repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
sequence | docstring
stringlengths 6
2.61k
| docstring_tokens
sequence | sha
stringlengths 40
40
| url
stringlengths 85
252
| partition
stringclasses 1
value |
---|---|---|---|---|---|---|---|---|---|---|---|
vishvananda/netlink | socket_linux.go | SocketGet | func SocketGet(local, remote net.Addr) (*Socket, error) {
localTCP, ok := local.(*net.TCPAddr)
if !ok {
return nil, ErrNotImplemented
}
remoteTCP, ok := remote.(*net.TCPAddr)
if !ok {
return nil, ErrNotImplemented
}
localIP := localTCP.IP.To4()
if localIP == nil {
return nil, ErrNotImplemented
}
remoteIP := remoteTCP.IP.To4()
if remoteIP == nil {
return nil, ErrNotImplemented
}
s, err := nl.Subscribe(unix.NETLINK_INET_DIAG)
if err != nil {
return nil, err
}
defer s.Close()
req := nl.NewNetlinkRequest(nl.SOCK_DIAG_BY_FAMILY, 0)
req.AddData(&socketRequest{
Family: unix.AF_INET,
Protocol: unix.IPPROTO_TCP,
ID: SocketID{
SourcePort: uint16(localTCP.Port),
DestinationPort: uint16(remoteTCP.Port),
Source: localIP,
Destination: remoteIP,
Cookie: [2]uint32{nl.TCPDIAG_NOCOOKIE, nl.TCPDIAG_NOCOOKIE},
},
})
s.Send(req)
msgs, err := s.Receive()
if err != nil {
return nil, err
}
if len(msgs) == 0 {
return nil, errors.New("no message nor error from netlink")
}
if len(msgs) > 2 {
return nil, fmt.Errorf("multiple (%d) matching sockets", len(msgs))
}
sock := &Socket{}
if err := sock.deserialize(msgs[0].Data); err != nil {
return nil, err
}
return sock, nil
} | go | func SocketGet(local, remote net.Addr) (*Socket, error) {
localTCP, ok := local.(*net.TCPAddr)
if !ok {
return nil, ErrNotImplemented
}
remoteTCP, ok := remote.(*net.TCPAddr)
if !ok {
return nil, ErrNotImplemented
}
localIP := localTCP.IP.To4()
if localIP == nil {
return nil, ErrNotImplemented
}
remoteIP := remoteTCP.IP.To4()
if remoteIP == nil {
return nil, ErrNotImplemented
}
s, err := nl.Subscribe(unix.NETLINK_INET_DIAG)
if err != nil {
return nil, err
}
defer s.Close()
req := nl.NewNetlinkRequest(nl.SOCK_DIAG_BY_FAMILY, 0)
req.AddData(&socketRequest{
Family: unix.AF_INET,
Protocol: unix.IPPROTO_TCP,
ID: SocketID{
SourcePort: uint16(localTCP.Port),
DestinationPort: uint16(remoteTCP.Port),
Source: localIP,
Destination: remoteIP,
Cookie: [2]uint32{nl.TCPDIAG_NOCOOKIE, nl.TCPDIAG_NOCOOKIE},
},
})
s.Send(req)
msgs, err := s.Receive()
if err != nil {
return nil, err
}
if len(msgs) == 0 {
return nil, errors.New("no message nor error from netlink")
}
if len(msgs) > 2 {
return nil, fmt.Errorf("multiple (%d) matching sockets", len(msgs))
}
sock := &Socket{}
if err := sock.deserialize(msgs[0].Data); err != nil {
return nil, err
}
return sock, nil
} | [
"func",
"SocketGet",
"(",
"local",
",",
"remote",
"net",
".",
"Addr",
")",
"(",
"*",
"Socket",
",",
"error",
")",
"{",
"localTCP",
",",
"ok",
":=",
"local",
".",
"(",
"*",
"net",
".",
"TCPAddr",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"ErrNotImplemented",
"\n",
"}",
"\n",
"remoteTCP",
",",
"ok",
":=",
"remote",
".",
"(",
"*",
"net",
".",
"TCPAddr",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"ErrNotImplemented",
"\n",
"}",
"\n",
"localIP",
":=",
"localTCP",
".",
"IP",
".",
"To4",
"(",
")",
"\n",
"if",
"localIP",
"==",
"nil",
"{",
"return",
"nil",
",",
"ErrNotImplemented",
"\n",
"}",
"\n",
"remoteIP",
":=",
"remoteTCP",
".",
"IP",
".",
"To4",
"(",
")",
"\n",
"if",
"remoteIP",
"==",
"nil",
"{",
"return",
"nil",
",",
"ErrNotImplemented",
"\n",
"}",
"\n\n",
"s",
",",
"err",
":=",
"nl",
".",
"Subscribe",
"(",
"unix",
".",
"NETLINK_INET_DIAG",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"defer",
"s",
".",
"Close",
"(",
")",
"\n",
"req",
":=",
"nl",
".",
"NewNetlinkRequest",
"(",
"nl",
".",
"SOCK_DIAG_BY_FAMILY",
",",
"0",
")",
"\n",
"req",
".",
"AddData",
"(",
"&",
"socketRequest",
"{",
"Family",
":",
"unix",
".",
"AF_INET",
",",
"Protocol",
":",
"unix",
".",
"IPPROTO_TCP",
",",
"ID",
":",
"SocketID",
"{",
"SourcePort",
":",
"uint16",
"(",
"localTCP",
".",
"Port",
")",
",",
"DestinationPort",
":",
"uint16",
"(",
"remoteTCP",
".",
"Port",
")",
",",
"Source",
":",
"localIP",
",",
"Destination",
":",
"remoteIP",
",",
"Cookie",
":",
"[",
"2",
"]",
"uint32",
"{",
"nl",
".",
"TCPDIAG_NOCOOKIE",
",",
"nl",
".",
"TCPDIAG_NOCOOKIE",
"}",
",",
"}",
",",
"}",
")",
"\n",
"s",
".",
"Send",
"(",
"req",
")",
"\n",
"msgs",
",",
"err",
":=",
"s",
".",
"Receive",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"len",
"(",
"msgs",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"len",
"(",
"msgs",
")",
">",
"2",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"len",
"(",
"msgs",
")",
")",
"\n",
"}",
"\n",
"sock",
":=",
"&",
"Socket",
"{",
"}",
"\n",
"if",
"err",
":=",
"sock",
".",
"deserialize",
"(",
"msgs",
"[",
"0",
"]",
".",
"Data",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"sock",
",",
"nil",
"\n",
"}"
] | // SocketGet returns the Socket identified by its local and remote addresses. | [
"SocketGet",
"returns",
"the",
"Socket",
"identified",
"by",
"its",
"local",
"and",
"remote",
"addresses",
"."
] | fd97bf4e47867b5e794234baa6b8a7746135ec10 | https://github.com/vishvananda/netlink/blob/fd97bf4e47867b5e794234baa6b8a7746135ec10/socket_linux.go#L108-L159 | train |
vishvananda/netlink | route_linux.go | RouteSubscribe | func RouteSubscribe(ch chan<- RouteUpdate, done <-chan struct{}) error {
return routeSubscribeAt(netns.None(), netns.None(), ch, done, nil, false)
} | go | func RouteSubscribe(ch chan<- RouteUpdate, done <-chan struct{}) error {
return routeSubscribeAt(netns.None(), netns.None(), ch, done, nil, false)
} | [
"func",
"RouteSubscribe",
"(",
"ch",
"chan",
"<-",
"RouteUpdate",
",",
"done",
"<-",
"chan",
"struct",
"{",
"}",
")",
"error",
"{",
"return",
"routeSubscribeAt",
"(",
"netns",
".",
"None",
"(",
")",
",",
"netns",
".",
"None",
"(",
")",
",",
"ch",
",",
"done",
",",
"nil",
",",
"false",
")",
"\n",
"}"
] | // RouteSubscribe takes a chan down which notifications will be sent
// when routes are added or deleted. Close the 'done' chan to stop subscription. | [
"RouteSubscribe",
"takes",
"a",
"chan",
"down",
"which",
"notifications",
"will",
"be",
"sent",
"when",
"routes",
"are",
"added",
"or",
"deleted",
".",
"Close",
"the",
"done",
"chan",
"to",
"stop",
"subscription",
"."
] | fd97bf4e47867b5e794234baa6b8a7746135ec10 | https://github.com/vishvananda/netlink/blob/fd97bf4e47867b5e794234baa6b8a7746135ec10/route_linux.go#L988-L990 | train |
vishvananda/netlink | route_linux.go | RouteSubscribeWithOptions | func RouteSubscribeWithOptions(ch chan<- RouteUpdate, done <-chan struct{}, options RouteSubscribeOptions) error {
if options.Namespace == nil {
none := netns.None()
options.Namespace = &none
}
return routeSubscribeAt(*options.Namespace, netns.None(), ch, done, options.ErrorCallback, options.ListExisting)
} | go | func RouteSubscribeWithOptions(ch chan<- RouteUpdate, done <-chan struct{}, options RouteSubscribeOptions) error {
if options.Namespace == nil {
none := netns.None()
options.Namespace = &none
}
return routeSubscribeAt(*options.Namespace, netns.None(), ch, done, options.ErrorCallback, options.ListExisting)
} | [
"func",
"RouteSubscribeWithOptions",
"(",
"ch",
"chan",
"<-",
"RouteUpdate",
",",
"done",
"<-",
"chan",
"struct",
"{",
"}",
",",
"options",
"RouteSubscribeOptions",
")",
"error",
"{",
"if",
"options",
".",
"Namespace",
"==",
"nil",
"{",
"none",
":=",
"netns",
".",
"None",
"(",
")",
"\n",
"options",
".",
"Namespace",
"=",
"&",
"none",
"\n",
"}",
"\n",
"return",
"routeSubscribeAt",
"(",
"*",
"options",
".",
"Namespace",
",",
"netns",
".",
"None",
"(",
")",
",",
"ch",
",",
"done",
",",
"options",
".",
"ErrorCallback",
",",
"options",
".",
"ListExisting",
")",
"\n",
"}"
] | // RouteSubscribeWithOptions work like RouteSubscribe but enable to
// provide additional options to modify the behavior. Currently, the
// namespace can be provided as well as an error callback. | [
"RouteSubscribeWithOptions",
"work",
"like",
"RouteSubscribe",
"but",
"enable",
"to",
"provide",
"additional",
"options",
"to",
"modify",
"the",
"behavior",
".",
"Currently",
"the",
"namespace",
"can",
"be",
"provided",
"as",
"well",
"as",
"an",
"error",
"callback",
"."
] | fd97bf4e47867b5e794234baa6b8a7746135ec10 | https://github.com/vishvananda/netlink/blob/fd97bf4e47867b5e794234baa6b8a7746135ec10/route_linux.go#L1009-L1015 | train |
vishvananda/netlink | bpf_linux.go | loadSimpleBpf | func loadSimpleBpf(progType BpfProgType, ret uint32) (int, error) {
insns := []uint64{
0x00000000000000b7 | (uint64(ret) << 32),
0x0000000000000095,
}
license := []byte{'A', 'S', 'L', '2', '\x00'}
attr := BPFAttr{
ProgType: uint32(progType),
InsnCnt: uint32(len(insns)),
Insns: uintptr(unsafe.Pointer(&insns[0])),
License: uintptr(unsafe.Pointer(&license[0])),
}
fd, _, errno := unix.Syscall(unix.SYS_BPF,
5, /* bpf cmd */
uintptr(unsafe.Pointer(&attr)),
unsafe.Sizeof(attr))
if errno != 0 {
return 0, errno
}
return int(fd), nil
} | go | func loadSimpleBpf(progType BpfProgType, ret uint32) (int, error) {
insns := []uint64{
0x00000000000000b7 | (uint64(ret) << 32),
0x0000000000000095,
}
license := []byte{'A', 'S', 'L', '2', '\x00'}
attr := BPFAttr{
ProgType: uint32(progType),
InsnCnt: uint32(len(insns)),
Insns: uintptr(unsafe.Pointer(&insns[0])),
License: uintptr(unsafe.Pointer(&license[0])),
}
fd, _, errno := unix.Syscall(unix.SYS_BPF,
5, /* bpf cmd */
uintptr(unsafe.Pointer(&attr)),
unsafe.Sizeof(attr))
if errno != 0 {
return 0, errno
}
return int(fd), nil
} | [
"func",
"loadSimpleBpf",
"(",
"progType",
"BpfProgType",
",",
"ret",
"uint32",
")",
"(",
"int",
",",
"error",
")",
"{",
"insns",
":=",
"[",
"]",
"uint64",
"{",
"0x00000000000000b7",
"|",
"(",
"uint64",
"(",
"ret",
")",
"<<",
"32",
")",
",",
"0x0000000000000095",
",",
"}",
"\n",
"license",
":=",
"[",
"]",
"byte",
"{",
"'A'",
",",
"'S'",
",",
"'L'",
",",
"'2'",
",",
"'\\x00'",
"}",
"\n",
"attr",
":=",
"BPFAttr",
"{",
"ProgType",
":",
"uint32",
"(",
"progType",
")",
",",
"InsnCnt",
":",
"uint32",
"(",
"len",
"(",
"insns",
")",
")",
",",
"Insns",
":",
"uintptr",
"(",
"unsafe",
".",
"Pointer",
"(",
"&",
"insns",
"[",
"0",
"]",
")",
")",
",",
"License",
":",
"uintptr",
"(",
"unsafe",
".",
"Pointer",
"(",
"&",
"license",
"[",
"0",
"]",
")",
")",
",",
"}",
"\n",
"fd",
",",
"_",
",",
"errno",
":=",
"unix",
".",
"Syscall",
"(",
"unix",
".",
"SYS_BPF",
",",
"5",
",",
"/* bpf cmd */",
"uintptr",
"(",
"unsafe",
".",
"Pointer",
"(",
"&",
"attr",
")",
")",
",",
"unsafe",
".",
"Sizeof",
"(",
"attr",
")",
")",
"\n",
"if",
"errno",
"!=",
"0",
"{",
"return",
"0",
",",
"errno",
"\n",
"}",
"\n",
"return",
"int",
"(",
"fd",
")",
",",
"nil",
"\n",
"}"
] | // loadSimpleBpf loads a trivial bpf program for testing purposes. | [
"loadSimpleBpf",
"loads",
"a",
"trivial",
"bpf",
"program",
"for",
"testing",
"purposes",
"."
] | fd97bf4e47867b5e794234baa6b8a7746135ec10 | https://github.com/vishvananda/netlink/blob/fd97bf4e47867b5e794234baa6b8a7746135ec10/bpf_linux.go#L33-L53 | train |
vishvananda/netlink | rule.go | NewRule | func NewRule() *Rule {
return &Rule{
SuppressIfgroup: -1,
SuppressPrefixlen: -1,
Priority: -1,
Mark: -1,
Mask: -1,
Goto: -1,
Flow: -1,
}
} | go | func NewRule() *Rule {
return &Rule{
SuppressIfgroup: -1,
SuppressPrefixlen: -1,
Priority: -1,
Mark: -1,
Mask: -1,
Goto: -1,
Flow: -1,
}
} | [
"func",
"NewRule",
"(",
")",
"*",
"Rule",
"{",
"return",
"&",
"Rule",
"{",
"SuppressIfgroup",
":",
"-",
"1",
",",
"SuppressPrefixlen",
":",
"-",
"1",
",",
"Priority",
":",
"-",
"1",
",",
"Mark",
":",
"-",
"1",
",",
"Mask",
":",
"-",
"1",
",",
"Goto",
":",
"-",
"1",
",",
"Flow",
":",
"-",
"1",
",",
"}",
"\n",
"}"
] | // NewRule return empty rules. | [
"NewRule",
"return",
"empty",
"rules",
"."
] | fd97bf4e47867b5e794234baa6b8a7746135ec10 | https://github.com/vishvananda/netlink/blob/fd97bf4e47867b5e794234baa6b8a7746135ec10/rule.go#L32-L42 | train |
vishvananda/netlink | qdisc_linux.go | NewNetem | func NewNetem(attrs QdiscAttrs, nattrs NetemQdiscAttrs) *Netem {
var limit uint32 = 1000
var lossCorr, delayCorr, duplicateCorr uint32
var reorderProb, reorderCorr uint32
var corruptProb, corruptCorr uint32
latency := nattrs.Latency
loss := Percentage2u32(nattrs.Loss)
gap := nattrs.Gap
duplicate := Percentage2u32(nattrs.Duplicate)
jitter := nattrs.Jitter
// Correlation
if latency > 0 && jitter > 0 {
delayCorr = Percentage2u32(nattrs.DelayCorr)
}
if loss > 0 {
lossCorr = Percentage2u32(nattrs.LossCorr)
}
if duplicate > 0 {
duplicateCorr = Percentage2u32(nattrs.DuplicateCorr)
}
// FIXME should validate values(like loss/duplicate are percentages...)
latency = time2Tick(latency)
if nattrs.Limit != 0 {
limit = nattrs.Limit
}
// Jitter is only value if latency is > 0
if latency > 0 {
jitter = time2Tick(jitter)
}
reorderProb = Percentage2u32(nattrs.ReorderProb)
reorderCorr = Percentage2u32(nattrs.ReorderCorr)
if reorderProb > 0 {
// ERROR if lantency == 0
if gap == 0 {
gap = 1
}
}
corruptProb = Percentage2u32(nattrs.CorruptProb)
corruptCorr = Percentage2u32(nattrs.CorruptCorr)
return &Netem{
QdiscAttrs: attrs,
Latency: latency,
DelayCorr: delayCorr,
Limit: limit,
Loss: loss,
LossCorr: lossCorr,
Gap: gap,
Duplicate: duplicate,
DuplicateCorr: duplicateCorr,
Jitter: jitter,
ReorderProb: reorderProb,
ReorderCorr: reorderCorr,
CorruptProb: corruptProb,
CorruptCorr: corruptCorr,
}
} | go | func NewNetem(attrs QdiscAttrs, nattrs NetemQdiscAttrs) *Netem {
var limit uint32 = 1000
var lossCorr, delayCorr, duplicateCorr uint32
var reorderProb, reorderCorr uint32
var corruptProb, corruptCorr uint32
latency := nattrs.Latency
loss := Percentage2u32(nattrs.Loss)
gap := nattrs.Gap
duplicate := Percentage2u32(nattrs.Duplicate)
jitter := nattrs.Jitter
// Correlation
if latency > 0 && jitter > 0 {
delayCorr = Percentage2u32(nattrs.DelayCorr)
}
if loss > 0 {
lossCorr = Percentage2u32(nattrs.LossCorr)
}
if duplicate > 0 {
duplicateCorr = Percentage2u32(nattrs.DuplicateCorr)
}
// FIXME should validate values(like loss/duplicate are percentages...)
latency = time2Tick(latency)
if nattrs.Limit != 0 {
limit = nattrs.Limit
}
// Jitter is only value if latency is > 0
if latency > 0 {
jitter = time2Tick(jitter)
}
reorderProb = Percentage2u32(nattrs.ReorderProb)
reorderCorr = Percentage2u32(nattrs.ReorderCorr)
if reorderProb > 0 {
// ERROR if lantency == 0
if gap == 0 {
gap = 1
}
}
corruptProb = Percentage2u32(nattrs.CorruptProb)
corruptCorr = Percentage2u32(nattrs.CorruptCorr)
return &Netem{
QdiscAttrs: attrs,
Latency: latency,
DelayCorr: delayCorr,
Limit: limit,
Loss: loss,
LossCorr: lossCorr,
Gap: gap,
Duplicate: duplicate,
DuplicateCorr: duplicateCorr,
Jitter: jitter,
ReorderProb: reorderProb,
ReorderCorr: reorderCorr,
CorruptProb: corruptProb,
CorruptCorr: corruptCorr,
}
} | [
"func",
"NewNetem",
"(",
"attrs",
"QdiscAttrs",
",",
"nattrs",
"NetemQdiscAttrs",
")",
"*",
"Netem",
"{",
"var",
"limit",
"uint32",
"=",
"1000",
"\n",
"var",
"lossCorr",
",",
"delayCorr",
",",
"duplicateCorr",
"uint32",
"\n",
"var",
"reorderProb",
",",
"reorderCorr",
"uint32",
"\n",
"var",
"corruptProb",
",",
"corruptCorr",
"uint32",
"\n\n",
"latency",
":=",
"nattrs",
".",
"Latency",
"\n",
"loss",
":=",
"Percentage2u32",
"(",
"nattrs",
".",
"Loss",
")",
"\n",
"gap",
":=",
"nattrs",
".",
"Gap",
"\n",
"duplicate",
":=",
"Percentage2u32",
"(",
"nattrs",
".",
"Duplicate",
")",
"\n",
"jitter",
":=",
"nattrs",
".",
"Jitter",
"\n\n",
"// Correlation",
"if",
"latency",
">",
"0",
"&&",
"jitter",
">",
"0",
"{",
"delayCorr",
"=",
"Percentage2u32",
"(",
"nattrs",
".",
"DelayCorr",
")",
"\n",
"}",
"\n",
"if",
"loss",
">",
"0",
"{",
"lossCorr",
"=",
"Percentage2u32",
"(",
"nattrs",
".",
"LossCorr",
")",
"\n",
"}",
"\n",
"if",
"duplicate",
">",
"0",
"{",
"duplicateCorr",
"=",
"Percentage2u32",
"(",
"nattrs",
".",
"DuplicateCorr",
")",
"\n",
"}",
"\n",
"// FIXME should validate values(like loss/duplicate are percentages...)",
"latency",
"=",
"time2Tick",
"(",
"latency",
")",
"\n\n",
"if",
"nattrs",
".",
"Limit",
"!=",
"0",
"{",
"limit",
"=",
"nattrs",
".",
"Limit",
"\n",
"}",
"\n",
"// Jitter is only value if latency is > 0",
"if",
"latency",
">",
"0",
"{",
"jitter",
"=",
"time2Tick",
"(",
"jitter",
")",
"\n",
"}",
"\n\n",
"reorderProb",
"=",
"Percentage2u32",
"(",
"nattrs",
".",
"ReorderProb",
")",
"\n",
"reorderCorr",
"=",
"Percentage2u32",
"(",
"nattrs",
".",
"ReorderCorr",
")",
"\n\n",
"if",
"reorderProb",
">",
"0",
"{",
"// ERROR if lantency == 0",
"if",
"gap",
"==",
"0",
"{",
"gap",
"=",
"1",
"\n",
"}",
"\n",
"}",
"\n\n",
"corruptProb",
"=",
"Percentage2u32",
"(",
"nattrs",
".",
"CorruptProb",
")",
"\n",
"corruptCorr",
"=",
"Percentage2u32",
"(",
"nattrs",
".",
"CorruptCorr",
")",
"\n\n",
"return",
"&",
"Netem",
"{",
"QdiscAttrs",
":",
"attrs",
",",
"Latency",
":",
"latency",
",",
"DelayCorr",
":",
"delayCorr",
",",
"Limit",
":",
"limit",
",",
"Loss",
":",
"loss",
",",
"LossCorr",
":",
"lossCorr",
",",
"Gap",
":",
"gap",
",",
"Duplicate",
":",
"duplicate",
",",
"DuplicateCorr",
":",
"duplicateCorr",
",",
"Jitter",
":",
"jitter",
",",
"ReorderProb",
":",
"reorderProb",
",",
"ReorderCorr",
":",
"reorderCorr",
",",
"CorruptProb",
":",
"corruptProb",
",",
"CorruptCorr",
":",
"corruptCorr",
",",
"}",
"\n",
"}"
] | // NOTE function is here because it uses other linux functions | [
"NOTE",
"function",
"is",
"here",
"because",
"it",
"uses",
"other",
"linux",
"functions"
] | fd97bf4e47867b5e794234baa6b8a7746135ec10 | https://github.com/vishvananda/netlink/blob/fd97bf4e47867b5e794234baa6b8a7746135ec10/qdisc_linux.go#L15-L77 | train |
vishvananda/netlink | handle_linux.go | SupportsNetlinkFamily | func (h *Handle) SupportsNetlinkFamily(nlFamily int) bool {
_, ok := h.sockets[nlFamily]
return ok
} | go | func (h *Handle) SupportsNetlinkFamily(nlFamily int) bool {
_, ok := h.sockets[nlFamily]
return ok
} | [
"func",
"(",
"h",
"*",
"Handle",
")",
"SupportsNetlinkFamily",
"(",
"nlFamily",
"int",
")",
"bool",
"{",
"_",
",",
"ok",
":=",
"h",
".",
"sockets",
"[",
"nlFamily",
"]",
"\n",
"return",
"ok",
"\n",
"}"
] | // SupportsNetlinkFamily reports whether the passed netlink family is supported by this Handle | [
"SupportsNetlinkFamily",
"reports",
"whether",
"the",
"passed",
"netlink",
"family",
"is",
"supported",
"by",
"this",
"Handle"
] | fd97bf4e47867b5e794234baa6b8a7746135ec10 | https://github.com/vishvananda/netlink/blob/fd97bf4e47867b5e794234baa6b8a7746135ec10/handle_linux.go#L25-L28 | train |
vishvananda/netlink | handle_linux.go | NewHandle | func NewHandle(nlFamilies ...int) (*Handle, error) {
return newHandle(netns.None(), netns.None(), nlFamilies...)
} | go | func NewHandle(nlFamilies ...int) (*Handle, error) {
return newHandle(netns.None(), netns.None(), nlFamilies...)
} | [
"func",
"NewHandle",
"(",
"nlFamilies",
"...",
"int",
")",
"(",
"*",
"Handle",
",",
"error",
")",
"{",
"return",
"newHandle",
"(",
"netns",
".",
"None",
"(",
")",
",",
"netns",
".",
"None",
"(",
")",
",",
"nlFamilies",
"...",
")",
"\n",
"}"
] | // NewHandle returns a netlink handle on the current network namespace.
// Caller may specify the netlink families the handle should support.
// If no families are specified, all the families the netlink package
// supports will be automatically added. | [
"NewHandle",
"returns",
"a",
"netlink",
"handle",
"on",
"the",
"current",
"network",
"namespace",
".",
"Caller",
"may",
"specify",
"the",
"netlink",
"families",
"the",
"handle",
"should",
"support",
".",
"If",
"no",
"families",
"are",
"specified",
"all",
"the",
"families",
"the",
"netlink",
"package",
"supports",
"will",
"be",
"automatically",
"added",
"."
] | fd97bf4e47867b5e794234baa6b8a7746135ec10 | https://github.com/vishvananda/netlink/blob/fd97bf4e47867b5e794234baa6b8a7746135ec10/handle_linux.go#L34-L36 | train |
vishvananda/netlink | handle_linux.go | SetSocketTimeout | func (h *Handle) SetSocketTimeout(to time.Duration) error {
if to < time.Microsecond {
return fmt.Errorf("invalid timeout, minimul value is %s", time.Microsecond)
}
tv := unix.NsecToTimeval(to.Nanoseconds())
for _, sh := range h.sockets {
if err := sh.Socket.SetSendTimeout(&tv); err != nil {
return err
}
if err := sh.Socket.SetReceiveTimeout(&tv); err != nil {
return err
}
}
return nil
} | go | func (h *Handle) SetSocketTimeout(to time.Duration) error {
if to < time.Microsecond {
return fmt.Errorf("invalid timeout, minimul value is %s", time.Microsecond)
}
tv := unix.NsecToTimeval(to.Nanoseconds())
for _, sh := range h.sockets {
if err := sh.Socket.SetSendTimeout(&tv); err != nil {
return err
}
if err := sh.Socket.SetReceiveTimeout(&tv); err != nil {
return err
}
}
return nil
} | [
"func",
"(",
"h",
"*",
"Handle",
")",
"SetSocketTimeout",
"(",
"to",
"time",
".",
"Duration",
")",
"error",
"{",
"if",
"to",
"<",
"time",
".",
"Microsecond",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"time",
".",
"Microsecond",
")",
"\n",
"}",
"\n",
"tv",
":=",
"unix",
".",
"NsecToTimeval",
"(",
"to",
".",
"Nanoseconds",
"(",
")",
")",
"\n",
"for",
"_",
",",
"sh",
":=",
"range",
"h",
".",
"sockets",
"{",
"if",
"err",
":=",
"sh",
".",
"Socket",
".",
"SetSendTimeout",
"(",
"&",
"tv",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"err",
":=",
"sh",
".",
"Socket",
".",
"SetReceiveTimeout",
"(",
"&",
"tv",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // SetSocketTimeout sets the send and receive timeout for each socket in the
// netlink handle. Although the socket timeout has granularity of one
// microsecond, the effective granularity is floored by the kernel timer tick,
// which default value is four milliseconds. | [
"SetSocketTimeout",
"sets",
"the",
"send",
"and",
"receive",
"timeout",
"for",
"each",
"socket",
"in",
"the",
"netlink",
"handle",
".",
"Although",
"the",
"socket",
"timeout",
"has",
"granularity",
"of",
"one",
"microsecond",
"the",
"effective",
"granularity",
"is",
"floored",
"by",
"the",
"kernel",
"timer",
"tick",
"which",
"default",
"value",
"is",
"four",
"milliseconds",
"."
] | fd97bf4e47867b5e794234baa6b8a7746135ec10 | https://github.com/vishvananda/netlink/blob/fd97bf4e47867b5e794234baa6b8a7746135ec10/handle_linux.go#L42-L56 | train |
vishvananda/netlink | handle_linux.go | GetSocketReceiveBufferSize | func (h *Handle) GetSocketReceiveBufferSize() ([]int, error) {
results := make([]int, len(h.sockets))
i := 0
for _, sh := range h.sockets {
fd := sh.Socket.GetFd()
size, err := unix.GetsockoptInt(fd, unix.SOL_SOCKET, unix.SO_RCVBUF)
if err != nil {
return nil, err
}
results[i] = size
i++
}
return results, nil
} | go | func (h *Handle) GetSocketReceiveBufferSize() ([]int, error) {
results := make([]int, len(h.sockets))
i := 0
for _, sh := range h.sockets {
fd := sh.Socket.GetFd()
size, err := unix.GetsockoptInt(fd, unix.SOL_SOCKET, unix.SO_RCVBUF)
if err != nil {
return nil, err
}
results[i] = size
i++
}
return results, nil
} | [
"func",
"(",
"h",
"*",
"Handle",
")",
"GetSocketReceiveBufferSize",
"(",
")",
"(",
"[",
"]",
"int",
",",
"error",
")",
"{",
"results",
":=",
"make",
"(",
"[",
"]",
"int",
",",
"len",
"(",
"h",
".",
"sockets",
")",
")",
"\n",
"i",
":=",
"0",
"\n",
"for",
"_",
",",
"sh",
":=",
"range",
"h",
".",
"sockets",
"{",
"fd",
":=",
"sh",
".",
"Socket",
".",
"GetFd",
"(",
")",
"\n",
"size",
",",
"err",
":=",
"unix",
".",
"GetsockoptInt",
"(",
"fd",
",",
"unix",
".",
"SOL_SOCKET",
",",
"unix",
".",
"SO_RCVBUF",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"results",
"[",
"i",
"]",
"=",
"size",
"\n",
"i",
"++",
"\n",
"}",
"\n",
"return",
"results",
",",
"nil",
"\n",
"}"
] | // GetSocketReceiveBufferSize gets the receiver buffer size for each
// socket in the netlink handle. The retrieved value should be the
// double to the one set for SetSocketReceiveBufferSize. | [
"GetSocketReceiveBufferSize",
"gets",
"the",
"receiver",
"buffer",
"size",
"for",
"each",
"socket",
"in",
"the",
"netlink",
"handle",
".",
"The",
"retrieved",
"value",
"should",
"be",
"the",
"double",
"to",
"the",
"one",
"set",
"for",
"SetSocketReceiveBufferSize",
"."
] | fd97bf4e47867b5e794234baa6b8a7746135ec10 | https://github.com/vishvananda/netlink/blob/fd97bf4e47867b5e794234baa6b8a7746135ec10/handle_linux.go#L79-L92 | train |
vishvananda/netlink | handle_linux.go | NewHandleAtFrom | func NewHandleAtFrom(newNs, curNs netns.NsHandle) (*Handle, error) {
return newHandle(newNs, curNs)
} | go | func NewHandleAtFrom(newNs, curNs netns.NsHandle) (*Handle, error) {
return newHandle(newNs, curNs)
} | [
"func",
"NewHandleAtFrom",
"(",
"newNs",
",",
"curNs",
"netns",
".",
"NsHandle",
")",
"(",
"*",
"Handle",
",",
"error",
")",
"{",
"return",
"newHandle",
"(",
"newNs",
",",
"curNs",
")",
"\n",
"}"
] | // NewHandleAtFrom works as NewHandle but allows client to specify the
// new and the origin netns Handle. | [
"NewHandleAtFrom",
"works",
"as",
"NewHandle",
"but",
"allows",
"client",
"to",
"specify",
"the",
"new",
"and",
"the",
"origin",
"netns",
"Handle",
"."
] | fd97bf4e47867b5e794234baa6b8a7746135ec10 | https://github.com/vishvananda/netlink/blob/fd97bf4e47867b5e794234baa6b8a7746135ec10/handle_linux.go#L103-L105 | train |
vishvananda/netlink | handle_linux.go | Delete | func (h *Handle) Delete() {
for _, sh := range h.sockets {
sh.Close()
}
h.sockets = nil
} | go | func (h *Handle) Delete() {
for _, sh := range h.sockets {
sh.Close()
}
h.sockets = nil
} | [
"func",
"(",
"h",
"*",
"Handle",
")",
"Delete",
"(",
")",
"{",
"for",
"_",
",",
"sh",
":=",
"range",
"h",
".",
"sockets",
"{",
"sh",
".",
"Close",
"(",
")",
"\n",
"}",
"\n",
"h",
".",
"sockets",
"=",
"nil",
"\n",
"}"
] | // Delete releases the resources allocated to this handle | [
"Delete",
"releases",
"the",
"resources",
"allocated",
"to",
"this",
"handle"
] | fd97bf4e47867b5e794234baa6b8a7746135ec10 | https://github.com/vishvananda/netlink/blob/fd97bf4e47867b5e794234baa6b8a7746135ec10/handle_linux.go#L124-L129 | train |
kubernetes-incubator/external-storage | snapshot/pkg/controller/cache/util.go | MakeSnapshotName | func MakeSnapshotName(snapshot *crdv1.VolumeSnapshot) string {
return snapshot.Metadata.Namespace + "/" + snapshot.Metadata.Name + "-" + string(snapshot.Metadata.UID)
} | go | func MakeSnapshotName(snapshot *crdv1.VolumeSnapshot) string {
return snapshot.Metadata.Namespace + "/" + snapshot.Metadata.Name + "-" + string(snapshot.Metadata.UID)
} | [
"func",
"MakeSnapshotName",
"(",
"snapshot",
"*",
"crdv1",
".",
"VolumeSnapshot",
")",
"string",
"{",
"return",
"snapshot",
".",
"Metadata",
".",
"Namespace",
"+",
"\"",
"\"",
"+",
"snapshot",
".",
"Metadata",
".",
"Name",
"+",
"\"",
"\"",
"+",
"string",
"(",
"snapshot",
".",
"Metadata",
".",
"UID",
")",
"\n",
"}"
] | // MakeSnapshotName makes a full name for a snapshot that includes
// the namespace and the short name | [
"MakeSnapshotName",
"makes",
"a",
"full",
"name",
"for",
"a",
"snapshot",
"that",
"includes",
"the",
"namespace",
"and",
"the",
"short",
"name"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/controller/cache/util.go#L30-L32 | train |
kubernetes-incubator/external-storage | gluster/glusterfs/pkg/volume/config.go | NewProvisionerConfig | func NewProvisionerConfig(pvName string, params map[string]string) (*ProvisionerConfig, error) {
var config ProvisionerConfig
var err error
// Set default volume type
forceCreate := false
volumeType := ""
namespace := "default"
selector := "glusterfs-node==pod"
var brickRootPaths []BrickRootPath
for k, v := range params {
switch strings.ToLower(k) {
case "brickrootpaths":
brickRootPaths, err = parseBrickRootPaths(v)
if err != nil {
return nil, err
}
case "volumetype":
volumeType = strings.TrimSpace(v)
case "namespace":
namespace = strings.TrimSpace(v)
case "selector":
selector = strings.TrimSpace(v)
case "forcecreate":
v = strings.TrimSpace(v)
forceCreate = strings.ToLower(v) == "true"
}
}
config.BrickRootPaths = brickRootPaths
config.VolumeName = pvName
config.VolumeType = volumeType
config.Namespace = namespace
config.LabelSelector = selector
config.ForceCreate = forceCreate
err = config.validate()
if err != nil {
return nil, err
}
return &config, nil
} | go | func NewProvisionerConfig(pvName string, params map[string]string) (*ProvisionerConfig, error) {
var config ProvisionerConfig
var err error
// Set default volume type
forceCreate := false
volumeType := ""
namespace := "default"
selector := "glusterfs-node==pod"
var brickRootPaths []BrickRootPath
for k, v := range params {
switch strings.ToLower(k) {
case "brickrootpaths":
brickRootPaths, err = parseBrickRootPaths(v)
if err != nil {
return nil, err
}
case "volumetype":
volumeType = strings.TrimSpace(v)
case "namespace":
namespace = strings.TrimSpace(v)
case "selector":
selector = strings.TrimSpace(v)
case "forcecreate":
v = strings.TrimSpace(v)
forceCreate = strings.ToLower(v) == "true"
}
}
config.BrickRootPaths = brickRootPaths
config.VolumeName = pvName
config.VolumeType = volumeType
config.Namespace = namespace
config.LabelSelector = selector
config.ForceCreate = forceCreate
err = config.validate()
if err != nil {
return nil, err
}
return &config, nil
} | [
"func",
"NewProvisionerConfig",
"(",
"pvName",
"string",
",",
"params",
"map",
"[",
"string",
"]",
"string",
")",
"(",
"*",
"ProvisionerConfig",
",",
"error",
")",
"{",
"var",
"config",
"ProvisionerConfig",
"\n",
"var",
"err",
"error",
"\n\n",
"// Set default volume type",
"forceCreate",
":=",
"false",
"\n",
"volumeType",
":=",
"\"",
"\"",
"\n",
"namespace",
":=",
"\"",
"\"",
"\n",
"selector",
":=",
"\"",
"\"",
"\n",
"var",
"brickRootPaths",
"[",
"]",
"BrickRootPath",
"\n\n",
"for",
"k",
",",
"v",
":=",
"range",
"params",
"{",
"switch",
"strings",
".",
"ToLower",
"(",
"k",
")",
"{",
"case",
"\"",
"\"",
":",
"brickRootPaths",
",",
"err",
"=",
"parseBrickRootPaths",
"(",
"v",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"case",
"\"",
"\"",
":",
"volumeType",
"=",
"strings",
".",
"TrimSpace",
"(",
"v",
")",
"\n",
"case",
"\"",
"\"",
":",
"namespace",
"=",
"strings",
".",
"TrimSpace",
"(",
"v",
")",
"\n",
"case",
"\"",
"\"",
":",
"selector",
"=",
"strings",
".",
"TrimSpace",
"(",
"v",
")",
"\n",
"case",
"\"",
"\"",
":",
"v",
"=",
"strings",
".",
"TrimSpace",
"(",
"v",
")",
"\n",
"forceCreate",
"=",
"strings",
".",
"ToLower",
"(",
"v",
")",
"==",
"\"",
"\"",
"\n",
"}",
"\n",
"}",
"\n\n",
"config",
".",
"BrickRootPaths",
"=",
"brickRootPaths",
"\n",
"config",
".",
"VolumeName",
"=",
"pvName",
"\n",
"config",
".",
"VolumeType",
"=",
"volumeType",
"\n",
"config",
".",
"Namespace",
"=",
"namespace",
"\n",
"config",
".",
"LabelSelector",
"=",
"selector",
"\n",
"config",
".",
"ForceCreate",
"=",
"forceCreate",
"\n\n",
"err",
"=",
"config",
".",
"validate",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"config",
",",
"nil",
"\n",
"}"
] | // NewProvisionerConfig create ProvisionerConfig from parameters of StorageClass | [
"NewProvisionerConfig",
"create",
"ProvisionerConfig",
"from",
"parameters",
"of",
"StorageClass"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/gluster/glusterfs/pkg/volume/config.go#L41-L84 | train |
kubernetes-incubator/external-storage | nfs/pkg/volume/export.go | Export | func (e *ganeshaExporter) Export(path string) error {
// Call AddExport using dbus
conn, err := dbus.SystemBus()
if err != nil {
return fmt.Errorf("error getting dbus session bus: %v", err)
}
obj := conn.Object("org.ganesha.nfsd", "/org/ganesha/nfsd/ExportMgr")
call := obj.Call("org.ganesha.nfsd.exportmgr.AddExport", 0, e.config, fmt.Sprintf("export(path = %s)", path))
if call.Err != nil {
return fmt.Errorf("error calling org.ganesha.nfsd.exportmgr.AddExport: %v", call.Err)
}
return nil
} | go | func (e *ganeshaExporter) Export(path string) error {
// Call AddExport using dbus
conn, err := dbus.SystemBus()
if err != nil {
return fmt.Errorf("error getting dbus session bus: %v", err)
}
obj := conn.Object("org.ganesha.nfsd", "/org/ganesha/nfsd/ExportMgr")
call := obj.Call("org.ganesha.nfsd.exportmgr.AddExport", 0, e.config, fmt.Sprintf("export(path = %s)", path))
if call.Err != nil {
return fmt.Errorf("error calling org.ganesha.nfsd.exportmgr.AddExport: %v", call.Err)
}
return nil
} | [
"func",
"(",
"e",
"*",
"ganeshaExporter",
")",
"Export",
"(",
"path",
"string",
")",
"error",
"{",
"// Call AddExport using dbus",
"conn",
",",
"err",
":=",
"dbus",
".",
"SystemBus",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"obj",
":=",
"conn",
".",
"Object",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"call",
":=",
"obj",
".",
"Call",
"(",
"\"",
"\"",
",",
"0",
",",
"e",
".",
"config",
",",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"path",
")",
")",
"\n",
"if",
"call",
".",
"Err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"call",
".",
"Err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Export exports the given directory using NFS Ganesha, assuming it is running
// and can be connected to using D-Bus. | [
"Export",
"exports",
"the",
"given",
"directory",
"using",
"NFS",
"Ganesha",
"assuming",
"it",
"is",
"running",
"and",
"can",
"be",
"connected",
"to",
"using",
"D",
"-",
"Bus",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/nfs/pkg/volume/export.go#L123-L136 | train |
kubernetes-incubator/external-storage | snapshot/pkg/controller/reconciler/reconciler.go | NewReconciler | func NewReconciler(
loopPeriod time.Duration,
syncDuration time.Duration,
disableReconciliationSync bool,
desiredStateOfWorld cache.DesiredStateOfWorld,
actualStateOfWorld cache.ActualStateOfWorld,
snapshotter snapshotter.VolumeSnapshotter) Reconciler {
return &reconciler{
loopPeriod: loopPeriod,
syncDuration: syncDuration,
disableReconciliationSync: disableReconciliationSync,
desiredStateOfWorld: desiredStateOfWorld,
actualStateOfWorld: actualStateOfWorld,
snapshotter: snapshotter,
timeOfLastSync: time.Now(),
}
} | go | func NewReconciler(
loopPeriod time.Duration,
syncDuration time.Duration,
disableReconciliationSync bool,
desiredStateOfWorld cache.DesiredStateOfWorld,
actualStateOfWorld cache.ActualStateOfWorld,
snapshotter snapshotter.VolumeSnapshotter) Reconciler {
return &reconciler{
loopPeriod: loopPeriod,
syncDuration: syncDuration,
disableReconciliationSync: disableReconciliationSync,
desiredStateOfWorld: desiredStateOfWorld,
actualStateOfWorld: actualStateOfWorld,
snapshotter: snapshotter,
timeOfLastSync: time.Now(),
}
} | [
"func",
"NewReconciler",
"(",
"loopPeriod",
"time",
".",
"Duration",
",",
"syncDuration",
"time",
".",
"Duration",
",",
"disableReconciliationSync",
"bool",
",",
"desiredStateOfWorld",
"cache",
".",
"DesiredStateOfWorld",
",",
"actualStateOfWorld",
"cache",
".",
"ActualStateOfWorld",
",",
"snapshotter",
"snapshotter",
".",
"VolumeSnapshotter",
")",
"Reconciler",
"{",
"return",
"&",
"reconciler",
"{",
"loopPeriod",
":",
"loopPeriod",
",",
"syncDuration",
":",
"syncDuration",
",",
"disableReconciliationSync",
":",
"disableReconciliationSync",
",",
"desiredStateOfWorld",
":",
"desiredStateOfWorld",
",",
"actualStateOfWorld",
":",
"actualStateOfWorld",
",",
"snapshotter",
":",
"snapshotter",
",",
"timeOfLastSync",
":",
"time",
".",
"Now",
"(",
")",
",",
"}",
"\n",
"}"
] | // NewReconciler is the constructor of Reconciler | [
"NewReconciler",
"is",
"the",
"constructor",
"of",
"Reconciler"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/controller/reconciler/reconciler.go#L52-L68 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/aws/retry_handler.go | AfterRetry | func (c *CrossRequestRetryDelay) AfterRetry(r *request.Request) {
if r.Error == nil {
return
}
awsError, ok := r.Error.(awserr.Error)
if !ok {
return
}
if awsError.Code() == "RequestLimitExceeded" {
c.backoff.ReportError()
glog.Warningf("Got RequestLimitExceeded error on AWS request (%s)",
describeRequest(r))
}
} | go | func (c *CrossRequestRetryDelay) AfterRetry(r *request.Request) {
if r.Error == nil {
return
}
awsError, ok := r.Error.(awserr.Error)
if !ok {
return
}
if awsError.Code() == "RequestLimitExceeded" {
c.backoff.ReportError()
glog.Warningf("Got RequestLimitExceeded error on AWS request (%s)",
describeRequest(r))
}
} | [
"func",
"(",
"c",
"*",
"CrossRequestRetryDelay",
")",
"AfterRetry",
"(",
"r",
"*",
"request",
".",
"Request",
")",
"{",
"if",
"r",
".",
"Error",
"==",
"nil",
"{",
"return",
"\n",
"}",
"\n",
"awsError",
",",
"ok",
":=",
"r",
".",
"Error",
".",
"(",
"awserr",
".",
"Error",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"\n",
"}",
"\n",
"if",
"awsError",
".",
"Code",
"(",
")",
"==",
"\"",
"\"",
"{",
"c",
".",
"backoff",
".",
"ReportError",
"(",
")",
"\n",
"glog",
".",
"Warningf",
"(",
"\"",
"\"",
",",
"describeRequest",
"(",
"r",
")",
")",
"\n",
"}",
"\n",
"}"
] | // AfterRetry is added to the AfterRetry chain; called after any error | [
"AfterRetry",
"is",
"added",
"to",
"the",
"AfterRetry",
"chain",
";",
"called",
"after",
"any",
"error"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/aws/retry_handler.go#L76-L89 | train |
kubernetes-incubator/external-storage | snapshot/pkg/volume/cinder/processor.go | Init | func (c *cinderPlugin) Init(cloud cloudprovider.Interface) {
c.cloud = cloud.(*openstack.OpenStack)
} | go | func (c *cinderPlugin) Init(cloud cloudprovider.Interface) {
c.cloud = cloud.(*openstack.OpenStack)
} | [
"func",
"(",
"c",
"*",
"cinderPlugin",
")",
"Init",
"(",
"cloud",
"cloudprovider",
".",
"Interface",
")",
"{",
"c",
".",
"cloud",
"=",
"cloud",
".",
"(",
"*",
"openstack",
".",
"OpenStack",
")",
"\n",
"}"
] | // Init inits volume plugin | [
"Init",
"inits",
"volume",
"plugin"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/volume/cinder/processor.go#L43-L45 | train |
kubernetes-incubator/external-storage | snapshot/pkg/volume/cinder/processor.go | VolumeDelete | func (c *cinderPlugin) VolumeDelete(pv *v1.PersistentVolume) error {
if pv == nil || pv.Spec.Cinder == nil {
return fmt.Errorf("invalid Cinder PV: %v", pv)
}
volumeID := pv.Spec.Cinder.VolumeID
err := c.cloud.DeleteVolume(volumeID)
if err != nil {
return err
}
return nil
} | go | func (c *cinderPlugin) VolumeDelete(pv *v1.PersistentVolume) error {
if pv == nil || pv.Spec.Cinder == nil {
return fmt.Errorf("invalid Cinder PV: %v", pv)
}
volumeID := pv.Spec.Cinder.VolumeID
err := c.cloud.DeleteVolume(volumeID)
if err != nil {
return err
}
return nil
} | [
"func",
"(",
"c",
"*",
"cinderPlugin",
")",
"VolumeDelete",
"(",
"pv",
"*",
"v1",
".",
"PersistentVolume",
")",
"error",
"{",
"if",
"pv",
"==",
"nil",
"||",
"pv",
".",
"Spec",
".",
"Cinder",
"==",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"pv",
")",
"\n",
"}",
"\n",
"volumeID",
":=",
"pv",
".",
"Spec",
".",
"Cinder",
".",
"VolumeID",
"\n",
"err",
":=",
"c",
".",
"cloud",
".",
"DeleteVolume",
"(",
"volumeID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // VolumeDelete deletes the specified volume passed on pv | [
"VolumeDelete",
"deletes",
"the",
"specified",
"volume",
"passed",
"on",
"pv"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/volume/cinder/processor.go#L58-L69 | train |
kubernetes-incubator/external-storage | snapshot/pkg/volume/cinder/processor.go | SnapshotCreate | func (c *cinderPlugin) SnapshotCreate(
snapshot *crdv1.VolumeSnapshot,
pv *v1.PersistentVolume,
tags *map[string]string,
) (*crdv1.VolumeSnapshotDataSource, *[]crdv1.VolumeSnapshotCondition, error) {
spec := &pv.Spec
if spec == nil || spec.Cinder == nil {
return nil, nil, fmt.Errorf("invalid PV spec %v", spec)
}
volumeID := spec.Cinder.VolumeID
snapshotName := string(pv.Name) + fmt.Sprintf("%d", time.Now().UnixNano())
snapshotDescription := "kubernetes snapshot"
glog.Infof("issuing Cinder.CreateSnapshot - SourceVol: %s, Name: %s, tags: %#v", volumeID, snapshotName, *tags)
snapID, status, err := c.cloud.CreateSnapshot(volumeID, snapshotName, snapshotDescription, *tags)
if err != nil {
return nil, nil, err
}
return &crdv1.VolumeSnapshotDataSource{
CinderSnapshot: &crdv1.CinderVolumeSnapshotSource{
SnapshotID: snapID,
},
}, c.convertSnapshotStatus(status), nil
} | go | func (c *cinderPlugin) SnapshotCreate(
snapshot *crdv1.VolumeSnapshot,
pv *v1.PersistentVolume,
tags *map[string]string,
) (*crdv1.VolumeSnapshotDataSource, *[]crdv1.VolumeSnapshotCondition, error) {
spec := &pv.Spec
if spec == nil || spec.Cinder == nil {
return nil, nil, fmt.Errorf("invalid PV spec %v", spec)
}
volumeID := spec.Cinder.VolumeID
snapshotName := string(pv.Name) + fmt.Sprintf("%d", time.Now().UnixNano())
snapshotDescription := "kubernetes snapshot"
glog.Infof("issuing Cinder.CreateSnapshot - SourceVol: %s, Name: %s, tags: %#v", volumeID, snapshotName, *tags)
snapID, status, err := c.cloud.CreateSnapshot(volumeID, snapshotName, snapshotDescription, *tags)
if err != nil {
return nil, nil, err
}
return &crdv1.VolumeSnapshotDataSource{
CinderSnapshot: &crdv1.CinderVolumeSnapshotSource{
SnapshotID: snapID,
},
}, c.convertSnapshotStatus(status), nil
} | [
"func",
"(",
"c",
"*",
"cinderPlugin",
")",
"SnapshotCreate",
"(",
"snapshot",
"*",
"crdv1",
".",
"VolumeSnapshot",
",",
"pv",
"*",
"v1",
".",
"PersistentVolume",
",",
"tags",
"*",
"map",
"[",
"string",
"]",
"string",
",",
")",
"(",
"*",
"crdv1",
".",
"VolumeSnapshotDataSource",
",",
"*",
"[",
"]",
"crdv1",
".",
"VolumeSnapshotCondition",
",",
"error",
")",
"{",
"spec",
":=",
"&",
"pv",
".",
"Spec",
"\n",
"if",
"spec",
"==",
"nil",
"||",
"spec",
".",
"Cinder",
"==",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"spec",
")",
"\n",
"}",
"\n",
"volumeID",
":=",
"spec",
".",
"Cinder",
".",
"VolumeID",
"\n",
"snapshotName",
":=",
"string",
"(",
"pv",
".",
"Name",
")",
"+",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"time",
".",
"Now",
"(",
")",
".",
"UnixNano",
"(",
")",
")",
"\n",
"snapshotDescription",
":=",
"\"",
"\"",
"\n",
"glog",
".",
"Infof",
"(",
"\"",
"\"",
",",
"volumeID",
",",
"snapshotName",
",",
"*",
"tags",
")",
"\n",
"snapID",
",",
"status",
",",
"err",
":=",
"c",
".",
"cloud",
".",
"CreateSnapshot",
"(",
"volumeID",
",",
"snapshotName",
",",
"snapshotDescription",
",",
"*",
"tags",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"crdv1",
".",
"VolumeSnapshotDataSource",
"{",
"CinderSnapshot",
":",
"&",
"crdv1",
".",
"CinderVolumeSnapshotSource",
"{",
"SnapshotID",
":",
"snapID",
",",
"}",
",",
"}",
",",
"c",
".",
"convertSnapshotStatus",
"(",
"status",
")",
",",
"nil",
"\n",
"}"
] | // SnapshotCreate creates a VolumeSnapshot from a PersistentVolumeSpec | [
"SnapshotCreate",
"creates",
"a",
"VolumeSnapshot",
"from",
"a",
"PersistentVolumeSpec"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/volume/cinder/processor.go#L72-L95 | train |
kubernetes-incubator/external-storage | snapshot/pkg/volume/cinder/processor.go | SnapshotDelete | func (c *cinderPlugin) SnapshotDelete(src *crdv1.VolumeSnapshotDataSource, _ *v1.PersistentVolume) error {
if src == nil || src.CinderSnapshot == nil {
return fmt.Errorf("invalid VolumeSnapshotDataSource: %v", src)
}
snapshotID := src.CinderSnapshot.SnapshotID
err := c.cloud.DeleteSnapshot(snapshotID)
if err != nil {
return err
}
return nil
} | go | func (c *cinderPlugin) SnapshotDelete(src *crdv1.VolumeSnapshotDataSource, _ *v1.PersistentVolume) error {
if src == nil || src.CinderSnapshot == nil {
return fmt.Errorf("invalid VolumeSnapshotDataSource: %v", src)
}
snapshotID := src.CinderSnapshot.SnapshotID
err := c.cloud.DeleteSnapshot(snapshotID)
if err != nil {
return err
}
return nil
} | [
"func",
"(",
"c",
"*",
"cinderPlugin",
")",
"SnapshotDelete",
"(",
"src",
"*",
"crdv1",
".",
"VolumeSnapshotDataSource",
",",
"_",
"*",
"v1",
".",
"PersistentVolume",
")",
"error",
"{",
"if",
"src",
"==",
"nil",
"||",
"src",
".",
"CinderSnapshot",
"==",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"src",
")",
"\n",
"}",
"\n",
"snapshotID",
":=",
"src",
".",
"CinderSnapshot",
".",
"SnapshotID",
"\n",
"err",
":=",
"c",
".",
"cloud",
".",
"DeleteSnapshot",
"(",
"snapshotID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // SnapshotDelete deletes a VolumeSnapshot
// PersistentVolume is provided for volume types, if any, that need PV Spec to delete snapshot | [
"SnapshotDelete",
"deletes",
"a",
"VolumeSnapshot",
"PersistentVolume",
"is",
"provided",
"for",
"volume",
"types",
"if",
"any",
"that",
"need",
"PV",
"Spec",
"to",
"delete",
"snapshot"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/volume/cinder/processor.go#L99-L109 | train |
kubernetes-incubator/external-storage | snapshot/pkg/volume/cinder/processor.go | SnapshotRestore | func (c *cinderPlugin) SnapshotRestore(snapshotData *crdv1.VolumeSnapshotData, pvc *v1.PersistentVolumeClaim, pvName string, parameters map[string]string) (*v1.PersistentVolumeSource, map[string]string, error) {
var tags = make(map[string]string)
var vType string
var zone string
if snapshotData == nil || snapshotData.Spec.CinderSnapshot == nil {
return nil, nil, fmt.Errorf("failed to retrieve Snapshot spec")
}
if pvc == nil {
return nil, nil, fmt.Errorf("no pvc specified")
}
snapID := snapshotData.Spec.CinderSnapshot.SnapshotID
volName := pvName
capacity := pvc.Spec.Resources.Requests[v1.ResourceName(v1.ResourceStorage)]
requestedSz := capacity.Value()
szGB := k8sVol.RoundUpSize(requestedSz, 1024*1024*1024)
for k, v := range parameters {
switch strings.ToLower(k) {
case "type":
vType = v
case "zone":
zone = v
default:
return nil, nil, fmt.Errorf("invalid option %q for volume plugin %s", k, GetPluginName())
}
}
// FIXME(j-griffith): Should probably use int64 in gophercloud?
volumeID, _, err := c.cloud.CreateVolume(volName, int(szGB), vType, zone, snapID, &tags)
if err != nil {
glog.Errorf("error create volume from snapshot: %v", err)
return nil, nil, err
}
glog.V(2).Infof("Successfully created Cinder Volume from Snapshot, Volume: %s", volumeID)
pv := &v1.PersistentVolumeSource{
Cinder: &v1.CinderPersistentVolumeSource{
VolumeID: volumeID,
FSType: "ext4",
ReadOnly: false,
},
}
return pv, nil, nil
} | go | func (c *cinderPlugin) SnapshotRestore(snapshotData *crdv1.VolumeSnapshotData, pvc *v1.PersistentVolumeClaim, pvName string, parameters map[string]string) (*v1.PersistentVolumeSource, map[string]string, error) {
var tags = make(map[string]string)
var vType string
var zone string
if snapshotData == nil || snapshotData.Spec.CinderSnapshot == nil {
return nil, nil, fmt.Errorf("failed to retrieve Snapshot spec")
}
if pvc == nil {
return nil, nil, fmt.Errorf("no pvc specified")
}
snapID := snapshotData.Spec.CinderSnapshot.SnapshotID
volName := pvName
capacity := pvc.Spec.Resources.Requests[v1.ResourceName(v1.ResourceStorage)]
requestedSz := capacity.Value()
szGB := k8sVol.RoundUpSize(requestedSz, 1024*1024*1024)
for k, v := range parameters {
switch strings.ToLower(k) {
case "type":
vType = v
case "zone":
zone = v
default:
return nil, nil, fmt.Errorf("invalid option %q for volume plugin %s", k, GetPluginName())
}
}
// FIXME(j-griffith): Should probably use int64 in gophercloud?
volumeID, _, err := c.cloud.CreateVolume(volName, int(szGB), vType, zone, snapID, &tags)
if err != nil {
glog.Errorf("error create volume from snapshot: %v", err)
return nil, nil, err
}
glog.V(2).Infof("Successfully created Cinder Volume from Snapshot, Volume: %s", volumeID)
pv := &v1.PersistentVolumeSource{
Cinder: &v1.CinderPersistentVolumeSource{
VolumeID: volumeID,
FSType: "ext4",
ReadOnly: false,
},
}
return pv, nil, nil
} | [
"func",
"(",
"c",
"*",
"cinderPlugin",
")",
"SnapshotRestore",
"(",
"snapshotData",
"*",
"crdv1",
".",
"VolumeSnapshotData",
",",
"pvc",
"*",
"v1",
".",
"PersistentVolumeClaim",
",",
"pvName",
"string",
",",
"parameters",
"map",
"[",
"string",
"]",
"string",
")",
"(",
"*",
"v1",
".",
"PersistentVolumeSource",
",",
"map",
"[",
"string",
"]",
"string",
",",
"error",
")",
"{",
"var",
"tags",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"string",
")",
"\n",
"var",
"vType",
"string",
"\n",
"var",
"zone",
"string",
"\n\n",
"if",
"snapshotData",
"==",
"nil",
"||",
"snapshotData",
".",
"Spec",
".",
"CinderSnapshot",
"==",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"pvc",
"==",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"snapID",
":=",
"snapshotData",
".",
"Spec",
".",
"CinderSnapshot",
".",
"SnapshotID",
"\n",
"volName",
":=",
"pvName",
"\n",
"capacity",
":=",
"pvc",
".",
"Spec",
".",
"Resources",
".",
"Requests",
"[",
"v1",
".",
"ResourceName",
"(",
"v1",
".",
"ResourceStorage",
")",
"]",
"\n",
"requestedSz",
":=",
"capacity",
".",
"Value",
"(",
")",
"\n",
"szGB",
":=",
"k8sVol",
".",
"RoundUpSize",
"(",
"requestedSz",
",",
"1024",
"*",
"1024",
"*",
"1024",
")",
"\n\n",
"for",
"k",
",",
"v",
":=",
"range",
"parameters",
"{",
"switch",
"strings",
".",
"ToLower",
"(",
"k",
")",
"{",
"case",
"\"",
"\"",
":",
"vType",
"=",
"v",
"\n",
"case",
"\"",
"\"",
":",
"zone",
"=",
"v",
"\n",
"default",
":",
"return",
"nil",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"k",
",",
"GetPluginName",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"// FIXME(j-griffith): Should probably use int64 in gophercloud?",
"volumeID",
",",
"_",
",",
"err",
":=",
"c",
".",
"cloud",
".",
"CreateVolume",
"(",
"volName",
",",
"int",
"(",
"szGB",
")",
",",
"vType",
",",
"zone",
",",
"snapID",
",",
"&",
"tags",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"glog",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"glog",
".",
"V",
"(",
"2",
")",
".",
"Infof",
"(",
"\"",
"\"",
",",
"volumeID",
")",
"\n",
"pv",
":=",
"&",
"v1",
".",
"PersistentVolumeSource",
"{",
"Cinder",
":",
"&",
"v1",
".",
"CinderPersistentVolumeSource",
"{",
"VolumeID",
":",
"volumeID",
",",
"FSType",
":",
"\"",
"\"",
",",
"ReadOnly",
":",
"false",
",",
"}",
",",
"}",
"\n",
"return",
"pv",
",",
"nil",
",",
"nil",
"\n",
"}"
] | // SnapshotRestore creates a new Volume using the data on the specified Snapshot | [
"SnapshotRestore",
"creates",
"a",
"new",
"Volume",
"using",
"the",
"data",
"on",
"the",
"specified",
"Snapshot"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/volume/cinder/processor.go#L112-L155 | train |
kubernetes-incubator/external-storage | snapshot/pkg/volume/cinder/processor.go | DescribeSnapshot | func (c *cinderPlugin) DescribeSnapshot(snapshotData *crdv1.VolumeSnapshotData) (*[]crdv1.VolumeSnapshotCondition, bool, error) {
if snapshotData == nil || snapshotData.Spec.CinderSnapshot == nil {
return nil, false, fmt.Errorf("invalid VolumeSnapshotDataSource: %v", snapshotData)
}
snapshotID := snapshotData.Spec.CinderSnapshot.SnapshotID
status, isComplete, err := c.cloud.DescribeSnapshot(snapshotID)
glog.Infof("DescribeSnapshot: Snapshot %s, Status %s, isComplete: %v", snapshotID, status, isComplete)
if err != nil {
return c.convertSnapshotStatus(status), false, err
}
return c.convertSnapshotStatus(status), isComplete, nil
} | go | func (c *cinderPlugin) DescribeSnapshot(snapshotData *crdv1.VolumeSnapshotData) (*[]crdv1.VolumeSnapshotCondition, bool, error) {
if snapshotData == nil || snapshotData.Spec.CinderSnapshot == nil {
return nil, false, fmt.Errorf("invalid VolumeSnapshotDataSource: %v", snapshotData)
}
snapshotID := snapshotData.Spec.CinderSnapshot.SnapshotID
status, isComplete, err := c.cloud.DescribeSnapshot(snapshotID)
glog.Infof("DescribeSnapshot: Snapshot %s, Status %s, isComplete: %v", snapshotID, status, isComplete)
if err != nil {
return c.convertSnapshotStatus(status), false, err
}
return c.convertSnapshotStatus(status), isComplete, nil
} | [
"func",
"(",
"c",
"*",
"cinderPlugin",
")",
"DescribeSnapshot",
"(",
"snapshotData",
"*",
"crdv1",
".",
"VolumeSnapshotData",
")",
"(",
"*",
"[",
"]",
"crdv1",
".",
"VolumeSnapshotCondition",
",",
"bool",
",",
"error",
")",
"{",
"if",
"snapshotData",
"==",
"nil",
"||",
"snapshotData",
".",
"Spec",
".",
"CinderSnapshot",
"==",
"nil",
"{",
"return",
"nil",
",",
"false",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"snapshotData",
")",
"\n",
"}",
"\n",
"snapshotID",
":=",
"snapshotData",
".",
"Spec",
".",
"CinderSnapshot",
".",
"SnapshotID",
"\n",
"status",
",",
"isComplete",
",",
"err",
":=",
"c",
".",
"cloud",
".",
"DescribeSnapshot",
"(",
"snapshotID",
")",
"\n",
"glog",
".",
"Infof",
"(",
"\"",
"\"",
",",
"snapshotID",
",",
"status",
",",
"isComplete",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"c",
".",
"convertSnapshotStatus",
"(",
"status",
")",
",",
"false",
",",
"err",
"\n",
"}",
"\n",
"return",
"c",
".",
"convertSnapshotStatus",
"(",
"status",
")",
",",
"isComplete",
",",
"nil",
"\n",
"}"
] | // DescribeSnapshot retrieves info for the specified Snapshot | [
"DescribeSnapshot",
"retrieves",
"info",
"for",
"the",
"specified",
"Snapshot"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/volume/cinder/processor.go#L158-L169 | train |
kubernetes-incubator/external-storage | snapshot/pkg/volume/cinder/processor.go | convertSnapshotStatus | func (c *cinderPlugin) convertSnapshotStatus(status string) *[]crdv1.VolumeSnapshotCondition {
var snapConditions []crdv1.VolumeSnapshotCondition
if status == "available" {
snapConditions = []crdv1.VolumeSnapshotCondition{
{
Type: crdv1.VolumeSnapshotConditionReady,
Status: v1.ConditionTrue,
Message: "Snapshot created successfully and it is ready",
LastTransitionTime: metav1.Now(),
},
}
} else if status == "creating" {
snapConditions = []crdv1.VolumeSnapshotCondition{
{
Type: crdv1.VolumeSnapshotConditionPending,
Status: v1.ConditionUnknown,
Message: "Snapshot is being created",
LastTransitionTime: metav1.Now(),
},
}
} else {
snapConditions = []crdv1.VolumeSnapshotCondition{
{
Type: crdv1.VolumeSnapshotConditionError,
Status: v1.ConditionTrue,
Message: "Snapshot creation failed",
LastTransitionTime: metav1.Now(),
},
}
}
return &snapConditions
} | go | func (c *cinderPlugin) convertSnapshotStatus(status string) *[]crdv1.VolumeSnapshotCondition {
var snapConditions []crdv1.VolumeSnapshotCondition
if status == "available" {
snapConditions = []crdv1.VolumeSnapshotCondition{
{
Type: crdv1.VolumeSnapshotConditionReady,
Status: v1.ConditionTrue,
Message: "Snapshot created successfully and it is ready",
LastTransitionTime: metav1.Now(),
},
}
} else if status == "creating" {
snapConditions = []crdv1.VolumeSnapshotCondition{
{
Type: crdv1.VolumeSnapshotConditionPending,
Status: v1.ConditionUnknown,
Message: "Snapshot is being created",
LastTransitionTime: metav1.Now(),
},
}
} else {
snapConditions = []crdv1.VolumeSnapshotCondition{
{
Type: crdv1.VolumeSnapshotConditionError,
Status: v1.ConditionTrue,
Message: "Snapshot creation failed",
LastTransitionTime: metav1.Now(),
},
}
}
return &snapConditions
} | [
"func",
"(",
"c",
"*",
"cinderPlugin",
")",
"convertSnapshotStatus",
"(",
"status",
"string",
")",
"*",
"[",
"]",
"crdv1",
".",
"VolumeSnapshotCondition",
"{",
"var",
"snapConditions",
"[",
"]",
"crdv1",
".",
"VolumeSnapshotCondition",
"\n",
"if",
"status",
"==",
"\"",
"\"",
"{",
"snapConditions",
"=",
"[",
"]",
"crdv1",
".",
"VolumeSnapshotCondition",
"{",
"{",
"Type",
":",
"crdv1",
".",
"VolumeSnapshotConditionReady",
",",
"Status",
":",
"v1",
".",
"ConditionTrue",
",",
"Message",
":",
"\"",
"\"",
",",
"LastTransitionTime",
":",
"metav1",
".",
"Now",
"(",
")",
",",
"}",
",",
"}",
"\n",
"}",
"else",
"if",
"status",
"==",
"\"",
"\"",
"{",
"snapConditions",
"=",
"[",
"]",
"crdv1",
".",
"VolumeSnapshotCondition",
"{",
"{",
"Type",
":",
"crdv1",
".",
"VolumeSnapshotConditionPending",
",",
"Status",
":",
"v1",
".",
"ConditionUnknown",
",",
"Message",
":",
"\"",
"\"",
",",
"LastTransitionTime",
":",
"metav1",
".",
"Now",
"(",
")",
",",
"}",
",",
"}",
"\n",
"}",
"else",
"{",
"snapConditions",
"=",
"[",
"]",
"crdv1",
".",
"VolumeSnapshotCondition",
"{",
"{",
"Type",
":",
"crdv1",
".",
"VolumeSnapshotConditionError",
",",
"Status",
":",
"v1",
".",
"ConditionTrue",
",",
"Message",
":",
"\"",
"\"",
",",
"LastTransitionTime",
":",
"metav1",
".",
"Now",
"(",
")",
",",
"}",
",",
"}",
"\n",
"}",
"\n\n",
"return",
"&",
"snapConditions",
"\n",
"}"
] | // convertSnapshotStatus converts Cinder snapshot status to crdv1.VolumeSnapshotCondition | [
"convertSnapshotStatus",
"converts",
"Cinder",
"snapshot",
"status",
"to",
"crdv1",
".",
"VolumeSnapshotCondition"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/volume/cinder/processor.go#L172-L204 | train |
kubernetes-incubator/external-storage | repo-infra/kazel/diff.go | Diff | func Diff(left, right []byte) error {
lf, err := ioutil.TempFile("/tmp", "actual-file-")
if err != nil {
return err
}
defer lf.Close()
defer os.Remove(lf.Name())
rf, err := ioutil.TempFile("/tmp", "expected-file-")
if err != nil {
return err
}
defer rf.Close()
defer os.Remove(rf.Name())
_, err = lf.Write(left)
if err != nil {
return err
}
lf.Close()
_, err = rf.Write(right)
if err != nil {
return err
}
rf.Close()
cmd := exec.Command("/usr/bin/diff", "-u", lf.Name(), rf.Name())
cmd.Stdout = os.Stdout
cmd.Stderr = os.Stderr
cmd.Run()
return nil
} | go | func Diff(left, right []byte) error {
lf, err := ioutil.TempFile("/tmp", "actual-file-")
if err != nil {
return err
}
defer lf.Close()
defer os.Remove(lf.Name())
rf, err := ioutil.TempFile("/tmp", "expected-file-")
if err != nil {
return err
}
defer rf.Close()
defer os.Remove(rf.Name())
_, err = lf.Write(left)
if err != nil {
return err
}
lf.Close()
_, err = rf.Write(right)
if err != nil {
return err
}
rf.Close()
cmd := exec.Command("/usr/bin/diff", "-u", lf.Name(), rf.Name())
cmd.Stdout = os.Stdout
cmd.Stderr = os.Stderr
cmd.Run()
return nil
} | [
"func",
"Diff",
"(",
"left",
",",
"right",
"[",
"]",
"byte",
")",
"error",
"{",
"lf",
",",
"err",
":=",
"ioutil",
".",
"TempFile",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"defer",
"lf",
".",
"Close",
"(",
")",
"\n",
"defer",
"os",
".",
"Remove",
"(",
"lf",
".",
"Name",
"(",
")",
")",
"\n\n",
"rf",
",",
"err",
":=",
"ioutil",
".",
"TempFile",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"defer",
"rf",
".",
"Close",
"(",
")",
"\n",
"defer",
"os",
".",
"Remove",
"(",
"rf",
".",
"Name",
"(",
")",
")",
"\n\n",
"_",
",",
"err",
"=",
"lf",
".",
"Write",
"(",
"left",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"lf",
".",
"Close",
"(",
")",
"\n\n",
"_",
",",
"err",
"=",
"rf",
".",
"Write",
"(",
"right",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"rf",
".",
"Close",
"(",
")",
"\n\n",
"cmd",
":=",
"exec",
".",
"Command",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"lf",
".",
"Name",
"(",
")",
",",
"rf",
".",
"Name",
"(",
")",
")",
"\n",
"cmd",
".",
"Stdout",
"=",
"os",
".",
"Stdout",
"\n",
"cmd",
".",
"Stderr",
"=",
"os",
".",
"Stderr",
"\n",
"cmd",
".",
"Run",
"(",
")",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Diff prints the unified diff of the two provided byte slices
// using the unix diff command. | [
"Diff",
"prints",
"the",
"unified",
"diff",
"of",
"the",
"two",
"provided",
"byte",
"slices",
"using",
"the",
"unix",
"diff",
"command",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/repo-infra/kazel/diff.go#L27-L60 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/controller/controller.go | StartLocalController | func StartLocalController(client *kubernetes.Clientset, ptable deleter.ProcTable, config *common.UserConfig) {
glog.Info("Initializing volume cache\n")
var provisionerName string
if config.UseNodeNameOnly {
provisionerName = fmt.Sprintf("local-volume-provisioner-%v", config.Node.Name)
} else {
provisionerName = fmt.Sprintf("local-volume-provisioner-%v-%v", config.Node.Name, config.Node.UID)
}
broadcaster := record.NewBroadcaster()
broadcaster.StartRecordingToSink(&v1core.EventSinkImpl{Interface: v1core.New(client.CoreV1().RESTClient()).Events("")})
recorder := broadcaster.NewRecorder(scheme.Scheme, v1.EventSource{Component: provisionerName})
// We choose a random resync period between MinResyncPeriod and 2 *
// MinResyncPeriod, so that local provisioners deployed on multiple nodes
// at same time don't list the apiserver simultaneously.
resyncPeriod := time.Duration(config.MinResyncPeriod.Seconds()*(1+rand.Float64())) * time.Second
runtimeConfig := &common.RuntimeConfig{
UserConfig: config,
Cache: cache.NewVolumeCache(),
VolUtil: util.NewVolumeUtil(),
APIUtil: util.NewAPIUtil(client),
Client: client,
Name: provisionerName,
Recorder: recorder,
Mounter: mount.New("" /* default mount path */),
InformerFactory: informers.NewSharedInformerFactory(client, resyncPeriod),
}
populator.NewPopulator(runtimeConfig)
var jobController deleter.JobController
var err error
if runtimeConfig.UseJobForCleaning {
labels := map[string]string{common.NodeNameLabel: config.Node.Name}
jobController, err = deleter.NewJobController(labels, runtimeConfig)
if err != nil {
glog.Fatalf("Error initializing jobController: %v", err)
}
glog.Infof("Enabling Jobs based cleaning.")
}
cleanupTracker := &deleter.CleanupStatusTracker{ProcTable: ptable, JobController: jobController}
discoverer, err := discovery.NewDiscoverer(runtimeConfig, cleanupTracker)
if err != nil {
glog.Fatalf("Error initializing discoverer: %v", err)
}
deleter := deleter.NewDeleter(runtimeConfig, cleanupTracker)
// Start informers after all event listeners are registered.
runtimeConfig.InformerFactory.Start(wait.NeverStop)
// Wait for all started informers' cache were synced.
for v, synced := range runtimeConfig.InformerFactory.WaitForCacheSync(wait.NeverStop) {
if !synced {
glog.Fatalf("Error syncing informer for %v", v)
}
}
// Run controller logic.
if jobController != nil {
go jobController.Run(wait.NeverStop)
}
glog.Info("Controller started\n")
for {
deleter.DeletePVs()
discoverer.DiscoverLocalVolumes()
time.Sleep(10 * time.Second)
}
} | go | func StartLocalController(client *kubernetes.Clientset, ptable deleter.ProcTable, config *common.UserConfig) {
glog.Info("Initializing volume cache\n")
var provisionerName string
if config.UseNodeNameOnly {
provisionerName = fmt.Sprintf("local-volume-provisioner-%v", config.Node.Name)
} else {
provisionerName = fmt.Sprintf("local-volume-provisioner-%v-%v", config.Node.Name, config.Node.UID)
}
broadcaster := record.NewBroadcaster()
broadcaster.StartRecordingToSink(&v1core.EventSinkImpl{Interface: v1core.New(client.CoreV1().RESTClient()).Events("")})
recorder := broadcaster.NewRecorder(scheme.Scheme, v1.EventSource{Component: provisionerName})
// We choose a random resync period between MinResyncPeriod and 2 *
// MinResyncPeriod, so that local provisioners deployed on multiple nodes
// at same time don't list the apiserver simultaneously.
resyncPeriod := time.Duration(config.MinResyncPeriod.Seconds()*(1+rand.Float64())) * time.Second
runtimeConfig := &common.RuntimeConfig{
UserConfig: config,
Cache: cache.NewVolumeCache(),
VolUtil: util.NewVolumeUtil(),
APIUtil: util.NewAPIUtil(client),
Client: client,
Name: provisionerName,
Recorder: recorder,
Mounter: mount.New("" /* default mount path */),
InformerFactory: informers.NewSharedInformerFactory(client, resyncPeriod),
}
populator.NewPopulator(runtimeConfig)
var jobController deleter.JobController
var err error
if runtimeConfig.UseJobForCleaning {
labels := map[string]string{common.NodeNameLabel: config.Node.Name}
jobController, err = deleter.NewJobController(labels, runtimeConfig)
if err != nil {
glog.Fatalf("Error initializing jobController: %v", err)
}
glog.Infof("Enabling Jobs based cleaning.")
}
cleanupTracker := &deleter.CleanupStatusTracker{ProcTable: ptable, JobController: jobController}
discoverer, err := discovery.NewDiscoverer(runtimeConfig, cleanupTracker)
if err != nil {
glog.Fatalf("Error initializing discoverer: %v", err)
}
deleter := deleter.NewDeleter(runtimeConfig, cleanupTracker)
// Start informers after all event listeners are registered.
runtimeConfig.InformerFactory.Start(wait.NeverStop)
// Wait for all started informers' cache were synced.
for v, synced := range runtimeConfig.InformerFactory.WaitForCacheSync(wait.NeverStop) {
if !synced {
glog.Fatalf("Error syncing informer for %v", v)
}
}
// Run controller logic.
if jobController != nil {
go jobController.Run(wait.NeverStop)
}
glog.Info("Controller started\n")
for {
deleter.DeletePVs()
discoverer.DiscoverLocalVolumes()
time.Sleep(10 * time.Second)
}
} | [
"func",
"StartLocalController",
"(",
"client",
"*",
"kubernetes",
".",
"Clientset",
",",
"ptable",
"deleter",
".",
"ProcTable",
",",
"config",
"*",
"common",
".",
"UserConfig",
")",
"{",
"glog",
".",
"Info",
"(",
"\"",
"\\n",
"\"",
")",
"\n\n",
"var",
"provisionerName",
"string",
"\n",
"if",
"config",
".",
"UseNodeNameOnly",
"{",
"provisionerName",
"=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"config",
".",
"Node",
".",
"Name",
")",
"\n",
"}",
"else",
"{",
"provisionerName",
"=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"config",
".",
"Node",
".",
"Name",
",",
"config",
".",
"Node",
".",
"UID",
")",
"\n",
"}",
"\n\n",
"broadcaster",
":=",
"record",
".",
"NewBroadcaster",
"(",
")",
"\n",
"broadcaster",
".",
"StartRecordingToSink",
"(",
"&",
"v1core",
".",
"EventSinkImpl",
"{",
"Interface",
":",
"v1core",
".",
"New",
"(",
"client",
".",
"CoreV1",
"(",
")",
".",
"RESTClient",
"(",
")",
")",
".",
"Events",
"(",
"\"",
"\"",
")",
"}",
")",
"\n",
"recorder",
":=",
"broadcaster",
".",
"NewRecorder",
"(",
"scheme",
".",
"Scheme",
",",
"v1",
".",
"EventSource",
"{",
"Component",
":",
"provisionerName",
"}",
")",
"\n\n",
"// We choose a random resync period between MinResyncPeriod and 2 *",
"// MinResyncPeriod, so that local provisioners deployed on multiple nodes",
"// at same time don't list the apiserver simultaneously.",
"resyncPeriod",
":=",
"time",
".",
"Duration",
"(",
"config",
".",
"MinResyncPeriod",
".",
"Seconds",
"(",
")",
"*",
"(",
"1",
"+",
"rand",
".",
"Float64",
"(",
")",
")",
")",
"*",
"time",
".",
"Second",
"\n\n",
"runtimeConfig",
":=",
"&",
"common",
".",
"RuntimeConfig",
"{",
"UserConfig",
":",
"config",
",",
"Cache",
":",
"cache",
".",
"NewVolumeCache",
"(",
")",
",",
"VolUtil",
":",
"util",
".",
"NewVolumeUtil",
"(",
")",
",",
"APIUtil",
":",
"util",
".",
"NewAPIUtil",
"(",
"client",
")",
",",
"Client",
":",
"client",
",",
"Name",
":",
"provisionerName",
",",
"Recorder",
":",
"recorder",
",",
"Mounter",
":",
"mount",
".",
"New",
"(",
"\"",
"\"",
"/* default mount path */",
")",
",",
"InformerFactory",
":",
"informers",
".",
"NewSharedInformerFactory",
"(",
"client",
",",
"resyncPeriod",
")",
",",
"}",
"\n\n",
"populator",
".",
"NewPopulator",
"(",
"runtimeConfig",
")",
"\n\n",
"var",
"jobController",
"deleter",
".",
"JobController",
"\n",
"var",
"err",
"error",
"\n",
"if",
"runtimeConfig",
".",
"UseJobForCleaning",
"{",
"labels",
":=",
"map",
"[",
"string",
"]",
"string",
"{",
"common",
".",
"NodeNameLabel",
":",
"config",
".",
"Node",
".",
"Name",
"}",
"\n",
"jobController",
",",
"err",
"=",
"deleter",
".",
"NewJobController",
"(",
"labels",
",",
"runtimeConfig",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"glog",
".",
"Fatalf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"glog",
".",
"Infof",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"cleanupTracker",
":=",
"&",
"deleter",
".",
"CleanupStatusTracker",
"{",
"ProcTable",
":",
"ptable",
",",
"JobController",
":",
"jobController",
"}",
"\n\n",
"discoverer",
",",
"err",
":=",
"discovery",
".",
"NewDiscoverer",
"(",
"runtimeConfig",
",",
"cleanupTracker",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"glog",
".",
"Fatalf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"deleter",
":=",
"deleter",
".",
"NewDeleter",
"(",
"runtimeConfig",
",",
"cleanupTracker",
")",
"\n\n",
"// Start informers after all event listeners are registered.",
"runtimeConfig",
".",
"InformerFactory",
".",
"Start",
"(",
"wait",
".",
"NeverStop",
")",
"\n",
"// Wait for all started informers' cache were synced.",
"for",
"v",
",",
"synced",
":=",
"range",
"runtimeConfig",
".",
"InformerFactory",
".",
"WaitForCacheSync",
"(",
"wait",
".",
"NeverStop",
")",
"{",
"if",
"!",
"synced",
"{",
"glog",
".",
"Fatalf",
"(",
"\"",
"\"",
",",
"v",
")",
"\n",
"}",
"\n",
"}",
"\n",
"// Run controller logic.",
"if",
"jobController",
"!=",
"nil",
"{",
"go",
"jobController",
".",
"Run",
"(",
"wait",
".",
"NeverStop",
")",
"\n",
"}",
"\n",
"glog",
".",
"Info",
"(",
"\"",
"\\n",
"\"",
")",
"\n",
"for",
"{",
"deleter",
".",
"DeletePVs",
"(",
")",
"\n",
"discoverer",
".",
"DiscoverLocalVolumes",
"(",
")",
"\n",
"time",
".",
"Sleep",
"(",
"10",
"*",
"time",
".",
"Second",
")",
"\n",
"}",
"\n",
"}"
] | // StartLocalController starts the sync loop for the local PV discovery and deleter | [
"StartLocalController",
"starts",
"the",
"sync",
"loop",
"for",
"the",
"local",
"PV",
"discovery",
"and",
"deleter"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/controller/controller.go#L44-L114 | train |
kubernetes-incubator/external-storage | flex/pkg/volume/provision.go | NewFlexProvisioner | func NewFlexProvisioner(client kubernetes.Interface, execCommand string, flexDriver string) controller.Provisioner {
return newFlexProvisionerInternal(client, execCommand, flexDriver)
} | go | func NewFlexProvisioner(client kubernetes.Interface, execCommand string, flexDriver string) controller.Provisioner {
return newFlexProvisionerInternal(client, execCommand, flexDriver)
} | [
"func",
"NewFlexProvisioner",
"(",
"client",
"kubernetes",
".",
"Interface",
",",
"execCommand",
"string",
",",
"flexDriver",
"string",
")",
"controller",
".",
"Provisioner",
"{",
"return",
"newFlexProvisionerInternal",
"(",
"client",
",",
"execCommand",
",",
"flexDriver",
")",
"\n",
"}"
] | // NewFlexProvisioner creates a new flex provisioner | [
"NewFlexProvisioner",
"creates",
"a",
"new",
"flex",
"provisioner"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/flex/pkg/volume/provision.go#L41-L43 | train |
kubernetes-incubator/external-storage | snapshot/pkg/controller/cache/desired_state_of_world.go | AddSnapshot | func (dsw *desiredStateOfWorld) AddSnapshot(snapshot *crdv1.VolumeSnapshot) error {
if snapshot == nil {
return fmt.Errorf("nil snapshot spec")
}
dsw.Lock()
defer dsw.Unlock()
snapshotName := MakeSnapshotName(snapshot)
glog.Infof("Adding new snapshot to desired state of world: %s", snapshotName)
dsw.snapshots[snapshotName] = snapshot
return nil
} | go | func (dsw *desiredStateOfWorld) AddSnapshot(snapshot *crdv1.VolumeSnapshot) error {
if snapshot == nil {
return fmt.Errorf("nil snapshot spec")
}
dsw.Lock()
defer dsw.Unlock()
snapshotName := MakeSnapshotName(snapshot)
glog.Infof("Adding new snapshot to desired state of world: %s", snapshotName)
dsw.snapshots[snapshotName] = snapshot
return nil
} | [
"func",
"(",
"dsw",
"*",
"desiredStateOfWorld",
")",
"AddSnapshot",
"(",
"snapshot",
"*",
"crdv1",
".",
"VolumeSnapshot",
")",
"error",
"{",
"if",
"snapshot",
"==",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"dsw",
".",
"Lock",
"(",
")",
"\n",
"defer",
"dsw",
".",
"Unlock",
"(",
")",
"\n\n",
"snapshotName",
":=",
"MakeSnapshotName",
"(",
"snapshot",
")",
"\n",
"glog",
".",
"Infof",
"(",
"\"",
"\"",
",",
"snapshotName",
")",
"\n",
"dsw",
".",
"snapshots",
"[",
"snapshotName",
"]",
"=",
"snapshot",
"\n",
"return",
"nil",
"\n",
"}"
] | // Adds a snapshot to the list of snapshots to be created | [
"Adds",
"a",
"snapshot",
"to",
"the",
"list",
"of",
"snapshots",
"to",
"be",
"created"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/controller/cache/desired_state_of_world.go#L67-L79 | train |
kubernetes-incubator/external-storage | snapshot/pkg/controller/cache/desired_state_of_world.go | DeleteSnapshot | func (dsw *desiredStateOfWorld) DeleteSnapshot(snapshotName string) error {
dsw.Lock()
defer dsw.Unlock()
glog.Infof("Deleting snapshot from desired state of world: %s", snapshotName)
delete(dsw.snapshots, snapshotName)
return nil
} | go | func (dsw *desiredStateOfWorld) DeleteSnapshot(snapshotName string) error {
dsw.Lock()
defer dsw.Unlock()
glog.Infof("Deleting snapshot from desired state of world: %s", snapshotName)
delete(dsw.snapshots, snapshotName)
return nil
} | [
"func",
"(",
"dsw",
"*",
"desiredStateOfWorld",
")",
"DeleteSnapshot",
"(",
"snapshotName",
"string",
")",
"error",
"{",
"dsw",
".",
"Lock",
"(",
")",
"\n",
"defer",
"dsw",
".",
"Unlock",
"(",
")",
"\n\n",
"glog",
".",
"Infof",
"(",
"\"",
"\"",
",",
"snapshotName",
")",
"\n\n",
"delete",
"(",
"dsw",
".",
"snapshots",
",",
"snapshotName",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // Removes the snapshot from the list of existing snapshots | [
"Removes",
"the",
"snapshot",
"from",
"the",
"list",
"of",
"existing",
"snapshots"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/controller/cache/desired_state_of_world.go#L82-L90 | train |
kubernetes-incubator/external-storage | nfs/pkg/volume/provision.go | NewNFSProvisioner | func NewNFSProvisioner(exportDir string, client kubernetes.Interface, outOfCluster bool, useGanesha bool, ganeshaConfig string, enableXfsQuota bool, serverHostname string, maxExports int, exportSubnet string) controller.Provisioner {
var exp exporter
if useGanesha {
exp = newGaneshaExporter(ganeshaConfig)
} else {
exp = newKernelExporter()
}
var quotaer quotaer
var err error
if enableXfsQuota {
quotaer, err = newXfsQuotaer(exportDir)
if err != nil {
glog.Fatalf("Error creating xfs quotaer! %v", err)
}
} else {
quotaer = newDummyQuotaer()
}
return newNFSProvisionerInternal(exportDir, client, outOfCluster, exp, quotaer, serverHostname, maxExports, exportSubnet)
} | go | func NewNFSProvisioner(exportDir string, client kubernetes.Interface, outOfCluster bool, useGanesha bool, ganeshaConfig string, enableXfsQuota bool, serverHostname string, maxExports int, exportSubnet string) controller.Provisioner {
var exp exporter
if useGanesha {
exp = newGaneshaExporter(ganeshaConfig)
} else {
exp = newKernelExporter()
}
var quotaer quotaer
var err error
if enableXfsQuota {
quotaer, err = newXfsQuotaer(exportDir)
if err != nil {
glog.Fatalf("Error creating xfs quotaer! %v", err)
}
} else {
quotaer = newDummyQuotaer()
}
return newNFSProvisionerInternal(exportDir, client, outOfCluster, exp, quotaer, serverHostname, maxExports, exportSubnet)
} | [
"func",
"NewNFSProvisioner",
"(",
"exportDir",
"string",
",",
"client",
"kubernetes",
".",
"Interface",
",",
"outOfCluster",
"bool",
",",
"useGanesha",
"bool",
",",
"ganeshaConfig",
"string",
",",
"enableXfsQuota",
"bool",
",",
"serverHostname",
"string",
",",
"maxExports",
"int",
",",
"exportSubnet",
"string",
")",
"controller",
".",
"Provisioner",
"{",
"var",
"exp",
"exporter",
"\n",
"if",
"useGanesha",
"{",
"exp",
"=",
"newGaneshaExporter",
"(",
"ganeshaConfig",
")",
"\n",
"}",
"else",
"{",
"exp",
"=",
"newKernelExporter",
"(",
")",
"\n",
"}",
"\n",
"var",
"quotaer",
"quotaer",
"\n",
"var",
"err",
"error",
"\n",
"if",
"enableXfsQuota",
"{",
"quotaer",
",",
"err",
"=",
"newXfsQuotaer",
"(",
"exportDir",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"glog",
".",
"Fatalf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"quotaer",
"=",
"newDummyQuotaer",
"(",
")",
"\n",
"}",
"\n",
"return",
"newNFSProvisionerInternal",
"(",
"exportDir",
",",
"client",
",",
"outOfCluster",
",",
"exp",
",",
"quotaer",
",",
"serverHostname",
",",
"maxExports",
",",
"exportSubnet",
")",
"\n",
"}"
] | // NewNFSProvisioner creates a Provisioner that provisions NFS PVs backed by
// the given directory. | [
"NewNFSProvisioner",
"creates",
"a",
"Provisioner",
"that",
"provisions",
"NFS",
"PVs",
"backed",
"by",
"the",
"given",
"directory",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/nfs/pkg/volume/provision.go#L81-L99 | train |
kubernetes-incubator/external-storage | nfs/pkg/volume/provision.go | ShouldProvision | func (p *nfsProvisioner) ShouldProvision(claim *v1.PersistentVolumeClaim) bool {
// As long as the export limit has not been reached we're ok to provision
ok := p.checkExportLimit()
if !ok {
glog.Infof("export limit reached. skipping claim %s/%s", claim.Namespace, claim.Name)
}
return ok
} | go | func (p *nfsProvisioner) ShouldProvision(claim *v1.PersistentVolumeClaim) bool {
// As long as the export limit has not been reached we're ok to provision
ok := p.checkExportLimit()
if !ok {
glog.Infof("export limit reached. skipping claim %s/%s", claim.Namespace, claim.Name)
}
return ok
} | [
"func",
"(",
"p",
"*",
"nfsProvisioner",
")",
"ShouldProvision",
"(",
"claim",
"*",
"v1",
".",
"PersistentVolumeClaim",
")",
"bool",
"{",
"// As long as the export limit has not been reached we're ok to provision",
"ok",
":=",
"p",
".",
"checkExportLimit",
"(",
")",
"\n",
"if",
"!",
"ok",
"{",
"glog",
".",
"Infof",
"(",
"\"",
"\"",
",",
"claim",
".",
"Namespace",
",",
"claim",
".",
"Name",
")",
"\n",
"}",
"\n",
"return",
"ok",
"\n",
"}"
] | // ShouldProvision returns whether provisioning should be attempted for the given
// claim. | [
"ShouldProvision",
"returns",
"whether",
"provisioning",
"should",
"be",
"attempted",
"for",
"the",
"given",
"claim",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/nfs/pkg/volume/provision.go#L187-L194 | train |
kubernetes-incubator/external-storage | nfs/pkg/volume/provision.go | createDirectory | func (p *nfsProvisioner) createDirectory(directory, gid string) error {
// TODO quotas
path := path.Join(p.exportDir, directory)
if _, err := os.Stat(path); !os.IsNotExist(err) {
return fmt.Errorf("the path already exists")
}
perm := os.FileMode(0777 | os.ModeSetgid)
if gid != "none" {
// Execute permission is required for stat, which kubelet uses during unmount.
perm = os.FileMode(0071 | os.ModeSetgid)
}
if err := os.MkdirAll(path, perm); err != nil {
return err
}
// Due to umask, need to chmod
if err := os.Chmod(path, perm); err != nil {
os.RemoveAll(path)
return err
}
if gid != "none" {
groupID, err := strconv.ParseUint(gid, 10, 64)
if err != nil {
os.RemoveAll(path)
return fmt.Errorf("strconv.ParseUint failed with error: %v", err)
}
cmd := exec.Command("chgrp", strconv.FormatUint(groupID, 10), path)
out, err := cmd.CombinedOutput()
if err != nil {
os.RemoveAll(path)
return fmt.Errorf("chgrp failed with error: %v, output: %s", err, out)
}
}
return nil
} | go | func (p *nfsProvisioner) createDirectory(directory, gid string) error {
// TODO quotas
path := path.Join(p.exportDir, directory)
if _, err := os.Stat(path); !os.IsNotExist(err) {
return fmt.Errorf("the path already exists")
}
perm := os.FileMode(0777 | os.ModeSetgid)
if gid != "none" {
// Execute permission is required for stat, which kubelet uses during unmount.
perm = os.FileMode(0071 | os.ModeSetgid)
}
if err := os.MkdirAll(path, perm); err != nil {
return err
}
// Due to umask, need to chmod
if err := os.Chmod(path, perm); err != nil {
os.RemoveAll(path)
return err
}
if gid != "none" {
groupID, err := strconv.ParseUint(gid, 10, 64)
if err != nil {
os.RemoveAll(path)
return fmt.Errorf("strconv.ParseUint failed with error: %v", err)
}
cmd := exec.Command("chgrp", strconv.FormatUint(groupID, 10), path)
out, err := cmd.CombinedOutput()
if err != nil {
os.RemoveAll(path)
return fmt.Errorf("chgrp failed with error: %v, output: %s", err, out)
}
}
return nil
} | [
"func",
"(",
"p",
"*",
"nfsProvisioner",
")",
"createDirectory",
"(",
"directory",
",",
"gid",
"string",
")",
"error",
"{",
"// TODO quotas",
"path",
":=",
"path",
".",
"Join",
"(",
"p",
".",
"exportDir",
",",
"directory",
")",
"\n",
"if",
"_",
",",
"err",
":=",
"os",
".",
"Stat",
"(",
"path",
")",
";",
"!",
"os",
".",
"IsNotExist",
"(",
"err",
")",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"perm",
":=",
"os",
".",
"FileMode",
"(",
"0777",
"|",
"os",
".",
"ModeSetgid",
")",
"\n",
"if",
"gid",
"!=",
"\"",
"\"",
"{",
"// Execute permission is required for stat, which kubelet uses during unmount.",
"perm",
"=",
"os",
".",
"FileMode",
"(",
"0071",
"|",
"os",
".",
"ModeSetgid",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"os",
".",
"MkdirAll",
"(",
"path",
",",
"perm",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"// Due to umask, need to chmod",
"if",
"err",
":=",
"os",
".",
"Chmod",
"(",
"path",
",",
"perm",
")",
";",
"err",
"!=",
"nil",
"{",
"os",
".",
"RemoveAll",
"(",
"path",
")",
"\n",
"return",
"err",
"\n",
"}",
"\n\n",
"if",
"gid",
"!=",
"\"",
"\"",
"{",
"groupID",
",",
"err",
":=",
"strconv",
".",
"ParseUint",
"(",
"gid",
",",
"10",
",",
"64",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"os",
".",
"RemoveAll",
"(",
"path",
")",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"cmd",
":=",
"exec",
".",
"Command",
"(",
"\"",
"\"",
",",
"strconv",
".",
"FormatUint",
"(",
"groupID",
",",
"10",
")",
",",
"path",
")",
"\n",
"out",
",",
"err",
":=",
"cmd",
".",
"CombinedOutput",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"os",
".",
"RemoveAll",
"(",
"path",
")",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
",",
"out",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // createDirectory creates the given directory in exportDir with appropriate
// permissions and ownership according to the given gid parameter string. | [
"createDirectory",
"creates",
"the",
"given",
"directory",
"in",
"exportDir",
"with",
"appropriate",
"permissions",
"and",
"ownership",
"according",
"to",
"the",
"given",
"gid",
"parameter",
"string",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/nfs/pkg/volume/provision.go#L449-L485 | train |
kubernetes-incubator/external-storage | nfs/pkg/volume/provision.go | createExport | func (p *nfsProvisioner) createExport(directory string, rootSquash bool) (string, uint16, error) {
path := path.Join(p.exportDir, directory)
block, exportID, err := p.exporter.AddExportBlock(path, rootSquash, p.exportSubnet)
if err != nil {
return "", 0, fmt.Errorf("error adding export block for path %s: %v", path, err)
}
err = p.exporter.Export(path)
if err != nil {
p.exporter.RemoveExportBlock(block, exportID)
return "", 0, fmt.Errorf("error exporting export block %s: %v", block, err)
}
return block, exportID, nil
} | go | func (p *nfsProvisioner) createExport(directory string, rootSquash bool) (string, uint16, error) {
path := path.Join(p.exportDir, directory)
block, exportID, err := p.exporter.AddExportBlock(path, rootSquash, p.exportSubnet)
if err != nil {
return "", 0, fmt.Errorf("error adding export block for path %s: %v", path, err)
}
err = p.exporter.Export(path)
if err != nil {
p.exporter.RemoveExportBlock(block, exportID)
return "", 0, fmt.Errorf("error exporting export block %s: %v", block, err)
}
return block, exportID, nil
} | [
"func",
"(",
"p",
"*",
"nfsProvisioner",
")",
"createExport",
"(",
"directory",
"string",
",",
"rootSquash",
"bool",
")",
"(",
"string",
",",
"uint16",
",",
"error",
")",
"{",
"path",
":=",
"path",
".",
"Join",
"(",
"p",
".",
"exportDir",
",",
"directory",
")",
"\n\n",
"block",
",",
"exportID",
",",
"err",
":=",
"p",
".",
"exporter",
".",
"AddExportBlock",
"(",
"path",
",",
"rootSquash",
",",
"p",
".",
"exportSubnet",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"0",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"path",
",",
"err",
")",
"\n",
"}",
"\n\n",
"err",
"=",
"p",
".",
"exporter",
".",
"Export",
"(",
"path",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"p",
".",
"exporter",
".",
"RemoveExportBlock",
"(",
"block",
",",
"exportID",
")",
"\n",
"return",
"\"",
"\"",
",",
"0",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"block",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"block",
",",
"exportID",
",",
"nil",
"\n",
"}"
] | // createExport creates the export by adding a block to the appropriate config
// file and exporting it | [
"createExport",
"creates",
"the",
"export",
"by",
"adding",
"a",
"block",
"to",
"the",
"appropriate",
"config",
"file",
"and",
"exporting",
"it"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/nfs/pkg/volume/provision.go#L489-L504 | train |
kubernetes-incubator/external-storage | nfs/pkg/volume/provision.go | createQuota | func (p *nfsProvisioner) createQuota(directory string, capacity resource.Quantity) (string, uint16, error) {
path := path.Join(p.exportDir, directory)
limit := strconv.FormatInt(capacity.Value(), 10)
block, projectID, err := p.quotaer.AddProject(path, limit)
if err != nil {
return "", 0, fmt.Errorf("error adding project for path %s: %v", path, err)
}
err = p.quotaer.SetQuota(projectID, path, limit)
if err != nil {
p.quotaer.RemoveProject(block, projectID)
return "", 0, fmt.Errorf("error setting quota for path %s: %v", path, err)
}
return block, projectID, nil
} | go | func (p *nfsProvisioner) createQuota(directory string, capacity resource.Quantity) (string, uint16, error) {
path := path.Join(p.exportDir, directory)
limit := strconv.FormatInt(capacity.Value(), 10)
block, projectID, err := p.quotaer.AddProject(path, limit)
if err != nil {
return "", 0, fmt.Errorf("error adding project for path %s: %v", path, err)
}
err = p.quotaer.SetQuota(projectID, path, limit)
if err != nil {
p.quotaer.RemoveProject(block, projectID)
return "", 0, fmt.Errorf("error setting quota for path %s: %v", path, err)
}
return block, projectID, nil
} | [
"func",
"(",
"p",
"*",
"nfsProvisioner",
")",
"createQuota",
"(",
"directory",
"string",
",",
"capacity",
"resource",
".",
"Quantity",
")",
"(",
"string",
",",
"uint16",
",",
"error",
")",
"{",
"path",
":=",
"path",
".",
"Join",
"(",
"p",
".",
"exportDir",
",",
"directory",
")",
"\n\n",
"limit",
":=",
"strconv",
".",
"FormatInt",
"(",
"capacity",
".",
"Value",
"(",
")",
",",
"10",
")",
"\n\n",
"block",
",",
"projectID",
",",
"err",
":=",
"p",
".",
"quotaer",
".",
"AddProject",
"(",
"path",
",",
"limit",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"0",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"path",
",",
"err",
")",
"\n",
"}",
"\n\n",
"err",
"=",
"p",
".",
"quotaer",
".",
"SetQuota",
"(",
"projectID",
",",
"path",
",",
"limit",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"p",
".",
"quotaer",
".",
"RemoveProject",
"(",
"block",
",",
"projectID",
")",
"\n",
"return",
"\"",
"\"",
",",
"0",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"path",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"block",
",",
"projectID",
",",
"nil",
"\n",
"}"
] | // createQuota creates a quota for the directory by adding a project to
// represent the directory and setting a quota on it | [
"createQuota",
"creates",
"a",
"quota",
"for",
"the",
"directory",
"by",
"adding",
"a",
"project",
"to",
"represent",
"the",
"directory",
"and",
"setting",
"a",
"quota",
"on",
"it"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/nfs/pkg/volume/provision.go#L508-L525 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/deleter/deleter.go | NewDeleter | func NewDeleter(config *common.RuntimeConfig, cleanupTracker *CleanupStatusTracker) *Deleter {
return &Deleter{
RuntimeConfig: config,
CleanupStatus: cleanupTracker,
}
} | go | func NewDeleter(config *common.RuntimeConfig, cleanupTracker *CleanupStatusTracker) *Deleter {
return &Deleter{
RuntimeConfig: config,
CleanupStatus: cleanupTracker,
}
} | [
"func",
"NewDeleter",
"(",
"config",
"*",
"common",
".",
"RuntimeConfig",
",",
"cleanupTracker",
"*",
"CleanupStatusTracker",
")",
"*",
"Deleter",
"{",
"return",
"&",
"Deleter",
"{",
"RuntimeConfig",
":",
"config",
",",
"CleanupStatus",
":",
"cleanupTracker",
",",
"}",
"\n",
"}"
] | // NewDeleter creates a Deleter object to handle the cleanup and deletion of local PVs
// allocated by this provisioner | [
"NewDeleter",
"creates",
"a",
"Deleter",
"object",
"to",
"handle",
"the",
"cleanup",
"and",
"deletion",
"of",
"local",
"PVs",
"allocated",
"by",
"this",
"provisioner"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/deleter/deleter.go#L61-L66 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/deleter/deleter.go | DeletePVs | func (d *Deleter) DeletePVs() {
for _, pv := range d.Cache.ListPVs() {
if pv.Status.Phase != v1.VolumeReleased {
continue
}
name := pv.Name
switch pv.Spec.PersistentVolumeReclaimPolicy {
case v1.PersistentVolumeReclaimRetain:
glog.V(4).Infof("reclaimVolume[%s]: policy is Retain, nothing to do", name)
case v1.PersistentVolumeReclaimRecycle:
glog.V(4).Infof("reclaimVolume[%s]: policy is Recycle which is not supported", name)
d.RuntimeConfig.Recorder.Eventf(pv, v1.EventTypeWarning, "VolumeUnsupportedReclaimPolicy", "Volume has unsupported PersistentVolumeReclaimPolicy: Recycle")
case v1.PersistentVolumeReclaimDelete:
glog.V(4).Infof("reclaimVolume[%s]: policy is Delete", name)
// Cleanup volume
err := d.deletePV(pv)
if err != nil {
mode, modeErr := d.getVolMode(pv)
if modeErr != nil {
mode = "unknown"
}
deleteType := metrics.DeleteTypeProcess
if d.shouldRunJob(mode) {
deleteType = metrics.DeleteTypeJob
}
metrics.PersistentVolumeDeleteFailedTotal.WithLabelValues(string(mode), deleteType).Inc()
cleaningLocalPVErr := fmt.Errorf("Error cleaning PV %q: %v", name, err.Error())
d.RuntimeConfig.Recorder.Eventf(pv, v1.EventTypeWarning, common.EventVolumeFailedDelete, cleaningLocalPVErr.Error())
glog.Error(err)
continue
}
default:
// Unknown PersistentVolumeReclaimPolicy
d.RuntimeConfig.Recorder.Eventf(pv, v1.EventTypeWarning, "VolumeUnknownReclaimPolicy", "Volume has unrecognized PersistentVolumeReclaimPolicy")
}
}
} | go | func (d *Deleter) DeletePVs() {
for _, pv := range d.Cache.ListPVs() {
if pv.Status.Phase != v1.VolumeReleased {
continue
}
name := pv.Name
switch pv.Spec.PersistentVolumeReclaimPolicy {
case v1.PersistentVolumeReclaimRetain:
glog.V(4).Infof("reclaimVolume[%s]: policy is Retain, nothing to do", name)
case v1.PersistentVolumeReclaimRecycle:
glog.V(4).Infof("reclaimVolume[%s]: policy is Recycle which is not supported", name)
d.RuntimeConfig.Recorder.Eventf(pv, v1.EventTypeWarning, "VolumeUnsupportedReclaimPolicy", "Volume has unsupported PersistentVolumeReclaimPolicy: Recycle")
case v1.PersistentVolumeReclaimDelete:
glog.V(4).Infof("reclaimVolume[%s]: policy is Delete", name)
// Cleanup volume
err := d.deletePV(pv)
if err != nil {
mode, modeErr := d.getVolMode(pv)
if modeErr != nil {
mode = "unknown"
}
deleteType := metrics.DeleteTypeProcess
if d.shouldRunJob(mode) {
deleteType = metrics.DeleteTypeJob
}
metrics.PersistentVolumeDeleteFailedTotal.WithLabelValues(string(mode), deleteType).Inc()
cleaningLocalPVErr := fmt.Errorf("Error cleaning PV %q: %v", name, err.Error())
d.RuntimeConfig.Recorder.Eventf(pv, v1.EventTypeWarning, common.EventVolumeFailedDelete, cleaningLocalPVErr.Error())
glog.Error(err)
continue
}
default:
// Unknown PersistentVolumeReclaimPolicy
d.RuntimeConfig.Recorder.Eventf(pv, v1.EventTypeWarning, "VolumeUnknownReclaimPolicy", "Volume has unrecognized PersistentVolumeReclaimPolicy")
}
}
} | [
"func",
"(",
"d",
"*",
"Deleter",
")",
"DeletePVs",
"(",
")",
"{",
"for",
"_",
",",
"pv",
":=",
"range",
"d",
".",
"Cache",
".",
"ListPVs",
"(",
")",
"{",
"if",
"pv",
".",
"Status",
".",
"Phase",
"!=",
"v1",
".",
"VolumeReleased",
"{",
"continue",
"\n",
"}",
"\n",
"name",
":=",
"pv",
".",
"Name",
"\n",
"switch",
"pv",
".",
"Spec",
".",
"PersistentVolumeReclaimPolicy",
"{",
"case",
"v1",
".",
"PersistentVolumeReclaimRetain",
":",
"glog",
".",
"V",
"(",
"4",
")",
".",
"Infof",
"(",
"\"",
"\"",
",",
"name",
")",
"\n",
"case",
"v1",
".",
"PersistentVolumeReclaimRecycle",
":",
"glog",
".",
"V",
"(",
"4",
")",
".",
"Infof",
"(",
"\"",
"\"",
",",
"name",
")",
"\n",
"d",
".",
"RuntimeConfig",
".",
"Recorder",
".",
"Eventf",
"(",
"pv",
",",
"v1",
".",
"EventTypeWarning",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"case",
"v1",
".",
"PersistentVolumeReclaimDelete",
":",
"glog",
".",
"V",
"(",
"4",
")",
".",
"Infof",
"(",
"\"",
"\"",
",",
"name",
")",
"\n",
"// Cleanup volume",
"err",
":=",
"d",
".",
"deletePV",
"(",
"pv",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"mode",
",",
"modeErr",
":=",
"d",
".",
"getVolMode",
"(",
"pv",
")",
"\n",
"if",
"modeErr",
"!=",
"nil",
"{",
"mode",
"=",
"\"",
"\"",
"\n",
"}",
"\n",
"deleteType",
":=",
"metrics",
".",
"DeleteTypeProcess",
"\n",
"if",
"d",
".",
"shouldRunJob",
"(",
"mode",
")",
"{",
"deleteType",
"=",
"metrics",
".",
"DeleteTypeJob",
"\n",
"}",
"\n",
"metrics",
".",
"PersistentVolumeDeleteFailedTotal",
".",
"WithLabelValues",
"(",
"string",
"(",
"mode",
")",
",",
"deleteType",
")",
".",
"Inc",
"(",
")",
"\n",
"cleaningLocalPVErr",
":=",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"name",
",",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"d",
".",
"RuntimeConfig",
".",
"Recorder",
".",
"Eventf",
"(",
"pv",
",",
"v1",
".",
"EventTypeWarning",
",",
"common",
".",
"EventVolumeFailedDelete",
",",
"cleaningLocalPVErr",
".",
"Error",
"(",
")",
")",
"\n",
"glog",
".",
"Error",
"(",
"err",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"default",
":",
"// Unknown PersistentVolumeReclaimPolicy",
"d",
".",
"RuntimeConfig",
".",
"Recorder",
".",
"Eventf",
"(",
"pv",
",",
"v1",
".",
"EventTypeWarning",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // DeletePVs will scan through all the existing PVs that are released, and cleanup and
// delete them | [
"DeletePVs",
"will",
"scan",
"through",
"all",
"the",
"existing",
"PVs",
"that",
"are",
"released",
"and",
"cleanup",
"and",
"delete",
"them"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/deleter/deleter.go#L70-L106 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/deleter/deleter.go | InProgress | func (c *CleanupStatusTracker) InProgress(pvName string, isJob bool) bool {
if isJob {
return c.JobController.IsCleaningJobRunning(pvName)
}
return c.ProcTable.IsRunning(pvName)
} | go | func (c *CleanupStatusTracker) InProgress(pvName string, isJob bool) bool {
if isJob {
return c.JobController.IsCleaningJobRunning(pvName)
}
return c.ProcTable.IsRunning(pvName)
} | [
"func",
"(",
"c",
"*",
"CleanupStatusTracker",
")",
"InProgress",
"(",
"pvName",
"string",
",",
"isJob",
"bool",
")",
"bool",
"{",
"if",
"isJob",
"{",
"return",
"c",
".",
"JobController",
".",
"IsCleaningJobRunning",
"(",
"pvName",
")",
"\n",
"}",
"\n",
"return",
"c",
".",
"ProcTable",
".",
"IsRunning",
"(",
"pvName",
")",
"\n",
"}"
] | // InProgress returns true if the cleaning for the specified PV is in progress. | [
"InProgress",
"returns",
"true",
"if",
"the",
"cleaning",
"for",
"the",
"specified",
"PV",
"is",
"in",
"progress",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/deleter/deleter.go#L375-L380 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/deleter/deleter.go | RemoveStatus | func (c *CleanupStatusTracker) RemoveStatus(pvName string, isJob bool) (CleanupState, *time.Time, error) {
if isJob {
return c.JobController.RemoveJob(pvName)
}
return c.ProcTable.RemoveEntry(pvName)
} | go | func (c *CleanupStatusTracker) RemoveStatus(pvName string, isJob bool) (CleanupState, *time.Time, error) {
if isJob {
return c.JobController.RemoveJob(pvName)
}
return c.ProcTable.RemoveEntry(pvName)
} | [
"func",
"(",
"c",
"*",
"CleanupStatusTracker",
")",
"RemoveStatus",
"(",
"pvName",
"string",
",",
"isJob",
"bool",
")",
"(",
"CleanupState",
",",
"*",
"time",
".",
"Time",
",",
"error",
")",
"{",
"if",
"isJob",
"{",
"return",
"c",
".",
"JobController",
".",
"RemoveJob",
"(",
"pvName",
")",
"\n",
"}",
"\n",
"return",
"c",
".",
"ProcTable",
".",
"RemoveEntry",
"(",
"pvName",
")",
"\n",
"}"
] | // RemoveStatus removes and returns the status and start time of a completed cleaning process.
// The method returns an error if the process has not yet completed. | [
"RemoveStatus",
"removes",
"and",
"returns",
"the",
"status",
"and",
"start",
"time",
"of",
"a",
"completed",
"cleaning",
"process",
".",
"The",
"method",
"returns",
"an",
"error",
"if",
"the",
"process",
"has",
"not",
"yet",
"completed",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/deleter/deleter.go#L384-L389 | train |
kubernetes-incubator/external-storage | gluster/file/cmd/glusterfile-provisioner/glusterfile-provisioner.go | NewglusterfileProvisioner | func NewglusterfileProvisioner(client kubernetes.Interface, id string) controller.Provisioner {
return &glusterfileProvisioner{
client: client,
identity: id,
allocator: gidallocator.New(client),
}
} | go | func NewglusterfileProvisioner(client kubernetes.Interface, id string) controller.Provisioner {
return &glusterfileProvisioner{
client: client,
identity: id,
allocator: gidallocator.New(client),
}
} | [
"func",
"NewglusterfileProvisioner",
"(",
"client",
"kubernetes",
".",
"Interface",
",",
"id",
"string",
")",
"controller",
".",
"Provisioner",
"{",
"return",
"&",
"glusterfileProvisioner",
"{",
"client",
":",
"client",
",",
"identity",
":",
"id",
",",
"allocator",
":",
"gidallocator",
".",
"New",
"(",
"client",
")",
",",
"}",
"\n",
"}"
] | //NewglusterfileProvisioner create a new provisioner. | [
"NewglusterfileProvisioner",
"create",
"a",
"new",
"provisioner",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/gluster/file/cmd/glusterfile-provisioner/glusterfile-provisioner.go#L92-L98 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/deleter/proctable.go | IsEmpty | func (v *ProcTableImpl) IsEmpty() bool {
v.mutex.RLock()
defer v.mutex.RUnlock()
return len(v.procTable) == 0
} | go | func (v *ProcTableImpl) IsEmpty() bool {
v.mutex.RLock()
defer v.mutex.RUnlock()
return len(v.procTable) == 0
} | [
"func",
"(",
"v",
"*",
"ProcTableImpl",
")",
"IsEmpty",
"(",
")",
"bool",
"{",
"v",
".",
"mutex",
".",
"RLock",
"(",
")",
"\n",
"defer",
"v",
".",
"mutex",
".",
"RUnlock",
"(",
")",
"\n",
"return",
"len",
"(",
"v",
".",
"procTable",
")",
"==",
"0",
"\n",
"}"
] | // IsEmpty Check if any cleanup process is running | [
"IsEmpty",
"Check",
"if",
"any",
"cleanup",
"process",
"is",
"running"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/deleter/proctable.go#L78-L82 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/deleter/proctable.go | MarkFailed | func (v *ProcTableImpl) MarkFailed(pvName string) error {
return v.markStatus(pvName, CSFailed)
} | go | func (v *ProcTableImpl) MarkFailed(pvName string) error {
return v.markStatus(pvName, CSFailed)
} | [
"func",
"(",
"v",
"*",
"ProcTableImpl",
")",
"MarkFailed",
"(",
"pvName",
"string",
")",
"error",
"{",
"return",
"v",
".",
"markStatus",
"(",
"pvName",
",",
"CSFailed",
")",
"\n",
"}"
] | // MarkFailed Indicate the process has failed in its run. | [
"MarkFailed",
"Indicate",
"the",
"process",
"has",
"failed",
"in",
"its",
"run",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/deleter/proctable.go#L97-L99 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/deleter/proctable.go | MarkSucceeded | func (v *ProcTableImpl) MarkSucceeded(pvName string) error {
return v.markStatus(pvName, CSSucceeded)
} | go | func (v *ProcTableImpl) MarkSucceeded(pvName string) error {
return v.markStatus(pvName, CSSucceeded)
} | [
"func",
"(",
"v",
"*",
"ProcTableImpl",
")",
"MarkSucceeded",
"(",
"pvName",
"string",
")",
"error",
"{",
"return",
"v",
".",
"markStatus",
"(",
"pvName",
",",
"CSSucceeded",
")",
"\n",
"}"
] | // MarkSucceeded Indicate the process has succeeded in its run. | [
"MarkSucceeded",
"Indicate",
"the",
"process",
"has",
"succeeded",
"in",
"its",
"run",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/deleter/proctable.go#L102-L104 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/deleter/proctable.go | RemoveEntry | func (v *ProcTableImpl) RemoveEntry(pvName string) (CleanupState, *time.Time, error) {
v.mutex.Lock()
defer v.mutex.Unlock()
entry, ok := v.procTable[pvName]
if !ok {
return CSNotFound, nil, nil
}
if entry.Status == CSRunning {
return CSUnknown, nil, fmt.Errorf("cannot remove proctable entry for %q when it is still running", pvName)
}
if entry.Status == CSUnknown {
return CSUnknown, nil, fmt.Errorf("proctable entry for %q in unexpected unknown state", pvName)
}
delete(v.procTable, pvName)
return entry.Status, &entry.StartTime, nil
} | go | func (v *ProcTableImpl) RemoveEntry(pvName string) (CleanupState, *time.Time, error) {
v.mutex.Lock()
defer v.mutex.Unlock()
entry, ok := v.procTable[pvName]
if !ok {
return CSNotFound, nil, nil
}
if entry.Status == CSRunning {
return CSUnknown, nil, fmt.Errorf("cannot remove proctable entry for %q when it is still running", pvName)
}
if entry.Status == CSUnknown {
return CSUnknown, nil, fmt.Errorf("proctable entry for %q in unexpected unknown state", pvName)
}
delete(v.procTable, pvName)
return entry.Status, &entry.StartTime, nil
} | [
"func",
"(",
"v",
"*",
"ProcTableImpl",
")",
"RemoveEntry",
"(",
"pvName",
"string",
")",
"(",
"CleanupState",
",",
"*",
"time",
".",
"Time",
",",
"error",
")",
"{",
"v",
".",
"mutex",
".",
"Lock",
"(",
")",
"\n",
"defer",
"v",
".",
"mutex",
".",
"Unlock",
"(",
")",
"\n",
"entry",
",",
"ok",
":=",
"v",
".",
"procTable",
"[",
"pvName",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"CSNotFound",
",",
"nil",
",",
"nil",
"\n",
"}",
"\n",
"if",
"entry",
".",
"Status",
"==",
"CSRunning",
"{",
"return",
"CSUnknown",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"pvName",
")",
"\n",
"}",
"\n",
"if",
"entry",
".",
"Status",
"==",
"CSUnknown",
"{",
"return",
"CSUnknown",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"pvName",
")",
"\n",
"}",
"\n",
"delete",
"(",
"v",
".",
"procTable",
",",
"pvName",
")",
"\n",
"return",
"entry",
".",
"Status",
",",
"&",
"entry",
".",
"StartTime",
",",
"nil",
"\n",
"}"
] | // RemoveEntry Removes proctable entry and returns final state and start time of cleanup.
// Must only be called and cleanup that has ended, else error is returned. | [
"RemoveEntry",
"Removes",
"proctable",
"entry",
"and",
"returns",
"final",
"state",
"and",
"start",
"time",
"of",
"cleanup",
".",
"Must",
"only",
"be",
"called",
"and",
"cleanup",
"that",
"has",
"ended",
"else",
"error",
"is",
"returned",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/deleter/proctable.go#L128-L143 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/deleter/proctable.go | Stats | func (v *ProcTableImpl) Stats() ProcTableStats {
v.mutex.RLock()
defer v.mutex.RUnlock()
running := 0
for _, entry := range v.procTable {
if entry.Status == CSRunning {
running++
}
}
return ProcTableStats{
Running: running,
Succeeded: v.succeeded,
Failed: v.failed,
}
} | go | func (v *ProcTableImpl) Stats() ProcTableStats {
v.mutex.RLock()
defer v.mutex.RUnlock()
running := 0
for _, entry := range v.procTable {
if entry.Status == CSRunning {
running++
}
}
return ProcTableStats{
Running: running,
Succeeded: v.succeeded,
Failed: v.failed,
}
} | [
"func",
"(",
"v",
"*",
"ProcTableImpl",
")",
"Stats",
"(",
")",
"ProcTableStats",
"{",
"v",
".",
"mutex",
".",
"RLock",
"(",
")",
"\n",
"defer",
"v",
".",
"mutex",
".",
"RUnlock",
"(",
")",
"\n",
"running",
":=",
"0",
"\n",
"for",
"_",
",",
"entry",
":=",
"range",
"v",
".",
"procTable",
"{",
"if",
"entry",
".",
"Status",
"==",
"CSRunning",
"{",
"running",
"++",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"ProcTableStats",
"{",
"Running",
":",
"running",
",",
"Succeeded",
":",
"v",
".",
"succeeded",
",",
"Failed",
":",
"v",
".",
"failed",
",",
"}",
"\n",
"}"
] | // Stats returns stats of ProcTable. | [
"Stats",
"returns",
"stats",
"of",
"ProcTable",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/deleter/proctable.go#L146-L160 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/deleter/proctable.go | MarkFailed | func (f *FakeProcTableImpl) MarkFailed(pvName string) error {
f.MarkDoneCount++
return f.realTable.MarkFailed(pvName)
} | go | func (f *FakeProcTableImpl) MarkFailed(pvName string) error {
f.MarkDoneCount++
return f.realTable.MarkFailed(pvName)
} | [
"func",
"(",
"f",
"*",
"FakeProcTableImpl",
")",
"MarkFailed",
"(",
"pvName",
"string",
")",
"error",
"{",
"f",
".",
"MarkDoneCount",
"++",
"\n",
"return",
"f",
".",
"realTable",
".",
"MarkFailed",
"(",
"pvName",
")",
"\n",
"}"
] | // MarkFailed Indicate the process has failed. | [
"MarkFailed",
"Indicate",
"the",
"process",
"has",
"failed",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/deleter/proctable.go#L202-L205 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/deleter/proctable.go | MarkSucceeded | func (f *FakeProcTableImpl) MarkSucceeded(pvName string) error {
f.MarkDoneCount++
return f.realTable.MarkSucceeded(pvName)
} | go | func (f *FakeProcTableImpl) MarkSucceeded(pvName string) error {
f.MarkDoneCount++
return f.realTable.MarkSucceeded(pvName)
} | [
"func",
"(",
"f",
"*",
"FakeProcTableImpl",
")",
"MarkSucceeded",
"(",
"pvName",
"string",
")",
"error",
"{",
"f",
".",
"MarkDoneCount",
"++",
"\n",
"return",
"f",
".",
"realTable",
".",
"MarkSucceeded",
"(",
"pvName",
")",
"\n",
"}"
] | // MarkSucceeded Indicate the process has succeeded. | [
"MarkSucceeded",
"Indicate",
"the",
"process",
"has",
"succeeded",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/deleter/proctable.go#L208-L211 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/deleter/proctable.go | RemoveEntry | func (f *FakeProcTableImpl) RemoveEntry(pvName string) (CleanupState, *time.Time, error) {
f.RemoveCount++
return f.realTable.RemoveEntry(pvName)
} | go | func (f *FakeProcTableImpl) RemoveEntry(pvName string) (CleanupState, *time.Time, error) {
f.RemoveCount++
return f.realTable.RemoveEntry(pvName)
} | [
"func",
"(",
"f",
"*",
"FakeProcTableImpl",
")",
"RemoveEntry",
"(",
"pvName",
"string",
")",
"(",
"CleanupState",
",",
"*",
"time",
".",
"Time",
",",
"error",
")",
"{",
"f",
".",
"RemoveCount",
"++",
"\n",
"return",
"f",
".",
"realTable",
".",
"RemoveEntry",
"(",
"pvName",
")",
"\n",
"}"
] | // RemoveEntry removes the entry from the proc table. | [
"RemoveEntry",
"removes",
"the",
"entry",
"from",
"the",
"proc",
"table",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/deleter/proctable.go#L214-L217 | train |
kubernetes-incubator/external-storage | snapshot/pkg/client/client.go | NewClient | func NewClient(cfg *rest.Config) (*rest.RESTClient, *runtime.Scheme, error) {
scheme := runtime.NewScheme()
if err := crdv1.AddToScheme(scheme); err != nil {
return nil, nil, err
}
config := *cfg
config.GroupVersion = &crdv1.SchemeGroupVersion
config.APIPath = "/apis"
config.ContentType = runtime.ContentTypeJSON
config.NegotiatedSerializer = serializer.DirectCodecFactory{CodecFactory: serializer.NewCodecFactory(scheme)}
client, err := rest.RESTClientFor(&config)
if err != nil {
return nil, nil, err
}
return client, scheme, nil
} | go | func NewClient(cfg *rest.Config) (*rest.RESTClient, *runtime.Scheme, error) {
scheme := runtime.NewScheme()
if err := crdv1.AddToScheme(scheme); err != nil {
return nil, nil, err
}
config := *cfg
config.GroupVersion = &crdv1.SchemeGroupVersion
config.APIPath = "/apis"
config.ContentType = runtime.ContentTypeJSON
config.NegotiatedSerializer = serializer.DirectCodecFactory{CodecFactory: serializer.NewCodecFactory(scheme)}
client, err := rest.RESTClientFor(&config)
if err != nil {
return nil, nil, err
}
return client, scheme, nil
} | [
"func",
"NewClient",
"(",
"cfg",
"*",
"rest",
".",
"Config",
")",
"(",
"*",
"rest",
".",
"RESTClient",
",",
"*",
"runtime",
".",
"Scheme",
",",
"error",
")",
"{",
"scheme",
":=",
"runtime",
".",
"NewScheme",
"(",
")",
"\n",
"if",
"err",
":=",
"crdv1",
".",
"AddToScheme",
"(",
"scheme",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"config",
":=",
"*",
"cfg",
"\n",
"config",
".",
"GroupVersion",
"=",
"&",
"crdv1",
".",
"SchemeGroupVersion",
"\n",
"config",
".",
"APIPath",
"=",
"\"",
"\"",
"\n",
"config",
".",
"ContentType",
"=",
"runtime",
".",
"ContentTypeJSON",
"\n",
"config",
".",
"NegotiatedSerializer",
"=",
"serializer",
".",
"DirectCodecFactory",
"{",
"CodecFactory",
":",
"serializer",
".",
"NewCodecFactory",
"(",
"scheme",
")",
"}",
"\n\n",
"client",
",",
"err",
":=",
"rest",
".",
"RESTClientFor",
"(",
"&",
"config",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"client",
",",
"scheme",
",",
"nil",
"\n",
"}"
] | // NewClient creates a new RESTClient | [
"NewClient",
"creates",
"a",
"new",
"RESTClient"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/client/client.go#L41-L59 | train |
kubernetes-incubator/external-storage | snapshot/pkg/client/client.go | CreateCRD | func CreateCRD(clientset apiextensionsclient.Interface) error {
crd := &apiextensionsv1beta1.CustomResourceDefinition{
ObjectMeta: metav1.ObjectMeta{
Name: crdv1.VolumeSnapshotDataResourcePlural + "." + crdv1.GroupName,
},
Spec: apiextensionsv1beta1.CustomResourceDefinitionSpec{
Group: crdv1.GroupName,
Version: crdv1.SchemeGroupVersion.Version,
Scope: apiextensionsv1beta1.ClusterScoped,
Names: apiextensionsv1beta1.CustomResourceDefinitionNames{
Plural: crdv1.VolumeSnapshotDataResourcePlural,
Kind: reflect.TypeOf(crdv1.VolumeSnapshotData{}).Name(),
},
},
}
res, err := clientset.ApiextensionsV1beta1().CustomResourceDefinitions().Create(crd)
if err != nil && !apierrors.IsAlreadyExists(err) {
glog.Fatalf("failed to create VolumeSnapshotDataResource: %#v, err: %#v",
res, err)
}
crd = &apiextensionsv1beta1.CustomResourceDefinition{
ObjectMeta: metav1.ObjectMeta{
Name: crdv1.VolumeSnapshotResourcePlural + "." + crdv1.GroupName,
},
Spec: apiextensionsv1beta1.CustomResourceDefinitionSpec{
Group: crdv1.GroupName,
Version: crdv1.SchemeGroupVersion.Version,
Scope: apiextensionsv1beta1.NamespaceScoped,
Names: apiextensionsv1beta1.CustomResourceDefinitionNames{
Plural: crdv1.VolumeSnapshotResourcePlural,
Kind: reflect.TypeOf(crdv1.VolumeSnapshot{}).Name(),
},
},
}
res, err = clientset.ApiextensionsV1beta1().CustomResourceDefinitions().Create(crd)
if err != nil && !apierrors.IsAlreadyExists(err) {
glog.Fatalf("failed to create VolumeSnapshotResource: %#v, err: %#v",
res, err)
}
return nil
} | go | func CreateCRD(clientset apiextensionsclient.Interface) error {
crd := &apiextensionsv1beta1.CustomResourceDefinition{
ObjectMeta: metav1.ObjectMeta{
Name: crdv1.VolumeSnapshotDataResourcePlural + "." + crdv1.GroupName,
},
Spec: apiextensionsv1beta1.CustomResourceDefinitionSpec{
Group: crdv1.GroupName,
Version: crdv1.SchemeGroupVersion.Version,
Scope: apiextensionsv1beta1.ClusterScoped,
Names: apiextensionsv1beta1.CustomResourceDefinitionNames{
Plural: crdv1.VolumeSnapshotDataResourcePlural,
Kind: reflect.TypeOf(crdv1.VolumeSnapshotData{}).Name(),
},
},
}
res, err := clientset.ApiextensionsV1beta1().CustomResourceDefinitions().Create(crd)
if err != nil && !apierrors.IsAlreadyExists(err) {
glog.Fatalf("failed to create VolumeSnapshotDataResource: %#v, err: %#v",
res, err)
}
crd = &apiextensionsv1beta1.CustomResourceDefinition{
ObjectMeta: metav1.ObjectMeta{
Name: crdv1.VolumeSnapshotResourcePlural + "." + crdv1.GroupName,
},
Spec: apiextensionsv1beta1.CustomResourceDefinitionSpec{
Group: crdv1.GroupName,
Version: crdv1.SchemeGroupVersion.Version,
Scope: apiextensionsv1beta1.NamespaceScoped,
Names: apiextensionsv1beta1.CustomResourceDefinitionNames{
Plural: crdv1.VolumeSnapshotResourcePlural,
Kind: reflect.TypeOf(crdv1.VolumeSnapshot{}).Name(),
},
},
}
res, err = clientset.ApiextensionsV1beta1().CustomResourceDefinitions().Create(crd)
if err != nil && !apierrors.IsAlreadyExists(err) {
glog.Fatalf("failed to create VolumeSnapshotResource: %#v, err: %#v",
res, err)
}
return nil
} | [
"func",
"CreateCRD",
"(",
"clientset",
"apiextensionsclient",
".",
"Interface",
")",
"error",
"{",
"crd",
":=",
"&",
"apiextensionsv1beta1",
".",
"CustomResourceDefinition",
"{",
"ObjectMeta",
":",
"metav1",
".",
"ObjectMeta",
"{",
"Name",
":",
"crdv1",
".",
"VolumeSnapshotDataResourcePlural",
"+",
"\"",
"\"",
"+",
"crdv1",
".",
"GroupName",
",",
"}",
",",
"Spec",
":",
"apiextensionsv1beta1",
".",
"CustomResourceDefinitionSpec",
"{",
"Group",
":",
"crdv1",
".",
"GroupName",
",",
"Version",
":",
"crdv1",
".",
"SchemeGroupVersion",
".",
"Version",
",",
"Scope",
":",
"apiextensionsv1beta1",
".",
"ClusterScoped",
",",
"Names",
":",
"apiextensionsv1beta1",
".",
"CustomResourceDefinitionNames",
"{",
"Plural",
":",
"crdv1",
".",
"VolumeSnapshotDataResourcePlural",
",",
"Kind",
":",
"reflect",
".",
"TypeOf",
"(",
"crdv1",
".",
"VolumeSnapshotData",
"{",
"}",
")",
".",
"Name",
"(",
")",
",",
"}",
",",
"}",
",",
"}",
"\n",
"res",
",",
"err",
":=",
"clientset",
".",
"ApiextensionsV1beta1",
"(",
")",
".",
"CustomResourceDefinitions",
"(",
")",
".",
"Create",
"(",
"crd",
")",
"\n\n",
"if",
"err",
"!=",
"nil",
"&&",
"!",
"apierrors",
".",
"IsAlreadyExists",
"(",
"err",
")",
"{",
"glog",
".",
"Fatalf",
"(",
"\"",
"\"",
",",
"res",
",",
"err",
")",
"\n",
"}",
"\n\n",
"crd",
"=",
"&",
"apiextensionsv1beta1",
".",
"CustomResourceDefinition",
"{",
"ObjectMeta",
":",
"metav1",
".",
"ObjectMeta",
"{",
"Name",
":",
"crdv1",
".",
"VolumeSnapshotResourcePlural",
"+",
"\"",
"\"",
"+",
"crdv1",
".",
"GroupName",
",",
"}",
",",
"Spec",
":",
"apiextensionsv1beta1",
".",
"CustomResourceDefinitionSpec",
"{",
"Group",
":",
"crdv1",
".",
"GroupName",
",",
"Version",
":",
"crdv1",
".",
"SchemeGroupVersion",
".",
"Version",
",",
"Scope",
":",
"apiextensionsv1beta1",
".",
"NamespaceScoped",
",",
"Names",
":",
"apiextensionsv1beta1",
".",
"CustomResourceDefinitionNames",
"{",
"Plural",
":",
"crdv1",
".",
"VolumeSnapshotResourcePlural",
",",
"Kind",
":",
"reflect",
".",
"TypeOf",
"(",
"crdv1",
".",
"VolumeSnapshot",
"{",
"}",
")",
".",
"Name",
"(",
")",
",",
"}",
",",
"}",
",",
"}",
"\n",
"res",
",",
"err",
"=",
"clientset",
".",
"ApiextensionsV1beta1",
"(",
")",
".",
"CustomResourceDefinitions",
"(",
")",
".",
"Create",
"(",
"crd",
")",
"\n",
"if",
"err",
"!=",
"nil",
"&&",
"!",
"apierrors",
".",
"IsAlreadyExists",
"(",
"err",
")",
"{",
"glog",
".",
"Fatalf",
"(",
"\"",
"\"",
",",
"res",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // CreateCRD creates CustomResourceDefinition | [
"CreateCRD",
"creates",
"CustomResourceDefinition"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/client/client.go#L62-L104 | train |
kubernetes-incubator/external-storage | snapshot/pkg/client/client.go | WaitForSnapshotResource | func WaitForSnapshotResource(snapshotClient *rest.RESTClient) error {
return wait.Poll(100*time.Millisecond, 60*time.Second, func() (bool, error) {
_, err := snapshotClient.Get().
Resource(crdv1.VolumeSnapshotDataResourcePlural).DoRaw()
if err == nil {
return true, nil
}
if apierrors.IsNotFound(err) {
return false, nil
}
return false, err
})
} | go | func WaitForSnapshotResource(snapshotClient *rest.RESTClient) error {
return wait.Poll(100*time.Millisecond, 60*time.Second, func() (bool, error) {
_, err := snapshotClient.Get().
Resource(crdv1.VolumeSnapshotDataResourcePlural).DoRaw()
if err == nil {
return true, nil
}
if apierrors.IsNotFound(err) {
return false, nil
}
return false, err
})
} | [
"func",
"WaitForSnapshotResource",
"(",
"snapshotClient",
"*",
"rest",
".",
"RESTClient",
")",
"error",
"{",
"return",
"wait",
".",
"Poll",
"(",
"100",
"*",
"time",
".",
"Millisecond",
",",
"60",
"*",
"time",
".",
"Second",
",",
"func",
"(",
")",
"(",
"bool",
",",
"error",
")",
"{",
"_",
",",
"err",
":=",
"snapshotClient",
".",
"Get",
"(",
")",
".",
"Resource",
"(",
"crdv1",
".",
"VolumeSnapshotDataResourcePlural",
")",
".",
"DoRaw",
"(",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"return",
"true",
",",
"nil",
"\n",
"}",
"\n",
"if",
"apierrors",
".",
"IsNotFound",
"(",
"err",
")",
"{",
"return",
"false",
",",
"nil",
"\n",
"}",
"\n",
"return",
"false",
",",
"err",
"\n",
"}",
")",
"\n",
"}"
] | // WaitForSnapshotResource waits for the snapshot resource | [
"WaitForSnapshotResource",
"waits",
"for",
"the",
"snapshot",
"resource"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/client/client.go#L107-L119 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/openstack/openstack_instances.go | List | func (i *Instances) List(nameFilter string) ([]types.NodeName, error) {
glog.V(4).Infof("openstack List(%v) called", nameFilter)
opts := servers.ListOpts{
Name: nameFilter,
Status: "ACTIVE",
}
pager := servers.List(i.compute, opts)
ret := make([]types.NodeName, 0)
err := pager.EachPage(func(page pagination.Page) (bool, error) {
sList, err := servers.ExtractServers(page)
if err != nil {
return false, err
}
for i := range sList {
ret = append(ret, mapServerToNodeName(&sList[i]))
}
return true, nil
})
if err != nil {
return nil, err
}
glog.V(3).Infof("Found %v instances matching %v: %v",
len(ret), nameFilter, ret)
return ret, nil
} | go | func (i *Instances) List(nameFilter string) ([]types.NodeName, error) {
glog.V(4).Infof("openstack List(%v) called", nameFilter)
opts := servers.ListOpts{
Name: nameFilter,
Status: "ACTIVE",
}
pager := servers.List(i.compute, opts)
ret := make([]types.NodeName, 0)
err := pager.EachPage(func(page pagination.Page) (bool, error) {
sList, err := servers.ExtractServers(page)
if err != nil {
return false, err
}
for i := range sList {
ret = append(ret, mapServerToNodeName(&sList[i]))
}
return true, nil
})
if err != nil {
return nil, err
}
glog.V(3).Infof("Found %v instances matching %v: %v",
len(ret), nameFilter, ret)
return ret, nil
} | [
"func",
"(",
"i",
"*",
"Instances",
")",
"List",
"(",
"nameFilter",
"string",
")",
"(",
"[",
"]",
"types",
".",
"NodeName",
",",
"error",
")",
"{",
"glog",
".",
"V",
"(",
"4",
")",
".",
"Infof",
"(",
"\"",
"\"",
",",
"nameFilter",
")",
"\n\n",
"opts",
":=",
"servers",
".",
"ListOpts",
"{",
"Name",
":",
"nameFilter",
",",
"Status",
":",
"\"",
"\"",
",",
"}",
"\n",
"pager",
":=",
"servers",
".",
"List",
"(",
"i",
".",
"compute",
",",
"opts",
")",
"\n\n",
"ret",
":=",
"make",
"(",
"[",
"]",
"types",
".",
"NodeName",
",",
"0",
")",
"\n",
"err",
":=",
"pager",
".",
"EachPage",
"(",
"func",
"(",
"page",
"pagination",
".",
"Page",
")",
"(",
"bool",
",",
"error",
")",
"{",
"sList",
",",
"err",
":=",
"servers",
".",
"ExtractServers",
"(",
"page",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n",
"for",
"i",
":=",
"range",
"sList",
"{",
"ret",
"=",
"append",
"(",
"ret",
",",
"mapServerToNodeName",
"(",
"&",
"sList",
"[",
"i",
"]",
")",
")",
"\n",
"}",
"\n",
"return",
"true",
",",
"nil",
"\n",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"glog",
".",
"V",
"(",
"3",
")",
".",
"Infof",
"(",
"\"",
"\"",
",",
"len",
"(",
"ret",
")",
",",
"nameFilter",
",",
"ret",
")",
"\n\n",
"return",
"ret",
",",
"nil",
"\n",
"}"
] | // List lists node names | [
"List",
"lists",
"node",
"names"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/openstack/openstack_instances.go#L52-L80 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/openstack/openstack_instances.go | NodeAddresses | func (i *Instances) NodeAddresses(name types.NodeName) ([]v1.NodeAddress, error) {
glog.V(4).Infof("NodeAddresses(%v) called", name)
addrs, err := getAddressesByName(i.compute, name)
if err != nil {
return nil, err
}
glog.V(4).Infof("NodeAddresses(%v) => %v", name, addrs)
return addrs, nil
} | go | func (i *Instances) NodeAddresses(name types.NodeName) ([]v1.NodeAddress, error) {
glog.V(4).Infof("NodeAddresses(%v) called", name)
addrs, err := getAddressesByName(i.compute, name)
if err != nil {
return nil, err
}
glog.V(4).Infof("NodeAddresses(%v) => %v", name, addrs)
return addrs, nil
} | [
"func",
"(",
"i",
"*",
"Instances",
")",
"NodeAddresses",
"(",
"name",
"types",
".",
"NodeName",
")",
"(",
"[",
"]",
"v1",
".",
"NodeAddress",
",",
"error",
")",
"{",
"glog",
".",
"V",
"(",
"4",
")",
".",
"Infof",
"(",
"\"",
"\"",
",",
"name",
")",
"\n\n",
"addrs",
",",
"err",
":=",
"getAddressesByName",
"(",
"i",
".",
"compute",
",",
"name",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"glog",
".",
"V",
"(",
"4",
")",
".",
"Infof",
"(",
"\"",
"\"",
",",
"name",
",",
"addrs",
")",
"\n",
"return",
"addrs",
",",
"nil",
"\n",
"}"
] | // NodeAddresses gets node addresses | [
"NodeAddresses",
"gets",
"node",
"addresses"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/openstack/openstack_instances.go#L98-L108 | train |
kubernetes-incubator/external-storage | nfs/pkg/volume/util.go | generateID | func generateID(mutex *sync.Mutex, ids map[uint16]bool) uint16 {
mutex.Lock()
id := uint16(1)
for ; id <= math.MaxUint16; id++ {
if _, ok := ids[id]; !ok {
break
}
}
ids[id] = true
mutex.Unlock()
return id
} | go | func generateID(mutex *sync.Mutex, ids map[uint16]bool) uint16 {
mutex.Lock()
id := uint16(1)
for ; id <= math.MaxUint16; id++ {
if _, ok := ids[id]; !ok {
break
}
}
ids[id] = true
mutex.Unlock()
return id
} | [
"func",
"generateID",
"(",
"mutex",
"*",
"sync",
".",
"Mutex",
",",
"ids",
"map",
"[",
"uint16",
"]",
"bool",
")",
"uint16",
"{",
"mutex",
".",
"Lock",
"(",
")",
"\n",
"id",
":=",
"uint16",
"(",
"1",
")",
"\n",
"for",
";",
"id",
"<=",
"math",
".",
"MaxUint16",
";",
"id",
"++",
"{",
"if",
"_",
",",
"ok",
":=",
"ids",
"[",
"id",
"]",
";",
"!",
"ok",
"{",
"break",
"\n",
"}",
"\n",
"}",
"\n",
"ids",
"[",
"id",
"]",
"=",
"true",
"\n",
"mutex",
".",
"Unlock",
"(",
")",
"\n",
"return",
"id",
"\n",
"}"
] | // generateID generates a unique exportID to assign an export | [
"generateID",
"generates",
"a",
"unique",
"exportID",
"to",
"assign",
"an",
"export"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/nfs/pkg/volume/util.go#L31-L42 | train |
kubernetes-incubator/external-storage | nfs/pkg/volume/util.go | getExistingIDs | func getExistingIDs(config string, re *regexp.Regexp) (map[uint16]bool, error) {
ids := map[uint16]bool{}
digitsRe := "([0-9]+)"
if !strings.Contains(re.String(), digitsRe) {
return ids, fmt.Errorf("regexp %s doesn't contain digits submatch %s", re.String(), digitsRe)
}
read, err := ioutil.ReadFile(config)
if err != nil {
return ids, err
}
allMatches := re.FindAllSubmatch(read, -1)
for _, match := range allMatches {
digits := match[1]
if id, err := strconv.ParseUint(string(digits), 10, 16); err == nil {
ids[uint16(id)] = true
}
}
return ids, nil
} | go | func getExistingIDs(config string, re *regexp.Regexp) (map[uint16]bool, error) {
ids := map[uint16]bool{}
digitsRe := "([0-9]+)"
if !strings.Contains(re.String(), digitsRe) {
return ids, fmt.Errorf("regexp %s doesn't contain digits submatch %s", re.String(), digitsRe)
}
read, err := ioutil.ReadFile(config)
if err != nil {
return ids, err
}
allMatches := re.FindAllSubmatch(read, -1)
for _, match := range allMatches {
digits := match[1]
if id, err := strconv.ParseUint(string(digits), 10, 16); err == nil {
ids[uint16(id)] = true
}
}
return ids, nil
} | [
"func",
"getExistingIDs",
"(",
"config",
"string",
",",
"re",
"*",
"regexp",
".",
"Regexp",
")",
"(",
"map",
"[",
"uint16",
"]",
"bool",
",",
"error",
")",
"{",
"ids",
":=",
"map",
"[",
"uint16",
"]",
"bool",
"{",
"}",
"\n\n",
"digitsRe",
":=",
"\"",
"\"",
"\n",
"if",
"!",
"strings",
".",
"Contains",
"(",
"re",
".",
"String",
"(",
")",
",",
"digitsRe",
")",
"{",
"return",
"ids",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"re",
".",
"String",
"(",
")",
",",
"digitsRe",
")",
"\n",
"}",
"\n\n",
"read",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"config",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"ids",
",",
"err",
"\n",
"}",
"\n\n",
"allMatches",
":=",
"re",
".",
"FindAllSubmatch",
"(",
"read",
",",
"-",
"1",
")",
"\n",
"for",
"_",
",",
"match",
":=",
"range",
"allMatches",
"{",
"digits",
":=",
"match",
"[",
"1",
"]",
"\n",
"if",
"id",
",",
"err",
":=",
"strconv",
".",
"ParseUint",
"(",
"string",
"(",
"digits",
")",
",",
"10",
",",
"16",
")",
";",
"err",
"==",
"nil",
"{",
"ids",
"[",
"uint16",
"(",
"id",
")",
"]",
"=",
"true",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"ids",
",",
"nil",
"\n",
"}"
] | // getExistingIDs populates a map with existing ids found in the given config
// file using the given regexp. Regexp must have a "digits" submatch. | [
"getExistingIDs",
"populates",
"a",
"map",
"with",
"existing",
"ids",
"found",
"in",
"the",
"given",
"config",
"file",
"using",
"the",
"given",
"regexp",
".",
"Regexp",
"must",
"have",
"a",
"digits",
"submatch",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/nfs/pkg/volume/util.go#L52-L74 | train |
kubernetes-incubator/external-storage | snapshot/pkg/controller/snapshot-controller/snapshot-controller.go | NewSnapshotController | func NewSnapshotController(client *rest.RESTClient,
scheme *runtime.Scheme,
clientset kubernetes.Interface,
volumePlugins *map[string]volume.Plugin,
syncDuration time.Duration) SnapshotController {
sc := &snapshotController{
snapshotClient: client,
snapshotScheme: scheme,
}
// Watch snapshot objects
source := kcache.NewListWatchFromClient(
sc.snapshotClient,
crdv1.VolumeSnapshotResourcePlural,
apiv1.NamespaceAll,
fields.Everything())
sc.snapshotStore, sc.snapshotController = kcache.NewInformer(
source,
// The object type.
&crdv1.VolumeSnapshot{},
// resyncPeriod
// Every resyncPeriod, all resources in the kcache will retrigger events.
// Set to 0 to disable the resync.
time.Minute*60,
// Your custom resource event handlers.
kcache.ResourceEventHandlerFuncs{
AddFunc: sc.onSnapshotAdd,
UpdateFunc: sc.onSnapshotUpdate,
DeleteFunc: sc.onSnapshotDelete,
})
//eventBroadcaster := record.NewBroadcaster()
//eventBroadcaster.StartLogging(glog.Infof)
//eventBroadcaster.StartRecordingToSink(&v1core.EventSinkImpl{Interface: v1core.New(client).Events("")})
// sc.recorder = eventBroadcaster.NewRecorder(api.Scheme, apiv1.EventSource{Component: "volume snapshotting"})
sc.desiredStateOfWorld = cache.NewDesiredStateOfWorld()
sc.actualStateOfWorld = cache.NewActualStateOfWorld()
sc.snapshotter = snapshotter.NewVolumeSnapshotter(
client,
scheme,
clientset,
sc.actualStateOfWorld,
volumePlugins)
sc.reconciler = reconciler.NewReconciler(
reconcilerLoopPeriod,
syncDuration,
false, /* disableReconciliationSync */
sc.desiredStateOfWorld,
sc.actualStateOfWorld,
sc.snapshotter)
sc.desiredStateOfWorldPopulator = populator.NewDesiredStateOfWorldPopulator(
desiredStateOfWorldPopulatorLoopSleepPeriod,
desiredStateOfWorldPopulatorListSnapshotsRetryDuration,
sc.snapshotStore,
sc.desiredStateOfWorld,
)
return sc
} | go | func NewSnapshotController(client *rest.RESTClient,
scheme *runtime.Scheme,
clientset kubernetes.Interface,
volumePlugins *map[string]volume.Plugin,
syncDuration time.Duration) SnapshotController {
sc := &snapshotController{
snapshotClient: client,
snapshotScheme: scheme,
}
// Watch snapshot objects
source := kcache.NewListWatchFromClient(
sc.snapshotClient,
crdv1.VolumeSnapshotResourcePlural,
apiv1.NamespaceAll,
fields.Everything())
sc.snapshotStore, sc.snapshotController = kcache.NewInformer(
source,
// The object type.
&crdv1.VolumeSnapshot{},
// resyncPeriod
// Every resyncPeriod, all resources in the kcache will retrigger events.
// Set to 0 to disable the resync.
time.Minute*60,
// Your custom resource event handlers.
kcache.ResourceEventHandlerFuncs{
AddFunc: sc.onSnapshotAdd,
UpdateFunc: sc.onSnapshotUpdate,
DeleteFunc: sc.onSnapshotDelete,
})
//eventBroadcaster := record.NewBroadcaster()
//eventBroadcaster.StartLogging(glog.Infof)
//eventBroadcaster.StartRecordingToSink(&v1core.EventSinkImpl{Interface: v1core.New(client).Events("")})
// sc.recorder = eventBroadcaster.NewRecorder(api.Scheme, apiv1.EventSource{Component: "volume snapshotting"})
sc.desiredStateOfWorld = cache.NewDesiredStateOfWorld()
sc.actualStateOfWorld = cache.NewActualStateOfWorld()
sc.snapshotter = snapshotter.NewVolumeSnapshotter(
client,
scheme,
clientset,
sc.actualStateOfWorld,
volumePlugins)
sc.reconciler = reconciler.NewReconciler(
reconcilerLoopPeriod,
syncDuration,
false, /* disableReconciliationSync */
sc.desiredStateOfWorld,
sc.actualStateOfWorld,
sc.snapshotter)
sc.desiredStateOfWorldPopulator = populator.NewDesiredStateOfWorldPopulator(
desiredStateOfWorldPopulatorLoopSleepPeriod,
desiredStateOfWorldPopulatorListSnapshotsRetryDuration,
sc.snapshotStore,
sc.desiredStateOfWorld,
)
return sc
} | [
"func",
"NewSnapshotController",
"(",
"client",
"*",
"rest",
".",
"RESTClient",
",",
"scheme",
"*",
"runtime",
".",
"Scheme",
",",
"clientset",
"kubernetes",
".",
"Interface",
",",
"volumePlugins",
"*",
"map",
"[",
"string",
"]",
"volume",
".",
"Plugin",
",",
"syncDuration",
"time",
".",
"Duration",
")",
"SnapshotController",
"{",
"sc",
":=",
"&",
"snapshotController",
"{",
"snapshotClient",
":",
"client",
",",
"snapshotScheme",
":",
"scheme",
",",
"}",
"\n\n",
"// Watch snapshot objects",
"source",
":=",
"kcache",
".",
"NewListWatchFromClient",
"(",
"sc",
".",
"snapshotClient",
",",
"crdv1",
".",
"VolumeSnapshotResourcePlural",
",",
"apiv1",
".",
"NamespaceAll",
",",
"fields",
".",
"Everything",
"(",
")",
")",
"\n\n",
"sc",
".",
"snapshotStore",
",",
"sc",
".",
"snapshotController",
"=",
"kcache",
".",
"NewInformer",
"(",
"source",
",",
"// The object type.",
"&",
"crdv1",
".",
"VolumeSnapshot",
"{",
"}",
",",
"// resyncPeriod",
"// Every resyncPeriod, all resources in the kcache will retrigger events.",
"// Set to 0 to disable the resync.",
"time",
".",
"Minute",
"*",
"60",
",",
"// Your custom resource event handlers.",
"kcache",
".",
"ResourceEventHandlerFuncs",
"{",
"AddFunc",
":",
"sc",
".",
"onSnapshotAdd",
",",
"UpdateFunc",
":",
"sc",
".",
"onSnapshotUpdate",
",",
"DeleteFunc",
":",
"sc",
".",
"onSnapshotDelete",
",",
"}",
")",
"\n\n",
"//eventBroadcaster := record.NewBroadcaster()",
"//eventBroadcaster.StartLogging(glog.Infof)",
"//eventBroadcaster.StartRecordingToSink(&v1core.EventSinkImpl{Interface: v1core.New(client).Events(\"\")})",
"//\tsc.recorder = eventBroadcaster.NewRecorder(api.Scheme, apiv1.EventSource{Component: \"volume snapshotting\"})",
"sc",
".",
"desiredStateOfWorld",
"=",
"cache",
".",
"NewDesiredStateOfWorld",
"(",
")",
"\n",
"sc",
".",
"actualStateOfWorld",
"=",
"cache",
".",
"NewActualStateOfWorld",
"(",
")",
"\n\n",
"sc",
".",
"snapshotter",
"=",
"snapshotter",
".",
"NewVolumeSnapshotter",
"(",
"client",
",",
"scheme",
",",
"clientset",
",",
"sc",
".",
"actualStateOfWorld",
",",
"volumePlugins",
")",
"\n\n",
"sc",
".",
"reconciler",
"=",
"reconciler",
".",
"NewReconciler",
"(",
"reconcilerLoopPeriod",
",",
"syncDuration",
",",
"false",
",",
"/* disableReconciliationSync */",
"sc",
".",
"desiredStateOfWorld",
",",
"sc",
".",
"actualStateOfWorld",
",",
"sc",
".",
"snapshotter",
")",
"\n\n",
"sc",
".",
"desiredStateOfWorldPopulator",
"=",
"populator",
".",
"NewDesiredStateOfWorldPopulator",
"(",
"desiredStateOfWorldPopulatorLoopSleepPeriod",
",",
"desiredStateOfWorldPopulatorListSnapshotsRetryDuration",
",",
"sc",
".",
"snapshotStore",
",",
"sc",
".",
"desiredStateOfWorld",
",",
")",
"\n\n",
"return",
"sc",
"\n",
"}"
] | // NewSnapshotController creates a new SnapshotController | [
"NewSnapshotController",
"creates",
"a",
"new",
"SnapshotController"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/controller/snapshot-controller/snapshot-controller.go#L96-L163 | train |
kubernetes-incubator/external-storage | snapshot/pkg/controller/snapshot-controller/snapshot-controller.go | Run | func (c *snapshotController) Run(ctx <-chan struct{}) {
glog.Infof("Starting snapshot controller")
go c.snapshotController.Run(ctx)
if !kcontroller.WaitForCacheSync("snapshot-controller", ctx, c.snapshotController.HasSynced) {
return
}
go c.reconciler.Run(ctx)
go c.desiredStateOfWorldPopulator.Run(ctx)
} | go | func (c *snapshotController) Run(ctx <-chan struct{}) {
glog.Infof("Starting snapshot controller")
go c.snapshotController.Run(ctx)
if !kcontroller.WaitForCacheSync("snapshot-controller", ctx, c.snapshotController.HasSynced) {
return
}
go c.reconciler.Run(ctx)
go c.desiredStateOfWorldPopulator.Run(ctx)
} | [
"func",
"(",
"c",
"*",
"snapshotController",
")",
"Run",
"(",
"ctx",
"<-",
"chan",
"struct",
"{",
"}",
")",
"{",
"glog",
".",
"Infof",
"(",
"\"",
"\"",
")",
"\n\n",
"go",
"c",
".",
"snapshotController",
".",
"Run",
"(",
"ctx",
")",
"\n\n",
"if",
"!",
"kcontroller",
".",
"WaitForCacheSync",
"(",
"\"",
"\"",
",",
"ctx",
",",
"c",
".",
"snapshotController",
".",
"HasSynced",
")",
"{",
"return",
"\n",
"}",
"\n\n",
"go",
"c",
".",
"reconciler",
".",
"Run",
"(",
"ctx",
")",
"\n",
"go",
"c",
".",
"desiredStateOfWorldPopulator",
".",
"Run",
"(",
"ctx",
")",
"\n\n",
"}"
] | // Run starts an Snapshot resource controller | [
"Run",
"starts",
"an",
"Snapshot",
"resource",
"controller"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/controller/snapshot-controller/snapshot-controller.go#L166-L178 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/aws/aws_loadbalancer.go | ensureLoadBalancerHealthCheck | func (c *Cloud) ensureLoadBalancerHealthCheck(loadBalancer *elb.LoadBalancerDescription, listeners []*elb.Listener) error {
name := aws.StringValue(loadBalancer.LoadBalancerName)
actual := loadBalancer.HealthCheck
// Default AWS settings
expectedHealthyThreshold := int64(2)
expectedUnhealthyThreshold := int64(6)
expectedTimeout := int64(5)
expectedInterval := int64(10)
// We only configure a TCP health-check on the first port
expectedTarget := ""
for _, listener := range listeners {
if listener.InstancePort == nil {
continue
}
expectedTarget = "TCP:" + strconv.FormatInt(*listener.InstancePort, 10)
break
}
if expectedTarget == "" {
return fmt.Errorf("unable to determine health check port for %q (no valid listeners)", name)
}
if expectedTarget == orEmpty(actual.Target) &&
expectedHealthyThreshold == orZero(actual.HealthyThreshold) &&
expectedUnhealthyThreshold == orZero(actual.UnhealthyThreshold) &&
expectedTimeout == orZero(actual.Timeout) &&
expectedInterval == orZero(actual.Interval) {
return nil
}
glog.V(2).Infof("Updating load-balancer health-check for %q", name)
healthCheck := &elb.HealthCheck{}
healthCheck.HealthyThreshold = &expectedHealthyThreshold
healthCheck.UnhealthyThreshold = &expectedUnhealthyThreshold
healthCheck.Timeout = &expectedTimeout
healthCheck.Interval = &expectedInterval
healthCheck.Target = &expectedTarget
request := &elb.ConfigureHealthCheckInput{}
request.HealthCheck = healthCheck
request.LoadBalancerName = loadBalancer.LoadBalancerName
_, err := c.elb.ConfigureHealthCheck(request)
if err != nil {
return fmt.Errorf("error configuring load-balancer health-check for %q: %v", name, err)
}
return nil
} | go | func (c *Cloud) ensureLoadBalancerHealthCheck(loadBalancer *elb.LoadBalancerDescription, listeners []*elb.Listener) error {
name := aws.StringValue(loadBalancer.LoadBalancerName)
actual := loadBalancer.HealthCheck
// Default AWS settings
expectedHealthyThreshold := int64(2)
expectedUnhealthyThreshold := int64(6)
expectedTimeout := int64(5)
expectedInterval := int64(10)
// We only configure a TCP health-check on the first port
expectedTarget := ""
for _, listener := range listeners {
if listener.InstancePort == nil {
continue
}
expectedTarget = "TCP:" + strconv.FormatInt(*listener.InstancePort, 10)
break
}
if expectedTarget == "" {
return fmt.Errorf("unable to determine health check port for %q (no valid listeners)", name)
}
if expectedTarget == orEmpty(actual.Target) &&
expectedHealthyThreshold == orZero(actual.HealthyThreshold) &&
expectedUnhealthyThreshold == orZero(actual.UnhealthyThreshold) &&
expectedTimeout == orZero(actual.Timeout) &&
expectedInterval == orZero(actual.Interval) {
return nil
}
glog.V(2).Infof("Updating load-balancer health-check for %q", name)
healthCheck := &elb.HealthCheck{}
healthCheck.HealthyThreshold = &expectedHealthyThreshold
healthCheck.UnhealthyThreshold = &expectedUnhealthyThreshold
healthCheck.Timeout = &expectedTimeout
healthCheck.Interval = &expectedInterval
healthCheck.Target = &expectedTarget
request := &elb.ConfigureHealthCheckInput{}
request.HealthCheck = healthCheck
request.LoadBalancerName = loadBalancer.LoadBalancerName
_, err := c.elb.ConfigureHealthCheck(request)
if err != nil {
return fmt.Errorf("error configuring load-balancer health-check for %q: %v", name, err)
}
return nil
} | [
"func",
"(",
"c",
"*",
"Cloud",
")",
"ensureLoadBalancerHealthCheck",
"(",
"loadBalancer",
"*",
"elb",
".",
"LoadBalancerDescription",
",",
"listeners",
"[",
"]",
"*",
"elb",
".",
"Listener",
")",
"error",
"{",
"name",
":=",
"aws",
".",
"StringValue",
"(",
"loadBalancer",
".",
"LoadBalancerName",
")",
"\n\n",
"actual",
":=",
"loadBalancer",
".",
"HealthCheck",
"\n\n",
"// Default AWS settings",
"expectedHealthyThreshold",
":=",
"int64",
"(",
"2",
")",
"\n",
"expectedUnhealthyThreshold",
":=",
"int64",
"(",
"6",
")",
"\n",
"expectedTimeout",
":=",
"int64",
"(",
"5",
")",
"\n",
"expectedInterval",
":=",
"int64",
"(",
"10",
")",
"\n\n",
"// We only configure a TCP health-check on the first port",
"expectedTarget",
":=",
"\"",
"\"",
"\n",
"for",
"_",
",",
"listener",
":=",
"range",
"listeners",
"{",
"if",
"listener",
".",
"InstancePort",
"==",
"nil",
"{",
"continue",
"\n",
"}",
"\n",
"expectedTarget",
"=",
"\"",
"\"",
"+",
"strconv",
".",
"FormatInt",
"(",
"*",
"listener",
".",
"InstancePort",
",",
"10",
")",
"\n",
"break",
"\n",
"}",
"\n\n",
"if",
"expectedTarget",
"==",
"\"",
"\"",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"name",
")",
"\n",
"}",
"\n\n",
"if",
"expectedTarget",
"==",
"orEmpty",
"(",
"actual",
".",
"Target",
")",
"&&",
"expectedHealthyThreshold",
"==",
"orZero",
"(",
"actual",
".",
"HealthyThreshold",
")",
"&&",
"expectedUnhealthyThreshold",
"==",
"orZero",
"(",
"actual",
".",
"UnhealthyThreshold",
")",
"&&",
"expectedTimeout",
"==",
"orZero",
"(",
"actual",
".",
"Timeout",
")",
"&&",
"expectedInterval",
"==",
"orZero",
"(",
"actual",
".",
"Interval",
")",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"glog",
".",
"V",
"(",
"2",
")",
".",
"Infof",
"(",
"\"",
"\"",
",",
"name",
")",
"\n\n",
"healthCheck",
":=",
"&",
"elb",
".",
"HealthCheck",
"{",
"}",
"\n",
"healthCheck",
".",
"HealthyThreshold",
"=",
"&",
"expectedHealthyThreshold",
"\n",
"healthCheck",
".",
"UnhealthyThreshold",
"=",
"&",
"expectedUnhealthyThreshold",
"\n",
"healthCheck",
".",
"Timeout",
"=",
"&",
"expectedTimeout",
"\n",
"healthCheck",
".",
"Interval",
"=",
"&",
"expectedInterval",
"\n",
"healthCheck",
".",
"Target",
"=",
"&",
"expectedTarget",
"\n\n",
"request",
":=",
"&",
"elb",
".",
"ConfigureHealthCheckInput",
"{",
"}",
"\n",
"request",
".",
"HealthCheck",
"=",
"healthCheck",
"\n",
"request",
".",
"LoadBalancerName",
"=",
"loadBalancer",
".",
"LoadBalancerName",
"\n\n",
"_",
",",
"err",
":=",
"c",
".",
"elb",
".",
"ConfigureHealthCheck",
"(",
"request",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"name",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Makes sure that the health check for an ELB matches the configured listeners | [
"Makes",
"sure",
"that",
"the",
"health",
"check",
"for",
"an",
"ELB",
"matches",
"the",
"configured",
"listeners"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/aws/aws_loadbalancer.go#L327-L379 | train |
kubernetes-incubator/external-storage | ceph/rbd/pkg/provision/rbd_util.go | CreateImage | func (u *RBDUtil) CreateImage(image string, pOpts *rbdProvisionOptions, options controller.VolumeOptions) (*v1.RBDPersistentVolumeSource, int, error) {
var output []byte
var err error
capacity := options.PVC.Spec.Resources.Requests[v1.ResourceName(v1.ResourceStorage)]
volSizeBytes := capacity.Value()
// convert to MB that rbd defaults on
sz := int(util.RoundUpSize(volSizeBytes, 1024*1024))
if sz <= 0 {
return nil, 0, fmt.Errorf("invalid storage '%s' requested for RBD provisioner, it must greater than zero", capacity.String())
}
volSz := fmt.Sprintf("%d", sz)
// rbd create
mon := u.kernelRBDMonitorsOpt(pOpts.monitors)
if pOpts.imageFormat == rbdImageFormat2 {
klog.V(4).Infof("rbd: create %s size %s format %s (features: %s) using mon %s, pool %s id %s key %s", image, volSz, pOpts.imageFormat, pOpts.imageFeatures, mon, pOpts.pool, pOpts.adminID, pOpts.adminSecret)
} else {
klog.V(4).Infof("rbd: create %s size %s format %s using mon %s, pool %s id %s key %s", image, volSz, pOpts.imageFormat, mon, pOpts.pool, pOpts.adminID, pOpts.adminSecret)
}
args := []string{"create", image, "--size", volSz, "--pool", pOpts.pool, "--id", pOpts.adminID, "-m", mon, "--key=" + pOpts.adminSecret, "--image-format", pOpts.imageFormat}
if pOpts.imageFormat == rbdImageFormat2 {
// if no image features is provided, it results in empty string
// which disable all RBD image format 2 features as we expected
features := strings.Join(pOpts.imageFeatures, ",")
args = append(args, "--image-feature", features)
}
output, err = u.execCommand("rbd", args)
if err != nil {
klog.Warningf("failed to create rbd image, output %v", string(output))
return nil, 0, fmt.Errorf("failed to create rbd image: %v, command output: %s", err, string(output))
}
return &v1.RBDPersistentVolumeSource{
CephMonitors: pOpts.monitors,
RBDImage: image,
RBDPool: pOpts.pool,
FSType: pOpts.fsType,
}, sz, nil
} | go | func (u *RBDUtil) CreateImage(image string, pOpts *rbdProvisionOptions, options controller.VolumeOptions) (*v1.RBDPersistentVolumeSource, int, error) {
var output []byte
var err error
capacity := options.PVC.Spec.Resources.Requests[v1.ResourceName(v1.ResourceStorage)]
volSizeBytes := capacity.Value()
// convert to MB that rbd defaults on
sz := int(util.RoundUpSize(volSizeBytes, 1024*1024))
if sz <= 0 {
return nil, 0, fmt.Errorf("invalid storage '%s' requested for RBD provisioner, it must greater than zero", capacity.String())
}
volSz := fmt.Sprintf("%d", sz)
// rbd create
mon := u.kernelRBDMonitorsOpt(pOpts.monitors)
if pOpts.imageFormat == rbdImageFormat2 {
klog.V(4).Infof("rbd: create %s size %s format %s (features: %s) using mon %s, pool %s id %s key %s", image, volSz, pOpts.imageFormat, pOpts.imageFeatures, mon, pOpts.pool, pOpts.adminID, pOpts.adminSecret)
} else {
klog.V(4).Infof("rbd: create %s size %s format %s using mon %s, pool %s id %s key %s", image, volSz, pOpts.imageFormat, mon, pOpts.pool, pOpts.adminID, pOpts.adminSecret)
}
args := []string{"create", image, "--size", volSz, "--pool", pOpts.pool, "--id", pOpts.adminID, "-m", mon, "--key=" + pOpts.adminSecret, "--image-format", pOpts.imageFormat}
if pOpts.imageFormat == rbdImageFormat2 {
// if no image features is provided, it results in empty string
// which disable all RBD image format 2 features as we expected
features := strings.Join(pOpts.imageFeatures, ",")
args = append(args, "--image-feature", features)
}
output, err = u.execCommand("rbd", args)
if err != nil {
klog.Warningf("failed to create rbd image, output %v", string(output))
return nil, 0, fmt.Errorf("failed to create rbd image: %v, command output: %s", err, string(output))
}
return &v1.RBDPersistentVolumeSource{
CephMonitors: pOpts.monitors,
RBDImage: image,
RBDPool: pOpts.pool,
FSType: pOpts.fsType,
}, sz, nil
} | [
"func",
"(",
"u",
"*",
"RBDUtil",
")",
"CreateImage",
"(",
"image",
"string",
",",
"pOpts",
"*",
"rbdProvisionOptions",
",",
"options",
"controller",
".",
"VolumeOptions",
")",
"(",
"*",
"v1",
".",
"RBDPersistentVolumeSource",
",",
"int",
",",
"error",
")",
"{",
"var",
"output",
"[",
"]",
"byte",
"\n",
"var",
"err",
"error",
"\n\n",
"capacity",
":=",
"options",
".",
"PVC",
".",
"Spec",
".",
"Resources",
".",
"Requests",
"[",
"v1",
".",
"ResourceName",
"(",
"v1",
".",
"ResourceStorage",
")",
"]",
"\n",
"volSizeBytes",
":=",
"capacity",
".",
"Value",
"(",
")",
"\n",
"// convert to MB that rbd defaults on",
"sz",
":=",
"int",
"(",
"util",
".",
"RoundUpSize",
"(",
"volSizeBytes",
",",
"1024",
"*",
"1024",
")",
")",
"\n",
"if",
"sz",
"<=",
"0",
"{",
"return",
"nil",
",",
"0",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"capacity",
".",
"String",
"(",
")",
")",
"\n",
"}",
"\n",
"volSz",
":=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"sz",
")",
"\n",
"// rbd create",
"mon",
":=",
"u",
".",
"kernelRBDMonitorsOpt",
"(",
"pOpts",
".",
"monitors",
")",
"\n",
"if",
"pOpts",
".",
"imageFormat",
"==",
"rbdImageFormat2",
"{",
"klog",
".",
"V",
"(",
"4",
")",
".",
"Infof",
"(",
"\"",
"\"",
",",
"image",
",",
"volSz",
",",
"pOpts",
".",
"imageFormat",
",",
"pOpts",
".",
"imageFeatures",
",",
"mon",
",",
"pOpts",
".",
"pool",
",",
"pOpts",
".",
"adminID",
",",
"pOpts",
".",
"adminSecret",
")",
"\n",
"}",
"else",
"{",
"klog",
".",
"V",
"(",
"4",
")",
".",
"Infof",
"(",
"\"",
"\"",
",",
"image",
",",
"volSz",
",",
"pOpts",
".",
"imageFormat",
",",
"mon",
",",
"pOpts",
".",
"pool",
",",
"pOpts",
".",
"adminID",
",",
"pOpts",
".",
"adminSecret",
")",
"\n",
"}",
"\n",
"args",
":=",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",
"image",
",",
"\"",
"\"",
",",
"volSz",
",",
"\"",
"\"",
",",
"pOpts",
".",
"pool",
",",
"\"",
"\"",
",",
"pOpts",
".",
"adminID",
",",
"\"",
"\"",
",",
"mon",
",",
"\"",
"\"",
"+",
"pOpts",
".",
"adminSecret",
",",
"\"",
"\"",
",",
"pOpts",
".",
"imageFormat",
"}",
"\n",
"if",
"pOpts",
".",
"imageFormat",
"==",
"rbdImageFormat2",
"{",
"// if no image features is provided, it results in empty string",
"// which disable all RBD image format 2 features as we expected",
"features",
":=",
"strings",
".",
"Join",
"(",
"pOpts",
".",
"imageFeatures",
",",
"\"",
"\"",
")",
"\n",
"args",
"=",
"append",
"(",
"args",
",",
"\"",
"\"",
",",
"features",
")",
"\n",
"}",
"\n",
"output",
",",
"err",
"=",
"u",
".",
"execCommand",
"(",
"\"",
"\"",
",",
"args",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"klog",
".",
"Warningf",
"(",
"\"",
"\"",
",",
"string",
"(",
"output",
")",
")",
"\n",
"return",
"nil",
",",
"0",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
",",
"string",
"(",
"output",
")",
")",
"\n",
"}",
"\n\n",
"return",
"&",
"v1",
".",
"RBDPersistentVolumeSource",
"{",
"CephMonitors",
":",
"pOpts",
".",
"monitors",
",",
"RBDImage",
":",
"image",
",",
"RBDPool",
":",
"pOpts",
".",
"pool",
",",
"FSType",
":",
"pOpts",
".",
"fsType",
",",
"}",
",",
"sz",
",",
"nil",
"\n",
"}"
] | // CreateImage creates a new ceph image with provision and volume options. | [
"CreateImage",
"creates",
"a",
"new",
"ceph",
"image",
"with",
"provision",
"and",
"volume",
"options",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/ceph/rbd/pkg/provision/rbd_util.go#L48-L86 | train |
kubernetes-incubator/external-storage | ceph/rbd/pkg/provision/rbd_util.go | rbdStatus | func (u *RBDUtil) rbdStatus(image string, pOpts *rbdProvisionOptions) (bool, error) {
var err error
var output string
var cmd []byte
mon := u.kernelRBDMonitorsOpt(pOpts.monitors)
// cmd "rbd status" list the rbd client watch with the following output:
//
// # there is a watcher (exit=0)
// Watchers:
// watcher=10.16.153.105:0/710245699 client.14163 cookie=1
//
// # there is no watcher (exit=0)
// Watchers: none
//
// Otherwise, exit is non-zero, for example:
//
// # image does not exist (exit=2)
// rbd: error opening image kubernetes-dynamic-pvc-<UUID>: (2) No such file or directory
//
klog.V(4).Infof("rbd: status %s using mon %s, pool %s id %s key %s", image, mon, pOpts.pool, pOpts.adminID, pOpts.adminSecret)
args := []string{"status", image, "--pool", pOpts.pool, "-m", mon, "--id", pOpts.adminID, "--key=" + pOpts.adminSecret}
cmd, err = u.execCommand("rbd", args)
output = string(cmd)
// If command never succeed, returns its last error.
if err != nil {
return false, err
}
if strings.Contains(output, imageWatcherStr) {
klog.V(4).Infof("rbd: watchers on %s: %s", image, output)
return true, nil
}
klog.Warningf("rbd: no watchers on %s", image)
return false, nil
} | go | func (u *RBDUtil) rbdStatus(image string, pOpts *rbdProvisionOptions) (bool, error) {
var err error
var output string
var cmd []byte
mon := u.kernelRBDMonitorsOpt(pOpts.monitors)
// cmd "rbd status" list the rbd client watch with the following output:
//
// # there is a watcher (exit=0)
// Watchers:
// watcher=10.16.153.105:0/710245699 client.14163 cookie=1
//
// # there is no watcher (exit=0)
// Watchers: none
//
// Otherwise, exit is non-zero, for example:
//
// # image does not exist (exit=2)
// rbd: error opening image kubernetes-dynamic-pvc-<UUID>: (2) No such file or directory
//
klog.V(4).Infof("rbd: status %s using mon %s, pool %s id %s key %s", image, mon, pOpts.pool, pOpts.adminID, pOpts.adminSecret)
args := []string{"status", image, "--pool", pOpts.pool, "-m", mon, "--id", pOpts.adminID, "--key=" + pOpts.adminSecret}
cmd, err = u.execCommand("rbd", args)
output = string(cmd)
// If command never succeed, returns its last error.
if err != nil {
return false, err
}
if strings.Contains(output, imageWatcherStr) {
klog.V(4).Infof("rbd: watchers on %s: %s", image, output)
return true, nil
}
klog.Warningf("rbd: no watchers on %s", image)
return false, nil
} | [
"func",
"(",
"u",
"*",
"RBDUtil",
")",
"rbdStatus",
"(",
"image",
"string",
",",
"pOpts",
"*",
"rbdProvisionOptions",
")",
"(",
"bool",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n",
"var",
"output",
"string",
"\n",
"var",
"cmd",
"[",
"]",
"byte",
"\n\n",
"mon",
":=",
"u",
".",
"kernelRBDMonitorsOpt",
"(",
"pOpts",
".",
"monitors",
")",
"\n",
"// cmd \"rbd status\" list the rbd client watch with the following output:",
"//",
"// # there is a watcher (exit=0)",
"// Watchers:",
"// watcher=10.16.153.105:0/710245699 client.14163 cookie=1",
"//",
"// # there is no watcher (exit=0)",
"// Watchers: none",
"//",
"// Otherwise, exit is non-zero, for example:",
"//",
"// # image does not exist (exit=2)",
"// rbd: error opening image kubernetes-dynamic-pvc-<UUID>: (2) No such file or directory",
"//",
"klog",
".",
"V",
"(",
"4",
")",
".",
"Infof",
"(",
"\"",
"\"",
",",
"image",
",",
"mon",
",",
"pOpts",
".",
"pool",
",",
"pOpts",
".",
"adminID",
",",
"pOpts",
".",
"adminSecret",
")",
"\n",
"args",
":=",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",
"image",
",",
"\"",
"\"",
",",
"pOpts",
".",
"pool",
",",
"\"",
"\"",
",",
"mon",
",",
"\"",
"\"",
",",
"pOpts",
".",
"adminID",
",",
"\"",
"\"",
"+",
"pOpts",
".",
"adminSecret",
"}",
"\n",
"cmd",
",",
"err",
"=",
"u",
".",
"execCommand",
"(",
"\"",
"\"",
",",
"args",
")",
"\n",
"output",
"=",
"string",
"(",
"cmd",
")",
"\n\n",
"// If command never succeed, returns its last error.",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"strings",
".",
"Contains",
"(",
"output",
",",
"imageWatcherStr",
")",
"{",
"klog",
".",
"V",
"(",
"4",
")",
".",
"Infof",
"(",
"\"",
"\"",
",",
"image",
",",
"output",
")",
"\n",
"return",
"true",
",",
"nil",
"\n",
"}",
"\n",
"klog",
".",
"Warningf",
"(",
"\"",
"\"",
",",
"image",
")",
"\n",
"return",
"false",
",",
"nil",
"\n",
"}"
] | // rbdStatus checks if there is watcher on the image.
// It returns true if there is a watcher onthe image, otherwise returns false. | [
"rbdStatus",
"checks",
"if",
"there",
"is",
"watcher",
"on",
"the",
"image",
".",
"It",
"returns",
"true",
"if",
"there",
"is",
"a",
"watcher",
"onthe",
"image",
"otherwise",
"returns",
"false",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/ceph/rbd/pkg/provision/rbd_util.go#L90-L126 | train |
kubernetes-incubator/external-storage | ceph/rbd/pkg/provision/rbd_util.go | DeleteImage | func (u *RBDUtil) DeleteImage(image string, pOpts *rbdProvisionOptions) error {
var output []byte
found, err := u.rbdStatus(image, pOpts)
if err != nil {
return err
}
if found {
klog.Info("rbd is still being used ", image)
return fmt.Errorf("rbd %s is still being used", image)
}
// rbd rm
mon := u.kernelRBDMonitorsOpt(pOpts.monitors)
klog.V(4).Infof("rbd: rm %s using mon %s, pool %s id %s key %s", image, mon, pOpts.pool, pOpts.adminID, pOpts.adminSecret)
args := []string{"rm", image, "--pool", pOpts.pool, "--id", pOpts.adminID, "-m", mon, "--key=" + pOpts.adminSecret}
output, err = u.execCommand("rbd", args)
if err == nil {
return nil
}
klog.Errorf("failed to delete rbd image: %v, command output: %s", err, string(output))
return err
} | go | func (u *RBDUtil) DeleteImage(image string, pOpts *rbdProvisionOptions) error {
var output []byte
found, err := u.rbdStatus(image, pOpts)
if err != nil {
return err
}
if found {
klog.Info("rbd is still being used ", image)
return fmt.Errorf("rbd %s is still being used", image)
}
// rbd rm
mon := u.kernelRBDMonitorsOpt(pOpts.monitors)
klog.V(4).Infof("rbd: rm %s using mon %s, pool %s id %s key %s", image, mon, pOpts.pool, pOpts.adminID, pOpts.adminSecret)
args := []string{"rm", image, "--pool", pOpts.pool, "--id", pOpts.adminID, "-m", mon, "--key=" + pOpts.adminSecret}
output, err = u.execCommand("rbd", args)
if err == nil {
return nil
}
klog.Errorf("failed to delete rbd image: %v, command output: %s", err, string(output))
return err
} | [
"func",
"(",
"u",
"*",
"RBDUtil",
")",
"DeleteImage",
"(",
"image",
"string",
",",
"pOpts",
"*",
"rbdProvisionOptions",
")",
"error",
"{",
"var",
"output",
"[",
"]",
"byte",
"\n",
"found",
",",
"err",
":=",
"u",
".",
"rbdStatus",
"(",
"image",
",",
"pOpts",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"found",
"{",
"klog",
".",
"Info",
"(",
"\"",
"\"",
",",
"image",
")",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"image",
")",
"\n",
"}",
"\n",
"// rbd rm",
"mon",
":=",
"u",
".",
"kernelRBDMonitorsOpt",
"(",
"pOpts",
".",
"monitors",
")",
"\n",
"klog",
".",
"V",
"(",
"4",
")",
".",
"Infof",
"(",
"\"",
"\"",
",",
"image",
",",
"mon",
",",
"pOpts",
".",
"pool",
",",
"pOpts",
".",
"adminID",
",",
"pOpts",
".",
"adminSecret",
")",
"\n",
"args",
":=",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",
"image",
",",
"\"",
"\"",
",",
"pOpts",
".",
"pool",
",",
"\"",
"\"",
",",
"pOpts",
".",
"adminID",
",",
"\"",
"\"",
",",
"mon",
",",
"\"",
"\"",
"+",
"pOpts",
".",
"adminSecret",
"}",
"\n",
"output",
",",
"err",
"=",
"u",
".",
"execCommand",
"(",
"\"",
"\"",
",",
"args",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"klog",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
",",
"string",
"(",
"output",
")",
")",
"\n",
"return",
"err",
"\n",
"}"
] | // DeleteImage deletes a ceph image with provision and volume options. | [
"DeleteImage",
"deletes",
"a",
"ceph",
"image",
"with",
"provision",
"and",
"volume",
"options",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/ceph/rbd/pkg/provision/rbd_util.go#L129-L149 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/aws/aws_routes.go | DeleteRoute | func (c *Cloud) DeleteRoute(clusterName string, route *cloudprovider.Route) error {
table, err := c.findRouteTable(clusterName)
if err != nil {
return err
}
request := &ec2.DeleteRouteInput{}
request.DestinationCidrBlock = aws.String(route.DestinationCIDR)
request.RouteTableId = table.RouteTableId
_, err = c.ec2.DeleteRoute(request)
if err != nil {
return fmt.Errorf("error deleting AWS route (%s): %v", route.DestinationCIDR, err)
}
return nil
} | go | func (c *Cloud) DeleteRoute(clusterName string, route *cloudprovider.Route) error {
table, err := c.findRouteTable(clusterName)
if err != nil {
return err
}
request := &ec2.DeleteRouteInput{}
request.DestinationCidrBlock = aws.String(route.DestinationCIDR)
request.RouteTableId = table.RouteTableId
_, err = c.ec2.DeleteRoute(request)
if err != nil {
return fmt.Errorf("error deleting AWS route (%s): %v", route.DestinationCIDR, err)
}
return nil
} | [
"func",
"(",
"c",
"*",
"Cloud",
")",
"DeleteRoute",
"(",
"clusterName",
"string",
",",
"route",
"*",
"cloudprovider",
".",
"Route",
")",
"error",
"{",
"table",
",",
"err",
":=",
"c",
".",
"findRouteTable",
"(",
"clusterName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"request",
":=",
"&",
"ec2",
".",
"DeleteRouteInput",
"{",
"}",
"\n",
"request",
".",
"DestinationCidrBlock",
"=",
"aws",
".",
"String",
"(",
"route",
".",
"DestinationCIDR",
")",
"\n",
"request",
".",
"RouteTableId",
"=",
"table",
".",
"RouteTableId",
"\n\n",
"_",
",",
"err",
"=",
"c",
".",
"ec2",
".",
"DeleteRoute",
"(",
"request",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"route",
".",
"DestinationCIDR",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // DeleteRoute implements Routes.DeleteRoute
// Delete the specified route | [
"DeleteRoute",
"implements",
"Routes",
".",
"DeleteRoute",
"Delete",
"the",
"specified",
"route"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/aws/aws_routes.go#L188-L204 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/discovery/discovery.go | NewDiscoverer | func NewDiscoverer(config *common.RuntimeConfig, cleanupTracker *deleter.CleanupStatusTracker) (*Discoverer, error) {
sharedInformer := config.InformerFactory.Storage().V1().StorageClasses()
sharedInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
// We don't need an actual event handler for StorageClasses,
// but we must pass a non-nil one to cache.NewInformer()
AddFunc: nil,
UpdateFunc: nil,
DeleteFunc: nil,
})
labelMap := make(map[string]string)
for _, labelName := range config.NodeLabelsForPV {
labelVal, ok := config.Node.Labels[labelName]
if ok {
labelMap[labelName] = labelVal
}
}
if config.UseAlphaAPI {
nodeAffinity, err := generateNodeAffinity(config.Node)
if err != nil {
return nil, fmt.Errorf("Failed to generate node affinity: %v", err)
}
tmpAnnotations := map[string]string{}
err = StorageNodeAffinityToAlphaAnnotation(tmpAnnotations, nodeAffinity)
if err != nil {
return nil, fmt.Errorf("Failed to convert node affinity to alpha annotation: %v", err)
}
return &Discoverer{
RuntimeConfig: config,
Labels: labelMap,
CleanupTracker: cleanupTracker,
classLister: sharedInformer.Lister(),
nodeAffinityAnn: tmpAnnotations[common.AlphaStorageNodeAffinityAnnotation]}, nil
}
volumeNodeAffinity, err := generateVolumeNodeAffinity(config.Node)
if err != nil {
return nil, fmt.Errorf("Failed to generate volume node affinity: %v", err)
}
return &Discoverer{
RuntimeConfig: config,
Labels: labelMap,
CleanupTracker: cleanupTracker,
classLister: sharedInformer.Lister(),
nodeAffinity: volumeNodeAffinity}, nil
} | go | func NewDiscoverer(config *common.RuntimeConfig, cleanupTracker *deleter.CleanupStatusTracker) (*Discoverer, error) {
sharedInformer := config.InformerFactory.Storage().V1().StorageClasses()
sharedInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
// We don't need an actual event handler for StorageClasses,
// but we must pass a non-nil one to cache.NewInformer()
AddFunc: nil,
UpdateFunc: nil,
DeleteFunc: nil,
})
labelMap := make(map[string]string)
for _, labelName := range config.NodeLabelsForPV {
labelVal, ok := config.Node.Labels[labelName]
if ok {
labelMap[labelName] = labelVal
}
}
if config.UseAlphaAPI {
nodeAffinity, err := generateNodeAffinity(config.Node)
if err != nil {
return nil, fmt.Errorf("Failed to generate node affinity: %v", err)
}
tmpAnnotations := map[string]string{}
err = StorageNodeAffinityToAlphaAnnotation(tmpAnnotations, nodeAffinity)
if err != nil {
return nil, fmt.Errorf("Failed to convert node affinity to alpha annotation: %v", err)
}
return &Discoverer{
RuntimeConfig: config,
Labels: labelMap,
CleanupTracker: cleanupTracker,
classLister: sharedInformer.Lister(),
nodeAffinityAnn: tmpAnnotations[common.AlphaStorageNodeAffinityAnnotation]}, nil
}
volumeNodeAffinity, err := generateVolumeNodeAffinity(config.Node)
if err != nil {
return nil, fmt.Errorf("Failed to generate volume node affinity: %v", err)
}
return &Discoverer{
RuntimeConfig: config,
Labels: labelMap,
CleanupTracker: cleanupTracker,
classLister: sharedInformer.Lister(),
nodeAffinity: volumeNodeAffinity}, nil
} | [
"func",
"NewDiscoverer",
"(",
"config",
"*",
"common",
".",
"RuntimeConfig",
",",
"cleanupTracker",
"*",
"deleter",
".",
"CleanupStatusTracker",
")",
"(",
"*",
"Discoverer",
",",
"error",
")",
"{",
"sharedInformer",
":=",
"config",
".",
"InformerFactory",
".",
"Storage",
"(",
")",
".",
"V1",
"(",
")",
".",
"StorageClasses",
"(",
")",
"\n",
"sharedInformer",
".",
"Informer",
"(",
")",
".",
"AddEventHandler",
"(",
"cache",
".",
"ResourceEventHandlerFuncs",
"{",
"// We don't need an actual event handler for StorageClasses,",
"// but we must pass a non-nil one to cache.NewInformer()",
"AddFunc",
":",
"nil",
",",
"UpdateFunc",
":",
"nil",
",",
"DeleteFunc",
":",
"nil",
",",
"}",
")",
"\n\n",
"labelMap",
":=",
"make",
"(",
"map",
"[",
"string",
"]",
"string",
")",
"\n",
"for",
"_",
",",
"labelName",
":=",
"range",
"config",
".",
"NodeLabelsForPV",
"{",
"labelVal",
",",
"ok",
":=",
"config",
".",
"Node",
".",
"Labels",
"[",
"labelName",
"]",
"\n",
"if",
"ok",
"{",
"labelMap",
"[",
"labelName",
"]",
"=",
"labelVal",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"config",
".",
"UseAlphaAPI",
"{",
"nodeAffinity",
",",
"err",
":=",
"generateNodeAffinity",
"(",
"config",
".",
"Node",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"tmpAnnotations",
":=",
"map",
"[",
"string",
"]",
"string",
"{",
"}",
"\n",
"err",
"=",
"StorageNodeAffinityToAlphaAnnotation",
"(",
"tmpAnnotations",
",",
"nodeAffinity",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"&",
"Discoverer",
"{",
"RuntimeConfig",
":",
"config",
",",
"Labels",
":",
"labelMap",
",",
"CleanupTracker",
":",
"cleanupTracker",
",",
"classLister",
":",
"sharedInformer",
".",
"Lister",
"(",
")",
",",
"nodeAffinityAnn",
":",
"tmpAnnotations",
"[",
"common",
".",
"AlphaStorageNodeAffinityAnnotation",
"]",
"}",
",",
"nil",
"\n",
"}",
"\n\n",
"volumeNodeAffinity",
",",
"err",
":=",
"generateVolumeNodeAffinity",
"(",
"config",
".",
"Node",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"&",
"Discoverer",
"{",
"RuntimeConfig",
":",
"config",
",",
"Labels",
":",
"labelMap",
",",
"CleanupTracker",
":",
"cleanupTracker",
",",
"classLister",
":",
"sharedInformer",
".",
"Lister",
"(",
")",
",",
"nodeAffinity",
":",
"volumeNodeAffinity",
"}",
",",
"nil",
"\n",
"}"
] | // NewDiscoverer creates a Discoverer object that will scan through
// the configured directories and create local PVs for any new directories found | [
"NewDiscoverer",
"creates",
"a",
"Discoverer",
"object",
"that",
"will",
"scan",
"through",
"the",
"configured",
"directories",
"and",
"create",
"local",
"PVs",
"for",
"any",
"new",
"directories",
"found"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/discovery/discovery.go#L52-L99 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/discovery/discovery.go | DiscoverLocalVolumes | func (d *Discoverer) DiscoverLocalVolumes() {
for class, config := range d.DiscoveryMap {
d.discoverVolumesAtPath(class, config)
}
} | go | func (d *Discoverer) DiscoverLocalVolumes() {
for class, config := range d.DiscoveryMap {
d.discoverVolumesAtPath(class, config)
}
} | [
"func",
"(",
"d",
"*",
"Discoverer",
")",
"DiscoverLocalVolumes",
"(",
")",
"{",
"for",
"class",
",",
"config",
":=",
"range",
"d",
".",
"DiscoveryMap",
"{",
"d",
".",
"discoverVolumesAtPath",
"(",
"class",
",",
"config",
")",
"\n",
"}",
"\n",
"}"
] | // DiscoverLocalVolumes reads the configured discovery paths, and creates PVs for the new volumes | [
"DiscoverLocalVolumes",
"reads",
"the",
"configured",
"discovery",
"paths",
"and",
"creates",
"PVs",
"for",
"the",
"new",
"volumes"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/discovery/discovery.go#L154-L158 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/discovery/discovery.go | roundDownCapacityPretty | func roundDownCapacityPretty(capacityBytes int64) int64 {
easyToReadUnitsBytes := []int64{esUtil.GiB, esUtil.MiB}
// Round down to the nearest easy to read unit
// such that there are at least 10 units at that size.
for _, easyToReadUnitBytes := range easyToReadUnitsBytes {
// Round down the capacity to the nearest unit.
size := capacityBytes / easyToReadUnitBytes
if size >= 10 {
return size * easyToReadUnitBytes
}
}
return capacityBytes
} | go | func roundDownCapacityPretty(capacityBytes int64) int64 {
easyToReadUnitsBytes := []int64{esUtil.GiB, esUtil.MiB}
// Round down to the nearest easy to read unit
// such that there are at least 10 units at that size.
for _, easyToReadUnitBytes := range easyToReadUnitsBytes {
// Round down the capacity to the nearest unit.
size := capacityBytes / easyToReadUnitBytes
if size >= 10 {
return size * easyToReadUnitBytes
}
}
return capacityBytes
} | [
"func",
"roundDownCapacityPretty",
"(",
"capacityBytes",
"int64",
")",
"int64",
"{",
"easyToReadUnitsBytes",
":=",
"[",
"]",
"int64",
"{",
"esUtil",
".",
"GiB",
",",
"esUtil",
".",
"MiB",
"}",
"\n\n",
"// Round down to the nearest easy to read unit",
"// such that there are at least 10 units at that size.",
"for",
"_",
",",
"easyToReadUnitBytes",
":=",
"range",
"easyToReadUnitsBytes",
"{",
"// Round down the capacity to the nearest unit.",
"size",
":=",
"capacityBytes",
"/",
"easyToReadUnitBytes",
"\n",
"if",
"size",
">=",
"10",
"{",
"return",
"size",
"*",
"easyToReadUnitBytes",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"capacityBytes",
"\n",
"}"
] | // Round down the capacity to an easy to read value. | [
"Round",
"down",
"the",
"capacity",
"to",
"an",
"easy",
"to",
"read",
"value",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/discovery/discovery.go#L339-L353 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/discovery/discovery.go | GetStorageNodeAffinityFromAnnotation | func GetStorageNodeAffinityFromAnnotation(annotations map[string]string) (*v1.NodeAffinity, error) {
if len(annotations) > 0 && annotations[common.AlphaStorageNodeAffinityAnnotation] != "" {
var affinity v1.NodeAffinity
err := json.Unmarshal([]byte(annotations[common.AlphaStorageNodeAffinityAnnotation]), &affinity)
if err != nil {
return nil, err
}
return &affinity, nil
}
return nil, nil
} | go | func GetStorageNodeAffinityFromAnnotation(annotations map[string]string) (*v1.NodeAffinity, error) {
if len(annotations) > 0 && annotations[common.AlphaStorageNodeAffinityAnnotation] != "" {
var affinity v1.NodeAffinity
err := json.Unmarshal([]byte(annotations[common.AlphaStorageNodeAffinityAnnotation]), &affinity)
if err != nil {
return nil, err
}
return &affinity, nil
}
return nil, nil
} | [
"func",
"GetStorageNodeAffinityFromAnnotation",
"(",
"annotations",
"map",
"[",
"string",
"]",
"string",
")",
"(",
"*",
"v1",
".",
"NodeAffinity",
",",
"error",
")",
"{",
"if",
"len",
"(",
"annotations",
")",
">",
"0",
"&&",
"annotations",
"[",
"common",
".",
"AlphaStorageNodeAffinityAnnotation",
"]",
"!=",
"\"",
"\"",
"{",
"var",
"affinity",
"v1",
".",
"NodeAffinity",
"\n",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"[",
"]",
"byte",
"(",
"annotations",
"[",
"common",
".",
"AlphaStorageNodeAffinityAnnotation",
"]",
")",
",",
"&",
"affinity",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"&",
"affinity",
",",
"nil",
"\n",
"}",
"\n",
"return",
"nil",
",",
"nil",
"\n",
"}"
] | // GetStorageNodeAffinityFromAnnotation gets the json serialized data from PersistentVolume.Annotations
// and converts it to the NodeAffinity type in core. | [
"GetStorageNodeAffinityFromAnnotation",
"gets",
"the",
"json",
"serialized",
"data",
"from",
"PersistentVolume",
".",
"Annotations",
"and",
"converts",
"it",
"to",
"the",
"NodeAffinity",
"type",
"in",
"core",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/discovery/discovery.go#L357-L367 | train |
kubernetes-incubator/external-storage | local-volume/provisioner/pkg/discovery/discovery.go | StorageNodeAffinityToAlphaAnnotation | func StorageNodeAffinityToAlphaAnnotation(annotations map[string]string, affinity *v1.NodeAffinity) error {
if affinity == nil {
return nil
}
json, err := json.Marshal(*affinity)
if err != nil {
return err
}
annotations[common.AlphaStorageNodeAffinityAnnotation] = string(json)
return nil
} | go | func StorageNodeAffinityToAlphaAnnotation(annotations map[string]string, affinity *v1.NodeAffinity) error {
if affinity == nil {
return nil
}
json, err := json.Marshal(*affinity)
if err != nil {
return err
}
annotations[common.AlphaStorageNodeAffinityAnnotation] = string(json)
return nil
} | [
"func",
"StorageNodeAffinityToAlphaAnnotation",
"(",
"annotations",
"map",
"[",
"string",
"]",
"string",
",",
"affinity",
"*",
"v1",
".",
"NodeAffinity",
")",
"error",
"{",
"if",
"affinity",
"==",
"nil",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"json",
",",
"err",
":=",
"json",
".",
"Marshal",
"(",
"*",
"affinity",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"annotations",
"[",
"common",
".",
"AlphaStorageNodeAffinityAnnotation",
"]",
"=",
"string",
"(",
"json",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // StorageNodeAffinityToAlphaAnnotation converts NodeAffinity type to Alpha annotation for use in PersistentVolumes | [
"StorageNodeAffinityToAlphaAnnotation",
"converts",
"NodeAffinity",
"type",
"to",
"Alpha",
"annotation",
"for",
"use",
"in",
"PersistentVolumes"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/local-volume/provisioner/pkg/discovery/discovery.go#L370-L381 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | newGCECloud | func newGCECloud(config io.Reader) (*Cloud, error) {
projectID, zone, err := getProjectAndZone()
if err != nil {
return nil, err
}
region, err := GetGCERegion(zone)
if err != nil {
return nil, err
}
networkName, err := getNetworkNameViaMetadata()
if err != nil {
return nil, err
}
networkURL := gceNetworkURL(projectID, networkName)
// By default, Kubernetes clusters only run against one zone
managedZones := []string{zone}
tokenSource := google.ComputeTokenSource("")
var nodeTags []string
var nodeInstancePrefix string
if config != nil {
var cfg Config
if err := gcfg.ReadInto(&cfg, config); err != nil {
glog.Errorf("Couldn't read config: %v", err)
return nil, err
}
glog.Infof("Using GCE provider config %+v", cfg)
if cfg.Global.ProjectID != "" {
projectID = cfg.Global.ProjectID
}
if cfg.Global.NetworkName != "" {
if strings.Contains(cfg.Global.NetworkName, "/") {
networkURL = cfg.Global.NetworkName
} else {
networkURL = gceNetworkURL(cfg.Global.ProjectID, cfg.Global.NetworkName)
}
}
if cfg.Global.TokenURL != "" {
tokenSource = NewAltTokenSource(cfg.Global.TokenURL, cfg.Global.TokenBody)
}
nodeTags = cfg.Global.NodeTags
nodeInstancePrefix = cfg.Global.NodeInstancePrefix
if cfg.Global.Multizone {
managedZones = nil // Use all zones in region
}
}
return CreateGCECloud(projectID, region, zone, managedZones, networkURL, nodeTags, nodeInstancePrefix, tokenSource, true /* useMetadataServer */)
} | go | func newGCECloud(config io.Reader) (*Cloud, error) {
projectID, zone, err := getProjectAndZone()
if err != nil {
return nil, err
}
region, err := GetGCERegion(zone)
if err != nil {
return nil, err
}
networkName, err := getNetworkNameViaMetadata()
if err != nil {
return nil, err
}
networkURL := gceNetworkURL(projectID, networkName)
// By default, Kubernetes clusters only run against one zone
managedZones := []string{zone}
tokenSource := google.ComputeTokenSource("")
var nodeTags []string
var nodeInstancePrefix string
if config != nil {
var cfg Config
if err := gcfg.ReadInto(&cfg, config); err != nil {
glog.Errorf("Couldn't read config: %v", err)
return nil, err
}
glog.Infof("Using GCE provider config %+v", cfg)
if cfg.Global.ProjectID != "" {
projectID = cfg.Global.ProjectID
}
if cfg.Global.NetworkName != "" {
if strings.Contains(cfg.Global.NetworkName, "/") {
networkURL = cfg.Global.NetworkName
} else {
networkURL = gceNetworkURL(cfg.Global.ProjectID, cfg.Global.NetworkName)
}
}
if cfg.Global.TokenURL != "" {
tokenSource = NewAltTokenSource(cfg.Global.TokenURL, cfg.Global.TokenBody)
}
nodeTags = cfg.Global.NodeTags
nodeInstancePrefix = cfg.Global.NodeInstancePrefix
if cfg.Global.Multizone {
managedZones = nil // Use all zones in region
}
}
return CreateGCECloud(projectID, region, zone, managedZones, networkURL, nodeTags, nodeInstancePrefix, tokenSource, true /* useMetadataServer */)
} | [
"func",
"newGCECloud",
"(",
"config",
"io",
".",
"Reader",
")",
"(",
"*",
"Cloud",
",",
"error",
")",
"{",
"projectID",
",",
"zone",
",",
"err",
":=",
"getProjectAndZone",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"region",
",",
"err",
":=",
"GetGCERegion",
"(",
"zone",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"networkName",
",",
"err",
":=",
"getNetworkNameViaMetadata",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"networkURL",
":=",
"gceNetworkURL",
"(",
"projectID",
",",
"networkName",
")",
"\n\n",
"// By default, Kubernetes clusters only run against one zone",
"managedZones",
":=",
"[",
"]",
"string",
"{",
"zone",
"}",
"\n\n",
"tokenSource",
":=",
"google",
".",
"ComputeTokenSource",
"(",
"\"",
"\"",
")",
"\n",
"var",
"nodeTags",
"[",
"]",
"string",
"\n",
"var",
"nodeInstancePrefix",
"string",
"\n",
"if",
"config",
"!=",
"nil",
"{",
"var",
"cfg",
"Config",
"\n",
"if",
"err",
":=",
"gcfg",
".",
"ReadInto",
"(",
"&",
"cfg",
",",
"config",
")",
";",
"err",
"!=",
"nil",
"{",
"glog",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"glog",
".",
"Infof",
"(",
"\"",
"\"",
",",
"cfg",
")",
"\n",
"if",
"cfg",
".",
"Global",
".",
"ProjectID",
"!=",
"\"",
"\"",
"{",
"projectID",
"=",
"cfg",
".",
"Global",
".",
"ProjectID",
"\n",
"}",
"\n",
"if",
"cfg",
".",
"Global",
".",
"NetworkName",
"!=",
"\"",
"\"",
"{",
"if",
"strings",
".",
"Contains",
"(",
"cfg",
".",
"Global",
".",
"NetworkName",
",",
"\"",
"\"",
")",
"{",
"networkURL",
"=",
"cfg",
".",
"Global",
".",
"NetworkName",
"\n",
"}",
"else",
"{",
"networkURL",
"=",
"gceNetworkURL",
"(",
"cfg",
".",
"Global",
".",
"ProjectID",
",",
"cfg",
".",
"Global",
".",
"NetworkName",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"cfg",
".",
"Global",
".",
"TokenURL",
"!=",
"\"",
"\"",
"{",
"tokenSource",
"=",
"NewAltTokenSource",
"(",
"cfg",
".",
"Global",
".",
"TokenURL",
",",
"cfg",
".",
"Global",
".",
"TokenBody",
")",
"\n",
"}",
"\n",
"nodeTags",
"=",
"cfg",
".",
"Global",
".",
"NodeTags",
"\n",
"nodeInstancePrefix",
"=",
"cfg",
".",
"Global",
".",
"NodeInstancePrefix",
"\n",
"if",
"cfg",
".",
"Global",
".",
"Multizone",
"{",
"managedZones",
"=",
"nil",
"// Use all zones in region",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"CreateGCECloud",
"(",
"projectID",
",",
"region",
",",
"zone",
",",
"managedZones",
",",
"networkURL",
",",
"nodeTags",
",",
"nodeInstancePrefix",
",",
"tokenSource",
",",
"true",
"/* useMetadataServer */",
")",
"\n",
"}"
] | // newGCECloud creates a new instance of GCECloud. | [
"newGCECloud",
"creates",
"a",
"new",
"instance",
"of",
"GCECloud",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L279-L330 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | translateAffinityType | func translateAffinityType(affinityType v1.ServiceAffinity) string {
switch affinityType {
case v1.ServiceAffinityClientIP:
return gceAffinityTypeClientIP
case v1.ServiceAffinityNone:
return gceAffinityTypeNone
default:
glog.Errorf("Unexpected affinity type: %v", affinityType)
return gceAffinityTypeNone
}
} | go | func translateAffinityType(affinityType v1.ServiceAffinity) string {
switch affinityType {
case v1.ServiceAffinityClientIP:
return gceAffinityTypeClientIP
case v1.ServiceAffinityNone:
return gceAffinityTypeNone
default:
glog.Errorf("Unexpected affinity type: %v", affinityType)
return gceAffinityTypeNone
}
} | [
"func",
"translateAffinityType",
"(",
"affinityType",
"v1",
".",
"ServiceAffinity",
")",
"string",
"{",
"switch",
"affinityType",
"{",
"case",
"v1",
".",
"ServiceAffinityClientIP",
":",
"return",
"gceAffinityTypeClientIP",
"\n",
"case",
"v1",
".",
"ServiceAffinityNone",
":",
"return",
"gceAffinityTypeNone",
"\n",
"default",
":",
"glog",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"affinityType",
")",
"\n",
"return",
"gceAffinityTypeNone",
"\n",
"}",
"\n",
"}"
] | // translate from what K8s supports to what the cloud provider supports for session affinity. | [
"translate",
"from",
"what",
"K8s",
"supports",
"to",
"what",
"the",
"cloud",
"provider",
"supports",
"for",
"session",
"affinity",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1007-L1017 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | DeleteForwardingRule | func (gce *Cloud) DeleteForwardingRule(name string) error {
region, err := GetGCERegion(gce.localZone)
if err != nil {
return err
}
return gce.deleteForwardingRule(name, region)
} | go | func (gce *Cloud) DeleteForwardingRule(name string) error {
region, err := GetGCERegion(gce.localZone)
if err != nil {
return err
}
return gce.deleteForwardingRule(name, region)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"DeleteForwardingRule",
"(",
"name",
"string",
")",
"error",
"{",
"region",
",",
"err",
":=",
"GetGCERegion",
"(",
"gce",
".",
"localZone",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"deleteForwardingRule",
"(",
"name",
",",
"region",
")",
"\n",
"}"
] | // DeleteForwardingRule deletes the forwarding rule | [
"DeleteForwardingRule",
"deletes",
"the",
"forwarding",
"rule"
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1488-L1494 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | DeleteTargetPool | func (gce *Cloud) DeleteTargetPool(name string, hc *compute.HttpHealthCheck) error {
region, err := GetGCERegion(gce.localZone)
if err != nil {
return err
}
return gce.deleteTargetPool(name, region, hc)
} | go | func (gce *Cloud) DeleteTargetPool(name string, hc *compute.HttpHealthCheck) error {
region, err := GetGCERegion(gce.localZone)
if err != nil {
return err
}
return gce.deleteTargetPool(name, region, hc)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"DeleteTargetPool",
"(",
"name",
"string",
",",
"hc",
"*",
"compute",
".",
"HttpHealthCheck",
")",
"error",
"{",
"region",
",",
"err",
":=",
"GetGCERegion",
"(",
"gce",
".",
"localZone",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"deleteTargetPool",
"(",
"name",
",",
"region",
",",
"hc",
")",
"\n",
"}"
] | // DeleteTargetPool deletes the given target pool. | [
"DeleteTargetPool",
"deletes",
"the",
"given",
"target",
"pool",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1497-L1503 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | UpdateFirewall | func (gce *Cloud) UpdateFirewall(name, desc string, sourceRanges netsets.IPNet, ports []int64, hostNames []string) error {
region, err := GetGCERegion(gce.localZone)
if err != nil {
return err
}
// TODO: This completely breaks modularity in the cloudprovider but the methods
// shared with the TCPLoadBalancer take v1.ServicePorts.
svcPorts := []v1.ServicePort{}
// TODO: Currently the only consumer of this method is the GCE L7
// loadbalancer controller, which never needs a protocol other than TCP.
// We should pipe through a mapping of port:protocol and default to TCP
// if UDP ports are required. This means the method signature will change,
// forcing downstream clients to refactor interfaces.
for _, p := range ports {
svcPorts = append(svcPorts, v1.ServicePort{Port: int32(p), Protocol: v1.ProtocolTCP})
}
hosts, err := gce.getInstancesByNames(hostNames)
if err != nil {
return err
}
return gce.updateFirewall(name, region, desc, sourceRanges, svcPorts, hosts)
} | go | func (gce *Cloud) UpdateFirewall(name, desc string, sourceRanges netsets.IPNet, ports []int64, hostNames []string) error {
region, err := GetGCERegion(gce.localZone)
if err != nil {
return err
}
// TODO: This completely breaks modularity in the cloudprovider but the methods
// shared with the TCPLoadBalancer take v1.ServicePorts.
svcPorts := []v1.ServicePort{}
// TODO: Currently the only consumer of this method is the GCE L7
// loadbalancer controller, which never needs a protocol other than TCP.
// We should pipe through a mapping of port:protocol and default to TCP
// if UDP ports are required. This means the method signature will change,
// forcing downstream clients to refactor interfaces.
for _, p := range ports {
svcPorts = append(svcPorts, v1.ServicePort{Port: int32(p), Protocol: v1.ProtocolTCP})
}
hosts, err := gce.getInstancesByNames(hostNames)
if err != nil {
return err
}
return gce.updateFirewall(name, region, desc, sourceRanges, svcPorts, hosts)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"UpdateFirewall",
"(",
"name",
",",
"desc",
"string",
",",
"sourceRanges",
"netsets",
".",
"IPNet",
",",
"ports",
"[",
"]",
"int64",
",",
"hostNames",
"[",
"]",
"string",
")",
"error",
"{",
"region",
",",
"err",
":=",
"GetGCERegion",
"(",
"gce",
".",
"localZone",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"// TODO: This completely breaks modularity in the cloudprovider but the methods",
"// shared with the TCPLoadBalancer take v1.ServicePorts.",
"svcPorts",
":=",
"[",
"]",
"v1",
".",
"ServicePort",
"{",
"}",
"\n",
"// TODO: Currently the only consumer of this method is the GCE L7",
"// loadbalancer controller, which never needs a protocol other than TCP.",
"// We should pipe through a mapping of port:protocol and default to TCP",
"// if UDP ports are required. This means the method signature will change,",
"// forcing downstream clients to refactor interfaces.",
"for",
"_",
",",
"p",
":=",
"range",
"ports",
"{",
"svcPorts",
"=",
"append",
"(",
"svcPorts",
",",
"v1",
".",
"ServicePort",
"{",
"Port",
":",
"int32",
"(",
"p",
")",
",",
"Protocol",
":",
"v1",
".",
"ProtocolTCP",
"}",
")",
"\n",
"}",
"\n",
"hosts",
",",
"err",
":=",
"gce",
".",
"getInstancesByNames",
"(",
"hostNames",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"updateFirewall",
"(",
"name",
",",
"region",
",",
"desc",
",",
"sourceRanges",
",",
"svcPorts",
",",
"hosts",
")",
"\n",
"}"
] | // UpdateFirewall applies the given firewall rule as an update to an existing
// firewall rule with the same name. | [
"UpdateFirewall",
"applies",
"the",
"given",
"firewall",
"rule",
"as",
"an",
"update",
"to",
"an",
"existing",
"firewall",
"rule",
"with",
"the",
"same",
"name",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1614-L1635 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | DeleteGlobalStaticIP | func (gce *Cloud) DeleteGlobalStaticIP(name string) error {
op, err := gce.service.GlobalAddresses.Delete(gce.projectID, name).Do()
if err != nil {
return err
}
return gce.waitForGlobalOp(op)
} | go | func (gce *Cloud) DeleteGlobalStaticIP(name string) error {
op, err := gce.service.GlobalAddresses.Delete(gce.projectID, name).Do()
if err != nil {
return err
}
return gce.waitForGlobalOp(op)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"DeleteGlobalStaticIP",
"(",
"name",
"string",
")",
"error",
"{",
"op",
",",
"err",
":=",
"gce",
".",
"service",
".",
"GlobalAddresses",
".",
"Delete",
"(",
"gce",
".",
"projectID",
",",
"name",
")",
".",
"Do",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"waitForGlobalOp",
"(",
"op",
")",
"\n",
"}"
] | // DeleteGlobalStaticIP deletes a global static IP by name. | [
"DeleteGlobalStaticIP",
"deletes",
"a",
"global",
"static",
"IP",
"by",
"name",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1656-L1662 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | GetGlobalStaticIP | func (gce *Cloud) GetGlobalStaticIP(name string) (address *compute.Address, err error) {
return gce.service.GlobalAddresses.Get(gce.projectID, name).Do()
} | go | func (gce *Cloud) GetGlobalStaticIP(name string) (address *compute.Address, err error) {
return gce.service.GlobalAddresses.Get(gce.projectID, name).Do()
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"GetGlobalStaticIP",
"(",
"name",
"string",
")",
"(",
"address",
"*",
"compute",
".",
"Address",
",",
"err",
"error",
")",
"{",
"return",
"gce",
".",
"service",
".",
"GlobalAddresses",
".",
"Get",
"(",
"gce",
".",
"projectID",
",",
"name",
")",
".",
"Do",
"(",
")",
"\n",
"}"
] | // GetGlobalStaticIP returns the global static IP by name. | [
"GetGlobalStaticIP",
"returns",
"the",
"global",
"static",
"IP",
"by",
"name",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1665-L1667 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | GetURLMap | func (gce *Cloud) GetURLMap(name string) (*compute.UrlMap, error) {
return gce.service.UrlMaps.Get(gce.projectID, name).Do()
} | go | func (gce *Cloud) GetURLMap(name string) (*compute.UrlMap, error) {
return gce.service.UrlMaps.Get(gce.projectID, name).Do()
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"GetURLMap",
"(",
"name",
"string",
")",
"(",
"*",
"compute",
".",
"UrlMap",
",",
"error",
")",
"{",
"return",
"gce",
".",
"service",
".",
"UrlMaps",
".",
"Get",
"(",
"gce",
".",
"projectID",
",",
"name",
")",
".",
"Do",
"(",
")",
"\n",
"}"
] | // UrlMap management
// GetURLMap returns the URLMap by name. | [
"UrlMap",
"management",
"GetURLMap",
"returns",
"the",
"URLMap",
"by",
"name",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1672-L1674 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | CreateURLMap | func (gce *Cloud) CreateURLMap(backend *compute.BackendService, name string) (*compute.UrlMap, error) {
urlMap := &compute.UrlMap{
Name: name,
DefaultService: backend.SelfLink,
}
op, err := gce.service.UrlMaps.Insert(gce.projectID, urlMap).Do()
if err != nil {
return nil, err
}
if err = gce.waitForGlobalOp(op); err != nil {
return nil, err
}
return gce.GetURLMap(name)
} | go | func (gce *Cloud) CreateURLMap(backend *compute.BackendService, name string) (*compute.UrlMap, error) {
urlMap := &compute.UrlMap{
Name: name,
DefaultService: backend.SelfLink,
}
op, err := gce.service.UrlMaps.Insert(gce.projectID, urlMap).Do()
if err != nil {
return nil, err
}
if err = gce.waitForGlobalOp(op); err != nil {
return nil, err
}
return gce.GetURLMap(name)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"CreateURLMap",
"(",
"backend",
"*",
"compute",
".",
"BackendService",
",",
"name",
"string",
")",
"(",
"*",
"compute",
".",
"UrlMap",
",",
"error",
")",
"{",
"urlMap",
":=",
"&",
"compute",
".",
"UrlMap",
"{",
"Name",
":",
"name",
",",
"DefaultService",
":",
"backend",
".",
"SelfLink",
",",
"}",
"\n",
"op",
",",
"err",
":=",
"gce",
".",
"service",
".",
"UrlMaps",
".",
"Insert",
"(",
"gce",
".",
"projectID",
",",
"urlMap",
")",
".",
"Do",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"err",
"=",
"gce",
".",
"waitForGlobalOp",
"(",
"op",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"GetURLMap",
"(",
"name",
")",
"\n",
"}"
] | // CreateURLMap creates an url map, using the given backend service as the default service. | [
"CreateURLMap",
"creates",
"an",
"url",
"map",
"using",
"the",
"given",
"backend",
"service",
"as",
"the",
"default",
"service",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1677-L1690 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | UpdateURLMap | func (gce *Cloud) UpdateURLMap(urlMap *compute.UrlMap) (*compute.UrlMap, error) {
op, err := gce.service.UrlMaps.Update(gce.projectID, urlMap.Name, urlMap).Do()
if err != nil {
return nil, err
}
if err = gce.waitForGlobalOp(op); err != nil {
return nil, err
}
return gce.service.UrlMaps.Get(gce.projectID, urlMap.Name).Do()
} | go | func (gce *Cloud) UpdateURLMap(urlMap *compute.UrlMap) (*compute.UrlMap, error) {
op, err := gce.service.UrlMaps.Update(gce.projectID, urlMap.Name, urlMap).Do()
if err != nil {
return nil, err
}
if err = gce.waitForGlobalOp(op); err != nil {
return nil, err
}
return gce.service.UrlMaps.Get(gce.projectID, urlMap.Name).Do()
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"UpdateURLMap",
"(",
"urlMap",
"*",
"compute",
".",
"UrlMap",
")",
"(",
"*",
"compute",
".",
"UrlMap",
",",
"error",
")",
"{",
"op",
",",
"err",
":=",
"gce",
".",
"service",
".",
"UrlMaps",
".",
"Update",
"(",
"gce",
".",
"projectID",
",",
"urlMap",
".",
"Name",
",",
"urlMap",
")",
".",
"Do",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"err",
"=",
"gce",
".",
"waitForGlobalOp",
"(",
"op",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"service",
".",
"UrlMaps",
".",
"Get",
"(",
"gce",
".",
"projectID",
",",
"urlMap",
".",
"Name",
")",
".",
"Do",
"(",
")",
"\n",
"}"
] | // UpdateURLMap applies the given UrlMap as an update, and returns the new UrlMap. | [
"UpdateURLMap",
"applies",
"the",
"given",
"UrlMap",
"as",
"an",
"update",
"and",
"returns",
"the",
"new",
"UrlMap",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1693-L1702 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | ListURLMaps | func (gce *Cloud) ListURLMaps() (*compute.UrlMapList, error) {
// TODO: use PageToken to list all not just the first 500
return gce.service.UrlMaps.List(gce.projectID).Do()
} | go | func (gce *Cloud) ListURLMaps() (*compute.UrlMapList, error) {
// TODO: use PageToken to list all not just the first 500
return gce.service.UrlMaps.List(gce.projectID).Do()
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"ListURLMaps",
"(",
")",
"(",
"*",
"compute",
".",
"UrlMapList",
",",
"error",
")",
"{",
"// TODO: use PageToken to list all not just the first 500",
"return",
"gce",
".",
"service",
".",
"UrlMaps",
".",
"List",
"(",
"gce",
".",
"projectID",
")",
".",
"Do",
"(",
")",
"\n",
"}"
] | // ListURLMaps lists all URLMaps in the project. | [
"ListURLMaps",
"lists",
"all",
"URLMaps",
"in",
"the",
"project",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1717-L1720 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | GetTargetHTTPProxy | func (gce *Cloud) GetTargetHTTPProxy(name string) (*compute.TargetHttpProxy, error) {
return gce.service.TargetHttpProxies.Get(gce.projectID, name).Do()
} | go | func (gce *Cloud) GetTargetHTTPProxy(name string) (*compute.TargetHttpProxy, error) {
return gce.service.TargetHttpProxies.Get(gce.projectID, name).Do()
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"GetTargetHTTPProxy",
"(",
"name",
"string",
")",
"(",
"*",
"compute",
".",
"TargetHttpProxy",
",",
"error",
")",
"{",
"return",
"gce",
".",
"service",
".",
"TargetHttpProxies",
".",
"Get",
"(",
"gce",
".",
"projectID",
",",
"name",
")",
".",
"Do",
"(",
")",
"\n",
"}"
] | // TargetHttpProxy management
// GetTargetHTTPProxy returns the UrlMap by name. | [
"TargetHttpProxy",
"management",
"GetTargetHTTPProxy",
"returns",
"the",
"UrlMap",
"by",
"name",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1725-L1727 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | CreateTargetHTTPProxy | func (gce *Cloud) CreateTargetHTTPProxy(urlMap *compute.UrlMap, name string) (*compute.TargetHttpProxy, error) {
proxy := &compute.TargetHttpProxy{
Name: name,
UrlMap: urlMap.SelfLink,
}
op, err := gce.service.TargetHttpProxies.Insert(gce.projectID, proxy).Do()
if err != nil {
return nil, err
}
if err = gce.waitForGlobalOp(op); err != nil {
return nil, err
}
return gce.GetTargetHTTPProxy(name)
} | go | func (gce *Cloud) CreateTargetHTTPProxy(urlMap *compute.UrlMap, name string) (*compute.TargetHttpProxy, error) {
proxy := &compute.TargetHttpProxy{
Name: name,
UrlMap: urlMap.SelfLink,
}
op, err := gce.service.TargetHttpProxies.Insert(gce.projectID, proxy).Do()
if err != nil {
return nil, err
}
if err = gce.waitForGlobalOp(op); err != nil {
return nil, err
}
return gce.GetTargetHTTPProxy(name)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"CreateTargetHTTPProxy",
"(",
"urlMap",
"*",
"compute",
".",
"UrlMap",
",",
"name",
"string",
")",
"(",
"*",
"compute",
".",
"TargetHttpProxy",
",",
"error",
")",
"{",
"proxy",
":=",
"&",
"compute",
".",
"TargetHttpProxy",
"{",
"Name",
":",
"name",
",",
"UrlMap",
":",
"urlMap",
".",
"SelfLink",
",",
"}",
"\n",
"op",
",",
"err",
":=",
"gce",
".",
"service",
".",
"TargetHttpProxies",
".",
"Insert",
"(",
"gce",
".",
"projectID",
",",
"proxy",
")",
".",
"Do",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"err",
"=",
"gce",
".",
"waitForGlobalOp",
"(",
"op",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"GetTargetHTTPProxy",
"(",
"name",
")",
"\n",
"}"
] | // CreateTargetHTTPProxy creates and returns a TargetHTTPProxy with the given UrlMap. | [
"CreateTargetHTTPProxy",
"creates",
"and",
"returns",
"a",
"TargetHTTPProxy",
"with",
"the",
"given",
"UrlMap",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1730-L1743 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | SetURLMapForTargetHTTPProxy | func (gce *Cloud) SetURLMapForTargetHTTPProxy(proxy *compute.TargetHttpProxy, urlMap *compute.UrlMap) error {
op, err := gce.service.TargetHttpProxies.SetUrlMap(gce.projectID, proxy.Name, &compute.UrlMapReference{UrlMap: urlMap.SelfLink}).Do()
if err != nil {
return err
}
return gce.waitForGlobalOp(op)
} | go | func (gce *Cloud) SetURLMapForTargetHTTPProxy(proxy *compute.TargetHttpProxy, urlMap *compute.UrlMap) error {
op, err := gce.service.TargetHttpProxies.SetUrlMap(gce.projectID, proxy.Name, &compute.UrlMapReference{UrlMap: urlMap.SelfLink}).Do()
if err != nil {
return err
}
return gce.waitForGlobalOp(op)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"SetURLMapForTargetHTTPProxy",
"(",
"proxy",
"*",
"compute",
".",
"TargetHttpProxy",
",",
"urlMap",
"*",
"compute",
".",
"UrlMap",
")",
"error",
"{",
"op",
",",
"err",
":=",
"gce",
".",
"service",
".",
"TargetHttpProxies",
".",
"SetUrlMap",
"(",
"gce",
".",
"projectID",
",",
"proxy",
".",
"Name",
",",
"&",
"compute",
".",
"UrlMapReference",
"{",
"UrlMap",
":",
"urlMap",
".",
"SelfLink",
"}",
")",
".",
"Do",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"waitForGlobalOp",
"(",
"op",
")",
"\n",
"}"
] | // SetURLMapForTargetHTTPProxy sets the given URLMap for the given TargetHTTPProxy. | [
"SetURLMapForTargetHTTPProxy",
"sets",
"the",
"given",
"URLMap",
"for",
"the",
"given",
"TargetHTTPProxy",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1746-L1752 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | ListTargetHTTPProxies | func (gce *Cloud) ListTargetHTTPProxies() (*compute.TargetHttpProxyList, error) {
// TODO: use PageToken to list all not just the first 500
return gce.service.TargetHttpProxies.List(gce.projectID).Do()
} | go | func (gce *Cloud) ListTargetHTTPProxies() (*compute.TargetHttpProxyList, error) {
// TODO: use PageToken to list all not just the first 500
return gce.service.TargetHttpProxies.List(gce.projectID).Do()
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"ListTargetHTTPProxies",
"(",
")",
"(",
"*",
"compute",
".",
"TargetHttpProxyList",
",",
"error",
")",
"{",
"// TODO: use PageToken to list all not just the first 500",
"return",
"gce",
".",
"service",
".",
"TargetHttpProxies",
".",
"List",
"(",
"gce",
".",
"projectID",
")",
".",
"Do",
"(",
")",
"\n",
"}"
] | // ListTargetHTTPProxies lists all TargetHTTPProxies in the project. | [
"ListTargetHTTPProxies",
"lists",
"all",
"TargetHTTPProxies",
"in",
"the",
"project",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1767-L1770 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | GetTargetHTTPSProxy | func (gce *Cloud) GetTargetHTTPSProxy(name string) (*compute.TargetHttpsProxy, error) {
return gce.service.TargetHttpsProxies.Get(gce.projectID, name).Do()
} | go | func (gce *Cloud) GetTargetHTTPSProxy(name string) (*compute.TargetHttpsProxy, error) {
return gce.service.TargetHttpsProxies.Get(gce.projectID, name).Do()
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"GetTargetHTTPSProxy",
"(",
"name",
"string",
")",
"(",
"*",
"compute",
".",
"TargetHttpsProxy",
",",
"error",
")",
"{",
"return",
"gce",
".",
"service",
".",
"TargetHttpsProxies",
".",
"Get",
"(",
"gce",
".",
"projectID",
",",
"name",
")",
".",
"Do",
"(",
")",
"\n",
"}"
] | // TargetHttpsProxy management
// GetTargetHTTPSProxy returns the URLMap by name. | [
"TargetHttpsProxy",
"management",
"GetTargetHTTPSProxy",
"returns",
"the",
"URLMap",
"by",
"name",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1775-L1777 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | CreateTargetHTTPSProxy | func (gce *Cloud) CreateTargetHTTPSProxy(urlMap *compute.UrlMap, sslCert *compute.SslCertificate, name string) (*compute.TargetHttpsProxy, error) {
proxy := &compute.TargetHttpsProxy{
Name: name,
UrlMap: urlMap.SelfLink,
SslCertificates: []string{sslCert.SelfLink},
}
op, err := gce.service.TargetHttpsProxies.Insert(gce.projectID, proxy).Do()
if err != nil {
return nil, err
}
if err = gce.waitForGlobalOp(op); err != nil {
return nil, err
}
return gce.GetTargetHTTPSProxy(name)
} | go | func (gce *Cloud) CreateTargetHTTPSProxy(urlMap *compute.UrlMap, sslCert *compute.SslCertificate, name string) (*compute.TargetHttpsProxy, error) {
proxy := &compute.TargetHttpsProxy{
Name: name,
UrlMap: urlMap.SelfLink,
SslCertificates: []string{sslCert.SelfLink},
}
op, err := gce.service.TargetHttpsProxies.Insert(gce.projectID, proxy).Do()
if err != nil {
return nil, err
}
if err = gce.waitForGlobalOp(op); err != nil {
return nil, err
}
return gce.GetTargetHTTPSProxy(name)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"CreateTargetHTTPSProxy",
"(",
"urlMap",
"*",
"compute",
".",
"UrlMap",
",",
"sslCert",
"*",
"compute",
".",
"SslCertificate",
",",
"name",
"string",
")",
"(",
"*",
"compute",
".",
"TargetHttpsProxy",
",",
"error",
")",
"{",
"proxy",
":=",
"&",
"compute",
".",
"TargetHttpsProxy",
"{",
"Name",
":",
"name",
",",
"UrlMap",
":",
"urlMap",
".",
"SelfLink",
",",
"SslCertificates",
":",
"[",
"]",
"string",
"{",
"sslCert",
".",
"SelfLink",
"}",
",",
"}",
"\n",
"op",
",",
"err",
":=",
"gce",
".",
"service",
".",
"TargetHttpsProxies",
".",
"Insert",
"(",
"gce",
".",
"projectID",
",",
"proxy",
")",
".",
"Do",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"err",
"=",
"gce",
".",
"waitForGlobalOp",
"(",
"op",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"GetTargetHTTPSProxy",
"(",
"name",
")",
"\n",
"}"
] | // CreateTargetHTTPSProxy creates and returns a TargetHTTPSProxy with the given URLMap and SslCertificate. | [
"CreateTargetHTTPSProxy",
"creates",
"and",
"returns",
"a",
"TargetHTTPSProxy",
"with",
"the",
"given",
"URLMap",
"and",
"SslCertificate",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1780-L1794 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | SetURLMapForTargetHTTPSProxy | func (gce *Cloud) SetURLMapForTargetHTTPSProxy(proxy *compute.TargetHttpsProxy, urlMap *compute.UrlMap) error {
op, err := gce.service.TargetHttpsProxies.SetUrlMap(gce.projectID, proxy.Name, &compute.UrlMapReference{UrlMap: urlMap.SelfLink}).Do()
if err != nil {
return err
}
return gce.waitForGlobalOp(op)
} | go | func (gce *Cloud) SetURLMapForTargetHTTPSProxy(proxy *compute.TargetHttpsProxy, urlMap *compute.UrlMap) error {
op, err := gce.service.TargetHttpsProxies.SetUrlMap(gce.projectID, proxy.Name, &compute.UrlMapReference{UrlMap: urlMap.SelfLink}).Do()
if err != nil {
return err
}
return gce.waitForGlobalOp(op)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"SetURLMapForTargetHTTPSProxy",
"(",
"proxy",
"*",
"compute",
".",
"TargetHttpsProxy",
",",
"urlMap",
"*",
"compute",
".",
"UrlMap",
")",
"error",
"{",
"op",
",",
"err",
":=",
"gce",
".",
"service",
".",
"TargetHttpsProxies",
".",
"SetUrlMap",
"(",
"gce",
".",
"projectID",
",",
"proxy",
".",
"Name",
",",
"&",
"compute",
".",
"UrlMapReference",
"{",
"UrlMap",
":",
"urlMap",
".",
"SelfLink",
"}",
")",
".",
"Do",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"waitForGlobalOp",
"(",
"op",
")",
"\n",
"}"
] | // SetURLMapForTargetHTTPSProxy sets the given URLMap for the given TargetHTTPSProxy. | [
"SetURLMapForTargetHTTPSProxy",
"sets",
"the",
"given",
"URLMap",
"for",
"the",
"given",
"TargetHTTPSProxy",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1797-L1803 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | SetSslCertificateForTargetHTTPSProxy | func (gce *Cloud) SetSslCertificateForTargetHTTPSProxy(proxy *compute.TargetHttpsProxy, sslCert *compute.SslCertificate) error {
op, err := gce.service.TargetHttpsProxies.SetSslCertificates(gce.projectID, proxy.Name, &compute.TargetHttpsProxiesSetSslCertificatesRequest{SslCertificates: []string{sslCert.SelfLink}}).Do()
if err != nil {
return err
}
return gce.waitForGlobalOp(op)
} | go | func (gce *Cloud) SetSslCertificateForTargetHTTPSProxy(proxy *compute.TargetHttpsProxy, sslCert *compute.SslCertificate) error {
op, err := gce.service.TargetHttpsProxies.SetSslCertificates(gce.projectID, proxy.Name, &compute.TargetHttpsProxiesSetSslCertificatesRequest{SslCertificates: []string{sslCert.SelfLink}}).Do()
if err != nil {
return err
}
return gce.waitForGlobalOp(op)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"SetSslCertificateForTargetHTTPSProxy",
"(",
"proxy",
"*",
"compute",
".",
"TargetHttpsProxy",
",",
"sslCert",
"*",
"compute",
".",
"SslCertificate",
")",
"error",
"{",
"op",
",",
"err",
":=",
"gce",
".",
"service",
".",
"TargetHttpsProxies",
".",
"SetSslCertificates",
"(",
"gce",
".",
"projectID",
",",
"proxy",
".",
"Name",
",",
"&",
"compute",
".",
"TargetHttpsProxiesSetSslCertificatesRequest",
"{",
"SslCertificates",
":",
"[",
"]",
"string",
"{",
"sslCert",
".",
"SelfLink",
"}",
"}",
")",
".",
"Do",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"waitForGlobalOp",
"(",
"op",
")",
"\n",
"}"
] | // SetSslCertificateForTargetHTTPSProxy sets the given SslCertificate for the given TargetHTTPSProxy. | [
"SetSslCertificateForTargetHTTPSProxy",
"sets",
"the",
"given",
"SslCertificate",
"for",
"the",
"given",
"TargetHTTPSProxy",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1806-L1812 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | DeleteTargetHTTPSProxy | func (gce *Cloud) DeleteTargetHTTPSProxy(name string) error {
op, err := gce.service.TargetHttpsProxies.Delete(gce.projectID, name).Do()
if err != nil {
if isHTTPErrorCode(err, http.StatusNotFound) {
return nil
}
return err
}
return gce.waitForGlobalOp(op)
} | go | func (gce *Cloud) DeleteTargetHTTPSProxy(name string) error {
op, err := gce.service.TargetHttpsProxies.Delete(gce.projectID, name).Do()
if err != nil {
if isHTTPErrorCode(err, http.StatusNotFound) {
return nil
}
return err
}
return gce.waitForGlobalOp(op)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"DeleteTargetHTTPSProxy",
"(",
"name",
"string",
")",
"error",
"{",
"op",
",",
"err",
":=",
"gce",
".",
"service",
".",
"TargetHttpsProxies",
".",
"Delete",
"(",
"gce",
".",
"projectID",
",",
"name",
")",
".",
"Do",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"isHTTPErrorCode",
"(",
"err",
",",
"http",
".",
"StatusNotFound",
")",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"return",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"waitForGlobalOp",
"(",
"op",
")",
"\n",
"}"
] | // DeleteTargetHTTPSProxy deletes the TargetHTTPSProxy by name. | [
"DeleteTargetHTTPSProxy",
"deletes",
"the",
"TargetHTTPSProxy",
"by",
"name",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1815-L1824 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | ListTargetHTTPSProxies | func (gce *Cloud) ListTargetHTTPSProxies() (*compute.TargetHttpsProxyList, error) {
// TODO: use PageToken to list all not just the first 500
return gce.service.TargetHttpsProxies.List(gce.projectID).Do()
} | go | func (gce *Cloud) ListTargetHTTPSProxies() (*compute.TargetHttpsProxyList, error) {
// TODO: use PageToken to list all not just the first 500
return gce.service.TargetHttpsProxies.List(gce.projectID).Do()
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"ListTargetHTTPSProxies",
"(",
")",
"(",
"*",
"compute",
".",
"TargetHttpsProxyList",
",",
"error",
")",
"{",
"// TODO: use PageToken to list all not just the first 500",
"return",
"gce",
".",
"service",
".",
"TargetHttpsProxies",
".",
"List",
"(",
"gce",
".",
"projectID",
")",
".",
"Do",
"(",
")",
"\n",
"}"
] | // ListTargetHTTPSProxies lists all TargetHTTPSProxies in the project. | [
"ListTargetHTTPSProxies",
"lists",
"all",
"TargetHTTPSProxies",
"in",
"the",
"project",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1827-L1830 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | GetSslCertificate | func (gce *Cloud) GetSslCertificate(name string) (*compute.SslCertificate, error) {
return gce.service.SslCertificates.Get(gce.projectID, name).Do()
} | go | func (gce *Cloud) GetSslCertificate(name string) (*compute.SslCertificate, error) {
return gce.service.SslCertificates.Get(gce.projectID, name).Do()
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"GetSslCertificate",
"(",
"name",
"string",
")",
"(",
"*",
"compute",
".",
"SslCertificate",
",",
"error",
")",
"{",
"return",
"gce",
".",
"service",
".",
"SslCertificates",
".",
"Get",
"(",
"gce",
".",
"projectID",
",",
"name",
")",
".",
"Do",
"(",
")",
"\n",
"}"
] | // SSL Certificate management
// GetSslCertificate returns the SslCertificate by name. | [
"SSL",
"Certificate",
"management",
"GetSslCertificate",
"returns",
"the",
"SslCertificate",
"by",
"name",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1835-L1837 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | GetBackendService | func (gce *Cloud) GetBackendService(name string) (*compute.BackendService, error) {
return gce.service.BackendServices.Get(gce.projectID, name).Do()
} | go | func (gce *Cloud) GetBackendService(name string) (*compute.BackendService, error) {
return gce.service.BackendServices.Get(gce.projectID, name).Do()
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"GetBackendService",
"(",
"name",
"string",
")",
"(",
"*",
"compute",
".",
"BackendService",
",",
"error",
")",
"{",
"return",
"gce",
".",
"service",
".",
"BackendServices",
".",
"Get",
"(",
"gce",
".",
"projectID",
",",
"name",
")",
".",
"Do",
"(",
")",
"\n",
"}"
] | // BackendService Management
// GetBackendService retrieves a backend by name. | [
"BackendService",
"Management",
"GetBackendService",
"retrieves",
"a",
"backend",
"by",
"name",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1927-L1929 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | UpdateBackendService | func (gce *Cloud) UpdateBackendService(bg *compute.BackendService) error {
op, err := gce.service.BackendServices.Update(gce.projectID, bg.Name, bg).Do()
if err != nil {
return err
}
return gce.waitForGlobalOp(op)
} | go | func (gce *Cloud) UpdateBackendService(bg *compute.BackendService) error {
op, err := gce.service.BackendServices.Update(gce.projectID, bg.Name, bg).Do()
if err != nil {
return err
}
return gce.waitForGlobalOp(op)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"UpdateBackendService",
"(",
"bg",
"*",
"compute",
".",
"BackendService",
")",
"error",
"{",
"op",
",",
"err",
":=",
"gce",
".",
"service",
".",
"BackendServices",
".",
"Update",
"(",
"gce",
".",
"projectID",
",",
"bg",
".",
"Name",
",",
"bg",
")",
".",
"Do",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"waitForGlobalOp",
"(",
"op",
")",
"\n",
"}"
] | // UpdateBackendService applies the given BackendService as an update to an existing service. | [
"UpdateBackendService",
"applies",
"the",
"given",
"BackendService",
"as",
"an",
"update",
"to",
"an",
"existing",
"service",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1932-L1938 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | CreateBackendService | func (gce *Cloud) CreateBackendService(bg *compute.BackendService) error {
op, err := gce.service.BackendServices.Insert(gce.projectID, bg).Do()
if err != nil {
return err
}
return gce.waitForGlobalOp(op)
} | go | func (gce *Cloud) CreateBackendService(bg *compute.BackendService) error {
op, err := gce.service.BackendServices.Insert(gce.projectID, bg).Do()
if err != nil {
return err
}
return gce.waitForGlobalOp(op)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"CreateBackendService",
"(",
"bg",
"*",
"compute",
".",
"BackendService",
")",
"error",
"{",
"op",
",",
"err",
":=",
"gce",
".",
"service",
".",
"BackendServices",
".",
"Insert",
"(",
"gce",
".",
"projectID",
",",
"bg",
")",
".",
"Do",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"waitForGlobalOp",
"(",
"op",
")",
"\n",
"}"
] | // CreateBackendService creates the given BackendService. | [
"CreateBackendService",
"creates",
"the",
"given",
"BackendService",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1953-L1959 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | ListBackendServices | func (gce *Cloud) ListBackendServices() (*compute.BackendServiceList, error) {
// TODO: use PageToken to list all not just the first 500
return gce.service.BackendServices.List(gce.projectID).Do()
} | go | func (gce *Cloud) ListBackendServices() (*compute.BackendServiceList, error) {
// TODO: use PageToken to list all not just the first 500
return gce.service.BackendServices.List(gce.projectID).Do()
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"ListBackendServices",
"(",
")",
"(",
"*",
"compute",
".",
"BackendServiceList",
",",
"error",
")",
"{",
"// TODO: use PageToken to list all not just the first 500",
"return",
"gce",
".",
"service",
".",
"BackendServices",
".",
"List",
"(",
"gce",
".",
"projectID",
")",
".",
"Do",
"(",
")",
"\n",
"}"
] | // ListBackendServices lists all backend services in the project. | [
"ListBackendServices",
"lists",
"all",
"backend",
"services",
"in",
"the",
"project",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1962-L1965 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | GetHealth | func (gce *Cloud) GetHealth(name string, instanceGroupLink string) (*compute.BackendServiceGroupHealth, error) {
groupRef := &compute.ResourceGroupReference{Group: instanceGroupLink}
return gce.service.BackendServices.GetHealth(gce.projectID, name, groupRef).Do()
} | go | func (gce *Cloud) GetHealth(name string, instanceGroupLink string) (*compute.BackendServiceGroupHealth, error) {
groupRef := &compute.ResourceGroupReference{Group: instanceGroupLink}
return gce.service.BackendServices.GetHealth(gce.projectID, name, groupRef).Do()
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"GetHealth",
"(",
"name",
"string",
",",
"instanceGroupLink",
"string",
")",
"(",
"*",
"compute",
".",
"BackendServiceGroupHealth",
",",
"error",
")",
"{",
"groupRef",
":=",
"&",
"compute",
".",
"ResourceGroupReference",
"{",
"Group",
":",
"instanceGroupLink",
"}",
"\n",
"return",
"gce",
".",
"service",
".",
"BackendServices",
".",
"GetHealth",
"(",
"gce",
".",
"projectID",
",",
"name",
",",
"groupRef",
")",
".",
"Do",
"(",
")",
"\n",
"}"
] | // GetHealth returns the health of the BackendService identified by the given
// name, in the given instanceGroup. The instanceGroupLink is the fully
// qualified self link of an instance group. | [
"GetHealth",
"returns",
"the",
"health",
"of",
"the",
"BackendService",
"identified",
"by",
"the",
"given",
"name",
"in",
"the",
"given",
"instanceGroup",
".",
"The",
"instanceGroupLink",
"is",
"the",
"fully",
"qualified",
"self",
"link",
"of",
"an",
"instance",
"group",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1970-L1973 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | GetHTTPHealthCheck | func (gce *Cloud) GetHTTPHealthCheck(name string) (*compute.HttpHealthCheck, error) {
return gce.service.HttpHealthChecks.Get(gce.projectID, name).Do()
} | go | func (gce *Cloud) GetHTTPHealthCheck(name string) (*compute.HttpHealthCheck, error) {
return gce.service.HttpHealthChecks.Get(gce.projectID, name).Do()
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"GetHTTPHealthCheck",
"(",
"name",
"string",
")",
"(",
"*",
"compute",
".",
"HttpHealthCheck",
",",
"error",
")",
"{",
"return",
"gce",
".",
"service",
".",
"HttpHealthChecks",
".",
"Get",
"(",
"gce",
".",
"projectID",
",",
"name",
")",
".",
"Do",
"(",
")",
"\n",
"}"
] | // Health Checks
// GetHTTPHealthCheck returns the given HTTPHealthCheck by name. | [
"Health",
"Checks",
"GetHTTPHealthCheck",
"returns",
"the",
"given",
"HTTPHealthCheck",
"by",
"name",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1978-L1980 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | UpdateHTTPHealthCheck | func (gce *Cloud) UpdateHTTPHealthCheck(hc *compute.HttpHealthCheck) error {
op, err := gce.service.HttpHealthChecks.Update(gce.projectID, hc.Name, hc).Do()
if err != nil {
return err
}
return gce.waitForGlobalOp(op)
} | go | func (gce *Cloud) UpdateHTTPHealthCheck(hc *compute.HttpHealthCheck) error {
op, err := gce.service.HttpHealthChecks.Update(gce.projectID, hc.Name, hc).Do()
if err != nil {
return err
}
return gce.waitForGlobalOp(op)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"UpdateHTTPHealthCheck",
"(",
"hc",
"*",
"compute",
".",
"HttpHealthCheck",
")",
"error",
"{",
"op",
",",
"err",
":=",
"gce",
".",
"service",
".",
"HttpHealthChecks",
".",
"Update",
"(",
"gce",
".",
"projectID",
",",
"hc",
".",
"Name",
",",
"hc",
")",
".",
"Do",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"waitForGlobalOp",
"(",
"op",
")",
"\n",
"}"
] | // UpdateHTTPHealthCheck applies the given HTTPHealthCheck as an update. | [
"UpdateHTTPHealthCheck",
"applies",
"the",
"given",
"HTTPHealthCheck",
"as",
"an",
"update",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L1983-L1989 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | CreateHTTPHealthCheck | func (gce *Cloud) CreateHTTPHealthCheck(hc *compute.HttpHealthCheck) error {
op, err := gce.service.HttpHealthChecks.Insert(gce.projectID, hc).Do()
if err != nil {
return err
}
return gce.waitForGlobalOp(op)
} | go | func (gce *Cloud) CreateHTTPHealthCheck(hc *compute.HttpHealthCheck) error {
op, err := gce.service.HttpHealthChecks.Insert(gce.projectID, hc).Do()
if err != nil {
return err
}
return gce.waitForGlobalOp(op)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"CreateHTTPHealthCheck",
"(",
"hc",
"*",
"compute",
".",
"HttpHealthCheck",
")",
"error",
"{",
"op",
",",
"err",
":=",
"gce",
".",
"service",
".",
"HttpHealthChecks",
".",
"Insert",
"(",
"gce",
".",
"projectID",
",",
"hc",
")",
".",
"Do",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"waitForGlobalOp",
"(",
"op",
")",
"\n",
"}"
] | // CreateHTTPHealthCheck creates the given HTTPHealthCheck. | [
"CreateHTTPHealthCheck",
"creates",
"the",
"given",
"HTTPHealthCheck",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L2004-L2010 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | ListHTTPHealthChecks | func (gce *Cloud) ListHTTPHealthChecks() (*compute.HttpHealthCheckList, error) {
// TODO: use PageToken to list all not just the first 500
return gce.service.HttpHealthChecks.List(gce.projectID).Do()
} | go | func (gce *Cloud) ListHTTPHealthChecks() (*compute.HttpHealthCheckList, error) {
// TODO: use PageToken to list all not just the first 500
return gce.service.HttpHealthChecks.List(gce.projectID).Do()
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"ListHTTPHealthChecks",
"(",
")",
"(",
"*",
"compute",
".",
"HttpHealthCheckList",
",",
"error",
")",
"{",
"// TODO: use PageToken to list all not just the first 500",
"return",
"gce",
".",
"service",
".",
"HttpHealthChecks",
".",
"List",
"(",
"gce",
".",
"projectID",
")",
".",
"Do",
"(",
")",
"\n",
"}"
] | // ListHTTPHealthChecks lists all HTTPHealthChecks in the project. | [
"ListHTTPHealthChecks",
"lists",
"all",
"HTTPHealthChecks",
"in",
"the",
"project",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L2013-L2016 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | CreateInstanceGroup | func (gce *Cloud) CreateInstanceGroup(name string, zone string) (*compute.InstanceGroup, error) {
op, err := gce.service.InstanceGroups.Insert(
gce.projectID, zone, &compute.InstanceGroup{Name: name}).Do()
if err != nil {
return nil, err
}
if err = gce.waitForZoneOp(op, zone); err != nil {
return nil, err
}
return gce.GetInstanceGroup(name, zone)
} | go | func (gce *Cloud) CreateInstanceGroup(name string, zone string) (*compute.InstanceGroup, error) {
op, err := gce.service.InstanceGroups.Insert(
gce.projectID, zone, &compute.InstanceGroup{Name: name}).Do()
if err != nil {
return nil, err
}
if err = gce.waitForZoneOp(op, zone); err != nil {
return nil, err
}
return gce.GetInstanceGroup(name, zone)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"CreateInstanceGroup",
"(",
"name",
"string",
",",
"zone",
"string",
")",
"(",
"*",
"compute",
".",
"InstanceGroup",
",",
"error",
")",
"{",
"op",
",",
"err",
":=",
"gce",
".",
"service",
".",
"InstanceGroups",
".",
"Insert",
"(",
"gce",
".",
"projectID",
",",
"zone",
",",
"&",
"compute",
".",
"InstanceGroup",
"{",
"Name",
":",
"name",
"}",
")",
".",
"Do",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"err",
"=",
"gce",
".",
"waitForZoneOp",
"(",
"op",
",",
"zone",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"GetInstanceGroup",
"(",
"name",
",",
"zone",
")",
"\n",
"}"
] | // InstanceGroup Management
// CreateInstanceGroup creates an instance group with the given instances. It is the callers responsibility to add named ports. | [
"InstanceGroup",
"Management",
"CreateInstanceGroup",
"creates",
"an",
"instance",
"group",
"with",
"the",
"given",
"instances",
".",
"It",
"is",
"the",
"callers",
"responsibility",
"to",
"add",
"named",
"ports",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L2021-L2031 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | RemoveInstancesFromInstanceGroup | func (gce *Cloud) RemoveInstancesFromInstanceGroup(name string, zone string, instanceNames []string) error {
if len(instanceNames) == 0 {
return nil
}
instances := []*compute.InstanceReference{}
for _, ins := range instanceNames {
instanceLink := makeHostURL(gce.projectID, zone, ins)
instances = append(instances, &compute.InstanceReference{Instance: instanceLink})
}
op, err := gce.service.InstanceGroups.RemoveInstances(
gce.projectID, zone, name,
&compute.InstanceGroupsRemoveInstancesRequest{
Instances: instances,
}).Do()
if err != nil {
if isHTTPErrorCode(err, http.StatusNotFound) {
return nil
}
return err
}
return gce.waitForZoneOp(op, zone)
} | go | func (gce *Cloud) RemoveInstancesFromInstanceGroup(name string, zone string, instanceNames []string) error {
if len(instanceNames) == 0 {
return nil
}
instances := []*compute.InstanceReference{}
for _, ins := range instanceNames {
instanceLink := makeHostURL(gce.projectID, zone, ins)
instances = append(instances, &compute.InstanceReference{Instance: instanceLink})
}
op, err := gce.service.InstanceGroups.RemoveInstances(
gce.projectID, zone, name,
&compute.InstanceGroupsRemoveInstancesRequest{
Instances: instances,
}).Do()
if err != nil {
if isHTTPErrorCode(err, http.StatusNotFound) {
return nil
}
return err
}
return gce.waitForZoneOp(op, zone)
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"RemoveInstancesFromInstanceGroup",
"(",
"name",
"string",
",",
"zone",
"string",
",",
"instanceNames",
"[",
"]",
"string",
")",
"error",
"{",
"if",
"len",
"(",
"instanceNames",
")",
"==",
"0",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"instances",
":=",
"[",
"]",
"*",
"compute",
".",
"InstanceReference",
"{",
"}",
"\n",
"for",
"_",
",",
"ins",
":=",
"range",
"instanceNames",
"{",
"instanceLink",
":=",
"makeHostURL",
"(",
"gce",
".",
"projectID",
",",
"zone",
",",
"ins",
")",
"\n",
"instances",
"=",
"append",
"(",
"instances",
",",
"&",
"compute",
".",
"InstanceReference",
"{",
"Instance",
":",
"instanceLink",
"}",
")",
"\n",
"}",
"\n",
"op",
",",
"err",
":=",
"gce",
".",
"service",
".",
"InstanceGroups",
".",
"RemoveInstances",
"(",
"gce",
".",
"projectID",
",",
"zone",
",",
"name",
",",
"&",
"compute",
".",
"InstanceGroupsRemoveInstancesRequest",
"{",
"Instances",
":",
"instances",
",",
"}",
")",
".",
"Do",
"(",
")",
"\n\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"isHTTPErrorCode",
"(",
"err",
",",
"http",
".",
"StatusNotFound",
")",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"return",
"err",
"\n",
"}",
"\n",
"return",
"gce",
".",
"waitForZoneOp",
"(",
"op",
",",
"zone",
")",
"\n",
"}"
] | // RemoveInstancesFromInstanceGroup removes the given instances from the instance group. | [
"RemoveInstancesFromInstanceGroup",
"removes",
"the",
"given",
"instances",
"from",
"the",
"instance",
"group",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L2080-L2102 | train |
kubernetes-incubator/external-storage | snapshot/pkg/cloudprovider/providers/gce/gce.go | AddPortToInstanceGroup | func (gce *Cloud) AddPortToInstanceGroup(ig *compute.InstanceGroup, port int64) (*compute.NamedPort, error) {
for _, np := range ig.NamedPorts {
if np.Port == port {
glog.V(3).Infof("Instance group %v already has named port %+v", ig.Name, np)
return np, nil
}
}
glog.Infof("Adding port %v to instance group %v with %d ports", port, ig.Name, len(ig.NamedPorts))
namedPort := compute.NamedPort{Name: fmt.Sprintf("port%v", port), Port: port}
ig.NamedPorts = append(ig.NamedPorts, &namedPort)
// setNamedPorts is a zonal endpoint, meaning we invoke it by re-creating a URL like:
// {project}/zones/{zone}/instanceGroups/{instanceGroup}/setNamedPorts, so the "zone"
// parameter given to SetNamedPorts must not be the entire zone URL.
zoneURLParts := strings.Split(ig.Zone, "/")
zone := zoneURLParts[len(zoneURLParts)-1]
op, err := gce.service.InstanceGroups.SetNamedPorts(
gce.projectID, zone, ig.Name,
&compute.InstanceGroupsSetNamedPortsRequest{
NamedPorts: ig.NamedPorts}).Do()
if err != nil {
return nil, err
}
if err = gce.waitForZoneOp(op, zone); err != nil {
return nil, err
}
return &namedPort, nil
} | go | func (gce *Cloud) AddPortToInstanceGroup(ig *compute.InstanceGroup, port int64) (*compute.NamedPort, error) {
for _, np := range ig.NamedPorts {
if np.Port == port {
glog.V(3).Infof("Instance group %v already has named port %+v", ig.Name, np)
return np, nil
}
}
glog.Infof("Adding port %v to instance group %v with %d ports", port, ig.Name, len(ig.NamedPorts))
namedPort := compute.NamedPort{Name: fmt.Sprintf("port%v", port), Port: port}
ig.NamedPorts = append(ig.NamedPorts, &namedPort)
// setNamedPorts is a zonal endpoint, meaning we invoke it by re-creating a URL like:
// {project}/zones/{zone}/instanceGroups/{instanceGroup}/setNamedPorts, so the "zone"
// parameter given to SetNamedPorts must not be the entire zone URL.
zoneURLParts := strings.Split(ig.Zone, "/")
zone := zoneURLParts[len(zoneURLParts)-1]
op, err := gce.service.InstanceGroups.SetNamedPorts(
gce.projectID, zone, ig.Name,
&compute.InstanceGroupsSetNamedPortsRequest{
NamedPorts: ig.NamedPorts}).Do()
if err != nil {
return nil, err
}
if err = gce.waitForZoneOp(op, zone); err != nil {
return nil, err
}
return &namedPort, nil
} | [
"func",
"(",
"gce",
"*",
"Cloud",
")",
"AddPortToInstanceGroup",
"(",
"ig",
"*",
"compute",
".",
"InstanceGroup",
",",
"port",
"int64",
")",
"(",
"*",
"compute",
".",
"NamedPort",
",",
"error",
")",
"{",
"for",
"_",
",",
"np",
":=",
"range",
"ig",
".",
"NamedPorts",
"{",
"if",
"np",
".",
"Port",
"==",
"port",
"{",
"glog",
".",
"V",
"(",
"3",
")",
".",
"Infof",
"(",
"\"",
"\"",
",",
"ig",
".",
"Name",
",",
"np",
")",
"\n",
"return",
"np",
",",
"nil",
"\n",
"}",
"\n",
"}",
"\n",
"glog",
".",
"Infof",
"(",
"\"",
"\"",
",",
"port",
",",
"ig",
".",
"Name",
",",
"len",
"(",
"ig",
".",
"NamedPorts",
")",
")",
"\n",
"namedPort",
":=",
"compute",
".",
"NamedPort",
"{",
"Name",
":",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"port",
")",
",",
"Port",
":",
"port",
"}",
"\n",
"ig",
".",
"NamedPorts",
"=",
"append",
"(",
"ig",
".",
"NamedPorts",
",",
"&",
"namedPort",
")",
"\n\n",
"// setNamedPorts is a zonal endpoint, meaning we invoke it by re-creating a URL like:",
"// {project}/zones/{zone}/instanceGroups/{instanceGroup}/setNamedPorts, so the \"zone\"",
"// parameter given to SetNamedPorts must not be the entire zone URL.",
"zoneURLParts",
":=",
"strings",
".",
"Split",
"(",
"ig",
".",
"Zone",
",",
"\"",
"\"",
")",
"\n",
"zone",
":=",
"zoneURLParts",
"[",
"len",
"(",
"zoneURLParts",
")",
"-",
"1",
"]",
"\n\n",
"op",
",",
"err",
":=",
"gce",
".",
"service",
".",
"InstanceGroups",
".",
"SetNamedPorts",
"(",
"gce",
".",
"projectID",
",",
"zone",
",",
"ig",
".",
"Name",
",",
"&",
"compute",
".",
"InstanceGroupsSetNamedPortsRequest",
"{",
"NamedPorts",
":",
"ig",
".",
"NamedPorts",
"}",
")",
".",
"Do",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"err",
"=",
"gce",
".",
"waitForZoneOp",
"(",
"op",
",",
"zone",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"&",
"namedPort",
",",
"nil",
"\n",
"}"
] | // AddPortToInstanceGroup adds a port to the given instance group. | [
"AddPortToInstanceGroup",
"adds",
"a",
"port",
"to",
"the",
"given",
"instance",
"group",
"."
] | fbfedbf60da4e5ee25a3151bfe8504f3e3281319 | https://github.com/kubernetes-incubator/external-storage/blob/fbfedbf60da4e5ee25a3151bfe8504f3e3281319/snapshot/pkg/cloudprovider/providers/gce/gce.go#L2105-L2133 | train |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.