil),\n\t}\n}", "func (*M_Submessage) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*M_Submessage_SubmessageOneofInt32)(nil),\n\t\t(*M_Submessage_SubmessageOneofInt64)(nil),\n\t}\n}", "func (*TestnetPacketData) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*TestnetPacketData_NoData)(nil),\n\t\t(*TestnetPacketData_FooPacket)(nil),\n\t}\n}", "func (*CodebookSubType_MultiPanel) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*CodebookSubType_MultiPanel_TwoTwoOne_TypeI_MultiPanel_Restriction)(nil),\n\t\t(*CodebookSubType_MultiPanel_TwoFourOne_TypeI_MultiPanel_Restriction)(nil),\n\t\t(*CodebookSubType_MultiPanel_FourTwoOne_TypeI_MultiPanel_Restriction)(nil),\n\t\t(*CodebookSubType_MultiPanel_TwoTwoTwo_TypeI_MultiPanel_Restriction)(nil),\n\t\t(*CodebookSubType_MultiPanel_TwoEightOne_TypeI_MultiPanel_Restriction)(nil),\n\t\t(*CodebookSubType_MultiPanel_FourFourOne_TypeI_MultiPanel_Restriction)(nil),\n\t\t(*CodebookSubType_MultiPanel_TwoFourTwo_TypeI_MultiPanel_Restriction)(nil),\n\t\t(*CodebookSubType_MultiPanel_FourTwoTwo_TypeI_MultiPanel_Restriction)(nil),\n\t}\n}", "func (*MetricsData) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*MetricsData_BoolValue)(nil),\n\t\t(*MetricsData_StringValue)(nil),\n\t\t(*MetricsData_Int64Value)(nil),\n\t\t(*MetricsData_DoubleValue)(nil),\n\t\t(*MetricsData_DistributionValue)(nil),\n\t}\n}", "func (*Packet) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Packet_PacketPing)(nil),\n\t\t(*Packet_PacketPong)(nil),\n\t\t(*Packet_PacketMsg)(nil),\n\t}\n}", "func (*InstructionResponse) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*InstructionResponse_Register)(nil),\n\t\t(*InstructionResponse_ProcessBundle)(nil),\n\t\t(*InstructionResponse_ProcessBundleProgress)(nil),\n\t\t(*InstructionResponse_ProcessBundleSplit)(nil),\n\t\t(*InstructionResponse_FinalizeBundle)(nil),\n\t}\n}", "func (*FieldType) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*FieldType_PrimitiveType_)(nil),\n\t\t(*FieldType_EnumType_)(nil),\n\t}\n}", "func (*OpenStatusUpdate) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*OpenStatusUpdate_ChanPending)(nil),\n\t\t(*OpenStatusUpdate_ChanOpen)(nil),\n\t\t(*OpenStatusUpdate_PsbtFund)(nil),\n\t}\n}", "func (*OpenStatusUpdate) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*OpenStatusUpdate_ChanPending)(nil),\n\t\t(*OpenStatusUpdate_ChanOpen)(nil),\n\t\t(*OpenStatusUpdate_PsbtFund)(nil),\n\t}\n}", "func (*OpenStatusUpdate) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*OpenStatusUpdate_ChanPending)(nil),\n\t\t(*OpenStatusUpdate_ChanOpen)(nil),\n\t\t(*OpenStatusUpdate_PsbtFund)(nil),\n\t}\n}", "func (*Tracing) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*Tracing_Zipkin_)(nil),\n\t\t(*Tracing_Lightstep_)(nil),\n\t\t(*Tracing_Datadog_)(nil),\n\t\t(*Tracing_Stackdriver_)(nil),\n\t}\n}", "func (*DynamicReplay) XXX_OneofWrappers() []interface{} {\n\treturn []interface{}{\n\t\t(*DynamicReplay_AuthRequest)(nil),\n\t\t(*DynamicReplay_AuthResponse)(nil),\n\t\t(*DynamicReplay_OutboundMessage)(nil),\n\t\t(*DynamicReplay_ReplayMessage)(nil),\n\t}\n}" ]
[ "0.88219297", "0.8802119", "0.8742942", "0.8742942", "0.8742942", "0.8742942", "0.8717952", "0.8717952", "0.8714713", "0.871365", "0.87007177", "0.87007177", "0.86998117", "0.86877567", "0.86787474", "0.8675661", "0.86728865", "0.8669618", "0.8665634", "0.8651422", "0.8647678", "0.86385727", "0.8634086", "0.86332667", "0.8631461", "0.8627964", "0.8617369", "0.86141", "0.8612313", "0.8607811", "0.8604341", "0.85992014", "0.85921896", "0.8589683", "0.85855347", "0.85855347", "0.85855347", "0.8580537", "0.85792047", "0.8578969", "0.8570836", "0.85641706", "0.8564027", "0.85624874", "0.85598487", "0.8559348", "0.85561335", "0.8554086", "0.85470206", "0.85470206", "0.85470206", "0.8544631", "0.8543755", "0.8543109", "0.85429555", "0.8542439", "0.854122", "0.8540027", "0.85393256", "0.8537358", "0.8534798", "0.8534798", "0.8534798", "0.8534798", "0.8534798", "0.8534798", "0.85266954", "0.8523379", "0.85188186", "0.8516131", "0.8515412", "0.85151345", "0.85134923", "0.8511797", "0.8511797", "0.8511797", "0.8511797", "0.8511061", "0.8510713", "0.8505989", "0.850435", "0.8502147", "0.8501006", "0.84973544", "0.8493029", "0.84916127", "0.84899884", "0.8488368", "0.84872645", "0.8485725", "0.84855723", "0.8484444", "0.84826887", "0.84825855", "0.8480332", "0.84801996", "0.84746355", "0.84746355", "0.84746355", "0.84725124", "0.84710175" ]
0.0
-1
NewParamExample is new param example
func NewParamExample(title string, v interface{}) *Example { return newExample(title, v, exampleTypeParam, 0) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func execNewParam(_ int, p *gop.Context) {\n\targs := p.GetArgs(4)\n\tret := types.NewParam(token.Pos(args[0].(int)), args[1].(*types.Package), args[2].(string), args[3].(types.Type))\n\tp.Ret(4, ret)\n}", "func newRequiredParam(name string) error {\n\treturn fmt.Errorf(\"missing required parameter '%s'\", name)\n}", "func (m *MethodInfo) NewParam() interface{} {\n\tif m.paramType == TypeNull {\n\t\treturn nil\n\t}\n\n\treturn reflect.New(m.paramType).Interface()\n}", "func (node *Node) Param(vc *validation.Config, keys ...string) *Node {\n\n\tif len(keys) == 0 { panic(\"NO KEYS SUPPLIED FOR NEW PARAMETER\") }\n\n\tnode.RLock()\n\t\tp := node.Parameter\n\tnode.RUnlock()\n\tif p != nil {\n\t\treturn p\n\t}\n\n\tn := node.new(\"{\" + keys[0] + \"}\")\n\n\tvc.Keys = keys\n\n\tn.Lock()\n\t\tn.Validation = vc\n\t\tn.Validations = append(n.Validations, vc)\n\tn.Unlock()\n\n\tnode.Lock()\n\t\tnode.Parameter = n\n\tnode.Unlock()\n\n\treturn n\n}", "func newConstant(name, paramType string) *Param {\n\treturn &Param{\n\t\tParameterKind: otherConstant,\n\t\tName: name,\n\t\tParameterType: paramType,\n\t}\n}", "func NewParameter(param *low.Parameter) *Parameter {\n\tp := new(Parameter)\n\tp.low = param\n\tp.Name = param.Name.Value\n\tp.In = param.In.Value\n\tp.Description = param.Description.Value\n\tp.Deprecated = param.Deprecated.Value\n\tp.AllowEmptyValue = param.AllowEmptyValue.Value\n\tp.Style = param.Style.Value\n\tif !param.Explode.IsEmpty() {\n\t\tp.Explode = &param.Explode.Value\n\t}\n\tp.AllowReserved = param.AllowReserved.Value\n\tif !param.Schema.IsEmpty() {\n\t\tp.Schema = base.NewSchemaProxy(&param.Schema)\n\t}\n\tp.Required = param.Required.Value\n\tp.Example = param.Example.Value\n\tp.Examples = base.ExtractExamples(param.Examples.Value)\n\tp.Content = ExtractContent(param.Content.Value)\n\tp.Extensions = high.ExtractExtensions(param.Extensions)\n\treturn p\n}", "func NewErrorParam(c *gin.Context, msg string, data interface{}) {\n\tresult := &Result{\n\t\tCode: ERROR_CODE_WRONG_PARAM,\n\t\tMsg: msg,\n\t\tData: data,\n\t}\n\tc.AbortWithStatusJSON(http.StatusOK, result)\n}", "func NewExample(examples *low.Examples) *Example {\n\te := new(Example)\n\te.low = examples\n\tif len(examples.Values) > 0 {\n\t\tvalues := make(map[string]any)\n\t\tfor k := range examples.Values {\n\t\t\tvalues[k.Value] = examples.Values[k].Value\n\t\t}\n\t\te.Values = values\n\t}\n\treturn e\n}", "func newCreateParam4Create(req *http.Request) (*CreateParam, error) {\n\tparam := &CreateParam{}\n\terr := xreq.BindJSON(req, param)\n\treturn param, err\n}", "func (node *Node) Param(config *ValidationConfig, keys ...string) *Node {\n\n\tif len(keys) == 0 { panic(\"NO KEYS SUPPLIED FOR NEW PARAMETER\") }\n\n\tn := node.new(\":\" + keys[0])\n\n\tconfig.keys = keys\n\n\tn.Lock()\n\t\tn.validation = config\n\t\tn.validations = append(n.validations, config)\n\tn.Unlock()\n\n\tnode.param = n\n\n\treturn n\n}", "func newVariable(name, paramType string) *Param {\n\treturn &Param{\n\t\tParameterKind: variable,\n\t\tName: name,\n\t\tParameterType: paramType,\n\t}\n}", "func NewParameter(in *yaml.Node, context *compiler.Context) (*Parameter, error) {\n\terrors := make([]error, 0)\n\tx := &Parameter{}\n\tm, ok := compiler.UnpackMap(in)\n\tif !ok {\n\t\tmessage := fmt.Sprintf(\"has unexpected value: %+v (%T)\", in, in)\n\t\terrors = append(errors, compiler.NewError(context, message))\n\t} else {\n\t\tallowedKeys := []string{\"$ref\", \"additionalProperties\", \"annotations\", \"default\", \"description\", \"enum\", \"enumDescriptions\", \"format\", \"id\", \"items\", \"location\", \"maximum\", \"minimum\", \"pattern\", \"properties\", \"repeated\", \"required\", \"type\"}\n\t\tvar allowedPatterns []*regexp.Regexp\n\t\tinvalidKeys := compiler.InvalidKeysInMap(m, allowedKeys, allowedPatterns)\n\t\tif len(invalidKeys) > 0 {\n\t\t\tmessage := fmt.Sprintf(\"has invalid %s: %+v\", compiler.PluralProperties(len(invalidKeys)), strings.Join(invalidKeys, \", \"))\n\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t}\n\t\t// string id = 1;\n\t\tv1 := compiler.MapValueForKey(m, \"id\")\n\t\tif v1 != nil {\n\t\t\tx.Id, ok = compiler.StringForScalarNode(v1)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for id: %s\", compiler.Display(v1))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// string type = 2;\n\t\tv2 := compiler.MapValueForKey(m, \"type\")\n\t\tif v2 != nil {\n\t\t\tx.Type, ok = compiler.StringForScalarNode(v2)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for type: %s\", compiler.Display(v2))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// string _ref = 3;\n\t\tv3 := compiler.MapValueForKey(m, \"$ref\")\n\t\tif v3 != nil {\n\t\t\tx.XRef, ok = compiler.StringForScalarNode(v3)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for $ref: %s\", compiler.Display(v3))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// string description = 4;\n\t\tv4 := compiler.MapValueForKey(m, \"description\")\n\t\tif v4 != nil {\n\t\t\tx.Description, ok = compiler.StringForScalarNode(v4)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for description: %s\", compiler.Display(v4))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// string default = 5;\n\t\tv5 := compiler.MapValueForKey(m, \"default\")\n\t\tif v5 != nil {\n\t\t\tx.Default, ok = compiler.StringForScalarNode(v5)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for default: %s\", compiler.Display(v5))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// bool required = 6;\n\t\tv6 := compiler.MapValueForKey(m, \"required\")\n\t\tif v6 != nil {\n\t\t\tx.Required, ok = compiler.BoolForScalarNode(v6)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for required: %s\", compiler.Display(v6))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// string format = 7;\n\t\tv7 := compiler.MapValueForKey(m, \"format\")\n\t\tif v7 != nil {\n\t\t\tx.Format, ok = compiler.StringForScalarNode(v7)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for format: %s\", compiler.Display(v7))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// string pattern = 8;\n\t\tv8 := compiler.MapValueForKey(m, \"pattern\")\n\t\tif v8 != nil {\n\t\t\tx.Pattern, ok = compiler.StringForScalarNode(v8)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for pattern: %s\", compiler.Display(v8))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// string minimum = 9;\n\t\tv9 := compiler.MapValueForKey(m, \"minimum\")\n\t\tif v9 != nil {\n\t\t\tx.Minimum, ok = compiler.StringForScalarNode(v9)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for minimum: %s\", compiler.Display(v9))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// string maximum = 10;\n\t\tv10 := compiler.MapValueForKey(m, \"maximum\")\n\t\tif v10 != nil {\n\t\t\tx.Maximum, ok = compiler.StringForScalarNode(v10)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for maximum: %s\", compiler.Display(v10))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// repeated string enum = 11;\n\t\tv11 := compiler.MapValueForKey(m, \"enum\")\n\t\tif v11 != nil {\n\t\t\tv, ok := compiler.SequenceNodeForNode(v11)\n\t\t\tif ok {\n\t\t\t\tx.Enum = compiler.StringArrayForSequenceNode(v)\n\t\t\t} else {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for enum: %s\", compiler.Display(v11))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// repeated string enum_descriptions = 12;\n\t\tv12 := compiler.MapValueForKey(m, \"enumDescriptions\")\n\t\tif v12 != nil {\n\t\t\tv, ok := compiler.SequenceNodeForNode(v12)\n\t\t\tif ok {\n\t\t\t\tx.EnumDescriptions = compiler.StringArrayForSequenceNode(v)\n\t\t\t} else {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for enumDescriptions: %s\", compiler.Display(v12))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// bool repeated = 13;\n\t\tv13 := compiler.MapValueForKey(m, \"repeated\")\n\t\tif v13 != nil {\n\t\t\tx.Repeated, ok = compiler.BoolForScalarNode(v13)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for repeated: %s\", compiler.Display(v13))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// string location = 14;\n\t\tv14 := compiler.MapValueForKey(m, \"location\")\n\t\tif v14 != nil {\n\t\t\tx.Location, ok = compiler.StringForScalarNode(v14)\n\t\t\tif !ok {\n\t\t\t\tmessage := fmt.Sprintf(\"has unexpected value for location: %s\", compiler.Display(v14))\n\t\t\t\terrors = append(errors, compiler.NewError(context, message))\n\t\t\t}\n\t\t}\n\t\t// Schemas properties = 15;\n\t\tv15 := compiler.MapValueForKey(m, \"properties\")\n\t\tif v15 != nil {\n\t\t\tvar err error\n\t\t\tx.Properties, err = NewSchemas(v15, compiler.NewContext(\"properties\", v15, context))\n\t\t\tif err != nil {\n\t\t\t\terrors = append(errors, err)\n\t\t\t}\n\t\t}\n\t\t// Schema additional_properties = 16;\n\t\tv16 := compiler.MapValueForKey(m, \"additionalProperties\")\n\t\tif v16 != nil {\n\t\t\tvar err error\n\t\t\tx.AdditionalProperties, err = NewSchema(v16, compiler.NewContext(\"additionalProperties\", v16, context))\n\t\t\tif err != nil {\n\t\t\t\terrors = append(errors, err)\n\t\t\t}\n\t\t}\n\t\t// Schema items = 17;\n\t\tv17 := compiler.MapValueForKey(m, \"items\")\n\t\tif v17 != nil {\n\t\t\tvar err error\n\t\t\tx.Items, err = NewSchema(v17, compiler.NewContext(\"items\", v17, context))\n\t\t\tif err != nil {\n\t\t\t\terrors = append(errors, err)\n\t\t\t}\n\t\t}\n\t\t// Annotations annotations = 18;\n\t\tv18 := compiler.MapValueForKey(m, \"annotations\")\n\t\tif v18 != nil {\n\t\t\tvar err error\n\t\t\tx.Annotations, err = NewAnnotations(v18, compiler.NewContext(\"annotations\", v18, context))\n\t\t\tif err != nil {\n\t\t\t\terrors = append(errors, err)\n\t\t\t}\n\t\t}\n\t}\n\treturn x, compiler.NewErrorGroupOrNil(errors)\n}", "func addParameter(p *[]*cloudformation.Parameter, key string, value string) {\n\n\t*p = append(*p, &cloudformation.Parameter{\n\t\tParameterKey: &key,\n\t\tParameterValue: &value,\n\t\tResolvedValue: nil,\n\t\tUsePreviousValue: nil,\n\t})\n}", "func New() *Parameter {\n\tparam := &Parameter{\n\t\tparameters: &sync.Map{},\n\t}\n\n\treturn param\n\n}", "func newIgnoredValue() *Param {\n\treturn &Param{\n\t\tParameterKind: ignored,\n\t\tName: \"<ignored>\",\n\t\tParameterType: \"<ignored>\",\n\t}\n}", "func NewTemplateParameter()(*TemplateParameter) {\n m := &TemplateParameter{\n }\n m.backingStore = ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStoreFactoryInstance();\n m.SetAdditionalData(make(map[string]any))\n return m\n}", "func NewParams() *Params {\n\treturn new(Params)\n}", "func (b *TriggerTemplateBuilder) Param(name, description string) {\n\tb.TriggerTemplate.Spec.Params = append(b.TriggerTemplate.Spec.Params, v1alpha1.ParamSpec{\n\t\tName: name,\n\t\tDescription: description,\n\t})\n}", "func newParamsetProvider(pf *psrefresh.ParamSetRefresher) regression.ParamsetProvider {\n\treturn func() paramtools.ReadOnlyParamSet {\n\t\treturn pf.Get()\n\t}\n}", "func newParam(table string) (interface{}, error) {\n\tswitch table {\n\tcase \"lv\":\n\t\treturn &lv.LogicalVolumeEntity{}, nil\n\tcase \"pvc\":\n\t\treturn &k8spvc.PersistVolumeClaimEntity{}, nil\n\tcase \"pv\":\n\t\treturn &k8spvc.PersistVolumeEntity{}, nil\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"do not support table %s\", table)\n\t}\n}", "func (l0 *l0Conn) parametersNew() (p *paramConf) {\n\tp = &paramConf{conf.New(l0.teo, &param{}), l0.teo.ev.subscribe(), l0}\n\tfmt.Printf(\"!!! Subscribed - peer connected !!!\\n\")\n\tgo func() {\n\t\t// TODO: uncomment wg using when normolise close channel during exit\n\t\tl0.teo.wg.Add(1)\n\t\tfor ev := range p.chanEvent {\n\t\t\tp.eventProcess(ev)\n\t\t}\n\t\tfmt.Printf(\"!!! Subscribed channel closed !!!\\n\")\n\t\tl0.teo.wg.Done()\n\t}()\n\treturn\n}", "func NewExample() *Example {\n\treturn &Example{}\n}", "func newDeclaration(name, paramType string) *Param {\n\treturn &Param{\n\t\tParameterKind: declaration,\n\t\tName: name,\n\t\tParameterType: paramType,\n\t}\n}", "func new() exampleInterface {\n\treturn config{}\n}", "func (o *Operation) AddParam(param *spec.Parameter) *Operation {\n\to.Operation.AddParam(param)\n\treturn o\n}", "func NewParams(nickname NicknameParams, dTag DTagParams, bio BioParams, oracle OracleParams) Params {\n\treturn Params{\n\t\tNickname: nickname,\n\t\tDTag: dTag,\n\t\tBio: bio,\n\t\tOracle: oracle,\n\t}\n}", "func NewParams() (Params, error) {\n\treturn Params{\n\t\tBaseParams: codec.BaseParams{\n\t\t\tKeyFrameInterval: 60,\n\t\t},\n\t}, nil\n}", "func FakeParam(scope *Scope, dtype tf.DataType, shape tf.Shape) (output tf.Output) {\n\tif scope.Err() != nil {\n\t\treturn\n\t}\n\tattrs := map[string]interface{}{\"dtype\": dtype, \"shape\": shape}\n\topspec := tf.OpSpec{\n\t\tType: \"FakeParam\",\n\n\t\tAttrs: attrs,\n\t}\n\top := scope.AddOperation(opspec)\n\treturn op.Output(0)\n}", "func NewParams(pricePerByte abi.TokenAmount, paymentInterval uint64, paymentIntervalIncrease uint64) (Params, error) {\n\treturn Params{\n\t\tPricePerByte: pricePerByte,\n\t\tPaymentInterval: paymentInterval,\n\t\tPaymentIntervalIncrease: paymentIntervalIncrease,\n\t}, nil\n}", "func newParametizer(z []byte) *parametizer {\n\tp := parametizerPool.Get().(*parametizer)\n\tp.z = z\n\n\treturn p\n}", "func CFAddParams1(ps *param.PSet) error {\n\tps.Add(\"example1\",\n\t\tpsetter.Bool{Value: &CFValExample1},\n\t\t\"here is where you would describe the parameter\",\n\t\tparam.AltNames(\"e1\"))\n\n\treturn nil\n}", "func Param(props *ParamProps, children ...Element) *ParamElem {\n\trProps := &_ParamProps{\n\t\tBasicHTMLElement: newBasicHTMLElement(),\n\t}\n\n\tif props != nil {\n\t\tprops.assign(rProps)\n\t}\n\n\treturn &ParamElem{\n\t\tElement: createElement(\"param\", rProps, children...),\n\t}\n}", "func NewParams(opts []copts.Opt) *Params {\r\n\tparams := &Params{}\r\n\tcopts.Apply(params, opts)\r\n\treturn params\r\n}", "func NewParameter(parameterData *model.Parameter) *Parameter {\n\tparameter := &Parameter{}\n\tparameter.ParamName = parameterData.ParamName()\n\tparameter.Value = numbers.BigIntToFloat64(parameterData.Value())\n\n\treturn parameter\n}", "func (c *command) addParam(key, value string) {\n\tif c.Parameters == nil {\n\t\tc.Parameters = map[string]string{}\n\t}\n\tc.Parameters[key] = value\n}", "func (s *BaseDMLListener) EnterParameterModifier(ctx *ParameterModifierContext) {}", "func (s *BasevhdlListener) EnterActual_parameter_part(ctx *Actual_parameter_partContext) {}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_import_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewParamMiddleware(f func() interface{}) *ParamMiddleware {\n\tm := &ParamMiddleware{GetParams: f}\n\treturn m\n}", "func NewParameter(d *Declarator, t Type) *Parameter {\n\treturn &Parameter{d, t}\n}", "func NewParamList(m map[string]interface{}) (*ParamList, error) {\n\tol := newOptionLoader(m)\n\n\tpl := &ParamList{\n\t\tapp: ol.LoadApp(),\n\t\tmoduleName: ol.LoadOptionalString(OptionModule),\n\t\tcomponentName: ol.LoadOptionalString(OptionComponentName),\n\t\tenvName: ol.LoadOptionalString(OptionEnvName),\n\n\t\tout: os.Stdout,\n\t\tfindModulesFn: component.ModulesFromEnv,\n\t\tfindModuleFn: component.GetModule,\n\t\tfindComponentFn: component.LocateComponent,\n\t}\n\n\tif ol.err != nil {\n\t\treturn nil, ol.err\n\t}\n\n\treturn pl, nil\n}", "func InitParamRecord(params *ParamT) {\n\tparams.raw = uintptr(unsafe.Pointer(C.yices_new_param_record()))\n}", "func NewParameter(name string, typ Type) *Parameter {\n\treturn &Parameter{name: name, typ: typ}\n}", "func newErrInvalidParameterType(idx int, gotType interface{}, wantedType interface{}) error {\n\treturn errors.Errorf(\"invalid %d parameter of %T type, but %T type is expected\", idx, gotType, wantedType)\n}", "func newExampleGenerator(a *AttributeDefinition, r *RandomGenerator) *exampleGenerator {\n\treturn &exampleGenerator{a, r}\n}", "func (AppModule) RandomizedParams(r *rand.Rand) []simtypes.ParamChange {\n\t// return simulation.ParamChanges(r)\n\treturn nil\n}", "func (s *BasecluListener) EnterParam(ctx *ParamContext) {}", "func NewParams(createWhoisPrice string, updateWhoisPrice string, deleteWhoisPrice string) Params {\n\treturn Params{\n\t\tCreateWhoisPrice: createWhoisPrice,\n\t\tUpdateWhoisPrice: updateWhoisPrice,\n\t\tDeleteWhoisPrice: deleteWhoisPrice,\n\t}\n}", "func (t *Test) GenerateParameter(paramSpec *spec.Parameter, db *mqswag.DB) (interface{}, error) {\n\ttag := mqswag.GetMeqaTag(paramSpec.Description)\n\tif paramSpec.Schema != nil {\n\t\treturn t.GenerateSchema(\"\", tag, paramSpec.Schema, db, 3)\n\t}\n\tif len(paramSpec.Enum) != 0 {\n\t\tfmt.Print(\"enum\\n\")\n\t\treturn generateEnum(paramSpec.Enum)\n\t}\n\tif len(paramSpec.Type) == 0 {\n\t\treturn nil, mqutil.NewError(mqutil.ErrInvalid, \"Parameter doesn't have type\")\n\t}\n\n\t// construct a full schema from simple ones\n\tschema := (*spec.Schema)(mqswag.CreateSchemaFromSimple(&paramSpec.SimpleSchema, &paramSpec.CommonValidations))\n\tif paramSpec.Type == gojsonschema.TYPE_OBJECT {\n\t\treturn t.generateObject(\"\", tag, schema, db, 3)\n\t}\n\tif paramSpec.Type == gojsonschema.TYPE_ARRAY {\n\t\treturn t.generateArray(\"\", tag, schema, db, 3)\n\t}\n\n\treturn t.generateByType(schema, paramSpec.Name, tag, paramSpec, true)\n}", "func (AppModuleBasic) RandomizedParams(r *rand.Rand) []sdksim.ParamChange {\n\treturn ParamChanges(r)\n}", "func NewParams(opts []copts.Opt) *Params {\n\tparams := &Params{}\n\tcopts.Apply(params, opts)\n\treturn params\n}", "func HelloParamCTRL(c echo.Context) error {\n\treturn c.String(http.StatusOK, c.QueryString())\n}", "func newParamLenErr(u, l int) error {\n\treturn fmt.Errorf(\"%w: got %d; requires %d\", ErrInvalidParamLen, u, l)\n}", "func (apiReq *APIRequest) AddParam(param string, value string) *APIRequest {\n\tapiReq.params[param] = value\n\treturn apiReq\n}", "func Param(params []v1.Param, paramSpec []v1.ParamSpec) string {\n\tif len(params) == 0 {\n\t\treturn \"---\"\n\t}\n\tvar str string\n\tfor i, param := range params {\n\t\tparamValue := \"\"\n\t\tswitch param.Value.Type {\n\t\tcase \"string\":\n\t\t\tparamValue = CheckParamDefaultValue(param.Value.StringVal, paramSpec)\n\t\tcase \"array\":\n\t\t\tparamValue = \"[\"\n\t\t\tfor j, pv := range param.Value.ArrayVal {\n\t\t\t\tpv = CheckParamDefaultValue(pv, paramSpec)\n\t\t\t\tif j == len(param.Value.ArrayVal)-1 {\n\t\t\t\t\tparamValue += \" \" + pv + \" ]\"\n\t\t\t\t} else {\n\t\t\t\t\tparamValue += \" \" + pv + \",\"\n\t\t\t\t}\n\t\t\t}\n\t\tdefault:\n\t\t\tparamValue = \"{\"\n\t\t\tj := 0\n\t\t\tfor k, v := range param.Value.ObjectVal {\n\t\t\t\tpv := CheckParamDefaultValue(v, paramSpec)\n\t\t\t\tif j == len(param.Value.ObjectVal)-1 {\n\t\t\t\t\tparamValue += fmt.Sprintf(\" %s: %s }\", k, pv)\n\t\t\t\t} else {\n\t\t\t\t\tparamValue += fmt.Sprintf(\" %s: %s ,\", k, pv)\n\t\t\t\t}\n\t\t\t\tj++\n\t\t\t}\n\t\t}\n\t\tif i == len(params)-1 {\n\t\t\tstr += fmt.Sprintf(\"%s: %s\", param.Name, paramValue)\n\t\t} else {\n\t\t\tstr += fmt.Sprintf(\"%s: %s, \", param.Name, paramValue)\n\t\t}\n\t}\n\treturn str\n}", "func newParamTypeErr(p, e interface{}) error {\n\ttyp := fmt.Sprintf(\"%T\", e)\n\treturn fmt.Errorf(\"%w: %#v not a(n) %q\", ErrInvalidParamType, p, typ)\n}", "func (s *BasePlSqlParserListener) EnterParameter_spec(ctx *Parameter_specContext) {}", "func NewParams(active bool, lps DistributionSchedules, dds DelegatorDistributionSchedules) Params {\n\treturn Params{\n\t\tActive: active,\n\t\tLiquidityProviderSchedules: lps,\n\t\tDelegatorDistributionSchedules: dds,\n\t}\n}", "func CFAddParams2(ps *param.PSet) error {\n\tps.Add(\"example2\",\n\t\tpsetter.Int64{Value: &CFValExample2},\n\t\t\"the description of the parameter\",\n\t\tparam.AltNames(\"e2\"))\n\n\treturn nil\n}", "func NewParams() *Params {\n\tp := Params{}\n\tp.names = []string{}\n\tp.values = map[string]interface{}{}\n\n\treturn &p\n}", "func (s *BasemumpsListener) EnterParam(ctx *ParamContext) {}", "func (self params) Add(param *Param) (updatedParams params) {\n return append(append(updatedParams, param), self...)\n}", "func newUpdateParam4Update(req *http.Request) (*UpdateParam, error) {\n\tparam := &UpdateParam{}\n\terr := xreq.BindURI(req, param)\n\n\treturn param, err\n}", "func newStringConstant(name string) *Param {\n\treturn &Param{\n\t\tParameterKind: stringConstant,\n\t\tName: name,\n\t\tParameterType: \"string\",\n\t}\n}", "func TestParam(t *testing.T) {\n\tparamCode := \"123456\"\n\tparamFields := \"f1;f2;f3\"\n\n\tts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tif r.Form.Get(\"code\") != paramCode {\n\t\t\tt.Errorf(\"Expected 'code' == %s; got %v\", paramCode, r.Form.Get(\"code\"))\n\t\t}\n\n\t\tif r.Form.Get(\"fields\") != paramFields {\n\t\t\tt.Errorf(\"Expected 'fields' == %s; got %v\", paramFields, r.Form.Get(\"fields\"))\n\t\t}\n\t}))\n\n\tdefer ts.Close()\n\n\tNew().Get(ts.URL).\n\t\tParam(\"code\", paramCode).\n\t\tParam(\"fields\", paramFields)\n}", "func (c *InputService21ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func newPerson(name string, age int) *Person {\n\tnewperson := Person{name: name, age: age}\n\treturn &newperson\n}", "func (c *InputService22ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (s RealmGateway_export_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RealmGateway_export_Params) NewParams() (Persistent_SaveParams, error) {\n\tss, err := NewPersistent_SaveParams(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Persistent_SaveParams{}, err\n\t}\n\terr = s.Struct.SetPtr(1, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (c *InputService9ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *OutputService1ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *OutputService1ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *OutputService14ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func NewSayParams() *SayParams {\n\tvar ()\n\treturn &SayParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (c *InputService1ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (gm GlobalManager) RegisterParamChangeEvent(ctx sdk.Context, event types.Event) sdk.Error {\n\t// param will be changed in one day\n\tproposalParam, err := gm.paramHolder.GetProposalParam(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif ctx.BlockHeader().Height > types.LinoBlockchainFirstUpdateHeight {\n\t\tif err := gm.registerEventAtTime(\n\t\t\tctx, ctx.BlockHeader().Time.Unix()+3600, event); err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tif err := gm.registerEventAtTime(\n\t\t\tctx, ctx.BlockHeader().Time.Unix()+proposalParam.ChangeParamExecutionSec, event); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func (c *OutputService9ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func addParameters(p *[]*cloudformation.Parameter, key string, values []string) {\n\n\tfor _, values := range values {\n\t\t*p = append(*p, &cloudformation.Parameter{\n\t\t\tParameterKey: &key,\n\t\t\tParameterValue: &values,\n\t\t\tResolvedValue: nil,\n\t\t\tUsePreviousValue: nil,\n\t\t})\n\t}\n}", "func (x *fastReflection_Params) New() protoreflect.Message {\n\treturn new(fastReflection_Params)\n}", "func newTemplateParams(r *http.Request) templateParams {\n\tuser := ctx.Get(r, \"user\").(models.User)\n\tsession := ctx.Get(r, \"session\").(*sessions.Session)\n\tmodifySystem, _ := user.HasPermission(models.PermissionModifySystem)\n\treturn templateParams{\n\t\tToken: csrf.Token(r),\n\t\tUser: user,\n\t\tModifySystem: modifySystem,\n\t\tVersion: config.Version,\n\t\tFlashes: session.Flashes(),\n\t}\n}", "func NewInvalidParam(field string, message string, args ...interface{}) *AppError {\n\treturn NewBadRequest(field, message, args...)\n}", "func NewParams(\n\tmintDenom string, inflationRateChange, inflationMax, inflationMin, goalBonded sdk.Dec, blocksPerYear uint64,\n) Params {\n\n\treturn Params{\n\t\tMintDenom: mintDenom,\n\t\tInflationRateChange: inflationRateChange,\n\t\tInflationMax: inflationMax,\n\t\tInflationMin: inflationMin,\n\t\tGoalBonded: goalBonded,\n\t\tBlocksPerYear: blocksPerYear,\n\t}\n}", "func NewParameters(in *yaml.Node, context *compiler.Context) (*Parameters, error) {\n\terrors := make([]error, 0)\n\tx := &Parameters{}\n\tm, ok := compiler.UnpackMap(in)\n\tif !ok {\n\t\tmessage := fmt.Sprintf(\"has unexpected value: %+v (%T)\", in, in)\n\t\terrors = append(errors, compiler.NewError(context, message))\n\t} else {\n\t\t// repeated NamedParameter additional_properties = 1;\n\t\t// MAP: Parameter\n\t\tx.AdditionalProperties = make([]*NamedParameter, 0)\n\t\tfor i := 0; i < len(m.Content); i += 2 {\n\t\t\tk, ok := compiler.StringForScalarNode(m.Content[i])\n\t\t\tif ok {\n\t\t\t\tv := m.Content[i+1]\n\t\t\t\tpair := &NamedParameter{}\n\t\t\t\tpair.Name = k\n\t\t\t\tvar err error\n\t\t\t\tpair.Value, err = NewParameter(v, compiler.NewContext(k, v, context))\n\t\t\t\tif err != nil {\n\t\t\t\t\terrors = append(errors, err)\n\t\t\t\t}\n\t\t\t\tx.AdditionalProperties = append(x.AdditionalProperties, pair)\n\t\t\t}\n\t\t}\n\t}\n\treturn x, compiler.NewErrorGroupOrNil(errors)\n}", "func (broadcast *Broadcast) ChangeProposalParam(ctx context.Context, creator string,\n\tparameter model.ProposalParam, reason string, privKeyHex string, seq int64) (*model.BroadcastResponse, error) {\n\tmsg := model.ChangeProposalParamMsg{\n\t\tCreator: creator,\n\t\tParameter: parameter,\n\t\tReason: reason,\n\t}\n\treturn broadcast.broadcastTransaction(ctx, msg, privKeyHex, seq, \"\", false)\n}", "func (s *BasevhdlListener) EnterParameter_specification(ctx *Parameter_specificationContext) {}", "func (c *InputService11ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *OutputService10ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func NewExample(db *db.DB) *Example {\n\treturn &Example{\n\t\tdb: db,\n\t}\n}", "func ExampleNewPerson() {\n\tperson := NewPerson(\"bob\")\n\t_ = person\n}", "func (c *InputService19ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *OutputService13ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService10ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *InputService4ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *OutputService15ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (d *Demo) UseParams(useParams bool) {\n\td.useParams = useParams\n}", "func (m *Method) AddParameter(dataType *Type, name string) (*Field, error) {\n\tfor _, parm := range m.Parameters {\n\t\tif strings.ToLower(parm.Name) == strings.ToLower(name) {\n\t\t\treturn nil, fmt.Errorf(\"Parameter redefined in method %s: %s\", m.Name, name)\n\t\t}\n\t}\n\tp := new(Field)\n\tp.Init()\n\tp.Name = name\n\tp.Type = dataType\n\tm.Parameters = append(m.Parameters, p)\n\treturn p, nil\n}", "func (c *InputService20ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "func (c *OutputService4ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}" ]
[ "0.63941187", "0.62056255", "0.5842661", "0.581108", "0.5740346", "0.5723421", "0.57176363", "0.5702052", "0.56909066", "0.5682781", "0.5605191", "0.5585697", "0.5565334", "0.5528868", "0.5498187", "0.548101", "0.5451902", "0.5430552", "0.5398362", "0.5391204", "0.53510535", "0.53211325", "0.5298188", "0.52687186", "0.5254115", "0.52519155", "0.5242243", "0.522838", "0.52253646", "0.51530313", "0.5136473", "0.5129361", "0.5098716", "0.5090089", "0.5089701", "0.5086246", "0.5084616", "0.50726426", "0.50726426", "0.5068296", "0.5062414", "0.5058197", "0.5044299", "0.503925", "0.50200623", "0.50160694", "0.50055945", "0.49986592", "0.49867907", "0.49792144", "0.4970881", "0.49693865", "0.49448523", "0.49415806", "0.49319765", "0.49298665", "0.4920935", "0.49188617", "0.4911603", "0.48920938", "0.4891453", "0.48853442", "0.4871385", "0.48655725", "0.48500863", "0.4833497", "0.4820836", "0.4813437", "0.4812893", "0.4793963", "0.4793963", "0.47933948", "0.47892907", "0.47892907", "0.47881758", "0.47871882", "0.4786287", "0.47856817", "0.47848803", "0.4783648", "0.47789553", "0.47789267", "0.47772643", "0.47723234", "0.4769383", "0.47657436", "0.47632095", "0.47606468", "0.47534594", "0.47521177", "0.47520941", "0.4752009", "0.4746521", "0.47438768", "0.473477", "0.4733833", "0.4732241", "0.47278702", "0.4726759", "0.47254965" ]
0.6167317
2
NewSuccessExample is new success example with status code
func NewSuccessExample(title string, v interface{}, status int) *Example { return newExample(title, v, exampleTypeSuccess, status) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewSuccess(data, meta interface{}) *Success {\n\treturn &Success{\n\t\tData: data,\n\t\tMeta: meta,\n\t}\n}", "func NewSuccessExample200(title string, v interface{}) *Example {\n\treturn newExample(title, v, exampleTypeSuccess, http.StatusOK)\n}", "func newSuccessResp(key, msg string) *ResponseType {\n\treturn &ResponseType{Ok: true, Message: msg, Key: key}\n}", "func Success(c echo.Context) error {\n\treturn c.String(http.StatusOK, \"Operation was fine\")\n}", "func TestReturnSuccess201(t *testing.T) {\n\torigin := logger.Errorf\n\tdefer func() { logger.Errorf = origin }()\n\tlogger.Errorf = mockErrorf\n\n\tlog.Println(\"\\nTestReturnSuccess201\")\n\tReturnSuccessWithObj(\n\t\t201,\n\t\tCommonResponse{Url: \"http://host:port/some_entity/some_id\"},\n\t\tmw)\n\n\tos.Stderr.Sync()\n}", "func Success(w http.ResponseWriter, message string, code int) {\n\tif code == 0 {\n\t\tcode = http.StatusOK\n\t}\n\tw.WriteHeader(code)\n\tjson.NewEncoder(w).Encode(map[string]string{\"success\": message})\n}", "func BebCreateSuccess(w http.ResponseWriter) {\n\tw.WriteHeader(http.StatusAccepted)\n\tresponse := bebtypes.CreateResponse{\n\t\tResponse: bebtypes.Response{\n\t\t\tStatusCode: http.StatusAccepted,\n\t\t\tMessage: \"\",\n\t\t},\n\t\tHref: \"\",\n\t}\n\terr := json.NewEncoder(w).Encode(response)\n\tExpect(err).ShouldNot(HaveOccurred())\n}", "func Success(code int) APIStatus {\n\treturn APIStatus{success: true, code: code, message: \"\"}\n}", "func Success(w http.ResponseWriter, code int, msg string, data interface{}) error {\n\treturn sendResponse(w, Resp{SUCCESS, code, msg, data, SuccessHttpCode})\n}", "func Success(w http.ResponseWriter) {\n\tw.Write(JSON(SuccessResponse{Message: \"success\", Code: 200}))\n}", "func newSuccessResult(vres *salesviews.SuccessResultView) *SuccessResult {\n\tres := &SuccessResult{}\n\tif vres.OK != nil {\n\t\tres.OK = *vres.OK\n\t}\n\treturn res\n}", "func (htpc *HttpProcessorConfig) Success(httpCode int) *HttpProcessorConfig {\n\thtpc.success = httpCode\n\treturn htpc\n}", "func Success(ctx *fiber.Ctx, msg string, data interface{}, status int) error {\n\treturn response(ctx, http.StatusOK, fiber.Map{\n\t\t\"success\": true,\n\t\t\"message\": msg,\n\t\t\"data\": data,\n\t})\n}", "func Success(ctx ...interface{}) {\n\tlogNormal(successStatus, time.Now(), ctx...)\n}", "func Success(r *ghttp.Request, data ...interface{}) *apiResp {\n\treturn NewResp(r, SUCCESS, \"\", data...)\n}", "func IrisSuccess(c iris.Context, data interface{}) {\n\tencodelog(c, &Response{ErrNo: 10000, ErrMsg: \"\", Data: data}, \"success response\")\n}", "func (c *Ctx) Success(body interface{}) error {\n\tc.Respond(http.StatusOK, body)\n\treturn nil\n}", "func TestCreateSuccess(t *testing.T) {\n\tisTesting = true\n\tvar request = Request{\n\t\tPath: \"/api/devices\",\n\t\tHTTPMethod: \"POST\",\n\t\tBody: `{\n\t\t\t\"id\": \"valid-id\",\n\t\t\t\"deviceModel\": \"valid-device-model\",\n\t\t\t\"model\": \"valid-model\",\n\t\t\t\"name\": \"valid-name\",\n\t\t\t\"serial\": \"valid-serial\"\n\t\t}`,\n\t}\n\tvar response, _ = Handler(request)\n\tif response.StatusCode != 201 {\n\t\tt.Errorf(\"response status code has to be 201\")\n\t}\n}", "func NewHTTPSuccessClient() HTTPSuccessClient {\n return NewHTTPSuccessClientWithBaseURI(DefaultBaseURI, )\n}", "func (a *AutoRollNotifier) SendNewSuccess(ctx context.Context, id, url string) {\n\ta.send(ctx, &tmplVars{\n\t\tIssueID: id,\n\t\tIssueURL: url,\n\t}, subjectTmplNewSuccess, bodyTmplNewSuccess, notifier.SEVERITY_WARNING, MSG_TYPE_NEW_SUCCESS, nil)\n}", "func genericSuccess(caller, inp, msg string) error {\n\tresp, err := json.Marshal(&Response{Status: \"Success\", Message: msg})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tprintAndLog(caller, inp, string(resp))\n\treturn nil\n}", "func SuccessResult(Response model.Response) model.Response {\n\tResponse.Code = Success\n\tResponse.Description = StatusCodes(Success)\n\n\treturn Response\n}", "func SuccessMessage(c *gin.Context, msg string) {\n\tc.JSON(http.StatusOK, &Result{\n\t\tMessage: msg,\n\t})\n}", "func respond_with_success(w http.ResponseWriter,\n\tstatus int,\n\tmessage string) {\n\tdetail := fmt.Sprintf(\"Success (%d). Sending response: %s\", status, message)\n\tif logutil.GPS_DEBUG > 0 {\n\t\tlogutil.LogRestResponse(detail)\n\t}\n\tadd_json_header(w)\n\tset_response_status(w, status)\n\tfmt.Fprintf(w, \"%s\\n\", message)\n}", "func Success(taskDescription string) {\n\tcolor.Green(\"Success - \" + taskDescription)\n}", "func Success(w io.Writer, format string, args ...any) {\n\tformat = strings.TrimRight(format, \"\\r\\n\") + \"\\n\"\n\tfmt.Fprintf(w, \"\\n\"+Wrap(BoldGreen(\"SUCCESS: \")+format, DefaultTextWidth)+\"\\n\", args...)\n}", "func Success(msg string) *Answer {\n\treturn &Answer{Message: \"success: \" + msg}\n}", "func Success(err error, statusCode int, message string, args ...interface{}) {\n\tif e := ok_err(err, statusCode, message, args...); e != nil {\n\t\tpanic(e)\n\t}\n}", "func HandleCreateSuccessfully(t *testing.T, output string) {\n\tth.Mux.HandleFunc(\"/software_configs\", func(w http.ResponseWriter, r *http.Request) {\n\t\tth.TestMethod(t, r, \"POST\")\n\t\tth.TestHeader(t, r, \"X-Auth-Token\", fake.TokenID)\n\t\tth.TestHeader(t, r, \"Accept\", \"application/json\")\n\t\tw.WriteHeader(http.StatusOK)\n\t\tfmt.Fprintf(w, output)\n\t})\n}", "func (r *Router) Success(ctx context.Context, w http.ResponseWriter, code int) {\n\treqID := r.GetRequestID(ctx)\n\n\tr.setDefaultHeaders(ctx, w)\n\n\tif code != http.StatusOK {\n\t\tw.WriteHeader(code)\n\t}\n\n\tr.logger.Debugw(\"response\",\n\t\t\"request_id\", reqID,\n\t\t\"status_code\", code,\n\t)\n}", "func WriteSuccess(w http.ResponseWriter, data interface{}, status int) {\n\tres := response.BuildSuccess(data, response.MetaInfo{HTTPStatus: status})\n\tresponse.Write(w, res, status)\n}", "func (c *Context) Success(name string) {\n\tc.HTML(http.StatusOK, name)\n}", "func (rest *TestTeamREST) TestCreateTeamSuccess() {\n\tservice, controller := rest.SecuredController(rest.testIdentity)\n\n\tg := rest.DBTestSuite.NewTestGraph(rest.T())\n\tspc := g.CreateSpace().AddAdmin(g.LoadIdentity(rest.testIdentity.ID))\n\n\tteamName := \"Team-\" + uuid.NewV4().String()\n\tpayload := &app.CreateTeamPayload{\n\t\tName: &teamName,\n\t\tSpaceID: &spc.Resource().ResourceID,\n\t}\n\n\t_, created := test.CreateTeamCreated(rest.T(), service.Context, service, controller, payload)\n\n\trequire.NotEmpty(rest.T(), created.TeamID)\n}", "func CreateSuccessResponse(result interface{}) *Response {\n\treturn &Response{Success: true, Result: result}\n}", "func TestSuccess(t *testing.T) {\n\trouter := SetupRouter()\n\n\tw := performRequest(router, \"GET\", \"/v1/fizzbuzz?string1=Fizz&string2=Buzz&int1=3&int2=5&limit=15\")\n\tassert.Equal(t, http.StatusOK, w.Code)\n\n\tvar response FizzbuzzResponse\n\terr := json.Unmarshal([]byte(w.Body.String()), &response)\n\tassert.Nil(t, err)\n\n\twant := []string{\"1\", \"2\", \"Fizz\", \"4\", \"Buzz\", \"Fizz\", \"7\", \"8\", \"Fizz\", \"Buzz\", \"11\", \"Fizz\", \"13\", \"14\", \"FizzBuzz\"}\n\tassert.Equal(t, want, response.Value)\n\tassert.Equal(t, 200, response.Status)\n}", "func (e *expectation) WithStatusCode(code int) { e.code = code }", "func TestCreateCourseSuccessNew(t *testing.T) {\n\n\t_ = config.SetConfigurationFromFile(\"../../../config/config-test.json\")\n\n\t// build the information of the course to be created (in a simplified way)\n\tjsonBody := simplejson.New()\n\tjsonBody.Set(\"name\", \"courseSuccess\")\n\n\t// generate a token to be appended to the course creation request\n\tuser := microservice.User{Name: \"nome\", Surname: \"cognome\", Username: \"username\", Password: \"password\", Type: \"teacher\", Mail: \"[email protected]\"}\n\ttoken, _ := microservice.GenerateAccessToken(user, []byte(config.Configuration.TokenPrivateKey))\n\n\t// make the POST request for the course creation\n\trequestBody, _ := jsonBody.MarshalJSON()\n\trequest, _ := http.NewRequest(http.MethodPost, \"/didattica-mobile/api/v1.0/courses\", bytes.NewBuffer(requestBody))\n\trequest.Header.Set(\"Content-Type\", \"application/json\")\n\trequest.AddCookie(&http.Cookie{Name: \"token\", Value: token})\n\n\tresponse := httptest.NewRecorder()\n\thandler := createTestGatewayCreateCourse()\n\t// Goroutines represent the micro-services listening to the requests coming from the api gateway\n\tgo mock.LaunchCourseManagementMock()\n\tgo mock.LaunchNotificationManagementMock()\n\t// simulates a request-response interaction between client and api gateway\n\thandler.ServeHTTP(response, request)\n\n\tif response.Code != http.StatusCreated {\n\t\tt.Error(\"Expected 201 Ok but got \" + strconv.Itoa(response.Code) + \" \" + http.StatusText(response.Code))\n\t}\n\n}", "func CommandSucceed(result StringInterface) *HTTPResult {\n\treturn &HTTPResult{\n\t\tMessage: \"OK\",\n\t\tDetails: result,\n\t}\n}", "func Success(file *os.File) *log.Logger {\n\tLogSucc := log.New(file, \"SUCCESS: \", log.Ldate|log.Ltime|log.Lshortfile)\n\treturn LogSucc\n}", "func SuccessSave(c *gin.Context, data interface{}, msg string) {\n\tc.JSON(http.StatusOK, &Result{\n\t\tData: data,\n\t\tMessage: msg,\n\t})\n}", "func CreateSuccessResponse(w http.ResponseWriter, data interface{}) {\n\tif data != nil {\n\t\tbytes, err := json.Marshal(data)\n\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tlog.Println(err)\n\t\t\treturn\n\t\t}\n\n\t\tw.Write(bytes)\n\t}\n}", "func TestSuccessful(t *testing.T) {\n\tcontroller := newTestController(t)\n\n\t// First try creating an invoice\n\tinv := load_scaffold_invoice(t, \"valid_v1\")\n\t_, err := controller.Client.CreateInvoice(inv)\n\tif err != nil {\n\t\tt.Fatalf(\"Unable to create invoice: %s\", err)\n\t}\n\n\t// Now create the parcel associated with that invoice\n\tdata := load_scaffold_parcel_data(t, \"valid_v1\", \"parcel\")\n\tif err := controller.Client.CreateParcel(inv.Name(), inv.Parcel[0].Label.SHA256, data); err != nil {\n\t\tt.Fatalf(\"Unable to create parcel: %s\", err)\n\t}\n\n\t// Now see if we get the parcel back from the server\n\tserverData, err := controller.Client.GetParcel(inv.Name(), inv.Parcel[0].Label.SHA256)\n\tif err != nil {\n\t\tt.Fatalf(\"Unable to fetch parcel from server: %s\", err)\n\t}\n\n\tif !reflect.DeepEqual(data, serverData) {\n\t\tt.Fatalf(\"Did not get back valid data from the server\\nExpected: %s\\nGot: %s\", data, serverData)\n\t}\n\n\t// Now try yanking the parcel and fetching it to make sure it gives us an error\n\tif err := controller.Client.YankInvoice(inv.Name()); err != nil {\n\t\tt.Fatalf(\"Unable to yank invoice: %s\", err)\n\t}\n\n\t_, err = controller.Client.GetInvoice(inv.Name())\n\tif err == nil {\n\t\tt.Fatal(\"Shouldn't be able to get a yanked invoice\")\n\t}\n\n\t// Get the yanked invoice and make sure it works\n\t_, err = controller.Client.GetYankedInvoice(inv.Name())\n\tif err != nil {\n\t\tt.Fatalf(\"Should be able to get a yanked invoice: %s\", err)\n\t}\n}", "func Success(c *gin.Context, data interface{}) {\n\tGinCorsHeaders(c)\n\tresponse := gin.H{\"code\": 20000, \"message\": \"success\", \"data\": data}\n\tc.JSON(http.StatusOK, response)\n}", "func (o *CreateRepository28Created) IsSuccess() bool {\n\treturn true\n}", "func Success(c *gin.Context, data interface{}) {\n\tc.JSON(http.StatusOK, &Result{\n\t\tData: data,\n\t})\n}", "func OK(w http.ResponseWriter, data interface{}, message string) {\n\tsuccessResponse := BuildSuccess(data, message, MetaInfo{HTTPStatus: http.StatusOK})\n\tWrite(w, successResponse, http.StatusOK)\n}", "func (a *assertEncapsulation) Success(err error, statusCode int, message string, args ...interface{}) {\n\tif e := ok_err(err, statusCode, message, args...); e != nil {\n\t\ta.throw(e)\n\t}\n}", "func RespondSuccess(w http.ResponseWriter, code int, success bool, message string, messageBody string) {\n\tRespondJSON(w, code, success, message, map[string]string{\"success\": messageBody})\n}", "func (m *Master) Example(args *ExampleArgs, reply *ExampleReply) error {\n\treply.Y = args.X + 1\n\treturn nil\n\t//return errors.New(\"test error 1\")\n}", "func Success(ctx context.Context, responseStatusCode int, statusCode, statusMessage string, data interface{}) Output {\n\tres := response{}\n\tres.StatusCode = responseStatusCode\n\tres.Status.Error = false\n\tres.Status.Code = statusCode\n\tres.Status.Message = statusMessage\n\n\t// send to logger before set data to response\n\tlogger.Response(ctx, responseStatusCode, res, nil, nil)\n\tlogger.ResponseMessage(ctx, statusMessage)\n\n\tres.Data = data\n\n\treturn &res\n}", "func newReturnCode(kind ReturnCodeKind, code int, desc string, info string) *ReturnCode {\n\treturn &ReturnCode{kind, code, desc, info}\n}", "func IncrementSuccessfulCreate(counts int) {\n\tincSuccessfulRequestByHandler(\"create\", counts)\n}", "func (r *Result) Success() {\n\tr.Pass = true\n}", "func SuccessWithReason(ctx context.Context, responseStatusCode int, statusCode, statusMessage, statusReason string, data interface{}) Output {\n\tres := response{}\n\tres.StatusCode = responseStatusCode\n\tres.Status.Error = false\n\tres.Status.Code = statusCode\n\tres.Status.Message = statusMessage\n\tres.Status.Reason = statusReason\n\n\t// send to logger before set data to response\n\tlogger.Response(ctx, responseStatusCode, res, nil, nil)\n\tlogger.ResponseMessage(ctx, statusMessage)\n\n\tres.Data = data\n\n\treturn &res\n}", "func (o *BackupsCreateStatusOK) Code() int {\n\treturn 200\n}", "func Created(ctx *fiber.Ctx, msg string, data interface{}) error {\n\treturn Success(ctx, msg, data, http.StatusCreated)\n}", "func TestSuccessErrorResponses(t *testing.T) {\n\n\tt.Log(\"Testing Success Status\")\n\tstatus := geoAPICallHarness(Ok200, \"status\", true, true, true, false, \"\")\n\n\tif !strings.Contains(status, \"200\") {\n\t\tt.Errorf(\"Expected a 200 response but got %s\", status)\n\t}\n\n\tt.Log(\"Testing UniqueID 400 Error\")\n\tif !strings.Contains(geoAPICallHarness(Error400sameUUID, \"body\", true, true, false, false, \"\"), messages.Err400MessageUUID) {\n\t\tt.Errorf(\"Expected response body message to contain %s and it did not\", messages.Err400MessageUUID)\n\t}\n\n\tt.Log(\"Testing same timestamp 400 Error\")\n\tif !strings.Contains(geoAPICallHarness(Error400sameTimestampByUser, \"body\", false, true, true, false, \"\"), messages.Err400MessageTime) {\n\t\tt.Errorf(\"Expected response body message to contain %s and it did not\", messages.Err400MessageTime)\n\t}\n}", "func TestTerraformBasicExampleNew(t *testing.T) {\n\tprojectname := \"awesomeproject\"\n\tterraformOptions := &terraform.Options {\n\t\t// The path to where your Terraform code is located\n\t\tTerraformDir: \"../\",\n\t\t// Variables to pass to our Terraform code using -var options\n\t\tVars: map[string]interface{}{\n\t\t\t\"name\": projectname,\n\t\t\t\"comment\" = \"tf-example-ons-instance-remark\",\n\t\t\t\"region\" = \"cn-beijing\",\n\t\t},\n\t\t// Disable colors in Terraform commands so its easier to parse stdout/stderr\n\t\tNoColor: true,\n\t}\n\t \n\t// At the end of the test, run `terraform destroy` to clean up any resources that were created\n\tdefer terraform.Destroy(t, terraformOptions)\n\t \n\t// This will run `terraform init` and `terraform apply` and fail the test if there are any errors\n\tterraform.InitAndApply(t, terraformOptions)\n\n\tactualproject := terraform.Output(t, terraformOptions, \"id\")\n\tassert.Equal(t, projectname, actualproject)\n}", "func Success() Result {\n\treturn Result{}\n}", "func (o *CreateRepository8Created) IsSuccess() bool {\n\treturn true\n}", "func successStatus(status int) bool {\n\treturn status >= 200 && status <= 399\n}", "func Success(body string) (events.APIGatewayProxyResponse, error) {\n\treturn events.APIGatewayProxyResponse{StatusCode: 200, Body: body}, nil\n}", "func IsSuccess(code int) bool {\n\treturn http.StatusOK <= code && code < http.StatusMultipleChoices\n}", "func (a *APIResponse) Success(data interface{}) {\n\ta.Status = HttpStatus{Code: http.StatusOK, Message: http.StatusText(http.StatusOK)}\n\ta.Data = data\n}", "func Created(w http.ResponseWriter, data interface{}) {\n\tsuccessResponse := BuildSuccess(data, \"Created\", MetaInfo{HTTPStatus: http.StatusCreated})\n\tWrite(w, successResponse, http.StatusCreated)\n}", "func TestNewSimpleResponse(t *testing.T) {\n\t// Create without format.\n\tr := NewSimpleResponse(\"TAG\", \"XXX\")\n\tif r.Status != \"TAG\" {\n\t\tt.Fatalf(\"Unexpected status. Expected: %s - Found: %s.\", \"TAG\", r.Status)\n\t}\n\tif r.Message != \"XXX\" {\n\t\tt.Fatalf(\"Unexpected message. Expected: %s - Found: %s.\", \"XXX\", r.Message)\n\t}\n\t// Create with format.\n\tr = NewSimpleResponsef(\"TAG2\", \"the%s\", \"message\")\n\tif r.Status != \"TAG2\" {\n\t\tt.Fatalf(\"Unexpected status. Expected: %s - Found: %s.\", \"TAG2\", r.Status)\n\t}\n\tif r.Message != \"themessage\" {\n\t\tt.Fatalf(\"Unexpected message. Expected: %s - Found: %s.\", \"themessage\", r.Message)\n\t}\n}", "func (o *CreateRepository38Created) IsSuccess() bool {\n\treturn true\n}", "func Ok(ctx *fiber.Ctx, msg string, data interface{}) error {\n\treturn Success(ctx, msg, data, http.StatusOK)\n}", "func (o *ObjectsCreateOK) Code() int {\n\treturn 200\n}", "func TestSuccess(t *testing.T) {\n\tdefer test.Guard(t)()\n\n\tctx := createClientTestContext(t, nil)\n\n\t// Initiate uncharge.\n\n\thash, _, err := ctx.swapClient.LoopOut(context.Background(), testRequest)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tctx.assertStored()\n\tctx.assertStatus(loopdb.StateInitiated)\n\n\tsignalSwapPaymentResult := ctx.AssertPaid(swapInvoiceDesc)\n\tsignalPrepaymentResult := ctx.AssertPaid(prepayInvoiceDesc)\n\n\t// Expect client to register for conf\n\tconfIntent := ctx.AssertRegisterConf()\n\n\ttestSuccess(ctx, testRequest.Amount, *hash,\n\t\tsignalPrepaymentResult, signalSwapPaymentResult, false,\n\t\tconfIntent,\n\t)\n}", "func writeSuccess(w http.ResponseWriter, targetLanguage language.Tag, targetPhrase string) {\n\theaders := w.Header()\n\n\theaders.Set(\"Content-Type\", \"text/plain\")\n\theaders.Set(\"Content-Language\", targetLanguage.String())\n\tw.WriteHeader(http.StatusOK)\n\tio.WriteString(w, targetPhrase)\n}", "func (c *Controller) succeed(j weles.JobID) {\n\t// errors logged in the SetStatusAndInfo.\n\t_ = c.jobs.SetStatusAndInfo(j, weles.JobStatusCOMPLETED, \"\") // nolint:gosec\n\tc.boruter.Release(j)\n}", "func (o *CreateRepository37Created) IsSuccess() bool {\n\treturn true\n}", "func Success(t *testing.T, msg string, args ...interface{}) {\n\tm := fmt.Sprintf(msg, args...)\n\tt.Log(fmt.Sprintf(\"\\t %-80s\", m), Succeed)\n}", "func TestGetSuccess(t *testing.T) {\n\tisTesting = true\n\n\tvar params = make(map[string]string)\n\tparams[\"id\"] = \"valid-id\"\n\n\tvar request = Request{\n\t\tPath: \"/api/devices\",\n\t\tPathParameters: params,\n\t\tHTTPMethod: \"GET\",\n\t}\n\tvar response, _ = Handler(request)\n\tif response.StatusCode != 200 {\n\t\tt.Errorf(\"response status code has to be 200 but is %d\", response.StatusCode)\n\t}\n}", "func (o *SnapshotCreateDefault) IsSuccess() bool {\n\treturn o._statusCode/100 == 2\n}", "func (response BasicJSONResponse) Success(writer http.ResponseWriter) {\n\tSuccess(writer, response)\n}", "func (t *Test) PrintSuccess() {\n\tlog.Successf(\"ok: %s\", t.Name)\n}", "func (s *business) Create(example repository.Example) *response.Error {\n\ts.logger = s.loggerClone\n\ts.logger.SugaredLogger = s.logger.With(\"method\", \"Create\")\n\n\texample.ExampleID = util.GetUUID()\n\texample.Status = \"Pending\"\n\texample.CreateTime = time.Now()\n\n\terr := s.repository.CreateExample(example)\n\tif err != nil {\n\t\ts.logger.Errorw(\"create data error\", \"error\", err)\n\t\treturn response.NewErrorFromCode(errorcode.CreateDataError)\n\t}\n\n\treturn nil\n}", "func (o *BackupsCreateStatusOK) IsSuccess() bool {\n\treturn true\n}", "func IsSuccess(statusCode int) bool {\n\treturn statusCode >= 200 && statusCode <= 299\n}", "func successLogger(testName, function string, args map[string]interface{}, startTime time.Time) *log.Entry {\n\t// calculate the test case duration\n\tduration := time.Since(startTime)\n\t// log with the fields as per mint\n\tfields := log.Fields{\"name\": \"minio-go: \" + testName, \"function\": function, \"args\": args, \"duration\": duration.Nanoseconds() / 1000000, \"status\": \"PASS\"}\n\treturn log.WithFields(cleanEmptyEntries(fields))\n}", "func (o *ObjectsClassReferencesCreateOK) Code() int {\n\treturn 200\n}", "func (o *ObjectsClassReferencesCreateOK) IsSuccess() bool {\n\treturn true\n}", "func (r *ModifyTaskRequest) SetSuccess(success bool) {\n r.Success = success\n}", "func PrintSuccessMessage(w http.ResponseWriter, obj interface{}) {\n\tmodel, err := json.Marshal(obj)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\tw.Write(model)\n}", "func (o *FpolicyPolicyCreateDefault) IsSuccess() bool {\n\treturn o._statusCode/100 == 2\n}", "func ResponseSuccess(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(JSONSuccess{true})\n}", "func (o *GetVersionDefault) IsSuccess() bool {\n\treturn o._statusCode/100 == 2\n}", "func NewSuccessResponse() Response {\n\treturn Response{Type: TypeSuccess}\n}", "func Succeeded(msg string) Response {\n\treturn ValidationResponse(true, msg)\n}", "func (s statusCode) Successful() bool { return s >= 200 && s < 300 }", "func CreateSuccessResponse(status uint16, id string, message string) []byte {\n\tresponse := Response{Status: status,\n\t\tId: id,\n\t\tMessage: message}\n\n\tresponseByte, err := json.Marshal(response)\n\n\tif err != nil {\n\t\treturn []byte(\"Something went wrong while parsing json\")\n\t}\n\n\treturn responseByte\n}", "func BuildSuccess(data interface{}, meta MetaInfo) SuccessResponse {\n\treturn SuccessResponse{\n\t\tData: data,\n\t\tMeta: meta,\n\t}\n}", "func new(c int, msg string) *Status {\n\treturn &Status{s: &spb.Status{Code: int32(c), Message: msg, Details: make([]*anypb.Any, 0)}}\n}", "func Created() Response {\n\treturn Response{\n\t\tStatusCode: http.StatusCreated,\n\t}\n}", "func BebListSuccess(w http.ResponseWriter) {\n\tw.WriteHeader(http.StatusAccepted)\n\tresponse := bebtypes.Response{\n\t\tStatusCode: http.StatusOK,\n\t\tMessage: \"\",\n\t}\n\terr := json.NewEncoder(w).Encode(response)\n\tExpect(err).ShouldNot(HaveOccurred())\n}", "func OK(payload interface{}) Response {\n\treturn Response{\n\t\tStatusCode: http.StatusOK,\n\t\tPayload: payload,\n\t}\n}", "func SendSuccessCreatedResponse(res http.ResponseWriter, responseBody interface{}) {\n\tres.WriteHeader(http.StatusCreated)\n\tjson.NewEncoder(res).Encode(responseBody)\n}", "func (j *JSendBuilderBuffer) Success(data interface{}) JSendBuilder {\n\tj.Set(FieldStatus, StatusSuccess)\n\tj.Data(data)\n\treturn j\n}" ]
[ "0.6742122", "0.6642618", "0.6447652", "0.64146173", "0.63157445", "0.61503553", "0.613427", "0.6065614", "0.60331285", "0.603221", "0.59895325", "0.58895284", "0.5883674", "0.58781254", "0.5865341", "0.58603024", "0.5857298", "0.5821988", "0.58090246", "0.57793045", "0.5742757", "0.5733627", "0.5711509", "0.5701556", "0.5701467", "0.56950766", "0.569188", "0.56723595", "0.5649875", "0.5625649", "0.5622156", "0.5618176", "0.55976236", "0.5590296", "0.5586447", "0.5578435", "0.55755186", "0.55744296", "0.55620086", "0.55571157", "0.5531608", "0.5515593", "0.5494419", "0.5493493", "0.5493163", "0.5479718", "0.54796284", "0.54778934", "0.5460341", "0.5444515", "0.5442959", "0.5441968", "0.54415435", "0.5439219", "0.54327935", "0.54239523", "0.54233193", "0.5414346", "0.5412411", "0.5411321", "0.54057366", "0.54048276", "0.5399307", "0.5396337", "0.5395361", "0.53897303", "0.53861755", "0.5385253", "0.537876", "0.5376707", "0.53732705", "0.53671956", "0.53617394", "0.535363", "0.5352066", "0.5350533", "0.5345738", "0.5345041", "0.5342836", "0.5336706", "0.5335772", "0.5326706", "0.5324763", "0.53229624", "0.5315687", "0.53064865", "0.5305342", "0.53003776", "0.52997035", "0.5299117", "0.5296493", "0.5293367", "0.5290952", "0.5283143", "0.5280663", "0.5279624", "0.5278899", "0.527751", "0.5272245", "0.52642065" ]
0.7420235
0
NewSuccessExample200 is new success example and status OK
func NewSuccessExample200(title string, v interface{}) *Example { return newExample(title, v, exampleTypeSuccess, http.StatusOK) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewSuccessExample(title string, v interface{}, status int) *Example {\n\treturn newExample(title, v, exampleTypeSuccess, status)\n}", "func Success(c echo.Context) error {\n\treturn c.String(http.StatusOK, \"Operation was fine\")\n}", "func newSuccessResp(key, msg string) *ResponseType {\n\treturn &ResponseType{Ok: true, Message: msg, Key: key}\n}", "func NewSuccess(data, meta interface{}) *Success {\n\treturn &Success{\n\t\tData: data,\n\t\tMeta: meta,\n\t}\n}", "func Success(w http.ResponseWriter) {\n\tw.Write(JSON(SuccessResponse{Message: \"success\", Code: 200}))\n}", "func BebCreateSuccess(w http.ResponseWriter) {\n\tw.WriteHeader(http.StatusAccepted)\n\tresponse := bebtypes.CreateResponse{\n\t\tResponse: bebtypes.Response{\n\t\t\tStatusCode: http.StatusAccepted,\n\t\t\tMessage: \"\",\n\t\t},\n\t\tHref: \"\",\n\t}\n\terr := json.NewEncoder(w).Encode(response)\n\tExpect(err).ShouldNot(HaveOccurred())\n}", "func TestReturnSuccess201(t *testing.T) {\n\torigin := logger.Errorf\n\tdefer func() { logger.Errorf = origin }()\n\tlogger.Errorf = mockErrorf\n\n\tlog.Println(\"\\nTestReturnSuccess201\")\n\tReturnSuccessWithObj(\n\t\t201,\n\t\tCommonResponse{Url: \"http://host:port/some_entity/some_id\"},\n\t\tmw)\n\n\tos.Stderr.Sync()\n}", "func Success(w http.ResponseWriter, message string, code int) {\n\tif code == 0 {\n\t\tcode = http.StatusOK\n\t}\n\tw.WriteHeader(code)\n\tjson.NewEncoder(w).Encode(map[string]string{\"success\": message})\n}", "func OK(w http.ResponseWriter, data interface{}, message string) {\n\tsuccessResponse := BuildSuccess(data, message, MetaInfo{HTTPStatus: http.StatusOK})\n\tWrite(w, successResponse, http.StatusOK)\n}", "func Success(w http.ResponseWriter, code int, msg string, data interface{}) error {\n\treturn sendResponse(w, Resp{SUCCESS, code, msg, data, SuccessHttpCode})\n}", "func Success(ctx *fiber.Ctx, msg string, data interface{}, status int) error {\n\treturn response(ctx, http.StatusOK, fiber.Map{\n\t\t\"success\": true,\n\t\t\"message\": msg,\n\t\t\"data\": data,\n\t})\n}", "func Success(r *ghttp.Request, data ...interface{}) *apiResp {\n\treturn NewResp(r, SUCCESS, \"\", data...)\n}", "func (c *Ctx) Success(body interface{}) error {\n\tc.Respond(http.StatusOK, body)\n\treturn nil\n}", "func HandleCreateSuccessfully(t *testing.T, output string) {\n\tth.Mux.HandleFunc(\"/software_configs\", func(w http.ResponseWriter, r *http.Request) {\n\t\tth.TestMethod(t, r, \"POST\")\n\t\tth.TestHeader(t, r, \"X-Auth-Token\", fake.TokenID)\n\t\tth.TestHeader(t, r, \"Accept\", \"application/json\")\n\t\tw.WriteHeader(http.StatusOK)\n\t\tfmt.Fprintf(w, output)\n\t})\n}", "func TestCreateSuccess(t *testing.T) {\n\tisTesting = true\n\tvar request = Request{\n\t\tPath: \"/api/devices\",\n\t\tHTTPMethod: \"POST\",\n\t\tBody: `{\n\t\t\t\"id\": \"valid-id\",\n\t\t\t\"deviceModel\": \"valid-device-model\",\n\t\t\t\"model\": \"valid-model\",\n\t\t\t\"name\": \"valid-name\",\n\t\t\t\"serial\": \"valid-serial\"\n\t\t}`,\n\t}\n\tvar response, _ = Handler(request)\n\tif response.StatusCode != 201 {\n\t\tt.Errorf(\"response status code has to be 201\")\n\t}\n}", "func (c *Context) Success(name string) {\n\tc.HTML(http.StatusOK, name)\n}", "func PrintSuccessMessage(w http.ResponseWriter, obj interface{}) {\n\tmodel, err := json.Marshal(obj)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\tw.Write(model)\n}", "func OK(payload interface{}) Response {\n\treturn Response{\n\t\tStatusCode: http.StatusOK,\n\t\tPayload: payload,\n\t}\n}", "func Success(code int) APIStatus {\n\treturn APIStatus{success: true, code: code, message: \"\"}\n}", "func WriteSuccess(w http.ResponseWriter, data interface{}, status int) {\n\tres := response.BuildSuccess(data, response.MetaInfo{HTTPStatus: status})\n\tresponse.Write(w, res, status)\n}", "func genericSuccess(caller, inp, msg string) error {\n\tresp, err := json.Marshal(&Response{Status: \"Success\", Message: msg})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tprintAndLog(caller, inp, string(resp))\n\treturn nil\n}", "func respond_with_success(w http.ResponseWriter,\n\tstatus int,\n\tmessage string) {\n\tdetail := fmt.Sprintf(\"Success (%d). Sending response: %s\", status, message)\n\tif logutil.GPS_DEBUG > 0 {\n\t\tlogutil.LogRestResponse(detail)\n\t}\n\tadd_json_header(w)\n\tset_response_status(w, status)\n\tfmt.Fprintf(w, \"%s\\n\", message)\n}", "func CreateSuccessResponse(w http.ResponseWriter, data interface{}) {\n\tif data != nil {\n\t\tbytes, err := json.Marshal(data)\n\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tlog.Println(err)\n\t\t\treturn\n\t\t}\n\n\t\tw.Write(bytes)\n\t}\n}", "func Ok(ctx *fiber.Ctx, msg string, data interface{}) error {\n\treturn Success(ctx, msg, data, http.StatusOK)\n}", "func (c *SeaterController) OK(data interface{}) {\n\tc.Code(200)\n\tc.jsonResp(data)\n}", "func Success(w io.Writer, format string, args ...any) {\n\tformat = strings.TrimRight(format, \"\\r\\n\") + \"\\n\"\n\tfmt.Fprintf(w, \"\\n\"+Wrap(BoldGreen(\"SUCCESS: \")+format, DefaultTextWidth)+\"\\n\", args...)\n}", "func Success(c *gin.Context, data interface{}) {\n\tGinCorsHeaders(c)\n\tresponse := gin.H{\"code\": 20000, \"message\": \"success\", \"data\": data}\n\tc.JSON(http.StatusOK, response)\n}", "func Success(ctx ...interface{}) {\n\tlogNormal(successStatus, time.Now(), ctx...)\n}", "func IrisSuccess(c iris.Context, data interface{}) {\n\tencodelog(c, &Response{ErrNo: 10000, ErrMsg: \"\", Data: data}, \"success response\")\n}", "func (rest *TestTeamREST) TestCreateTeamSuccess() {\n\tservice, controller := rest.SecuredController(rest.testIdentity)\n\n\tg := rest.DBTestSuite.NewTestGraph(rest.T())\n\tspc := g.CreateSpace().AddAdmin(g.LoadIdentity(rest.testIdentity.ID))\n\n\tteamName := \"Team-\" + uuid.NewV4().String()\n\tpayload := &app.CreateTeamPayload{\n\t\tName: &teamName,\n\t\tSpaceID: &spc.Resource().ResourceID,\n\t}\n\n\t_, created := test.CreateTeamCreated(rest.T(), service.Context, service, controller, payload)\n\n\trequire.NotEmpty(rest.T(), created.TeamID)\n}", "func TestNewSimpleResponse(t *testing.T) {\n\t// Create without format.\n\tr := NewSimpleResponse(\"TAG\", \"XXX\")\n\tif r.Status != \"TAG\" {\n\t\tt.Fatalf(\"Unexpected status. Expected: %s - Found: %s.\", \"TAG\", r.Status)\n\t}\n\tif r.Message != \"XXX\" {\n\t\tt.Fatalf(\"Unexpected message. Expected: %s - Found: %s.\", \"XXX\", r.Message)\n\t}\n\t// Create with format.\n\tr = NewSimpleResponsef(\"TAG2\", \"the%s\", \"message\")\n\tif r.Status != \"TAG2\" {\n\t\tt.Fatalf(\"Unexpected status. Expected: %s - Found: %s.\", \"TAG2\", r.Status)\n\t}\n\tif r.Message != \"themessage\" {\n\t\tt.Fatalf(\"Unexpected message. Expected: %s - Found: %s.\", \"themessage\", r.Message)\n\t}\n}", "func SuccessSave(c *gin.Context, data interface{}, msg string) {\n\tc.JSON(http.StatusOK, &Result{\n\t\tData: data,\n\t\tMessage: msg,\n\t})\n}", "func Created(w http.ResponseWriter, data interface{}) {\n\tsuccessResponse := BuildSuccess(data, \"Created\", MetaInfo{HTTPStatus: http.StatusCreated})\n\tWrite(w, successResponse, http.StatusCreated)\n}", "func (ctx *ShowWorkflowContext) OK(resp []byte) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/xml\")\n\t}\n\tctx.ResponseData.WriteHeader(200)\n\t_, err := ctx.ResponseData.Write(resp)\n\treturn err\n}", "func writeSuccess(w http.ResponseWriter, targetLanguage language.Tag, targetPhrase string) {\n\theaders := w.Header()\n\n\theaders.Set(\"Content-Type\", \"text/plain\")\n\theaders.Set(\"Content-Language\", targetLanguage.String())\n\tw.WriteHeader(http.StatusOK)\n\tio.WriteString(w, targetPhrase)\n}", "func NewHTTPSuccessClient() HTTPSuccessClient {\n return NewHTTPSuccessClientWithBaseURI(DefaultBaseURI, )\n}", "func newSuccessResult(vres *salesviews.SuccessResultView) *SuccessResult {\n\tres := &SuccessResult{}\n\tif vres.OK != nil {\n\t\tres.OK = *vres.OK\n\t}\n\treturn res\n}", "func CreateSuccessResponse(result interface{}) *Response {\n\treturn &Response{Success: true, Result: result}\n}", "func (r *Router) Success(ctx context.Context, w http.ResponseWriter, code int) {\n\treqID := r.GetRequestID(ctx)\n\n\tr.setDefaultHeaders(ctx, w)\n\n\tif code != http.StatusOK {\n\t\tw.WriteHeader(code)\n\t}\n\n\tr.logger.Debugw(\"response\",\n\t\t\"request_id\", reqID,\n\t\t\"status_code\", code,\n\t)\n}", "func OKWithMeta(w http.ResponseWriter, data interface{}, msg string, meta interface{}) error {\n\tsb := BuildSuccess(data, msg, meta)\n\treturn Write(w, sb, http.StatusOK)\n}", "func (htpc *HttpProcessorConfig) Success(httpCode int) *HttpProcessorConfig {\n\thtpc.success = httpCode\n\treturn htpc\n}", "func (ctx *ShowBottleContext) OK(r *GoaExampleBottle) error {\n\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.example.bottle+json\")\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 200, r)\n}", "func Success(c *gin.Context, data interface{}) {\n\tc.JSON(http.StatusOK, &Result{\n\t\tData: data,\n\t})\n}", "func TestGetSuccess(t *testing.T) {\n\tisTesting = true\n\n\tvar params = make(map[string]string)\n\tparams[\"id\"] = \"valid-id\"\n\n\tvar request = Request{\n\t\tPath: \"/api/devices\",\n\t\tPathParameters: params,\n\t\tHTTPMethod: \"GET\",\n\t}\n\tvar response, _ = Handler(request)\n\tif response.StatusCode != 200 {\n\t\tt.Errorf(\"response status code has to be 200 but is %d\", response.StatusCode)\n\t}\n}", "func CommandSucceed(result StringInterface) *HTTPResult {\n\treturn &HTTPResult{\n\t\tMessage: \"OK\",\n\t\tDetails: result,\n\t}\n}", "func (ctx *ShowStatusContext) OK(r *Status) error {\n\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.status+json\")\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 200, r)\n}", "func SuccessMessage(c *gin.Context, msg string) {\n\tc.JSON(http.StatusOK, &Result{\n\t\tMessage: msg,\n\t})\n}", "func (a *AutoRollNotifier) SendNewSuccess(ctx context.Context, id, url string) {\n\ta.send(ctx, &tmplVars{\n\t\tIssueID: id,\n\t\tIssueURL: url,\n\t}, subjectTmplNewSuccess, bodyTmplNewSuccess, notifier.SEVERITY_WARNING, MSG_TYPE_NEW_SUCCESS, nil)\n}", "func (a *APIResponse) Success(data interface{}) {\n\ta.Status = HttpStatus{Code: http.StatusOK, Message: http.StatusText(http.StatusOK)}\n\ta.Data = data\n}", "func (client HTTPSuccessClient) Post200(booleanValue *bool) (result autorest.Response, err error) {\n req, err := client.Post200Preparer(booleanValue)\n if err != nil {\n return result, autorest.NewErrorWithError(err, \"httpinfrastructuregroup.HTTPSuccessClient\", \"Post200\", nil , \"Failure preparing request\")\n }\n\n resp, err := client.Post200Sender(req)\n if err != nil {\n result.Response = resp\n return result, autorest.NewErrorWithError(err, \"httpinfrastructuregroup.HTTPSuccessClient\", \"Post200\", resp, \"Failure sending request\")\n }\n\n result, err = client.Post200Responder(resp)\n if err != nil {\n err = autorest.NewErrorWithError(err, \"httpinfrastructuregroup.HTTPSuccessClient\", \"Post200\", resp, \"Failure responding to request\")\n }\n\n return\n}", "func TestSuccessful(t *testing.T) {\n\tcontroller := newTestController(t)\n\n\t// First try creating an invoice\n\tinv := load_scaffold_invoice(t, \"valid_v1\")\n\t_, err := controller.Client.CreateInvoice(inv)\n\tif err != nil {\n\t\tt.Fatalf(\"Unable to create invoice: %s\", err)\n\t}\n\n\t// Now create the parcel associated with that invoice\n\tdata := load_scaffold_parcel_data(t, \"valid_v1\", \"parcel\")\n\tif err := controller.Client.CreateParcel(inv.Name(), inv.Parcel[0].Label.SHA256, data); err != nil {\n\t\tt.Fatalf(\"Unable to create parcel: %s\", err)\n\t}\n\n\t// Now see if we get the parcel back from the server\n\tserverData, err := controller.Client.GetParcel(inv.Name(), inv.Parcel[0].Label.SHA256)\n\tif err != nil {\n\t\tt.Fatalf(\"Unable to fetch parcel from server: %s\", err)\n\t}\n\n\tif !reflect.DeepEqual(data, serverData) {\n\t\tt.Fatalf(\"Did not get back valid data from the server\\nExpected: %s\\nGot: %s\", data, serverData)\n\t}\n\n\t// Now try yanking the parcel and fetching it to make sure it gives us an error\n\tif err := controller.Client.YankInvoice(inv.Name()); err != nil {\n\t\tt.Fatalf(\"Unable to yank invoice: %s\", err)\n\t}\n\n\t_, err = controller.Client.GetInvoice(inv.Name())\n\tif err == nil {\n\t\tt.Fatal(\"Shouldn't be able to get a yanked invoice\")\n\t}\n\n\t// Get the yanked invoice and make sure it works\n\t_, err = controller.Client.GetYankedInvoice(inv.Name())\n\tif err != nil {\n\t\tt.Fatalf(\"Should be able to get a yanked invoice: %s\", err)\n\t}\n}", "func OK(data interface{}, w http.ResponseWriter) {\n\tjsonResponse(data, http.StatusOK, w)\n}", "func TestCreateCourseSuccessNew(t *testing.T) {\n\n\t_ = config.SetConfigurationFromFile(\"../../../config/config-test.json\")\n\n\t// build the information of the course to be created (in a simplified way)\n\tjsonBody := simplejson.New()\n\tjsonBody.Set(\"name\", \"courseSuccess\")\n\n\t// generate a token to be appended to the course creation request\n\tuser := microservice.User{Name: \"nome\", Surname: \"cognome\", Username: \"username\", Password: \"password\", Type: \"teacher\", Mail: \"[email protected]\"}\n\ttoken, _ := microservice.GenerateAccessToken(user, []byte(config.Configuration.TokenPrivateKey))\n\n\t// make the POST request for the course creation\n\trequestBody, _ := jsonBody.MarshalJSON()\n\trequest, _ := http.NewRequest(http.MethodPost, \"/didattica-mobile/api/v1.0/courses\", bytes.NewBuffer(requestBody))\n\trequest.Header.Set(\"Content-Type\", \"application/json\")\n\trequest.AddCookie(&http.Cookie{Name: \"token\", Value: token})\n\n\tresponse := httptest.NewRecorder()\n\thandler := createTestGatewayCreateCourse()\n\t// Goroutines represent the micro-services listening to the requests coming from the api gateway\n\tgo mock.LaunchCourseManagementMock()\n\tgo mock.LaunchNotificationManagementMock()\n\t// simulates a request-response interaction between client and api gateway\n\thandler.ServeHTTP(response, request)\n\n\tif response.Code != http.StatusCreated {\n\t\tt.Error(\"Expected 201 Ok but got \" + strconv.Itoa(response.Code) + \" \" + http.StatusText(response.Code))\n\t}\n\n}", "func Success(taskDescription string) {\n\tcolor.Green(\"Success - \" + taskDescription)\n}", "func NewStatusOK() *StatusOK {\n\treturn &StatusOK{}\n}", "func NewStatusOK() *StatusOK {\n\n\treturn &StatusOK{}\n}", "func (r *Responder) OK() { r.write(http.StatusOK) }", "func (t *Test) PrintSuccess() {\n\tlog.Successf(\"ok: %s\", t.Name)\n}", "func (a *App) Ok(w http.ResponseWriter, r *http.Request) {\n\tw.WriteHeader(http.StatusOK)\n\tlogerr(w.Write(randomByteSlice(10, \"OK\", \"0123456789abcdef\")))\n}", "func Success(data interface{}) *JSONResponse {\n\treturn &JSONResponse{\n\t\tStatus: http.StatusOK,\n\t\tContent: data,\n\t\tContentType: \"application/json\",\n\t}\n}", "func (ctx *AddLinkWorkflowContext) OK(resp []byte) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"text/plain\")\n\t}\n\tctx.ResponseData.WriteHeader(200)\n\t_, err := ctx.ResponseData.Write(resp)\n\treturn err\n}", "func ResponseSuccess(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(JSONSuccess{true})\n}", "func (response BasicJSONResponse) Success(writer http.ResponseWriter) {\n\tSuccess(writer, response)\n}", "func (client HTTPSuccessClient) Put200(booleanValue *bool) (result autorest.Response, err error) {\n req, err := client.Put200Preparer(booleanValue)\n if err != nil {\n return result, autorest.NewErrorWithError(err, \"httpinfrastructuregroup.HTTPSuccessClient\", \"Put200\", nil , \"Failure preparing request\")\n }\n\n resp, err := client.Put200Sender(req)\n if err != nil {\n result.Response = resp\n return result, autorest.NewErrorWithError(err, \"httpinfrastructuregroup.HTTPSuccessClient\", \"Put200\", resp, \"Failure sending request\")\n }\n\n result, err = client.Put200Responder(resp)\n if err != nil {\n err = autorest.NewErrorWithError(err, \"httpinfrastructuregroup.HTTPSuccessClient\", \"Put200\", resp, \"Failure responding to request\")\n }\n\n return\n}", "func WriteSuccessResponse(w http.ResponseWriter) {\n\tjson, _ := json.Marshal(NewSuccessResponse())\n\n\tw.WriteHeader(http.StatusOK)\n\tw.Header().Add(\"content-type\", \"application/json\")\n\tw.Write(json)\n}", "func (ctx *ShowBottleContext) OK(r *GoaExampleBottle) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.example.bottle+json\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 200, r)\n}", "func Created(ctx *fiber.Ctx, msg string, data interface{}) error {\n\treturn Success(ctx, msg, data, http.StatusCreated)\n}", "func (a API) Created(data interface{}) (int, model.MessageResponse) {\n\treturn http.StatusCreated, model.MessageResponse{\n\t\tData: data,\n\t\tMessages: model.Responses{{Code: RecordCreated, Message: \"¡listo!\"}},\n\t}\n}", "func Success(msg string) *Answer {\n\treturn &Answer{Message: \"success: \" + msg}\n}", "func (v1 *EndpointsV1) GenStatusHTMLEndpoint(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintf(w, `<h1>STATUS OK</h1>`)\n}", "func (r *Responder) Created() { r.write(http.StatusCreated) }", "func (a API) OK(data interface{}) (int, model.MessageResponse) {\n\treturn http.StatusOK, model.MessageResponse{\n\t\tData: data,\n\t\tMessages: model.Responses{{Code: Ok, Message: \"¡listo!\"}},\n\t}\n}", "func OK(c *gin.Context, data interface{}) {\n\tJSON(c, Response{\n\t\tCode: 200,\n\t\tMessage: \"ok\",\n\t\tData: data,\n\t})\n}", "func (srv *Service) WriteOk(w http.ResponseWriter) {\n\tw.WriteHeader(http.StatusOK)\n}", "func (client HTTPSuccessClient) Get200() (result Bool, err error) {\n req, err := client.Get200Preparer()\n if err != nil {\n return result, autorest.NewErrorWithError(err, \"httpinfrastructuregroup.HTTPSuccessClient\", \"Get200\", nil , \"Failure preparing request\")\n }\n\n resp, err := client.Get200Sender(req)\n if err != nil {\n result.Response = autorest.Response{Response: resp}\n return result, autorest.NewErrorWithError(err, \"httpinfrastructuregroup.HTTPSuccessClient\", \"Get200\", resp, \"Failure sending request\")\n }\n\n result, err = client.Get200Responder(resp)\n if err != nil {\n err = autorest.NewErrorWithError(err, \"httpinfrastructuregroup.HTTPSuccessClient\", \"Get200\", resp, \"Failure responding to request\")\n }\n\n return\n}", "func BebListSuccess(w http.ResponseWriter) {\n\tw.WriteHeader(http.StatusAccepted)\n\tresponse := bebtypes.Response{\n\t\tStatusCode: http.StatusOK,\n\t\tMessage: \"\",\n\t}\n\terr := json.NewEncoder(w).Encode(response)\n\tExpect(err).ShouldNot(HaveOccurred())\n}", "func Created() Response {\n\treturn Response{\n\t\tStatusCode: http.StatusCreated,\n\t}\n}", "func (ctx *GenerateUUIDContext) OK(resp []byte) error {\n\tctx.ResponseData.Header().Set(\"Content-Type\", \"text/plain\")\n\tctx.ResponseData.WriteHeader(200)\n\t_, err := ctx.ResponseData.Write(resp)\n\treturn err\n}", "func (c *Context) JSONSuccess(data interface{}) {\n\tc.JSON(http.StatusOK, data)\n}", "func SuccessResult(Response model.Response) model.Response {\n\tResponse.Code = Success\n\tResponse.Description = StatusCodes(Success)\n\n\treturn Response\n}", "func TestSuccess(t *testing.T) {\n\trouter := SetupRouter()\n\n\tw := performRequest(router, \"GET\", \"/v1/fizzbuzz?string1=Fizz&string2=Buzz&int1=3&int2=5&limit=15\")\n\tassert.Equal(t, http.StatusOK, w.Code)\n\n\tvar response FizzbuzzResponse\n\terr := json.Unmarshal([]byte(w.Body.String()), &response)\n\tassert.Nil(t, err)\n\n\twant := []string{\"1\", \"2\", \"Fizz\", \"4\", \"Buzz\", \"Fizz\", \"7\", \"8\", \"Fizz\", \"Buzz\", \"11\", \"Fizz\", \"13\", \"14\", \"FizzBuzz\"}\n\tassert.Equal(t, want, response.Value)\n\tassert.Equal(t, 200, response.Status)\n}", "func Success(body string) (events.APIGatewayProxyResponse, error) {\n\treturn events.APIGatewayProxyResponse{StatusCode: 200, Body: body}, nil\n}", "func CreateSuccessResponse(status uint16, id string, message string) []byte {\n\tresponse := Response{Status: status,\n\t\tId: id,\n\t\tMessage: message}\n\n\tresponseByte, err := json.Marshal(response)\n\n\tif err != nil {\n\t\treturn []byte(\"Something went wrong while parsing json\")\n\t}\n\n\treturn responseByte\n}", "func SimpleOK() *Responder {\n\treturn &Responder{\n\t\thttp.StatusOK,\n\t\t&models.StatusResponse{Status: true},\n\t\tmake(http.Header),\n\t}\n}", "func (api *API) Status(request *restful.Request, response *restful.Response) {\n\tresponse.WriteHeader(http.StatusOK)\n}", "func Created(c *routing.Context, msg string, service string) error {\n\tResponse(c, `{\"error\": false, \"msg\": \"`+msg+`\"}`, 201, service, \"application/json\")\n\treturn nil\n}", "func Success(ctx context.Context, responseStatusCode int, statusCode, statusMessage string, data interface{}) Output {\n\tres := response{}\n\tres.StatusCode = responseStatusCode\n\tres.Status.Error = false\n\tres.Status.Code = statusCode\n\tres.Status.Message = statusMessage\n\n\t// send to logger before set data to response\n\tlogger.Response(ctx, responseStatusCode, res, nil, nil)\n\tlogger.ResponseMessage(ctx, statusMessage)\n\n\tres.Data = data\n\n\treturn &res\n}", "func NewSuccessResponse() Response {\n\treturn Response{Type: TypeSuccess}\n}", "func (ctx *GetHealthContext) OK(resp []byte) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"text/plain\")\n\t}\n\tctx.ResponseData.WriteHeader(200)\n\t_, err := ctx.ResponseData.Write(resp)\n\treturn err\n}", "func successStatus(status int) bool {\n\treturn status >= 200 && status <= 399\n}", "func (resp *Response) StatusOk(w http.ResponseWriter) {\n\tresp.Ok = true\n\twrite(resp, w)\n}", "func Ok(c *routing.Context, msg string, service string) error {\n\tResponse(c, msg, 200, service, \"application/json\")\n\treturn nil\n}", "func Ok(ctx *gin.Context, data interface{}) {\n\tctx.JSON(http.StatusOK, BuildErrorObj(ctx, merrors.ErrSuccess, nil, data))\n\treturn\n}", "func ResponseSuccess(w http.ResponseWriter, result *Result, message string) {\n\tresponseData := httpResponse{\n\t\tSuccess: true,\n\t\tData: result.Data,\n\t\tMessage: message,\n\t\tCode: http.StatusOK,\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\tjson.NewEncoder(w).Encode(responseData)\n\treturn\n}", "func RespondSuccess(w http.ResponseWriter, code int, success bool, message string, messageBody string) {\n\tRespondJSON(w, code, success, message, map[string]string{\"success\": messageBody})\n}", "func TestGetReturns200(t *testing.T) {\n\treq, err := http.NewRequest(\"GET\", fmt.Sprintf(\"%s/api/v1/notification\", server.URL), nil)\n\treq.SetBasicAuth(\"test\", \"test\")\n\n\tif err != nil {\n\t\tt.Fatal(\"Request failed [GET] /api/v1/notification\")\n\t}\n\n\tresp, _ := http.DefaultClient.Do(req)\n\n\tassert.Equal(t, 200, resp.StatusCode)\n}", "func OK(r *http.ResponseWriter) error {\n\tresponse := *r\n\tresponse.WriteHeader(200)\n\treturn nil\n}", "func TestGetNotificationSuccess(t *testing.T) {\n\tn := &Notification{\n\t\tMessage: \"Test GET\",\n\t}\n\n\tApp.db.Create(n)\n\n\treq, err := http.NewRequest(\"GET\", fmt.Sprintf(\"%s/api/v1/notification/%s\", server.URL, n.ExtId), nil)\n\treq.SetBasicAuth(\"test\", \"test\")\n\n\tif err != nil {\n\t\tt.Fatal(\"Request failed [GET] /api/v1/notification\")\n\t}\n\n\tresp, _ := http.DefaultClient.Do(req)\n\n\tvar o Notification\n\n\tjson.NewDecoder(resp.Body).Decode(&o)\n\n\tassert.Equal(t, 200, resp.StatusCode)\n\tassert.Equal(t, \"Test GET\", o.Message)\n}", "func OK(w http.ResponseWriter, r *http.Request, body interface{}) {\n\tbuilder := response.New(w, r)\n\tbuilder.WithHeader(\"Content-Type\", \"text/xml; charset=utf-8\")\n\tbuilder.WithBody(body)\n\tbuilder.Write()\n}", "func TestSuccessErrorResponses(t *testing.T) {\n\n\tt.Log(\"Testing Success Status\")\n\tstatus := geoAPICallHarness(Ok200, \"status\", true, true, true, false, \"\")\n\n\tif !strings.Contains(status, \"200\") {\n\t\tt.Errorf(\"Expected a 200 response but got %s\", status)\n\t}\n\n\tt.Log(\"Testing UniqueID 400 Error\")\n\tif !strings.Contains(geoAPICallHarness(Error400sameUUID, \"body\", true, true, false, false, \"\"), messages.Err400MessageUUID) {\n\t\tt.Errorf(\"Expected response body message to contain %s and it did not\", messages.Err400MessageUUID)\n\t}\n\n\tt.Log(\"Testing same timestamp 400 Error\")\n\tif !strings.Contains(geoAPICallHarness(Error400sameTimestampByUser, \"body\", false, true, true, false, \"\"), messages.Err400MessageTime) {\n\t\tt.Errorf(\"Expected response body message to contain %s and it did not\", messages.Err400MessageTime)\n\t}\n}" ]
[ "0.7086656", "0.66270274", "0.65076387", "0.6369026", "0.6347598", "0.6320223", "0.62563485", "0.6218782", "0.6173476", "0.61324733", "0.611414", "0.60746384", "0.6037016", "0.59548616", "0.5951004", "0.59216726", "0.5920794", "0.59158987", "0.5912962", "0.58728623", "0.58653516", "0.5826216", "0.5824137", "0.5803141", "0.57967865", "0.5791942", "0.5786574", "0.57824135", "0.5780195", "0.57496965", "0.57388085", "0.5735597", "0.5704042", "0.5703671", "0.5667243", "0.56388795", "0.563555", "0.56271636", "0.561995", "0.56081045", "0.5605605", "0.5598227", "0.55978626", "0.55903673", "0.5589721", "0.5585621", "0.5577112", "0.5570569", "0.5566081", "0.5561701", "0.556052", "0.55540514", "0.5552548", "0.55470186", "0.55431527", "0.5542535", "0.5537518", "0.55367076", "0.5535909", "0.55188686", "0.55160767", "0.5507751", "0.5507138", "0.5491549", "0.54887366", "0.5484356", "0.5480932", "0.548054", "0.5476581", "0.5475918", "0.54734486", "0.54732287", "0.54630774", "0.5462878", "0.54601157", "0.54588974", "0.5454872", "0.54539716", "0.54443765", "0.54401565", "0.5439686", "0.5432113", "0.54240596", "0.5415456", "0.54074895", "0.5405656", "0.53939754", "0.53816974", "0.5380423", "0.5380358", "0.53738356", "0.53722954", "0.53719866", "0.53699934", "0.5369762", "0.53656286", "0.53639853", "0.53534776", "0.5343957", "0.5339998" ]
0.72901356
0
Bool is a convenience function for filling optional bool values.
func Bool(b bool) *bool { return &b }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func OptionalBool(x bool) *bool {\n\tb := x\n\treturn &b\n}", "func Bool(v interface{}, defaults ...bool) (b bool) {\n\tswitch tv := v.(type) {\n\tcase nil:\n\t\tif 1 < len(defaults) {\n\t\t\tb = defaults[1]\n\t\t}\n\tcase bool:\n\t\tb = tv\n\tcase string:\n\t\tvar err error\n\t\tif 1 < len(defaults) {\n\t\t\tb = defaults[1]\n\t\t} else if b, err = strconv.ParseBool(tv); err != nil {\n\t\t\tif 0 < len(defaults) {\n\t\t\t\tb = defaults[0]\n\t\t\t}\n\t\t}\n\tcase gen.Bool:\n\t\tb = bool(tv)\n\tcase gen.String:\n\t\tvar err error\n\t\tif 1 < len(defaults) {\n\t\t\tb = defaults[1]\n\t\t} else if b, err = strconv.ParseBool(string(tv)); err != nil {\n\t\t\tif 0 < len(defaults) {\n\t\t\t\tb = defaults[0]\n\t\t\t}\n\t\t}\n\tdefault:\n\t\tif 0 < len(defaults) {\n\t\t\tb = defaults[0]\n\t\t}\n\t}\n\treturn\n}", "func OptionalBool(v bool) OptionalBoolType {\n\treturn OptionalBoolType{true, v}\n}", "func Bool(x bool) bool { return x }", "func NewBool(v bool) Bool {\n\treturn Bool{v: v, present: true, initialized: true}\n}", "func Bool(v *bool) bool {\n\tif v != nil {\n\t\treturn *v\n\t}\n\treturn false\n}", "func Bool(i interface{}) bool {\n\tif i == nil {\n\t\treturn false\n\t}\n\tif v, ok := i.(bool); ok {\n\t\treturn v\n\t}\n\tif s := String(i); s != \"\" && s != \"0\" && s != \"false\" && s != \"off\" {\n\t\treturn true\n\t}\n\treturn false\n}", "func Bool(b *bool) bool {\n\tif b == nil {\n\t\treturn false\n\t}\n\treturn *b\n}", "func (p *Parser) Bool(description string) *bool {\n\tv := false\n\top := p.newOpt(description, false)\n\top.valueType = boolValue\n\top.value = &v\n\treturn &v\n}", "func Bool(name string, value string, usage string, aliases ...string) *Value {\n\treturn newBool(flag.Var, name, value, usage, aliases...)\n}", "func Bool(v *Value, def bool) bool {\n\tb, err := v.Bool()\n\tif err != nil {\n\t\treturn def\n\t}\n\treturn b\n}", "func Bool(name string, value bool, usage string) *bool {\n\tp := new(bool);\n\tBoolVar(p, name, value, usage);\n\treturn p;\n}", "func Bool(v bool) *bool {\n\tp := new(bool)\n\t*p = v\n\treturn p\n}", "func Bool(flag string, value bool, description string) *bool {\n\tvar v bool\n\tBoolVar(&v, flag, value, description)\n\treturn &v\n}", "func Bool(name string, value bool) *bool {\n\tp := new(bool)\n\tBoolVar(p, name, value)\n\treturn p\n}", "func OptBool(value bool) *bool {\n\treturn &value\n}", "func Bool(val bool, buf []byte) []byte {\n\tif val {\n\t\treturn append(buf, `true`...)\n\t}\n\treturn append(buf, `false`...)\n}", "func Bool(v bool) (p *bool) { return &v }", "func Bool(a bool) cell.I {\n\tif a {\n\t\treturn sym.True\n\t}\n\n\treturn pair.Null\n}", "func Bool(bp *bool) bool {\n\tif bp == nil {\n\t\treturn false\n\t}\n\treturn *bp\n}", "func Bool(v bool) *bool { return &v }", "func Bool(v bool) *bool { return &v }", "func Bool(v bool) *bool { return &v }", "func Bool(v bool) *bool { return &v }", "func Bool(v bool) *bool { return &v }", "func Bool(v bool) *bool { return &v }", "func (form *FormData) Bool(key string, target *bool, defaultValue bool) *FormData {\n\treturn form.mustValue(key, target, defaultValue)\n}", "func Bool(a bool, b bool) bool {\n\treturn a == b\n}", "func (v Value) Bool(defaults ...bool) bool {\n\t// Return the first default if the raw is undefined\n\tif v.raw == nil {\n\t\t// Make sure there's at least one thing in the list\n\t\tdefaults = append(defaults, false)\n\t\treturn defaults[0]\n\t}\n\n\tswitch t := v.raw.(type) {\n\tcase string:\n\t\tb, err := strconv.ParseBool(t)\n\t\tif err != nil {\n\t\t\tslog.Panicf(\"failed to parse bool: %v\", err)\n\t\t}\n\t\treturn b\n\n\tcase bool:\n\t\treturn t\n\n\tdefault:\n\t\tslog.Panicf(\"%v is of unsupported type %v\", t, reflect.TypeOf(t).String())\n\t}\n\n\treturn false\n}", "func NilBool() Bool {\n\treturn Bool{v: false, present: false, initialized: true}\n}", "func (c *Constructor[_]) Bool(name string, value bool, help string) *bool {\n\tp := new(bool)\n\tc.BoolVar(p, name, value, help)\n\treturn p\n}", "func Bool(val string) error {\n\tif strings.EqualFold(val, \"true\") || strings.EqualFold(val, \"false\") {\n\t\treturn nil\n\t}\n\n\treturn fmt.Errorf(\"invalid bool value '%s', can be only 'true' or 'false'\", val)\n}", "func Bool(name string, val bool) Field {\n\treturn Field(zap.Bool(name, val))\n}", "func (c *Cmd) Bool(p BoolParam) *bool {\n\tinto := new(bool)\n\tvalue := values.NewBool(into, p.value())\n\n\tswitch x := p.(type) {\n\tcase BoolOpt:\n\t\tc.mkOpt(container.Container{Name: x.Name, Desc: x.Desc, EnvVar: x.EnvVar, HideValue: x.HideValue, Value: value, ValueSetByUser: x.SetByUser})\n\tcase BoolArg:\n\t\tc.mkArg(container.Container{Name: x.Name, Desc: x.Desc, EnvVar: x.EnvVar, HideValue: x.HideValue, Value: value, ValueSetByUser: x.SetByUser})\n\tdefault:\n\t\tpanic(fmt.Sprintf(\"Unhandled param %v\", p))\n\t}\n\n\treturn into\n}", "func NewBool(val bool, status ...bool) Bool {\n\tswitch len(status) {\n\tcase 0:\n\t\treturn newBool(val, true, false)\n\tcase 1:\n\t\tif !status[0] {\n\t\t\treturn newBool(false, false, false)\n\t\t}\n\t\treturn newBool(val, status[0], false)\n\tdefault:\n\t\tif !status[0] {\n\t\t\treturn newBool(false, false, false)\n\t\t}\n\t\tif status[1] {\n\t\t\treturn newBool(false, true, true)\n\t\t}\n\t\treturn newBool(val, status[0], status[1])\n\t}\n}", "func Bool(v interface{}) *bool {\n\tswitch v.(type) {\n\tcase bool:\n\t\tval := v.(bool)\n\t\treturn &val\n\tcase int, uint, int32, int16, int8, int64, uint32, uint16, uint8, uint64, float32, float64:\n\t\tval, err := strconv.Atoi(fmt.Sprintf(\"%v\", v))\n\t\tif err != nil {\n\t\t\texception.Err(err, 500).Ctx(M{\"v\": v}).Throw()\n\t\t}\n\t\tres := false\n\t\tif val != 0 {\n\t\t\tres = true\n\t\t}\n\t\treturn &res\n\tdefault:\n\t\tval := fmt.Sprintf(\"%v\", v)\n\t\tres := false\n\t\tif val != \"\" {\n\t\t\tres = true\n\t\t}\n\t\treturn &res\n\t}\n}", "func Bool(v bool) *bool {\n\treturn &v\n}", "func Bool(v bool) *bool {\n\treturn &v\n}", "func Bool(v bool) *bool {\n\treturn &v\n}", "func Bool(v bool) *bool {\n\treturn &v\n}", "func Bool(v bool) *bool {\n\treturn &v\n}", "func Bool(name string, defs ...bool) bool {\n\tvar def bool\n\tfor _, d := range defs {\n\t\tdef = d\n\t\tbreak\n\t}\n\tswitch v := strings.ToLower(Raw(name)); {\n\tcase v == \"true\":\n\t\treturn true\n\tcase v == \"false\":\n\t\treturn false\n\tdefault:\n\t\treturn def\n\t}\n}", "func (data *Data) Bool(s ...string) bool {\n\treturn data.Interface(s...).(bool)\n}", "func (w *Writer) Bool(v bool) {\n\tw.buf = strconv.AppendBool(w.buf, v)\n}", "func (f *Flagger) Bool(name, shorthand string, value bool, usage string) {\n\tf.cmd.Flags().BoolP(name, shorthand, value, usage)\n\tf.cfg.BindPFlag(name, f.cmd.Flags().Lookup(name))\n}", "func Bool(key string, val bool) Field {\n\tvar ival int64\n\tif val {\n\t\tival = 1\n\t}\n\treturn Field{Key: key, Type: core.BoolType, Integer: ival}\n}", "func Bool(value interface{}) bool {\r\n\ts := String(value)\r\n\tb, _ := strconv.ParseBool(s)\r\n\treturn b\r\n}", "func (elt *Element) Bool(defaultValue ...bool) (bool, error) {\n\tdefValue := func() *bool {\n\t\tif len(defaultValue) == 0 {\n\t\t\treturn nil\n\t\t}\n\t\treturn &defaultValue[0]\n\t}\n\tdef := defValue()\n\tif elt.Value == nil {\n\t\tdef := defValue()\n\t\tif def == nil {\n\t\t\tvar v bool\n\t\t\treturn v, NewWrongPathError(elt.Path)\n\t\t}\n\t\treturn *def, nil\n\t}\n\tv, ok := elt.Value.(bool)\n\tif !ok {\n\t\tif def == nil{\n\t\t\tvar v bool\n\t\t\treturn v, NewWrongTypeError(\"bool\", elt.Value)\n\t\t}\n\t\treturn *def, nil\n\t}\n\treturn v, nil\n}", "func NewBool(b bool) Bool {\n\treturn Bool{\n\t\tNullBool: sql.NullBool{\n\t\t\tBool: b,\n\t\t\tValid: true,\n\t\t},\n\t}\n}", "func Bool(name string, value bool) *bool {\n\treturn ex.FlagSet.Bool(name, value, \"\")\n}", "func (this *parameter) Bool() bool {\n\tif this.Values == nil {\n\t\treturn false\n\t} else {\n\t\treturn reflekt.AsBool(this.Values[0])\n\t}\n}", "func BoolP(short rune, long string, value bool, description string) *bool {\n\tvar v bool\n\tBoolVarP(&v, short, long, value, description)\n\treturn &v\n}", "func (g GitPushOptions) Bool(key string, def bool) bool {\n\tif val, ok := g[key]; ok {\n\t\tif b, err := strconv.ParseBool(val); err == nil {\n\t\t\treturn b\n\t\t}\n\t}\n\treturn def\n}", "func (f *Form) Bool(param string, defaultValue bool) bool {\n\tvals, ok := f.values[param]\n\tif !ok {\n\t\treturn defaultValue\n\t}\n\tparamVal, err := strconv.ParseBool(vals[0])\n\tif err != nil {\n\t\tf.err = err\n\t\treturn defaultValue\n\t}\n\treturn paramVal\n}", "func Bool(value interface{}) bool {\n\tret, err := BoolE(value)\n\tif err != nil {\n\t\tmod.Error(err)\n\t}\n\treturn ret\n}", "func Bool(b bool) Cell {\n\tif b {\n\t\treturn True\n\t}\n\treturn Nil\n}", "func (h *Random) Bool() bool {\n\tboolList := []bool{true, false}\n\trandomIndex := rand.Intn(len(boolList))\n\treturn boolList[randomIndex]\n}", "func Bool(b bool) BooleanField {\n\treturn BooleanField{\n\t\tvalue: &b,\n\t}\n}", "func Bool(b *bool, title, id, class string, valid Validator) (jquery.JQuery, error) {\n\tj := jq(\"<input>\").AddClass(ClassPrefix + \"-bool\").AddClass(class)\n\tj.SetAttr(\"type\", \"checkbox\")\n\tj.SetAttr(\"title\", title).SetAttr(\"id\", id)\n\tj.SetProp(\"checked\", *b)\n\tj.SetData(\"prev\", *b)\n\tj.Call(jquery.CHANGE, func(event jquery.Event) {\n\t\tval := event.Target.Get(\"checked\").String()\n\t\tbNew, e := strconv.ParseBool(val)\n\t\tif e != nil {\n\t\t\t// Theorectially impossible\n\t\t\tpanic(fmt.Sprintf(\"value '%s' has invalid type, expected bool\", val))\n\t\t}\n\t\tif valid != nil && !valid.Validate(bNew) {\n\t\t\tbNew = j.Data(\"prev\").(bool)\n\t\t\tj.SetProp(\"checked\", bNew)\n\t\t}\n\t\t*b = bNew\n\t\tj.SetData(\"prev\", bNew)\n\t})\n\treturn j, nil\n}", "func NewBool(value bool) *Bool {\n\tif value {\n\t\treturn &Bool{i: 1}\n\t}\n\treturn &Bool{}\n}", "func Bool(k string, v bool) Field {\n\treturn Field{Key: k, Value: valf.Bool(v)}\n}", "func (bw *BufWriter) Bool(val bool) {\n\tif bw.Error != nil {\n\t\treturn\n\t}\n\tif val {\n\t\t_, bw.Error = bw.writer.WriteString(\"true\")\n\t\treturn\n\t}\n\t_, bw.Error = bw.writer.WriteString(\"false\")\n}", "func Bool() FlagOption {\n\treturn Kind(flagBool{})\n}", "func Bool(val bool) *bool {\n\treturn &val\n}", "func BooleanArg(short, long, usage, field string, value bool) (Arg, error) {\n\tretval, err := genericArg(short, long, usage, field)\n\treturn retval, err\n}", "func (w *Writer) Bool(b bool) error {\n\tif b {\n\t\treturn w.Bit(1)\n\t}\n\treturn w.Bit(0)\n}", "func (tp Boolean) NewBool(data bool) Boolean {\n\treturn Boolean(data)\n}", "func Boolean(param interface{}) bool {\n\tvar v bool\n\tif param != nil {\n\t\tv = param.(bool)\n\t}\n\treturn v\n}", "func Bool(val interface{}) (bool, error) {\n\tif val == nil {\n\t\treturn false, nil\n\t}\n\tswitch ret := val.(type) {\n\tcase bool:\n\t\treturn ret, nil\n\tcase int, int8, int16, int32, int64, float32, float64, uint, uint8, uint16, uint32, uint64:\n\t\treturn ret != 0, nil\n\tcase []byte:\n\t\treturn stringToBool(string(ret))\n\tcase string:\n\t\treturn stringToBool(ret)\n\tdefault:\n\t\treturn false, converError(val, \"bool\")\n\t}\n}", "func BoolArg(register Register, name string, options ...ArgOptionApplyer) *bool {\n\tp := new(bool)\n\t_ = BoolArgVar(register, p, name, options...)\n\treturn p\n}", "func MakeBool(in *bool) *google_protobuf.BoolValue {\n\tif in == nil {\n\t\treturn nil\n\t}\n\n\treturn &google_protobuf.BoolValue{\n\t\tValue: *in,\n\t}\n}", "func ZeroBool(v interface{}) bool {\n\tb, err := Bool(v)\n\tif err != nil {\n\t\treturn false\n\t}\n\treturn b\n}", "func BoolVar(pv *bool, flag string, value bool, description string) {\n\tshort, long, err := parseSingleFlag(flag)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\t*pv = value\n\tflags = append(flags, &optionBool{\n\t\tdescription: description,\n\t\tlong: long,\n\t\tshort: short,\n\t\tpv: pv,\n\t\tdef: value,\n\t})\n}", "func (o *Object) Bool(name string) bool {\n\tv, _ := boolFrom(o, name, false)\n\treturn v\n}", "func NewBool(value bool) *Value {\n\treturn &Value{kind: kindBool, boolContent: value}\n}", "func (i *InsertFactBuilder) OBool(b bool, unitID uint64) *InsertFactBuilder {\n\ti.fact.Object = ABool(b, unitID)\n\treturn i\n}", "func Bool(b bool) string {\n\treturn strconv.FormatBool(b)\n}", "func Bool(value bool) *bool {\n\treturn &value\n}", "func (v Value) Bool() bool {\n\treturn v.Integer() != 0\n}", "func InitHintBool(hint Hint, value bool) {\n\tif value {\n\t\tInitHint(hint, True)\n\t} else {\n\t\tInitHint(hint, False)\n\t}\n}", "func newBoolFormulaArg(b bool) formulaArg {\n\tvar n float64\n\tif b {\n\t\tn = 1\n\t}\n\treturn formulaArg{Type: ArgNumber, Number: n, Boolean: true}\n}", "func (t *Typed) Bool(key string) bool {\n\treturn t.BoolOr(key, false)\n}", "func NewBool(b bool) *Value {\n\treturn &Value{b, Bool}\n}", "func Bool() bool {\n\treturn global.Bool()\n}", "func BoolVal(b *bool) bool {\n\tif b == nil {\n\t\treturn false\n\t}\n\treturn *b\n}", "func (v *Value) Bool() bool {\n return Util.ToBool(v.data)\n}", "func (tv *TypedBool) Bool() bool {\n\treturn tv.Bytes[0] == 1\n}", "func Bool(i interface{}) bool {\n if i == nil {\n return false\n }\n if v, ok := i.(bool); ok {\n return v\n }\n if s, ok := i.(string); ok {\n if _, ok := emptyStringMap[s]; ok {\n return false\n }\n return true\n }\n rv := reflect.ValueOf(i)\n switch rv.Kind() {\n case reflect.Ptr: return !rv.IsNil()\n case reflect.Map: fallthrough\n case reflect.Array: fallthrough\n case reflect.Slice: return rv.Len() != 0\n case reflect.Struct: return true\n default:\n s := String(i)\n if _, ok := emptyStringMap[s]; ok {\n return false\n }\n return true\n\n }\n}", "func (nvp *NameValues) Bool(name string) (bool, bool) {\n\tvalue, _ := nvp.String(name)\n\treturn (value == \"true\" || value == \"yes\" || value == \"1\" || value == \"-1\" || value == \"on\"), true\n}", "func newBool(value bool) *TypedBool {\n\tbuf := make([]byte, 1)\n\tif value {\n\t\tbuf[0] = 1\n\t}\n\ttypedBool := TypedBool{\n\t\tBytes: buf,\n\t\tType: ValueType_BOOL,\n\t}\n\treturn &typedBool\n}", "func ExampleBool() {\n\n\t// Bool conversion from other bool values will be returned without\n\t// modification.\n\tfmt.Println(conv.Bool(true))\n\tfmt.Println(conv.Bool(false))\n\n\t// Bool conversion from strings consider the following values true:\n\t// \"t\", \"T\", \"true\", \"True\", \"TRUE\",\n\t// \t \"y\", \"Y\", \"yes\", \"Yes\", \"YES\", \"1\"\n\t//\n\t// It considers the following values false:\n\t// \"f\", \"F\", \"false\", \"False\", \"FALSE\",\n\t// \"n\", \"N\", \"no\", \"No\", \"NO\", \"0\"\n\tfmt.Println(conv.Bool(\"T\"))\n\tfmt.Println(conv.Bool(\"False\"))\n\n\t// Bool conversion from other supported types will return true unless it is\n\t// the zero value for the given type.\n\tfmt.Println(conv.Bool(int64(123)))\n\tfmt.Println(conv.Bool(int64(0)))\n\tfmt.Println(conv.Bool(time.Duration(123)))\n\tfmt.Println(conv.Bool(time.Duration(0)))\n\tfmt.Println(conv.Bool(time.Now()))\n\tfmt.Println(conv.Bool(time.Time{}))\n\n\t// All other types will return false.\n\tfmt.Println(conv.Bool(struct{ string }{\"\"}))\n\n\t// Output:\n\t// true <nil>\n\t// false <nil>\n\t// true <nil>\n\t// false <nil>\n\t// true <nil>\n\t// false <nil>\n\t// true <nil>\n\t// false <nil>\n\t// true <nil>\n\t// false <nil>\n\t// false cannot convert struct { string }{string:\"\"} (type struct { string }) to bool\n}", "func Bool(key string, val bool) Tag {\n\treturn Tag{key: key, tType: boolType, boolVal: val}\n}", "func FakeBool(v interface{}) bool {\n\tswitch r := v.(type) {\n\tcase float64:\n\t\treturn r != 0\n\tcase string:\n\t\treturn r != \"\"\n\tcase bool:\n\t\treturn r\n\tcase nil:\n\t\treturn false\n\tdefault:\n\t\treturn true\n\t}\n}", "func (m *Value) Bool() bool { return m.BoolMock() }", "func (v Value) Bool() (bool, error) {\n\tif v.typ != Bool {\n\t\treturn false, v.newError(\"%s is not a bool\", v.Raw())\n\t}\n\treturn v.boo, nil\n}" ]
[ "0.73978704", "0.73970497", "0.73664093", "0.72292644", "0.7045568", "0.7033603", "0.7008187", "0.6976388", "0.6975165", "0.6953598", "0.69414616", "0.69271785", "0.68999326", "0.6830393", "0.6815506", "0.6804985", "0.67706245", "0.67632174", "0.67479616", "0.67369556", "0.6720308", "0.6720308", "0.6720308", "0.6720308", "0.6720308", "0.6720308", "0.6703502", "0.66885346", "0.6668798", "0.6642243", "0.66351795", "0.6632799", "0.66260797", "0.6624521", "0.6622788", "0.66102123", "0.6598685", "0.6598685", "0.6598685", "0.6598685", "0.6598685", "0.6587136", "0.6585527", "0.65764505", "0.6569229", "0.65614605", "0.6555621", "0.6553745", "0.6544425", "0.64989746", "0.648749", "0.6474416", "0.64658135", "0.64627457", "0.6457758", "0.645491", "0.64543897", "0.6451355", "0.6444825", "0.64436233", "0.643569", "0.6426801", "0.6424207", "0.6418249", "0.6417618", "0.64093447", "0.6406566", "0.64059895", "0.6402083", "0.6392833", "0.63910186", "0.63889974", "0.6384649", "0.6383945", "0.638291", "0.6379618", "0.6377957", "0.63749", "0.6373139", "0.6370087", "0.6361765", "0.63568455", "0.6354776", "0.6353119", "0.6344639", "0.6340037", "0.63330716", "0.63275284", "0.6327454", "0.6321501", "0.63185656", "0.631839", "0.6315536", "0.63154745", "0.63145536" ]
0.64523715
62
Add is a convenience function for adding new Item instances to Items.
func Add(item Item) { Items = append(Items, item) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func Add(item AlfredItem) {\n\titems = append(items, item.Item())\n}", "func (i *ItemInventory) Add(o *Item) {\n\ti.Contents = append(i.Contents, o)\n\ti.TotalWeight += o.GetWeight()\n}", "func Add(category string, text string, id int, sn string, status product.Status) {\n\tEnsureLoaded()\n\n\titem := &Item{\n\t\tId: id,\n\t\tText: text,\n\t\tSN: sn,\n\t\tQuickString: parseQuickText(text),\n\t\tType: _categoryToType(category),\n\t\tStatus: status,\n\t}\n\n\tl.Lock()\n\titems, ok := cache[category]\n\tif !ok {\n\t\tcache[category] = Items([]*Item{item}) // newitems\n\t} else {\n\t\titems := append(items, item)\n\t\tsort.Sort(items)\n\t\tcache[category] = items\n\t}\n\tl.Unlock()\n}", "func (b *Bag) Add(items ...Item) {\n\tb.items = append(b.items, items...)\n}", "func (g *Game) addItem(itemType ItemType, id int, x int, y int) Item {\n\tnewItem := Item{itemType, id, x, y}\n\tg.Items[id] = newItem\n\treturn newItem\n}", "func (oi *OutlineItem) Add(item *OutlineItem) {\n\toi.items = append(oi.items, item)\n}", "func (r *Receipt) AddItem(item *Item) {\n r.Items = append(r.Items, item)\n r.Taxes += float64(item.Quantity) * item.Taxes\n r.Total += float64(item.Quantity) * (item.Price + item.Taxes)\n}", "func AddItem(c *gin.Context) {\n\tvar item model.Item\n\terr := c.ShouldBindJSON(&item)\n\tif err != nil {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\"Error\": err.Error()})\n\t\treturn\n\t}\n\tutil.DB.Create(&item)\n\tc.JSON(http.StatusOK, util.SuccessResponse(http.StatusOK, \"Success add item\", item))\n}", "func (self *Response) AddItem(data map[string]interface{}) {\n\tself.items = append(self.items, data)\n}", "func (s *ItemScroller) Add(item IPanel) {\n\n\ts.InsertAt(len(s.items), item)\n}", "func (o *Order) AddItem(id, name, uom string) error {\n\t_, err := o.findItem(id)\n\tif err == nil {\n\t\treturn ErrItemAlreadyOnList\n\t}\n\titem := newItem(id, name, uom)\n\to.Items = append([]Item{item}, o.Items...)\n\treturn nil\n}", "func (d *Dump) Add(item Item) (int, error) {\n\td.mutex.Lock()\n\tdefer d.mutex.Unlock()\n\n\td.items = append(d.items, item)\n\n\tif d.persist == PERSIST_WRITES {\n\t\treturn len(d.items) - 1, d.save()\n\t}\n\n\treturn len(d.items) - 1, nil\n}", "func (inv *Inv) AddItem(t InvType, hash []byte) {\n\titem := InvVect{\n\t\tType: t,\n\t\tHash: hash,\n\t}\n\n\tinv.InvList = append(inv.InvList, item)\n}", "func (r *ItemCatalogue) AddItem(i Item) {\n\tr.Items = append(r.Items, i)\n}", "func (b *Basket) AddItem(productName string, price float64) {\n\tb.products[productName] = price\n}", "func (li *ListItem) Add(s string) *ListItem {\n\tni := ListItem{\n\t\tlen(li.items),\n\t\tTODO,\n\t\ts,\n\t\tmake([]*ListItem, 0),\n\t}\n\tli.items = append(li.items, &ni)\n\treturn &ni\n}", "func (i Inventory) AddItem(item Item) (string, *ErrHandler) {\n if item.Id == 0 {\n return \"\", &ErrHandler{10, \"func (Inventory)\", \"AddItem\", \"\"}\n }\n if item.Name == \"\" {\n return \"\", &ErrHandler{11, \"func (Inventory)\", \"AddItem\", \"\"}\n }\n if item.Quantity == 0 {\n return \"\", &ErrHandler{12, \"func (Inventory)\", \"AddItem\", \"\"}\n }\n err := i.Db.AddItem(item)\n if err != nil {\n return \"\", err\n }\n return \"item added\", nil\n}", "func (i *Inventory) Add(thing thing.Interface) {\n\tif i.find(thing) == NOT_FOUND {\n\t\ti.contents = append(i.contents, thing)\n\t}\n}", "func (set *EarleyItemSet) AddItem(state int, parent int, parseNode *SppfNode) {\n\t//force uniqueness\n\thash := fmt.Sprint(state, parent)\n\tif set.ustates[hash] {\n\t\treturn\n\t}\n\tset.ustates[hash] = true\n\tset.items = append(set.items, EarleyItem{state, parent, nil, parseNode})\n}", "func (r *CompanyItemsCollectionRequest) Add(ctx context.Context, reqObj *Item) (resObj *Item, err error) {\n\terr = r.JSONRequest(ctx, \"POST\", \"\", reqObj, &resObj)\n\treturn\n}", "func (c *Cart) AddItem(i Item) {\n\tc.init()\n\tif existingItem, ok := c.items[i.ID]; ok {\n\t\texistingItem.Qty++\n\t\tc.items[i.ID] = existingItem\n\n\t} else {\n\t\ti.Qty = 1\n\t\tc.items[i.ID] = i\n\t}\n}", "func (c *Client) Add(ctx context.Context, item *Item) error {\n\treturn c.do(ctx, func(c *Conn) error {\n\t\treturn c.Add(item)\n\t})\n}", "func AddItem(da DataAccess, name string, itemType string, username string, value int64) error {\n\t// run standard validation\n\tif err := validateItem(name, itemType, value); err != nil {\n\t\treturn err\n\t}\n\n\t// find the user and verify they exist\n\tuser, err := FindUserByName(da, username)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// try to add the new item\n\treturn da.AddItem(context.Background(), user.Id, name, itemType, value)\n}", "func (b Bag) Add(i Item) (Bag, error) {\n\tif len(b.Items) >= b.Size {\n\t\treturn b, errors.New(\"Bag is full\")\n\t}\n\tb.Items = append(b.Items, i)\n\treturn b, nil\n}", "func (r *PolicySetItemsCollectionRequest) Add(ctx context.Context, reqObj *PolicySetItem) (resObj *PolicySetItem, err error) {\n\terr = r.JSONRequest(ctx, \"POST\", \"\", reqObj, &resObj)\n\treturn\n}", "func (r *Response) AddItem(key, value string) {\n\tr.Items = append(r.Items, Item{\n\t\tName: key,\n\t\tValue: value,\n\t})\n}", "func (lb *smoothWeightedRR) Add(item interface{}, weight int64) (err error) {\n\tif item == nil {\n\t\treturn fmt.Errorf(\"item cannot be nil\")\n\t}\n\n\tif weight < 0 {\n\t\treturn fmt.Errorf(\"item weight %v cannot be negative\", weight)\n\t}\n\n\tif lb.itemMap[item] != nil {\n\t\treturn fmt.Errorf(\"item %v already present\", item)\n\t}\n\n\tweightedItem := &weightedItem{item: item, weight: weight, currentWeight: 0, effectiveWeight: weight}\n\n\tlb.itemMap[item] = weightedItem\n\tlb.items = append(lb.items, weightedItem)\n\n\treturn nil\n}", "func (r *Relationships) Add(item Relationship) {\n\tr.Items = append(r.Items, item)\n}", "func (o *Outline) Add(item *OutlineItem) {\n\to.items = append(o.items, item)\n}", "func AddItems(ctx *fasthttp.RequestCtx) {\n\titem, ok := ctx.UserValue(\"item\").(string)\n\tif !ok {\n\t\tctx.SetStatusCode(fasthttp.StatusBadRequest)\n\t\treturn\n\t}\n\n\tAddItem(item)\n\tctx.SetStatusCode(fasthttp.StatusOK)\n}", "func (mp *MassPayment) AddItem(item MassPaymentItem) {\n\tmp.Items = append(mp.Items, item)\n}", "func (d *Dictionary) AddItem(key string, value handle.Handler) error {\n\tif _, exist := d.item[key]; exist {\n\t\treturn fmt.Errorf(\"key %s already exists\", key)\n\t}\n\td.item[key] = value\n\treturn nil\n}", "func (c *Cart) AddItem(item string) {\n\t// TODO\n\tfor key, _ := range Prices {\n if key == item {\n c.Items = append(c.Items, item)\n \tc.TotalPrice += Prices[item]\n \tfmt.Println(\"Item \" + item + \" added\")\n }\n }\n}", "func (c *Cache) Add(key interface{}, item caching.Item) {\n\t_, ok := c.load(key)\n\tif ok {\n\t\treturn\n\t}\n\n\tc.store(key, item)\n}", "func TestAdd(t *testing.T) {\n\t_ph := New()\n\t_ph.Add(Item{})\n\tif len(_ph.Items) != 1 {\n\t\tt.Errorf(\"Item was not added\")\n\t}\n}", "func (invertedIndex *InvertedIndex) AddItem(Term uint64, Document int) {\n\tif invertedIndex.HashMap[Term] != nil {\n\t\t// log.Println(\"Index item\", Term, \"already exists :: updating existing item\")\n\n\t\tFoundItemPosition := invertedIndex.FindItem(Term)\n\n\t\tinvertedIndex.Items[FoundItemPosition].Frequency++\n\t\tinvertedIndex.Items[FoundItemPosition].DocumentListing = append(invertedIndex.Items[FoundItemPosition].DocumentListing, Document)\n\t} else {\n\t\t// log.Println(\"Index item\", Term, \" does not exist :: creating new item\")\n\n\t\tInvertedIndexEntry := &InvertedIndexEntry{\n\t\t\tTerm: Term,\n\t\t\tFrequency: 1,\n\t\t\tDocumentListing: []int{Document},\n\t\t}\n\n\t\tinvertedIndex.HashMap[Term] = InvertedIndexEntry\n\t\tinvertedIndex.Items = append(invertedIndex.Items, InvertedIndexEntry)\n\t}\n}", "func (o *Order) AddItem(itemID int) error {\n\tif o.State != Ongoing && o.State != Empty {\n\t\treturn fmt.Errorf(\"order in wrong state\")\n\t}\n\t_, ok := o.Items[itemID]\n\tif ok {\n\t\treturn fmt.Errorf(\"item already present\")\n\t}\n\to.TrackChange(o, &ItemAdded{ItemID: itemID})\n\treturn nil\n}", "func (l *List) Add(s string) *ListItem {\n\n\tli := l.rootItem\n\tni := li.Add(s)\n\treturn ni\n}", "func (this *AppCollection) Add(item collection.Item) error {\n var err error\n\n app := item.(IApp)\n appItem := storage.NewAppItem(app.Info().Name(), app.Info().Protocol(), app.Info().Address())\n\n if this.repository != nil {\n if _, err = this.repository.Add(appItem); err == nil {\n this.apps[app.Info().Name()] = app\n }\n } else {\n this.apps[app.Info().Name()] = app\n }\n\n return err\n}", "func (b *Bill) addItem(item string, price float64) {\n\tb.items[item] = price\n}", "func (player *Player) add_item(item *Item) {\n\tplayer.items = append(player.items, item)\n}", "func NewItem() Item {\n\treturn Item{make(map[string]interface{})}\n}", "func (al *ArrayList) AddItem(item interface{}) error {\n\tif al.elementType == \"\" {\n\t\t// storing the type of the first element added into the ArrayList\n\t\tal.elementType = reflect.TypeOf(item).String()\n\t}\n\tif al.elementType == reflect.TypeOf(item).String() {\n\t\tal.slice = append(al.slice, item)\n\t} else {\n\t\terrString := \"Type Mismatch. Cannot insert item of type \" + reflect.TypeOf(item).String() + \" into slice of type \" + reflect.TypeOf(al.slice).String()\n\t\treturn errors.New(errString)\n\t}\n\treturn nil\n}", "func (rw *RandW) Add(item interface{}, weight int) {\n\trItem := &randWeighted{Item: item, Weight: weight}\n\trw.items = append(rw.items, rItem)\n\trw.sumOfWeights += weight\n\trw.n++\n}", "func (set *Set) Add(items ...interface{}) {\n\tfor _, item := range items {\n\t\tset.items[item] = itemExists\n\t}\n}", "func (t *Table) AddItem(item *PutItem) {\n\tw := &SDK.PutItemInput{\n\t\tTableName: pointers.String(t.nameWithPrefix),\n\t\tReturnConsumedCapacity: pointers.String(\"TOTAL\"),\n\t\tItem: item.data,\n\t\tExpected: item.conditions,\n\t}\n\tt.putSpool = append(t.putSpool, w)\n\tt.service.addWriteTable(t)\n}", "func (hMenu HMENU) AddItem(cmdId int, text string) HMENU {\r\n\thMenu.AppendMenu(co.MF_STRING, uint16(cmdId), text)\r\n\treturn hMenu\r\n}", "func NewItem(\n\tid string,\n\tname string,\n\tdescription string,\n\ttags []string,\n\tcreator string,\n\tcreatedAt time.Time) Item {\n\n\treturn Item{\n\t\tID: id,\n\t\tName: name,\n\t\tDescription: description,\n\t\tTags: tags,\n\t\tCreatedAt: createdAt,\n\t\tCreatedBy: creator,\n\t\tModifiedAt: createdAt,\n\t\tModifiedBy: creator,\n\t\tVersion: 1,\n\t}\n}", "func (c *Checklist) AddItem(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {\n\tif i := r.URL.Query().Get(\"item\"); len(i) != 0 {\n\t\tif c.getItemIndex(i) != -1 {\n\t\t\tc.b.Response(\"\", \"Item already exists\", http.StatusBadRequest, w)\n\t\t\treturn\n\t\t}\n\t\titemObj := item{\n\t\t\tKey: i,\n\t\t\tDone: false,\n\t\t}\n\n\t\tc.Items = append(c.Items, &itemObj)\n\t\tgo func() {\n\t\t\tc.Finished = c.CheckDone()\n\t\t\tc.saveToRedis()\n\t\t}()\n\t\tjson.NewEncoder(w).Encode(c.Items)\n\t\tgo c.b.WSChecklistUpdate()\n\t\treturn\n\t}\n\tc.b.Response(\"\", \"no item defined\", http.StatusBadRequest, w)\n}", "func (li *List) Add(item IPanel) *ListItem {\n\n\treturn li.InsertAt(len(li.items), item)\n}", "func (l *LogItems) Add(ii ...*LogItem) {\n\tl.mx.Lock()\n\tdefer l.mx.Unlock()\n\n\tl.items = append(l.items, ii...)\n}", "func (set *Set) Add(items ...interface{}) {\n\tfor _, item := range items {\n\t\tset.tree.Put(item, itemExists)\n\t}\n}", "func Append(exchange string, p currency.Pair, a asset.Item, price, volume float64) {\n\tif AlreadyExists(exchange, p, a, price, volume) {\n\t\treturn\n\t}\n\n\ti := Item{\n\t\tExchange: exchange,\n\t\tPair: p,\n\t\tAssetType: a,\n\t\tPrice: price,\n\t\tVolume: volume,\n\t}\n\n\tItems = append(Items, i)\n}", "func (a *Alfred) Append(item *Item) {\n\ta.Items = append(a.Items, *item)\n}", "func (set *SetThreadSafe) Add(Items ...interface{}) {\n\tfor _, item := range Items {\n\t\tset.Items.Store(item, itemExists)\n\t}\n}", "func TestAdd(t *testing.T) {\n\tfeed := New()\n\tfeed.Add(Item{})\n\n\tif len(feed.Items) != 1 {\n\t\tt.Errorf(\"Item was not added\")\n\t}\n}", "func (g *Group) Add(code ...Code) *Statement {\n\ts := Add(code...)\n\tg.items = append(g.items, s)\n\treturn s\n}", "func (m *Menu) AddItem(title string, action func(), key ...string) *MenuItem {\n\tk := \"\"\n\tif len(key) > 0 {\n\t\tk = key[0]\n\t}\n\tretM := C.addItem(C.MenuObj{\n\t\ttitle: C.CString(title),\n\t\tkey: C.CString(k),\n\t\tmenu: m.menu,\n\t})\n\n\titem := MenuItem{\n\t\tAction: action,\n\t\ttitle: title,\n\t\tmenuItem: retM.menuItem,\n\t\tparent: m,\n\t}\n\tmenuItems = append(menuItems, &item)\n\treturn &item\n}", "func (i *Inbox[M]) Add(inboxItem InboxItem) {\n\ti.InboxItems = append(i.InboxItems, inboxItem)\n}", "func (s *itemStack) Push(t Item) {\n\ts.lock.Lock()\n\ts.lock.Unlock()\n\ts.items = append(s.items, t)\n}", "func (q *Queue) Add(body string, retries int) (string, error) {\n\ti, err := item.New(body, retries)\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tq.lock.Lock()\n\tdefer q.lock.Unlock()\n\n\tq.Items = append(q.Items, i)\n\treturn i.Id, nil\n}", "func (c *Collection) Add(entity Entity) {\n\tc.register.Add(entity)\n\tc.entities.Add(entity)\n}", "func NewItem(id string, name string, price float64) *Item {\n\titem := &Item{\n\t\tid,\n\t\tname,\n\t\tprice,\n\t\ttime.Now().UTC(),\n\t}\n\n\treturn item\n}", "func (p *Player) AddItem(item *Item) bool {\n var totalWeight int\n totalWeight += item.Weight\n if totalWeight + item.Weight > p.MaxWeight {\n return false\n }\n p.Inventory = append(p.Inventory, item)\n if item.Name == \"Rusty Sword\" {\n p.Attack += 2\n }\n if item.Name == \"Small Shield\" {\n p.Armor += 2\n }\n if item.Name == \"Battle Armor\" {\n p.Attack += 2\n p.Armor ++\n }\n if item.Name == \"Heavy Armor\" {\n p.Attack ++\n p.Armor += 3\n }\n if item.Name == \"Lost Sword\" {\n p.Attack += 4\n }\n if item.Name == \"Large Shield\" {\n p.Armor += 4\n }\n return true\n}", "func (r *Reservoir) Add(item interface{}) *Reservoir {\n\tr.total++\n\tif len(r.sample) < r.k {\n\t\tr.sample = append(r.sample, item)\n\t} else {\n\t\tif rand.Float64() < (float64(r.k) / float64(r.total)) {\n\t\t\tr.sample[rand.Intn(r.k)] = item\n\t\t\tr.switches++\n\t\t}\n\t}\n\treturn r\n}", "func (lc *ILoginCredentials) AddItem(pld *inventory.AddItem) (*inventory.AddItemResponse, error) {\n\tcredPld := &postAddItem{\n\t\tAddItem: pld,\n\t\tILoginCredentials: lc,\n\t}\n\n\tresponse := &inventory.AddItemResponse{}\n\terr := do(credPld, response, \"inventory/addItem\")\n\tif err != nil {\n\t\treturn nil, &Error{\"AddItem()\", err}\n\t}\n\n\treturn response, nil\n}", "func (as *ApplicationStore) Add(ctx context.Context, a *domain.Application) (*domain.Application, error) {\n\t// TODO What if such application already exist? Should we thrown an error, or silently replace it?\n\tas.items[a.Name] = a\n\treturn a, nil\n}", "func (db *BotDB) AddItem(item string) (uint64, error) {\n\tvar id uint64\n\terr := db.standardErr(db.sqlAddItem.QueryRow(item).Scan(&id))\n\n\tif db.CheckError(\"AddItem\", err) != nil {\n\t\treturn 0, err\n\t}\n\treturn id, nil\n}", "func (c *Cache) Add(key string, item IWorker) {\n\tc.Lock()\n\tdefer c.Unlock()\n\tc.Items[key] = item\n}", "func (set *Set) AddItem(item interface{}) (bool, interface{}) {\n\topt, k, _ := set.tree.PutItem(item, itemExists)\n\treturn opt, k\n}", "func NewItem(value interface{}) *Item {\n\treturn &Item{unsafe.Pointer(&value), nil, nil}\n}", "func Add(book Book) {\n\tbookshelf = append(bookshelf, book)\n}", "func (i *OrderedItems) Add(key interface{}, value interface{}) interface{} {\n\ti.mu.Lock()\n\tdefer i.mu.Unlock()\n\t_, ok := i.OrderedItems[key]\n\ti.OrderedItems[key] = value\n\tif !ok {\n\t\ti.KeySlice = append(i.KeySlice, key)\n\t}\n\treturn i.OrderedItems[key]\n}", "func (b *BioBag) Add(item *fruit.FruitItem) bool {\n\tif b.Count < 5 {\n\t\tb.List[b.Count] = item\n\t\tb.Count += 1\n\t\treturn true\n\t} else {\n\t\tfmt.Println(\"Bag이 다 찼습니다. 새로운 Bag에 넣어주세요.\")\n\t\treturn false\n\t}\n}", "func AddItem(item Item) error {\n\tcfDict, err := ConvertMapToCFDictionary(item.attr)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer Release(C.CFTypeRef(cfDict))\n\n\terrCode := C.SecItemAdd(cfDict, nil)\n\terr = checkError(errCode)\n\treturn err\n}", "func NewItem(payload map[string]interface{}) (*Item, error) {\n\tid, found := payload[\"id\"]\n\tif !found {\n\t\treturn nil, errors.New(\"Missing ID field\")\n\t}\n\tetag, err := genEtag(payload)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\titem := &Item{\n\t\tID: id,\n\t\tEtag: etag,\n\t\tUpdated: time.Now(),\n\t\tPayload: payload,\n\t}\n\treturn item, nil\n}", "func NewItem() Item {\n\treturn Item{Descriptor: DefaultDescriptor()}\n}", "func (b *Backend) Add(c context.Context, item string) {\n\tb.log.Append(c, AddItem(item))\n}", "func (ris *rssItems) addItem(item *RssItem) {\n\tris.Lock()\n\tris.items = append(ris.items, *item)\n\tris.Unlock()\n}", "func (s *MyEntityManager) Add(entity ecs.Entity, systemIDs ...string) {\n\tsystemMap := make(map[string]bool)\n\tfor _, system := range systemIDs {\n\t\tsystemMap[system] = true\n\t}\n\ts.items[entity.ID()] = EntityManagerItems{\n\t\tsystems: systemMap,\n\t\tentity: &entity,\n\t}\n}", "func (tb *Table) AddItems(items [][]byte) {\n\ttb.rawItems.addItems(tb, items)\n\tatomic.AddUint64(&tb.itemsAdded, uint64(len(items)))\n\tn := 0\n\tfor _, item := range items {\n\t\tn += len(item)\n\t}\n\tatomic.AddUint64(&tb.itemsAddedSizeBytes, uint64(n))\n}", "func (s *Set) Add(item string) {\n\ts.safeMap()\n\ts.m[item] = true\n}", "func AddItem(svc *dynamodb.DynamoDB, item OccurrenceInfo) error {\n\ttableName := \"Occurrences\"\n\n\ttime.Sleep(time.Nanosecond * 1)\n\tsha := sha1.New()\n\n\tsha.Write([]byte(fmt.Sprintf(\"%d\", time.Now().UnixNano())))\n\ts := sha.Sum(nil)\n\ths := fmt.Sprintf(\"%x\", s)\n\n\titem.OccurrenceID = hs\n\n\t_, err := time.Parse(\"2006-01-02\", item.Date)\n\tif err != nil {\n\t\tfmt.Println(\"Got error with date:\")\n\t\tfmt.Println(err.Error())\n\t\treturn err\n\t}\n\n\t// just in case I decide to just default to using todays date\n\t// item.Date = time.Now().Format(\"2006-01-02\")\n\n\tav, err := dynamodbattribute.MarshalMap(item)\n\tif err != nil {\n\t\tfmt.Println(\"Got error marshalling map:\")\n\t\tfmt.Println(err.Error())\n\t\treturn err\n\t}\n\n\t// Create item in table Movies\n\tinput := &dynamodb.PutItemInput{\n\t\tItem: av,\n\t\tTableName: aws.String(tableName),\n\t}\n\n\t_, err = svc.PutItem(input)\n\tif err != nil {\n\t\tfmt.Println(\"Got error calling PutItem:\")\n\t\tfmt.Println(err.Error())\n\t\treturn err\n\t}\n\treturn nil\n}", "func (r *FinancialItemRepository) AddItem(tx *sql.Tx, item *models.FinancialItem) error {\n\tvar itemID int64\n\terr := tx.QueryRow(\"INSERT INTO items (PLAID_ITEM_ID, PLAID_ACCESS_TOKEN, USER_ID, PLAID_INSTITUTION_ID, INSTITUTION_NAME, INSTITUTION_COLOR, INSTITUTION_LOGO, ERROR_CODE, ERROR_DEV_MSG, ERROR_USER_MSG) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10) RETURNING id\",\n\t\titem.PlaidItemID, item.PlaidAccessToken, item.UserID, item.PlaidInstitutionID,\n\t\titem.InstitutionName, item.InstitutionColor, item.InstitutionLogo,\n\t\titem.ErrorCode, item.ErrorDevMessage, item.ErrorUserMessage).Scan(&itemID)\n\tif err != nil {\n\t\treturn err\n\t}\n\titem.ID = itemID\n\treturn nil\n}", "func (s *ItemStack) Push(t Item) {\n\ts.lock.Lock()\n\tdefer s.lock.Unlock()\n\ts.items = append(s.items, t)\n}", "func AddItem(bill, units map[string]int, item, unit string) bool {\n\tquantity, exists := units[unit]\n\tif !exists {\n\t\treturn false\n\t}\n\tbill[item] += quantity\n\treturn true\n}", "func (c *Cache) AddItem(hash string, item NetFace, expiration time.Duration) bool {\n\t// check if that item exists or not\n\titemExists := c.GetItem(hash)\n\tif itemExists != nil {\n\t\treturn false\n\t}\n\n\tc.lock.RLock()\n\tdefer c.lock.RUnlock()\n\n\tc.items[hash] = &CacheItem{\n\t\tdata: item,\n\t\texpiration: time.Now().Add(expiration),\n\t}\n\n\treturn true\n}", "func NewItem(name string, weight int) *Item {\n return &Item{name, weight}\n}", "func (s *Set) Add(item Value) *Set {\n\tvar mapValue struct{}\n\treturn &Set{backingMap: s.backingMap.Store(item, mapValue)}\n}", "func (bs *BookShelf) Add(book *Book) {\n\tbs.Books = append(bs.Books, book)\n}", "func TestAdd(t *testing.T) {\n\t_plague := New()\n\t_plague.Add(Item{})\n\tif len(_plague.Items) != 1 {\n\t\tt.Errorf(\"Item was not added\")\n\t}\n}", "func NewItem(score uint32, delay uint32, body []byte) *Item {\n\ti := new(Item)\n\ti.score = score\n\ti.delay = delay\n\ti.body = body\n\treturn i\n}", "func (r *CompanyItemCategoriesCollectionRequest) Add(ctx context.Context, reqObj *ItemCategory) (resObj *ItemCategory, err error) {\n\terr = r.JSONRequest(ctx, \"POST\", \"\", reqObj, &resObj)\n\treturn\n}", "func (ld *LanguageData) AddLanguageItem(name string, bytes int) {\n\tld.sum += bytes\n\tld.languages[name] = &LanguageItem{\n\t\tbytes: bytes,\n\t}\n}", "func (i *ItemList) Add(name, comment string) {\n\titer := i.Append()\n\n\ti.Set(&iter,\n\t\t[]int{int(NameColumn), int(CommentColumn)},\n\t\t[]glib.Value{*glib.NewValue(name), *glib.NewValue(comment)},\n\t)\n}", "func (b *bag) addItem(i item) error {\n\tif b.currItemsWeight + i.weight <= b.maxItemsWeight {\n\t\tb.currItemsWeight +=i.weight\n\t\tb.items = append(b.items, i)\n\t\treturn nil\n\t}\n\treturn errors.New(\"could not fit item\")\n}", "func (scheduler *Scheduler) Add(job Job, duration time.Duration) error {\n\tif scheduler.IsRunning() {\n\t\treturn fmt.Errorf(\"unable to add item to scheduler: scheduler is already running\")\n\t}\n\n\tscheduler.items = append(scheduler.items, item{\n\t\tjob: job,\n\t\tduration: duration,\n\t\tdone: make(chan struct{}),\n\t})\n\n\treturn nil\n}", "func NewItem(n string, p string, s int) Item {\n\tprice, err := decimal.NewFromString(p)\n\tif err != nil {\n\t\tlog.Fatalf(\"Could not create new items\")\n\t}\n\treturn Item{\n\t\tselector: s,\n\t\tname: n,\n\t\tprice: price,\n\t}\n}", "func (hil *HTTPServiceInfoList) AddItem(h HTTPServiceInfo) {\n\tfor i, item := range *hil {\n\t\tif h.BCSVHost == item.BCSVHost && h.ServicePort == item.ServicePort {\n\t\t\titem.Backends = append(item.Backends, h.Backends...)\n\t\t\t(*hil)[i] = item\n\t\t\treturn\n\t\t}\n\t}\n\n\t//not match data already exist\n\t*hil = append(*hil, h)\n}", "func (s *Set) Add(items ...uint32) *Set {\n\tfor _, item := range items {\n\t\ts.items[item] = struct{}{}\n\t}\n\treturn s\n}" ]
[ "0.74165183", "0.7090409", "0.6876846", "0.6849664", "0.66357064", "0.65796465", "0.6491072", "0.6477436", "0.6476322", "0.6445154", "0.64410967", "0.6426966", "0.6387066", "0.63806593", "0.6369628", "0.6353556", "0.63494164", "0.6347625", "0.63026434", "0.62804484", "0.6243011", "0.6214876", "0.6214503", "0.6155668", "0.6137817", "0.61318445", "0.61224324", "0.61192006", "0.61189204", "0.61105394", "0.61045", "0.6098516", "0.609575", "0.60749495", "0.6071793", "0.6060315", "0.6045545", "0.60449386", "0.6043712", "0.6035875", "0.60183936", "0.5993743", "0.5956789", "0.59483886", "0.59258837", "0.5917543", "0.5907678", "0.59072924", "0.5895568", "0.5886105", "0.58856004", "0.586519", "0.58488137", "0.58383834", "0.5817639", "0.580112", "0.57955754", "0.5757971", "0.57575226", "0.575532", "0.5753556", "0.57492554", "0.57460797", "0.5740154", "0.57375383", "0.57331187", "0.5729057", "0.5720193", "0.570129", "0.56980234", "0.5682675", "0.56649095", "0.5664104", "0.56631947", "0.56621546", "0.56496704", "0.5647486", "0.56346685", "0.56342286", "0.5623608", "0.562141", "0.5606443", "0.5604032", "0.56009096", "0.55969787", "0.5592966", "0.55851877", "0.5577213", "0.55568993", "0.5543821", "0.55336297", "0.55071914", "0.55068135", "0.550332", "0.5495453", "0.54906166", "0.547481", "0.54542035", "0.5450672", "0.5426749" ]
0.76659644
0
String returns the JSON for currently populated values or the minimum required values.
func String() string { output := output{ Rerun: Rerun, Variables: Variables, Items: Items, } var err error var b []byte if Indent == "" { b, err = json.Marshal(output) } else { b, err = json.MarshalIndent(output, "", Indent) } if err != nil { messageErr := Errorf("Error in parser. Please report this output to https://github.com/drgrib/alfred/issues: %v", err) panic(messageErr) } s := string(b) return s }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (s *Siegfried) JSON() string {\n\tversion := config.Version()\n\tstr := fmt.Sprintf(\n\t\t\"{\\\"siegfried\\\":\\\"%d.%d.%d\\\",\\\"scandate\\\":\\\"%v\\\",\\\"signature\\\":\\\"%s\\\",\\\"created\\\":\\\"%v\\\",\\\"identifiers\\\":[\",\n\t\tversion[0], version[1], version[2],\n\t\ttime.Now().Format(time.RFC3339),\n\t\tconfig.SignatureBase(),\n\t\ts.C.Format(time.RFC3339))\n\tfor i, id := range s.ids {\n\t\tif i > 0 {\n\t\t\tstr += \",\"\n\t\t}\n\t\td := id.Describe()\n\t\tstr += fmt.Sprintf(\"{\\\"name\\\":\\\"%s\\\",\\\"details\\\":\\\"%s\\\"}\", d[0], d[1])\n\t}\n\tstr += \"],\"\n\treturn str\n}", "func dummyJSONStr() string {\n\treturn `{\n \"number\": 1234.56,\n \"string\": \"foo bar\",\n \"arrayOfString\": [\n \"one\",\n \"two\",\n \"three\",\n \"four\"\n ],\n \"object\": {\n \"foo\": \"bar\",\n \"hello\": \"world\",\n \"answer\": 42\n },\n \"true\": true,\n \"false\": false,\n \"null\": null\n }`\n}", "func (o *Observationvalue) String() string {\n \n \n \n o.RequestedRoutingSkillIds = []string{\"\"} \n \n \n \n \n \n \n \n \n \n \n \n \n o.RequestedRoutings = []string{\"\"} \n \n o.ScoredAgents = []Analyticsscoredagent{{}} \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (fd FieldData) JSON() (string, error) {\n\tdata, err := json.MarshalIndent(fd.values, \"\", \" \")\n\treturn string(data), err\n}", "func (m *Model) JSON() string {\n\tret := \"\"\n\tif m.Emm != nil {\n\t\tret += m.Emm.JSON()\n\t}\n\tif m.Snow != nil {\n\t\tret += m.Snow.JSON()\n\t}\n\treturn ret\n}", "func (o *Addshifttraderequest) String() string {\n \n \n \n \n o.AcceptableIntervals = []string{\"\"} \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (info *SchemaInfo) JSON() string {\n\treturn fmt.Sprintf(\n\t\t`{\"name\": \"%s\",\"latestRev\": %d,\"desc\":`+\n\t\t\t` \"%s\",\"isActive\": %t,\"hasDraft\": %t}`,\n\t\tinfo.Name, info.LatestRevision,\n\t\tinfo.Description, info.IsActive, info.HasDraft)\n}", "func (v *Value) String() string {\n switch d := v.data.(type) {\n case []byte:\n return string(d)\n case string:\n return d\n default:\n if j, e := json.Marshal(v.data); e == nil {\n return string(j)\n }\n return fmt.Sprintf(\"%+v\", v.data)\n }\n}", "func (a ValueArray) String() string {\n\treturn a.JSONString()\n}", "func (p *Parms) String() string {\n\tout, _ := json.MarshalIndent(p, \"\", \"\\t\")\n\treturn string(out)\n}", "func (self *monitoringData) String() string {\n\tstr, _ := self.JSON()\n\treturn str\n}", "func (m *Meta) JSON() string {\n\tj, _ := json.MarshalIndent(m, \"\", \" \")\n\treturn string(j)\n}", "func (s *Struct) JSON() string {\n\tstr := &strings.Builder{}\n\tstr.WriteByte('{')\n\n\ti := 0\n\tfor name, val := range s.value {\n\t\tif i > 0 {\n\t\t\tstr.WriteString(\", \")\n\t\t}\n\t\tstr.WriteString(\"\\\"\" + name + \"\\\"\")\n\t\tstr.WriteString(\": \")\n\t\tstr.WriteString(val.JSON())\n\t\ti++\n\t}\n\n\tstr.WriteByte('}')\n\treturn str.String()\n}", "func (e Data) String() string {\n\tj, _ := e.MarshalJSON()\n\treturn string(j)\n}", "func (d Dict) String() string {\n\tout, _ := json.MarshalIndent(d, \"\", \" \")\n\treturn string(out)\n}", "func (j JSON) String() string {\n\tbs, err := j.MarshalJSON()\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\n\treturn string(bs)\n}", "func (j Json) String() string {\n\treturn string(j)\n}", "func (configVarString ConfigVarString) MarshalJSON() ([]byte, error) {\n\tvar secretKeyRefEmpty, configMapKeyRefEmpty bool\n\tif configVarString.SecretKeyRef.ObjectReference.Namespace == \"\" &&\n\t\tconfigVarString.SecretKeyRef.ObjectReference.Name == \"\" &&\n\t\tconfigVarString.SecretKeyRef.Key == \"\" {\n\t\tsecretKeyRefEmpty = true\n\t}\n\n\tif configVarString.ConfigMapKeyRef.ObjectReference.Namespace == \"\" &&\n\t\tconfigVarString.ConfigMapKeyRef.ObjectReference.Name == \"\" &&\n\t\tconfigVarString.ConfigMapKeyRef.Key == \"\" {\n\t\tconfigMapKeyRefEmpty = true\n\t}\n\n\tif secretKeyRefEmpty && configMapKeyRefEmpty {\n\t\treturn []byte(fmt.Sprintf(`\"%s\"`, configVarString.Value)), nil\n\t}\n\n\tbuffer := bytes.NewBufferString(\"{\")\n\tif !secretKeyRefEmpty {\n\t\tjsonVal, err := json.Marshal(configVarString.SecretKeyRef)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tbuffer.WriteString(fmt.Sprintf(`\"secretKeyRef\":%s`, string(jsonVal)))\n\t}\n\n\tif !configMapKeyRefEmpty {\n\t\tvar leadingComma string\n\t\tif !secretKeyRefEmpty {\n\t\t\tleadingComma = \",\"\n\t\t}\n\t\tjsonVal, err := json.Marshal(configVarString.ConfigMapKeyRef)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tbuffer.WriteString(fmt.Sprintf(`%s\"configMapKeyRef\":%s`, leadingComma, jsonVal))\n\t}\n\n\tif configVarString.Value != \"\" {\n\t\tbuffer.WriteString(fmt.Sprintf(`,\"value\":\"%s\"`, configVarString.Value))\n\t}\n\n\tbuffer.WriteString(\"}\")\n\treturn buffer.Bytes(), nil\n}", "func String(i interface{}) string {\n\tj, e := json.Marshal(i)\n\tif e != nil {\n\t\treturn fmt.Sprintf(\"%+v\", i)\n\t}\n\treturn string(j)\n}", "func (f Form1299s) String() string {\n\tjf, _ := json.Marshal(f)\n\treturn string(jf)\n}", "func (f Form1299s) String() string {\n\tjf, _ := json.Marshal(f)\n\treturn string(jf)\n}", "func (f Featured) String() string {\n\tjf, _ := json.Marshal(f)\n\treturn string(jf)\n}", "func (o *Entitytypecriteria) String() string {\n \n o.Values = []string{\"\"} \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (p *Policy) String() string {\n\tresult, _ := json.MarshalIndent(p, \"\", \" \")\n\treturn string(result)\n}", "func (def *ProviderDefinition) JSONSchemaString() string {\n\tvars := &templateVars{\n\t\tRequiredFields: baseProviderRequiredFields,\n\t\tRequiredProperties: make([]string, 0),\n\t\tPropertySchemas: make([]*propertySchemaWithKey, 0),\n\t}\n\tfor key, prop := range def.PropertyDefinitions {\n\t\tif prop.Required {\n\t\t\tvars.RequiredProperties = append(vars.RequiredProperties, key)\n\t\t}\n\t\tps := &propertySchemaWithKey{\n\t\t\tPropertySchema: prop.Schema,\n\t\t\tKey: key,\n\t\t}\n\t\tvars.PropertySchemas = append(vars.PropertySchemas, ps)\n\t}\n\tvar b bytes.Buffer\n\tif err := providerSchemaTemplate.Execute(&b, vars); err != nil {\n\t\treturn fmt.Sprintf(\"TEMPLATE ERROR: %s\", err)\n\t}\n\treturn b.String()\n}", "func (o *Shiftstartvariance) String() string {\n o.ApplicableDays = []string{\"\"} \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (f Form1299) String() string {\n\tjf, _ := json.Marshal(f)\n\treturn string(jf)\n}", "func (f Form1299) String() string {\n\tjf, _ := json.Marshal(f)\n\treturn string(jf)\n}", "func (t Terms) String() string {\n\tjt, _ := json.Marshal(t)\n\treturn string(jt)\n}", "func (vl GeoJSONValue) String() string {\n\treturn string(vl)\n}", "func (vl GeoJSONValue) String() string {\n\treturn string(vl)\n}", "func JSON(j interface{}) string {\n\tvar buf bytes.Buffer\n\tencoder := json.NewEncoder(&buf)\n\tencoder.SetEscapeHTML(false)\n\tencoder.SetIndent(\"\", \"\")\n\terr := encoder.Encode(j)\n\n\tif err == nil {\n\t\treturn strings.TrimSuffix(buf.String(), \"\\n\")\n\t}\n\n\t// j could not be serialized to json, so let's log the error and return a\n\t// helpful-ish value\n\tError().logGenericArgs(\"error serializing value to json\", err, nil, 1)\n\treturn fmt.Sprintf(\"<error: %v>\", err)\n}", "func (o *Createemailrequest) String() string {\n \n \n \n o.SkillIds = []string{\"\"} \n \n \n o.Attributes = map[string]string{\"\": \"\"} \n \n \n \n \n \n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (ioval *InputObjectValue) String() string {\n\tbuf := new(strings.Builder)\n\tbuf.WriteByte('{')\n\tfor i, field := range ioval.Fields {\n\t\tif i > 0 {\n\t\t\tbuf.WriteString(\", \")\n\t\t}\n\t\tbuf.WriteString(field.Name.String())\n\t\tbuf.WriteString(\": \")\n\t\tbuf.WriteString(field.Value.String())\n\t}\n\tbuf.WriteByte('}')\n\treturn buf.String()\n}", "func (h *Histogram) String() string {\n\th.mutex.Lock()\n\tdefer h.mutex.Unlock()\n\tbuf, err := json.Marshal(h.values)\n\tif err != nil {\n\t\treturn \"{}\"\n\t}\n\treturn string(buf)\n}", "func (g Groups) String() string {\n\tjg, _ := json.Marshal(g)\n\treturn string(jg)\n}", "func (o *Timeoffbalancerequest) String() string {\n o.ActivityCodeIds = []string{\"\"} \n o.DateRanges = []Localdaterange{{}} \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (o *Assignmentvalidation) String() string {\n o.MembersNotAssigned = []Userreference{{}} \n o.MembersAlreadyAssigned = []Userreference{{}} \n o.MembersAlreadyAssignedToOther = []Otherprofileassignment{{}} \n o.InvalidMemberAssignments = []Invalidassignment{{}} \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (o *Apiusageclientquery) String() string {\n \n \n o.Metrics = []string{\"\"} \n o.GroupBy = []string{\"\"} \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (environment *Environment) String() string {\n\tmarshaledVal, _ := json.MarshalIndent(*environment, \"\", \" \") // Marshal to JSON\n\n\treturn string(marshaledVal) // Return string value\n}", "func (f Featureds) String() string {\n\tjf, _ := json.Marshal(f)\n\treturn string(jf)\n}", "func (o *Createperformanceprofile) String() string {\n \n \n \n o.ReportingIntervals = []Reportinginterval{{}} \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (uc *UseCase) String() string {\n\treturn string(uc.JSON())\n}", "func mustToRawJson(v interface{}) (string, error) {\n\tbuf := new(bytes.Buffer)\n\tenc := json.NewEncoder(buf)\n\tenc.SetEscapeHTML(false)\n\terr := enc.Encode(&v)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn strings.TrimSuffix(buf.String(), \"\\n\"), nil\n}", "func (q Quests) String() string {\n\tjc, _ := json.Marshal(q)\n\treturn string(jc)\n}", "func (b Boms) String() string {\n\tjb, _ := json.Marshal(b)\n\treturn string(jb)\n}", "func jsonify(v interface{}) string { return string(mustMarshalJSON(v)) }", "func (n NullString) MarshalJSON() ([]byte, error) { return nulljson(n.Valid, n.StringVal) }", "func (m *Metrics) String() string {\n\tb, _ := json.Marshal(m)\n\treturn string(b)\n}", "func (j *JSONData) FormatString() string {\n\treturn string(j.data)\n}", "func (i *Info) String() string {\n\tb, _ := json.Marshal(i)\n\treturn string(b)\n}", "func ( fq *Fq_req ) To_json( ) ( *string, error ) {\n\tjbytes, err := json.Marshal( fq )\t\t\t// bundle into a json string\n\n\ts := string( jbytes )\n\n\treturn &s, err\n}", "func (b BudgetLines) String() string {\n\tjb, _ := json.Marshal(b)\n\treturn string(jb)\n}", "func toJSON(val interface{}) string {\n\tjs, err := json.Marshal(val)\n\tif err != nil {\n\t\treturn \"<error serializing value>\"\n\t}\n\treturn string(js)\n}", "func (t Technology) String() string {\n\tjt, _ := json.Marshal(t)\n\treturn string(jt)\n}", "func (u Users) String() string {\n\tju, _ := json.Marshal(u)\n\treturn string(ju)\n}", "func (u Users) String() string {\n\tju, _ := json.Marshal(u)\n\treturn string(ju)\n}", "func (u Users) String() string {\n\tju, _ := json.Marshal(u)\n\treturn string(ju)\n}", "func (u Users) String() string {\n\tju, _ := json.Marshal(u)\n\treturn string(ju)\n}", "func (u Users) String() string {\n\tju, _ := json.Marshal(u)\n\treturn string(ju)\n}", "func (u Users) String() string {\n\tju, _ := json.Marshal(u)\n\treturn string(ju)\n}", "func (v Value) String() string {\n\tswitch {\n\tcase v.FloatValue != nil:\n\t\treturn fmt.Sprintf(\"%v\", *v.FloatValue)\n\tcase v.IntValue != nil:\n\t\treturn fmt.Sprintf(\"%v\", *v.IntValue)\n\tcase v.StringValue != nil:\n\t\treturn fmt.Sprintf(\"%q\", *v.StringValue)\n\tcase v.BooleanValue != nil:\n\t\treturn fmt.Sprintf(\"%v\", *v.BooleanValue)\n\tcase v.ListValue != nil:\n\t\tstrs := []string{}\n\t\tfor _, item := range v.ListValue.Items {\n\t\t\tstrs = append(strs, item.String())\n\t\t}\n\t\treturn \"[\" + strings.Join(strs, \",\") + \"]\"\n\tcase v.MapValue != nil:\n\t\tstrs := []string{}\n\t\tfor _, i := range v.MapValue.Items {\n\t\t\tstrs = append(strs, fmt.Sprintf(\"%v=%v\", i.Name, i.Value))\n\t\t}\n\t\treturn \"{\" + strings.Join(strs, \";\") + \"}\"\n\tdefault:\n\t\tfallthrough\n\tcase v.Null == true:\n\t\treturn \"null\"\n\t}\n}", "func (s StringOptionalWrapper) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"value\", s.Value)\n\treturn json.Marshal(objectMap)\n}", "func (r RoomOccupancies) String() string {\n\tjr, _ := json.Marshal(r)\n\treturn string(jr)\n}", "func (o *Coretype) String() string {\n \n \n \n \n \n o.ValidationFields = []string{\"\"} \n \n o.ItemValidationFields = []string{\"\"} \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (v *JSONValue) String() string {\n\tv.parseString()\n\treturn v.valString\n}", "func (w Widgets) String() string {\n\tjw, _ := json.Marshal(w)\n\treturn string(jw)\n}", "func (o *Commonruleconditions) String() string {\n o.Clauses = []Commonruleconditions{{}} \n o.Predicates = []Commonrulepredicate{{}} \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (a Analysis) String() string {\n\tb, err := json.Marshal(a)\n\tif err != nil {\n\t\treturn fmt.Sprintf(\"failed to format user: %v\", err.Error())\n\t}\n\treturn string(b)\n}", "func (o *Patchintegrationactionfields) String() string {\n \n o.RequestMappings = []Requestmapping{{}} \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (fpm *RegionalDistribution_FieldPathMap) JSONString() string {\n\treturn strcase.ToLowerCamel(fpm.selector.String()) + \".\" + fpm.key\n}", "func (o *Initialconfiguration) String() string {\n\tj, _ := json.Marshal(o)\n\tstr, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n\treturn str\n}", "func (r Resiliency) String() string {\n\tb, _ := json.Marshal(r)\n\treturn string(b)\n}", "func (o *Outcomequantilecondition) String() string {\n\tj, _ := json.Marshal(o)\n\tstr, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n\treturn str\n}", "func (r RoomOccupancy) String() string {\n\tjr, _ := json.Marshal(r)\n\treturn string(jr)\n}", "func (obj KeyColumnUsage) String() string {\n\tif data, err := json.Marshal(obj); err != nil {\n\t\treturn fmt.Sprintf(\"<KeyColumnUsage>\")\n\t} else {\n\t\treturn string(data)\n\t}\n}", "func RespondJSON(w io.Writer, val promql.Value) error {\n\tdata := struct {\n\t\tType string `json:\"type\"`\n\t\tValue interface{} `json:\"value\"`\n\t\tVersion int `json:\"version\"`\n\t}{\n\t\tType: val.Type().String(),\n\t\tValue: val,\n\t\tVersion: jsonFormatVersion,\n\t}\n\t// TODO(fabxc): Adding MarshalJSON to promql.Values might be a good idea.\n\tif sc, ok := val.(*promql.Scalar); ok {\n\t\tdata.Value = sc.Value\n\t}\n\tenc := json.NewEncoder(w)\n\treturn enc.Encode(data)\n}", "func (ts *TimeStats) JSON() string {\n\tout, _ := json.Marshal(ts)\n\tts.Total = 0\n\tts.Earliest = time.Time{}\n\tts.Latest = time.Time{}\n\treturn string(out)\n\n}", "func jsonString(b []byte) string {\n\ts := string(b)\n\tif s == \"\" {\n\t\treturn \"{}\"\n\t}\n\treturn s\n}", "func (t Things) String() string {\n\tjt, _ := json.Marshal(t)\n\treturn string(jt)\n}", "func (b BudgetLine) String() string {\n\tjb, _ := json.Marshal(b)\n\treturn string(jb)\n}", "func (c *FiscalYear) String() string {\n\tbytes, _ := json.Marshal(c)\n\treturn string(bytes)\n}", "func (v Value) MarshalJSON() ([]byte, error) {\n\tswitch {\n\tcase v.IsQuoted():\n\t\treturn json.Marshal(v.String())\n\tcase v.typ == Null:\n\t\treturn nullstr, nil\n\t}\n\treturn v.val, nil\n}", "func (c *Config) JSON() string {\n\tbytes, _ := json.Marshal(c)\n\n\treturn string(bytes)\n\n}", "func (o *Knowledgedocumentreq) String() string {\n \n \n o.Alternatives = []Knowledgedocumentalternative{{}} \n \n o.LabelIds = []string{\"\"} \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (r SendAll) String() string {\n\tJSON, err := json.Marshal(r)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\treturn string(JSON)\n}", "func (out String) MarshalJSON() ([]byte, error) {\n\tif out.Valid {\n\t\treturn json.Marshal(out.String)\n\t}\n\treturn json.Marshal(nil)\n}", "func (s *FixedSchema) String() string {\n\tbytes, err := json.MarshalIndent(s, \"\", \" \")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn string(bytes)\n}", "func (o *Createtimeofflimitrequest) String() string {\n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (s PropertyLatestValue) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (fpm *AlertingConditionSpecTimeSeriesCombineThreshold_FieldPathMap) JSONString() string {\n\treturn strcase.ToLowerCamel(fpm.selector.String()) + \".\" + fpm.key\n}", "func (g *GenOpts) JSON() ([]byte, error) {\n\treturn json.Marshal(g)\n}", "func (o OrderItems) String() string {\n\tjo, _ := json.Marshal(o)\n\treturn string(jo)\n}", "func (o *Integrationtype) String() string {\n\tj, _ := json.Marshal(o)\n\tstr, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n\treturn str\n}", "func (o *Metrics) String() string {\n \n \n \n \n \n \n \n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (o *Compliance) String() string {\n\tj, _ := json.Marshal(o)\n\tstr, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n\treturn str\n}", "func (t Tasks) String() string {\n\tjt, _ := json.Marshal(t)\n\treturn string(jt)\n}", "func (o *Emailcampaignschedule) String() string {\n \n \n o.Intervals = []Scheduleinterval{{}} \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (i *Info) JSONString(indent bool) string {\n\treturn marshal.SafeJSON(i.ctx, netPrinter{i}, indent)\n}", "func (r Register) String() string {\n\tJSON, err := json.Marshal(r)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\treturn string(JSON)\n}", "func (l *List) JSON() string {\n\tstr := &strings.Builder{}\n\n\tstr.WriteByte('[')\n\n\tfor i, item := range l.value {\n\t\tif i > 0 {\n\t\t\tstr.WriteString(\", \")\n\t\t}\n\n\t\tstr.WriteString(item.JSON())\n\t}\n\n\tstr.WriteByte(']')\n\n\treturn str.String()\n}" ]
[ "0.6209043", "0.59475523", "0.59300464", "0.591607", "0.5880529", "0.5879527", "0.58495015", "0.5842354", "0.5822543", "0.5814434", "0.5791733", "0.57773095", "0.571827", "0.57141197", "0.57105416", "0.5710541", "0.56884086", "0.56586236", "0.56442463", "0.56439734", "0.56439734", "0.5642004", "0.56402254", "0.5626206", "0.5621845", "0.5617176", "0.56139237", "0.56139237", "0.5612671", "0.5611271", "0.5611271", "0.5606854", "0.5597534", "0.55489534", "0.5544211", "0.554314", "0.55373657", "0.55313367", "0.5530935", "0.5523786", "0.55159664", "0.5515548", "0.551513", "0.55150014", "0.5509668", "0.55056316", "0.550186", "0.54955274", "0.5489721", "0.54849535", "0.54829204", "0.5479967", "0.5476265", "0.54689795", "0.54684895", "0.5457764", "0.5457764", "0.5457764", "0.5457764", "0.5457764", "0.5457764", "0.54567593", "0.5454003", "0.5450635", "0.5440223", "0.5439584", "0.54370207", "0.543208", "0.54320186", "0.5431802", "0.5426923", "0.54267913", "0.5425566", "0.5424322", "0.5423652", "0.54220533", "0.54193515", "0.5416152", "0.5415573", "0.5413231", "0.54106975", "0.54104465", "0.5408893", "0.5389677", "0.5383362", "0.5382554", "0.5380898", "0.5379124", "0.5373123", "0.5370703", "0.5364853", "0.5363465", "0.53621197", "0.5359706", "0.5351906", "0.5350705", "0.5348302", "0.53465366", "0.5337782", "0.53370386", "0.53368825" ]
0.0
-1
Run prints the result of String() to standard output for debugging or direct consumption by an Alfred script filter.
func Run() { Println(String()) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func Run() string {\n\tmain()\n\treturn \"\"\n}", "func Run(input string) (err error) {\n\tif q, err = parser.Run(input); err != nil {\n\t\treturn err\n\t}\n\tif err = q.Execute(output); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (s GetRunOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (o BuildSpecRuntimeOutput) Run() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v BuildSpecRuntime) []string { return v.Run }).(pulumi.StringArrayOutput)\n}", "func (f *FilterLog) Run(next HandlerFunc) HandlerFunc {\n\tif f.Logger == nil {\n\t\tf.Logger = log.New(os.Stderr, \"\", log.LstdFlags)\n\t}\n\tif f.PostLogFormat == \"\" {\n\t\tf.PostLogFormat = LogFormatRelax\n\t}\n\n\treturn func(ctx *Context) {\n\t\tif f.PreLogFormat != \"\" {\n\t\t\tf.Printf(f.PreLogFormat, ctx)\n\t\t}\n\n\t\tnext(ctx)\n\n\t\tf.Printf(f.PostLogFormat, ctx)\n\t}\n}", "func (r *OC) Run(arg ...string) error {\n\treturn r.run(os.Stdout, arg...)\n}", "func (l *Logger) Run(_ string) (*entities.CommandResult, derrors.Error) {\n\treturn entities.NewSuccessCommand([]byte(l.Msg)), nil\n}", "func (c *Tool) Run() ([]byte, error) {\n\tif IsDebug() == true {\n\t\tstart := time.Now()\n\t\tcommands := c.Commands()\n\t\tout, err := c.Command().CombinedOutput()\n\t\tfmt.Println(time.Since(start), commands)\n\t\treturn out, err\n\t}\n\treturn c.Command().CombinedOutput()\n}", "func Run(t *testing.T, file string) string {\n\tout, err := exec.Command(\"go\", \"run\", file).Output()\n\tif e, ok := err.(*exec.ExitError); ok {\n\t\tt.Fatalf(\"%s\", e.Stderr)\n\t} else if err != nil {\n\t\tt.Fatalf(\"%s\", err)\n\t}\n\treturn string(out)\n}", "func (result JenkinsRunResult) String() string {\n\treturn string(result)\n}", "func (elmScrpr *elementScraper) Run() string {\n\tdefer func() {\n\t\tif err := recover(); err != nil {\n\t\t\tfmt.Println(err)\n\t\t}\n\t}()\n\treturn elmScrpr.elementScraper(elmScrpr.input)\n}", "func main() {\n\tfmt.Println(str)\n}", "func (s GetRunInput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (r Runner) String() string {\n\treturn fmt.Sprintf(\"Runner{ application: %s, logger: %s, mvn: %s}\", r.application, r.logger, r.mvn)\n}", "func (s StartRunOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (fr *Runner) Run(args ...string) (stdout, stderr string, err error) {\n\targs = append(fr.ExecArgs, args...)\n\n\targsStr := strings.Join(args, \" \")\n\n\tif fr.Debug {\n\t\tlog.Printf(\"running '%s %v'\", fr.Exe, argsStr)\n\t}\n\n\tc := exec.Command(fr.Exe, args...)\n\n\terrOut := &bytes.Buffer{}\n\tc.Stderr = errOut\n\n\to, err := c.Output()\n\n\tif fr.Debug || err != nil {\n\t\tlog.Printf(\"finished '%s %v' with err=%v and output:\\n%v\\n%v\", fr.Exe, argsStr, err, string(o), errOut.String())\n\t}\n\n\treturn string(o), errOut.String(), err\n}", "func Run(input string) string {\n\tinput = strings.Trim(input, \" \\r\\n\\t\")\n\tif len(input) < 2 {\n\t\tlog.Fatal(\"Invalid input (too short)\")\n\t}\n\treturn fmt.Sprintf(\"Part 1: %v\\nPart 2: %v\\n\", part1(input), part2(input))\n}", "func (o BuildRunStatusBuildSpecRuntimeOutput) Run() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v BuildRunStatusBuildSpecRuntime) []string { return v.Run }).(pulumi.StringArrayOutput)\n}", "func (s AutomationExecutionFilter) String() string {\n\treturn awsutil.Prettify(s)\n}", "func RunF(format string, args ...interface{}) error {\n\treturn Run(fmt.Sprintf(format, args...))\n}", "func RunSprint(x interface{}) {\n\tvar msg string\n\n\ttype stringer interface {\n\t\tString() string\n\t}\n\n\tswitch x := x.(type) {\n\tcase stringer:\n\t\tmsg = x.String()\n\tcase string:\n\t\tmsg = x\n\tcase int:\n\t\tmsg = strconv.Itoa(x)\n\tcase bool:\n\t\tif x {\n\t\t\tmsg = \"true\"\n\t\t}\n\t\tmsg = \"false\"\n\tdefault:\n\t\tmsg = \"???\" // array, chan, func, map, pointer, slice, struct\n\t}\n\n\tfmt.Print(msg)\n}", "func (s LexTranscriptFilter) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (i ios) Run(ctx context.Context, command string) (string, error) {\n\toutput, err := i.RunUntil(ctx, command, i.basePrompt())\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\toutput = strings.ReplaceAll(output, \"\\r\\n\", \"\\n\")\n\tlines := strings.Split(output, \"\\n\")\n\tresult := \"\"\n\n\tfor i := 1; i < len(lines)-1; i++ {\n\t\tresult += lines[i] + \"\\n\"\n\t}\n\n\treturn result, nil\n}", "func (e *Echo) Runout(cmdStr string) {\n\tfmt.Print(e.Run(cmdStr))\n}", "func run(arg0 string, args ...string) error {\n\tcmd := exec.Command(arg0, args...)\n\tpipe, err := cmd.StdoutPipe()\n\tif err != nil {\n\t\treturn err\n\t}\n\tcmd.Stderr = cmd.Stdout\n\n\tfmt.Println(\"Running command:\", arg0, strings.Join(args, \" \"))\n\terr = cmd.Start()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Stream the output from r10k as it is generated\n\tscanner := bufio.NewScanner(pipe)\n\tscanner.Split(bufio.ScanLines)\n\tfor scanner.Scan() {\n\t\tm := scanner.Text()\n\t\tfmt.Println(m)\n\t}\n\n\terr = cmd.Wait()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func main() {\n s := \"hello string in golang\";\n Prints(s)\n}", "func Run() {\n\tx := &xCmd{Ctx: app.AppCtx()}\n\tx.Flags = opt.New(\"{file}\")\n\tx.NewFlag(\"D\", \"debug\", &x.Debug)\n\tx.NewFlag(\"F\", \"sep: blank character(s) (or string under -1)\", &x.seps)\n\tx.NewFlag(\"1\", \"words separated by 1 run of the blank string given to -F\", &x.one)\n\targs, err := x.Parse(x.Args)\n\tif err != nil {\n\t\tapp.Warn(\"%s\", err)\n\t\tx.Usage()\n\t\tapp.Exits(\"usage\")\n\t}\n\tif len(args) != 0 {\n\t\tin := app.Files(args...)\n\t\tapp.SetIO(in, 0)\n\t}\n\tin := app.Lines(app.In())\t// to make sure we don't break a word in recvs.\n\tx.words(in, app.Out())\n\tapp.Exits(cerror(in))\n}", "func (s *Service) Run(ctx context.Context) error {\n\tlog := s.log.With().Str(\"path\", s.Config.SourcePath).Logger()\n\n\t// Open source file\n\tf, err := os.Open(s.Config.SourcePath)\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"Failed to open file\")\n\t\treturn maskAny(err)\n\t}\n\tdefer f.Close()\n\n\t// Split into lines\n\tscanner := bufio.NewScanner(f)\n\tfor scanner.Scan() {\n\t\t// Get line\n\t\tline := scanner.Text()\n\n\t\t// Publish line\n\t\tdataURI := dataurl.New([]byte(line), \"text/plain\")\n\t\tif _, err := s.outputReady(ctx, dataURI.String(), s.Config.OutputName); err != nil {\n\t\t\treturn maskAny(err)\n\t\t}\n\t}\n\n\treturn nil\n}", "func (cmd *FigletCommand) Run(args ...string) {\n\tchannel, err := cmd.Channel(cmd.line)\n\tif err != nil {\n\t\tcmd.bot.LogError(\"FigletCommand.Run()\", err)\n\t\treturn\n\t}\n\n\tif len(args) <= 0 {\n\t\tcmd.bot.Log.WithField(\"args\", args).Debug(\"FigletCommand.Run(): No args\")\n\t\treturn\n\t}\n\n\tphrase := args[0]\n\tif phrase == \"\" {\n\t\tcmd.bot.Log.Debug(\"FigletCommand.Run(): No phrase\")\n\t\treturn\n\t}\n\n\tif output, err := exec.Command(figletPath, phrase).Output(); err != nil {\n\t\tcmd.bot.LogError(\"FigletCommand.Run()\", err)\n\t} else {\n\t\tfor _, line := range strings.Split(string(output), \"\\n\") {\n\t\t\tcmd.bot.Msg(cmd.conn, channel, line)\n\t\t}\n\t}\n}", "func Run(root string) error {\n\tv1, err := readConfig()\n\tmust(err)\n\n\tvar context = runconf{\n\t\tFilterOut: v1.GetStringSlice(\"filterOut\"),\n\t\tLookFor: v1.GetStringSlice(\"lookFor\"),\n\t\trootPath: root,\n\t}\n\n\titerate(context)\n\treturn nil\n}", "func (b EchoBot) Run(c *Command) string {\n\treturn strings.Join(c.Args, \" \")\n}", "func (c *showCommand) Run(ctx context.Context, _ *commoncli.Env, serverClient util.ServerClient) error {\n\tif err := c.validate(); err != nil {\n\t\treturn err\n\t}\n\n\tresp, err := c.fetchEntries(ctx, serverClient.NewEntryClient())\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcommonutil.SortTypesEntries(resp.Entries)\n\treturn c.printer.PrintProto(resp)\n}", "func run() {\n\n\tvar amdata amData\n\tget(&amdata)\n\tmergeData(amdata)\n\tsortAlert()\n\tfilter()\n\n\tif *jsonOutput {\n\t\tif name != \"\" {\n\t\t\tjsonPrintDetails()\n\t\t} else {\n\t\t\tjsonPrint()\n\t\t}\n\t} else {\n\t\tif name != \"\" {\n\t\t\tdetailPrint()\n\t\t} else {\n\t\t\ttabulate()\n\t\t}\n\t}\n}", "func (e *Echo) Run(cmdStr string) string {\n\treturn exec.Run(e.Eval(cmdStr))\n}", "func (task SchTask) Run(taskName string, own bool) string {\n\n\tif Debug {\n\t\treturn dbgMessage\n\t}\n\n\tif own {\n\t\ttaskName = task.prefix + taskName\n\t}\n\tcmd := exec.Command(task.bin, _Run.Command, _Run.taskname, taskName, _Run.immediate)\n\n\toutput, err := cmd.CombinedOutput()\n\tcatch(output, err)\n\n\treturn string(output)\n}", "func run(input string) (interface{}, interface{}) {\n\n\t// fmt.Println(\"PASS\")\n\treturn parse(input)\n}", "func (s *Stream) Run(cmd string) error {\n\t// First parse the entire command string\n\tcm, er := parser.ParseString(cmd)\n\tif er != nil {\n\t\treturn er\n\t}\n\t//spew.Dump(cm)\n\t// So now we run these commands on the file\n\tfi, er := interpreter.New(s.file)\n\tif er != nil {\n\t\treturn er\n\t}\n\treturn fi.Run(cm)\n}", "func Run() {\n\t// initialize the shell\n\tinitialize()\n\n\t// interpret each input indefinetly\n\tfor {\n\t\terr := interpret()\n\t\tif err == nil {\n\t\t\tcontinue\n\t\t}\n\t\tif err == io.EOF {\n\t\t\tfmt.Fprintln(os.Stderr, err)\n\t\t\tbreak\n\t\t}\n\t\tfmt.Println(err)\n\t}\n\n}", "func (t *Trigger) runScript(input string, matches [][]int) (string, error) {\n\tlog.Tracef(\"running script\")\n\t// We could JSON-encode this, oooor...\n\tmatchesStr := strings.Replace(fmt.Sprintf(\"%v\", matches), \" \", \",\", -1)\n\tmatchesStr = matchesStr\n\treturn input, fmt.Errorf(\"not implemented\")\n}", "func (s StepExecutionFilter) String() string {\n\treturn awsutil.Prettify(s)\n}", "func run(command string) string {\r\n\tcmd := exec.Command(command)\r\n\tout, err := cmd.CombinedOutput()\r\n\tif err != nil {\r\n\t\treturn \"error\"\r\n\t}\r\n\treturn string(out)\r\n}", "func (s *StreamBuffer) WriteStringRun(str string) (n int, err error) {\n\treturn s.WriteRuneRun([]rune(str))\n}", "func Run(searchTerm string) {\n\t//feeds,err := RetrieveFeeds()\n\t//if err!=nil {\n\t//\tlog.Fatal(err)\n\t}", "func run(input string) (interface{}, interface{}) {\n\treturn strconv.Itoa(intcode.New(input, 0, 1).Run()), strconv.Itoa(intcode.New(input, 0, 2).Run())\n}", "func (ls *LightString) Render() {\n\tlog.Debug(\"Rendering string\")\n}", "func (p *Program) String() string {\n\tvar buf bytes.Buffer\n\n\tbuf.WriteString(fmt.Sprintf(`//\n//\tPackage - transpiled by c4go\n//\n//\tIf you have found any issues, please raise an issue at:\n//\thttps://github.com/Konstantin8105/c4go/\n//\n\n`))\n\n\t// Simplification from :\n\t//\tvar cc int32 = int32(uint8((func() []byte {\n\t//\t\tdefer func() {\n\t//\t\t\tfunc() []byte {\n\t//\t\t\t\ttempVarUnary := ss\n\t//\t\t\t\tdefer func() {\n\t//\t\t\t\t\tss = ss[0+1:]\n\t//\t\t\t\t}()\n\t//\t\t\t\treturn tempVarUnary\n\t//\t\t\t}()\n\t//\t\t}()\n\t//\t\treturn ss\n\t//\t}())[0]))\n\t//\n\t// to:\n\t//\tvar cc int32 = int32(uint8((func() []byte {\n\t//\t\tdefer func() {\n\t//\t\t\tss = ss[0+1:]\n\t//\t\t}()\n\t//\t\treturn ss\n\t//\t}())[0]))\n\tgoast.Walk(new(simpleDefer), p.File)\n\n\t// Only for debugging\n\t// goast.Walk(new(nilWalker), p.File)\n\n\t// First write all the messages. The double newline afterwards is important\n\t// so that the package statement has a newline above it so that the warnings\n\t// are not part of the documentation for the package.\n\tbuf.WriteString(strings.Join(p.messages, \"\\n\") + \"\\n\\n\")\n\n\tif err := format.Node(&buf, p.FileSet, p.File); err != nil {\n\t\t// Printing the entire AST will generate a lot of output. However, it is\n\t\t// the only way to debug this type of error. Hopefully the error\n\t\t// (printed immediately afterwards) will give a clue.\n\t\t//\n\t\t// You may see an error like:\n\t\t//\n\t\t// panic: format.Node internal error (692:23: expected selector or\n\t\t// type assertion, found '[')\n\t\t//\n\t\t// This means that when Go was trying to convert the Go AST to source\n\t\t// code it has come across a value or attribute that is illegal.\n\t\t//\n\t\t// The line number it is referring to (in this case, 692) is not helpful\n\t\t// as it references the internal line number of the Go code which you\n\t\t// will never see.\n\t\t//\n\t\t// The \"[\" means that there is a bracket in the wrong place. Almost\n\t\t// certainly in an identifer, like:\n\t\t//\n\t\t// noarch.IntTo[]byte(\"foo\")\n\t\t//\n\t\t// The \"[]\" which is obviously not supposed to be in the function name\n\t\t// is causing the syntax error. However, finding the original code that\n\t\t// produced this can be tricky.\n\t\t//\n\t\t// The first step is to filter down the AST output to probably lines.\n\t\t// In the error message it said that there was a misplaced \"[\" so that's\n\t\t// what we will search for. Using the original command (that generated\n\t\t// thousands of lines) we will add two grep filters:\n\t\t//\n\t\t// go test ... | grep \"\\[\" | grep -v '{$'\n\t\t// # | |\n\t\t// # | ^ This excludes lines that end with \"{\"\n\t\t// # | which almost certainly won't be what\n\t\t// # | we are looking for.\n\t\t// # |\n\t\t// # ^ This is the character we are looking for.\n\t\t//\n\t\t// Hopefully in the output you should see some lines, like (some lines\n\t\t// removed for brevity):\n\t\t//\n\t\t// 9083 . . . . . . . . . . Name: \"noarch.[]byteTo[]int\"\n\t\t// 9190 . . . . . . . . . Name: \"noarch.[]intTo[]byte\"\n\t\t//\n\t\t// These two lines are clearly the error because a name should not look\n\t\t// like this.\n\t\t//\n\t\t// Looking at the full output of the AST (thousands of lines) and\n\t\t// looking at those line numbers should give you a good idea where the\n\t\t// error is coming from; by looking at the parents of the bad lines.\n\t\t_ = goast.Print(p.FileSet, p.File)\n\n\t\tpanic(err)\n\t}\n\n\t// Add comments at the end C file\n\tfor file, beginLine := range p.commentLine {\n\t\tfor i := range p.PreprocessorFile.GetComments() {\n\t\t\tif p.PreprocessorFile.GetComments()[i].File == file {\n\t\t\t\tif beginLine.line < p.PreprocessorFile.GetComments()[i].Line {\n\t\t\t\t\tbuf.WriteString(\n\t\t\t\t\t\tfmt.Sprintln(\n\t\t\t\t\t\t\tp.PreprocessorFile.GetComments()[i].Comment))\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t// simplify Go code. Example :\n\t// Before:\n\t// func compare(a interface {\n\t// }, b interface {\n\t// }) (c4goDefaultReturn int) {\n\t// After :\n\t// func compare(a interface {}, b interface {}) (c4goDefaultReturn int) {\n\treg := util.GetRegex(\"interface( )?{(\\r*)\\n(\\t*)}\")\n\ts := string(reg.ReplaceAll(buf.Bytes(), []byte(\"interface {}\")))\n\n\tsp := strings.Split(s, \"\\n\")\n\tfor i := range sp {\n\t\tif strings.HasSuffix(sp[i], \"-= 1\") {\n\t\t\tsp[i] = strings.TrimSuffix(sp[i], \"-= 1\") + \"--\"\n\t\t}\n\t\tif strings.HasSuffix(sp[i], \"+= 1\") {\n\t\t\tsp[i] = strings.TrimSuffix(sp[i], \"+= 1\") + \"++\"\n\t\t}\n\t}\n\n\treturn strings.Join(sp, \"\\n\")\n}", "func (r *Runner) Run(input string) *Result {\n\tcmd := exec.Command(\"go\", \"run\", \".\")\n\tf, err := os.Open(input)\n\tif err != nil {\n\t\treturn &Result{r.t, input, \"\", err, \"\"}\n\t}\n\tdefer func() { _ = f.Close() }()\n\tcmd.Stdin = f\n\n\tvar stdout, stderr bytes.Buffer\n\tcmd.Stdout = &stdout\n\tcmd.Stderr = &stderr\n\n\terr = cmd.Run()\n\terrmsg := stderr.String()\n\tif err != nil {\n\t\treturn &Result{r.t, input, \"\", err, errmsg}\n\t}\n\n\toutput := string(normalize(stdout.Bytes()))\n\tgot := strings.TrimSpace(output)\n\treturn &Result{r.t, input, got, err, errmsg}\n}", "func runTest(input string) (string, error) {\n\tvar buf bytes.Buffer\n\tm := NewMachine(&buf)\n\n\terr := m.Eval(strings.NewReader(input))\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn buf.String(), nil\n}", "func TestRun2(t *testing.T) {\n\n\tbody := ioutil.NopCloser(strings.NewReader(\n\t\t`{\n\t\t\t\t\"language\": \"cpp\",\n\t\t\t\t\"code\": \"#include <iostream>\\nint main() {std::cout << \\\"Hello\\\" << std::endl;return 0;}\",\n\t\t\t\t\"stdIn\": \"\"\n\t\t\t}`))\n\n\tstdout, stderr, err := Run(body)\n\twant_stdout := []byte(\"Hello\\n\")\n\twant_stderr := []byte{}\n\n\tif err != nil {\n\t\tt.Errorf(\"An unexpected error was raised:\\n %v\\n %T\", err, err)\n\t} else {\n\t\tif diff := cmp.Diff(want_stdout, stdout); diff != \"\" {\n\t\t\tt.Errorf(\"Stdout mismatch (-want +got):\\n%s\", diff)\n\t\t}\n\t\tif diff := cmp.Diff(want_stderr, stderr); diff != \"\" {\n\t\t\tt.Errorf(\"Stderr mismatch (-want +got):\\n%s\", diff)\n\t\t}\n\t}\n\n}", "func Run(name string, arg ...string) chan string {\n\tcmd := exec.Command(name, arg...)\n\n\tpr, pw := io.Pipe()\n\tcmd.Stdout = pw\n\n\tout := make(chan string)\n\n\tgo func() {\n\t\ts := bufio.NewScanner(pr)\n\t\tfor s.Scan() {\n\t\t\tout <- s.Text()\n\t\t}\n\t\tclose(out) // stops reader of out.\n\t}()\n\n\tgo func() {\n\t\tcmd.Run()\n\t\tpr.Close() // stops s.Scan().\n\t\tpw.Close()\n\t}()\n\n\treturn out\n}", "func (l *StringLexer) AcceptRun(valid string) bool {\n\treturn AcceptRun(l, valid)\n}", "func run(name string, arg ...string) (string, error) {\n\tstdout, stderr, err := exe(name, arg...)\n\n\tif err != nil && stderr != \"\" {\n\t\treturn stdout, errors.New(stderr)\n\t}\n\treturn stdout, err\n}", "func (inter *Interpreter) Run() (string, error) {\n\tlist := []byte{'+', '-', '<', '>', '.', ',', '[', ']'}\n\tfor {\n\t\tc := inter.code[inter.codePointer]\n\t\tif bytes.Contains(list, []byte{c}) {\n\t\t\tinter.operate(c)\n\t\t}\n\t\tinter.codePointer++\n\t\tif inter.codePointer >= int64(len(inter.code)) {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn string(inter.output), nil\n}", "func String() string {\n\toutput := output{\n\t\tRerun: Rerun,\n\t\tVariables: Variables,\n\t\tItems: Items,\n\t}\n\tvar err error\n\tvar b []byte\n\tif Indent == \"\" {\n\t\tb, err = json.Marshal(output)\n\t} else {\n\t\tb, err = json.MarshalIndent(output, \"\", Indent)\n\t}\n\tif err != nil {\n\t\tmessageErr := Errorf(\"Error in parser. Please report this output to https://github.com/drgrib/alfred/issues: %v\", err)\n\t\tpanic(messageErr)\n\t}\n\ts := string(b)\n\treturn s\n}", "func F(f string, v ...interface{}) {\n\t// log.Printf(f, v...)\n\tspewInstance.Printf(f+\"\\n\", v...)\n}", "func (r *RemoteExecutor) Run(name string, args ...string) error {\n\t_, err := r.RunWithStdout(name, args...)\n\treturn err\n}", "func (s TranscriptFilter) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s TranscriptFilter) String() string {\n\treturn awsutil.Prettify(s)\n}", "func Run(cmd *cobra.Command) (string, error) {\n\tctx := context.Background()\n\tdataIn, err := input(ctx)\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"failed to obtain input\")\n\t}\n\n\t// Further errors do not need a usage report.\n\tcmd.SilenceUsage = true\n\n\tdataOut, err := process(ctx, dataIn)\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"failed to process\")\n\t}\n\n\tif viper.GetBool(\"quiet\") {\n\t\treturn \"\", nil\n\t}\n\n\tresults, err := output(ctx, dataOut)\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"failed to obtain output\")\n\t}\n\n\treturn results, nil\n}", "func Run(arg0 string, args ...string) error {\n\treturn RunWithIO(os.Stdin, os.Stdout, os.Stderr, arg0, args...)\n}", "func TestPrint(t *testing.T) {\n\tconst src = `\nprint(\"hello\")\ndef f(): print(\"hello\", \"world\", sep=\", \")\nf()\n`\n\tbuf := new(bytes.Buffer)\n\tprint := func(thread *starlark.Thread, msg string) {\n\t\tcaller := thread.CallFrame(1)\n\t\tfmt.Fprintf(buf, \"%s: %s: %s\\n\", caller.Pos, caller.Name, msg)\n\t}\n\tthread := &starlark.Thread{Print: print}\n\tif _, err := starlark.ExecFile(thread, \"foo.star\", src, nil); err != nil {\n\t\tt.Fatal(err)\n\t}\n\twant := \"foo.star:2:6: <toplevel>: hello\\n\" +\n\t\t\"foo.star:3:15: f: hello, world\\n\"\n\tif got := buf.String(); got != want {\n\t\tt.Errorf(\"output was %s, want %s\", got, want)\n\t}\n}", "func (o ObfuscationRuleOutput) Filter() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ObfuscationRule) pulumi.StringOutput { return v.Filter }).(pulumi.StringOutput)\n}", "func run(command string, args ...string) []byte {\n\toutput, err := exec.Command(command, args...).Output()\n\tcheck(err)\n\treturn output\n}", "func Run(args []string, stdin io.Reader, stdout io.Writer, stderr io.Writer) int {\n\tif err := run(args, stdin, stdout, stderr); err != nil {\n\t\tmessage := err.Error()\n\t\tif message == \"\" {\n\t\t\tmessage = \"unexpected error\"\n\t\t}\n\t\t_, _ = fmt.Fprintln(stderr, message)\n\t\treturn 1\n\t}\n\treturn 0\n}", "func (s GetRunTaskOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (t *ManagePatient) Run(stub shim.ChaincodeStubInterface, function string, args []string) ([]byte, error) {\n fmt.Println(\"run is running \" + function)\n return t.Invoke(stub, function, args)\n }", "func Run() {\n\trun()\n}", "func (s RunTaskOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func TestRun1(t *testing.T) {\n\n\tbody := ioutil.NopCloser(strings.NewReader(\n\t\t`{\n\t\t\t\t\"language\": \"javascript\",\n\t\t\t\t\"code\": \"\",\n\t\t\t\t\"stdIn\": \"\"\n\t\t\t}`))\n\n\tstdout, stderr, err := Run(body)\n\twant_stdout := []byte{}\n\twant_stderr := []byte{}\n\n\tif diff := cmp.Diff(stdout, want_stdout); diff != \"\" {\n\t\tt.Errorf(\"Stdout mismatch (-want +got):\\n%s\", diff)\n\t}\n\tif diff := cmp.Diff(stderr, want_stderr); diff != \"\" {\n\t\tt.Errorf(\"Stderr mismatch (-want +got):\\n%s\", diff)\n\t}\n\n\tif err != nil {\n\t\tt.Errorf(\"An unexpected error was raised:\\n %v\\n %T\", err, err)\n\t} else {\n\t\tif diff := cmp.Diff(stdout, want_stdout); diff != \"\" {\n\t\t\tt.Errorf(\"Stdout mismatch (-want +got):\\n%s\", diff)\n\t\t}\n\t\tif diff := cmp.Diff(stderr, want_stderr); diff != \"\" {\n\t\t\tt.Errorf(\"Stderr mismatch (-want +got):\\n%s\", diff)\n\t\t}\n\t}\n}", "func Run(params Params) error {\n\tif params.ShowFullName {\n\t\tfmt.Printf(\"full main: %[1]T: %+#[1]v\\n\", params)\n\t} else {\n\t\tfmt.Printf(\"main: %[1]T: %+#[1]v\\n\", params)\n\t}\n\treturn nil\n}", "func (d *Day1) Run() string {\n\treturn strconv.Itoa(d.Captcha())\n}", "func (sfr *stateFilterRunner) RunFilter(channel chan *FilterResponse) {\n\tsnapshotInfo := sfr.info.(*infos.SnapshotInfo)\n\n\tpassed := sfr.criteria.State == snapshotInfo.State\n\n\tif passed {\n\t\tsfr.report.AddReason(\n\t\t\t\"Snapshot '%v' state '%v' matches '%v'\",\n\t\t\tsfr.info.Name(),\n\t\t\tsfr.criteria.State,\n\t\t\tsnapshotInfo.State,\n\t\t)\n\t} else {\n\t\tsfr.report.AddReason(\n\t\t\t\"Snapshot '%v' state '%v' does not match '%v'\",\n\t\t\tsfr.info.Name(),\n\t\t\tsfr.criteria.State,\n\t\t\tsnapshotInfo.State,\n\t\t)\n\t}\n\n\tchannel <- &FilterResponse{\n\t\tPassed: passed && sfr.criteria.Include(),\n\t\tReport: sfr.report,\n\t}\n}", "func (i *interviewer) Run(tty *os.File) {\n\tgo func() {\n\t\tbuf := make([]byte, 32*1024)\n\t\tfor {\n\t\t\tnr, er := tty.Read(buf)\n\t\t\tif nr > 0 {\n\t\t\t\t//\t\t\t\tfmt.Println(\" <\" + string(buf[0:nr]) + \"> \")\n\t\t\t\tif q := i.getQ(buf[0:nr]); q != nil {\n\t\t\t\t\ttty.Write([]byte(i.fn(q.value, q.sensitive) + \"\\n\"))\n\t\t\t\t}\n\t\t\t}\n\t\t\tif er == io.EOF {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tif er != nil {\n\t\t\t\tfmt.Println(er)\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}()\n}", "func (t *Subrogationcode) Run(stub shim.ChaincodeStubInterface, function string, args []string) ([]byte, error) {\n\treturn t.Invoke(stub, function, args)\n}", "func run() error {\n\tif err := ShowInfo(Hello); err != nil {\n\t\treturn err\n\t}\n\n\tif err := ShowInfo(func(\n\t\tw io.Writer,\n\t\tname string,\n\t) error {\n\t\treturn nil\n\t}); err != nil {\n\t\treturn err\n\t}\n\n\tif err := ShowInfo(new(P).Hello); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (execution *Execution) String() string {\n\treturn fmt.Sprintf(`%q`, execution.command.GetArgs())\n}", "func (t *SimpleChaincode) Run(stub shim.ChaincodeStubInterface, function string, args []string) ([]byte, error) {\n\tfmt.Println(\"run is running \" + function)\n\treturn t.Invoke(stub, function, args)\n}", "func (c *HelloCommand) Run(args []string) int {\n\tif len(args) == 0 {\n\t\tfmt.Fprintln(c.ErrStream, \"Please specify name\")\n\t\treturn 1\n\t}\n\n\tfmt.Fprintf(c.OutStream, \"Hello %s\\n\", args[0])\n\treturn 0\n}", "func Run(t testing.TestingT, image string, options *RunOptions) string {\n\tout, err := RunE(t, image, options)\n\trequire.NoError(t, err)\n\treturn out\n}", "func main() {\n\t// Print in console \"Hello world\"\n\tfmt.Println(\"Hello, World!\")\n\n\t// Print in console the function called of rsc.io/quote\n\tfmt.Println(quote.Go())\n\tfmt.Println(quote.Glass())\n\tfmt.Println(quote.Hello())\n}", "func (s ListRunsOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s ListRunsOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (cmd *FilteredRecordsCommand) Run(c *client.Client, args []string) error {\n\tvar path string\n\tif len(args) > 0 {\n\t\tpath = args[0]\n\t} else {\n\t\tpath = fmt.Sprintf(\"/records/data/%v/filtered\", cmd.RecordID)\n\t}\n\tlogger := goa.NewLogger(log.New(os.Stderr, \"\", log.LstdFlags))\n\tctx := goa.WithLogger(context.Background(), logger)\n\tresp, err := c.FilteredRecords(ctx, path)\n\tif err != nil {\n\t\tgoa.LogError(ctx, \"failed\", \"err\", err)\n\t\treturn err\n\t}\n\n\tgoaclient.HandleResponse(c.Client, resp, cmd.PrettyPrint)\n\treturn nil\n}", "func run(command string, args ...string) []byte {\n\n\toutput, _ := exec.Command(command, args...).CombinedOutput()\n\treturn output\n}", "func Run(cli string, args ...string) error {\n\tre := regexp.MustCompile(`[\\r\\t\\n\\f ]+`)\n\ta := strings.Split(re.ReplaceAllString(cli, \" \"), \" \")\n\tparams := args\n\tif len(a) > 1 {\n\t\tparams = append(a[1:], args...)\n\t}\n\texe := strings.TrimPrefix(a[0], \"@\")\n\tsilent := strings.HasPrefix(a[0], \"@\")\n\n\tif !silent {\n\t\tif len(params) > 0 {\n\t\t\tfmt.Printf(\"%s %s\\n\", exe, strings.Join(params, \" \"))\n\t\t} else {\n\t\t\tfmt.Println(exe)\n\t\t}\n\t}\n\n\tif *DryRunFlag {\n\t\terrs := DryRunPop()\n\t\tif errs == \"\" {\n\t\t\treturn nil\n\t\t}\n\t\treturn errors.New(errs)\n\t}\n\n\tlog.Tracef(\"< %s %v\\n\", exe, params)\n\tcmd := exec.Command(exe, params...)\n\tcmd.Stdout = os.Stdout\n\tcmd.Stderr = os.Stderr\n\treturn cmd.Run()\n}", "func LogRun(cmd string, args ...string) {\n\tif debug {\n\t\tcount++\n\t\t_, err := color.New(color.FgBlue).Printf(\"DEBUG (%d): %s %s\\n\", count, cmd, strings.Join(args, \" \"))\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"DEBUG (%d): %s %s\\n\", count, cmd, strings.Join(args, \" \"))\n\t\t}\n\t}\n}", "func Run(name string, args ...string) error {\n\tlog.Infof(\"Run: %s %s\", name, strings.Join(args, \" \"))\n\tcmd := exec.Command(name, args...)\n\tcmd.Stdout = os.Stdout\n\tcmd.Stderr = os.Stdout\n\n\treturn cmd.Run()\n}", "func (t *SimpleChaincode) Run(stub *shim.ChaincodeStub, function string, args []string) ([]byte, error) {\n\tfmt.Println(\"run is running \" + function)\n\treturn t.Invoke(stub, function, args)\n}", "func (s DeleteRunOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func Run(args ...string) ([]byte, error) {\n\treturn RunInPath(\"\", args...)\n}", "func (s StartRunInput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (p *parametizer) exec() string {\n\tfor state := p.scanTextFn; state != nil; {\n\t\tstate = state()\n\t}\n\treturn p.buf.String()\n}", "func (f *Filter) String() string {\n\treturn (string)(*f)\n}", "func Run() error {\n\t/*\n\t\tlogs.InitLogs()\n\t\tdefer logs.FlushLogs()\n\t*/\n\n\tcmd := cmd.NewJXCommand(cmdutil.NewFactory(), os.Stdin, os.Stdout, os.Stderr)\n\treturn cmd.Execute()\n}", "func (info *Info) Run(c Cursor) {\n\tp := c.P()\n\tif !info.HeadLess {\n\t\tp.Printf(\"info %v {\", info.Domain)\n\t\tp.ShiftIn()\n\t\tdefer p.ShiftOut(\"}\")\n\t}\n\n\tips := info.run(c)\n\tif c.E() != nil {\n\t\treturn\n\t}\n\n\tif !info.HideResult {\n\t\tips.PrintResult(c)\n\n\t\tif len(info.NameServers) > 0 {\n\t\t\tp.Print()\n\t\t\tfor _, ns := range info.NameServers {\n\t\t\t\tp.Printf(\"// %v\", ns)\n\t\t\t}\n\t\t}\n\n\t\tif len(info.Records) > 0 {\n\t\t\tp.Print()\n\t\t\tfor _, rr := range info.Records {\n\t\t\t\tp.Printf(\"// %s\", rr.Digest())\n\t\t\t}\n\t\t}\n\t}\n}", "func Run(cmd *exec.Cmd) (string, error) {\n\tklog.V(4).Infof(\"Executing: %s\", cmd)\n\n\tr, w := io.Pipe()\n\tcmd.Stdout = w\n\tcmd.Stderr = w\n\tbuffer := new(bytes.Buffer)\n\tr2 := io.TeeReader(r, buffer)\n\tvar wg sync.WaitGroup\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\tscanner := bufio.NewScanner(r2)\n\t\tfor scanner.Scan() {\n\t\t\tklog.V(5).Infof(\"%s: %s\", cmd.Path, scanner.Text())\n\t\t}\n\t}()\n\terr := cmd.Run()\n\tw.Close()\n\twg.Wait()\n\tklog.V(4).Infof(\"%s terminated, with %d bytes of output and error %v\", cmd.Path, buffer.Len(), err)\n\n\toutput := string(buffer.Bytes())\n\tif err != nil {\n\t\terr = fmt.Errorf(\"command %q failed: %v\\nOutput: %s\", cmd, err, output)\n\t}\n\treturn output, err\n}", "func (s ExecuteScriptOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (i *Interpreter) run(w *eval.World, path_orEmpty string, sourceCode string) error {\n\tvar code eval.Code\n\tvar vars []string\n\tvar err error\n\n\tfileSet := token.NewFileSet()\n\tif len(path_orEmpty) > 0 {\n\t\tfileSet.AddFile(path_orEmpty, fileSet.Base(), len(sourceCode))\n\t}\n\n\tcode, vars, err = i.compile(w, fileSet, sourceCode)\n\ti.tryToAddVars(w, fileSet, vars)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tresult, err := code.Run()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif result != nil {\n\t\tfmt.Fprintf(stdout, \"%s\\n\", result)\n\t}\n\n\treturn nil\n}", "func (l levelHook) Run(e *zerolog.Event, level zerolog.Level, _ string) {\n\tvar levelName string\n\n\tswitch level {\n\tcase zerolog.DebugLevel:\n\t\tlevelName = \"Debug\"\n\tcase zerolog.WarnLevel:\n\t\tlevelName = \"Warning\"\n\tcase zerolog.ErrorLevel:\n\t\tlevelName = \"Error\"\n\tdefault:\n\t\tlevelName = \"Info\"\n\t}\n\te.Str(\"severity\", levelName)\n}", "func (r Registry) Run(rep Reporter) {\n\tr.RunWithContext(rep, NewContext())\n}" ]
[ "0.6461878", "0.58399224", "0.5781803", "0.5753282", "0.56263125", "0.56190044", "0.5513375", "0.5513311", "0.54915744", "0.5478106", "0.5474172", "0.54433393", "0.54167986", "0.54147494", "0.53792274", "0.5364793", "0.5364661", "0.53575325", "0.53553385", "0.5344495", "0.53315854", "0.53182113", "0.5310365", "0.5308757", "0.5300901", "0.5294259", "0.52862877", "0.52557606", "0.5255078", "0.5245673", "0.52361304", "0.5224596", "0.5224503", "0.52224886", "0.519758", "0.5181543", "0.5166425", "0.51616627", "0.51529825", "0.5148982", "0.51403666", "0.5124682", "0.51100296", "0.5107208", "0.5103564", "0.5095645", "0.50810015", "0.5079946", "0.50733286", "0.5067172", "0.5066851", "0.5061532", "0.5060693", "0.50460035", "0.5045731", "0.50424117", "0.50385505", "0.503779", "0.50358224", "0.50304496", "0.5028174", "0.50278884", "0.50221086", "0.50116336", "0.50029194", "0.49997857", "0.49960437", "0.4994661", "0.49946055", "0.4994026", "0.49918434", "0.49903595", "0.4988862", "0.49862716", "0.4983925", "0.49834242", "0.49810794", "0.49768957", "0.49720752", "0.497109", "0.49607915", "0.49606243", "0.49549294", "0.4948668", "0.4946736", "0.4942348", "0.49384886", "0.49371088", "0.49361947", "0.49352127", "0.4934604", "0.49311218", "0.49220693", "0.49192882", "0.49179792", "0.4916783", "0.49111542", "0.49109566", "0.49094057", "0.49003282" ]
0.68293995
0
Warn formats and logs a warning message.
func (CryptoMachineLogger) Warn(message string, args ...interface{}) { log.Warnf(message, args...) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func Warn(format string, args ...interface{}) {\n\treport(color.YellowString, \"WARN\", format, args...)\n}", "func (l typeLogger) Warn(format string, v ...interface{}) {\n\tif l.level <= logWarning {\n\t\tmessage := fmt.Sprintf(format, v...)\n\t\tl.logger.Printf(\"%s%s%s: %s (%s)\", colorWarning, tagWarning, colorClear, message, getCallerPosition())\n\t}\n}", "func Warn(format string, v ...interface{}) {\n\tif LogLevel() <= 2 {\n\t\tlog.Printf(\"WARN: \"+format, v...)\n\t}\n}", "func Warn(format string, v ...interface{}) {\n\tl.output(LWarn, format, v...)\n}", "func Warning(w io.Writer, format string, args ...any) {\n\tformat = strings.TrimRight(format, \"\\r\\n\") + \"\\n\"\n\tfmt.Fprintf(w, \"\\n\"+Wrap(BoldYellow(\"WARNING: \")+format, DefaultTextWidth)+\"\\n\", args...)\n}", "func Warning(format string, a ...interface{}) {\n\tif Level >= 2 {\n\t\ta, w := extractLoggerArgs(format, a...)\n\t\ts := fmt.Sprintf(label(format, WarningLabel), a...)\n\n\t\tif Color {\n\t\t\tw = color.Output\n\t\t\ts = color.YellowString(s)\n\t\t}\n\n\t\tfmt.Fprintf(w, s)\n\t}\n}", "func Warn(format string, v ...interface{}) {\n\tLog(1, WARN, format, v...)\n}", "func (l *Logger) Warnf(format string, v ...interface{}) { l.lprintf(WARN, format, v...) }", "func ExampleWarn() {\n\tsetup()\n\tlog.Warn().Msg(\"hello world\")\n\n\t// Output: {\"level\":\"warn\",\"time\":1199811905,\"message\":\"hello world\"}\n}", "func Warning(format string, a ...interface{}) {\n\tprefix := magenta(warn)\n\tlog.Println(prefix, fmt.Sprintf(format, a...))\n}", "func (l Logger) Warn(msg ...interface{}) {\n\tif l.Level <= log.WarnLevel {\n\t\tout := l.WarnColor.Sprint(append([]interface{}{\"WARNING: \"}, msg...)...)\n\t\tout = checkEnding(out)\n\t\tfmt.Fprint(l.WarnOut, out)\n\t}\n}", "func (l *Logger) Warn(v ...interface{}) { l.lprint(WARN, v...) }", "func Warning(format string, v ...interface{}) {\n\tdoLog(\"WARNING\", format, v...)\n}", "func (l *Logger) Warn(v ...interface{}) {\n\tif l.loglevel <= sWarning {\n\t\tl.output(sWarning, 0, fmt.Sprint(v...))\n\t} else {\n\t\treturn\n\t}\n}", "func (log *TcLog) Warn(format string, v ...interface{}) {\n\tif LevelWarn < log.level {\n\t\treturn\n\t}\n\tmsg := fmt.Sprintf(format, v...)\n\tlog.writeMsg(LevelWarn, msg)\n}", "func Warn(format string, v ...interface{}) {\n\tLeveledLogger(level.Warn, format, v...)\n}", "func (d *DummyLogger) Warning(format string) {}", "func Warn(msg string) {\n\tif lvl <= war {\n\t\tl.Print(\"[WARN ]: \" + msg)\n\t}\n}", "func (l *Logger) Warn(format string, v ...interface{}) {\n\tfmt.Fprint(l.stderr, addColor(WarnPrefix+\" \", Yellow))\n\tl.Msg(format, v...)\n}", "func Warnf(format string, v ...interface{}) { std.lprintf(WARN, format, v...) }", "func (l *Logger) Warn(v ...interface{}) {\n\tl.Log(fmt.Sprintln(v...), Lwarn, 0)\n}", "func (l *Logger) Warn(v ...interface{}) {\n\tl.NewEntry().Print(WARN, v...)\n}", "func (l *MessageLogger) Warn(msg string) { l.logger.Warn(msg) }", "func (l *Logger) Warn(err errors.Error) {\n\tl.logWarn.Printf(string(err.JSON()))\n}", "func Warn(msg ...interface{}) {\n\tCurrent.Warn(msg...)\n}", "func Warn(v ...interface{}) error {\n\treturn output(os.Stdout, LevelWarn, v...)\n}", "func Warning(format string, args ...interface{}) {\n\tdo(WARNING, format, args...)\n}", "func (glogger *GLogger) Warn(format string, a ...interface{}) {\n\tglogger.internalLog(LWarn, fmt.Sprintf(format, a...))\n}", "func Warn(format string, v ...interface{}) {\n\tDefaultLogger.Warn(format, v...)\n}", "func Warn(format string, args ...interface{}) {\n\tlogLock.RLock()\n\tok := logLevel <= 2\n\tlogLock.RUnlock()\n\n\tif ok {\n\t\tlogWithCaller(fgRed, \"WARNING\", format, args...)\n\t}\n}", "func (o Object) Warn(f string, a ...interface{}) {\n\tif o.WarningEnabled {\n\t\to.PrintMsg(\"WARNING\", 2, f, a...)\n\t}\n}", "func (l *Logger) Warn(v ...interface{}) {\n\tl.Log(WarnLevel, fmt.Sprint(v...))\n}", "func (logger *ColorLogger) Warn(format string, args ...interface{}) {\n\tlogger.log(LOG_LEVEL_WARN, \"yellow\", format, args...)\n}", "func Warning(format string, args ...interface{}) {\n\tlog.Warningf(format, args...)\n}", "func (logger *Logger) Warn(args ...interface{}) {\n\tlogger.std.Log(append([]interface{}{\"Warn\"}, args...)...)\n}", "func Warn(msg string, fields ...Field) {\n\tgetLogger().Warn(msg, fields...)\n}", "func lWarn(v ...interface{}) {\n\t/* #nosec */\n\t_ = warnLogger.Output(2, fmt.Sprintln(v...)) //Following log package, ignoring error value\n}", "func (logger *Logger) Warning(format string, a ...interface{}) {\n\tlogger.log(Warning, format, a...)\n}", "func Warning(msg string, args ...interface{}) {\n\tif level&WARN != 0 {\n\t\twriteMessage(\"WRN\", msg, args...)\n\t}\n}", "func Warn(v ...interface{}) { std.lprint(WARN, v...) }", "func Warn(msg string, fields ...zapcore.Field) {\n\tl.Warn(msg, fields...)\n}", "func Warn(err error, args ...interface{}) {\n\tlogger.WithError(err).Warn(args...)\n}", "func (l *Logger) Warn(messageFormat string, messageArgs ...interface{}) {\n\tl.Log(Warn, messageFormat, messageArgs...)\n}", "func Warn(msg ...interface{}) {\n\tlog(defaultLogger, WARNING, msg...)\n}", "func (l Logger) Warn(msg ...interface{}) {\n\tif l.Level <= log.WarnLevel {\n\t\tl.logger.Print(append([]interface{}{\"[WARNING] \"}, msg...)...)\n\t}\n}", "func Warn(format string, v ...interface{}) {\n\tmsg := fmt.Sprintf(\"[W]\"+format, v...)\n\tlog.Println(msg)\n}", "func (logger *Logger) Warn(v ...interface{}) {\n\tif logger.level >= 2 {\n\t\tlogger.log.Output(2, fmt.Sprintf(\"[WARN] %s\\n\", v...))\n\t}\n}", "func (l *Logger) Warn(message string) {\n\tstdLog.Warn(message)\n}", "func Warn(v ...interface{}) {\n\tstdLogger.Log(WarnLevel, fmt.Sprint(v...))\n}", "func (l Log) Warning(format string, args ...interface{}) {\n\tl.Logger.Sugar().Warnf(format, args...)\n}", "func Warnf(format string, a ...interface{}) {\n\tlog(defaultLogger, WARNING, fmt.Sprintf(format, a...))\n}", "func Warn(message string, fields Fields) {\n\tlogger.Warn(message, fields)\n}", "func (l *Logger) Warn(v ...interface{}) {\n\tif l.LogToStdout {\n\t\tlog.Print(v...)\n\t}\n\tif l.LogToSystemLog {\n\t\tl.SystemLog.Warning(fmt.Sprint(v...))\n\t}\n}", "func Warn(str string, Pairs ...Pairs) {\n\tif logLevel > WARN {\n\t\treturn\n\t}\n\tcontextLogger := prepareContext(Pairs)\n\tcontextLogger.Warn(str)\n}", "func Warn(format string, a ...interface{}) {\n\tif currentLogger == nil {\n\t\treturn\n\t}\n\tcurrentLogger.output(currentPool, _WarnLevel, format, a...)\n}", "func (l *Logger) Warn(fields Fields) {\n\tl.add(Warning, fields)\n}", "func Warning(ctx context.Context, format string, values ...interface{}) {\n\tWarningWithFields(ctx, nil, format, values...)\n}", "func Warn(data []byte) {\n\tlog.Print(\"WARNING: \", string(data))\n}", "func Warn(format string, v ...interface{}) {\n\tif std.level >= WarnLevel {\n\t\tstd.Output(std.callDepth, fmt.Sprintf(format, v...), WarnLevel)\n\t}\n}", "func Warn(args ...interface{}) {\r\n\tLogger.Warn(\"\", args)\r\n}", "func Warn(msg string, ctx ...interface{}) {\n\tmetrics.GetOrRegisterCounter(\"warn\", nil).Inc(1)\n\tl.Output(msg, l.LvlWarn, CallDepth, ctx...)\n}", "func Warn(ctx context.Context, msg string, args ...Args) {\n\tL(ctx).Log(NewEntry(LevelWarn, msg, args...))\n}", "func Warn(v ...interface{}) {\n\toutput(LevelWarn, v...)\n}", "func Warn(v ...interface{}) {\n\tif LogLevel >= 2 {\n\t\tDoLog(3, WARN, fmt.Sprint(v...))\n\t}\n}", "func Warn(v ...interface{}) string {\n\treturn logr.Warn(v...)\n}", "func (l *Logger) Warnf(format string, v ...interface{}) {\n\tl.NewEntry().Printf(WARN, format, v...)\n}", "func (logger *Logger) Warn(a ...any) {\n\tlogger.echo(nil, level.Warn, formatPrint, a...)\n}", "func (z *Logger) Warn(args ...interface{}) {\n\tz.SugaredLogger.Warn(args...)\n}", "func (l *Logger) Warnf(format string, v ...interface{}) {\n\tif l.loglevel <= sWarning {\n\t\tl.output(sWarning, 0, fmt.Sprintf(format, v...))\n\t} else {\n\t\treturn\n\t}\n}", "func WarnLog(service, action, resource, id string, gotError error) {\n\tlog.Printf(\"[WARN] %s\", ProblemStandardMessage(service, action, resource, id, gotError))\n}", "func (l *GlogLogger) Warn(ctx context.Context, format string, args ...interface{}) {\n\tif glog.V(l.warnV) {\n\t\tmsg := fmt.Sprintf(format, args...)\n\t\tglog.WarningDepth(1, msg)\n\t}\n}", "func (l *ZapLogger) Warning(format string) {\n\tl.logger.Warn(format)\n}", "func (l logger) Warn(ctx context.Context, msg string, data ...interface{}) {\n\tif l.LogLevel >= Warn {\n\t\tl.Printf(l.warnStr+msg, data...)\n\t}\n}", "func (l *Logger) Warn(a ...interface{}) {\n\tif l.Verbosity <= VerbosityLevelQuiet {\n\t\treturn\n\t}\n\n\tl.logInStyle(warningString, yellow, a...)\n}", "func Warnf(msg string, v ...interface{}) {\n\tif lvl <= war {\n\t\tl.Printf(\"[WARN ]: \"+msg, v...)\n\t}\n}", "func Warn(msg ...interface{}) {\n\tif LevelWarn >= logLevel {\n\t\tsyslog.Println(\"W:\", msg)\n\t}\n}", "func (l *Logger) Warn(msg string) {\n\t// check if level is in config\n\t// if not, return\n\tif WARN&l.levels == 0 {\n\t\treturn\n\t}\n\te := Entry{Level: WARN, Message: msg}\n\n\te.enc = BorrowEncoder(l.w)\n\n\t// if we do not require a context then we\n\t// format with formatter and return.\n\tif l.contextName == \"\" {\n\t\tl.beginEntry(e.Level, msg, e)\n\t\tl.runHook(e)\n\t} else {\n\t\tl.openEntry(e.enc)\n\t}\n\n\tl.closeEntry(e)\n\tl.finalizeIfContext(e)\n\n\te.enc.Release()\n}", "func Warn(v ...interface{}) {\n\tif level <= LevelWarning {\n\t\tTorbitLogger.Printf(\"[W] %v\\n\", v)\n\t}\n}", "func Warn(msg string, fields ...Field) {\n\tL().log(2, WarnLevel, msg, nil, fields)\n}", "func Warn(msg string, fields ...zap.Field) {\n\tlog.Warn(msg, fields...)\n}", "func Warn(ctx context.Context, args ...interface{}) {\n\tGetLogger().Log(ctx, loggers.WarnLevel, 1, args...)\n}", "func (l *thundraLogger) Warn(v ...interface{}) {\n\tif logLevelId > warnLogLevelId {\n\t\treturn\n\t}\n\tlogManager.recentLogLevel = warnLogLevel\n\tlogManager.recentLogLevelId = warnLogLevelId\n\tl.Output(2, fmt.Sprint(v...))\n}", "func Warn(msg string, args ...interface{}) {\n\tdefaultLogger.Warn(msg, args...)\n}", "func Warn(args ...interface{}) {\n\terrorLogger.Warn(args...)\n}", "func (l *Logs) WarnF(format string, v ...interface{}) {\n\tl.warnings++\n\tif configuration.LogLevel >= 2 {\n\t\tlog.Printf(\"[WARN][\"+l.funcName+\"] \"+format, v...)\n\t}\n}", "func Warn(ctx context.Context, args ...interface{}) {\n\tglobal.Warn(ctx, args...)\n}", "func Warning(args ...interface{}) {\n\tWarn(args...)\n}", "func Warn(msg string, fields ...zap.Field) {\n\tlogger.Warn(msg, fields...)\n}", "func Warn(msg string, fields map[string]interface{}) error {\n\treturn defaultLogger.Log(LvWarn, msg, fields)\n}", "func Warning(text string) {\n\tprintLog(\"warning\", text)\n}", "func (l *loggerWrapper) Warning(args ...interface{}) {\n\tl.logger.Warn(sprint(args...))\n}", "func Warn(msg string) {\r\n\tif (currentLogLevel > warn_level.value) {\r\n\t\treturn;\r\n\t}\r\n\r\n\tfmt.Println(adjustLog(warn_level.name, msg))\r\n}", "func Warn(args ...interface{}) {\n\tDefaultLogger.Warn(args...)\n}", "func Warn(log string, v ...interface{}) {\n\tsyslog.Printf(\"WARN \"+log, v...)\n}", "func Warn(args ...interface{}) {\n\tlogger.Warn(args...)\n}", "func Warn(args ...interface{}) {\n\tlogger.Warn(args...)\n}", "func Warn(args ...interface{}) {\n\tlogger.Warn(args...)\n}", "func (l *Logger) Warn(args ...interface{}) {\n\tkitlevel.Warn(l.Log).Log(args...)\n}", "func Warn(msg string, fields ...zapcore.Field) {\n\tinitLogger()\n\n\tlogger.Warn(msg, fields...)\n}", "func (l *Logger) Warnf(format string, v ...interface{}) {\n\tl.Log(WarnLevel, fmt.Sprintf(format, v...))\n}", "func Warn(message string, fields ...zap.Field) {\n\tlogger.Warn(message, fields...)\n}" ]
[ "0.78701484", "0.78410864", "0.7696451", "0.75903314", "0.75745946", "0.7573671", "0.75535816", "0.7550111", "0.753678", "0.75256777", "0.752561", "0.75237316", "0.7522358", "0.75098956", "0.7507258", "0.74956053", "0.7477858", "0.7448665", "0.7440785", "0.74213314", "0.7413817", "0.7400667", "0.73861235", "0.7384191", "0.7367244", "0.73616374", "0.735037", "0.7346277", "0.7343376", "0.7343243", "0.7337121", "0.7319972", "0.7308121", "0.7292885", "0.72895956", "0.72870696", "0.72858953", "0.72778267", "0.72760284", "0.7268075", "0.7267391", "0.72645724", "0.72608554", "0.7256382", "0.725617", "0.725428", "0.723817", "0.7235055", "0.72287565", "0.72149587", "0.72103506", "0.7209716", "0.720805", "0.7197881", "0.719447", "0.7193614", "0.7189515", "0.7184624", "0.7184204", "0.7181994", "0.7180831", "0.7179095", "0.71765375", "0.7174526", "0.7173349", "0.7169579", "0.7169187", "0.71629465", "0.7158156", "0.7150598", "0.7146618", "0.7143514", "0.7143329", "0.7137012", "0.71193326", "0.7115261", "0.7111257", "0.71098137", "0.7105978", "0.71026033", "0.70881563", "0.7085361", "0.7081778", "0.7080113", "0.70717627", "0.70716876", "0.7071011", "0.70679677", "0.7067434", "0.7065525", "0.70634663", "0.70546246", "0.705428", "0.70533997", "0.7053161", "0.7053161", "0.7053161", "0.70517474", "0.70470965", "0.7044177", "0.70393914" ]
0.0
-1
Debug formats and logs a debug message.
func (CryptoMachineLogger) Debug(message string, args ...interface{}) { log.Debugf(message, args...) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (d *DummyLogger) Debug(format string) {}", "func debug(format string, args ...interface{}) {\n\tif IsDebug {\n\t\tLog.Debug(fmt.Sprintf(format, args...))\n\t}\n}", "func (l *MessageLogger) Debug(msg string) { l.logger.Debug(msg) }", "func Debug(msg string, a ...interface{}) {\n if *verbose {\n formatted := fmt.Sprintf(msg, a...)\n logger.Println(fmt.Sprintf(\"\\033[35;1mDEBUG:\\033[0m %s\", formatted))\n }\n}", "func Debug(msg string){\n\tif IsDebug() {\n\t\tlog.Println(msg)\n\t}\n}", "func (l *Logger) Debug(message string) {\n\tl.printLogMessage(keptnLogMessage{Timestamp: time.Now(), Message: message, LogLevel: \"DEBUG\"})\n}", "func debug(format string, args ...interface{}) {\n\tif debugOn {\n\t\tlog.Printf(\"DEBUG: \"+format, args...)\n\t}\n}", "func (l *Logger) Debug(msg string) {\n\t// check if level is in config\n\t// if not, return\n\tif DEBUG&l.levels == 0 {\n\t\treturn\n\t}\n\te := Entry{Level: DEBUG, Message: msg}\n\n\te.enc = BorrowEncoder(l.w)\n\n\t// if we do not require a context then we\n\t// format with formatter and return.\n\tif l.contextName == \"\" {\n\t\tl.beginEntry(e.Level, msg, e)\n\t\tl.runHook(e)\n\t} else {\n\t\tl.openEntry(e.enc)\n\t}\n\n\tl.closeEntry(e)\n\tl.finalizeIfContext(e)\n\n\te.enc.Release()\n}", "func Debug(format string, a ...interface{}) {\n\tif Level >= 4 {\n\t\ta, w := extractLoggerArgs(format, a...)\n\t\ts := fmt.Sprintf(label(format, DebugLabel), a...)\n\n\t\tfmt.Fprintf(w, s)\n\t}\n}", "func (dl *defaultLogger) Debug(msg string) {\n\tdl.Print(msg)\n}", "func Debug(text string) {\n\tprintLog(\"debug\", text)\n}", "func (log *TcLog) Debug(format string, v ...interface{}) {\n\tif LevelDebug < log.level {\n\t\treturn\n\t}\n\tmsg := fmt.Sprintf(format, v...)\n\tlog.writeMsg(LevelDebug, msg)\n}", "func debug(message string) {\n if DebugMode {\n fmt.Fprintln(os.Stderr, \"DEBUG:\", message)\n }\n}", "func Debug(message string) {\n\tif logLevel >= 1 {\n\t\tlogger.Printf(\"DEBUG %s\", message)\n\t}\n}", "func Debug(format string, args ...interface{}) {\n\tif !Debugging {\n\t\treturn\n\t}\n\tlog.Printf(format, args...)\n}", "func (l *Impl) Debug(format string, args ...interface{}) {\n\tl.write(\"DEBUG\", format, args...)\n}", "func logDebug(text string, params ...interface{}) {\n\tif !*debug {\n\t\treturn\n\t}\n\tline := fmt.Sprintf(text, params...)\n\tlog.Printf(\"DEBUG: %s\", line)\n}", "func (l *Logger) Debug(message string) {\n\tl.LogWithLevel(message, \"debug\")\n}", "func (l *Log) Debug(format string, args ...interface{}) {\n\n\tl.write(SeverityDebug, fmt.Sprintf(format, args...))\n}", "func Debug(msg ...interface{}) {\n\tif LevelDebug >= logLevel {\n\t\tsyslog.Println(\"D:\", msg)\n\t}\n}", "func Debug(ctx context.Context, msg string, args ...Args) {\n\tL(ctx).Log(NewEntry(LevelDebug, msg, args...))\n}", "func (l typeLogger) Debug(format string, v ...interface{}) {\n\tif l.level <= logDebug {\n\t\tmessage := fmt.Sprintf(format, v...)\n\t\tl.logger.Printf(\" %s%s%s : %s (%s)\", colorDebug, tagDebug, colorClear, message, getCallerPosition())\n\t}\n}", "func (l *Logger) Debug(messageFormat string, messageArgs ...interface{}) {\n\tl.Log(Debug, messageFormat, messageArgs...)\n}", "func (s SugaredLogger) Debug(message string, fields ...interface{}) {\n\ts.zapLogger.Debugw(message, fields...)\n}", "func Debug(format string, v ...interface{}) {\n\tif logger.Debug {\n\t\tdoLog(\"DEBUG\", format, v...)\n\t}\n}", "func Debug(msg string) {\n\tif lvl <= deb {\n\t\tl.Print(\"[DEBUG]: \" + msg)\n\t}\n}", "func debug(fmt string, args ...interface{}) {\n\tlog.Printf(fmt, args...)\n}", "func Debug(format string, a ...interface{}) {\n\tif DebuggingEnabled {\n\t\tfmt.Printf(format, a...)\n\t}\n}", "func ExampleDebug() {\n\tsetup()\n\tlog.Debug().Msg(\"hello world\")\n\n\t// Output: {\"level\":\"debug\",\"time\":1199811905,\"message\":\"hello world\"}\n}", "func Debug(msg string, fields ...Field) {\n\tgetLogger().Debug(msg, fields...)\n}", "func Debug(format string, args ...interface{}) {\n\tif logger == nil {\n\t\treturn\n\t}\n\tlogger.Printf(format+\"\\n\", args...)\n}", "func (stimLogger *FullStimLogger) Debug(message ...interface{}) {\n\tif stimLogger.highestLevel >= DebugLevel {\n\t\tif stimLogger.setLogger == nil {\n\t\t\tif stimLogger.forceFlush {\n\t\t\t\tstimLogger.writeLogs(stimLogger.formatString(DebugLevel, debugMsg, message...))\n\t\t\t} else {\n\t\t\t\tstimLogger.formatAndLog(DebugLevel, debugMsg, message...)\n\t\t\t}\n\t\t} else {\n\t\t\tstimLogger.setLogger.Debug(message...)\n\t\t}\n\t}\n}", "func Debug(message string, fields Fields) {\n\tlogger.Debug(message, fields)\n}", "func Debug(format string, v ...interface{}) {\n\tmsg := fmt.Sprintf(\"[D]\"+format, v...)\n\tlog.Println(msg)\n}", "func Debug(msg string, fields ...zapcore.Field) {\n\tinitLogger()\n\n\tlogger.Debug(msg, fields...)\n}", "func myDebug(format string, a ...interface{}) {\n\tif FlagDebug {\n\t\tformat = fmt.Sprintf(\"[DEBUG] %s\\n\", format)\n\t\tfmt.Fprintf(os.Stderr, format, a...)\n\t}\n}", "func (w *Writer) Debug(m string) error {}", "func (t *TextLogger) Debug(args ...interface{}) {\n\tt.Debugf(\"%s\", fmt.Sprint(args...))\n}", "func Debug(msg string) {\n log.Debug(msg)\n}", "func (l *jsonLogger) Debug(message interface{}, params ...interface{}) {\n\tl.jsonLogParser.parse(context.Background(), l.jsonLogParser.log.Debug(), \"\", params...).Msgf(\"%s\", message)\n}", "func (l *Logger) Debug(message string) {\n\tstdLog.Debug(message)\n}", "func printDebug(msg string) {\n\tif Debug {\n\t\tfmt.Println(fmt.Sprintf(\"DEBUG %s: %s\", getFormattedTime(), msg))\n\t}\n}", "func printDebug(msg string) {\n\tif Debug {\n\t\tfmt.Println(fmt.Sprintf(\"DEBUG %s: %s\", getFormattedTime(), msg))\n\t}\n}", "func (sl *SysLogger) Debug(info, msg string) {\n\tlog.Println(\"[DEBUG]\", sl.tag, info, msg)\n}", "func Debug(msg ...interface{}) {\n\tlog(defaultLogger, DEBUG, msg...)\n}", "func (l *logHandler) Debug(args ...interface{}) {\n\tl.Log(LogDebug, 3, args...)\n}", "func Debug(msg string, fields ...zap.Field) {\n\tlog.Debug(msg, fields...)\n}", "func Debug(msg string) {\n\t// log level 1\n\tif logLevel <= 1 {\n\t\tfmt.Println(brightwhite + \"[debug]\\t\" + white + msg + logTime())\n\t}\n}", "func (std STDLogger) Debug(format string, args ...interface{}) {\n\tfmt.Printf(format, args...)\n\tfmt.Printf(\"\\n\")\n\n}", "func Debug(data []byte) {\n\tlog.Print(\"DEBUG: \", string(data))\n}", "func Debug(message interface{}) {\n\tlogging.Debug(message)\n}", "func Debug(message string) {\n\tif DebugLogFunc != nil {\n\t\tDebugLogFunc(strings.TrimRight(message, \" \\r\\n\\t\"))\n\t}\n}", "func debug(s string) {\n\tif isDebugMode {\n\t\tfmt.Printf(\"DEBUG: %s\", s)\n\t}\n}", "func Debug(format string, v ...interface{}) {\n\tLog(1, DEBUG, format, v...)\n}", "func (l Logger) Debug(msg ...interface{}) {\n\tif l.Level <= log.DebugLevel {\n\t\tout := fmt.Sprint(append([]interface{}{l.DebugColor.Sprint(\"DEBUG: \")}, msg...)...)\n\t\tout = checkEnding(out)\n\t\tfmt.Fprint(l.DebugOut, out)\n\t}\n}", "func (l prefixer) Debug(f string, v ...interface{}) {\n\tDebug(\n\t\tl.Target,\n\t\tl.FormatSpecifierPrefix+f,\n\t\tv...,\n\t)\n}", "func (l *Logger) Debug(msg string, v ...interface{}) {\n\tif l.debug {\n\t\tfmt.Fprint(l.stderr, addColor(DebugPrefix+\" \", Cyan))\n\t\tl.Msg(msg, v...)\n\t}\n}", "func (r *Record) Debug(args ...interface{}) {\n\tr.Log(DebugLevel, args...)\n}", "func Debug(format string, args ...interface{}) {\n\tdo(DEBUG, format, args...)\n}", "func Debug(msg string, fields ...zapcore.Field) {\n\tGetZapLogger().Debug(msg, fields...)\n}", "func (l *Logger) Debug(msg string, fields ...Field) {\n\tl.log(2, DebugLevel, msg, nil, fields)\n}", "func (logger *Logger) Debug(args ...interface{}) {\n\tlogger.std.Log(append([]interface{}{\"Debug\"}, args...)...)\n}", "func Debug(format string, args ...interface{}) {\n\tlog.Debugf(format, args...)\n}", "func debugLog(msg ...interface{}) {\n\tlogLocker.Lock()\n\tdefer logLocker.Unlock()\n\tif *confVerbose {\n\t\tcolor.White(fmt.Sprint(time.Now().Format(\"02_01_06-15.04.05\"), \"[DEBUG] ->\", msg))\n\t}\n}", "func Debug(msg string, fields ...Field) {\n\tL().log(2, DebugLevel, msg, nil, fields)\n}", "func Debug(format string, values ...interface{}) {\n\tif logger != nil {\n\t\tlogWithLogger(\"DEBUG\", format, values...)\n\t\treturn\n\t}\n\tlog.Debugf(format, values...)\n}", "func Debug(msg string, args ...interface{}) {\n\tif level&DEBUG != 0 {\n\t\twriteMessage(\"DBG\", msg, args...)\n\t}\n}", "func (s *SlcLogger) Debug(message interface{}, title ...string) error {\n\treturn s.sendNotification(LevelDebug, colorDebug, message, title)\n}", "func (l *comLogger) Debug(msg string) {\n\tl.Log(Debug, msg)\n}", "func (l *LoggerService) Debug(message string, values ...interface{}) {\n\tlog.Printf(\"[DEBUG] \"+message+\"\\n\", values...)\n}", "func (l *Logger) Debug(format string, v ...interface{}) {\n\tl.Output(2, fmt.Sprintf(fmt.Sprintf(\"[%s]:%s\", levelStr[DEBUG], format), v...))\n}", "func (logger *Logger) Debug(args ...interface{}) {\n\tlogger.logPrint(L_DEBUG, args...)\n\tlogger.Flush()\n}", "func debug(format string, args ...interface{}) {\n\tf := red(\">>>\") + format + red(\"<<<\") + \"\\n\"\n\tfmt.Printf(f, args...)\n}", "func (l *BasicLogger) Debug(msg string) {\n\tl.appendLogEvent(level.DebugLevel, msg)\n}", "func Debug(message interface{}) {\n\tglobalLogger.Debug(message)\n}", "func (l StdLogger) Debug(msg string, objects ...Object) {\n\tl.log(LogLevelDebug, prepareEntry(msg, nil, objects...))\n}", "func Debug(msg string, fields map[string]interface{}) error {\n\treturn defaultLogger.Log(LvDebug, msg, fields)\n}", "func Debug(description ...interface{}) {\n\tdes := fmt.Sprint(description...)\n\tlogger.Debug(des)\n}", "func Debug(msg string, fields ...zap.Field) {\n\tlogger.Debug(msg, fields...)\n}", "func (log Logger) Debug(message string, fields ...Data) {\n\tlog.log(log.zl.Debug(), message, fields...)\n}", "func Debug(rf *Raft, format string, a ...interface{}) (n int, err error) {\n\tif DebugMode >= 3 {\n\t\tlog.Printf(\"%s\\n\", White(rf, \"DEBUG\", format, a...))\n\t}\n\treturn\n}", "func Debug(format string, v ...interface{}) {\n\tif LogLevel() <= 0 {\n\t\tlog.Printf(\"DEBUG: \"+format, v...)\n\t}\n}", "func Debug(v ...interface{}) {\n\tif jl.level != INFO {\n\t\tvar s string\n\t\tjl.stdlog.SetPrefix(\"[DEBUG] \")\n\t\tif jl.flag == LstdFlags|Lshortfile {\n\t\t\ts = generateStdflagShortFile()\n\t\t}\n\n\t\ts = s + fmt.Sprintln(v...)\n\t\tjl.stdlog.Print(s)\n\t}\n}", "func Debug(v ...interface{}) {\n\tm := fmt.Sprint(v...)\n\tdefaultLogger.Log(debugLogging, \"%s\", m)\n}", "func (l LoggerFunc) Debug(format string, args ...interface{}) {\n\tl(format, args...)\n}", "func (z *Logger) Debug(args ...interface{}) {\n\tz.SugaredLogger.Debug(args...)\n}", "func (fl fieldLogger) Debug(msg string, fields ...Field) {\n\tfl.l.Debug(msg, unpack(fields...)...)\n}", "func debug(m string, v interface{}) {\n\tif DebugMode {\n\t\tlog.Printf(m+\":%+v\", v)\n\t}\n}", "func (f *firstLogger) Debug(message ...interface{}) {\n\ttransactionLog.WithFields(logrus.Fields{\n\t\t\"file\": f.Filename,\n\t}).Debug(message)\n\n}", "func (l *Logger) Debug(msg string, keysAndValues ...interface{}) {\n\tif l.level >= LogLevelDebug {\n\t\tl.debugLogger.Print(addFileLinePrefix(msg))\n\t\tprintKeysAndValues(l.debugLogger, keysAndValues...)\n\t}\n}", "func (l *Logger) Debug(msg string, args ...interface{}) {\n\tl.z.Debugw(msg, args...)\n}", "func debug(msg string, args ...interface{}) {\n\tif *verbose {\n\t\tif len(args) > 0 {\n\t\t\tlog.Printf(msg, args...)\n\t\t} else {\n\t\t\tlog.Printf(msg)\n\t\t}\n\t}\n}", "func (logger *Logger) Debug(msg string, extras ...map[string]string) error {\n\tif DebugLevel >= logger.LogLevel {\n\t\treturn logger.Log(msg, DebugLevel, extras...)\n\t}\n\treturn nil\n}", "func (c *Client) debug(str string, args ...interface{}) {\n\tif c.level >= 2 {\n\t\tc.log.Printf(str, args...)\n\t}\n}", "func (g GrcpGatewayLogger) Debug(msg string) {\n\tif g.logger.silent(DebugLevel) {\n\t\treturn\n\t}\n\te := g.logger.header(DebugLevel)\n\tif g.logger.Caller > 0 {\n\t\t_, file, line, _ := runtime.Caller(g.logger.Caller)\n\t\te.caller(file, line, g.logger.FullpathCaller)\n\t}\n\te.Context(g.context).Msg(msg)\n}", "func Debug(format string, v ...interface{}) {\n\tLeveledLogger(level.Debug, format, v...)\n}", "func (l *JSONLogger) Debug(format string, args ...interface{}) {\n\tl.Log(\"debug\", format, args...)\n}", "func Debugf(format string, args ...interface{}) {\n\tlock.Lock()\n\tdefer lock.Unlock()\n\n\tif level < Debug {\n\t\treturn\n\t}\n\n\tmsg := fmt.Sprintf(\"DEBUG: %s\", format)\n\tif len(args) > 0 {\n\t\tmsg = fmt.Sprintf(msg, args...)\n\t}\n\n\tlog.Println(msg)\n}", "func (customLogger *CustomLogger) Debug(message string) {\n\tcustomLogger.logger.Debug(message)\n}", "func (StdLogger) Debugf(format string, v ...interface{}) {}" ]
[ "0.7723598", "0.7696748", "0.76224524", "0.7569844", "0.75622237", "0.75610167", "0.7551859", "0.75502473", "0.7542373", "0.7470927", "0.74653596", "0.7465278", "0.7443189", "0.74393797", "0.74313897", "0.74255466", "0.7418193", "0.74064404", "0.74027467", "0.73973733", "0.73876303", "0.7370896", "0.7367616", "0.73671454", "0.7358875", "0.73572445", "0.7352254", "0.7350906", "0.73395485", "0.73379153", "0.7323255", "0.7322465", "0.7316607", "0.7313514", "0.7309124", "0.73087025", "0.73070896", "0.7292208", "0.728697", "0.7281301", "0.7277325", "0.72579414", "0.72579414", "0.7257685", "0.72569287", "0.72468984", "0.7242448", "0.72413653", "0.7240008", "0.7239283", "0.7239024", "0.72356075", "0.72263765", "0.7225345", "0.72237587", "0.72099763", "0.7209784", "0.720011", "0.71994245", "0.7189507", "0.7187916", "0.7184475", "0.71811175", "0.7179446", "0.7177315", "0.7176238", "0.71756536", "0.7174891", "0.7173555", "0.71659315", "0.7165424", "0.7165135", "0.716439", "0.7163594", "0.71633106", "0.71620274", "0.7160341", "0.7159731", "0.7152569", "0.7150831", "0.715059", "0.7146208", "0.71403474", "0.7138765", "0.71368444", "0.71357065", "0.7132034", "0.7124605", "0.71162736", "0.7113267", "0.71073407", "0.71053827", "0.71051306", "0.71048135", "0.71026194", "0.7100614", "0.70985156", "0.7092556", "0.7089675", "0.7078791" ]
0.75299156
9