query
stringlengths
8
6.75k
document
stringlengths
9
1.89M
negatives
sequencelengths
19
19
metadata
dict
release decrements the active count and signals waiters. The caller must hold p.mu during the call.
func (p *BeanstalkdPool) release() { p.active -= 1 if p.cond != nil { p.cond.Signal() } }
[ "func (m *MuxSemaphore) Release(count int) {\n\tselect {\n\tcase m.resumeCh <- struct{}{}:\n\t\tm.count = count\n\tcase <-time.After(5 * time.Second):\n\t\tpanic(\"release time exceeded\")\n\t}\n}", "func (ml *concurrencyLimiter) Release() {\n\tatomic.AddInt32(&ml.now, -1)\n\tatomic.AddInt32(&ml.tmp, -1)\n}", "func (p *Pool[T, U, C, CT, TF]) release() {\n\tif !p.state.CompareAndSwap(gpool.OPENED, gpool.CLOSED) {\n\t\treturn\n\t}\n\tp.lock.Lock()\n\tp.workers.reset()\n\tp.lock.Unlock()\n\t// There might be some callers waiting in retrieveWorker(), so we need to wake them up to prevent\n\t// those callers blocking infinitely.\n\tp.cond.Broadcast()\n\tclose(p.taskCh)\n}", "func (s *semaphore) release() {\n\tfor {\n\t\told := s.state.Load()\n\t\tcapacity, in := unpack(old)\n\n\t\tif in == 0 {\n\t\t\tpanic(\"release and acquire are not paired\")\n\t\t}\n\n\t\tin--\n\t\tif s.state.CAS(old, pack(capacity, in)) {\n\t\t\tif in < capacity {\n\t\t\t\tselect {\n\t\t\t\tcase s.queue <- struct{}{}:\n\t\t\t\tdefault:\n\t\t\t\t\t// We generate more wakeups than we might need as we don't know\n\t\t\t\t\t// how many goroutines are waiting here. It is therefore okay\n\t\t\t\t\t// to drop the poke on the floor here as this case would mean we\n\t\t\t\t\t// have enough wakeups to wake up as many goroutines as this semaphore\n\t\t\t\t\t// can take, which is guaranteed to be enough.\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t}\n}", "func (w *Worker) release() {\n\tw.job = nil\n\tw.mySim <- w\n}", "func (semaphore Semaphore) Release() {\n\t<-semaphore\n}", "func (a *allocator) release(n int) {\n\ta.pool.SetBit(a.pool, n-a.low, free)\n}", "func TestSerialRelease(t *testing.T) {\n\tctx, cancel := context.WithTimeout(context.Background(), testTimeout)\n\tdefer cancel()\n\n\tacquirerCount := 100\n\n\ts := NewSemaphore()\n\tacquireCount := 0\n\tcallCh := make(chan acquireCall, acquirerCount)\n\tfor i := 0; i < acquirerCount; i++ {\n\t\tgo func() {\n\t\t\tcall := callAcquire(ctx, s, 1)\n\t\t\tacquireCount++\n\t\t\tcallCh <- call\n\t\t}()\n\t}\n\n\tfor i := 0; i < acquirerCount; i++ {\n\t\trequireNoCall(t, callCh)\n\n\t\tcount := s.Release(1)\n\t\trequire.Equal(t, int64(1), count)\n\n\t\tselect {\n\t\tcase call := <-callCh:\n\t\t\trequire.Equal(t, acquireCall{1, 0, nil}, call)\n\t\tcase <-ctx.Done():\n\t\t\tt.Fatal(ctx.Err())\n\t\t}\n\n\t\trequireNoCall(t, callCh)\n\n\t\trequire.Equal(t, int64(0), s.Count())\n\t}\n\n\t// acquireCount should have been incremented race-free.\n\trequire.Equal(t, acquirerCount, acquireCount)\n}", "func (l *Limiter) Release(n int) {\n\tl.cond.L.Lock()\n\tl.current -= n\n\tif l.current < 0 {\n\t\tl.cond.L.Unlock()\n\t\tpanic(\"units released exceeds units requested\")\n\t}\n\tl.cond.L.Unlock()\n\tl.cond.Signal()\n}", "func (b *bucket) release() error {\n\tif err := b.checkStatus(); err != nil {\n\t\treturn err\n\t}\n\n\tvar c int\n\tb.svcLock()\n\tdefer func() {\n\t\tif b.l() != nil {\n\t\t\tb.l().Printf(\"bucket #%d: release %d arenas\", b.idx, c)\n\t\t}\n\t\tb.svcUnlock()\n\t}()\n\n\tb.buf.Release()\n\n\tvar wg sync.WaitGroup\n\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\tif b.elen() == 0 {\n\t\t\treturn\n\t\t}\n\t\tb.evictRange(len(b.entry))\n\t\tb.entry = b.entry[:0]\n\t}()\n\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\ta := b.queue.head()\n\t\tfor a != nil {\n\t\t\tif a.full() {\n\t\t\t\ta.reset()\n\t\t\t\tb.mw().Reset(b.ids, b.ac())\n\t\t\t}\n\t\t\tc++\n\t\t\ta.release()\n\t\t\tb.mw().Release(b.ids, b.ac())\n\t\t\tb.size.snap(snapRelease, b.ac())\n\t\t\ta = a.next()\n\t\t}\n\t\tb.queue.setHead(nil).setAct(nil).setTail(nil)\n\t}()\n\n\twg.Wait()\n\n\treturn ErrOK\n}", "func (r request) release() {\n\t<-r.sem\n}", "func (res *Resource[T]) Release() {\n\tif res.status != resourceStatusAcquired {\n\t\tpanic(\"tried to release resource that is not acquired\")\n\t}\n\tres.pool.releaseAcquiredResource(res, nanotime())\n}", "func (pool *Pool) Release() {\n\tpool.system <- closingPool\n}", "func (m *ResourceManager) Release(n int64) {\n\tselect {\n\tcase m.releaseC <- n:\n\tcase <-m.closeC:\n\t}\n}", "func (p *Pool[T]) releaseAcquiredResource(res *Resource[T], lastUsedNano int64) {\n\tp.mux.Lock()\n\tdefer p.mux.Unlock()\n\tdefer p.acquireSem.Release(1)\n\n\tif p.closed || res.poolResetCount != p.resetCount {\n\t\tp.allResources.remove(res)\n\t\tgo p.destructResourceValue(res.value)\n\t} else {\n\t\tres.lastUsedNano = lastUsedNano\n\t\tres.status = resourceStatusIdle\n\t\tp.idleResources.Push(res)\n\t}\n}", "func (c *permitPool) Release() {\n\t<-c.sem\n}", "func TestTemporarilyReleaseAfterRelease(t *testing.T) {\n\tctx := concurrencylimiter.With(context.Background(), 1)\n\tctx, release := concurrencylimiter.Acquire(ctx)\n\trelease()\n\n\tran := false\n\n\tconcurrencylimiter.TemporarilyRelease(ctx, func() {\n\t\tran = true\n\t})\n\n\tassert.True(t, ran)\n}", "func (qp *QPool) Release(v int64) {\n\tqp.Lock()\n\tselect {\n\tcase q := <-qp.quota:\n\t\tv += q\n\tdefault:\n\t}\n\tif v > qp.max {\n\t\tv = qp.max\n\t}\n\tqp.quota <- v\n\tqp.Unlock()\n}", "func (step AggregateStep) Release() {\n\tfor _, src := range step {\n\t\tsrc.Release()\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewSQLBlobStorageFactory returns a BlobStorageFactory implementation which will return storage APIs backed by SQL.
func NewSQLBlobStorageFactory(tableName string, db *sql.DB, sqlBuilder sql_utils.StatementBuilder) BlobStorageFactory { return &sqlBlobStoreFactory{tableName: tableName, db: db, builder: sqlBuilder} }
[ "func newStorage(machineName, datasetId, tableName string) (storage.StorageDriver, error) {\n\tbqClient, err := client.NewClient()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr = bqClient.CreateDataset(datasetId)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tret := &bigqueryStorage{\n\t\tclient: bqClient,\n\t\tmachineName: machineName,\n\t}\n\tschema := ret.GetSchema()\n\terr = bqClient.CreateTable(tableName, schema)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn ret, nil\n}", "func New(conf *config.AzureBlobConfig, timeout time.Duration) (*Storage, error) {\n\tconst op errors.Op = \"azureblob.New\"\n\tu, err := url.Parse(fmt.Sprintf(\"https://%s.blob.core.windows.net\", conf.AccountName))\n\tif err != nil {\n\t\treturn nil, errors.E(op, err)\n\t}\n\tcl, err := newBlobStoreClient(u, conf.AccountName, conf.AccountKey, conf.ContainerName)\n\tif err != nil {\n\t\treturn nil, errors.E(op, err)\n\t}\n\treturn &Storage{client: cl, timeout: timeout}, nil\n}", "func NewSQLStore(params sqlstore.Parameters) (storage.FirmwareImageStore, error) {\n\tdb, err := sql.Open(params.Type, params.ConnectionString)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif err := db.Ping(); err != nil {\n\t\treturn nil, err\n\t}\n\tret := &sqlStore{db: db}\n\tif err := ret.createSchema(params); err != nil {\n\t\tlogging.Error(\"Unable to create schema for firmware image store: %v\", err)\n\t\treturn nil, err\n\t}\n\n\tif err := ret.prepare(); err != nil {\n\t\tlogging.Error(\"Unable to prepare statements for firmware image store: %v\", err)\n\t\treturn nil, err\n\t}\n\treturn ret, nil\n}", "func NewStorage(ctx context.Context, cfg ConnectionInfo) (Storage, error) {\n\tif factory, ok := factories[cfg.Type]; ok {\n\t\treturn factory.createStorageFunc(ctx, cfg.Config)\n\t}\n\n\treturn nil, fmt.Errorf(\"unknown storage type: %s\", cfg.Type)\n}", "func NewSqlStore(config *StorageConfig) (*SqlStore, error) {\n\tlocation := config.Location\n\n\tdb, err := sql.Open(\"sqlite3\", location)\n\tif err != nil {\n\t\treturn nil, &StorageError{err.Error() + \" \" + location}\n\t}\n\n\tstatement, err := db.Prepare(createStatement)\n\tif err != nil {\n\t\treturn nil, &StorageError{err.Error()}\n\t}\n\n\t_, err = statement.Exec()\n\tif err != nil {\n\t\treturn nil, &StorageError{err.Error()}\n\t}\n\n\tmutex := &sync.Mutex{}\n\n\treturn &SqlStore{location, make(map[string]string, 20), db, mutex}, nil\n}", "func NewStorageProvider(filename string) (engine.StorageProvider, error) {\n\tsession, err := bolt.Open(filename, 0666, &bolt.Options{Timeout: 1 * time.Second})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr2 := initBuckets(session)\n\tif err2 != nil {\n\t\treturn nil, err2\n\t}\n\treturn &boltDBStorageProvider{session}, nil\n}", "func NewStorage() (*Database, error) {\n\tlogger := hclog.New(&hclog.LoggerOptions{Name: \"database\", Level: hclog.Debug})\n\tconnStr := \"postgresql://localhost/couponcutter?user=couponcutter&password=david\"\n\tdbPool, err := pgxpool.Connect(context.Background(), connStr)\n\n\tif err != nil {\n\t\tlogger.Error(\"unable to connect to database\", err)\n\t\treturn nil, err\n\t}\n\n\tst := &Database{\n\t\tdbPool: dbPool,\n\t\tlogger: logger,\n\t\tpsql: sq.StatementBuilder.PlaceholderFormat(sq.Dollar),\n\t}\n\treturn st, nil\n}", "func NewMemoryBlobStorageFactory() BlobStorageFactory {\n\treturn &memoryBlobStoreFactory{table: blobTable{}}\n}", "func New(ctx context.Context, connStr string, logg logger.Logger) (*StorageInDB, error) {\n\tdb, err := sql.Open(\"postgres\", connStr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ts := &StorageInDB{\n\t\tdb: db,\n\t\tlogg: logg,\n\t}\n\tgo s.Close(ctx, logg)\n\treturn s, nil\n}", "func NewSqliteStorage() *SqliteStorage {\n\tdb, err := sql.Open(\"sqlite3\", \"./db.sqlite3?_foreign_keys=on\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tstorage := SqliteStorage{DB: db}\n\terr = storage.createTables()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn &storage\n}", "func NewStorageInterface(dbFile string) *StorageInterface {\n\tdb, err := getDbCxn(dbFile)\n\tif err != nil {\n\t\tpanic(fmt.Errorf(\"Failed to open sqlite connection: %v\", err))\n\t}\n\treturn &StorageInterface{db: db, secret: getSecret(db)}\n}", "func NewDBStorage(driver, source string) (sensors.OrderStorage, error) {\n\n\tengine, err := xorm.NewEngine(driver, source)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tstorage := &storageImpl{\n\t\tLogger: slf4go.Get(\"storage\"),\n\t\tengine: engine,\n\t}\n\n\treturn storage, nil\n}", "func NewSQLiteStorage(path string) (Storage, error) {\n\tdb, err := gorm.Open(sqlite.Open(path), &gorm.Config{})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &sqliteStorage{GORM: db}, nil\n}", "func NewStorageFactory(\n\tstorageConfig storagebackend.Config,\n\tdefaultMediaType string,\n\tserializer runtime.StorageSerializer,\n\tdefaultResourceEncoding *serverstorage.DefaultResourceEncodingConfig,\n\tstorageEncodingOverrides map[string]schema.GroupVersion,\n\tresourceEncodingOverrides []schema.GroupVersionResource,\n\tapiResourceConfig *serverstorage.ResourceConfig,\n) (*serverstorage.DefaultStorageFactory, error) {\n\tresourceEncodingConfig := resourceconfig.MergeGroupEncodingConfigs(defaultResourceEncoding, storageEncodingOverrides)\n\tresourceEncodingConfig = resourceconfig.MergeResourceEncodingConfigs(resourceEncodingConfig, resourceEncodingOverrides)\n\treturn serverstorage.NewDefaultStorageFactory(storageConfig, defaultMediaType, serializer, resourceEncodingConfig, apiResourceConfig, SpecialDefaultResourcePrefixes), nil\n}", "func New(pathname string) (s *Storage, err error) {\n\ts = &Storage{\n\t}\n\n\tif s.db, err = sql.Open(\"sqlite3\", pathname+\"?cache=shared\"); err != nil { // _journal_mode=WAL&\n\t\treturn nil, err\n\t}\n\n\tdefer func() {\n\t\tif err != nil {\n\t\t\ts.db.Close()\n\t\t\ts.db = nil\n\t\t\ts = nil\n\t\t}\n\t}()\n\n\tif err = s.setupSchema(); err != nil {\n\t\treturn\n\t}\n\n\tif s.Books, err = NewBookStorage(s); err != nil {\n\t\treturn\n\t}\n\tif s.Authors, err = NewAuthorStorage(s); err != nil {\n\t\treturn\n\t}\n\tif s.Publishers, err = NewPublisherStorage(s); err != nil {\n\t\treturn\n\t}\n\n\tif s.Series, err = NewSeriesStorage(s); err != nil {\n\t\treturn\n\t}\n\n\treturn\n}", "func NewPgStorage(connectionString string) Storage {\n\tdb, err := sql.Open(\"postgres\", connectionString)\n\tif err != nil {\n\t\tpanic(fmt.Sprintln(err))\n\t}\n\treturn &pgStorage{\n\t\tdb: db,\n\t}\n}", "func NewSqliteStorage(descriptor string) (*SqliteStorage, error) {\n\t// Open up a sqlite memory connection\n\tdb, err := sql.Open(\"sqlite3\", descriptor)\n\tif err != nil {\n\t\t// If an error occurs, returns this error\n\t\treturn nil, err\n\t}\n\n\t// Create a empty sqlite storage struct, and store the db connection in it\n\tstorage := new(SqliteStorage)\n\tstorage.db = db\n\n\t// Setup database tables\n\tstorage.init()\n\n\t// Return the new storage engine\n\treturn storage, nil\n}", "func New(accountName, accountKey, containerName string, cdnConf *config.CDNConfig) (*Storage, error) {\n\tconst op errors.Op = \"azurecdn.New\"\n\tu, err := url.Parse(fmt.Sprintf(\"https://%s.blob.core.windows.net\", accountName))\n\tif err != nil {\n\t\treturn nil, errors.E(op, err)\n\t}\n\tcl := newBlobStoreClient(u, accountName, accountKey, containerName)\n\treturn &Storage{cl: cl, baseURI: u, cdnConf: cdnConf}, nil\n}", "func NewStorageDB(cfg *config.Config) (interfaces.EventStorage, error) { //*interfaces.EventStorage\n\tvar err error\n\tvar db interfaces.EventStorage\n\n\tswitch cfg.DB.DbName {\n\tcase \"MemorySlice\": // MemorySlice хранение событий в slice\n\t\tdb = memslice.NewEventStore()\n\tcase \"MemoryMap\": // MemoryMap хранение событий в map\n\t\tdb = memory.NewEventStore()\n\n\tcase \"Postgres\": //Postgres работа с БД\n\t\tctx := context.Background()\n\t\tdb, err = postgresdb.NewPgEventStore(ctx, cfg.DB.DatabaseURL)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn db, err\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
String returns the canonical string representation of the egress type
func (s EgressType) String() string { switch s { case ControlPlane: return "controlplane" case Etcd: return "etcd" case Cluster: return "cluster" default: return "invalid" } }
[ "func (e ESType) String() string {\n\tswitch e {\n\tcase ESTypeString:\n\t\treturn \"ESString\"\n\tcase ESTypeInteger:\n\t\treturn \"ESInteger\"\n\tcase ESTypeFloat:\n\t\treturn \"ESFloat\"\n\tcase ESTypeBool:\n\t\treturn \"ESBoolean\"\n\t// TODO: Add ESTypeObject case\n\tcase ESTypeNil:\n\t\treturn \"ESNil\"\n\tdefault:\n\t\treturn \"ESUnknownType\"\n\t}\n}", "func (ct ComputeType) String() string {\n\treturn [...]string{\"unknown\", \"ec2\", \"docker\", \"kubernetes\", \"ecs\", \"eks\", \"lambda\"}[ct]\n}", "func (t Type) String() string { return types[t] }", "func (typ PPPoETagType) String() string {\n\tswitch typ {\n\tcase PPPoETagTypeEOL:\n\t\treturn \"EOL\"\n\tcase PPPoETagTypeServiceName:\n\t\treturn \"Service Name\"\n\tcase PPPoETagTypeACName:\n\t\treturn \"AC Name\"\n\tcase PPPoETagTypeHostUniq:\n\t\treturn \"Host Uniq\"\n\tcase PPPoETagTypeACCookie:\n\t\treturn \"AC Cookie\"\n\tcase PPPoETagTypeVendorSpecific:\n\t\treturn \"Vendor Specific\"\n\tcase PPPoETagTypeRelaySessionID:\n\t\treturn \"Relay Session ID\"\n\tcase PPPoETagTypeServiceNameError:\n\t\treturn \"Service Name Error\"\n\tcase PPPoETagTypeACSystemError:\n\t\treturn \"AC System Error\"\n\tcase PPPoETagTypeGenericError:\n\t\treturn \"Generic Error\"\n\tdefault:\n\t\treturn \"Unknown\"\n\t}\n}", "func (t Type) String() string {\n\tswitch t {\n\tcase SumField:\n\t\treturn \"sum\"\n\tcase MinField:\n\t\treturn \"min\"\n\tcase MaxField:\n\t\treturn \"max\"\n\tcase GaugeField:\n\t\treturn \"gauge\"\n\tcase HistogramField:\n\t\treturn \"histogram\"\n\tdefault:\n\t\treturn \"unknown\"\n\t}\n}", "func (c coinType) String() string {\r\n\treturn string(c)\r\n}", "func (t typeId) String() string\t{ return t.gobType().String() }", "func (typ SymType) String() string {\n\tm := map[SymType]string{\n\t\tSymTypeNone: \"none\",\n\t\tSymTypeObject: \"object\",\n\t\tSymTypeFunc: \"function\",\n\t\tSymTypeSection: \"section\",\n\t\tSymTypeFile: \"file\",\n\t\tSymTypeCommon: \"common\",\n\t\tSymTypeOS0: \"OS 0\",\n\t\tSymTypeOS1: \"OS 1\",\n\t\tSymTypeOS2: \"OS 2\",\n\t\tSymTypeProc0: \"processor 0\",\n\t\tSymTypeProc1: \"processor 1\",\n\t\tSymTypeProc2: \"processor 2\",\n\t}\n\tif s, ok := m[typ]; ok {\n\t\treturn s\n\t}\n\tpanic(fmt.Errorf(\"support for symbol type %v not yet implemented\", uint8(typ)))\n}", "func (t BeerType) String() string {\n\tif Unspecified <= t && t <= PaleAle {\n\t\treturn types[t-1]\n\t}\n\treturn \"Unspecified\"\n}", "func (c ConstraintType) String() string {\n\tif int(c) < len(constraintTypeTags) {\n\t\treturn constraintTypeTags[c].String()\n\t}\n\treturn \"constraintType\" + strconv.Itoa(int(c))\n}", "func (g *Gmetric) TypeToString(t uint32) string {\n\tswitch t {\n\tcase VALUE_UNKNOWN:\n\t\treturn \"unknown\"\n\tcase VALUE_STRING:\n\t\treturn \"string\"\n\tcase VALUE_UNSIGNED_SHORT:\n\t\treturn \"uint16\"\n\tcase VALUE_SHORT:\n\t\treturn \"int16\"\n\tcase VALUE_UNSIGNED_INT:\n\t\treturn \"uint32\"\n\tcase VALUE_INT:\n\t\treturn \"int32\"\n\tcase VALUE_FLOAT:\n\t\treturn \"float\"\n\tcase VALUE_DOUBLE:\n\t\treturn \"double\"\n\t}\n\treturn \"unknown\"\n}", "func (t StorageType) String() string {\n\treturn string(t)\n}", "func (at Kind) String() string {\n\treturn string(at)\n}", "func (t DeltaType) String() string {\n\tswitch t {\n\tcase Common:\n\t\treturn \" \"\n\tcase LeftOnly:\n\t\treturn \"-\"\n\tcase RightOnly:\n\t\treturn \"+\"\n\t}\n\treturn \"?\"\n}", "func (t ExtType) String() string {\n\treturn fromExtType[t]\n}", "func (t ConnectType) String() string {\n\treturn fromConnectType[t]\n}", "func (t EngineType) String() string {\r\n\tswitch t {\r\n\tcase SingleUse:\r\n\t\treturn \"Single use\"\r\n\tcase Reloadable:\r\n\t\treturn \"Reloadable\"\r\n\tcase Hybrid:\r\n\t\treturn \"Hybrid\"\r\n\t}\r\n\tpanic(errors.New(\"Invalid enumeration constant\"))\r\n}", "func rtype_String(*Type) string", "func (t TypeSize) String() string {\n\treturn fmt.Sprintf(\"%.3f\", t)\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
AsNetworkContext is a helper function to make it easy to get the basic NetworkContext objects.
func (s EgressType) AsNetworkContext() NetworkContext { return NetworkContext{EgressSelectionName: s} }
[ "func Context(c echo.Context) context.Context {\n\tobj := c.Get(contextNetContextKey)\n\tif obj != nil {\n\t\tif ctx, ok := obj.(context.Context); ok {\n\t\t\treturn ctx\n\t\t}\n\t}\n\tctx := appengine.NewContext(c.Request())\n\tc.Set(contextNetContextKey, ctx)\n\treturn ctx\n}", "func (o *GetPrivateNetworkParams) WithContext(ctx context.Context) *GetPrivateNetworkParams {\n\to.SetContext(ctx)\n\treturn o\n}", "func (d *Dialer) DialContext(ctx context.Context, network, address string) (Conn, error) {}", "func GenericNetwork(ctx context.Context, req GenericNetworkRequest) (Network, error) {\n\tprovider, err := req.ProviderType.GetProvider()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tnetwork, err := provider.CreateNetwork(ctx, req.NetworkRequest)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"%w: failed to create network\", err)\n\t}\n\n\treturn network, nil\n}", "func NewContext(c *gripdata.Context, db NodeContextdb) error {\r\n\t//Get my node id data\r\n\tn, pr := db.GetPrivateNodeData()\r\n\tc.SetNodeID(n.ID)\r\n\tc.CreatedOn = uint64(time.Now().UnixNano())\r\n\terr := gripcrypto.Sign(c, pr.PrivateKey)\r\n\tif err != nil {\r\n\t\treturn err\r\n\t}\r\n\terr = db.StoreContext(c)\r\n\tif err != nil {\r\n\t\treturn err\r\n\t}\r\n\treturn nil\r\n}", "func (store *Store) getChainFromNetwork(ctx context.Context,\n\treq *chainRequest) (*cert.Chain, error) {\n\n\tvar span opentracing.Span\n\tspan, ctx = opentracing.StartSpanFromContext(ctx, \"getChainFromNetwork\")\n\tdefer span.Finish()\n\tresponseC, cancelF, span := store.chainDeduper.Request(ctx, req)\n\tdefer cancelF()\n\tdefer span.Finish()\n\tselect {\n\tcase response := <-responseC:\n\t\tif response.Error != nil {\n\t\t\treturn nil, response.Error\n\t\t}\n\t\tif response.Data == nil {\n\t\t\treturn nil, common.NewBasicError(ErrNotFound, nil)\n\t\t}\n\t\treturn response.Data.(*cert.Chain), nil\n\tcase <-ctx.Done():\n\t\treturn nil, common.NewBasicError(\"Context canceled while waiting for Chain\",\n\t\t\tnil, \"ia\", req.ia, \"version\", req.version)\n\t}\n}", "func (d *Dialer) DialContext(ctx context.Context, network, address string) (net.Conn, error) {\n\tif network != \"tcp\" {\n\t\treturn nil, &net.OpError{Op: \"dial\", Net: network, Err: net.UnknownNetworkError(network)}\n\t}\n\tif len(address) > 0 {\n\t\t_, _, err := net.SplitHostPort(address)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif !d.SplitFlows {\n\t\tflow, err := makeTdFlow(flowBidirectional, nil, address)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tflow.tdRaw.TcpDialer = d.TcpDialer\n\t\treturn flow, flow.DialContext(ctx)\n\t}\n\treturn dialSplitFlow(ctx, d.TcpDialer, address)\n}", "func (d *Dialer) DialContext(ctx context.Context, network, addr string) (net.Conn, error) {\n\tconn, err := d.Dialer.DialContext(ctx, network, addr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\theader := d.HeaderProvider(ctx, conn)\n\tif header == nil {\n\t\treturn conn, nil\n\t}\n\t_, err = header.WriteTo(conn)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn conn, nil\n}", "func New(t *testing.T, mtu uint32) *Context {\n\ts := stack.New([]string{ipv4.ProtocolName}, []string{tcp.ProtocolName})\n\n\tid, linkEP := channel.New(256, mtu)\n\tif testing.Verbose() {\n\t\tid = sniffer.New(id)\n\t}\n\n\tif err := s.CreateNic(1, id); err != nil {\n\t\tt.Fatal(\"CreateNic failed: %v\", err)\n\t}\n\n\tif err := s.AddAddress(1, ipv4.ProtocolNumber, StackAddr); err != nil {\n\t\tt.Fatal(\"AddAddress failed: %v\", err)\n\t}\n\n\ts.SetRouteTable([]types.RouteEntry{\n\t\t{\n\t\t\tDestination:\t\"\\x00\\x00\\x00\\x00\",\n\t\t\tMask:\t\t\t\"\\x00\\x00\\x00\\x00\",\n\t\t\tGateway:\t\t\"\",\n\t\t\tNic:\t\t\t1,\n\t\t},\n\t})\n\n\treturn &Context{\n\t\tt:\t\tt,\n\t\ts:\t\ts,\n\t\tlinkEP:\tlinkEP,\n\t}\n}", "func contextWithClient(ctx context.Context, includeMetadata bool) context.Context {\n\tcl := client.FromContext(ctx)\n\tif p, ok := peer.FromContext(ctx); ok {\n\t\tcl.Addr = p.Addr\n\t}\n\tif includeMetadata {\n\t\tif md, ok := metadata.FromIncomingContext(ctx); ok {\n\t\t\tcopiedMD := md.Copy()\n\t\t\tif len(md[client.MetadataHostName]) == 0 && len(md[\":authority\"]) > 0 {\n\t\t\t\tcopiedMD[client.MetadataHostName] = md[\":authority\"]\n\t\t\t}\n\t\t\tcl.Metadata = client.NewMetadata(copiedMD)\n\t\t}\n\t}\n\treturn client.NewContext(ctx, cl)\n}", "func (c *Context) Clone() *Context {\n\tif len(c.cloned) == 0 {\n\t\tc.cloned = make([]*Context, 0)\n\t}\n\tresult := &Context{}\n\tresult.Wait = &sync.WaitGroup{}\n\tresult.Context = c.Context.Clone()\n\tresult.state = NewDefaultState(c)\n\tresult.state.Apply(c.state)\n\tresult.SessionID = c.SessionID\n\tresult.Listener = c.Listener\n\tresult.CLIEnabled = c.CLIEnabled\n\tresult.Secrets = c.Secrets\n\tresult.AsyncUnsafeKeys = make(map[interface{}]bool)\n\tfor k, v := range c.AsyncUnsafeKeys {\n\t\tresult.AsyncUnsafeKeys[k] = v\n\t}\n\tc.cloned = append(c.cloned, result)\n\treturn result\n}", "func GetClientTxContext() (client.Context, error) {\n\tclientCtx, err := GetClientContextFromCmd()\n\tif err != nil {\n\t\treturn clientCtx, err\n\t}\n\n\topts := flags.TxFlagsFromCmd()\n\n\tclientCtx = clientCtx.WithGenerateOnly(opts.GenerateOnly)\n\tclientCtx = clientCtx.WithOffline(opts.Offline)\n\tclientCtx = clientCtx.WithUseLedger(opts.UseLedger)\n\tclientCtx = clientCtx.WithBroadcastMode(opts.BroadcastMode)\n\tclientCtx = clientCtx.WithSkipConfirmation(opts.SkipConfirmation)\n\tclientCtx = clientCtx.WithSignModeStr(opts.SignMode)\n\n\tif opts.FeeAccount != \"\" {\n\t\tgranterAcc, err := sdk.AccAddressFromBech32(opts.FeeAccount)\n\t\tif err != nil {\n\t\t\treturn clientCtx, err\n\t\t}\n\n\t\tclientCtx = clientCtx.WithFeeGranterAddress(granterAcc)\n\t}\n\n\t{\n\t\tfromAddr, fromName, keyType, err := client.GetFromFields(clientCtx.Keyring, opts.From, clientCtx.GenerateOnly)\n\t\tif err != nil {\n\t\t\treturn clientCtx, err\n\t\t}\n\t\tclientCtx = clientCtx.WithFrom(opts.From).WithFromAddress(fromAddr).WithFromName(fromName)\n\n\t\t// If the `from` signer account is a ledger key, we need to use\n\t\t// SIGN_MODE_AMINO_JSON, because ledger doesn't support proto yet.\n\t\t// ref: https://github.com/cosmos/cosmos-sdk/issues/8109\n\t\tif keyType == keyring.TypeLedger && clientCtx.SignModeStr != sdkflags.SignModeLegacyAminoJSON {\n\t\t\tfmt.Println(\"Default sign-mode 'direct' not supported by Ledger, using sign-mode 'amino-json'.\")\n\t\t\tclientCtx = clientCtx.WithSignModeStr(sdkflags.SignModeLegacyAminoJSON)\n\t\t}\n\t}\n\n\treturn clientCtx, nil\n}", "func SystemContextFromOptions(c *cli.Context) (*types.SystemContext, error) {\n\tctx := &types.SystemContext{\n\t\tDockerCertPath: c.String(\"cert-dir\"),\n\t}\n\tif c.IsSet(\"tls-verify\") {\n\t\tctx.DockerInsecureSkipTLSVerify = !c.BoolT(\"tls-verify\")\n\t}\n\tif c.IsSet(\"creds\") {\n\t\tvar err error\n\t\tctx.DockerAuthConfig, err = getDockerAuth(c.String(\"creds\"))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tif c.IsSet(\"signature-policy\") {\n\t\tctx.SignaturePolicyPath = c.String(\"signature-policy\")\n\t}\n\tif c.IsSet(\"authfile\") {\n\t\tctx.AuthFilePath = c.String(\"authfile\")\n\t}\n\tif c.GlobalIsSet(\"registries-conf\") {\n\t\tctx.SystemRegistriesConfPath = c.GlobalString(\"registries-conf\")\n\t}\n\tif c.GlobalIsSet(\"registries-conf-dir\") {\n\t\tctx.RegistriesDirPath = c.GlobalString(\"registries-conf-dir\")\n\t}\n\treturn ctx, nil\n}", "func (d *Dialer) DialContext(ctx context.Context, network, address string) (net.Conn, error) {\n\taddrs, err := d.LookupAddrs(ctx, \"\", \"\", address, 0)\n\tif xerrors.Is(err, ErrNoAddrs) {\n\t\treturn d.dialer()(ctx, network, address)\n\t} else if err != nil {\n\t\treturn nil, err\n\t}\n\ti := d.randInt(len(addrs))\n\taddr := addrs[i]\n\tif addrNet := addr.Network(); addrNet != network {\n\t\treturn nil, xerrors.Errorf(\n\t\t\t\"requested network and SRV network do not match: Dial(%q, ...) != SRV(%q)\",\n\t\t\tnetwork, addrNet,\n\t\t)\n\t}\n\treturn d.dialer()(ctx, network, addr.String())\n}", "func CreateContext(ctx framework.TestContext, p pilot.Instance) Context {\n\tns := namespace.NewOrFail(ctx, ctx, namespace.Config{\n\t\tPrefix: \"reachability\",\n\t\tInject: true,\n\t})\n\n\tvar a, b, multiVersion, headless, naked echo.Instance\n\tcfg := util.EchoConfig(\"multiversion\", ns, false, nil, p)\n\tcfg.Subsets = []echo.SubsetConfig{\n\t\t// Istio deployment, with sidecar.\n\t\t{\n\t\t\tVersion: \"vistio\",\n\t\t},\n\t\t// Legacy deployment subset, does not have sidecar injected.\n\t\t{\n\t\t\tVersion: \"vlegacy\",\n\t\t\tAnnotations: echo.NewAnnotations().SetBool(echo.SidecarInject, false),\n\t\t},\n\t}\n\techoboot.NewBuilderOrFail(ctx, ctx).\n\t\tWith(&a, util.EchoConfig(\"a\", ns, false, nil, p)).\n\t\tWith(&b, util.EchoConfig(\"b\", ns, false, nil, p)).\n\t\tWith(&multiVersion, cfg).\n\t\tWith(&headless, util.EchoConfig(\"headless\", ns, true, nil, p)).\n\t\tWith(&naked, util.EchoConfig(\"naked\", ns, false, echo.NewAnnotations().\n\t\t\tSetBool(echo.SidecarInject, false), p)).\n\t\tBuildOrFail(ctx)\n\n\treturn Context{\n\t\tctx: ctx,\n\t\tp: p,\n\t\tNamespace: ns,\n\t\tA: a,\n\t\tB: b,\n\t\tMultiversion: multiVersion,\n\t\tHeadless: headless,\n\t\tNaked: naked,\n\t}\n}", "func (o *GetNetworkSmConnectivityParams) WithContext(ctx context.Context) *GetNetworkSmConnectivityParams {\n\to.SetContext(ctx)\n\treturn o\n}", "func newContext() Context {\n\treturn Context{members: make(map[string]interface{})}\n}", "func (s *Iris) newContextPool() sync.Pool {\n\treturn sync.Pool{New: func() interface{} {\n\t\treturn &Context{station: s}\n\t}}\n}", "func NewBasicContext(wl *Workload, applicationName, revision, namespace string) process.Context {\n\tpCtx := process.NewContext(namespace, wl.Name, applicationName, revision)\n\tpCtx.InsertSecrets(wl.OutputSecretName, wl.RequiredSecrets)\n\tif len(wl.UserConfigs) > 0 {\n\t\tpCtx.SetConfigs(wl.UserConfigs)\n\t}\n\tif wl.Params != nil {\n\t\tpCtx.SetParameters(wl.Params)\n\t}\n\treturn pCtx\n}", "func NewClientNetwork(ec EventContext, config MsgNetworkConfig, err *Error) (res ClientNetwork) {\n\tres = ClientNetworkFromC(C.clientnetwork_new(ec.inner, config.inner, err))\n\tif res.inner != nil {\n\t\tec.attach(rawPtr(res.inner), res)\n\t}\n\tclientNetworkSetFinalizer(res, true)\n\truntime.KeepAlive(ec)\n\truntime.KeepAlive(config)\n\treturn\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
connect establishes a connection to a proxy over gRPC. TODO At the moment, it does not use the provided context.
func (u *udsGRPCConnector) connect(_ context.Context) (proxier, error) { udsName := u.udsName dialOption := grpc.WithContextDialer(func(ctx context.Context, addr string) (net.Conn, error) { var d net.Dialer c, err := d.DialContext(ctx, "unix", udsName) if err != nil { klog.Errorf("failed to create connection to uds name %s, error: %v", udsName, err) } return c, err }) // CreateSingleUseGrpcTunnel() unfortunately couples dial and connection contexts. Because of that, // we cannot use ctx just for dialing and control the connection lifetime separately. // See https://github.com/kubernetes-sigs/apiserver-network-proxy/issues/357. tunnelCtx := context.TODO() tunnel, err := client.CreateSingleUseGrpcTunnel(tunnelCtx, udsName, dialOption, grpc.WithBlock(), grpc.WithReturnConnectionError(), grpc.WithTimeout(30*time.Second), // matches http.DefaultTransport dial timeout grpc.WithTransportCredentials(insecure.NewCredentials())) if err != nil { return nil, err } return &grpcProxier{tunnel: tunnel}, nil }
[ "func (s *HTTPProxy) connect(w http.ResponseWriter, r *http.Request) {\n\t// Use Hijacker to get the underlying connection\n\thij, ok := w.(http.Hijacker)\n\tif !ok {\n\t\thttp.Error(w, \"Server does not support Hijacker\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// connect the remote client directly\n\tdst, err := s.tr.DialContext(context.Background(), \"tcp\", r.URL.Host)\n\tif err != nil {\n\t\tif nerr, ok := err.(net.Error); ok && nerr.Timeout() {\n\t\t\tzap.L().Debug(\"CONNECT roundtrip proxy timeout\")\n\t\t\treturn\n\t\t}\n\t\tzap.L().Debug(\"CONNECT roundtrip proxy\", zap.String(\"error\", err.Error()))\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tdefer dst.Close()\n\n\tsrc, _, err := hij.Hijack()\n\tif err != nil {\n\t\tzap.L().Debug(\"CONNECT hijack\", zap.String(\"error\", err.Error()))\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tdefer src.Close()\n\n\t// Once connected successfully, return OK\n\t_, _ = src.Write([]byte(\"HTTP/1.1 200 OK\\r\\n\\r\\n\"))\n\n\t// Proxy is no need to know anything, just exchange data between the client\n\t// the the remote server.\n\tvar wg sync.WaitGroup\n\tcopyAndWait := func(dst, src net.Conn) {\n\t\tdefer wg.Done()\n\t\t_, err := io.Copy(dst, src)\n\t\tif err != nil {\n\t\t\tzap.L().Error(\"CONNECT copy response\", zap.Any(\"src\", src), zap.Any(\"dst\", dst))\n\t\t}\n\t\tif tcpConn, ok := dst.(interface{ CloseWrite() error }); ok {\n\t\t\t_ = tcpConn.CloseWrite()\n\t\t}\n\t}\n\n\twg.Add(2)\n\tgo copyAndWait(dst, src) // client to remote\n\tgo copyAndWait(src, dst) // remote to client\n\twg.Wait()\n}", "func grpcConnect(args []string, svc string) (gitpb.Git_ConnectClient, error) {\n\tvar (\n\t\taddr *url.URL\n\t\terr error\n\t)\n\tswitch {\n\tcase len(args) >= 3:\n\t\taddr, err = url.Parse(args[2])\n\tcase len(args) == 2:\n\t\taddr, err = url.Parse(args[1])\n\tdefault:\n\t\terr = fmt.Errorf(\"no address given\")\n\t}\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"parsing remote address: %v\", err)\n\t}\n\n\tconn, err := grpc.Dial(addr.Host, grpc.WithInsecure())\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"dial %s: %v\", addr.Host, err)\n\t}\n\tgitClient := gitpb.NewGitClient(conn)\n\n\t// Identify the repository by the address path.\n\trepoPath := strings.TrimPrefix(addr.Path, \"/\")\n\tctx := metadata.AppendToOutgoingContext(context.Background(),\n\t\t\"service\", svc,\n\t\t\"repository\", repoPath,\n\t)\n\treturn gitClient.Connect(ctx)\n}", "func (s *Service) Connect(port string) (*grpc.ClientConn, error) {\n\ttlsConfig, err := s.Credentials()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn grpc.Dial(s.Address(port), grpc.WithTransportCredentials(credentials.NewTLS(tlsConfig)))\n}", "func Connect(peer *Peer, mspID string, identity *identity.Identity) (*Connection, error) {\n\tvar clientConn *grpc.ClientConn\n\tvar err error\n\tif peer.tls != nil {\n\t\tcreds := credentials.NewTLS(&tls.Config{\n\t\t\tInsecureSkipVerify: true,\n\t\t})\n\t\tclientConn, err = grpc.Dial(fmt.Sprintf(\"localhost:%d\", peer.apiPort), grpc.WithTransportCredentials(creds))\n\t} else {\n\t\tclientConn, err = grpc.Dial(fmt.Sprintf(\"localhost:%d\", peer.apiPort), grpc.WithInsecure())\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Connection{\n\t\tpeer: peer,\n\t\tclientConn: clientConn,\n\t\tmspID: mspID,\n\t\tidentity: identity,\n\t}, nil\n}", "func connect() error {\n\tconnection := \"\"\n\tif viper.GetString(\"connection\") != \"\" {\n\t\tconnection = viper.GetString(\"connection\")\n\t}\n\n\tif connection == \"\" {\n\t\treturn errors.New(\"no connection\")\n\t}\n\toutputIf(debug, fmt.Sprintf(\"Connecting to %s\", connection))\n\n\topts := []grpc.DialOption{grpc.WithInsecure()}\n\n\tctx, cancel := context.WithTimeout(context.Background(), viper.GetDuration(\"timeout\"))\n\tdefer cancel()\n\tvar err error\n\teth2GRPCConn, err = grpc.DialContext(ctx, connection, opts...)\n\treturn err\n}", "func Connect(ctx context.Context, conn *grpc.ClientConn) (*stash.Client, error) {\n\tremote, err := connect(ctx, conn)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &stash.Client{Service: &remote}, nil\n}", "func connect(tg *tvb.Target) connection {\n\tlog.Debug(\"In gnmi_oper connect\")\n\tif tg.Address == \"\" {\n\t\treturn connection{connError: errors.New(\"an address must be specified\")}\n\t}\n\tctx := context.Background()\n\tctx, cancel := context.WithTimeout(ctx, CtxTimeout)\n\tdefer cancel()\n\tconn, err := grpc.DialContext(ctx, tg.Address, grpc.WithInsecure())\n\tif err != nil {\n\t\treturn connection{connError: fmt.Errorf(\"cannot dial target %s, %v\", tg.Address, err)}\n\t}\n\n\treturn connection{ctx: ctx, client: gnmi.NewGNMIClient(conn), cancel: func() { conn.Close() }}\n}", "func (c *Client) Connect(ctx context.Context, proxyBrokerURL string) (*api.CommandConnected, error) {\n\treturn c.Connector.Connect(ctx, \"\", proxyBrokerURL)\n}", "func (n *Node) Connect() (*grpc.ClientConn, error) {\n\ttlsConfig, err := n.Credentials()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn grpc.Dial(n.Address(), grpc.WithTransportCredentials(credentials.NewTLS(tlsConfig)))\n}", "func (cs *ClientServerImpl) websocketConn(parsedURL *url.URL, request *http.Request) (net.Conn, error) {\n\tproxyURL, err := http.ProxyFromEnvironment(request)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// url.Host might not have the port, but tls.Dial needs it\n\ttargetHost := parsedURL.Host\n\tif !strings.Contains(targetHost, \":\") {\n\t\ttargetHost += \":443\"\n\t}\n\ttargetHostname, _, err := net.SplitHostPort(targetHost)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttlsConfig := tls.Config{ServerName: targetHostname, InsecureSkipVerify: cs.AcceptInvalidCert}\n\ttimeoutDialer := &net.Dialer{Timeout: wsConnectTimeout}\n\n\tif proxyURL == nil {\n\t\t// directly connect\n\t\tlog.Info(\"Creating poll dialer\", \"host\", parsedURL.Host)\n\t\treturn tls.DialWithDialer(timeoutDialer, \"tcp\", targetHost, &tlsConfig)\n\t}\n\n\t// connect via proxy\n\tlog.Info(\"Creating poll dialer\", \"proxy\", proxyURL.Host, \"host\", parsedURL.Host)\n\tplainConn, err := timeoutDialer.Dial(\"tcp\", proxyURL.Host)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// TLS over an HTTP proxy via CONNECT taken from: https://golang.org/src/net/http/transport.go\n\tconnectReq := &http.Request{\n\t\tMethod: \"CONNECT\",\n\t\tURL: &url.URL{Opaque: targetHost},\n\t\tHost: targetHost,\n\t\tHeader: make(http.Header),\n\t}\n\n\tif proxyUser := proxyURL.User; proxyUser != nil {\n\t\tusername := proxyUser.Username()\n\t\tpassword, _ := proxyUser.Password()\n\t\tauth := base64.StdEncoding.EncodeToString([]byte(username + \":\" + password))\n\t\tconnectReq.Header.Set(\"Proxy-Authorization\", \"Basic \"+auth)\n\t}\n\n\tconnectReq.Write(plainConn)\n\n\t// Read response.\n\t// Okay to use and discard buffered reader here, because\n\t// TLS server will not speak until spoken to.\n\tbr := bufio.NewReader(plainConn)\n\tresp, err := http.ReadResponse(br, connectReq)\n\tif err != nil {\n\t\tplainConn.Close()\n\t\treturn nil, err\n\t}\n\tif resp.StatusCode != 200 {\n\t\tplainConn.Close()\n\t\treturn nil, errors.New(resp.Status)\n\t}\n\n\ttlsConn := tls.Client(plainConn, &tlsConfig)\n\n\treturn tlsConn, nil\n}", "func ConnectClient(peer *client.Peer, mspID string, identity *identity.Identity) (*Connection, error) {\n\tparsedURL, err := url.Parse(peer.APIURL)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tclientConn, err := grpc.Dial(parsedURL.Host, grpc.WithInsecure(), grpc.WithAuthority(peer.APIOptions.DefaultAuthority))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Connection{\n\t\tpeer: nil,\n\t\tclientConn: clientConn,\n\t\tmspID: mspID,\n\t\tidentity: identity,\n\t}, nil\n}", "func (p *peer) connect(connector connector, ch chan<- connection.Conn) {\n\tlog.Printf(\"Connecting to %q.\", p.name())\n\tp.pending = true\n\tgo func() {\n\t\tch <- connector(p.name(), connection.Config{\n\t\t\tVersion: 70001,\n\t\t\tServices: 0,\n\t\t\tUserAgent: \"\",\n\t\t\tMinRemoteVersion: kMinPeerVersion,\n\t\t\tRelay: false,\n\t\t})\n\t}()\n}", "func connectToWallet(walletHost string, walletCert string) (WalletClientConn, error) {\n\trand.Seed(time.Now().Unix())\n\tcreds, err := credentials.NewClientTLSFromFile(walletCert, \"localhost\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\toptCreds := grpc.WithTransportCredentials(creds)\n\n\tconnCtx, cancel := context.WithTimeout(context.Background(), time.Second*3)\n\tdefer cancel()\n\n\t// wallet doesn't allow config of keepalive for the moment, so disable it\n\t// and perform a manual ping.\n\t// optKeepAlive := grpc.WithKeepaliveParams(keepalive.ClientParameters{\n\t// \tTime: 30 * time.Second,\n\t// \tTimeout: 5 * time.Second,\n\t// \tPermitWithoutStream: true,\n\t// })\n\n\tconn, err := grpc.DialContext(connCtx, walletHost, optCreds)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\twsvc := pb.NewWalletServiceClient(conn)\n\n\twc := &onlineWalletClient{\n\t\tconn: conn,\n\t\twsvc: wsvc,\n\t}\n\n\treturn wc, nil\n}", "func (p *proxyConnection) proxy() {\r\n\tdefer p.lconn.Close()\r\n\tvar err error\r\n\r\n\tp.rconn, err = net.Dial(\"tcp\", p.raddr)\r\n\tif err != nil {\r\n\t\tp.errorFunc(\"Cannot connect to remote connection: %s\", err)\r\n\t\treturn\r\n\t}\r\n\tdefer p.rconn.Close()\r\n\r\n\tgo p.exchangeData(p.rconn, p.lconn)\r\n\tgo p.exchangeData(p.lconn, p.rconn)\r\n\r\n\t//wait for close signal\r\n\t<-p.closeSignal\r\n\tfmt.Printf(\"Done proxying: %s %s\\n\", p.lconn.LocalAddr(), p.rconn.LocalAddr())\r\n}", "func (s *ProxyServer) Connect(ctx context.Context, proxyCtx *common.ProxyContext, clientSrcAddr, clientDstAddr net.Addr) (net.Conn, error) {\n\tvar labels prometheus.Labels\n\tif len(proxyCtx.Servers) > 0 {\n\t\tlabels = getLabelsFromDB(proxyCtx.Servers[0].GetDatabase())\n\t} else {\n\t\tlabels = getLabelsFromDB(nil)\n\t}\n\n\tlabels[\"available_db_servers\"] = strconv.Itoa(len(proxyCtx.Servers))\n\n\tdefer observeLatency(connectionSetupTime.With(labels))()\n\n\tvar attemptedServers int\n\tdefer func() {\n\t\tdialAttemptedServers.With(labels).Observe(float64(attemptedServers))\n\t}()\n\n\t// There may be multiple database servers proxying the same database. If\n\t// we get a connection problem error trying to dial one of them, likely\n\t// the database server is down so try the next one.\n\tfor _, server := range getShuffleFunc()(proxyCtx.Servers) {\n\t\tattemptedServers++\n\t\ts.log.Debugf(\"Dialing to %v.\", server)\n\t\ttlsConfig, err := s.getConfigForServer(ctx, proxyCtx.Identity, server)\n\t\tif err != nil {\n\t\t\treturn nil, trace.Wrap(err)\n\t\t}\n\n\t\tdialAttempts.With(labels).Inc()\n\t\tserviceConn, err := proxyCtx.Cluster.Dial(reversetunnelclient.DialParams{\n\t\t\tFrom: clientSrcAddr,\n\t\t\tTo: &utils.NetAddr{AddrNetwork: \"tcp\", Addr: reversetunnelclient.LocalNode},\n\t\t\tOriginalClientDstAddr: clientDstAddr,\n\t\t\tServerID: fmt.Sprintf(\"%v.%v\", server.GetHostID(), proxyCtx.Cluster.GetName()),\n\t\t\tConnType: types.DatabaseTunnel,\n\t\t\tProxyIDs: server.GetProxyIDs(),\n\t\t})\n\t\tif err != nil {\n\t\t\tdialFailures.With(labels).Inc()\n\t\t\t// If an agent is down, we'll retry on the next one (if available).\n\t\t\tif isReverseTunnelDownError(err) {\n\t\t\t\ts.log.WithError(err).Warnf(\"Failed to dial database %v.\", server)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\treturn nil, trace.Wrap(err)\n\t\t}\n\t\t// Upgrade the connection so the client identity can be passed to the\n\t\t// remote server during TLS handshake. On the remote side, the connection\n\t\t// received from the reverse tunnel will be handled by tls.Server.\n\t\tserviceConn = tls.Client(serviceConn, tlsConfig)\n\t\treturn serviceConn, nil\n\t}\n\treturn nil, trace.BadParameter(\"failed to connect to any of the database servers\")\n}", "func run(ctx context.Context, conf config) error {\n\tvar opts []grpc.DialOption\n\tvar err error\n\tif len(conf.certFile) == 0 || len(conf.keyFile) == 0 {\n\t\topts, err = tunnel.DialTLSCredsOpts(conf.caFile)\n\t} else {\n\t\topts, err = tunnel.DialmTLSCredsOpts(conf.certFile, conf.keyFile, conf.caFile)\n\t}\n\n\tif err != nil {\n\t\treturn err\n\t}\n\tclientConn, err := grpc.Dial(conf.tunnelAddress, opts...)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"grpc dial error: %v\", err)\n\t}\n\tdefer clientConn.Close()\n\n\tpeers := make(map[tunnel.Target]struct{})\n\tvar peerMux sync.Mutex\n\n\tpeerAddHandler := func(t tunnel.Target) error {\n\t\tpeerMux.Lock()\n\t\tdefer peerMux.Unlock()\n\t\tpeers[t] = struct{}{}\n\t\tlog.Printf(\"peer target %s added\\n\", t)\n\t\treturn nil\n\t}\n\n\tpeerDelHandler := func(t tunnel.Target) error {\n\t\tpeerMux.Lock()\n\t\tdefer peerMux.Unlock()\n\t\tif _, ok := peers[t]; ok {\n\t\t\tdelete(peers, t)\n\t\t\tlog.Printf(\"peer target %s deleted\\n\", t)\n\t\t}\n\t\treturn nil\n\t}\n\n\ttargets := make(map[tunnel.Target]struct{})\n\tclient, err := tunnel.NewClient(tpb.NewTunnelClient(clientConn), tunnel.ClientConfig{\n\t\tPeerAddHandler: peerAddHandler,\n\t\tPeerDelHandler: peerDelHandler,\n\t\tSubscriptions: []string{conf.dialTargetType},\n\t}, targets)\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to create tunnel client: %v\", err)\n\t}\n\n\tctx, cancel := context.WithCancel(ctx)\n\tdefer cancel()\n\n\terrCh := make(chan error, 2)\n\tgo func() {\n\t\tif err := client.Register(ctx); err != nil {\n\t\t\terrCh <- err\n\t\t\treturn\n\t\t}\n\t\tclient.Start(ctx)\n\t\tif err := client.Error(); err != nil {\n\t\t\terrCh <- err\n\t\t}\n\t}()\n\n\tdialTarget := tunnel.Target{ID: conf.dialTarget, Type: conf.dialTargetType}\n\tfoundDialTarget := func() bool {\n\t\tpeerMux.Lock()\n\t\tdefer peerMux.Unlock()\n\t\t_, ok := peers[dialTarget]\n\t\treturn ok\n\t}\n\n\t// Dial the target with retry.\n\tgo func() {\n\t\tbo := getBackOff()\n\t\tfor !foundDialTarget() {\n\t\t\twait := bo.NextBackOff()\n\t\t\tlog.Printf(\"dial target %s (type: %s) not found. reconnecting in %s (all targets found: %s) \\n\", conf.dialTarget, conf.dialTargetType, wait, peers)\n\t\t\ttime.Sleep(wait)\n\t\t}\n\n\t\tsession, err := client.NewSession(dialTarget)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"error from new session: %v\", err)\n\t\t\terrCh <- err\n\t\t\treturn\n\t\t}\n\t\tlog.Printf(\"new session established for target: %s\\n\", dialTarget)\n\n\t\t// Once a tunnel session is established, it connects it to a stdio.\n\t\tstdio := &stdIOConn{Reader: os.Stdin, WriteCloser: os.Stdout}\n\t\tif err = bidi.Copy(session, stdio); err != nil {\n\t\t\tlog.Printf(\"error from bidi copy: %v\\n\", err)\n\t\t\treturn\n\t\t}\n\n\t}()\n\n\t// Listen for any request to create a new session.\n\tselect {\n\tcase <-ctx.Done():\n\t\treturn ctx.Err()\n\tcase err := <-errCh:\n\t\treturn fmt.Errorf(\"exiting: %s\", err)\n\t}\n}", "func (n *managedNode) Connect() error {\n\tn.Lock()\n\tdefer n.Unlock()\n\tvar opts []grpc.DialOption\n\tvar creds credentials.TransportAuthenticator\n\tvar err error\n\tcreds = credentials.NewTLS(&tls.Config{\n\t\tInsecureSkipVerify: true,\n\t})\n\topts = append(opts, grpc.WithTransportCredentials(creds))\n\tn.conn, err = grpc.Dial(n.address, opts...)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to dial ring server for config: %v\", err)\n\t}\n\tn.client = cc.NewCmdCtrlClient(n.conn)\n\treturn nil\n}", "func Connect(addr string, eventHandler EventHandler) {\n\tif strings.HasPrefix(addr, \"http://\") || strings.HasPrefix(addr, \"https://\") {\n\t\taddr = strings.Replace(addr, \"http\", \"ws\", 1)\n\t}\n\twsConn, httpRes, err := dialer.Dial(addr, nil)\n\tif err != nil {\n\t\t_checkAndGenerateEvent(eventHandler, Error, nil, nil, err)\n\t\treturn\n\t}\n\tif wsConn.Subprotocol() != \"birect\" {\n\t\t_checkAndGenerateEvent(eventHandler, Error, nil, nil, errs.New(nil, \"Unable to negotiate birect subprotocol\"))\n\t\treturn\n\t}\n\tnewConn(httpRes.Request, wsConn, eventHandler) // sets up read/write loop\n}", "func (*Service) Connect(ctx context.Context, req *ConnectionRequest) (*ConnectionResponse, error) {\n\tdata := req.GetData()\n\tnetworkConfig := data.GetNetworkConfig()\n\tpatternMatchers := data.GetPattenMatchers()\n\tif networkConfig == \"\" {\n\t\tnetworkConfig = defaultConfig.NetworkConfig\n\t\tif patternMatchers == \"\" {\n\t\t\tpatternMatchers = defaultConfig.PattenMatchers\n\t\t}\n\t}\n\tchannelID := data.GetChannelId()\n\tif channelID == \"\" {\n\t\tchannelID = defaultConfig.ChannelId\n\t}\n\tuserName := data.GetUserName()\n\tif userName == \"\" {\n\t\tuserName = defaultConfig.UserName\n\t}\n\torgName := data.GetOrgName()\n\tif orgName == \"\" {\n\t\torgName = defaultConfig.OrgName\n\t}\n\n\tclient, err := NewNetworkClient(networkConfig, patternMatchers, channelID, userName, orgName)\n\tif err != nil {\n\t\tglog.Errorf(\"Failed Fabric connection for channel %s: %+v\", channelID, err)\n\t\treturn nil, err\n\t}\n\tglog.V(2).Infof(\"Return fabric connection id %d\", client.cid)\n\treturn &ConnectionResponse{\n\t\tCode: 200,\n\t\tConnectionId: client.cid,\n\t}, nil\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewEgressSelector configures lookup mechanism for Lookup. It does so based on a EgressSelectorConfiguration which was read at startup.
func NewEgressSelector(config *apiserver.EgressSelectorConfiguration) (*EgressSelector, error) { if config == nil || config.EgressSelections == nil { // No Connection Services configured, leaving the serviceMap empty, will return default dialer. return nil, nil } cs := &EgressSelector{ egressToDialer: make(map[EgressType]utilnet.DialFunc), } for _, service := range config.EgressSelections { name, err := lookupServiceName(service.Name) if err != nil { return nil, err } dialerCreator, err := connectionToDialerCreator(service.Connection) if err != nil { return nil, fmt.Errorf("failed to create dialer for egressSelection %q: %v", name, err) } cs.egressToDialer[name] = dialerCreator.createDialer() } return cs, nil }
[ "func NewEgressSelectorWithMap(m map[EgressType]utilnet.DialFunc) *EgressSelector {\n\tif m == nil {\n\t\tm = make(map[EgressType]utilnet.DialFunc)\n\t}\n\treturn &EgressSelector{\n\t\tegressToDialer: m,\n\t}\n}", "func (cs *EgressSelector) Lookup(networkContext NetworkContext) (utilnet.DialFunc, error) {\n\tif cs.egressToDialer == nil {\n\t\t// The round trip wrapper will over-ride the dialContext method appropriately\n\t\treturn nil, nil\n\t}\n\n\treturn cs.egressToDialer[networkContext.EgressSelectionName], nil\n}", "func New(sess *session.Session) *Selector {\n\tserviceRegistry := NewRegistry()\n\tserviceRegistry.RegisterAWSServices()\n\tec2Client := ec2.New(userAgentWith(sess))\n\treturn &Selector{\n\t\tEC2: ec2Client,\n\t\tEC2Pricing: ec2pricing.New(sess),\n\t\tInstanceTypesProvider: instancetypes.LoadFromOrNew(\"\", *sess.Config.Region, 0, ec2Client),\n\t\tServiceRegistry: serviceRegistry,\n\t}\n}", "func ReadEgressSelectorConfiguration(configFilePath string) (*apiserver.EgressSelectorConfiguration, error) {\n\tif configFilePath == \"\" {\n\t\treturn nil, nil\n\t}\n\t// a file was provided, so we just read it.\n\tdata, err := ioutil.ReadFile(configFilePath)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to read egress selector configuration from %q [%v]\", configFilePath, err)\n\t}\n\tvar decodedConfig v1alpha1.EgressSelectorConfiguration\n\terr = yaml.Unmarshal(data, &decodedConfig)\n\tif err != nil {\n\t\t// we got an error where the decode wasn't related to a missing type\n\t\treturn nil, err\n\t}\n\tif decodedConfig.Kind != \"EgressSelectorConfiguration\" {\n\t\treturn nil, fmt.Errorf(\"invalid service configuration object %q\", decodedConfig.Kind)\n\t}\n\tinternalConfig := &apiserver.EgressSelectorConfiguration{}\n\tif err := cfgScheme.Convert(&decodedConfig, internalConfig, nil); err != nil {\n\t\t// we got an error where the decode wasn't related to a missing type\n\t\treturn nil, err\n\t}\n\treturn internalConfig, nil\n}", "func newSelector() Selector {\n\treturn internalSelector(nil)\n}", "func newEgressGroups(c *ControlplaneV1beta2Client) *egressGroups {\n\treturn &egressGroups{\n\t\tclient: c.RESTClient(),\n\t}\n}", "func NewSelector(client RESTClient, mapping *meta.RESTMapping, namespace string, selector labels.Selector, export bool) *Selector {\n\treturn &Selector{\n\t\tClient: client,\n\t\tMapping: mapping,\n\t\tNamespace: namespace,\n\t\tSelector: selector,\n\t\tExport: export,\n\t}\n}", "func newEsPool(esInfo map[string]*conf.Es) (esCluster map[string]*elastic.Client) {\n\tesCluster = make(map[string]*elastic.Client)\n\tfor esName, e := range esInfo {\n\t\tclient, err := elastic.NewClient(elastic.SetURL(e.Addr...), elastic.SetSniff(false))\n\t\tif err != nil {\n\t\t\tpanic(fmt.Sprintf(\"es:集群连接失败, cluster: %s, %v\", esName, err))\n\t\t}\n\t\tesCluster[esName] = client\n\t}\n\treturn\n}", "func newEventSelector(publisher eventbus.Publisher, handler ScoreEventHandler,\n\ttimeOut time.Duration, state consensus.State) *eventSelector {\n\treturn &eventSelector{\n\t\tpublisher: publisher,\n\t\thandler: handler,\n\t\ttimer: consensus.NewTimer(timeOut, make(chan struct{})),\n\t\tstate: state,\n\t}\n}", "func NewSelector() *Selector {\n\treturn &Selector{\n\t\tdrivers: make([]common.Driver, 0),\n\t}\n}", "func newEgressFirewallRule(rawEgressFirewallRule egressfirewallapi.EgressFirewallRule, id int) (*egressFirewallRule, error) {\n\tefr := &egressFirewallRule{\n\t\tid: id,\n\t\taccess: rawEgressFirewallRule.Type,\n\t}\n\n\tif rawEgressFirewallRule.To.DNSName != \"\" {\n\t\tefr.to.dnsName = rawEgressFirewallRule.To.DNSName\n\t} else {\n\n\t\t_, _, err := net.ParseCIDR(rawEgressFirewallRule.To.CIDRSelector)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tefr.to.cidrSelector = rawEgressFirewallRule.To.CIDRSelector\n\t}\n\tefr.ports = rawEgressFirewallRule.Ports\n\n\treturn efr, nil\n}", "func (f *SelectorMapFactory) getECSelectors(selector *grpc_inventory_go.AssetSelector) (SelectorMap, derrors.Error) {\n\tlog.Debug().Interface(\"selector\", selector).Msg(\"getECSelectors\")\n\n\t// Check if this is an appropriate selectormap creator for the selector\n\tif len(selector.GetLabels()) != 0 || len(selector.GetGroupIds()) != 0 {\n\t\treturn nil, nil\n\t}\n\n\tselectors := make(SelectorMap)\n\n\torgId := selector.GetOrganizationId()\n\tecId := selector.GetEdgeControllerId()\n\n\tif ecId != \"\" {\n\t\t// No further selectors and ecId means we just need the\n\t\t// already existing selector\n\t\tselectors[ecId] = selector\n\t} else {\n\t\t// Selector for each Edge Controller in Organization\n\t\tctx, cancel := InventoryContext()\n\t\tdefer cancel()\n\n\t\tecList, err := f.controllersClient.List(ctx, &grpc_organization_go.OrganizationId{\n\t\t\tOrganizationId: orgId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn nil, derrors.NewUnavailableError(\"unable to retrieve edge controllers\", err).WithParams(orgId)\n\t\t}\n\n\t\tfor _, ec := range ecList.GetControllers() {\n\t\t\tid := ec.GetEdgeControllerId()\n\t\t\tselectors[id] = &grpc_inventory_go.AssetSelector{\n\t\t\t\tOrganizationId: orgId,\n\t\t\t\tEdgeControllerId: id,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn selectors, nil\n}", "func (rc *ReplicationController) AddSelectors(new map[string]string) {\n\tmergo.Merge(&rc.Spec.Selector, new, mergo.WithOverride)\n}", "func (f *DeviceGroup) ProviderNodeSelector() map[string]string {\n\tif f.HostUSB != nil {\n\t\tif f.HostUSB.NodeName != \"\" {\n\t\t\treturn map[string]string{\n\t\t\t\t\"kubernetes.io/hostname\": f.HostUSB.NodeName,\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "func LoadSelector(cfg *config.PolicySelector) (Selector, error) {\n\tselCount := 0\n\n\tif cfg.Migration != nil {\n\t\tselCount++\n\t}\n\tif cfg.Static != nil {\n\t\tselCount++\n\t}\n\tif cfg.Claims != nil {\n\t\tselCount++\n\t}\n\tif cfg.Regex != nil {\n\t\tselCount++\n\t}\n\tif selCount > 1 {\n\t\treturn nil, ErrMultipleSelectors\n\t}\n\n\tif cfg.Migration == nil && cfg.Static == nil && cfg.Claims == nil && cfg.Regex == nil {\n\t\treturn nil, ErrSelectorConfigIncomplete\n\t}\n\n\tif cfg.Static != nil {\n\t\treturn NewStaticSelector(cfg.Static), nil\n\t}\n\n\tif cfg.Migration != nil {\n\t\treturn NewMigrationSelector(\n\t\t\tcfg.Migration,\n\t\t\taccounts.NewAccountsService(\"com.owncloud.accounts\", grpc.NewClient())), nil\n\t}\n\n\tif cfg.Claims != nil {\n\t\tif cfg.Claims.SelectorCookieName == \"\" {\n\t\t\tcfg.Claims.SelectorCookieName = SelectorCookieName\n\t\t}\n\t\treturn NewClaimsSelector(cfg.Claims), nil\n\t}\n\n\tif cfg.Regex != nil {\n\t\tif cfg.Regex.SelectorCookieName == \"\" {\n\t\t\tcfg.Regex.SelectorCookieName = SelectorCookieName\n\t\t}\n\t\treturn NewRegexSelector(cfg.Regex), nil\n\t}\n\n\treturn nil, ErrUnexpectedConfigError\n}", "func New(alg Algorithm, elitism uint) (Selector, error) {\n\tsyncMutex.RLock()\n\tdefer syncMutex.RUnlock()\n\n\tnewFn, ok := algorithms[alg]\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"Algorithm not linked: %s\", alg)\n\t}\n\n\treturn newFn(elitism)\n}", "func (sc *SelectorCache) AddFQDNSelector(user CachedSelectionUser, fqdnSelec api.FQDNSelector) (cachedSelector CachedSelector, added bool) {\n\tkey := fqdnSelec.String()\n\n\t// Lock NameManager before the SelectorCache\n\tsc.localIdentityNotifier.Lock()\n\tdefer sc.localIdentityNotifier.Unlock()\n\n\t// If the selector already exists, use it.\n\tsc.mutex.Lock()\n\tfqdnSel, exists := sc.selectors[key]\n\tif exists {\n\t\tadded := fqdnSel.addUser(user)\n\t\tsc.mutex.Unlock()\n\t\treturn fqdnSel, added\n\t}\n\tsc.mutex.Unlock()\n\n\t// Create the new selector. Pulling the identities it selects could\n\t// cause allocation of new CIDR identities, so we do this while not\n\t// holding the 'sc.mutex'.\n\tnewFQDNSel := &fqdnSelector{\n\t\tselectorManager: selectorManager{\n\t\t\tkey: key,\n\t\t\tusers: make(map[CachedSelectionUser]struct{}),\n\t\t\tcachedSelections: make(map[identity.NumericIdentity]struct{}),\n\t\t},\n\t\tselector: fqdnSelec,\n\t}\n\n\t// Make the FQDN subsystem aware of this selector and fetch identities\n\t// that the FQDN subsystem is aware of.\n\t//\n\t// If the same 'fqdnSelec' is registered twice here from different\n\t// goroutines, we do *NOT* need to unregister the second one because\n\t// 'fqdnSelec' is just a struct passed by value. The call below doesn't\n\t// retain any references/pointers.\n\t//\n\t// If this is called twice, one of the results will arbitrarily contain\n\t// a real slice of ids, while the other will receive nil. We must fold\n\t// them together below.\n\tsc.localIdentityNotifier.RegisterForIdentityUpdatesLocked(newFQDNSel.selector)\n\tselectors := map[api.FQDNSelector]struct{}{newFQDNSel.selector: {}}\n\t_, selectorIPMapping := sc.localIdentityNotifier.MapSelectorsToIPsLocked(selectors)\n\n\t// Allocate identities corresponding to the slice of IPs identified as\n\t// being selected by this FQDN selector above. This could plausibly\n\t// happen twice, once with an empty 'ids' slice and once with the real\n\t// 'ids' slice. Either way, they are added to the selector that is\n\t// stored in 'sc.selectors[]'.\n\tcurrentlyAllocatedIdentities := sc.allocateIdentityMappings(fqdnSelec, selectorIPMapping)\n\n\t// Note: No notifications are sent for the existing\n\t// identities. Caller must use GetSelections() to get the\n\t// current selections after adding a selector. This way the\n\t// behavior is the same between the two cases here (selector\n\t// is already cached, or is a new one).\n\n\tsc.mutex.Lock()\n\t// Check whether the selectorCache was updated while 'newFQDNSel' was\n\t// being registered without the 'sc.mutex'. If so, use it. Otherwise\n\t// we can use the one we just created/configured above.\n\tif sel, exists := sc.selectors[key]; exists {\n\t\tnewFQDNSel = sel.(*fqdnSelector)\n\t} else {\n\t\tsc.selectors[key] = newFQDNSel\n\t}\n\tidentitiesToRelease := newFQDNSel.transferIdentityReferencesToSelector(currentlyAllocatedIdentities)\n\tnewFQDNSel.updateSelections()\n\tadded = newFQDNSel.addUser(user)\n\tsc.mutex.Unlock()\n\n\tsc.releaseIdentityMappings(identitiesToRelease)\n\n\treturn newFQDNSel, added\n}", "func ValidateEgressSelectorConfiguration(config *apiserver.EgressSelectorConfiguration) field.ErrorList {\n\tallErrs := field.ErrorList{}\n\tif config == nil {\n\t\treturn allErrs // Treating a nil configuration as valid\n\t}\n\tfor _, service := range config.EgressSelections {\n\t\tbase := field.NewPath(\"service\", \"connection\")\n\t\tswitch service.Connection.Type {\n\t\tcase \"direct\":\n\t\t\tallErrs = append(allErrs, validateDirectConnection(service.Connection, base)...)\n\t\tcase \"http-connect\":\n\t\t\tallErrs = append(allErrs, validateHTTPConnection(service.Connection, base)...)\n\t\tdefault:\n\t\t\tallErrs = append(allErrs, field.NotSupported(\n\t\t\t\tbase.Child(\"type\"),\n\t\t\t\tservice.Connection.Type,\n\t\t\t\t[]string{\"direct\", \"http-connect\"}))\n\t\t}\n\t}\n\n\treturn allErrs\n}", "func (p *GranularMarkingType) AddSelector(s string) error {\n\tp.Selectors = append(p.Selectors, s)\n\treturn nil\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewEgressSelectorWithMap returns a EgressSelector with the supplied EgressType to DialFunc map.
func NewEgressSelectorWithMap(m map[EgressType]utilnet.DialFunc) *EgressSelector { if m == nil { m = make(map[EgressType]utilnet.DialFunc) } return &EgressSelector{ egressToDialer: m, } }
[ "func NewEgressSelector(config *apiserver.EgressSelectorConfiguration) (*EgressSelector, error) {\n\tif config == nil || config.EgressSelections == nil {\n\t\t// No Connection Services configured, leaving the serviceMap empty, will return default dialer.\n\t\treturn nil, nil\n\t}\n\tcs := &EgressSelector{\n\t\tegressToDialer: make(map[EgressType]utilnet.DialFunc),\n\t}\n\tfor _, service := range config.EgressSelections {\n\t\tname, err := lookupServiceName(service.Name)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdialerCreator, err := connectionToDialerCreator(service.Connection)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"failed to create dialer for egressSelection %q: %v\", name, err)\n\t\t}\n\t\tcs.egressToDialer[name] = dialerCreator.createDialer()\n\t}\n\treturn cs, nil\n}", "func (f *SelectorMapFactory) SelectorMap(selector *grpc_inventory_go.AssetSelector) (SelectorMap, derrors.Error) {\n\tvar selectors SelectorMap\n\tvar derr derrors.Error\n\n\tfor _, fn := range f.funcList {\n\t\tselectors, derr = fn(selector)\n\t\tif derr != nil {\n\t\t\treturn nil, derr\n\t\t}\n\n\t\t// Got selectors, we're done\n\t\tif selectors != nil {\n\t\t\tbreak\n\t\t}\n\t}\n\n\tderr = f.filterECs(selector.GetOrganizationId(), selectors)\n\tif derr != nil {\n\t\treturn nil, derr\n\t}\n\n\treturn selectors, nil\n}", "func NewSelector(client RESTClient, mapping *meta.RESTMapping, namespace string, selector labels.Selector, export bool) *Selector {\n\treturn &Selector{\n\t\tClient: client,\n\t\tMapping: mapping,\n\t\tNamespace: namespace,\n\t\tSelector: selector,\n\t\tExport: export,\n\t}\n}", "func NewFromMap(node api.Node, t map[string]interface{}) api.Transport {\n\n\tlistenStr := \"\"\n\tupstreamStr := \"\"\n\tclientConv := uint32(0x11223344)\n\tserverConv := uint32(0x11223344)\n\tif _, ok := t[\"ListenStr\"]; ok {\n\t\tlistenStr = t[\"ListenStr\"].(string)\n\t}\n\tif _, ok := t[\"UpstreamStr\"]; ok {\n\t\tupstreamStr = t[\"UpstreamStr\"].(string)\n\t}\n\tif _, ok := t[\"ClientConv\"]; ok {\n\t\tclientConv = t[\"ClientConv\"].(uint32)\n\t}\n\tif _, ok := t[\"ServerConv\"]; ok {\n\t\tserverConv = t[\"ServerConv\"].(uint32)\n\t}\n\n\tinstance := New(node, clientConv, serverConv)\n\tinstance.UpstreamStr = upstreamStr\n\tinstance.ListenStr = listenStr\n\n\treturn instance\n}", "func expandEndpointPolicyTrafficPortSelectorMap(c *Client, f map[string]EndpointPolicyTrafficPortSelector, res *EndpointPolicy) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandEndpointPolicyTrafficPortSelector(c, &item, res)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "func ProviderConfigFromMap(cfgMap map[string]string) *ProviderConfig {\n\treturn &ProviderConfig{cfgMap: cfgMap}\n}", "func NewEgressServer(superSpec *supervisor.Spec, super *supervisor.Supervisor,\n\tserviceName string, service *service.Service, inf informer.Informer) *EgressServer {\n\n\tentity, exists := super.GetSystemController(trafficcontroller.Kind)\n\tif !exists {\n\t\tpanic(fmt.Errorf(\"BUG: traffic controller not found\"))\n\t}\n\n\ttc, ok := entity.Instance().(*trafficcontroller.TrafficController)\n\tif !ok {\n\t\tpanic(fmt.Errorf(\"BUG: want *TrafficController, got %T\", entity.Instance()))\n\t}\n\n\treturn &EgressServer{\n\t\tsuper: super,\n\t\tsuperSpec: superSpec,\n\n\t\tinf: inf,\n\t\ttc: tc,\n\t\tnamespace: fmt.Sprintf(\"%s/%s\", superSpec.Name(), \"egress\"),\n\t\tpipelines: make(map[string]*supervisor.ObjectEntity),\n\t\tserviceName: serviceName,\n\t\tservice: service,\n\t}\n}", "func (*CodeEngineV2) NewGetProjectEgressIpsOptions(projectID string) *GetProjectEgressIpsOptions {\n\treturn &GetProjectEgressIpsOptions{\n\t\tProjectID: core.StringPtr(projectID),\n\t}\n}", "func New(alg Algorithm, elitism uint) (Selector, error) {\n\tsyncMutex.RLock()\n\tdefer syncMutex.RUnlock()\n\n\tnewFn, ok := algorithms[alg]\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"Algorithm not linked: %s\", alg)\n\t}\n\n\treturn newFn(elitism)\n}", "func newEgressGroups(c *ControlplaneV1beta2Client) *egressGroups {\n\treturn &egressGroups{\n\t\tclient: c.RESTClient(),\n\t}\n}", "func generateNodeSelector(name string, selector map[string]string) map[string]string {\n\t// Check if the selector is default.\n\tselectorValue, ok := selector[ipfailover.DefaultName]\n\tif ok && len(selector) == 1 && selectorValue == name {\n\t\treturn map[string]string{}\n\t}\n\n\treturn selector\n}", "func NewEgress(def EncoderFactory, others ...EncoderFactory) *Egress {\n\tlist := EncoderList{def}\n\tlist = append(list, others...)\n\treturn &Egress{list, nil}\n}", "func (spawner *Spawner) ApplyNodeSelectorForOperator(nodeSelector map[string]string) {\n\tif spawner.NodeSelector == nil {\n\t\tspawner.NodeSelector = make(map[string]string)\n\t}\n\tfor k, v := range nodeSelector {\n\t\tspawner.NodeSelector[k] = v\n\t}\n}", "func AddFuncMap(key string, fn interface{}) error {\n\ttemplateFuncMap[key] = fn\n\treturn nil\n}", "func NewResolverFromMap(m map[string]Node) Resolver {\n\treturn mapResolver(m)\n}", "func (cs *EgressSelector) Lookup(networkContext NetworkContext) (utilnet.DialFunc, error) {\n\tif cs.egressToDialer == nil {\n\t\t// The round trip wrapper will over-ride the dialContext method appropriately\n\t\treturn nil, nil\n\t}\n\n\treturn cs.egressToDialer[networkContext.EgressSelectionName], nil\n}", "func NewNetworkServiceEndpointRegistryClient(opts ...Option) registry.NetworkServiceEndpointRegistryClient {\n\tvar clientOptions = &options{\n\t\tresolver: net.DefaultResolver,\n\t\tregistryService: DefaultRegistryService,\n\t}\n\n\tfor _, opt := range opts {\n\t\topt(clientOptions)\n\t}\n\n\tr := &dnsNSEResolveClient{\n\t\tresolver: clientOptions.resolver,\n\t\tregistryService: clientOptions.registryService,\n\t}\n\n\treturn r\n}", "func newNodePool(endpoint string, copts conn.Options, maxConns int32) *NodePool {\n\tret := &NodePool{\n\t\tendpoint: endpoint,\n\t\tconnOpts: copts,\n\t\tcloseFlag: new(int32),\n\t\tavailableFlag: new(int32),\n\t\tmaxConns: maxConns,\n\t\tconsumersCount: new(int32),\n\t\tconsumedConnsCount: new(int32),\n\t\trequestChan: make(chan struct{}, 1),\n\t\tconsumerChan: make(chan *Conn),\n\t\treleasedChan: make(chan *Conn),\n\t\troutineWG: sync.WaitGroup{},\n\t}\n\tif ret.maxConns < 1 {\n\t\tret.maxConns = 1\n\t}\n\t*ret.availableFlag = 1\n\n\t// launch routine\n\tret.routineWG.Add(1)\n\tgo ret.routine()\n\n\treturn ret\n}", "func EgressGroupKeyFunc(obj interface{}) (string, error) {\n\tgroup, ok := obj.(*types.EgressGroup)\n\tif !ok {\n\t\treturn \"\", fmt.Errorf(\"object is not *types.EgressGroup: %v\", obj)\n\t}\n\treturn group.Name, nil\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
Lookup gets the dialer function for the network context. This is configured for the Kubernetes API Server at startup.
func (cs *EgressSelector) Lookup(networkContext NetworkContext) (utilnet.DialFunc, error) { if cs.egressToDialer == nil { // The round trip wrapper will over-ride the dialContext method appropriately return nil, nil } return cs.egressToDialer[networkContext.EgressSelectionName], nil }
[ "func (r *Resolver) lookupFunc(key string) func() (interface{}, error) {\n\tif len(key) == 0 {\n\t\tpanic(\"lookupFunc with empty key\")\n\t}\n\n\tvar resolver DNSResolver = net.DefaultResolver\n\tif r.Resolver != nil {\n\t\tresolver = r.Resolver\n\t}\n\n\tswitch key[0] {\n\tcase 'h':\n\t\treturn func() (interface{}, error) {\n\t\t\tctx, cancel := r.getCtx()\n\t\t\tdefer cancel()\n\t\t\treturn resolver.LookupHost(ctx, key[1:])\n\t\t}\n\tcase 'r':\n\t\treturn func() (interface{}, error) {\n\t\t\tctx, cancel := r.getCtx()\n\t\t\tdefer cancel()\n\t\t\treturn resolver.LookupAddr(ctx, key[1:])\n\t\t}\n\tdefault:\n\t\tpanic(\"lookupFunc invalid key type: \" + key)\n\t}\n}", "func (r *Resolver) LookupPort(ctx context.Context, network, service string) (port int, err error) {}", "func (r *Router) Lookup(method, path string, ctx *fasthttp.RequestCtx) (fasthttp.RequestHandler, bool) {\n\tif root := r.tress[method]; root != nil {\n\t\treturn root.getValue(path, ctx)\n\t}\n\treturn nil, false\n}", "func getLookupMethod(deviceScanCfg DeviceScan) int {\n\n\t// If the target device is on both the systemDeviceNames list and the hwlocDeviceNames list,\n\t// then we know we can do a valid direct lookup. If it only shows up on the systemDevicesNames list\n\t// it is likely a device we do not want used, such as \"lo\"\n\tif _, found := deviceScanCfg.systemDeviceNamesMap[deviceScanCfg.targetDevice]; found {\n\t\tif _, found := deviceScanCfg.hwlocDeviceNamesMap[deviceScanCfg.targetDevice]; found {\n\t\t\treturn direct\n\t\t}\n\t}\n\t// If not on the systemDeviceNames list, but it is on the hwlocDeviceNames list, it could be\n\t// virtual device name such as hfi1_0, which requires a sibling lookup to find the matching device (i.e. ib0)\n\tif _, found := deviceScanCfg.hwlocDeviceNamesMap[deviceScanCfg.targetDevice]; found {\n\t\treturn sibling\n\t}\n\n\t// If not on the hwlocDeviceNames list, then we might be looking at a decorated device name such\n\t// as hfi1_0-dgram. In that case, it will match to hfi1_0 where a sibling lookup will find the matching\n\t// device for ib0.\n\treturn bestfit\n}", "func (c *BaseCommand) DefaultWrappingLookupFunc(operation, path string) string {\n\tif c.flagWrapTTL != 0 {\n\t\treturn c.flagWrapTTL.String()\n\t}\n\n\treturn api.DefaultWrappingLookupFunc(operation, path)\n}", "func (c *TerraformCtlClient) dialable() string {\n\treturn fmt.Sprintf(\"%s:%d\", c.hostname, c.port)\n}", "func (r *router) Lookup(method, path string) (HandlerFunc, Params, bool) {\n\tif root := r.trees[method]; root != nil {\n\t\treturn root.getValue(path)\n\t}\n\treturn nil, nil, false\n}", "func (cli *dnsClient) Lookup(n Name) (Record, error) {\n\treturn cli.lookup(context.Background(), n)\n}", "func (c ContainerID) lookup(port int, timeout time.Duration) (ip string, err error) {\n\tip, err = c.IP()\n\tif err != nil {\n\t\terr = fmt.Errorf(\"error getting IP: %v\", err)\n\t\treturn\n\t}\n\taddr := fmt.Sprintf(\"%s:%d\", ip, port)\n\terr = netutil.AwaitReachable(addr, timeout)\n\treturn\n}", "func (config Config) getDialer(ctx context.Context) (_ rpc.Dialer, err error) {\n\ttlsOptions, err := getProcessTLSOptions(ctx)\n\tif err != nil {\n\t\treturn rpc.Dialer{}, packageError.Wrap(err)\n\t}\n\n\tdialer := rpc.NewDefaultDialer(tlsOptions)\n\tif config.pool != nil {\n\t\tdialer.Pool = config.pool\n\t} else {\n\t\tdialer.Pool = rpc.NewDefaultConnectionPool()\n\t}\n\n\tdialer.DialTimeout = config.DialTimeout\n\n\tif config.connector != nil {\n\t\tdialer.Connector = config.connector\n\t} else {\n\t\tdialContext := config.DialContext\n\t\tif dialContext == nil {\n\t\t\tdialContext = socket.BackgroundDialer().DialContext\n\t\t}\n\n\t\tdialer.Connector = rpc.NewDefaultTCPConnector(&rpc.ConnectorAdapter{DialContext: dialContext})\n\t}\n\n\treturn dialer, nil\n}", "func (ga *gossipAdapterMock) Lookup(PKIID common.PKIidType) *discovery.NetworkMember {\n\t// Ensure we have configured Lookup prior\n\tif !ga.wasMocked(\"Lookup\") {\n\t\treturn &discovery.NetworkMember{}\n\t}\n\targs := ga.Called(PKIID)\n\tif args.Get(0) == nil {\n\t\treturn nil\n\t}\n\treturn args.Get(0).(*discovery.NetworkMember)\n}", "func (sv Server) Lookup(name string) interface{} {\n\tparam := make([]interface{}, 1)\n\tparam[0] = name\n\trq := utils.Request{Op: \"Lookup\", Params: param}\n\tinv := utils.Invocation{Host: sv.IP, Port: sv.Port, Request: rq}\n\treqtor := requestor.Requestor{}\n\t// getting the reply\n\treply := reqtor.Invoke(inv).([]interface{})\n\tif reply[1] != nil {\n\t\terr := reply[1].(error)\n\t\tutils.PrintError(err, \"unable to lookup on naming proxy\")\n\t}\n\trpMap := reply[0].(map[string]interface{})\n\tcp := clientproxy.InitClientProxy(rpMap[\"Host\"].(string), int(rpMap[\"Port\"].(float64)), int(rpMap[\"ID\"].(float64)), rpMap[\"TypeName\"].(string))\n\t// getting the result\n\tvar result interface{}\n\tswitch cp.TypeName {\n\tcase \"Calculator\":\n\t\tresult = CalculatorProxy{Host: cp.Host, Port: cp.Port, ID: cp.ID}\n\tdefault:\n\t\tutils.PrintError(errors.New(\"unrecognized clientproxy type\"), \"type of the clientproxy: \"+cp.TypeName)\n\t}\n\treturn result\n}", "func DialFromEnviron(dnsAddr string) func(ctx context.Context, network, addr string) (net.Conn, error) {\n\treturn func(ctx context.Context, network, addr string) (conn net.Conn, err error) {\n\t\tlogger := log.WithFields(log.Fields{\n\t\t\t\"addr\": addr,\n\t\t\t\"network\": network,\n\t\t})\n\t\tlogger.Debug(\"Dial.\")\n\n\t\tif isInsidePod() {\n\t\t\treturn Dial(ctx, network, addr)\n\t\t}\n\n\t\tconn, err = DialWithLocalResolver(ctx, dnsAddr, network, addr)\n\t\tif err == nil {\n\t\t\treturn conn, nil\n\t\t}\n\n\t\tif !strings.HasSuffix(addr, defaults.ServiceAddrSuffix) {\n\t\t\treturn nil, trace.Wrap(err)\n\t\t}\n\n\t\tvar port string\n\t\tif strings.Contains(addr, \":\") {\n\t\t\taddr, port, err = net.SplitHostPort(addr)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, trace.Wrap(err, \"invalid host:port address: %q\", addr)\n\t\t\t}\n\t\t}\n\n\t\t// Dial with a kubernetes service resolver\n\t\tlogger.WithError(err).Warn(\"Failed to dial with local resolver.\")\n\t\treturn DialWithServiceResolver(ctx, network, addr, port)\n\n\t}\n}", "func (w *walletAPIHandler) lookup(ctx context.Context, c Call, wr io.Writer) error {\n\tvar opts nameOptions\n\tif err := unmarshalOptions(c, &opts); err != nil {\n\t\treturn w.encodeErr(c, err, wr)\n\t}\n\tif err := w.registerIdentifyUI(); err != nil {\n\t\treturn w.encodeErr(c, err, wr)\n\t}\n\n\tresult, err := w.cli.LookupCLILocal(ctx, opts.Name)\n\tif err != nil {\n\t\treturn w.encodeErr(c, err, wr)\n\t}\n\treturn w.encodeResult(c, result, wr)\n}", "func (cfg *Config) LookupProvider(endpoint string) *Provider {\n if endpoint == \"\" {\n return nil\n }\n\n if prov, hasProv := cfg.Provider[endpoint] ; hasProv {\n return prov\n } else {\n return &Provider{ Url: endpoint }\n }\n}", "func (cgm *channelMap) Lookup(lookup func(string) (interface{}, error)) error {\n\tcgm.lookup = lookup\n\treturn nil\n}", "func defaultDialer() func(network, addr string) (net.Conn, error) {\n\tif fn := http.DefaultTransport.(*http.Transport).Dial; fn != nil {\n\t\treturn fn\n\t}\n\treturn net.Dial\n}", "func (m *apiConfigManager) lookupRpcMethod(methodName, version string) *endpoints.ApiMethod {\n\tm.configLock.Lock()\n\tdefer m.configLock.Unlock()\n\tmethod, _ := m.rpcMethods[lookupKey{methodName, version}]\n\treturn method\n}", "func (cc *controlChannel) lookup(reqKeys map[string]string, reason rlspb.RouteLookupRequest_Reason, staleHeaders string, cb lookupCallback) (throttled bool) {\n\tif cc.throttler.ShouldThrottle() {\n\t\tcc.logger.Infof(\"RLS request throttled by client-side adaptive throttling\")\n\t\treturn true\n\t}\n\tgo func() {\n\t\treq := &rlspb.RouteLookupRequest{\n\t\t\tTargetType: \"grpc\",\n\t\t\tKeyMap: reqKeys,\n\t\t\tReason: reason,\n\t\t\tStaleHeaderData: staleHeaders,\n\t\t}\n\t\tcc.logger.Infof(\"Sending RLS request %+v\", pretty.ToJSON(req))\n\n\t\tctx, cancel := context.WithTimeout(context.Background(), cc.rpcTimeout)\n\t\tdefer cancel()\n\t\tresp, err := cc.client.RouteLookup(ctx, req)\n\t\tcb(resp.GetTargets(), resp.GetHeaderData(), err)\n\t}()\n\treturn false\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
New creates a new HTTP server for kubecheck
func New(kubecheck *config.Kubecheck) *http.Server { if kubecheck.Router == nil { kubecheck.Router = mux.NewRouter() kubecheck.Router.HandleFunc("/", indexHandler(kubecheck)) kubecheck.Router.HandleFunc("/checks/", healthchecksHandler(kubecheck.Config, kubecheck.Healthchecks)) for _, c := range kubecheck.Healthchecks { hcks := []checks.Healthcheck{c} kubecheck.Router.HandleFunc(getHealthcheckPath(c), healthchecksHandler(kubecheck.Config, hcks)) } kubecheck.Router.Use(loggingMiddleware) } srv := &http.Server{ Handler: kubecheck.Router, Addr: ":8113", ReadTimeout: 30 * time.Second, WriteTimeout: 30 * time.Second, } log.WithFields(log.Fields{ "service": "HTTP-Server", "address": srv.Addr, }).Infof("listening on %s", srv.Addr) return srv }
[ "func NewServer(handler http.Handler) *httptest.Server", "func newHTTPServer(address string, tlsConfig *tls.Config, handler http.Handler) *http.Server {\n\tserver := &http.Server{\n\t\tAddr: address,\n\t\tTLSConfig: tlsConfig,\n\t\tHandler: handler,\n\t}\n\treturn server\n}", "func NewTLSServer(handler http.Handler) *httptest.Server", "func newTestServer() *testServer {\n\tsrv := &testServer{\n\t\tseen: make(map[string]*requestStatus),\n\t\ttotal: atomic.NewUint64(0),\n\t\taccepted: atomic.NewUint64(0),\n\t\tretried: atomic.NewUint64(0),\n\t\tfailed: atomic.NewUint64(0),\n\t\tpeak: atomic.NewInt64(0),\n\t\tactive: atomic.NewInt64(0),\n\t}\n\tsrv.server = httptest.NewServer(srv)\n\tsrv.URL = srv.server.URL\n\treturn srv\n}", "func New() MPMServer {\n\thttp.DefaultServeMux = new(http.ServeMux)\n\treturn MPMServer{\n\t\t&http.Server{\n\t\t\tAddr: \":2000\",\n\t\t},\n\t}\n}", "func newHttpServer() *httpServer {\n\treturn &httpServer{}\n}", "func New(conf Config) Server {\n\ts := &server{}\n\ts.http.Addr = conf.Addr\n\ts.http.ErrorLog = conf.Logger\n\ts.http.Handler = s\n\ts.http.SetKeepAlivesEnabled(false)\n\ts.conf = &conf\n\tif s.conf.Authenticator == nil {\n\t\ts.conf.Authenticator = func(_ Server, _ *http.Request, _ ID) error {\n\t\t\treturn nil\n\t\t}\n\t}\n\n\ts.upgrader.CheckOrigin = func(r *http.Request) bool {\n\t\tswitch s.conf.Origin {\n\t\tcase \"\", \"*\":\n\t\t\treturn true\n\t\t}\n\t\treturn s.conf.Origin == r.Header.Get(\"Origin\")\n\t}\n\t//s.connMap = make(map[ID]*websocket.Conn)\n\ts.launchTime = time.Now().UTC()\n\treturn s\n}", "func New(addr string, proxySet *proxy.Set, certPath, keyPath string) (*T, error) {\n\tnetwork := networkUnix\n\tif strings.Contains(addr, \":\") {\n\t\tnetwork = networkTCP\n\t}\n\t// Start listening on the specified network/address.\n\tlistener, err := net.Listen(network, addr)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to create listener\")\n\t}\n\t// If the address is Unix Domain Socket then make it accessible for everyone.\n\tif network == networkUnix {\n\t\tif err := os.Chmod(addr, 0777); err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"failed to change socket permissions\")\n\t\t}\n\t}\n\t// Create a graceful HTTP server instance.\n\trouter := mux.NewRouter()\n\thttpServer := &http.Server{Handler: router}\n\n\ths := &T{\n\t\tactDesc: actor.Root().NewChild(addr),\n\t\taddr: addr,\n\t\tlistener: listener,\n\t\thttpServer: httpServer,\n\t\tproxySet: proxySet,\n\t\terrorCh: make(chan error, 1),\n\t\tcertPath: certPath,\n\t\tkeyPath: keyPath,\n\t}\n\t// Configure the API request handlers.\n\trouter.HandleFunc(fmt.Sprintf(\"/clusters/{%s}/topics/{%s}/messages\", prmCluster, prmTopic), hs.handleProduce).Methods(\"POST\")\n\trouter.HandleFunc(fmt.Sprintf(\"/topics/{%s}/messages\", prmTopic), hs.handleProduce).Methods(\"POST\")\n\n\trouter.HandleFunc(fmt.Sprintf(\"/clusters/{%s}/topics/{%s}/messages\", prmCluster, prmTopic), hs.handleConsume).Methods(\"GET\")\n\trouter.HandleFunc(fmt.Sprintf(\"/topics/{%s}/messages\", prmTopic), hs.handleConsume).Methods(\"GET\")\n\n\trouter.HandleFunc(fmt.Sprintf(\"/clusters/{%s}/topics/{%s}/acks\", prmCluster, prmTopic), hs.handleAck).Methods(\"POST\")\n\trouter.HandleFunc(fmt.Sprintf(\"/topics/{%s}/acks\", prmTopic), hs.handleAck).Methods(\"POST\")\n\n\trouter.HandleFunc(fmt.Sprintf(\"/clusters/{%s}/topics/{%s}/offsets\", prmCluster, prmTopic), hs.handleGetOffsets).Methods(\"GET\")\n\trouter.HandleFunc(fmt.Sprintf(\"/topics/{%s}/offsets\", prmTopic), hs.handleGetOffsets).Methods(\"GET\")\n\n\trouter.HandleFunc(fmt.Sprintf(\"/clusters/{%s}/topics/{%s}/offsets\", prmCluster, prmTopic), hs.handleSetOffsets).Methods(\"POST\")\n\trouter.HandleFunc(fmt.Sprintf(\"/topics/{%s}/offsets\", prmTopic), hs.handleSetOffsets).Methods(\"POST\")\n\n\trouter.HandleFunc(fmt.Sprintf(\"/clusters/{%s}/topics/{%s}/consumers\", prmCluster, prmTopic), hs.handleGetTopicConsumers).Methods(\"GET\")\n\trouter.HandleFunc(fmt.Sprintf(\"/topics/{%s}/consumers\", prmTopic), hs.handleGetTopicConsumers).Methods(\"GET\")\n\n\trouter.HandleFunc(fmt.Sprintf(\"/clusters/{%s}/topics\", prmCluster), hs.handleListTopics).Methods(\"GET\")\n\trouter.HandleFunc(\"/topics\", hs.handleListTopics).Methods(\"GET\")\n\n\trouter.HandleFunc(fmt.Sprintf(\"/clusters/{%s}/topics/{%s}\", prmCluster, prmTopic), hs.handleGetTopicMetadata).Methods(\"GET\")\n\trouter.HandleFunc(fmt.Sprintf(\"/topics/{%s}\", prmTopic), hs.handleGetTopicMetadata).Methods(\"GET\")\n\n\trouter.HandleFunc(\"/pprof/heap\", http.HandlerFunc(getHeapProfile)).Methods(\"GET\")\n\n\trouter.HandleFunc(\"/_ping\", hs.handlePing).Methods(\"GET\")\n\treturn hs, nil\n}", "func newServer(h *hive) *httpServer {\n\tr := mux.NewRouter()\n\ts := &httpServer{\n\t\tServer: http.Server{\n\t\t\tAddr: h.config.Addr,\n\t\t\tHandler: r,\n\t\t},\n\t\trouter: r,\n\t\thive: h,\n\t}\n\tv1 := v1Handler{srv: s}\n\tv1.install(r)\n\tw := webHandler{}\n\tw.install(r)\n\tif h.config.Pprof {\n\t\tp := pprofHandler{}\n\t\tp.install(r)\n\t}\n\treturn s\n}", "func NewServer(c *Cacher, config *Config) *well.HTTPServer {\n\taddr := config.Addr\n\tif len(addr) == 0 {\n\t\taddr = defaultAddress\n\t}\n\n\treturn &well.HTTPServer{\n\t\tServer: &http.Server{\n\t\t\tAddr: addr,\n\t\t\tHandler: cacheHandler{c},\n\t\t},\n\t}\n}", "func newTest3CServer(customPath string, customFunc func(w http.ResponseWriter, r *http.Request)) (*httptest.Server, error) {\n\trtr := mux.NewRouter()\n\n\tdealFunc := func(w http.ResponseWriter, r *http.Request) {\n\t\tw.WriteHeader(http.StatusCreated)\n\t}\n\n\tif customFunc != nil {\n\t\tdealFunc = customFunc\n\t}\n\n\tif customPath != StartNewDealPath {\n\t\trtr.HandleFunc(StartNewDealPath, dealFunc)\n\t}\n\n\tif customFunc != nil {\n\t\trtr.HandleFunc(customPath, customFunc)\n\t}\n\treturn httptest.NewServer(rtr), nil\n}", "func New(port string) Api {\n\tdone := make(chan bool, 1)\n\thttpServer := &http.Server{\n\t\tAddr: \":\" + port,\n\t}\n\tserv := Api{\n\t\tDone: done,\n\t\tServer: httpServer,\n\t}\n\treturn serv\n}", "func New(listener net.Listener, handler http.Handler, options Options) goroutine.BackgroundRoutine {\n\thttpServer := &http.Server{\n\t\tHandler: ot.Middleware(handler),\n\t\tReadTimeout: options.ReadTimeout,\n\t\tWriteTimeout: options.WriteTimeout,\n\t}\n\n\treturn &server{\n\t\tlistener: listener,\n\t\tserver: httpServer,\n\t}\n}", "func NewServer(name string, onClose func()) *httpServer {\n\treturn &httpServer{\n\t\tname: name,\n\t\thttpPort: *httpPort,\n\t\tonClose: onClose,\n\t}\n}", "func NewHttp(manage *manage.Manage) *Http {\n\th := &Http{\n\t\thttpConfig: NewConfig(runtime.GetRuntimeDirectory(\".config\") + ConfigFilename),\n\t\tfiber: fiber.New(),\n\t\tmanage: manage,\n\t\tloginLogger: &log.Logger{},\n\t\taccessLogger: &log.Logger{},\n\t\tlinkClients: make([]*linkClient, 0),\n\t\tlinkRetry: 2,\n\t}\n\th.setup()\n\treturn h\n}", "func (s *Server) newServer(spec *healthApi.Spec) *healthApi.Server {\n\trestAPI := restapi.NewCiliumHealthAPIAPI(spec.Document)\n\trestAPI.Logger = log.Printf\n\n\t// Admin API\n\trestAPI.GetHealthzHandler = NewGetHealthzHandler(s)\n\trestAPI.ConnectivityGetStatusHandler = NewGetStatusHandler(s)\n\trestAPI.ConnectivityPutStatusProbeHandler = NewPutStatusProbeHandler(s)\n\n\tapi.DisableAPIs(spec.DeniedAPIs, restAPI.AddMiddlewareFor)\n\tsrv := healthApi.NewServer(restAPI)\n\tsrv.EnabledListeners = []string{\"unix\"}\n\tsrv.SocketPath = defaults.SockPath\n\n\tsrv.ConfigureAPI()\n\n\treturn srv\n}", "func New(opts ...Option) *Client {\n\tc := &Client{\n\t\tnetwork: Mainnet,\n\t\turl: url.URL{Scheme: \"http\", Host: \"209.126.98.204:7890\"},\n\t\trequest: sendReq}\n\n\tfor _, opt := range opts {\n\t\topt(c)\n\t}\n\n\treturn c\n}", "func newHealthServer(cfg config) *healthServer {\n\n\ts := &healthServer{\n\t\tcfg: cfg,\n\t\tserver: &http.Server{Addr: cfg.healthServer.listenAddress},\n\t}\n\n\ts.server.Handler = s\n\n\treturn s\n}", "func NewHTTP(addr string, state *rumour.State, logOpt httplog.Options) *http.Server {\n\treturn &http.Server{\n\t\tAddr: addr,\n\t\tHandler: newRouter(state, httplog.NewLogger(\"http\", logOpt)),\n\t\tReadTimeout: 5 * time.Second,\n\t\tWriteTimeout: 300 * time.Second,\n\t\tIdleTimeout: 15 * time.Second,\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
trimLeftChars removes 'n' characters (runes) from string 's'
func trimLeftChars(s string, n int) string { m := 0 for i := range s { if m >= n { return s[i:] } m++ } return s[:0] }
[ "func TrimLeftFunc(s string, f func(rune) bool) string {\n\tinner_func := func(r rune) bool {\n\t\treturn r <= 'c' || r >= 'i'\n\t}\n\tfmt.Println(strings.TrimLeftFunc(\"abcdefghijk\", inner_func)) // defghijk\n\tfmt.Println(strings.TrimLeftFunc(\"agbcdefghijk\", inner_func)) // gbcdefghijk\n\tfmt.Println(strings.TrimLeftFunc(\"asgbcdefghijk\", inner_func)) // gbcdefghijk\n\treturn strings.TrimLeftFunc(s, f)\n}", "func stripWhitespaceLeft(s string) string {\r\n\tloc := stripWhitespaceRegex.FindStringIndex(s)\r\n\r\n\tif loc == nil {\r\n\t\treturn s\r\n\t}\r\n\r\n\treturn s[loc[1]:]\r\n}", "func TrimLeftLength(source, s []byte) int {\n\treturn len(source) - len(TrimLeft(source, s))\n}", "func trimRightLen(s string, n int) string {\n\tif n <= 0 {\n\t\treturn s\n\t}\n\tc := utf8.RuneCountInString(s)\n\truneCount := 0\n\tvar i int\n\tfor i = range s {\n\t\tif runeCount >= c-n {\n\t\t\tbreak\n\t\t}\n\t\truneCount++\n\t}\n\treturn s[:i]\n}", "func TrimLeft(s string, cutset string) string {\n\tfmt.Printf(\"[%q]\\n\", strings.TrimLeft(\" !!! Achtung! Achtung! !!! \", \"! \")) // [\"Achtung! Achtung! !!! \"]\n\tfmt.Printf(\"[%q]\\n\", strings.TrimLeft(\" !!! Achtung! Achtung! !!! @@@ \", \"!@\")) // [\" !!! Achtung! Achtung! !!! @@@ \"]\n\tfmt.Printf(\"[%q]\\n\", strings.TrimLeft(\" !!! Achtung! Achtung! !!! \", \"\")) // [\" !!! Achtung! Achtung! !!! \"]\n\tfmt.Printf(\"[%q]\\n\", strings.TrimLeft(\" !!! Achtung! Achtung! !!! \", \" \")) // [\"!!! Achtung! Achtung! !!! \"]\n\treturn strings.TrimLeft(s, cutset)\n}", "func TrimLeftSpace(source []byte) []byte {\n\treturn TrimLeft(source, spaces)\n}", "func Left(s string, n int) string {\n\tif n < 0 {\n\t\treturn Right(s, -n)\n\t}\n\treturn Substr(s, 0, n)\n}", "func LeftByRune(s string, count int) string {\r\n\tif count <= 0 || len(s) == 0 {\r\n\t\treturn \"\"\r\n\t}\r\n\tr := Runes(s)\r\n\tif count > len(r) {\r\n\t\tcount = len(r)\r\n\t}\r\n\treturn string(r[0:count])\r\n}", "func TrimLeftSpaceLength(source []byte) int {\n\ti := 0\n\tfor ; i < len(source); i++ {\n\t\tif !IsSpace(source[i]) {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn i\n}", "func FirstN(s string, n int) string {\n\tif n < 1 {\n\t\treturn \"\"\n\t}\n\tr := []rune(s)\n\tif n > len(r) {\n\t\treturn s\n\t}\n\treturn string(r[:n])\n}", "func trimPrefix(s string) string {\n\ts = strings.TrimPrefix(s, \"a \")\n\ts = strings.TrimPrefix(s, \"the \")\n\treturn s\n}", "func TrimLeft(source, b []byte) []byte {\n\ti := 0\n\tfor ; i < len(source); i++ {\n\t\tc := source[i]\n\t\tfound := false\n\t\tfor j := 0; j < len(b); j++ {\n\t\t\tif c == b[j] {\n\t\t\t\tfound = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif !found {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn source[i:]\n}", "func trim(s string) string {\n\ts = regexp.MustCompile(`[ \\t]+`).ReplaceAllString(s, \" \")\n\ts = regexp.MustCompile(`(?m)(^ | $)`).ReplaceAllString(s, \"\")\n\ts = strings.TrimLeft(s, \"\\n\")\n\ts = regexp.MustCompile(`\\n\\n+`).ReplaceAllString(s, \"\\n\")\n\treturn s\n}", "func trimLeadingZeros(s string) string {\n\treturn strings.TrimLeft(s, \"0\")\n}", "func RemoveStringToTheLeftOfMarker(s, marker string) (result string) {\n\tmarkerIdx := strings.Index(s, marker)\n\tif markerIdx == -1 {\n\t\treturn s\n\t}\n\n\tmarkerIdx = markerIdx + len(marker)\n\n\ttextForRemoval := s[0:markerIdx]\n\tresultStr := strings.Replace(s, textForRemoval, \"\", -1)\n\treturn resultStr\n}", "func StripStart(s string) string {\n\tr := regexp.MustCompile(`[A-Za-z0-9À-ÖØ-öø-ÿ]`)\n\tf := r.FindStringIndex(s)\n\tif f == nil {\n\t\treturn \"\"\n\t}\n\tif f[0] != 0 {\n\t\treturn s[f[0]:]\n\t}\n\treturn s\n}", "func LeftF(n int) func(string) string {\n\treturn func(s string) string {\n\t\treturn Left(s, n)\n\t}\n}", "func (t *Segment) TrimLeftSpace(buffer []byte) Segment {\n\tv := buffer[t.Start:t.Stop]\n\tl := util.TrimLeftSpaceLength(v)\n\treturn NewSegment(t.Start+l, t.Stop)\n}", "func Exercise8() {\n\tfmt.Println()\n\tfmt.Println(\"---- EXERCISE8: Right Trim It from 08-right-trim-it ----\")\n\n\t// currently it prints 17\n\t// it should print 5\n\n\tname := \"inanç \"\n\tname = strings.TrimRight(name, \" \")\n\t// fmt.Println(len(name))\n\tfmt.Println(utf8.RuneCountInString(name))\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
Do executes an HTTP request. If verbose is set this will log the request and response using httputil.
func (hc *httpClient) Do(req *http.Request) (*http.Response, error) { if hc.log.Verbose { dump, err := httputil.DumpRequest(req, req.Header.Get("Content-Type") == "application/json") if err != nil { hc.log.Errorf("Unable to dump request: %s\n", err) } else { hc.log.Errorf("%s\n\n", dump) } } resp, err := hc.c.Do(req) if err == nil && hc.log.Verbose { dump, err := httputil.DumpResponse(resp, resp.Header.Get("Content-Type") == "application/json") if err != nil { hc.log.Errorf("Unable to dump request: %s\n", err) } else { hc.log.Errorf("%s\n", dump) } } return resp, err }
[ "func (g *Server) Do(req *http.Request) (*http.Response, error) {\n\treq.Header.Set(\"User-Agent\", g.UserAgent)\n\tif g.Authenticator != nil {\n\t\tif err := g.Authenticator.Authenticate(req); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif g.Debug {\n\t\tif req.URL.RawQuery != \"\" {\n\t\t\treq.URL.RawQuery += \"&trace=0x1\"\n\t\t} else {\n\t\t\treq.URL.RawQuery += \"trace=0x1\"\n\t\t}\n\t}\n\treturn g.Client.Do(req)\n}", "func (c *Client) Do(req *Request) (*http.Response, error) {\n\t// set UserAgent\n\tif c.UserAgent != \"\" && req.HTTPRequest.Header.Get(\"User-Agent\") == \"\" {\n\t\treq.HTTPRequest.Header.Set(\"User-Agent\", c.UserAgent)\n\t}\n\n\t// set Timeout\n\tif c.Timeout > 0 {\n\t\tc.HTTPClient.Timeout = time.Duration(10 * time.Second)\n\t}\n\n\t// make request and return response\n\tresp, err := c.HTTPClient.Do(req.HTTPRequest)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp, nil\n}", "func (c *Client) Do(request *http.Request) (resp *http.Response, err error) {\n\tclient := &http.Client{\n\t\tTimeout: c.Timeout,\n\t}\n\tc.setProxy(client, request)\n\tresponse, err := client.Do(request)\n\treturn response, err\n}", "func LogHTTPRequest(\n\tlogger *zerolog.Logger,\n\tclient *http.Client,\n\treq *http.Request,\n) (*http.Response, error) {\n\tstart := time.Now()\n\tresp, err := client.Do(req)\n\tif resp != nil {\n\t\tlogger.Err(err).\n\t\t\tStringer(\"duration\", time.Since(start)).\n\t\t\tStr(\"method\", req.Method).\n\t\t\tInt64(\"size\", resp.ContentLength).\n\t\t\tInt(\"statusCode\", resp.StatusCode).\n\t\t\tStr(\"status\", resp.Status).\n\t\t\tStringer(\"url\", req.URL).\n\t\t\tMsg(\"HTTPRequest\")\n\t} else {\n\t\tlogger.Err(err).\n\t\t\tStringer(\"duration\", time.Since(start)).\n\t\t\tStr(\"method\", req.Method).\n\t\t\tStringer(\"url\", req.URL).\n\t\t\tMsg(\"HTTPRequest\")\n\t}\n\treturn resp, err\n}", "func doRequest(ctx context.Context, url string) (resp *http.Response, err error) {\n\tvar req *http.Request\n\n\treq, err = http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\terr = errors.Wrapf(err, \"couldn't create request obj\")\n\t\treturn\n\t}\n\n\treq = req.WithContext(ctx)\n\n\tqueryParams := req.URL.Query()\n\tqueryParams.Add(\"go-get\", \"1\")\n\treq.URL.RawQuery = queryParams.Encode()\n\n\tresp, err = http.DefaultClient.Do(req)\n\tif err != nil {\n\t\terr = errors.Wrapf(err, \"failed to send http request\")\n\t\treturn\n\t}\n\n\treturn\n}", "func (p *Proxy) Do(req *http.Request) (*http.Response, error) {\n\treturn p.Client().Do(req)\n}", "func (t *Transport) doHTTP(conn net.Conn, req *http.Request) (*http.Response, error) {\n\tdebug.Printf(\"Requesting %q over HTTP.\\n\", req.URL.String())\n\n\t// Create the HTTP ClientConn, which handles the\n\t// HTTP details.\n\thttpConn := httputil.NewClientConn(conn, nil)\n\tres, err := httpConn.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif !res.Close {\n\t\tt.tcpConns[req.URL.Host] <- conn\n\t} else {\n\t\t// This connection is closing, so another can be used.\n\t\tt.connLimit[req.URL.Host] <- struct{}{}\n\t\terr = httpConn.Close()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn res, nil\n}", "func (r *AWSRequest) DoHTTP(ua, url string) (time.Duration, error) {\n\treq, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\treq.Header.Set(\"User-Agent\", ua)\n\n\tstart := time.Now()\n\tresp, err := r.httpClient.Do(req)\n\tlatency := time.Since(start)\n\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tdefer resp.Body.Close()\n\n\treturn latency, nil\n}", "func (r *AWSRequest) Do(ua, url string, reqType RequestType) (time.Duration, error) {\n\tif reqType == RequestTypeHTTP {\n\t\treturn r.DoHTTP(ua, url)\n\t}\n\treturn r.DoTCP(ua, url)\n}", "func (t *HTTPService) DoHTTPRequest(_ *http.Request, _ http2.RequestCallback, _ http2.ResponseCallback) *http2.Error {\n\treturn nil\n}", "func (p *Profiler) DoRequest(client *http.Client, req *http.Request) {\n\n\tres, err := p.trackRequestTime(client, req)\n\n\tif err != nil {\n\t\tp.Profile.TotalError++\n\t\tp.Profile.Errors = append(p.Profile.Errors, err)\n\t}\n\n\tif statusCodeRange := res.StatusCode / 100; statusCodeRange == 4 || statusCodeRange == 5 {\n\t\t_, ok := p.Profile.StatusErrorCodes[res.StatusCode]\n\t\tif ok {\n\t\t\tp.Profile.StatusErrorCodes[res.StatusCode]++\n\t\t} else {\n\t\t\tp.Profile.StatusErrorCodes[res.StatusCode] = 1\n\t\t}\n\t}\n\n\tsize := res.GetSize()\n\tp.Profile.MinResponseSize = common.MinInt64NonZero(p.Profile.MinResponseSize, size)\n\tp.Profile.MaxResponseSize = common.MaxInt64(p.Profile.MaxResponseSize, size)\n\tp.Profile.TotalRequest++\n}", "func (c *Client) doRequest(host *URI, method, path string, headers map[string]string, reader io.Reader) (*http.Response, error) {\n\treq, err := makeRequest(host, method, path, headers, reader)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"building request\")\n\t}\n\treturn c.client.Do(req)\n}", "func (tc TweetClient) Do(req *http.Request) (*http.Response, error) {\n\treturn tc.Client.Do(req)\n}", "func httpDo(ctx context.Context, req *http.Request, f func(*http.Response, error) error) error {\n\t// Run the HTTP request in a goroutine and pass the response to f.\n\tc := make(chan error, 1)\n\treq = req.WithContext(ctx)\n\tfmt.Println(\"Req:\", req)\n\tgo func() { c <- f(http.DefaultClient.Do(req)) }()\n\tselect {\n\tcase <-ctx.Done():\n\t\t<-c // Wait for f to return.\n\t\treturn ctx.Err()\n\tcase err := <-c:\n\t\tfmt.Println(\"Error in httpdo:\", err)\n\t\tfmt.Println(req.Body)\n\t\treturn err\n\t}\n}", "func Debug(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tif os.Getenv(\"DEBUG_HTTP_TRAFFIC\") == \"true\" {\n\t\t\t// You need to write the entire thing in one Write, otherwise the\n\t\t\t// output will be jumbled with other requests.\n\t\t\tb := new(bytes.Buffer)\n\t\t\tbits, err := httputil.DumpRequest(r, true)\n\t\t\tif err != nil {\n\t\t\t\t_, _ = b.WriteString(err.Error())\n\t\t\t} else {\n\t\t\t\t_, _ = b.Write(bits)\n\t\t\t}\n\t\t\tres := httptest.NewRecorder()\n\t\t\th.ServeHTTP(res, r)\n\n\t\t\t_, _ = b.WriteString(fmt.Sprintf(\"HTTP/1.1 %d\\r\\n\", res.Code))\n\t\t\t_ = res.HeaderMap.Write(b)\n\t\t\tfor k, v := range res.HeaderMap {\n\t\t\t\tw.Header()[k] = v\n\t\t\t}\n\t\t\tw.WriteHeader(res.Code)\n\t\t\t_, _ = b.WriteString(\"\\r\\n\")\n\t\t\twriter := io.MultiWriter(w, b)\n\t\t\t_, _ = res.Body.WriteTo(writer)\n\t\t\t_, _ = b.WriteTo(os.Stderr)\n\t\t} else {\n\t\t\th.ServeHTTP(w, r)\n\t\t}\n\t})\n}", "func (client ClientHolder) Do(req *http.Request, dst ...interface{}) error {\n\tresp, err := client.HTTP.Do(req)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"while do-ing http request to %s\", req.URL)\n\t}\n\n\terr = procResp(resp, dst...)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (client *Client) Do(req *http.Request, result interface{}) error {\n\treturn client.do(req, result)\n}", "func SendRequestDebug(req *http.Request) (raw []byte, httpResponse *http.Response, err error) {\n\tcurlCommand, err := http2curl.GetCurlCommand(req)\n\tif err != nil {\n\t\tfmt.Printf(\"[imbot/http][%v] GetCurlCommand error: %v\\n\", time.Now(), err)\n\t\treturn\n\t}\n\n\tcurlLiteral := curlCommand.String()\n\n\tfmt.Printf(\"[imbot/http][%v] request CURL: %v\\n\", time.Now(), curlLiteral)\n\n\t// send\n\thttpResponse, err = (&http.Client{}).Do(req)\n\tif err != nil {\n\t\tfmt.Printf(\"[imbot/http][%v] request error: %v. CURL: %v\\n\", time.Now(), err, curlLiteral)\n\t\treturn\n\t}\n\tdefer httpResponse.Body.Close()\n\n\traw, err = ioutil.ReadAll(httpResponse.Body)\n\tif err != nil {\n\t\tfmt.Printf(\"[imbot/http][%v] read body error: %v. CURL: %v\\n\", time.Now(), err, curlLiteral)\n\t\treturn\n\t}\n\n\tfmt.Printf(\"[%v] response body: %s. CURL: %v\\n\", time.Now(), raw, curlLiteral)\n\treturn\n}", "func sendAndPrintHTTP(url string) {\n\treturnCode, resp := sendHTTPReq(url)\n\n\tif returnCode != 200 {\n\t\tfmt.Println(\"Error! HTTP return code : \", returnCode)\n\t\treturn\n\t}\n\tfmt.Print(resp)\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
GetBody returns the value of the 'body' parameter and a flag indicating if the parameter has a value. Description of the addon.
func (r *AddOnsAddServerRequest) GetBody() (value *AddOn, ok bool) { ok = r != nil && r.body != nil if ok { value = r.body } return }
[ "func GetBody(ctx context.Context) interface{} {\n\treturn ctx.Value(BodyKey)\n}", "func GetBody(res *http.Response) string {\n\t_ = res // TODO: Use this parameter\n\treturn \"\"\n}", "func (m *OutlookTask) GetBody()(ItemBodyable) {\n val, err := m.GetBackingStore().Get(\"body\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(ItemBodyable)\n }\n return nil\n}", "func (f *Function) GetBody() *FunctionBody {\n\treturn f.body\n}", "func (this *Fixture) GetBody() *Body {\n\treturn this.Body\n}", "func (m *TermsAndConditions) GetBodyText()(*string) {\n return m.bodyText\n}", "func (msg ExtraMsg) GetBody(dest interface{}) error {\n\treturn json.Unmarshal(msg.Body, dest)\n}", "func (r *RoleBindingsAddServerRequest) GetBody() (value *RoleBinding, ok bool) {\n\tok = r != nil && r.body != nil\n\tif ok {\n\t\tvalue = r.body\n\t}\n\treturn\n}", "func (o *WorkflowApiAllOf) GetBodyOk() (*string, bool) {\n\tif o == nil || o.Body == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Body, true\n}", "func (current PageSizeBase) GetBody() interface{} {\n\treturn current.Body\n}", "func (bi *batchItem) GetBody() RequestBody {\n\treturn bi.Body\n}", "func (self *Response) GetBody(mockName string, request *http.Request) string {\n\tresponseBody := self.body\n\n\tif self.bodyGenerator != nil {\n\t\tresponseBody = (*self.bodyGenerator)(mockName, *request)\n\t}\n\n\treturn responseBody\n}", "func readBody(vw *valueWr, r *http.Request) error {\n\tcontent, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tlog.Println(\"Error reading request body:\", err)\n\t\treturn err\n\t}\n\tvw.Value = string(content)\n\treturn nil\n}", "func (f *FileParams) GetBody() (*bytes.Buffer, string, error) {\n\tbody := &bytes.Buffer{}\n\twriter := multipart.NewWriter(body)\n\n\tif f.Purpose != nil {\n\t\terr := writer.WriteField(\"purpose\", StringValue(f.Purpose))\n\t\tif err != nil {\n\t\t\treturn nil, \"\", err\n\t\t}\n\t}\n\n\tif f.FileReader != nil && f.Filename != nil {\n\t\tpart, err := writer.CreateFormFile(\"file\", filepath.Base(StringValue(f.Filename)))\n\t\tif err != nil {\n\t\t\treturn nil, \"\", err\n\t\t}\n\n\t\t_, err = io.Copy(part, f.FileReader)\n\t\tif err != nil {\n\t\t\treturn nil, \"\", err\n\t\t}\n\t}\n\n\tif f.FileLinkData != nil {\n\t\tvalues := &form.Values{}\n\t\tform.AppendToPrefixed(values, f.FileLinkData, []string{\"file_link_data\"})\n\n\t\tparams, err := url.ParseQuery(values.Encode())\n\t\tif err != nil {\n\t\t\treturn nil, \"\", err\n\t\t}\n\t\tfor key, values := range params {\n\t\t\terr := writer.WriteField(key, values[0])\n\t\t\tif err != nil {\n\t\t\t\treturn nil, \"\", err\n\t\t\t}\n\t\t}\n\t}\n\n\terr := writer.Close()\n\tif err != nil {\n\t\treturn nil, \"\", err\n\t}\n\n\treturn body, writer.Boundary(), nil\n}", "func AddBodyFlag(fs *pflag.FlagSet, value *string) {\n\tfs.StringVar(\n\t\tvalue,\n\t\t\"body\",\n\t\t\"\",\n\t\t\"Name of the file containing the request body. If this isn't given then \"+\n\t\t\t\"the body will be taken from the standard input.\",\n\t)\n}", "func (o *WorkflowApiAllOf) HasBody() bool {\n\tif o != nil && o.Body != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (c *case_) requestBody() io.Reader {\n\tif c.postbody == \"\" {\n\t\treturn nil\n\t}\n\treturn strings.NewReader(c.postbody)\n}", "func (e *event) GetBody() []byte {\n\treturn e.msg.Data\n}", "func ValidateBody(fl validator.FieldLevel) bool {\n\treturn len(fl.Field().String()) >= 0 && len(fl.Field().String()) <= 280\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
unmarshal is the method used internally to unmarshal request to the 'add' method.
func (r *AddOnsAddServerRequest) unmarshal(reader io.Reader) error { var err error decoder := json.NewDecoder(reader) data := new(addOnData) err = decoder.Decode(data) if err != nil { return err } r.body, err = data.unwrap() if err != nil { return err } return err }
[ "func unmarshalAddMemberPayload(ctx context.Context, service *goa.Service, req *http.Request) error {\n\tpayload := &addMemberPayload{}\n\tif err := service.DecodeRequest(req, payload); err != nil {\n\t\treturn err\n\t}\n\tif err := payload.Validate(); err != nil {\n\t\t// Initialize payload with private data structure so it can be logged\n\t\tgoa.ContextRequest(ctx).Payload = payload\n\t\treturn err\n\t}\n\tgoa.ContextRequest(ctx).Payload = payload.Publicize()\n\treturn nil\n}", "func unmarshalAddItemsPayload(ctx context.Context, service *goa.Service, req *http.Request) error {\n\tpayload := &addItemPayload{}\n\tif err := service.DecodeRequest(req, payload); err != nil {\n\t\treturn err\n\t}\n\tif err := payload.Validate(); err != nil {\n\t\t// Initialize payload with private data structure so it can be logged\n\t\tgoa.ContextRequest(ctx).Payload = payload\n\t\treturn err\n\t}\n\tgoa.ContextRequest(ctx).Payload = payload.Publicize()\n\treturn nil\n}", "func unmarshalAddAdministratorPayload(ctx context.Context, service *goa.Service, req *http.Request) error {\n\tpayload := &addAdministratorPayload{}\n\tif err := service.DecodeRequest(req, payload); err != nil {\n\t\treturn err\n\t}\n\tif err := payload.Validate(); err != nil {\n\t\t// Initialize payload with private data structure so it can be logged\n\t\tgoa.ContextRequest(ctx).Payload = payload\n\t\treturn err\n\t}\n\tgoa.ContextRequest(ctx).Payload = payload.Publicize()\n\treturn nil\n}", "func unmarshalAddExpeditionPayload(ctx context.Context, service *goa.Service, req *http.Request) error {\n\tpayload := &addExpeditionPayload{}\n\tif err := service.DecodeRequest(req, payload); err != nil {\n\t\treturn err\n\t}\n\tif err := payload.Validate(); err != nil {\n\t\t// Initialize payload with private data structure so it can be logged\n\t\tgoa.ContextRequest(ctx).Payload = payload\n\t\treturn err\n\t}\n\tgoa.ContextRequest(ctx).Payload = payload.Publicize()\n\treturn nil\n}", "func (c *AppContext) Unmarshall(input interface{}) error {\n\tbytez, _ := ioutil.ReadAll(c.Body)\n\tif err := json.Unmarshal(bytez, input); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func unmarshalAddOrdersPayload(ctx context.Context, service *goa.Service, req *http.Request) error {\n\tpayload := &addOrderPayload{}\n\tif err := service.DecodeRequest(req, payload); err != nil {\n\t\treturn err\n\t}\n\tif err := payload.Validate(); err != nil {\n\t\t// Initialize payload with private data structure so it can be logged\n\t\tgoa.ContextRequest(ctx).Payload = payload\n\t\treturn err\n\t}\n\tgoa.ContextRequest(ctx).Payload = payload.Publicize()\n\treturn nil\n}", "func unmarshalAddStationPayload(ctx context.Context, service *goa.Service, req *http.Request) error {\n\tpayload := &addStationPayload{}\n\tif err := service.DecodeRequest(req, payload); err != nil {\n\t\treturn err\n\t}\n\tif err := payload.Validate(); err != nil {\n\t\t// Initialize payload with private data structure so it can be logged\n\t\tgoa.ContextRequest(ctx).Payload = payload\n\t\treturn err\n\t}\n\tgoa.ContextRequest(ctx).Payload = payload.Publicize()\n\treturn nil\n}", "func unmarshalAddTwitterPayload(ctx context.Context, service *goa.Service, req *http.Request) error {\n\tpayload := &addTwitterAccountSourcePayload{}\n\tif err := service.DecodeRequest(req, payload); err != nil {\n\t\treturn err\n\t}\n\tif err := payload.Validate(); err != nil {\n\t\t// Initialize payload with private data structure so it can be logged\n\t\tgoa.ContextRequest(ctx).Payload = payload\n\t\treturn err\n\t}\n\tgoa.ContextRequest(ctx).Payload = payload.Publicize()\n\treturn nil\n}", "func Unmarshal(r *http.Request, pm httprouter.Params, decodeBody bool, obj interface{}) error {\n\tvar err error\n\n\t// Check if we need to decode the request JSON body (POST or PUT)\n\tif decodeBody {\n\t\t// Start decoding json body\n\t\tdecoder := json.NewDecoder(r.Body)\n\n\t\t// Always close body\n\t\tdefer r.Body.Close()\n\n\t\t// Decode to object\n\t\terr = decoder.Decode(obj)\n\t\tif err != nil && err != io.EOF {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Unmarshal query & router params\n\terr = unmarshalParams(r, pm, obj)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func unmarshalAddDevicePayload(ctx context.Context, service *goa.Service, req *http.Request) error {\n\tpayload := &addDeviceSourcePayload{}\n\tif err := service.DecodeRequest(req, payload); err != nil {\n\t\treturn err\n\t}\n\tif err := payload.Validate(); err != nil {\n\t\t// Initialize payload with private data structure so it can be logged\n\t\tgoa.ContextRequest(ctx).Payload = payload\n\t\treturn err\n\t}\n\tgoa.ContextRequest(ctx).Payload = payload.Publicize()\n\treturn nil\n}", "func unmarshalAddTeamPayload(ctx context.Context, service *goa.Service, req *http.Request) error {\n\tpayload := &addTeamPayload{}\n\tif err := service.DecodeRequest(req, payload); err != nil {\n\t\treturn err\n\t}\n\tif err := payload.Validate(); err != nil {\n\t\t// Initialize payload with private data structure so it can be logged\n\t\tgoa.ContextRequest(ctx).Payload = payload\n\t\treturn err\n\t}\n\tgoa.ContextRequest(ctx).Payload = payload.Publicize()\n\treturn nil\n}", "func (x *GetStoredApplicationUpRequest) UnmarshalJSON(b []byte) error {\n\treturn jsonplugin.DefaultUnmarshalerConfig.Unmarshal(b, x)\n}", "func (m *CheckinRequest) Unmarshal(rawBytes []byte) (*CheckinRequest, error) {\n\treader := jspb.NewReader(rawBytes)\n\n\tm = m.UnmarshalFromReader(reader)\n\n\tif err := reader.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn m, nil\n}", "func (s *MakersServiceOp) Unmarshal(ctx context.Context, opt *MakerOptions, out interface{}) (*Response, error) {\n\tpath := makerBasePath\n\tpath, err := addOptions(path, opt)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar res makerResult\n\tvar r *Response\n\tres, r, err = s.list(ctx, path)\n\tif err != nil {\n\t\treturn r, err\n\t}\n\tif res.Maker == nil {\n\t\treturn r, nil\n\t}\n\tif err = json.Unmarshal(res.Maker, out); err != nil {\n\t\treturn r, err\n\t}\n\treturn r, err\n}", "func (r *RoleBindingUpdateServerRequest) unmarshal(reader io.Reader) error {\n\tvar err error\n\tdecoder := json.NewDecoder(reader)\n\tdata := new(roleBindingData)\n\terr = decoder.Decode(data)\n\tif err != nil {\n\t\treturn err\n\t}\n\tr.body, err = data.unwrap()\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn err\n}", "func unmarshalRegisterAuthenticationPayload(ctx context.Context, service *goa.Service, req *http.Request) error {\n\tpayload := &registerPayload{}\n\tif err := service.DecodeRequest(req, payload); err != nil {\n\t\treturn err\n\t}\n\tif err := payload.Validate(); err != nil {\n\t\t// Initialize payload with private data structure so it can be logged\n\t\tgoa.ContextRequest(ctx).Payload = payload\n\t\treturn err\n\t}\n\tgoa.ContextRequest(ctx).Payload = payload.Publicize()\n\treturn nil\n}", "func decodeAddContactRequest(_ context.Context, r *http.Request) (request interface{}, err error) {\n\tvar req contacts.AddContactRequest\n\tif e := json.NewDecoder(r.Body).Decode(&req); e != nil {\n\t\treturn nil, e\n\t}\n\treturn req, nil\n}", "func (a *encAPRepPart) unmarshal(b []byte) error {\n\t_, err := asn1.UnmarshalWithParams(b, a, fmt.Sprintf(\"application,explicit,tag:%v\", asnAppTag.EncAPRepPart))\n\tif err != nil {\n\t\treturn krberror.Errorf(err, krberror.EncodingError, \"AP_REP unmarshal error\")\n\t}\n\treturn nil\n}", "func Unmarshal(r *request.Request) {\n\tdefer r.HTTPResponse.Body.Close()\n\tif r.DataFilled() {\n\t\tdecoder := xml.NewDecoder(r.HTTPResponse.Body)\n\t\terr := xmlutil.UnmarshalXML(r.Data, decoder, r.Operation.Name+\"Result\")\n\t\tif err != nil {\n\t\t\tr.Error = awserr.NewRequestFailure(\n\t\t\t\tawserr.New(request.ErrCodeSerialization, \"failed decoding Query response\", err),\n\t\t\t\tr.HTTPResponse.StatusCode,\n\t\t\t\tr.RequestID,\n\t\t\t)\n\t\t\treturn\n\t\t}\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
Body sets the value of the 'body' parameter. Description of the addon.
func (r *AddOnsAddServerResponse) Body(value *AddOn) *AddOnsAddServerResponse { r.body = value return r }
[ "func (o *AddOpsNoteParams) SetBody(body *models.OpsNote) {\n\to.Body = body\n}", "func (m *Modal) SetBody(body Component) {\n\tm.Config.Body = body\n}", "func (c *Command) SetBody(body string) *Command {\n\tc.Body = body\n\treturn c\n}", "func (m *OutlookTask) SetBody(value ItemBodyable)() {\n err := m.GetBackingStore().Set(\"body\", value)\n if err != nil {\n panic(err)\n }\n}", "func (o *EchoParams) SetBody(body *models.ExampleStringMessage) {\n\to.Body = body\n}", "func (o *UpdateWhitelabelConfigurationParams) SetBody(body *models.WhitelabelConfiguration) {\n\to.Body = body\n}", "func (o *SetFieldParams) SetBody(body string) {\n\to.Body = body\n}", "func (o *ValidateCreateConfigurationParams) SetBody(body *dynatrace.MaintenanceWindow) {\n\to.Body = body\n}", "func (o *CreateTransactionParams) SetBody(body *model.Newtransaction) {\n\to.Body = body\n}", "func (o *ValidateParams) SetBody(body *models.WorkflowSpec) {\n\to.Body = body\n}", "func (o *CreateNetworkParams) SetBody(body *models.NetworkSpecification) {\n\to.Body = body\n}", "func (o *UpdateDashboardLayoutParams) SetBody(body *models.DashboardLayout) {\n\to.Body = body\n}", "func (o *UpdateStockReceiptItemParams) SetBody(body *models.StockReceiptItem) {\n\to.Body = body\n}", "func (i *V4RequestBuilder) Body(contentType string, body []byte) *V4RequestBuilder {\n\t// Check if someone tried to add an object as a string representation\n\t// as per original allowed implementation, e.g.\n\t// { \"foo\": \"bar\", \"baz\": like(\"bat\") }\n\tif utils.IsJSONFormattedObject(string(body)) {\n\t\tlog.Println(\"[WARN] request body appears to be a JSON formatted object, \" +\n\t\t\t\"no matching will occur. Support for structured strings has been\" +\n\t\t\t\"deprecated as of 0.13.0. Please use the JSON() method instead\")\n\t}\n\n\ti.interaction.interaction.WithRequestBody(contentType, body)\n\n\treturn i\n}", "func (o *PostComputeRackUnitsMoidParams) SetBody(body *models.ComputeRackUnit) {\n\to.Body = body\n}", "func (o *AddProjectParams) SetBody(body *models.Project) {\n\to.Body = body\n}", "func (o *RunInlineQueryParams) SetBody(body *models.Query) {\n\to.Body = body\n}", "func (o *UpdateOrganizationApplicationParams) SetBody(body *models.UpdateApp) {\n\to.Body = body\n}", "func (o *CreateChargebackReversalParams) SetBody(body *kbmodel.InvoicePaymentTransaction) {\n\to.Body = body\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
marshall is the method used internally to marshal responses for the 'add' method.
func (r *AddOnsAddServerResponse) marshal(writer io.Writer) error { var err error encoder := json.NewEncoder(writer) data, err := r.body.wrap() if err != nil { return err } err = encoder.Encode(data) return err }
[ "func (r *AddOnsListServerResponse) marshal(writer io.Writer) error {\n\tvar err error\n\tencoder := json.NewEncoder(writer)\n\tdata := new(addOnsListServerResponseData)\n\tdata.Items, err = r.items.wrap()\n\tif err != nil {\n\t\treturn err\n\t}\n\tdata.Page = r.page\n\tdata.Size = r.size\n\tdata.Total = r.total\n\terr = encoder.Encode(data)\n\treturn err\n}", "func marshallPost(w http.ResponseWriter, r *http.Request, v interface{}) {\n\tbytes, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\tlog.Error(err)\n\t\treturn\n\t}\n\n\tdefer r.Body.Close()\n\n\tdecoder := json.NewDecoder(strings.NewReader(string(bytes)))\n\n\terr = decoder.Decode(&v)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\tlog.Error(err)\n\t\treturn\n\t}\n}", "func (r *RoleBindingsListServerResponse) marshal(writer io.Writer) error {\n\tvar err error\n\tencoder := json.NewEncoder(writer)\n\tdata := new(roleBindingsListServerResponseData)\n\tdata.Items, err = r.items.wrap()\n\tif err != nil {\n\t\treturn err\n\t}\n\tdata.Page = r.page\n\tdata.Size = r.size\n\tdata.Total = r.total\n\terr = encoder.Encode(data)\n\treturn err\n}", "func (r *RoleBindingGetServerResponse) marshal(writer io.Writer) error {\n\tvar err error\n\tencoder := json.NewEncoder(writer)\n\tdata, err := r.body.wrap()\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = encoder.Encode(data)\n\treturn err\n}", "func (r *RoleBindingUpdateServerResponse) marshal(writer io.Writer) error {\n\tvar err error\n\tencoder := json.NewEncoder(writer)\n\tdata, err := r.body.wrap()\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = encoder.Encode(data)\n\treturn err\n}", "func (res *response) marshal() ([]byte, error) {\n\tpkt := make([]byte, 4)\n\tpkt[0] = socks5Version\n\tpkt[1] = byte(res.reply)\n\tpkt[2] = 0 // null reserved byte\n\tpkt[3] = byte(res.bindAddrType)\n\n\tif res.reply != success {\n\t\treturn pkt, nil\n\t}\n\n\tvar addr []byte\n\tswitch res.bindAddrType {\n\tcase ipv4:\n\t\taddr = net.ParseIP(res.bindAddr).To4()\n\t\tif addr == nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid IPv4 address for binding\")\n\t\t}\n\tcase domainName:\n\t\tif len(res.bindAddr) > 255 {\n\t\t\treturn nil, fmt.Errorf(\"invalid domain name for binding\")\n\t\t}\n\t\taddr = make([]byte, 0, len(res.bindAddr)+1)\n\t\taddr = append(addr, byte(len(res.bindAddr)))\n\t\taddr = append(addr, []byte(res.bindAddr)...)\n\tcase ipv6:\n\t\taddr = net.ParseIP(res.bindAddr).To16()\n\t\tif addr == nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid IPv6 address for binding\")\n\t\t}\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"unsupported address type\")\n\t}\n\n\tpkt = append(pkt, addr...)\n\tpkt = binary.BigEndian.AppendUint16(pkt, uint16(res.bindPort))\n\n\treturn pkt, nil\n}", "func (c *AppContext) Marshall(j interface{}) {\n\tbytez, _ := json.Marshal(j)\n\tc.Body = ioutil.NopCloser(bytes.NewReader(bytez))\n}", "func (sr *ScrapeResp) Marshall() ([]byte, error) {\n\tbuff := bytes.NewBuffer(make([]byte, 8+len(sr.Info)*12))\n\n\tif err := binary.Write(buff, binary.BigEndian, sr.Action); err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to encode scrape response action\")\n\t}\n\tif err := binary.Write(buff, binary.BigEndian, sr.TransactionID); err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to encode scrape response transaction id\")\n\t}\n\tif err := binary.Write(buff, binary.BigEndian, sr.Info); err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to encode scrape response info\")\n\t}\n\n\treturn buff.Bytes(), nil\n}", "func (m *Marshaller) MarshallRegistrationResponse(messages []string) []byte {\n\tmessagesBytes, err := json.Marshal(messages)\n\tif err != nil {\n\t\tlog.Fatal(err.Error())\n\t}\n\treturn messagesBytes\n}", "func (c *AppContext) Unmarshall(input interface{}) error {\n\tbytez, _ := ioutil.ReadAll(c.Body)\n\tif err := json.Unmarshal(bytez, input); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (b BuildpackBindingResourceCollection) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"nextLink\", b.NextLink)\n\tpopulate(objectMap, \"value\", b.Value)\n\treturn json.Marshal(objectMap)\n}", "func (d DynamicsAXLinkedService) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"annotations\", d.Annotations)\n\tpopulate(objectMap, \"connectVia\", d.ConnectVia)\n\tpopulate(objectMap, \"description\", d.Description)\n\tpopulate(objectMap, \"parameters\", d.Parameters)\n\tobjectMap[\"type\"] = \"DynamicsAX\"\n\tpopulate(objectMap, \"typeProperties\", d.TypeProperties)\n\tif d.AdditionalProperties != nil {\n\t\tfor key, val := range d.AdditionalProperties {\n\t\t\tobjectMap[key] = val\n\t\t}\n\t}\n\treturn json.Marshal(objectMap)\n}", "func (r ResponsysLinkedService) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"annotations\", r.Annotations)\n\tpopulate(objectMap, \"connectVia\", r.ConnectVia)\n\tpopulate(objectMap, \"description\", r.Description)\n\tpopulate(objectMap, \"parameters\", r.Parameters)\n\tobjectMap[\"type\"] = \"Responsys\"\n\tpopulate(objectMap, \"typeProperties\", r.TypeProperties)\n\tif r.AdditionalProperties != nil {\n\t\tfor key, val := range r.AdditionalProperties {\n\t\t\tobjectMap[key] = val\n\t\t}\n\t}\n\treturn json.Marshal(objectMap)\n}", "func (b BuildpackBindingResourceCollection) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"nextLink\", b.NextLink)\n\tpopulate(objectMap, \"value\", b.Value)\n\treturn json.Marshal(objectMap)\n}", "func writeAddOnsAddResponse(w http.ResponseWriter, r *AddOnsAddServerResponse) error {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(r.status)\n\terr := r.marshal(w)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (t TwilioLinkedService) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"annotations\", t.Annotations)\n\tpopulate(objectMap, \"connectVia\", t.ConnectVia)\n\tpopulate(objectMap, \"description\", t.Description)\n\tpopulate(objectMap, \"parameters\", t.Parameters)\n\tobjectMap[\"type\"] = \"Twilio\"\n\tpopulate(objectMap, \"typeProperties\", t.TypeProperties)\n\tif t.AdditionalProperties != nil {\n\t\tfor key, val := range t.AdditionalProperties {\n\t\t\tobjectMap[key] = val\n\t\t}\n\t}\n\treturn json.Marshal(objectMap)\n}", "func (a AmazonMWSLinkedService) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"annotations\", a.Annotations)\n\tpopulate(objectMap, \"connectVia\", a.ConnectVia)\n\tpopulate(objectMap, \"description\", a.Description)\n\tpopulate(objectMap, \"parameters\", a.Parameters)\n\tobjectMap[\"type\"] = \"AmazonMWS\"\n\tpopulate(objectMap, \"typeProperties\", a.TypeProperties)\n\tif a.AdditionalProperties != nil {\n\t\tfor key, val := range a.AdditionalProperties {\n\t\t\tobjectMap[key] = val\n\t\t}\n\t}\n\treturn json.Marshal(objectMap)\n}", "func unmarshalAddItemsPayload(ctx context.Context, service *goa.Service, req *http.Request) error {\n\tpayload := &addItemPayload{}\n\tif err := service.DecodeRequest(req, payload); err != nil {\n\t\treturn err\n\t}\n\tif err := payload.Validate(); err != nil {\n\t\t// Initialize payload with private data structure so it can be logged\n\t\tgoa.ContextRequest(ctx).Payload = payload\n\t\treturn err\n\t}\n\tgoa.ContextRequest(ctx).Payload = payload.Publicize()\n\treturn nil\n}", "func (r *marshalerRegistry) add(mime string, inbound, outbound Marshaler) error {\n\tif mime == \"\" {\n\t\treturn errors.New(\"empty MIME type\")\n\t}\n\t(*r)[mime] = &mimeMarshaler{\n\t\tinbound: inbound,\n\t\toutbound: outbound,\n\t}\n\treturn nil\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
GetOrder returns the value of the 'order' parameter and a flag indicating if the parameter has a value. Order criteria. The syntax of this parameter is similar to the syntax of the _order by_ clause of a SQL statement, but using the names of the attributes of the addon instead of the names of the columns of a table. For example, in order to sort the addons descending by name the value should be: [source,sql] name desc If the parameter isn't provided, or if the value is empty, then the order of the results is undefined.
func (r *AddOnsListServerRequest) GetOrder() (value string, ok bool) { ok = r != nil && r.order != nil if ok { value = *r.order } return }
[ "func (c *FGConfig) GetOrder() []int {\n\treturn c.Order\n}", "func (h API) GetOrder(w http.ResponseWriter, r *http.Request) {\n\torders, err := h.mod.GetOrderWithProduct(r.Context(), module.ReqFilterOrder{})\n\tif err != nil {\n\t\tlog.Printf(\"Error Get Order [%v]\\n\", err)\n\t\tinternal.ConstructRespError(w, http.StatusInternalServerError, \"Internal Server Error\")\n\t\treturn\n\t}\n\n\tinternal.ConstructRespSucces(w, \"orders\", orders)\n}", "func (s Set) GetOrder(ctx context.Context, a m_order.GetOrderRequest) (m_order.GetOrderResponse, error) {\n\tresp, err := s.GetOrderEndpoint(ctx, a)\n\tif err != nil {\n\t\treturn m_order.GetOrderResponse{}, err\n\t}\n\tresponse := resp.(m_order.GetOrderResponse)\n\treturn response, response.Err\n}", "func (h *Handler) GetOrder(w http.ResponseWriter, r *http.Request) {\n\tctx := r.Context()\n\tacc, err := acme.AccountFromContext(ctx)\n\tif err != nil {\n\t\tapi.WriteError(w, err)\n\t\treturn\n\t}\n\toid := chi.URLParam(r, \"ordID\")\n\to, err := h.Auth.GetOrder(ctx, acc.GetID(), oid)\n\tif err != nil {\n\t\tapi.WriteError(w, err)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Location\", h.Auth.GetLink(ctx, acme.OrderLink, true, o.GetID()))\n\tapi.JSON(w, o)\n}", "func (self *SelectManager) Order(expr interface{}) *SelectManager {\n\tif _, ok := expr.(string); ok {\n\t\texpr = nodes.Literal(expr)\n\t}\n\n\tself.Tree.Orders = append(self.Tree.Orders, expr)\n\treturn self\n}", "func (r *KeywordRegistry) GetKeywordOrder(prop string) int {\n\tif order, ok := r.keywordOrder[prop]; ok {\n\t\treturn order\n\t}\n\treturn 1\n}", "func GetOrder(w http.ResponseWriter, r *http.Request) {\n\n\tmuxVars := mux.Vars(r)\n\torderID := muxVars[\"id\"]\n\n\tquery := cqrs.NewQueryMessage(&domain_order.GetOrderQuery{OrderID: orderID})\n\n\terr := domain.QueryBus.Dispatch(query, &w)\n\tif err != nil {\n\t\thelpers.WriteErrorJSON(w, http.StatusInternalServerError, err.Error())\n\t\treturn\n\t}\n}", "func (m Market) GetOrderByID(orderID string) Order {\n\treturn m.Call(\"getOrderById\", orderID).Interface().(Order)\n}", "func GetCmdOrder(queryRoute string, cdc *codec.Codec) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"order [id]\",\n\t\tExample: \"order 1\",\n\t\tShort: \"Get order by id\",\n\t\tArgs: cobra.ExactArgs(1),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tctx := context.NewCLIContext().WithCodec(cdc)\n\n\t\t\t// parse inputs\n\t\t\torderID, err := helpers.ParseDnIDParam(\"id\", args[0], helpers.ParamTypeCliArg)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// prepare request\n\t\t\treq := types.OrderReq{\n\t\t\t\tID: orderID,\n\t\t\t}\n\n\t\t\tbz, err := ctx.Codec.MarshalJSON(req)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// query and parse the result\n\t\t\tres, _, err := ctx.QueryWithData(fmt.Sprintf(\"custom/%s/%s\", queryRoute, types.QueryOrder), bz)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tvar out types.Order\n\t\t\tcdc.MustUnmarshalJSON(res, &out)\n\n\t\t\treturn ctx.PrintOutput(out)\n\t\t},\n\t}\n\thelpers.BuildCmdHelp(cmd, []string{\n\t\t\"order ID [uint]\",\n\t})\n\n\treturn cmd\n}", "func (db *DB) GetOrder(nonce order.Nonce) (order.Order, error) {\n\tvar (\n\t\to order.Order\n\t\terr error\n\t\tcallback = func(nonce order.Nonce, rawOrder []byte,\n\t\t\textraData *extraOrderData) error {\n\n\t\t\tr := bytes.NewReader(rawOrder)\n\t\t\to, err = DeserializeOrder(nonce, r)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\ttlvReader := bytes.NewReader(extraData.tlvData)\n\t\t\terr = deserializeOrderTlvData(tlvReader, o)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// TODO(roasbeef): factory func to de-dup w/ all other\n\t\t\t// instances?\n\t\t\tif bidOrder, ok := o.(*order.Bid); ok {\n\t\t\t\tbidOrder.MinNodeTier = extraData.minNodeTier\n\t\t\t}\n\t\t\to.Details().MinUnitsMatch = extraData.minUnitsMatch\n\n\t\t\treturn nil\n\t\t}\n\t)\n\terr = db.View(func(tx *bbolt.Tx) error {\n\t\trootBucket, err := getBucket(tx, ordersBucketKey)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn fetchOrderTX(rootBucket, nonce, callback)\n\t})\n\treturn o, err\n}", "func OptionOrder(i []Identifier, o []Order) Option {\n\treturn Option{optionOrderByColumns: i, optionOrderByDirections: o}\n}", "func (o *Account) GetOrder() int32 {\n\tif o == nil || o.Order.Get() == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.Order.Get()\n}", "func (w *Warehouse) GetOrder(orderNumber int) (*models.Order, bool) {\n\tw.mutex.Lock()\n\tdefer w.mutex.Unlock()\n\torder, ok := w.Ids[orderNumber]\n\treturn order, ok\n}", "func (c GroupCurve) Order() *big.Int {\n\treturn c.ops.Params().N\n}", "func GetOrder(currentFloor uint, direction bool) (uint, bool) {\n\tif direction {\n\t\tif nextStop := checkUp(currentFloor, N_FLOORS); nextStop > 0 {\n\t\t\treturn nextStop, true\n\t\t} else if nextStop := checkDown(N_FLOORS, 1); nextStop > 0 {\n\t\t\treturn nextStop, false\n\t\t} else {\n\t\t\treturn checkUp(1, N_FLOORS), true\n\t\t}\n\t} else {\n\t\tif nextStop := checkDown(currentFloor, 1); nextStop > 0 {\n\t\t\treturn nextStop, false\n\t\t} else if nextStop := checkUp(1, N_FLOORS); nextStop > 0 {\n\t\t\treturn nextStop, true\n\t\t} else {\n\t\t\treturn checkDown(N_FLOORS, 1), false\n\t\t}\n\t}\n}", "func (o TagFieldOutput) Order() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v TagField) *int { return v.Order }).(pulumi.IntPtrOutput)\n}", "func (o *GetFolderFolderIDParams) SetOrder(order *string) {\n\to.Order = order\n}", "func GetCmdOrderList(queryRoute string, cdc *codec.Codec) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"orders [open/closed] [addr]\",\n\t\tShort: \"get order list\",\n\t\tArgs: cobra.ExactArgs(2),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tcliCtx := context.NewCLIContext().WithCodec(cdc)\n\t\t\tif args[0] != \"open\" && args[0] != \"closed\" {\n\t\t\t\treturn fmt.Errorf(fmt.Sprintf(\"order status should be open/closed\"))\n\t\t\t}\n\t\t\taddr := args[1]\n\t\t\tflags := cmd.Flags()\n\t\t\tproduct, errProduct := flags.GetString(\"product\")\n\t\t\tpage, errPage := flags.GetInt(\"page\")\n\t\t\tperPage, errPerPage := flags.GetInt(\"per-page\")\n\t\t\tstart, errST := flags.GetInt64(\"start\")\n\t\t\tend, errET := flags.GetInt64(\"end\")\n\t\t\tside, errSide := flags.GetString(\"side\")\n\t\t\thideNoFill, errHide := flags.GetBool(\"hideNoFill\")\n\n\t\t\tmError := types.NewErrorsMerged(errProduct, errST, errET, errPage, errPerPage, errSide, errHide)\n\t\t\tif mError != nil {\n\t\t\t\treturn mError\n\t\t\t}\n\n\t\t\tparams := types.NewQueryOrderListParams(\n\t\t\t\taddr, product, side, page, perPage, start, end, hideNoFill)\n\t\t\tbz, err := cdc.MarshalJSON(params)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tres, _, err := cliCtx.QueryWithData(fmt.Sprintf(\"custom/%s/%s/%s\", queryRoute, types.QueryOrderList, args[0]), bz)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Printf(\"failed to get %s order list of %s :%v\\n\", args[0], addr, err)\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tfmt.Println(string(res))\n\t\t\treturn nil\n\t\t},\n\t}\n\tcmd.Flags().StringP(\"product\", \"p\", \"\", \"filter orders by product\")\n\tcmd.Flags().IntP(\"page\", \"\", 1, \"page num\")\n\tcmd.Flags().IntP(\"per-page\", \"\", 50, \"items per page\")\n\tcmd.Flags().Int64P(\"start\", \"\", 0, \"start timestamp. if start and end is set to 0, it means ignoring time condition.\")\n\tcmd.Flags().Int64P(\"end\", \"\", 0, \"end timestamp. if start and end is set to 0, it means ignoring time condition.\")\n\tcmd.Flags().StringP(\"side\", \"\", \"\", \"filter deals by side, support SELL|BUY, default for empty string means all\")\n\tcmd.Flags().Bool(\"hideNoFill\", false, \"hide orders that have no fills\")\n\treturn cmd\n}", "func (s Status) Order() int {\n\tswitch s {\n\tcase Active:\n\t\treturn 0\n\tcase Released:\n\t\treturn 1\n\tcase Queued:\n\t\treturn 2\n\tdefault:\n\t\treturn 3\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
Page returns the value of the 'page' parameter. Index of the requested page, where one corresponds to the first page.
func (r *AddOnsListServerRequest) Page() int { if r != nil && r.page != nil { return *r.page } return 0 }
[ "func (r *UsersListServerRequest) Page() int {\n\tif r != nil && r.page != nil {\n\t\treturn *r.page\n\t}\n\treturn 0\n}", "func PageParam(ctx context.Context) int {\n\tpage, ok := ctx.Value(contextKeyPage).(int)\n\tif !ok {\n\t\treturn defaultPage\n\t}\n\n\treturn page\n}", "func (p *Paginate) Page(num int) Paginater {\n\tif num < 0 {\n\t\tnum = 0\n\t}\n\tp.currentPage = num\n\tp.current = num * p.pageSize\n\treturn p\n}", "func (r *Request) Page(page int) *Request {\n\tif page > 0 {\n\t\tr.page = page\n\t} else {\n\t\tr.page = 1\n\t}\n\treturn r\n}", "func (r *AddOnsListServerResponse) Page(value int) *AddOnsListServerResponse {\n\tr.page = &value\n\treturn r\n}", "func PageNumber(page string) int {\n\tnum := 1\n\tif len(page) > 0 {\n\t\tnum, _ = strconv.Atoi(page)\n\t}\n\treturn num\n}", "func (r *AddOnsListServerRequest) GetPage() (value int, ok bool) {\n\tok = r != nil && r.page != nil\n\tif ok {\n\t\tvalue = *r.page\n\t}\n\treturn\n}", "func getCurrentPage(r *http.Request, pageParam string) int {\n\tstrPage := r.URL.Query().Get(pageParam)\n\n\tif page, err := strconv.Atoi(strPage); err == nil {\n\t\treturn page\n\t}\n\n\treturn 1\n}", "func (o *SearchResultPage) GetPage() int32 {\n\tif o == nil || o.Page == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.Page\n}", "func (s *Setup) PageParser(params url.Values) (int, error) {\n\tnewPage := 1\n\tif params[\"page\"] != nil && params[\"page\"][0] != \"\" {\n\t\tnewPage, err := strconv.Atoi(params[\"page\"][0])\n\t\tif err != nil {\n\t\t\treturn newPage, err\n\t\t}\n\t\treturn newPage, nil\n\t}\n\n\treturn newPage, nil\n}", "func (input ArticleSearchInput) CurrentPage() int {\n\treturn input.Page\n}", "func (p *Paginate) CurrentPage() int {\n\treturn p.currentPage\n}", "func (ct *Cointop) CurrentPage() int {\n\tct.debuglog(\"currentPage()\")\n\treturn ct.State.page + 1\n}", "func (self *Pager) First() uint64 {\n\n\tif self.TotalEntries == 0 {\n\t\treturn 0\n\t} else {\n\t\treturn ((self.CurrentPage - 1) * self.EntryPerPage) + 1\n\t}\n}", "func GetPage(pager *Pager, pageNum uint32) *Page {\n\tif pageNum > TableMaxPages {\n\t\tfmt.Printf(\"page number out of bound: %v\\n\", pageNum)\n\t\tos.Exit(util.ExitFailure)\n\t}\n\n\tif pager.Pages[pageNum] == nil {\n\t\tvar page *Page = new(Page)\n\t\tvar numPages uint32 = uint32(pager.FileLength / PageSize)\n\t\t// Last page not fulled\n\t\tif pager.FileLength%PageSize != 0 {\n\t\t\tnumPages++\n\t\t}\n\n\t\tif pageNum <= numPages {\n\t\t\tvar fileOffSet int64 = int64(pageNum) * int64(PageSize)\n\t\t\tpager.FilePtr.Seek(fileOffSet, 0)\n\n\t\t\tvar restOfSize int64 = pager.FileLength - fileOffSet\n\t\t\tif restOfSize >= PageSize {\n\t\t\t\treadBytes, err := pager.FilePtr.Read(page.Mem[:])\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Printf(\"Error reading file: %s\\n\", err.Error())\n\t\t\t\t\tos.Exit(util.ExitFailure)\n\t\t\t\t}\n\n\t\t\t\tif readBytes != PageSize {\n\t\t\t\t\tfmt.Printf(\"Read Bytes %v not equal to PageSize(4kB)\\n\", readBytes)\n\t\t\t\t\tos.Exit(util.ExitFailure)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif restOfSize < PageSize {\n\t\t\t\treadBytes, err := pager.FilePtr.Read(page.Mem[:restOfSize])\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Printf(\"Error reading file: %s\\n\", err.Error())\n\t\t\t\t\tos.Exit(util.ExitFailure)\n\t\t\t\t}\n\n\t\t\t\tif int64(readBytes) != restOfSize {\n\t\t\t\t\tfmt.Printf(\"Read Bytes %v not equal to restOfSize %v\\n\", readBytes, restOfSize)\n\t\t\t\t\tos.Exit(util.ExitFailure)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tpager.Pages[pageNum] = page\n\n\t\tif pageNum >= pager.NumPages {\n\t\t\tpager.NumPages = pageNum + 1\n\t\t}\n\t}\n\n\treturn pager.Pages[pageNum]\n}", "func (server *HttpServer) IndexPage() string {\n\tif server.ServerConfig().IndexPage == \"\" {\n\t\treturn DefaultIndexPage\n\t} else {\n\t\treturn server.ServerConfig().IndexPage\n\t}\n}", "func (server *HttpServer) IndexPage() string {\n\tif server.ServerConfig.IndexPage == \"\" {\n\t\treturn DefaultIndexPage\n\t} else {\n\t\treturn server.ServerConfig.IndexPage\n\t}\n}", "func (fr FragmentRequest) GetESPage() int {\n\tif fr.GetPage() < 2 {\n\t\treturn 0\n\t}\n\treturn int((fr.GetPage() * FRAGMENT_SIZE) - 1)\n}", "func Page(page int) RequestOption {\n\treturn newRequestOption(func(r *http.Request) {\n\t\tq := r.URL.Query()\n\t\tq.Set(\"page\", strconv.FormatInt(int64(page), 10))\n\t\tr.URL.RawQuery = q.Encode()\n\t})\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
GetPage returns the value of the 'page' parameter and a flag indicating if the parameter has a value. Index of the requested page, where one corresponds to the first page.
func (r *AddOnsListServerRequest) GetPage() (value int, ok bool) { ok = r != nil && r.page != nil if ok { value = *r.page } return }
[ "func (o *SearchResultPage) GetPage() int32 {\n\tif o == nil || o.Page == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.Page\n}", "func GetPage(pager *Pager, pageNum uint32) *Page {\n\tif pageNum > TableMaxPages {\n\t\tfmt.Printf(\"page number out of bound: %v\\n\", pageNum)\n\t\tos.Exit(util.ExitFailure)\n\t}\n\n\tif pager.Pages[pageNum] == nil {\n\t\tvar page *Page = new(Page)\n\t\tvar numPages uint32 = uint32(pager.FileLength / PageSize)\n\t\t// Last page not fulled\n\t\tif pager.FileLength%PageSize != 0 {\n\t\t\tnumPages++\n\t\t}\n\n\t\tif pageNum <= numPages {\n\t\t\tvar fileOffSet int64 = int64(pageNum) * int64(PageSize)\n\t\t\tpager.FilePtr.Seek(fileOffSet, 0)\n\n\t\t\tvar restOfSize int64 = pager.FileLength - fileOffSet\n\t\t\tif restOfSize >= PageSize {\n\t\t\t\treadBytes, err := pager.FilePtr.Read(page.Mem[:])\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Printf(\"Error reading file: %s\\n\", err.Error())\n\t\t\t\t\tos.Exit(util.ExitFailure)\n\t\t\t\t}\n\n\t\t\t\tif readBytes != PageSize {\n\t\t\t\t\tfmt.Printf(\"Read Bytes %v not equal to PageSize(4kB)\\n\", readBytes)\n\t\t\t\t\tos.Exit(util.ExitFailure)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif restOfSize < PageSize {\n\t\t\t\treadBytes, err := pager.FilePtr.Read(page.Mem[:restOfSize])\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Printf(\"Error reading file: %s\\n\", err.Error())\n\t\t\t\t\tos.Exit(util.ExitFailure)\n\t\t\t\t}\n\n\t\t\t\tif int64(readBytes) != restOfSize {\n\t\t\t\t\tfmt.Printf(\"Read Bytes %v not equal to restOfSize %v\\n\", readBytes, restOfSize)\n\t\t\t\t\tos.Exit(util.ExitFailure)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tpager.Pages[pageNum] = page\n\n\t\tif pageNum >= pager.NumPages {\n\t\t\tpager.NumPages = pageNum + 1\n\t\t}\n\t}\n\n\treturn pager.Pages[pageNum]\n}", "func getCurrentPage(r *http.Request, pageParam string) int {\n\tstrPage := r.URL.Query().Get(pageParam)\n\n\tif page, err := strconv.Atoi(strPage); err == nil {\n\t\treturn page\n\t}\n\n\treturn 1\n}", "func PageParam(ctx context.Context) int {\n\tpage, ok := ctx.Value(contextKeyPage).(int)\n\tif !ok {\n\t\treturn defaultPage\n\t}\n\n\treturn page\n}", "func (this *PdfReader) GetPage(pageNumber int) (PdfObject, error) {\n\tif this.parser.crypter != nil && !this.parser.crypter.authenticated {\n\t\treturn nil, fmt.Errorf(\"File need to be decrypted first\")\n\t}\n\tif len(this.pageList) < pageNumber {\n\t\treturn nil, errors.New(\"Invalid page number (page count too short)\")\n\t}\n\tpage := this.pageList[pageNumber-1]\n\n\t// Look up all references related to page and load everything.\n\terr := this.traverseObjectData(page)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tLog.Debug(\"Page: %T %s\", page, page)\n\tLog.Debug(\"- %T %s\", page.PdfObject, page.PdfObject)\n\n\treturn page, nil\n}", "func (r *AddOnsListServerRequest) Page() int {\n\tif r != nil && r.page != nil {\n\t\treturn *r.page\n\t}\n\treturn 0\n}", "func getPaging(ctx context.Context) (int, int, error) {\n\trequest, err := getRequestFromContext(ctx)\n\tif err != nil {\n\t\treturn 0, 0, err\n\t}\n\tconst startName = \"start\"\n\tstart := request.QueryParameter(startName)\n\ts := 0\n\tif len(start) > 0 {\n\t\ts, err = strconv.Atoi(start)\n\t\tif err != nil {\n\t\t\treturn 0, 0, errors.ErrorParamTypeError.Format(startName, \"number\", \"string\")\n\t\t}\n\t}\n\tconst limitName = \"limit\"\n\tlimit := request.QueryParameter(limitName)\n\tl := common.DefaultPagingLimit\n\tif len(limit) > 0 {\n\t\tl, err = strconv.Atoi(limit)\n\t\tif err != nil {\n\t\t\treturn 0, 0, errors.ErrorParamTypeError.Format(limitName, \"number\", \"string\")\n\t\t}\n\t}\n\n\treturn s, l, nil\n}", "func (fr FragmentRequest) GetESPage() int {\n\tif fr.GetPage() < 2 {\n\t\treturn 0\n\t}\n\treturn int((fr.GetPage() * FRAGMENT_SIZE) - 1)\n}", "func PageNumber(page string) int {\n\tnum := 1\n\tif len(page) > 0 {\n\t\tnum, _ = strconv.Atoi(page)\n\t}\n\treturn num\n}", "func (r *UsersListServerRequest) Page() int {\n\tif r != nil && r.page != nil {\n\t\treturn *r.page\n\t}\n\treturn 0\n}", "func (b *BaseHandler) GetPaging(ctx *gin.Context) (int, int) {\n\toffset, _ := strconv.Atoi(ctx.DefaultQuery(\"offset\", \"0\"))\n\tlimit, _ := strconv.Atoi(ctx.DefaultQuery(\"limit\", \"20\"))\n\treturn offset, limit\n}", "func GetPage(id int64, uid int64) (Page, error) {\n\tp := Page{}\n\terr := db.Where(\"user_id=? and id=?\", uid, id).Find(&p).Error\n\tif err != nil {\n\t\tlog.Error(err)\n\t}\n\treturn p, err\n}", "func (s *Setup) PageParser(params url.Values) (int, error) {\n\tnewPage := 1\n\tif params[\"page\"] != nil && params[\"page\"][0] != \"\" {\n\t\tnewPage, err := strconv.Atoi(params[\"page\"][0])\n\t\tif err != nil {\n\t\t\treturn newPage, err\n\t\t}\n\t\treturn newPage, nil\n\t}\n\n\treturn newPage, nil\n}", "func (o *Node4) GetPageOk() (*PageType, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Page, true\n}", "func (repo *repositoryMem) GetPage(ctx context.Context, page int64, size int64) ([]*model.Order, error) {\n\tvar results []*model.Order\n\tfor _, elem := range repo.db.Data {\n\t\tresults = append(results, &elem)\n\t}\n\treturn results, nil\n}", "func (r *Request) Page(page int) *Request {\n\tif page > 0 {\n\t\tr.page = page\n\t} else {\n\t\tr.page = 1\n\t}\n\treturn r\n}", "func GetPagination(page int, start int, end int, rangeLimit int) (startLimit int, EndLimit int) {\n\tif page <= 0 {\n\t\tpage = 1\n\t}\n\tif start < 0 {\n\t\tstart = 0\n\t}\n\tif end < 0 {\n\t\tend = 1\n\t}\n\tif page == 1 {\n\t\tstart = 0\n\t}\n\tif rangeLimit < 1 {\n\t\trangeLimit = 1\n\t}\n\tswitch page {\n\tcase 1:\n\t\treturn start, end\n\tdefault:\n\t\treturn rangeLimit * (page - 1), rangeLimit\n\t}\n}", "func (r *AddOnsListServerResponse) Page(value int) *AddOnsListServerResponse {\n\tr.page = &value\n\treturn r\n}", "func (p *Paginate) Page(num int) Paginater {\n\tif num < 0 {\n\t\tnum = 0\n\t}\n\tp.currentPage = num\n\tp.current = num * p.pageSize\n\treturn p\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
Search returns the value of the 'search' parameter. Search criteria. The syntax of this parameter is similar to the syntax of the _where_ clause of an SQL statement, but using the names of the attributes of the addon instead of the names of the columns of a table. For example, in order to retrieve all the addons with a name starting with `my` the value should be: [source,sql] name like 'my%' If the parameter isn't provided, or if the value is empty, then all the addons that the user has permission to see will be returned.
func (r *AddOnsListServerRequest) Search() string { if r != nil && r.search != nil { return *r.search } return "" }
[ "func (r *RoleBindingsListServerRequest) Search() string {\n\tif r != nil && r.search != nil {\n\t\treturn *r.search\n\t}\n\treturn \"\"\n}", "func (q *DataQuery) Search(query string) *DataQuery {\n\tq.params.Add(\"search\", query)\n\treturn q\n}", "func Search(searchBy SearchKey, propertyName string, correlationid string) (*SearchResult, error) {\n\treq, err := client.NewJSONRequest(\n\t\tConfig,\n\t\t\"POST\",\n\t\t\"/papi/v1/search/find-by-value\",\n\t\tmap[string]string{(string)(searchBy): propertyName},\n\t)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tedge.PrintHttpRequestCorrelation(req, true, correlationid)\n\n\tres, err := client.Do(Config, req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tedge.PrintHttpResponseCorrelation(res, true, correlationid)\n\n\tif client.IsError(res) {\n\t\treturn nil, client.NewAPIError(res)\n\t}\n\n\tresults := &SearchResult{}\n\tif err = client.BodyJSON(res, results); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(results.Versions.Items) == 0 {\n\t\treturn nil, nil\n\t}\n\n\treturn results, nil\n}", "func Search(index, query string) {\n\ta.Get(index + \"/_search?q=\" + query)\n}", "func (r *QuotaSummaryListServerRequest) Search() string {\n\tif r != nil && r.search != nil {\n\t\treturn *r.search\n\t}\n\treturn \"\"\n}", "func (c *Client) Search(q string) (Result, error) {\n\tr := Result{}\n\td := url.Values{}\n\td.Set(\"action\", \"search\")\n\td.Set(\"q\", q)\n\n\terr := c.perform(d, &r)\n\tif err != nil {\n\t\treturn r, err\n\t}\n\n\treturn r, nil\n}", "func (o *GetProgramsParams) SetSearch(search *string) {\n\to.Search = search\n}", "func (m *Manager) Search(cn string) storage.Record {\n\treturn m.storage.Search(cn)\n}", "func Search(cfg Config, params SearchParameters) (queries.GamesResult, error) {\n\tvar gamesResult queries.GamesResult\n\tvar serialNumbers []string\n\n\tif params.Text != \"\" {\n\t\tresults, err := resultsFromIndex(cfg, params)\n\t\tif err != nil {\n\t\t\treturn gamesResult, err\n\t\t}\n\n\t\tif len(results.Hits) <= 0 {\n\t\t\treturn gamesResult, err\n\t\t}\n\n\t\tserialNumbers = getSerialNumbersFromGameHits(results.Hits)\n\t}\n\n\tgamesResult, err := gamesDetailsFromDatabase(cfg.Database, params, serialNumbers)\n\treturn gamesResult, err\n}", "func (r *AddOnsListServerRequest) GetSearch() (value string, ok bool) {\n\tok = r != nil && r.search != nil\n\tif ok {\n\t\tvalue = *r.search\n\t}\n\treturn\n}", "func NewSearch() *SearchParameters {\n\treturn &SearchParameters{parameters: make(map[string]string)}\n}", "func (c ChannelRepository) Search(search string) ([]models.ChannelModel, error) {\n\tvar channels []models.ChannelModel\n\tvar err error\n\tif err := app.DB.Where(\"name LIKE ?\", \"%\"+search+\"%\").Find(&channels).Error; err != nil {\n\t\treturn channels, err\n\t}\n\n\treturn channels, err\n}", "func (s *Searcher) Search(searched string) bool {\n\treturn searchEvaluator(s.tree, searched)\n}", "func (r *RoleBindingsListServerRequest) GetSearch() (value string, ok bool) {\n\tok = r != nil && r.search != nil\n\tif ok {\n\t\tvalue = *r.search\n\t}\n\treturn\n}", "func (a *client) Search(query string, params Parameters) ([]SearchResultStruct, *ErrorStruct) {\n\tparams.Set(\"access_token\", a.oauth.AccessToken)\n\tparams.Add(\"q\", query)\n\tresult := <-a.handler.addRequest(search, params)\n\n\tdec := json.NewDecoder(bytes.NewBuffer(result.body))\n\tif 200 <= result.statuscode && result.statuscode < 300 {\n\t\ttarget := []SearchResultStruct{}\n\t\tdec.Decode(&target)\n\t\treturn target, nil\n\t} else {\n\t\ttarget := ErrorStruct{}\n\t\tdec.Decode(&target)\n\t\treturn []SearchResultStruct{}, &target\n\t}\n\n\treturn []SearchResultStruct{}, &ErrorStruct{}\n}", "func (s *Storage) Search(param *string) []string {\n\tvar d crawler.Document\n\n\tres := make([]string, 0)\n\th := hash(strings.ToLower(*param))\n\tids := s.ind[h]\n\n\tfor _, id := range ids {\n\t\td = s.binarySearch(id, 0, len(s.docs))\n\t\tif d.ID != 0 {\n\t\t\tres = append(res, fmt.Sprintf(\"%d: %s (%s)\", d.ID, d.Title, d.URL))\n\t\t}\n\t}\n\n\treturn res\n}", "func (s *RoleQueryStrategy) Search(payload []byte) ([]core.Model, error) {\n\tvar params role\n\tif err := json.Unmarshal(payload, &params); err != nil {\n\t\treturn nil, errors.Wrap(err, \"Error deserializing payload\")\n\t}\n\n\trs := make([]*role, 0)\n\n\tquery := s.DB.Model(&rs)\n\n\tif params.ID != \"\" {\n\t\tquery = query.Where(\"id = ?\", params.ID)\n\t}\n\n\tif params.Name != \"\" {\n\t\tquery = query.Where(\"name ilike ?\", \"%\"+params.Name+\"%\")\n\t}\n\n\tif params.GroupID != \"\" {\n\t\tquery = query.Where(\"group_id = ?\", params.GroupID)\n\t}\n\n\tif err := query.Select(); err != nil {\n\t\treturn nil, err\n\t}\n\n\tresult := make([]core.Model, len(rs))\n\tfor i, r := range rs {\n\t\tresult[i] = core.Model(r)\n\t}\n\n\treturn result, nil\n}", "func (o *IntegrationsListParams) SetSearch(search *string) {\n\to.Search = search\n}", "func (r *QuotaSummaryListServerRequest) GetSearch() (value string, ok bool) {\n\tok = r != nil && r.search != nil\n\tif ok {\n\t\tvalue = *r.search\n\t}\n\treturn\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
GetSearch returns the value of the 'search' parameter and a flag indicating if the parameter has a value. Search criteria. The syntax of this parameter is similar to the syntax of the _where_ clause of an SQL statement, but using the names of the attributes of the addon instead of the names of the columns of a table. For example, in order to retrieve all the addons with a name starting with `my` the value should be: [source,sql] name like 'my%' If the parameter isn't provided, or if the value is empty, then all the addons that the user has permission to see will be returned.
func (r *AddOnsListServerRequest) GetSearch() (value string, ok bool) { ok = r != nil && r.search != nil if ok { value = *r.search } return }
[ "func (r *RoleBindingsListServerRequest) GetSearch() (value string, ok bool) {\n\tok = r != nil && r.search != nil\n\tif ok {\n\t\tvalue = *r.search\n\t}\n\treturn\n}", "func (r *QuotaSummaryListServerRequest) GetSearch() (value string, ok bool) {\n\tok = r != nil && r.search != nil\n\tif ok {\n\t\tvalue = *r.search\n\t}\n\treturn\n}", "func (r *AddOnsListServerRequest) Search() string {\n\tif r != nil && r.search != nil {\n\t\treturn *r.search\n\t}\n\treturn \"\"\n}", "func (r *RoleBindingsListServerRequest) Search() string {\n\tif r != nil && r.search != nil {\n\t\treturn *r.search\n\t}\n\treturn \"\"\n}", "func GetSearch(c *web.AppContext) {\n\tdbObject, err := service.GetSearch(c)\n\tdoRespond(c, dbObject, err)\n\tc.SD.Client.Inc(\"Get_Search\", 1, 1.0)\n}", "func SearchGet(key string) ([]interface{}, error) {\n\tmatchingKeys, matchingKeysErr := globalClient.Keys(key + \"*\").Result()\n\tif matchingKeysErr != nil {\n\t\treturn nil, matchingKeysErr\n\t}\n\tvalues, valueErr := globalClient.MGet(matchingKeys...).Result()\n\tif valueErr != nil {\n\t\treturn nil, valueErr\n\t}\n\treturn values, nil\n}", "func NewSearch() *SearchParameters {\n\treturn &SearchParameters{parameters: make(map[string]string)}\n}", "func (s *scraper) GetSearch(ctx context.Context, isin string) (*http.Request, error) {\n\turl := fmt.Sprintf(\"https://www.morningstar.it/it/funds/SecuritySearchResults.aspx?search=%s&type=\", isin)\n\treturn http.NewRequestWithContext(ctx, http.MethodGet, url, nil)\n}", "func (o *GetProgramsParams) SetSearch(search *string) {\n\to.Search = search\n}", "func (r *QuotaSummaryListServerRequest) Search() string {\n\tif r != nil && r.search != nil {\n\t\treturn *r.search\n\t}\n\treturn \"\"\n}", "func (q *DataQuery) Search(query string) *DataQuery {\n\tq.params.Add(\"search\", query)\n\treturn q\n}", "func get(c client, s *ldap.SearchRequest) (*ldap.SearchResult, error) {\n\tlog.Infof(\"searching ldap with query: %v\", s)\n\tresults, err := c.Search(s)\n\tif err != nil {\n\t\treturn results, err\n\t}\n\n\tlog.Infof(\"found: %v\", results)\n\treturn results, nil\n}", "func Search(index, query string) {\n\ta.Get(index + \"/_search?q=\" + query)\n}", "func Search(ctx context.Context, query string) (Results, error) {\n\t//Prepare the Google Search API request.\n\treq, err := http.NewRequest(\"GET\", \"https://ajax.googleapis.com/ajax/services/search/web?v=1.0\", nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tq := req.URL.Query()\n\tq.Set(\"q\", query)\n\n\t//If ctx is carrying\n}", "func (pm *MockPackageManager) Search(string) (bool, error) {\n\treturn true, nil\n}", "func (o *GetResourcesUsingGET2Params) SetSearch(search *string) {\n\to.Search = search\n}", "func Search(searchBy SearchKey, propertyName string, correlationid string) (*SearchResult, error) {\n\treq, err := client.NewJSONRequest(\n\t\tConfig,\n\t\t\"POST\",\n\t\t\"/papi/v1/search/find-by-value\",\n\t\tmap[string]string{(string)(searchBy): propertyName},\n\t)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tedge.PrintHttpRequestCorrelation(req, true, correlationid)\n\n\tres, err := client.Do(Config, req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tedge.PrintHttpResponseCorrelation(res, true, correlationid)\n\n\tif client.IsError(res) {\n\t\treturn nil, client.NewAPIError(res)\n\t}\n\n\tresults := &SearchResult{}\n\tif err = client.BodyJSON(res, results); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(results.Versions.Items) == 0 {\n\t\treturn nil, nil\n\t}\n\n\treturn results, nil\n}", "func (o *IntegrationsListParams) SetSearch(search *string) {\n\to.Search = search\n}", "func (c *Client) Search(q string) (Result, error) {\n\tr := Result{}\n\td := url.Values{}\n\td.Set(\"action\", \"search\")\n\td.Set(\"q\", q)\n\n\terr := c.perform(d, &r)\n\tif err != nil {\n\t\treturn r, err\n\t}\n\n\treturn r, nil\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
Items sets the value of the 'items' parameter. Retrieved list of addons.
func (r *AddOnsListServerResponse) Items(value *AddOnList) *AddOnsListServerResponse { r.items = value return r }
[ "func (_this *DataTransfer) Items() *DataTransferItemList {\n\tvar ret *DataTransferItemList\n\tvalue := _this.Value_JS.Get(\"items\")\n\tret = DataTransferItemListFromJS(value)\n\treturn ret\n}", "func (r *UsersListServerResponse) Items(value *UserList) *UsersListServerResponse {\n\tr.items = value\n\treturn r\n}", "func (r *RoleBindingsListServerResponse) Items(value *RoleBindingList) *RoleBindingsListServerResponse {\n\tr.items = value\n\treturn r\n}", "func (rb *FilterBuilder) Items(items ...string) *FilterBuilder {\n\trb.v.Items = items\n\treturn rb\n}", "func (r *QuotaSummaryListServerResponse) Items(value *QuotaSummaryList) *QuotaSummaryListServerResponse {\n\tr.items = value\n\treturn r\n}", "func (s *DataStore) Items() *ItemStore {\n\treturn &ItemStore{s}\n}", "func (o *SubscriptionListAllOf) SetItems(v []Subscription) {\n\to.Items = &v\n}", "func (s *DataStore) ItemItems() *ItemItemStore {\n\treturn &ItemItemStore{s}\n}", "func (env Env) GetAllItems(w http.ResponseWriter, r *http.Request) {\n\tJSONResponse(\"SUCCESS\", \"Implement to return food item list\", w)\n}", "func (c SyncCommand) Items(arg, data string) (items []alfred.Item, err error) {\n\t// TODO: Another option would be to \"learn\" the scenes by setting them\n\t// using group/0 and retrieving the light details. Afterwords use the light\n\t// details to set scenes.\n\n\tif err = refresh(); err != nil {\n\t\treturn\n\t}\n\n\titems = append(items, alfred.Item{\n\t\tTitle: \"Refreshed!\",\n\t})\n\n\treturn\n}", "func (o *IntegrationOrder) SetItems(v []IntegrationOrderItem) {\n\to.Items = &v\n}", "func (o CSIDriverListOutput) Items() CSIDriverTypeArrayOutput {\n\treturn o.ApplyT(func(v *CSIDriverList) CSIDriverTypeArrayOutput { return v.Items }).(CSIDriverTypeArrayOutput)\n}", "func (b *SchemaBuilder) Items(v Schema) *SchemaBuilder {\n\tb.lock.Lock()\n\tdefer b.lock.Unlock()\n\tif b.target == nil {\n\t\treturn b\n\t}\n\tb.target.items = v\n\treturn b\n}", "func (oi *OutlineItem) Items() []*OutlineItem {\n\treturn oi.Entries\n}", "func (l *IOTHubEnrichmentList) GetItems() []resource.Managed {\n\titems := make([]resource.Managed, len(l.Items))\n\tfor i := range l.Items {\n\t\titems[i] = &l.Items[i]\n\t}\n\treturn items\n}", "func (o *FacetCountData) SetItems(v []FacetCountItem) {\n\to.Items = &v\n}", "func (m *DriveItemRequestBuilder) Items()(*i40c8d5da7fc9a6217b6efac58c3740cd58572b63d41abf7ff231e644f35845bf.ItemsRequestBuilder) {\n return i40c8d5da7fc9a6217b6efac58c3740cd58572b63d41abf7ff231e644f35845bf.NewItemsRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "func NewItems(items *low.Items) *Items {\n\ti := new(Items)\n\ti.low = items\n\tif !items.Type.IsEmpty() {\n\t\ti.Type = items.Type.Value\n\t}\n\tif !items.Format.IsEmpty() {\n\t\ti.Format = items.Format.Value\n\t}\n\tif !items.Items.IsEmpty() {\n\t\ti.Items = NewItems(items.Items.Value)\n\t}\n\tif !items.CollectionFormat.IsEmpty() {\n\t\ti.CollectionFormat = items.CollectionFormat.Value\n\t}\n\tif !items.Default.IsEmpty() {\n\t\ti.Default = items.Default.Value\n\t}\n\tif !items.Maximum.IsEmpty() {\n\t\ti.Maximum = items.Maximum.Value\n\t}\n\tif !items.ExclusiveMaximum.IsEmpty() {\n\t\ti.ExclusiveMaximum = items.ExclusiveMaximum.Value\n\t}\n\tif !items.Minimum.IsEmpty() {\n\t\ti.Minimum = items.Minimum.Value\n\t}\n\tif !items.ExclusiveMinimum.IsEmpty() {\n\t\ti.ExclusiveMinimum = items.ExclusiveMinimum.Value\n\t}\n\tif !items.MaxLength.IsEmpty() {\n\t\ti.MaxLength = items.MaxLength.Value\n\t}\n\tif !items.MinLength.IsEmpty() {\n\t\ti.MinLength = items.MinLength.Value\n\t}\n\tif !items.Pattern.IsEmpty() {\n\t\ti.Pattern = items.Pattern.Value\n\t}\n\tif !items.MinItems.IsEmpty() {\n\t\ti.MinItems = items.MinItems.Value\n\t}\n\tif !items.MaxItems.IsEmpty() {\n\t\ti.MaxItems = items.MaxItems.Value\n\t}\n\tif !items.UniqueItems.IsEmpty() {\n\t\ti.UniqueItems = items.UniqueItems.Value\n\t}\n\tif !items.Enum.IsEmpty() {\n\t\tvar enums []any\n\t\tfor e := range items.Enum.Value {\n\t\t\tenums = append(enums, items.Enum.Value[e].Value)\n\t\t}\n\t\ti.Enum = enums\n\t}\n\tif !items.MultipleOf.IsEmpty() {\n\t\ti.MultipleOf = items.MultipleOf.Value\n\t}\n\treturn i\n}", "func ListItems() {\n\toffers, err := db.GetItems()\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t}\n\n\tif len(*offers) == 0 {\n\t\tfmt.Println(\"No offers saved yet :)\")\n\t}\n\n\tfor index, offer := range *offers {\n\t\tfmt.Println(fmt.Sprintf(\"%d. %s - (%s) %s \", index, offer.Name, offer.Price, offer.URL))\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
Page sets the value of the 'page' parameter. Index of the requested page, where one corresponds to the first page.
func (r *AddOnsListServerResponse) Page(value int) *AddOnsListServerResponse { r.page = &value return r }
[ "func (r *Request) Page(page int) *Request {\n\tif page > 0 {\n\t\tr.page = page\n\t} else {\n\t\tr.page = 1\n\t}\n\treturn r\n}", "func (p *Paginate) Page(num int) Paginater {\n\tif num < 0 {\n\t\tnum = 0\n\t}\n\tp.currentPage = num\n\tp.current = num * p.pageSize\n\treturn p\n}", "func (r *AddOnsListServerRequest) Page() int {\n\tif r != nil && r.page != nil {\n\t\treturn *r.page\n\t}\n\treturn 0\n}", "func (ct *Cointop) SetPage(page int) int {\n\tct.debuglog(\"setPage()\")\n\tif (page*ct.State.perPage) < ct.GetListCount() && page >= 0 {\n\t\tct.State.page = page\n\t}\n\treturn ct.State.page\n}", "func (r *UsersListServerRequest) Page() int {\n\tif r != nil && r.page != nil {\n\t\treturn *r.page\n\t}\n\treturn 0\n}", "func (o *SearchFoldersParams) SetPage(page *int64) {\n\to.Page = page\n}", "func (o *GetProductModelsParams) SetPage(page *int64) {\n\to.Page = page\n}", "func (o *GetProgramsParams) SetPage(page *int32) {\n\to.Page = page\n}", "func Page(page int) RequestOption {\n\treturn newRequestOption(func(r *http.Request) {\n\t\tq := r.URL.Query()\n\t\tq.Set(\"page\", strconv.FormatInt(int64(page), 10))\n\t\tr.URL.RawQuery = q.Encode()\n\t})\n}", "func (o *GetConsumersParams) SetPage(page *int32) {\n\to.Page = page\n}", "func PageParam(ctx context.Context) int {\n\tpage, ok := ctx.Value(contextKeyPage).(int)\n\tif !ok {\n\t\treturn defaultPage\n\t}\n\n\treturn page\n}", "func (o *GetAttachmentsParams) SetPage(page *int64) {\n\to.Page = page\n}", "func (o *FAXDeliveryReceiptAutomationsGetParams) SetPage(page *int32) {\n\to.Page = page\n}", "func (o *GetConversationitemsParams) SetPage(page string) {\n\to.Page = page\n}", "func PageNumber(page string) int {\n\tnum := 1\n\tif len(page) > 0 {\n\t\tnum, _ = strconv.Atoi(page)\n\t}\n\treturn num\n}", "func (s *Setup) PageParser(params url.Values) (int, error) {\n\tnewPage := 1\n\tif params[\"page\"] != nil && params[\"page\"][0] != \"\" {\n\t\tnewPage, err := strconv.Atoi(params[\"page\"][0])\n\t\tif err != nil {\n\t\t\treturn newPage, err\n\t\t}\n\t\treturn newPage, nil\n\t}\n\n\treturn newPage, nil\n}", "func Page(doc *rmtool.Document, pageID string, w io.Writer) error {\n\tc := DefaultContext()\n\treturn renderPage(c, doc, pageID, w)\n}", "func (o *GetRestapiV10DictionaryTimezoneParams) SetPage(page *string) {\n\to.Page = page\n}", "func (input ArticleSearchInput) CurrentPage() int {\n\treturn input.Page\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
marshall is the method used internally to marshal responses for the 'list' method.
func (r *AddOnsListServerResponse) marshal(writer io.Writer) error { var err error encoder := json.NewEncoder(writer) data := new(addOnsListServerResponseData) data.Items, err = r.items.wrap() if err != nil { return err } data.Page = r.page data.Size = r.size data.Total = r.total err = encoder.Encode(data) return err }
[ "func (r *RoleBindingsListServerResponse) marshal(writer io.Writer) error {\n\tvar err error\n\tencoder := json.NewEncoder(writer)\n\tdata := new(roleBindingsListServerResponseData)\n\tdata.Items, err = r.items.wrap()\n\tif err != nil {\n\t\treturn err\n\t}\n\tdata.Page = r.page\n\tdata.Size = r.size\n\tdata.Total = r.total\n\terr = encoder.Encode(data)\n\treturn err\n}", "func (s SBNamespaceListResult) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"nextLink\", s.NextLink)\n\tpopulate(objectMap, \"value\", s.Value)\n\treturn json.Marshal(objectMap)\n}", "func (s SBNamespaceListResult) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"nextLink\", s.NextLink)\n\tpopulate(objectMap, \"value\", s.Value)\n\treturn json.Marshal(objectMap)\n}", "func (client managementClient) listFilesystemsResponder(resp pipeline.Response) (pipeline.Response, error) {\n\terr := validateResponse(resp, http.StatusOK)\n\tif resp == nil {\n\t\treturn nil, err\n\t}\n\tresult := &ListFilesystemSchema{rawResponse: resp.Response()}\n\tif err != nil {\n\t\treturn result, err\n\t}\n\tdefer resp.Response().Body.Close()\n\tb, err := ioutil.ReadAll(resp.Response().Body)\n\tif err != nil {\n\t\treturn result, NewResponseError(err, resp.Response(), \"failed to read response body\")\n\t}\n\tif len(b) > 0 {\n\t\tb = removeBOM(b)\n\t\terr = json.Unmarshal(b, result)\n\t\tif err != nil {\n\t\t\treturn result, NewResponseError(err, resp.Response(), \"failed to unmarshal response body\")\n\t\t}\n\t}\n\treturn result, nil\n}", "func (s *Scrape) Unmarshall(data []byte) error {\n\ts.InfoHashes = make([]storage.Hash, (len(data)-16)/20)\n\treader := bytes.NewReader(data)\n\n\tif err := binary.Read(reader, binary.BigEndian, &s.ConnectionID); err != nil {\n\t\treturn errors.Wrap(err, \"failed to decode scrape connection id\")\n\t}\n\tif err := binary.Read(reader, binary.BigEndian, &s.Action); err != nil {\n\t\treturn errors.Wrap(err, \"failed to decode scrape action\")\n\t}\n\tif err := binary.Read(reader, binary.BigEndian, &s.TransactionID); err != nil {\n\t\treturn errors.Wrap(err, \"failed to decode scrape transaction id\")\n\t}\n\tif err := binary.Read(reader, binary.BigEndian, &s.InfoHashes); err != nil {\n\t\treturn errors.Wrap(err, \"failed to decode scrape infohashes\")\n\t}\n\n\treturn nil\n}", "func (client Client) ListResponder(resp *http.Response) (result List, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (d DataFlowListResponse) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"nextLink\", d.NextLink)\n\tpopulate(objectMap, \"value\", d.Value)\n\treturn json.Marshal(objectMap)\n}", "func (a AccessControlListsListResult) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"nextLink\", a.NextLink)\n\tpopulate(objectMap, \"value\", a.Value)\n\treturn json.Marshal(objectMap)\n}", "func ReturnList(r *http.Request, w http.ResponseWriter, listAllNumber, page int, list interface{}) {\n\tr = r.WithContext(context.WithValue(r.Context(), render.StatusCtxKey, http.StatusOK))\n\trender.DefaultResponder(w, r, ResponseBody{List: list, ListAllNumber: listAllNumber, Page: page})\n}", "func (rl *ResourceList) Marshal() ([]byte, error) {\n\t// return error when resource is empty.\n\tif len(*rl) == 0 {\n\t\treturn nil, common.ErrEmptyResource\n\t}\n\n\ttotalSize := rl.Size()\n\traw := make([]byte, totalSize)\n\n\tvar n int\n\tfor _, resource := range *rl {\n\t\tif resource == nil {\n\t\t\tcontinue\n\t\t}\n\t\tresourceByte, err := resource.Marshal()\n\t\tif err != nil {\n\t\t\treturn raw, err\n\t\t}\n\t\tn += copy(raw[n:], resourceByte)\n\t\tn += copy(raw[n:], deliRes)\n\t}\n\traw[n-len(deliRes)] = endByte\n\treturn raw[0 : n-len(deliRes)+1], nil\n}", "func (s SKUAvailabilityListResponse) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"nextLink\", s.NextLink)\n\tpopulate(objectMap, \"value\", s.Value)\n\treturn json.Marshal(objectMap)\n}", "func (client managementClient) listPathsResponder(resp pipeline.Response) (pipeline.Response, error) {\n\terr := validateResponse(resp, http.StatusOK)\n\tif resp == nil {\n\t\treturn nil, err\n\t}\n\tresult := &ListSchema{rawResponse: resp.Response()}\n\tif err != nil {\n\t\treturn result, err\n\t}\n\tdefer resp.Response().Body.Close()\n\tb, err := ioutil.ReadAll(resp.Response().Body)\n\tif err != nil {\n\t\treturn result, NewResponseError(err, resp.Response(), \"failed to read response body\")\n\t}\n\tif len(b) > 0 {\n\t\tb = removeBOM(b)\n\t\terr = json.Unmarshal(b, result)\n\t\tif err != nil {\n\t\t\treturn result, NewResponseError(err, resp.Response(), \"failed to unmarshal response body\")\n\t\t}\n\t}\n\treturn result, nil\n}", "func (srlr ScopedResourceListResult) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\treturn json.Marshal(objectMap)\n}", "func (p *Resource) BillingModelListAllHandler(req *restful.Request, resp *restful.Response) {\n\tlogrus.Infoln(\"BillingModelListAllHandler is called!\")\n\tvar skip int = queryIntParam(req, \"skip\", 0)\n\tvar limit int = queryIntParam(req, \"limit\", 0)\n\tsort := req.QueryParameter(\"sort\")\n\n\ttotal, bms, errorCode, err := services.GetBillingService().QueryAllBillingModels(skip, limit, sort)\n\tif err != nil {\n\t\tresponse.WriteStatusError(errorCode, err, resp)\n\t\treturn\n\t}\n\tres := response.QueryStruct{Success: true, Data: bms}\n\tif c, _ := strconv.ParseBool(req.QueryParameter(\"count\")); c {\n\t\tres.Count = total\n\t\tresp.AddHeader(\"X-Object-Count\", strconv.Itoa(total))\n\t}\n\tresp.WriteEntity(res)\n\treturn\n}", "func (client Client) ListResponder(resp *http.Response) (result Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (c *AppContext) Unmarshall(input interface{}) error {\n\tbytez, _ := ioutil.ReadAll(c.Body)\n\tif err := json.Unmarshal(bytez, input); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (m ManagedPrivateEndpointListResponse) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"nextLink\", m.NextLink)\n\tpopulate(objectMap, \"value\", m.Value)\n\treturn json.Marshal(objectMap)\n}", "func (a AvailableOperationsListResponse) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"nextLink\", a.NextLink)\n\tpopulate(objectMap, \"value\", a.Value)\n\treturn json.Marshal(objectMap)\n}", "func (d DedicatedCloudServiceListResponse) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"nextLink\", d.NextLink)\n\tpopulate(objectMap, \"value\", d.Value)\n\treturn json.Marshal(objectMap)\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
dispatchAddOns navigates the servers tree rooted at the given server till it finds one that matches the given set of path segments, and then invokes the corresponding server.
func dispatchAddOns(w http.ResponseWriter, r *http.Request, server AddOnsServer, segments []string) { if len(segments) == 0 { switch r.Method { case "POST": adaptAddOnsAddRequest(w, r, server) case "GET": adaptAddOnsListRequest(w, r, server) default: errors.SendMethodNotAllowed(w, r) return } } else { switch segments[0] { default: target := server.Addon(segments[0]) if target == nil { errors.SendNotFound(w, r) return } dispatchAddOn(w, r, target, segments[1:]) } } }
[ "func Dispatch(w http.ResponseWriter, r *http.Request, server Server, segments []string) {\n\tif len(segments) > 0 && segments[0] == \"api\" {\n\t\tdispatch(w, r, server, segments[1:])\n\t\treturn\n\t}\n\terrors.SendNotFound(w, r)\n}", "func dispatchUsers(w http.ResponseWriter, r *http.Request, server UsersServer, segments []string) {\n\tif len(segments) == 0 {\n\t\tswitch r.Method {\n\t\tcase \"POST\":\n\t\t\tadaptUsersAddRequest(w, r, server)\n\t\t\treturn\n\t\tcase \"GET\":\n\t\t\tadaptUsersListRequest(w, r, server)\n\t\t\treturn\n\t\tdefault:\n\t\t\terrors.SendMethodNotAllowed(w, r)\n\t\t\treturn\n\t\t}\n\t}\n\tswitch segments[0] {\n\tdefault:\n\t\ttarget := server.User(segments[0])\n\t\tif target == nil {\n\t\t\terrors.SendNotFound(w, r)\n\t\t\treturn\n\t\t}\n\t\tdispatchUser(w, r, target, segments[1:])\n\t}\n}", "func dispatchOrganization(w http.ResponseWriter, r *http.Request, server OrganizationServer, segments []string) {\n\tif len(segments) == 0 {\n\t\tswitch r.Method {\n\t\tcase \"GET\":\n\t\t\tadaptOrganizationGetRequest(w, r, server)\n\t\t\treturn\n\t\tcase \"PATCH\":\n\t\t\tadaptOrganizationUpdateRequest(w, r, server)\n\t\t\treturn\n\t\tdefault:\n\t\t\terrors.SendMethodNotAllowed(w, r)\n\t\t\treturn\n\t\t}\n\t}\n\tswitch segments[0] {\n\tcase \"labels\":\n\t\ttarget := server.Labels()\n\t\tif target == nil {\n\t\t\terrors.SendNotFound(w, r)\n\t\t\treturn\n\t\t}\n\t\tdispatchGenericLabels(w, r, target, segments[1:])\n\tcase \"quota_cost\":\n\t\ttarget := server.QuotaCost()\n\t\tif target == nil {\n\t\t\terrors.SendNotFound(w, r)\n\t\t\treturn\n\t\t}\n\t\tdispatchQuotaCost(w, r, target, segments[1:])\n\tcase \"quota_summary\":\n\t\ttarget := server.QuotaSummary()\n\t\tif target == nil {\n\t\t\terrors.SendNotFound(w, r)\n\t\t\treturn\n\t\t}\n\t\tdispatchQuotaSummary(w, r, target, segments[1:])\n\tcase \"resource_quota\":\n\t\ttarget := server.ResourceQuota()\n\t\tif target == nil {\n\t\t\terrors.SendNotFound(w, r)\n\t\t\treturn\n\t\t}\n\t\tdispatchResourceQuotas(w, r, target, segments[1:])\n\tcase \"summary_dashboard\":\n\t\ttarget := server.SummaryDashboard()\n\t\tif target == nil {\n\t\t\terrors.SendNotFound(w, r)\n\t\t\treturn\n\t\t}\n\t\tdispatchSummaryDashboard(w, r, target, segments[1:])\n\tdefault:\n\t\terrors.SendNotFound(w, r)\n\t\treturn\n\t}\n}", "func dispatchHandler(s *state) {\n\n\tif len(s.cmd) > 0 {\n\n\t\tif s.cmd[0] == '$' && !s.scripting {\n\t\t\ts.msg.Actor.SendBad(\"Unknown command, type HELP to get a list of commands\")\n\t\t\treturn\n\t\t}\n\n\t\t// Check the player stack for the command first\n\t\tif val, ok := s.actor.Menu[strings.ToLower(s.cmd)]; ok {\n\t\t\tlog.Println(\"Match\" + val.Command)\n\t\t\ts.scriptActor(val.Command, strings.Join(s.input, \" \"))\n\t\t\treturn\n\t\t}\n\t\ts.actor.EmptyMenu()\n\n\t\t// Check the room stack for a command second:\n\t\tif val, ok := s.where.Commands[s.cmd]; ok {\n\t\t\tlog.Println(\"Match\" + val.Command)\n\t\t\ts.scriptAll(val.Command, strings.Join(s.input, \" \"))\n\t\t\treturn\n\t\t}\n\n\t\tswitch handler, valid := handlers[s.cmd]; {\n\t\tcase valid:\n\t\t\thandler.process(s)\n\t\tdefault:\n\t\t\ts.msg.Actor.SendBad(\"Unknown command, type HELP to get a list of commands\")\n\t\t}\n\n\t}else{\n\t\ts.msg.Actor.SendBad(\"Unknown command, type HELP to get a list of commands\")\n\t}\n}", "func UA_Client_findServers(client []UA_Client, serverUrl []byte, serverUrisSize uint, serverUris []UA_String, localeIdsSize uint, localeIds []UA_String, registeredServersSize []uint, registeredServers [][]UA_ApplicationDescription) UA_StatusCode {\n\tvar connected UA_Boolean = UA_Boolean((int((map[bool]int{false: 0, true: 1}[uint32(client[0].state) > uint32(UA_CLIENTSTATE_DISCONNECTED)]))))\n\tif int((int((connected)))) != 0 && strncmp(client[0].endpointUrl.data, serverUrl, uint32((uint(client[0].endpointUrl.length)))) != 0 {\n\t\t// Client is already connected to a different server\n\t\treturn UA_StatusCode((uint32_t((uint32((uint32(2158690304)))))))\n\t}\n\tif int((int((noarch.NotUA_Boolean(UA_Boolean(connected)))))) != 0 {\n\t\tvar retval UA_StatusCode = UA_Client_connectInternal(client, serverUrl, 1, 0)\n\t\tif retval != UA_StatusCode((uint32_t((uint32((0)))))) {\n\t\t\treturn UA_StatusCode(retval)\n\t\t}\n\t}\n\tvar request UA_FindServersRequest\n\t// Prepare the request\n\tUA_FindServersRequest_init((*[100000000]UA_FindServersRequest)(unsafe.Pointer(&request))[:])\n\trequest.serverUrisSize = serverUrisSize\n\trequest.serverUris = serverUris\n\trequest.localeIdsSize = localeIdsSize\n\trequest.localeIds = localeIds\n\tvar response UA_FindServersResponse\n\t// Send the request\n\t__UA_Client_Service(client, (*[100000000]UA_FindServersRequest)(unsafe.Pointer(&request))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[145]))[:], (*[100000000]UA_FindServersResponse)(unsafe.Pointer(&response))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[194]))[:])\n\tvar retval UA_StatusCode = UA_StatusCode(response.responseHeader.serviceResult)\n\tif retval == UA_StatusCode((uint32_t((uint32((0)))))) {\n\t\t// Process the response\n\t\tregisteredServersSize[0] = uint(response.serversSize)\n\t\tregisteredServers[0] = response.servers\n\t\tresponse.serversSize = 0\n\t\tresponse.servers = nil\n\t} else {\n\t\tregisteredServersSize[0] = 0\n\t\tregisteredServers[0] = nil\n\t}\n\t// Clean up\n\tUA_FindServersResponse_deleteMembers((*[100000000]UA_FindServersResponse)(unsafe.Pointer(&response))[:])\n\tif int((int((noarch.NotUA_Boolean(UA_Boolean(connected)))))) != 0 {\n\t\tUA_Client_disconnect(client)\n\t}\n\treturn UA_StatusCode(retval)\n}", "func Server(pc *client.APIClient, port uint16) *http.Server {\n\trouter := mux.NewRouter()\n\trouter.Handle(`/`, newRootHandler(pc)).Methods(\"GET\", \"HEAD\")\n\n\t// Bucket-related routes. Repo validation regex is the same that the aws\n\t// cli uses. There's two routers - one with a trailing a slash and one\n\t// without. Both route to the same handlers, i.e. a request to `/foo` is\n\t// the same as `/foo/`. This is used instead of mux's builtin \"strict\n\t// slash\" functionality, because that uses redirects which doesn't always\n\t// play nice with s3 clients.\n\tbucketHandler := newBucketHandler(pc)\n\ttrailingSlashBucketRouter := router.Path(`/{branch:[a-zA-Z0-9\\-_]{1,255}}.{repo:[a-zA-Z0-9\\-_]{1,255}}/`).Subrouter()\n\tattachBucketRoutes(trailingSlashBucketRouter, bucketHandler)\n\tbucketRouter := router.Path(`/{branch:[a-zA-Z0-9\\-_]{1,255}}.{repo:[a-zA-Z0-9\\-_]{1,255}}`).Subrouter()\n\tattachBucketRoutes(bucketRouter, bucketHandler)\n\n\t// object-related routes\n\tobjectRouter := router.Path(`/{branch:[a-zA-Z0-9\\-_]{1,255}}.{repo:[a-zA-Z0-9\\-_]{1,255}}/{file:.+}`).Subrouter()\n\n\tobjectRouter.Methods(\"GET\", \"PUT\").Queries(\"acl\", \"\").HandlerFunc(notImplementedError)\n\tobjectRouter.Methods(\"GET\", \"PUT\").Queries(\"legal-hold\", \"\").HandlerFunc(notImplementedError)\n\tobjectRouter.Methods(\"GET\", \"PUT\").Queries(\"retention\", \"\").HandlerFunc(notImplementedError)\n\tobjectRouter.Methods(\"GET\", \"PUT\", \"DELETE\").Queries(\"tagging\", \"\").HandlerFunc(notImplementedError)\n\tobjectRouter.Methods(\"GET\").Queries(\"torrent\", \"\").HandlerFunc(notImplementedError)\n\tobjectRouter.Methods(\"POST\").Queries(\"restore\", \"\").HandlerFunc(notImplementedError)\n\tobjectRouter.Methods(\"POST\").Queries(\"select\", \"\").HandlerFunc(notImplementedError)\n\tobjectRouter.Methods(\"PUT\").Headers(\"x-amz-copy-source\", \"\").HandlerFunc(notImplementedError) // maybe worth implementing at some point\n\tobjectRouter.Methods(\"GET\", \"HEAD\").Queries(\"uploadId\", \"\").HandlerFunc(notImplementedError)\n\tobjectRouter.Methods(\"POST\").Queries(\"uploads\", \"\").HandlerFunc(notImplementedError)\n\tobjectRouter.Methods(\"POST\").Queries(\"uploadId\", \"\").HandlerFunc(notImplementedError)\n\tobjectRouter.Methods(\"PUT\").Queries(\"uploadId\", \"\").HandlerFunc(notImplementedError)\n\tobjectRouter.Methods(\"DELETE\").Queries(\"uploadId\", \"\").HandlerFunc(notImplementedError)\n\n\tobjectHandler := newObjectHandler(pc)\n\tobjectRouter.Methods(\"GET\", \"HEAD\").HandlerFunc(objectHandler.get)\n\tobjectRouter.Methods(\"PUT\").HandlerFunc(objectHandler.put)\n\tobjectRouter.Methods(\"DELETE\").HandlerFunc(objectHandler.del)\n\n\trouter.MethodNotAllowedHandler = http.HandlerFunc(methodNotAllowedError)\n\trouter.NotFoundHandler = http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\trequestLogger(r).Infof(\"not found: %+v\", r.URL.Path)\n\t\tif bucketNameValidator.MatchString(r.URL.Path) {\n\t\t\tnoSuchKeyError(w, r)\n\t\t} else {\n\t\t\tinvalidBucketNameError(w, r)\n\t\t}\n\t})\n\n\t// NOTE: this is not closed. If the standard logger gets customized, this will need to be fixed\n\tserverErrorLog := logrus.WithFields(logrus.Fields{\n\t\t\"source\": \"s3gateway\",\n\t}).Writer()\n\n\tvar lastEnterpriseCheck time.Time\n\tisEnterprise := false\n\n\treturn &http.Server{\n\t\tAddr: fmt.Sprintf(\":%d\", port),\n\t\tHandler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\t// Set a request ID, if it hasn't been set by the client already.\n\t\t\t// This can be used for tracing, and is included in error\n\t\t\t// responses.\n\t\t\trequestID := r.Header.Get(\"X-Request-ID\")\n\t\t\tif requestID == \"\" {\n\t\t\t\trequestID = uuid.NewWithoutDashes()\n\t\t\t\tr.Header.Set(\"X-Request-ID\", requestID)\n\t\t\t}\n\t\t\tw.Header().Set(\"x-amz-request-id\", requestID)\n\n\t\t\t// Log that a request was made\n\t\t\trequestLogger(r).Debugf(\"http request: %s %s\", r.Method, r.RequestURI)\n\n\t\t\t// Ensure enterprise is enabled\n\t\t\tnow := time.Now()\n\t\t\tif !isEnterprise || now.Sub(lastEnterpriseCheck) > enterpriseTimeout {\n\t\t\t\tresp, err := pc.Enterprise.GetState(context.Background(), &enterpriseclient.GetStateRequest{})\n\t\t\t\tif err != nil {\n\t\t\t\t\terr = fmt.Errorf(\"could not get Enterprise status: %v\", grpcutil.ScrubGRPC(err))\n\t\t\t\t\tinternalError(w, r, err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tisEnterprise = resp.State == enterpriseclient.State_ACTIVE\n\t\t\t}\n\t\t\tif !isEnterprise {\n\t\t\t\tenterpriseDisabledError(w, r)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\trouter.ServeHTTP(w, r)\n\t\t}),\n\t\tErrorLog: stdlog.New(serverErrorLog, \"\", 0),\n\t}\n}", "func (s *site) executeOnServers(ctx context.Context, servers []remoteServer, fn func(context.Context, remoteServer) error) error {\n\terrCh := make(chan error, len(servers))\n\n\t// this semaphore limits the number of operations running concurrently\n\tsemaphoreCh := make(chan int, defaults.MaxOperationConcurrency)\n\n\t// start a goroutine for each server, up to the defined concurrency level\n\tfor _, server := range servers {\n\t\tselect {\n\t\tcase semaphoreCh <- 1: // will block if the concurrency limit is reached\n\t\t\tgo func(ctx context.Context, server remoteServer) {\n\t\t\t\tdefer func() { <-semaphoreCh }()\n\t\t\t\terr := fn(ctx, server)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.WithError(err).Warn(\"Failed to execute operation.\")\n\t\t\t\t}\n\t\t\t\terrCh <- trace.Wrap(err)\n\t\t\t}(ctx, server)\n\t\tcase <-ctx.Done():\n\t\t\treturn trace.LimitExceeded(\"cancelled\")\n\t\t}\n\t}\n\n\t// now collect results from all goroutines\n\tvar errors []error\n\tfor i := 0; i < len(servers); i++ {\n\t\tselect {\n\t\tcase err := <-errCh:\n\t\t\terrors = append(errors, err)\n\t\tcase <-ctx.Done():\n\t\t\treturn trace.LimitExceeded(\"cancelled\")\n\t\t}\n\t}\n\n\treturn trace.NewAggregate(errors...)\n}", "func OnServers(f func() []string) {\n\tserverContextF = f\n}", "func UA_Server_browse(server []UA_Server, maxrefs UA_UInt32, descr []UA_BrowseDescription) UA_BrowseResult {\n\tvar result UA_BrowseResult\n\tUA_BrowseResult_init((*[100000000]UA_BrowseResult)(unsafe.Pointer(&result))[:])\n\tOperation_Browse(server, (*[100000000]UA_Session)(unsafe.Pointer(&adminSession))[:], (*[100000000]UA_UInt32)(unsafe.Pointer(&maxrefs))[:], descr, (*[100000000]UA_BrowseResult)(unsafe.Pointer(&result))[:])\n\treturn result\n}", "func dispatchRoleBindings(w http.ResponseWriter, r *http.Request, server RoleBindingsServer, segments []string) {\n\tif len(segments) == 0 {\n\t\tswitch r.Method {\n\t\tcase \"POST\":\n\t\t\tadaptRoleBindingsAddRequest(w, r, server)\n\t\tcase \"GET\":\n\t\t\tadaptRoleBindingsListRequest(w, r, server)\n\t\tdefault:\n\t\t\terrors.SendMethodNotAllowed(w, r)\n\t\t\treturn\n\t\t}\n\t} else {\n\t\tswitch segments[0] {\n\t\tdefault:\n\t\t\ttarget := server.RoleBinding(segments[0])\n\t\t\tif target == nil {\n\t\t\t\terrors.SendNotFound(w, r)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tdispatchRoleBinding(w, r, target, segments[1:])\n\t\t}\n\t}\n}", "func Match(method string, route string, handler interface{}) {\n\tmainServer.Match(route, method, handler)\n}", "func (m *MicroClientConn) InvokeServerID(ctx context.Context, ms, serverID string, cmdid uint64, req interface{}) (pkg *packets.CmdPacket, resp interface{}, err error) {\n\tfor _, v := range m.Micros {\n\t\tif v.Name == ms {\n\t\t\tpkg, resp, err = v.InvokeByServerID(ctx, serverID, cmdid, req)\n\t\t\treturn\n\t\t}\n\t}\n\terr = fmt.Errorf(\"No microservices found: %s\", ms)\n\treturn\n}", "func (n *NamingServiceServer) runHTTPServerForServiceLookup() {\n\tdefer n.listener.Close()\n\tlog.Printf(\"Running Lookup Endpoint on %s\\n\\n\", n.namnigServerAddr)\n\n\thttp.HandleFunc(\"/lookup/\", n.requestHandler.HandleLookupServices)\n\n\tserveErr := http.Serve(n.listener, nil)\n\tif serveErr != nil {\n\t\tlog.Fatal(serveErr.Error())\n\t}\n}", "func StartServer(handlers []RouteHandler) {\n\trouter := mux.NewRouter()\n\tfor _, handler := range handlers {\n\t\thandler.RegisterRoutes(router)\n\t}\n\tlog.Println(\"Starting HTTP server...\")\n\tlog.Fatal(http.ListenAndServe(\":8888\", router))\n}", "func Service_FindServers(server []UA_Server, session []UA_Session, request []UA_FindServersRequest, response []UA_FindServersResponse) {\n\tUA_LOG_DEBUG(UA_Logger(server[0].config.logger), UA_LOGCATEGORY_SESSION, []byte(\"Connection %i | SecureChannel %i | Session %08x-%04x-%04x-%02x%02x-%02x%02x%02x%02x%02x%02x | Processing FindServersRequest%.0s\\x00\"), (func() int {\n\t\tif (session)[0].header.channel != nil {\n\t\t\treturn (func() int {\n\t\t\t\tif (session)[0].header.channel[0].connection != nil {\n\t\t\t\t\treturn int((__int32_t((int32_t((UA_Int32((session)[0].header.channel[0].connection[0].sockfd)))))))\n\t\t\t\t}\n\t\t\t\treturn 0\n\t\t\t}())\n\t\t}\n\t\treturn 0\n\t}()), (func() uint32 {\n\t\tif (session)[0].header.channel != nil {\n\t\t\treturn uint32((uint32((uint32_t((UA_UInt32((session)[0].header.channel[0].securityToken.channelId)))))))\n\t\t}\n\t\treturn 0\n\t}()), UA_UInt32((*(session)[0].sessionId.identifier.guid()).data1), int(uint16((uint16((uint16_t((UA_UInt16((*(session)[0].sessionId.identifier.guid()).data2)))))))), int(uint16((uint16((uint16_t((UA_UInt16((*(session)[0].sessionId.identifier.guid()).data3)))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][0])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][1])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][2])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][3])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][4])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][5])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][6])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][7])))))))), []byte(\"\\x00\"))\n\tvar foundServersSize uint\n\tvar foundServers []UA_ApplicationDescription\n\tvar addSelf UA_Boolean\n\tvar foundServerFilteredPointer [][]UA_RegisteredServer\n\tif uint32((uint(request[0].serverUrisSize))) != 0 {\n\t\tvar fsfpSize uint = uint((8 * uint32((uint(server[0].registeredServersSize)))))\n\t\t// temporarily store all the pointers which we found to avoid reiterating\n\t\t// through the list\n\t\t// check if client only requested a specific set of servers\n\t\tfoundServerFilteredPointer = make([][]UA_RegisteredServer, fsfpSize*uint((1))/8)\n\t\tif foundServerFilteredPointer == nil {\n\t\t\tresponse[0].responseHeader.serviceResult = UA_StatusCode((uint32_t((uint32((uint32(2147680256)))))))\n\t\t\treturn\n\t\t}\n\t\t{\n\t\t\tvar i uint\n\t\t\tfor ; i < uint(request[0].serverUrisSize); i++ {\n\t\t\t\tif int((int((noarch.NotUA_Boolean(UA_Boolean(addSelf)))))) != 0 && int((int((UA_String_equal((*[100000000]UA_String)(unsafe.Pointer(&request[0].serverUris[i]))[:], (*[100000000]UA_String)(unsafe.Pointer(&server[0].config.applicationDescription.applicationUri))[:]))))) != 0 {\n\t\t\t\t\taddSelf = 1\n\t\t\t\t} else {\n\t\t\t\t\tvar current []registeredServer_list_entry\n\t\t\t\t\tfor current = ((*[100000000]registeredServer_list)(unsafe.Pointer(&server[0].registeredServers))[:])[0].lh_first; current != nil; current = (current)[0].pointers.le_next {\n\t\t\t\t\t\tif int((int((UA_String_equal((*[100000000]UA_String)(unsafe.Pointer(&current[0].registeredServer.serverUri))[:], (*[100000000]UA_String)(unsafe.Pointer(&request[0].serverUris[i]))[:]))))) != 0 {\n\t\t\t\t\t\t\tvar existing UA_Boolean\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tvar j uint\n\t\t\t\t\t\t\t\tfor ; j < foundServersSize; j++ {\n\t\t\t\t\t\t\t\t\tif int((int((UA_String_equal((*[100000000]UA_String)(unsafe.Pointer(&foundServerFilteredPointer[j][0].serverUri))[:], (*[100000000]UA_String)(unsafe.Pointer(&request[0].serverUris[i]))[:]))))) != 0 {\n\t\t\t\t\t\t\t\t\t\t// check if entry already in list:\n\t\t\t\t\t\t\t\t\t\texisting = 1\n\t\t\t\t\t\t\t\t\t\tbreak\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tif int((int((noarch.NotUA_Boolean(UA_Boolean(existing)))))) != 0 {\n\t\t\t\t\t\t\t\tfoundServerFilteredPointer[func() uint {\n\t\t\t\t\t\t\t\t\tdefer func() {\n\t\t\t\t\t\t\t\t\t\tfoundServersSize ++\n\t\t\t\t\t\t\t\t\t}()\n\t\t\t\t\t\t\t\t\treturn foundServersSize\n\t\t\t\t\t\t\t\t}()] = (*[100000000]UA_RegisteredServer)(unsafe.Pointer(&current[0].registeredServer))[:]\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tbreak\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tif int((int((UA_Boolean(addSelf))))) != 0 {\n\t\t\tfoundServersSize ++\n\t\t}\n\t} else {\n\t\taddSelf = 1\n\t\t// self + registered servers\n\t\tfoundServersSize = uint((1 + uint32((uint(server[0].registeredServersSize)))))\n\t}\n\tif uint32((uint(foundServersSize))) != 0 {\n\t\tvar fsSize uint = uint((120 * uint32((foundServersSize))))\n\t\tfoundServers = make([]UA_ApplicationDescription, fsSize*uint((1))/120)\n\t\tif foundServers == nil {\n\t\t\tif foundServerFilteredPointer != nil {\n\t\t\t\t_ = foundServerFilteredPointer\n\t\t\t}\n\t\t\tresponse[0].responseHeader.serviceResult = UA_StatusCode((uint32_t((uint32((uint32(2147680256)))))))\n\t\t\treturn\n\t\t}\n\t\tif int((int((UA_Boolean(addSelf))))) != 0 {\n\t\t\tresponse[0].responseHeader.serviceResult = setApplicationDescriptionFromServer((*[100000000]UA_ApplicationDescription)(unsafe.Pointer(&foundServers[0]))[:], server)\n\t\t\tif UA_StatusCode(response[0].responseHeader.serviceResult) != UA_StatusCode((uint32_t((uint32((0)))))) {\n\t\t\t\t_ = foundServers\n\t\t\t\tif foundServerFilteredPointer != nil {\n\t\t\t\t\t_ = foundServerFilteredPointer\n\t\t\t\t}\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tvar currentIndex uint\n\t\tif int((int((UA_Boolean(addSelf))))) != 0 {\n\t\t\tcurrentIndex ++\n\t\t}\n\t\tif foundServerFilteredPointer != nil {\n\t\t\tvar iterCount uint = uint((func() uint32 {\n\t\t\t\tif int((int((UA_Boolean(addSelf))))) != 0 {\n\t\t\t\t\treturn uint32((foundServersSize - uint((1))))\n\t\t\t\t}\n\t\t\t\treturn uint32((uint(foundServersSize)))\n\t\t\t}()))\n\t\t\t{\n\t\t\t\tvar i uint\n\t\t\t\tfor ; i < iterCount; i++ {\n\t\t\t\t\t// add all the registered servers to the list\n\t\t\t\t\t// use filtered list because client only requested specific uris\n\t\t\t\t\t// -1 because foundServersSize also includes this self server\n\t\t\t\t\tresponse[0].responseHeader.serviceResult = setApplicationDescriptionFromRegisteredServer(request, (*[100000000]UA_ApplicationDescription)(unsafe.Pointer(&foundServers[func() uint {\n\t\t\t\t\t\tdefer func() {\n\t\t\t\t\t\t\tcurrentIndex ++\n\t\t\t\t\t\t}()\n\t\t\t\t\t\treturn currentIndex\n\t\t\t\t\t}()]))[:], foundServerFilteredPointer[i])\n\t\t\t\t\tif UA_StatusCode(response[0].responseHeader.serviceResult) != UA_StatusCode((uint32_t((uint32((0)))))) {\n\t\t\t\t\t\t_ = foundServers\n\t\t\t\t\t\t_ = foundServerFilteredPointer\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\t_ = foundServerFilteredPointer\n\t\t\tfoundServerFilteredPointer = nil\n\t\t} else {\n\t\t\tvar current []registeredServer_list_entry\n\t\t\tfor current = ((*[100000000]registeredServer_list)(unsafe.Pointer(&server[0].registeredServers))[:])[0].lh_first; current != nil; current = (current)[0].pointers.le_next {\n\t\t\t\tresponse[0].responseHeader.serviceResult = setApplicationDescriptionFromRegisteredServer(request, (*[100000000]UA_ApplicationDescription)(unsafe.Pointer(&foundServers[func() uint {\n\t\t\t\t\tdefer func() {\n\t\t\t\t\t\tcurrentIndex ++\n\t\t\t\t\t}()\n\t\t\t\t\treturn currentIndex\n\t\t\t\t}()]))[:], (*[100000000]UA_RegisteredServer)(unsafe.Pointer(&current[0].registeredServer))[:])\n\t\t\t\tif UA_StatusCode(response[0].responseHeader.serviceResult) != UA_StatusCode((uint32_t((uint32((0)))))) {\n\t\t\t\t\t_ = foundServers\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tif foundServerFilteredPointer != nil {\n\t\t_ = foundServerFilteredPointer\n\t}\n\tresponse[0].servers = foundServers\n\tresponse[0].serversSize = foundServersSize\n}", "func UA_Server_call(server []UA_Server, request []UA_CallMethodRequest) UA_CallMethodResult {\n\tvar result UA_CallMethodResult\n\tUA_CallMethodResult_init((*[100000000]UA_CallMethodResult)(unsafe.Pointer(&result))[:])\n\tOperation_CallMethod(server, (*[100000000]UA_Session)(unsafe.Pointer(&adminSession))[:], nil, request, (*[100000000]UA_CallMethodResult)(unsafe.Pointer(&result))[:])\n\treturn result\n}", "func (mgr *HandlerManager) callHandlers(gvr schema.GroupVersionResource, resController *ClusterWatcher, rw *ResourceWatcher, eventData *eventHandlerData) error {\n\tif logger.IsEnabled(LogTypeEntry) {\n\t\tlogger.Log(CallerName(), LogTypeEntry, fmt.Sprintf(\"callHandlers entry %s %v\\n\", gvr, eventData))\n\t}\n\thandler := mgr.handlers[gvr]\n\t// TODO: can this be done better? For now, We just accumulate one error and log the rest\n\tvar err error\n\tif handler != nil {\n\t\tif handler.primaryHandler != nil {\n\t\t\tif resController.isEventPermitted(eventData) {\n\t\t\t\t// Kinds: Application, CustomResourceDefinition, or KAppNav\n\t\t\t\t// Call batchApplicationHandler, CRDNewHandler, or KAppNavHandler\n\t\t\t\terr1 := (*handler.primaryHandler)(resController, rw, eventData)\n\t\t\t\tif err1 != nil {\n\t\t\t\t\terr = err1\n\t\t\t\t\tif logger.IsEnabled(LogTypeError) {\n\t\t\t\t\t\tlogger.Log(CallerName(), LogTypeError, fmt.Sprintf(\"Error calling primary handler for gvr %s, error: %s\", gvr, err))\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\t// Kinds: Deployment or StatefulSet\n\t\t\t// Call namespaceFilterHandler > batchResourceHandler\n\t\t\terr2 := (*mgr.defaultPrimaryHandler)(resController, rw, eventData)\n\t\t\tif err2 != nil {\n\t\t\t\terr = err2\n\t\t\t\tif logger.IsEnabled(LogTypeError) {\n\t\t\t\t\tlogger.Log(CallerName(), LogTypeError, fmt.Sprintf(\"Error calling default primary handler for gvr %s, error: %s\", gvr, err))\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tif resController.isEventPermitted(eventData) {\n\t\t\t// Kinds: Deployment or StatefulSet\n\t\t\t// Call all other handlers (currently only autoCreateAppHandler and autoCreateKAMHandler)\n\t\t\tfor _, otherHandler := range handler.otherHandlers {\n\t\t\t\terr3 := (*otherHandler)(resController, rw, eventData)\n\t\t\t\tif err3 != nil {\n\t\t\t\t\terr = err3\n\t\t\t\t\tif logger.IsEnabled(LogTypeError) {\n\t\t\t\t\t\tlogger.Log(CallerName(), LogTypeError, fmt.Sprintf(\"Error calling other handler for gvr %s, error: %s\", gvr, err))\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t} else {\n\t\t// Kinds: Application componentKinds that are NOT one of the following:\n\t\t// Application, CustomResourceDefinition, Deployment or StatefulSet\n\t\t// Call namespaceFilterHandler > batchResourceHandler\n\t\terr4 := (*mgr.defaultPrimaryHandler)(resController, rw, eventData)\n\t\tif err4 != nil {\n\t\t\terr = err4\n\t\t\tif logger.IsEnabled(LogTypeError) {\n\t\t\t\tlogger.Log(CallerName(), LogTypeError, fmt.Sprintf(\"Error calling default primary handler for gvr %s, error: %s\", gvr, err))\n\t\t\t}\n\t\t}\n\t}\n\tif logger.IsEnabled(LogTypeExit) {\n\t\tlogger.Log(CallerName(), LogTypeExit, fmt.Sprintf(\"%v\\n\", err))\n\n\t}\n\treturn err\n}", "func loadHandlers(selConfig *SelectionConfig) {\n\troutes := map[string] http.Handler {\n\t\t\"/elevator/\" : elevatorHandler(selConfig),\n\t}\n\n\tfor pattern, handler := range routes {\n\t\thttp.Handle(pattern, handler)\n\t}\n}", "func runServerWrapMiddle(hostport, path string, middle gin.HandlerFunc) error {\n\trouter := gin.Default()\n\trouter.Use(middle)\n\trouter.POST(path, echo)\n\n\treturn router.Run(hostport)\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
readAddOnsAddRequest reads the given HTTP requests and translates it into an object of type AddOnsAddServerRequest.
func readAddOnsAddRequest(r *http.Request) (*AddOnsAddServerRequest, error) { var err error result := new(AddOnsAddServerRequest) err = result.unmarshal(r.Body) if err != nil { return nil, err } return result, err }
[ "func readAddOnsListRequest(r *http.Request) (*AddOnsListServerRequest, error) {\n\tvar err error\n\tresult := new(AddOnsListServerRequest)\n\tquery := r.URL.Query()\n\tresult.order, err = helpers.ParseString(query, \"order\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresult.page, err = helpers.ParseInteger(query, \"page\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif result.page == nil {\n\t\tresult.page = helpers.NewInteger(1)\n\t}\n\tresult.search, err = helpers.ParseString(query, \"search\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresult.size, err = helpers.ParseInteger(query, \"size\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif result.size == nil {\n\t\tresult.size = helpers.NewInteger(100)\n\t}\n\treturn result, err\n}", "func readRoleBindingsAddRequest(r *http.Request) (*RoleBindingsAddServerRequest, error) {\n\tvar err error\n\tresult := new(RoleBindingsAddServerRequest)\n\terr = result.unmarshal(r.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result, err\n}", "func (r *AddOnsAddServerRequest) unmarshal(reader io.Reader) error {\n\tvar err error\n\tdecoder := json.NewDecoder(reader)\n\tdata := new(addOnData)\n\terr = decoder.Decode(data)\n\tif err != nil {\n\t\treturn err\n\t}\n\tr.body, err = data.unwrap()\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn err\n}", "func adaptAddOnsAddRequest(w http.ResponseWriter, r *http.Request, server AddOnsServer) {\n\trequest, err := readAddOnsAddRequest(r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := new(AddOnsAddServerResponse)\n\tresponse.status = 201\n\terr = server.Add(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeAddOnsAddResponse(w, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func adaptAddOnsListRequest(w http.ResponseWriter, r *http.Request, server AddOnsServer) {\n\trequest, err := readAddOnsListRequest(r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := new(AddOnsListServerResponse)\n\tresponse.status = 200\n\terr = server.List(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeAddOnsListResponse(w, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func (s *Service) readRequest(r io.Reader) (*internal.Request, error) {\n\t// Read request length.\n\tvar n uint32\n\tif err := binary.Read(r, binary.BigEndian, &n); err != nil {\n\t\treturn nil, fmt.Errorf(\"read request length: %s\", err)\n\t}\n\n\t// Read body.\n\tbuf := make([]byte, n)\n\tif _, err := io.ReadFull(r, buf); err != nil {\n\t\treturn nil, fmt.Errorf(\"read request: %s\", err)\n\t}\n\n\t// Unmarshal request.\n\treq := &internal.Request{}\n\tif err := proto.Unmarshal(buf, req); err != nil {\n\t\treturn nil, fmt.Errorf(\"unmarshal request: %s\", err)\n\t}\n\n\treturn req, nil\n}", "func (s *ExecutionResultUpdateService) ExtractFromRequest(r *http.Request) ([]tasking.ExecutionResult, error) {\n\tb, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"can't read input data: %v, err: %v\", string(b), err)\n\t}\n\tdefer func() {\n\t\terr := r.Body.Close()\n\t\tif err != nil {\n\t\t\tlogger.Log.WarnfCtx(r.Context(), \"cannot close request.Body err: %s\", err)\n\t\t}\n\t}()\n\n\tlogger.Log.DebugfCtx(r.Context(), \"ExecutionResultUpdateService: received payload '%s' from %v\", string(b), r.URL.String())\n\n\t// decode input data\n\tvar results []tasking.ExecutionResult\n\tif err = json.Unmarshal(b, &results); err != nil {\n\t\t// try to decode into old format\n\t\tvar res tasking.ExecutionResult\n\t\tif err = json.Unmarshal(b, &res); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"can't decode input data: %v, err: %v\", string(b), err)\n\t\t}\n\t\tresults = append(results, res)\n\t}\n\n\tfor _, res := range results {\n\t\tif err = validator.ValidateByCustomValidators(res); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"can't validate input data: %v, err: %v\", string(b), err)\n\t\t}\n\t}\n\treturn results, nil\n}", "func (proxy ItemProxy) ReadRequests() ([]RequestInfo, *Error) {\n\tvar result = make([]RequestInfo, 0)\n\n\trows, err := proxy.DB.Query(\"SELECT id, item_id, (remote = b'1'), response_status, response_time, request_date, remote_response_time, remote_response_status FROM request\")\n\n\tif err != nil {\n\t\treturn nil, NewError(\n\t\t\t\"service_unavailable\",\n\t\t\t\"Unable to retrieve requests data\",\n\t\t\t503,\n\t\t)\n\t}\n\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\t\tvar aux RequestInfo\n\n\t\terr = rows.Scan(&aux.ID, &aux.ItemID, &aux.Remote, &aux.ResponseStatus, &aux.ResponseTime, &aux.RequestDate, &aux.RemoteResponseTime, &aux.RemoteResponseStatus)\n\n\t\tif err != nil {\n\t\t\treturn nil, UnknownError()\n\t\t}\n\n\t\tresult = append(result, aux)\n\t}\n\treturn result, nil\n}", "func parseRequest(msg []string) Request {\n rJson := map[string]interface{}{}\n json.Unmarshal([]byte(msg[1]), &rJson)\n req := Request {\n ClientId: msg[0],\n Id: rJson[\"id\"].(string),\n Method: rJson[\"method\"].(string),\n Args: rJson[\"args\"].([]interface{}),\n }\n return req\n}", "func (m *Message) ReadRequest(br *bufio.Reader) error {\n\tdec := m.getDecoder(br)\n\tdefer dec.Reset(empty_) /* Unwire the stream, help the GC. */\n\treturn dec.DecodeMulti(&m.Type,&m.Id,&m.Exp,&m.Payload)\n}", "func (a *API) ReadRequest(req *http.Request, throwErr bool) error {\n\ta.RequestMethod = req.Method\n\ta.RequestPath = strings.Split(a.getRequestURI(req), \"?\")[0]\n\tif err := a.ReadRequestHeader(req.Header); err != nil {\n\t\tif throwErr {\n\t\t\treturn err\n\t\t}\n\t\tlog.Println(err)\n\t}\n\tif err := a.ReadRequestURLParams(a.getRequestURI(req)); err != nil {\n\t\tif throwErr {\n\t\t\treturn err\n\t\t}\n\t\tlog.Println(err)\n\t}\n\tif err := a.ReadRequestBody(req); err != nil {\n\t\tif throwErr {\n\t\t\treturn err\n\t\t}\n\t\tlog.Println(err)\n\t}\n\treturn nil\n}", "func readRequest(req *http.Request, pb proto.Message) error {\n\tcompressed, err := ioutil.ReadAll(req.Body)\n\tif err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\tdst := *snappyPool.Get().(*[]byte)\n\tdst = dst[:cap(dst)]\n\tb, err := snappy.Decode(dst, compressed)\n\tif err == nil {\n\t\terr = proto.Unmarshal(b, pb)\n\t}\n\tsnappyPool.Put(&b)\n\treturn errors.WithStack(err)\n}", "func (p *plugin) readRequest() error {\n\tdata, err := ioutil.ReadAll(p.in)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to read marshaled request from input: %s\", err.Error())\n\t}\n\n\tif err = proto.Unmarshal(data, p.request); err != nil {\n\t\treturn fmt.Errorf(\"failed to unmarshal request from binary data: %s\", err.Error())\n\t}\n\n\t// TODO: enable code bellow if you need to echo input data to stdin.bin file - it is used for debugging\n\t// ioutil.WriteFile(\"./stdin.bin\", data, 0)\n\n\treturn nil\n}", "func readRoleBindingUpdateRequest(r *http.Request) (*RoleBindingUpdateServerRequest, error) {\n\tvar err error\n\tresult := new(RoleBindingUpdateServerRequest)\n\terr = result.unmarshal(r.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result, err\n}", "func readRoleBindingsListRequest(r *http.Request) (*RoleBindingsListServerRequest, error) {\n\tvar err error\n\tresult := new(RoleBindingsListServerRequest)\n\tquery := r.URL.Query()\n\tresult.page, err = helpers.ParseInteger(query, \"page\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif result.page == nil {\n\t\tresult.page = helpers.NewInteger(1)\n\t}\n\tresult.search, err = helpers.ParseString(query, \"search\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresult.size, err = helpers.ParseInteger(query, \"size\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif result.size == nil {\n\t\tresult.size = helpers.NewInteger(100)\n\t}\n\treturn result, err\n}", "func parseClientRequest(r io.Reader) (*request, error) {\n\tvar hdr [4]byte\n\t_, err := io.ReadFull(r, hdr[:])\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not read packet header\")\n\t}\n\tcmd := hdr[1]\n\tdestAddrType := addrType(hdr[3])\n\n\tvar destination string\n\tvar port uint16\n\n\tif destAddrType == ipv4 {\n\t\tvar ip [4]byte\n\t\t_, err = io.ReadFull(r, ip[:])\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not read IPv4 address\")\n\t\t}\n\t\tdestination = net.IP(ip[:]).String()\n\t} else if destAddrType == domainName {\n\t\tvar dstSizeByte [1]byte\n\t\t_, err = io.ReadFull(r, dstSizeByte[:])\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not read domain name size\")\n\t\t}\n\t\tdstSize := int(dstSizeByte[0])\n\t\tdomainName := make([]byte, dstSize)\n\t\t_, err = io.ReadFull(r, domainName)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not read domain name\")\n\t\t}\n\t\tdestination = string(domainName)\n\t} else if destAddrType == ipv6 {\n\t\tvar ip [16]byte\n\t\t_, err = io.ReadFull(r, ip[:])\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not read IPv6 address\")\n\t\t}\n\t\tdestination = net.IP(ip[:]).String()\n\t} else {\n\t\treturn nil, fmt.Errorf(\"unsupported address type\")\n\t}\n\tvar portBytes [2]byte\n\t_, err = io.ReadFull(r, portBytes[:])\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not read port\")\n\t}\n\tport = binary.BigEndian.Uint16(portBytes[:])\n\n\treturn &request{\n\t\tcommand: commandType(cmd),\n\t\tdestination: destination,\n\t\tport: port,\n\t\tdestAddrType: destAddrType,\n\t}, nil\n}", "func parseRequest(config *Config, r *http.Request) (requests []*types.Request, count int, err error) {\n\t// decode request\n\terr = json.NewDecoder(r.Body).Decode(&requests)\n\tif err != nil {\n\t\treturn nil, 0, api.NewError(http.StatusBadRequest, MsgDecodeRequest).\n\t\t\tSetInternal(err)\n\t}\n\n\tcount = len(requests)\n\n\t// check counts of requests\n\tif count > config.MaxURls {\n\t\treturn nil, 0, api.NewError(http.StatusRequestEntityTooLarge, MsgLargeRequest)\n\t}\n\n\treturn\n}", "func NewAddAnnotationsRequestFromReader(reader io.Reader) (*AddAnnotationsRequest, error) {\n\tvar addAnnotationsRequest AddAnnotationsRequest\n\terr := json.NewDecoder(reader).Decode(&addAnnotationsRequest)\n\tif err != nil && err != io.EOF {\n\t\treturn nil, errors.Wrap(err, \"failed to decode add annotations request\")\n\t}\n\n\treturn &addAnnotationsRequest, nil\n}", "func decodeAddContactRequest(_ context.Context, r *http.Request) (request interface{}, err error) {\n\tvar req contacts.AddContactRequest\n\tif e := json.NewDecoder(r.Body).Decode(&req); e != nil {\n\t\treturn nil, e\n\t}\n\treturn req, nil\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
writeAddOnsAddResponse translates the given request object into an HTTP response.
func writeAddOnsAddResponse(w http.ResponseWriter, r *AddOnsAddServerResponse) error { w.Header().Set("Content-Type", "application/json") w.WriteHeader(r.status) err := r.marshal(w) if err != nil { return err } return nil }
[ "func writeAddOnsListResponse(w http.ResponseWriter, r *AddOnsListServerResponse) error {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(r.status)\n\terr := r.marshal(w)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func adaptAddOnsAddRequest(w http.ResponseWriter, r *http.Request, server AddOnsServer) {\n\trequest, err := readAddOnsAddRequest(r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := new(AddOnsAddServerResponse)\n\tresponse.status = 201\n\terr = server.Add(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeAddOnsAddResponse(w, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func writeRoleBindingsAddResponse(w http.ResponseWriter, r *RoleBindingsAddServerResponse) error {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(r.status)\n\terr := r.marshal(w)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func writeResponse(w http.ResponseWriter, res Response) {\n\tif res.Error != nil {\n\t\tlog.Error(w, res.Error)\n\t}\n\n\tif res.Certificate != nil {\n\t\tapi.LogCertificate(w, res.Certificate)\n\t}\n\n\tw.Header().Set(\"Content-Type\", contentHeader(res))\n\t_, _ = w.Write(res.Data)\n}", "func WriteResponse(w http.ResponseWriter, httpStatus int, data model.GlobalResponse) {\n\tdata.Timestamp = time.Now()\n\tjs, err := json.MarshalIndent(data, \"\", \" \")\n\tif err != nil {\n\t\tlog.Error(\"Could not marshal http write data: \", data)\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// Set response content type\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(httpStatus)\n\tw.Write(js)\n\treturn\n}", "func (r *ServiceRouter) WriteResponse(encoderFactory EncoderFactory, response interface{}, request *http.Request, responseWriter http.ResponseWriter) error {\n\trequestContentType := request.Header.Get(\"Content-Type\")\n\tresponseContentType := getContentTypeOrJSONContentType(requestContentType)\n\tencoder := encoderFactory.Create(responseWriter)\n\tresponseWriter.Header().Set(\"Content-Type\", responseContentType)\n\terr := encoder.Encode(response)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to encode response %v, due to %v\", response, err)\n\t}\n\treturn nil\n}", "func WriteResponse(w http.ResponseWriter, status int, payload interface{}) {\n\tw.Header().Add(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(status)\n\t_ = json.NewEncoder(w).Encode(payload)\n}", "func writeResponse(w http.ResponseWriter, contentType string, encode bool, obj interface{}) {\n\tif contentType != \"\" {\n\t\tw.Header().Set(contentTypeHeader, contentType)\n\t}\n\n\tvar body []byte\n\tvar err error = errInternal\n\n\tswitch t := obj.(type) {\n\tcase []*x509.Certificate:\n\t\tbody, err = encodePKCS7CertsOnly(t)\n\n\tcase *x509.Certificate:\n\t\tbody, err = encodePKCS7CertsOnly([]*x509.Certificate{t})\n\n\tcase CSRAttrs:\n\t\tbody, err = t.Marshal()\n\n\tcase []byte:\n\t\tbody, err = t, nil\n\t}\n\n\tif err != nil {\n\t\terrInternal.Write(w)\n\t\treturn\n\t}\n\n\tif encode {\n\t\tw.Header().Set(transferEncodingHeader, encodingTypeBase64)\n\t\tbody = base64Encode(body)\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\tw.Write(body)\n}", "func EncodeEditResponse(encoder func(context.Context, http.ResponseWriter) goahttp.Encoder) func(context.Context, http.ResponseWriter, interface{}) error {\n\treturn func(ctx context.Context, w http.ResponseWriter, v interface{}) error {\n\t\tw.WriteHeader(http.StatusNoContent)\n\t\treturn nil\n\t}\n}", "func EncodeAddResponse(ctx context.Context, v interface{}, hdr, trlr *metadata.MD) (interface{}, error) {\n\tresult, ok := v.(string)\n\tif !ok {\n\t\treturn nil, goagrpc.ErrInvalidType(\"organization\", \"add\", \"string\", v)\n\t}\n\tresp := NewAddResponse(result)\n\treturn resp, nil\n}", "func EncodeAddParrotResponse(encoder func(context.Context, http.ResponseWriter) goahttp.Encoder) func(context.Context, http.ResponseWriter, interface{}) error {\n\treturn func(ctx context.Context, w http.ResponseWriter, v interface{}) error {\n\t\tres := v.(int)\n\t\tenc := encoder(ctx, w)\n\t\tbody := res\n\t\tw.WriteHeader(http.StatusCreated)\n\t\treturn enc.Encode(body)\n\t}\n}", "func writeHTTPResponse(rw http.ResponseWriter, response *http.Response) error {\n\n\t//TODO add support for Trailers https://golang.org/src/net/http/httputil/reverseproxy.go?s=3318:3379#L276\n\n\t//Set all response headers in the response writer\n\tfor key, values := range response.Header {\n\t\trw.Header()[key] = values\n\t}\n\n\trw.WriteHeader(response.StatusCode)\n\n\t//Close the body before returning\n\tdefer response.Body.Close()\n\t_, err := io.Copy(rw, response.Body)\n\n\treturn err\n}", "func (service *Service) writeEventListResponse(w http.ResponseWriter, evens []*Event, code int) {\n\tresponse := &EventListResponse{evens}\n\tdata, err := json.Marshal(response)\n\n\tif err != nil {\n\t\tif service.logger != nil {\n\t\t\tservice.logger.Errorf(\"Service.writeEventListResponse, marshal response error %s\", err)\n\t\t}\n\t\tw.WriteHeader(500)\n\t\t_, writeErr := w.Write([]byte(\"internal server error\"))\n\t\tif writeErr != nil && service.logger != nil {\n\t\t\tservice.logger.Errorf(\"Service.writeEventListResponse, write `internal server error` error %s\", err)\n\t\t}\n\t\treturn\n\t}\n\n\tw.WriteHeader(code)\n\t_, writeErr := w.Write(data)\n\tif writeErr != nil && service.logger != nil {\n\t\tservice.logger.Errorf(\"Service.writeEventListResponse, write `EventListResponse` error %s\", err)\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n}", "func WriteResponse(handler string, w http.ResponseWriter, v []byte, ct string, status int) {\n\t// Header must be set before status is written\n\tif len(v) > 0 {\n\t\tw.Header().Set(\"Content-Type\", ct)\n\t}\n\n\t// Header and status must be written before content is written\n\tw.WriteHeader(status)\n\tif len(v) > 0 {\n\t\tif _, err := w.Write(v); err != nil {\n\t\t\tLogAndReturnError(handler, http.StatusInternalServerError, err, w)\n\t\t}\n\t}\n}", "func writeOkResponse(w http.ResponseWriter, msg string, data interface{}) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\tjson.NewEncoder(w).Encode(response{\n\t\tStatus: \"OK\",\n\t\tMsg: msg,\n\t\tData: data,\n\t})\n}", "func WritePostAPIResponse(ctx context.Context, w http.ResponseWriter, r *http.Request, resourceLocation string, err error) {\n\tif err != nil {\n\t\tcoreerror := getCoreError(ctx, err)\n\t\t//write error message\n\t\tw.WriteHeader(coreerror.ErrorType)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tjson.NewEncoder(w).Encode(coreerror)\n\t} else {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.Header().Set(\"Location\", resourceLocation)\n\t}\n}", "func EncodeUpdateResponse(encoder func(context.Context, http.ResponseWriter) goahttp.Encoder) func(context.Context, http.ResponseWriter, interface{}) error {\n\treturn func(ctx context.Context, w http.ResponseWriter, v interface{}) error {\n\t\tres := v.(*usersviews.StoredUser)\n\t\tenc := encoder(ctx, w)\n\t\tbody := NewUpdateResponseBody(res.Projected)\n\t\tw.WriteHeader(http.StatusOK)\n\t\treturn enc.Encode(body)\n\t}\n}", "func (s *serverRequest) WriteResponse(w http.ResponseWriter, reply interface{}) {\n\twithCodec(func(c *Codec) error {\n\t\tw.Header().Set(\"Content-Type\", \"text/xml; charset=utf-8\")\n\t\tzw := newCompressor(w, s.header)\n\t\tc.writeResponse(zw, reply)\n\t\tif closer, _ := zw.(*compressWriter); closer != nil {\n\t\t\tcloser.Close()\n\t\t}\n\t\treturn nil\n\t})\n}", "func adaptAddOnsListRequest(w http.ResponseWriter, r *http.Request, server AddOnsServer) {\n\trequest, err := readAddOnsListRequest(r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := new(AddOnsListServerResponse)\n\tresponse.status = 200\n\terr = server.List(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeAddOnsListResponse(w, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
adaptAddOnsAddRequest translates the given HTTP request into a call to the corresponding method of the given server. Then it translates the results returned by that method into an HTTP response.
func adaptAddOnsAddRequest(w http.ResponseWriter, r *http.Request, server AddOnsServer) { request, err := readAddOnsAddRequest(r) if err != nil { glog.Errorf( "Can't read request for method '%s' and path '%s': %v", r.Method, r.URL.Path, err, ) errors.SendInternalServerError(w, r) return } response := new(AddOnsAddServerResponse) response.status = 201 err = server.Add(r.Context(), request, response) if err != nil { glog.Errorf( "Can't process request for method '%s' and path '%s': %v", r.Method, r.URL.Path, err, ) errors.SendInternalServerError(w, r) return } err = writeAddOnsAddResponse(w, response) if err != nil { glog.Errorf( "Can't write response for method '%s' and path '%s': %v", r.Method, r.URL.Path, err, ) return } }
[ "func adaptAddOnsListRequest(w http.ResponseWriter, r *http.Request, server AddOnsServer) {\n\trequest, err := readAddOnsListRequest(r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := new(AddOnsListServerResponse)\n\tresponse.status = 200\n\terr = server.List(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeAddOnsListResponse(w, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func adaptUsersAddRequest(w http.ResponseWriter, r *http.Request, server UsersServer) {\n\trequest := &UsersAddServerRequest{}\n\terr := readUsersAddRequest(request, r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := &UsersAddServerResponse{}\n\tresponse.status = 201\n\terr = server.Add(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeUsersAddResponse(response, w)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func adaptRoleBindingsAddRequest(w http.ResponseWriter, r *http.Request, server RoleBindingsServer) {\n\trequest, err := readRoleBindingsAddRequest(r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := new(RoleBindingsAddServerResponse)\n\tresponse.status = 201\n\terr = server.Add(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeRoleBindingsAddResponse(w, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func adaptOrganizationUpdateRequest(w http.ResponseWriter, r *http.Request, server OrganizationServer) {\n\trequest := &OrganizationUpdateServerRequest{}\n\terr := readOrganizationUpdateRequest(request, r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := &OrganizationUpdateServerResponse{}\n\tresponse.status = 200\n\terr = server.Update(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeOrganizationUpdateResponse(response, w)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func Adapt(rh fasthttp.RequestHandler, adapters ...Adapter) fasthttp.RequestHandler {\n\tfor _, adapter := range adapters {\n\t\t// rh diventa un RequestHandler con funzionalità estesa da adapter\n\t\trh = adapter(rh)\n\t}\n\n\treturn rh\n}", "func adaptOrganizationGetRequest(w http.ResponseWriter, r *http.Request, server OrganizationServer) {\n\trequest := &OrganizationGetServerRequest{}\n\terr := readOrganizationGetRequest(request, r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := &OrganizationGetServerResponse{}\n\tresponse.status = 200\n\terr = server.Get(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeOrganizationGetResponse(response, w)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func dispatchAddOns(w http.ResponseWriter, r *http.Request, server AddOnsServer, segments []string) {\n\tif len(segments) == 0 {\n\t\tswitch r.Method {\n\t\tcase \"POST\":\n\t\t\tadaptAddOnsAddRequest(w, r, server)\n\t\tcase \"GET\":\n\t\t\tadaptAddOnsListRequest(w, r, server)\n\t\tdefault:\n\t\t\terrors.SendMethodNotAllowed(w, r)\n\t\t\treturn\n\t\t}\n\t} else {\n\t\tswitch segments[0] {\n\t\tdefault:\n\t\t\ttarget := server.Addon(segments[0])\n\t\t\tif target == nil {\n\t\t\t\terrors.SendNotFound(w, r)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tdispatchAddOn(w, r, target, segments[1:])\n\t\t}\n\t}\n}", "func Adapt(handler http.Handler, adapters ...Adapter) http.Handler {\n\tfor _, adapter := range adapters {\n\t\thandler = adapter(handler)\n\t}\n\treturn handler\n}", "func adaptHandler(handler func(*admission_v1beta1.AdmissionReview) *admission_v1beta1.AdmissionResponse) func(http.ResponseWriter, *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tvar body []byte\n\t\tif r.Body != nil {\n\t\t\tif data, err := ioutil.ReadAll(r.Body); err == nil {\n\t\t\t\tbody = data\n\t\t\t}\n\t\t}\n\n\t\tif len(body) == 0 {\n\t\t\thttp.Error(w, \"empty body\", http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\tmediaType, _, err := mime.ParseMediaType(r.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\thttp.Error(w, \"Invalid content-type\", http.StatusUnsupportedMediaType)\n\t\t\treturn\n\t\t}\n\n\t\tif mediaType != \"application/json\" {\n\t\t\thttp.Error(w, \"invalid Content-Type, expect `application/json`\", http.StatusUnsupportedMediaType)\n\t\t\treturn\n\t\t}\n\n\t\tvar admissionResponse *admission_v1beta1.AdmissionResponse\n\t\tar := admission_v1beta1.AdmissionReview{}\n\t\tif _, _, err := deserializer.Decode(body, nil, &ar); err != nil {\n\t\t\tadmissionResponse = &admission_v1beta1.AdmissionResponse{\n\t\t\t\tResult: &meta_v1.Status{\n\t\t\t\t\tMessage: err.Error(),\n\t\t\t\t},\n\t\t\t}\n\t\t} else {\n\t\t\tadmissionResponse = handler(&ar)\n\t\t}\n\n\t\tadmissionReview := admission_v1beta1.AdmissionReview{}\n\t\tif admissionResponse != nil {\n\t\t\tadmissionReview.Response = admissionResponse\n\t\t\tif ar.Request != nil {\n\t\t\t\tadmissionReview.Response.UID = ar.Request.UID\n\t\t\t}\n\t\t}\n\n\t\tresp, err := json.Marshal(admissionReview)\n\t\tif err != nil {\n\t\t\thttp.Error(w, fmt.Sprintf(\"could not encode response: %v\", err), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\t\tif _, err := w.Write(resp); err != nil {\n\t\t\thttp.Error(w, fmt.Sprintf(\"could not write response: %v\", err), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t}\n}", "func adaptHandlerFunc(fn func(w http.ResponseWriter, r *http.Request)) chainHandler {\n\treturn adaptHandler(http.HandlerFunc(fn))\n}", "func AdaptFunc(h func(w http.ResponseWriter, r *http.Request), a ...Adapter) http.Handler {\n\treturn Adapt(http.HandlerFunc(h), a...)\n}", "func (srv *BenchmarkServer) OnRequest(\n\tctx context.Context,\n\t_ wwr.Connection,\n\tmsg wwr.Message,\n) (response wwr.Payload, err error) {\n\t// Reply to the request using the same data and encoding\n\treturn wwr.Payload{\n\t\tEncoding: msg.PayloadEncoding(),\n\t\tData: msg.Payload(),\n\t}, nil\n}", "func adaptRoleBindingGetRequest(w http.ResponseWriter, r *http.Request, server RoleBindingServer) {\n\trequest, err := readRoleBindingGetRequest(r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := new(RoleBindingGetServerResponse)\n\tresponse.status = 200\n\terr = server.Get(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeRoleBindingGetResponse(w, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func (b *BaseService) Adapt(mw ...Adapter) { b.mw = mw }", "func adaptRoleBindingsListRequest(w http.ResponseWriter, r *http.Request, server RoleBindingsServer) {\n\trequest, err := readRoleBindingsListRequest(r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := new(RoleBindingsListServerResponse)\n\tresponse.status = 200\n\terr = server.List(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeRoleBindingsListResponse(w, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func adaptUsersListRequest(w http.ResponseWriter, r *http.Request, server UsersServer) {\n\trequest := &UsersListServerRequest{}\n\terr := readUsersListRequest(request, r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := &UsersListServerResponse{}\n\tresponse.status = 200\n\terr = server.List(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeUsersListResponse(response, w)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func InstrumentHttpClientRequest(observers []prometheus.ObserverVec, next http.RoundTripper, clientRequestLabelFuncs ...HttpClientRequestLabelFunc) promhttp.RoundTripperFunc {\n\treturn promhttp.RoundTripperFunc(func(r *http.Request) (*http.Response, error) {\n\t\tstart := time.Now()\n\t\tresp, err := next.RoundTrip(r)\n\t\tif err == nil {\n\t\t\tclientRequestLabelFunc := defaultMetricsHttpClientRequestLabelFunc\n\t\t\tif len(clientRequestLabelFuncs) > 0 {\n\t\t\t\tclientRequestLabelFunc = clientRequestLabelFuncs[0]\n\t\t\t}\n\t\t\tfor _, obs := range observers {\n\t\t\t\tlabels := clientRequestLabelFunc(obs, r, resp)\n\t\t\t\tobs.With(labels).Observe(time.Since(start).Seconds())\n\t\t\t}\n\t\t}\n\t\treturn resp, err\n\t})\n}", "func adaptHandler(h http.Handler) chainHandler {\n\treturn func(ctx *Context) http.Handler {\n\t\treturn h\n\t}\n}", "func readAddOnsAddRequest(r *http.Request) (*AddOnsAddServerRequest, error) {\n\tvar err error\n\tresult := new(AddOnsAddServerRequest)\n\terr = result.unmarshal(r.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result, err\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
readAddOnsListRequest reads the given HTTP requests and translates it into an object of type AddOnsListServerRequest.
func readAddOnsListRequest(r *http.Request) (*AddOnsListServerRequest, error) { var err error result := new(AddOnsListServerRequest) query := r.URL.Query() result.order, err = helpers.ParseString(query, "order") if err != nil { return nil, err } result.page, err = helpers.ParseInteger(query, "page") if err != nil { return nil, err } if result.page == nil { result.page = helpers.NewInteger(1) } result.search, err = helpers.ParseString(query, "search") if err != nil { return nil, err } result.size, err = helpers.ParseInteger(query, "size") if err != nil { return nil, err } if result.size == nil { result.size = helpers.NewInteger(100) } return result, err }
[ "func readAddOnsAddRequest(r *http.Request) (*AddOnsAddServerRequest, error) {\n\tvar err error\n\tresult := new(AddOnsAddServerRequest)\n\terr = result.unmarshal(r.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result, err\n}", "func adaptAddOnsListRequest(w http.ResponseWriter, r *http.Request, server AddOnsServer) {\n\trequest, err := readAddOnsListRequest(r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := new(AddOnsListServerResponse)\n\tresponse.status = 200\n\terr = server.List(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeAddOnsListResponse(w, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func adaptAddOnsAddRequest(w http.ResponseWriter, r *http.Request, server AddOnsServer) {\n\trequest, err := readAddOnsAddRequest(r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := new(AddOnsAddServerResponse)\n\tresponse.status = 201\n\terr = server.Add(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeAddOnsAddResponse(w, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func (cl *Transport)requestList(method, path string, body io.Reader, headers map[string]string) (j []string, err error) {\n\n fpath := cl.dsn + \"/\" + path\n\n req, err := http.NewRequest(method, fpath, body)\n\n if err != nil {\n return j, err\n }\n\n cl.addHeader(req, headers)\n\n resp, err := cl.http.Do(req)\n\n if err != nil {\n return j, err\n }\n\n if resp.StatusCode == 304 {\n // If-None-Match\n err = CouchdbError{\n fpath, method,\n \"None modify\",\n \"This document is not modified\",\n }\n return j, err\n }\n\n if resp.StatusCode > 400 {\n err = CouchdbError{\n fpath, method,\n string(resp.StatusCode),\n \"Maybe no auth?\",\n }\n return j, err\n }\n\n b, err := ioutil.ReadAll(resp.Body)\n\n var js []string\n err = json.Unmarshal(b, &js)\n\n if err != nil {\n err = CouchdbError{\n fpath, method,\n \"DecodeError\",\n \"return json could loaded by json\",\n }\n return j, err\n }\n\n defer resp.Body.Close()\n\n return js, err\n}", "func (proxy ItemProxy) ReadRequests() ([]RequestInfo, *Error) {\n\tvar result = make([]RequestInfo, 0)\n\n\trows, err := proxy.DB.Query(\"SELECT id, item_id, (remote = b'1'), response_status, response_time, request_date, remote_response_time, remote_response_status FROM request\")\n\n\tif err != nil {\n\t\treturn nil, NewError(\n\t\t\t\"service_unavailable\",\n\t\t\t\"Unable to retrieve requests data\",\n\t\t\t503,\n\t\t)\n\t}\n\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\t\tvar aux RequestInfo\n\n\t\terr = rows.Scan(&aux.ID, &aux.ItemID, &aux.Remote, &aux.ResponseStatus, &aux.ResponseTime, &aux.RequestDate, &aux.RemoteResponseTime, &aux.RemoteResponseStatus)\n\n\t\tif err != nil {\n\t\t\treturn nil, UnknownError()\n\t\t}\n\n\t\tresult = append(result, aux)\n\t}\n\treturn result, nil\n}", "func readRoleBindingsListRequest(r *http.Request) (*RoleBindingsListServerRequest, error) {\n\tvar err error\n\tresult := new(RoleBindingsListServerRequest)\n\tquery := r.URL.Query()\n\tresult.page, err = helpers.ParseInteger(query, \"page\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif result.page == nil {\n\t\tresult.page = helpers.NewInteger(1)\n\t}\n\tresult.search, err = helpers.ParseString(query, \"search\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresult.size, err = helpers.ParseInteger(query, \"size\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif result.size == nil {\n\t\tresult.size = helpers.NewInteger(100)\n\t}\n\treturn result, err\n}", "func (r *AddOnsAddServerRequest) unmarshal(reader io.Reader) error {\n\tvar err error\n\tdecoder := json.NewDecoder(reader)\n\tdata := new(addOnData)\n\terr = decoder.Decode(data)\n\tif err != nil {\n\t\treturn err\n\t}\n\tr.body, err = data.unwrap()\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn err\n}", "func (c *FtpServerConn) ListRequest(args ...string) (io.ReadCloser, error) {\n\tcmd := append([]string{\"LIST\"}, args...)\n\tval := strings.Join(cmd, \" \")\n\tconn, err := c.transferCmd(val)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &FtpDataConn{conn, c}, nil\n}", "func readRoleBindingsAddRequest(r *http.Request) (*RoleBindingsAddServerRequest, error) {\n\tvar err error\n\tresult := new(RoleBindingsAddServerRequest)\n\terr = result.unmarshal(r.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result, err\n}", "func NewAppListRequest(server string, namespace string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"namespace\", namespace)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/namespaces/%s/apps\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"GET\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (a *ArchiveHelper) RequestList(apiKey, count, offset int) *Request {\n\turl := fmt.Sprintf(\"%s/v2/partner/%d/archive?offset=%d&count=%d\",\n\t\tbaseURL, apiKey, offset, count)\n\treturn NewRequest(\"GET\", url)\n}", "func (s *Service) RequestList() []*Request {\n\treturn s.requests\n}", "func adaptUsersListRequest(w http.ResponseWriter, r *http.Request, server UsersServer) {\n\trequest := &UsersListServerRequest{}\n\terr := readUsersListRequest(request, r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := &UsersListServerResponse{}\n\tresponse.status = 200\n\terr = server.List(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeUsersListResponse(response, w)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func (s *Server) handleListRequest(sc *serverClient, mesg *msg.Message) {\n\trsp := msg.Message{\n\t\tVersion: msg.MyVersion,\n\t\tMessageId: mesg.MessageId,\n\t\tListRes: &msg.ListResponse{\n\t\t\tOthers: s.getClientIds(sc.cid),\n\t\t},\n\t}\n\tsc.responseMsgs <- rsp\n}", "func NewListByronWalletsRequest(server string) (*http.Request, error) {\n\tvar err error\n\n\tserverURL, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\toperationPath := fmt.Sprintf(\"/byron-wallets\")\n\tif operationPath[0] == '/' {\n\t\toperationPath = operationPath[1:]\n\t}\n\toperationURL := url.URL{\n\t\tPath: operationPath,\n\t}\n\n\tqueryURL := serverURL.ResolveReference(&operationURL)\n\n\treq, err := http.NewRequest(\"GET\", queryURL.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func NewIstioConfigListRequest(server string, namespace string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"namespace\", namespace)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/namespaces/%s/istio\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"GET\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (client *BorutaClient) ListRequests(f boruta.ListFilter, s *boruta.SortInfo,\n\tp *boruta.RequestsPaginator) ([]boruta.ReqInfo, *boruta.ListInfo, error) {\n\n\tlistSpec := &util.RequestsListSpec{\n\t\tSorter: s,\n\t\tPaginator: p,\n\t}\n\tif f != nil {\n\t\trfilter, ok := f.(*filter.Requests)\n\t\tif !ok {\n\t\t\treturn nil, nil, errors.New(\"only *filter.Requests type is supported\")\n\t\t}\n\t\tlistSpec.Filter = rfilter\n\t}\n\n\treq, err := json.Marshal(listSpec)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tresp, err := http.Post(client.url+\"reqs/list\", contentType, bytes.NewReader(req))\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tinfo, err := listInfoFromHeaders(resp.Header)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tlist := new([]boruta.ReqInfo)\n\terr = processResponse(resp, list)\n\treturn *list, info, err\n}", "func dispatchAddOns(w http.ResponseWriter, r *http.Request, server AddOnsServer, segments []string) {\n\tif len(segments) == 0 {\n\t\tswitch r.Method {\n\t\tcase \"POST\":\n\t\t\tadaptAddOnsAddRequest(w, r, server)\n\t\tcase \"GET\":\n\t\t\tadaptAddOnsListRequest(w, r, server)\n\t\tdefault:\n\t\t\terrors.SendMethodNotAllowed(w, r)\n\t\t\treturn\n\t\t}\n\t} else {\n\t\tswitch segments[0] {\n\t\tdefault:\n\t\t\ttarget := server.Addon(segments[0])\n\t\t\tif target == nil {\n\t\t\t\terrors.SendNotFound(w, r)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tdispatchAddOn(w, r, target, segments[1:])\n\t\t}\n\t}\n}", "func NewServiceListRequest(server string, namespace string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"namespace\", namespace)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/namespaces/%s/services\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"GET\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
writeAddOnsListResponse translates the given request object into an HTTP response.
func writeAddOnsListResponse(w http.ResponseWriter, r *AddOnsListServerResponse) error { w.Header().Set("Content-Type", "application/json") w.WriteHeader(r.status) err := r.marshal(w) if err != nil { return err } return nil }
[ "func writeAddOnsAddResponse(w http.ResponseWriter, r *AddOnsAddServerResponse) error {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(r.status)\n\terr := r.marshal(w)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (service *Service) writeEventListResponse(w http.ResponseWriter, evens []*Event, code int) {\n\tresponse := &EventListResponse{evens}\n\tdata, err := json.Marshal(response)\n\n\tif err != nil {\n\t\tif service.logger != nil {\n\t\t\tservice.logger.Errorf(\"Service.writeEventListResponse, marshal response error %s\", err)\n\t\t}\n\t\tw.WriteHeader(500)\n\t\t_, writeErr := w.Write([]byte(\"internal server error\"))\n\t\tif writeErr != nil && service.logger != nil {\n\t\t\tservice.logger.Errorf(\"Service.writeEventListResponse, write `internal server error` error %s\", err)\n\t\t}\n\t\treturn\n\t}\n\n\tw.WriteHeader(code)\n\t_, writeErr := w.Write(data)\n\tif writeErr != nil && service.logger != nil {\n\t\tservice.logger.Errorf(\"Service.writeEventListResponse, write `EventListResponse` error %s\", err)\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n}", "func adaptAddOnsListRequest(w http.ResponseWriter, r *http.Request, server AddOnsServer) {\n\trequest, err := readAddOnsListRequest(r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := new(AddOnsListServerResponse)\n\tresponse.status = 200\n\terr = server.List(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeAddOnsListResponse(w, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func EncodeListUserResponse(encoder func(context.Context, http.ResponseWriter) goahttp.Encoder) func(context.Context, http.ResponseWriter, interface{}) error {\n\treturn func(ctx context.Context, w http.ResponseWriter, v interface{}) error {\n\t\tres := v.(userviews.JeeekUserCollection)\n\t\tw.Header().Set(\"goa-view\", res.View)\n\t\tenc := encoder(ctx, w)\n\t\tvar body interface{}\n\t\tswitch res.View {\n\t\tcase \"default\", \"\":\n\t\t\tbody = NewJeeekUserResponseCollection(res.Projected)\n\t\tcase \"tiny\":\n\t\t\tbody = NewJeeekUserResponseTinyCollection(res.Projected)\n\t\tcase \"admin\":\n\t\t\tbody = NewJeeekUserResponseAdminCollection(res.Projected)\n\t\t}\n\t\tw.WriteHeader(http.StatusOK)\n\t\treturn enc.Encode(body)\n\t}\n}", "func EncodeListResponse(encoder func(context.Context, http.ResponseWriter) goahttp.Encoder) func(context.Context, http.ResponseWriter, interface{}) error {\n\treturn func(ctx context.Context, w http.ResponseWriter, v interface{}) error {\n\t\tw.WriteHeader(http.StatusOK)\n\t\treturn nil\n\t}\n}", "func EncodeListResponse(encoder func(context.Context, http.ResponseWriter) goahttp.Encoder) func(context.Context, http.ResponseWriter, interface{}) error {\n\treturn func(ctx context.Context, w http.ResponseWriter, v interface{}) error {\n\t\tres := v.(usersviews.StoredUserCollection)\n\t\tw.Header().Set(\"goa-view\", res.View)\n\t\tenc := encoder(ctx, w)\n\t\tvar body interface{}\n\t\tswitch res.View {\n\t\tcase \"default\", \"\":\n\t\t\tbody = NewStoredUserResponseCollection(res.Projected)\n\t\tcase \"tiny\":\n\t\t\tbody = NewStoredUserResponseTinyCollection(res.Projected)\n\t\t}\n\t\tw.WriteHeader(http.StatusOK)\n\t\treturn enc.Encode(body)\n\t}\n}", "func EncodeListResponse(encoder func(context.Context, http.ResponseWriter) goahttp.Encoder) func(context.Context, http.ResponseWriter, interface{}) error {\n\treturn func(ctx context.Context, w http.ResponseWriter, v interface{}) error {\n\t\tres := v.(usersviews.StoredUserCollection)\n\t\tenc := encoder(ctx, w)\n\t\tbody := NewStoredUserResponseCollection(res.Projected)\n\t\tw.WriteHeader(http.StatusOK)\n\t\treturn enc.Encode(body)\n\t}\n}", "func writeRoleBindingsListResponse(w http.ResponseWriter, r *RoleBindingsListServerResponse) error {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(r.status)\n\terr := r.marshal(w)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func encodeListUsersResponse(ctx context.Context, w http.ResponseWriter, response interface{}) (err error) {\n\tif f, ok := response.(Failure); ok && f.Failed() != nil {\n\t\tErrorEncoder(ctx, f.Failed(), w)\n\t\treturn nil\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=utf-8\")\n\terr = json.NewEncoder(w).Encode(response)\n\treturn\n}", "func writeRoleBindingsAddResponse(w http.ResponseWriter, r *RoleBindingsAddServerResponse) error {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(r.status)\n\terr := r.marshal(w)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func adaptAddOnsAddRequest(w http.ResponseWriter, r *http.Request, server AddOnsServer) {\n\trequest, err := readAddOnsAddRequest(r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := new(AddOnsAddServerResponse)\n\tresponse.status = 201\n\terr = server.Add(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeAddOnsAddResponse(w, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func EncodeListResponse(ctx context.Context, v interface{}, hdr, trlr *metadata.MD) (interface{}, error) {\n\tvres, ok := v.(organizationviews.StoredOrganizationCollection)\n\tif !ok {\n\t\treturn nil, goagrpc.ErrInvalidType(\"organization\", \"list\", \"organizationviews.StoredOrganizationCollection\", v)\n\t}\n\tresult := vres.Projected\n\t(*hdr).Append(\"goa-view\", vres.View)\n\tresp := NewStoredOrganizationCollection(result)\n\treturn resp, nil\n}", "func WriteResponse(w http.ResponseWriter, status int, payload interface{}) {\n\tw.Header().Add(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(status)\n\t_ = json.NewEncoder(w).Encode(payload)\n}", "func HandleListSuccessfully(t *testing.T) {\n\tth.Mux.HandleFunc(\"/os-aggregates\", func(w http.ResponseWriter, r *http.Request) {\n\t\tth.TestMethod(t, r, \"GET\")\n\t\tth.TestHeader(t, r, \"X-Auth-Token\", client.TokenID)\n\n\t\tw.Header().Add(\"Content-Type\", \"application/json\")\n\t\tfmt.Fprintf(w, AggregateListBody)\n\t})\n}", "func (client *ReportsClient) listByRequestHandleResponse(resp *http.Response) (ReportsListByRequestResponse, error) {\n\tresult := ReportsListByRequestResponse{RawResponse: resp}\n\tif err := runtime.UnmarshalAsJSON(resp, &result.RequestReportCollection); err != nil {\n\t\treturn ReportsListByRequestResponse{}, runtime.NewResponseError(err, resp)\n\t}\n\treturn result, nil\n}", "func listHandler(w http.ResponseWriter, r *http.Request) {\n\tunits, err := listUnits()\n\tif err != nil {\n\t\thttputils.ReportError(w, r, err, \"Failed to list units.\")\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tif err := json.NewEncoder(w).Encode(units); err != nil {\n\t\tsklog.Errorf(\"Failed to write or encode output: %s\", err)\n\t}\n}", "func WriteResponse(w http.ResponseWriter, httpStatus int, data model.GlobalResponse) {\n\tdata.Timestamp = time.Now()\n\tjs, err := json.MarshalIndent(data, \"\", \" \")\n\tif err != nil {\n\t\tlog.Error(\"Could not marshal http write data: \", data)\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// Set response content type\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(httpStatus)\n\tw.Write(js)\n\treturn\n}", "func CreateListObjectsResponse(bucketName string, request *s3.ListObjectsRequest,\n\tlistRsp *s3.ListObjectsResponse) (response datatype.ListObjectsResponse) {\n\tfor _, o := range listRsp.Objects {\n\t\tobj := datatype.Object{\n\t\t\tKey: o.ObjectKey,\n\t\t\tLastModified: time.Unix(o.LastModified, 0).UTC().Format(timeFormatAMZ),\n\t\t\tETag: o.Etag,\n\t\t\tSize: o.Size,\n\t\t\tStorageClass: o.StorageClass,\n\t\t\tLocation: o.Location,\n\t\t\tTier: o.Tier,\n\t\t}\n\t\tif request.EncodingType != \"\" { // only support \"url\" encoding for now\n\t\t\tobj.Key = UrlEncodeAsAwsS3(obj.Key)\n\t\t}\n\t\tif request.FetchOwner {\n\t\t\tobj.Owner = &datatype.Owner{\n\t\t\t\tID: o.TenantId,\n\t\t\t\t// currently, display name is the same as tenantId\n\t\t\t\tDisplayName: o.TenantId, //TODO: DisplayName\n\t\t\t}\n\t\t}\n\t\tresponse.Contents = append(response.Contents, obj)\n\t}\n\n\tvar prefixes []datatype.CommonPrefix\n\tfor _, prefix := range listRsp.Prefixes {\n\t\titem := datatype.CommonPrefix{\n\t\t\tPrefix: prefix,\n\t\t}\n\t\tprefixes = append(prefixes, item)\n\t}\n\tresponse.CommonPrefixes = prefixes\n\n\tresponse.Delimiter = request.Delimiter\n\tresponse.EncodingType = request.EncodingType\n\tresponse.IsTruncated = listRsp.IsTruncated\n\tresponse.MaxKeys = int(request.MaxKeys)\n\tresponse.Prefix = request.Prefix\n\tresponse.BucketName = bucketName\n\n\tif request.Version == constants.ListObjectsType2Int {\n\t\tresponse.KeyCount = len(response.Contents)\n\t\tresponse.ContinuationToken = request.ContinuationToken\n\t\tresponse.NextContinuationToken = listRsp.NextMarker\n\t\tresponse.StartAfter = request.StartAfter\n\t} else { // version 1\n\t\tresponse.Marker = request.Marker\n\t\tresponse.NextMarker = listRsp.NextMarker\n\t}\n\n\tif request.EncodingType != \"\" {\n\t\tresponse.Delimiter = UrlEncodeAsAwsS3(response.Delimiter)\n\t\tresponse.Prefix = UrlEncodeAsAwsS3(response.Prefix)\n\t\tresponse.StartAfter = UrlEncodeAsAwsS3(response.StartAfter)\n\t}\n\n\treturn\n}", "func (r *AddOnsListServerResponse) marshal(writer io.Writer) error {\n\tvar err error\n\tencoder := json.NewEncoder(writer)\n\tdata := new(addOnsListServerResponseData)\n\tdata.Items, err = r.items.wrap()\n\tif err != nil {\n\t\treturn err\n\t}\n\tdata.Page = r.page\n\tdata.Size = r.size\n\tdata.Total = r.total\n\terr = encoder.Encode(data)\n\treturn err\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
adaptAddOnsListRequest translates the given HTTP request into a call to the corresponding method of the given server. Then it translates the results returned by that method into an HTTP response.
func adaptAddOnsListRequest(w http.ResponseWriter, r *http.Request, server AddOnsServer) { request, err := readAddOnsListRequest(r) if err != nil { glog.Errorf( "Can't read request for method '%s' and path '%s': %v", r.Method, r.URL.Path, err, ) errors.SendInternalServerError(w, r) return } response := new(AddOnsListServerResponse) response.status = 200 err = server.List(r.Context(), request, response) if err != nil { glog.Errorf( "Can't process request for method '%s' and path '%s': %v", r.Method, r.URL.Path, err, ) errors.SendInternalServerError(w, r) return } err = writeAddOnsListResponse(w, response) if err != nil { glog.Errorf( "Can't write response for method '%s' and path '%s': %v", r.Method, r.URL.Path, err, ) return } }
[ "func adaptAddOnsAddRequest(w http.ResponseWriter, r *http.Request, server AddOnsServer) {\n\trequest, err := readAddOnsAddRequest(r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := new(AddOnsAddServerResponse)\n\tresponse.status = 201\n\terr = server.Add(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeAddOnsAddResponse(w, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func adaptUsersListRequest(w http.ResponseWriter, r *http.Request, server UsersServer) {\n\trequest := &UsersListServerRequest{}\n\terr := readUsersListRequest(request, r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := &UsersListServerResponse{}\n\tresponse.status = 200\n\terr = server.List(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeUsersListResponse(response, w)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func adaptRoleBindingsListRequest(w http.ResponseWriter, r *http.Request, server RoleBindingsServer) {\n\trequest, err := readRoleBindingsListRequest(r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := new(RoleBindingsListServerResponse)\n\tresponse.status = 200\n\terr = server.List(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeRoleBindingsListResponse(w, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func readAddOnsListRequest(r *http.Request) (*AddOnsListServerRequest, error) {\n\tvar err error\n\tresult := new(AddOnsListServerRequest)\n\tquery := r.URL.Query()\n\tresult.order, err = helpers.ParseString(query, \"order\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresult.page, err = helpers.ParseInteger(query, \"page\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif result.page == nil {\n\t\tresult.page = helpers.NewInteger(1)\n\t}\n\tresult.search, err = helpers.ParseString(query, \"search\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresult.size, err = helpers.ParseInteger(query, \"size\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif result.size == nil {\n\t\tresult.size = helpers.NewInteger(100)\n\t}\n\treturn result, err\n}", "func adaptUsersAddRequest(w http.ResponseWriter, r *http.Request, server UsersServer) {\n\trequest := &UsersAddServerRequest{}\n\terr := readUsersAddRequest(request, r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := &UsersAddServerResponse{}\n\tresponse.status = 201\n\terr = server.Add(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeUsersAddResponse(response, w)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func dispatchAddOns(w http.ResponseWriter, r *http.Request, server AddOnsServer, segments []string) {\n\tif len(segments) == 0 {\n\t\tswitch r.Method {\n\t\tcase \"POST\":\n\t\t\tadaptAddOnsAddRequest(w, r, server)\n\t\tcase \"GET\":\n\t\t\tadaptAddOnsListRequest(w, r, server)\n\t\tdefault:\n\t\t\terrors.SendMethodNotAllowed(w, r)\n\t\t\treturn\n\t\t}\n\t} else {\n\t\tswitch segments[0] {\n\t\tdefault:\n\t\t\ttarget := server.Addon(segments[0])\n\t\t\tif target == nil {\n\t\t\t\terrors.SendNotFound(w, r)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tdispatchAddOn(w, r, target, segments[1:])\n\t\t}\n\t}\n}", "func adaptRoleBindingsAddRequest(w http.ResponseWriter, r *http.Request, server RoleBindingsServer) {\n\trequest, err := readRoleBindingsAddRequest(r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := new(RoleBindingsAddServerResponse)\n\tresponse.status = 201\n\terr = server.Add(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeRoleBindingsAddResponse(w, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func Adapt(rh fasthttp.RequestHandler, adapters ...Adapter) fasthttp.RequestHandler {\n\tfor _, adapter := range adapters {\n\t\t// rh diventa un RequestHandler con funzionalità estesa da adapter\n\t\trh = adapter(rh)\n\t}\n\n\treturn rh\n}", "func Adapt(handler http.Handler, adapters ...Adapter) http.Handler {\n\tfor _, adapter := range adapters {\n\t\thandler = adapter(handler)\n\t}\n\treturn handler\n}", "func adaptOrganizationUpdateRequest(w http.ResponseWriter, r *http.Request, server OrganizationServer) {\n\trequest := &OrganizationUpdateServerRequest{}\n\terr := readOrganizationUpdateRequest(request, r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := &OrganizationUpdateServerResponse{}\n\tresponse.status = 200\n\terr = server.Update(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeOrganizationUpdateResponse(response, w)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func writeAddOnsListResponse(w http.ResponseWriter, r *AddOnsListServerResponse) error {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(r.status)\n\terr := r.marshal(w)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (s *addOnsImpl) List(planCode string, params Params) (*Response, []AddOn, error) {\n\taction := fmt.Sprintf(\"plans/%s/add_ons\", planCode)\n\treq, err := s.client.newRequest(\"GET\", action, params, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tvar p struct {\n\t\tXMLName xml.Name `xml:\"add_ons\"`\n\t\tAddOns []AddOn `xml:\"add_on\"`\n\t}\n\tresp, err := s.client.do(req, &p)\n\n\treturn resp, p.AddOns, err\n}", "func adaptOrganizationGetRequest(w http.ResponseWriter, r *http.Request, server OrganizationServer) {\n\trequest := &OrganizationGetServerRequest{}\n\terr := readOrganizationGetRequest(request, r)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't read request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\tresponse := &OrganizationGetServerResponse{}\n\tresponse.status = 200\n\terr = server.Get(r.Context(), request, response)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't process request for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\terrors.SendInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = writeOrganizationGetResponse(response, w)\n\tif err != nil {\n\t\tglog.Errorf(\n\t\t\t\"Can't write response for method '%s' and path '%s': %v\",\n\t\t\tr.Method, r.URL.Path, err,\n\t\t)\n\t\treturn\n\t}\n}", "func httpIPListQueryHandler(lang string) func(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {\n\treturn func(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\t\tvar postList []string\n\t\tbody, err := ioutil.ReadAll(io.LimitReader(r.Body, 1048576))\n\t\tif err != nil {\n\t\t\treturnBadRequestResponse(w, \"post data error or oversize\")\n\t\t\treturn\n\t\t}\n\t\tif err := r.Body.Close(); err != nil {\n\t\t\treturnServerFailResponse(w, \"can't close http reader\")\n\t\t\treturn\n\t\t}\n\n\t\tif err := json.Unmarshal(body, &postList); err != nil {\n\t\t\treturnBadRequestResponse(w, \"post data error or json marshal fail\")\n\t\t\treturn\n\t\t}\n\t\tpostListStruct := validateIPAddressFromList(postList)\n\t\tpostListStruct.GetIPInfo(lang)\n\t\treturnStatusOkResponse(w, &postListStruct)\n\t}\n}", "func readAddOnsAddRequest(r *http.Request) (*AddOnsAddServerRequest, error) {\n\tvar err error\n\tresult := new(AddOnsAddServerRequest)\n\terr = result.unmarshal(r.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result, err\n}", "func AdaptFunc(h func(w http.ResponseWriter, r *http.Request), a ...Adapter) http.Handler {\n\treturn Adapt(http.HandlerFunc(h), a...)\n}", "func (b *BaseService) Adapt(mw ...Adapter) { b.mw = mw }", "func adaptHandlerFunc(fn func(w http.ResponseWriter, r *http.Request)) chainHandler {\n\treturn adaptHandler(http.HandlerFunc(fn))\n}", "func adaptHandler(handler func(*admission_v1beta1.AdmissionReview) *admission_v1beta1.AdmissionResponse) func(http.ResponseWriter, *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tvar body []byte\n\t\tif r.Body != nil {\n\t\t\tif data, err := ioutil.ReadAll(r.Body); err == nil {\n\t\t\t\tbody = data\n\t\t\t}\n\t\t}\n\n\t\tif len(body) == 0 {\n\t\t\thttp.Error(w, \"empty body\", http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\tmediaType, _, err := mime.ParseMediaType(r.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\thttp.Error(w, \"Invalid content-type\", http.StatusUnsupportedMediaType)\n\t\t\treturn\n\t\t}\n\n\t\tif mediaType != \"application/json\" {\n\t\t\thttp.Error(w, \"invalid Content-Type, expect `application/json`\", http.StatusUnsupportedMediaType)\n\t\t\treturn\n\t\t}\n\n\t\tvar admissionResponse *admission_v1beta1.AdmissionResponse\n\t\tar := admission_v1beta1.AdmissionReview{}\n\t\tif _, _, err := deserializer.Decode(body, nil, &ar); err != nil {\n\t\t\tadmissionResponse = &admission_v1beta1.AdmissionResponse{\n\t\t\t\tResult: &meta_v1.Status{\n\t\t\t\t\tMessage: err.Error(),\n\t\t\t\t},\n\t\t\t}\n\t\t} else {\n\t\t\tadmissionResponse = handler(&ar)\n\t\t}\n\n\t\tadmissionReview := admission_v1beta1.AdmissionReview{}\n\t\tif admissionResponse != nil {\n\t\t\tadmissionReview.Response = admissionResponse\n\t\t\tif ar.Request != nil {\n\t\t\t\tadmissionReview.Response.UID = ar.Request.UID\n\t\t\t}\n\t\t}\n\n\t\tresp, err := json.Marshal(admissionReview)\n\t\tif err != nil {\n\t\t\thttp.Error(w, fmt.Sprintf(\"could not encode response: %v\", err), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\t\tif _, err := w.Write(resp); err != nil {\n\t\t\thttp.Error(w, fmt.Sprintf(\"could not write response: %v\", err), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
CrawlerFlux controls the flux of a single crawler
func (cc *SCrawlerController) CrawlerFlux(URL string, index int, baseURL string, optionsURL string) { client.CrawlerClient.NewCrawlerClient() client.CrawlerClient.SetDefaultCrawlerRequester(GetMethod, "https://www.movingimoveis.com.br/venda-pr-curitiba/apartamentos/page/2", nil) filename := fmt.Sprintf("viva_real_%v", index) outDir := file_manager.FileManager.GetOutputDirectory() response := client.CrawlerClient.CrawlerDo() for _, cookie := range response.Cookies() { fmt.Println(cookie) } //log.Fatal("Technical stop") fmt.Println("--------------------------- INIT HERE --------------------------") bs, _ := ioutil.ReadAll(response.Body) s := string(bs) fmt.Println(s) fmt.Println("--------------------------- END HERE --------------------------") log.Fatal("Technical stop") crawler := crawler2.NewCrawler(outDir) crawler.SetURLParameters(baseURL, "", optionsURL) crawler.SetDocumentToProcess(response) crawler.WriteBuildingsListFileToCrawl(filename) for crawler.CheckAndSetNextPageQuery() { crawler.SetNextDocumentToProcess() crawler.WriteBuildingsListFileToCrawl(filename) time.Sleep(time.Second * 8) } fmt.Println(fmt.Sprintf("Finished process %v ->", index)) }
[ "func (f *FeedProcessor) WithCrawler(value bool) {\n\tf.crawler = value\n}", "func (crawler *Crawler) Crawl(uri string, depth int) {\n\tdefer crawler.wg.Done()\n\tdomain := crawler.Domain\n\tlog.Printf(\"Depth: %v - %s%s Crawling...\", depth, domain, uri)\n\ttimeout := time.Duration(5 * time.Second)\n\tclient := http.Client{\n\t\tTimeout: timeout,\n\t}\n\tresp, err := client.Get(\"http://\" + domain + uri)\n\tif err != nil {\n\t\tlog.Printf(\"Couldn't get %s%s\", domain, uri)\n\t\treturn\n\t}\n\tlog.Printf(\"Depth: %v - %s%s Parsing...\", depth, domain, uri)\n\tlinks, assets := crawler.DocParser.ParseBody(crawler.Domain, resp.Body)\n\tdefer resp.Body.Close()\n\tlog.Printf(\"Depth: %v - %s%s Extracted (%v links) and (%v assets)\", depth, domain, uri, len(links), len(assets))\n\tcrawler.Site.AddDocument(uri, depth)\n\tcrawler.Site.Visit(uri)\n\tfor asset := range assets {\n\t\tcrawler.Site.AddAsset(uri, asset)\n\t}\n\tdepth += 1\n\tfor _, parsedLink := range links {\n\t\tif parsedLink.URI != \"\" {\n\t\t\tcrawler.Site.AddLink(uri, parsedLink.URI, depth)\n\t\t\tif !crawler.Site.HasBeenVisited(parsedLink.URI) && depth <= crawler.MaxDepth {\n\t\t\t\tcrawler.wg.Add(1)\n\t\t\t\tgo crawler.Crawl(parsedLink.URI, depth)\n\t\t\t}\n\t\t}\n\t}\n}", "func Crawler(cliCtx *cli.Context) error {\n\tif cliCtx.Bool(\"profile\") {\n\t\tgo func() {\n\t\t\thttp.ListenAndServe(\":6060\", nil)\n\t\t}()\n\t}\n\n\tcfg := &browserk.Config{}\n\tcfg.FormData = &browserk.DefaultFormValues\n\n\tif cliCtx.String(\"config\") == \"\" {\n\t\tcfg = &browserk.Config{\n\t\t\tURL: cliCtx.String(\"url\"),\n\t\t\tNumBrowsers: cliCtx.Int(\"numbrowsers\"),\n\t\t\tMaxDepth: cliCtx.Int(\"maxdepth\"),\n\t\t}\n\t} else {\n\t\tdata, err := ioutil.ReadFile(cliCtx.String(\"config\"))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := toml.NewDecoder(strings.NewReader(string(data))).Decode(cfg); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif cfg.URL == \"\" && cliCtx.String(\"url\") != \"\" {\n\t\t\tcfg.URL = cliCtx.String(\"url\")\n\t\t}\n\t\tif cfg.DataPath == \"\" && cliCtx.String(\"datadir\") != \"\" {\n\t\t\tcfg.DataPath = cliCtx.String(\"datadir\")\n\t\t}\n\t}\n\tos.RemoveAll(cfg.DataPath)\n\tcrawl := store.NewCrawlGraph(cfg.DataPath + \"/crawl\")\n\tpluginStore := store.NewPluginStore(cfg.DataPath + \"/plugin\")\n\tbrowserk := scanner.New(cfg, crawl, pluginStore)\n\tlog.Logger.Info().Msg(\"Starting browserker\")\n\n\tscanContext := context.Background()\n\tif err := browserk.Init(scanContext); err != nil {\n\t\tlog.Logger.Error().Err(err).Msg(\"failed to init engine\")\n\t\treturn err\n\t}\n\n\tc := make(chan os.Signal)\n\tsignal.Notify(c, os.Interrupt, syscall.SIGTERM)\n\tgo func() {\n\t\t<-c\n\t\tlog.Info().Msg(\"Ctrl-C Pressed, shutting down\")\n\t\terr := browserk.Stop()\n\t\tlog.Info().Msg(\"Giving a few seconds to sync db...\")\n\t\ttime.Sleep(time.Second * 10)\n\t\tif err != nil {\n\t\t\tlog.Error().Err(err).Msg(\"failed to stop browserk\")\n\t\t}\n\t\tos.Exit(1)\n\t}()\n\n\terr := browserk.Start()\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"browserk failure occurred\")\n\t}\n\n\tif cliCtx.Bool(\"summary\") {\n\t\tprintSummary(crawl)\n\t}\n\n\treturn browserk.Stop()\n}", "func (c *Crawler) crawling(urls []*url.URL) (done <-chan struct{}) {\n\tvar w *crawling\n\n\t// how to perform a crawling Crawler's main function: crawl.\n\trake := func(s site) {\n\t\tw.add(w.crawlSite(s), s.URL, s.Depth-1) // new urls enter crawling - circular feedback\n\t\ttime.Sleep(c.Delay) // have a gentle nap\n\t}\n\n\t// how to discriminate 'seen before'\n\tattr := func(s site) interface{} {\n\t\treturn s.URL.String()\n\t}\n\n\t// how many in parallel\n\tmany := parallel(c.Parallel) // no idea what keeps Crawler from setting `Parallel` upon validation\n\n\tw = &crawling{\n\t\tc, // \"Crawler is used as configuration ...\"\n\t\tNew(rake, attr, many), // the cirular network\n\t\tmake(chan result), // results - the (secondary) output\n\t}\n\n\tgo func() { // launch the results closer\n\t\t<-w.Done() // block 'till crawling.Rake is done\n\t\tclose(w.results)\n\t}()\n\n\tw.add(urls, nil, c.Depth) // feed initial urls\n\n\treturn DoneFunc(w.results, c.report) // signal when results report are done\n}", "func main() {\r\n flag.Parse()\r\n\r\n if *itemSaverServiceName == \"\" {\r\n log.Fatal(\"must specity itemsaver service name\")\r\n }\r\n\r\n if *crawlServiceName == \"\" {\r\n log.Fatal(\"must specity crawler service name\")\r\n }\r\n\r\n // 创建consul client\r\n consulClient, err := consulsupport.NewClient(consulapi.DefaultConfig(), *consulAddress)\r\n if err != nil {\r\n log.Fatal(err)\r\n }\r\n\r\n // 从consul中获得itemSaverServiceName对应服务的 host:port\r\n itemSaverhost, err := getHostWithServiceName(consulClient, *itemSaverServiceName)\r\n if err != nil {\r\n log.Fatal(err)\r\n }\r\n\r\n // 创建itemSaver Service的client\r\n itemChan, err := itemsaver.ItemSaver(itemSaverhost)\r\n if err != nil {\r\n log.Fatal(err)\r\n }\r\n\r\n // pool := createClientPool(strings.Split(*crawlHosts, \",\"))\r\n\r\n // 创建连接池\r\n clientChan, err := crawl.CreateClientPool(consulClient, *crawlServiceName)\r\n if err != nil {\r\n log.Fatal(err)\r\n }\r\n\r\n // 从consul中获得redis的 host:port\r\n redisHost, err := consulsupport.GetConfig(consulClient, \"redis/address\")\r\n if err != nil {\r\n log.Fatal(err)\r\n }\r\n\r\n // 创建每个URL的request对应的processor\r\n processor := crawl.CreateProcessor(clientChan)\r\n\r\n e := engine.ConcurrentEngine{\r\n Scheduler: &scheduler.QueuedScheduler{},\r\n WorkerCount: 100,\r\n ItemChan: itemChan,\r\n RequestProcessor: processor,\r\n RedisHost: redisHost,\r\n }\r\n\r\n // 启动爬虫,从起始页面 http://www.zhenai.com/zhenghun 开始爬取\r\n e.Run(engine.Request{\r\n URL: \"http://www.zhenai.com/zhenghun\",\r\n Parser: engine.NewParser(config.ParseCityList, parser.ParseCityList),\r\n })\r\n}", "func (nc *netCrawler) run() {\n\t// make sure we are orchestrated\n\tif nc.mgr == nil {\n\t\tpanic(fmt.Errorf(\"no svc manager set on %s\", nc.name()))\n\t}\n\n\t// if we can not communicate, terminate the crawler right away\n\tif nc.client == nil {\n\t\tlog.Warningf(\"client not open, network discovery disabled\")\n\t\treturn\n\t}\n\n\t// signal orchestrator we started and go\n\tnc.mgr.started(nc)\n\tgo nc.execute()\n}", "func (c Crawler) crawling(urls []*url.URL) (done <-chan struct{}) {\n\tcrawling := crawling{\n\t\tc, // \"Crawler is used as configuration ...\"\n\t\ttraffic{\n\t\t\tTravel: make(chan site), // the feedback traffic\n\t\t\tWaitGroup: new(sync.WaitGroup), // monitor traffic\n\t\t},\n\t\tmake(chan result), // results - the (secondary) output\n\t}\n\tcrawling.crawling(urls, parallel(c.Parallel))\n\treturn res.ResultDone(crawling.results, c.report)\n}", "func Crawler(url string, depth int, fetcher Fetcher) {\n\tgroup := &sync.WaitGroup{}\n\tcache := &Cache{v: map[string]bool{}}\n\n\tcache.Add(url) // update cache.\n\tgroup.Add(1) // register in the group.\n\tgo crawl(url, depth, fetcher, cache, group)\n\tgroup.Wait() // wait here for completion of all the spawned crawlers.\n\n\treturn\n}", "func crawl(client *http.Client, linkChan <-chan string, depth int, wg *sync.WaitGroup, doWork func(link string)) {\n\tfor link := range linkChan {\n\t\tgo func(l string) {\n\t\t\tdefer wg.Done()\n\t\t\tdoWork(l)\n\t\t\tif depth > 0 {\n\t\t\t\tdepth--\n\t\t\t\tsubLinkChan := streamLinks(client, l)\n\t\t\t\tcrawl(client, subLinkChan, depth, wg, doWork)\n\t\t\t}\n\t\t}(link)\n\t\twg.Add(1)\n\t}\n}", "func CrawlerForSites(crawler Crawler) func(*Report) {\n\treturn func(r *Report) {\n\t\tr.crawler = crawler\n\t}\n}", "func (c *Crawler) Clone() *Crawler {\r\n\treturn &Crawler{\r\n\t\tlock: c.lock,\r\n\t\tUserAgent: c.UserAgent,\r\n\t\tretryCount: c.retryCount,\r\n\t\tretryConditions: c.retryConditions,\r\n\t\tclient: c.client,\r\n\t\tcookies: c.cookies,\r\n\t\tgoPool: c.goPool,\r\n\t\tproxyURLPool: c.proxyURLPool,\r\n\t\tContext: c.Context,\r\n\t\tcache: c.cache,\r\n\t\tcacheFields: c.cacheFields,\r\n\t\trequestHandler: make([]HandleRequest, 0, 5),\r\n\t\tresponseHandler: make([]HandleResponse, 0, 5),\r\n\t\thtmlHandler: make([]*HTMLParser, 0, 5),\r\n\t\twg: &sync.WaitGroup{},\r\n\t\tlog: c.log,\r\n\t}\r\n}", "func NewCrawler(opts ...CrawlerOption) *Crawler {\r\n\tc := new(Crawler)\r\n\r\n\tc.UserAgent = \"Predator\"\r\n\r\n\tc.client = new(fasthttp.Client)\r\n\r\n\tfor _, op := range opts {\r\n\t\top(c)\r\n\t}\r\n\r\n\tc.lock = &sync.RWMutex{}\r\n\r\n\tc.Context = context.Background()\r\n\r\n\tcapacityState := c.goPool != nil\r\n\r\n\tif c.log != nil {\r\n\t\tif capacityState {\r\n\t\t\tc.log.Info().\r\n\t\t\t\tBool(\"state\", capacityState).\r\n\t\t\t\tUint64(\"capacity\", c.goPool.capacity).\r\n\t\t\t\tMsg(\"concurrent\")\r\n\t\t} else {\r\n\t\t\tc.log.Info().\r\n\t\t\t\tBool(\"state\", capacityState).\r\n\t\t\t\tMsg(\"concurrent\")\r\n\t\t}\r\n\t}\r\n\r\n\treturn c\r\n}", "func NewCrawler(w Workerer) *Crawler {\n\treturn &Crawler{Worker: w}\n}", "func (s *Site) Fetch(crawler Crawler) error {\n\tif s.Error != nil {\n\t\treturn s.Error\n\t}\n\tif crawler == nil {\n\t\ts.Error = errors.Simple(\"crawler is not provided\")\n\t\treturn s.Error\n\t}\n\tvar unexpected error\n\twg, events := &sync.WaitGroup{}, make(chan event, 512)\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\tdefer errors.Recover(&unexpected)\n\t\ts.listen(events)\n\t}()\n\ts.Error = crawler.Visit(s.url.String(), events)\n\twg.Wait()\n\tif unexpected != nil {\n\t\tpanic(unexpected)\n\t}\n\treturn s.Error\n}", "func startScraper(ctx context.Context, m *scraper) {\n\tlog.Printf(\"Starting %s...\\n\", m.name)\n\n\tfor {\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\treturn\n\t\tcase mp := <-m.payloadCh:\n\t\t\tsetBusy(m)\n\t\t\tlog.Printf(\"Crawling urls(%d) from depth %d\\n\", len(mp.urls), mp.currentDepth)\n\t\t\tmds := crawlURLs(mp.currentDepth, mp.urls)\n\t\t\tgot := make(chan bool)\n\t\t\tm.delegatorDumpCh <- &scraperDumps{\n\t\t\t\tscraper: m.name,\n\t\t\t\tgot: got,\n\t\t\t\tmds: mds,\n\t\t\t}\n\t\t\t<-got\n\t\t\tsetAvailable(m)\n\t\t}\n\t}\n}", "func (o *Task) SetFlux(v string) {\n\to.Flux = v\n}", "func (o *TaskUpdateRequest) SetFlux(v string) {\n\to.Flux = &v\n}", "func Crawl(url string, depth int, fetcher Fetcher) {\n\ttype URL struct { //store the current url's recursion depth count\n\t\turl string\n\t\tdepth int\n\t}\n\n\tmsg := make(chan string) //display result channel\n\treq := make(chan URL) //current url's recursion depth count channel\n\tquit := make(chan int) //?\n\n\t//define crawler in this way to get web content,\n\t//easy to use routines and routines channels\n\tcrawler := func(url string, depth int) {\n\t\tdefer func() { quit <- 0 }() //run at the end of crawler\n\n\t\tif depth <= 0 { //when depth=0,we not recursion\n\t\t\treturn\n\t\t}\n\n\t\tbody, urls, err := fetcher.Fetch(url) //get web content\n\n\t\tif err != nil {\n\t\t\tmsg <- fmt.Sprintf(\"%s\\n\", err) //fill display error result channel\n\t\t\treturn\n\t\t}\n\n\t\tmsg <- fmt.Sprintf(\"found: %s %q\\n\", url, body) //fill display result channel\n\n\t\t//fill recursion depth count struct channel\n\t\tfor _, u := range urls {\n\t\t\treq <- URL{u, depth - 1} //depth count down\n\t\t}\n\t}\n\n\tworks := 1\n\n\tmemo := make(map[string]bool)\n\tmemo[url] = true\n\n\t//run a crawler routine to fill channels\n\tgo crawler(url, depth)\n\n\tfor works > 0 {\n\t\t//check and select channels to recursion\n\t\tselect {\n\t\t//output \"get web content info\"\n\t\tcase s := <-msg:\n\t\t\tfmt.Print(s)\n\t\t//recursion to get web content\n\t\tcase u := <-req:\n\t\t\tif !memo[u.url] {\n\t\t\t\tmemo[u.url] = true\n\t\t\t\tworks++\n\n\t\t\t\tgo crawler(u.url, u.depth)\n\t\t\t}\n\t\t//when all crawler routine finish the for is finish\n\t\tcase <-quit:\n\t\t\tworks--\n\t\t}\n\t}\n}", "func (crawler *DomainCrawler) Crawl() (*SiteMap, error) {\n\tmaxConcurrency := crawler.config.MaxConcurrency\n\tcrawlTimeout := crawler.config.CrawlTimeout\n\n\tfor i := 0; i < maxConcurrency; i++ {\n\t\tgo crawler.drainURLS()\n\t}\n\n\t// The timeout mechanism signals to the goroutines to stop reading\n\t// more URLs after the specified timeout. The function doesn't\n\t// return until the goroutines have drained the URLs.\n\tif crawlTimeout > 0 {\n\t\tgo func() {\n\t\t\ttime.Sleep(crawlTimeout)\n\t\t\tcrawler.timedOut.Store(true)\n\t\t}()\n\t}\n\n\tcrawler.pendingURLSRemaining.Wait()\n\tclose(crawler.pendingURLS)\n\n\tif crawler.accessedPageCount.Load() == 0 {\n\t\treturn nil, fmt.Errorf(\"unable to access url %s\", crawler.root.String())\n\t}\n\n\treturn crawler.siteMap, nil\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
MojoLexerInit initializes any static state used to implement MojoLexer. By default the static state used to implement the lexer is lazily initialized during the first call to NewMojoLexer(). You can call this function if you wish to initialize the static state ahead of time.
func MojoLexerInit() { staticData := &MojoLexerLexerStaticData staticData.once.Do(mojolexerLexerInit) }
[ "func SQLLexerInit() {\n\tstaticData := &sqllexerLexerStaticData\n\tstaticData.once.Do(sqllexerLexerInit)\n}", "func NewMojoLexer(input antlr.CharStream) *MojoLexer {\n\tMojoLexerInit()\n\tl := new(MojoLexer)\n\tl.BaseLexer = antlr.NewBaseLexer(input)\n\tstaticData := &MojoLexerLexerStaticData\n\tl.Interpreter = antlr.NewLexerATNSimulator(l, staticData.atn, staticData.decisionToDFA, staticData.PredictionContextCache)\n\tl.channelNames = staticData.ChannelNames\n\tl.modeNames = staticData.ModeNames\n\tl.RuleNames = staticData.RuleNames\n\tl.LiteralNames = staticData.LiteralNames\n\tl.SymbolicNames = staticData.SymbolicNames\n\tl.GrammarFileName = \"MojoLexer.g4\"\n\t// TODO: l.EOF = antlr.TokenEOF\n\n\treturn l\n}", "func (i *Input) Init(ctx session.Context, m middleware.Middleware) {\n\tctx.Logger = ctx.Logger.With().\n\t\tStr(session.LoggerKeyComponent, \"input\").\n\t\tLogger()\n\n\tctx.Logger.Debug().Msg(\"init\")\n\n\t// This is an interim channel that allows\n\t// the streams to be wrapped before passed\n\t// to the format.\n\tstreams := make(chan InputReader)\n\n\tgo i.Format.Init(ctx, m, streams)\n\tgo i.Source.Init(ctx)\n\n\tfor {\n\t\tselect {\n\t\tcase rs := <-i.Source.Streams():\n\t\t\tr, err := i.Modifiers.Wrap(rs)\n\t\t\tif err != nil {\n\t\t\t\tctx.Errors <- fmt.Errorf(\"failed to wrap source stream: %w\", err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tstreams <- r\n\t\tcase <-ctx.StdContext.Done():\n\t\t\tctx.Logger.Debug().Msg(\"context canceled\")\n\t\t\treturn\n\t\t}\n\t}\n}", "func (p *Parser) init() {\n\tp.advance()\n\tp.advance()\n\tp.prefixFuncs = make(map[lexer.TokenType]prefixParseFunction)\n\tp.binaryFuncs = make(map[lexer.TokenType]binaryParseFunction)\n\n\t// Register functions to parse all operators that are of the form `op expresion`\n\tp.registerPrefixFunc(p.parseNumberLiteral, lexer.Number)\n\tp.registerPrefixFunc(p.parsePrefixExpression, lexer.Minus, lexer.Bang)\n\tp.registerPrefixFunc(p.parseIdentifier, lexer.Identifier)\n\tp.registerPrefixFunc(p.parseBoolean, lexer.True, lexer.False)\n\tp.registerPrefixFunc(p.parseParenthesisedExpression, lexer.OpenParent)\n\tp.registerPrefixFunc(p.parseStringLiteral, lexer.String)\n\tp.registerPrefixFunc(p.parseArrayLiteral, lexer.OpenBracket)\n\tp.registerPrefixFunc(p.parseNewCall, lexer.New)\n\n\t// Register functions to parse all operators that are of the form `expression op expresion`\n\tp.registerPrefixFunc(p.parseNumberLiteral, lexer.Number)\n\tp.registerBinaryFunc(p.parseArrayAccess, lexer.OpenBracket)\n\tp.registerBinaryFunc(p.parseBinaryExpression, lexer.Plus, lexer.Mul, lexer.Minus, lexer.Div,\n\t\tlexer.GT, lexer.GTE, lexer.LT, lexer.LTE, lexer.EQ, lexer.NEQ, lexer.Dot, lexer.DotDot)\n}", "func JsonQueryParserInit() {\n\tstaticData := &jsonqueryParserStaticData\n\tstaticData.once.Do(jsonqueryParserInit)\n}", "func NewLexer(r io.Reader, firstFunc LexerFunc) *Lexer {\n\tvar br *bufio.Reader\n\tvar ok bool\n\tif br, ok = r.(*bufio.Reader); !ok {\n\t\tbr = bufio.NewReader(r)\n\t}\n\n\tl := Lexer{\n\t\tr: br,\n\t\tch: make(chan *Token, 1),\n\t\toutbuf: bytes.NewBuffer(make([]byte, 0, 1024)),\n\t\tstate: firstFunc,\n\t\trow: -1,\n\t\tcol: -1,\n\t\tabsRow: 1,\n\t}\n\n\treturn &l\n}", "func New(state StateFn, input string) *Lexer {\n\n\tif state == nil {\n\t\treturn nil //panic(\"nil start state\")\n\t}\n\treturn &Lexer{\n\t\tstate: state,\n\t\tinput: input,\n\t\titems: list.New(),\n\t}\n}", "func (p *Parser) Init(src []byte, rules Ruleset) {\n\tscanError := func(pos token.Position, msg string) { p.error(pos, msg) }\n\tp.scanner.Init(src, scanError, rules.ScanRules)\n\tp.rules = rules\n}", "func (compiler *Compiler) Init() {\n\tcompiler.Functions = make(map[string]Type)\n\tcompiler.Concepts = make(map[string]Concept)\n\tcompiler.Aliases = make(map[string]Alias)\n\tcompiler.Language = English\n}", "func CParserInit() {\n\tstaticData := &CParserStaticData\n\tstaticData.once.Do(cParserInit)\n}", "func NewLexer(input string) *Lexer {\n\tl := &Lexer{text: input, pos: -1}\n\tl.advance()\n\treturn l\n}", "func InitTokenStore() *TokenStore {\n\tts := TokenStore{}\n\tts.store = make(map[string]token)\n\n\treturn &ts\n}", "func (game *Mki3dGame) InitToken() error {\n\n\ttokenPtr, err := game.AssetsPtr.LoadRandomToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttokenDataShaderPtr, err := glmki3d.MakeDataShader(game.ShaderPtr, tokenPtr)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttokenDataShaderPtr.UniPtr.SetSimple()\n\n\tif game.TokenDSPtr != nil {\n\t\tgame.TokenDSPtr.DeleteData() // free old GL buffers\n\t}\n\n\tgame.TokenDSPtr = tokenDataShaderPtr\n\tgame.GenerateTokens()\n\n\treturn nil\n}", "func Init() {\n\tvalidate = validator.New()\n}", "func (re *RolloutEvaluator) Init() {\n\tif !re.PreRollout {\n\t\treturn\n\t}\n\tre.played, re.wins = rollout(nil, re.Opponent, re.N)\n}", "func (o *FilterProcessScanner) Init() error {\n\ttracerx.Printf(\"Initialize filter-process\")\n\treqVer := \"version=2\"\n\n\tinitMsg, err := o.pl.ReadPacketText()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"reading filter-process initialization\")\n\t}\n\tif initMsg != \"git-filter-client\" {\n\t\treturn fmt.Errorf(\"invalid filter-process pkt-line welcome message: %s\", initMsg)\n\t}\n\n\tsupVers, err := o.pl.ReadPacketList()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"reading filter-process versions\")\n\t}\n\tif !isStringInSlice(supVers, reqVer) {\n\t\treturn fmt.Errorf(\"filter '%s' not supported (your Git supports: %s)\", reqVer, supVers)\n\t}\n\n\terr = o.pl.WritePacketList([]string{\"git-filter-server\", reqVer})\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"writing filter-process initialization failed\")\n\t}\n\treturn nil\n}", "func (li *LimitIterator) Init() {\n\t// Initialization\n}", "func (ne *NativeEngine) Init() error {\n\treturn nil\n}", "func InitParser(state *core.BuildState) *core.BuildState {\n\tif state.Parser == nil {\n\t\tp := &aspParser{parser: newAspParser(state)}\n\t\tstate.Parser = p\n\t}\n\treturn state\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewMojoLexer produces a new lexer instance for the optional input antlr.CharStream.
func NewMojoLexer(input antlr.CharStream) *MojoLexer { MojoLexerInit() l := new(MojoLexer) l.BaseLexer = antlr.NewBaseLexer(input) staticData := &MojoLexerLexerStaticData l.Interpreter = antlr.NewLexerATNSimulator(l, staticData.atn, staticData.decisionToDFA, staticData.PredictionContextCache) l.channelNames = staticData.ChannelNames l.modeNames = staticData.ModeNames l.RuleNames = staticData.RuleNames l.LiteralNames = staticData.LiteralNames l.SymbolicNames = staticData.SymbolicNames l.GrammarFileName = "MojoLexer.g4" // TODO: l.EOF = antlr.TokenEOF return l }
[ "func NewLexer(input string) *Lexer {\n\tl := &Lexer{text: input, pos: -1}\n\tl.advance()\n\treturn l\n}", "func NewLexer(r io.Reader, firstFunc LexerFunc) *Lexer {\n\tvar br *bufio.Reader\n\tvar ok bool\n\tif br, ok = r.(*bufio.Reader); !ok {\n\t\tbr = bufio.NewReader(r)\n\t}\n\n\tl := Lexer{\n\t\tr: br,\n\t\tch: make(chan *Token, 1),\n\t\toutbuf: bytes.NewBuffer(make([]byte, 0, 1024)),\n\t\tstate: firstFunc,\n\t\trow: -1,\n\t\tcol: -1,\n\t\tabsRow: 1,\n\t}\n\n\treturn &l\n}", "func New(input string) Lexer {\n\tl := Lexer{input: input}\n\tl.advance()\n\treturn l\n}", "func New(src string) *Lexer {\n\treturn &Lexer{\n\t\tcur: utfstrings.Cursor{\n\t\t\tString: src,\n\t\t},\n\t}\n}", "func New(r io.Reader, opts ...Opt) *Lexer {\n\tl := &Lexer{\n\t\tr: bufio.NewReader(r),\n\t}\n\n\tfor _, opt := range opts {\n\t\topt(l)\n\t}\n\n\treturn l\n}", "func New(state StateFn, input string) *Lexer {\n\n\tif state == nil {\n\t\treturn nil //panic(\"nil start state\")\n\t}\n\treturn &Lexer{\n\t\tstate: state,\n\t\tinput: input,\n\t\titems: list.New(),\n\t}\n}", "func MojoLexerInit() {\n\tstaticData := &MojoLexerLexerStaticData\n\tstaticData.once.Do(mojolexerLexerInit)\n}", "func New(file *token.File, src io.RuneReader, opts ...Option) (*Lexer, error) {\n\tr := &Lexer{\n\t\tFile: file,\n\t\tbomMode: BOMIgnoreFirst,\n\t\tclassf: DefaultRuneClass,\n\t\tsrc: src,\n\t}\n\tif x, ok := src.(CharReader); ok {\n\t\tr.charSrc = x\n\t}\n\tr.errorf = r.defaultErrorf\n\tfor _, o := range opts {\n\t\tif err := o(r); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn r, nil\n}", "func NewFromString(startState StateFn, input string, channelCap int) Lexer {\n\treturn newLex(startState, strings.NewReader(input), len(input), false, channelCap)\n}", "func buildLexer() *lexer.StatefulDefinition {\n\treturn lexer.MustSimple([]lexer.SimpleRule{\n\t\t{Name: `Bytes`, Pattern: `0x[a-fA-F0-9]+`},\n\t\t{Name: `Float`, Pattern: `[-+]?\\d*\\.\\d+([eE][-+]?\\d+)?`},\n\t\t{Name: `Int`, Pattern: `[-+]?\\d+`},\n\t\t{Name: `String`, Pattern: `\"(\\\\\"|[^\"])*\"`},\n\t\t{Name: `OpNot`, Pattern: `\\b(not)\\b`},\n\t\t{Name: `OpOr`, Pattern: `\\b(or)\\b`},\n\t\t{Name: `OpAnd`, Pattern: `\\b(and)\\b`},\n\t\t{Name: `OpComparison`, Pattern: `==|!=|>=|<=|>|<`},\n\t\t{Name: `OpAddSub`, Pattern: `\\+|\\-`},\n\t\t{Name: `OpMultDiv`, Pattern: `\\/|\\*`},\n\t\t{Name: `Boolean`, Pattern: `\\b(true|false)\\b`},\n\t\t{Name: `LParen`, Pattern: `\\(`},\n\t\t{Name: `RParen`, Pattern: `\\)`},\n\t\t{Name: `Punct`, Pattern: `[,.\\[\\]]`},\n\t\t{Name: `Uppercase`, Pattern: `[A-Z][A-Z0-9_]*`},\n\t\t{Name: `Lowercase`, Pattern: `[a-z][a-z0-9_]*`},\n\t\t{Name: \"whitespace\", Pattern: `\\s+`},\n\t})\n}", "func NewFromFile(file io.Reader) *Lexer {\n\tz := &Lexer{\n\t\tfileName: \"stdin\",\n\t\tfd: file,\n\t\tscanner: bufio.NewScanner(file),\n\t\tneedsRefresh: true,\n\t}\n\tz.scanner.Split(plSplitter)\n\treturn z\n}", "func NewCtoLexer(input antlr.CharStream) *CtoLexer {\n\tl := new(CtoLexer)\n\tlexerDeserializer := antlr.NewATNDeserializer(nil)\n\tlexerAtn := lexerDeserializer.DeserializeFromUInt16(serializedLexerAtn)\n\tlexerDecisionToDFA := make([]*antlr.DFA, len(lexerAtn.DecisionToState))\n\tfor index, ds := range lexerAtn.DecisionToState {\n\t\tlexerDecisionToDFA[index] = antlr.NewDFA(ds, index)\n\t}\n\tl.BaseLexer = antlr.NewBaseLexer(input)\n\tl.Interpreter = antlr.NewLexerATNSimulator(l, lexerAtn, lexerDecisionToDFA, antlr.NewPredictionContextCache())\n\n\tl.channelNames = lexerChannelNames\n\tl.modeNames = lexerModeNames\n\tl.RuleNames = lexerRuleNames\n\tl.LiteralNames = lexerLiteralNames\n\tl.SymbolicNames = lexerSymbolicNames\n\tl.GrammarFileName = \"CtoLexer.g4\"\n\t// TODO: l.EOF = antlr.TokenEOF\n\n\treturn l\n}", "func NewwktLexer(input antlr.CharStream) *wktLexer {\n\tl := new(wktLexer)\n\tlexerDeserializer := antlr.NewATNDeserializer(nil)\n\tlexerAtn := lexerDeserializer.DeserializeFromUInt16(serializedLexerAtn)\n\tlexerDecisionToDFA := make([]*antlr.DFA, len(lexerAtn.DecisionToState))\n\tfor index, ds := range lexerAtn.DecisionToState {\n\t\tlexerDecisionToDFA[index] = antlr.NewDFA(ds, index)\n\t}\n\tl.BaseLexer = antlr.NewBaseLexer(input)\n\tl.Interpreter = antlr.NewLexerATNSimulator(l, lexerAtn, lexerDecisionToDFA, antlr.NewPredictionContextCache())\n\n\tl.channelNames = lexerChannelNames\n\tl.modeNames = lexerModeNames\n\tl.RuleNames = lexerRuleNames\n\tl.LiteralNames = lexerLiteralNames\n\tl.SymbolicNames = lexerSymbolicNames\n\tl.GrammarFileName = \"wkt.g4\"\n\t// TODO: l.EOF = antlr.TokenEOF\n\n\treturn l\n}", "func NewLessLexer(input antlr.CharStream) *LessLexer {\n\tl := new(LessLexer)\n\tlexerDeserializer := antlr.NewATNDeserializer(nil)\n\tlexerAtn := lexerDeserializer.DeserializeFromUInt16(serializedLexerAtn)\n\tlexerDecisionToDFA := make([]*antlr.DFA, len(lexerAtn.DecisionToState))\n\tfor index, ds := range lexerAtn.DecisionToState {\n\t\tlexerDecisionToDFA[index] = antlr.NewDFA(ds, index)\n\t}\n\tl.BaseLexer = antlr.NewBaseLexer(input)\n\tl.Interpreter = antlr.NewLexerATNSimulator(l, lexerAtn, lexerDecisionToDFA, antlr.NewPredictionContextCache())\n\n\tl.channelNames = lexerChannelNames\n\tl.modeNames = lexerModeNames\n\tl.RuleNames = lexerRuleNames\n\tl.LiteralNames = lexerLiteralNames\n\tl.SymbolicNames = lexerSymbolicNames\n\tl.GrammarFileName = \"LessLexer.g4\"\n\t// TODO: l.EOF = antlr.TokenEOF\n\n\treturn l\n}", "func New(l *lexer.Lexer) *Parser {\n\tp := &Parser{\n\t\tl: l,\n\t\terrors: []ParsingError{},\n\t}\n\tp.nextToken()\n\tp.nextToken()\n\n\treturn p\n}", "func NewSQLLexer(input antlr.CharStream) *SQLLexer {\n\tSQLLexerInit()\n\tl := new(SQLLexer)\n\tl.BaseLexer = antlr.NewBaseLexer(input)\n\tstaticData := &sqllexerLexerStaticData\n\tl.Interpreter = antlr.NewLexerATNSimulator(l, staticData.atn, staticData.decisionToDFA, staticData.predictionContextCache)\n\tl.channelNames = staticData.channelNames\n\tl.modeNames = staticData.modeNames\n\tl.RuleNames = staticData.ruleNames\n\tl.LiteralNames = staticData.literalNames\n\tl.SymbolicNames = staticData.symbolicNames\n\tl.GrammarFileName = \"SQL.g4\"\n\t// TODO: l.EOF = antlr.TokenEOF\n\n\treturn l\n}", "func NewCESQLParserLexer(input antlr.CharStream) *CESQLParserLexer {\n\tl := new(CESQLParserLexer)\n\tlexerDeserializer := antlr.NewATNDeserializer(nil)\n\tlexerAtn := lexerDeserializer.DeserializeFromUInt16(serializedLexerAtn)\n\tlexerDecisionToDFA := make([]*antlr.DFA, len(lexerAtn.DecisionToState))\n\tfor index, ds := range lexerAtn.DecisionToState {\n\t\tlexerDecisionToDFA[index] = antlr.NewDFA(ds, index)\n\t}\n\tl.BaseLexer = antlr.NewBaseLexer(input)\n\tl.Interpreter = antlr.NewLexerATNSimulator(l, lexerAtn, lexerDecisionToDFA, antlr.NewPredictionContextCache())\n\n\tl.channelNames = lexerChannelNames\n\tl.modeNames = lexerModeNames\n\tl.RuleNames = lexerRuleNames\n\tl.LiteralNames = lexerLiteralNames\n\tl.SymbolicNames = lexerSymbolicNames\n\tl.GrammarFileName = \"CESQLParser.g4\"\n\t// TODO: l.EOF = antlr.TokenEOF\n\n\treturn l\n}", "func New(src string, isCode bool) *Tokenizer {\n\tvar s scanner.Scanner\n\n\tlines := splitLines(src, isCode)\n\tsrc = strings.Join(lines, \"\\n\")\n\n\tt := Tokenizer{Source: lines, TokenP: 0}\n\tt.Tokens = make([]Token, 0)\n\n\ts.Init(strings.NewReader(src))\n\ts.Error = func(s *scanner.Scanner, msg string) { /* suppress messaging */ }\n\ts.Filename = \"Input\"\n\n\tfor tok := s.Scan(); tok != scanner.EOF; tok = s.Scan() {\n\t\tnextTokenSpelling := s.TokenText()\n\n\t\tvar nextToken Token\n\n\t\tif TypeTokens[NewTypeToken(nextTokenSpelling)] {\n\t\t\tnextToken = NewTypeToken(nextTokenSpelling)\n\t\t} else if util.InList(nextTokenSpelling, \"true\", \"false\") {\n\t\t\tnextToken = Token{class: BooleanTokenClass, spelling: nextTokenSpelling}\n\t\t} else if tx := NewReservedToken(nextTokenSpelling); tx.IsReserved(true) {\n\t\t\tnextToken = tx\n\t\t} else if IsSymbol(nextTokenSpelling) {\n\t\t\tnextToken = NewIdentifierToken(nextTokenSpelling)\n\t\t} else if SpecialTokens[NewSpecialToken(nextTokenSpelling)] {\n\t\t\tnextToken = NewSpecialToken(nextTokenSpelling)\n\t\t} else if strings.HasPrefix(nextTokenSpelling, \"\\\"\") && strings.HasSuffix(nextTokenSpelling, \"\\\"\") {\n\t\t\trawString := unQuote(nextTokenSpelling)\n\t\t\tnextToken = NewStringToken(rawString)\n\t\t} else if strings.HasPrefix(nextTokenSpelling, \"`\") && strings.HasSuffix(nextTokenSpelling, \"`\") {\n\t\t\tnextToken = NewStringToken(strings.TrimPrefix(strings.TrimSuffix(nextTokenSpelling, \"`\"), \"`\"))\n\t\t} else if _, err := strconv.ParseInt(nextTokenSpelling, 10, 64); err == nil {\n\t\t\tnextToken = Token{class: IntegerTokenClass, spelling: nextTokenSpelling}\n\t\t} else if _, err := strconv.ParseFloat(nextTokenSpelling, 64); err == nil {\n\t\t\tnextToken = Token{class: FloatTokenClass, spelling: nextTokenSpelling}\n\t\t} else {\n\t\t\tnextToken = Token{class: ValueTokenClass, spelling: nextTokenSpelling}\n\t\t}\n\n\t\tt.Tokens = append(t.Tokens, nextToken)\n\t\tcolumn := s.Column\n\n\t\t// See if this is one of the special cases convert multiple tokens into\n\t\t// a single token?\n\t\tif isCode {\n\t\t\tfor _, crush := range crushedTokens {\n\t\t\t\tif len(crush.source) > len(t.Tokens) {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tfound := true\n\t\t\t\t// See if the current token stream now ends with a sequence that should\n\t\t\t\t// be collapsed. If we look at each source token and never get a mismatch\n\t\t\t\t// we know this was still found.\n\t\t\t\tfor i, ch := range crush.source {\n\t\t\t\t\tif t.Tokens[len(t.Tokens)-len(crush.source)+i] != ch {\n\t\t\t\t\t\tfound = false\n\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\t// If we found a match here, lop off the individual tokens\n\t\t\t\t// and replace the \"current\" token with the crushed value\n\t\t\t\tif found {\n\t\t\t\t\tt.Tokens = append(t.Tokens[:len(t.Tokens)-len(crush.source)], crush.result)\n\n\t\t\t\t\t// We also must adjust the Line and Pos arrays accordingly. Remove as many\n\t\t\t\t\t// items from the end as needed.\n\t\t\t\t\tt.Line = t.Line[:len(t.Line)-len(crush.source)+1]\n\t\t\t\t\tt.Pos = t.Pos[:len(t.Pos)-len(crush.source)+1]\n\n\t\t\t\t\t// Adjust the column to reflect the character position of the\n\t\t\t\t\t// start of the crushed token.\n\t\t\t\t\tcolumn = column - len(crush.result.Spelling())\n\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t// Add in the line from the scan and the (possibly adjusted) column\n\t\tt.Line = append(t.Line, s.Line)\n\t\tt.Pos = append(t.Pos, column)\n\t}\n\n\tif ui.IsActive(ui.TokenLogger) {\n\t\tui.WriteLog(ui.TokenLogger, \"Tokenizer contents:\")\n\n\t\tfor index, token := range t.Tokens {\n\t\t\tui.WriteLog(ui.TokenLogger, \" [%2d:%2d] %v\", t.Line[index], t.Pos[index], token)\n\t\t}\n\t}\n\n\treturn &t\n}", "func NewfilterLexer(input antlr.CharStream) *filterLexer {\n\tl := new(filterLexer)\n\tlexerDeserializer := antlr.NewATNDeserializer(nil)\n\tlexerAtn := lexerDeserializer.DeserializeFromUInt16(serializedLexerAtn)\n\tlexerDecisionToDFA := make([]*antlr.DFA, len(lexerAtn.DecisionToState))\n\tfor index, ds := range lexerAtn.DecisionToState {\n\t\tlexerDecisionToDFA[index] = antlr.NewDFA(ds, index)\n\t}\n\tl.BaseLexer = antlr.NewBaseLexer(input)\n\tl.Interpreter = antlr.NewLexerATNSimulator(l, lexerAtn, lexerDecisionToDFA, antlr.NewPredictionContextCache())\n\n\tl.channelNames = lexerChannelNames\n\tl.modeNames = lexerModeNames\n\tl.RuleNames = lexerRuleNames\n\tl.LiteralNames = lexerLiteralNames\n\tl.SymbolicNames = lexerSymbolicNames\n\tl.GrammarFileName = \"filter.g4\"\n\t// TODO: l.EOF = antlr.TokenEOF\n\n\treturn l\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
When return value named, they are initialized to the zero values for their types when the function begins; >good! func some() (t int,err error) testTypeSwitches
func testTypeSwitches() { do(21) do("hello") do(true) }
[ "func InitResult(args ...NameValue[string]) Result {\n\n\tres := Result{\n\t\tStatus: string(EXCEPTION),\n\t\tln: livenote.LiveNote{},\n\t}\n\n\tres.Messages = make([]string, 0)\n\n\tfor _, nv := range args {\n\n\t\t// check if it is a valid status, ignore if not\n\t\t// go to next value if valid\n\t\tif strings.EqualFold(nv.Name, `status`) {\n\t\t\tswitch nv.Value {\n\t\t\tcase string(OK), string(EXCEPTION), string(VALID), string(INVALID), string(YES), string(NO):\n\t\t\t\tres.Status = nv.Value\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\n\t\tif strings.EqualFold(nv.Name, `prefix`) {\n\t\t\tres.MessagePrefix = nv.Value\n\t\t\tres.ln.Prefix = nv.Value // set default prefix for livenote\n\t\t\tcontinue\n\t\t}\n\n\t\tif strings.EqualFold(nv.Name, `message`) {\n\t\t\tif res.Status == string(EXCEPTION) {\n\t\t\t\tres.AddError(nv.Value)\n\t\t\t} else {\n\t\t\t\tres.AddInfo(nv.Value)\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\t}\n\n\t// Auto-detect function that called this function\n\tif pc, _, _, ok := runtime.Caller(1); ok {\n\t\tif details := runtime.FuncForPC(pc); details != nil {\n\t\t\tnm := details.Name()\n\t\t\tif pos := strings.LastIndex(nm, `.`); pos != -1 {\n\t\t\t\tnm = nm[pos+1:]\n\t\t\t}\n\t\t\tres.Operation = strings.ToLower(nm)\n\t\t\tres.eventVerb = res.Operation\n\t\t}\n\t}\n\n\treturn res\n}", "func CollectInitFuncReturnTypes(typeName string, initFuncName string, astFiles []*ast.File) ([]string, error) {\n\tfor _, astFile := range astFiles {\n\t\tfor _, decl := range astFile.Decls {\n\t\t\tfuncDecl, ok := decl.(*ast.FuncDecl)\n\t\t\tif !ok {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif funcDecl.Name.Name != initFuncName {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif len(funcDecl.Recv.List) <= 0 {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif typ, ok := funcDecl.Recv.List[0].Type.(*ast.Ident); !ok || typ.Name != typeName {\n\t\t\t\tif typ, ok := funcDecl.Recv.List[0].Type.(*ast.StarExpr); !ok || typ.X.(*ast.Ident).Name != typeName {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif funcDecl.Type.Results == nil { // no return values/types in the init function\n\t\t\t\treturn []string{}, nil\n\t\t\t}\n\n\t\t\tresultTypes := funcDecl.Type.Results.List\n\t\t\tresultTypeNames := make([]string, len(resultTypes))\n\t\t\tfor i, resultType := range resultTypes {\n\t\t\t\tif ident, ok := resultType.Type.(*ast.Ident); ok {\n\t\t\t\t\tresultTypeNames[i] = ident.Name\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tresultTypeNames[i] = fmt.Sprintf(\"*%s\", resultType.Type.(*ast.StarExpr).X.(*ast.Ident).Name)\n\t\t\t}\n\t\t\treturn resultTypeNames, nil\n\t\t}\n\t}\n\n\treturn nil, fmt.Errorf(\"there is no init function \\\"%s\\\" associated with type \\\"%s\\\"\", initFuncName, typeName)\n}", "func variablesAndSimpleTypes() {\n\t// Constants should be declared and initialized at once\n\n\t// Here goes a <uint64> type coercion.\n\t// in this case, if you don't specify type, the compiler would define as <int>\n\tconst answer uint64 = 42 // uint64 constant\n\n\t// Automatic inference\n\tconst (\n\t\tpi = 3.1415926535 // float64 constant\n\t\ttab = '\\t' // use single quote to declare rune\n\t\tstrConst = \"string constant\"\n\t\t// The lines above only executes from GO 1.13 ( and later )\n\t\tintVar = 0b00001111 // int variable declared as binary literal\n\t\tintegerHexadecimal = 0x9a\n\t\tmirrorAnotherConst = integerHexadecimal\n\t)\n\n\tvar strA = \"string variable declared with 'var' keyword\"\n\tvar strB string // string variable declared and initialized with \"\"\n\tstrC := strConst + \"short form declaring and initializing by inference\"\n\n\t// Declaring one or more variables in the same instruction block\n\t// The same can be done with \"const\" declarations\n\tvar (\n\t\tstrD = `literal string containing \"double quoted substring\" and not subject to escape characters like \\t or \\n`\n\t\tintA = 0 // int by inference\n\t\tintB uint8 // declared as eight bits unsigned int, initialized with zero\n\t\tfltA = 12.5 // float64 type is standard for floating point values\n\t\tfltB = float32(9) / float32(2) // here we're forcing float32 type\n\t\tint9By2 = 9 / 2 // Gotcha! Here the result is integer.\n\t\truneA = 'A'\n\t\truneB rune = 66\n\t\toctalInt = 0o660\n\t\thexadecimalFloatingPoint = 0x123p8\n\t\tlaterVariableUsingAPreviousValue = strD\n\t)\n\n\t// This is the standard/embedded function printLn(), to print content to stdout\n\tprintln(\"There goes the variables to stdout, using fmt.Printf function ( Printf from fmt imported package )\")\n\n\tfmt.Printf(\"pi is type %T and value %#v\\n\", pi, pi)\n\n\tfmt.Printf(\"answer is type %T and value %#v\\n\", answer, answer)\n\n\tfmt.Printf(\"tab is type %T and value %#v\\n\", tab, tab)\n\n\tfmt.Printf(\"intVar is type %T and value %#v\\n\", intVar, intVar)\n\n\tfmt.Printf(\"strA is type %T and value %#v and got %d bytes lenght\\n\", strA, strA, len(strA))\n\n\tfmt.Printf(\"strB is type %T and value %#v\\n\", strB, strB)\n\n\tfmt.Printf(\"strC is type %T and value %#v\\n\", strC, strC)\n\n\tfmt.Printf(\"strC is type %T and value %#v\\n\", strD, strD)\n\n\tfmt.Printf(\"intA is type %T and value %#v\\n\", intA, intA)\n\n\tfmt.Printf(\"intB is type %T and value %#v\\n\", intB, intB)\n\n\tfmt.Printf(\"fltA is type %T and value %#v\\n\", fltA, fltA)\n\n\tfmt.Printf(\"fltB is type %T and value %#v\\n\", fltB, fltB)\n\n\tfmt.Printf(\"int9By2 is type %T and value %#v\\n\", int9By2, int9By2)\n\n\tfmt.Printf(\"integerHexadecimal is type %T and value %d\\n\", integerHexadecimal, integerHexadecimal)\n\n\tfmt.Printf(\"octalInt is type %T and value %d\\n\", octalInt, octalInt)\n\n\tfmt.Printf(\"hexadecimalFloatingPoint is type %T and value %d\\n\", hexadecimalFloatingPoint, hexadecimalFloatingPoint)\n\n\tfmt.Printf(\"laterVariableUsingAPreviousValue is type %T and value %#v\\n\", laterVariableUsingAPreviousValue, laterVariableUsingAPreviousValue)\n\n\t// printLn is a built-in routine\n\tprintln(\"Rune is an alias for type int32\")\n\n\tfmt.Printf(\"runeA is type %T and value %c\\n\", runeA, runeA)\n\n\tfmt.Printf(\"runeB is type %T and value %c\\n\", runeB, runeB)\n}", "func InitInferred(*types.Info) {\n}", "func TestParsedTypes(t *testing.T) {\n\tconst (\n\t\tknownType = 1\n\t\tunknownType = 3\n\t\tsecondKnownType = 4\n\t)\n\n\ttests := []parsedTypeTest{\n\t\t{\n\t\t\tname: \"known and unknown\",\n\t\t\tencode: []tlv.Type{knownType, unknownType},\n\t\t\tdecode: []tlv.Type{knownType},\n\t\t\texpParsedTypes: tlv.TypeMap{\n\t\t\t\tunknownType: []byte{0, 0, 0, 0, 0, 0, 0, 0},\n\t\t\t\tknownType: nil,\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tname: \"known and missing known\",\n\t\t\tencode: []tlv.Type{knownType},\n\t\t\tdecode: []tlv.Type{knownType, secondKnownType},\n\t\t\texpParsedTypes: tlv.TypeMap{\n\t\t\t\tknownType: nil,\n\t\t\t},\n\t\t},\n\t}\n\n\tfor _, test := range tests {\n\t\ttest := test\n\t\tt.Run(test.name, func(t *testing.T) {\n\t\t\ttestParsedTypes(t, test)\n\t\t})\n\t}\n}", "func TypesMain() {\n\tpointers()\n\tstructs()\n\tarrays()\n\tslices()\n\tadvancedSlices()\n\trangeLoop()\n\tprintSlicesExercise(SlicesExercise)\n\tmaps()\n\tfmt.Println(wordCount(\"This This is is a string\"))\n\tfunctionValues()\n\tcallClosure()\n}", "func fetchExpectedType() bool {\n\tvalues := [10]bool{true, true, true, true, true, true, true, true, true, true}\n\ti := rand.Intn(10)\n\tvalues[i] = false\n\ti = rand.Intn(10)\n\tvalues[i] = false\n\ti = rand.Intn(10)\n\treturn values[i]\n}", "func PMapIONumberBoolPtrErr() string {\n\treturn `\nfunc TestPmap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(t *testing.T) {\n\t// Test : someLogic\n\tvar vt <OUTPUT_TYPE> = true\n\tvar vf <OUTPUT_TYPE> = false\n\n\tvar v10 <INPUT_TYPE> = 10\n\tvar v0 <INPUT_TYPE>\n\tvar v3 <INPUT_TYPE> = 3\n\n\texpectedList := []*<OUTPUT_TYPE>{&vt, &vf}\n\tnewList, _ := PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v10, &v0})\n\n\tif *newList[0] != *expectedList[0] || *newList[1] != *expectedList[1] {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed. expected=%v, actual=%v\", expectedList, newList)\n\t}\n\n\tr, _ := PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(nil, nil)\n\tif len(r) > 0 {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\tr, _ = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(nil, []*<INPUT_TYPE>{})\n\tif len(r) > 0 {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\t_, err := PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v10, &v3})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\treflect.TypeOf(\"Nandeshwar\") // Leaving it here to make use of import reflect\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v10, &v10, &v3}, Optional{FixedPool: 1})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v3, &v3, &v10}, Optional{FixedPool: 2})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v3, &v10, &v3}, Optional{FixedPool: 1})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>Err failed\")\n\t}\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v10, &v10, &v3}, Optional{FixedPool: 1})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\texpectedList = []*<OUTPUT_TYPE>{&vt, &vt}\n\tnewList, _ = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v10, &v10}, Optional{RandomOrder: true})\n\n\tcounter := 0\n\tfor i := 0; i < len(expectedList); i++ {\n\t\tfor j := 0; j < len(newList); j++ {\n\t\t\tif *expectedList[i] == *newList[j] {\n\t\t\t\tcounter++\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\tif counter != len(expectedList) {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>Ptr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v10, &v10, &v3}, Optional{FixedPool: 1, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>Err failed\")\n\t}\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v10, &v10, &v3}, Optional{FixedPool: 2, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v3, &v3, &v10}, Optional{FixedPool: 1, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v3, &v10, &v3}, Optional{FixedPool: 2, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v10, &v10, &v3}, Optional{FixedPool: 2, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n}\n`\n}", "func pickFunc(name string, args, res, vtypes []string, doc string) {\n\tfargs := strings.Join(args, \",\")\n\tbody := fmt.Sprintf(\"func(%s)\", fargs)\n\n\tvar pick bool = true\n\tfor i := 0; i < len(vtypes); i++ {\n\t\tif isUserDefType(vtypes[i]) {\n\t\t\tpick = false\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif pick {\n\t\taddFunc(name, body, res, doc)\n\t\t//fmt.Println(\"add func:\", name)\n\t}\n}", "func parseResults(funcDecl *ast.FuncDecl) (types []string) {\n\tif results := funcDecl.Type.Results; results != nil {\n\t\tfor _, field := range results.List {\n\t\t\ttypes = append(types, fmt.Sprintf(\"%s\", field.Type))\n\t\t}\n\t}\n\treturn\n}", "func Return(in interface{}, _ error) interface{} { return in }", "func TestStringToType(t *testing.T) {\n\ttests := map[string]struct {\n\t\tt reflect.Type\n\t\tv interface{}\n\t}{\n\t\t\"coucou\": {rt(\"\"), \"coucou\"},\n\t\t\"0\": {rt(int8(0)), int64(0)},\n\t\t\"1\": {rt(int16(0)), int64(1)},\n\t\t\"2\": {rt(int32(0)), int64(2)},\n\t\t\"3\": {rt(int64(0)), int64(3)},\n\t\t\"4\": {rt(uint8(4)), uint64(4)},\n\t\t\"5\": {rt(uint16(5)), uint64(5)},\n\t\t\"6\": {rt(uint32(6)), uint64(6)},\n\t\t\"7\": {rt(uint64(7)), uint64(7)},\n\t\t\"true\": {rt(true), true},\n\t\t\"f\": {rt(false), false},\n\t\t\"invalid\": {rt(true), false},\n\t\t\"8\": {rt(float32(8)), float64(8.0)},\n\t\t\"9.1\": {rt(float64(9.1)), float64(9.1)},\n\t}\n\tfor from, to := range tests {\n\t\tvv, err := stringToType(from, to.t)\n\t\tif err != nil {\n\t\t\tt.Error(err)\n\t\t}\n\t\tif !reflect.DeepEqual(to.v, vv) {\n\t\t\tt.Errorf(\"expected %s to be converted to %s(%v), got %T(%v)\", from, to.t.String(), to.v, vv, vv)\n\t\t}\n\t}\n\t// Expect error for unknown unsuported types\n\t// in conversion.\n\t_, err := stringToType(\"\", reflect.TypeOf([]string{}))\n\tif err == nil {\n\t\tt.Errorf(\"expected error to be non-nil for unsupported type\")\n\t}\n}", "func initBuiltInTypes() {\n\tfor _, t := range oneByteTypes {\n\t\tdataTypes[t] = dataType{Name: t, Size: 1, Kind: typeScalar}\n\t}\n\n\tfor _, t := range twoByteTypes {\n\t\tdataTypes[t] = dataType{Name: t, Size: 2, Kind: typeScalar}\n\t}\n\n\tfor _, t := range fourByteTypes {\n\t\tdataTypes[t] = dataType{Name: t, Size: 4, Kind: typeScalar}\n\t}\n\n\tfor _, t := range eightByteTypes {\n\t\tdataTypes[t] = dataType{Name: t, Size: 8, Kind: typeScalar}\n\t}\n\n\tfor _, t := range voidPtrTypes {\n\t\tdataTypes[t] = dataType{Name: t, Size: -1, Kind: typeVoidPtr}\n\t}\n}", "func Default(typ Type) Type {}", "func cleanType(tc *TestCollector) {\n\t// intuit pod or command or invalid\n\tif tc.Type == \"\" {\n\t\t// assume command if cmd provided\n\t\tif tc.Cmd != \"\" {\n\t\t\ttc.Type = command\n\t\t} else {\n\t\t\ttc.Type = pod\n\t\t}\n\t}\n\ttc.Type = strings.ToLower(tc.Type)\n}", "func SwitchOnType(x interface{}) {\n\tswitch x.(type) { // Called an assert\n\tcase int:\n\t\tfmt.Println(\"int\")\n\tdefault:\n\t\tfmt.Println(\"Default\")\n\t}\n}", "func PMapIOBoolStrPtrErr() string {\n\treturn `\nfunc TestPmap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(t *testing.T) {\n\t// Test : someLogic\n\tvar vt <INPUT_TYPE> = true\n\tvar vf <INPUT_TYPE> = false\n\n\tvar v10 <OUTPUT_TYPE> = \"10\"\n\tvar v0 <OUTPUT_TYPE> = \"0\"\n\n\texpectedList := []*<OUTPUT_TYPE>{&v10, &v0}\n\tnewList, _ := PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vt, &vt})\n\n\tif *newList[0] != *expectedList[0] && *newList[1] != *expectedList[1] {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed. expected=%v, actual=%v\", expectedList, newList)\n\t}\n\n\tr, _ := PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(nil, nil)\n\tif len(r) > 0 {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\tr, _ = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(nil, []*<INPUT_TYPE>{})\n\tif len(r) > 0 {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\t_, err := PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vt, &vf})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\treflect.TypeOf(\"Nandeshwar\") // Leaving it here to make use of import reflect\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vt, &vt, &vf}, Optional{FixedPool: 1})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vf, &vf, &vt}, Optional{FixedPool: 2})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vf, &vt, &vf}, Optional{FixedPool: 1})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vt, &vt, &vf}, Optional{FixedPool: 1})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\texpectedList = []*<OUTPUT_TYPE>{&v10, &v10}\n\tnewList, _ = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vt, &vt}, Optional{RandomOrder: true})\n\n\tcounter := 0\n\tfor i := 0; i < len(expectedList); i++ {\n\t\tfor j := 0; j < len(newList); j++ {\n\t\t\tif *expectedList[i] == *newList[j] {\n\t\t\t\tcounter++\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\tif counter != len(expectedList) {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vt, &vt, &vf}, Optional{FixedPool: 1, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vt, &vt, &vf}, Optional{FixedPool: 2, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vf, &vf, &vt}, Optional{FixedPool: 1, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vf, &vt, &vf}, Optional{FixedPool: 2, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vt, &vt, &vf}, Optional{FixedPool: 2, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n}\n`\n}", "func PMapIOBoolNumberPtrErr() string {\n\treturn `\nfunc TestPmap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(t *testing.T) {\n\t// Test : someLogic\n\tvar vt <INPUT_TYPE> = true\n\tvar vf <INPUT_TYPE> = false\n\n\tvar v10 <OUTPUT_TYPE> = 10\n\tvar v0 <OUTPUT_TYPE> = 0\n\n\texpectedList := []*<OUTPUT_TYPE>{&v10, &v0}\n\tnewList, _ := PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vt, &vt})\n\n\tif *newList[0] != *expectedList[0] && *newList[1] != *expectedList[1] {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed. expected=%v, actual=%v\", expectedList, newList)\n\t}\n\n\tr, _ := PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(nil, nil)\n\tif len(r) > 0 {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\tr, _ = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(nil, []*<INPUT_TYPE>{})\n\tif len(r) > 0 {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\t_, err := PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vt, &vf})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\treflect.TypeOf(\"Ram\") // Leaving it here to make use of import reflect\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vt, &vt, &vf, &vf}, Optional{FixedPool: 1})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vf, &vf, &vt}, Optional{FixedPool: 2})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vf, &vt, &vf}, Optional{FixedPool: 1})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vt, &vt, &vf}, Optional{FixedPool: 1})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\texpectedList = []*<OUTPUT_TYPE>{&v10, &v10}\n\tnewList, _ = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vt, &vt}, Optional{RandomOrder: true})\n\n\tcounter := 0\n\tfor i := 0; i < len(expectedList); i++ {\n\t\tfor j := 0; j < len(newList); j++ {\n\t\t\tif *expectedList[i] == *newList[j] {\n\t\t\t\tcounter++\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\tif counter != len(expectedList) {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>Ptr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vt, &vt, &vf}, Optional{FixedPool: 1, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vt, &vt, &vf}, Optional{FixedPool: 2, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vf, &vf, &vt}, Optional{FixedPool: 1, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vf, &vt, &vf}, Optional{FixedPool: 2, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&vt, &vt, &vf}, Optional{FixedPool: 2, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n}\n`\n}", "func PMapIOStrBoolPtrErr() string {\n\treturn `\nfunc TestPmap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(t *testing.T) {\n\t// Test : someLogic\n\tvar vt <OUTPUT_TYPE> = true\n\tvar vf <OUTPUT_TYPE> = false\n\n\tvar v10 <INPUT_TYPE> = \"10\"\n\tvar v0 <INPUT_TYPE> = \"0\"\n\tvar v3 <INPUT_TYPE> = \"3\"\n\n\texpectedList := []*<OUTPUT_TYPE>{&vt, &vf}\n\tnewList, _ := PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v10, &v0})\n\n\tif *newList[0] != *expectedList[0] || *newList[1] != *expectedList[1] {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed. expected=%v, actual=%v\", expectedList, newList)\n\t}\n\n\tr, _ := PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(nil, nil)\n\tif len(r) > 0 {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\tr, _ = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(nil, []*<INPUT_TYPE>{})\n\tif len(r) > 0 {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\t_, err := PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v10, &v0, &v3})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\treflect.TypeOf(\"Nandeshwar\") // Leaving it here to make use of import reflect\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v10, &v10, &v3}, Optional{FixedPool: 1})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v3, &v3, &v10}, Optional{FixedPool: 2})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v3, &v10, &v3}, Optional{FixedPool: 1})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v10, &v10, &v3}, Optional{FixedPool: 1})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\texpectedList = []*<OUTPUT_TYPE>{&vt, &vt}\n\tnewList, _ = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v10, &v10}, Optional{RandomOrder: true})\n\n\tcounter := 0\n\tfor i := 0; i < len(expectedList); i++ {\n\t\tfor j := 0; j < len(newList); j++ {\n\t\t\tif *expectedList[i] == *newList[j] {\n\t\t\t\tcounter++\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\tif counter != len(expectedList) {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>Ptr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v10, &v10, &v3}, Optional{FixedPool: 1, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v10, &v10, &v3}, Optional{FixedPool: 2, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v3, &v3, &v10}, Optional{FixedPool: 1, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v3, &v10, &v3}, Optional{FixedPool: 2, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr failed\")\n\t}\n\n\t_, err = PMap<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr(someLogic<FINPUT_TYPE><FOUTPUT_TYPE>PtrErr, []*<INPUT_TYPE>{&v10, &v10, &v3}, Optional{FixedPool: 2, RandomOrder: true})\n\tif err == nil {\n\t\tt.Errorf(\"PMap<FINPUT_TYPE><FOUTPUT_TYPE>Err failed\")\n\t}\n}\n`\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
practice fibonacci this is a closure with a,b and one function the function returns a function> func fib()> func() int
func fib() func() int { a, b := 0, 1 return func() int { a, b = b, a+b //a=b b=a+b return a } }
[ "func fibFunc() func() int {\n\tvar a, b int\n\ta = 1\n\treturn func() int {\n\t\tc := a + b\n\t\tb = a\n\t\ta = c\n\t\treturn c\n\t}\n}", "func fibonacci() func() int {\n\tvalue_old := 0\n\tvalue_new := 1\n\treturn func() int {\n\t\tbuffer := value_old\n\t\tvalue_old = value_new\n\t\tvalue_new = value_new + buffer\n\t\tif (value_new == 1) {\n\t\t\treturn 1\n\t\t}\n\t\treturn value_new\n\t}\n}", "func fib() func(int) int {\n\tmemo := []int{0, 1}\n\treturn func(n int) int {\n\t\tfor len(memo) < n+1 {\n\t\t\tlength := len(memo)\n\t\t\tmemo = append(memo, memo[length-1]+memo[length-2])\n\t\t}\n\t\treturn memo[n]\n\t}\n}", "func fibonacci() func() Uint128 {\n\tvar i Uint128\n\tvar a Uint128\n\tvar b Uint128\n\tvar c Uint128\n\tb = New(1, 0)\n\tc = a.Add(b)\n\t//c := a + b\n\treturn func() Uint128 {\n\t\tvar num Uint128\n\t\tif i.IsZero() {\n\t\t\ti = i.Add64(uint64(1))\n\t\t} else if i.Equals(New(1, 0)) {\n\t\t\ti = i.Add64(uint64(1))\n\t\t\tnum = num.Add64(uint64(1))\n\t\t} else {\n\t\t\tnum = c\n\t\t\ta = b\n\t\t\tb = c\n\t\t\tc = a.Add(b)\n\t\t}\n\t\t//fmt.Println(i, \" \", a, \" \", b, \" \", c)\n\t\treturn num\n\t}\n}", "func RunFibonacci() {\n\tf := fibonacci()\n\tfor i := 0; i < 10; i++ {\n\t\tfmt.Println(f())\n\t}\n}", "func fib(nthFib int) int {\n\tif nthFib == 0 {\n\t\treturn 0\n\t}\n\tif nthFib == 1 {\n\t\treturn 1\n\t}\n\treturn fib(nthFib - 1) + fib(nthFib - 2)\n}", "func (c *Client) Fibonacci(ctx context.Context, n uint64) (*Output, error) {\n\tu := c.prepareServiceURL(\"/fib\", fmt.Sprintf(\"%d\", n))\n\n\toutput := &Output{}\n\terr := c.doRequest(ctx, u, output)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn output, nil\n}", "func fibo(n int, c chan int ){\n x, y := 0,1 \n\n for i := 0; i< n; i++{\n\t <- c\n\t x, y = y , x+y\n }\n close(c) // close cannel that tell no more value\n}", "func FibonacciWithClosure(n int) ([]int, error) {\n\tif n < 0 {\n\t\treturn []int{}, errNegativeAmount(n)\n\t}\n\tif n == 0 {\n\t\treturn []int{}, nil\n\t}\n\tvar s []int\n\n\tf := getFibonacciWithClosure()\n\n\tfor i := 0; i < n; i++ {\n\t\ts = append(s, f())\n\t}\n\treturn s, nil\n}", "func (f Fibonacci) Fib(steps int) (result int) {\n\tif steps == 1 || steps == 2 {\n\t\tresult = 1\n\t} else if steps > 2 {\n\t\tresult = f.Fib(steps-1) + f.Fib(steps-2)\n\t}\n\treturn result\n}", "func Fib(n int) int {\n\tfibber := fib()\n\treturn fibber(n)\n}", "func fib(nth int) int {\r\n\tif nth <= 2 {\r\n\t\treturn 1\r\n\t}\r\n\r\n\treturn fib(nth-2) + fib(nth-1)\r\n}", "func RunFibonacci() {\n\tc := make(chan int, 10)\n\tgo fibonacci(cap(c), c)\n\n\tfor i := range c {\n\t\tfmt.Println(i)\n\t}\n}", "func Fibonacci() chan *big.Int {\n\tc := make(chan *big.Int, 1)\n\n\tgo func() {\n\t\tdefer close(c)\n\n\t\ta, b := big.NewInt(0), big.NewInt(1)\n\n\t\tfor true {\n\t\t\ta.Add(a, b)\n\t\t\ta, b = b, a\n\t\t\tc <- a\n\t\t}\n\t}()\n\n\treturn c\n}", "func fib(max int) int {\n\ttotal := 0\n\n\tfirst := 0\n\tsecond := 1\n\n\tfor {\n\t\ttmp := second\n\t\tsecond += first\n\t\tfirst = tmp\n\t\tif first > max || second > max {\n\t\t\tbreak\n\t\t} else if second%2 == 0 {\n\t\t\ttotal += second\n\t\t}\n\t}\n\n\treturn total\n}", "func NewFibonacci(a, b uint64) *Fibonacci {\n\treturn &Fibonacci{a, b, 0}\n}", "func MemoizedFibonacci(n int) int {\n\tresults := []int{0, 1}\n\n\tfor i := 2; i <= n; i++ {\n\t\tresults = append(results, results[i-2]+results[i-1])\n\t}\n\n\treturn results[n]\n}", "func SmartFibonacci(n int) int {\n\ta, b := 0, 1\n\tfor i := 1; i < n; i++ {\n\t\ta, b = b, a+b\n\t}\n\treturn b\n}", "func PrintFibonacci(n int) {\n\tmemo := make([]int, n+1)\n\n\tfor i := 1; i <= n; i++ {\n\t\tFibonacci(i, memo)\n\t\tfmt.Printf(\"%d: %v\\n\", i, Fibonacci(i, memo))\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewGetWorkflowWorkflowMetaMoidNotFound creates a GetWorkflowWorkflowMetaMoidNotFound with default headers values
func NewGetWorkflowWorkflowMetaMoidNotFound() *GetWorkflowWorkflowMetaMoidNotFound { return &GetWorkflowWorkflowMetaMoidNotFound{} }
[ "func NewGetWorkflowNotFound() *GetWorkflowNotFound {\n\n\treturn &GetWorkflowNotFound{}\n}", "func NewGetWorkflowWorkflowMetaMoidDefault(code int) *GetWorkflowWorkflowMetaMoidDefault {\n\treturn &GetWorkflowWorkflowMetaMoidDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewWorkflowNotFound(body *WorkflowNotFoundResponseBody) *collection.CollectionNotfound {\n\tv := &collection.CollectionNotfound{\n\t\tMessage: *body.Message,\n\t\tID: *body.ID,\n\t}\n\n\treturn v\n}", "func NewGetNiaapiNiaMetadataMoidNotFound() *GetNiaapiNiaMetadataMoidNotFound {\n\treturn &GetNiaapiNiaMetadataMoidNotFound{}\n}", "func NewGetVmsNotFound() *GetVmsNotFound {\n\treturn &GetVmsNotFound{}\n}", "func NewGetProjectResourceMetadataNotFound() *GetProjectResourceMetadataNotFound {\n\treturn &GetProjectResourceMetadataNotFound{}\n}", "func NewGetIdentityNotFound() *GetIdentityNotFound {\n\treturn &GetIdentityNotFound{}\n}", "func NewGetHyperflexAppCatalogsMoidNotFound() *GetHyperflexAppCatalogsMoidNotFound {\n\treturn &GetHyperflexAppCatalogsMoidNotFound{}\n}", "func NewHeadNotFound(name string, id string, message string, temporary bool, timeout bool, fault bool) *goa.ServiceError {\n\tv := &goa.ServiceError{}\n\tv.Name = name\n\tv.ID = id\n\tv.Message = message\n\tv.Temporary = temporary\n\tv.Timeout = timeout\n\tv.Fault = fault\n\n\treturn v\n}", "func NewGetManifestNotFound() *GetManifestNotFound {\n\n\treturn &GetManifestNotFound{}\n}", "func (o *GetWorkflowNotFound) WithPayload(payload *models.MissingResponse) *GetWorkflowNotFound {\n\to.Payload = payload\n\treturn o\n}", "func NewGetNiaapiVersionRegexesMoidNotFound() *GetNiaapiVersionRegexesMoidNotFound {\n\treturn &GetNiaapiVersionRegexesMoidNotFound{}\n}", "func NewGetSchemaNotFound() *GetSchemaNotFound {\n\treturn &GetSchemaNotFound{}\n}", "func NewMasterEmailTemplateGetNotFound() *MasterEmailTemplateGetNotFound {\n\treturn &MasterEmailTemplateGetNotFound{}\n}", "func NewDeleteWorkflowNotFound() *DeleteWorkflowNotFound {\n\treturn &DeleteWorkflowNotFound{}\n}", "func newGetWorkflowByIDInput(r *http.Request) (*models.GetWorkflowByIDInput, error) {\n\tvar input models.GetWorkflowByIDInput\n\n\tvar err error\n\t_ = err\n\n\tworkflowIDStr := mux.Vars(r)[\"workflowID\"]\n\tif len(workflowIDStr) == 0 {\n\t\treturn nil, errors.New(\"path parameter 'workflowID' must be specified\")\n\t}\n\tworkflowIDStrs := []string{workflowIDStr}\n\n\tif len(workflowIDStrs) > 0 {\n\t\tvar workflowIDTmp string\n\t\tworkflowIDStr := workflowIDStrs[0]\n\t\tworkflowIDTmp, err = workflowIDStr, error(nil)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tinput.WorkflowID = workflowIDTmp\n\t}\n\n\tfetchHistoryStrs := r.URL.Query()[\"fetchHistory\"]\n\n\tif len(fetchHistoryStrs) == 0 {\n\t\tfetchHistoryStrs = []string{\"false\"}\n\t}\n\tif len(fetchHistoryStrs) > 0 {\n\t\tvar fetchHistoryTmp bool\n\t\tfetchHistoryStr := fetchHistoryStrs[0]\n\t\tfetchHistoryTmp, err = strconv.ParseBool(fetchHistoryStr)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tinput.FetchHistory = &fetchHistoryTmp\n\t}\n\n\treturn &input, nil\n}", "func NewGetAcrV1NameMetadataMetadataNotFound() *GetAcrV1NameMetadataMetadataNotFound {\n\treturn &GetAcrV1NameMetadataMetadataNotFound{}\n}", "func NewGetCustomCapabilityPresentationNotFound() *GetCustomCapabilityPresentationNotFound {\n\treturn &GetCustomCapabilityPresentationNotFound{}\n}", "func NewSchemaObjectsGetNotFound() *SchemaObjectsGetNotFound {\n\n\treturn &SchemaObjectsGetNotFound{}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewGetWorkflowWorkflowMetaMoidDefault creates a GetWorkflowWorkflowMetaMoidDefault with default headers values
func NewGetWorkflowWorkflowMetaMoidDefault(code int) *GetWorkflowWorkflowMetaMoidDefault { return &GetWorkflowWorkflowMetaMoidDefault{ _statusCode: code, } }
[ "func NewPatchWorkflowWorkflowInfosMoidDefault(code int) *PatchWorkflowWorkflowInfosMoidDefault {\n\treturn &PatchWorkflowWorkflowInfosMoidDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewGetWorkflowsInstanceIDDefault(code int) *GetWorkflowsInstanceIDDefault {\n\treturn &GetWorkflowsInstanceIDDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewGetWorkflowBuildTaskMetaOwnersDefault(code int) *GetWorkflowBuildTaskMetaOwnersDefault {\n\treturn &GetWorkflowBuildTaskMetaOwnersDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewGetTaskWorkflowActionsDefault(code int) *GetTaskWorkflowActionsDefault {\n\treturn &GetTaskWorkflowActionsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewGetVmsDefault(code int) *GetVmsDefault {\n\tif code <= 0 {\n\t\tcode = 500\n\t}\n\n\treturn &GetVmsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func newGetWorkflowDefinitionsInput(r *http.Request) (*models.GetWorkflowDefinitionsInput, error) {\n\tvar input models.GetWorkflowDefinitionsInput\n\n\tvar err error\n\t_ = err\n\n\treturn &input, nil\n}", "func NewWorkflowPowerShellApiWithDefaults() *WorkflowPowerShellApi {\n\tthis := WorkflowPowerShellApi{}\n\tvar classId string = \"workflow.PowerShellApi\"\n\tthis.ClassId = classId\n\tvar objectType string = \"workflow.PowerShellApi\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewGetWorkflowCatalogsDefault(code int) *GetWorkflowCatalogsDefault {\n\treturn &GetWorkflowCatalogsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func newGetWorkflowByIDInput(r *http.Request) (*models.GetWorkflowByIDInput, error) {\n\tvar input models.GetWorkflowByIDInput\n\n\tvar err error\n\t_ = err\n\n\tworkflowIDStr := mux.Vars(r)[\"workflowID\"]\n\tif len(workflowIDStr) == 0 {\n\t\treturn nil, errors.New(\"path parameter 'workflowID' must be specified\")\n\t}\n\tworkflowIDStrs := []string{workflowIDStr}\n\n\tif len(workflowIDStrs) > 0 {\n\t\tvar workflowIDTmp string\n\t\tworkflowIDStr := workflowIDStrs[0]\n\t\tworkflowIDTmp, err = workflowIDStr, error(nil)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tinput.WorkflowID = workflowIDTmp\n\t}\n\n\tfetchHistoryStrs := r.URL.Query()[\"fetchHistory\"]\n\n\tif len(fetchHistoryStrs) == 0 {\n\t\tfetchHistoryStrs = []string{\"false\"}\n\t}\n\tif len(fetchHistoryStrs) > 0 {\n\t\tvar fetchHistoryTmp bool\n\t\tfetchHistoryStr := fetchHistoryStrs[0]\n\t\tfetchHistoryTmp, err = strconv.ParseBool(fetchHistoryStr)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tinput.FetchHistory = &fetchHistoryTmp\n\t}\n\n\treturn &input, nil\n}", "func newGetWorkflowsInput(r *http.Request) (*models.GetWorkflowsInput, error) {\n\tvar input models.GetWorkflowsInput\n\n\tvar err error\n\t_ = err\n\n\tlimitStrs := r.URL.Query()[\"limit\"]\n\n\tif len(limitStrs) == 0 {\n\t\tlimitStrs = []string{\"10\"}\n\t}\n\tif len(limitStrs) > 0 {\n\t\tvar limitTmp int64\n\t\tlimitStr := limitStrs[0]\n\t\tlimitTmp, err = swag.ConvertInt64(limitStr)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tinput.Limit = &limitTmp\n\t}\n\n\toldestFirstStrs := r.URL.Query()[\"oldestFirst\"]\n\n\tif len(oldestFirstStrs) > 0 {\n\t\tvar oldestFirstTmp bool\n\t\toldestFirstStr := oldestFirstStrs[0]\n\t\toldestFirstTmp, err = strconv.ParseBool(oldestFirstStr)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tinput.OldestFirst = &oldestFirstTmp\n\t}\n\n\tpageTokenStrs := r.URL.Query()[\"pageToken\"]\n\n\tif len(pageTokenStrs) > 0 {\n\t\tvar pageTokenTmp string\n\t\tpageTokenStr := pageTokenStrs[0]\n\t\tpageTokenTmp, err = pageTokenStr, error(nil)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tinput.PageToken = &pageTokenTmp\n\t}\n\n\tstatusStrs := r.URL.Query()[\"status\"]\n\n\tif len(statusStrs) > 0 {\n\t\tvar statusTmp string\n\t\tstatusStr := statusStrs[0]\n\t\tstatusTmp, err = statusStr, error(nil)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tinput.Status = &statusTmp\n\t}\n\n\tresolvedByUserStrs := r.URL.Query()[\"resolvedByUser\"]\n\n\tif len(resolvedByUserStrs) > 0 {\n\t\tvar resolvedByUserTmp bool\n\t\tresolvedByUserStr := resolvedByUserStrs[0]\n\t\tresolvedByUserTmp, err = strconv.ParseBool(resolvedByUserStr)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tinput.ResolvedByUser = &resolvedByUserTmp\n\t}\n\n\tsummaryOnlyStrs := r.URL.Query()[\"summaryOnly\"]\n\n\tif len(summaryOnlyStrs) == 0 {\n\t\tsummaryOnlyStrs = []string{\"false\"}\n\t}\n\tif len(summaryOnlyStrs) > 0 {\n\t\tvar summaryOnlyTmp bool\n\t\tsummaryOnlyStr := summaryOnlyStrs[0]\n\t\tsummaryOnlyTmp, err = strconv.ParseBool(summaryOnlyStr)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tinput.SummaryOnly = &summaryOnlyTmp\n\t}\n\n\tworkflowDefinitionNameStrs := r.URL.Query()[\"workflowDefinitionName\"]\n\tif len(workflowDefinitionNameStrs) == 0 {\n\t\treturn nil, errors.New(\"query parameter 'workflowDefinitionName' must be specified\")\n\t}\n\n\tif len(workflowDefinitionNameStrs) > 0 {\n\t\tvar workflowDefinitionNameTmp string\n\t\tworkflowDefinitionNameStr := workflowDefinitionNameStrs[0]\n\t\tworkflowDefinitionNameTmp, err = workflowDefinitionNameStr, error(nil)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tinput.WorkflowDefinitionName = workflowDefinitionNameTmp\n\t}\n\n\treturn &input, nil\n}", "func NewGetHaproxyProcessInfoDefault(code int) *GetHaproxyProcessInfoDefault {\n\treturn &GetHaproxyProcessInfoDefault{\n\t\t_statusCode: code,\n\t\tConfigurationVersion: 0,\n\t}\n}", "func NewPatchWorkflowTaskDefinitionsMoidDefault(code int) *PatchWorkflowTaskDefinitionsMoidDefault {\n\treturn &PatchWorkflowTaskDefinitionsMoidDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewGetHyperflexSoftwareVersionPoliciesMoidDefault(code int) *GetHyperflexSoftwareVersionPoliciesMoidDefault {\n\treturn &GetHyperflexSoftwareVersionPoliciesMoidDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewGetSimulationActivitiesDefault(code int) *GetSimulationActivitiesDefault {\n\treturn &GetSimulationActivitiesDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewGetHealthcheckDefault(code int) *GetHealthcheckDefault {\n\treturn &GetHealthcheckDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewGetNiaapiNiaMetadataMoidDefault(code int) *GetNiaapiNiaMetadataMoidDefault {\n\treturn &GetNiaapiNiaMetadataMoidDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewGetFirewallFieldsDefault(code int) *GetFirewallFieldsDefault {\n\treturn &GetFirewallFieldsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewGetSpoeTransactionDefault(code int) *GetSpoeTransactionDefault {\n\treturn &GetSpoeTransactionDefault{\n\t\t_statusCode: code,\n\t\tConfigurationVersion: 0,\n\t}\n}", "func NewGetPciLinksMoidDefault(code int) *GetPciLinksMoidDefault {\n\treturn &GetPciLinksMoidDefault{\n\t\t_statusCode: code,\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
Code gets the status code for the get workflow workflow meta moid default response
func (o *GetWorkflowWorkflowMetaMoidDefault) Code() int { return o._statusCode }
[ "func (o *GetWorkflowsInstanceIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PatchWorkflowWorkflowInfosMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetTaskWorkflowActionsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PatchWorkflowTaskDefinitionsMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetNiaapiNiaMetadataMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetWorkflowCatalogsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetSimulationActivitiesDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PutWorkflowsTasksDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetTamSecurityAdvisoriesMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetHyperflexAppCatalogsMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetWorkflowBuildTaskMetaOwnersDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetAboutAPIDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetNiaapiVersionRegexesMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetCustomCapabilityPresentationDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetMaterialsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ReadSMSDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetCondHclStatusDetailsMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetHyperflexSoftwareVersionPoliciesMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetJobMessagesDefault) Code() int {\n\treturn o._statusCode\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
GetDefaultSLA returns the Service License Agreement for the default language.
func GetDefaultSLA(rez *UDIFResources) (*SLA, error) { lpic, err := rez.ParsedLPic() if err != nil { return nil, errors.WithStack(err) } return GetSLA(rez, lpic.DefaultLanguage) }
[ "func (m *RegionalAndLanguageSettings) GetDefaultTranslationLanguage()(LocaleInfoable) {\n val, err := m.GetBackingStore().Get(\"defaultTranslationLanguage\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(LocaleInfoable)\n }\n return nil\n}", "func GetSLA(rez *UDIFResources, lang Language) (*SLA, error) {\n\tlpic, err := rez.ParsedLPic()\n\tif err != nil {\n\t\treturn nil, errors.WithStack(err)\n\t}\n\n\tentry, ok := lpic.ByLanguage(lang)\n\tif !ok {\n\t\treturn nil, nil\n\t}\n\n\ttextRes, ok := rez.Text.ByID(LPicResourceID + entry.RelativeResourceID)\n\tif !ok {\n\t\treturn nil, nil\n\t}\n\n\treturn &SLA{\n\t\tLanguage: entry.Language,\n\t\tText: textRes.StringData(),\n\t}, nil\n}", "func LanguageGetDefault() *Language {\n\tretC := C.pango_language_get_default()\n\tretGo := LanguageNewFromC(unsafe.Pointer(retC))\n\n\treturn retGo\n}", "func GetDefaultLanguage(conf config.Config) string {\n\treturn conf.Get(\"defaults\", \"lang\").String(\"en\")\n}", "func (m *RegionalAndLanguageSettings) GetDefaultSpeechInputLanguage()(LocaleInfoable) {\n val, err := m.GetBackingStore().Get(\"defaultSpeechInputLanguage\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(LocaleInfoable)\n }\n return nil\n}", "func (cfg *BaseConfig) GetDefaultLanguage() string {\n\treturn cfg.s_defaultLanguage\n}", "func SourceLanguageManagerGetDefault() (*SourceLanguageManager, error) {\n\tc := C.gtk_source_language_manager_get_default()\n\tif c == nil {\n\t\treturn nil, nilPtrErr\n\t}\n\treturn wrapSourceLanguageManager(glib.Take(unsafe.Pointer(c))), nil\n}", "func (m *RegionalAndLanguageSettings) GetDefaultRegionalFormat()(LocaleInfoable) {\n val, err := m.GetBackingStore().Get(\"defaultRegionalFormat\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(LocaleInfoable)\n }\n return nil\n}", "func DefaultLanguage() Language {\n\tp, ok := os.LookupEnv(\"LC_ALL\")\n\tif ok {\n\t\treturn languageFromLocale(p)\n\t}\n\n\tp, ok = os.LookupEnv(\"LC_CTYPE\")\n\tif ok {\n\t\treturn languageFromLocale(p)\n\t}\n\n\tp, ok = os.LookupEnv(\"LANG\")\n\tif ok {\n\t\treturn languageFromLocale(p)\n\t}\n\n\treturn \"\"\n}", "func (m *RegionalAndLanguageSettings) GetDefaultDisplayLanguage()(LocaleInfoable) {\n val, err := m.GetBackingStore().Get(\"defaultDisplayLanguage\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(LocaleInfoable)\n }\n return nil\n}", "func (_class PoolClass) GetDefaultSR(sessionID SessionRef, self PoolRef) (_retval SRRef, _err error) {\n\tif IsMock {\n\t\treturn _class.GetDefaultSRMock(sessionID, self)\n\t}\t\n\t_method := \"pool.get_default_SR\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertPoolRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_result, _err := _class.client.APICall(_method, _sessionIDArg, _selfArg)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_retval, _err = convertSRRefToGo(_method + \" -> \", _result.Value)\n\treturn\n}", "func (client *Client) GetDefaultDomain(orgGUID string) (Domain, Warnings, error) {\n\trequest, err := client.newHTTPRequest(requestOptions{\n\t\tRequestName: internal.GetDefaultDomainRequest,\n\t\tURIParams: map[string]string{\"organization_guid\": orgGUID},\n\t})\n\tif err != nil {\n\t\treturn Domain{}, nil, err\n\t}\n\n\tvar defaultDomain Domain\n\n\tresponse := cloudcontroller.Response{\n\t\tDecodeJSONResponseInto: &defaultDomain,\n\t}\n\n\terr = client.connection.Make(request, &response)\n\n\treturn defaultDomain, response.Warnings, err\n}", "func (m *TenantInformation) GetDefaultDomainName()(*string) {\n val, err := m.GetBackingStore().Get(\"defaultDomainName\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "func NewGetSolPoliciesDefault(code int) *GetSolPoliciesDefault {\n\treturn &GetSolPoliciesDefault{\n\t\t_statusCode: code,\n\t}\n}", "func GetDefault(path string) (ACL, error) {\n\treturn getDefault(path)\n}", "func GetDefaultSecurityProvider(key string) (*securityprovider.SecurityProviderApiKey, error) {\n\treturn securityprovider.NewSecurityProviderApiKey(\"header\", \"Authorization\", \"Bearer \"+key)\n}", "func (m *GroupPolicyUploadedDefinitionFile) GetDefaultLanguageCode()(*string) {\n val, err := m.GetBackingStore().Get(\"defaultLanguageCode\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "func GetDefaultSubscriber() appv1alpha1.Subscriber {\n\treturn defaultSubscriber\n}", "func AppDefaultI18nLang() string {\n\treturn defaultApp.DefaultI18nLang()\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
GetSLA returns the Service License Agreement for a specific language.
func GetSLA(rez *UDIFResources, lang Language) (*SLA, error) { lpic, err := rez.ParsedLPic() if err != nil { return nil, errors.WithStack(err) } entry, ok := lpic.ByLanguage(lang) if !ok { return nil, nil } textRes, ok := rez.Text.ByID(LPicResourceID + entry.RelativeResourceID) if !ok { return nil, nil } return &SLA{ Language: entry.Language, Text: textRes.StringData(), }, nil }
[ "func GetAgreement(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *AgreementState, opts ...pulumi.ResourceOption) (*Agreement, error) {\n\tvar resource Agreement\n\terr := ctx.ReadResource(\"azure-native:logic/v20160601:Agreement\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (v *SourceLanguageManager) GetLanguage(id string) (*SourceLanguage, error) {\n\tcstr := C.CString(id)\n\tdefer C.free(unsafe.Pointer(cstr))\n\tc := C.gtk_source_language_manager_get_language(v.native(), (*C.gchar)(cstr))\n\tif c == nil {\n\t\treturn nil, nilPtrErr\n\t}\n\treturn wrapSourceLanguage(glib.Take(unsafe.Pointer(c))), nil\n}", "func (a *API) GetLanguage(code string) *model2.Language {\n\texists := false\n\tlanguage := model2.NewLanguage()\n\tfor _, l := range a.Languages {\n\t\tif l.Code == code {\n\t\t\tlanguage = &l\n\t\t\texists = !exists\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif exists {\n\t\treturn language\n\t}\n\n\treturn nil\n}", "func GetDefaultSLA(rez *UDIFResources) (*SLA, error) {\n\tlpic, err := rez.ParsedLPic()\n\tif err != nil {\n\t\treturn nil, errors.WithStack(err)\n\t}\n\n\treturn GetSLA(rez, lpic.DefaultLanguage)\n}", "func GetLanguage(name string) *Language {\n\treturn languages[name]\n}", "func GetLanguage(c *context.Context) string {\n\t// Check LanguageCode Cookie\n\tsignkey := beego.AppConfig.String(\"signkey\")\n\tlang, found := c.GetSecureCookie(signkey, \"LanguageCode\")\n\tif !found || lang == \"\" {\n\t\treturn language.English.String()\n\t}\n\treturn lang\n}", "func (c *SLOClient) Get(sloID string, startUnix time.Time, endUnix time.Time) (*SLOResult, error) {\n\tbody, err := c.client.Get(\n\t\tfmt.Sprintf(\"%s/%s?from=%s&to=%s\",\n\t\t\tsloPath,\n\t\t\tsloID,\n\t\t\tcommon.TimestampToString(startUnix),\n\t\t\tcommon.TimestampToString(endUnix)))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar result SLOResult\n\terr = json.Unmarshal(body, &result)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// for SLO - its also possible that there is an HTTP 200 but there is an error text in the error property!\n\t// Since Sprint 206 the error property is always there - but - will have the value \"NONE\" in case there is no actual error retrieving the value\n\tif result.Error != \"NONE\" {\n\t\treturn nil, fmt.Errorf(\"dynatrace API returned an error: %s\", result.Error)\n\t}\n\n\treturn &result, nil\n}", "func (a *UtilityApiService) GrammaticalFeaturesSourceLanguageGet(ctx context.Context, sourceLanguage string, appId string, appKey string) (UtilityLabels, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Get\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tsuccessPayload UtilityLabels\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/grammaticalFeatures/{source_language}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"source_language\"+\"}\", fmt.Sprintf(\"%v\", sourceLanguage), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"application/json\",\n\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tlocalVarHeaderParams[\"app_id\"] = parameterToString(appId, \"\")\n\tlocalVarHeaderParams[\"app_key\"] = parameterToString(appKey, \"\")\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn successPayload, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn successPayload, localVarHttpResponse, err\n\t}\n\tdefer localVarHttpResponse.Body.Close()\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tbodyBytes, _ := ioutil.ReadAll(localVarHttpResponse.Body)\n\t\treturn successPayload, localVarHttpResponse, reportError(\"Status: %v, Body: %s\", localVarHttpResponse.Status, bodyBytes)\n\t}\n\n\tif err = json.NewDecoder(localVarHttpResponse.Body).Decode(&successPayload); err != nil {\n\t\treturn successPayload, localVarHttpResponse, err\n\t}\n\n\treturn successPayload, localVarHttpResponse, err\n}", "func (m *Manager) GetLicense(ctx context.Context, _ *empty.Empty) (*rpc.License, error) {\n\tclusterID := m.clusterInfo.GetClusterID()\n\tresp := &rpc.License{ClusterId: clusterID}\n\t// We want to be able to test GetClusterID easily in our integration tests,\n\t// so we return the error in the license.ErrMsg response RPC.\n\tvar errMsg string\n\n\t// This is the actual license used by the cluster\n\tlicenseData, err := os.ReadFile(\"/home/telepresence/license\")\n\tif err != nil {\n\t\terrMsg += fmt.Sprintf(\"error reading license: %s\\n\", err)\n\t} else {\n\t\tresp.License = string(licenseData)\n\t}\n\n\t// This is the host domain associated with a license\n\thostDomainData, err := os.ReadFile(\"/home/telepresence/hostDomain\")\n\tif err != nil {\n\t\terrMsg += fmt.Sprintf(\"error reading hostDomain: %s\\n\", err)\n\t} else {\n\t\tresp.Host = string(hostDomainData)\n\t}\n\n\tif errMsg != \"\" {\n\t\tresp.ErrMsg = errMsg\n\t}\n\treturn resp, nil\n}", "func (a *UtilityApiService) LexicalcategoriesLanguageGet(ctx context.Context, language string, appId string, appKey string) (UtilityLabels, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Get\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tsuccessPayload UtilityLabels\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/lexicalcategories/{language}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"language\"+\"}\", fmt.Sprintf(\"%v\", language), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"application/json\",\n\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tlocalVarHeaderParams[\"app_id\"] = parameterToString(appId, \"\")\n\tlocalVarHeaderParams[\"app_key\"] = parameterToString(appKey, \"\")\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn successPayload, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn successPayload, localVarHttpResponse, err\n\t}\n\tdefer localVarHttpResponse.Body.Close()\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tbodyBytes, _ := ioutil.ReadAll(localVarHttpResponse.Body)\n\t\treturn successPayload, localVarHttpResponse, reportError(\"Status: %v, Body: %s\", localVarHttpResponse.Status, bodyBytes)\n\t}\n\n\tif err = json.NewDecoder(localVarHttpResponse.Body).Decode(&successPayload); err != nil {\n\t\treturn successPayload, localVarHttpResponse, err\n\t}\n\n\treturn successPayload, localVarHttpResponse, err\n}", "func (cl *Client) Language(ctx context.Context) (string, error) {\n\treturn cl.doReqString(ctx, \"api/language/current-language\", nil, \"CurrentLanguage\")\n}", "func (a *ServiceLevelObjectivesApiService) GetSLO(ctx _context.Context, sloId string) apiGetSLORequest {\n\treturn apiGetSLORequest{\n\t\tapiService: a,\n\t\tctx: ctx,\n\t\tsloId: sloId,\n\t}\n}", "func (v *SourceBuffer) GetLanguage() (*SourceLanguage, error) {\n\tc := C.gtk_source_buffer_get_language(v.native())\n\tif c == nil {\n\t\treturn nil, nilPtrErr\n\t}\n\treturn wrapSourceLanguage(glib.Take(unsafe.Pointer(c))), nil\n}", "func (catalog *Catalog) GetLicense(label string) *License {\n\tif lic, ok := catalog.List.Licenses[label]; ok {\n\t\treturn lic\n\t}\n\tlogrus.Warn(\"Label %s is not an identifier of a known license \" + label)\n\treturn nil\n}", "func (recv *Context) GetLanguage() *Language {\n\tretC := C.pango_context_get_language((*C.PangoContext)(recv.native))\n\tretGo := LanguageNewFromC(unsafe.Pointer(retC))\n\n\treturn retGo\n}", "func (client *Client) GetServiceLevelObjective(id string) (*ServiceLevelObjective, error) {\n\tvar out reqSingleServiceLevelObjective\n\n\tif id == \"\" {\n\t\treturn nil, fmt.Errorf(\"no SLO specified\")\n\t}\n\n\tif err := client.doJsonRequest(\"GET\", fmt.Sprintf(\"/v1/slo/%s\", id), nil, &out); err != nil {\n\t\treturn nil, err\n\t}\n\tif out.Error != \"\" {\n\t\treturn nil, fmt.Errorf(out.Error)\n\t}\n\n\treturn out.Data, nil\n}", "func (db *PsqlDB) GetLanguage(id int) (*Language, error) {\n\tlanguage := &Language{Id: id}\n\n\terr := db.QueryRow(`\n\t\tSELECT name, tag FROM languages\n\t\tWHERE id = $1`,\n\t\tlanguage.Id,\n\t).Scan(&language.Name, &language.Tag)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn language, nil\n}", "func LsoSubscription() {\n\ts := []byte(`{\n\t\t\"apiVersion\":\"operators.coreos.com/v1alpha1\",\n\t\t\"kind\":\"Subscription\",\n\t\t\"metadata\":{\n\t\t\t\"name\": \"local-storage-operator\",\n\t\t\t\"namespace\":\"openshift-local-storage\",\n\t\t},\n\t\t\"spec\":{\n\t\t\t\"channel\": \"4.6\",\n \"installPlanApproval\": \"Automatic\",\n \"name\": \"local-storage-operator\",\n \"source\": \"redhat-local-storage-src\",\n \"sourceNamespace\": \"openshift-marketplace\",\n\t\t},\n\n\t}`)\n\n\ts, err := yaml.JSONToYAML(s)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t} else {\n\t\tfmt.Println(string(s))\n\t}\n}", "func (m *MdhdBox) GetLanguage() string {\n\ta := (m.Language >> 10) & 0x1f\n\tb := (m.Language >> 5) & 0x1f\n\tc := m.Language & 0x1f\n\treturn fmt.Sprintf(\"%c%c%c\", a+charOffset, b+charOffset, c+charOffset)\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewConvertAmount constructs a new ConvertAmount
func NewConvertAmount() *ConvertAmount { return &ConvertAmount{} }
[ "func NewAmount(amount *big.Int) Amount {\n\treturn Amount{n: new(big.Int).Set(amount)}\n}", "func New(amount int64, currency string) (*Money, error) {\n\tcurr, err := getCurrencyByCode(currency)\n\tif err != nil {\n\t\treturn &Money{}, err\n\t}\n\n\treturn &Money{\n\t\t&Amount{amount},\n\t\tcurr,\n\t}, nil\n}", "func NewAmount(i interface{}) Amount {\n\tswitch i.(type) {\n\tcase int:\n\t\treturn Amount(*big.NewInt(int64(i.(int))))\n\tcase int32:\n\t\treturn Amount(*big.NewInt(int64(i.(int32))))\n\tcase int64:\n\t\treturn Amount(*big.NewInt(i.(int64)))\n\tcase uint32:\n\t\treturn Amount(*big.NewInt(int64(i.(uint32))))\n\tcase uint64:\n\t\ta := new(big.Int).SetUint64(i.(uint64))\n\t\treturn Amount(*a)\n\tcase string:\n\t\ts := i.(string)\n\n\t\t// Check for scientific notation.\n\t\tif strings.Contains(s, \".\") && strings.Contains(s, \"e+\") {\n\t\t\tf, ok := new(big.Float).SetString(s)\n\t\t\tif !ok {\n\t\t\t\treturn Amount(*big.NewInt(0))\n\t\t\t}\n\t\t\ta, _ := f.Int(nil)\n\t\t\treturn Amount(*a)\n\t\t}\n\n\t\ta, ok := new(big.Int).SetString(s, 10)\n\t\tif !ok {\n\t\t\treturn Amount(*big.NewInt(0))\n\t\t}\n\t\treturn Amount(*a)\n\tcase *big.Int:\n\t\ta := i.(*big.Int)\n\t\treturn Amount(*a)\n\tcase big.Int:\n\t\treturn Amount(i.(big.Int))\n\tdefault:\n\t\treturn Amount(*big.NewInt(0))\n\t}\n}", "func NewAmount(f float64) (uint64, error) {\n\t// The amount is only considered invalid if it cannot be represented\n\t// as an integer type. This may happen if f is NaN or +-Infinity.\n\tswitch {\n\tcase math.IsNaN(f):\n\t\tfallthrough\n\tcase math.IsInf(f, 1):\n\t\tfallthrough\n\tcase math.IsInf(f, -1):\n\t\treturn 0, errors.New(\"invalid coin amount\")\n\t}\n\n\treturn round(f * AtomsPerCoin), nil\n}", "func NewAmount(f float64) (Amount, error) {\n\t// The amount is only considered invalid if it cannot be represented\n\t// as an integer type. This may happen if f is NaN or +-Infinity.\n\tswitch {\n\tcase math.IsNaN(f):\n\t\tfallthrough\n\tcase math.IsInf(f, 1):\n\t\tfallthrough\n\tcase math.IsInf(f, -1):\n\t\treturn 0, errors.New(\"invalid bitcoin amount\")\n\t}\n\n\treturn round(f * SatoshiPerBitcoin), nil\n}", "func New(curr string, value int64, exp int32) (Money, error) {\n\n\tc, ok := GetCurrency(curr)\n\tif !ok {\n\t\treturn Money{amount: decimal.Zero, currency: getBadCurrency()}, fmt.Errorf(\"Currency [%s] not supported\", curr)\n\t}\n\treturn Money{\n\t\tamount: decimal.New(value, exp),\n\t\tcurrency: c,\n\t}, nil\n\n}", "func NewAmountFromString(value string) (Amount, error) {\n\tv, err := strconv.ParseFloat(value, 64)\n\tif err != nil {\n\t\treturn 0, fmt.Errorf(\"model.NewAmountFromString: %s\", err)\n\t}\n\n\treturn Amount(v), nil\n}", "func New(units int64) Decimal { return dec2(units * 100) }", "func AmountConversion(a int) string {\n\tfbalance := new(big.Float)\n\tfbalance.SetString(a.String())\n\tethValue := new(big.Float).Quo(fbalance, big.NewFloat(math.Pow(18)))\n\treturn ethValue\n}", "func newZeroAmount(curreny Currency) Amount {\n\treturn Amount{curreny, \"0\", 0}\n}", "func New(conversionrates map[string]map[string]float64) *SimpleConverter {\ns := SimpleConverter{}\ns.rates = conversionrates //storing conversion rate in s \nreturn &s \n//return &SimpleConverter{conversionrates}\n}", "func NewAmount(value float64, currency string) *AmountDataElement {\n\ta := &AmountDataElement{\n\t\tAmount: NewValue(value),\n\t\tCurrency: NewCurrency(currency),\n\t}\n\ta.DataElement = NewGroupDataElementGroup(amountGDEG, 2, a)\n\treturn a\n}", "func NewMoney(c string, a int64, d string) Money {\n\treturn Money{\n\t\tCurrency: c,\n\t\tAmount: a,\n\t\tDescription: d,\n\t}\n}", "func (exchange *Exchange) ConvertTo(target string, amount int) (*big.Float, error) {\n\treturn exchange.apiConvert(query{From: exchange.Base, To: target, Amount: amount})\n}", "func NewFromBigInt(curr string, value *big.Int, exp int32) (Money, error) {\n\n\tc, ok := GetCurrency(curr)\n\tif !ok {\n\t\treturn Money{amount: decimal.Zero, currency: getBadCurrency()}, fmt.Errorf(\"Currency [%s] not supported\", curr)\n\t}\n\n\treturn Money{\n\t\tamount: decimal.NewFromBigInt(value, exp),\n\t\tcurrency: c,\n\t}, nil\n\n}", "func NewCents(cents int64) Decimal { return dec2(cents) }", "func NewConvert(expr sql.Expression, castToType string) *Convert {\n\treturn &Convert{\n\t\tUnaryExpression: UnaryExpression{Child: expr},\n\t\tcastToType: castToType,\n\t}\n}", "func NewFromFloat(curr string, value float64) (Money, error) {\n\treturn NewFromFloatWithExponent(curr, value, math.MinInt32)\n}", "func newDecimalFromString(s string) decimal.Decimal {\n\tresult, err := decimal.NewFromString(s)\n\tif err != nil {\n\t\tpanic(fmt.Errorf(\"Error while converting '%s'\", s))\n\t}\n\treturn result\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewSigningCertificateRequest creates new request for signing certificate
func (c *Provider) NewSigningCertificateRequest( keyLabel, algo string, keySize int, CN string, names []X509Name, hosts []string, ) *CertificateRequest { return &CertificateRequest{ KeyRequest: c.NewKeyRequest(keyLabel, algo, keySize, Signing), CN: CN, Names: names, Hosts: hosts, } }
[ "func CertificateGenerateRequest(privateKey *rsa.PrivateKey, props TlsCertificateProps, fqdncn bool) (*certificates.CertificateSigningRequest, error) {\n\tdnsNames := make([]string, 3)\n\tdnsNames[0] = props.Service\n\tdnsNames[1] = props.Service + \".\" + props.Namespace\n\t// The full service name is the CommonName for the certificate\n\tcommonName := GenerateInClusterServiceName(props)\n\tdnsNames[2] = commonName\n\tcsCommonName := props.Service\n\tif fqdncn {\n\t\t// use FQDN as CommonName as a workaournd for https://github.com/nirmata/kyverno/issues/542\n\t\tcsCommonName = commonName\n\t}\n\tvar ips []net.IP\n\tapiServerIP := net.ParseIP(props.ApiServerHost)\n\tif apiServerIP != nil {\n\t\tips = append(ips, apiServerIP)\n\t} else {\n\t\tdnsNames = append(dnsNames, props.ApiServerHost)\n\t}\n\n\tcsrTemplate := x509.CertificateRequest{\n\t\tSubject: pkix.Name{\n\t\t\tCommonName: csCommonName,\n\t\t},\n\t\tSignatureAlgorithm: x509.SHA256WithRSA,\n\t\tDNSNames: dnsNames,\n\t\tIPAddresses: ips,\n\t}\n\n\tcsrBytes, err := x509.CreateCertificateRequest(rand.Reader, &csrTemplate, privateKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &certificates.CertificateSigningRequest{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"certificates.k8s.io/v1beta1\",\n\t\t\tKind: \"CertificateSigningRequest\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: props.Service + \".\" + props.Namespace + \".cert-request\",\n\t\t},\n\t\tSpec: certificates.CertificateSigningRequestSpec{\n\t\t\tRequest: certificateRequestToPem(csrBytes),\n\t\t\tGroups: []string{\"system:masters\", \"system:authenticated\"},\n\t\t\tUsages: []certificates.KeyUsage{\n\t\t\t\tcertificates.UsageDigitalSignature,\n\t\t\t\tcertificates.UsageKeyEncipherment,\n\t\t\t\tcertificates.UsageServerAuth,\n\t\t\t\tcertificates.UsageClientAuth,\n\t\t\t},\n\t\t},\n\t}, nil\n}", "func (f *certificateFlow) CreateSignRequest(tok, subject string, sans []string) (*api.SignRequest, crypto.PrivateKey, error) {\n\tjwt, err := token.ParseInsecure(tok)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tpk, err := keys.GenerateDefaultKey()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tvar emails []string\n\tdnsNames, ips := splitSANs(sans, jwt.Payload.SANs)\n\tif jwt.Payload.Email != \"\" {\n\t\temails = append(emails, jwt.Payload.Email)\n\t}\n\n\tswitch jwt.Payload.Type() {\n\tcase token.AWS:\n\t\tdoc := jwt.Payload.Amazon.InstanceIdentityDocument\n\t\tif len(ips) == 0 && len(dnsNames) == 0 {\n\t\t\tdefaultSANs := []string{\n\t\t\t\tdoc.PrivateIP,\n\t\t\t\tfmt.Sprintf(\"ip-%s.%s.compute.internal\", strings.Replace(doc.PrivateIP, \".\", \"-\", -1), doc.Region),\n\t\t\t}\n\t\t\tif !sharedContext.DisableCustomSANs {\n\t\t\t\tdefaultSANs = append(defaultSANs, subject)\n\t\t\t}\n\t\t\tdnsNames, ips = splitSANs(defaultSANs)\n\t\t}\n\tcase token.GCP:\n\t\tce := jwt.Payload.Google.ComputeEngine\n\t\tif len(ips) == 0 && len(dnsNames) == 0 {\n\t\t\tdefaultSANs := []string{\n\t\t\t\tfmt.Sprintf(\"%s.c.%s.internal\", ce.InstanceName, ce.ProjectID),\n\t\t\t\tfmt.Sprintf(\"%s.%s.c.%s.internal\", ce.InstanceName, ce.Zone, ce.ProjectID),\n\t\t\t}\n\t\t\tif !sharedContext.DisableCustomSANs {\n\t\t\t\tdefaultSANs = append(defaultSANs, subject)\n\t\t\t}\n\t\t\tdnsNames, ips = splitSANs(defaultSANs)\n\t\t}\n\tcase token.Azure:\n\t\tif len(ips) == 0 && len(dnsNames) == 0 {\n\t\t\tdefaultSANs := []string{\n\t\t\t\tjwt.Payload.Azure.VirtualMachine,\n\t\t\t}\n\t\t\tif !sharedContext.DisableCustomSANs {\n\t\t\t\tdefaultSANs = append(defaultSANs, subject)\n\t\t\t}\n\t\t\tdnsNames, ips = splitSANs(defaultSANs)\n\t\t}\n\tdefault: // Use common name in the token\n\t\tsubject = jwt.Payload.Subject\n\t}\n\n\ttemplate := &x509.CertificateRequest{\n\t\tSubject: pkix.Name{\n\t\t\tCommonName: subject,\n\t\t},\n\t\tSignatureAlgorithm: keys.DefaultSignatureAlgorithm,\n\t\tDNSNames: dnsNames,\n\t\tIPAddresses: ips,\n\t\tEmailAddresses: emails,\n\t}\n\n\tcsr, err := x509.CreateCertificateRequest(rand.Reader, template, pk)\n\tif err != nil {\n\t\treturn nil, nil, errors.Wrap(err, \"error creating certificate request\")\n\t}\n\tcr, err := x509.ParseCertificateRequest(csr)\n\tif err != nil {\n\t\treturn nil, nil, errors.Wrap(err, \"error parsing certificate request\")\n\t}\n\tif err := cr.CheckSignature(); err != nil {\n\t\treturn nil, nil, errors.Wrap(err, \"error signing certificate request\")\n\t}\n\treturn &api.SignRequest{\n\t\tCsrPEM: api.CertificateRequest{CertificateRequest: cr},\n\t\tOTT: tok,\n\t}, pk, nil\n}", "func NewCertificateRequest(ctx RequestContext) (*Impl, error) {\n\n\t// Convert time string to time type\n\ttimes, err := getTimes(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Parse the query parameters\n\treq, err := getReq(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Check to make sure that the request does not have conflicting filters\n\terr = validateReq(req, times)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Impl{\n\t\tID: req.ID,\n\t\tSerialNumber: req.Serial,\n\t\tAki: req.AKI,\n\t\tNotexpired: req.NotExpired,\n\t\tNotrevoked: req.NotRevoked,\n\t\tExpiredTimeStart: times.expiredStart,\n\t\tExpiredTimeEnd: times.expiredEnd,\n\t\tRevokedTimeStart: times.revokedStart,\n\t\tRevokedTimeEnd: times.revokedEnd,\n\t}, nil\n}", "func (c *Client) CertificateSigningRequestCreate(payload *CertificateSigningRequestCreateParametersStruct) (string, error) {\n\tvar err error\n\tvar result string\n\treturn result, err\n}", "func (c Client) RequestCertificate(details CertificateDetails) (csrPEM []byte, keyPEM []byte, certPEM []byte, err error) {\n\tflog := log.WithFields(log.Fields{\"f\": \"RequestCertificate\"})\n\n\tflog.WithFields(log.Fields{\n\t\t\"CN\": details.CommonName,\n\t\t\"Names\": details.Group,\n\t\t\"Hosts\": details.Hosts,\n\t}).Info(\"Requesting new Certificate\")\n\n\tvar cfg *csr.CAConfig\n\tcsrRequest := csr.CertificateRequest{\n\t\tCN: details.CommonName,\n\t\tNames: []csr.Name{{\n\t\t\tO: details.Group,\n\t\t}},\n\t\tHosts: details.Hosts,\n\t\tKeyRequest: &keyParam,\n\t\tCA: cfg,\n\t}\n\n\tg := &csr.Generator{Validator: noopValidator}\n\tcsrPEM, keyPEM, err = g.ProcessRequest(&csrRequest)\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\treq, err := json.Marshal(sign.Request{\n\t\tCertificateRequest: csrPEM,\n\t\tProfile: details.Profile,\n\t})\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\n\tflog.Debugf(\"Invoking Lambda: %s\", *aws.String(\"slsslSign-\" + c.config.Name))\n\tresp, err := c.lambdaSvc.Invoke(&lambda.InvokeInput{FunctionName: aws.String(\"slsslSign-\" + c.config.Name), Payload: req})\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\n\treturn csrPEM, keyPEM, resp.Payload, nil\n}", "func CreateCertificateRequest(rand io.Reader, template *x509.CertificateRequest, priv interface{}) (csr []byte, err error) {\r\n\tkey, ok := priv.(crypto.Signer)\r\n\tif !ok {\r\n\t\treturn nil, errors.New(\"x509: certificate private key does not implement crypto.Signer\")\r\n\t}\r\n\tvar hashFunc crypto.Hash\r\n\tvar sigAlgo pkix.AlgorithmIdentifier\r\n\thashFunc, sigAlgo, err = signingParamsForPublicKey(key.Public(), template.SignatureAlgorithm)\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\tvar publicKeyBytes []byte\r\n\tvar publicKeyAlgorithm pkix.AlgorithmIdentifier\r\n\tpublicKeyBytes, publicKeyAlgorithm, err = marshalPublicKey(key.Public())\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\tvar extensions []pkix.Extension\r\n\r\n\tif (len(template.DNSNames) > 0 || len(template.EmailAddresses) > 0 || len(template.IPAddresses) > 0 || len(template.URIs) > 0) &&\r\n\t\t!oidInExtensions(oidExtensionSubjectAltName, template.ExtraExtensions) {\r\n\t\tsanBytes, err := marshalSANs(template.DNSNames, template.EmailAddresses, template.IPAddresses, template.URIs)\r\n\t\tif err != nil {\r\n\t\t\treturn nil, err\r\n\t\t}\r\n\r\n\t\textensions = append(extensions, pkix.Extension{\r\n\t\t\tId: oidExtensionSubjectAltName,\r\n\t\t\tValue: sanBytes,\r\n\t\t})\r\n\t}\r\n\r\n\textensions = append(extensions, template.ExtraExtensions...)\r\n\r\n\t// Make a copy of template.Attributes because we may alter it below.\r\n\tattributes := make([]pkix.AttributeTypeAndValueSET, 0, len(template.Attributes))\r\n\tfor _, attr := range template.Attributes {\r\n\t\tvalues := make([][]pkix.AttributeTypeAndValue, len(attr.Value))\r\n\t\tcopy(values, attr.Value)\r\n\t\tattributes = append(attributes, pkix.AttributeTypeAndValueSET{\r\n\t\t\tType: attr.Type,\r\n\t\t\tValue: values,\r\n\t\t})\r\n\t}\r\n\r\n\textensionsAppended := false\r\n\tif len(extensions) > 0 {\r\n\t\t// Append the extensions to an existing attribute if possible.\r\n\t\tfor _, atvSet := range attributes {\r\n\t\t\tif !atvSet.Type.Equal(oidExtensionRequest) || len(atvSet.Value) == 0 {\r\n\t\t\t\tcontinue\r\n\t\t\t}\r\n\r\n\t\t\t// specifiedExtensions contains all the extensions that we\r\n\t\t\t// found specified via template.Attributes.\r\n\t\t\tspecifiedExtensions := make(map[string]bool)\r\n\r\n\t\t\tfor _, atvs := range atvSet.Value {\r\n\t\t\t\tfor _, atv := range atvs {\r\n\t\t\t\t\tspecifiedExtensions[atv.Type.String()] = true\r\n\t\t\t\t}\r\n\t\t\t}\r\n\r\n\t\t\tnewValue := make([]pkix.AttributeTypeAndValue, 0, len(atvSet.Value[0])+len(extensions))\r\n\t\t\tnewValue = append(newValue, atvSet.Value[0]...)\r\n\r\n\t\t\tfor _, e := range extensions {\r\n\t\t\t\tif specifiedExtensions[e.Id.String()] {\r\n\t\t\t\t\t// Attributes already contained a value for\r\n\t\t\t\t\t// this extension and it takes priority.\r\n\t\t\t\t\tcontinue\r\n\t\t\t\t}\r\n\r\n\t\t\t\tnewValue = append(newValue, pkix.AttributeTypeAndValue{\r\n\t\t\t\t\t// There is no place for the critical\r\n\t\t\t\t\t// flag in an AttributeTypeAndValue.\r\n\t\t\t\t\tType: e.Id,\r\n\t\t\t\t\tValue: e.Value,\r\n\t\t\t\t})\r\n\t\t\t}\r\n\r\n\t\t\tatvSet.Value[0] = newValue\r\n\t\t\textensionsAppended = true\r\n\t\t\tbreak\r\n\t\t}\r\n\t}\r\n\r\n\trawAttributes, err := newRawAttributes(attributes)\r\n\tif err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\t// If not included in attributes, add a new attribute for the\r\n\t// extensions.\r\n\tif len(extensions) > 0 && !extensionsAppended {\r\n\t\tattr := struct {\r\n\t\t\tType asn1.ObjectIdentifier\r\n\t\t\tValue [][]pkix.Extension `asn1:\"set\"`\r\n\t\t}{\r\n\t\t\tType: oidExtensionRequest,\r\n\t\t\tValue: [][]pkix.Extension{extensions},\r\n\t\t}\r\n\r\n\t\tb, err := asn1.Marshal(attr)\r\n\t\tif err != nil {\r\n\t\t\treturn nil, errors.New(\"x509: failed to serialise extensions attribute: \" + err.Error())\r\n\t\t}\r\n\r\n\t\tvar rawValue asn1.RawValue\r\n\t\tif _, err := asn1.Unmarshal(b, &rawValue); err != nil {\r\n\t\t\treturn nil, err\r\n\t\t}\r\n\r\n\t\trawAttributes = append(rawAttributes, rawValue)\r\n\t}\r\n\r\n\tasn1Subject := template.RawSubject\r\n\tif len(asn1Subject) == 0 {\r\n\t\tasn1Subject, err = asn1.Marshal(template.Subject.ToRDNSequence())\r\n\t\tif err != nil {\r\n\t\t\treturn nil, err\r\n\t\t}\r\n\t}\r\n\r\n\ttbsCSR := tbsCertificateRequest{\r\n\t\tVersion: 0, // PKCS #10, RFC 2986\r\n\t\tSubject: asn1.RawValue{FullBytes: asn1Subject},\r\n\t\tPublicKey: publicKeyInfo{\r\n\t\t\tAlgorithm: publicKeyAlgorithm,\r\n\t\t\tPublicKey: asn1.BitString{\r\n\t\t\t\tBytes: publicKeyBytes,\r\n\t\t\t\tBitLength: len(publicKeyBytes) * 8,\r\n\t\t\t},\r\n\t\t},\r\n\t\tRawAttributes: rawAttributes,\r\n\t}\r\n\r\n\ttbsCSRContents, err := asn1.Marshal(tbsCSR)\r\n\tif err != nil {\r\n\t\treturn\r\n\t}\r\n\ttbsCSR.Raw = tbsCSRContents\r\n\r\n\tsigned := tbsCSRContents\r\n\tvar signature []byte\r\n\tvar opts crypto.SignerOpts = hashFunc\r\n\tif hashFunc != 0 {\r\n\t\th := hashFunc.New()\r\n\t\th.Write(signed)\r\n\t\tsigned = h.Sum(nil)\r\n\t}\r\n\tif sigAlgo.Algorithm.Equal(oidSignatureSM2WithSM3) {\r\n\t\topts = sm2.NewSM2SignerOption(true, nil)\r\n\t}\r\n\tsignature, err = key.Sign(rand, signed, opts)\r\n\tif err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\treturn asn1.Marshal(certificateRequest{\r\n\t\tTBSCSR: tbsCSR,\r\n\t\tSignatureAlgorithm: sigAlgo,\r\n\t\tSignatureValue: asn1.BitString{\r\n\t\t\tBytes: signature,\r\n\t\t\tBitLength: len(signature) * 8,\r\n\t\t},\r\n\t})\r\n}", "func CreateCertificateRequest(rand io.Reader, template *CertificateRequest, priv interface{}) (csr []byte, err error) {\n\tkey, ok := priv.(crypto.Signer)\n\tif !ok {\n\t\treturn nil, errors.New(\"x509: certificate private key does not implement crypto.Signer\")\n\t}\n\n\tvar hashFunc crypto.Hash\n\tvar sigAlgo pkix.AlgorithmIdentifier\n\thashFunc, sigAlgo, err = signingParamsForPublicKey(key.Public(), template.SignatureAlgorithm)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar publicKeyBytes []byte\n\tvar publicKeyAlgorithm pkix.AlgorithmIdentifier\n\tpublicKeyBytes, publicKeyAlgorithm, err = marshalPublicKey(key.Public())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar extensions []pkix.Extension\n\n\tif (len(template.DNSNames) > 0 || len(template.EmailAddresses) > 0 || len(template.IPAddresses) > 0 || len(template.URIs) > 0) &&\n\t\t!oidInExtensions(OIDExtensionSubjectAltName, template.ExtraExtensions) {\n\t\tsanBytes, err := marshalSANs(template.DNSNames, template.EmailAddresses, template.IPAddresses, template.URIs)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\textensions = append(extensions, pkix.Extension{\n\t\t\tId: OIDExtensionSubjectAltName,\n\t\t\tValue: sanBytes,\n\t\t})\n\t}\n\n\textensions = append(extensions, template.ExtraExtensions...)\n\n\t// Make a copy of template.Attributes because we may alter it below.\n\tattributes := make([]pkix.AttributeTypeAndValueSET, 0, len(template.Attributes))\n\tfor _, attr := range template.Attributes {\n\t\tvalues := make([][]pkix.AttributeTypeAndValue, len(attr.Value))\n\t\tcopy(values, attr.Value)\n\t\tattributes = append(attributes, pkix.AttributeTypeAndValueSET{\n\t\t\tType: attr.Type,\n\t\t\tValue: values,\n\t\t})\n\t}\n\n\textensionsAppended := false\n\tif len(extensions) > 0 {\n\t\t// Append the extensions to an existing attribute if possible.\n\t\tfor _, atvSet := range attributes {\n\t\t\tif !atvSet.Type.Equal(oidExtensionRequest) || len(atvSet.Value) == 0 {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// specifiedExtensions contains all the extensions that we\n\t\t\t// found specified via template.Attributes.\n\t\t\tspecifiedExtensions := make(map[string]bool)\n\n\t\t\tfor _, atvs := range atvSet.Value {\n\t\t\t\tfor _, atv := range atvs {\n\t\t\t\t\tspecifiedExtensions[atv.Type.String()] = true\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tnewValue := make([]pkix.AttributeTypeAndValue, 0, len(atvSet.Value[0])+len(extensions))\n\t\t\tnewValue = append(newValue, atvSet.Value[0]...)\n\n\t\t\tfor _, e := range extensions {\n\t\t\t\tif specifiedExtensions[e.Id.String()] {\n\t\t\t\t\t// Attributes already contained a value for\n\t\t\t\t\t// this extension and it takes priority.\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tnewValue = append(newValue, pkix.AttributeTypeAndValue{\n\t\t\t\t\t// There is no place for the critical\n\t\t\t\t\t// flag in an AttributeTypeAndValue.\n\t\t\t\t\tType: e.Id,\n\t\t\t\t\tValue: e.Value,\n\t\t\t\t})\n\t\t\t}\n\n\t\t\tatvSet.Value[0] = newValue\n\t\t\textensionsAppended = true\n\t\t\tbreak\n\t\t}\n\t}\n\n\trawAttributes, err := newRawAttributes(attributes)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// If not included in attributes, add a new attribute for the\n\t// extensions.\n\tif len(extensions) > 0 && !extensionsAppended {\n\t\tattr := struct {\n\t\t\tType asn1.ObjectIdentifier\n\t\t\tValue [][]pkix.Extension `asn1:\"set\"`\n\t\t}{\n\t\t\tType: oidExtensionRequest,\n\t\t\tValue: [][]pkix.Extension{extensions},\n\t\t}\n\n\t\tb, err := asn1.Marshal(attr)\n\t\tif err != nil {\n\t\t\treturn nil, errors.New(\"x509: failed to serialise extensions attribute: \" + err.Error())\n\t\t}\n\n\t\tvar rawValue asn1.RawValue\n\t\tif _, err := asn1.Unmarshal(b, &rawValue); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\trawAttributes = append(rawAttributes, rawValue)\n\t}\n\n\tasn1Subject := template.RawSubject\n\tif len(asn1Subject) == 0 {\n\t\tasn1Subject, err = asn1.Marshal(template.Subject.ToRDNSequence())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\ttbsCSR := tbsCertificateRequest{\n\t\tVersion: 0, // PKCS #10, RFC 2986\n\t\tSubject: asn1.RawValue{FullBytes: asn1Subject},\n\t\tPublicKey: publicKeyInfo{\n\t\t\tAlgorithm: publicKeyAlgorithm,\n\t\t\tPublicKey: asn1.BitString{\n\t\t\t\tBytes: publicKeyBytes,\n\t\t\t\tBitLength: len(publicKeyBytes) * 8,\n\t\t\t},\n\t\t},\n\t\tRawAttributes: rawAttributes,\n\t}\n\n\ttbsCSRContents, err := asn1.Marshal(tbsCSR)\n\tif err != nil {\n\t\treturn\n\t}\n\ttbsCSR.Raw = tbsCSRContents\n\n\tsigned := tbsCSRContents\n\tif hashFunc != 0 {\n\t\th := hashFunc.New()\n\t\th.Write(signed)\n\t\tsigned = h.Sum(nil)\n\t}\n\n\tvar signature []byte\n\tsignature, err = key.Sign(rand, signed, hashFunc)\n\tif err != nil {\n\t\treturn\n\t}\n\n\treturn asn1.Marshal(certificateRequest{\n\t\tTBSCSR: tbsCSR,\n\t\tSignatureAlgorithm: sigAlgo,\n\t\tSignatureValue: asn1.BitString{\n\t\t\tBytes: signature,\n\t\t\tBitLength: len(signature) * 8,\n\t\t},\n\t})\n}", "func (a *ConfigApiService) CreateAgentCertificateSigningRequest(ctx context.Context, body CertificateSigningRequestData, server string, agent string) (string, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Post\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue string\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/config/server/{server}/agent/{agent}/csr\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"server\"+\"}\", fmt.Sprintf(\"%v\", server), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"agent\"+\"}\", fmt.Sprintf(\"%v\", agent), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{\"*/*\"}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\", \"text/plain\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &body\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode < 300 {\n\t\t// If we succeed, return the data, otherwise pass on to decode error.\n\t\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\tif err == nil { \n\t\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t\t}\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 200 {\n\t\t\tvar v string\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 400 {\n\t\t\tvar v ErrorList\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 404 {\n\t\t\tvar v ErrorList\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 500 {\n\t\t\tvar v ErrorList\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHttpResponse, nil\n}", "func New(req *csr.CertificateRequest) (cert, key []byte, err error) {\n\tlog.Infof(\"creating root certificate from CSR\")\n\tg := &csr.Generator{validator}\n\tcsr, key, err := g.ProcessRequest(req)\n\tif err != nil {\n\t\tlog.Errorf(\"failed to process request: %v\", err)\n\t\tkey = nil\n\t\treturn\n\t}\n\n\tpriv, err := helpers.ParsePrivateKeyPEM(key)\n\tif err != nil {\n\t\tlog.Errorf(\"failed to parse private key: %v\", err)\n\t\treturn\n\t}\n\n\ts := &signer.Signer{\n\t\tPriv: priv,\n\t\tPolicy: CAPolicy,\n\t}\n\n\tcert, err = s.Sign(\"\", csr, \"\")\n\treturn\n}", "func signCertificate(creationInfo *creationBundle,\n\tcsr *x509.CertificateRequest) (*certutil.ParsedCertBundle, error) {\n\tswitch {\n\tcase creationInfo == nil:\n\t\treturn nil, errutil.UserError{Err: \"nil creation info given to signCertificate\"}\n\tcase creationInfo.SigningBundle == nil:\n\t\treturn nil, errutil.UserError{Err: \"nil signing bundle given to signCertificate\"}\n\tcase csr == nil:\n\t\treturn nil, errutil.UserError{Err: \"nil csr given to signCertificate\"}\n\t}\n\n\terr := csr.CheckSignature()\n\tif err != nil {\n\t\treturn nil, errutil.UserError{Err: \"request signature invalid\"}\n\t}\n\n\tresult := &certutil.ParsedCertBundle{}\n\n\tserialNumber, err := certutil.GenerateSerialNumber()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tmarshaledKey, err := x509.MarshalPKIXPublicKey(csr.PublicKey)\n\tif err != nil {\n\t\treturn nil, errutil.InternalError{Err: fmt.Sprintf(\"error marshalling public key: %s\", err)}\n\t}\n\tsubjKeyID := sha1.Sum(marshaledKey)\n\n\tsubject := pkix.Name{\n\t\tCommonName: creationInfo.CommonName,\n\t}\n\n\tcertTemplate := &x509.Certificate{\n\t\tSerialNumber: serialNumber,\n\t\tSubject: subject,\n\t\tNotBefore: time.Now().Add(-30 * time.Second),\n\t\tNotAfter: time.Now().Add(creationInfo.TTL),\n\t\tSubjectKeyId: subjKeyID[:],\n\t}\n\n\tswitch creationInfo.SigningBundle.PrivateKeyType {\n\tcase certutil.RSAPrivateKey:\n\t\tcertTemplate.SignatureAlgorithm = x509.SHA256WithRSA\n\tcase certutil.ECPrivateKey:\n\t\tcertTemplate.SignatureAlgorithm = x509.ECDSAWithSHA256\n\t}\n\n\tif creationInfo.UseCSRValues {\n\t\tcertTemplate.Subject = csr.Subject\n\n\t\tcertTemplate.DNSNames = csr.DNSNames\n\t\tcertTemplate.EmailAddresses = csr.EmailAddresses\n\t\tcertTemplate.IPAddresses = csr.IPAddresses\n\n\t\tcertTemplate.ExtraExtensions = csr.Extensions\n\t} else {\n\t\tcertTemplate.DNSNames = creationInfo.DNSNames\n\t\tcertTemplate.EmailAddresses = creationInfo.EmailAddresses\n\t\tcertTemplate.IPAddresses = creationInfo.IPAddresses\n\t}\n\n\taddKeyUsages(creationInfo, certTemplate)\n\n\tvar certBytes []byte\n\tcaCert := creationInfo.SigningBundle.Certificate\n\n\tcertTemplate.IssuingCertificateURL = creationInfo.URLs.IssuingCertificates\n\tcertTemplate.CRLDistributionPoints = creationInfo.URLs.CRLDistributionPoints\n\tcertTemplate.OCSPServer = creationInfo.SigningBundle.URLs.OCSPServers\n\n\tif creationInfo.IsCA {\n\t\tcertTemplate.BasicConstraintsValid = true\n\t\tcertTemplate.IsCA = true\n\n\t\tif creationInfo.SigningBundle.Certificate.MaxPathLen == 0 &&\n\t\t\tcreationInfo.SigningBundle.Certificate.MaxPathLenZero {\n\t\t\treturn nil, errutil.UserError{Err: \"signing certificate has a max path length of zero, and cannot issue further CA certificates\"}\n\t\t}\n\n\t\tcertTemplate.MaxPathLen = creationInfo.MaxPathLength\n\t\tif certTemplate.MaxPathLen == 0 {\n\t\t\tcertTemplate.MaxPathLenZero = true\n\t\t}\n\t}\n\n\tcertBytes, err = x509.CreateCertificate(rand.Reader, certTemplate, caCert, csr.PublicKey, creationInfo.SigningBundle.PrivateKey)\n\n\tif err != nil {\n\t\treturn nil, errutil.InternalError{Err: fmt.Sprintf(\"unable to create certificate: %s\", err)}\n\t}\n\n\tresult.CertificateBytes = certBytes\n\tresult.Certificate, err = x509.ParseCertificate(certBytes)\n\tif err != nil {\n\t\treturn nil, errutil.InternalError{Err: fmt.Sprintf(\"unable to parse created certificate: %s\", err)}\n\t}\n\n\tresult.CAChain = creationInfo.SigningBundle.GetCAChain()\n\n\treturn result, nil\n}", "func (p *X509Proxy) SignRequest(req *X509ProxyRequest, lifetime time.Duration) (new *X509Proxy, err error) {\n\ttemplate := x509.Certificate{}\n\n\ttemplate.PublicKey = req.Request.PublicKey\n\ttemplate.SerialNumber = p.Certificate.SerialNumber\n\tgenerateProxySubject(p, &template.Subject)\n\ttemplate.NotAfter = time.Now().Add(lifetime)\n\ttemplate.NotBefore = time.Now()\n\ttemplate.KeyUsage = p.Certificate.KeyUsage\n\ttemplate.BasicConstraintsValid = true\n\ttemplate.IsCA = false\n\ttemplate.MaxPathLen = p.Certificate.MaxPathLen\n\ttemplate.MaxPathLenZero = p.Certificate.MaxPathLenZero\n\ttemplate.SignatureAlgorithm = req.Request.SignatureAlgorithm\n\n\tif p.Certificate.NotAfter.Before(template.NotAfter) {\n\t\ttemplate.NotAfter = p.Certificate.NotAfter\n\t}\n\n\tswitch p.ProxyType {\n\tcase TypeRFC3820:\n\t\tvar data []byte\n\t\tdata, err = asn1.Marshal(proxyCertInfoExtension{\n\t\t\tProxyPolicy: proxyPolicy{\n\t\t\t\tPolicyLanguage: proxyPolicyInheritAllOid,\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\ttemplate.ExtraExtensions = append(template.ExtraExtensions, pkix.Extension{\n\t\t\tId: proxyCertInfoOid,\n\t\t\tCritical: true,\n\t\t\tValue: data,\n\t\t})\n\t}\n\n\trawCert, err := x509.CreateCertificate(\n\t\trand.Reader, &template, &p.Certificate, req.Request.PublicKey, p.PrivateKey,\n\t)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tcert, err := x509.ParseCertificate(rawCert)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tnew = &X509Proxy{\n\t\tCertificate: *cert,\n\t\tPrivateKey: nil,\n\t\tChain: make([]*x509.Certificate, 0, len(p.Chain)+1),\n\t\tProxyType: p.ProxyType,\n\t\tIssuer: p.Subject,\n\t\tIdentity: p.Identity,\n\t\tVomsAttributes: make([]VomsAttribute, len(p.VomsAttributes)),\n\t}\n\tnew.Chain = append(new.Chain, &p.Certificate)\n\tnew.Chain = append(new.Chain, p.Chain...)\n\tcopy(new.VomsAttributes, p.VomsAttributes)\n\treturn\n}", "func fillCertificateRequest(req *certificate.Request, cf *commandFlags) *certificate.Request {\n\tif cf.caDN != \"\" {\n\t\treq.CADN = cf.caDN\n\t}\n\tif cf.friendlyName != \"\" {\n\t\treq.FriendlyName = cf.friendlyName\n\t}\n\tif cf.commonName != \"\" {\n\t\treq.Subject.CommonName = cf.commonName\n\t}\n\tif cf.country != \"\" {\n\t\treq.Subject.Country = []string{cf.country}\n\t}\n\tif cf.state != \"\" {\n\t\treq.Subject.Province = []string{cf.state}\n\t}\n\tif cf.locality != \"\" {\n\t\treq.Subject.Locality = []string{cf.locality}\n\t}\n\tif cf.org != \"\" {\n\t\treq.Subject.Organization = []string{cf.org}\n\t}\n\tif len(cf.orgUnits) > 0 {\n\t\treq.Subject.OrganizationalUnit = cf.orgUnits\n\t}\n\tif len(cf.dnsSans) > 0 {\n\t\treq.DNSNames = cf.dnsSans\n\t}\n\tif len(cf.ipSans) > 0 {\n\t\treq.IPAddresses = cf.ipSans\n\t}\n\tif len(cf.emailSans) > 0 {\n\t\treq.EmailAddresses = cf.emailSans\n\t}\n\tif len(cf.uriSans) > 0 {\n\t\treq.URIs = cf.uriSans\n\t}\n\tif len(cf.upnSans) > 0 {\n\t\treq.UPNs = cf.upnSans\n\t}\n\treq.OmitSANs = cf.omitSans\n\tfor _, f := range cf.customFields {\n\t\tk, v, err := parseCustomField(f)\n\t\tif err != nil {\n\t\t\tlogger.Panic(err)\n\t\t}\n\t\treq.CustomFields = append(req.CustomFields, certificate.CustomField{Name: k, Value: v})\n\t}\n\n\tif len(cf.instance) > 0 {\n\t\treq.Location = &certificate.Location{}\n\t\tinstance := strings.Split(cf.instance, \":\")\n\t\treq.Location.Instance = instance[0]\n\t\tif len(instance) > 1 {\n\t\t\treq.Location.Workload = instance[1]\n\t\t}\n\n\t\treq.Location.TLSAddress = cf.tlsAddress\n\t\treq.Location.Replace = cf.replaceInstance\n\t}\n\n\torigin := OriginName\n\tif len(cf.appInfo) > 0 {\n\t\torigin = cf.appInfo\n\t}\n\treq.CustomFields = append(req.CustomFields, certificate.CustomField{Name: \"Origin\", Value: origin, Type: certificate.CustomFieldOrigin})\n\n\tswitch true {\n\tcase 0 == strings.Index(cf.csrOption, \"file:\"):\n\t\tvar err error\n\t\tcsrFileName := cf.csrOption[5:]\n\t\tcsr, err := readCSRfromFile(csrFileName)\n\t\tif err != nil {\n\t\t\tlogger.Panicf(\"Failed to read CSR from file %s: %s\", csrFileName, err)\n\t\t}\n\t\terr = req.SetCSR(csr)\n\t\tif err != nil {\n\t\t\tlogger.Panicf(\"Failed to set CSR %s\", err)\n\t\t}\n\t\treq.CsrOrigin = certificate.UserProvidedCSR\n\n\tcase \"service\" == cf.csrOption:\n\t\tif cf.keyType != nil {\n\t\t\treq.KeyType = *cf.keyType\n\t\t}\n\t\tif cf.keySize > 0 {\n\t\t\treq.KeyLength = cf.keySize\n\t\t} else if req.KeyLength == 0 {\n\t\t\treq.KeyLength = 2048\n\t\t}\n\t\tif cf.keyCurve != certificate.EllipticCurveNotSet {\n\t\t\treq.KeyCurve = cf.keyCurve\n\t\t}\n\t\treq.CsrOrigin = certificate.ServiceGeneratedCSR\n\n\tdefault: // \"local\" == cf.csrOption:\n\t\tif cf.keyType != nil {\n\t\t\treq.KeyType = *cf.keyType\n\t\t}\n\t\tif cf.keySize > 0 {\n\t\t\treq.KeyLength = cf.keySize\n\t\t} else if req.KeyLength == 0 {\n\t\t\treq.KeyLength = 2048\n\t\t}\n\t\tif cf.keyCurve != certificate.EllipticCurveNotSet {\n\t\t\treq.KeyCurve = cf.keyCurve\n\t\t}\n\t\treq.CsrOrigin = certificate.LocalGeneratedCSR\n\t}\n\n\tif cf.validDays != \"\" {\n\t\tdata := strings.Split(cf.validDays, \"#\")\n\t\tdays, _ := strconv.ParseInt(data[0], 10, 64)\n\t\tduration := time.Duration(days) * time.Hour * 24\n\n\t\treq.ValidityDuration = &duration\n\n\t\tif len(data) > 1 { // means that issuer hint is set\n\t\t\tvar issuerHint util.IssuerHint\n\n\t\t\tswitch strings.ToLower(data[1]) {\n\t\t\tcase \"m\":\n\t\t\t\tissuerHint = util.IssuerHintMicrosoft\n\t\t\tcase \"d\":\n\t\t\t\tissuerHint = util.IssuerHintDigicert\n\t\t\tcase \"e\":\n\t\t\t\tissuerHint = util.IssuerHintEntrust\n\t\t\t}\n\n\t\t\treq.IssuerHint = issuerHint\n\t\t}\n\t}\n\n\tif cf.validPeriod != \"\" {\n\t\treq.ValidityPeriod = cf.validPeriod\n\t}\n\n\treturn req\n}", "func (identityProvider *certificateIdentityProvider) ApproveSigningRequest(clusterID,\n\tsigningRequest string) (response *responsetypes.SigningRequestResponse, err error) {\n\trnd := fmt.Sprintf(\"%v\", rand.Int63())\n\n\tsigningBytes, err := base64.StdEncoding.DecodeString(signingRequest)\n\tif err != nil {\n\t\tklog.Error(err)\n\t\treturn response, err\n\t}\n\n\tcert := &certv1.CertificateSigningRequest{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tGenerateName: strings.Join([]string{identitySecretRoot, \"\"}, \"-\"),\n\t\t\tLabels: map[string]string{\n\t\t\t\t// the informer needs to select it by label, this is a temporal ID for this request\n\t\t\t\trandomIDLabel: rnd,\n\t\t\t},\n\t\t},\n\t\tSpec: certv1.CertificateSigningRequestSpec{\n\t\t\tGroups: []string{\n\t\t\t\t\"system:authenticated\",\n\t\t\t},\n\t\t\tSignerName: certv1.KubeAPIServerClientSignerName,\n\t\t\tRequest: signingBytes,\n\t\t\tUsages: []certv1.KeyUsage{\n\t\t\t\tcertv1.UsageDigitalSignature,\n\t\t\t\tcertv1.UsageKeyEncipherment,\n\t\t\t\tcertv1.UsageClientAuth,\n\t\t\t},\n\t\t},\n\t}\n\n\tcert, err = identityProvider.client.CertificatesV1().CertificateSigningRequests().Create(context.TODO(), cert, metav1.CreateOptions{})\n\tif err != nil {\n\t\tklog.Error(err)\n\t\treturn response, err\n\t}\n\n\t// approve the CertificateSigningRequest\n\tif err = certificateSigningRequest.ApproveCSR(identityProvider.client, cert, \"IdentityManagerApproval\",\n\t\t\"This CSR was approved by Liqo Identity Manager\"); err != nil {\n\t\tklog.Error(err)\n\t\treturn response, err\n\t}\n\n\tresponse = &responsetypes.SigningRequestResponse{\n\t\tResponseType: responsetypes.SigningRequestResponseCertificate,\n\t}\n\t// retrieve the certificate issued by the Kubernetes issuer in the CSR\n\tresponse.Certificate, err = identityProvider.getCertificate(cert, rnd)\n\tif err != nil {\n\t\tklog.Error(err)\n\t\treturn response, err\n\t}\n\n\t// store the certificate in a Secret, in this way is possbile to retrieve it again in the future\n\tif _, err = identityProvider.storeRemoteCertificate(clusterID, signingBytes, response.Certificate); err != nil {\n\t\tklog.Error(err)\n\t\treturn response, err\n\t}\n\treturn response, nil\n}", "func New(request client.APICertificateRequest) ([]byte, []byte, error) {\n\n\tvar (\n\t\tca CA\n\t\tcaCert, caKey []byte\n\t\terr error\n\t)\n\n\t// validation - request has the minimal required values\n\tif !valid(request) {\n\t\treturn []byte{}, []byte{}, rest.ErrBadRequest\n\t}\n\n\tca.ca = APITox509Certificate(request)\n\n\tca.caKey, err = apiToCryptoKey(request)\n\tif err != nil {\n\t\treturn []byte{}, []byte{}, err\n\t}\n\n\tca.ca.IsCA = true\n\tca.ca.ExtKeyUsage = []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth}\n\tca.ca.KeyUsage = x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign\n\tca.ca.BasicConstraintsValid = true\n\tca.ca.MaxPathLenZero = true\n\n\tspkiASN1, err := x509.MarshalPKIXPublicKey(ca.caKey.(crypto.Signer).Public())\n\tif err != nil {\n\t\treturn []byte{}, []byte{}, err\n\t}\n\n\tvar spki struct {\n\t\tAlgorithm pkix.AlgorithmIdentifier\n\t\tSubjectPublicKey asn1.BitString\n\t}\n\t_, err = asn1.Unmarshal(spkiASN1, &spki)\n\tif err != nil {\n\t\treturn []byte{}, []byte{}, err\n\t}\n\n\tskid := sha1.Sum(spki.SubjectPublicKey.Bytes)\n\n\tca.ca.SubjectKeyId = skid[:]\n\n\tcaCert, caKey, err = ca.CreateCertificate(ca.ca, ca.caKey)\n\tif err != nil {\n\t\treturn []byte{}, []byte{}, err\n\t}\n\n\tca.bytesCertificate = caCert\n\n\treturn caCert, caKey, err\n\n}", "func CreateRequest(cert, issuer *x509.Certificate, opts *RequestOptions) ([]byte, error) {\r\n\thashFunc := opts.hash()\r\n\r\n\t// OCSP seems to be the only place where these raw hash identifiers are\r\n\t// used. I took the following from\r\n\t// http://msdn.microsoft.com/en-us/library/ff635603.aspx\r\n\tvar hashOID asn1.ObjectIdentifier\r\n\tswitch hashFunc {\r\n\tcase crypto.SHA1:\r\n\t\thashOID = asn1.ObjectIdentifier([]int{1, 3, 14, 3, 2, 26})\r\n\tcase crypto.SHA256:\r\n\t\thashOID = asn1.ObjectIdentifier([]int{2, 16, 840, 1, 101, 3, 4, 2, 1})\r\n\tcase crypto.SHA384:\r\n\t\thashOID = asn1.ObjectIdentifier([]int{2, 16, 840, 1, 101, 3, 4, 2, 2})\r\n\tcase crypto.SHA512:\r\n\t\thashOID = asn1.ObjectIdentifier([]int{2, 16, 840, 1, 101, 3, 4, 2, 3})\r\n\tdefault:\r\n\t\treturn nil, x509.ErrUnsupportedAlgorithm\r\n\t}\r\n\r\n\tif !hashFunc.Available() {\r\n\t\treturn nil, x509.ErrUnsupportedAlgorithm\r\n\t}\r\n\th := opts.hash().New()\r\n\r\n\tvar publicKeyInfo struct {\r\n\t\tAlgorithm pkix.AlgorithmIdentifier\r\n\t\tPublicKey asn1.BitString\r\n\t}\r\n\tif _, err := asn1.Unmarshal(issuer.RawSubjectPublicKeyInfo, &publicKeyInfo); err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\th.Write(publicKeyInfo.PublicKey.RightAlign())\r\n\tissuerKeyHash := h.Sum(nil)\r\n\r\n\th.Reset()\r\n\th.Write(issuer.RawSubject)\r\n\tissuerNameHash := h.Sum(nil)\r\n\r\n\treturn asn1.Marshal(ocspRequest{\r\n\t\ttbsRequest{\r\n\t\t\tVersion: 0,\r\n\t\t\tRequestList: []request{\r\n\t\t\t\t{\r\n\t\t\t\t\tCert: certID{\r\n\t\t\t\t\t\tpkix.AlgorithmIdentifier{\r\n\t\t\t\t\t\t\tAlgorithm: hashOID,\r\n\t\t\t\t\t\t\tParameters: asn1.RawValue{Tag: 5 /* ASN.1 NULL */},\r\n\t\t\t\t\t\t},\r\n\t\t\t\t\t\tissuerNameHash,\r\n\t\t\t\t\t\tissuerKeyHash,\r\n\t\t\t\t\t\tcert.SerialNumber,\r\n\t\t\t\t\t},\r\n\t\t\t\t},\r\n\t\t\t},\r\n\t\t},\r\n\t})\r\n}", "func (c *CKMctrler) SignCertificateRequest(ctx context.Context, req *ckmproto.CertificateSignReq) (*ckmproto.CertificateSignResp, error) {\n\tvar err error\n\n\t// make sure counters are updated on return\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tc.incrementRPCError()\n\t\t} else {\n\t\t\tc.incrementRPCSuccess()\n\t\t}\n\t}()\n\n\t// Only check that CSR is syntactically valid\n\tcsr, err := x509.ParseCertificateRequest(req.GetCsr())\n\tif err != nil {\n\t\tlog.Errorf(\"Received invalid certificate request, error: %v\", err)\n\t\treturn &ckmproto.CertificateSignResp{Approved: false}, err\n\t}\n\n\terr = csr.CheckSignature()\n\tif err != nil {\n\t\tlog.Errorf(\"Received CSR with invalid signature, error: %v\", err)\n\t\treturn &ckmproto.CertificateSignResp{Approved: false}, err\n\t}\n\n\tcert, err := certs.SignCSRwithCA(csr, c.certificate, c.privateKey, certs.WithValidityDays(7))\n\tif err != nil {\n\t\tlog.Errorf(\"Error signing CSR: %v\", err)\n\t\treturn &ckmproto.CertificateSignResp{Approved: false}, err\n\t}\n\n\treturn &ckmproto.CertificateSignResp{\n\t\tCertificate: &ckmproto.Certificate{Certificate: cert.Raw},\n\t\tApproved: true}, nil\n}", "func newSignedCert(cfg certutil.Config, key crypto.Signer, caCert *x509.Certificate, caKey crypto.Signer) (*x509.Certificate, error) {\n\tserial, err := rand.Int(rand.Reader, new(big.Int).SetInt64(math.MaxInt64))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(cfg.CommonName) == 0 {\n\t\treturn nil, errors.New(\"must specify a CommonName\")\n\t}\n\tif len(cfg.Usages) == 0 {\n\t\treturn nil, errors.New(\"must specify at least one ExtKeyUsage\")\n\t}\n\n\tcertTmpl := x509.Certificate{\n\t\tSubject: pkix.Name{\n\t\t\tCommonName: cfg.CommonName,\n\t\t\tOrganization: cfg.Organization,\n\t\t},\n\t\tDNSNames: cfg.AltNames.DNSNames,\n\t\tIPAddresses: cfg.AltNames.IPs,\n\t\tSerialNumber: serial,\n\t\tNotBefore: caCert.NotBefore,\n\t\tNotAfter: time.Now().Add(duration365d).UTC(),\n\t\tKeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,\n\t\tExtKeyUsage: cfg.Usages,\n\t}\n\tcertDERBytes, err := x509.CreateCertificate(rand.Reader, &certTmpl, caCert, key.Public(), caKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn x509.ParseCertificate(certDERBytes)\n}", "func (s *CertificateRequest) SignRequest(rand io.Reader, userKey ssh.Signer) (err error) {\n\tpayload := GenerateSigningPayload(s)\n\tsignature, err := userKey.Sign(rand, payload)\n\tif err != nil {\n\t\treturn err\n\t}\n\ts.Signature = signature\n\treturn nil\n}", "func newSignedCert(cfg certutil.Config, key crypto.Signer, caCert *x509.Certificate, caKey crypto.Signer, duration time.Duration) (*x509.Certificate, error) {\n\tserial, err := rand.Int(rand.Reader, new(big.Int).SetInt64(math.MaxInt64))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(cfg.CommonName) == 0 {\n\t\treturn nil, errors.New(\"must specify a CommonName\")\n\t}\n\tif len(cfg.Usages) == 0 {\n\t\treturn nil, errors.New(\"must specify at least one ExtKeyUsage\")\n\t}\n\n\tcertTmpl := x509.Certificate{\n\t\tSubject: pkix.Name{\n\t\t\tCommonName: cfg.CommonName,\n\t\t\tOrganization: cfg.Organization,\n\t\t},\n\t\tDNSNames: cfg.AltNames.DNSNames,\n\t\tIPAddresses: cfg.AltNames.IPs,\n\t\tSerialNumber: serial,\n\t\tNotBefore: caCert.NotBefore,\n\t\tNotAfter: time.Now().Add(duration).UTC(),\n\t\tKeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,\n\t\tExtKeyUsage: cfg.Usages,\n\t}\n\tcertDERBytes, err := x509.CreateCertificate(cryptorand.Reader, &certTmpl, caCert, key.Public(), caKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn x509.ParseCertificate(certDERBytes)\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewRoot creates a new root certificate from the certificate request.
func (c *Provider) NewRoot(req *CertificateRequest) (cert, csrPEM, key []byte, err error) { // RootCA fixup policy, err := MakeCAPolicy(req) if err != nil { err = errors.WithMessage(err, "ca policy failed") return } err = ValidateCSR(req) if err != nil { err = errors.WithMessage(err, "invalid request") return } csrPEM, gkey, keyID, err := c.ParseCsrRequest(req) if err != nil { key = nil err = errors.WithMessage(err, "process request") return } signkey := gkey.(crypto.Signer) uri, keyBytes, err := c.provider.ExportKey(keyID) if err != nil { err = errors.WithMessage(err, "key URI") return } if keyBytes == nil { key = []byte(uri) } else { key = keyBytes } s, err := local.NewSigner(signkey, nil, signer.DefaultSigAlgo(signkey), policy) if err != nil { err = errors.WithMessage(err, "create signer") return } signReq := signer.SignRequest{Hosts: req.Hosts, Request: string(csrPEM)} cert, err = s.Sign(signReq) return }
[ "func New(req *csr.CertificateRequest) (cert, key []byte, err error) {\n\tlog.Infof(\"creating root certificate from CSR\")\n\tg := &csr.Generator{validator}\n\tcsr, key, err := g.ProcessRequest(req)\n\tif err != nil {\n\t\tlog.Errorf(\"failed to process request: %v\", err)\n\t\tkey = nil\n\t\treturn\n\t}\n\n\tpriv, err := helpers.ParsePrivateKeyPEM(key)\n\tif err != nil {\n\t\tlog.Errorf(\"failed to parse private key: %v\", err)\n\t\treturn\n\t}\n\n\ts := &signer.Signer{\n\t\tPriv: priv,\n\t\tPolicy: CAPolicy,\n\t}\n\n\tcert, err = s.Sign(\"\", csr, \"\")\n\treturn\n}", "func (c *ca) createRoot(mountPoint, domain, service string, force bool) error {\n\t// Check if there is already a PKI mounted at the given mountpoint\n\tmounts, err := c.vaultClient.Sys().ListMounts()\n\tif err != nil {\n\t\treturn maskAny(err)\n\t}\n\tif _, found := mounts[mountPoint+\"/\"]; found {\n\t\t// Already mounted\n\t\tc.log.Debugf(\"pki already mounted at %s\", mountPoint)\n\t\tif !force {\n\t\t\treturn nil\n\t\t}\n\t}\n\n\t// Mount PKI\n\tc.log.Debugf(\"mounting pki at %s\", mountPoint)\n\tinfo := &api.MountInput{\n\t\tType: \"pki\",\n\t\tDescription: \"CA mount for \" + mountPoint,\n\t\tConfig: api.MountConfigInput{\n\t\t\tMaxLeaseTTL: \"87600h\",\n\t\t},\n\t}\n\tif err := c.vaultClient.Sys().Mount(mountPoint, info); err != nil {\n\t\treturn maskAny(err)\n\t}\n\n\t// Create root certificate\n\tc.log.Debugf(\"generating root certificate pki at %s\", mountPoint)\n\trelPath := path.Join(mountPoint, \"root/generate/internal\")\n\tdata := make(map[string]interface{})\n\tdata[\"common_name\"] = fmt.Sprintf(\"%s.%s\", service, domain)\n\tdata[\"ttl\"] = \"87600h\"\n\tif _, err := c.vaultClient.Logical().Write(relPath, data); err != nil {\n\t\treturn maskAny(err)\n\t}\n\n\treturn nil\n}", "func NewRootCA(rootCertBytes, signCertBytes, signKeyBytes []byte, certExpiry time.Duration, intermediates []byte) (RootCA, error) {\n\t// Parse all the certificates in the cert bundle\n\tparsedCerts, err := helpers.ParseCertificatesPEM(rootCertBytes)\n\tif err != nil {\n\t\treturn RootCA{}, errors.Wrap(err, \"invalid root certificates\")\n\t}\n\t// Check to see if we have at least one valid cert\n\tif len(parsedCerts) < 1 {\n\t\treturn RootCA{}, errors.New(\"no valid root CA certificates found\")\n\t}\n\n\t// Create a Pool with all of the certificates found\n\tpool := x509.NewCertPool()\n\tfor _, cert := range parsedCerts {\n\t\tif err := validateSignatureAlgorithm(cert); err != nil {\n\t\t\treturn RootCA{}, err\n\t\t}\n\t\t// Check to see if all of the certificates are valid, self-signed root CA certs\n\t\tselfpool := x509.NewCertPool()\n\t\tselfpool.AddCert(cert)\n\t\tif _, err := cert.Verify(x509.VerifyOptions{Roots: selfpool}); err != nil {\n\t\t\treturn RootCA{}, errors.Wrap(err, \"error while validating Root CA Certificate\")\n\t\t}\n\t\tpool.AddCert(cert)\n\t}\n\n\t// Calculate the digest for our Root CA bundle\n\tdigest := digest.FromBytes(rootCertBytes)\n\n\t// The intermediates supplied must be able to chain up to the root certificates, so that when they are appended to\n\t// a leaf certificate, the leaf certificate can be validated through the intermediates to the root certificates.\n\tvar intermediatePool *x509.CertPool\n\tvar parsedIntermediates []*x509.Certificate\n\tif len(intermediates) > 0 {\n\t\tparsedIntermediates, _, err = ValidateCertChain(pool, intermediates, false)\n\t\tif err != nil {\n\t\t\treturn RootCA{}, errors.Wrap(err, \"invalid intermediate chain\")\n\t\t}\n\t\tintermediatePool = x509.NewCertPool()\n\t\tfor _, cert := range parsedIntermediates {\n\t\t\tintermediatePool.AddCert(cert)\n\t\t}\n\t}\n\n\tvar localSigner *LocalSigner\n\tif len(signKeyBytes) != 0 || len(signCertBytes) != 0 {\n\t\tlocalSigner, err = newLocalSigner(signKeyBytes, signCertBytes, certExpiry, pool, intermediatePool)\n\t\tif err != nil {\n\t\t\treturn RootCA{}, err\n\t\t}\n\n\t\t// If a signer is provided and there are intermediates, then either the first intermediate would be the signer CA\n\t\t// certificate (in which case it'd have the same subject and public key), or it would be a cross-signed\n\t\t// intermediate with the same subject and public key as our signing CA certificate (which could be either an\n\t\t// intermediate cert or a self-signed root cert).\n\t\tif len(parsedIntermediates) > 0 && (!bytes.Equal(parsedIntermediates[0].RawSubject, localSigner.parsedCert.RawSubject) ||\n\t\t\t!bytes.Equal(parsedIntermediates[0].RawSubjectPublicKeyInfo, localSigner.parsedCert.RawSubjectPublicKeyInfo)) {\n\t\t\treturn RootCA{}, errors.New(\n\t\t\t\t\"invalid intermediate chain - the first intermediate must have the same subject and public key as the signing cert\")\n\t\t}\n\t}\n\n\treturn RootCA{signer: localSigner, Intermediates: intermediates, Digest: digest, Certs: rootCertBytes, Pool: pool}, nil\n}", "func (c *Container) NewRoot(pk cipher.PubKey, sk cipher.SecKey) (r *Root,\n\terr error) {\n\n\tif c.coreRegistry == nil {\n\t\terr = ErrNoCoreRegistry\n\t\treturn\n\t}\n\n\tif r, err = c.newRoot(pk, sk); err != nil {\n\t\treturn\n\t}\n\n\tr.reg = c.coreRegistry.Reference()\n\tr.rsh = c.coreRegistry\n\n\treturn\n}", "func (rca *RootCA) RequestAndSaveNewCertificates(ctx context.Context, kw KeyWriter, config CertificateRequestConfig) (*tls.Certificate, *IssuerInfo, error) {\n\t// Create a new key/pair and CSR\n\tcsr, key, err := GenerateNewCSR()\n\tif err != nil {\n\t\treturn nil, nil, errors.Wrap(err, \"error when generating new node certs\")\n\t}\n\n\t// Get the remote manager to issue a CA signed certificate for this node\n\t// Retry up to 5 times in case the manager we first try to contact isn't\n\t// responding properly (for example, it may have just been demoted).\n\tvar signedCert []byte\n\tfor i := 0; i != 5; i++ {\n\t\tsignedCert, err = GetRemoteSignedCertificate(ctx, csr, rca.Pool, config)\n\t\tif err == nil {\n\t\t\tbreak\n\t\t}\n\n\t\t// If the first attempt fails, we should try a remote\n\t\t// connection. The local node may be a manager that was\n\t\t// demoted, so the local connection (which is preferred) may\n\t\t// not work. If we are successful in renewing the certificate,\n\t\t// the local connection will not be returned by the connection\n\t\t// broker anymore.\n\t\tconfig.ForceRemote = true\n\n\t\t// Wait a moment, in case a leader election was taking place.\n\t\tselect {\n\t\tcase <-time.After(config.RetryInterval):\n\t\tcase <-ctx.Done():\n\t\t\treturn nil, nil, ctx.Err()\n\t\t}\n\t}\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\t// Доверяй, но проверяй.\n\t// Before we overwrite our local key + certificate, let's make sure the server gave us one that is valid\n\t// Create an X509Cert so we can .Verify()\n\t// Check to see if this certificate was signed by our CA, and isn't expired\n\tparsedCerts, chains, err := ValidateCertChain(rca.Pool, signedCert, false)\n\t// TODO(cyli): - right now we need the invalid certificate in order to determine whether or not we should\n\t// download a new root, because we only want to do that in the case of workers. When we have a single\n\t// codepath for updating the root CAs for both managers and workers, this snippet can go.\n\tif _, ok := err.(x509.UnknownAuthorityError); ok {\n\t\tif parsedCerts, parseErr := helpers.ParseCertificatesPEM(signedCert); parseErr == nil && len(parsedCerts) > 0 {\n\t\t\treturn nil, nil, x509UnknownAuthError{\n\t\t\t\terror: err,\n\t\t\t\tfailedLeafCert: parsedCerts[0],\n\t\t\t}\n\t\t}\n\t}\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\t// ValidateChain, if successful, will always return at least 1 parsed cert and at least 1 chain containing\n\t// at least 2 certificates: the leaf and the root.\n\tleafCert := parsedCerts[0]\n\tissuer := chains[0][1]\n\n\t// Create a valid TLSKeyPair out of the PEM encoded private key and certificate\n\ttlsKeyPair, err := tls.X509KeyPair(signedCert, key)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tvar kekUpdate *KEKData\n\tfor i := 0; i < 5; i++ {\n\t\t// ValidateCertChain will always return at least 1 cert, so indexing at 0 is safe\n\t\tkekUpdate, err = rca.getKEKUpdate(ctx, leafCert, tlsKeyPair, config)\n\t\tif err == nil {\n\t\t\tbreak\n\t\t}\n\n\t\tconfig.ForceRemote = true\n\n\t\t// Wait a moment, in case a leader election was taking place.\n\t\tselect {\n\t\tcase <-time.After(config.RetryInterval):\n\t\tcase <-ctx.Done():\n\t\t\treturn nil, nil, ctx.Err()\n\t\t}\n\t}\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tif err := kw.Write(NormalizePEMs(signedCert), key, kekUpdate); err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\treturn &tlsKeyPair, &IssuerInfo{\n\t\tPublicKey: issuer.RawSubjectPublicKeyInfo,\n\t\tSubject: issuer.RawSubject,\n\t}, nil\n}", "func newLeaf(trustAnchor *Certificate, intermediates []*Certificate) (*Certificate, error) {\n\tvar parent *Certificate\n\tif len(intermediates) == 0 {\n\t\tparent = trustAnchor\n\t} else {\n\t\tparent = intermediates[len(intermediates)-1]\n\t}\n\t// Edit this template to look like whatever leaf cert you need.\n\ttemplate := x509.Certificate{\n\t\tRaw: nil,\n\t\tRawTBSCertificate: nil,\n\t\tRawSubjectPublicKeyInfo: nil,\n\t\tRawSubject: nil,\n\t\tRawIssuer: nil,\n\t\tSignature: nil,\n\t\tSignatureAlgorithm: 0,\n\t\tPublicKeyAlgorithm: 0,\n\t\tPublicKey: nil,\n\t\tVersion: 0,\n\t\tSerialNumber: nextSerial(),\n\t\tIssuer: pkix.Name{},\n\t\tSubject: pkix.Name{},\n\t\tNotBefore: util.RFC5280Date,\n\t\tNotAfter: time.Date(9999, 0, 0, 0, 0, 0, 0, time.UTC),\n\t\tKeyUsage: 0,\n\t\tExtensions: nil,\n\t\tExtraExtensions: nil,\n\t\tUnhandledCriticalExtensions: nil,\n\t\tExtKeyUsage: nil,\n\t\tUnknownExtKeyUsage: nil,\n\t\tBasicConstraintsValid: false,\n\t\tIsCA: false,\n\t\tMaxPathLen: 0,\n\t\tMaxPathLenZero: false,\n\t\tSubjectKeyId: nil,\n\t\tAuthorityKeyId: nil,\n\t\tOCSPServer: nil,\n\t\tIssuingCertificateURL: nil,\n\t\tDNSNames: nil,\n\t\tEmailAddresses: nil,\n\t\tIPAddresses: nil,\n\t\tURIs: nil,\n\t\tPermittedEmailAddresses: nil,\n\t\tExcludedEmailAddresses: nil,\n\t\tCRLDistributionPoints: nil,\n\t\tPolicyIdentifiers: nil,\n\t}\n\tkey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcert, err := x509.CreateCertificate(rand.Reader, &template, parent.Certificate, key.Public(), parent.private)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tc, err := x509.ParseCertificate(cert)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Certificate{\n\t\tCertificate: c,\n\t\tpublic: key.Public(),\n\t\tprivate: key,\n\t}, nil\n}", "func NewRootInitRequestTransaction(\n\tkeyPair *ed25519.KeyPair,\n\tchainID *iscp.ChainID,\n\tdescription string,\n\ttimestamp time.Time,\n\tallInputs ...ledgerstate.Output,\n) (*ledgerstate.Transaction, error) {\n\ttxb := utxoutil.NewBuilder(allInputs...).WithTimestamp(timestamp)\n\n\targs := requestargs.New(nil)\n\n\targs.AddEncodeSimple(governance.ParamChainID, codec.EncodeChainID(chainID))\n\targs.AddEncodeSimple(governance.ParamDescription, codec.EncodeString(description))\n\n\tmetadata := request.NewMetadata().\n\t\tWithTarget(iscp.Hn(\"root\")).\n\t\tWithEntryPoint(iscp.EntryPointInit).\n\t\tWithArgs(args).\n\t\tBytes()\n\n\terr := txb.AddExtendedOutputConsume(chainID.AsAddress(), metadata, colored.Balances1IotaL1)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\taddr := ledgerstate.NewED25519Address(keyPair.PublicKey)\n\tif err := txb.AddRemainderOutputIfNeeded(addr, nil, true); err != nil {\n\t\treturn nil, err\n\t}\n\ttx, err := txb.BuildWithED25519(keyPair)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn tx, nil\n}", "func genTestRootCert() (cert_b, priv_b []byte) {\n\t//Generate a short lived cert\n\t//valid for 1 day to be used with server hosted\n\tca := &x509.Certificate{\n\t\tSerialNumber: big.NewInt(1653),\n\t\tSubject: pkix.Name{\n\t\t\tCountry: []string{\"Test\"},\n\t\t\tOrganization: []string{\"Test\"},\n\t\t\tOrganizationalUnit: []string{\"Test\"},\n\t\t},\n\t\tNotBefore: time.Now(),\n\t\tNotAfter: time.Now().AddDate(0, 0, 1),\n\t\tSubjectKeyId: []byte{1, 2, 3, 4, 5},\n\t\tBasicConstraintsValid: true,\n\t\tIsCA: true,\n\t\tDNSNames: []string{\"localhost\"},\n\t\tIPAddresses: []net.IP{net.ParseIP(\"127.0.0.1\")},\n\t\tExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth},\n\t\tKeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,\n\t}\n\n\tpriv, _ := rsa.GenerateKey(rand.Reader, 1024)\n\tpub := &priv.PublicKey\n\tca_b, err := x509.CreateCertificate(rand.Reader, ca, ca, pub, priv)\n\tif err != nil {\n\t\tlog.Println(\"create ca failed\", err)\n\t\treturn\n\t}\n\tpriv_b = x509.MarshalPKCS1PrivateKey(priv)\n\treturn ca_b, priv_b\n}", "func CreateRootCA(rootCN string) (RootCA, error) {\n\t// Create a simple CSR for the CA using the default CA validator and policy\n\treq := cfcsr.CertificateRequest{\n\t\tCN: rootCN,\n\t\tKeyRequest: &cfcsr.KeyRequest{A: RootKeyAlgo, S: RootKeySize},\n\t\tCA: &cfcsr.CAConfig{Expiry: RootCAExpiration},\n\t}\n\n\t// Generate the CA and get the certificate and private key\n\tcert, _, key, err := initca.New(&req)\n\tif err != nil {\n\t\treturn RootCA{}, err\n\t}\n\n\trootCA, err := NewRootCA(cert, cert, key, DefaultNodeCertExpiration, nil)\n\tif err != nil {\n\t\treturn RootCA{}, err\n\t}\n\n\treturn rootCA, nil\n}", "func newRootRoute() (root *rootRoute) {\n\troot = &rootRoute{\n\t\tmethodDelete: &route{\n\t\t\tname: \"/\",\n\t\t\thandler: nil,\n\t\t\tisParam: false,\n\t\t},\n\t\tmethodGet: &route{\n\t\t\tname: \"/\",\n\t\t\thandler: nil,\n\t\t\tisParam: false,\n\t\t},\n\t\tmethodPatch: &route{\n\t\t\tname: \"/\",\n\t\t\thandler: nil,\n\t\t\tisParam: false,\n\t\t},\n\t\tmethodPost: &route{\n\t\t\tname: \"/\",\n\t\t\thandler: nil,\n\t\t\tisParam: false,\n\t\t},\n\t\tmethodPut: &route{\n\t\t\tname: \"/\",\n\t\t\thandler: nil,\n\t\t\tisParam: false,\n\t\t},\n\t}\n\n\treturn\n}", "func (t *T) newRoot() error {\n\tblock, err := t.writeNewNode(t.root)\n\tif err != nil {\n\t\treturn Error.Wrap(err)\n\t}\n\n\tt.cache.Add(t.root, block)\n\tt.root = node.New(t.root.Height() + 1)\n\tt.root.SetPivot(block)\n\treturn nil\n}", "func NewRoot(root string) *FDC {\n\treturn &FDC{root}\n}", "func (i *runtime) newRootContext(test *Test, goTest *testing.T, labels label.Set) *testContext {\n\treturn newTestContext(test, goTest, i.context, nil, labels)\n}", "func generateRootCert(trustDomain string, skew time.Duration) (*x509.Certificate, error) {\n\tcert, err := generateBaseCert(caTTL, skew)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcert.KeyUsage |= x509.KeyUsageCertSign\n\tcert.Subject = pkix.Name{Organization: []string{trustDomain}}\n\tcert.IsCA = true\n\tcert.BasicConstraintsValid = true\n\tcert.SignatureAlgorithm = x509.ECDSAWithSHA256\n\treturn cert, nil\n}", "func NewRootRequest(server string) (*http.Request, error) {\n\tvar err error\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/\")\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"GET\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (c *Client) NewRootHealthRequest(ctx context.Context, path string) (*http.Request, error) {\n\tscheme := c.Scheme\n\tif scheme == \"\" {\n\t\tscheme = \"http\"\n\t}\n\tu := url.URL{Host: c.Host, Scheme: scheme, Path: path}\n\treq, err := http.NewRequest(\"GET\", u.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif c.JWTSigner != nil {\n\t\tif err := c.JWTSigner.Sign(req); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn req, nil\n}", "func (mr *merkleRoots) checkNewRoot(newRoot crypto.Hash) crypto.Hash {\n\ttree := crypto.NewCachedTree(sectorHeight)\n\tfor _, st := range mr.cachedSubTrees {\n\t\tif err := tree.PushSubTree(st.height, st.sum); err != nil {\n\t\t\t// This should never fail.\n\t\t\tbuild.Critical(err)\n\t\t}\n\t}\n\tfor _, root := range mr.uncachedRoots {\n\t\ttree.Push(root)\n\t}\n\t// Push the new root.\n\ttree.Push(newRoot)\n\treturn tree.Root()\n}", "func NewRootCertificateAuthority() *RootCertificateAuthority {\n\treturn &RootCertificateAuthority{\n\t\tgenerateCertificate: generateRootCertificate,\n\t\tgenerateKey: generateKey,\n\t\tgenerateSerialNumber: generateSerialNumber,\n\t}\n}", "func (i *Installer) InstallRoot(certFile string, keyFile string) error {\n\tif runtime.GOOS != \"linux\" {\n\t\tfmt.Printf(\"Root certificate is skipped for %s\\n\", runtime.GOOS)\n\t\treturn nil\n\t}\n\tif i.AndroidDeviceId != \"\" {\n\t\tif runtime.GOOS != \"linux\" {\n\t\t\treturn fmt.Errorf(\"test root CA for Android is only supported on a Linux host machine\")\n\t\t}\n\t\tfmt.Println(\"Installing test root CA on Android...\")\n\t\treturn i.AdbInstallRoot(certFile)\n\t}\n\tfmt.Printf(\"Loading cert from %v\\n\", certFile)\n\tfmt.Printf(\"Loading key from %v\\n\", keyFile)\n\trootCert, err := tls.LoadX509KeyPair(certFile, keyFile)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error opening cert or key files: %v\", err)\n\t}\n\tderBytes := rootCert.Certificate[0]\n\tCAName := getCAName()\n\tdbPath := getDbPath()\n\n\tfmt.Printf(\"Attempting to install root certificate in %q\\n\", dbPath)\n\n\ti.RemoveRoot()\n\tcmd := exec.Command(i.CertUtilBinaryPath, \"-d\", dbPath, \"-A\", \"-n\", CAName, \"-t\", \"C,p,p\")\n\tcmd.Stdout = os.Stdout\n\tcmd.Stderr = os.Stderr\n\n\tstdin, err := cmd.StdinPipe()\n\tif err != nil {\n\t\treturn err\n\t}\n\tif err := cmd.Start(); err != nil {\n\t\treturn err\n\t}\n\tif _, err := stdin.Write(derBytes); err != nil {\n\t\treturn err\n\t}\n\tstdin.Close()\n\tif err := cmd.Wait(); err != nil {\n\t\treturn fmt.Errorf(\"NSS certutil failed: %s\\n\", err)\n\t}\n\n\tfmt.Println(\"Root certificate should now be installed for NSS (i.e. Chrome).\")\n\treturn err\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
ProcessCsrRequest takes a certificate request and generates a key and CSR from it.
func (c *Provider) ProcessCsrRequest(req *CertificateRequest) (csrPEM, key []byte, keyID string, pub crypto.PublicKey, err error) { err = ValidateCSR(req) if err != nil { err = errors.WithMessage(err, "invalid request") return } var priv crypto.PrivateKey csrPEM, priv, keyID, err = c.ParseCsrRequest(req) if err != nil { key = nil err = errors.WithMessage(err, "process request") return } s, ok := priv.(crypto.Signer) if !ok { key = nil err = errors.WithMessage(err, "unable to convert key to crypto.Signer") return } pub = s.Public() uri, keyBytes, err := c.provider.ExportKey(keyID) if err != nil { err = errors.WithMessage(err, "key URI") return } if keyBytes == nil { key = []byte(uri) } else { key = keyBytes } return }
[ "func (c *Provider) ParseCsrRequest(req *CertificateRequest) (csr []byte, priv crypto.PrivateKey, keyID string, err error) {\n\tif req.KeyRequest == nil {\n\t\terr = errors.New(\"invalid key request\")\n\t\treturn\n\t}\n\n\tlogger.Infof(\"algo=%s, size=%d\", req.KeyRequest.Algo(), req.KeyRequest.Size())\n\n\tpriv, err = req.KeyRequest.Generate()\n\tif err != nil {\n\t\terr = errors.WithMessage(err, \"generate key\")\n\t\treturn\n\t}\n\n\tvar label string\n\tkeyID, label, err = c.provider.IdentifyKey(priv)\n\tif err != nil {\n\t\terr = errors.WithMessage(err, \"identify key\")\n\t\treturn\n\t}\n\n\tlogger.Infof(\"generated key, id=%q, label=%q\", keyID, label)\n\n\tvar tpl = x509.CertificateRequest{\n\t\tSubject: req.Name(),\n\t\tSignatureAlgorithm: req.KeyRequest.SigAlgo(),\n\t}\n\n\tfor i := range req.Hosts {\n\t\tif ip := net.ParseIP(req.Hosts[i]); ip != nil {\n\t\t\ttpl.IPAddresses = append(tpl.IPAddresses, ip)\n\t\t} else if email, err := mail.ParseAddress(req.Hosts[i]); err == nil && email != nil {\n\t\t\ttpl.EmailAddresses = append(tpl.EmailAddresses, req.Hosts[i])\n\t\t} else {\n\t\t\ttpl.DNSNames = append(tpl.DNSNames, req.Hosts[i])\n\t\t}\n\t}\n\n\tcsr, err = x509.CreateCertificateRequest(rand.Reader, &tpl, priv)\n\tif err != nil {\n\t\tlogger.Errorf(\"failed to generate a CSR: %v\", errors.WithStack(err))\n\t\terr = errors.WithMessage(err, \"generate csr\")\n\t\treturn\n\t}\n\tblock := pem.Block{\n\t\tType: \"CERTIFICATE REQUEST\",\n\t\tBytes: csr,\n\t}\n\n\tcsr = pem.EncodeToMemory(&block)\n\n\treturn\n}", "func ValidateCertificateRequest(conf *config.Configuration, csr *x509.CertificateRequest, certType string,\n\t ctxMap *map[string]types.RoleInfo) error {\n\tlog.Trace(\"validation/validate_CSR:ValidateCertificateRequest() Entering\")\n\tdefer log.Trace(\"validation/validate_CSR:ValidateCertificateRequest() Leaving\")\n\n\t// TODO: We should be able to support other signature algorithms... such as ECDSA with SHA384\n\tif csr.SignatureAlgorithm != x509.SHA384WithRSA {\n\t\treturn fmt.Errorf(\"validation/validate_CSR:ValidateCertificateRequest() Incorrect Signature Algorithm used (should be SHA 384 with RSA): %v\", csr.SignatureAlgorithm)\n\t}\n\tif len(csr.Subject.Names) != 1 {\n\t\treturn errors.New(\"validation/validate_CSR:ValidateCertificateRequest() Only Common Name is supported in Subject\")\n\t}\n\tsubjectFromCsr := strings.TrimSpace(csr.Subject.String())\n\t// Validate CN\n\tsanListsFromToken := []string{}\n\tisCnPresentInToken := false\n\n\tfor k,_ := range *ctxMap {\n\t\tparams := strings.Split(k, \";\")\n\t\t// Check if Subject matches with CN\n\t\tif len(params) > 0 && (strings.EqualFold(params[0], subjectFromCsr) || search.WildcardMatched(params[0], subjectFromCsr)) {\n\t\t\tisCnPresentInToken = true\n\t\t\tlog.Debugf(\"validation/validate_CSR:ValidateCertificateRequest() Token contains required Common Name : %v \", subjectFromCsr)\n\t\t\tif len(params) > 2 {\n\t\t\t\tif strings.EqualFold(params[2], \"CERTTYPE=\" +certType) { // Check if cert type matches\n\t\t\t\t\tsanListsFromToken = append(sanListsFromToken, params[1])\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tif !isCnPresentInToken {\n\t\treturn errors.New(\"validation/validate_CSR:ValidateCertificateRequest() No role associated with provided Common Name in CSR -\" + subjectFromCsr)\n\t}\n\tlog.Info(\"validation/validate_CSR:ValidateCertificateRequest() Got valid Common Name in CSR : \" + subjectFromCsr)\n\n\t// Validate SAN only for TLS\n\tif strings.EqualFold(constants.Tls, certType) {\n\t\tlog.Debugf(\"validation/validate_CSR:ValidateCertificateRequest() San list(IP) requested in CSR - %v \", csr.IPAddresses)\n\t\tlog.Debugf(\"validation/validate_CSR:ValidateCertificateRequest() San list(DNS) requested in CSR - %v \", csr.DNSNames)\n\t\terr := validateDNSNames(csr.DNSNames)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"validation/validate_CSR:ValidateCertificateRequest() Unsupported content in SAN list\")\n\t\t}\n\n\t\tfor _, sanlistFromToken := range sanListsFromToken {\n\t\t\tif sanlistFromToken != \"\" {\n\t\t\t\tlog.Debugf(\"validation/validate_CSR:ValidateCertificateRequest() San list requested in token - %v \", sanlistFromToken)\n\t\t\t\tsans := strings.Split(sanlistFromToken, \"=\")\n\t\t\t\tif len(sans) > 1 {\n\t\t\t\t\ttokenSanList := strings.Split(sans[1], \",\")\n\t\t\t\t\tisSanPresentInToken := true\n\t\t\t\t\tfor _, san := range tokenSanList {\n\t\t\t\t\t\tif !ipInSlice(san, csr.IPAddresses) && !stringInSlice(san, csr.DNSNames) {\n\t\t\t\t\t\t\tisSanPresentInToken = false\n\t\t\t\t\t\t\tbreak;\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tif(isSanPresentInToken) {\n\t\t\t\t\t\tlog.Debugf(\"validation/validate_CSR:ValidateCertificateRequest() San list requested in CSR is part of Token is valid\",)\n\t\t\t\t\t\treturn nil\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\treturn errors.New(\"validation/validate_CSR:ValidateCertificateRequest() No role associated with provided SAN list in CSR\")\n\t}\n\tlog.Info(\"validation/validate_CSR:ValidateCertificateRequest() Certificate Signing Request is valid\")\n\treturn nil\n}", "func (c *Client) ProcessCertificateRequest(ctx context.Context, req workload.CertificateRequest) (*workload.CertificateResponse, error) {\n\tvar header metadata.MD\n\tre, err := c.Client.ProcessCertificateRequest(ctx, &CertificateRequest{\n\t\tCertAuthorityID: req.CertAuthorityID,\n\t\tTTL: int64(req.TTL),\n\t\tCSR: req.CSR,\n\t}, grpc.Header(&header))\n\tif err != nil {\n\t\terr = trail.FromGRPC(err, header)\n\t\treturn nil, trace.Wrap(err)\n\t}\n\treturn &workload.CertificateResponse{\n\t\tCert: re.Cert,\n\t}, nil\n}", "func (c Client) RequestCertificate(details CertificateDetails) (csrPEM []byte, keyPEM []byte, certPEM []byte, err error) {\n\tflog := log.WithFields(log.Fields{\"f\": \"RequestCertificate\"})\n\n\tflog.WithFields(log.Fields{\n\t\t\"CN\": details.CommonName,\n\t\t\"Names\": details.Group,\n\t\t\"Hosts\": details.Hosts,\n\t}).Info(\"Requesting new Certificate\")\n\n\tvar cfg *csr.CAConfig\n\tcsrRequest := csr.CertificateRequest{\n\t\tCN: details.CommonName,\n\t\tNames: []csr.Name{{\n\t\t\tO: details.Group,\n\t\t}},\n\t\tHosts: details.Hosts,\n\t\tKeyRequest: &keyParam,\n\t\tCA: cfg,\n\t}\n\n\tg := &csr.Generator{Validator: noopValidator}\n\tcsrPEM, keyPEM, err = g.ProcessRequest(&csrRequest)\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\treq, err := json.Marshal(sign.Request{\n\t\tCertificateRequest: csrPEM,\n\t\tProfile: details.Profile,\n\t})\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\n\tflog.Debugf(\"Invoking Lambda: %s\", *aws.String(\"slsslSign-\" + c.config.Name))\n\tresp, err := c.lambdaSvc.Invoke(&lambda.InvokeInput{FunctionName: aws.String(\"slsslSign-\" + c.config.Name), Payload: req})\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\n\treturn csrPEM, keyPEM, resp.Payload, nil\n}", "func CreateCertificateRequest(rand io.Reader, template *x509.CertificateRequest, priv interface{}) (csr []byte, err error) {\r\n\tkey, ok := priv.(crypto.Signer)\r\n\tif !ok {\r\n\t\treturn nil, errors.New(\"x509: certificate private key does not implement crypto.Signer\")\r\n\t}\r\n\tvar hashFunc crypto.Hash\r\n\tvar sigAlgo pkix.AlgorithmIdentifier\r\n\thashFunc, sigAlgo, err = signingParamsForPublicKey(key.Public(), template.SignatureAlgorithm)\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\tvar publicKeyBytes []byte\r\n\tvar publicKeyAlgorithm pkix.AlgorithmIdentifier\r\n\tpublicKeyBytes, publicKeyAlgorithm, err = marshalPublicKey(key.Public())\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\tvar extensions []pkix.Extension\r\n\r\n\tif (len(template.DNSNames) > 0 || len(template.EmailAddresses) > 0 || len(template.IPAddresses) > 0 || len(template.URIs) > 0) &&\r\n\t\t!oidInExtensions(oidExtensionSubjectAltName, template.ExtraExtensions) {\r\n\t\tsanBytes, err := marshalSANs(template.DNSNames, template.EmailAddresses, template.IPAddresses, template.URIs)\r\n\t\tif err != nil {\r\n\t\t\treturn nil, err\r\n\t\t}\r\n\r\n\t\textensions = append(extensions, pkix.Extension{\r\n\t\t\tId: oidExtensionSubjectAltName,\r\n\t\t\tValue: sanBytes,\r\n\t\t})\r\n\t}\r\n\r\n\textensions = append(extensions, template.ExtraExtensions...)\r\n\r\n\t// Make a copy of template.Attributes because we may alter it below.\r\n\tattributes := make([]pkix.AttributeTypeAndValueSET, 0, len(template.Attributes))\r\n\tfor _, attr := range template.Attributes {\r\n\t\tvalues := make([][]pkix.AttributeTypeAndValue, len(attr.Value))\r\n\t\tcopy(values, attr.Value)\r\n\t\tattributes = append(attributes, pkix.AttributeTypeAndValueSET{\r\n\t\t\tType: attr.Type,\r\n\t\t\tValue: values,\r\n\t\t})\r\n\t}\r\n\r\n\textensionsAppended := false\r\n\tif len(extensions) > 0 {\r\n\t\t// Append the extensions to an existing attribute if possible.\r\n\t\tfor _, atvSet := range attributes {\r\n\t\t\tif !atvSet.Type.Equal(oidExtensionRequest) || len(atvSet.Value) == 0 {\r\n\t\t\t\tcontinue\r\n\t\t\t}\r\n\r\n\t\t\t// specifiedExtensions contains all the extensions that we\r\n\t\t\t// found specified via template.Attributes.\r\n\t\t\tspecifiedExtensions := make(map[string]bool)\r\n\r\n\t\t\tfor _, atvs := range atvSet.Value {\r\n\t\t\t\tfor _, atv := range atvs {\r\n\t\t\t\t\tspecifiedExtensions[atv.Type.String()] = true\r\n\t\t\t\t}\r\n\t\t\t}\r\n\r\n\t\t\tnewValue := make([]pkix.AttributeTypeAndValue, 0, len(atvSet.Value[0])+len(extensions))\r\n\t\t\tnewValue = append(newValue, atvSet.Value[0]...)\r\n\r\n\t\t\tfor _, e := range extensions {\r\n\t\t\t\tif specifiedExtensions[e.Id.String()] {\r\n\t\t\t\t\t// Attributes already contained a value for\r\n\t\t\t\t\t// this extension and it takes priority.\r\n\t\t\t\t\tcontinue\r\n\t\t\t\t}\r\n\r\n\t\t\t\tnewValue = append(newValue, pkix.AttributeTypeAndValue{\r\n\t\t\t\t\t// There is no place for the critical\r\n\t\t\t\t\t// flag in an AttributeTypeAndValue.\r\n\t\t\t\t\tType: e.Id,\r\n\t\t\t\t\tValue: e.Value,\r\n\t\t\t\t})\r\n\t\t\t}\r\n\r\n\t\t\tatvSet.Value[0] = newValue\r\n\t\t\textensionsAppended = true\r\n\t\t\tbreak\r\n\t\t}\r\n\t}\r\n\r\n\trawAttributes, err := newRawAttributes(attributes)\r\n\tif err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\t// If not included in attributes, add a new attribute for the\r\n\t// extensions.\r\n\tif len(extensions) > 0 && !extensionsAppended {\r\n\t\tattr := struct {\r\n\t\t\tType asn1.ObjectIdentifier\r\n\t\t\tValue [][]pkix.Extension `asn1:\"set\"`\r\n\t\t}{\r\n\t\t\tType: oidExtensionRequest,\r\n\t\t\tValue: [][]pkix.Extension{extensions},\r\n\t\t}\r\n\r\n\t\tb, err := asn1.Marshal(attr)\r\n\t\tif err != nil {\r\n\t\t\treturn nil, errors.New(\"x509: failed to serialise extensions attribute: \" + err.Error())\r\n\t\t}\r\n\r\n\t\tvar rawValue asn1.RawValue\r\n\t\tif _, err := asn1.Unmarshal(b, &rawValue); err != nil {\r\n\t\t\treturn nil, err\r\n\t\t}\r\n\r\n\t\trawAttributes = append(rawAttributes, rawValue)\r\n\t}\r\n\r\n\tasn1Subject := template.RawSubject\r\n\tif len(asn1Subject) == 0 {\r\n\t\tasn1Subject, err = asn1.Marshal(template.Subject.ToRDNSequence())\r\n\t\tif err != nil {\r\n\t\t\treturn nil, err\r\n\t\t}\r\n\t}\r\n\r\n\ttbsCSR := tbsCertificateRequest{\r\n\t\tVersion: 0, // PKCS #10, RFC 2986\r\n\t\tSubject: asn1.RawValue{FullBytes: asn1Subject},\r\n\t\tPublicKey: publicKeyInfo{\r\n\t\t\tAlgorithm: publicKeyAlgorithm,\r\n\t\t\tPublicKey: asn1.BitString{\r\n\t\t\t\tBytes: publicKeyBytes,\r\n\t\t\t\tBitLength: len(publicKeyBytes) * 8,\r\n\t\t\t},\r\n\t\t},\r\n\t\tRawAttributes: rawAttributes,\r\n\t}\r\n\r\n\ttbsCSRContents, err := asn1.Marshal(tbsCSR)\r\n\tif err != nil {\r\n\t\treturn\r\n\t}\r\n\ttbsCSR.Raw = tbsCSRContents\r\n\r\n\tsigned := tbsCSRContents\r\n\tvar signature []byte\r\n\tvar opts crypto.SignerOpts = hashFunc\r\n\tif hashFunc != 0 {\r\n\t\th := hashFunc.New()\r\n\t\th.Write(signed)\r\n\t\tsigned = h.Sum(nil)\r\n\t}\r\n\tif sigAlgo.Algorithm.Equal(oidSignatureSM2WithSM3) {\r\n\t\topts = sm2.NewSM2SignerOption(true, nil)\r\n\t}\r\n\tsignature, err = key.Sign(rand, signed, opts)\r\n\tif err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\treturn asn1.Marshal(certificateRequest{\r\n\t\tTBSCSR: tbsCSR,\r\n\t\tSignatureAlgorithm: sigAlgo,\r\n\t\tSignatureValue: asn1.BitString{\r\n\t\t\tBytes: signature,\r\n\t\t\tBitLength: len(signature) * 8,\r\n\t\t},\r\n\t})\r\n}", "func GenerateCertFromCsr(s Server, c Certificate) (Certificate, error) {\n\tif s.Endpoint == \"\" || s.Username == \"\" || s.Password == \"\" {\n\t\treturn c, fmt.Errorf(\"Must specify Endpoint/Username/Password to request certs\")\n\t}\n\tif c.CertificateRequest == \"\" {\n\t\treturn c, fmt.Errorf(\"Certs must contain CertificateRequest\")\n\t}\n\tif err := c.requestNewCert(s); err != nil {\n\t\treturn c, fmt.Errorf(\"fatal: %v\", err)\n\t}\n\tif err := c.fetchCertResult(s); err != nil {\n\t\treturn c, fmt.Errorf(\"fatal: %v\", err)\n\t}\n\treturn c, nil\n}", "func CreateCertificateRequest(rand io.Reader, template *CertificateRequest, priv interface{}) (csr []byte, err error) {\n\tkey, ok := priv.(crypto.Signer)\n\tif !ok {\n\t\treturn nil, errors.New(\"x509: certificate private key does not implement crypto.Signer\")\n\t}\n\n\tvar hashFunc crypto.Hash\n\tvar sigAlgo pkix.AlgorithmIdentifier\n\thashFunc, sigAlgo, err = signingParamsForPublicKey(key.Public(), template.SignatureAlgorithm)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar publicKeyBytes []byte\n\tvar publicKeyAlgorithm pkix.AlgorithmIdentifier\n\tpublicKeyBytes, publicKeyAlgorithm, err = marshalPublicKey(key.Public())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar extensions []pkix.Extension\n\n\tif (len(template.DNSNames) > 0 || len(template.EmailAddresses) > 0 || len(template.IPAddresses) > 0 || len(template.URIs) > 0) &&\n\t\t!oidInExtensions(OIDExtensionSubjectAltName, template.ExtraExtensions) {\n\t\tsanBytes, err := marshalSANs(template.DNSNames, template.EmailAddresses, template.IPAddresses, template.URIs)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\textensions = append(extensions, pkix.Extension{\n\t\t\tId: OIDExtensionSubjectAltName,\n\t\t\tValue: sanBytes,\n\t\t})\n\t}\n\n\textensions = append(extensions, template.ExtraExtensions...)\n\n\t// Make a copy of template.Attributes because we may alter it below.\n\tattributes := make([]pkix.AttributeTypeAndValueSET, 0, len(template.Attributes))\n\tfor _, attr := range template.Attributes {\n\t\tvalues := make([][]pkix.AttributeTypeAndValue, len(attr.Value))\n\t\tcopy(values, attr.Value)\n\t\tattributes = append(attributes, pkix.AttributeTypeAndValueSET{\n\t\t\tType: attr.Type,\n\t\t\tValue: values,\n\t\t})\n\t}\n\n\textensionsAppended := false\n\tif len(extensions) > 0 {\n\t\t// Append the extensions to an existing attribute if possible.\n\t\tfor _, atvSet := range attributes {\n\t\t\tif !atvSet.Type.Equal(oidExtensionRequest) || len(atvSet.Value) == 0 {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// specifiedExtensions contains all the extensions that we\n\t\t\t// found specified via template.Attributes.\n\t\t\tspecifiedExtensions := make(map[string]bool)\n\n\t\t\tfor _, atvs := range atvSet.Value {\n\t\t\t\tfor _, atv := range atvs {\n\t\t\t\t\tspecifiedExtensions[atv.Type.String()] = true\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tnewValue := make([]pkix.AttributeTypeAndValue, 0, len(atvSet.Value[0])+len(extensions))\n\t\t\tnewValue = append(newValue, atvSet.Value[0]...)\n\n\t\t\tfor _, e := range extensions {\n\t\t\t\tif specifiedExtensions[e.Id.String()] {\n\t\t\t\t\t// Attributes already contained a value for\n\t\t\t\t\t// this extension and it takes priority.\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tnewValue = append(newValue, pkix.AttributeTypeAndValue{\n\t\t\t\t\t// There is no place for the critical\n\t\t\t\t\t// flag in an AttributeTypeAndValue.\n\t\t\t\t\tType: e.Id,\n\t\t\t\t\tValue: e.Value,\n\t\t\t\t})\n\t\t\t}\n\n\t\t\tatvSet.Value[0] = newValue\n\t\t\textensionsAppended = true\n\t\t\tbreak\n\t\t}\n\t}\n\n\trawAttributes, err := newRawAttributes(attributes)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// If not included in attributes, add a new attribute for the\n\t// extensions.\n\tif len(extensions) > 0 && !extensionsAppended {\n\t\tattr := struct {\n\t\t\tType asn1.ObjectIdentifier\n\t\t\tValue [][]pkix.Extension `asn1:\"set\"`\n\t\t}{\n\t\t\tType: oidExtensionRequest,\n\t\t\tValue: [][]pkix.Extension{extensions},\n\t\t}\n\n\t\tb, err := asn1.Marshal(attr)\n\t\tif err != nil {\n\t\t\treturn nil, errors.New(\"x509: failed to serialise extensions attribute: \" + err.Error())\n\t\t}\n\n\t\tvar rawValue asn1.RawValue\n\t\tif _, err := asn1.Unmarshal(b, &rawValue); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\trawAttributes = append(rawAttributes, rawValue)\n\t}\n\n\tasn1Subject := template.RawSubject\n\tif len(asn1Subject) == 0 {\n\t\tasn1Subject, err = asn1.Marshal(template.Subject.ToRDNSequence())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\ttbsCSR := tbsCertificateRequest{\n\t\tVersion: 0, // PKCS #10, RFC 2986\n\t\tSubject: asn1.RawValue{FullBytes: asn1Subject},\n\t\tPublicKey: publicKeyInfo{\n\t\t\tAlgorithm: publicKeyAlgorithm,\n\t\t\tPublicKey: asn1.BitString{\n\t\t\t\tBytes: publicKeyBytes,\n\t\t\t\tBitLength: len(publicKeyBytes) * 8,\n\t\t\t},\n\t\t},\n\t\tRawAttributes: rawAttributes,\n\t}\n\n\ttbsCSRContents, err := asn1.Marshal(tbsCSR)\n\tif err != nil {\n\t\treturn\n\t}\n\ttbsCSR.Raw = tbsCSRContents\n\n\tsigned := tbsCSRContents\n\tif hashFunc != 0 {\n\t\th := hashFunc.New()\n\t\th.Write(signed)\n\t\tsigned = h.Sum(nil)\n\t}\n\n\tvar signature []byte\n\tsignature, err = key.Sign(rand, signed, hashFunc)\n\tif err != nil {\n\t\treturn\n\t}\n\n\treturn asn1.Marshal(certificateRequest{\n\t\tTBSCSR: tbsCSR,\n\t\tSignatureAlgorithm: sigAlgo,\n\t\tSignatureValue: asn1.BitString{\n\t\t\tBytes: signature,\n\t\t\tBitLength: len(signature) * 8,\n\t\t},\n\t})\n}", "func CertificateGenerateRequest(privateKey *rsa.PrivateKey, props TlsCertificateProps, fqdncn bool) (*certificates.CertificateSigningRequest, error) {\n\tdnsNames := make([]string, 3)\n\tdnsNames[0] = props.Service\n\tdnsNames[1] = props.Service + \".\" + props.Namespace\n\t// The full service name is the CommonName for the certificate\n\tcommonName := GenerateInClusterServiceName(props)\n\tdnsNames[2] = commonName\n\tcsCommonName := props.Service\n\tif fqdncn {\n\t\t// use FQDN as CommonName as a workaournd for https://github.com/nirmata/kyverno/issues/542\n\t\tcsCommonName = commonName\n\t}\n\tvar ips []net.IP\n\tapiServerIP := net.ParseIP(props.ApiServerHost)\n\tif apiServerIP != nil {\n\t\tips = append(ips, apiServerIP)\n\t} else {\n\t\tdnsNames = append(dnsNames, props.ApiServerHost)\n\t}\n\n\tcsrTemplate := x509.CertificateRequest{\n\t\tSubject: pkix.Name{\n\t\t\tCommonName: csCommonName,\n\t\t},\n\t\tSignatureAlgorithm: x509.SHA256WithRSA,\n\t\tDNSNames: dnsNames,\n\t\tIPAddresses: ips,\n\t}\n\n\tcsrBytes, err := x509.CreateCertificateRequest(rand.Reader, &csrTemplate, privateKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &certificates.CertificateSigningRequest{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"certificates.k8s.io/v1beta1\",\n\t\t\tKind: \"CertificateSigningRequest\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: props.Service + \".\" + props.Namespace + \".cert-request\",\n\t\t},\n\t\tSpec: certificates.CertificateSigningRequestSpec{\n\t\t\tRequest: certificateRequestToPem(csrBytes),\n\t\t\tGroups: []string{\"system:masters\", \"system:authenticated\"},\n\t\t\tUsages: []certificates.KeyUsage{\n\t\t\t\tcertificates.UsageDigitalSignature,\n\t\t\t\tcertificates.UsageKeyEncipherment,\n\t\t\t\tcertificates.UsageServerAuth,\n\t\t\t\tcertificates.UsageClientAuth,\n\t\t\t},\n\t\t},\n\t}, nil\n}", "func (c *CKMctrler) SignCertificateRequest(ctx context.Context, req *ckmproto.CertificateSignReq) (*ckmproto.CertificateSignResp, error) {\n\tvar err error\n\n\t// make sure counters are updated on return\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tc.incrementRPCError()\n\t\t} else {\n\t\t\tc.incrementRPCSuccess()\n\t\t}\n\t}()\n\n\t// Only check that CSR is syntactically valid\n\tcsr, err := x509.ParseCertificateRequest(req.GetCsr())\n\tif err != nil {\n\t\tlog.Errorf(\"Received invalid certificate request, error: %v\", err)\n\t\treturn &ckmproto.CertificateSignResp{Approved: false}, err\n\t}\n\n\terr = csr.CheckSignature()\n\tif err != nil {\n\t\tlog.Errorf(\"Received CSR with invalid signature, error: %v\", err)\n\t\treturn &ckmproto.CertificateSignResp{Approved: false}, err\n\t}\n\n\tcert, err := certs.SignCSRwithCA(csr, c.certificate, c.privateKey, certs.WithValidityDays(7))\n\tif err != nil {\n\t\tlog.Errorf(\"Error signing CSR: %v\", err)\n\t\treturn &ckmproto.CertificateSignResp{Approved: false}, err\n\t}\n\n\treturn &ckmproto.CertificateSignResp{\n\t\tCertificate: &ckmproto.Certificate{Certificate: cert.Raw},\n\t\tApproved: true}, nil\n}", "func (a *ConfigApiService) CreateAgentCertificateSigningRequest(ctx context.Context, body CertificateSigningRequestData, server string, agent string) (string, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Post\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue string\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/config/server/{server}/agent/{agent}/csr\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"server\"+\"}\", fmt.Sprintf(\"%v\", server), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"agent\"+\"}\", fmt.Sprintf(\"%v\", agent), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{\"*/*\"}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\", \"text/plain\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &body\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode < 300 {\n\t\t// If we succeed, return the data, otherwise pass on to decode error.\n\t\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\tif err == nil { \n\t\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t\t}\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 200 {\n\t\t\tvar v string\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 400 {\n\t\t\tvar v ErrorList\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 404 {\n\t\t\tvar v ErrorList\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 500 {\n\t\t\tvar v ErrorList\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHttpResponse, nil\n}", "func ParseCertificateRequest(asn1Data []byte) (*CertificateRequest, error) {\r\n\tvar csr certificateRequest\r\n\r\n\trest, err := asn1.Unmarshal(asn1Data, &csr)\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t} else if len(rest) != 0 {\r\n\t\treturn nil, asn1.SyntaxError{Msg: \"trailing data\"}\r\n\t}\r\n\tif !csr.SignatureAlgorithm.Algorithm.Equal(oidSignatureSM2WithSM3) {\r\n\t\tcsrR, err := x509.ParseCertificateRequest(asn1Data)\r\n\t\tif err != nil {\r\n\t\t\treturn nil, err\r\n\t\t}\r\n\t\treturn &CertificateRequest{*csrR}, nil\r\n\t}\r\n\treturn parseCertificateRequest(&csr)\r\n}", "func makeCSR(req *csrRequest) error {\n\tkey, err := newRSAKey(2048)\n\tif err != nil {\n\t\treturn err\n\t}\n\tpemKey, err := encryptedKey(key, req.password)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err := ioutil.WriteFile(req.pkeyFilename, pemKey, 0600); err != nil {\n\t\treturn err\n\t}\n\n\tderBytes, err := newCSR(key, strings.ToLower(req.email), strings.ToUpper(req.country), req.cname)\n\tif err != nil {\n\t\treturn err\n\t}\n\tpemCSR := pemCSR(derBytes)\n\treturn ioutil.WriteFile(req.csrFilename, pemCSR, 0600)\n}", "func CreateCSR(privatekey crypto.PrivateKey, subject *pkix.Name, dnsnames []string, ipaddrs []net.IP) (*x509.CertificateRequest, error) {\n\tif subject == nil {\n\t\thostname, err := os.Hostname()\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"Unable to determine hostname\")\n\t\t}\n\t\tsubject = &pkix.Name{\n\t\t\tCommonName: hostname,\n\t\t}\n\t}\n\n\t// if both the dnsnames and ipaddrs are nil, caller wants us to populate with FQDN and IP address\n\tif dnsnames == nil && ipaddrs == nil {\n\t\tdnsnames, ipaddrs = netutils.NameAndIPs()\n\t}\n\tif dnsnames == nil && ipaddrs == nil {\n\t\treturn nil, errors.New(\"Failed to determine Hostname and IP addresses\")\n\t}\n\n\ttemplate := &x509.CertificateRequest{\n\t\tSubject: *subject,\n\t\tDNSNames: dnsnames,\n\t\tIPAddresses: ipaddrs,\n\t}\n\n\tbytes, err := x509.CreateCertificateRequest(rand.Reader, template, privatekey)\n\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Failed Creating CSR\")\n\t}\n\tcsr, err := x509.ParseCertificateRequest(bytes)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Failed to Parse CSR after creation.\")\n\t}\n\treturn csr, err\n\n}", "func ParseCertificateRequest(pemData []byte) (*x509.CertificateRequest, error) {\n\tvar block *pem.Block\n\tfor len(pemData) > 0 {\n\t\tblock, pemData = pem.Decode(pemData)\n\t\tif block == nil {\n\t\t\treturn nil, errors.New(\"error decoding pem block\")\n\t\t}\n\t\tif (block.Type != \"CERTIFICATE REQUEST\" && block.Type != \"NEW CERTIFICATE REQUEST\") ||\n\t\t\tlen(block.Headers) != 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\tcsr, err := x509.ParseCertificateRequest(block.Bytes)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"error parsing certificate request\")\n\t\t}\n\t\treturn csr, nil\n\t}\n\n\treturn nil, errors.New(\"error parsing certificate request: no certificate found\")\n}", "func PrepareCSR(csrBytes []byte, cn, ou, org string) cfsigner.SignRequest {\n\t// All managers get added the subject-alt-name of CA, so they can be\n\t// used for cert issuance.\n\thosts := []string{ou, cn}\n\tif ou == ManagerRole {\n\t\thosts = append(hosts, CARole)\n\t}\n\n\treturn cfsigner.SignRequest{\n\t\tRequest: string(csrBytes),\n\t\t// OU is used for Authentication of the node type. The CN has the random\n\t\t// node ID.\n\t\tSubject: &cfsigner.Subject{CN: cn, Names: []cfcsr.Name{{OU: ou, O: org}}},\n\t\t// Adding ou as DNS alt name, so clients can connect to ManagerRole and CARole\n\t\tHosts: hosts,\n\t}\n}", "func generateCertFromCSR(csrPEM []byte, duration time.Duration, isCA bool) (*x509.Certificate, error) {\n\tvar serialNumberLimit = new(big.Int).Lsh(big.NewInt(1), 128)\n\n\tcsr, err := extractCertificateRequest(csrPEM)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := csr.CheckSignature(); err != nil {\n\t\treturn nil, err\n\t}\n\n\tku := DefaultCertKeyUsage\n\tif csr.PublicKeyAlgorithm == x509.RSA {\n\t\tku |= RSAKeyUsage\n\t}\n\tif isCA {\n\t\tku |= CAKeyUsage\n\t}\n\n\tserialNumber, err := rand.Int(rand.Reader, serialNumberLimit)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to generate serial number: %w\", err)\n\t}\n\n\treturn &x509.Certificate{\n\t\tVersion: csr.Version,\n\t\tBasicConstraintsValid: true,\n\t\tSerialNumber: serialNumber,\n\t\tPublicKeyAlgorithm: csr.PublicKeyAlgorithm,\n\t\tPublicKey: csr.PublicKey,\n\t\tIsCA: isCA,\n\t\tSubject: csr.Subject,\n\t\tNotBefore: time.Now(),\n\t\tNotAfter: time.Now().Add(duration),\n\t\tKeyUsage: ku,\n\t\tExtKeyUsage: DefaultCertExtKeyUsage,\n\t\tDNSNames: csr.DNSNames,\n\t\tEmailAddresses: csr.EmailAddresses,\n\t}, nil\n}", "func NewCertificateRequest(ctx RequestContext) (*Impl, error) {\n\n\t// Convert time string to time type\n\ttimes, err := getTimes(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Parse the query parameters\n\treq, err := getReq(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Check to make sure that the request does not have conflicting filters\n\terr = validateReq(req, times)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Impl{\n\t\tID: req.ID,\n\t\tSerialNumber: req.Serial,\n\t\tAki: req.AKI,\n\t\tNotexpired: req.NotExpired,\n\t\tNotrevoked: req.NotRevoked,\n\t\tExpiredTimeStart: times.expiredStart,\n\t\tExpiredTimeEnd: times.expiredEnd,\n\t\tRevokedTimeStart: times.revokedStart,\n\t\tRevokedTimeEnd: times.revokedEnd,\n\t}, nil\n}", "func SignCSR(identifier string, csrPEM string) string {\n\tvar idx []models.CertIndex\n\tindexBytes, _ := ioutil.ReadFile(\"./cas/\" + identifier + \"/index.json\")\n\tjson.Unmarshal(indexBytes, &idx)\n\n\tblock, _ := pem.Decode([]byte(csrPEM))\n\tcsr, err := x509.ParseCertificateRequest(block.Bytes)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\t// TODO: check whether cert has been issued to the subject already, decide what to do if it has\n\t// revoke and re-sign, return existing or return error??\n\n\t// load the CA certificate to get the subject (issuer)\n\tca := loadCACert(identifier)\n\n\t// load the root information to get the next serial number\n\trootInfo := loadRoot(identifier)\n\trootInfo.SerialNumber++\n\tsaveRoot(rootInfo)\n\n\t// TODO: make validity period configurable\n\tfmt.Println(\"Constructing template\")\n\tcertTemplate := x509.Certificate{\n\t\tSignature: csr.Signature,\n\t\tSignatureAlgorithm: csr.SignatureAlgorithm,\n\n\t\tPublicKeyAlgorithm: csr.PublicKeyAlgorithm,\n\t\tPublicKey: csr.PublicKey,\n\n\t\tSerialNumber: big.NewInt(rootInfo.SerialNumber),\n\t\tIssuer: ca.Subject,\n\t\tSubject: csr.Subject,\n\t\tNotBefore: time.Now(),\n\t\tNotAfter: time.Now().Add(24 * time.Hour * 365 * 10),\n\t\tIsCA: true,\n\t\t// KeyUsage: x509.KeyUsageDigitalSignature,\n\t\t// ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},\n\t\tKeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,\n\t\tExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth},\n\t\tBasicConstraintsValid: true,\n\t}\n\n\tcaPrivateKey := loadCAKey(identifier)\n\n\tfmt.Println(\"Signing certificate\")\n\tcertBytes, err := x509.CreateCertificate(rand.Reader, &certTemplate, ca, csr.PublicKey, caPrivateKey)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\tcertPEM := new(bytes.Buffer)\n\tpem.Encode(certPEM, &pem.Block{\n\t\tType: \"CERTIFICATE\",\n\t\tBytes: certBytes,\n\t})\n\n\tsn := strconv.FormatInt(rootInfo.SerialNumber, 16)\n\tioutil.WriteFile(\"./cas/\"+identifier+\"/\"+sn+\".csr\", []byte(csrPEM), 0775)\n\n\tioutil.WriteFile(\"./cas/\"+identifier+\"/\"+sn+\".cer\", certPEM.Bytes(), 0775)\n\n\t// add to the index and save\n\tvar newidx models.CertIndex\n\tnewidx.Active = true\n\tnewidx.Root = identifier\n\tnewidx.SerialNumber = sn\n\tnewidx.Subject = csr.Subject.String()\n\tidx = append(idx, newidx)\n\n\tnewIndexBytes, _ := json.Marshal(idx)\n\tioutil.WriteFile(\"./cas/\"+identifier+\"/index.json\", newIndexBytes, 0775)\n\n\treturn string(certPEM.String())\n}", "func NewCertificateCsr(ctx *pulumi.Context,\n\tname string, args *CertificateCsrArgs, opts ...pulumi.ResourceOption) (*CertificateCsr, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.ResourceGroupName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ResourceGroupName'\")\n\t}\n\taliases := pulumi.Aliases([]pulumi.Alias{\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:web/v20150801:CertificateCsr\"),\n\t\t},\n\t})\n\topts = append(opts, aliases)\n\tvar resource CertificateCsr\n\terr := ctx.RegisterResource(\"azure-native:web/v20150801:CertificateCsr\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
ParseCsrRequest takes a certificate request and generates a key and CSR from it. It does no validation caveat emptor. It will, however, fail if the key request is not valid (i.e., an unsupported curve or RSA key size). The lack of validation was specifically chosen to allow the end user to define a policy and validate the request appropriately before calling this function.
func (c *Provider) ParseCsrRequest(req *CertificateRequest) (csr []byte, priv crypto.PrivateKey, keyID string, err error) { if req.KeyRequest == nil { err = errors.New("invalid key request") return } logger.Infof("algo=%s, size=%d", req.KeyRequest.Algo(), req.KeyRequest.Size()) priv, err = req.KeyRequest.Generate() if err != nil { err = errors.WithMessage(err, "generate key") return } var label string keyID, label, err = c.provider.IdentifyKey(priv) if err != nil { err = errors.WithMessage(err, "identify key") return } logger.Infof("generated key, id=%q, label=%q", keyID, label) var tpl = x509.CertificateRequest{ Subject: req.Name(), SignatureAlgorithm: req.KeyRequest.SigAlgo(), } for i := range req.Hosts { if ip := net.ParseIP(req.Hosts[i]); ip != nil { tpl.IPAddresses = append(tpl.IPAddresses, ip) } else if email, err := mail.ParseAddress(req.Hosts[i]); err == nil && email != nil { tpl.EmailAddresses = append(tpl.EmailAddresses, req.Hosts[i]) } else { tpl.DNSNames = append(tpl.DNSNames, req.Hosts[i]) } } csr, err = x509.CreateCertificateRequest(rand.Reader, &tpl, priv) if err != nil { logger.Errorf("failed to generate a CSR: %v", errors.WithStack(err)) err = errors.WithMessage(err, "generate csr") return } block := pem.Block{ Type: "CERTIFICATE REQUEST", Bytes: csr, } csr = pem.EncodeToMemory(&block) return }
[ "func (c *Provider) ProcessCsrRequest(req *CertificateRequest) (csrPEM, key []byte, keyID string, pub crypto.PublicKey, err error) {\n\terr = ValidateCSR(req)\n\tif err != nil {\n\t\terr = errors.WithMessage(err, \"invalid request\")\n\t\treturn\n\t}\n\n\tvar priv crypto.PrivateKey\n\n\tcsrPEM, priv, keyID, err = c.ParseCsrRequest(req)\n\tif err != nil {\n\t\tkey = nil\n\t\terr = errors.WithMessage(err, \"process request\")\n\t\treturn\n\t}\n\n\ts, ok := priv.(crypto.Signer)\n\tif !ok {\n\t\tkey = nil\n\t\terr = errors.WithMessage(err, \"unable to convert key to crypto.Signer\")\n\t\treturn\n\t}\n\tpub = s.Public()\n\n\turi, keyBytes, err := c.provider.ExportKey(keyID)\n\tif err != nil {\n\t\terr = errors.WithMessage(err, \"key URI\")\n\t\treturn\n\t}\n\n\tif keyBytes == nil {\n\t\tkey = []byte(uri)\n\t} else {\n\t\tkey = keyBytes\n\t}\n\n\treturn\n}", "func ParseCertificateRequest(asn1Data []byte) (*CertificateRequest, error) {\r\n\tvar csr certificateRequest\r\n\r\n\trest, err := asn1.Unmarshal(asn1Data, &csr)\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t} else if len(rest) != 0 {\r\n\t\treturn nil, asn1.SyntaxError{Msg: \"trailing data\"}\r\n\t}\r\n\tif !csr.SignatureAlgorithm.Algorithm.Equal(oidSignatureSM2WithSM3) {\r\n\t\tcsrR, err := x509.ParseCertificateRequest(asn1Data)\r\n\t\tif err != nil {\r\n\t\t\treturn nil, err\r\n\t\t}\r\n\t\treturn &CertificateRequest{*csrR}, nil\r\n\t}\r\n\treturn parseCertificateRequest(&csr)\r\n}", "func ValidateCertificateRequest(conf *config.Configuration, csr *x509.CertificateRequest, certType string,\n\t ctxMap *map[string]types.RoleInfo) error {\n\tlog.Trace(\"validation/validate_CSR:ValidateCertificateRequest() Entering\")\n\tdefer log.Trace(\"validation/validate_CSR:ValidateCertificateRequest() Leaving\")\n\n\t// TODO: We should be able to support other signature algorithms... such as ECDSA with SHA384\n\tif csr.SignatureAlgorithm != x509.SHA384WithRSA {\n\t\treturn fmt.Errorf(\"validation/validate_CSR:ValidateCertificateRequest() Incorrect Signature Algorithm used (should be SHA 384 with RSA): %v\", csr.SignatureAlgorithm)\n\t}\n\tif len(csr.Subject.Names) != 1 {\n\t\treturn errors.New(\"validation/validate_CSR:ValidateCertificateRequest() Only Common Name is supported in Subject\")\n\t}\n\tsubjectFromCsr := strings.TrimSpace(csr.Subject.String())\n\t// Validate CN\n\tsanListsFromToken := []string{}\n\tisCnPresentInToken := false\n\n\tfor k,_ := range *ctxMap {\n\t\tparams := strings.Split(k, \";\")\n\t\t// Check if Subject matches with CN\n\t\tif len(params) > 0 && (strings.EqualFold(params[0], subjectFromCsr) || search.WildcardMatched(params[0], subjectFromCsr)) {\n\t\t\tisCnPresentInToken = true\n\t\t\tlog.Debugf(\"validation/validate_CSR:ValidateCertificateRequest() Token contains required Common Name : %v \", subjectFromCsr)\n\t\t\tif len(params) > 2 {\n\t\t\t\tif strings.EqualFold(params[2], \"CERTTYPE=\" +certType) { // Check if cert type matches\n\t\t\t\t\tsanListsFromToken = append(sanListsFromToken, params[1])\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tif !isCnPresentInToken {\n\t\treturn errors.New(\"validation/validate_CSR:ValidateCertificateRequest() No role associated with provided Common Name in CSR -\" + subjectFromCsr)\n\t}\n\tlog.Info(\"validation/validate_CSR:ValidateCertificateRequest() Got valid Common Name in CSR : \" + subjectFromCsr)\n\n\t// Validate SAN only for TLS\n\tif strings.EqualFold(constants.Tls, certType) {\n\t\tlog.Debugf(\"validation/validate_CSR:ValidateCertificateRequest() San list(IP) requested in CSR - %v \", csr.IPAddresses)\n\t\tlog.Debugf(\"validation/validate_CSR:ValidateCertificateRequest() San list(DNS) requested in CSR - %v \", csr.DNSNames)\n\t\terr := validateDNSNames(csr.DNSNames)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"validation/validate_CSR:ValidateCertificateRequest() Unsupported content in SAN list\")\n\t\t}\n\n\t\tfor _, sanlistFromToken := range sanListsFromToken {\n\t\t\tif sanlistFromToken != \"\" {\n\t\t\t\tlog.Debugf(\"validation/validate_CSR:ValidateCertificateRequest() San list requested in token - %v \", sanlistFromToken)\n\t\t\t\tsans := strings.Split(sanlistFromToken, \"=\")\n\t\t\t\tif len(sans) > 1 {\n\t\t\t\t\ttokenSanList := strings.Split(sans[1], \",\")\n\t\t\t\t\tisSanPresentInToken := true\n\t\t\t\t\tfor _, san := range tokenSanList {\n\t\t\t\t\t\tif !ipInSlice(san, csr.IPAddresses) && !stringInSlice(san, csr.DNSNames) {\n\t\t\t\t\t\t\tisSanPresentInToken = false\n\t\t\t\t\t\t\tbreak;\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tif(isSanPresentInToken) {\n\t\t\t\t\t\tlog.Debugf(\"validation/validate_CSR:ValidateCertificateRequest() San list requested in CSR is part of Token is valid\",)\n\t\t\t\t\t\treturn nil\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\treturn errors.New(\"validation/validate_CSR:ValidateCertificateRequest() No role associated with provided SAN list in CSR\")\n\t}\n\tlog.Info(\"validation/validate_CSR:ValidateCertificateRequest() Certificate Signing Request is valid\")\n\treturn nil\n}", "func ParseCertificateRequest(pemData []byte) (*x509.CertificateRequest, error) {\n\tvar block *pem.Block\n\tfor len(pemData) > 0 {\n\t\tblock, pemData = pem.Decode(pemData)\n\t\tif block == nil {\n\t\t\treturn nil, errors.New(\"error decoding pem block\")\n\t\t}\n\t\tif (block.Type != \"CERTIFICATE REQUEST\" && block.Type != \"NEW CERTIFICATE REQUEST\") ||\n\t\t\tlen(block.Headers) != 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\tcsr, err := x509.ParseCertificateRequest(block.Bytes)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"error parsing certificate request\")\n\t\t}\n\t\treturn csr, nil\n\t}\n\n\treturn nil, errors.New(\"error parsing certificate request: no certificate found\")\n}", "func ParseCertificateRequest(asn1Data []byte) (*CertificateRequest, error) {\n\tvar csr certificateRequest\n\n\trest, err := asn1.Unmarshal(asn1Data, &csr)\n\tif err != nil {\n\t\treturn nil, err\n\t} else if len(rest) != 0 {\n\t\treturn nil, asn1.SyntaxError{Msg: \"trailing data\"}\n\t}\n\n\treturn parseCertificateRequest(&csr)\n}", "func ParseCertificateRequestPEM(data []byte) (*CertificateRequest, error) {\r\n\tblock, _ := pem.Decode(data)\r\n\tif block == nil {\r\n\t\treturn nil, errors.New(\"failed to decode PEM block containing CSR\")\r\n\t}\r\n\treturn ParseCertificateRequest(block.Bytes)\r\n}", "func ParseCSR(pemValue string) (*x509.CertificateRequest, error) {\n\t// The _ result below is not an error but the remaining PEM bytes.\n\tblock, _ := pem.Decode([]byte(pemValue))\n\tif block == nil {\n\t\treturn nil, fmt.Errorf(\"no PEM-encoded data found\")\n\t}\n\n\tif block.Type != \"CERTIFICATE REQUEST\" {\n\t\treturn nil, fmt.Errorf(\"first PEM-block should be CERTIFICATE REQUEST type\")\n\t}\n\n\treturn x509.ParseCertificateRequest(block.Bytes)\n}", "func NewCertificateRequest(ctx RequestContext) (*Impl, error) {\n\n\t// Convert time string to time type\n\ttimes, err := getTimes(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Parse the query parameters\n\treq, err := getReq(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Check to make sure that the request does not have conflicting filters\n\terr = validateReq(req, times)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Impl{\n\t\tID: req.ID,\n\t\tSerialNumber: req.Serial,\n\t\tAki: req.AKI,\n\t\tNotexpired: req.NotExpired,\n\t\tNotrevoked: req.NotRevoked,\n\t\tExpiredTimeStart: times.expiredStart,\n\t\tExpiredTimeEnd: times.expiredEnd,\n\t\tRevokedTimeStart: times.revokedStart,\n\t\tRevokedTimeEnd: times.revokedEnd,\n\t}, nil\n}", "func CertificateGenerateRequest(privateKey *rsa.PrivateKey, props TlsCertificateProps, fqdncn bool) (*certificates.CertificateSigningRequest, error) {\n\tdnsNames := make([]string, 3)\n\tdnsNames[0] = props.Service\n\tdnsNames[1] = props.Service + \".\" + props.Namespace\n\t// The full service name is the CommonName for the certificate\n\tcommonName := GenerateInClusterServiceName(props)\n\tdnsNames[2] = commonName\n\tcsCommonName := props.Service\n\tif fqdncn {\n\t\t// use FQDN as CommonName as a workaournd for https://github.com/nirmata/kyverno/issues/542\n\t\tcsCommonName = commonName\n\t}\n\tvar ips []net.IP\n\tapiServerIP := net.ParseIP(props.ApiServerHost)\n\tif apiServerIP != nil {\n\t\tips = append(ips, apiServerIP)\n\t} else {\n\t\tdnsNames = append(dnsNames, props.ApiServerHost)\n\t}\n\n\tcsrTemplate := x509.CertificateRequest{\n\t\tSubject: pkix.Name{\n\t\t\tCommonName: csCommonName,\n\t\t},\n\t\tSignatureAlgorithm: x509.SHA256WithRSA,\n\t\tDNSNames: dnsNames,\n\t\tIPAddresses: ips,\n\t}\n\n\tcsrBytes, err := x509.CreateCertificateRequest(rand.Reader, &csrTemplate, privateKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &certificates.CertificateSigningRequest{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"certificates.k8s.io/v1beta1\",\n\t\t\tKind: \"CertificateSigningRequest\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: props.Service + \".\" + props.Namespace + \".cert-request\",\n\t\t},\n\t\tSpec: certificates.CertificateSigningRequestSpec{\n\t\t\tRequest: certificateRequestToPem(csrBytes),\n\t\t\tGroups: []string{\"system:masters\", \"system:authenticated\"},\n\t\t\tUsages: []certificates.KeyUsage{\n\t\t\t\tcertificates.UsageDigitalSignature,\n\t\t\t\tcertificates.UsageKeyEncipherment,\n\t\t\t\tcertificates.UsageServerAuth,\n\t\t\t\tcertificates.UsageClientAuth,\n\t\t\t},\n\t\t},\n\t}, nil\n}", "func CreateCertificateRequest(rand io.Reader, template *x509.CertificateRequest, priv interface{}) (csr []byte, err error) {\r\n\tkey, ok := priv.(crypto.Signer)\r\n\tif !ok {\r\n\t\treturn nil, errors.New(\"x509: certificate private key does not implement crypto.Signer\")\r\n\t}\r\n\tvar hashFunc crypto.Hash\r\n\tvar sigAlgo pkix.AlgorithmIdentifier\r\n\thashFunc, sigAlgo, err = signingParamsForPublicKey(key.Public(), template.SignatureAlgorithm)\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\tvar publicKeyBytes []byte\r\n\tvar publicKeyAlgorithm pkix.AlgorithmIdentifier\r\n\tpublicKeyBytes, publicKeyAlgorithm, err = marshalPublicKey(key.Public())\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\tvar extensions []pkix.Extension\r\n\r\n\tif (len(template.DNSNames) > 0 || len(template.EmailAddresses) > 0 || len(template.IPAddresses) > 0 || len(template.URIs) > 0) &&\r\n\t\t!oidInExtensions(oidExtensionSubjectAltName, template.ExtraExtensions) {\r\n\t\tsanBytes, err := marshalSANs(template.DNSNames, template.EmailAddresses, template.IPAddresses, template.URIs)\r\n\t\tif err != nil {\r\n\t\t\treturn nil, err\r\n\t\t}\r\n\r\n\t\textensions = append(extensions, pkix.Extension{\r\n\t\t\tId: oidExtensionSubjectAltName,\r\n\t\t\tValue: sanBytes,\r\n\t\t})\r\n\t}\r\n\r\n\textensions = append(extensions, template.ExtraExtensions...)\r\n\r\n\t// Make a copy of template.Attributes because we may alter it below.\r\n\tattributes := make([]pkix.AttributeTypeAndValueSET, 0, len(template.Attributes))\r\n\tfor _, attr := range template.Attributes {\r\n\t\tvalues := make([][]pkix.AttributeTypeAndValue, len(attr.Value))\r\n\t\tcopy(values, attr.Value)\r\n\t\tattributes = append(attributes, pkix.AttributeTypeAndValueSET{\r\n\t\t\tType: attr.Type,\r\n\t\t\tValue: values,\r\n\t\t})\r\n\t}\r\n\r\n\textensionsAppended := false\r\n\tif len(extensions) > 0 {\r\n\t\t// Append the extensions to an existing attribute if possible.\r\n\t\tfor _, atvSet := range attributes {\r\n\t\t\tif !atvSet.Type.Equal(oidExtensionRequest) || len(atvSet.Value) == 0 {\r\n\t\t\t\tcontinue\r\n\t\t\t}\r\n\r\n\t\t\t// specifiedExtensions contains all the extensions that we\r\n\t\t\t// found specified via template.Attributes.\r\n\t\t\tspecifiedExtensions := make(map[string]bool)\r\n\r\n\t\t\tfor _, atvs := range atvSet.Value {\r\n\t\t\t\tfor _, atv := range atvs {\r\n\t\t\t\t\tspecifiedExtensions[atv.Type.String()] = true\r\n\t\t\t\t}\r\n\t\t\t}\r\n\r\n\t\t\tnewValue := make([]pkix.AttributeTypeAndValue, 0, len(atvSet.Value[0])+len(extensions))\r\n\t\t\tnewValue = append(newValue, atvSet.Value[0]...)\r\n\r\n\t\t\tfor _, e := range extensions {\r\n\t\t\t\tif specifiedExtensions[e.Id.String()] {\r\n\t\t\t\t\t// Attributes already contained a value for\r\n\t\t\t\t\t// this extension and it takes priority.\r\n\t\t\t\t\tcontinue\r\n\t\t\t\t}\r\n\r\n\t\t\t\tnewValue = append(newValue, pkix.AttributeTypeAndValue{\r\n\t\t\t\t\t// There is no place for the critical\r\n\t\t\t\t\t// flag in an AttributeTypeAndValue.\r\n\t\t\t\t\tType: e.Id,\r\n\t\t\t\t\tValue: e.Value,\r\n\t\t\t\t})\r\n\t\t\t}\r\n\r\n\t\t\tatvSet.Value[0] = newValue\r\n\t\t\textensionsAppended = true\r\n\t\t\tbreak\r\n\t\t}\r\n\t}\r\n\r\n\trawAttributes, err := newRawAttributes(attributes)\r\n\tif err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\t// If not included in attributes, add a new attribute for the\r\n\t// extensions.\r\n\tif len(extensions) > 0 && !extensionsAppended {\r\n\t\tattr := struct {\r\n\t\t\tType asn1.ObjectIdentifier\r\n\t\t\tValue [][]pkix.Extension `asn1:\"set\"`\r\n\t\t}{\r\n\t\t\tType: oidExtensionRequest,\r\n\t\t\tValue: [][]pkix.Extension{extensions},\r\n\t\t}\r\n\r\n\t\tb, err := asn1.Marshal(attr)\r\n\t\tif err != nil {\r\n\t\t\treturn nil, errors.New(\"x509: failed to serialise extensions attribute: \" + err.Error())\r\n\t\t}\r\n\r\n\t\tvar rawValue asn1.RawValue\r\n\t\tif _, err := asn1.Unmarshal(b, &rawValue); err != nil {\r\n\t\t\treturn nil, err\r\n\t\t}\r\n\r\n\t\trawAttributes = append(rawAttributes, rawValue)\r\n\t}\r\n\r\n\tasn1Subject := template.RawSubject\r\n\tif len(asn1Subject) == 0 {\r\n\t\tasn1Subject, err = asn1.Marshal(template.Subject.ToRDNSequence())\r\n\t\tif err != nil {\r\n\t\t\treturn nil, err\r\n\t\t}\r\n\t}\r\n\r\n\ttbsCSR := tbsCertificateRequest{\r\n\t\tVersion: 0, // PKCS #10, RFC 2986\r\n\t\tSubject: asn1.RawValue{FullBytes: asn1Subject},\r\n\t\tPublicKey: publicKeyInfo{\r\n\t\t\tAlgorithm: publicKeyAlgorithm,\r\n\t\t\tPublicKey: asn1.BitString{\r\n\t\t\t\tBytes: publicKeyBytes,\r\n\t\t\t\tBitLength: len(publicKeyBytes) * 8,\r\n\t\t\t},\r\n\t\t},\r\n\t\tRawAttributes: rawAttributes,\r\n\t}\r\n\r\n\ttbsCSRContents, err := asn1.Marshal(tbsCSR)\r\n\tif err != nil {\r\n\t\treturn\r\n\t}\r\n\ttbsCSR.Raw = tbsCSRContents\r\n\r\n\tsigned := tbsCSRContents\r\n\tvar signature []byte\r\n\tvar opts crypto.SignerOpts = hashFunc\r\n\tif hashFunc != 0 {\r\n\t\th := hashFunc.New()\r\n\t\th.Write(signed)\r\n\t\tsigned = h.Sum(nil)\r\n\t}\r\n\tif sigAlgo.Algorithm.Equal(oidSignatureSM2WithSM3) {\r\n\t\topts = sm2.NewSM2SignerOption(true, nil)\r\n\t}\r\n\tsignature, err = key.Sign(rand, signed, opts)\r\n\tif err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\treturn asn1.Marshal(certificateRequest{\r\n\t\tTBSCSR: tbsCSR,\r\n\t\tSignatureAlgorithm: sigAlgo,\r\n\t\tSignatureValue: asn1.BitString{\r\n\t\t\tBytes: signature,\r\n\t\t\tBitLength: len(signature) * 8,\r\n\t\t},\r\n\t})\r\n}", "func GenerateCertFromCsr(s Server, c Certificate) (Certificate, error) {\n\tif s.Endpoint == \"\" || s.Username == \"\" || s.Password == \"\" {\n\t\treturn c, fmt.Errorf(\"Must specify Endpoint/Username/Password to request certs\")\n\t}\n\tif c.CertificateRequest == \"\" {\n\t\treturn c, fmt.Errorf(\"Certs must contain CertificateRequest\")\n\t}\n\tif err := c.requestNewCert(s); err != nil {\n\t\treturn c, fmt.Errorf(\"fatal: %v\", err)\n\t}\n\tif err := c.fetchCertResult(s); err != nil {\n\t\treturn c, fmt.Errorf(\"fatal: %v\", err)\n\t}\n\treturn c, nil\n}", "func CreateCertificateRequest(rand io.Reader, template *CertificateRequest, priv interface{}) (csr []byte, err error) {\n\tkey, ok := priv.(crypto.Signer)\n\tif !ok {\n\t\treturn nil, errors.New(\"x509: certificate private key does not implement crypto.Signer\")\n\t}\n\n\tvar hashFunc crypto.Hash\n\tvar sigAlgo pkix.AlgorithmIdentifier\n\thashFunc, sigAlgo, err = signingParamsForPublicKey(key.Public(), template.SignatureAlgorithm)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar publicKeyBytes []byte\n\tvar publicKeyAlgorithm pkix.AlgorithmIdentifier\n\tpublicKeyBytes, publicKeyAlgorithm, err = marshalPublicKey(key.Public())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar extensions []pkix.Extension\n\n\tif (len(template.DNSNames) > 0 || len(template.EmailAddresses) > 0 || len(template.IPAddresses) > 0 || len(template.URIs) > 0) &&\n\t\t!oidInExtensions(OIDExtensionSubjectAltName, template.ExtraExtensions) {\n\t\tsanBytes, err := marshalSANs(template.DNSNames, template.EmailAddresses, template.IPAddresses, template.URIs)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\textensions = append(extensions, pkix.Extension{\n\t\t\tId: OIDExtensionSubjectAltName,\n\t\t\tValue: sanBytes,\n\t\t})\n\t}\n\n\textensions = append(extensions, template.ExtraExtensions...)\n\n\t// Make a copy of template.Attributes because we may alter it below.\n\tattributes := make([]pkix.AttributeTypeAndValueSET, 0, len(template.Attributes))\n\tfor _, attr := range template.Attributes {\n\t\tvalues := make([][]pkix.AttributeTypeAndValue, len(attr.Value))\n\t\tcopy(values, attr.Value)\n\t\tattributes = append(attributes, pkix.AttributeTypeAndValueSET{\n\t\t\tType: attr.Type,\n\t\t\tValue: values,\n\t\t})\n\t}\n\n\textensionsAppended := false\n\tif len(extensions) > 0 {\n\t\t// Append the extensions to an existing attribute if possible.\n\t\tfor _, atvSet := range attributes {\n\t\t\tif !atvSet.Type.Equal(oidExtensionRequest) || len(atvSet.Value) == 0 {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// specifiedExtensions contains all the extensions that we\n\t\t\t// found specified via template.Attributes.\n\t\t\tspecifiedExtensions := make(map[string]bool)\n\n\t\t\tfor _, atvs := range atvSet.Value {\n\t\t\t\tfor _, atv := range atvs {\n\t\t\t\t\tspecifiedExtensions[atv.Type.String()] = true\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tnewValue := make([]pkix.AttributeTypeAndValue, 0, len(atvSet.Value[0])+len(extensions))\n\t\t\tnewValue = append(newValue, atvSet.Value[0]...)\n\n\t\t\tfor _, e := range extensions {\n\t\t\t\tif specifiedExtensions[e.Id.String()] {\n\t\t\t\t\t// Attributes already contained a value for\n\t\t\t\t\t// this extension and it takes priority.\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tnewValue = append(newValue, pkix.AttributeTypeAndValue{\n\t\t\t\t\t// There is no place for the critical\n\t\t\t\t\t// flag in an AttributeTypeAndValue.\n\t\t\t\t\tType: e.Id,\n\t\t\t\t\tValue: e.Value,\n\t\t\t\t})\n\t\t\t}\n\n\t\t\tatvSet.Value[0] = newValue\n\t\t\textensionsAppended = true\n\t\t\tbreak\n\t\t}\n\t}\n\n\trawAttributes, err := newRawAttributes(attributes)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// If not included in attributes, add a new attribute for the\n\t// extensions.\n\tif len(extensions) > 0 && !extensionsAppended {\n\t\tattr := struct {\n\t\t\tType asn1.ObjectIdentifier\n\t\t\tValue [][]pkix.Extension `asn1:\"set\"`\n\t\t}{\n\t\t\tType: oidExtensionRequest,\n\t\t\tValue: [][]pkix.Extension{extensions},\n\t\t}\n\n\t\tb, err := asn1.Marshal(attr)\n\t\tif err != nil {\n\t\t\treturn nil, errors.New(\"x509: failed to serialise extensions attribute: \" + err.Error())\n\t\t}\n\n\t\tvar rawValue asn1.RawValue\n\t\tif _, err := asn1.Unmarshal(b, &rawValue); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\trawAttributes = append(rawAttributes, rawValue)\n\t}\n\n\tasn1Subject := template.RawSubject\n\tif len(asn1Subject) == 0 {\n\t\tasn1Subject, err = asn1.Marshal(template.Subject.ToRDNSequence())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\ttbsCSR := tbsCertificateRequest{\n\t\tVersion: 0, // PKCS #10, RFC 2986\n\t\tSubject: asn1.RawValue{FullBytes: asn1Subject},\n\t\tPublicKey: publicKeyInfo{\n\t\t\tAlgorithm: publicKeyAlgorithm,\n\t\t\tPublicKey: asn1.BitString{\n\t\t\t\tBytes: publicKeyBytes,\n\t\t\t\tBitLength: len(publicKeyBytes) * 8,\n\t\t\t},\n\t\t},\n\t\tRawAttributes: rawAttributes,\n\t}\n\n\ttbsCSRContents, err := asn1.Marshal(tbsCSR)\n\tif err != nil {\n\t\treturn\n\t}\n\ttbsCSR.Raw = tbsCSRContents\n\n\tsigned := tbsCSRContents\n\tif hashFunc != 0 {\n\t\th := hashFunc.New()\n\t\th.Write(signed)\n\t\tsigned = h.Sum(nil)\n\t}\n\n\tvar signature []byte\n\tsignature, err = key.Sign(rand, signed, hashFunc)\n\tif err != nil {\n\t\treturn\n\t}\n\n\treturn asn1.Marshal(certificateRequest{\n\t\tTBSCSR: tbsCSR,\n\t\tSignatureAlgorithm: sigAlgo,\n\t\tSignatureValue: asn1.BitString{\n\t\t\tBytes: signature,\n\t\t\tBitLength: len(signature) * 8,\n\t\t},\n\t})\n}", "func (i *TriremeIssuer) ValidateRequest(csr *x509.CertificateRequest) error {\n\t// we check the signature for validation only at the moment\n\t// TODO: there should be more criteria than just a valid signature\n\treturn csr.CheckSignature()\n}", "func (c *Client) ProcessCertificateRequest(ctx context.Context, req workload.CertificateRequest) (*workload.CertificateResponse, error) {\n\tvar header metadata.MD\n\tre, err := c.Client.ProcessCertificateRequest(ctx, &CertificateRequest{\n\t\tCertAuthorityID: req.CertAuthorityID,\n\t\tTTL: int64(req.TTL),\n\t\tCSR: req.CSR,\n\t}, grpc.Header(&header))\n\tif err != nil {\n\t\terr = trail.FromGRPC(err, header)\n\t\treturn nil, trace.Wrap(err)\n\t}\n\treturn &workload.CertificateResponse{\n\t\tCert: re.Cert,\n\t}, nil\n}", "func (c Client) RequestCertificate(details CertificateDetails) (csrPEM []byte, keyPEM []byte, certPEM []byte, err error) {\n\tflog := log.WithFields(log.Fields{\"f\": \"RequestCertificate\"})\n\n\tflog.WithFields(log.Fields{\n\t\t\"CN\": details.CommonName,\n\t\t\"Names\": details.Group,\n\t\t\"Hosts\": details.Hosts,\n\t}).Info(\"Requesting new Certificate\")\n\n\tvar cfg *csr.CAConfig\n\tcsrRequest := csr.CertificateRequest{\n\t\tCN: details.CommonName,\n\t\tNames: []csr.Name{{\n\t\t\tO: details.Group,\n\t\t}},\n\t\tHosts: details.Hosts,\n\t\tKeyRequest: &keyParam,\n\t\tCA: cfg,\n\t}\n\n\tg := &csr.Generator{Validator: noopValidator}\n\tcsrPEM, keyPEM, err = g.ProcessRequest(&csrRequest)\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\treq, err := json.Marshal(sign.Request{\n\t\tCertificateRequest: csrPEM,\n\t\tProfile: details.Profile,\n\t})\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\n\tflog.Debugf(\"Invoking Lambda: %s\", *aws.String(\"slsslSign-\" + c.config.Name))\n\tresp, err := c.lambdaSvc.Invoke(&lambda.InvokeInput{FunctionName: aws.String(\"slsslSign-\" + c.config.Name), Payload: req})\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\n\treturn csrPEM, keyPEM, resp.Payload, nil\n}", "func ReadCertificateRequest(filename string) (*x509.CertificateRequest, error) {\n\tb, err := utils.ReadFile(filename)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// PEM format\n\tif bytes.HasPrefix(b, []byte(\"-----BEGIN \")) {\n\t\tcsr, err := Parse(b, WithFilename(filename))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tswitch csr := csr.(type) {\n\t\tcase *x509.CertificateRequest:\n\t\t\treturn csr, nil\n\t\tdefault:\n\t\t\treturn nil, errors.Errorf(\"error decoding PEM: file '%s' does not contain a certificate request\", filename)\n\t\t}\n\t}\n\n\t// DER format (binary)\n\tcsr, err := x509.ParseCertificateRequest(b)\n\treturn csr, errors.Wrapf(err, \"error parsing %s\", filename)\n}", "func CertificateRequestText(csr *x509.CertificateRequest) (string, error) {\n\tvar buf bytes.Buffer\n\tbuf.Grow(4096) // 4KiB should be enough\n\n\tbuf.WriteString(\"Certificate Request:\\n\")\n\tbuf.WriteString(fmt.Sprintf(\"%4sData:\\n\", \"\"))\n\tprintVersion(csr.Version, &buf)\n\n\t// Subject information\n\terr := printSubjectInformation(&csr.Subject, csr.PublicKeyAlgorithm, csr.PublicKey, &buf)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// Optional extensions for PKCS #10, RFC 2986\n\tif csr.Version == 0 && len(csr.Extensions) > 0 {\n\t\tbuf.WriteString(fmt.Sprintf(\"%8sRequested Extensions:\\n\", \"\"))\n\t\tunknownExts := []pkix.Extension{}\n\t\tfor _, ext := range csr.Extensions {\n\t\t\tswitch {\n\t\t\tcase ext.Id.Equal(oidExtSubjectKeyID):\n\t\t\t\terr = printSubjKeyID(ext, &buf)\n\t\t\tcase ext.Id.Equal(oidExtSubjectAltName):\n\t\t\t\terr = printSubjAltNames(ext, csr.DNSNames, csr.EmailAddresses, csr.IPAddresses, csr.URIs, &buf)\n\t\t\tcase ext.Id.Equal(oidExtKeyUsage):\n\t\t\t\t// keyUsage: RFC 5280, 4.2.1.3\n\t\t\t\tku, err := parseKeyUsage(ext.Value)\n\t\t\t\tif err != nil {\n\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%12sX509v3 Key Usage: failed to decode\\n\", \"\"))\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%12sX509v3 Key Usage:\", \"\"))\n\t\t\t\tif ext.Critical {\n\t\t\t\t\tbuf.WriteString(\" critical\\n\")\n\t\t\t\t} else {\n\t\t\t\t\tbuf.WriteString(\"\\n\")\n\t\t\t\t}\n\t\t\t\tkus := []struct {\n\t\t\t\t\tku x509.KeyUsage\n\t\t\t\t\tdesc string\n\t\t\t\t}{\n\t\t\t\t\t{x509.KeyUsageDigitalSignature, \"Digital Signature\"},\n\t\t\t\t\t{x509.KeyUsageContentCommitment, \"Content Commitment\"},\n\t\t\t\t\t{x509.KeyUsageKeyEncipherment, \"Key Encipherment\"},\n\t\t\t\t\t{x509.KeyUsageDataEncipherment, \"Data Encipherment\"},\n\t\t\t\t\t{x509.KeyUsageKeyAgreement, \"Key Agreement\"},\n\t\t\t\t\t{x509.KeyUsageCertSign, \"Certificate Sign\"},\n\t\t\t\t\t{x509.KeyUsageCRLSign, \"CRL Sign\"},\n\t\t\t\t\t{x509.KeyUsageEncipherOnly, \"Encipher Only\"},\n\t\t\t\t\t{x509.KeyUsageDecipherOnly, \"Decipher Only\"},\n\t\t\t\t}\n\t\t\t\tvar usages []string\n\t\t\t\tfor _, u := range kus {\n\t\t\t\t\tif ku&u.ku > 0 {\n\t\t\t\t\t\tusages = append(usages, u.desc)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tif len(usages) > 0 {\n\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%16s%s\", \"\", usages[0]))\n\t\t\t\t\tfor i := 1; i < len(usages); i++ {\n\t\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\", %s\", usages[i]))\n\t\t\t\t\t}\n\t\t\t\t\tbuf.WriteString(\"\\n\")\n\t\t\t\t} else {\n\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%16sNone\\n\", \"\"))\n\t\t\t\t}\n\t\t\tcase ext.Id.Equal(oidExtBasicConstraints):\n\t\t\t\t// basicConstraints: RFC 5280, 4.2.1.9\n\t\t\t\tvar constraints basicConstraints\n\t\t\t\t_, err := asn1.Unmarshal(ext.Value, &constraints)\n\t\t\t\tif err != nil {\n\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%12sX509v3 Basic Constraints: failed to decode\\n\", \"\"))\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%12sX509v3 Basic Constraints:\", \"\"))\n\t\t\t\tif ext.Critical {\n\t\t\t\t\tbuf.WriteString(\" critical\\n\")\n\t\t\t\t} else {\n\t\t\t\t\tbuf.WriteString(\"\\n\")\n\t\t\t\t}\n\t\t\t\tif constraints.IsCA {\n\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%16sCA:TRUE\", \"\"))\n\t\t\t\t} else {\n\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%16sCA:FALSE\", \"\"))\n\t\t\t\t}\n\t\t\t\tswitch {\n\t\t\t\tcase constraints.MaxPathLen == 0:\n\t\t\t\t\tbuf.WriteString(\", pathlen:0\\n\")\n\t\t\t\tcase constraints.MaxPathLen > 0:\n\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\", pathlen:%d\\n\", constraints.MaxPathLen))\n\t\t\t\tdefault:\n\t\t\t\t\tbuf.WriteString(\"\\n\")\n\t\t\t\t}\n\t\t\tcase ext.Id.Equal(oidExtNameConstraints):\n\t\t\t\t// RFC 5280, 4.2.1.10\n\t\t\t\t// NameConstraints ::= SEQUENCE {\n\t\t\t\t// permittedSubtrees [0] GeneralSubtrees OPTIONAL,\n\t\t\t\t// excludedSubtrees [1] GeneralSubtrees OPTIONAL }\n\t\t\t\t//\n\t\t\t\t// GeneralSubtrees ::= SEQUENCE SIZE (1..MAX) OF GeneralSubtree\n\t\t\t\t//\n\t\t\t\t// GeneralSubtree ::= SEQUENCE {\n\t\t\t\t// base GeneralName,\n\t\t\t\t// minimum [0] BaseDistance DEFAULT 0,\n\t\t\t\t// maximum [1] BaseDistance OPTIONAL }\n\t\t\t\t//\n\t\t\t\t// BaseDistance ::= INTEGER (0..MAX)\n\t\t\t\tvar constraints nameConstraints\n\t\t\t\t_, err := asn1.Unmarshal(ext.Value, &constraints)\n\t\t\t\tif err != nil {\n\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%12sX509v3 Name Constraints: failed to decode\\n\", \"\"))\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tif len(constraints.Excluded) > 0 && ext.Critical {\n\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%12sX509v3 Name Constraints: failed to decode: unexpected excluded name constraints\\n\", \"\"))\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tvar permittedDNSDomains []string\n\t\t\t\tfor _, subtree := range constraints.Permitted {\n\t\t\t\t\tif subtree.Name == \"\" {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tpermittedDNSDomains = append(permittedDNSDomains, subtree.Name)\n\t\t\t\t}\n\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%12sX509v3 Name Constraints:\", \"\"))\n\t\t\t\tif ext.Critical {\n\t\t\t\t\tbuf.WriteString(\" critical\\n\")\n\t\t\t\t} else {\n\t\t\t\t\tbuf.WriteString(\"\\n\")\n\t\t\t\t}\n\t\t\t\tif len(permittedDNSDomains) > 0 {\n\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%16sPermitted:\\n%18s%s\", \"\", \"\", permittedDNSDomains[0]))\n\t\t\t\t\tfor i := 1; i < len(permittedDNSDomains); i++ {\n\t\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\", %s\", permittedDNSDomains[i]))\n\t\t\t\t\t}\n\t\t\t\t\tbuf.WriteString(\"\\n\")\n\t\t\t\t}\n\t\t\tcase ext.Id.Equal(oidExtExtendedKeyUsage):\n\t\t\t\t// extKeyUsage: RFC 5280, 4.2.1.12\n\t\t\t\t// id-ce-extKeyUsage OBJECT IDENTIFIER ::= { id-ce 37 }\n\t\t\t\t//\n\t\t\t\t// ExtKeyUsageSyntax ::= SEQUENCE SIZE (1..MAX) OF KeyPurposeId\n\t\t\t\t//\n\t\t\t\t// KeyPurposeId ::= OBJECT IDENTIFIER\n\t\t\t\tvar keyUsage []asn1.ObjectIdentifier\n\t\t\t\tif _, err = asn1.Unmarshal(ext.Value, &keyUsage); err != nil {\n\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%12sX509v3 Extended Key Usage: failed to decode\\n\", \"\"))\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tekus := []struct {\n\t\t\t\t\toid asn1.ObjectIdentifier\n\t\t\t\t\tdesc string\n\t\t\t\t}{\n\t\t\t\t\t{oidExtKeyUsageAny, \"Any Usage\"},\n\t\t\t\t\t{oidExtKeyUsageServerAuth, \"Server Authentication\"},\n\t\t\t\t\t{oidExtKeyUsageClientAuth, \"Client Authentication\"},\n\t\t\t\t\t{oidExtKeyUsageCodeSigning, \"Code Signing\"},\n\t\t\t\t\t{oidExtKeyUsageEmailProtection, \"E-mail Protection\"},\n\t\t\t\t\t{oidExtKeyUsageIPSECEndSystem, \"IPSec End System\"},\n\t\t\t\t\t{oidExtKeyUsageIPSECTunnel, \"IPSec Tunnel\"},\n\t\t\t\t\t{oidExtKeyUsageIPSECUser, \"IPSec User\"},\n\t\t\t\t\t{oidExtKeyUsageTimeStamping, \"Time Stamping\"},\n\t\t\t\t\t{oidExtKeyUsageOCSPSigning, \"OCSP Signing\"},\n\t\t\t\t\t{oidExtKeyUsageMicrosoftServerGatedCrypto, \"Microsoft Server Gated Crypto\"},\n\t\t\t\t\t{oidExtKeyUsageNetscapeServerGatedCrypto, \"Netscape Server Gated Crypto\"},\n\t\t\t\t\t{oidExtKeyUsageMicrosoftCommercialCodeSigning, \"Microsoft Commercial Code Signing\"},\n\t\t\t\t\t{oidExtKeyUsageMicrosoftKernelCodeSigning, \"Microsoft Kernel Code Signing\"},\n\t\t\t\t\t{oidExtKeyUsageEKCertificate, \"EK Certificate\"},\n\t\t\t\t}\n\t\t\t\tvar list []string\n\t\t\t\tfor _, u := range keyUsage {\n\t\t\t\t\tfound := false\n\t\t\t\t\tfor _, eku := range ekus {\n\t\t\t\t\t\tif u.Equal(eku.oid) {\n\t\t\t\t\t\t\tlist = append(list, eku.desc)\n\t\t\t\t\t\t\tfound = true\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tif !found {\n\t\t\t\t\t\tlist = append(list, fmt.Sprintf(\"UNKNOWN(%s)\", u.String()))\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%12sX509v3 Extended Key Usage:\", \"\"))\n\t\t\t\tif ext.Critical {\n\t\t\t\t\tbuf.WriteString(\" critical\\n\")\n\t\t\t\t} else {\n\t\t\t\t\tbuf.WriteString(\"\\n\")\n\t\t\t\t}\n\t\t\t\tif len(list) > 0 {\n\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%16s%s\", \"\", list[0]))\n\t\t\t\t\tfor i := 1; i < len(list); i++ {\n\t\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\", %s\", list[i]))\n\t\t\t\t\t}\n\t\t\t\t\tbuf.WriteString(\"\\n\")\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tunknownExts = append(unknownExts, ext)\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\treturn \"\", err\n\t\t\t}\n\t\t}\n\t\tif len(unknownExts) > 0 {\n\t\t\tbuf.WriteString(fmt.Sprintf(\"%8sAttributes:\\n\", \"\"))\n\t\t\tfor _, ext := range unknownExts {\n\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%12s%s:\", \"\", ext.Id.String()))\n\t\t\t\tif ext.Critical {\n\t\t\t\t\tbuf.WriteString(\" critical\\n\")\n\t\t\t\t} else {\n\t\t\t\t\tbuf.WriteString(\"\\n\")\n\t\t\t\t}\n\t\t\t\tvalue := bytes.Runes(ext.Value)\n\t\t\t\tsanitized := make([]rune, len(value))\n\t\t\t\thasSpecialChar := false\n\t\t\t\tfor i, r := range value {\n\t\t\t\t\tif strconv.IsPrint(r) && r != '�' {\n\t\t\t\t\t\tsanitized[i] = r\n\t\t\t\t\t} else {\n\t\t\t\t\t\thasSpecialChar = true\n\t\t\t\t\t\tsanitized[i] = '.'\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%16s%s\\n\", \"\", string(sanitized)))\n\t\t\t\tif hasSpecialChar {\n\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%16s\", \"\"))\n\t\t\t\t\tfor i, b := range ext.Value {\n\t\t\t\t\t\tbuf.WriteString(fmt.Sprintf(\"%02x\", b))\n\t\t\t\t\t\tif i != len(ext.Value)-1 {\n\t\t\t\t\t\t\tbuf.WriteString(\":\")\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tbuf.WriteString(\"\\n\")\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t// Signature\n\tprintSignature(csr.SignatureAlgorithm, csr.Signature, &buf)\n\n\treturn buf.String(), nil\n}", "func (c *CKMctrler) SignCertificateRequest(ctx context.Context, req *ckmproto.CertificateSignReq) (*ckmproto.CertificateSignResp, error) {\n\tvar err error\n\n\t// make sure counters are updated on return\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tc.incrementRPCError()\n\t\t} else {\n\t\t\tc.incrementRPCSuccess()\n\t\t}\n\t}()\n\n\t// Only check that CSR is syntactically valid\n\tcsr, err := x509.ParseCertificateRequest(req.GetCsr())\n\tif err != nil {\n\t\tlog.Errorf(\"Received invalid certificate request, error: %v\", err)\n\t\treturn &ckmproto.CertificateSignResp{Approved: false}, err\n\t}\n\n\terr = csr.CheckSignature()\n\tif err != nil {\n\t\tlog.Errorf(\"Received CSR with invalid signature, error: %v\", err)\n\t\treturn &ckmproto.CertificateSignResp{Approved: false}, err\n\t}\n\n\tcert, err := certs.SignCSRwithCA(csr, c.certificate, c.privateKey, certs.WithValidityDays(7))\n\tif err != nil {\n\t\tlog.Errorf(\"Error signing CSR: %v\", err)\n\t\treturn &ckmproto.CertificateSignResp{Approved: false}, err\n\t}\n\n\treturn &ckmproto.CertificateSignResp{\n\t\tCertificate: &ckmproto.Certificate{Certificate: cert.Raw},\n\t\tApproved: true}, nil\n}", "func fillCertificateRequest(req *certificate.Request, cf *commandFlags) *certificate.Request {\n\tif cf.caDN != \"\" {\n\t\treq.CADN = cf.caDN\n\t}\n\tif cf.friendlyName != \"\" {\n\t\treq.FriendlyName = cf.friendlyName\n\t}\n\tif cf.commonName != \"\" {\n\t\treq.Subject.CommonName = cf.commonName\n\t}\n\tif cf.country != \"\" {\n\t\treq.Subject.Country = []string{cf.country}\n\t}\n\tif cf.state != \"\" {\n\t\treq.Subject.Province = []string{cf.state}\n\t}\n\tif cf.locality != \"\" {\n\t\treq.Subject.Locality = []string{cf.locality}\n\t}\n\tif cf.org != \"\" {\n\t\treq.Subject.Organization = []string{cf.org}\n\t}\n\tif len(cf.orgUnits) > 0 {\n\t\treq.Subject.OrganizationalUnit = cf.orgUnits\n\t}\n\tif len(cf.dnsSans) > 0 {\n\t\treq.DNSNames = cf.dnsSans\n\t}\n\tif len(cf.ipSans) > 0 {\n\t\treq.IPAddresses = cf.ipSans\n\t}\n\tif len(cf.emailSans) > 0 {\n\t\treq.EmailAddresses = cf.emailSans\n\t}\n\tif len(cf.uriSans) > 0 {\n\t\treq.URIs = cf.uriSans\n\t}\n\tif len(cf.upnSans) > 0 {\n\t\treq.UPNs = cf.upnSans\n\t}\n\treq.OmitSANs = cf.omitSans\n\tfor _, f := range cf.customFields {\n\t\tk, v, err := parseCustomField(f)\n\t\tif err != nil {\n\t\t\tlogger.Panic(err)\n\t\t}\n\t\treq.CustomFields = append(req.CustomFields, certificate.CustomField{Name: k, Value: v})\n\t}\n\n\tif len(cf.instance) > 0 {\n\t\treq.Location = &certificate.Location{}\n\t\tinstance := strings.Split(cf.instance, \":\")\n\t\treq.Location.Instance = instance[0]\n\t\tif len(instance) > 1 {\n\t\t\treq.Location.Workload = instance[1]\n\t\t}\n\n\t\treq.Location.TLSAddress = cf.tlsAddress\n\t\treq.Location.Replace = cf.replaceInstance\n\t}\n\n\torigin := OriginName\n\tif len(cf.appInfo) > 0 {\n\t\torigin = cf.appInfo\n\t}\n\treq.CustomFields = append(req.CustomFields, certificate.CustomField{Name: \"Origin\", Value: origin, Type: certificate.CustomFieldOrigin})\n\n\tswitch true {\n\tcase 0 == strings.Index(cf.csrOption, \"file:\"):\n\t\tvar err error\n\t\tcsrFileName := cf.csrOption[5:]\n\t\tcsr, err := readCSRfromFile(csrFileName)\n\t\tif err != nil {\n\t\t\tlogger.Panicf(\"Failed to read CSR from file %s: %s\", csrFileName, err)\n\t\t}\n\t\terr = req.SetCSR(csr)\n\t\tif err != nil {\n\t\t\tlogger.Panicf(\"Failed to set CSR %s\", err)\n\t\t}\n\t\treq.CsrOrigin = certificate.UserProvidedCSR\n\n\tcase \"service\" == cf.csrOption:\n\t\tif cf.keyType != nil {\n\t\t\treq.KeyType = *cf.keyType\n\t\t}\n\t\tif cf.keySize > 0 {\n\t\t\treq.KeyLength = cf.keySize\n\t\t} else if req.KeyLength == 0 {\n\t\t\treq.KeyLength = 2048\n\t\t}\n\t\tif cf.keyCurve != certificate.EllipticCurveNotSet {\n\t\t\treq.KeyCurve = cf.keyCurve\n\t\t}\n\t\treq.CsrOrigin = certificate.ServiceGeneratedCSR\n\n\tdefault: // \"local\" == cf.csrOption:\n\t\tif cf.keyType != nil {\n\t\t\treq.KeyType = *cf.keyType\n\t\t}\n\t\tif cf.keySize > 0 {\n\t\t\treq.KeyLength = cf.keySize\n\t\t} else if req.KeyLength == 0 {\n\t\t\treq.KeyLength = 2048\n\t\t}\n\t\tif cf.keyCurve != certificate.EllipticCurveNotSet {\n\t\t\treq.KeyCurve = cf.keyCurve\n\t\t}\n\t\treq.CsrOrigin = certificate.LocalGeneratedCSR\n\t}\n\n\tif cf.validDays != \"\" {\n\t\tdata := strings.Split(cf.validDays, \"#\")\n\t\tdays, _ := strconv.ParseInt(data[0], 10, 64)\n\t\tduration := time.Duration(days) * time.Hour * 24\n\n\t\treq.ValidityDuration = &duration\n\n\t\tif len(data) > 1 { // means that issuer hint is set\n\t\t\tvar issuerHint util.IssuerHint\n\n\t\t\tswitch strings.ToLower(data[1]) {\n\t\t\tcase \"m\":\n\t\t\t\tissuerHint = util.IssuerHintMicrosoft\n\t\t\tcase \"d\":\n\t\t\t\tissuerHint = util.IssuerHintDigicert\n\t\t\tcase \"e\":\n\t\t\t\tissuerHint = util.IssuerHintEntrust\n\t\t\t}\n\n\t\t\treq.IssuerHint = issuerHint\n\t\t}\n\t}\n\n\tif cf.validPeriod != \"\" {\n\t\treq.ValidityPeriod = cf.validPeriod\n\t}\n\n\treturn req\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
Like gokit log's Log method only logs a message to the specified channelName which must be a member of this MultipleChannelLogger
func (mcl MultipleChannelLogger) Log(keyvals ...interface{}) error { channel := structure.Value(keyvals, structure.ChannelKey) if channel == nil { return fmt.Errorf("MultipleChannelLogger could not select channel because"+ " '%s' was not set in log message", structure.ChannelKey) } channelName, ok := channel.(string) if !ok { return fmt.Errorf("MultipleChannelLogger could not select channel because"+ " channel was set to non-string value %v", channel) } logger := mcl[channelName] if logger == nil { return fmt.Errorf("Could not log to channel '%s', since it is not "+ "registered with this MultipleChannelLogger (the underlying logger may "+ "have been nil when passed to NewMultipleChannelLogger)", channelName) } return logger.Log(keyvals...) }
[ "func (cl ChannelLogger) Log(msg string) {\n\tcl <- msg\n}", "func Test_Alog_Channel(t *testing.T) {\n\n\t// Configure\n\tentries := []string{}\n\tConfigStdLogWriter(&entries)\n\tConfigDefaultLevel(DEBUG2)\n\n\tch := UseChannel(\"THIS\")\n\tch.Log(INFO, \"Logged to this!\")\n\n\tfoo := func() {\n\t\tch := UseChannel(\"FOO\")\n\t\tch.Log(INFO, \"Doin it in FOO\")\n\t}\n\tfoo()\n\n\tch.Log(INFO, \"Done with FOO\")\n\n\t// Check the result\n\tassert.True(t, VerifyLogs(entries, []ExpEntry{\n\t\tExpEntry{channel: \"THIS \", level: \"INFO\", body: \"Logged to this!\"},\n\t\tExpEntry{channel: \"FOO \", level: \"INFO\", body: \"Doin it in FOO\"},\n\t\tExpEntry{channel: \"THIS \", level: \"INFO\", body: \"Done with FOO\"},\n\t}))\n\n\t// Reset for next test\n\tResetDefaults()\n}", "func (m *NodeJoin) LoggingChannel() logpb.Channel { return logpb.Channel_OPS }", "func (l *xLog) log(log string, logTarget string, logLevel string, isRaw bool) {\r\n\tif l.enabledLog {\r\n\t\tskip := 3\r\n\t\tlogCtx, err := callerInfo(skip)\r\n\t\tif err != nil {\r\n\t\t\tfmt.Println(\"log println err! \" + time.Now().Format(\"2006-01-02 15:04:05\") + \" Error: \" + err.Error())\r\n\t\t\tlogCtx = &logContext{}\r\n\t\t}\r\n\t\tchanLog := chanLog{\r\n\t\t\tLogTarget: logTarget + \"_\" + logLevel,\r\n\t\t\tContent: log,\r\n\t\t\tLogLevel: logLevel,\r\n\t\t\tisRaw: isRaw,\r\n\t\t\tlogCtx: logCtx,\r\n\t\t}\r\n\t\tl.logChan_Custom <- chanLog\r\n\t}\r\n}", "func logger(m birc.Message, c birc.ChannelWriter) {\n\tif m.Content != \"\" {\n\t\tfmt.Printf(\"(%s) %s [%s] %s\\n\", c.GetConfig().ChannelName, m.Time.Format(\"2006-01-06 15:04:05\"), m.Name, m.Content)\n\t}\n}", "func (h hclogLogger) Named(name string) hclog.Logger {\n\treturn &hclogLogger{Logger: h.Logger, args: h.args, name: name + h.name}\n}", "func (l *ScribeLogger) Emit(ctx *logging.MessageContext, message string, args ...interface{}) error {\n\n\tif l.enabled {\n\t\t// format the message - we remove the level because scribe already sends them to different pipelines\n\t\t// plus we add the timestamp which the default logger already has\n\t\tstr := l.formatter.Format(ctx, message, args...)\n\t\tcategory := fmt.Sprintf(\"%s.%s\", l.category, ctx.Level)\n\n\t\tif l.secondaryOutput != nil {\n\t\t\tfmt.Fprintln(l.secondaryOutput, str)\n\t\t}\n\n\t\t//make sure the channel is not closed\n\t\tif l.channel != nil {\n\n\t\t\t//try sending, aborting immediately if the buffer is full\n\t\t\tselect {\n\t\t\tcase l.channel <- &scribe.LogEntry{category, str}:\n\t\t\t\tbreak\n\t\t\tdefault: //could not send\n\n\t\t\t\treturn fmt.Errorf(\"Scribe buffer full\")\n\t\t\t}\n\t\t} else {\n\t\t\treturn fmt.Errorf(\"Scribe buffer channel closed\")\n\t\t}\n\n\t}\n\treturn nil\n}", "func (b *Bot) LogIncomingMessage(m *slack.Message) {\n\tuser := b.FindUser(m.User)\n\tchannel := b.FindChannel(m.Channel)\n\n\tuserName := \"system\"\n\tif user != nil {\n\t\tuserName = user.Name\n\t}\n\n\tif channel != nil {\n\t\tb.Logf(\"=> #%s (%s) - %s: %s\", channel.Name, channel.ID, userName, m.Text)\n\t} else {\n\t\tb.Logf(\"=> PM - %s: %s\", userName, m.Text)\n\t}\n}", "func (e *Entry) Log(calldepth int, level Level, args ...interface{}) {\n\tif !e.logger.Skip(level) {\n\t\te.Level = level\n\t\tif len(args) > 0 {\n\t\t\te.Message = FormatMessage(args...)\n\t\t}\n\t\te.calldepth = calldepth + 1\n\t\te.flush()\n\t}\n}", "func (p *provider) Logs(ctx context.Context, name string, options *models.GetOptions) (string, error) {\n\t_, err := p.getStack(ctx, name)\n\n\treturn \"\", err\n}", "func Log(ctx context.Context, category, message string) {}", "func NewChannel(name string) *Channel {\n\tchannelMux.Lock()\n\tdefer channelMux.Unlock()\n\n\tif c, ok := channels[name]; ok {\n\t\treturn c\n\t}\n\n\tchannels[name] = &Channel{\n\t\tname: name,\n\t\tlevel: LvlInfo,\n\t\tlog: log.New(os.Stderr, \"\", log.LstdFlags),\n\t\tnameTrace: fmt.Sprintf(\"[Trace](%s):\", name),\n\t\tnameDebug: fmt.Sprintf(\"[Debug](%s):\", name),\n\t\tnameInfo: fmt.Sprintf(\"[Info](%s):\", name),\n\t\tnameWarning: fmt.Sprintf(\"[Warning](%s):\", name),\n\t\tnameError: fmt.Sprintf(\"[Error](%s):\", name),\n\t\tnameFatal: fmt.Sprintf(\"[Fatal](%s):\", name),\n\t\tnamePanic: fmt.Sprintf(\"[Panic](%s):\", name),\n\t\tnamePrint: fmt.Sprintf(\"[Print](%s):\", name),\n\t}\n\treturn channels[name]\n}", "func (s *SMTP) ChannelName() string {\n\treturn channelName\n}", "func (c *Channel) Print(args ...interface{}) {\n\tif c.skipLog(LvlPrint) {\n\t\treturn\n\t}\n\tc.log.Println(append([]interface{}{c.namePrint}, args...)...)\n}", "func sendLogMessageFromWriteln(logStruct logMessage, ch chan int, args ...interface{}) {\n\tbuf := new(bytes.Buffer)\n\tfmt.Fprintln(buf, args...)\n\tlogStruct.MessageContent = strings.TrimSpace(buf.String())\n\tgo func() {\n\t\t// Send the actual message here\n\t\tpushLogMessageToQueue(logStruct)\n\t\tch <- 1\n\t\tif logStruct.MessageType == \"FATAL\" {\n\t\t\tos.Exit(1)\n\t\t}\n\t}()\n}", "func (a *API) LogChan(stream chan string, quit chan struct{}) {\n\tticker := time.NewTicker(500 * time.Millisecond) // send log messages to client at an interval\n\n\t// following code switch out old logger (os.Stdout) to a new one which is able to stream output\n\t// to both console & a new buffer to send back to client\n\n\tb := &bytes.Buffer{}\n\tmw := io.MultiWriter(os.Stdout, b)\n\n\tstdHandler, _ := log.NewStreamHandler(os.Stdout)\n\toldLogger := log.NewDefault(stdHandler)\n\n\tmultiplexer, _ := log.NewStreamHandler(mw)\n\tlogger := log.NewDefault(multiplexer)\n\n\tlogger.SetLevel(0) // must set level to \"trace\" for `print` func (used by Syncer's db driver) to work\n\tlog.SetDefaultLogger(logger)\n\ta.syncer.SetLogger(logger)\n\n\tfor {\n\t\tselect {\n\t\tcase <-ticker.C:\n\t\t\tif b.Len() > 0 {\n\t\t\t\tdata := strings.Split(b.String(), \"\\n\")\n\t\t\t\tfor _, line := range data {\n\t\t\t\t\tstream <- line\n\t\t\t\t}\n\t\t\t\tb.Reset()\n\t\t\t}\n\t\tcase <-quit:\n\t\t\tlogger.SetLevel(2)\n\t\t\tlog.SetDefaultLogger(oldLogger)\n\t\t\ta.syncer.SetLogger(oldLogger)\n\t\t\tb.Reset()\n\t\t\treturn\n\t\t}\n\t}\n}", "func (m *MultiLogger) SetName(string) {}", "func Test_Alog_JSONBasicChannel(t *testing.T) {\n\n\t// Configure\n\tentries := []string{}\n\tConfigJSONLogWriter(&entries)\n\tConfigDefaultLevel(DEBUG)\n\tch := UseChannel(\"MAIN\")\n\n\t// Log a simple line on info\n\tch.Log(INFO, \"[%d] This is a formatted test\", 10)\n\n\t// Log a line on debug3 that shouldn't show up\n\tch.Log(DEBUG3, \"This shouldn't show up\")\n\n\t// Check the result\n\tassert.True(t, len(entries) == 1)\n\tassert.True(t, VerifyJSONLogs(entries, []ExpEntry{\n\t\tExpEntry{channel: \"MAIN\", level: \"info\", body: \"[10] This is a formatted test\"},\n\t}))\n\n\t// Reset for next test\n\tResetDefaults()\n}", "func NotificationChannelNameOption(channel string) Option { return nil }" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewAuthentication creates a new list of Authentication.
func NewAuthentication_List(s *capnp.Segment, sz int32) (Authentication_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz) return Authentication_List{l}, err }
[ "func NewAuthentication() *Authentication {\n\tthis := Authentication{}\n\treturn &this\n}", "func NewAuthentication(alg gojwt.Algorithm) *Authentication {\n\treturn &Authentication{alg: alg}\n}", "func NewAuthentication(reason interface{}) error {\n\treturn newError(codeAuth, reason)\n}", "func NewAuthenticationInfo() *AuthenticationInfo {\n\tauthenticationInfo := &AuthenticationInfo{}\n\n\tnullData := nex.NewNullData()\n\n\tauthenticationInfo.NullData = nullData\n\n\tauthenticationInfo.hierarchy = []nex.StructureInterface{\n\t\tnullData,\n\t}\n\n\treturn authenticationInfo\n}", "func NewAuthenticationHandler(sv internal.Service) auth.AuthenticateHandlerFunc {\n\treturn func(params auth.AuthenticateParams) restful.Responder {\n\t\trequest := params.Body\n\t\ttokenReview, err := sv.Authenticate(request.Spec.Token)\n\n\t\tif errors.IsUnauthorized(err) {\n\t\t\ttokenReview = defaultResponse()\n\t\t\treturn auth.NewAuthenticateUnauthorized().WithPayload(tokenReview)\n\t\t}\n\n\t\tif errors.IsInternalError(err) || err != nil {\n\t\t\ttokenReview = defaultResponse()\n\t\t\treturn auth.NewLoginInternalServerError().WithPayload(tokenReview)\n\t\t}\n\n\t\treturn auth.NewAuthenticateOK().WithPayload(tokenReview)\n\t}\n}", "func NewTunnelAuth_List(s *capnp.Segment, sz int32) (TunnelAuth_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn TunnelAuth_List{l}, err\n}", "func NewAuthenticateResponse_List(s *capnp.Segment, sz int32) (AuthenticateResponse_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 3}, sz)\n\treturn AuthenticateResponse_List{l}, err\n}", "func NewAuthenticationController(service *goa.Service) (*AuthenticationController, error) {\n\tb, err := ioutil.ReadFile(\"./jwtkey/jwt.key\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tprivKey, err := jwtgo.ParseRSAPrivateKeyFromPEM(b)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"jwt: failed to load private key: %s\", err) // bug\n\t}\n\treturn &AuthenticationController{\n\t\tController: service.NewController(\"AuthenticationController\"),\n\t\tprivateKey: privKey,\n\t}, nil\n}", "func authHandlerNewToken(w http.ResponseWriter, r *http.Request) {\n\tvar user account\n\n\terr := json.NewDecoder(r.Body).Decode(&user)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\tif user.Username == \"\" || user.Password == \"\" {\n\t\thttp.Error(w, \"Invalid username and password combination\", http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\t// TODO: implement authentication data store and validate credentials\n\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{\n\t\t\"username\": user.Username,\n\t\t\"exp\": time.Now().Add(time.Minute * 15).Unix(),\n\t})\n\ttokenStr, err := token.SignedString([]byte(AuthPassword))\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\tjson.NewEncoder(w).Encode(`{\"token\": \"` + tokenStr + `\"}`)\n\n\treturn\n}", "func NewAuthenticationWithDefaults() *Authentication {\n\tthis := Authentication{}\n\treturn &this\n}", "func NewAuthenticationProtocol(server *nex.Server) *AuthenticationProtocol {\n\tauthenticationProtocol := &AuthenticationProtocol{server: server}\n\n\tauthenticationProtocol.Setup()\n\n\treturn authenticationProtocol\n}", "func NewAuthenticationAPIInterface() Interface {\n\treturn &authenticationAPIInterface{}\n}", "func NewAuthenticationFromFile() (*Authentication, error) {\n\tfile := os.Getenv(AuthenticationFilepathName)\n\tif file == \"\" {\n\t\treturn nil, fmt.Errorf(\"Authentication file not found, environment variable %s is not set\", AuthenticationFilepathName)\n\t}\n\n\tb, err := ioutil.ReadFile(file)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Reading authentication file %q failed: %v\", file, err)\n\t}\n\n\t// Authentication file might be encoded.\n\tdecoded, err := decode(b)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Decoding authentication file %q failed: %v\", file, err)\n\t}\n\n\t// Unmarshal the authentication file.\n\tvar auth Authentication\n\tif err := json.Unmarshal(decoded, &auth); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &auth, nil\n\n}", "func (f *AuthNPorterTokenFactory) NewAuthenticated(next http.Handler) http.Handler {\n\treturn &AuthNPorterToken{next, f.config}\n}", "func NewPasswordAuthenticationMethod()(*PasswordAuthenticationMethod) {\n m := &PasswordAuthenticationMethod{\n AuthenticationMethod: *NewAuthenticationMethod(),\n }\n odataTypeValue := \"#microsoft.graph.passwordAuthenticationMethod\";\n m.SetOdataType(&odataTypeValue);\n return m\n}", "func New(jwtKey string, ur user.Repository) Authorization {\n\treturn &auth{jwtKey, ur}\n}", "func NewAuthenticationMiddleware(opts ...Option) *AuthenticationMiddleware {\n\tam := &AuthenticationMiddleware{\n\t\tOptions: Options{\n\t\t\tContextKey: \"Claims\",\n\t\t},\n\t}\n\n\tfor _, opt := range opts {\n\t\topt(&am.Options)\n\t}\n\n\tif am.Options.Authenticate == nil {\n\t\tpanic(fmt.Sprintf(\"[%s]: Cannot create instance - authentication function must be set!\", componentName))\n\t}\n\n\tif am.Options.Secret == \"\" {\n\t\tpanic(fmt.Sprintf(\"[%s]: Cannot create instance - secret must be set!\", componentName))\n\t}\n\n\treturn am\n}", "func MakeNewAuth(username string, password string) *Auth {\n\treturn &Auth{\n\t\tId: 1,\n\t\tUsername: username,\n\t\tPassword: password,\n\t}\n}", "func (o *FwPolicies) NewList() *Args {\n\to.Args.Verb = \"GET\"\n\to.Args.RequiresAuth = true\n\treturn o.Args\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewLogLines sets the logLines field to a newly allocated capnp.TextList, preferring placement in s's segment.
func (s TunnelRegistration) NewLogLines(n int32) (capnp.TextList, error) { l, err := capnp.NewTextList(s.Struct.Segment(), n) if err != nil { return capnp.TextList{}, err } err = s.Struct.SetPtr(2, l.List.ToPtr()) return l, err }
[ "func (h HeadlessLogOutput) Lines() []string { return append([]string{}, *h.linesPtr...) }", "func New(size, maxLineLength int) *LogBuffer {\n\tlb := &LogBuffer{\n\t\tcontent: make([]Line, size),\n\t}\n\tlb.LineBuffer = NewLineBuffer(maxLineLength, lb.lineCallback)\n\treturn lb\n}", "func (o *LogParams) SetLines(lines *string) {\n\to.Lines = lines\n}", "func (m *Mat) NewLine() {\n\tm.d = append(m.d, make([]uint64, m.nbOfWordsPerLine())...)\n\tm.l++\n}", "func NewLogLine(line string) (*LogLine, error) {\n\tsplitLine := strings.Split(line, \" \")\n\tif len(splitLine) < 4 {\n\t\treturn nil, errors.Errorf(\"'%s' is not a valid container log line\", line)\n\t}\n\tlogTime, err := time.Parse(LogTimeFormat, splitLine[0])\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"unable to convert time %s from container log\", splitLine[0])\n\t}\n\tl := LogLine{\n\t\tTime: logTime,\n\t\tDevice: splitLine[1],\n\t\tParseLogType: splitLine[2],\n\t\tMsg: strings.Join(splitLine[3:], \" \"),\n\t}\n\treturn &l, nil\n}", "func logLines(keyvals ...string) [][]interface{} {\n\tllines := make([][]interface{}, 0)\n\tline := make([]interface{}, 0)\n\tfor _, kv := range keyvals {\n\t\tif kv == \"\" {\n\t\t\tllines = append(llines, line)\n\t\t\tline = make([]interface{}, 0)\n\t\t} else {\n\t\t\tline = append(line, kv)\n\t\t}\n\t}\n\tif len(line) > 0 {\n\t\tllines = append(llines, line)\n\t}\n\treturn llines\n}", "func (suite *ProviderTestSuite) newLogSources(path string) []*config.LogSource {\n\treturn []*config.LogSource{config.NewLogSource(\"\", &config.LogsConfig{Type: config.FileType, Path: path})}\n}", "func (s *sectionBuf) appendLines(entryType int, lines [][]byte) {\n\ts.lines = append(s.lines, lines...)\n\tswitch entryType {\n\tcase entryTypeBlank:\n\t\ts.blankSeen = true\n\tcase entryTypeSection:\n\t\tfallthrough\n\tcase entryTypeComment:\n\t\tif !s.blankSeen {\n\t\t\ts.lastLeadComment = len(s.lines) - len(lines)\n\t\t}\n\tcase entryTypeKV:\n\t\ts.lastKV = len(s.lines) - 1\n\t}\n}", "func newLogSubsystem(sys string) LogSubsystem {\n\t//logSubsystemMax++\n\tl := logSubsystemMax\n\tlogSubsystemList = append(logSubsystemList, logSubsystemPair{sys, l})\n\taddLogSubsystem(sys, l)\n\treturn l\n}", "func addToLog(n int, term int, s *[]LogEntry) {\n\tfor i := 0; i < n; i++ {\n\t\t*s = append(*s, LogEntry{Term: term, Command: term})\n\t}\n}", "func AppendLog(l Log, b []byte) Log {\n\tcontent := append(l.content, b...)\n\tif len(content) > maxLogLengthInBytes {\n\t\tfor i := len(content) - maxLogLengthInBytes - 1; i < len(content); i++ {\n\t\t\tif content[i] == '\\n' {\n\t\t\t\tcontent = content[i+1:]\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\treturn Log{content}\n}", "func newLog(c client.Client, serviceName string, opts ...runtime.LogsOption) *klog {\n\toptions := runtime.LogsOptions{\n\t\tNamespace: client.DefaultNamespace,\n\t}\n\tfor _, o := range opts {\n\t\to(&options)\n\t}\n\n\tklog := &klog{\n\t\tserviceName: serviceName,\n\t\tclient: c,\n\t\toptions: options,\n\t}\n\n\treturn klog\n}", "func (b *LogBuffer) ReadLines(n int) []Line {\n\tb.mu.RLock()\n\tdefer b.mu.RUnlock()\n\n\tn = b.capToContentLength(n)\n\n\t// Copy references out to keep them around\n\toutArray := make([]Line, n)\n\tfor i := 1; i <= n; i++ {\n\t\toutArray[n-i] = b.content[(b.length-i)%len(b.content)]\n\t}\n\treturn outArray\n}", "func (a Agent) LogView(sid int) ([]LogEntry, error) {\n\tlog := []LogEntry{}\n\treq := libts.Request{\n\t\tCommand: \"logview\",\n\t\tArgs: map[string]interface{}{\n\t\t\t\"lines\": 99,\n\t\t\t\"reverse\": 1,\n\t\t},\n\t}\n\tif sid == 0 {\n\t\treq.Args[\"instance\"] = 1\n\t} else {\n\t\treq.ServerID = sid\n\t}\n\tfor beginPos := int64(1); beginPos != 0; { // keep querying the log until there is no more to query\n\t\tif beginPos > 1 { // beginPos needed to start somewhere\n\t\t\treq.Args[\"begin_pos\"] = beginPos\n\t\t}\n\t\tlogs, err := a.Query.DoRaw(req)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tmeta := struct {\n\t\t\tLastPos int64 `mapstructure:\"last_pos\"`\n\t\t\tFileSize int64 `mapstructure:\"file_size\"`\n\t\t}{}\n\t\tfirstLog := bytes.Index(logs, []byte(\"l=\"))\n\t\terr = communication.UnmarshalResponse(communication.ConvertResponse(logs[:firstLog]), &meta)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tbeginPos = meta.LastPos\n\t\tentries := []struct {\n\t\t\tL string `mapstructure:\"l\"`\n\t\t}{}\n\t\terr = communication.UnmarshalResponse(communication.ConvertResponse(logs[firstLog:]), &entries)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tfor i := range entries { // parse the log entries\n\t\t\tentry, err := parseLogEntry(entries[i].L)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tlog = append(log, *entry)\n\t\t}\n\t}\n\tfor left, right := 0, len(log)-1; left < right; left, right = left+1, right-1 { // reverse the array, so the first line in the log is actually first\n\t\tlog[left], log[right] = log[right], log[left]\n\t}\n\treturn log, nil\n}", "func Newln(v ...interface{}) error {\n\treturn Err(fmt.Sprintln(v...))\n}", "func (o *LogParams) WithLines(lines *string) *LogParams {\n\to.SetLines(lines)\n\treturn o\n}", "func NewService_logLevel_Params_List(s *capnp.Segment, sz int32) (Service_logLevel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn Service_logLevel_Params_List{l}, err\n}", "func (mv *ModalView) SetLines(g1 *gocui.Gui, lines []string) {\n\tDebugln(\"ModalView: SetLines\")\n\tg1.Update(\n\t\tfunc(g *gocui.Gui) error {\n\t\t\tmv.Lines = lines\n\t\t\treturn nil\n\t\t},\n\t)\n}", "func NewApp_logLevel_Params_List(s *capnp.Segment, sz int32) (App_logLevel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn App_logLevel_Params_List{l}, err\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewTunnelRegistration creates a new list of TunnelRegistration.
func NewTunnelRegistration_List(s *capnp.Segment, sz int32) (TunnelRegistration_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 6}, sz) return TunnelRegistration_List{l}, err }
[ "func (s TunnelServer_registerTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewTunnelServer_registerTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_registerTunnel_Params_List{l}, err\n}", "func NewTunnelServer_registerTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_registerTunnel_Results_List{l}, err\n}", "func (s TunnelServer_reconnectTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_registerTunnel_Params) NewOptions() (RegistrationOptions, error) {\n\tss, err := NewRegistrationOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegistrationOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewRegistration(urp repository.UserCredentialRepository) *Register {\n\treturn &Register{\n\t\tUserRepository: urp,\n\t}\n}", "func (s TunnelRegistration) NewLogLines(n int32) (capnp.TextList, error) {\n\tl, err := capnp.NewTextList(s.Struct.Segment(), n)\n\tif err != nil {\n\t\treturn capnp.TextList{}, err\n\t}\n\terr = s.Struct.SetPtr(2, l.List.ToPtr())\n\treturn l, err\n}", "func NewRegistrationServer_registerConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 3}, sz)\n\treturn RegistrationServer_registerConnection_Params_List{l}, err\n}", "func newTunnel(link link.Link) *tun {\n\treturn &tun{\n\t\tlink: link,\n\t\tsend: make(chan *message, 128),\n\t\tclosed: make(chan bool),\n\t\tsockets: make(map[string]*socket),\n\t}\n}", "func NewRegistrationServer_registerConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_registerConnection_Results_List{l}, err\n}", "func UA_RegisterNodesResponse_new() []UA_RegisterNodesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[120]))[:]).([]UA_RegisterNodesResponse)\n}", "func (np *NgrokProvider) CreateTunnel(t *tunnelProvider.Tunnel) error {\n\n\tfor attempt := uint(0); attempt <= maxRetries; attempt++ {\n\t\terr := func() error {\n\t\t\t//log.Printf(\"Creating tunnel %d attempt \\n\", attempt)\n\t\t\ttime.Sleep(1 * time.Second)\n\t\t\tvar record TunnelResponse\n\t\t\tjsonData := map[string]interface{}{\n\t\t\t\t\"addr\": fmt.Sprintf(\"%s:%s\", t.LocalIP, t.LocalPort),\n\t\t\t\t\"proto\": t.Proto,\n\t\t\t\t\"name\": t.Name,\n\t\t\t\t\"inspect\": t.Inspect,\n\t\t\t\t\"auth\": t.Auth,\n\t\t\t}\n\n\t\t\tif string(t.Proto) == \"http\" {\n\t\t\t\tjsonData[\"bind_tls\"] = true\n\t\t\t}\n\t\t\turl := fmt.Sprintf(\"http://%s/api/tunnels\", np.Client.API)\n\t\t\tjsonValue, err := json.Marshal(jsonData)\n\t\t\tif err != nil {\n\t\t\t\tgolog.Error(err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tres, err := http.Post(url, \"application/json\", bytes.NewBuffer(jsonValue))\n\t\t\tif err != nil {\n\t\t\t\tgolog.Error(err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tdefer res.Body.Close()\n\n\t\t\tif res.StatusCode < 200 || res.StatusCode > 299 {\n\t\t\t\tres, _ := ioutil.ReadAll(res.Body)\n\t\t\t\treturn errors.New(\"error api: \" + string(res))\n\t\t\t}\n\n\t\t\tif err := json.NewDecoder(res.Body).Decode(&record); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tt.RemoteAddress = record.PublicURL\n\t\t\tt.IsCreated = true\n\t\t\tgolog.Info(t.Name + \" is created and Live: -> \" + t.RemoteAddress)\n\t\t\treturn nil\n\t\t}()\n\t\tif np.Client.LogAPI && err != nil {\n\t\t\tgolog.Error(err)\n\t\t}\n\t\tif err == nil {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn nil\n}", "func UA_RegisteredServer_new() []UA_RegisteredServer {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[180]))[:]).([]UA_RegisteredServer)\n}", "func NewRegistrationListPage(getNextPage func(context.Context, RegistrationList) (RegistrationList, error)) RegistrationListPage {\n\treturn RegistrationListPage{fn: getNextPage}\n}", "func newIPSecVpnTunnels(c *ContivppV1Client, namespace string) *iPSecVpnTunnels {\n\treturn &iPSecVpnTunnels{\n\t\tclient: c.RESTClient(),\n\t\tns: namespace,\n\t}\n}", "func (s RegistrationOptions) NewFeatures(n int32) (capnp.TextList, error) {\n\tl, err := capnp.NewTextList(s.Struct.Segment(), n)\n\tif err != nil {\n\t\treturn capnp.TextList{}, err\n\t}\n\terr = s.Struct.SetPtr(7, l.List.ToPtr())\n\treturn l, err\n}", "func (s RegistrationOptions) NewTags(n int32) (Tag_List, error) {\n\tl, err := NewTag_List(s.Struct.Segment(), n)\n\tif err != nil {\n\t\treturn Tag_List{}, err\n\t}\n\terr = s.Struct.SetPtr(4, l.List.ToPtr())\n\treturn l, err\n}", "func NewMeetingRegistration()(*MeetingRegistration) {\n m := &MeetingRegistration{\n MeetingRegistrationBase: *NewMeetingRegistrationBase(),\n }\n odataTypeValue := \"#microsoft.graph.meetingRegistration\"\n m.SetOdataType(&odataTypeValue)\n return m\n}", "func New(name string, sshClientConfig *ssh.ClientConfig, sshAddr, remoteAddr, localAddr string) *Tunnel {\n\treturn &Tunnel{\n\t\tname: name,\n\t\tsshAddr: sshAddr,\n\t\tremoteAddr: remoteAddr,\n\t\tlocalAddr: localAddr,\n\t\tclientConfig: sshClientConfig,\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewTags sets the tags field to a newly allocated Tag_List, preferring placement in s's segment.
func (s RegistrationOptions) NewTags(n int32) (Tag_List, error) { l, err := NewTag_List(s.Struct.Segment(), n) if err != nil { return Tag_List{}, err } err = s.Struct.SetPtr(4, l.List.ToPtr()) return l, err }
[ "func (s PowerboxDescriptor) NewTags(n int32) (PowerboxDescriptor_Tag_List, error) {\n\tl, err := NewPowerboxDescriptor_Tag_List(s.Struct.Segment(), n)\n\tif err != nil {\n\t\treturn PowerboxDescriptor_Tag_List{}, err\n\t}\n\terr = s.Struct.SetPtr(0, l.List.ToPtr())\n\treturn l, err\n}", "func NewTag_List(s *capnp.Segment, sz int32) (Tag_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn Tag_List{l}, err\n}", "func TagNew(c *gin.Context) {\n\th := helpers.DefaultH(c)\n\th[\"Title\"] = \"New tag\"\n\th[\"Active\"] = \"tags\"\n\tsession := sessions.Default(c)\n\th[\"Flash\"] = session.Flashes()\n\tsession.Save()\n\n\tc.HTML(http.StatusOK, \"tags/form\", h)\n}", "func newTagsTagValues(c *TagsV1beta1Client, namespace string) *tagsTagValues {\n\treturn &tagsTagValues{\n\t\tclient: c.RESTClient(),\n\t\tns: namespace,\n\t}\n}", "func ParseTags(tags []AWSTag) resource.Tags {\n\tt := make(resource.Tags)\n\n\tfor _, tag := range tags {\n\t\tt[*tag.Key] = *tag.Value\n\t}\n\treturn t\n}", "func (m *Alert) SetTags(value []string)() {\n m.tags = value\n}", "func (modifySamCommand *ModifySamCommand) SetTags(tags []string) {\n\tmodifySamCommand.tags = tags\n}", "func StringTagsToTags(s StringTags) models.Tags {\n\ttags := models.NewTags(len(s), models.NewTagOptions())\n\tfor _, t := range s {\n\t\ttags = tags.AddTag(models.Tag{Name: []byte(t.N), Value: []byte(t.V)})\n\t}\n\n\treturn tags\n}", "func NewTagSet(data []byte) (Set, error) {\n\ttags := &internal.Set{}\n\terr := proto.Unmarshal(data, tags)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ts := Set{}\n\n\tfor _, tag := range tags.Tags {\n\t\ts.Add(tag.Name, tag.Classifiers...)\n\t}\n\n\treturn s, nil\n}", "func BucketUpdateTags(ctx context.Context, conn s3iface.S3API, identifier string, oldTagsMap, newTagsMap any) error {\n\toldTags := tftags.New(ctx, oldTagsMap)\n\tnewTags := tftags.New(ctx, newTagsMap)\n\n\t// We need to also consider any existing ignored tags.\n\tallTags, err := BucketListTags(ctx, conn, identifier)\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"listing resource tags (%s): %w\", identifier, err)\n\t}\n\n\tignoredTags := allTags.Ignore(oldTags).Ignore(newTags)\n\n\tif len(newTags)+len(ignoredTags) > 0 {\n\t\tinput := &s3.PutBucketTaggingInput{\n\t\t\tBucket: aws.String(identifier),\n\t\t\tTagging: &s3.Tagging{\n\t\t\t\tTagSet: Tags(newTags.Merge(ignoredTags)),\n\t\t\t},\n\t\t}\n\n\t\t_, err := conn.PutBucketTaggingWithContext(ctx, input)\n\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"setting resource tags (%s): %w\", identifier, err)\n\t\t}\n\t} else if len(oldTags) > 0 && len(ignoredTags) == 0 {\n\t\tinput := &s3.DeleteBucketTaggingInput{\n\t\t\tBucket: aws.String(identifier),\n\t\t}\n\n\t\t_, err := conn.DeleteBucketTaggingWithContext(ctx, input)\n\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"deleting resource tags (%s): %w\", identifier, err)\n\t\t}\n\t}\n\n\treturn nil\n}", "func (o *GetSMSEventsParams) SetTags(tags *string) {\n\to.Tags = tags\n}", "func SourceTagNew(tagName string) (*gtk.TextTag, error) {\n\tcstr := C.CString(tagName)\n\tdefer C.free(unsafe.Pointer(cstr))\n\n\tc := C.gtk_source_tag_new((*C.gchar)(cstr))\n\tif c == nil {\n\t\treturn nil, nilPtrErr\n\t}\n\n\treturn toTextTag(c), nil\n}", "func (b *basicShape) SetTags(tags ...string) {\n\tb.tags = tags\n}", "func createTags(d *schema.ResourceData, key, resourceType string) egoscale.Command {\n\tif t, ok := d.GetOk(key); ok {\n\t\tm := t.(map[string]interface{})\n\t\ttags := make([]egoscale.ResourceTag, 0, len(m))\n\t\tfor k, v := range m {\n\t\t\ttags = append(tags, egoscale.ResourceTag{\n\t\t\t\tKey: k,\n\t\t\t\tValue: v.(string),\n\t\t\t})\n\t\t}\n\n\t\treturn &egoscale.CreateTags{\n\t\t\tResourceIDs: []string{d.Id()},\n\t\t\tResourceType: resourceType,\n\t\t\tTags: tags,\n\t\t}\n\t}\n\n\treturn nil\n}", "func TagSliceToTags(s []models.Tag) models.Tags {\n\ttags := models.EmptyTags()\n\tfor _, t := range s {\n\t\ttags = tags.AddTag(t)\n\t}\n\n\treturn tags\n}", "func NewTagSet() *TagSet {\r\n\treturn &TagSet{\r\n\t\tInclude: []*Tag{},\r\n\t\tExclude: []*Tag{},\r\n\t}\r\n}", "func New(application, service string) Tags {\n\treturn Tags{\n\t\tApplication: application,\n\t\tService: service,\n\t\tCluster: \"none\",\n\t\tShard: \"none\",\n\t\tCustomTags: make(map[string]string, 0),\n\t}\n}", "func New(tags map[string]string, next sink) *AdditionalSpanTags {\n\treturn &AdditionalSpanTags{\n\t\ttags: tags,\n\t\tnext: next,\n\t}\n}", "func (r *Repository) diffTags(ctx context.Context, resourceID string, oldTagNames, newTagNames []string) error {\n\n\toldTags := map[string]struct{}{}\n\tfor _, v := range oldTagNames {\n\t\toldTags[v] = struct{}{}\n\t}\n\n\tnewTags := map[string]struct{}{}\n\tfor _, v := range newTagNames {\n\t\tnewTags[v] = struct{}{}\n\t}\n\n\t//find removed tags\n\tvar tags2remove []string\n\tfor i := range oldTags {\n\t\t_, stillThere := newTags[i]\n\t\tif !stillThere {\n\t\t\ttags2remove = append(tags2remove, i)\n\t\t}\n\t}\n\n\tif len(tags2remove) > 0 {\n\t\t_, err := r.Tags.Remove(ctx, &tags.RemoveRequest{\n\t\t\tResourceID: resourceID,\n\t\t\tType: TagType,\n\t\t\tTitles: tags2remove,\n\t\t})\n\t\tif err != nil {\n\t\t\tlogger.Errorf(\"Error decreasing count for tag '%v' with type '%v' for Post '%v'\", tags2remove, TagType, resourceID)\n\t\t}\n\n\t}\n\n\t//find added tags\n\tvar tags2add []string\n\tfor i := range newTags {\n\t\t_, exist := oldTags[i]\n\t\tif !exist {\n\t\t\ttags2add = append(tags2add, i)\n\t\t}\n\t}\n\n\tif len(tags2add) > 0 {\n\n\t\t_, err := r.Tags.Add(ctx, &tags.AddRequest{\n\t\t\tResourceID: resourceID,\n\t\t\tType: TagType,\n\t\t\tTitles: tags2add,\n\t\t})\n\n\t\tif err != nil {\n\t\t\tlogger.Errorf(\"Error increasing count for tag '%v' with type '%v' for parent '%v': %v\", tags2add, TagType, resourceID, err)\n\t\t}\n\n\t}\n\n\treturn nil\n\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewFeatures sets the features field to a newly allocated capnp.TextList, preferring placement in s's segment.
func (s RegistrationOptions) NewFeatures(n int32) (capnp.TextList, error) { l, err := capnp.NewTextList(s.Struct.Segment(), n) if err != nil { return capnp.TextList{}, err } err = s.Struct.SetPtr(7, l.List.ToPtr()) return l, err }
[ "func (s ClientInfo) NewFeatures(n int32) (capnp.TextList, error) {\n\tl, err := capnp.NewTextList(s.Struct.Segment(), n)\n\tif err != nil {\n\t\treturn capnp.TextList{}, err\n\t}\n\terr = s.Struct.SetPtr(1, l.List.ToPtr())\n\treturn l, err\n}", "func AttrFontFeaturesNew(features string) *Attribute {\n\tc_features := C.CString(features)\n\tdefer C.free(unsafe.Pointer(c_features))\n\n\tretC := C.pango_attr_font_features_new(c_features)\n\tretGo := AttributeNewFromC(unsafe.Pointer(retC))\n\n\treturn retGo\n}", "func (s *UsageCriteria) SetFeatures(v []*string) *UsageCriteria {\n\ts.Features = v\n\treturn s\n}", "func (s *GetMetadataOutput) SetFeatures(v map[string]*string) *GetMetadataOutput {\n\ts.Features = v\n\treturn s\n}", "func (in *ActionVpsCloneInput) SetFeatures(value bool) *ActionVpsCloneInput {\n\tin.Features = value\n\n\tif in._selectedParameters == nil {\n\t\tin._selectedParameters = make(map[string]interface{})\n\t}\n\n\tin._selectedParameters[\"Features\"] = nil\n\treturn in\n}", "func (c *Client) UpdateFeatures(bts []byte) {\n\tfm, err := models.NewFeatureMap(bts)\n\n\tif err != nil {\n\t\tprinter.SayErr(\"parse error: %v, feature payload: %s\", err, bts)\n\t\treturn\n\t}\n\n\tc.SetFeatureMap(fm)\n}", "func (ec *EnterpriseClient) SetFeatures(features uint64) {}", "func (b Ball) Features() string {\n\tst := fmt.Sprintf(\"%+v\", b)\n\tst = strings.TrimPrefix(st, \"{\")\n\treg := regexp.MustCompile(`Class.*$`)\n\tst = reg.ReplaceAllString(st, \"${1}\")\n\tst = strings.TrimSpace(st)\n\t// st = strings.ReplaceAll(st, \":\", \"=\")\n\tst = \"|F \" + st\n\treturn st\n}", "func getFeatures(token string, index int, tokens []string) []string {\n\tlength := len(tokens)\n\tcaps := \"No\"\n\tif startsWithCapital(token) {\n\t\tcaps = \"Yes\"\n\t}\n\n\treturn []string{\n\t\tfmt.Sprintf(\"I%s\", strconv.Itoa(index)),\n\t\tfmt.Sprintf(\"L%s\", bucketLength(length)),\n\t\tcaps + \"CAP\",\n\t\t\"NoPAREN\",\n\t}\n}", "func FontFeatures(otf *ot.Font, script, lang ot.Tag) ([]Feature, []Feature, error) {\n\tlytTables, err := getLayoutTables(otf)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tvar feats = make([][]Feature, 2)\n\tif script == 0 {\n\t\tscript = ot.T(\"DFLT\")\n\t}\n\tfor i := 0; i < 2; i++ {\n\t\tt := lytTables[i]\n\t\tscr := t.ScriptList.LookupTag(script)\n\t\tif scr.IsNull() && script != ot.T(\"DFLT\") {\n\t\t\tscr = t.ScriptList.LookupTag(ot.T(\"DFLT\"))\n\t\t}\n\t\tif scr.IsNull() {\n\t\t\ttrace().Infof(\"font %s has no feature-links from script %s\", otf.F.Fontname, script)\n\t\t\tcontinue\n\t\t}\n\t\ttrace().Debugf(\"found script table for '%s'\", script)\n\t\tlangs := scr.Navigate()\n\t\t//trace().Debugf(\"now at table %s\", langs.Name())\n\t\tvar dflt, lsys ot.Navigator\n\t\tdflt = langs.Link().Navigate()\n\t\tif lang != 0 {\n\t\t\tif lptr := langs.Map().LookupTag(lang); !lptr.IsNull() {\n\t\t\t\tlsys = lptr.Navigate()\n\t\t\t}\n\t\t}\n\t\ttrace().Debugf(\"dflt = %v, |feats| = %d\", dflt.Name(), dflt.List().Len())\n\t\tif lsys != nil && !lsys.IsVoid() {\n\t\t\ttrace().Debugf(\"lsys = %v\", lsys.Name())\n\t\t} else {\n\t\t\tlsys = dflt\n\t\t}\n\t\tflocs := lsys.List().All()\n\t\tfeats[i] = make([]Feature, len(flocs))\n\t\tfor j, loc := range flocs {\n\t\t\tinx := loc.U16(0)\n\t\t\t//trace().Debugf(\"loc[%d] = %d\", j, inx)\n\t\t\tfeats[i][j] = wrapFeature(t, inx, i)\n\t\t\ttrace().Debugf(\"%2d: feat[%v] \", j, feats[i][j].Tag())\n\t\t}\n\t}\n\treturn feats[0], feats[1], nil\n}", "func BuildFeatures(doc string, doc2words text.Doc2Words) []Feature {\n\twords := doc2words(doc)\n\tfeatures := make([]Feature, len(words))\n\tfor i, w := range words {\n\t\tfeatures[i] = NewFeature([]byte(w))\n\t}\n\t//fmt.Printf(\"%#v\\n\", features)\n\treturn features\n}", "func (in *S3Features) DeepCopy() *S3Features {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(S3Features)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func (r Software_Description) GetFeatures() (resp []datatypes.Software_Description_Feature, err error) {\n\terr = r.Session.DoRequest(\"SoftLayer_Software_Description\", \"getFeatures\", nil, &r.Options, &resp)\n\treturn\n}", "func (b *Baseboard) Features() BoardFeature {\n\treturn BoardFeature(b.byte(0x09))\n}", "func getFeatures(\n\ti int,\n\tts []token.TokenSN,\n\tnd *NameData,\n) (int, []feature.ClassFeatures) {\n\tvar lfs []feature.ClassFeatures\n\tclass := nlp.IsNotName\n\n\tfor j := i; j < len(ts); j++ {\n\t\tt := ts[j]\n\t\tif !t.Features().IsCapitalized {\n\t\t\tcontinue\n\t\t}\n\n\t\tupperIndex := token.UpperIndex(j, len(ts))\n\t\tfeatureSet := nlp.NewFeatureSet(ts[j:upperIndex])\n\t\tif nd.Name != \"\" && t.End() > nd.Start {\n\t\t\tclass = nlp.IsName\n\t\t\tlfs = append(lfs, feature.ClassFeatures{Features: featureSet.Flatten(),\n\t\t\t\tClass: class})\n\t\t\treturn j + 1, lfs\n\t\t}\n\n\t\tfor _, v := range featureSet.Uninomial {\n\t\t\tif v.Name == \"uniDict\" && v.Value == \"inGenus\" {\n\t\t\t\tinGenusButNoName[t.Cleaned()] = struct{}{}\n\t\t\t}\n\t\t}\n\t\tlfs = append(lfs, feature.ClassFeatures{Features: featureSet.Flatten(),\n\t\t\tClass: class})\n\t}\n\treturn -1, lfs\n}", "func getCfFromFeaturesFile() []CrsFeatures{\n\tfmt.Println(\"getCfFromFeaturesFile\");\n\tcf := []CrsFeatures{}\n\n\tfeaturesFile, err := os.Open(\"Data_2019_03_01/PS_Features.csv\")\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\tdefer featuresFile.Close()\n\treader := csv.NewReader(featuresFile)\n\treader.FieldsPerRecord = -1\n\n\tif err := gocsv.UnmarshalFile(featuresFile, &cf); err != nil {\n\t\tpanic(err)\n\t}\n\treturn cf\n}", "func NewAcceptFeatures(acceptFeatures []string) (AcceptFeatures, error) {\n\tif len(acceptFeatures) == 0 {\n\t\treturn EmptyAcceptFeatures, nil\n\t}\n\tvar expressions []FeatureExpression\n\tfor _, e := range acceptFeatures {\n\t\texpressions = append(expressions, FeatureExpression(e))\n\t}\n\treturn AcceptFeatures(expressions), nil\n}", "func sequenceFeature(tkz VocabTokenizer, seqLen int32, text string) Feature {\n\tf := Feature{\n\t\tText: text,\n\t\tTokens: make([]string, seqLen),\n\t\tTokenIDs: make([]int32, seqLen),\n\t\tMask: make([]int32, seqLen),\n\t\tTypeIDs: make([]int32, seqLen),\n\t}\n\tparts := strings.Split(text, SequenceSeparator)\n\tseqs := make([][]string, len(parts))\n\tfor i, part := range parts {\n\t\tseqs[i] = tkz.Tokenize(part)\n\t}\n\tseqs = truncate(seqs, seqLen-int32(len(seqs))-1) // truncate w/ space for CLS/SEP\n\tvoc := tkz.Vocab()\n\tvar s int\n\tf.Tokens[s] = ClassToken\n\tf.TokenIDs[s] = voc.GetID(ClassToken).Int32()\n\tf.TypeIDs[s] = 0\n\tf.Mask[s] = 1\n\ts++\n\tfor sid, seq := range seqs {\n\t\tfor _, tok := range seq {\n\t\t\tf.Tokens[s] = tok\n\t\t\tf.TokenIDs[s] = voc.GetID(tok).Int32()\n\t\t\tf.TypeIDs[s] = int32(sid)\n\t\t\tf.Mask[s] = 1\n\t\t\ts++\n\t\t}\n\t\tf.Tokens[s] = SeparatorToken\n\t\tf.TokenIDs[s] = voc.GetID(SeparatorToken).Int32()\n\t\tf.TypeIDs[s] = int32(sid)\n\t\tf.Mask[s] = 1\n\t\ts++\n\t}\n\treturn f\n}", "func (vfs *OrefaFS) Features() avfs.Feature {\n\treturn vfs.feature\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewRegistrationOptions creates a new list of RegistrationOptions.
func NewRegistrationOptions_List(s *capnp.Segment, sz int32) (RegistrationOptions_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 16, PointerCount: 8}, sz) return RegistrationOptions_List{l}, err }
[ "func (s TunnelServer_registerTunnel_Params) NewOptions() (RegistrationOptions, error) {\n\tss, err := NewRegistrationOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegistrationOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_authenticate_Params) NewOptions() (RegistrationOptions, error) {\n\tss, err := NewRegistrationOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegistrationOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RegistrationOptions) NewFeatures(n int32) (capnp.TextList, error) {\n\tl, err := capnp.NewTextList(s.Struct.Segment(), n)\n\tif err != nil {\n\t\treturn capnp.TextList{}, err\n\t}\n\terr = s.Struct.SetPtr(7, l.List.ToPtr())\n\treturn l, err\n}", "func NewClusterRegistrationOptions() *ClusterRegistrationOptions {\n\treturn &ClusterRegistrationOptions{\n\t\tClusterNamePrefix: RegistrationNamePrefix,\n\t\tClusterType: string(clusterapi.EdgeClusterSelfProvisioned),\n\t\tClusterSyncMode: string(clusterapi.Pull),\n\t\tClusterStatusReportFrequency: metav1.Duration{Duration: DefaultClusterStatusReportFrequency},\n\t\tClusterStatusCollectFrequency: metav1.Duration{Duration: DefaultClusterStatusCollectFrequency},\n\t}\n}", "func (s RegistrationOptions) NewTags(n int32) (Tag_List, error) {\n\tl, err := NewTag_List(s.Struct.Segment(), n)\n\tif err != nil {\n\t\treturn Tag_List{}, err\n\t}\n\terr = s.Struct.SetPtr(4, l.List.ToPtr())\n\treturn l, err\n}", "func (s RegistrationServer_registerConnection_Params) NewOptions() (ConnectionOptions, error) {\n\tss, err := NewConnectionOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewTunnelRegistration_List(s *capnp.Segment, sz int32) (TunnelRegistration_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 6}, sz)\n\treturn TunnelRegistration_List{l}, err\n}", "func NewRegistrationListPage(getNextPage func(context.Context, RegistrationList) (RegistrationList, error)) RegistrationListPage {\n\treturn RegistrationListPage{fn: getNextPage}\n}", "func NewRegistrationServer_registerConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 3}, sz)\n\treturn RegistrationServer_registerConnection_Params_List{l}, err\n}", "func (w *WebAuthn) GetRegistrationOptions(user User, session Session) (*protocol.CredentialCreationOptions, error) {\n\tchal, err := protocol.NewChallenge()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tu := protocol.PublicKeyCredentialUserEntity{\n\t\tID: user.WebAuthID(),\n\t\tPublicKeyCredentialEntity: protocol.PublicKeyCredentialEntity{\n\t\t\tName: user.WebAuthName(),\n\t\t},\n\t\tDisplayName: user.WebAuthDisplayName(),\n\t}\n\n\toptions := &protocol.CredentialCreationOptions{\n\t\tPublicKey: protocol.PublicKeyCredentialCreationOptions{\n\t\t\tChallenge: chal,\n\t\t\tRP: protocol.PublicKeyCredentialRpEntity{\n\t\t\t\tID: w.Config.RelyingPartyID,\n\t\t\t\tPublicKeyCredentialEntity: protocol.PublicKeyCredentialEntity{\n\t\t\t\t\tName: w.Config.RelyingPartyName,\n\t\t\t\t},\n\t\t\t},\n\t\t\tPubKeyCredParams: []protocol.PublicKeyCredentialParameters{\n\t\t\t\t{\n\t\t\t\t\tType: protocol.PublicKeyCredentialTypePublicKey,\n\t\t\t\t\tAlgorithm: protocol.ES256,\n\t\t\t\t},\n\t\t\t},\n\t\t\tTimeout: w.Config.Timeout,\n\t\t\tUser: u,\n\t\t\tAttestation: protocol.AttestationConveyancePreferenceDirect,\n\t\t},\n\t}\n\n\tauthenticators, err := w.Config.AuthenticatorStore.GetAuthenticators(user)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\texcludeCredentials := make([]protocol.PublicKeyCredentialDescriptor, len(authenticators))\n\n\tfor i, authr := range authenticators {\n\t\texcludeCredentials[i] = protocol.PublicKeyCredentialDescriptor{\n\t\t\tID: authr.WebAuthCredentialID(),\n\t\t\tType: protocol.PublicKeyCredentialTypePublicKey,\n\t\t}\n\t}\n\n\toptions.PublicKey.ExcludeCredentials = excludeCredentials\n\n\tif err := session.Set(w.Config.SessionKeyPrefixChallenge+\".register\", []byte(chal)); err != nil {\n\t\treturn nil, err\n\t}\n\tif err := session.Set(w.Config.SessionKeyPrefixUserID+\".register\", u.ID); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn options, nil\n}", "func (c *CherrypickAutoApprove) RegisterOptions(opts *options.Options) sets.String { return nil }", "func newOptionList(opts []Option) *optionList {\n\toptions := new(optionList)\n\tfor _, opt := range opts {\n\t\topt(options)\n\t}\n\treturn options\n}", "func createRegistrationSyncers(clientset *clientset.Clientset, opts Options) v1.RegistrationSyncer {\n\tskipPrometheusBounce := opts.DisablePrometheusBouncer\n\treturn v1.RegistrationSyncers{\n\t\tistio.NewIstioSecretDeleter(clientset.Kube),\n\t\tistiostats.NewIstioPrometheusSyncer(clientset.Prometheus, clientset.Kube, skipPrometheusBounce),\n\t\tlinkerdstats.NewLinkerdPrometheusSyncer(clientset.Prometheus, clientset.Kube, skipPrometheusBounce),\n\t\tgloo.NewGlooRegistrationSyncer(\n\t\t\tclientset,\n\t\t\tlinkerd.NewGlooLinkerdMtlsPlugin(clientset),\n\t\t\tistio2.NewGlooIstioMtlsPlugin(clientset),\n\t\t),\n\t\tappmesh.NewAppMeshRegistrationSyncer(\n\t\t\treporter.NewReporter(\"app-mesh-registration-reporter\", clientset.Supergloo.Mesh.BaseClient()),\n\t\t\tclientset.Kube,\n\t\t\tclientset.Supergloo.Secret,\n\t\t\tkube.New(nil),\n\t\t\topts.SuperglooNamespace,\n\t\t\topts.SidecarInjectorImageName,\n\t\t\topts.SidecarInjectorImagePullPolicy,\n\t\t),\n\t}\n}", "func UA_RegisterServerResponse_new() []UA_RegisterServerResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[149]))[:]).([]UA_RegisterServerResponse)\n}", "func UA_RegisteredServer_new() []UA_RegisteredServer {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[180]))[:]).([]UA_RegisteredServer)\n}", "func newOptions() *options {\n\treturn &options{\n\t\tfillColor: cell.ColorNumber(DefaultFillColorNumber),\n\t\tplaceHolderColor: cell.ColorNumber(DefaultPlaceHolderColorNumber),\n\t\thighlightedColor: cell.ColorNumber(DefaultHighlightedColorNumber),\n\t\tcursorColor: cell.ColorNumber(DefaultCursorColorNumber),\n\t\tlabelAlign: DefaultLabelAlign,\n\t}\n}", "func UA_RegisterServerRequest_new() []UA_RegisterServerRequest {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[182]))[:]).([]UA_RegisterServerRequest)\n}", "func RegistryFromOptions(optionsRegistry *markers.Registry, options []string) (*markers.Registry, error) {\n\tprotoRt, err := protoFromOptions(optionsRegistry, options)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treg := &markers.Registry{}\n\tif err := protoRt.Generators.RegisterMarkers(reg); err != nil {\n\t\treturn nil, err\n\t}\n\treturn reg, nil\n}", "func NewMeetingRegistration()(*MeetingRegistration) {\n m := &MeetingRegistration{\n MeetingRegistrationBase: *NewMeetingRegistrationBase(),\n }\n odataTypeValue := \"#microsoft.graph.meetingRegistration\"\n m.SetOdataType(&odataTypeValue)\n return m\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewTag creates a new list of Tag.
func NewTag_List(s *capnp.Segment, sz int32) (Tag_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz) return Tag_List{l}, err }
[ "func TagNew(c *gin.Context) {\n\th := helpers.DefaultH(c)\n\th[\"Title\"] = \"New tag\"\n\th[\"Active\"] = \"tags\"\n\tsession := sessions.Default(c)\n\th[\"Flash\"] = session.Flashes()\n\tsession.Save()\n\n\tc.HTML(http.StatusOK, \"tags/form\", h)\n}", "func (s PowerboxDescriptor) NewTags(n int32) (PowerboxDescriptor_Tag_List, error) {\n\tl, err := NewPowerboxDescriptor_Tag_List(s.Struct.Segment(), n)\n\tif err != nil {\n\t\treturn PowerboxDescriptor_Tag_List{}, err\n\t}\n\terr = s.Struct.SetPtr(0, l.List.ToPtr())\n\treturn l, err\n}", "func (s RegistrationOptions) NewTags(n int32) (Tag_List, error) {\n\tl, err := NewTag_List(s.Struct.Segment(), n)\n\tif err != nil {\n\t\treturn Tag_List{}, err\n\t}\n\terr = s.Struct.SetPtr(4, l.List.ToPtr())\n\treturn l, err\n}", "func NewTag() filters.Spec {\n\treturn tagSpec{}\n}", "func (obj *TagController) CreateNewTag(c *fiber.Ctx) error {\n\ttagRequest := new(request.TagRequest)\n\n\tif err := c.BodyParser(tagRequest); err != nil {\n\t\treturn util.ResponseError(err.Error(), nil)\n\t}\n\n\ttag := model.Tag{\n\t\tName: tagRequest.Name,\n\t\tSlug: tagRequest.Slug,\n\t\tStatus: tagRequest.Status,\n\t}\n\n\tif _, err := obj.tagRepository.SaveTag(tag); err != nil {\n\t\treturn util.ResponseError(err.Error(), nil)\n\t}\n\n\treturn util.ResponseSuccess(\"Thành công\", nil)\n}", "func NewTag(key, value string) Tag {\n\treturn Tag{\n\t\tKey: []byte(key),\n\t\tValue: []byte(value),\n\t}\n}", "func TagCreate(w http.ResponseWriter, r *http.Request) {\n\ttmpl := shared.Template(r)\n\tsession := shared.Session(r)\n\tdata := shared.DefaultData(r)\n\tif r.Method == \"GET\" {\n\n\t\tdata[\"Title\"] = \"New tag\"\n\t\tdata[\"Active\"] = \"tags\"\n\t\tdata[\"Flash\"] = session.Flashes()\n\t\tsession.Save(r, w)\n\t\ttmpl.Lookup(\"tags/form\").Execute(w, data)\n\n\t} else if r.Method == \"POST\" {\n\n\t\ttag := &models.Tag{\n\t\t\tName: r.PostFormValue(\"name\"),\n\t\t}\n\n\t\tif err := tag.Insert(); err != nil {\n\t\t\tsession.AddFlash(err.Error())\n\t\t\tsession.Save(r, w)\n\t\t\thttp.Redirect(w, r, \"/admin/new_tag\", 303)\n\t\t\treturn\n\t\t}\n\t\thttp.Redirect(w, r, \"/admin/tags\", 303)\n\n\t} else {\n\t\terr := fmt.Errorf(\"Method %q not allowed\", r.Method)\n\t\tlog.Printf(\"ERROR: %s\\n\", err)\n\t\tw.WriteHeader(405)\n\t\ttmpl.Lookup(\"errors/405\").Execute(w, shared.ErrorData(err))\n\t}\n}", "func NewTag(tag string, attrs ...string) *Tag {\n\tt := &Tag{\n\t\ttag: tag,\n\t\tattributes: newAttributes(attrs),\n\t\tfragment: &fragment{},\n\t}\n\tt.parent = newParent(t)\n\treturn t\n}", "func NewTag(ctx *pulumi.Context,\n\tname string, args *TagArgs, opts ...pulumi.ResourceOption) (*Tag, error) {\n\tif args == nil || args.DisplayName == nil {\n\t\treturn nil, errors.New(\"missing required argument 'DisplayName'\")\n\t}\n\tif args == nil || args.ResourceGroupName == nil {\n\t\treturn nil, errors.New(\"missing required argument 'ResourceGroupName'\")\n\t}\n\tif args == nil || args.ServiceName == nil {\n\t\treturn nil, errors.New(\"missing required argument 'ServiceName'\")\n\t}\n\tif args == nil || args.TagId == nil {\n\t\treturn nil, errors.New(\"missing required argument 'TagId'\")\n\t}\n\tif args == nil {\n\t\targs = &TagArgs{}\n\t}\n\taliases := pulumi.Aliases([]pulumi.Alias{\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:apimanagement/latest:Tag\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:apimanagement/v20170301:Tag\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:apimanagement/v20180601preview:Tag\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:apimanagement/v20190101:Tag\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:apimanagement/v20191201:Tag\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:apimanagement/v20191201preview:Tag\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:apimanagement/v20200601preview:Tag\"),\n\t\t},\n\t})\n\topts = append(opts, aliases)\n\tvar resource Tag\n\terr := ctx.RegisterResource(\"azure-nextgen:apimanagement/v20180101:Tag\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func CreateTag(c config.Cpi, nodeID, tag string) error {\n\ttags := models.Tags{\n\t\tT: []string{tag},\n\t}\n\tbody, err := json.Marshal(tags)\n\tif err != nil {\n\t\treturn nil\n\t}\n\n\turl := fmt.Sprintf(\"%s/api/2.0/nodes/%s/tags\", c.ApiServer, nodeID)\n\t_, err = helpers.MakeRequest(url, \"PATCH\", 200, body)\n\treturn err\n}", "func newTag(key []byte) (t *tag, err error) {\n\tif len(key) == 0 {\n\t\treturn nil, nil\n\t}\n\tif !ascii.IsAlpha(key[0]) {\n\t\treturn nil, fmt.Errorf(\"dkim: invalid tag key: '%s'\", key)\n\t}\n\tfor x := 0; x < len(key); x++ {\n\t\tif ascii.IsAlnum(key[x]) || key[x] == '_' {\n\t\t\tcontinue\n\t\t}\n\t\treturn nil, fmt.Errorf(\"dkim: invalid tag key: '%s'\", key)\n\t}\n\n\tt = &tag{\n\t\tkey: tagUnknown,\n\t}\n\tfor k, v := range tagKeys {\n\t\tif bytes.Equal(v, key) {\n\t\t\tt.key = k\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn t, nil\n}", "func SourceTagNew(tagName string) (*gtk.TextTag, error) {\n\tcstr := C.CString(tagName)\n\tdefer C.free(unsafe.Pointer(cstr))\n\n\tc := C.gtk_source_tag_new((*C.gchar)(cstr))\n\tif c == nil {\n\t\treturn nil, nilPtrErr\n\t}\n\n\treturn toTextTag(c), nil\n}", "func newTagsTagValues(c *TagsV1beta1Client, namespace string) *tagsTagValues {\n\treturn &tagsTagValues{\n\t\tclient: c.RESTClient(),\n\t\tns: namespace,\n\t}\n}", "func NewTag(tag *low.Tag) *Tag {\n\tt := new(Tag)\n\tt.low = tag\n\tif !tag.Name.IsEmpty() {\n\t\tt.Name = tag.Name.Value\n\t}\n\tif !tag.Description.IsEmpty() {\n\t\tt.Description = tag.Description.Value\n\t}\n\tif !tag.ExternalDocs.IsEmpty() {\n\t\tt.ExternalDocs = NewExternalDoc(tag.ExternalDocs.Value)\n\t}\n\tt.Extensions = high.ExtractExtensions(tag.Extensions)\n\treturn t\n}", "func GitHubCreateNewTags(\n\td *Data,\n\trepo string,\n\ttagsDest *[]*github.Reference,\n\tbranches, newTags []*github.Reference,\n\tmasterSHA string) error {\n\n\tfor _, tag := range newTags {\n\t\tsha := FindBranchHEADForTag(tag, d.PrefixBranch, masterSHA, branches)\n\n\t\t// In dry-run mode just append the new ref to the given list of destination refs.\n\t\tif d.DryRun {\n\t\t\tref, _ := GitHubCreateRef(d, repo, tag.GetRef(), sha, true)\n\t\t\t*tagsDest = append(*tagsDest, ref)\n\t\t\tcontinue\n\t\t}\n\n\t\tif _, err := GitHubCreateRef(d, repo, tag.GetRef(), sha, false); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func NewTag(name []byte) *Tag {\n\tvar tag Tag\n\ttag.name = name\n\ttag.attrs = make(map[string][]byte)\n\ttag.nextSibling = nil\n\ttag.firstChild = nil\n\ttag.content = make([]byte, 0)\n\ttag.lastContent = make([]byte, 0)\n\treturn &tag\n}", "func (a *App) createTag(w http.ResponseWriter, r *http.Request) {\n\tif a.Config.AddTag {\n\t\tvar tags []string\n\t\tdecoder := json.NewDecoder(r.Body)\n\t\tif err := decoder.Decode(&tags); err != nil {\n\t\t\tfmt.Println(\"tags received:\", tags)\n\t\t\trespondWithError(w, http.StatusBadRequest, \"Invalid request payload\")\n\t\t\treturn\n\t\t}\n\t\tdefer r.Body.Close()\n\n\t\terr := a.Conn.Add(tags...)\n\t\tif err != nil {\n\t\t\trespondWithError(w, http.StatusBadRequest, \"Did not add tags\")\n\t\t\treturn\n\t\t}\n\t\trespondWithJSON(w, http.StatusCreated, map[string]interface{}{\"result\": \"created\"})\n\t} else {\n\t\trespondWithError(w, http.StatusBadRequest, \"no additions allowed\")\n\t}\n}", "func NewTag(\n\tobject Sha1,\n\tobjectType string,\n\tname string,\n\ttagger Person,\n\tmessage string,\n) *Tag {\n\treturn &Tag{sha1field{object}, objectType, name, &tagger, message, nil}\n}", "func newTagListCmd(tagParams *tagParameters) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"list\",\n\t\tShort: \"List tags from a repository\",\n\t\tLong: newTagListCmdLongMessage,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tregistryName, err := tagParams.GetRegistryName()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tloginURL := api.LoginURL(registryName)\n\t\t\t// An acrClient is created to make the http requests to the registry.\n\t\t\tacrClient, err := api.GetAcrCLIClientWithAuth(loginURL, tagParams.username, tagParams.password, tagParams.configs)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tctx := context.Background()\n\t\t\terr = listTags(ctx, acrClient, loginURL, tagParams.repoName)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\treturn cmd\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
ExistingTunnelPolicyFromString returns the enum value with a name, or the zero value if there's no such value.
func ExistingTunnelPolicyFromString(c string) ExistingTunnelPolicy { switch c { case "ignore": return ExistingTunnelPolicy_ignore case "disconnect": return ExistingTunnelPolicy_disconnect case "balance": return ExistingTunnelPolicy_balance default: return 0 } }
[ "func ProposalStatusFromString(str string) (ProposalStatus, error) {\n\tswitch str {\n\tcase \"DepositPeriod\":\n\t\treturn StatusDepositPeriod, nil\n\tcase \"VotingPeriod\":\n\t\treturn StatusVotingPeriod, nil\n\tcase \"Passed\":\n\t\treturn StatusPassed, nil\n\tcase \"Rejected\":\n\t\treturn StatusRejected, nil\n\tcase \"\":\n\t\treturn StatusNil, nil\n\tdefault:\n\t\treturn ProposalStatus(0xff), errors.Errorf(\"'%s' is not a valid proposal status\", str)\n\t}\n}", "func LookupPolicy(s string) (Policy, error) {\n\tpolicy, exists := supportedPolicies[s]\n\tif exists {\n\t\treturn policy, nil\n\t}\n\n\t// Sort the keys first as maps are non-deterministic.\n\tkeys := []string{}\n\tfor k := range supportedPolicies {\n\t\tif k != \"\" {\n\t\t\tkeys = append(keys, k)\n\t\t}\n\t}\n\tsort.Strings(keys)\n\n\treturn -1, fmt.Errorf(\"invalid seccomp policy %q: valid policies are %+q\", s, keys)\n}", "func ProposalStatusFromString(str string) (ProposalStatus, error) {\n\tnum, ok := ProposalStatus_value[str]\n\tif !ok {\n\t\treturn StatusNil, fmt.Errorf(\"'%s' is not a valid proposal status\", str)\n\t}\n\treturn ProposalStatus(num), nil\n}", "func NewPolicySpecifiesPortNameThatDoesntExist(r *resource.Instance, portName string, host string) diag.Message {\n\treturn diag.NewMessage(\n\t\tPolicySpecifiesPortNameThatDoesntExist,\n\t\tr,\n\t\tportName,\n\t\thost,\n\t)\n}", "func (h *Handler) GetByName(name string) (*networkingv1.NetworkPolicy, error) {\n\treturn h.clientset.NetworkingV1().NetworkPolicies(h.namespace).Get(h.ctx, name, h.Options.GetOptions)\n}", "func ParseRestartPolicy(policy string) (string, uint, error) {\n\tvar (\n\t\tretriesUint uint\n\t\tpolicyType string\n\t)\n\tsplitRestart := strings.Split(policy, \":\")\n\tswitch len(splitRestart) {\n\tcase 1:\n\t\t// No retries specified\n\t\tpolicyType = splitRestart[0]\n\t\tif strings.ToLower(splitRestart[0]) == \"never\" {\n\t\t\tpolicyType = define.RestartPolicyNo\n\t\t}\n\tcase 2:\n\t\tif strings.ToLower(splitRestart[0]) != \"on-failure\" {\n\t\t\treturn \"\", 0, errors.New(\"restart policy retries can only be specified with on-failure restart policy\")\n\t\t}\n\t\tretries, err := strconv.Atoi(splitRestart[1])\n\t\tif err != nil {\n\t\t\treturn \"\", 0, fmt.Errorf(\"parsing restart policy retry count: %w\", err)\n\t\t}\n\t\tif retries < 0 {\n\t\t\treturn \"\", 0, errors.New(\"must specify restart policy retry count as a number greater than 0\")\n\t\t}\n\t\tretriesUint = uint(retries)\n\t\tpolicyType = splitRestart[0]\n\tdefault:\n\t\treturn \"\", 0, errors.New(\"invalid restart policy: may specify retries at most once\")\n\t}\n\treturn policyType, retriesUint, nil\n}", "func (Qos_QosVPNQoss_QosVPNQos_QosVpnVxlanPolicyApplys_QosVpnVxlanPolicyApply_Vpndirection) EnumDescriptor() ([]byte, []int) {\n\treturn file_huaweiV8R10_qos_proto_rawDescGZIP(), []int{23, 35, 0, 2, 0, 0}\n}", "func ParseTunnelProto(proto string) TunnelProto {\n\tswitch proto {\n\tcase \"ssh\":\n\t\treturn SSH\n\tcase \"tcp\":\n\t\treturn TCP\n\tcase \"http2\":\n\t\treturn HTTP2\n\tdefault:\n\t\treturn UNSUPPORTED\n\t}\n}", "func ParseEnum(name string) (Enum, error) {\n\tswitch name {\n\tcase \"creating\":\n\t\treturn Creating, nil\n\tcase \"available\":\n\t\treturn Available, nil\n\tcase \"deprecated\":\n\t\treturn Deprecated, nil\n\tcase \"unavailable\":\n\t\treturn Unavailable, nil\n\tcase \"deleting\":\n\t\treturn Deleting, nil\n\tcase \"deleted\":\n\t\treturn Deleted, nil\n\tcase \"failed\":\n\t\treturn Failed, nil\n\t}\n\tvar zero Enum\n\treturn zero, fmt.Errorf(\"%s is not a valid imagestatus.Enum\", name)\n}", "func ProtoToComputeTargetSslProxyProxyHeaderEnum(e computepb.ComputeTargetSslProxyProxyHeaderEnum) *compute.TargetSslProxyProxyHeaderEnum {\n\tif e == 0 {\n\t\treturn nil\n\t}\n\tif n, ok := computepb.ComputeTargetSslProxyProxyHeaderEnum_name[int32(e)]; ok {\n\t\te := compute.TargetSslProxyProxyHeaderEnum(n[len(\"ComputeTargetSslProxyProxyHeaderEnum\"):])\n\t\treturn &e\n\t}\n\treturn nil\n}", "func SendingIntervalPolicyString(s string) (SendingIntervalPolicy, error) {\n\tif val, ok := _SendingIntervalPolicyNameToValueMap[s]; ok {\n\t\treturn val, nil\n\t}\n\treturn 0, fmt.Errorf(\"%s does not belong to SendingIntervalPolicy values\", s)\n}", "func (o GetTlsCipherPoliciesPolicyOutput) Id() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetTlsCipherPoliciesPolicy) string { return v.Id }).(pulumi.StringOutput)\n}", "func (c *vaultpolicies) Get(name string, options meta_v1.GetOptions) (result *v1.VaultPolicy, err error) {\n\tresult = &v1.VaultPolicy{}\n\terr = c.client.Get().\n\t\tResource(\"vaultpolicies\").\n\t\tName(name).\n\t\tVersionedParams(&options, scheme.ParameterCodec).\n\t\tDo().\n\t\tInto(result)\n\treturn\n}", "func (m *UnifiedRoleManagementPolicyAssignment) GetPolicyId()(*string) {\n return m.policyId\n}", "func NewVisibilityPolicy(anno string) (*VisibilityPolicy, error) {\n\tif !annotationRegex.MatchString(anno) {\n\t\treturn nil, fmt.Errorf(\"annotation for proxy visibility did not match expected format %s\", annotationRegex.String())\n\t}\n\n\tnvp := &VisibilityPolicy{\n\t\tIngress: make(DirectionalVisibilityPolicy),\n\t\tEgress: make(DirectionalVisibilityPolicy),\n\t}\n\n\t// TODO: look into using regex groups.\n\tanSplit := strings.Split(anno, \",\")\n\tfor i := range anSplit {\n\t\tproxyAnnoSplit := strings.Split(anSplit[i], \"/\")\n\t\tif len(proxyAnnoSplit) != 4 {\n\t\t\terr := fmt.Errorf(\"invalid number of fields (%d) in annotation\", len(proxyAnnoSplit))\n\t\t\treturn nil, err\n\t\t}\n\t\t// <Ingress|Egress --> Ingress|Egress\n\t\t// Don't need to validate the content itself, regex already did that.\n\t\tdirection := proxyAnnoSplit[0][1:]\n\t\tport := proxyAnnoSplit[1]\n\n\t\tportInt, err := strconv.ParseUint(port, 10, 16)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"unable to parse port: %s\", err)\n\t\t}\n\n\t\t// Don't need to validate, regex already did that.\n\t\tl4Proto := proxyAnnoSplit[2]\n\t\tu8Prot, err := u8proto.ParseProtocol(l4Proto)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid L4 protocol %s\", l4Proto)\n\t\t}\n\n\t\t// ANY equates to TCP and UDP in the datapath; the datapath itself does\n\t\t// not support 'Any' protocol paired with a port at L4.\n\t\tvar protos []u8proto.U8proto\n\t\tif u8Prot == u8proto.ANY {\n\t\t\tprotos = append(protos, u8proto.TCP)\n\t\t\tprotos = append(protos, u8proto.UDP)\n\t\t\tprotos = append(protos, u8proto.SCTP)\n\t\t} else {\n\t\t\tprotos = append(protos, u8Prot)\n\t\t}\n\t\t// Remove trailing '>'.\n\t\tl7Protocol := L7ParserType(strings.ToLower(proxyAnnoSplit[3][:len(proxyAnnoSplit[3])-1]))\n\n\t\tif err := validateL7ProtocolWithDirection(direction, l7Protocol); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tvar dvp DirectionalVisibilityPolicy\n\t\tvar ingress bool\n\t\tif direction == \"Ingress\" {\n\t\t\tdvp = nvp.Ingress\n\t\t\tingress = true\n\t\t} else {\n\t\t\tdvp = nvp.Egress\n\t\t\tingress = false\n\t\t}\n\n\t\tfor _, prot := range protos {\n\t\t\tpp := strconv.FormatUint(portInt, 10) + \"/\" + prot.String()\n\t\t\tif res, ok := dvp[pp]; ok {\n\t\t\t\tif res.Parser != l7Protocol {\n\t\t\t\t\treturn nil, fmt.Errorf(\"duplicate annotations with different L7 protocols %s and %s for %s\", res.Parser, l7Protocol, pp)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tl7Meta := generateL7AllowAllRules(l7Protocol)\n\n\t\t\tdvp[pp] = &VisibilityMetadata{\n\t\t\t\tParser: l7Protocol,\n\t\t\t\tPort: uint16(portInt),\n\t\t\t\tProto: prot,\n\t\t\t\tIngress: ingress,\n\t\t\t\tL7Metadata: l7Meta,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nvp, nil\n}", "func (o HostPortGroupOutput) TeamingPolicy() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *HostPortGroup) pulumi.StringPtrOutput { return v.TeamingPolicy }).(pulumi.StringPtrOutput)\n}", "func (c *iPSecVpnTunnels) Get(name string, options metav1.GetOptions) (result *v1.IPSecVpnTunnel, err error) {\n\tresult = &v1.IPSecVpnTunnel{}\n\terr = c.client.Get().\n\t\tNamespace(c.ns).\n\t\tResource(\"ipsecvpntunnels\").\n\t\tName(name).\n\t\tVersionedParams(&options, scheme.ParameterCodec).\n\t\tDo().\n\t\tInto(result)\n\treturn\n}", "func StatusEnumFromValue(value string) StatusEnum {\n switch value {\n case \"kInitializing\":\n return Status_KINITIALIZING\n case \"kAvailable\":\n return Status_KAVAILABLE\n case \"kBound\":\n return Status_KBOUND\n case \"kFailed\":\n return Status_KFAILED\n default:\n return Status_KINITIALIZING\n }\n}", "func NewPolicyEval() Evaluator {\n\treturn &policyEval{}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewServerInfo creates a new list of ServerInfo.
func NewServerInfo_List(s *capnp.Segment, sz int32) (ServerInfo_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz) return ServerInfo_List{l}, err }
[ "func newServerInfo(addr, port, password, method string) *serverInfo {\n\treturn &serverInfo{addr, port, password, method}\n}", "func newServers(c *ServerV1beta1Client, namespace string) *servers {\n\treturn &servers{\n\t\tclient: c.RESTClient(),\n\t\tns: namespace,\n\t}\n}", "func (s *Server) ServerInfo() *ServerInfo {\n\tinfo := &ServerInfo{\n\t\tMethods: []string{\"*\"},\n\t\tMetrics: make(map[string]any),\n\t\tStartTime: s.start,\n\t}\n\tserverMetrics.Do(func(kv expvar.KeyValue) {\n\t\tinfo.Metrics[kv.Key] = json.RawMessage(kv.Value.String())\n\t})\n\tif n, ok := s.mux.(Namer); ok {\n\t\tinfo.Methods = n.Names()\n\t}\n\treturn info\n}", "func (o *Servers) NewList() *Args {\n\to.Args.Verb = \"GET\"\n\to.Args.RequiresAuth = true\n\treturn o.Args\n}", "func NewServerInfoAPI(serverRegion string) *ServerInfoAPI {\n\treturn &ServerInfoAPI{\n\t\tserverRegion: serverRegion,\n\t}\n}", "func (s TunnelServer_getServerInfo_Results) NewResult() (ServerInfo, error) {\n\tss, err := NewServerInfo(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ServerInfo{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (o *Servers) NewCreate(servers []ServerRequest) *Args {\n\to.Args.Verb = \"POST\"\n\to.Args.RequiresAuth = true\n\to.Args.AddHeaderPair(\"Content-Type\", \"application/json\")\n\tbody := struct {\n\t\tObjects []ServerRequest `json:\"objects\"`\n\t}{servers}\n\to.Args.Body = body\n\treturn o.Args\n}", "func NewTunnelServer_getServerInfo_Results_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_getServerInfo_Results_List{l}, err\n}", "func NewServer(owner string, formData forms.NewServer, port int) (Server, error) {\n\tvar s = Server{\n\t\tName: formData.Name,\n\t\tOwner: owner,\n\t\tFlavor: formData.Flavor,\n\t\tRelease: formData.Release,\n\t\tAutoStart: formData.AutoStart,\n\t}\n\n\tvar err error\n\tvar suuid uuid.UUID\n\tvar pUUID string\n\tfor err == nil {\n\t\tsuuid, err = uuid.NewRandom()\n\t\ts.UUID = suuid.String()\n\n\t\tif !releases.FlavorIsValid(s.Flavor) {\n\t\t\terr = errors.New(\"invalid flavor\")\n\t\t}\n\n\t\tif port == 0 {\n\t\t\terr = errors.New(\"unable to find an available port\")\n\t\t}\n\n\t\t// attempt download first (no-op if it exists)\n\t\terr = s.DownloadJar()\n\t\terr = storage.MakeServerDir(s.UUID)\n\t\terr = writeDefaultPropertiesFile(s.ServerDir())\n\t\terr = s.RefreshProperties()\n\t\ts.Props.set(\"enable-rcon\", \"true\")\n\t\ts.Props.set(\"gamemode\", formData.GameMode)\n\t\ts.Props.set(\"rcon.password\", \"admin\")\n\t\ts.Props.set(\"motd\", formData.MOTD)\n\t\ts.Props.setPort(port)\n\t\ts.Props.set(\"level-type\", formData.WorldType)\n\n\t\tif formData.Seed != \"\" {\n\t\t\ts.Props.set(\"level-seed\", formData.Seed)\n\t\t}\n\n\t\tif formData.Whitelist {\n\t\t\ts.Props.enableWhiteList()\n\t\t}\n\n\t\tif formData.Hardcore {\n\t\t\ts.Props.set(\"hardcore\", \"true\")\n\t\t}\n\n\t\tif !formData.PVP {\n\t\t\ts.Props.set(\"pvp\", \"false\")\n\t\t}\n\n\t\terr = s.SaveProps()\n\t\terr = acceptEULA(s.ServerDir())\n\t\terr = storage.DeployJar(s.Flavor, s.Release, s.UUID)\n\t\terr = s.SaveManagedJSON()\n\t\tpUUID, err = auth.PlayerUUIDLookup(owner)\n\t\terr = s.AddOpOffline(owner, pUUID, true)\n\n\t\tif s.WhitelistEnabled() {\n\t\t\terr = s.AddWhitelistOffline(owner, pUUID, true)\n\t\t}\n\n\t\terr = storage.SetupServerBackup(s.UUID)\n\t\tstorage.AuditWrite(s.Owner, \"create\", fmt.Sprintf(\"created server %s\", s.UUID))\n\t\tbreak\n\t}\n\n\tif err == nil && formData.StartNow {\n\t\terr = s.Start()\n\t}\n\n\treturn s, err\n}", "func newServer() *csServer {\n\ts := new(csServer)\n\treturn s\n}", "func newBackendServer(info BackendServerInfo) *backendServer {\n\treturn &backendServer{\n\t\tBackendServerInfo: info,\n\n\t\tupdatedIPAddress: info.IPAddress,\n\t\tupdatedPort: info.Port,\n\t\tupdatedWeight: strconv.Itoa(int(info.CurrentWeight)),\n\t\tupdatedState: info.State,\n\t}\n}", "func NewTunnelServer_getServerInfo_Params_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_getServerInfo_Params_List{l}, err\n}", "func NewServer(ledger api.LedgerServer, opt ...Option) *Server {\n\ts := &Server{\n\t\tledger: ledger,\n\t\toptions: defaultOptions,\n\t}\n\tfor _, o := range opt {\n\t\to(&s.options)\n\t}\n\n\tr := mux.NewRouter()\n\tr.Methods(\"GET\").Path(URLPrefix + \"/{index:[0-9]+}\").Handler(s.handler(s.readHandler))\n\t// Allow optional trailing slash on append requests.\n\tr.Methods(\"POST\").Path(URLPrefix + `{_slash:\\/?}`).Handler(s.handler(s.appendHandler))\n\tr.Methods(\"GET\").Path(\"/\").Handler(s.handler(s.statusHandler))\n\ts.router = r\n\treturn s\n}", "func (c *client) ServerCreate() (*Server, error) {\n\tout := new(Server)\n\turi := fmt.Sprintf(pathServers, c.addr)\n\terr := c.post(uri, nil, out)\n\treturn out, err\n}", "func UA_Server_new(config []UA_ServerConfig) []UA_Server {\n\tif config == nil {\n\t\t// A config is required\n\t\treturn nil\n\t}\n\tif uint(config[0].endpointsSize) == uint((0)) {\n\t\t// At least one endpoint has to be configured\n\t\tUA_LOG_FATAL(UA_Logger(config[0].logger), UA_LOGCATEGORY_SERVER, []byte(\"There has to be at least one endpoint.\\x00\"))\n\t\treturn nil\n\t}\n\tvar// Warning (*ast.UnaryExprOrTypeTraitExpr): $GOPATH/src/github.com/eugeis/gopen62541/gen/open62541.c:19956 :Cannot determine sizeof : |UA_Server|. err = Cannot determine sizeof : |struct UA_Server|. err = Cannot canculate `struct` sizeof for `string`. Cannot determine sizeof : |struct DelayedCallbacksList|. err = Cannot canculate `struct` sizeof for `*program.Struct`. Cannot determine sizeof : |UA_DelayedCallback|. err = error in array size\n\t// Warning (*ast.VarDecl): $GOPATH/src/github.com/eugeis/gopen62541/gen/open62541.c:19956 :Cannot determine sizeof : |UA_Server|. err = Cannot determine sizeof : |struct UA_Server|. err = Cannot canculate `struct` sizeof for `*program.Struct`. Cannot determine sizeof : |DelayedCallbacksList|. err = Cannot canculate `struct` sizeof for `*program.Struct`. Cannot determine sizeof : |UA_DelayedCallback|. err = error in array size\n\t// Warning (*ast.VarDecl): $GOPATH/src/github.com/eugeis/gopen62541/gen/open62541.c:19956 :Cannot getDefaultValueForVar : err = Cannot determine sizeof : |UA_Server|. err = Cannot determine sizeof : |struct UA_Server|. err = Cannot canculate `struct` sizeof for `*program.Struct`. Cannot determine sizeof : |DelayedCallbacksList|. err = Cannot canculate `struct` sizeof for `*program.Struct`. Cannot determine sizeof : |UA_DelayedCallback|. err = error in array size\n\tserver []UA_Server\n\tif server == nil {\n\t\t// Allocate the server\n\t\treturn nil\n\t}\n\t// Set the config\n\tserver[0].config = config[0]\n\t// Init start time to zero, the actual start time will be sampled in\n\t// * UA_Server_run_startup()\n\tserver[0].startTime = 0\n\t// Set a seed for non-cyptographic randomness\n\tUA_random_seed(UA_UInt64(UA_DateTime_now()))\n\t// Initialize the handling of repeated callbacks\n\tUA_Timer_init((*[100000000]UA_Timer)(unsafe.Pointer(&server[0].timer))[:])\n\t{\n\t\t// Initialized the linked list for delayed callbacks\n\t\t((*[100000000]DelayedCallbacksList)(unsafe.Pointer(&server[0].delayedCallbacks))[:])[0].slh_first = nil\n\t}\n\t// Initialized the dispatch queue for worker threads\n\t// Create Namespaces 0 and 1\n\tserver[0].namespaces = UA_Array_new(2, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[11]))[:]).([]UA_String)\n\t//opcfoundation.org/UA/\");\n\tserver[0].namespaces[0] = UA_String_fromChars([]byte(\"http://opcfoundation.org/UA/\\x00\"))\n\tUA_String_copy((*[100000000]UA_String)(unsafe.Pointer(&server[0].config.applicationDescription.applicationUri))[:], (*[100000000]UA_String)(unsafe.Pointer(&server[0].namespaces[1]))[:])\n\tserver[0].namespacesSize = 2\n\t// Initialized SecureChannel and Session managers\n\tUA_SecureChannelManager_init((*[100000000]UA_SecureChannelManager)(unsafe.Pointer(&server[0].secureChannelManager))[:], server)\n\tUA_SessionManager_init((*[100000000]UA_SessionManager)(unsafe.Pointer(&server[0].sessionManager))[:], server)\n\t// Add a regular callback for cleanup and maintenance\n\tUA_Server_addRepeatedCallback(server, UA_ServerCallback(UA_Server_cleanup), nil, 10000, nil)\n\tfor {\n\t\t// Initialized discovery database\n\t\t((*[100000000]registeredServer_list)(unsafe.Pointer(&server[0].registeredServers))[:])[0].lh_first = nil\n\t\tif noarch.NotInt((0)) != 0 {\n\t\t\tbreak\n\t\t}\n\t}\n\tserver[0].registeredServersSize = 0\n\tfor {\n\t\t((*[100000000]periodicServerRegisterCallback_list)(unsafe.Pointer(&server[0].periodicServerRegisterCallbacks))[:])[0].lh_first = nil\n\t\tif noarch.NotInt((0)) != 0 {\n\t\t\tbreak\n\t\t}\n\t}\n\tserver[0].registerServerCallback = nil\n\tserver[0].registerServerCallbackData = nil\n\tvar retVal UA_StatusCode = UA_Server_initNS0(server)\n\tif retVal != UA_StatusCode((uint32_t((uint32((0)))))) {\n\t\t// Initialize multicast discovery\n\t\t// Initialize namespace 0\n\t\tUA_LOG_ERROR(UA_Logger(config[0].logger), UA_LOGCATEGORY_SERVER, []byte(\"Initialization of Namespace 0 failed with %s. See previous outputs for any error messages.\\x00\"), UA_StatusCode_name(UA_StatusCode(retVal)))\n\t\tUA_Server_delete(server)\n\t\treturn nil\n\t}\n\treturn server\n}", "func (a *Agent) SetServerInfo(si agents.ServerInfoSource) {\n\ta.ServerInfoSource = si\n}", "func UA_RegisteredServer_new() []UA_RegisteredServer {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[180]))[:]).([]UA_RegisteredServer)\n}", "func NewRedisServerInfo(servers string) *RedisServerInfo {\n\tsi := &RedisServerInfo{servers: servers}\n\tsi.instances = make(RedisShims, 0)\n\tif servers != \"\" {\n\t\tserverList := regexp.MustCompile(\" *, *\").Split(servers, -1)\n\t\tfor _, s := range serverList {\n\t\t\tlogInfo(\"adding redis server: %s\", s)\n\t\t\tsi.instances = append(si.instances, NewRedisShim(s))\n\t\t}\n\t}\n\tsi.Reset()\n\treturn si\n}", "func CreateServer(ip net.IP) (s *Server) {\n\tlog.Debugf(\"Creating new server at %s\", ip)\n\ts = &Server{IP: ip}\n\tservers = append(servers, s)\n\tlog.Debugf(\"Server added! %v, (%d) %#v\", s, len(servers), servers)\n\n\treturn\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewAuthenticateResponse creates a new list of AuthenticateResponse.
func NewAuthenticateResponse_List(s *capnp.Segment, sz int32) (AuthenticateResponse_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 3}, sz) return AuthenticateResponse_List{l}, err }
[ "func ParseAuthenticateResponse(rsp *http.Response) (*authenticateResponse, error) {\n\tbodyBytes, err := ioutil.ReadAll(rsp.Body)\n\tdefer rsp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &authenticateResponse{\n\t\tBody: bodyBytes,\n\t\tHTTPResponse: rsp,\n\t}\n\n\tswitch {\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 200:\n\t\tvar dest TokenResponse\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON200 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 500:\n\t\tvar dest struct {\n\n\t\t\t// HTTP status code\n\t\t\tCode *int32 `json:\"code,omitempty\"`\n\t\t\tMessage *string `json:\"message,omitempty\"`\n\t\t}\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON500 = &dest\n\n\t}\n\n\treturn response, nil\n}", "func (s TunnelServer_authenticate_Results) NewResult() (AuthenticateResponse, error) {\n\tss, err := NewAuthenticateResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn AuthenticateResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewTunnelServer_authenticate_Results_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_authenticate_Results_List{l}, err\n}", "func UA_ActivateSessionResponse_new() []UA_ActivateSessionResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[109]))[:]).([]UA_ActivateSessionResponse)\n}", "func NewPasswordAuthenticationMethodCollectionResponse()(*PasswordAuthenticationMethodCollectionResponse) {\n m := &PasswordAuthenticationMethodCollectionResponse{\n BaseCollectionPaginationCountResponse: *NewBaseCollectionPaginationCountResponse(),\n }\n return m\n}", "func UA_GetEndpointsResponse_new() []UA_GetEndpointsResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[193]))[:]).([]UA_GetEndpointsResponse)\n}", "func newAppendEntriesResponse(term uint64, success bool, index uint64, commitIndex uint64) *AppendEntriesResponse {\n\treturn &AppendEntriesResponse{\n\t\tTerm: term,\n\t\tSuccess: success,\n\t\tIndex: index,\n\t\tCommitIndex: commitIndex,\n\t}\n}", "func CreateDeleteCredentialsListResponse() (response *DeleteCredentialsListResponse) {\n\tresponse = &DeleteCredentialsListResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func CreateListPipelineResponse() (response *ListPipelineResponse) {\n\tresponse = &ListPipelineResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func UA_OpenSecureChannelResponse_new() []UA_OpenSecureChannelResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[104]))[:]).([]UA_OpenSecureChannelResponse)\n}", "func HandleAuthenticate(t *testing.T) {\n\ttesthelper.Mux.HandleFunc(\"/auth/tokens\", func(w http.ResponseWriter, r *http.Request) {\n\t\ttesthelper.TestMethod(t, r, \"POST\")\n\t\ttesthelper.TestHeader(t, r, \"Content-Type\", \"application/json\")\n\t\ttesthelper.TestHeader(t, r, \"Accept\", \"application/json\")\n\t\ttesthelper.TestHeader(t, r, \"Authorization\", `OAuth oauth_consumer_key=\"7fea2d\", oauth_nonce=\"66148873158553341551586804894\", oauth_signature_method=\"HMAC-SHA1\", oauth_timestamp=\"0\", oauth_token=\"accd36\", oauth_version=\"1.0\", oauth_signature=\"JgMHu4e7rXGlqz3A%2FLhHDMvtjp8%3D\"`)\n\t\ttesthelper.TestJSONRequest(t, r, `{\"auth\": {\"identity\": {\"oauth1\": {}, \"methods\": [\"oauth1\"]}}}`)\n\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusCreated)\n\t\tfmt.Fprintf(w, tokens.TokenOutput)\n\t})\n}", "func AuthAuthenticate(w http.ResponseWriter, r *http.Request) {\n\t//Check matches\n\tusername := strings.TrimSpace(r.FormValue(\"username\"))\n\tpassword := r.FormValue(\"password\")\n\tif username == \"\" || password == \"\" {\n\t\tHandleError(errors.New(\"Please input username or password\"), w)\n\t\treturn\n\t}\n\terr, user := handler.CanLogin(r.Context(), username, password)\n\tif err != nil {\n\t\tlog.Error(\"Error when verifying username and password of \"+username+\": \"+err.Error(), \"\", r.Context())\n\t\tHandleError(errors.New(\"Verifying failed\"), w, 400)\n\t\treturn\n\t}\n\n\t//Generate refresh token and access token\n\tuserID := user.GetCID()\n\trefreshToken, err := auth.NewRefreshToken(r.Context(), userID)\n\tif err != nil {\n\t\tlog.Error(\"Error in generating token on \"+strconv.Itoa(userID)+\": \"+err.Error(), \"\")\n\t\tHandleError(errors.New(\"Error when generating refresh token\"), w)\n\t\treturn\n\t}\n\n\taccessToken, err := auth.NewAccessToken(refreshToken, r)\n\tif err != nil {\n\t\tlog.Error(\"Error in generating token on \"+strconv.Itoa(userID)+\": \"+err.Error(), \"\")\n\t\tHandleError(errors.New(\"Error when generating refresh token\"), w)\n\t\treturn\n\t}\n\n\tresultObj := map[string]interface{}{\"refresh_token\": refreshToken, \"access_token\": accessToken}\n\tresult, _ := json.Marshal(resultObj)\n\n\tw.Write(result)\n}", "func UA_CreateSessionResponse_new() []UA_CreateSessionResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[197]))[:]).([]UA_CreateSessionResponse)\n}", "func UA_ReadResponse_new() []UA_ReadResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[161]))[:]).([]UA_ReadResponse)\n}", "func NewTunnelServer_authenticate_Params_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_authenticate_Params_List{l}, err\n}", "func NewAuthentication_List(s *capnp.Segment, sz int32) (Authentication_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn Authentication_List{l}, err\n}", "func CreateInvokeShellCommandResponse() (response *InvokeShellCommandResponse) {\n\tresponse = &InvokeShellCommandResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func NewAuthnResponse() *Response {\n\tid := util.ID()\n\treturn &Response{\n\t\tXMLName: xml.Name{\n\t\t\tLocal: \"samlp:Response\",\n\t\t},\n\t\tRootXML: &RootXML{\n\t\t\tSAMLP: \"urn:oasis:names:tc:SAML:2.0:protocol\",\n\t\t\tSAML: \"urn:oasis:names:tc:SAML:2.0:assertion\",\n\t\t\tSAMLSIG: \"http://www.w3.org/2000/09/xmldsig#\",\n\t\t\tID: id,\n\t\t\tVersion: \"2.0\",\n\t\t\tIssueInstant: time.Now().UTC().Format(time.RFC3339Nano),\n\t\t\tIssuer: Issuer{\n\t\t\t\tXMLName: xml.Name{\n\t\t\t\t\tLocal: \"saml:Issuer\",\n\t\t\t\t},\n\t\t\t\tURL: \"\", // caller must populate ar.AppSettings.AssertionConsumerServiceURL,\n\t\t\t},\n\t\t\tSignature: packager.GetSignatureEntity(id),\n\t\t},\n\t\tStatus: Status{\n\t\t\tXMLName: xml.Name{\n\t\t\t\tLocal: \"samlp:Status\",\n\t\t\t},\n\t\t\tStatusCode: StatusCode{\n\t\t\t\tXMLName: xml.Name{\n\t\t\t\t\tLocal: \"samlp:StatusCode\",\n\t\t\t\t},\n\t\t\t\t// TODO unsuccesful responses??\n\t\t\t\tValue: \"urn:oasis:names:tc:SAML:2.0:status:Success\",\n\t\t\t},\n\t\t},\n\t\tAssertion: Assertion{\n\t\t\tXMLName: xml.Name{\n\t\t\t\tLocal: \"saml:Assertion\",\n\t\t\t},\n\t\t\tXS: \"http://www.w3.org/2001/XMLSchema\",\n\t\t\tXSI: \"http://www.w3.org/2001/XMLSchema-instance\",\n\t\t\tSAML: \"urn:oasis:names:tc:SAML:2.0:assertion\",\n\t\t\tVersion: \"2.0\",\n\t\t\tID: util.ID(),\n\t\t\tIssueInstant: time.Now().UTC().Format(time.RFC3339Nano),\n\t\t\tIssuer: Issuer{\n\t\t\t\tXMLName: xml.Name{\n\t\t\t\t\tLocal: \"saml:Issuer\",\n\t\t\t\t},\n\t\t\t\tURL: \"\", // caller must populate ar.AppSettings.AssertionConsumerServiceURL,\n\t\t\t},\n\t\t\tSubject: Subject{\n\t\t\t\tXMLName: xml.Name{\n\t\t\t\t\tLocal: \"saml:Subject\",\n\t\t\t\t},\n\t\t\t\tNameID: NameID{\n\t\t\t\t\tXMLName: xml.Name{\n\t\t\t\t\t\tLocal: \"saml:NameID\",\n\t\t\t\t\t},\n\t\t\t\t\tFormat: \"urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified\",\n\t\t\t\t\tValue: \"\",\n\t\t\t\t},\n\t\t\t\tSubjectConfirmation: SubjectConfirmation{\n\t\t\t\t\tXMLName: xml.Name{\n\t\t\t\t\t\tLocal: \"saml:SubjectConfirmation\",\n\t\t\t\t\t},\n\t\t\t\t\tMethod: \"urn:oasis:names:tc:SAML:2.0:cm:bearer\",\n\t\t\t\t\tSubjectConfirmationData: SubjectConfirmationData{\n\t\t\t\t\t\tInResponseTo: \"\",\n\t\t\t\t\t\tNotOnOrAfter: time.Now().Add(time.Minute * 5).UTC().Format(time.RFC3339Nano),\n\t\t\t\t\t\tRecipient: \"\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tConditions: Conditions{\n\t\t\t\tXMLName: xml.Name{\n\t\t\t\t\tLocal: \"saml:Conditions\",\n\t\t\t\t},\n\t\t\t\tNotBefore: time.Now().Add(time.Minute * -5).UTC().Format(time.RFC3339Nano),\n\t\t\t\tNotOnOrAfter: time.Now().Add(time.Minute * 5).UTC().Format(time.RFC3339Nano),\n\t\t\t},\n\t\t\tAuthnStatement: AuthnStatement{\n\t\t\t\tXMLName: xml.Name{\n\t\t\t\t\tLocal: \"saml:AuthnStatement\",\n\t\t\t\t},\n\t\t\t\tAuthnInstant: \"\",\n\t\t\t\tSessionIndex: \"\",\n\t\t\t\tAuthnContext: RequestedAuthnContext{\n\t\t\t\t\tXMLName: xml.Name{\n\t\t\t\t\t\tLocal: \"saml:AuthnContext\",\n\t\t\t\t\t},\n\t\t\t\t\tAuthnContextClassRef: AuthnContextClassRef{\n\t\t\t\t\t\tXMLName: xml.Name{\n\t\t\t\t\t\t\tLocal: \"saml:AuthnContextClassRef\",\n\t\t\t\t\t\t},\n\t\t\t\t\t\tTransport: \"\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAttributeStatement: AttributeStatement{\n\t\t\t\tXMLName: xml.Name{\n\t\t\t\t\tLocal: \"saml:AttributeStatement\",\n\t\t\t\t},\n\t\t\t\tAttributes: []Attribute{},\n\t\t\t},\n\t\t},\n\t}\n}", "func newOpenAPIResponse(statusCode int, description string, options ...ResponseOption) *openAPIResponse {\n\tr := &openAPIResponse{\n\t\tStatusCode: statusCode,\n\t\tDescription: description,\n\t}\n\n\tfor _, option := range options {\n\t\toption.applyResponse(r)\n\t}\n\n\treturn r\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewFeatures sets the features field to a newly allocated capnp.TextList, preferring placement in s's segment.
func (s ClientInfo) NewFeatures(n int32) (capnp.TextList, error) { l, err := capnp.NewTextList(s.Struct.Segment(), n) if err != nil { return capnp.TextList{}, err } err = s.Struct.SetPtr(1, l.List.ToPtr()) return l, err }
[ "func (s RegistrationOptions) NewFeatures(n int32) (capnp.TextList, error) {\n\tl, err := capnp.NewTextList(s.Struct.Segment(), n)\n\tif err != nil {\n\t\treturn capnp.TextList{}, err\n\t}\n\terr = s.Struct.SetPtr(7, l.List.ToPtr())\n\treturn l, err\n}", "func AttrFontFeaturesNew(features string) *Attribute {\n\tc_features := C.CString(features)\n\tdefer C.free(unsafe.Pointer(c_features))\n\n\tretC := C.pango_attr_font_features_new(c_features)\n\tretGo := AttributeNewFromC(unsafe.Pointer(retC))\n\n\treturn retGo\n}", "func (s *UsageCriteria) SetFeatures(v []*string) *UsageCriteria {\n\ts.Features = v\n\treturn s\n}", "func (s *GetMetadataOutput) SetFeatures(v map[string]*string) *GetMetadataOutput {\n\ts.Features = v\n\treturn s\n}", "func (in *ActionVpsCloneInput) SetFeatures(value bool) *ActionVpsCloneInput {\n\tin.Features = value\n\n\tif in._selectedParameters == nil {\n\t\tin._selectedParameters = make(map[string]interface{})\n\t}\n\n\tin._selectedParameters[\"Features\"] = nil\n\treturn in\n}", "func (c *Client) UpdateFeatures(bts []byte) {\n\tfm, err := models.NewFeatureMap(bts)\n\n\tif err != nil {\n\t\tprinter.SayErr(\"parse error: %v, feature payload: %s\", err, bts)\n\t\treturn\n\t}\n\n\tc.SetFeatureMap(fm)\n}", "func (ec *EnterpriseClient) SetFeatures(features uint64) {}", "func (b Ball) Features() string {\n\tst := fmt.Sprintf(\"%+v\", b)\n\tst = strings.TrimPrefix(st, \"{\")\n\treg := regexp.MustCompile(`Class.*$`)\n\tst = reg.ReplaceAllString(st, \"${1}\")\n\tst = strings.TrimSpace(st)\n\t// st = strings.ReplaceAll(st, \":\", \"=\")\n\tst = \"|F \" + st\n\treturn st\n}", "func getFeatures(token string, index int, tokens []string) []string {\n\tlength := len(tokens)\n\tcaps := \"No\"\n\tif startsWithCapital(token) {\n\t\tcaps = \"Yes\"\n\t}\n\n\treturn []string{\n\t\tfmt.Sprintf(\"I%s\", strconv.Itoa(index)),\n\t\tfmt.Sprintf(\"L%s\", bucketLength(length)),\n\t\tcaps + \"CAP\",\n\t\t\"NoPAREN\",\n\t}\n}", "func FontFeatures(otf *ot.Font, script, lang ot.Tag) ([]Feature, []Feature, error) {\n\tlytTables, err := getLayoutTables(otf)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tvar feats = make([][]Feature, 2)\n\tif script == 0 {\n\t\tscript = ot.T(\"DFLT\")\n\t}\n\tfor i := 0; i < 2; i++ {\n\t\tt := lytTables[i]\n\t\tscr := t.ScriptList.LookupTag(script)\n\t\tif scr.IsNull() && script != ot.T(\"DFLT\") {\n\t\t\tscr = t.ScriptList.LookupTag(ot.T(\"DFLT\"))\n\t\t}\n\t\tif scr.IsNull() {\n\t\t\ttrace().Infof(\"font %s has no feature-links from script %s\", otf.F.Fontname, script)\n\t\t\tcontinue\n\t\t}\n\t\ttrace().Debugf(\"found script table for '%s'\", script)\n\t\tlangs := scr.Navigate()\n\t\t//trace().Debugf(\"now at table %s\", langs.Name())\n\t\tvar dflt, lsys ot.Navigator\n\t\tdflt = langs.Link().Navigate()\n\t\tif lang != 0 {\n\t\t\tif lptr := langs.Map().LookupTag(lang); !lptr.IsNull() {\n\t\t\t\tlsys = lptr.Navigate()\n\t\t\t}\n\t\t}\n\t\ttrace().Debugf(\"dflt = %v, |feats| = %d\", dflt.Name(), dflt.List().Len())\n\t\tif lsys != nil && !lsys.IsVoid() {\n\t\t\ttrace().Debugf(\"lsys = %v\", lsys.Name())\n\t\t} else {\n\t\t\tlsys = dflt\n\t\t}\n\t\tflocs := lsys.List().All()\n\t\tfeats[i] = make([]Feature, len(flocs))\n\t\tfor j, loc := range flocs {\n\t\t\tinx := loc.U16(0)\n\t\t\t//trace().Debugf(\"loc[%d] = %d\", j, inx)\n\t\t\tfeats[i][j] = wrapFeature(t, inx, i)\n\t\t\ttrace().Debugf(\"%2d: feat[%v] \", j, feats[i][j].Tag())\n\t\t}\n\t}\n\treturn feats[0], feats[1], nil\n}", "func BuildFeatures(doc string, doc2words text.Doc2Words) []Feature {\n\twords := doc2words(doc)\n\tfeatures := make([]Feature, len(words))\n\tfor i, w := range words {\n\t\tfeatures[i] = NewFeature([]byte(w))\n\t}\n\t//fmt.Printf(\"%#v\\n\", features)\n\treturn features\n}", "func (in *S3Features) DeepCopy() *S3Features {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(S3Features)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func (r Software_Description) GetFeatures() (resp []datatypes.Software_Description_Feature, err error) {\n\terr = r.Session.DoRequest(\"SoftLayer_Software_Description\", \"getFeatures\", nil, &r.Options, &resp)\n\treturn\n}", "func (b *Baseboard) Features() BoardFeature {\n\treturn BoardFeature(b.byte(0x09))\n}", "func getFeatures(\n\ti int,\n\tts []token.TokenSN,\n\tnd *NameData,\n) (int, []feature.ClassFeatures) {\n\tvar lfs []feature.ClassFeatures\n\tclass := nlp.IsNotName\n\n\tfor j := i; j < len(ts); j++ {\n\t\tt := ts[j]\n\t\tif !t.Features().IsCapitalized {\n\t\t\tcontinue\n\t\t}\n\n\t\tupperIndex := token.UpperIndex(j, len(ts))\n\t\tfeatureSet := nlp.NewFeatureSet(ts[j:upperIndex])\n\t\tif nd.Name != \"\" && t.End() > nd.Start {\n\t\t\tclass = nlp.IsName\n\t\t\tlfs = append(lfs, feature.ClassFeatures{Features: featureSet.Flatten(),\n\t\t\t\tClass: class})\n\t\t\treturn j + 1, lfs\n\t\t}\n\n\t\tfor _, v := range featureSet.Uninomial {\n\t\t\tif v.Name == \"uniDict\" && v.Value == \"inGenus\" {\n\t\t\t\tinGenusButNoName[t.Cleaned()] = struct{}{}\n\t\t\t}\n\t\t}\n\t\tlfs = append(lfs, feature.ClassFeatures{Features: featureSet.Flatten(),\n\t\t\tClass: class})\n\t}\n\treturn -1, lfs\n}", "func getCfFromFeaturesFile() []CrsFeatures{\n\tfmt.Println(\"getCfFromFeaturesFile\");\n\tcf := []CrsFeatures{}\n\n\tfeaturesFile, err := os.Open(\"Data_2019_03_01/PS_Features.csv\")\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\tdefer featuresFile.Close()\n\treader := csv.NewReader(featuresFile)\n\treader.FieldsPerRecord = -1\n\n\tif err := gocsv.UnmarshalFile(featuresFile, &cf); err != nil {\n\t\tpanic(err)\n\t}\n\treturn cf\n}", "func NewAcceptFeatures(acceptFeatures []string) (AcceptFeatures, error) {\n\tif len(acceptFeatures) == 0 {\n\t\treturn EmptyAcceptFeatures, nil\n\t}\n\tvar expressions []FeatureExpression\n\tfor _, e := range acceptFeatures {\n\t\texpressions = append(expressions, FeatureExpression(e))\n\t}\n\treturn AcceptFeatures(expressions), nil\n}", "func sequenceFeature(tkz VocabTokenizer, seqLen int32, text string) Feature {\n\tf := Feature{\n\t\tText: text,\n\t\tTokens: make([]string, seqLen),\n\t\tTokenIDs: make([]int32, seqLen),\n\t\tMask: make([]int32, seqLen),\n\t\tTypeIDs: make([]int32, seqLen),\n\t}\n\tparts := strings.Split(text, SequenceSeparator)\n\tseqs := make([][]string, len(parts))\n\tfor i, part := range parts {\n\t\tseqs[i] = tkz.Tokenize(part)\n\t}\n\tseqs = truncate(seqs, seqLen-int32(len(seqs))-1) // truncate w/ space for CLS/SEP\n\tvoc := tkz.Vocab()\n\tvar s int\n\tf.Tokens[s] = ClassToken\n\tf.TokenIDs[s] = voc.GetID(ClassToken).Int32()\n\tf.TypeIDs[s] = 0\n\tf.Mask[s] = 1\n\ts++\n\tfor sid, seq := range seqs {\n\t\tfor _, tok := range seq {\n\t\t\tf.Tokens[s] = tok\n\t\t\tf.TokenIDs[s] = voc.GetID(tok).Int32()\n\t\t\tf.TypeIDs[s] = int32(sid)\n\t\t\tf.Mask[s] = 1\n\t\t\ts++\n\t\t}\n\t\tf.Tokens[s] = SeparatorToken\n\t\tf.TokenIDs[s] = voc.GetID(SeparatorToken).Int32()\n\t\tf.TypeIDs[s] = int32(sid)\n\t\tf.Mask[s] = 1\n\t\ts++\n\t}\n\treturn f\n}", "func (vfs *OrefaFS) Features() avfs.Feature {\n\treturn vfs.feature\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewClientInfo creates a new list of ClientInfo.
func NewClientInfo_List(s *capnp.Segment, sz int32) (ClientInfo_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 4}, sz) return ClientInfo_List{l}, err }
[ "func NewClientInfo(id string, secret string) (ClientInfo, error) {\n\tvar clientInfo ClientInfo\n\n\tif id != \"\" && secret != \"\" {\n\t\tclientInfo = ClientInfo{\n\t\t\tID: id,\n\t\t\tSecret: secret,\n\t\t}\n\t\treturn clientInfo, nil\n\t}\n\n\tclientInfoFromFile, err := getClientInfoFromFile()\n\tif err != nil {\n\t\treturn clientInfo, err\n\t}\n\n\tif id == \"\" {\n\t\tclientInfo.ID = clientInfoFromFile.ID\n\t}\n\n\tif secret == \"\" {\n\t\tclientInfo.Secret = clientInfoFromFile.Secret\n\t}\n\n\treturn clientInfo, nil\n}", "func NewClientInfo(config *rest.Config) (*ClientInfo, error) {\n\tclient, err := kubernetes.NewForConfig(config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tnetclient, err := netclient.NewForConfig(config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbroadcaster := record.NewBroadcaster()\n\tbroadcaster.StartLogging(klog.Infof)\n\tbroadcaster.StartRecordingToSink(&v1core.EventSinkImpl{Interface: client.CoreV1().Events(\"\")})\n\trecorder := broadcaster.NewRecorder(scheme.Scheme, v1.EventSource{Component: \"multus\"})\n\treturn &ClientInfo{\n\t\tClient: client,\n\t\tNetClient: netclient,\n\t\tEventBroadcaster: broadcaster,\n\t\tEventRecorder: recorder,\n\t}, nil\n}", "func (s ConnectionOptions) NewClient() (ClientInfo, error) {\n\tss, err := NewClientInfo(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ClientInfo{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func saveNewClient(id string, clientList *[]Util.Client) {\n\tif printLogs {\n\t\tfmt.Println(id + \" CONNECTED...\")\n\t}\n\tnewClient := Util.Client{\n\t\tName: id,\n\t\tConn: nil,\n\t\tExit: false,\n\t}\n\t*clientList = append(*clientList, newClient)\n}", "func (c *ClientList) AddNewClient(name string) (string, error) {\n\tif c.list == nil {\n\t\treturn \"\", errors.New(\"ClientList list is not initialized\")\n\t}\n\tif c.userNameExists(name) {\n\t\treturn \"\", errors.New(\"User name is in use\")\n\t}\n\tid := uuid.New().String()\n\tc.list = append(c.list, &client{id: id, name: name})\n\treturn id, nil\n}", "func (context Context) AddClientInfo(key string, value string) GError {\n\tvar err *C.GError\n\n\tcKey := (*C.char)(C.CString(key))\n\tdefer C.free(unsafe.Pointer(cKey))\n\tcValue := (*C.char)(C.CString(value))\n\tdefer C.free(unsafe.Pointer(cValue))\n\n\tret := C.gfal2_add_client_info(context.cContext, cKey, cValue, &err)\n\tif ret < 0 {\n\t\treturn errorCtoGo(err)\n\t}\n\n\treturn nil\n}", "func fillClientInfo() {\n\thostsFn := \"/etc/hosts\"\n\tif runtime.GOOS == \"windows\" {\n\t\thostsFn = os.ExpandEnv(\"$SystemRoot\\\\system32\\\\drivers\\\\etc\\\\hosts\")\n\t}\n\n\td, e := ioutil.ReadFile(hostsFn)\n\tif e != nil {\n\t\tlog.Info(\"Can't read file %s: %v\", hostsFn, e)\n\t\treturn\n\t}\n\n\tlines := strings.Split(string(d), \"\\n\")\n\tfor _, ln := range lines {\n\t\tln = strings.TrimSpace(ln)\n\t\tif len(ln) == 0 || ln[0] == '#' {\n\t\t\tcontinue\n\t\t}\n\n\t\tfields := strings.Fields(ln)\n\t\tif len(fields) < 2 {\n\t\t\tcontinue\n\t\t}\n\n\t\tvar c Client\n\t\tc.IP = fields[0]\n\t\tc.Name = fields[1]\n\t\tclients = append(clients, c)\n\t\tlog.Tracef(\"%s -> %s\", c.IP, c.Name)\n\t}\n\n\tlog.Info(\"Added %d client aliases from %s\", len(clients), hostsFn)\n\tclientsFilled = true\n}", "func BulkCreateClientInfo(clients []ClientInfo) error {\n\tchunks := sliceClients(clients, 500)\n\n\tfor _, clients := range chunks {\n\t\tdb.Create(&clients)\n\t}\n\n\treturn nil\n}", "func NewServiceInfoClient(c config) *ServiceInfoClient {\n\treturn &ServiceInfoClient{config: c}\n}", "func (s ClientInfo) NewFeatures(n int32) (capnp.TextList, error) {\n\tl, err := capnp.NewTextList(s.Struct.Segment(), n)\n\tif err != nil {\n\t\treturn capnp.TextList{}, err\n\t}\n\terr = s.Struct.SetPtr(1, l.List.ToPtr())\n\treturn l, err\n}", "func NewFakeClientInfo() *k8sclient.ClientInfo {\n\treturn &k8sclient.ClientInfo{\n\t\tClient: fake.NewSimpleClientset(),\n\t\tNetClient: netfake.NewSimpleClientset().K8sCniCncfIoV1(),\n\t\tEventRecorder: record.NewFakeRecorder(10),\n\t}\n}", "func NewClientList() *ClientList {\n\ts := make([]*client, 0, 0)\n\treturn &ClientList{list: s}\n}", "func ExampleNewClient() {\r\n\tclient := NewClient(nil, nil, EnvironmentIAE)\r\n\r\n\tfmt.Printf(\"created new client: %s\", client.Options.UserAgent)\r\n\t// Output:created new client: go-handcash-connect: v0.1.0\r\n}", "func updateClientInfo(data MonitorMetric) {\n\tserverStatus.Lock.Lock()\n\tdefer serverStatus.Lock.Unlock()\n\tif data.Alive {\n\t\tserverStatus.ClientList[data.Addr] = data\n\t} else {\n\t\tif _, ok := serverStatus.ClientList[data.Addr]; ok {\n\t\t\t// gather finished clients processed jobs\n\t\t\tserverStatus.ProcessedJob += data.ProcessedReq\n\t\t\tdelete(serverStatus.ClientList, data.Addr)\n\t\t}\n\t}\n}", "func UA_Client_new(config UA_ClientConfig) []UA_Client {\n\tvar client []UA_Client = make([]UA_Client, 896/896)\n\tif client == nil {\n\t\treturn nil\n\t}\n\tUA_Client_init(client, UA_ClientConfig(config))\n\treturn client\n}", "func NewClientDetail(email string, tosConsent bool, marketingConsent bool, dataConsent bool, tosConsentDate string, taxInformation []string, countryBirth CountryField, lastLogin time.Time, referredBy NullableString, successfulReferrals int32, kycVerified bool, isVerified bool, feeSegments []string, extraData map[string]interface{}, portfolios []string, riskLevel int32, onboardingToken string, uuid string, created time.Time, updated time.Time, status StatusB65Enum, language string, marketingConsentDate string, dataConsentDate string) *ClientDetail {\n\tthis := ClientDetail{}\n\tthis.Email = email\n\tthis.TosConsent = tosConsent\n\tthis.MarketingConsent = marketingConsent\n\tthis.DataConsent = dataConsent\n\tthis.TosConsentDate = tosConsentDate\n\tthis.TaxInformation = taxInformation\n\tthis.CountryBirth = countryBirth\n\tthis.LastLogin = lastLogin\n\tthis.ReferredBy = referredBy\n\tthis.SuccessfulReferrals = successfulReferrals\n\tthis.KycVerified = kycVerified\n\tthis.IsVerified = isVerified\n\tthis.FeeSegments = feeSegments\n\tthis.ExtraData = extraData\n\tthis.Portfolios = portfolios\n\tthis.RiskLevel = riskLevel\n\tthis.OnboardingToken = onboardingToken\n\tthis.Uuid = uuid\n\tthis.Created = created\n\tthis.Updated = updated\n\tthis.Status = status\n\tthis.Language = language\n\tthis.MarketingConsentDate = marketingConsentDate\n\tthis.DataConsentDate = dataConsentDate\n\treturn &this\n}", "func createClients(req *restful.Request, resp *restful.Response) {\n\t//Check weather user has permission to perform this operation\n\tif !utils.HasRole(req, \"SA\") {\n\t\tlog.Infof(\"User not authorized\")\n\t\tutils.WriteError(resp, errors.CreateError(401, \"Not Authorized\"))\n\t\treturn\n\t}\n\n\t//parsing data from request\n\trequest := CreateClientModel{}\n\terr := req.ReadEntity(&request)\n\tif err != nil {\n\t\tlog.Errorf(\"Request data is not valid: error %v\\n\", err)\n\t\tutils.WriteError(resp, errors.CreateError(400, \"invalid_data\"))\n\t\treturn\n\t}\n\n\t//Create client and get the details\n\tclient, err := GetClientService().CreateClient(request)\n\n\tif err != nil {\n\t\tlog.Errorf(\"Error happend at service: error %v\\n\", err)\n\t\tutils.WriteError(resp, err)\n\t\treturn\n\t}\n\n\tresp.WriteHeaderAndEntity(204, client)\n\n}", "func (cdd *DataAccess) NewClient(pword string) error {\n\tif cdd.disableNewAccounts {\n\t\treturn ErrAccountCreationDisabled\n\t}\n\texists, err := cdd.ClientExists(cdd.name)\n\tswitch {\n\tcase err != nil:\n\t\treturn err\n\tcase exists:\n\t\treturn ErrClientExists\n\t}\n\tif !ValidateName(cdd.name) {\n\t\treturn ErrInvalidName\n\t}\n\thashpword := Encrypt(pword)\n\terr = cdd.data.Add(\"client\", row(\"password\", hashpword, \"name\", cdd.name, \"lastonline\", time.Now().String()))\n\treturn err\n}", "func NewTokeninfoClient(url string) *TokeninfoClient {\n\treturn &TokeninfoClient{\n\t\tcache: newTokeninfoCache(),\n\t\turl: url,\n\t\tbasicCall: BasicTokeninfo(url),\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewClient sets the client field to a newly allocated ClientInfo struct, preferring placement in s's segment.
func (s ConnectionOptions) NewClient() (ClientInfo, error) { ss, err := NewClientInfo(s.Struct.Segment()) if err != nil { return ClientInfo{}, err } err = s.Struct.SetPtr(0, ss.Struct.ToPtr()) return ss, err }
[ "func NewClient(address, versionStr string) *SparrowClient {\n\treturn &SparrowClient{\n\t\tClient: vnet.NewClient(address, \"sprw\", \"0\"),\n\t}\n}", "func NewClientInfo_List(s *capnp.Segment, sz int32) (ClientInfo_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 4}, sz)\n\treturn ClientInfo_List{l}, err\n}", "func NewClientInfo(id string, secret string) (ClientInfo, error) {\n\tvar clientInfo ClientInfo\n\n\tif id != \"\" && secret != \"\" {\n\t\tclientInfo = ClientInfo{\n\t\t\tID: id,\n\t\t\tSecret: secret,\n\t\t}\n\t\treturn clientInfo, nil\n\t}\n\n\tclientInfoFromFile, err := getClientInfoFromFile()\n\tif err != nil {\n\t\treturn clientInfo, err\n\t}\n\n\tif id == \"\" {\n\t\tclientInfo.ID = clientInfoFromFile.ID\n\t}\n\n\tif secret == \"\" {\n\t\tclientInfo.Secret = clientInfoFromFile.Secret\n\t}\n\n\treturn clientInfo, nil\n}", "func (cdd *DataAccess) NewClient(pword string) error {\n\tif cdd.disableNewAccounts {\n\t\treturn ErrAccountCreationDisabled\n\t}\n\texists, err := cdd.ClientExists(cdd.name)\n\tswitch {\n\tcase err != nil:\n\t\treturn err\n\tcase exists:\n\t\treturn ErrClientExists\n\t}\n\tif !ValidateName(cdd.name) {\n\t\treturn ErrInvalidName\n\t}\n\thashpword := Encrypt(pword)\n\terr = cdd.data.Add(\"client\", row(\"password\", hashpword, \"name\", cdd.name, \"lastonline\", time.Now().String()))\n\treturn err\n}", "func NewClient(sclient SClientFactory) ClientInterface {\n\treturn &Client{\n\t\tcreateSvcatClient: sclient,\n\t}\n}", "func newGateClient(uid int, client *network.ClientSocket) {\n\tllog.Infof(\"GateServer newGateClient: uid=%d, client=%d, %s\", uid, client.Uid, client.GetSAddr())\n\n\tif rpcClient, ok := This.clients.Load(uid); ok {\n\t\tif rpcClient != nil {\n\t\t\tllog.Errorf(\"GateServer newGateClient: server[%d] has already connected\", uid)\n\t\t\tclient.SetClientId(0)\n\t\t\tclient.Stop()\n\t\t\treturn\n\t\t}\n\t}\n\tThis.clients.Store(uid, client)\n\n\treq := &pbmsg.LouMiaoLoginGate{TokenId: lutil.Itoa(uid), UserId: int64(lconfig.SERVER_NODE_UID)}\n\tbuff, _ := message.EncodeProBuff(uid, \"LouMiaoLoginGate\", req)\n\tclient.Send(buff)\n}", "func NewClientInfo(config *rest.Config) (*ClientInfo, error) {\n\tclient, err := kubernetes.NewForConfig(config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tnetclient, err := netclient.NewForConfig(config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbroadcaster := record.NewBroadcaster()\n\tbroadcaster.StartLogging(klog.Infof)\n\tbroadcaster.StartRecordingToSink(&v1core.EventSinkImpl{Interface: client.CoreV1().Events(\"\")})\n\trecorder := broadcaster.NewRecorder(scheme.Scheme, v1.EventSource{Component: \"multus\"})\n\treturn &ClientInfo{\n\t\tClient: client,\n\t\tNetClient: netclient,\n\t\tEventBroadcaster: broadcaster,\n\t\tEventRecorder: recorder,\n\t}, nil\n}", "func (t *ServiceClient) NewClient(tableName string) *Client {\n\treturn &Client{\n\t\tclient: t.client,\n\t\tname: tableName,\n\t\tservice: t,\n\t\tcon: t.con,\n\t\tcred: t.cred,\n\t}\n}", "func NewClient(addr, name string) *Client {\n\taddresses := strings.Split(addr, \",\")\n\tvar pool ConnPool\n\tif len(addresses) == 1 {\n\t\tpool = NewSingleHostPool(addresses[0])\n\t} else {\n\t\tpool = NewMultiHostPool(addresses)\n\t}\n\tret := &Client{\n\t\tpool: pool,\n\t\tname: name,\n\t}\n\treturn ret\n}", "func newClient(conn net.Conn) *client {\n\treturn &client{\n\t\tname: conn.RemoteAddr().String(),\n\t\trc: rpc.NewClient(conn),\n\t}\n}", "func NewClient(m gfs.ServerAddress) *Client {\n\treturn &Client{\n\t\tmaster: m,\n\t\tleases: newChunkLease(m),\n\t}\n}", "func NewClient(address string, port uint16) (cli *Client, err error) {\n\taddr, err := net.ResolveTCPAddr(\"tcp\", fmt.Sprintf(\"%s:%d\", address, port))\n\tif err != nil {\n\t\treturn\n\t}\n\n\tconn, err := net.DialTCP(\"tcp\", nil, addr)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tcli = &Client{\n\t\tconn: conn,\n\t\tscanner: bufio.NewScanner(conn),\n\t}\n\treturn\n}", "func ExampleNewClient() {\r\n\tclient := NewClient(nil, nil, EnvironmentIAE)\r\n\r\n\tfmt.Printf(\"created new client: %s\", client.Options.UserAgent)\r\n\t// Output:created new client: go-handcash-connect: v0.1.0\r\n}", "func NewClient(server *Server, conn net.Conn, clientData *data.ConnectPacket) *Client {\n\treturn &Client{\n\t\tserver: server,\n\t\tconn: conn,\n\t\tclientID: clientData.GetClientID(),\n\t\tretain: clientData.ShouldRetain(),\n\t\tqos: clientData.GetQos(),\n\t\tcleanSession: clientData.ShouldCleanSession(),\n\t}\n}", "func NewClient(fd int) (c *Client, err os.Error) {\n\tc = new(Client);\n\tc.fd = fd;\n\tc.r.fd = fd;\n\tc.s.fd = fd;\n\tc.service = make(map[string]srv);\n\tc.pending = make(map[uint64]*RPC);\n\n\t// service discovery request\n\tm := &msg{\n\t\tprotocol: protocol,\n\t\tisReq: true,\n\t\tRet: []interface{}{[]byte(nil)},\n\t\tSize: []int{4000},\n\t};\n\tm.packRequest();\n\tc.s.send(m);\n\tm, err = c.r.recv();\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tm.unpackResponse();\n\tif m.status != OK {\n\t\tlog.Stderrf(\"NewClient service_discovery: %s\", m.status);\n\t\treturn nil, m.status;\n\t}\n\tfor n, line := range bytes.Split(m.Ret[0].([]byte), []byte{'\\n'}, 0) {\n\t\ti := bytes.Index(line, []byte{':'});\n\t\tif i < 0 {\n\t\t\tcontinue\n\t\t}\n\t\tc.service[string(line[0:i])] = srv{uint32(n), string(line[i+1 : len(line)])};\n\t}\n\n\tc.out = make(chan *msg);\n\tgo c.input();\n\tgo c.output();\n\treturn c, nil;\n}", "func newClient() (mesosAgentClient, error) {\n\tmesosClientOnce.Do(func() {\n\t\t// Start Client\n\t\tapiURL := url.URL{\n\t\t\tScheme: \"http\",\n\t\t\tHost: *MesosAgentAddress,\n\t\t\tPath: \"/api/v1\",\n\t\t}\n\n\t\tmesosClient = &client{\n\t\t\thc: httpcli.New(\n\t\t\t\thttpcli.Endpoint(apiURL.String()),\n\t\t\t\thttpcli.Codec(codecs.ByMediaType[codecs.MediaTypeProtobuf]),\n\t\t\t\thttpcli.Do(httpcli.With(httpcli.Timeout(*MesosAgentTimeout))),\n\t\t\t),\n\t\t}\n\t})\n\n\t_, err := mesosClient.getVersion()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to get version\")\n\t}\n\treturn mesosClient, nil\n}", "func (ss *Server) HandleNewClient(socket net.Conn) []byte {\n\tsubscriptionID := ss.SubscriptionCounter.Next()\n\tclient := NewStratumClient(subscriptionID, socket, ss.Options, ss.JobManager, ss.BanningManager)\n\tss.StratumClients[binary.LittleEndian.Uint64(subscriptionID)] = client\n\t// client.connected\n\n\tgo func() {\n\t\tfor {\n\t\t\t<-client.SocketClosedEvent\n\t\t\tlog.Warn(\"a client socket closed\")\n\t\t\tss.RemoveStratumClientBySubscriptionId(subscriptionID)\n\t\t\t// client.disconnected\n\t\t}\n\t}()\n\n\tclient.Init()\n\n\treturn subscriptionID\n}", "func NewClient(deviceuid string) (_ *Godel) {\n uid := NewDeviceUID()\n if deviceuid != \"\" {\n uid = deviceuid\n }\n return &Godel{\n Key: \"aPLFAjyUusVPHgcgvlAxihthmRaiuqCjBsRCPLan\",\n DeviceUID: uid,\n }\n}", "func NewClient(deps *module.Dependencies) Client {\n\tserviceName := deps.Default.Config.MustGetString(\"clients.baz.serviceName\")\n\tvar routingKey string\n\tif deps.Default.Config.ContainsKey(\"clients.baz.routingKey\") {\n\t\troutingKey = deps.Default.Config.MustGetString(\"clients.baz.routingKey\")\n\t}\n\tvar requestUUIDHeaderKey string\n\tif deps.Default.Config.ContainsKey(\"tchannel.clients.requestUUIDHeaderKey\") {\n\t\trequestUUIDHeaderKey = deps.Default.Config.MustGetString(\"tchannel.clients.requestUUIDHeaderKey\")\n\t}\n\n\tip := deps.Default.Config.MustGetString(\"clients.baz.ip\")\n\tport := deps.Default.Config.MustGetInt(\"clients.baz.port\")\n\tgateway := deps.Default.Gateway\n\tvar channel *tchannel.Channel\n\n\t// If dedicated.tchannel.client : true, each tchannel client will create a\n\t// dedicated connection with local sidecar, else it will use a shared connection\n\tif deps.Default.Config.ContainsKey(\"dedicated.tchannel.client\") &&\n\t\tdeps.Default.Config.MustGetBoolean(\"dedicated.tchannel.client\") {\n\t\tchannel = gateway.SetupClientTChannel(deps.Default.Config, serviceName)\n\t\tchannel.Peers().Add(ip + \":\" + strconv.Itoa(int(port)))\n\t} else {\n\t\tchannel = gateway.ServerTChannel\n\t\tchannel.GetSubChannel(serviceName, tchannel.Isolated).Peers().Add(ip + \":\" + strconv.Itoa(int(port)))\n\t}\n\n\t/*Ex:\n\t{\n\t\t\"clients.rider-presentation.alternates\": {\n\t\t\t\"routingConfigs\": [\n\t\t\t\t{\n\t\t\t\t\t\"headerName\": \"x-test-env\",\n\t\t\t\t\t\"headerValue\": \"*\",\n\t\t\t\t\t\"serviceName\": \"testservice\"\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\t\"headerName\": \"x-container\",\n\t\t\t\t\t\"headerValue\": \"container*\",\n\t\t\t\t\t\"serviceName\": \"relayer\"\n\t\t\t\t}\n\t\t\t],\n\t\t\t\"servicesDetail\": {\n\t\t\t\t\"testservice\": {\n\t\t\t\t\t\"ip\": \"127.0.0.1\",\n\t\t\t\t\t\"port\": 5000\n\t\t\t\t},\n\t\t\t\t\"relayer\": {\n\t\t\t\t\t\"ip\": \"127.0.0.1\",\n\t\t\t\t\t\"port\": 12000\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}*/\n\tvar re ruleengine.RuleEngine\n\tvar headerPatterns []string\n\taltChannelMap := make(map[string]*tchannel.SubChannel)\n\theaderPatterns, re = initializeDynamicChannel(channel, deps, headerPatterns, altChannelMap, re)\n\ttimeoutVal := int(deps.Default.Config.MustGetInt(\"clients.baz.timeout\"))\n\ttimeout := time.Millisecond * time.Duration(\n\t\ttimeoutVal,\n\t)\n\ttimeoutPerAttempt := time.Millisecond * time.Duration(\n\t\tdeps.Default.Config.MustGetInt(\"clients.baz.timeoutPerAttempt\"),\n\t)\n\n\tmethodNames := map[string]string{\n\t\t\"SecondService::echoBinary\": \"EchoBinary\",\n\t\t\"SecondService::echoBool\": \"EchoBool\",\n\t\t\"SecondService::echoDouble\": \"EchoDouble\",\n\t\t\"SecondService::echoEnum\": \"EchoEnum\",\n\t\t\"SecondService::echoI16\": \"EchoI16\",\n\t\t\"SecondService::echoI32\": \"EchoI32\",\n\t\t\"SecondService::echoI64\": \"EchoI64\",\n\t\t\"SecondService::echoI8\": \"EchoI8\",\n\t\t\"SecondService::echoString\": \"EchoString\",\n\t\t\"SecondService::echoStringList\": \"EchoStringList\",\n\t\t\"SecondService::echoStringMap\": \"EchoStringMap\",\n\t\t\"SecondService::echoStringSet\": \"EchoStringSet\",\n\t\t\"SecondService::echoStructList\": \"EchoStructList\",\n\t\t\"SecondService::echoStructSet\": \"EchoStructSet\",\n\t\t\"SecondService::echoTypedef\": \"EchoTypedef\",\n\t\t\"SimpleService::call\": \"Call\",\n\t\t\"SimpleService::compare\": \"Compare\",\n\t\t\"SimpleService::getProfile\": \"GetProfile\",\n\t\t\"SimpleService::headerSchema\": \"HeaderSchema\",\n\t\t\"SimpleService::ping\": \"Ping\",\n\t\t\"SimpleService::sillyNoop\": \"DeliberateDiffNoop\",\n\t\t\"SimpleService::testUuid\": \"TestUUID\",\n\t\t\"SimpleService::trans\": \"Trans\",\n\t\t\"SimpleService::transHeaders\": \"TransHeaders\",\n\t\t\"SimpleService::transHeadersNoReq\": \"TransHeadersNoReq\",\n\t\t\"SimpleService::transHeadersType\": \"TransHeadersType\",\n\t\t\"SimpleService::urlTest\": \"URLTest\",\n\t}\n\n\t//get mapping of client method and it's timeout\n\t//if mapping is not provided, use client's timeout for all the methods\n\tclientMethodTimeoutMapping := make(map[string]int64)\n\tif deps.Default.Config.ContainsKey(\"clients.baz.methodTimeoutMapping\") {\n\t\tdeps.Default.Config.MustGetStruct(\"clients.baz.methodTimeoutMapping\", &clientMethodTimeoutMapping)\n\t} else {\n\t\tfor _, methodName := range methodNames {\n\t\t\tclientMethodTimeoutMapping[methodName] = int64(timeoutVal)\n\t\t}\n\t}\n\n\tqpsLevels := map[string]string{\n\t\t\"baz-Call\": \"4\",\n\t\t\"baz-Compare\": \"2\",\n\t\t\"baz-DeliberateDiffNoop\": \"3\",\n\t\t\"baz-EchoBinary\": \"default\",\n\t\t\"baz-EchoBool\": \"default\",\n\t\t\"baz-EchoDouble\": \"default\",\n\t\t\"baz-EchoEnum\": \"default\",\n\t\t\"baz-EchoI16\": \"default\",\n\t\t\"baz-EchoI32\": \"default\",\n\t\t\"baz-EchoI64\": \"default\",\n\t\t\"baz-EchoI8\": \"default\",\n\t\t\"baz-EchoString\": \"default\",\n\t\t\"baz-EchoStringList\": \"default\",\n\t\t\"baz-EchoStringMap\": \"default\",\n\t\t\"baz-EchoStringSet\": \"default\",\n\t\t\"baz-EchoStructList\": \"default\",\n\t\t\"baz-EchoStructSet\": \"default\",\n\t\t\"baz-EchoTypedef\": \"default\",\n\t\t\"baz-GetProfile\": \"2\",\n\t\t\"baz-HeaderSchema\": \"1\",\n\t\t\"baz-Ping\": \"1\",\n\t\t\"baz-TestUUID\": \"default\",\n\t\t\"baz-Trans\": \"2\",\n\t\t\"baz-TransHeaders\": \"2\",\n\t\t\"baz-TransHeadersNoReq\": \"2\",\n\t\t\"baz-TransHeadersType\": \"2\",\n\t\t\"baz-URLTest\": \"default\",\n\t}\n\n\t// circuitBreakerDisabled sets whether circuit-breaker should be disabled\n\tcircuitBreakerDisabled := false\n\tif deps.Default.Config.ContainsKey(\"clients.baz.circuitBreakerDisabled\") {\n\t\tcircuitBreakerDisabled = deps.Default.Config.MustGetBoolean(\"clients.baz.circuitBreakerDisabled\")\n\t}\n\n\tif !circuitBreakerDisabled {\n\t\tfor methodName, methodTimeoutVal := range clientMethodTimeoutMapping {\n\t\t\tcircuitBreakerName := \"baz\" + \"-\" + methodName\n\t\t\tqpsLevel := \"default\"\n\t\t\tif level, ok := qpsLevels[circuitBreakerName]; ok {\n\t\t\t\tqpsLevel = level\n\t\t\t}\n\t\t\tconfigureCircuitBreaker(deps, int(methodTimeoutVal), circuitBreakerName, qpsLevel)\n\t\t}\n\t}\n\n\tvar client *zanzibar.TChannelClient\n\n\tif deps.Default.Config.ContainsKey(\"tchannelclients.retryCount.feature.enabled\") && deps.Default.Config.MustGetBoolean(\"tchannelclients.retryCount.feature.enabled\") && deps.Default.Config.ContainsKey(\"clients.baz.retryCount\") && int(deps.Default.Config.MustGetInt(\"clients.baz.retryCount\")) > 0 {\n\t\tmaxAttempts := int(deps.Default.Config.MustGetInt(\"clients.baz.retryCount\"))\n\t\tclient = zanzibar.NewTChannelClientContext(\n\t\t\tchannel,\n\t\t\tdeps.Default.ContextLogger,\n\t\t\tdeps.Default.ContextMetrics,\n\t\t\tdeps.Default.ContextExtractor,\n\t\t\t&zanzibar.TChannelClientOption{\n\t\t\t\tServiceName: serviceName,\n\t\t\t\tClientID: \"baz\",\n\t\t\t\tMethodNames: methodNames,\n\t\t\t\tTimeout: timeout,\n\t\t\t\tTimeoutPerAttempt: timeoutPerAttempt,\n\t\t\t\tRoutingKey: &routingKey,\n\t\t\t\tRuleEngine: re,\n\t\t\t\tHeaderPatterns: headerPatterns,\n\t\t\t\tRequestUUIDHeaderKey: requestUUIDHeaderKey,\n\t\t\t\tAltChannelMap: altChannelMap,\n\t\t\t\tMaxAttempts: maxAttempts,\n\t\t\t},\n\t\t)\n\t} else {\n\t\tclient = zanzibar.NewTChannelClientContext(\n\t\t\tchannel,\n\t\t\tdeps.Default.ContextLogger,\n\t\t\tdeps.Default.ContextMetrics,\n\t\t\tdeps.Default.ContextExtractor,\n\t\t\t&zanzibar.TChannelClientOption{\n\t\t\t\tServiceName: serviceName,\n\t\t\t\tClientID: \"baz\",\n\t\t\t\tMethodNames: methodNames,\n\t\t\t\tTimeout: timeout,\n\t\t\t\tTimeoutPerAttempt: timeoutPerAttempt,\n\t\t\t\tRoutingKey: &routingKey,\n\t\t\t\tRuleEngine: re,\n\t\t\t\tHeaderPatterns: headerPatterns,\n\t\t\t\tRequestUUIDHeaderKey: requestUUIDHeaderKey,\n\t\t\t\tAltChannelMap: altChannelMap,\n\t\t\t},\n\t\t)\n\t}\n\n\treturn &bazClient{\n\t\tclient: client,\n\t\tcircuitBreakerDisabled: circuitBreakerDisabled,\n\t\tdefaultDeps: deps.Default,\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewConnectionOptions creates a new list of ConnectionOptions.
func NewConnectionOptions_List(s *capnp.Segment, sz int32) (ConnectionOptions_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 2}, sz) return ConnectionOptions_List{l}, err }
[ "func newConnOptions() *connOptions {\n\treturn &connOptions{\n\t\tBufferSize: defaultBufferSize,\n\t}\n}", "func (s RegistrationServer_registerConnection_Params) NewOptions() (ConnectionOptions, error) {\n\tss, err := NewConnectionOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func newChannelOptions() channelOptions {\n\treturn channelOptions{\n\t\tSourcePort: TransferPort,\n\t\tSourceVersion: TransferVersion,\n\t\tTargetPort: TransferPort,\n\t\tTargetVersion: TransferVersion,\n\t\tOrdering: OrderingUnordered,\n\t}\n}", "func NewOptions() *Common {\n\treturn &Common{}\n}", "func newGrpcConnections(conf *config.Config) *GrpcConnections {\n\treturn &GrpcConnections{conf: conf}\n}", "func NewConnections(capacity int32) (conns *Connections) {\n\tconns = &Connections{\n\t\tcapacityM: &sync.RWMutex{},\n\t\t_capacity: capacity,\n\n\t\tgetM: &sync.RWMutex{},\n\t\t_get: make([]*Connection, 0, capacity),\n\t}\n\treturn conns\n}", "func newOptions() *options {\n\treturn &options{\n\t\tfillColor: cell.ColorNumber(DefaultFillColorNumber),\n\t\tplaceHolderColor: cell.ColorNumber(DefaultPlaceHolderColorNumber),\n\t\thighlightedColor: cell.ColorNumber(DefaultHighlightedColorNumber),\n\t\tcursorColor: cell.ColorNumber(DefaultCursorColorNumber),\n\t\tlabelAlign: DefaultLabelAlign,\n\t}\n}", "func NewOptions() IOptions {\n\treturn &Options{\n\t\tcache: 0,\n\t\tgzip: false,\n\t}\n}", "func NewInitializeConnections(conf *config.Config) (*GrpcConnections, error) {\n\tgrpcCons := newGrpcConnections(conf)\n\terr := grpcCons.initialize()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn grpcCons, nil\n}", "func (s TunnelServer_authenticate_Params) NewOptions() (RegistrationOptions, error) {\n\tss, err := NewRegistrationOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegistrationOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewConnection(\n\tparent context.Context,\n\trwc io.ReadWriteCloser,\n\ttimestamp time.Time,\n\tpeerDelta uint32,\n\toptions *Options,\n) *Connection {\n\tif options == nil {\n\t\toptions = &Options{}\n\t}\n\n\tif timestamp.IsZero() {\n\t\ttimestamp = time.Now()\n\t}\n\n\tctx, cancel := context.WithCancel(parent)\n\tc := &Connection{\n\t\toptions: *options,\n\t\trwc: rwc,\n\t\tinboundChunks: chunk.NewChunks(timestamp, peerDelta),\n\t\toutboundChunks: chunk.NewChunks(timestamp, peerDelta),\n\t\tcontext: ctx,\n\t\tcancel: cancel,\n\t\tinboundMessages: make(chan *message.Raw, options.InboundMessageBuffer),\n\t\toutboundMessages: make(chan *message.Raw, options.OutboundMessageBuffer),\n\t\tmutex: &sync.Mutex{},\n\t}\n\n\tgo c.recvLoop()\n\tgo c.sendLoop()\n\n\treturn c\n}", "func NewNetworkConnectionParameters(connectionSize uint16, owner bool, connectionType uint8, priority uint8, connectionSizeType bool) *_NetworkConnectionParameters {\n\treturn &_NetworkConnectionParameters{ConnectionSize: connectionSize, Owner: owner, ConnectionType: connectionType, Priority: priority, ConnectionSizeType: connectionSizeType}\n}", "func NewCallOptions()(*CallOptions) {\n m := &CallOptions{\n }\n m.SetAdditionalData(make(map[string]interface{}));\n return m\n}", "func (t *System_Openflow_Controller) NewConnection(AuxId uint8) (*System_Openflow_Controller_Connection, error) {\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Connection == nil {\n\t\tt.Connection = make(map[uint8]*System_Openflow_Controller_Connection)\n\t}\n\n\tkey := AuxId\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Connection[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Connection\", key)\n\t}\n\n\tt.Connection[key] = &System_Openflow_Controller_Connection{\n\t\tAuxId: &AuxId,\n\t}\n\n\treturn t.Connection[key], nil\n}", "func NewConnList() (cl *connList) {\n\tcl = &connList{\n\t\tm: make(map[string]net.Conn),\n\t}\n\treturn cl\n}", "func NewConnectionPool(parameters ConnectionParameters, options ConnectionPoolOptions) (p *ConnectionPool, err error) {\n\tp = new(ConnectionPool)\n\tp.parameters = parameters\n\tp.maxConnections = options.MaxConnections\n\tp.afterConnect = options.AfterConnect\n\tif options.Logger != nil {\n\t\tp.logger = options.Logger\n\t} else {\n\t\tp.logger = nullLogger(\"null\")\n\t}\n\n\tp.allConnections = make([]*Connection, 0, p.maxConnections)\n\tp.availableConnections = make([]*Connection, 0, p.maxConnections)\n\tp.cond = sync.NewCond(new(sync.Mutex))\n\n\t// Initially establish one connection\n\tvar c *Connection\n\tc, err = p.createConnection()\n\tif err != nil {\n\t\treturn\n\t}\n\tp.allConnections = append(p.allConnections, c)\n\tp.availableConnections = append(p.availableConnections, c)\n\n\treturn\n}", "func newOptionList(opts []Option) *optionList {\n\toptions := new(optionList)\n\tfor _, opt := range opts {\n\t\topt(options)\n\t}\n\treturn options\n}", "func CreateOptions(c dict.Dicter) (opts *redis.Options, err error) {\n\tnetwork, err := c.String(ConfigKeyNetwork, &defaultNetwork)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\taddr, err := c.String(ConfigKeyAddress, &defaultAddress)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\thost, _, err := net.SplitHostPort(addr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif host == \"\" {\n\t\treturn nil, &ErrHostMissing{msg: fmt.Sprintf(\"no host provided in '%s'\", addr)}\n\t}\n\n\tpassword, err := c.String(ConfigKeyPassword, &defaultPassword)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdb, err := c.Int(ConfigKeyDB, &defaultDB)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\to := &redis.Options{\n\t\tNetwork: network,\n\t\tAddr: addr,\n\t\tPassword: password,\n\t\tDB: db,\n\t\tPoolSize: 2,\n\t\tDialTimeout: 3 * time.Second,\n\t}\n\n\tssl, err := c.Bool(ConfigKeySSL, &defaultSSL)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif ssl {\n\t\to.TLSConfig = &tls.Config{ServerName: host}\n\t}\n\n\treturn o, nil\n}", "func NewConnectionPool() *ConnectionPool {\n\tfmt.Println(\"NewConnectionPool\")\n\t\n\tpool := &ConnectionPool{\n\t\tlist: make(map[int]net.Conn),\n\t}\n\n\tfmt.Println(\"before return.......\")\n\treturn pool\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewConnectionDetails sets the connectionDetails field to a newly allocated ConnectionDetails struct, preferring placement in s's segment.
func (s ConnectionResponse_result) NewConnectionDetails() (ConnectionDetails, error) { s.Struct.SetUint16(0, 1) ss, err := NewConnectionDetails(s.Struct.Segment()) if err != nil { return ConnectionDetails{}, err } err = s.Struct.SetPtr(0, ss.Struct.ToPtr()) return ss, err }
[ "func NewConnectionDetails_List(s *capnp.Segment, sz int32) (ConnectionDetails_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 2}, sz)\n\treturn ConnectionDetails_List{l}, err\n}", "func NewConnectionDetailsObserver(e ConnectionDetailsExtractor) *ConnectionDetailsObserver {\n\treturn &ConnectionDetailsObserver{details: e}\n}", "func newConnectionInfo(host string, _type zmq.SocketType) *_ConnectionInfo {\n\tres := &_ConnectionInfo{Type: _type, Sock: nil}\n\tres.Host = list.New()\n\tres.Host.PushBack(host)\n\treturn res\n}", "func (tr *IOTHubDPS) GetConnectionDetailsMapping() map[string]string {\n\treturn map[string]string{\"linked_hub[*].connection_string\": \"spec.forProvider.linkedHub[*].connectionStringSecretRef\"}\n}", "func (mg *Volume) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo) {\n\tmg.Spec.PublishConnectionDetailsTo = r\n}", "func (tr *IOTHubEndpointStorageContainer) GetConnectionDetailsMapping() map[string]string {\n\treturn map[string]string{\"connection_string\": \"spec.forProvider.connectionStringSecretRef\"}\n}", "func (tr *SourceRepresentationInstance) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func (tr *IOTHubDPSSharedAccessPolicy) GetConnectionDetailsMapping() map[string]string {\n\treturn map[string]string{\"primary_connection_string\": \"status.atProvider.primaryConnectionString\", \"primary_key\": \"status.atProvider.primaryKey\", \"secondary_connection_string\": \"status.atProvider.secondaryConnectionString\", \"secondary_key\": \"status.atProvider.secondaryKey\"}\n}", "func (h *Handler) fetchConnectionDetails() (result *ConnectionDetails, err error) {\n\tresult = &ConnectionDetails{Options: make(map[string]string)}\n\n\tvar connectionDetails map[string][]byte\n\tif connectionDetails, err = h.Resolver.Resolve(h.GetConfig().Credentials); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif h.DebugModeOn() {\n\t\tkeys := reflect.ValueOf(connectionDetails).MapKeys()\n\t\tlog.Printf(\"%s backend connection parameters: %s\", h.GetConfig().Name, keys)\n\t}\n\n\tif host := connectionDetails[\"host\"]; host != nil {\n\t\tresult.Host = string(connectionDetails[\"host\"])\n\t}\n\n\tif connectionDetails[\"port\"] != nil {\n\t\tport64, _ := strconv.ParseUint(string(connectionDetails[\"port\"]), 10, 64)\n\t\tresult.Port = uint(port64)\n\t}\n\n\tif connectionDetails[\"username\"] != nil {\n\t\tresult.Username = string(connectionDetails[\"username\"])\n\t}\n\n\tif connectionDetails[\"password\"] != nil {\n\t\tresult.Password = string(connectionDetails[\"password\"])\n\t}\n\n\tdelete(connectionDetails, \"host\")\n\tdelete(connectionDetails, \"port\")\n\tdelete(connectionDetails, \"username\")\n\tdelete(connectionDetails, \"password\")\n\n\tresult.Options = make(map[string]string)\n\tfor k, v := range connectionDetails {\n\t\tresult.Options[k] = string(v)\n\t}\n\n\treturn result, nil\n}", "func (tr *IOTHubSharedAccessPolicy) GetConnectionDetailsMapping() map[string]string {\n\treturn map[string]string{\"primary_connection_string\": \"status.atProvider.primaryConnectionString\", \"primary_key\": \"status.atProvider.primaryKey\", \"secondary_connection_string\": \"status.atProvider.secondaryConnectionString\", \"secondary_key\": \"status.atProvider.secondaryKey\"}\n}", "func NewCapacityDetails(ctx *pulumi.Context,\n\tname string, args *CapacityDetailsArgs, opts ...pulumi.ResourceOption) (*CapacityDetails, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.ResourceGroupName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ResourceGroupName'\")\n\t}\n\tif args.Sku == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Sku'\")\n\t}\n\taliases := pulumi.Aliases([]pulumi.Alias{\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:powerbidedicated/v20171001:CapacityDetails\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:powerbidedicated:CapacityDetails\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:powerbidedicated:CapacityDetails\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:powerbidedicated/v20210101:CapacityDetails\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:powerbidedicated/v20210101:CapacityDetails\"),\n\t\t},\n\t})\n\topts = append(opts, aliases)\n\tvar resource CapacityDetails\n\terr := ctx.RegisterResource(\"azure-native:powerbidedicated/v20171001:CapacityDetails\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (tr *IOTHubDPSCertificate) GetConnectionDetailsMapping() map[string]string {\n\treturn map[string]string{\"certificate_content\": \"spec.forProvider.certificateContentSecretRef\"}\n}", "func (tr *IOTHubConsumerGroup) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func newClusterDetails(ctx context.Context, cfg clusterDetailsConfig) (_ *kubeDetails, err error) {\n\tcreds := cfg.kubeCreds\n\tif creds == nil {\n\t\tcreds, err = getKubeClusterCredentials(ctx, cfg)\n\t\tif err != nil {\n\t\t\treturn nil, trace.Wrap(err)\n\t\t}\n\t}\n\n\tvar dynLabels *labels.Dynamic\n\tif len(cfg.cluster.GetDynamicLabels()) > 0 {\n\t\tdynLabels, err = labels.NewDynamic(\n\t\t\tctx,\n\t\t\t&labels.DynamicConfig{\n\t\t\t\tLabels: cfg.cluster.GetDynamicLabels(),\n\t\t\t\tLog: cfg.log,\n\t\t\t})\n\t\tif err != nil {\n\t\t\treturn nil, trace.Wrap(err)\n\t\t}\n\t\tdynLabels.Sync()\n\t\tgo dynLabels.Start()\n\t}\n\tvar isClusterOffline bool\n\t// Create the codec factory and the list of supported types for RBAC.\n\tcodecFactory, rbacSupportedTypes, err := newClusterSchemaBuilder(creds.getKubeClient())\n\tif err != nil {\n\t\tcfg.log.WithError(err).Warn(\"Failed to create cluster schema. Possibly the cluster is offline.\")\n\t\t// If the cluster is offline, we will not be able to create the codec factory\n\t\t// and the list of supported types for RBAC.\n\t\t// We mark the cluster as offline and continue to create the kubeDetails but\n\t\t// the offline cluster will not be able to serve any requests until it comes back online.\n\t\tisClusterOffline = true\n\t}\n\n\tctx, cancel := context.WithCancel(ctx)\n\tk := &kubeDetails{\n\t\tkubeCreds: creds,\n\t\tdynamicLabels: dynLabels,\n\t\tkubeCluster: cfg.cluster,\n\t\tkubeCodecs: codecFactory,\n\t\trbacSupportedTypes: rbacSupportedTypes,\n\t\tcancelFunc: cancel,\n\t\tisClusterOffline: isClusterOffline,\n\t}\n\n\tk.wg.Add(1)\n\t// Start the periodic update of the codec factory and the list of supported types for RBAC.\n\tgo func() {\n\t\tdefer k.wg.Done()\n\t\tticker := cfg.clock.NewTicker(5 * time.Minute)\n\t\tdefer ticker.Stop()\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase <-ctx.Done():\n\t\t\t\treturn\n\t\t\tcase <-ticker.Chan():\n\t\t\t\tcodecFactory, rbacSupportedTypes, err := newClusterSchemaBuilder(creds.getKubeClient())\n\t\t\t\tif err != nil {\n\t\t\t\t\tcfg.log.WithError(err).Error(\"Failed to update cluster schema\")\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tk.rwMu.Lock()\n\t\t\t\tk.kubeCodecs = codecFactory\n\t\t\t\tk.rbacSupportedTypes = rbacSupportedTypes\n\t\t\t\tk.isClusterOffline = false\n\t\t\t\tk.rwMu.Unlock()\n\t\t\t}\n\t\t}\n\t}()\n\treturn k, nil\n}", "func (t *System_Openflow_Controller) NewConnection(AuxId uint8) (*System_Openflow_Controller_Connection, error) {\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Connection == nil {\n\t\tt.Connection = make(map[uint8]*System_Openflow_Controller_Connection)\n\t}\n\n\tkey := AuxId\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Connection[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Connection\", key)\n\t}\n\n\tt.Connection[key] = &System_Openflow_Controller_Connection{\n\t\tAuxId: &AuxId,\n\t}\n\n\treturn t.Connection[key], nil\n}", "func (mg *IOTHubEndpointStorageContainer) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo) {\n\tmg.Spec.PublishConnectionDetailsTo = r\n}", "func (in *DerivedConnectionDetail) DeepCopy() *DerivedConnectionDetail {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(DerivedConnectionDetail)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func (mg *IOTHubDPSSharedAccessPolicy) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo) {\n\tmg.Spec.PublishConnectionDetailsTo = r\n}", "func (mg *IOTHubSharedAccessPolicy) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo) {\n\tmg.Spec.PublishConnectionDetailsTo = r\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewConnectionResponse creates a new list of ConnectionResponse.
func NewConnectionResponse_List(s *capnp.Segment, sz int32) (ConnectionResponse_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 1}, sz) return ConnectionResponse_List{l}, err }
[ "func NewConnectionResponse(communicationChannelId uint8, status Status, hpaiDataEndpoint HPAIDataEndpoint, connectionResponseDataBlock ConnectionResponseDataBlock) *_ConnectionResponse {\n\t_result := &_ConnectionResponse{\n\t\tCommunicationChannelId: communicationChannelId,\n\t\tStatus: status,\n\t\tHpaiDataEndpoint: hpaiDataEndpoint,\n\t\tConnectionResponseDataBlock: connectionResponseDataBlock,\n\t\t_KnxNetIpMessage: NewKnxNetIpMessage(),\n\t}\n\t_result._KnxNetIpMessage._KnxNetIpMessageChildRequirements = _result\n\treturn _result\n}", "func CreateUpdateConnectionResponse() (response *UpdateConnectionResponse) {\n\tresponse = &UpdateConnectionResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func (s ConnectionResponse_result) NewConnectionDetails() (ConnectionDetails, error) {\n\ts.Struct.SetUint16(0, 1)\n\tss, err := NewConnectionDetails(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionDetails{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewResponse(conn net.Conn) *response {\n\n\tv := flag.Lookup(\"v\").Value.(flag.Getter).Get().(bool)\n\n\tdefaultHeaders := map[string]string{\n\t\t\"Connection\": \"close\",\n\t\t\"Date\": time.Now().Format(time.UnixDate),\n\t}\n\treturn &response{\n\t\theaders: defaultHeaders,\n\t\tConn: conn,\n\t\tstatus: 200,\n\t\tverbose: v,\n\t}\n}", "func (t *System_Openflow_Controller) NewConnection(AuxId uint8) (*System_Openflow_Controller_Connection, error) {\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Connection == nil {\n\t\tt.Connection = make(map[uint8]*System_Openflow_Controller_Connection)\n\t}\n\n\tkey := AuxId\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Connection[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Connection\", key)\n\t}\n\n\tt.Connection[key] = &System_Openflow_Controller_Connection{\n\t\tAuxId: &AuxId,\n\t}\n\n\treturn t.Connection[key], nil\n}", "func NewConnectionPool() *ConnectionPool {\n\tfmt.Println(\"NewConnectionPool\")\n\t\n\tpool := &ConnectionPool{\n\t\tlist: make(map[int]net.Conn),\n\t}\n\n\tfmt.Println(\"before return.......\")\n\treturn pool\n}", "func UA_CreateSubscriptionResponse_new() []UA_CreateSubscriptionResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[152]))[:]).([]UA_CreateSubscriptionResponse)\n}", "func (s RegistrationServer_registerConnection_Results) NewResult() (ConnectionResponse, error) {\n\tss, err := NewConnectionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func UA_RegisterNodesResponse_new() []UA_RegisterNodesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[120]))[:]).([]UA_RegisterNodesResponse)\n}", "func UA_CallResponse_new() []UA_CallResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[156]))[:]).([]UA_CallResponse)\n}", "func UA_CreateSessionResponse_new() []UA_CreateSessionResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[197]))[:]).([]UA_CreateSessionResponse)\n}", "func UA_AddNodesResponse_new() []UA_AddNodesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[140]))[:]).([]UA_AddNodesResponse)\n}", "func UA_WriteResponse_new() []UA_WriteResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[113]))[:]).([]UA_WriteResponse)\n}", "func newConnectionInfo(host string, _type zmq.SocketType) *_ConnectionInfo {\n\tres := &_ConnectionInfo{Type: _type, Sock: nil}\n\tres.Host = list.New()\n\tres.Host.PushBack(host)\n\treturn res\n}", "func NewConnList() (cl *connList) {\n\tcl = &connList{\n\t\tm: make(map[string]net.Conn),\n\t}\n\treturn cl\n}", "func UA_PublishResponse_new() []UA_PublishResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[94]))[:]).([]UA_PublishResponse)\n}", "func NewConnections(capacity int32) (conns *Connections) {\n\tconns = &Connections{\n\t\tcapacityM: &sync.RWMutex{},\n\t\t_capacity: capacity,\n\n\t\tgetM: &sync.RWMutex{},\n\t\t_get: make([]*Connection, 0, capacity),\n\t}\n\treturn conns\n}", "func UA_RegisterServer2Response_new() []UA_RegisterServer2Response {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[165]))[:]).([]UA_RegisterServer2Response)\n}", "func UA_AddReferencesResponse_new() []UA_AddReferencesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[170]))[:]).([]UA_AddReferencesResponse)\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewConnectionDetails creates a new list of ConnectionDetails.
func NewConnectionDetails_List(s *capnp.Segment, sz int32) (ConnectionDetails_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 2}, sz) return ConnectionDetails_List{l}, err }
[ "func (s ConnectionResponse_result) NewConnectionDetails() (ConnectionDetails, error) {\n\ts.Struct.SetUint16(0, 1)\n\tss, err := NewConnectionDetails(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionDetails{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewConnectionDetailsObserver(e ConnectionDetailsExtractor) *ConnectionDetailsObserver {\n\treturn &ConnectionDetailsObserver{details: e}\n}", "func (t *System_Openflow_Controller) NewConnection(AuxId uint8) (*System_Openflow_Controller_Connection, error) {\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Connection == nil {\n\t\tt.Connection = make(map[uint8]*System_Openflow_Controller_Connection)\n\t}\n\n\tkey := AuxId\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Connection[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Connection\", key)\n\t}\n\n\tt.Connection[key] = &System_Openflow_Controller_Connection{\n\t\tAuxId: &AuxId,\n\t}\n\n\treturn t.Connection[key], nil\n}", "func newConnectionInfo(host string, _type zmq.SocketType) *_ConnectionInfo {\n\tres := &_ConnectionInfo{Type: _type, Sock: nil}\n\tres.Host = list.New()\n\tres.Host.PushBack(host)\n\treturn res\n}", "func (ui *mainUI) addNewConnection(c connectionConfig) {\n\tui.connections.List.Unselect(nil)\n\tcUI := newConnUI(c)\n\tlv := &duit.ListValue{\n\t\tText: c.Name,\n\t\tValue: cUI,\n\t\tSelected: true,\n\t}\n\tui.connections.Values = append(ui.connections.Values, lv)\n\tui.sortConnections(ui.connections.Values)\n\tif !ui.connections.Match(c.Name) {\n\t\tui.connections.Search.Text = c.Name\n\t}\n\tui.connections.Filter()\n\tui.connectionBox.Kids = duit.NewKids(cUI)\n\tui.layout()\n}", "func NewConnList() (cl *connList) {\n\tcl = &connList{\n\t\tm: make(map[string]net.Conn),\n\t}\n\treturn cl\n}", "func NewCapacityDetails(ctx *pulumi.Context,\n\tname string, args *CapacityDetailsArgs, opts ...pulumi.ResourceOption) (*CapacityDetails, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.ResourceGroupName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ResourceGroupName'\")\n\t}\n\tif args.Sku == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Sku'\")\n\t}\n\taliases := pulumi.Aliases([]pulumi.Alias{\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:powerbidedicated/v20171001:CapacityDetails\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:powerbidedicated:CapacityDetails\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:powerbidedicated:CapacityDetails\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:powerbidedicated/v20210101:CapacityDetails\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:powerbidedicated/v20210101:CapacityDetails\"),\n\t\t},\n\t})\n\topts = append(opts, aliases)\n\tvar resource CapacityDetails\n\terr := ctx.RegisterResource(\"azure-native:powerbidedicated/v20171001:CapacityDetails\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func NewConnectionPool() *ConnectionPool {\n\tfmt.Println(\"NewConnectionPool\")\n\t\n\tpool := &ConnectionPool{\n\t\tlist: make(map[int]net.Conn),\n\t}\n\n\tfmt.Println(\"before return.......\")\n\treturn pool\n}", "func NewConnectionResponse_List(s *capnp.Segment, sz int32) (ConnectionResponse_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 1}, sz)\n\treturn ConnectionResponse_List{l}, err\n}", "func newConn(ch chan map[string]*model.InstanceInfo, latestTime int64, arg *model.ArgPolls) *conn {\n\treturn &conn{ch: ch, latestTime: latestTime, arg: arg, count: 1}\n}", "func (in *DerivedConnectionDetail) DeepCopy() *DerivedConnectionDetail {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(DerivedConnectionDetail)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func NewConnections(capacity int32) (conns *Connections) {\n\tconns = &Connections{\n\t\tcapacityM: &sync.RWMutex{},\n\t\t_capacity: capacity,\n\n\t\tgetM: &sync.RWMutex{},\n\t\t_get: make([]*Connection, 0, capacity),\n\t}\n\treturn conns\n}", "func newConnection(conf connectionConfig) (*Connection, error) {\n\tc := &Connection{\n\t\tlogger: conf.Logger,\n\t\tisDebug: conf.Debug,\n\t\ttimeout: conf.Timeout,\n\t}\n\n\tconn, err := net.Dial(\"tcp\", conf.GetDSN())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc.conn = conn\n\terr = c.auth(conf.GetProjectToken(), conf.GetHostname())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn c, nil\n}", "func (h *VPCPeeringConnectionsHandler) Create(\n\tproject string,\n\tvpcID string,\n\treq CreateVPCPeeringConnectionRequest,\n) (*VPCPeeringConnection, error) {\n\tpath := buildPath(\"project\", project, \"vpcs\", vpcID, \"peering-connections\")\n\trsp, err := h.client.doPostRequest(path, req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response *VPCPeeringConnection\n\tif err := json.Unmarshal(rsp, &response); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// if region was not set in the request omit it from the response\n\tif req.PeerRegion == nil {\n\t\tresponse.PeerRegion = nil\n\t}\n\n\treturn response, nil\n}", "func (client *VirtualNetworkGatewaysClient) listConnectionsCreateRequest(ctx context.Context, resourceGroupName string, virtualNetworkGatewayName string, options *VirtualNetworkGatewaysListConnectionsOptions) (*azcore.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/virtualNetworkGateways/{virtualNetworkGatewayName}/connections\"\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\turlPath = strings.ReplaceAll(urlPath, \"{virtualNetworkGatewayName}\", url.PathEscape(virtualNetworkGatewayName))\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := azcore.NewRequest(ctx, http.MethodGet, azcore.JoinPaths(client.con.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Telemetry(telemetryInfo)\n\tquery := req.URL.Query()\n\tquery.Set(\"api-version\", \"2020-07-01\")\n\treq.URL.RawQuery = query.Encode()\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewConnectionOptions_List(s *capnp.Segment, sz int32) (ConnectionOptions_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 2}, sz)\n\treturn ConnectionOptions_List{l}, err\n}", "func (store Store) CreateConnection(conn *connection.Connection) (*connection.Connection, error) {\n\tid, err := ksuid.NewRandom()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tconn.ID = connection.ID(id.String())\n\n\tvalue, err := json.Marshal(conn)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcreateConnection := etcd.OpPut(fmt.Sprintf(\"%s%s\", ConnectionsPrefix, string(conn.ID)), string(value))\n\tcreateJobs, err := store.createJobsOps(conn)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tops := append(createJobs, createConnection)\n\t_, err = store.client.Txn(context.TODO()).Then(ops...).Commit()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tstore.log.Debugw(\"Connection created.\", \"space\", conn.Space, \"connectionId\", conn.ID)\n\n\treturn conn, nil\n}", "func newConnOptions() *connOptions {\n\treturn &connOptions{\n\t\tBufferSize: defaultBufferSize,\n\t}\n}", "func NewConnectionOperation()(*ConnectionOperation) {\n m := &ConnectionOperation{\n Entity: *iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.NewEntity(),\n }\n return m\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewTunnelAuth creates a new list of TunnelAuth.
func NewTunnelAuth_List(s *capnp.Segment, sz int32) (TunnelAuth_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz) return TunnelAuth_List{l}, err }
[ "func (s RegistrationServer_registerConnection_Params) NewAuth() (TunnelAuth, error) {\n\tss, err := NewTunnelAuth(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelAuth{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func newTunnel(link link.Link) *tun {\n\treturn &tun{\n\t\tlink: link,\n\t\tsend: make(chan *message, 128),\n\t\tclosed: make(chan bool),\n\t\tsockets: make(map[string]*socket),\n\t}\n}", "func New(name string, sshClientConfig *ssh.ClientConfig, sshAddr, remoteAddr, localAddr string) *Tunnel {\n\treturn &Tunnel{\n\t\tname: name,\n\t\tsshAddr: sshAddr,\n\t\tremoteAddr: remoteAddr,\n\t\tlocalAddr: localAddr,\n\t\tclientConfig: sshClientConfig,\n\t}\n}", "func newIPSecVpnTunnels(c *ContivppV1Client, namespace string) *iPSecVpnTunnels {\n\treturn &iPSecVpnTunnels{\n\t\tclient: c.RESTClient(),\n\t\tns: namespace,\n\t}\n}", "func NewTunnelIamPolicy(ctx *pulumi.Context,\n\tname string, args *TunnelIamPolicyArgs, opts ...pulumi.ResourceOption) (*TunnelIamPolicy, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.PolicyData == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'PolicyData'\")\n\t}\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource TunnelIamPolicy\n\terr := ctx.RegisterResource(\"gcp:iap/tunnelIamPolicy:TunnelIamPolicy\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func NewTmpTunnel(t time.Duration) (*jsonrpc.Tunnel, *ConnRecorder, *ReqRecorder) {\n\tconnRecorder := NewConnRecorder()\n\tconnRecorder.CloseAfter(t)\n\treqRecorder := NewReqRecorder()\n\treqRecorder.CloseAfter(t)\n\ttunnel := jsonrpc.NewTunnel(connRecorder, reqRecorder)\n\ttunnel.Go()\n\treturn tunnel, connRecorder, reqRecorder\n}", "func NewTunnelRegistration_List(s *capnp.Segment, sz int32) (TunnelRegistration_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 6}, sz)\n\treturn TunnelRegistration_List{l}, err\n}", "func NewTunnelServer_authenticate_Params_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_authenticate_Params_List{l}, err\n}", "func NewTunnelRealm(bindIF string, bindPort string, dstHost string, dstPort string) *TunnelRealm {\n\trealm := &TunnelRealm{\n\t\ttunnels: make(map[string]*TCPTunnel),\n\t\tjoining: make(chan net.Conn),\n\t\tbindIF: bindIF,\n\t\tbindPort: bindPort,\n\t\tdstHost: dstHost,\n\t\tdstPort: dstPort,\n\t}\n\trealm.listen()\n\treturn realm\n}", "func (c *iPSecVpnTunnels) Create(iPSecVpnTunnel *v1.IPSecVpnTunnel) (result *v1.IPSecVpnTunnel, err error) {\n\tresult = &v1.IPSecVpnTunnel{}\n\terr = c.client.Post().\n\t\tNamespace(c.ns).\n\t\tResource(\"ipsecvpntunnels\").\n\t\tBody(iPSecVpnTunnel).\n\t\tDo().\n\t\tInto(result)\n\treturn\n}", "func (np *NgrokProvider) CreateTunnel(t *tunnelProvider.Tunnel) error {\n\n\tfor attempt := uint(0); attempt <= maxRetries; attempt++ {\n\t\terr := func() error {\n\t\t\t//log.Printf(\"Creating tunnel %d attempt \\n\", attempt)\n\t\t\ttime.Sleep(1 * time.Second)\n\t\t\tvar record TunnelResponse\n\t\t\tjsonData := map[string]interface{}{\n\t\t\t\t\"addr\": fmt.Sprintf(\"%s:%s\", t.LocalIP, t.LocalPort),\n\t\t\t\t\"proto\": t.Proto,\n\t\t\t\t\"name\": t.Name,\n\t\t\t\t\"inspect\": t.Inspect,\n\t\t\t\t\"auth\": t.Auth,\n\t\t\t}\n\n\t\t\tif string(t.Proto) == \"http\" {\n\t\t\t\tjsonData[\"bind_tls\"] = true\n\t\t\t}\n\t\t\turl := fmt.Sprintf(\"http://%s/api/tunnels\", np.Client.API)\n\t\t\tjsonValue, err := json.Marshal(jsonData)\n\t\t\tif err != nil {\n\t\t\t\tgolog.Error(err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tres, err := http.Post(url, \"application/json\", bytes.NewBuffer(jsonValue))\n\t\t\tif err != nil {\n\t\t\t\tgolog.Error(err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tdefer res.Body.Close()\n\n\t\t\tif res.StatusCode < 200 || res.StatusCode > 299 {\n\t\t\t\tres, _ := ioutil.ReadAll(res.Body)\n\t\t\t\treturn errors.New(\"error api: \" + string(res))\n\t\t\t}\n\n\t\t\tif err := json.NewDecoder(res.Body).Decode(&record); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tt.RemoteAddress = record.PublicURL\n\t\t\tt.IsCreated = true\n\t\t\tgolog.Info(t.Name + \" is created and Live: -> \" + t.RemoteAddress)\n\t\t\treturn nil\n\t\t}()\n\t\tif np.Client.LogAPI && err != nil {\n\t\t\tgolog.Error(err)\n\t\t}\n\t\tif err == nil {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn nil\n}", "func (ag *fakeAgent) CreateTunnel(np *netproto.Tunnel) error {\n\treturn nil\n}", "func New(ctx context.Context, next http.Handler, config *Config, name string) (http.Handler, error) {\n\treturn &VaultAuth{\n\t\tnext: next,\n\t\tname: name,\n\t\tconfig: config,\n\t}, nil\n}", "func (c *Client) InitTunnel(t *Tunnel) (err error) {\n\tfor attempt := uint8(0); attempt <= Settings.MaxRetries; attempt++ {\n\t\terr = func() error {\n\t\t\tif Settings.ShouldLog {\n\t\t\t\tLogger.Println(\"Attempting to initialize tunnel...\")\n\t\t\t\tLogger.Printf(\">>>\\tName: %s | Addr: %s\\n\", t.Name, t.LocalAddress)\n\t\t\t}\n\t\t\ttime.Sleep(1 * time.Second)\n\n\t\t\tjsonData := t.getJSON()\n\n\t\t\tif protocols[t.Proto] == \"http\" {\n\t\t\t\t// IF HTTP APPEND BIND_TLS\n\t\t\t\tjsonData[\"bind_tls\"] = true\n\t\t\t}\n\n\t\t\turl := fmt.Sprintf(Settings.TunnelAPIAddr, c.NGROKLocalAddr)\n\n\t\t\tjsonValue, err := json.Marshal(jsonData)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// INIT RECORD\n\t\t\trecord, err := attemptInitTunnel(url, jsonValue)\n\n\t\t\tif err != nil {\n\t\t\t\tif Settings.ShouldLog {\n\t\t\t\t\tLogger.Printf(\"failed to init tunnel: %s | addr: %s\\n\", t.Name, t.LocalAddress)\n\t\t\t\t}\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tt.RemoteAddress = record.PublicURL\n\t\t\tt.IsCreated = true\n\n\t\t\tif Settings.ShouldLog {\n\t\t\t\tLogger.Println(\"Tunnel Created...\")\n\t\t\t\tLogger.Printf(\">>> Name: %s | Public Addr: %s\\n\", t.Name, t.RemoteAddress)\n\t\t\t}\n\t\t\treturn nil\n\t\t}()\n\t\tif c.LogAPI && err != nil {\n\t\t\tif Settings.ShouldLog {\n\t\t\t\tLogger.Println(err)\n\t\t\t}\n\t\t}\n\t\tif err == nil {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn\n}", "func NewVPNTunnel(ctx *pulumi.Context,\n\tname string, args *VPNTunnelArgs, opts ...pulumi.ResourceOption) (*VPNTunnel, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.SharedSecret == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'SharedSecret'\")\n\t}\n\tif args.SharedSecret != nil {\n\t\targs.SharedSecret = pulumi.ToSecret(args.SharedSecret).(pulumi.StringInput)\n\t}\n\tsecrets := pulumi.AdditionalSecretOutputs([]string{\n\t\t\"sharedSecret\",\n\t})\n\topts = append(opts, secrets)\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource VPNTunnel\n\terr := ctx.RegisterResource(\"gcp:compute/vPNTunnel:VPNTunnel\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (c *Client) CreateTunnel(targetHost, targetPort string) (io.ReadWriteCloser, error) {\n\t// url encode.\n\thost := util.Encode(targetHost)\n\tport := util.Encode(targetPort)\n\turl := c.wsAddr + \"/free?h=\" + host + \"&p=\" + port\n\tws, res, err := c.dialer.Dial(url, c.header)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif res.StatusCode == 404 {\n\t\treturn nil, errors.New(\"Empty target address or port.\")\n\t}\n\tt := &tunnel.Tunnel{*ws}\n\treturn t, nil\n}", "func MakeNewAuth(username string, password string) *Auth {\n\treturn &Auth{\n\t\tId: 1,\n\t\tUsername: username,\n\t\tPassword: password,\n\t}\n}", "func NewAuthOps() AuthOps {\n\treturn &authOps{}\n}", "func NewAuth(auth string, authType int) (Auth, error) {\n\tswitch authType {\n\tcase 1:\n\t\treturn Auth{\n\t\t\tauthType: authType,\n\t\t\tauthorization: auth,\n\t\t}, nil\n\tcase 2:\n\t\treturn Auth{\n\t\t\tauthType: authType,\n\t\t\tauthorization: \"Bearer \" + auth,\n\t\t}, nil\n\tdefault:\n\t\treturn Auth{}, fmt.Errorf(\"Invalid authType %v please give 1 or 2 as a value\", authType)\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewAuth sets the auth field to a newly allocated TunnelAuth struct, preferring placement in s's segment.
func (s RegistrationServer_registerConnection_Params) NewAuth() (TunnelAuth, error) { ss, err := NewTunnelAuth(s.Struct.Segment()) if err != nil { return TunnelAuth{}, err } err = s.Struct.SetPtr(0, ss.Struct.ToPtr()) return ss, err }
[ "func NewAuth(u, s, apass, a, ppass, p string) (*SNMPAuth, error) {\n\tsl, err := retrieveSecurityLevel(s)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\taproto, err := retrieveAuthProto(a)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpproto, err := retrievePrivProto(p)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &SNMPAuth{\n\t\tUsername: u,\n\t\tSecurityLevel: sl,\n\t\tAuthPassword: apass,\n\t\tAuthProtocol: aproto,\n\t\tPrivPassword: ppass,\n\t\tPrivProtocol: pproto,\n\t}, nil\n}", "func NewAuth(ip string, id int64, v string) (*Auth, error) {\n\tif ip == \"\" {\n\t\treturn nil, fmt.Errorf(\"NewAuth: Auth's ip miss\")\n\t}\n\tif v == \"\" {\n\t\tv = config.DefaultVersion\n\t}\n\t//random load\n\trand.Seed(time.Now().UnixNano())\n\tload := rand.Float32()\n\n\tresp := &Auth{\n\t\tName: \"Auth\",\n\t\tIID: id,\n\t\tIP: ip,\n\t\tVersion: v,\n\t\tQuality: rentities.NewServiceQuality(load),\n\t}\n\treturn resp, nil\n}", "func NewAuth(c config.Config, initPayloadGetter InitPayloadGetter, l *zap.Logger) (*Auth, error) {\n\tkey, err := rsa.GenerateKey(rand.Reader, 2048)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ta := &Auth{\n\t\tprivKey: key,\n\n\t\tadminOTP: c.AdminOTP,\n\t\tdisableAuth: c.DisableAuth,\n\n\t\tallowedPlugins: make(map[string]string),\n\t\tallowedOrigins: make(map[string]int),\n\n\t\tinitPayloadGetter: initPayloadGetter,\n\n\t\tlogger: l.Named(\"auth-handler\"),\n\t}\n\n\tif len(c.AllowOrigins) > 0 {\n\t\tfor _, origin := range c.AllowOrigins {\n\t\t\ta.allowedOrigins[origin] = math.MaxInt32\n\t\t}\n\t}\n\n\tinvalidID := xid.New().String()\n\ta.adminID.Store(invalidID)\n\n\ta.cors = cors.New(cors.Options{\n\t\tAllowOriginFunc: a.AllowOriginFunc,\n\t\tAllowCredentials: true,\n\t\tAllowedHeaders: []string{\"Authorization\", \"Content-Type\", \"X-Apollo-Tracing\"},\n\t})\n\n\treturn a, nil\n}", "func NewAuth(auth string, authType int) (Auth, error) {\n\tswitch authType {\n\tcase 1:\n\t\treturn Auth{\n\t\t\tauthType: authType,\n\t\t\tauthorization: auth,\n\t\t}, nil\n\tcase 2:\n\t\treturn Auth{\n\t\t\tauthType: authType,\n\t\t\tauthorization: \"Bearer \" + auth,\n\t\t}, nil\n\tdefault:\n\t\treturn Auth{}, fmt.Errorf(\"Invalid authType %v please give 1 or 2 as a value\", authType)\n\t}\n}", "func NewTunnelAuth_List(s *capnp.Segment, sz int32) (TunnelAuth_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn TunnelAuth_List{l}, err\n}", "func newReportingAuth(db types.Database, auth Auth) *reportingAuth {\n\treturn &reportingAuth{\n\t\tAuth: auth,\n\t\tcomponent: \"db:auth\",\n\t\tdb: db,\n\t}\n}", "func NewAuthService(c core.Config) (*AuthService, error) {\n\taddress := \":50051\"\n\tserver := &AuthService{config: c, wg: sync.WaitGroup{}}\n\n\tif addr, err := c.String(\"auth\", \"address\"); err == nil && address != \"\" {\n\t\taddress = addr\n\t}\n\n\tlis, err := net.Listen(\"tcp\", address)\n\tif err != nil {\n\t\tglog.Fatal(\"Failed to listen: %v\", err)\n\t\treturn nil, err\n\t}\n\tserver.listener = lis\n\tserver.srv = grpc.NewServer()\n\tRegisterAuthServiceServer(server.srv, server)\n\treflection.Register(server.srv)\n\treturn server, nil\n}", "func newLoginAuth(usr, pwd, host string) smtp.Auth {\n\treturn &loginAuth{usr, pwd, host}\n}", "func New(o Options, s Store) (*TinyAuth, error) {\n\treturn &TinyAuth{\n\t\topt: o,\n\t\tstore: s,\n\t}, nil\n}", "func newAuthInfo(restConfig *rest.Config) *clientcmdapi.AuthInfo {\n\tauthInfo := clientcmdapi.AuthInfo{}\n\thaveCredentials := false\n\tif restConfig.TLSClientConfig.CertFile != \"\" {\n\t\tauthInfo.ClientCertificate = restConfig.TLSClientConfig.CertFile\n\t\thaveCredentials = true\n\t}\n\tif len(restConfig.TLSClientConfig.CertData) > 0 {\n\t\tauthInfo.ClientCertificateData = restConfig.TLSClientConfig.CertData\n\t\thaveCredentials = true\n\t}\n\tif restConfig.TLSClientConfig.KeyFile != \"\" {\n\t\tauthInfo.ClientKey = restConfig.TLSClientConfig.KeyFile\n\t\thaveCredentials = true\n\t}\n\tif len(restConfig.TLSClientConfig.KeyData) > 0 {\n\t\tauthInfo.ClientKeyData = restConfig.TLSClientConfig.KeyData\n\t\thaveCredentials = true\n\t}\n\tif restConfig.Username != \"\" {\n\t\tauthInfo.Username = restConfig.Username\n\t\thaveCredentials = true\n\t}\n\tif restConfig.Password != \"\" {\n\t\tauthInfo.Password = restConfig.Password\n\t\thaveCredentials = true\n\t}\n\tif restConfig.BearerToken != \"\" {\n\t\tauthInfo.Token = restConfig.BearerToken\n\t\thaveCredentials = true\n\t}\n\tif restConfig.ExecProvider != nil {\n\t\tauthInfo.Exec = restConfig.ExecProvider\n\t\thaveCredentials = true\n\t}\n\tif restConfig.ExecProvider == nil && !haveCredentials {\n\t\t// If no credentials were set (or there was no exec provider), we assume in-cluster config.\n\t\t// In-cluster configs from the go-client will no longer set bearer tokens, so we set the\n\t\t// well known token path. See issue #774\n\t\tauthInfo.TokenFile = \"/var/run/secrets/kubernetes.io/serviceaccount/token\"\n\t}\n\treturn &authInfo\n}", "func MakeNewAuth(username string, password string) *Auth {\n\treturn &Auth{\n\t\tId: 1,\n\t\tUsername: username,\n\t\tPassword: password,\n\t}\n}", "func New(ctx context.Context, next http.Handler, config *Config, name string) (http.Handler, error) {\n\treturn &VaultAuth{\n\t\tnext: next,\n\t\tname: name,\n\t\tconfig: config,\n\t}, nil\n}", "func NewBaseAuth(info Info) Wrapper {\n\treturn base{info}\n}", "func NewSSHAuth() Component {\n\treturn &sshAuth{}\n}", "func NewAuthFile(path string) (*AuthFile, error) {\n\ta := &AuthFile{\n\t\tpath: path,\n\t\tlock: sync.RWMutex{},\n\t\ttab: make(map[string]string),\n\t}\n\t_, err := a.Refresh()\n\tif err != nil {\n\t\treturn a, err\n\t}\n\treturn a, nil\n}", "func New(name string) (Authable, error) {\n\tfn := auths[name]\n\tif fn == nil {\n\t\treturn nil, ErrNotFound{name: name}\n\t}\n\tdb, err := fn()\n\n\tif err != nil {\n\t\treturn nil, authError{name: name, originalErr: err}\n\t}\n\n\treturn db, nil\n}", "func NewAuthServerWithNewState() envoy_service_auth_v3.AuthorizationServer {\n\treturn &serverWithNewState{}\n}", "func NewAuthHandler() *AuthHandler {\r\n\ta := &AuthHandler{\r\n\t\tUsers: make(map[string]string),\r\n\t}\r\n\treturn a\r\n}", "func (o *Paypal) NewAuth(w http.ResponseWriter, r *http.Request) {\n\tnonce := uuid.NewV4().String()\n\tstate := uuid.NewV4().String()\n\n\tvals := url.Values{}\n\tvals.Add(\"client_id\", o.ClientID)\n\tvals.Add(\"response_type\", \"code\")\n\tvals.Add(\"scope\", \"openid profile\")\n\tvals.Add(\"redirect_uri\", o.RedirectURI)\n\tvals.Add(\"nonce\", nonce)\n\tvals.Add(\"state\", state)\n\turlParams := vals.Encode()\n\n\t// CSRF Prevention using nonce and state\n\tsession, _ := o.SessionStore.Get(r, \"poidc\")\n\tsession.Values[\"nonce\"] = nonce\n\tsession.Values[\"state\"] = state\n\tsession.Save(r, w)\n\n\thttp.Redirect(w, r, \"https://www.sandbox.paypal.com/webapps/auth/protocol/openidconnect/v1/authorize?\"+urlParams, http.StatusFound)\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewOptions sets the options field to a newly allocated ConnectionOptions struct, preferring placement in s's segment.
func (s RegistrationServer_registerConnection_Params) NewOptions() (ConnectionOptions, error) { ss, err := NewConnectionOptions(s.Struct.Segment()) if err != nil { return ConnectionOptions{}, err } err = s.Struct.SetPtr(2, ss.Struct.ToPtr()) return ss, err }
[ "func newConnOptions() *connOptions {\n\treturn &connOptions{\n\t\tBufferSize: defaultBufferSize,\n\t}\n}", "func NewOptions(maxSegmentSize uint16, windowScale uint8, timestamp,\n\techoTimestamp uint32) []uint8 {\n\toptions := []uint8{}\n\n\tif maxSegmentSize != NoSegmentSize {\n\t\toptions = append(options, 2, 4, uint8(maxSegmentSize>>8), uint8(maxSegmentSize))\n\t}\n\n\tif windowScale != NoWindowScale {\n\t\toptions = append(options, 3, 3, windowScale)\n\t}\n\n\tif timestamp != NoTimestamp {\n\t\toptions = append(options, 8, 10, uint8(timestamp>>24), uint8(timestamp>>16),\n\t\t\tuint8(timestamp>>8), uint8(timestamp))\n\t\toptions = append(options, uint8(echoTimestamp>>24), uint8(echoTimestamp>>16),\n\t\t\tuint8(echoTimestamp>>8), uint8(echoTimestamp))\n\t}\n\n\t// End-of-options 0 value.\n\toptions = append(options, 0)\n\n\t// Padding to a multiple of 32.\n\tfor len(options)%4 != 0 {\n\t\toptions = append(options, 0)\n\t}\n\n\treturn options\n}", "func (s TunnelServer_authenticate_Params) NewOptions() (RegistrationOptions, error) {\n\tss, err := NewRegistrationOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegistrationOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func newOptions() *options {\n\treturn &options{\n\t\tfillColor: cell.ColorNumber(DefaultFillColorNumber),\n\t\tplaceHolderColor: cell.ColorNumber(DefaultPlaceHolderColorNumber),\n\t\thighlightedColor: cell.ColorNumber(DefaultHighlightedColorNumber),\n\t\tcursorColor: cell.ColorNumber(DefaultCursorColorNumber),\n\t\tlabelAlign: DefaultLabelAlign,\n\t}\n}", "func NewConnectionOptions_List(s *capnp.Segment, sz int32) (ConnectionOptions_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 2}, sz)\n\treturn ConnectionOptions_List{l}, err\n}", "func NewOptions() IOptions {\n\treturn &Options{\n\t\tcache: 0,\n\t\tgzip: false,\n\t}\n}", "func NewOptions() *Common {\n\treturn &Common{}\n}", "func (s TunnelServer_registerTunnel_Params) NewOptions() (RegistrationOptions, error) {\n\tss, err := NewRegistrationOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegistrationOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (c *WriterConfiguration) NewOptions(\n\tcs client.Client,\n\tiOpts instrument.Options,\n\trwOptions xio.Options,\n) (writer.Options, error) {\n\topts := writer.NewOptions().\n\t\tSetTopicName(c.TopicName).\n\t\tSetPlacementOptions(c.PlacementOptions.NewOptions()).\n\t\tSetInstrumentOptions(iOpts).\n\t\tSetWithoutConsumerScope(c.WithoutConsumerScope)\n\n\tkvOpts, err := c.TopicServiceOverride.NewOverrideOptions()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttopicServiceOpts := topic.NewServiceOptions().\n\t\tSetConfigService(cs).\n\t\tSetKVOverrideOptions(kvOpts)\n\tts, err := topic.NewService(topicServiceOpts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\topts = opts.SetTopicService(ts)\n\n\tif c.TopicWatchInitTimeout != nil {\n\t\topts = opts.SetTopicWatchInitTimeout(*c.TopicWatchInitTimeout)\n\t}\n\tsd, err := cs.Services(c.PlacementServiceOverride.NewOptions())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\topts = opts.SetServiceDiscovery(sd)\n\n\tif c.PlacementWatchInitTimeout != nil {\n\t\topts = opts.SetPlacementWatchInitTimeout(*c.PlacementWatchInitTimeout)\n\t}\n\topts, err = c.setRetryOptions(opts, iOpts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif c.MessageQueueNewWritesScanInterval != nil {\n\t\topts = opts.SetMessageQueueNewWritesScanInterval(*c.MessageQueueNewWritesScanInterval)\n\t}\n\tif c.MessageQueueFullScanInterval != nil {\n\t\topts = opts.SetMessageQueueFullScanInterval(*c.MessageQueueFullScanInterval)\n\t}\n\tif c.MessageQueueScanBatchSize != nil {\n\t\topts = opts.SetMessageQueueScanBatchSize(*c.MessageQueueScanBatchSize)\n\t}\n\tif c.InitialAckMapSize != nil {\n\t\topts = opts.SetInitialAckMapSize(*c.InitialAckMapSize)\n\t}\n\tif c.CloseCheckInterval != nil {\n\t\topts = opts.SetCloseCheckInterval(*c.CloseCheckInterval)\n\t}\n\tif c.AckErrorRetry != nil {\n\t\topts = opts.SetAckErrorRetryOptions(c.AckErrorRetry.NewOptions(tally.NoopScope))\n\t}\n\tif c.Encoder != nil {\n\t\topts = opts.SetEncoderOptions(c.Encoder.NewOptions(iOpts))\n\t}\n\tif c.Decoder != nil {\n\t\topts = opts.SetDecoderOptions(c.Decoder.NewOptions(iOpts))\n\t}\n\tif c.Connection != nil {\n\t\topts = opts.SetConnectionOptions(c.Connection.NewOptions(iOpts))\n\t}\n\n\topts = opts.SetIgnoreCutoffCutover(c.IgnoreCutoffCutover)\n\n\topts = opts.SetDecoderOptions(opts.DecoderOptions().SetRWOptions(rwOptions))\n\treturn opts, nil\n}", "func newChannelOptions() channelOptions {\n\treturn channelOptions{\n\t\tSourcePort: TransferPort,\n\t\tSourceVersion: TransferVersion,\n\t\tTargetPort: TransferPort,\n\t\tTargetVersion: TransferVersion,\n\t\tOrdering: OrderingUnordered,\n\t}\n}", "func newNativeOptions(c *C.rocksdb_options_t) *Options {\n\treturn &Options{c: c}\n}", "func CreateOptions(c dict.Dicter) (opts *redis.Options, err error) {\n\tnetwork, err := c.String(ConfigKeyNetwork, &defaultNetwork)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\taddr, err := c.String(ConfigKeyAddress, &defaultAddress)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\thost, _, err := net.SplitHostPort(addr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif host == \"\" {\n\t\treturn nil, &ErrHostMissing{msg: fmt.Sprintf(\"no host provided in '%s'\", addr)}\n\t}\n\n\tpassword, err := c.String(ConfigKeyPassword, &defaultPassword)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdb, err := c.Int(ConfigKeyDB, &defaultDB)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\to := &redis.Options{\n\t\tNetwork: network,\n\t\tAddr: addr,\n\t\tPassword: password,\n\t\tDB: db,\n\t\tPoolSize: 2,\n\t\tDialTimeout: 3 * time.Second,\n\t}\n\n\tssl, err := c.Bool(ConfigKeySSL, &defaultSSL)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif ssl {\n\t\to.TLSConfig = &tls.Config{ServerName: host}\n\t}\n\n\treturn o, nil\n}", "func (s ConnectionOptions) NewClient() (ClientInfo, error) {\n\tss, err := NewClientInfo(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ClientInfo{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func ConfigureOptions(fs *flag.FlagSet, args []string, printVersion, printHelp, printTLSHelp func()) (*Options, error) {\n\topts := &Options{}\n\tvar (\n\t\tshowVersion bool\n\t\tshowHelp bool\n\t\tshowTLSHelp bool\n\t\tsignal string\n\t\tconfigFile string\n\t\tdbgAndTrace bool\n\t\ttrcAndVerboseTrc bool\n\t\tdbgAndTrcAndVerboseTrc bool\n\t\terr error\n\t)\n\n\tfs.BoolVar(&showHelp, \"h\", false, \"Show this message.\")\n\tfs.BoolVar(&showHelp, \"help\", false, \"Show this message.\")\n\tfs.IntVar(&opts.Port, \"port\", 0, \"Port to listen on.\")\n\tfs.IntVar(&opts.Port, \"p\", 0, \"Port to listen on.\")\n\tfs.StringVar(&opts.ServerName, \"n\", \"\", \"Server name.\")\n\tfs.StringVar(&opts.ServerName, \"name\", \"\", \"Server name.\")\n\tfs.StringVar(&opts.ServerName, \"server_name\", \"\", \"Server name.\")\n\tfs.StringVar(&opts.Host, \"addr\", \"\", \"Network host to listen on.\")\n\tfs.StringVar(&opts.Host, \"a\", \"\", \"Network host to listen on.\")\n\tfs.StringVar(&opts.Host, \"net\", \"\", \"Network host to listen on.\")\n\tfs.StringVar(&opts.ClientAdvertise, \"client_advertise\", \"\", \"Client URL to advertise to other servers.\")\n\tfs.BoolVar(&opts.Debug, \"D\", false, \"Enable Debug logging.\")\n\tfs.BoolVar(&opts.Debug, \"debug\", false, \"Enable Debug logging.\")\n\tfs.BoolVar(&opts.Trace, \"V\", false, \"Enable Trace logging.\")\n\tfs.BoolVar(&trcAndVerboseTrc, \"VV\", false, \"Enable Verbose Trace logging. (Traces system account as well)\")\n\tfs.BoolVar(&opts.Trace, \"trace\", false, \"Enable Trace logging.\")\n\tfs.BoolVar(&dbgAndTrace, \"DV\", false, \"Enable Debug and Trace logging.\")\n\tfs.BoolVar(&dbgAndTrcAndVerboseTrc, \"DVV\", false, \"Enable Debug and Verbose Trace logging. (Traces system account as well)\")\n\tfs.BoolVar(&opts.Logtime, \"T\", true, \"Timestamp log entries.\")\n\tfs.BoolVar(&opts.Logtime, \"logtime\", true, \"Timestamp log entries.\")\n\tfs.BoolVar(&opts.LogtimeUTC, \"logtime_utc\", false, \"Timestamps in UTC instead of local timezone.\")\n\tfs.StringVar(&opts.Username, \"user\", _EMPTY_, \"Username required for connection.\")\n\tfs.StringVar(&opts.Password, \"pass\", _EMPTY_, \"Password required for connection.\")\n\tfs.StringVar(&opts.Authorization, \"auth\", _EMPTY_, \"Authorization token required for connection.\")\n\tfs.IntVar(&opts.HTTPPort, \"m\", 0, \"HTTP Port for /varz, /connz endpoints.\")\n\tfs.IntVar(&opts.HTTPPort, \"http_port\", 0, \"HTTP Port for /varz, /connz endpoints.\")\n\tfs.IntVar(&opts.HTTPSPort, \"ms\", 0, \"HTTPS Port for /varz, /connz endpoints.\")\n\tfs.IntVar(&opts.HTTPSPort, \"https_port\", 0, \"HTTPS Port for /varz, /connz endpoints.\")\n\tfs.StringVar(&configFile, \"c\", \"\", \"Configuration file.\")\n\tfs.StringVar(&configFile, \"config\", \"\", \"Configuration file.\")\n\tfs.BoolVar(&opts.CheckConfig, \"t\", false, \"Check configuration and exit.\")\n\tfs.StringVar(&signal, \"sl\", \"\", \"Send signal to nats-server process (ldm, stop, quit, term, reopen, reload).\")\n\tfs.StringVar(&signal, \"signal\", \"\", \"Send signal to nats-server process (ldm, stop, quit, term, reopen, reload).\")\n\tfs.StringVar(&opts.PidFile, \"P\", \"\", \"File to store process pid.\")\n\tfs.StringVar(&opts.PidFile, \"pid\", \"\", \"File to store process pid.\")\n\tfs.StringVar(&opts.PortsFileDir, \"ports_file_dir\", \"\", \"Creates a ports file in the specified directory (<executable_name>_<pid>.ports).\")\n\tfs.StringVar(&opts.LogFile, \"l\", \"\", \"File to store logging output.\")\n\tfs.StringVar(&opts.LogFile, \"log\", \"\", \"File to store logging output.\")\n\tfs.Int64Var(&opts.LogSizeLimit, \"log_size_limit\", 0, \"Logfile size limit being auto-rotated\")\n\tfs.BoolVar(&opts.Syslog, \"s\", false, \"Enable syslog as log method.\")\n\tfs.BoolVar(&opts.Syslog, \"syslog\", false, \"Enable syslog as log method.\")\n\tfs.StringVar(&opts.RemoteSyslog, \"r\", \"\", \"Syslog server addr (udp://127.0.0.1:514).\")\n\tfs.StringVar(&opts.RemoteSyslog, \"remote_syslog\", \"\", \"Syslog server addr (udp://127.0.0.1:514).\")\n\tfs.BoolVar(&showVersion, \"version\", false, \"Print version information.\")\n\tfs.BoolVar(&showVersion, \"v\", false, \"Print version information.\")\n\tfs.IntVar(&opts.ProfPort, \"profile\", 0, \"Profiling HTTP port.\")\n\tfs.StringVar(&opts.RoutesStr, \"routes\", \"\", \"Routes to actively solicit a connection.\")\n\tfs.StringVar(&opts.Cluster.ListenStr, \"cluster\", \"\", \"Cluster url from which members can solicit routes.\")\n\tfs.StringVar(&opts.Cluster.ListenStr, \"cluster_listen\", \"\", \"Cluster url from which members can solicit routes.\")\n\tfs.StringVar(&opts.Cluster.Advertise, \"cluster_advertise\", \"\", \"Cluster URL to advertise to other servers.\")\n\tfs.BoolVar(&opts.Cluster.NoAdvertise, \"no_advertise\", false, \"Advertise known cluster IPs to clients.\")\n\tfs.IntVar(&opts.Cluster.ConnectRetries, \"connect_retries\", 0, \"For implicit routes, number of connect retries.\")\n\tfs.StringVar(&opts.Cluster.Name, \"cluster_name\", \"\", \"Cluster Name, if not set one will be dynamically generated.\")\n\tfs.BoolVar(&showTLSHelp, \"help_tls\", false, \"TLS help.\")\n\tfs.BoolVar(&opts.TLS, \"tls\", false, \"Enable TLS.\")\n\tfs.BoolVar(&opts.TLSVerify, \"tlsverify\", false, \"Enable TLS with client verification.\")\n\tfs.StringVar(&opts.TLSCert, \"tlscert\", \"\", \"Server certificate file.\")\n\tfs.StringVar(&opts.TLSKey, \"tlskey\", \"\", \"Private key for server certificate.\")\n\tfs.StringVar(&opts.TLSCaCert, \"tlscacert\", \"\", \"Client certificate CA for verification.\")\n\tfs.IntVar(&opts.MaxTracedMsgLen, \"max_traced_msg_len\", 0, \"Maximum printable length for traced messages. 0 for unlimited.\")\n\tfs.BoolVar(&opts.JetStream, \"js\", false, \"Enable JetStream.\")\n\tfs.BoolVar(&opts.JetStream, \"jetstream\", false, \"Enable JetStream.\")\n\tfs.StringVar(&opts.StoreDir, \"sd\", \"\", \"Storage directory.\")\n\tfs.StringVar(&opts.StoreDir, \"store_dir\", \"\", \"Storage directory.\")\n\n\t// The flags definition above set \"default\" values to some of the options.\n\t// Calling Parse() here will override the default options with any value\n\t// specified from the command line. This is ok. We will then update the\n\t// options with the content of the configuration file (if present), and then,\n\t// call Parse() again to override the default+config with command line values.\n\t// Calling Parse() before processing config file is necessary since configFile\n\t// itself is a command line argument, and also Parse() is required in order\n\t// to know if user wants simply to show \"help\" or \"version\", etc...\n\tif err := fs.Parse(args); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif showVersion {\n\t\tprintVersion()\n\t\treturn nil, nil\n\t}\n\n\tif showHelp {\n\t\tprintHelp()\n\t\treturn nil, nil\n\t}\n\n\tif showTLSHelp {\n\t\tprintTLSHelp()\n\t\treturn nil, nil\n\t}\n\n\t// Process args looking for non-flag options,\n\t// 'version' and 'help' only for now\n\tshowVersion, showHelp, err = ProcessCommandLineArgs(fs)\n\tif err != nil {\n\t\treturn nil, err\n\t} else if showVersion {\n\t\tprintVersion()\n\t\treturn nil, nil\n\t} else if showHelp {\n\t\tprintHelp()\n\t\treturn nil, nil\n\t}\n\n\t// Snapshot flag options.\n\tFlagSnapshot = opts.Clone()\n\n\t// Keep track of the boolean flags that were explicitly set with their value.\n\tfs.Visit(func(f *flag.Flag) {\n\t\tswitch f.Name {\n\t\tcase \"DVV\":\n\t\t\ttrackExplicitVal(FlagSnapshot, &FlagSnapshot.inCmdLine, \"Debug\", dbgAndTrcAndVerboseTrc)\n\t\t\ttrackExplicitVal(FlagSnapshot, &FlagSnapshot.inCmdLine, \"Trace\", dbgAndTrcAndVerboseTrc)\n\t\t\ttrackExplicitVal(FlagSnapshot, &FlagSnapshot.inCmdLine, \"TraceVerbose\", dbgAndTrcAndVerboseTrc)\n\t\tcase \"DV\":\n\t\t\ttrackExplicitVal(FlagSnapshot, &FlagSnapshot.inCmdLine, \"Debug\", dbgAndTrace)\n\t\t\ttrackExplicitVal(FlagSnapshot, &FlagSnapshot.inCmdLine, \"Trace\", dbgAndTrace)\n\t\tcase \"D\":\n\t\t\tfallthrough\n\t\tcase \"debug\":\n\t\t\ttrackExplicitVal(FlagSnapshot, &FlagSnapshot.inCmdLine, \"Debug\", FlagSnapshot.Debug)\n\t\tcase \"VV\":\n\t\t\ttrackExplicitVal(FlagSnapshot, &FlagSnapshot.inCmdLine, \"Trace\", trcAndVerboseTrc)\n\t\t\ttrackExplicitVal(FlagSnapshot, &FlagSnapshot.inCmdLine, \"TraceVerbose\", trcAndVerboseTrc)\n\t\tcase \"V\":\n\t\t\tfallthrough\n\t\tcase \"trace\":\n\t\t\ttrackExplicitVal(FlagSnapshot, &FlagSnapshot.inCmdLine, \"Trace\", FlagSnapshot.Trace)\n\t\tcase \"T\":\n\t\t\tfallthrough\n\t\tcase \"logtime\":\n\t\t\ttrackExplicitVal(FlagSnapshot, &FlagSnapshot.inCmdLine, \"Logtime\", FlagSnapshot.Logtime)\n\t\tcase \"s\":\n\t\t\tfallthrough\n\t\tcase \"syslog\":\n\t\t\ttrackExplicitVal(FlagSnapshot, &FlagSnapshot.inCmdLine, \"Syslog\", FlagSnapshot.Syslog)\n\t\tcase \"no_advertise\":\n\t\t\ttrackExplicitVal(FlagSnapshot, &FlagSnapshot.inCmdLine, \"Cluster.NoAdvertise\", FlagSnapshot.Cluster.NoAdvertise)\n\t\t}\n\t})\n\n\t// Process signal control.\n\tif signal != _EMPTY_ {\n\t\tif err := processSignal(signal); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t// Parse config if given\n\tif configFile != _EMPTY_ {\n\t\t// This will update the options with values from the config file.\n\t\terr := opts.ProcessConfigFile(configFile)\n\t\tif err != nil {\n\t\t\tif opts.CheckConfig {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tif cerr, ok := err.(*processConfigErr); !ok || len(cerr.Errors()) != 0 {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\t// If we get here we only have warnings and can still continue\n\t\t\tfmt.Fprint(os.Stderr, err)\n\t\t} else if opts.CheckConfig {\n\t\t\t// Report configuration file syntax test was successful and exit.\n\t\t\treturn opts, nil\n\t\t}\n\n\t\t// Call this again to override config file options with options from command line.\n\t\t// Note: We don't need to check error here since if there was an error, it would\n\t\t// have been caught the first time this function was called (after setting up the\n\t\t// flags).\n\t\tfs.Parse(args)\n\t} else if opts.CheckConfig {\n\t\treturn nil, fmt.Errorf(\"must specify [-c, --config] option to check configuration file syntax\")\n\t}\n\n\t// Special handling of some flags\n\tvar (\n\t\tflagErr error\n\t\ttlsDisabled bool\n\t\ttlsOverride bool\n\t)\n\tfs.Visit(func(f *flag.Flag) {\n\t\t// short-circuit if an error was encountered\n\t\tif flagErr != nil {\n\t\t\treturn\n\t\t}\n\t\tif strings.HasPrefix(f.Name, \"tls\") {\n\t\t\tif f.Name == \"tls\" {\n\t\t\t\tif !opts.TLS {\n\t\t\t\t\t// User has specified \"-tls=false\", we need to disable TLS\n\t\t\t\t\topts.TLSConfig = nil\n\t\t\t\t\ttlsDisabled = true\n\t\t\t\t\ttlsOverride = false\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\ttlsOverride = true\n\t\t\t} else if !tlsDisabled {\n\t\t\t\ttlsOverride = true\n\t\t\t}\n\t\t} else {\n\t\t\tswitch f.Name {\n\t\t\tcase \"VV\":\n\t\t\t\topts.Trace, opts.TraceVerbose = trcAndVerboseTrc, trcAndVerboseTrc\n\t\t\tcase \"DVV\":\n\t\t\t\topts.Trace, opts.Debug, opts.TraceVerbose = dbgAndTrcAndVerboseTrc, dbgAndTrcAndVerboseTrc, dbgAndTrcAndVerboseTrc\n\t\t\tcase \"DV\":\n\t\t\t\t// Check value to support -DV=false\n\t\t\t\topts.Trace, opts.Debug = dbgAndTrace, dbgAndTrace\n\t\t\tcase \"cluster\", \"cluster_listen\":\n\t\t\t\t// Override cluster config if explicitly set via flags.\n\t\t\t\tflagErr = overrideCluster(opts)\n\t\t\tcase \"routes\":\n\t\t\t\t// Keep in mind that the flag has updated opts.RoutesStr at this point.\n\t\t\t\tif opts.RoutesStr == \"\" {\n\t\t\t\t\t// Set routes array to nil since routes string is empty\n\t\t\t\t\topts.Routes = nil\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\trouteUrls := RoutesFromStr(opts.RoutesStr)\n\t\t\t\topts.Routes = routeUrls\n\t\t\t}\n\t\t}\n\t})\n\tif flagErr != nil {\n\t\treturn nil, flagErr\n\t}\n\n\t// This will be true if some of the `-tls` params have been set and\n\t// `-tls=false` has not been set.\n\tif tlsOverride {\n\t\tif err := overrideTLS(opts); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t// If we don't have cluster defined in the configuration\n\t// file and no cluster listen string override, but we do\n\t// have a routes override, we need to report misconfiguration.\n\tif opts.RoutesStr != \"\" && opts.Cluster.ListenStr == \"\" && opts.Cluster.Host == \"\" && opts.Cluster.Port == 0 {\n\t\treturn nil, errors.New(\"solicited routes require cluster capabilities, e.g. --cluster\")\n\t}\n\n\treturn opts, nil\n}", "func NewOptions() *Options {\n\treturn &Options{\n\t\tOptions: scheduleroptions.NewOptions(),\n\t}\n}", "func NewParserPoolOptions() *ParserPoolOptions {\n\treturn &ParserPoolOptions{\n\t\tinstrumentOpts: instrument.NewOptions(),\n\t\tsize: 4096,\n\t}\n}", "func (cfg OverrideConfiguration) NewOptions() OverrideOptions {\n\treturn NewOverrideOptions().\n\t\tSetNamespaceOptions(cfg.Namespaces.NewOptions())\n}", "func (cfg ElectionConfiguration) NewOptions() ElectionOptions {\n\topts := NewElectionOptions()\n\tif cfg.LeaderTimeout != nil {\n\t\topts = opts.SetLeaderTimeout(*cfg.LeaderTimeout)\n\t}\n\tif cfg.ResignTimeout != nil {\n\t\topts = opts.SetResignTimeout(*cfg.ResignTimeout)\n\t}\n\tif cfg.TTLSeconds != nil {\n\t\topts = opts.SetTTLSecs(*cfg.TTLSeconds)\n\t}\n\treturn opts\n}", "func NewOptions() *Options {\n\tvar url *url.URL\n\n\tif os.Getenv(\"PRERENDER_SERVICE_URL\") != \"\" {\n\t\turl, _ = url.Parse(os.Getenv(\"PRERENDER_SERVICE_URL\"))\n\t} else {\n\t\turl, _ = url.Parse(\"https://service.headless-render-api.com/\")\n\t}\n\n\treturn &Options{\n\t\tPrerenderURL: url,\n\t\tToken: os.Getenv(\"PRERENDER_TOKEN\"),\n\t\tUsingAppEngine: false,\n\t\tBotsOnly: false,\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewRegistrationServer_registerConnection_Params creates a new list of RegistrationServer_registerConnection_Params.
func NewRegistrationServer_registerConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Params_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 3}, sz) return RegistrationServer_registerConnection_Params_List{l}, err }
[ "func NewRegistrationServer_unregisterConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Params_List{l}, err\n}", "func NewTunnelServer_registerTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_registerTunnel_Params_List{l}, err\n}", "func NewRegistrationServer_registerConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_registerConnection_Results_List{l}, err\n}", "func (s RegistrationServer_registerConnection_Params) NewOptions() (ConnectionOptions, error) {\n\tss, err := NewConnectionOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func UA_RegisterServerRequest_new() []UA_RegisterServerRequest {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[182]))[:]).([]UA_RegisterServerRequest)\n}", "func UA_RegisterServer2Request_new() []UA_RegisterServer2Request {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[190]))[:]).([]UA_RegisterServer2Request)\n}", "func (r *Register) RegisterServerAll(nameServerAddressList *singlylinkedlist.List) {\n\tif nameServerAddressList != nil && !nameServerAddressList.Empty() {\n\t\trequest := namesrv.Request{}\n\t\trequest.ActionType = namesrv.ActionRegister\n\t\trreq := common.RegisterRequestConfig\n\t\tif rreq.ServerAddr == \"\" {\n\t\t\trreq.ServerAddr = netutil.GetLocalIP()\n\t\t}\n\t\tif rreq.HaServerAddr == \"\" {\n\t\t\trreq.HaServerAddr = netutil.GetLocalIP()\n\t\t}\n\t\tbody, _ := json.Marshal(rreq)\n\t\trequest.Body = body\n\t\twg := sync.WaitGroup{}\n\t\twg.Add(nameServerAddressList.Size())\n\t\tnameServerAddressList.Each(func(index int, value interface{}) {\n\t\t\tnamesrvAddr, _ := value.(string)\n\t\t\tgo registerServer(namesrvAddr, 1000, request, &wg)\n\t\t})\n\t\twg.Wait()\n\t}\n}", "func NewRegistrationServer_updateLocalConfiguration_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_updateLocalConfiguration_Params_List{l}, err\n}", "func NewTunnelRegistration_List(s *capnp.Segment, sz int32) (TunnelRegistration_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 6}, sz)\n\treturn TunnelRegistration_List{l}, err\n}", "func UA_RegisterServerResponse_new() []UA_RegisterServerResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[149]))[:]).([]UA_RegisterServerResponse)\n}", "func (s TunnelServer_registerTunnel_Params) NewOptions() (RegistrationOptions, error) {\n\tss, err := NewRegistrationOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegistrationOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func registerToServer(serverConnection *rpc.Client, serverAddr string) (err error) {\n\t//var directory OnionDirectory\n\tvar directory map[string]resource.OnionInfo\n\terr = serverConnection.Call(\"ServerRPC.RegisterServer\", localAddress, &directory)\n\tcheckError(err, \"RegisterToServer: serverConnection.Call\")\n\n\tserverNeighbours.Lock()\n\tserverNeighbours.neighbourMap[serverAddr] = serverConnection\n\tserverNeighbours.Unlock()\n\n\t// Initiate the heartbeat\n\ttimeStamp := time.Now().UnixNano()\n\tserverHeartBeats.Lock()\n\tserverHeartBeats.HeartBeatMap[serverAddr] = timeStamp\n\tserverHeartBeats.Unlock()\n\n\treturn err\n}", "func RegisterServer(n string) RegisterOption {\n\treturn func(o *registerOptions) {\n\t\to.servers = append(o.servers, n)\n\t}\n}", "func NewTunnelServer_unregisterTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Params_List{l}, err\n}", "func UA_Client_Service_registerNodes(client []UA_Client, request UA_RegisterNodesRequest) UA_RegisterNodesResponse {\n\tvar response UA_RegisterNodesResponse\n\t__UA_Client_Service(client, (*[100000000]UA_RegisterNodesRequest)(unsafe.Pointer(&request))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[91]))[:], (*[100000000]UA_RegisterNodesResponse)(unsafe.Pointer(&response))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[120]))[:])\n\treturn response\n}", "func UA_RegisterServer2Response_new() []UA_RegisterServer2Response {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[165]))[:]).([]UA_RegisterServer2Response)\n}", "func UA_RegisteredServer_new() []UA_RegisteredServer {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[180]))[:]).([]UA_RegisteredServer)\n}", "func Service_RegisterNodes(server []UA_Server, session []UA_Session, request []UA_RegisterNodesRequest, response []UA_RegisterNodesResponse) {\n\tUA_LOG_DEBUG(UA_Logger(server[0].config.logger), UA_LOGCATEGORY_SESSION, []byte(\"Connection %i | SecureChannel %i | Session %08x-%04x-%04x-%02x%02x-%02x%02x%02x%02x%02x%02x | Processing RegisterNodesRequest%.0s\\x00\"), (func() int {\n\t\tif (session)[0].header.channel != nil {\n\t\t\treturn (func() int {\n\t\t\t\tif (session)[0].header.channel[0].connection != nil {\n\t\t\t\t\treturn int((__int32_t((int32_t((UA_Int32((session)[0].header.channel[0].connection[0].sockfd)))))))\n\t\t\t\t}\n\t\t\t\treturn 0\n\t\t\t}())\n\t\t}\n\t\treturn 0\n\t}()), (func() uint32 {\n\t\tif (session)[0].header.channel != nil {\n\t\t\treturn uint32((uint32((uint32_t((UA_UInt32((session)[0].header.channel[0].securityToken.channelId)))))))\n\t\t}\n\t\treturn 0\n\t}()), UA_UInt32((*(session)[0].sessionId.identifier.guid()).data1), int(uint16((uint16((uint16_t((UA_UInt16((*(session)[0].sessionId.identifier.guid()).data2)))))))), int(uint16((uint16((uint16_t((UA_UInt16((*(session)[0].sessionId.identifier.guid()).data3)))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][0])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][1])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][2])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][3])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][4])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][5])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][6])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][7])))))))), []byte(\"\\x00\"))\n\tif uint(request[0].nodesToRegisterSize) == uint((0)) {\n\t\t//TODO: hang the nodeids to the session if really needed\n\t\tresponse[0].responseHeader.serviceResult = UA_StatusCode((uint32_t((uint32((uint32(2148466688)))))))\n\t\treturn\n\t}\n\tif UA_UInt32(server[0].config.maxNodesPerRegisterNodes) != UA_UInt32((uint32_t((uint32((0)))))) && uint(request[0].nodesToRegisterSize) > uint((uint32((uint32((uint32_t((UA_UInt32(server[0].config.maxNodesPerRegisterNodes))))))))) {\n\t\tresponse[0].responseHeader.serviceResult = UA_StatusCode((uint32_t((uint32((uint32(2148532224)))))))\n\t\treturn\n\t}\n\tresponse[0].responseHeader.serviceResult = UA_Array_copy(request[0].nodesToRegister, uint(request[0].nodesToRegisterSize), (*[100000000][]UA_NodeId)(unsafe.Pointer(&response[0].registeredNodeIds))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[16]))[:])\n\tif UA_StatusCode(response[0].responseHeader.serviceResult) == UA_StatusCode((uint32_t((uint32((0)))))) {\n\t\tresponse[0].registeredNodeIdsSize = uint(request[0].nodesToRegisterSize)\n\t}\n}", "func (rscp RegisteredServerCreateParameters) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tif rscp.RegisteredServerCreateParametersProperties != nil {\n\t\tobjectMap[\"properties\"] = rscp.RegisteredServerCreateParametersProperties\n\t}\n\treturn json.Marshal(objectMap)\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewResult sets the result field to a newly allocated ConnectionResponse struct, preferring placement in s's segment.
func (s RegistrationServer_registerConnection_Results) NewResult() (ConnectionResponse, error) { ss, err := NewConnectionResponse(s.Struct.Segment()) if err != nil { return ConnectionResponse{}, err } err = s.Struct.SetPtr(0, ss.Struct.ToPtr()) return ss, err }
[ "func (s TunnelServer_authenticate_Results) NewResult() (AuthenticateResponse, error) {\n\tss, err := NewAuthenticateResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn AuthenticateResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_reconnectTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_getServerInfo_Results) NewResult() (ServerInfo, error) {\n\tss, err := NewServerInfo(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ServerInfo{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s ConnectionResponse_result) NewConnectionDetails() (ConnectionDetails, error) {\n\ts.Struct.SetUint16(0, 1)\n\tss, err := NewConnectionDetails(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionDetails{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s ConfigurationManager_updateConfiguration_Results) NewResult() (UpdateConfigurationResponse, error) {\n\tss, err := NewUpdateConfigurationResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn UpdateConfigurationResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_registerTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func newResult(ip net.IP, domain, sender, hostname string) (r *Result) {\n\tbsender := []byte(sender)\n\n\tat := bytes.Index(bsender, []byte{'@'})\n\tr = &Result{\n\t\tIP: ip,\n\t\tDomain: []byte(domain),\n\t\tSender: []byte(sender),\n\t\tHostname: []byte(hostname),\n\t\tsenderLocal: bsender[:at],\n\t\tsenderDomain: bsender[at+1:],\n\t}\n\n\tif !libnet.IsHostnameValid(r.Domain, true) {\n\t\tr.Code = ResultCodeNone\n\t\tr.Err = \"invalid domain name\"\n\t\treturn\n\t}\n\n\treturn\n}", "func (s CoreBanking_createAccount_Results) NewRes() (Response, error) {\n\tss, err := NewResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Response{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s CoreBanking_transferFunds_Results) NewRes() (Response, error) {\n\tss, err := NewResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Response{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func ConstructResult(hnsNetwork *hcsshim.HNSNetwork, hnsEndpoint *hcsshim.HNSEndpoint) (*current.Result, error) {\n\tresultInterface := &current.Interface{\n\t\tName: hnsEndpoint.Name,\n\t\tMac: hnsEndpoint.MacAddress,\n\t}\n\t_, ipSubnet, err := net.ParseCIDR(hnsNetwork.Subnets[0].AddressPrefix)\n\tif err != nil {\n\t\treturn nil, errors.Annotatef(err, \"failed to parse CIDR from %s\", hnsNetwork.Subnets[0].AddressPrefix)\n\t}\n\n\tvar ipVersion string\n\tif ipv4 := hnsEndpoint.IPAddress.To4(); ipv4 != nil {\n\t\tipVersion = \"4\"\n\t} else if ipv6 := hnsEndpoint.IPAddress.To16(); ipv6 != nil {\n\t\tipVersion = \"6\"\n\t} else {\n\t\treturn nil, fmt.Errorf(\"IPAddress of HNSEndpoint %s isn't a valid ipv4 or ipv6 Address\", hnsEndpoint.Name)\n\t}\n\n\tresultIPConfig := &current.IPConfig{\n\t\tVersion: ipVersion,\n\t\tAddress: net.IPNet{\n\t\t\tIP: hnsEndpoint.IPAddress,\n\t\t\tMask: ipSubnet.Mask},\n\t\tGateway: net.ParseIP(hnsEndpoint.GatewayAddress),\n\t}\n\tresult := &current.Result{}\n\tresult.Interfaces = []*current.Interface{resultInterface}\n\tresult.IPs = []*current.IPConfig{resultIPConfig}\n\n\treturn result, nil\n}", "func newSuccessResult(vres *inventoryviews.SuccessResultView) *SuccessResult {\n\tres := &SuccessResult{}\n\tif vres.OK != nil {\n\t\tres.OK = *vres.OK\n\t}\n\treturn res\n}", "func newSuccessResult(vres *productviews.SuccessResultView) *SuccessResult {\n\tres := &SuccessResult{}\n\tif vres.OK != nil {\n\t\tres.OK = *vres.OK\n\t}\n\treturn res\n}", "func (s SessionManager_registerUdpSession_Results) NewResult() (RegisterUdpSessionResponse, error) {\n\tss, err := NewRegisterUdpSessionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegisterUdpSessionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func setupResult(rrt *ResolverRuntime, rcode int, opaqueResponse interface{}) (ret *dns.Msg) {\n\tswitch t := opaqueResponse.(type) {\n\tcase [][]dns.RR:\n\t\tret = &dns.Msg{Answer: t[0], Ns: t[1], Extra: t[2]}\n\tcase []dns.RR:\n\t\tret = &dns.Msg{Answer: t}\n\tcase dns.RR: /// single RR means a SOA for nxdomain/nodata responses\n\t\tret = &dns.Msg{Ns: []dns.RR{t}}\n\tcase *dns.Msg:\n\t\t//t.Rcode = rcode\n\t\tret = &dns.Msg{MsgHdr: t.MsgHdr, Answer: cloneSection(t.Answer), Ns: cloneSection(t.Ns), Extra: cloneSection(t.Extra)}\n\tdefault:\n\t\tret = &dns.Msg{}\n\t}\n\tret.SetRcode(rrt.original, rcode)\n\tLogInfo(rrt, \"Setting up result as answer to Q [%s] Id [%d] RC [%s]\\n[%v]\\n\\n\", rrt.original.Question[0].String(), rrt.original.Id, dns.RcodeToString[ret.Rcode], ret)\n\treturn\n}", "func NewResultInfo()(*ResultInfo) {\n m := &ResultInfo{\n }\n m.SetAdditionalData(make(map[string]interface{}));\n return m\n}", "func (r *request) SetResult(result interface{}) {\n\tr.Result = result\n}", "func (this *SelectResult) BuildNewResult() (*sqltypes.Result, error) {\n\t//fmt.Println(this.tempRows)\n\terr := this.handleRowsGroupBy()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t//sort\n\tthis.sort()\n\t//\n\tthis.optTempFieldsRows()\n\t//\n\tthis.optTempFields()\n\t//\n\tvar rows [][]sqltypes.Value\n\tvar offset, rowcount int64\n\tif this.stmt.Limit != nil && len(this.tempRows) > 0{\n\t\tif this.stmt.Limit.Offset != nil {\n\t\t\ttbufOffset := sqlparser.NewTrackedBuffer(nil)\n\t\t\tthis.stmt.Limit.Offset.Format(tbufOffset)\n\t\t\toffset, err = strconv.ParseInt(tbufOffset.String(), 10, 64)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t\tif this.stmt.Limit.Rowcount != nil {\n\t\t\ttbufRowcount := sqlparser.NewTrackedBuffer(nil)\n\t\t\tthis.stmt.Limit.Rowcount.Format(tbufRowcount)\n\t\t\trowcount, err = strconv.ParseInt(tbufRowcount.String(), 10, 64)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t\t//\n\t\trows = make([][]sqltypes.Value,rowcount)\n\t\t//glog.Infof(\"### limit %d,%d\", offset, rowcount)\n\t\tif offset < int64(len(this.tempRows)) && rowcount > 0 {\n\t\t\tif offset+rowcount < int64(len(this.tempRows)) {\n\t\t\t\tcopy(rows, this.tempRows[offset:offset+rowcount])\n\t\t\t} else {\n\t\t\t\trows = make([][]sqltypes.Value,len(this.tempRows) - int(offset))\n\t\t\t\tcopy(rows, this.tempRows[offset:])\n\t\t\t}\n\t\t}\n\t} else {\n\t\trows = this.tempRows\n\t}\n\t//\n\tnewResult := &sqltypes.Result{\n\t\tFields: this.tempFields,\n\t\tRows: rows,\n\t\tRowsAffected: uint64(len(this.tempRows)),\n\t}\n\treturn newResult, nil\n}", "func newCursorResult(arr []bson.Raw) *operationResult {\n\t// If the operation returned no documents, the array might be nil. It isn't possible to distinguish between this\n\t// case and the case where there is no cursor result, so we overwrite the result with an non-nil empty slice.\n\tresult := arr\n\tif result == nil {\n\t\tresult = make([]bson.Raw, 0)\n\t}\n\n\treturn &operationResult{\n\t\tCursorResult: result,\n\t}\n}", "func newDocumentResult(result []byte, err error) *operationResult {\n\treturn newValueResult(bsontype.EmbeddedDocument, result, err)\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewRegistrationServer_registerConnection_Results creates a new list of RegistrationServer_registerConnection_Results.
func NewRegistrationServer_registerConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Results_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz) return RegistrationServer_registerConnection_Results_List{l}, err }
[ "func NewRegistrationServer_unregisterConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Results_List{l}, err\n}", "func NewTunnelServer_registerTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_registerTunnel_Results_List{l}, err\n}", "func (s RegistrationServer_registerConnection_Results) NewResult() (ConnectionResponse, error) {\n\tss, err := NewConnectionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func UA_RegisterServer2Response_new() []UA_RegisterServer2Response {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[165]))[:]).([]UA_RegisterServer2Response)\n}", "func UA_RegisterNodesResponse_new() []UA_RegisterNodesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[120]))[:]).([]UA_RegisterNodesResponse)\n}", "func NewRegistrationServer_registerConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 3}, sz)\n\treturn RegistrationServer_registerConnection_Params_List{l}, err\n}", "func UA_RegisterServerResponse_new() []UA_RegisterServerResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[149]))[:]).([]UA_RegisterServerResponse)\n}", "func (s TunnelServer_registerTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func UA_RegisteredServer_new() []UA_RegisteredServer {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[180]))[:]).([]UA_RegisteredServer)\n}", "func (s TunnelServer_reconnectTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewRegistrationServer_updateLocalConfiguration_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_updateLocalConfiguration_Results_List{l}, err\n}", "func NewRegisterResult(message *user_methodpb.RegisterResponse) *usermethod.ResponseResult {\n\tresult := &usermethod.ResponseResult{\n\t\tCode: int(message.Code),\n\t}\n\tif message.Message_ != \"\" {\n\t\tresult.Message = &message.Message_\n\t}\n\tif message.Data != nil {\n\t\tresult.Data = make(map[string]string, len(message.Data))\n\t\tfor key, val := range message.Data {\n\t\t\ttk := key\n\t\t\ttv := val\n\t\t\tresult.Data[tk] = tv\n\t\t}\n\t}\n\treturn result\n}", "func UA_RegisterServerRequest_new() []UA_RegisterServerRequest {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[182]))[:]).([]UA_RegisterServerRequest)\n}", "func UA_RegisterServer2Request_new() []UA_RegisterServer2Request {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[190]))[:]).([]UA_RegisterServer2Request)\n}", "func NewTunnelServer_unregisterTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Results_List{l}, err\n}", "func NewSessionManager_registerUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_registerUdpSession_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn SessionManager_registerUdpSession_Results_List{l}, err\n}", "func NewTunnelRegistration_List(s *capnp.Segment, sz int32) (TunnelRegistration_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 6}, sz)\n\treturn TunnelRegistration_List{l}, err\n}", "func NewTunnelServer_reconnectTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_reconnectTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_reconnectTunnel_Results_List{l}, err\n}", "func (s SessionManager_registerUdpSession_Results) NewResult() (RegisterUdpSessionResponse, error) {\n\tss, err := NewRegisterUdpSessionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegisterUdpSessionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewRegistrationServer_unregisterConnection_Params creates a new list of RegistrationServer_unregisterConnection_Params.
func NewRegistrationServer_unregisterConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Params_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz) return RegistrationServer_unregisterConnection_Params_List{l}, err }
[ "func NewTunnelServer_unregisterTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Params_List{l}, err\n}", "func NewRegistrationServer_registerConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 3}, sz)\n\treturn RegistrationServer_registerConnection_Params_List{l}, err\n}", "func NewRegistrationServer_unregisterConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Results_List{l}, err\n}", "func NewSessionManager_unregisterUdpSession_Params_List(s *capnp.Segment, sz int32) (SessionManager_unregisterUdpSession_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn SessionManager_unregisterUdpSession_Params_List{l}, err\n}", "func UA_RegisterServer2Request_deleteMembers(p []UA_RegisterServer2Request) {\n\tUA_deleteMembers(p, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[190]))[:])\n}", "func UA_Server_removeConnection(server []UA_Server, connection []UA_Connection) {\n\tUA_Connection_detachSecureChannel(connection)\n\tconnection.free(connection)\n}", "func NewTunnelServer_registerTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_registerTunnel_Params_List{l}, err\n}", "func NewTunnelServer_unregisterTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Results_List{l}, err\n}", "func UA_RegisterServer2Response_deleteMembers(p []UA_RegisterServer2Response) {\n\tUA_deleteMembers(p, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[165]))[:])\n}", "func Service_UnregisterNodes(server []UA_Server, session []UA_Session, request []UA_UnregisterNodesRequest, response []UA_UnregisterNodesResponse) {\n\tUA_LOG_DEBUG(UA_Logger(server[0].config.logger), UA_LOGCATEGORY_SESSION, []byte(\"Connection %i | SecureChannel %i | Session %08x-%04x-%04x-%02x%02x-%02x%02x%02x%02x%02x%02x | Processing UnRegisterNodesRequest%.0s\\x00\"), (func() int {\n\t\tif (session)[0].header.channel != nil {\n\t\t\treturn (func() int {\n\t\t\t\tif (session)[0].header.channel[0].connection != nil {\n\t\t\t\t\treturn int((__int32_t((int32_t((UA_Int32((session)[0].header.channel[0].connection[0].sockfd)))))))\n\t\t\t\t}\n\t\t\t\treturn 0\n\t\t\t}())\n\t\t}\n\t\treturn 0\n\t}()), (func() uint32 {\n\t\tif (session)[0].header.channel != nil {\n\t\t\treturn uint32((uint32((uint32_t((UA_UInt32((session)[0].header.channel[0].securityToken.channelId)))))))\n\t\t}\n\t\treturn 0\n\t}()), UA_UInt32((*(session)[0].sessionId.identifier.guid()).data1), int(uint16((uint16((uint16_t((UA_UInt16((*(session)[0].sessionId.identifier.guid()).data2)))))))), int(uint16((uint16((uint16_t((UA_UInt16((*(session)[0].sessionId.identifier.guid()).data3)))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][0])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][1])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][2])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][3])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][4])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][5])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][6])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][7])))))))), []byte(\"\\x00\"))\n\tif uint(request[0].nodesToUnregisterSize) == uint((0)) {\n\t\t//TODO: remove the nodeids from the session if really needed\n\t\tresponse[0].responseHeader.serviceResult = UA_StatusCode((uint32_t((uint32((uint32(2148466688)))))))\n\t}\n\tif UA_UInt32(server[0].config.maxNodesPerRegisterNodes) != UA_UInt32((uint32_t((uint32((0)))))) && uint(request[0].nodesToUnregisterSize) > uint((uint32((uint32((uint32_t((UA_UInt32(server[0].config.maxNodesPerRegisterNodes))))))))) {\n\t\tresponse[0].responseHeader.serviceResult = UA_StatusCode((uint32_t((uint32((uint32(2148532224)))))))\n\t\treturn\n\t}\n}", "func (s RegistrationServer_registerConnection_Params) NewOptions() (ConnectionOptions, error) {\n\tss, err := NewConnectionOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (in *ActionApiServerUnlockTransactionSigningKeyInput) UnselectParameters(params ...string) *ActionApiServerUnlockTransactionSigningKeyInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func UA_Client_Service_unregisterNodes(client []UA_Client, request UA_UnregisterNodesRequest) UA_UnregisterNodesResponse {\n\tvar response UA_UnregisterNodesResponse\n\t__UA_Client_Service(client, (*[100000000]UA_UnregisterNodesRequest)(unsafe.Pointer(&request))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[48]))[:], (*[100000000]UA_UnregisterNodesResponse)(unsafe.Pointer(&response))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[129]))[:])\n\treturn response\n}", "func UA_RegisterServerRequest_deleteMembers(p []UA_RegisterServerRequest) {\n\tUA_deleteMembers(p, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[182]))[:])\n}", "func NewRegistrationServer_registerConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_registerConnection_Results_List{l}, err\n}", "func NewRegistrationServer_updateLocalConfiguration_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_updateLocalConfiguration_Params_List{l}, err\n}", "func UA_RegisterServerResponse_deleteMembers(p []UA_RegisterServerResponse) {\n\tUA_deleteMembers(p, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[149]))[:])\n}", "func (in *ActionIncomingPaymentUpdateInput) UnselectParameters(params ...string) *ActionIncomingPaymentUpdateInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func UA_UnregisterNodesRequest_new() []UA_UnregisterNodesRequest {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[48]))[:]).([]UA_UnregisterNodesRequest)\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewRegistrationServer_unregisterConnection_Results creates a new list of RegistrationServer_unregisterConnection_Results.
func NewRegistrationServer_unregisterConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Results_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz) return RegistrationServer_unregisterConnection_Results_List{l}, err }
[ "func NewTunnelServer_unregisterTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Results_List{l}, err\n}", "func NewRegistrationServer_registerConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_registerConnection_Results_List{l}, err\n}", "func NewRegistrationServer_unregisterConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Params_List{l}, err\n}", "func NewSessionManager_unregisterUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_unregisterUdpSession_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn SessionManager_unregisterUdpSession_Results_List{l}, err\n}", "func UA_UnregisterNodesResponse_new() []UA_UnregisterNodesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[129]))[:]).([]UA_UnregisterNodesResponse)\n}", "func UA_RegisterServer2Response_new() []UA_RegisterServer2Response {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[165]))[:]).([]UA_RegisterServer2Response)\n}", "func NewTunnelServer_registerTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_registerTunnel_Results_List{l}, err\n}", "func (s RegistrationServer_registerConnection_Results) NewResult() (ConnectionResponse, error) {\n\tss, err := NewConnectionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func UA_RegisterServer2Response_deleteMembers(p []UA_RegisterServer2Response) {\n\tUA_deleteMembers(p, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[165]))[:])\n}", "func NewTunnelServer_unregisterTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Params_List{l}, err\n}", "func NewRegistrationServer_updateLocalConfiguration_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_updateLocalConfiguration_Results_List{l}, err\n}", "func NewSessionManager_registerUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_registerUdpSession_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn SessionManager_registerUdpSession_Results_List{l}, err\n}", "func UA_RegisterNodesResponse_new() []UA_RegisterNodesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[120]))[:]).([]UA_RegisterNodesResponse)\n}", "func UA_RegisterServerResponse_new() []UA_RegisterServerResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[149]))[:]).([]UA_RegisterServerResponse)\n}", "func UA_RegisteredServer_new() []UA_RegisteredServer {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[180]))[:]).([]UA_RegisteredServer)\n}", "func UA_Client_Service_unregisterNodes(client []UA_Client, request UA_UnregisterNodesRequest) UA_UnregisterNodesResponse {\n\tvar response UA_UnregisterNodesResponse\n\t__UA_Client_Service(client, (*[100000000]UA_UnregisterNodesRequest)(unsafe.Pointer(&request))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[48]))[:], (*[100000000]UA_UnregisterNodesResponse)(unsafe.Pointer(&response))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[129]))[:])\n\treturn response\n}", "func NewTunnelServer_reconnectTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_reconnectTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_reconnectTunnel_Results_List{l}, err\n}", "func NewTunnelServer_getServerInfo_Results_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_getServerInfo_Results_List{l}, err\n}", "func NewRegistrationServer_registerConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 3}, sz)\n\treturn RegistrationServer_registerConnection_Params_List{l}, err\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewRegistrationServer_updateLocalConfiguration_Params creates a new list of RegistrationServer_updateLocalConfiguration_Params.
func NewRegistrationServer_updateLocalConfiguration_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Params_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz) return RegistrationServer_updateLocalConfiguration_Params_List{l}, err }
[ "func NewRegistrationServer_updateLocalConfiguration_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_updateLocalConfiguration_Results_List{l}, err\n}", "func NewConfigurationManager_updateConfiguration_Params_List(s *capnp.Segment, sz int32) (ConfigurationManager_updateConfiguration_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 1}, sz)\n\treturn ConfigurationManager_updateConfiguration_Params_List{l}, err\n}", "func (p *StorageServerConnectionService) UpdateLocal() *StorageServerConnectionServiceUpdateLocalRequest {\n\treturn &StorageServerConnectionServiceUpdateLocalRequest{StorageServerConnectionService: p}\n}", "func (m *MockPeerStore) SetLocalAddresses(tcp, udp int) {\n\n}", "func (client *ConfigurationsClient) batchUpdateCreateRequest(ctx context.Context, resourceGroupName string, serverName string, parameters ConfigurationListForBatchUpdate, options *ConfigurationsBeginBatchUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforMySQL/flexibleServers/{serverName}/updateConfigurations\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif serverName == \"\" {\n\t\treturn nil, errors.New(\"parameter serverName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{serverName}\", url.PathEscape(serverName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func NewRegistrationServer_registerConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 3}, sz)\n\treturn RegistrationServer_registerConnection_Params_List{l}, err\n}", "func newProxyLocalConfig() proxyLocalConfig {\n\tlc := NewLocalConfig()\n\treturn proxyLocalConfig{\n\t\tTypeMeta: lc.typeMeta,\n\t}\n}", "func prepareLocalProfileServerMap(localServerURL string, getconfigCtx *getconfigContext) (map[string][]*urlAndSrcIP, error) {\n\tu, err := url.Parse(localServerURL)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"checkAndPrepareLocalIP: url.Parse: %s\", err)\n\t}\n\tres := make(map[string][]*urlAndSrcIP)\n\tappendURLAndSrcIPMap := func(resMap map[string][]*urlAndSrcIP, intf string, obj *urlAndSrcIP) {\n\t\tif _, ok := resMap[intf]; !ok {\n\t\t\tresMap[intf] = []*urlAndSrcIP{}\n\t\t}\n\t\tresMap[intf] = append(resMap[intf], obj)\n\t}\n\tappNetworkStatuses := getconfigCtx.subAppNetworkStatus.GetAll()\n\tnetworkInstanceConfigs := getconfigCtx.pubNetworkInstanceConfig.GetAll()\n\tlocalProfileServerHostname := u.Hostname()\n\tlocalProfileServerIP := net.ParseIP(localProfileServerHostname)\n\tfor _, entry := range appNetworkStatuses {\n\t\tappNetworkStatus := entry.(types.AppNetworkStatus)\n\t\tfor _, ulStatus := range appNetworkStatus.UnderlayNetworkList {\n\t\t\tbridgeIP := net.ParseIP(ulStatus.BridgeIPAddr)\n\t\t\tif bridgeIP == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif localProfileServerIP != nil {\n\t\t\t\t//check if defined IP of localServer is equals with allocated IP of app\n\t\t\t\tif ulStatus.AllocatedIPAddr == localProfileServerIP.String() {\n\t\t\t\t\tappendURLAndSrcIPMap(res, ulStatus.Bridge,\n\t\t\t\t\t\t&urlAndSrcIP{actualURL: localServerURL, srcIP: bridgeIP})\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t//check if defined hostname of localServer is in DNS records\n\t\t\tfor _, ni := range networkInstanceConfigs {\n\t\t\t\tnetworkInstanceConfig := ni.(types.NetworkInstanceConfig)\n\t\t\t\tfor _, dnsNameToIPList := range networkInstanceConfig.DnsNameToIPList {\n\t\t\t\t\tif dnsNameToIPList.HostName != localProfileServerHostname {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tfor _, ip := range dnsNameToIPList.IPs {\n\t\t\t\t\t\tlocalServerURLReplaced := strings.Replace(localServerURL, localProfileServerHostname,\n\t\t\t\t\t\t\tip.String(), 1)\n\t\t\t\t\t\tlog.Functionf(\n\t\t\t\t\t\t\t\"prepareLocalProfileServerMap: will use %s for bridge %s\",\n\t\t\t\t\t\t\tlocalServerURLReplaced, ulStatus.Bridge)\n\t\t\t\t\t\tappendURLAndSrcIPMap(res, ulStatus.Bridge,\n\t\t\t\t\t\t\t&urlAndSrcIP{actualURL: localServerURLReplaced, srcIP: bridgeIP})\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn res, nil\n}", "func NewUpdateWhitelabelConfigurationParams() *UpdateWhitelabelConfigurationParams {\n\treturn &UpdateWhitelabelConfigurationParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewSendLocalListResponse(status SendLocalListStatus) *SendLocalListResponse {\n\treturn &SendLocalListResponse{Status: status}\n}", "func NewConfigurationManager_updateConfiguration_Results_List(s *capnp.Segment, sz int32) (ConfigurationManager_updateConfiguration_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn ConfigurationManager_updateConfiguration_Results_List{l}, err\n}", "func NewSendLocalListRequest(versionNumber int, updateType UpdateType) *SendLocalListRequest {\n\treturn &SendLocalListRequest{VersionNumber: versionNumber, UpdateType: updateType}\n}", "func (rndr *Renderer) UpdateLocalBackendIfs(oldIfNames, newIfNames renderer.Interfaces) error {\n\tif rndr.snatOnly {\n\t\treturn nil\n\t}\n\trndr.Log.WithFields(logging.Fields{\n\t\t\"oldIfNames\": oldIfNames,\n\t\t\"newIfNames\": newIfNames,\n\t}).Debug(\"Nat44Renderer - UpdateLocalBackendIfs()\")\n\n\t// Re-build the list of interfaces with enabled NAT features.\n\trndr.natGlobalCfg = proto.Clone(rndr.natGlobalCfg).(*nat.Nat44Global)\n\t// - keep non-backends unchanged\n\tnewNatIfs := []*nat.Nat44Global_NatInterface{}\n\tfor _, natIf := range rndr.natGlobalCfg.NatInterfaces {\n\t\tif !natIf.IsInside || natIf.OutputFeature {\n\t\t\tnewNatIfs = append(newNatIfs, natIf)\n\t\t}\n\t}\n\t// - re-create the list of backends\n\tfor backendIf := range newIfNames {\n\t\tnewNatIfs = append(newNatIfs,\n\t\t\t&nat.Nat44Global_NatInterface{\n\t\t\t\tName: backendIf,\n\t\t\t\tIsInside: true,\n\t\t\t\tOutputFeature: false,\n\t\t\t})\n\t}\n\t// - re-write the cached list\n\trndr.natGlobalCfg.NatInterfaces = newNatIfs\n\n\t// Update global NAT config via ligato/vpp-agent.\n\tdsl := rndr.NATTxnFactory()\n\tputDsl := dsl.Put()\n\tputDsl.NAT44Global(rndr.natGlobalCfg)\n\n\treturn dsl.Send().ReceiveReply()\n}", "func NewRegistrationServer_unregisterConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Params_List{l}, err\n}", "func createLocalConfig(context *cli.Context) *lib.Config {\n\treturn &lib.Config{\n\t\tLocalPrintingEnable: true,\n\t\tCloudPrintingEnable: false,\n\n\t\tNativeJobQueueSize: uint(context.Int(\"native-job-queue-size\")),\n\t\tNativePrinterPollInterval: context.String(\"native-printer-poll-interval\"),\n\t\tCUPSJobFullUsername: lib.PointerToBool(context.Bool(\"cups-job-full-username\")),\n\t\tPrefixJobIDToJobTitle: lib.PointerToBool(context.Bool(\"prefix-job-id-to-job-title\")),\n\t\tDisplayNamePrefix: context.String(\"display-name-prefix\"),\n\t\tPrinterBlacklist: lib.DefaultConfig.PrinterBlacklist,\n\t\tPrinterWhitelist: lib.DefaultConfig.PrinterWhitelist,\n\t\tLogLevel: context.String(\"log-level\"),\n\n\t\tLocalPortLow: uint16(context.Int(\"local-port-low\")),\n\t\tLocalPortHigh: uint16(context.Int(\"local-port-high\")),\n\t}\n}", "func (c *Configuration) UpdateBoundParameters() {\n\tfor _, boundParameter := range c.boundParameters {\n\t\tparameterName := boundParameter.Name\n\n\t\tswitch boundParameter.BoundType {\n\t\tcase reflectutils.BoolType:\n\t\t\t*(boundParameter.BoundPointer.(*bool)) = c.Bool(parameterName)\n\t\tcase reflectutils.TimeDurationType:\n\t\t\t*(boundParameter.BoundPointer.(*time.Duration)) = c.Duration(parameterName)\n\t\tcase reflectutils.Float32Type:\n\t\t\t*(boundParameter.BoundPointer.(*float32)) = float32(c.Float64(parameterName))\n\t\tcase reflectutils.Float64Type:\n\t\t\t*(boundParameter.BoundPointer.(*float64)) = c.Float64(parameterName)\n\t\tcase reflectutils.IntType:\n\t\t\t*(boundParameter.BoundPointer.(*int)) = c.Int(parameterName)\n\t\tcase reflectutils.Int8Type:\n\t\t\t*(boundParameter.BoundPointer.(*int8)) = int8(c.Int(parameterName))\n\t\tcase reflectutils.Int16Type:\n\t\t\t*(boundParameter.BoundPointer.(*int16)) = int16(c.Int(parameterName))\n\t\tcase reflectutils.Int32Type:\n\t\t\t*(boundParameter.BoundPointer.(*int32)) = int32(c.Int(parameterName))\n\t\tcase reflectutils.Int64Type:\n\t\t\t*(boundParameter.BoundPointer.(*int64)) = c.Int64(parameterName)\n\t\tcase reflectutils.StringType:\n\t\t\t*(boundParameter.BoundPointer.(*string)) = c.String(parameterName)\n\t\tcase reflectutils.UintType:\n\t\t\t*(boundParameter.BoundPointer.(*uint)) = uint(c.Int(parameterName))\n\t\tcase reflectutils.Uint8Type:\n\t\t\t*(boundParameter.BoundPointer.(*uint8)) = uint8(c.Int(parameterName))\n\t\tcase reflectutils.Uint16Type:\n\t\t\t*(boundParameter.BoundPointer.(*uint16)) = uint16(c.Int(parameterName))\n\t\tcase reflectutils.Uint32Type:\n\t\t\t*(boundParameter.BoundPointer.(*uint32)) = uint32(c.Int(parameterName))\n\t\tcase reflectutils.Uint64Type:\n\t\t\t*(boundParameter.BoundPointer.(*uint64)) = uint64(c.Int64(parameterName))\n\t\tcase reflectutils.StringSliceType:\n\t\t\t*(boundParameter.BoundPointer.(*[]string)) = c.Strings(parameterName)\n\t\tcase reflectutils.StringMapType:\n\t\t\t*(boundParameter.BoundPointer.(*map[string]string)) = c.StringMap(parameterName)\n\n\t\tdefault:\n\t\t\t// we need to create a new empty object of the same type,\n\t\t\t// otherwise we may only overwrite first values of a slice of bigger length\n\t\t\tnewBoundParameterPointer := reflect.New(boundParameter.BoundType)\n\t\t\tnewBoundParameter := newBoundParameterPointer.Interface()\n\n\t\t\t// if we don't know the type, we try to unmarshal it\n\t\t\tif err := c.Unmarshal(parameterName, newBoundParameter); err != nil {\n\t\t\t\tpanic(fmt.Sprintf(\"could not unmarshal value of '%s', error: %s\", parameterName, err))\n\t\t\t}\n\n\t\t\t// Overwrite the original value with the new value\n\t\t\treflect.ValueOf(boundParameter.BoundPointer).Elem().Set(newBoundParameterPointer.Elem())\n\t\t}\n\t}\n}", "func (p *StorageServerConnectionsService) AddLocal() *StorageServerConnectionsServiceAddLocalRequest {\n\treturn &StorageServerConnectionsServiceAddLocalRequest{StorageServerConnectionsService: p}\n}", "func (l RemoteConfig) LocalConfig() LocalConfig {\n\treturn LocalConfig{}\n}", "func NewLocalConfig() LocalConfig {\n\treturn LocalConfig{\n\t\ttypeMeta: metav1.TypeMeta{\n\t\t\tKind: localConfigKind,\n\t\t\tAPIVersion: localConfigAPIVersion,\n\t\t},\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewRegistrationServer_updateLocalConfiguration_Results creates a new list of RegistrationServer_updateLocalConfiguration_Results.
func NewRegistrationServer_updateLocalConfiguration_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Results_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz) return RegistrationServer_updateLocalConfiguration_Results_List{l}, err }
[ "func NewRegistrationServer_updateLocalConfiguration_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_updateLocalConfiguration_Params_List{l}, err\n}", "func NewConfigurationManager_updateConfiguration_Results_List(s *capnp.Segment, sz int32) (ConfigurationManager_updateConfiguration_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn ConfigurationManager_updateConfiguration_Results_List{l}, err\n}", "func NewSendLocalListResponse(status SendLocalListStatus) *SendLocalListResponse {\n\treturn &SendLocalListResponse{Status: status}\n}", "func (s ConfigurationManager_updateConfiguration_Results) NewResult() (UpdateConfigurationResponse, error) {\n\tss, err := NewUpdateConfigurationResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn UpdateConfigurationResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewTunnelServer_registerTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_registerTunnel_Results_List{l}, err\n}", "func NewRegistrationServer_registerConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_registerConnection_Results_List{l}, err\n}", "func (p *StorageServerConnectionService) UpdateLocal() *StorageServerConnectionServiceUpdateLocalRequest {\n\treturn &StorageServerConnectionServiceUpdateLocalRequest{StorageServerConnectionService: p}\n}", "func NewTunnelServer_getServerInfo_Results_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_getServerInfo_Results_List{l}, err\n}", "func NewRegistrationServer_unregisterConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Results_List{l}, err\n}", "func (a *Agent) LocalServers() (members []*ServerParts) {\n\tfor _, member := range a.serf.Members() {\n\t\tok, parts := isServer(member)\n\t\tif !ok || member.Status != serf.StatusAlive {\n\t\t\tcontinue\n\t\t}\n\t\tif a.config.Region == parts.Region {\n\t\t\tmembers = append(members, parts)\n\t\t}\n\t}\n\treturn members\n}", "func NewBackend_installPackage_Results_List(s *capnp.Segment, sz int32) (Backend_installPackage_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn capnp.StructList[Backend_installPackage_Results](l), err\n}", "func prepareLocalProfileServerMap(localServerURL string, getconfigCtx *getconfigContext) (map[string][]*urlAndSrcIP, error) {\n\tu, err := url.Parse(localServerURL)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"checkAndPrepareLocalIP: url.Parse: %s\", err)\n\t}\n\tres := make(map[string][]*urlAndSrcIP)\n\tappendURLAndSrcIPMap := func(resMap map[string][]*urlAndSrcIP, intf string, obj *urlAndSrcIP) {\n\t\tif _, ok := resMap[intf]; !ok {\n\t\t\tresMap[intf] = []*urlAndSrcIP{}\n\t\t}\n\t\tresMap[intf] = append(resMap[intf], obj)\n\t}\n\tappNetworkStatuses := getconfigCtx.subAppNetworkStatus.GetAll()\n\tnetworkInstanceConfigs := getconfigCtx.pubNetworkInstanceConfig.GetAll()\n\tlocalProfileServerHostname := u.Hostname()\n\tlocalProfileServerIP := net.ParseIP(localProfileServerHostname)\n\tfor _, entry := range appNetworkStatuses {\n\t\tappNetworkStatus := entry.(types.AppNetworkStatus)\n\t\tfor _, ulStatus := range appNetworkStatus.UnderlayNetworkList {\n\t\t\tbridgeIP := net.ParseIP(ulStatus.BridgeIPAddr)\n\t\t\tif bridgeIP == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif localProfileServerIP != nil {\n\t\t\t\t//check if defined IP of localServer is equals with allocated IP of app\n\t\t\t\tif ulStatus.AllocatedIPAddr == localProfileServerIP.String() {\n\t\t\t\t\tappendURLAndSrcIPMap(res, ulStatus.Bridge,\n\t\t\t\t\t\t&urlAndSrcIP{actualURL: localServerURL, srcIP: bridgeIP})\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t//check if defined hostname of localServer is in DNS records\n\t\t\tfor _, ni := range networkInstanceConfigs {\n\t\t\t\tnetworkInstanceConfig := ni.(types.NetworkInstanceConfig)\n\t\t\t\tfor _, dnsNameToIPList := range networkInstanceConfig.DnsNameToIPList {\n\t\t\t\t\tif dnsNameToIPList.HostName != localProfileServerHostname {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tfor _, ip := range dnsNameToIPList.IPs {\n\t\t\t\t\t\tlocalServerURLReplaced := strings.Replace(localServerURL, localProfileServerHostname,\n\t\t\t\t\t\t\tip.String(), 1)\n\t\t\t\t\t\tlog.Functionf(\n\t\t\t\t\t\t\t\"prepareLocalProfileServerMap: will use %s for bridge %s\",\n\t\t\t\t\t\t\tlocalServerURLReplaced, ulStatus.Bridge)\n\t\t\t\t\t\tappendURLAndSrcIPMap(res, ulStatus.Bridge,\n\t\t\t\t\t\t\t&urlAndSrcIP{actualURL: localServerURLReplaced, srcIP: bridgeIP})\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn res, nil\n}", "func NewApp_configs_Results_List(s *capnp.Segment, sz int32) (App_configs_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn App_configs_Results_List{l}, err\n}", "func NewTunnelServer_unregisterTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Results_List{l}, err\n}", "func (a *Client) InitializeLcmLocalUsersUsingPOST(params *InitializeLcmLocalUsersUsingPOSTParams, authInfo runtime.ClientAuthInfoWriter) (*InitializeLcmLocalUsersUsingPOSTOK, *InitializeLcmLocalUsersUsingPOSTCreated, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewInitializeLcmLocalUsersUsingPOSTParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"initializeLcmLocalUsersUsingPOST\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/lcm/authzn/api/users/initializeLocalUsers\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &InitializeLcmLocalUsersUsingPOSTReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tswitch value := result.(type) {\n\tcase *InitializeLcmLocalUsersUsingPOSTOK:\n\t\treturn value, nil, nil\n\tcase *InitializeLcmLocalUsersUsingPOSTCreated:\n\t\treturn nil, value, nil\n\t}\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for authentication_user_a_p_is: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "func newProxyLocalConfig() proxyLocalConfig {\n\tlc := NewLocalConfig()\n\treturn proxyLocalConfig{\n\t\tTypeMeta: lc.typeMeta,\n\t}\n}", "func (l RemoteConfig) LocalConfig() LocalConfig {\n\treturn LocalConfig{}\n}", "func NewBackend_ping_Results_List(s *capnp.Segment, sz int32) (Backend_ping_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn capnp.StructList[Backend_ping_Results](l), err\n}", "func UA_MonitoredItemModifyResult_new() []UA_MonitoredItemModifyResult {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[31]))[:]).([]UA_MonitoredItemModifyResult)\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewOptions sets the options field to a newly allocated RegistrationOptions struct, preferring placement in s's segment.
func (s TunnelServer_registerTunnel_Params) NewOptions() (RegistrationOptions, error) { ss, err := NewRegistrationOptions(s.Struct.Segment()) if err != nil { return RegistrationOptions{}, err } err = s.Struct.SetPtr(2, ss.Struct.ToPtr()) return ss, err }
[ "func (s TunnelServer_authenticate_Params) NewOptions() (RegistrationOptions, error) {\n\tss, err := NewRegistrationOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegistrationOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RegistrationServer_registerConnection_Params) NewOptions() (ConnectionOptions, error) {\n\tss, err := NewConnectionOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func newOptions() *options {\n\treturn &options{\n\t\tfillColor: cell.ColorNumber(DefaultFillColorNumber),\n\t\tplaceHolderColor: cell.ColorNumber(DefaultPlaceHolderColorNumber),\n\t\thighlightedColor: cell.ColorNumber(DefaultHighlightedColorNumber),\n\t\tcursorColor: cell.ColorNumber(DefaultCursorColorNumber),\n\t\tlabelAlign: DefaultLabelAlign,\n\t}\n}", "func NewRegistrationOptions_List(s *capnp.Segment, sz int32) (RegistrationOptions_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 16, PointerCount: 8}, sz)\n\treturn RegistrationOptions_List{l}, err\n}", "func NewOptions(maxSegmentSize uint16, windowScale uint8, timestamp,\n\techoTimestamp uint32) []uint8 {\n\toptions := []uint8{}\n\n\tif maxSegmentSize != NoSegmentSize {\n\t\toptions = append(options, 2, 4, uint8(maxSegmentSize>>8), uint8(maxSegmentSize))\n\t}\n\n\tif windowScale != NoWindowScale {\n\t\toptions = append(options, 3, 3, windowScale)\n\t}\n\n\tif timestamp != NoTimestamp {\n\t\toptions = append(options, 8, 10, uint8(timestamp>>24), uint8(timestamp>>16),\n\t\t\tuint8(timestamp>>8), uint8(timestamp))\n\t\toptions = append(options, uint8(echoTimestamp>>24), uint8(echoTimestamp>>16),\n\t\t\tuint8(echoTimestamp>>8), uint8(echoTimestamp))\n\t}\n\n\t// End-of-options 0 value.\n\toptions = append(options, 0)\n\n\t// Padding to a multiple of 32.\n\tfor len(options)%4 != 0 {\n\t\toptions = append(options, 0)\n\t}\n\n\treturn options\n}", "func NewOptions() *Options {\n\treturn &Options{\n\t\tOptions: scheduleroptions.NewOptions(),\n\t}\n}", "func (c *CherrypickAutoApprove) RegisterOptions(opts *options.Options) sets.String { return nil }", "func NewOptions() *Common {\n\treturn &Common{}\n}", "func NewOptions(spec string) *OptionSpec {\n\t// TODO(gaal): move to constant\n\tflagSpec := regexp.MustCompile(`^([-\\w,]+)(=?)\\s+(.*)$`)\n\t// Not folded into previous pattern because that would necessitate FindStringSubmatchIndex.\n\tdefaultValue := regexp.MustCompile(`\\[(.*)\\]$`)\n\n\ts := &OptionSpec{UnknownOptionsFatal: true, UnknownValuesFatal: false, Exit: os.Exit}\n\ts.aliases = make(map[string]string)\n\ts.defaults = make(map[string]string)\n\ts.requiresArg = make(map[string]bool)\n\tstanza := 0 // synopsis\n\tspecLines := strings.Split(spec, \"\\n\")\n\tfor n, l := range specLines {\n\t\tswitch stanza {\n\t\tcase 0:\n\t\t\t{\n\t\t\t\tif l == \"--\" {\n\t\t\t\t\ts.Usage += \"\\n\"\n\t\t\t\t\tstanza++\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\ts.Usage += l + \"\\n\"\n\t\t\t}\n\t\tcase 1:\n\t\t\t{\n\t\t\t\tif l == \"\" {\n\t\t\t\t\ts.Usage += \"\\n\"\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tparts := flagSpec.FindStringSubmatch(l)\n\t\t\t\tif parts == nil {\n\t\t\t\t\tpanic(fmt.Sprint(n, \": no parse: \", l))\n\t\t\t\t}\n\t\t\t\tnames := strings.Split(parts[1], \",\")\n\t\t\t\tcanonical := names[len(names)-1]\n\t\t\t\tfor _, name := range names {\n\t\t\t\t\tif _, dup := s.aliases[name]; dup {\n\t\t\t\t\t\tpanic(fmt.Sprint(n, \": duplicate name: \", name))\n\t\t\t\t\t}\n\t\t\t\t\tif name == \"\" || name == \"-\" || name == \"--\" {\n\t\t\t\t\t\tpanic(fmt.Sprint(n, \": bad name: \", name))\n\t\t\t\t\t}\n\n\t\t\t\t\ts.aliases[name] = canonical\n\t\t\t\t}\n\t\t\t\tif parts[2] == \"=\" {\n\t\t\t\t\ts.requiresArg[canonical] = true\n\t\t\t\t}\n\t\t\t\tif def := defaultValue.FindStringSubmatch(parts[3]); def != nil {\n\t\t\t\t\ts.defaults[canonical] = def[1]\n\t\t\t\t}\n\t\t\t\t// TODO(gaal): linewrap.\n\t\t\t\ts.Usage += \" \" + strings.Join(smap(prettyFlag, names), \", \") +\n\t\t\t\t\tparts[2] + \" \" + parts[3] + \"\\n\"\n\t\t\t}\n\t\tdefault:\n\t\t\tpanic(fmt.Sprint(n, \": no parse: \", spec))\n\t\t}\n\t}\n\treturn s\n}", "func NewOptions() IOptions {\n\treturn &Options{\n\t\tcache: 0,\n\t\tgzip: false,\n\t}\n}", "func (c *WriterConfiguration) NewOptions(\n\tcs client.Client,\n\tiOpts instrument.Options,\n\trwOptions xio.Options,\n) (writer.Options, error) {\n\topts := writer.NewOptions().\n\t\tSetTopicName(c.TopicName).\n\t\tSetPlacementOptions(c.PlacementOptions.NewOptions()).\n\t\tSetInstrumentOptions(iOpts).\n\t\tSetWithoutConsumerScope(c.WithoutConsumerScope)\n\n\tkvOpts, err := c.TopicServiceOverride.NewOverrideOptions()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttopicServiceOpts := topic.NewServiceOptions().\n\t\tSetConfigService(cs).\n\t\tSetKVOverrideOptions(kvOpts)\n\tts, err := topic.NewService(topicServiceOpts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\topts = opts.SetTopicService(ts)\n\n\tif c.TopicWatchInitTimeout != nil {\n\t\topts = opts.SetTopicWatchInitTimeout(*c.TopicWatchInitTimeout)\n\t}\n\tsd, err := cs.Services(c.PlacementServiceOverride.NewOptions())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\topts = opts.SetServiceDiscovery(sd)\n\n\tif c.PlacementWatchInitTimeout != nil {\n\t\topts = opts.SetPlacementWatchInitTimeout(*c.PlacementWatchInitTimeout)\n\t}\n\topts, err = c.setRetryOptions(opts, iOpts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif c.MessageQueueNewWritesScanInterval != nil {\n\t\topts = opts.SetMessageQueueNewWritesScanInterval(*c.MessageQueueNewWritesScanInterval)\n\t}\n\tif c.MessageQueueFullScanInterval != nil {\n\t\topts = opts.SetMessageQueueFullScanInterval(*c.MessageQueueFullScanInterval)\n\t}\n\tif c.MessageQueueScanBatchSize != nil {\n\t\topts = opts.SetMessageQueueScanBatchSize(*c.MessageQueueScanBatchSize)\n\t}\n\tif c.InitialAckMapSize != nil {\n\t\topts = opts.SetInitialAckMapSize(*c.InitialAckMapSize)\n\t}\n\tif c.CloseCheckInterval != nil {\n\t\topts = opts.SetCloseCheckInterval(*c.CloseCheckInterval)\n\t}\n\tif c.AckErrorRetry != nil {\n\t\topts = opts.SetAckErrorRetryOptions(c.AckErrorRetry.NewOptions(tally.NoopScope))\n\t}\n\tif c.Encoder != nil {\n\t\topts = opts.SetEncoderOptions(c.Encoder.NewOptions(iOpts))\n\t}\n\tif c.Decoder != nil {\n\t\topts = opts.SetDecoderOptions(c.Decoder.NewOptions(iOpts))\n\t}\n\tif c.Connection != nil {\n\t\topts = opts.SetConnectionOptions(c.Connection.NewOptions(iOpts))\n\t}\n\n\topts = opts.SetIgnoreCutoffCutover(c.IgnoreCutoffCutover)\n\n\topts = opts.SetDecoderOptions(opts.DecoderOptions().SetRWOptions(rwOptions))\n\treturn opts, nil\n}", "func NewOptions() *Options {\n\tvar url *url.URL\n\n\tif os.Getenv(\"PRERENDER_SERVICE_URL\") != \"\" {\n\t\turl, _ = url.Parse(os.Getenv(\"PRERENDER_SERVICE_URL\"))\n\t} else {\n\t\turl, _ = url.Parse(\"https://service.headless-render-api.com/\")\n\t}\n\n\treturn &Options{\n\t\tPrerenderURL: url,\n\t\tToken: os.Getenv(\"PRERENDER_TOKEN\"),\n\t\tUsingAppEngine: false,\n\t\tBotsOnly: false,\n\t}\n}", "func NewClusterRegistrationOptions() *ClusterRegistrationOptions {\n\treturn &ClusterRegistrationOptions{\n\t\tClusterNamePrefix: RegistrationNamePrefix,\n\t\tClusterType: string(clusterapi.EdgeClusterSelfProvisioned),\n\t\tClusterSyncMode: string(clusterapi.Pull),\n\t\tClusterStatusReportFrequency: metav1.Duration{Duration: DefaultClusterStatusReportFrequency},\n\t\tClusterStatusCollectFrequency: metav1.Duration{Duration: DefaultClusterStatusCollectFrequency},\n\t}\n}", "func (cfg OverrideConfiguration) NewOptions() OverrideOptions {\n\treturn NewOverrideOptions().\n\t\tSetNamespaceOptions(cfg.Namespaces.NewOptions())\n}", "func newInitOptions() *initOptions {\n\t// initialize the public kubeadm config API by applying defaults\n\texternalInitCfg := &kubeadmapiv1.InitConfiguration{}\n\tkubeadmscheme.Scheme.Default(externalInitCfg)\n\n\texternalClusterCfg := &kubeadmapiv1.ClusterConfiguration{\n\t\t// CertificatesDir: filepath.Join(homedir.HomeDir(), \".fireflyadm\", \"pki\"),\n\t}\n\tkubeadmscheme.Scheme.Default(externalClusterCfg)\n\n\t// Create the options object for the bootstrap token-related flags, and override the default value for .Description\n\tbto := options.NewBootstrapTokenOptions()\n\tbto.Description = \"The default bootstrap token generated by 'kubeadm init'.\"\n\n\tkubeconfig := os.Getenv(\"KUBECONFIG\")\n\tif kubeconfig == \"\" {\n\t\tkubeconfig = filepath.Join(homedir.HomeDir(), \".kube\", \"config\")\n\t}\n\n\treturn &initOptions{\n\t\texternalInitCfg: externalInitCfg,\n\t\texternalClusterCfg: externalClusterCfg,\n\t\tbto: bto,\n\t\tkubeconfigDir: constants.KubernetesDir,\n\t\tkubeconfigPath: kubeconfig,\n\t\tuploadCerts: false,\n\t}\n}", "func NewCallOptions()(*CallOptions) {\n m := &CallOptions{\n }\n m.SetAdditionalData(make(map[string]interface{}));\n return m\n}", "func RegistryFromOptions(optionsRegistry *markers.Registry, options []string) (*markers.Registry, error) {\n\tprotoRt, err := protoFromOptions(optionsRegistry, options)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treg := &markers.Registry{}\n\tif err := protoRt.Generators.RegisterMarkers(reg); err != nil {\n\t\treturn nil, err\n\t}\n\treturn reg, nil\n}", "func CreateOptions(c dict.Dicter) (opts *redis.Options, err error) {\n\tnetwork, err := c.String(ConfigKeyNetwork, &defaultNetwork)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\taddr, err := c.String(ConfigKeyAddress, &defaultAddress)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\thost, _, err := net.SplitHostPort(addr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif host == \"\" {\n\t\treturn nil, &ErrHostMissing{msg: fmt.Sprintf(\"no host provided in '%s'\", addr)}\n\t}\n\n\tpassword, err := c.String(ConfigKeyPassword, &defaultPassword)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdb, err := c.Int(ConfigKeyDB, &defaultDB)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\to := &redis.Options{\n\t\tNetwork: network,\n\t\tAddr: addr,\n\t\tPassword: password,\n\t\tDB: db,\n\t\tPoolSize: 2,\n\t\tDialTimeout: 3 * time.Second,\n\t}\n\n\tssl, err := c.Bool(ConfigKeySSL, &defaultSSL)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif ssl {\n\t\to.TLSConfig = &tls.Config{ServerName: host}\n\t}\n\n\treturn o, nil\n}", "func newOptionSet(opts ...Option) *optionSet {\n\tset := &optionSet{\n\t\tEntryName: rkgininter.RpcEntryNameValue,\n\t\tEntryType: rkgininter.RpcEntryTypeValue,\n\t\tregisterer: prometheus.DefaultRegisterer,\n\t}\n\n\tfor i := range opts {\n\t\topts[i](set)\n\t}\n\n\tnamespace := strings.ReplaceAll(rkentry.GlobalAppCtx.GetAppInfoEntry().AppName, \"-\", \"_\")\n\tsubSystem := strings.ReplaceAll(set.EntryName, \"-\", \"_\")\n\tset.MetricsSet = rkprom.NewMetricsSet(\n\t\tnamespace,\n\t\tsubSystem,\n\t\tset.registerer)\n\n\tif _, ok := optionsMap[set.EntryName]; !ok {\n\t\toptionsMap[set.EntryName] = set\n\t}\n\n\tinitMetrics(set)\n\n\treturn set\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewTunnelServer_registerTunnel_Params creates a new list of TunnelServer_registerTunnel_Params.
func NewTunnelServer_registerTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Params_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz) return TunnelServer_registerTunnel_Params_List{l}, err }
[ "func NewTunnelServer_unregisterTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Params_List{l}, err\n}", "func NewRegistrationServer_registerConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 3}, sz)\n\treturn RegistrationServer_registerConnection_Params_List{l}, err\n}", "func (s TunnelServer_registerTunnel_Params) NewOptions() (RegistrationOptions, error) {\n\tss, err := NewRegistrationOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegistrationOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewTunnelServer_registerTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_registerTunnel_Results_List{l}, err\n}", "func NewTunnelServer_getServerInfo_Params_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_getServerInfo_Params_List{l}, err\n}", "func NewTunnelServer_reconnectTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_reconnectTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 5}, sz)\n\treturn TunnelServer_reconnectTunnel_Params_List{l}, err\n}", "func NewTunnelRegistration_List(s *capnp.Segment, sz int32) (TunnelRegistration_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 6}, sz)\n\treturn TunnelRegistration_List{l}, err\n}", "func (r *Register) RegisterServerAll(nameServerAddressList *singlylinkedlist.List) {\n\tif nameServerAddressList != nil && !nameServerAddressList.Empty() {\n\t\trequest := namesrv.Request{}\n\t\trequest.ActionType = namesrv.ActionRegister\n\t\trreq := common.RegisterRequestConfig\n\t\tif rreq.ServerAddr == \"\" {\n\t\t\trreq.ServerAddr = netutil.GetLocalIP()\n\t\t}\n\t\tif rreq.HaServerAddr == \"\" {\n\t\t\trreq.HaServerAddr = netutil.GetLocalIP()\n\t\t}\n\t\tbody, _ := json.Marshal(rreq)\n\t\trequest.Body = body\n\t\twg := sync.WaitGroup{}\n\t\twg.Add(nameServerAddressList.Size())\n\t\tnameServerAddressList.Each(func(index int, value interface{}) {\n\t\t\tnamesrvAddr, _ := value.(string)\n\t\t\tgo registerServer(namesrvAddr, 1000, request, &wg)\n\t\t})\n\t\twg.Wait()\n\t}\n}", "func NewTunnelServer_authenticate_Params_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_authenticate_Params_List{l}, err\n}", "func NewTunnelServer_obsoleteDeclarativeTunnelConnect_Params_List(s *capnp.Segment, sz int32) (TunnelServer_obsoleteDeclarativeTunnelConnect_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_obsoleteDeclarativeTunnelConnect_Params_List{l}, err\n}", "func NewRegistrationServer_unregisterConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Params_List{l}, err\n}", "func NewSessionManager_registerUdpSession_Params_List(s *capnp.Segment, sz int32) (SessionManager_registerUdpSession_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 16, PointerCount: 3}, sz)\n\treturn SessionManager_registerUdpSession_Params_List{l}, err\n}", "func (s RegistrationServer_registerConnection_Params) NewOptions() (ConnectionOptions, error) {\n\tss, err := NewConnectionOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_registerTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_authenticate_Params) NewOptions() (RegistrationOptions, error) {\n\tss, err := NewRegistrationOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegistrationOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s Node) NewParameters(n int32) (Node_Parameter_List, error) {\n\tl, err := NewNode_Parameter_List(s.Struct.Segment(), n)\n\tif err != nil {\n\t\treturn Node_Parameter_List{}, err\n\t}\n\terr = s.Struct.SetPtr(5, l.List.ToPtr())\n\treturn l, err\n}", "func RegisterServer(n string) RegisterOption {\n\treturn func(o *registerOptions) {\n\t\to.servers = append(o.servers, n)\n\t}\n}", "func NewRegistrationServer_updateLocalConfiguration_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_updateLocalConfiguration_Params_List{l}, err\n}", "func NewParamServer(params []*autofunc.Variable, u Updater) *ParamServer {\n\treturn &ParamServer{\n\t\tparameters: params,\n\t\tupdater: u,\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewResult sets the result field to a newly allocated TunnelRegistration struct, preferring placement in s's segment.
func (s TunnelServer_registerTunnel_Results) NewResult() (TunnelRegistration, error) { ss, err := NewTunnelRegistration(s.Struct.Segment()) if err != nil { return TunnelRegistration{}, err } err = s.Struct.SetPtr(0, ss.Struct.ToPtr()) return ss, err }
[ "func (s TunnelServer_reconnectTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RegistrationServer_registerConnection_Results) NewResult() (ConnectionResponse, error) {\n\tss, err := NewConnectionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s SessionManager_registerUdpSession_Results) NewResult() (RegisterUdpSessionResponse, error) {\n\tss, err := NewRegisterUdpSessionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegisterUdpSessionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_authenticate_Results) NewResult() (AuthenticateResponse, error) {\n\tss, err := NewAuthenticateResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn AuthenticateResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_getServerInfo_Results) NewResult() (ServerInfo, error) {\n\tss, err := NewServerInfo(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ServerInfo{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s ConfigurationManager_updateConfiguration_Results) NewResult() (UpdateConfigurationResponse, error) {\n\tss, err := NewUpdateConfigurationResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn UpdateConfigurationResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func newResult(ip net.IP, domain, sender, hostname string) (r *Result) {\n\tbsender := []byte(sender)\n\n\tat := bytes.Index(bsender, []byte{'@'})\n\tr = &Result{\n\t\tIP: ip,\n\t\tDomain: []byte(domain),\n\t\tSender: []byte(sender),\n\t\tHostname: []byte(hostname),\n\t\tsenderLocal: bsender[:at],\n\t\tsenderDomain: bsender[at+1:],\n\t}\n\n\tif !libnet.IsHostnameValid(r.Domain, true) {\n\t\tr.Code = ResultCodeNone\n\t\tr.Err = \"invalid domain name\"\n\t\treturn\n\t}\n\n\treturn\n}", "func ConstructResult(hnsNetwork *hcsshim.HNSNetwork, hnsEndpoint *hcsshim.HNSEndpoint) (*current.Result, error) {\n\tresultInterface := &current.Interface{\n\t\tName: hnsEndpoint.Name,\n\t\tMac: hnsEndpoint.MacAddress,\n\t}\n\t_, ipSubnet, err := net.ParseCIDR(hnsNetwork.Subnets[0].AddressPrefix)\n\tif err != nil {\n\t\treturn nil, errors.Annotatef(err, \"failed to parse CIDR from %s\", hnsNetwork.Subnets[0].AddressPrefix)\n\t}\n\n\tvar ipVersion string\n\tif ipv4 := hnsEndpoint.IPAddress.To4(); ipv4 != nil {\n\t\tipVersion = \"4\"\n\t} else if ipv6 := hnsEndpoint.IPAddress.To16(); ipv6 != nil {\n\t\tipVersion = \"6\"\n\t} else {\n\t\treturn nil, fmt.Errorf(\"IPAddress of HNSEndpoint %s isn't a valid ipv4 or ipv6 Address\", hnsEndpoint.Name)\n\t}\n\n\tresultIPConfig := &current.IPConfig{\n\t\tVersion: ipVersion,\n\t\tAddress: net.IPNet{\n\t\t\tIP: hnsEndpoint.IPAddress,\n\t\t\tMask: ipSubnet.Mask},\n\t\tGateway: net.ParseIP(hnsEndpoint.GatewayAddress),\n\t}\n\tresult := &current.Result{}\n\tresult.Interfaces = []*current.Interface{resultInterface}\n\tresult.IPs = []*current.IPConfig{resultIPConfig}\n\n\treturn result, nil\n}", "func newSuccessResult(vres *inventoryviews.SuccessResultView) *SuccessResult {\n\tres := &SuccessResult{}\n\tif vres.OK != nil {\n\t\tres.OK = *vres.OK\n\t}\n\treturn res\n}", "func (m *registers) PushResult(r cell.I) {\n\t// println(\"push result\")\n\tm.dump = pair.Cons(r, m.dump)\n}", "func NewRegisterResult(message *user_methodpb.RegisterResponse) *usermethod.ResponseResult {\n\tresult := &usermethod.ResponseResult{\n\t\tCode: int(message.Code),\n\t}\n\tif message.Message_ != \"\" {\n\t\tresult.Message = &message.Message_\n\t}\n\tif message.Data != nil {\n\t\tresult.Data = make(map[string]string, len(message.Data))\n\t\tfor key, val := range message.Data {\n\t\t\ttk := key\n\t\t\ttv := val\n\t\t\tresult.Data[tk] = tv\n\t\t}\n\t}\n\treturn result\n}", "func newSuccessResult(vres *productviews.SuccessResultView) *SuccessResult {\n\tres := &SuccessResult{}\n\tif vres.OK != nil {\n\t\tres.OK = *vres.OK\n\t}\n\treturn res\n}", "func NewTunnelServer_registerTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_registerTunnel_Results_List{l}, err\n}", "func (p *ResultsServerServiceClient) RegisterSearchResult_(result *SearchResult_, taskType AnnotationTaskType) (err error) {\n if err = p.sendRegisterSearchResult_(result, taskType); err != nil { return }\n return p.recvRegisterSearchResult_()\n}", "func newResult(t reflect.Type, opts resultOptions) (result, error) {\n\tswitch {\n\tcase isIn(t) || (t.Kind() == reflect.Ptr && isIn(t.Elem())) || isEmbed(t, _inPtrType):\n\t\treturn nil, errf(\"cannot provide parameter objects\", \"%v embeds a dig.In\", t)\n\tcase isError(t):\n\t\treturn nil, errf(\"cannot return an error here, return it from the constructor instead\")\n\tcase isOut(t):\n\t\treturn newResultObject(t, opts)\n\tcase isEmbed(t, _outPtrType):\n\t\treturn nil, errf(\n\t\t\t\"cannot build a result object by embedding *dig.Out, embed dig.Out instead\",\n\t\t\t\"%v embeds *dig.Out\", t)\n\tcase t.Kind() == reflect.Ptr && isOut(t.Elem()):\n\t\treturn nil, errf(\n\t\t\t\"cannot return a pointer to a result object, use a value instead\",\n\t\t\t\"%v is a pointer to a struct that embeds dig.Out\", t)\n\tcase len(opts.Group) > 0:\n\t\tg, err := parseGroupString(opts.Group)\n\t\tif err != nil {\n\t\t\treturn nil, errf(\n\t\t\t\t\"cannot parse group %q\", opts.Group, err)\n\t\t}\n\t\trg := resultGrouped{Type: t, Group: g.Name, Flatten: g.Flatten}\n\t\tif g.Flatten {\n\t\t\tif t.Kind() != reflect.Slice {\n\t\t\t\treturn nil, errf(\n\t\t\t\t\t\"flatten can be applied to slices only\",\n\t\t\t\t\t\"%v is not a slice\", t)\n\t\t\t}\n\t\t\trg.Type = rg.Type.Elem()\n\t\t}\n\t\treturn rg, nil\n\tdefault:\n\t\treturn resultSingle{Type: t, Name: opts.Name}, nil\n\t}\n}", "func (m methodInfo) NewResult() interface{} {\n\treturn m.newResultFunc()\n}", "func UA_AddNodesResult_new() []UA_AddNodesResult {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[34]))[:]).([]UA_AddNodesResult)\n}", "func (r *runner) addResult(s result) result {\n\tm, ok := r.metrics[s.doResult.RequestLabel]\n\tif !ok {\n\t\tm = new(Metrics)\n\t\tr.metrics[s.doResult.RequestLabel] = m\n\t}\n\tm.add(s)\n\treturn s\n}", "func (this *SelectResult) BuildNewResult() (*sqltypes.Result, error) {\n\t//fmt.Println(this.tempRows)\n\terr := this.handleRowsGroupBy()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t//sort\n\tthis.sort()\n\t//\n\tthis.optTempFieldsRows()\n\t//\n\tthis.optTempFields()\n\t//\n\tvar rows [][]sqltypes.Value\n\tvar offset, rowcount int64\n\tif this.stmt.Limit != nil && len(this.tempRows) > 0{\n\t\tif this.stmt.Limit.Offset != nil {\n\t\t\ttbufOffset := sqlparser.NewTrackedBuffer(nil)\n\t\t\tthis.stmt.Limit.Offset.Format(tbufOffset)\n\t\t\toffset, err = strconv.ParseInt(tbufOffset.String(), 10, 64)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t\tif this.stmt.Limit.Rowcount != nil {\n\t\t\ttbufRowcount := sqlparser.NewTrackedBuffer(nil)\n\t\t\tthis.stmt.Limit.Rowcount.Format(tbufRowcount)\n\t\t\trowcount, err = strconv.ParseInt(tbufRowcount.String(), 10, 64)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t\t//\n\t\trows = make([][]sqltypes.Value,rowcount)\n\t\t//glog.Infof(\"### limit %d,%d\", offset, rowcount)\n\t\tif offset < int64(len(this.tempRows)) && rowcount > 0 {\n\t\t\tif offset+rowcount < int64(len(this.tempRows)) {\n\t\t\t\tcopy(rows, this.tempRows[offset:offset+rowcount])\n\t\t\t} else {\n\t\t\t\trows = make([][]sqltypes.Value,len(this.tempRows) - int(offset))\n\t\t\t\tcopy(rows, this.tempRows[offset:])\n\t\t\t}\n\t\t}\n\t} else {\n\t\trows = this.tempRows\n\t}\n\t//\n\tnewResult := &sqltypes.Result{\n\t\tFields: this.tempFields,\n\t\tRows: rows,\n\t\tRowsAffected: uint64(len(this.tempRows)),\n\t}\n\treturn newResult, nil\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewTunnelServer_registerTunnel_Results creates a new list of TunnelServer_registerTunnel_Results.
func NewTunnelServer_registerTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Results_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz) return TunnelServer_registerTunnel_Results_List{l}, err }
[ "func (s TunnelServer_registerTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewRegistrationServer_registerConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_registerConnection_Results_List{l}, err\n}", "func NewTunnelServer_unregisterTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Results_List{l}, err\n}", "func (s TunnelServer_reconnectTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewTunnelServer_getServerInfo_Results_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_getServerInfo_Results_List{l}, err\n}", "func NewTunnelServer_registerTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_registerTunnel_Params_List{l}, err\n}", "func NewTunnelServer_reconnectTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_reconnectTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_reconnectTunnel_Results_List{l}, err\n}", "func NewTunnelServer_authenticate_Results_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_authenticate_Results_List{l}, err\n}", "func (s RegistrationServer_registerConnection_Results) NewResult() (ConnectionResponse, error) {\n\tss, err := NewConnectionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewTunnelRegistration_List(s *capnp.Segment, sz int32) (TunnelRegistration_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 6}, sz)\n\treturn TunnelRegistration_List{l}, err\n}", "func NewSessionManager_registerUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_registerUdpSession_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn SessionManager_registerUdpSession_Results_List{l}, err\n}", "func (s SessionManager_registerUdpSession_Results) NewResult() (RegisterUdpSessionResponse, error) {\n\tss, err := NewRegisterUdpSessionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegisterUdpSessionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func UA_RegisterServer2Response_new() []UA_RegisterServer2Response {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[165]))[:]).([]UA_RegisterServer2Response)\n}", "func NewRegistrationServer_unregisterConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Results_List{l}, err\n}", "func NewRegisterResult(message *user_methodpb.RegisterResponse) *usermethod.ResponseResult {\n\tresult := &usermethod.ResponseResult{\n\t\tCode: int(message.Code),\n\t}\n\tif message.Message_ != \"\" {\n\t\tresult.Message = &message.Message_\n\t}\n\tif message.Data != nil {\n\t\tresult.Data = make(map[string]string, len(message.Data))\n\t\tfor key, val := range message.Data {\n\t\t\ttk := key\n\t\t\ttv := val\n\t\t\tresult.Data[tk] = tv\n\t\t}\n\t}\n\treturn result\n}", "func (s TunnelServer_getServerInfo_Results) NewResult() (ServerInfo, error) {\n\tss, err := NewServerInfo(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ServerInfo{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func UA_RegisterNodesResponse_new() []UA_RegisterNodesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[120]))[:]).([]UA_RegisterNodesResponse)\n}", "func UA_RegisterServerResponse_new() []UA_RegisterServerResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[149]))[:]).([]UA_RegisterServerResponse)\n}", "func (r *Register) RegisterServerAll(nameServerAddressList *singlylinkedlist.List) {\n\tif nameServerAddressList != nil && !nameServerAddressList.Empty() {\n\t\trequest := namesrv.Request{}\n\t\trequest.ActionType = namesrv.ActionRegister\n\t\trreq := common.RegisterRequestConfig\n\t\tif rreq.ServerAddr == \"\" {\n\t\t\trreq.ServerAddr = netutil.GetLocalIP()\n\t\t}\n\t\tif rreq.HaServerAddr == \"\" {\n\t\t\trreq.HaServerAddr = netutil.GetLocalIP()\n\t\t}\n\t\tbody, _ := json.Marshal(rreq)\n\t\trequest.Body = body\n\t\twg := sync.WaitGroup{}\n\t\twg.Add(nameServerAddressList.Size())\n\t\tnameServerAddressList.Each(func(index int, value interface{}) {\n\t\t\tnamesrvAddr, _ := value.(string)\n\t\t\tgo registerServer(namesrvAddr, 1000, request, &wg)\n\t\t})\n\t\twg.Wait()\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewTunnelServer_getServerInfo_Params creates a new list of TunnelServer_getServerInfo_Params.
func NewTunnelServer_getServerInfo_Params_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Params_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz) return TunnelServer_getServerInfo_Params_List{l}, err }
[ "func NewTunnelServer_getServerInfo_Results_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_getServerInfo_Results_List{l}, err\n}", "func newServerInfo(addr, port, password, method string) *serverInfo {\n\treturn &serverInfo{addr, port, password, method}\n}", "func (s *Server) ServerInfo() *ServerInfo {\n\tinfo := &ServerInfo{\n\t\tMethods: []string{\"*\"},\n\t\tMetrics: make(map[string]any),\n\t\tStartTime: s.start,\n\t}\n\tserverMetrics.Do(func(kv expvar.KeyValue) {\n\t\tinfo.Metrics[kv.Key] = json.RawMessage(kv.Value.String())\n\t})\n\tif n, ok := s.mux.(Namer); ok {\n\t\tinfo.Methods = n.Names()\n\t}\n\treturn info\n}", "func (a *ConfigApiService) GetServerParameters(ctx context.Context, server string) ([]KeyValue, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Get\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue []KeyValue\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/config/server/{server}/params\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"server\"+\"}\", fmt.Sprintf(\"%v\", server), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode < 300 {\n\t\t// If we succeed, return the data, otherwise pass on to decode error.\n\t\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\tif err == nil { \n\t\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t\t}\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 200 {\n\t\t\tvar v []KeyValue\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 404 {\n\t\t\tvar v ErrorList\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 500 {\n\t\t\tvar v ErrorList\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHttpResponse, nil\n}", "func NewGetServerLogsParams() *GetServerLogsParams {\n\tvar (\n\t\tlogTypeDefault = string(\"all\")\n\t\toffsetDefault = int64(10000)\n\t\toriginDefault = string(\"end\")\n\t)\n\treturn &GetServerLogsParams{\n\t\tLogType: &logTypeDefault,\n\t\tOffset: &offsetDefault,\n\t\tOrigin: &originDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewServerInfo_List(s *capnp.Segment, sz int32) (ServerInfo_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn ServerInfo_List{l}, err\n}", "func (*CloudantV1) NewGetServerInformationOptions() *GetServerInformationOptions {\n\treturn &GetServerInformationOptions{}\n}", "func NewParamServer(params []*autofunc.Variable, u Updater) *ParamServer {\n\treturn &ParamServer{\n\t\tparameters: params,\n\t\tupdater: u,\n\t}\n}", "func NewTunnelServer_registerTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_registerTunnel_Params_List{l}, err\n}", "func GetServerInfo(ctx context.Context, host string, attemptDecode bool) (server Server, err error) {\n\tquery, err := NewQuery(host)\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer func() {\n\t\tif e := query.Close(); e != nil {\n\t\t\tpanic(e)\n\t\t}\n\t}()\n\n\tping, err := query.GetPing(ctx)\n\tif err != nil {\n\t\treturn\n\t}\n\tserver.Ping = int(ping)\n\n\tserver, err = query.GetInfo(ctx, attemptDecode)\n\tif err != nil {\n\t\treturn\n\t}\n\tserver.Address = host\n\n\tserver.Rules, err = query.GetRules(ctx)\n\tif err != nil {\n\t\treturn\n\t}\n\n\treturn\n}", "func (in *ServerKeyParameters) DeepCopy() *ServerKeyParameters {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(ServerKeyParameters)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func NewServerInfoAPI(serverRegion string) *ServerInfoAPI {\n\treturn &ServerInfoAPI{\n\t\tserverRegion: serverRegion,\n\t}\n}", "func (srv *BaseServer) NodeInfo() *NodeInfo {\n\tnode := srv.Self()\n\n\t// Gather and assemble the generic node infos\n\tinfo := &NodeInfo{\n\t\tName: srv.Name(),\n\t\tEnode: node.String(),\n\t\tID: node.ID.String(),\n\t\tIP: node.IP.String(),\n\t\tListenAddr: srv.ListenAddr,\n\t\tProtocols: make(map[string]interface{}),\n\t}\n\tinfo.Ports.Discovery = int(node.UDP)\n\tinfo.Ports.Listener = int(node.TCP)\n\n\t// Gather all the running protocol infos (only once per protocol type)\n\tfor _, proto := range srv.Protocols {\n\t\tif _, ok := info.Protocols[proto.Name]; !ok {\n\t\t\tnodeInfo := interface{}(\"unknown\")\n\t\t\tif query := proto.NodeInfo; query != nil {\n\t\t\t\tnodeInfo = proto.NodeInfo()\n\t\t\t}\n\t\t\tinfo.Protocols[proto.Name] = nodeInfo\n\t\t}\n\t}\n\treturn info\n}", "func (s SandstormHttpBridge_getSessionRequest_Results) NewRequestInfo(n int32) (powerbox.PowerboxDescriptor_List, error) {\n\tl, err := powerbox.NewPowerboxDescriptor_List(capnp.Struct(s).Segment(), n)\n\tif err != nil {\n\t\treturn powerbox.PowerboxDescriptor_List{}, err\n\t}\n\terr = capnp.Struct(s).SetPtr(0, l.ToPtr())\n\treturn l, err\n}", "func NewTunnelServer_authenticate_Params_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_authenticate_Params_List{l}, err\n}", "func (c Client) DownloadStationInfoSetServerConfig(config map[string]string) (interface{}, error) {\n\tparams := map[string]string{\n\t\t\"api\": \"SYNO.DownloadStation.Info\",\n\t\t\"version\": \"1\",\n\t\t\"method\": \"setserverconfig\",\n\t}\n\tfor k, v := range config {\n\t\tif v != \"\" {\n\t\t\tparams[k] = v\n\t\t}\n\t}\n\treturn c.get(\n\t\t\"/webapi/DownloadStation/info.cgi\",\n\t\tparams,\n\t\tmap[int]string{},\n\t)\n}", "func NewTunnelServer_unregisterTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Params_List{l}, err\n}", "func generateServerParams(param int) (string, string, error) {\n\tif param < 0 {\n\t\treturn \"\", \"\", errors.New(\"server number should be non-negative\")\n\t}\n\tcurrPort := basePort + param\n\tcurrPortAddr := \":\" + strconv.Itoa(currPort)\n\tcurrServerName := serverName + strconv.Itoa(param+1)\n\treturn currServerName, currPortAddr, nil\n}", "func (in *FlexibleServerParameters) DeepCopy() *FlexibleServerParameters {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(FlexibleServerParameters)\n\tin.DeepCopyInto(out)\n\treturn out\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewResult sets the result field to a newly allocated ServerInfo struct, preferring placement in s's segment.
func (s TunnelServer_getServerInfo_Results) NewResult() (ServerInfo, error) { ss, err := NewServerInfo(s.Struct.Segment()) if err != nil { return ServerInfo{}, err } err = s.Struct.SetPtr(0, ss.Struct.ToPtr()) return ss, err }
[ "func (s RegistrationServer_registerConnection_Results) NewResult() (ConnectionResponse, error) {\n\tss, err := NewConnectionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_authenticate_Results) NewResult() (AuthenticateResponse, error) {\n\tss, err := NewAuthenticateResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn AuthenticateResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewResultInfo()(*ResultInfo) {\n m := &ResultInfo{\n }\n m.SetAdditionalData(make(map[string]interface{}));\n return m\n}", "func (s GatewayRouter_routeForeignHostname_Results) NewInfo() (GatewayRouter_ForeignHostnameInfo, error) {\n\tss, err := NewGatewayRouter_ForeignHostnameInfo(s.Struct.Segment())\n\tif err != nil {\n\t\treturn GatewayRouter_ForeignHostnameInfo{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_registerTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s GatewayRouter_routeForeignHostname_Results) NewInfo() (GatewayRouter_ForeignHostnameInfo, error) {\n\tss, err := NewGatewayRouter_ForeignHostnameInfo(capnp.Struct(s).Segment())\n\tif err != nil {\n\t\treturn GatewayRouter_ForeignHostnameInfo{}, err\n\t}\n\terr = capnp.Struct(s).SetPtr(0, capnp.Struct(ss).ToPtr())\n\treturn ss, err\n}", "func newSuccessResult(vres *inventoryviews.SuccessResultView) *SuccessResult {\n\tres := &SuccessResult{}\n\tif vres.OK != nil {\n\t\tres.OK = *vres.OK\n\t}\n\treturn res\n}", "func (s TunnelServer_reconnectTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s ConfigurationManager_updateConfiguration_Results) NewResult() (UpdateConfigurationResponse, error) {\n\tss, err := NewUpdateConfigurationResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn UpdateConfigurationResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func newServerInfo(addr, port, password, method string) *serverInfo {\n\treturn &serverInfo{addr, port, password, method}\n}", "func newSuccessResult(vres *productviews.SuccessResultView) *SuccessResult {\n\tres := &SuccessResult{}\n\tif vres.OK != nil {\n\t\tres.OK = *vres.OK\n\t}\n\treturn res\n}", "func newResult(ip net.IP, domain, sender, hostname string) (r *Result) {\n\tbsender := []byte(sender)\n\n\tat := bytes.Index(bsender, []byte{'@'})\n\tr = &Result{\n\t\tIP: ip,\n\t\tDomain: []byte(domain),\n\t\tSender: []byte(sender),\n\t\tHostname: []byte(hostname),\n\t\tsenderLocal: bsender[:at],\n\t\tsenderDomain: bsender[at+1:],\n\t}\n\n\tif !libnet.IsHostnameValid(r.Domain, true) {\n\t\tr.Code = ResultCodeNone\n\t\tr.Err = \"invalid domain name\"\n\t\treturn\n\t}\n\n\treturn\n}", "func (m methodInfo) NewResult() interface{} {\n\treturn m.newResultFunc()\n}", "func ConstructResult(hnsNetwork *hcsshim.HNSNetwork, hnsEndpoint *hcsshim.HNSEndpoint) (*current.Result, error) {\n\tresultInterface := &current.Interface{\n\t\tName: hnsEndpoint.Name,\n\t\tMac: hnsEndpoint.MacAddress,\n\t}\n\t_, ipSubnet, err := net.ParseCIDR(hnsNetwork.Subnets[0].AddressPrefix)\n\tif err != nil {\n\t\treturn nil, errors.Annotatef(err, \"failed to parse CIDR from %s\", hnsNetwork.Subnets[0].AddressPrefix)\n\t}\n\n\tvar ipVersion string\n\tif ipv4 := hnsEndpoint.IPAddress.To4(); ipv4 != nil {\n\t\tipVersion = \"4\"\n\t} else if ipv6 := hnsEndpoint.IPAddress.To16(); ipv6 != nil {\n\t\tipVersion = \"6\"\n\t} else {\n\t\treturn nil, fmt.Errorf(\"IPAddress of HNSEndpoint %s isn't a valid ipv4 or ipv6 Address\", hnsEndpoint.Name)\n\t}\n\n\tresultIPConfig := &current.IPConfig{\n\t\tVersion: ipVersion,\n\t\tAddress: net.IPNet{\n\t\t\tIP: hnsEndpoint.IPAddress,\n\t\t\tMask: ipSubnet.Mask},\n\t\tGateway: net.ParseIP(hnsEndpoint.GatewayAddress),\n\t}\n\tresult := &current.Result{}\n\tresult.Interfaces = []*current.Interface{resultInterface}\n\tresult.IPs = []*current.IPConfig{resultIPConfig}\n\n\treturn result, nil\n}", "func newSuccessResultView(res *SuccessResult) *inventoryviews.SuccessResultView {\n\tvres := &inventoryviews.SuccessResultView{\n\t\tOK: &res.OK,\n\t}\n\treturn vres\n}", "func newSuccessResultView(res *SuccessResult) *productviews.SuccessResultView {\n\tvres := &productviews.SuccessResultView{\n\t\tOK: &res.OK,\n\t}\n\treturn vres\n}", "func NewServerInfo_List(s *capnp.Segment, sz int32) (ServerInfo_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn ServerInfo_List{l}, err\n}", "func NewTunnelServer_getServerInfo_Results_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_getServerInfo_Results_List{l}, err\n}", "func (s CoreBanking_createAccount_Results) NewRes() (Response, error) {\n\tss, err := NewResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Response{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewTunnelServer_getServerInfo_Results creates a new list of TunnelServer_getServerInfo_Results.
func NewTunnelServer_getServerInfo_Results_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Results_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz) return TunnelServer_getServerInfo_Results_List{l}, err }
[ "func (s TunnelServer_getServerInfo_Results) NewResult() (ServerInfo, error) {\n\tss, err := NewServerInfo(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ServerInfo{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewTunnelServer_registerTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_registerTunnel_Results_List{l}, err\n}", "func NewTunnelServer_getServerInfo_Params_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_getServerInfo_Params_List{l}, err\n}", "func NewTunnelServer_authenticate_Results_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_authenticate_Results_List{l}, err\n}", "func (s TunnelServer_registerTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewTunnelServer_unregisterTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Results_List{l}, err\n}", "func NewTunnelServer_reconnectTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_reconnectTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_reconnectTunnel_Results_List{l}, err\n}", "func newServerInfo(addr, port, password, method string) *serverInfo {\n\treturn &serverInfo{addr, port, password, method}\n}", "func GetServerInfo(ctx context.Context, host string, attemptDecode bool) (server Server, err error) {\n\tquery, err := NewQuery(host)\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer func() {\n\t\tif e := query.Close(); e != nil {\n\t\t\tpanic(e)\n\t\t}\n\t}()\n\n\tping, err := query.GetPing(ctx)\n\tif err != nil {\n\t\treturn\n\t}\n\tserver.Ping = int(ping)\n\n\tserver, err = query.GetInfo(ctx, attemptDecode)\n\tif err != nil {\n\t\treturn\n\t}\n\tserver.Address = host\n\n\tserver.Rules, err = query.GetRules(ctx)\n\tif err != nil {\n\t\treturn\n\t}\n\n\treturn\n}", "func (s *Server) ServerInfo() *ServerInfo {\n\tinfo := &ServerInfo{\n\t\tMethods: []string{\"*\"},\n\t\tMetrics: make(map[string]any),\n\t\tStartTime: s.start,\n\t}\n\tserverMetrics.Do(func(kv expvar.KeyValue) {\n\t\tinfo.Metrics[kv.Key] = json.RawMessage(kv.Value.String())\n\t})\n\tif n, ok := s.mux.(Namer); ok {\n\t\tinfo.Methods = n.Names()\n\t}\n\treturn info\n}", "func NewServerInfo_List(s *capnp.Segment, sz int32) (ServerInfo_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn ServerInfo_List{l}, err\n}", "func (s TunnelServer_authenticate_Results) NewResult() (AuthenticateResponse, error) {\n\tss, err := NewAuthenticateResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn AuthenticateResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewResults(del []*asura.ResponseDeliverTx) AsuraResults {\n\tres := make(AsuraResults, len(del))\n\tfor i, d := range del {\n\t\tres[i] = NewResultFromResponse(d)\n\t}\n\treturn res\n}", "func (s TunnelServer_reconnectTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (client SyncAgentsClient) ListByServerNextResults(lastResults SyncAgentListResult) (result SyncAgentListResult, err error) {\n\treq, err := lastResults.SyncAgentListResultPreparer()\n\tif err != nil {\n\t\treturn result, autorest.NewErrorWithError(err, \"sql.SyncAgentsClient\", \"ListByServer\", nil, \"Failure preparing next results request\")\n\t}\n\tif req == nil {\n\t\treturn\n\t}\n\n\tresp, err := client.ListByServerSender(req)\n\tif err != nil {\n\t\tresult.Response = autorest.Response{Response: resp}\n\t\treturn result, autorest.NewErrorWithError(err, \"sql.SyncAgentsClient\", \"ListByServer\", resp, \"Failure sending next results request\")\n\t}\n\n\tresult, err = client.ListByServerResponder(resp)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"sql.SyncAgentsClient\", \"ListByServer\", resp, \"Failure responding to next results request\")\n\t}\n\n\treturn\n}", "func UA_FindServersOnNetworkResponse_new() []UA_FindServersOnNetworkResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[89]))[:]).([]UA_FindServersOnNetworkResponse)\n}", "func UA_FindServersResponse_new() []UA_FindServersResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[194]))[:]).([]UA_FindServersResponse)\n}", "func NewRegistrationServer_updateLocalConfiguration_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_updateLocalConfiguration_Results_List{l}, err\n}", "func (t *TestProxy) GetServers(ctx context.Context, domainName string, labels map[string]string) ([]services.Server, error) {\n\treturn nil, nil\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewTunnelServer_unregisterTunnel_Params creates a new list of TunnelServer_unregisterTunnel_Params.
func NewTunnelServer_unregisterTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Params_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 0}, sz) return TunnelServer_unregisterTunnel_Params_List{l}, err }
[ "func NewRegistrationServer_unregisterConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Params_List{l}, err\n}", "func NewTunnelServer_unregisterTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Results_List{l}, err\n}", "func NewSessionManager_unregisterUdpSession_Params_List(s *capnp.Segment, sz int32) (SessionManager_unregisterUdpSession_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn SessionManager_unregisterUdpSession_Params_List{l}, err\n}", "func NewTunnelServer_registerTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_registerTunnel_Params_List{l}, err\n}", "func NewTunnelServer_getServerInfo_Params_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_getServerInfo_Params_List{l}, err\n}", "func (in *ActionApiServerUnlockTransactionSigningKeyInput) UnselectParameters(params ...string) *ActionApiServerUnlockTransactionSigningKeyInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func (in *ActionVpsReinstallInput) UnselectParameters(params ...string) *ActionVpsReinstallInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func NewTunnelServer_reconnectTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_reconnectTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 5}, sz)\n\treturn TunnelServer_reconnectTunnel_Params_List{l}, err\n}", "func (in *ActionVpsCloneInput) UnselectParameters(params ...string) *ActionVpsCloneInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func (in *ActionUserTotpDeviceUpdateInput) UnselectParameters(params ...string) *ActionUserTotpDeviceUpdateInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func (in *ActionUserEnvironmentConfigUpdateInput) UnselectParameters(params ...string) *ActionUserEnvironmentConfigUpdateInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func (in *ActionIpAddressCreateInput) UnselectParameters(params ...string) *ActionIpAddressCreateInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func NewTunnelServer_obsoleteDeclarativeTunnelConnect_Params_List(s *capnp.Segment, sz int32) (TunnelServer_obsoleteDeclarativeTunnelConnect_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_obsoleteDeclarativeTunnelConnect_Params_List{l}, err\n}", "func (in *ActionIncomingPaymentUpdateInput) UnselectParameters(params ...string) *ActionIncomingPaymentUpdateInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func (in *ActionIncomingPaymentIndexInput) UnselectParameters(params ...string) *ActionIncomingPaymentIndexInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func (in *ActionMailRecipientCreateInput) UnselectParameters(params ...string) *ActionMailRecipientCreateInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func (in *ActionOsTemplateCreateInput) UnselectParameters(params ...string) *ActionOsTemplateCreateInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func (in *ActionOutageCreateInput) UnselectParameters(params ...string) *ActionOutageCreateInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func (in *ActionUserPaymentCreateInput) UnselectParameters(params ...string) *ActionUserPaymentCreateInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewTunnelServer_unregisterTunnel_Results creates a new list of TunnelServer_unregisterTunnel_Results.
func NewTunnelServer_unregisterTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Results_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz) return TunnelServer_unregisterTunnel_Results_List{l}, err }
[ "func NewRegistrationServer_unregisterConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Results_List{l}, err\n}", "func NewTunnelServer_registerTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_registerTunnel_Results_List{l}, err\n}", "func NewTunnelServer_unregisterTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Params_List{l}, err\n}", "func NewSessionManager_unregisterUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_unregisterUdpSession_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn SessionManager_unregisterUdpSession_Results_List{l}, err\n}", "func NewTunnelServer_getServerInfo_Results_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_getServerInfo_Results_List{l}, err\n}", "func NewTunnelServer_reconnectTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_reconnectTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_reconnectTunnel_Results_List{l}, err\n}", "func (s TunnelServer_registerTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewAppHooks_drop_Results_List(s *capnp.Segment, sz int32) (AppHooks_drop_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn capnp.StructList[AppHooks_drop_Results](l), err\n}", "func (s TunnelServer_reconnectTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewTunnelServer_authenticate_Results_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_authenticate_Results_List{l}, err\n}", "func NewTunnelServer_obsoleteDeclarativeTunnelConnect_Results_List(s *capnp.Segment, sz int32) (TunnelServer_obsoleteDeclarativeTunnelConnect_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_obsoleteDeclarativeTunnelConnect_Results_List{l}, err\n}", "func UA_UnregisterNodesResponse_new() []UA_UnregisterNodesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[129]))[:]).([]UA_UnregisterNodesResponse)\n}", "func NewRegistrationServer_registerConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_registerConnection_Results_List{l}, err\n}", "func NewSessionManager_registerUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_registerUdpSession_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn SessionManager_registerUdpSession_Results_List{l}, err\n}", "func NewRegistrationServer_unregisterConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Params_List{l}, err\n}", "func UA_RegisterServer2Response_new() []UA_RegisterServer2Response {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[165]))[:]).([]UA_RegisterServer2Response)\n}", "func NewAppHooks_restore_Results_List(s *capnp.Segment, sz int32) (AppHooks_restore_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn capnp.StructList[AppHooks_restore_Results](l), err\n}", "func (s SessionManager_registerUdpSession_Results) NewResult() (RegisterUdpSessionResponse, error) {\n\tss, err := NewRegisterUdpSessionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegisterUdpSessionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewRegistrationServer_updateLocalConfiguration_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_updateLocalConfiguration_Results_List{l}, err\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewTunnelServer_obsoleteDeclarativeTunnelConnect_Params creates a new list of TunnelServer_obsoleteDeclarativeTunnelConnect_Params.
func NewTunnelServer_obsoleteDeclarativeTunnelConnect_Params_List(s *capnp.Segment, sz int32) (TunnelServer_obsoleteDeclarativeTunnelConnect_Params_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz) return TunnelServer_obsoleteDeclarativeTunnelConnect_Params_List{l}, err }
[ "func NewTunnelServer_obsoleteDeclarativeTunnelConnect_Results_List(s *capnp.Segment, sz int32) (TunnelServer_obsoleteDeclarativeTunnelConnect_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_obsoleteDeclarativeTunnelConnect_Results_List{l}, err\n}", "func NewTunnelServer_unregisterTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Params_List{l}, err\n}", "func NewTunnelServer_reconnectTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_reconnectTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 5}, sz)\n\treturn TunnelServer_reconnectTunnel_Params_List{l}, err\n}", "func NewTunnelServer_registerTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_registerTunnel_Params_List{l}, err\n}", "func NewRegistrationServer_unregisterConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Params_List{l}, err\n}", "func NewTunnelServer_authenticate_Params_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_authenticate_Params_List{l}, err\n}", "func NewShellCli_renewCertificateNow_Params_List(s *capnp.Segment, sz int32) (ShellCli_renewCertificateNow_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn capnp.StructList[ShellCli_renewCertificateNow_Params](l), err\n}", "func NewTunnelServer_getServerInfo_Params_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_getServerInfo_Params_List{l}, err\n}", "func (c *Controller) removeStaleTunnelPorts() error {\n\tnodes, err := c.nodeLister.List(labels.Everything())\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error when listing Nodes: %v\", err)\n\t}\n\t// desiredInterfaces is the set of interfaces we wish to have, based on the current list of\n\t// Nodes. If a tunnel port corresponds to a valid Node but its configuration is wrong, we\n\t// will not include it in the set.\n\tdesiredInterfaces := make(map[string]bool)\n\t// knownInterfaces is the list of interfaces currently in the local cache.\n\tknownInterfaces := c.interfaceStore.GetInterfaceKeysByType(interfacestore.TunnelInterface)\n\n\tif c.networkConfig.TrafficEncryptionMode == config.TrafficEncryptionModeIPSec {\n\t\tfor _, node := range nodes {\n\t\t\tinterfaceConfig, found := c.interfaceStore.GetNodeTunnelInterface(node.Name)\n\t\t\tif !found {\n\t\t\t\t// Tunnel port not created for this Node, nothing to do.\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tpeerNodeIPs, err := k8s.GetNodeAddrs(node)\n\t\t\tif err != nil {\n\t\t\t\tklog.Errorf(\"Failed to retrieve IP address of Node %s: %v\", node.Name, err)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tifaceID := util.GenerateNodeTunnelInterfaceKey(node.Name)\n\t\t\tifaceName := util.GenerateNodeTunnelInterfaceName(node.Name)\n\t\t\tif c.compareInterfaceConfig(interfaceConfig, peerNodeIPs.IPv4, ifaceName) || c.compareInterfaceConfig(interfaceConfig, peerNodeIPs.IPv6, ifaceName) {\n\t\t\t\tdesiredInterfaces[ifaceID] = true\n\t\t\t}\n\t\t}\n\t}\n\n\t// remove all ports which are no longer needed or for which the configuration is no longer\n\t// valid.\n\tfor _, ifaceID := range knownInterfaces {\n\t\tif _, found := desiredInterfaces[ifaceID]; found {\n\t\t\t// this interface matches an existing Node, nothing to do.\n\t\t\tcontinue\n\t\t}\n\t\tinterfaceConfig, found := c.interfaceStore.GetInterface(ifaceID)\n\t\tif !found {\n\t\t\t// should not happen, nothing should have concurrent access to the interface\n\t\t\t// store for tunnel interfaces.\n\t\t\tklog.Errorf(\"Interface %s can no longer be found in the interface store\", ifaceID)\n\t\t\tcontinue\n\t\t}\n\t\tif interfaceConfig.InterfaceName == c.nodeConfig.DefaultTunName {\n\t\t\tcontinue\n\t\t}\n\t\tif err := c.ovsBridgeClient.DeletePort(interfaceConfig.PortUUID); err != nil {\n\t\t\tklog.Errorf(\"Failed to delete OVS tunnel port %s: %v\", interfaceConfig.InterfaceName, err)\n\t\t} else {\n\t\t\tc.interfaceStore.DeleteInterface(interfaceConfig)\n\t\t}\n\t}\n\n\treturn nil\n}", "func (s Method) NewImplicitParameters(n int32) (Node_Parameter_List, error) {\n\tl, err := NewNode_Parameter_List(s.Struct.Segment(), n)\n\tif err != nil {\n\t\treturn Node_Parameter_List{}, err\n\t}\n\terr = s.Struct.SetPtr(4, l.List.ToPtr())\n\treturn l, err\n}", "func WithLegacyMigrationPorts() option {\n\tconst LibvirtDirectMigrationPort = 49152\n\tconst LibvirtBlockMigrationPort = 49153\n\treturn func(m *MasqPod) {\n\t\tm.migrationPorts = []string{strconv.Itoa(LibvirtDirectMigrationPort), strconv.Itoa(LibvirtBlockMigrationPort)}\n\t}\n}", "func NewRegistrationServer_updateLocalConfiguration_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_updateLocalConfiguration_Params_List{l}, err\n}", "func (in *ActionIncomingPaymentUpdateInput) UnselectParameters(params ...string) *ActionIncomingPaymentUpdateInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func NewUnignoreParams() *UnignoreParams {\n\tvar ()\n\treturn &UnignoreParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func ConnectTimeout(timeout time.Duration) ClientOption {\n\tlog.Println(\"The ConnectTimeout client option is deprecated and will be removed.\")\n\treturn OptClientConnectTimeout(timeout)\n}", "func (in *ActionUserTotpDeviceUpdateInput) UnselectParameters(params ...string) *ActionUserTotpDeviceUpdateInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func (in *ActionVpsCloneInput) UnselectParameters(params ...string) *ActionVpsCloneInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func (mr *MockApplicationGatewaysClientAPIMockRecorder) ListAvailableServerVariables(ctx interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"ListAvailableServerVariables\", reflect.TypeOf((*MockApplicationGatewaysClientAPI)(nil).ListAvailableServerVariables), ctx)\n}", "func NewAMQPTLSUnwrapped(lconn io.ReadWriteCloser, laddr, raddr *net.TCPAddr, addr string) *AMQPProxy {\n\tp := NewAMQP(lconn, laddr, raddr)\n\tp.tlsUnwrapp = true\n\tp.tlsAddress = addr\n\treturn p\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewTunnelServer_obsoleteDeclarativeTunnelConnect_Results creates a new list of TunnelServer_obsoleteDeclarativeTunnelConnect_Results.
func NewTunnelServer_obsoleteDeclarativeTunnelConnect_Results_List(s *capnp.Segment, sz int32) (TunnelServer_obsoleteDeclarativeTunnelConnect_Results_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz) return TunnelServer_obsoleteDeclarativeTunnelConnect_Results_List{l}, err }
[ "func NewTunnelServer_obsoleteDeclarativeTunnelConnect_Params_List(s *capnp.Segment, sz int32) (TunnelServer_obsoleteDeclarativeTunnelConnect_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_obsoleteDeclarativeTunnelConnect_Params_List{l}, err\n}", "func NewTunnelServer_unregisterTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Results_List{l}, err\n}", "func NewTunnelServer_reconnectTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_reconnectTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_reconnectTunnel_Results_List{l}, err\n}", "func NewTunnelServer_registerTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_registerTunnel_Results_List{l}, err\n}", "func NewRegistrationServer_unregisterConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Results_List{l}, err\n}", "func NewTunnelServer_authenticate_Results_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_authenticate_Results_List{l}, err\n}", "func (s TunnelServer_reconnectTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (c *Controller) removeStaleTunnelPorts() error {\n\tnodes, err := c.nodeLister.List(labels.Everything())\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error when listing Nodes: %v\", err)\n\t}\n\t// desiredInterfaces is the set of interfaces we wish to have, based on the current list of\n\t// Nodes. If a tunnel port corresponds to a valid Node but its configuration is wrong, we\n\t// will not include it in the set.\n\tdesiredInterfaces := make(map[string]bool)\n\t// knownInterfaces is the list of interfaces currently in the local cache.\n\tknownInterfaces := c.interfaceStore.GetInterfaceKeysByType(interfacestore.TunnelInterface)\n\n\tif c.networkConfig.TrafficEncryptionMode == config.TrafficEncryptionModeIPSec {\n\t\tfor _, node := range nodes {\n\t\t\tinterfaceConfig, found := c.interfaceStore.GetNodeTunnelInterface(node.Name)\n\t\t\tif !found {\n\t\t\t\t// Tunnel port not created for this Node, nothing to do.\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tpeerNodeIPs, err := k8s.GetNodeAddrs(node)\n\t\t\tif err != nil {\n\t\t\t\tklog.Errorf(\"Failed to retrieve IP address of Node %s: %v\", node.Name, err)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tifaceID := util.GenerateNodeTunnelInterfaceKey(node.Name)\n\t\t\tifaceName := util.GenerateNodeTunnelInterfaceName(node.Name)\n\t\t\tif c.compareInterfaceConfig(interfaceConfig, peerNodeIPs.IPv4, ifaceName) || c.compareInterfaceConfig(interfaceConfig, peerNodeIPs.IPv6, ifaceName) {\n\t\t\t\tdesiredInterfaces[ifaceID] = true\n\t\t\t}\n\t\t}\n\t}\n\n\t// remove all ports which are no longer needed or for which the configuration is no longer\n\t// valid.\n\tfor _, ifaceID := range knownInterfaces {\n\t\tif _, found := desiredInterfaces[ifaceID]; found {\n\t\t\t// this interface matches an existing Node, nothing to do.\n\t\t\tcontinue\n\t\t}\n\t\tinterfaceConfig, found := c.interfaceStore.GetInterface(ifaceID)\n\t\tif !found {\n\t\t\t// should not happen, nothing should have concurrent access to the interface\n\t\t\t// store for tunnel interfaces.\n\t\t\tklog.Errorf(\"Interface %s can no longer be found in the interface store\", ifaceID)\n\t\t\tcontinue\n\t\t}\n\t\tif interfaceConfig.InterfaceName == c.nodeConfig.DefaultTunName {\n\t\t\tcontinue\n\t\t}\n\t\tif err := c.ovsBridgeClient.DeletePort(interfaceConfig.PortUUID); err != nil {\n\t\t\tklog.Errorf(\"Failed to delete OVS tunnel port %s: %v\", interfaceConfig.InterfaceName, err)\n\t\t} else {\n\t\t\tc.interfaceStore.DeleteInterface(interfaceConfig)\n\t\t}\n\t}\n\n\treturn nil\n}", "func UA_UnregisterNodesResponse_new() []UA_UnregisterNodesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[129]))[:]).([]UA_UnregisterNodesResponse)\n}", "func NewTunnelServer_unregisterTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Params_List{l}, err\n}", "func (nf *NodeFilter) ProxyOutdatedNodes(params cke.ProxyParams) (nodes []*cke.Node) {\n\tif nf.cluster.Options.Proxy.Disable {\n\t\treturn nil\n\t}\n\tcurrentExtra := nf.cluster.Options.Proxy\n\n\tfor _, n := range nf.cluster.Nodes {\n\t\tst := nf.nodeStatus(n).Proxy\n\t\tcurrentBuiltIn := k8s.ProxyParams()\n\t\tcurrentConfig := k8s.GenerateProxyConfiguration(params, n)\n\t\trunningConfig := st.Config\n\t\tswitch {\n\t\tcase !st.Running:\n\t\t\t// stopped nodes are excluded\n\t\tcase cke.KubernetesImage.Name() != st.Image:\n\t\t\tfallthrough\n\t\tcase !currentBuiltIn.Equal(st.BuiltInParams):\n\t\t\tfallthrough\n\t\tcase !currentExtra.Equal(st.ExtraParams):\n\t\t\tfallthrough\n\t\tcase !equality.Semantic.DeepEqual(currentConfig, runningConfig):\n\t\t\tlog.Debug(\"proxy outdated\", map[string]interface{}{\n\t\t\t\t\"node\": n.Nodename(),\n\t\t\t\t\"st_builtin_args\": st.BuiltInParams.ExtraArguments,\n\t\t\t\t\"st_builtin_env\": st.BuiltInParams.ExtraEnvvar,\n\t\t\t\t\"st_extra_args\": st.ExtraParams.ExtraArguments,\n\t\t\t\t\"st_extra_env\": st.ExtraParams.ExtraEnvvar,\n\t\t\t\t\"current_builtin_args\": currentBuiltIn.ExtraArguments,\n\t\t\t\t\"current_builtin_env\": currentBuiltIn.ExtraEnvvar,\n\t\t\t\t\"current_extra_args\": currentExtra.ExtraArguments,\n\t\t\t\t\"current_extra_env\": currentExtra.ExtraEnvvar,\n\t\t\t\t\"config\": currentConfig,\n\t\t\t\t\"diff\": cmp.Diff(currentConfig, runningConfig),\n\t\t\t})\n\t\t\tnodes = append(nodes, n)\n\t\t}\n\t}\n\treturn nodes\n}", "func NewShellCli_renewCertificateNow_Results_List(s *capnp.Segment, sz int32) (ShellCli_renewCertificateNow_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn capnp.StructList[ShellCli_renewCertificateNow_Results](l), err\n}", "func NewTunnelServer_getServerInfo_Results_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_getServerInfo_Results_List{l}, err\n}", "func (c *iPSecVpnTunnels) List(opts metav1.ListOptions) (result *v1.IPSecVpnTunnelList, err error) {\n\tvar timeout time.Duration\n\tif opts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*opts.TimeoutSeconds) * time.Second\n\t}\n\tresult = &v1.IPSecVpnTunnelList{}\n\terr = c.client.Get().\n\t\tNamespace(c.ns).\n\t\tResource(\"ipsecvpntunnels\").\n\t\tVersionedParams(&opts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tDo().\n\t\tInto(result)\n\treturn\n}", "func NewLiveOutputListResultPage(getNextPage func(context.Context, LiveOutputListResult) (LiveOutputListResult, error)) LiveOutputListResultPage {\n\treturn LiveOutputListResultPage{fn: getNextPage}\n}", "func (s TunnelServer_registerTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (ag *fakeAgent) ListTunnel() []*netproto.Tunnel {\n\treturn nil\n}", "func NewRegistrationServer_updateLocalConfiguration_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_updateLocalConfiguration_Results_List{l}, err\n}", "func NewAMQPTLSUnwrapped(lconn io.ReadWriteCloser, laddr, raddr *net.TCPAddr, addr string) *AMQPProxy {\n\tp := NewAMQP(lconn, laddr, raddr)\n\tp.tlsUnwrapp = true\n\tp.tlsAddress = addr\n\treturn p\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewOptions sets the options field to a newly allocated RegistrationOptions struct, preferring placement in s's segment.
func (s TunnelServer_authenticate_Params) NewOptions() (RegistrationOptions, error) { ss, err := NewRegistrationOptions(s.Struct.Segment()) if err != nil { return RegistrationOptions{}, err } err = s.Struct.SetPtr(2, ss.Struct.ToPtr()) return ss, err }
[ "func (s TunnelServer_registerTunnel_Params) NewOptions() (RegistrationOptions, error) {\n\tss, err := NewRegistrationOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegistrationOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RegistrationServer_registerConnection_Params) NewOptions() (ConnectionOptions, error) {\n\tss, err := NewConnectionOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func newOptions() *options {\n\treturn &options{\n\t\tfillColor: cell.ColorNumber(DefaultFillColorNumber),\n\t\tplaceHolderColor: cell.ColorNumber(DefaultPlaceHolderColorNumber),\n\t\thighlightedColor: cell.ColorNumber(DefaultHighlightedColorNumber),\n\t\tcursorColor: cell.ColorNumber(DefaultCursorColorNumber),\n\t\tlabelAlign: DefaultLabelAlign,\n\t}\n}", "func NewRegistrationOptions_List(s *capnp.Segment, sz int32) (RegistrationOptions_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 16, PointerCount: 8}, sz)\n\treturn RegistrationOptions_List{l}, err\n}", "func NewOptions(maxSegmentSize uint16, windowScale uint8, timestamp,\n\techoTimestamp uint32) []uint8 {\n\toptions := []uint8{}\n\n\tif maxSegmentSize != NoSegmentSize {\n\t\toptions = append(options, 2, 4, uint8(maxSegmentSize>>8), uint8(maxSegmentSize))\n\t}\n\n\tif windowScale != NoWindowScale {\n\t\toptions = append(options, 3, 3, windowScale)\n\t}\n\n\tif timestamp != NoTimestamp {\n\t\toptions = append(options, 8, 10, uint8(timestamp>>24), uint8(timestamp>>16),\n\t\t\tuint8(timestamp>>8), uint8(timestamp))\n\t\toptions = append(options, uint8(echoTimestamp>>24), uint8(echoTimestamp>>16),\n\t\t\tuint8(echoTimestamp>>8), uint8(echoTimestamp))\n\t}\n\n\t// End-of-options 0 value.\n\toptions = append(options, 0)\n\n\t// Padding to a multiple of 32.\n\tfor len(options)%4 != 0 {\n\t\toptions = append(options, 0)\n\t}\n\n\treturn options\n}", "func NewOptions() *Options {\n\treturn &Options{\n\t\tOptions: scheduleroptions.NewOptions(),\n\t}\n}", "func (c *CherrypickAutoApprove) RegisterOptions(opts *options.Options) sets.String { return nil }", "func NewOptions() *Common {\n\treturn &Common{}\n}", "func NewOptions(spec string) *OptionSpec {\n\t// TODO(gaal): move to constant\n\tflagSpec := regexp.MustCompile(`^([-\\w,]+)(=?)\\s+(.*)$`)\n\t// Not folded into previous pattern because that would necessitate FindStringSubmatchIndex.\n\tdefaultValue := regexp.MustCompile(`\\[(.*)\\]$`)\n\n\ts := &OptionSpec{UnknownOptionsFatal: true, UnknownValuesFatal: false, Exit: os.Exit}\n\ts.aliases = make(map[string]string)\n\ts.defaults = make(map[string]string)\n\ts.requiresArg = make(map[string]bool)\n\tstanza := 0 // synopsis\n\tspecLines := strings.Split(spec, \"\\n\")\n\tfor n, l := range specLines {\n\t\tswitch stanza {\n\t\tcase 0:\n\t\t\t{\n\t\t\t\tif l == \"--\" {\n\t\t\t\t\ts.Usage += \"\\n\"\n\t\t\t\t\tstanza++\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\ts.Usage += l + \"\\n\"\n\t\t\t}\n\t\tcase 1:\n\t\t\t{\n\t\t\t\tif l == \"\" {\n\t\t\t\t\ts.Usage += \"\\n\"\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tparts := flagSpec.FindStringSubmatch(l)\n\t\t\t\tif parts == nil {\n\t\t\t\t\tpanic(fmt.Sprint(n, \": no parse: \", l))\n\t\t\t\t}\n\t\t\t\tnames := strings.Split(parts[1], \",\")\n\t\t\t\tcanonical := names[len(names)-1]\n\t\t\t\tfor _, name := range names {\n\t\t\t\t\tif _, dup := s.aliases[name]; dup {\n\t\t\t\t\t\tpanic(fmt.Sprint(n, \": duplicate name: \", name))\n\t\t\t\t\t}\n\t\t\t\t\tif name == \"\" || name == \"-\" || name == \"--\" {\n\t\t\t\t\t\tpanic(fmt.Sprint(n, \": bad name: \", name))\n\t\t\t\t\t}\n\n\t\t\t\t\ts.aliases[name] = canonical\n\t\t\t\t}\n\t\t\t\tif parts[2] == \"=\" {\n\t\t\t\t\ts.requiresArg[canonical] = true\n\t\t\t\t}\n\t\t\t\tif def := defaultValue.FindStringSubmatch(parts[3]); def != nil {\n\t\t\t\t\ts.defaults[canonical] = def[1]\n\t\t\t\t}\n\t\t\t\t// TODO(gaal): linewrap.\n\t\t\t\ts.Usage += \" \" + strings.Join(smap(prettyFlag, names), \", \") +\n\t\t\t\t\tparts[2] + \" \" + parts[3] + \"\\n\"\n\t\t\t}\n\t\tdefault:\n\t\t\tpanic(fmt.Sprint(n, \": no parse: \", spec))\n\t\t}\n\t}\n\treturn s\n}", "func NewOptions() IOptions {\n\treturn &Options{\n\t\tcache: 0,\n\t\tgzip: false,\n\t}\n}", "func (c *WriterConfiguration) NewOptions(\n\tcs client.Client,\n\tiOpts instrument.Options,\n\trwOptions xio.Options,\n) (writer.Options, error) {\n\topts := writer.NewOptions().\n\t\tSetTopicName(c.TopicName).\n\t\tSetPlacementOptions(c.PlacementOptions.NewOptions()).\n\t\tSetInstrumentOptions(iOpts).\n\t\tSetWithoutConsumerScope(c.WithoutConsumerScope)\n\n\tkvOpts, err := c.TopicServiceOverride.NewOverrideOptions()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttopicServiceOpts := topic.NewServiceOptions().\n\t\tSetConfigService(cs).\n\t\tSetKVOverrideOptions(kvOpts)\n\tts, err := topic.NewService(topicServiceOpts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\topts = opts.SetTopicService(ts)\n\n\tif c.TopicWatchInitTimeout != nil {\n\t\topts = opts.SetTopicWatchInitTimeout(*c.TopicWatchInitTimeout)\n\t}\n\tsd, err := cs.Services(c.PlacementServiceOverride.NewOptions())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\topts = opts.SetServiceDiscovery(sd)\n\n\tif c.PlacementWatchInitTimeout != nil {\n\t\topts = opts.SetPlacementWatchInitTimeout(*c.PlacementWatchInitTimeout)\n\t}\n\topts, err = c.setRetryOptions(opts, iOpts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif c.MessageQueueNewWritesScanInterval != nil {\n\t\topts = opts.SetMessageQueueNewWritesScanInterval(*c.MessageQueueNewWritesScanInterval)\n\t}\n\tif c.MessageQueueFullScanInterval != nil {\n\t\topts = opts.SetMessageQueueFullScanInterval(*c.MessageQueueFullScanInterval)\n\t}\n\tif c.MessageQueueScanBatchSize != nil {\n\t\topts = opts.SetMessageQueueScanBatchSize(*c.MessageQueueScanBatchSize)\n\t}\n\tif c.InitialAckMapSize != nil {\n\t\topts = opts.SetInitialAckMapSize(*c.InitialAckMapSize)\n\t}\n\tif c.CloseCheckInterval != nil {\n\t\topts = opts.SetCloseCheckInterval(*c.CloseCheckInterval)\n\t}\n\tif c.AckErrorRetry != nil {\n\t\topts = opts.SetAckErrorRetryOptions(c.AckErrorRetry.NewOptions(tally.NoopScope))\n\t}\n\tif c.Encoder != nil {\n\t\topts = opts.SetEncoderOptions(c.Encoder.NewOptions(iOpts))\n\t}\n\tif c.Decoder != nil {\n\t\topts = opts.SetDecoderOptions(c.Decoder.NewOptions(iOpts))\n\t}\n\tif c.Connection != nil {\n\t\topts = opts.SetConnectionOptions(c.Connection.NewOptions(iOpts))\n\t}\n\n\topts = opts.SetIgnoreCutoffCutover(c.IgnoreCutoffCutover)\n\n\topts = opts.SetDecoderOptions(opts.DecoderOptions().SetRWOptions(rwOptions))\n\treturn opts, nil\n}", "func NewOptions() *Options {\n\tvar url *url.URL\n\n\tif os.Getenv(\"PRERENDER_SERVICE_URL\") != \"\" {\n\t\turl, _ = url.Parse(os.Getenv(\"PRERENDER_SERVICE_URL\"))\n\t} else {\n\t\turl, _ = url.Parse(\"https://service.headless-render-api.com/\")\n\t}\n\n\treturn &Options{\n\t\tPrerenderURL: url,\n\t\tToken: os.Getenv(\"PRERENDER_TOKEN\"),\n\t\tUsingAppEngine: false,\n\t\tBotsOnly: false,\n\t}\n}", "func NewClusterRegistrationOptions() *ClusterRegistrationOptions {\n\treturn &ClusterRegistrationOptions{\n\t\tClusterNamePrefix: RegistrationNamePrefix,\n\t\tClusterType: string(clusterapi.EdgeClusterSelfProvisioned),\n\t\tClusterSyncMode: string(clusterapi.Pull),\n\t\tClusterStatusReportFrequency: metav1.Duration{Duration: DefaultClusterStatusReportFrequency},\n\t\tClusterStatusCollectFrequency: metav1.Duration{Duration: DefaultClusterStatusCollectFrequency},\n\t}\n}", "func (cfg OverrideConfiguration) NewOptions() OverrideOptions {\n\treturn NewOverrideOptions().\n\t\tSetNamespaceOptions(cfg.Namespaces.NewOptions())\n}", "func newInitOptions() *initOptions {\n\t// initialize the public kubeadm config API by applying defaults\n\texternalInitCfg := &kubeadmapiv1.InitConfiguration{}\n\tkubeadmscheme.Scheme.Default(externalInitCfg)\n\n\texternalClusterCfg := &kubeadmapiv1.ClusterConfiguration{\n\t\t// CertificatesDir: filepath.Join(homedir.HomeDir(), \".fireflyadm\", \"pki\"),\n\t}\n\tkubeadmscheme.Scheme.Default(externalClusterCfg)\n\n\t// Create the options object for the bootstrap token-related flags, and override the default value for .Description\n\tbto := options.NewBootstrapTokenOptions()\n\tbto.Description = \"The default bootstrap token generated by 'kubeadm init'.\"\n\n\tkubeconfig := os.Getenv(\"KUBECONFIG\")\n\tif kubeconfig == \"\" {\n\t\tkubeconfig = filepath.Join(homedir.HomeDir(), \".kube\", \"config\")\n\t}\n\n\treturn &initOptions{\n\t\texternalInitCfg: externalInitCfg,\n\t\texternalClusterCfg: externalClusterCfg,\n\t\tbto: bto,\n\t\tkubeconfigDir: constants.KubernetesDir,\n\t\tkubeconfigPath: kubeconfig,\n\t\tuploadCerts: false,\n\t}\n}", "func NewCallOptions()(*CallOptions) {\n m := &CallOptions{\n }\n m.SetAdditionalData(make(map[string]interface{}));\n return m\n}", "func RegistryFromOptions(optionsRegistry *markers.Registry, options []string) (*markers.Registry, error) {\n\tprotoRt, err := protoFromOptions(optionsRegistry, options)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treg := &markers.Registry{}\n\tif err := protoRt.Generators.RegisterMarkers(reg); err != nil {\n\t\treturn nil, err\n\t}\n\treturn reg, nil\n}", "func CreateOptions(c dict.Dicter) (opts *redis.Options, err error) {\n\tnetwork, err := c.String(ConfigKeyNetwork, &defaultNetwork)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\taddr, err := c.String(ConfigKeyAddress, &defaultAddress)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\thost, _, err := net.SplitHostPort(addr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif host == \"\" {\n\t\treturn nil, &ErrHostMissing{msg: fmt.Sprintf(\"no host provided in '%s'\", addr)}\n\t}\n\n\tpassword, err := c.String(ConfigKeyPassword, &defaultPassword)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdb, err := c.Int(ConfigKeyDB, &defaultDB)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\to := &redis.Options{\n\t\tNetwork: network,\n\t\tAddr: addr,\n\t\tPassword: password,\n\t\tDB: db,\n\t\tPoolSize: 2,\n\t\tDialTimeout: 3 * time.Second,\n\t}\n\n\tssl, err := c.Bool(ConfigKeySSL, &defaultSSL)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif ssl {\n\t\to.TLSConfig = &tls.Config{ServerName: host}\n\t}\n\n\treturn o, nil\n}", "func newOptionSet(opts ...Option) *optionSet {\n\tset := &optionSet{\n\t\tEntryName: rkgininter.RpcEntryNameValue,\n\t\tEntryType: rkgininter.RpcEntryTypeValue,\n\t\tregisterer: prometheus.DefaultRegisterer,\n\t}\n\n\tfor i := range opts {\n\t\topts[i](set)\n\t}\n\n\tnamespace := strings.ReplaceAll(rkentry.GlobalAppCtx.GetAppInfoEntry().AppName, \"-\", \"_\")\n\tsubSystem := strings.ReplaceAll(set.EntryName, \"-\", \"_\")\n\tset.MetricsSet = rkprom.NewMetricsSet(\n\t\tnamespace,\n\t\tsubSystem,\n\t\tset.registerer)\n\n\tif _, ok := optionsMap[set.EntryName]; !ok {\n\t\toptionsMap[set.EntryName] = set\n\t}\n\n\tinitMetrics(set)\n\n\treturn set\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewTunnelServer_authenticate_Params creates a new list of TunnelServer_authenticate_Params.
func NewTunnelServer_authenticate_Params_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Params_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz) return TunnelServer_authenticate_Params_List{l}, err }
[ "func NewTunnelServer_authenticate_Results_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_authenticate_Results_List{l}, err\n}", "func NewTunnelServer_getServerInfo_Params_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_getServerInfo_Params_List{l}, err\n}", "func (s TunnelServer_authenticate_Params) NewOptions() (RegistrationOptions, error) {\n\tss, err := NewRegistrationOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegistrationOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewTunnelServer_registerTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_registerTunnel_Params_List{l}, err\n}", "func NewAuthenticateRequest(server string) (*http.Request, error) {\n\tvar err error\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/authenticate\")\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"GET\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func NewTunnelServer_reconnectTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_reconnectTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 5}, sz)\n\treturn TunnelServer_reconnectTunnel_Params_List{l}, err\n}", "func NewTunnelAuth_List(s *capnp.Segment, sz int32) (TunnelAuth_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn TunnelAuth_List{l}, err\n}", "func NewTunnelServer_obsoleteDeclarativeTunnelConnect_Params_List(s *capnp.Segment, sz int32) (TunnelServer_obsoleteDeclarativeTunnelConnect_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_obsoleteDeclarativeTunnelConnect_Params_List{l}, err\n}", "func (s TunnelServer_authenticate_Results) NewResult() (AuthenticateResponse, error) {\n\tss, err := NewAuthenticateResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn AuthenticateResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RegistrationServer_registerConnection_Params) NewAuth() (TunnelAuth, error) {\n\tss, err := NewTunnelAuth(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelAuth{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewAuthenticateResponse_List(s *capnp.Segment, sz int32) (AuthenticateResponse_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 3}, sz)\n\treturn AuthenticateResponse_List{l}, err\n}", "func (s *Server) Authenticate(r *http.Request) (*ClientCredentials, *TokenCredentials, error) {\n\tvar (\n\t\tc *ClientCredentials\n\t\tt *TokenCredentials\n\t\terr error\n\t)\n\n\trr, err := s.validate(r, false)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tc = rr.client\n\tt = rr.token\n\treturn c, t, nil\n}", "func NewServerCreds(opts *ServerOptions) (credentials.TransportCredentials, error) {\n\tif opts == nil {\n\t\treturn nil, errors.New(\"nil server options\")\n\t}\n\tvar localIdentities []*commonpb.Identity\n\tfor _, localIdentity := range opts.LocalIdentities {\n\t\tprotoLocalIdentity, err := toProtoIdentity(localIdentity)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tlocalIdentities = append(localIdentities, protoLocalIdentity)\n\t}\n\tif opts.EnableLegacyMode {\n\t\treturn &s2aTransportCreds{\n\t\t\tinfo: &credentials.ProtocolInfo{\n\t\t\t\tSecurityProtocol: s2aSecurityProtocol,\n\t\t\t},\n\t\t\tminTLSVersion: commonpb.TLSVersion_TLS1_3,\n\t\t\tmaxTLSVersion: commonpb.TLSVersion_TLS1_3,\n\t\t\ttlsCiphersuites: []commonpb.Ciphersuite{\n\t\t\t\tcommonpb.Ciphersuite_AES_128_GCM_SHA256,\n\t\t\t\tcommonpb.Ciphersuite_AES_256_GCM_SHA384,\n\t\t\t\tcommonpb.Ciphersuite_CHACHA20_POLY1305_SHA256,\n\t\t\t},\n\t\t\tlocalIdentities: localIdentities,\n\t\t\tisClient: false,\n\t\t\ts2aAddr: opts.S2AAddress,\n\t\t}, nil\n\t}\n\tverificationMode := getVerificationMode(opts.VerificationMode)\n\treturn v2.NewServerCreds(opts.S2AAddress, localIdentities, verificationMode, opts.getS2AStream)\n}", "func (w *ServerInterfaceWrapper) Authenticate(ctx echo.Context) error {\n\tvar err error\n\n\tctx.Set(\"authorization.Scopes\", []string{\"user\", \"password\"})\n\n\t// Invoke the callback with all the unmarshalled arguments\n\terr = w.Handler.Authenticate(ctx)\n\treturn err\n}", "func NewTunnelServer_unregisterTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Params_List{l}, err\n}", "func NewTunnelServer_getServerInfo_Results_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_getServerInfo_Results_List{l}, err\n}", "func (c *Client) InitTunnel(t *Tunnel) (err error) {\n\tfor attempt := uint8(0); attempt <= Settings.MaxRetries; attempt++ {\n\t\terr = func() error {\n\t\t\tif Settings.ShouldLog {\n\t\t\t\tLogger.Println(\"Attempting to initialize tunnel...\")\n\t\t\t\tLogger.Printf(\">>>\\tName: %s | Addr: %s\\n\", t.Name, t.LocalAddress)\n\t\t\t}\n\t\t\ttime.Sleep(1 * time.Second)\n\n\t\t\tjsonData := t.getJSON()\n\n\t\t\tif protocols[t.Proto] == \"http\" {\n\t\t\t\t// IF HTTP APPEND BIND_TLS\n\t\t\t\tjsonData[\"bind_tls\"] = true\n\t\t\t}\n\n\t\t\turl := fmt.Sprintf(Settings.TunnelAPIAddr, c.NGROKLocalAddr)\n\n\t\t\tjsonValue, err := json.Marshal(jsonData)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// INIT RECORD\n\t\t\trecord, err := attemptInitTunnel(url, jsonValue)\n\n\t\t\tif err != nil {\n\t\t\t\tif Settings.ShouldLog {\n\t\t\t\t\tLogger.Printf(\"failed to init tunnel: %s | addr: %s\\n\", t.Name, t.LocalAddress)\n\t\t\t\t}\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tt.RemoteAddress = record.PublicURL\n\t\t\tt.IsCreated = true\n\n\t\t\tif Settings.ShouldLog {\n\t\t\t\tLogger.Println(\"Tunnel Created...\")\n\t\t\t\tLogger.Printf(\">>> Name: %s | Public Addr: %s\\n\", t.Name, t.RemoteAddress)\n\t\t\t}\n\t\t\treturn nil\n\t\t}()\n\t\tif c.LogAPI && err != nil {\n\t\t\tif Settings.ShouldLog {\n\t\t\t\tLogger.Println(err)\n\t\t\t}\n\t\t}\n\t\tif err == nil {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn\n}", "func (s TunnelServer_registerTunnel_Params) NewOptions() (RegistrationOptions, error) {\n\tss, err := NewRegistrationOptions(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegistrationOptions{}, err\n\t}\n\terr = s.Struct.SetPtr(2, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func Authenticate(state []State, key string) Rc {\n\tcstate, _ := (*C.ykpiv_state)(unsafe.Pointer((*sliceHeader)(unsafe.Pointer(&state)).Data)), cgoAllocsUnknown\n\tckey, _ := unpackPUcharString(key)\n\t__ret := C.ykpiv_authenticate(cstate, ckey)\n\t__v := (Rc)(__ret)\n\treturn __v\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewResult sets the result field to a newly allocated AuthenticateResponse struct, preferring placement in s's segment.
func (s TunnelServer_authenticate_Results) NewResult() (AuthenticateResponse, error) { ss, err := NewAuthenticateResponse(s.Struct.Segment()) if err != nil { return AuthenticateResponse{}, err } err = s.Struct.SetPtr(0, ss.Struct.ToPtr()) return ss, err }
[ "func (s RegistrationServer_registerConnection_Results) NewResult() (ConnectionResponse, error) {\n\tss, err := NewConnectionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_getServerInfo_Results) NewResult() (ServerInfo, error) {\n\tss, err := NewServerInfo(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ServerInfo{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_registerTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_reconnectTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s ConfigurationManager_updateConfiguration_Results) NewResult() (UpdateConfigurationResponse, error) {\n\tss, err := NewUpdateConfigurationResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn UpdateConfigurationResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func newSuccessResult(vres *inventoryviews.SuccessResultView) *SuccessResult {\n\tres := &SuccessResult{}\n\tif vres.OK != nil {\n\t\tres.OK = *vres.OK\n\t}\n\treturn res\n}", "func newSuccessResult(vres *productviews.SuccessResultView) *SuccessResult {\n\tres := &SuccessResult{}\n\tif vres.OK != nil {\n\t\tres.OK = *vres.OK\n\t}\n\treturn res\n}", "func NewAuthenticateResponse_List(s *capnp.Segment, sz int32) (AuthenticateResponse_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 3}, sz)\n\treturn AuthenticateResponse_List{l}, err\n}", "func newResult(ip net.IP, domain, sender, hostname string) (r *Result) {\n\tbsender := []byte(sender)\n\n\tat := bytes.Index(bsender, []byte{'@'})\n\tr = &Result{\n\t\tIP: ip,\n\t\tDomain: []byte(domain),\n\t\tSender: []byte(sender),\n\t\tHostname: []byte(hostname),\n\t\tsenderLocal: bsender[:at],\n\t\tsenderDomain: bsender[at+1:],\n\t}\n\n\tif !libnet.IsHostnameValid(r.Domain, true) {\n\t\tr.Code = ResultCodeNone\n\t\tr.Err = \"invalid domain name\"\n\t\treturn\n\t}\n\n\treturn\n}", "func (s CoreBanking_createAccount_Results) NewRes() (Response, error) {\n\tss, err := NewResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Response{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewTunnelServer_authenticate_Results_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_authenticate_Results_List{l}, err\n}", "func ConstructResult(hnsNetwork *hcsshim.HNSNetwork, hnsEndpoint *hcsshim.HNSEndpoint) (*current.Result, error) {\n\tresultInterface := &current.Interface{\n\t\tName: hnsEndpoint.Name,\n\t\tMac: hnsEndpoint.MacAddress,\n\t}\n\t_, ipSubnet, err := net.ParseCIDR(hnsNetwork.Subnets[0].AddressPrefix)\n\tif err != nil {\n\t\treturn nil, errors.Annotatef(err, \"failed to parse CIDR from %s\", hnsNetwork.Subnets[0].AddressPrefix)\n\t}\n\n\tvar ipVersion string\n\tif ipv4 := hnsEndpoint.IPAddress.To4(); ipv4 != nil {\n\t\tipVersion = \"4\"\n\t} else if ipv6 := hnsEndpoint.IPAddress.To16(); ipv6 != nil {\n\t\tipVersion = \"6\"\n\t} else {\n\t\treturn nil, fmt.Errorf(\"IPAddress of HNSEndpoint %s isn't a valid ipv4 or ipv6 Address\", hnsEndpoint.Name)\n\t}\n\n\tresultIPConfig := &current.IPConfig{\n\t\tVersion: ipVersion,\n\t\tAddress: net.IPNet{\n\t\t\tIP: hnsEndpoint.IPAddress,\n\t\t\tMask: ipSubnet.Mask},\n\t\tGateway: net.ParseIP(hnsEndpoint.GatewayAddress),\n\t}\n\tresult := &current.Result{}\n\tresult.Interfaces = []*current.Interface{resultInterface}\n\tresult.IPs = []*current.IPConfig{resultIPConfig}\n\n\treturn result, nil\n}", "func setupResult(rrt *ResolverRuntime, rcode int, opaqueResponse interface{}) (ret *dns.Msg) {\n\tswitch t := opaqueResponse.(type) {\n\tcase [][]dns.RR:\n\t\tret = &dns.Msg{Answer: t[0], Ns: t[1], Extra: t[2]}\n\tcase []dns.RR:\n\t\tret = &dns.Msg{Answer: t}\n\tcase dns.RR: /// single RR means a SOA for nxdomain/nodata responses\n\t\tret = &dns.Msg{Ns: []dns.RR{t}}\n\tcase *dns.Msg:\n\t\t//t.Rcode = rcode\n\t\tret = &dns.Msg{MsgHdr: t.MsgHdr, Answer: cloneSection(t.Answer), Ns: cloneSection(t.Ns), Extra: cloneSection(t.Extra)}\n\tdefault:\n\t\tret = &dns.Msg{}\n\t}\n\tret.SetRcode(rrt.original, rcode)\n\tLogInfo(rrt, \"Setting up result as answer to Q [%s] Id [%d] RC [%s]\\n[%v]\\n\\n\", rrt.original.Question[0].String(), rrt.original.Id, dns.RcodeToString[ret.Rcode], ret)\n\treturn\n}", "func (m methodInfo) NewResult() interface{} {\n\treturn m.newResultFunc()\n}", "func NewActivateResult(message *user_methodpb.ActivateResponse) *usermethod.ResponseResult {\n\tresult := &usermethod.ResponseResult{\n\t\tCode: int(message.Code),\n\t}\n\tif message.Message_ != \"\" {\n\t\tresult.Message = &message.Message_\n\t}\n\tif message.Data != nil {\n\t\tresult.Data = make(map[string]string, len(message.Data))\n\t\tfor key, val := range message.Data {\n\t\t\ttk := key\n\t\t\ttv := val\n\t\t\tresult.Data[tk] = tv\n\t\t}\n\t}\n\treturn result\n}", "func NewAdmissionResult(requestUID string) Result {\n\treturn &CompositeResult{\n\t\tMessage: fmt.Sprintf(\"For resource with UID - %s:\", requestUID),\n\t\tReason: Success,\n\t}\n}", "func (s SessionManager_registerUdpSession_Results) NewResult() (RegisterUdpSessionResponse, error) {\n\tss, err := NewRegisterUdpSessionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegisterUdpSessionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (r *request) SetResult(result interface{}) {\n\tr.Result = result\n}", "func newSuccessResultView(res *SuccessResult) *inventoryviews.SuccessResultView {\n\tvres := &inventoryviews.SuccessResultView{\n\t\tOK: &res.OK,\n\t}\n\treturn vres\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewTunnelServer_authenticate_Results creates a new list of TunnelServer_authenticate_Results.
func NewTunnelServer_authenticate_Results_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Results_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz) return TunnelServer_authenticate_Results_List{l}, err }
[ "func (s TunnelServer_authenticate_Results) NewResult() (AuthenticateResponse, error) {\n\tss, err := NewAuthenticateResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn AuthenticateResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewTunnelServer_authenticate_Params_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_authenticate_Params_List{l}, err\n}", "func NewTunnelServer_getServerInfo_Results_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_getServerInfo_Results_List{l}, err\n}", "func NewTunnelServer_registerTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_registerTunnel_Results_List{l}, err\n}", "func NewTunnelServer_reconnectTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_reconnectTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_reconnectTunnel_Results_List{l}, err\n}", "func NewAuthenticateResponse_List(s *capnp.Segment, sz int32) (AuthenticateResponse_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 3}, sz)\n\treturn AuthenticateResponse_List{l}, err\n}", "func (s TunnelServer_registerTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewTunnelServer_obsoleteDeclarativeTunnelConnect_Results_List(s *capnp.Segment, sz int32) (TunnelServer_obsoleteDeclarativeTunnelConnect_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_obsoleteDeclarativeTunnelConnect_Results_List{l}, err\n}", "func (s TunnelServer_getServerInfo_Results) NewResult() (ServerInfo, error) {\n\tss, err := NewServerInfo(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ServerInfo{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_reconnectTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewTunnelServer_unregisterTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Results_List{l}, err\n}", "func NewGatewayRouter_keepaliveApiToken_Results_List(s *capnp.Segment, sz int32) (GatewayRouter_keepaliveApiToken_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn capnp.StructList[GatewayRouter_keepaliveApiToken_Results](l), err\n}", "func (client SyncAgentsClient) ListByServerNextResults(lastResults SyncAgentListResult) (result SyncAgentListResult, err error) {\n\treq, err := lastResults.SyncAgentListResultPreparer()\n\tif err != nil {\n\t\treturn result, autorest.NewErrorWithError(err, \"sql.SyncAgentsClient\", \"ListByServer\", nil, \"Failure preparing next results request\")\n\t}\n\tif req == nil {\n\t\treturn\n\t}\n\n\tresp, err := client.ListByServerSender(req)\n\tif err != nil {\n\t\tresult.Response = autorest.Response{Response: resp}\n\t\treturn result, autorest.NewErrorWithError(err, \"sql.SyncAgentsClient\", \"ListByServer\", resp, \"Failure sending next results request\")\n\t}\n\n\tresult, err = client.ListByServerResponder(resp)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"sql.SyncAgentsClient\", \"ListByServer\", resp, \"Failure responding to next results request\")\n\t}\n\n\treturn\n}", "func NewTunnelAuth_List(s *capnp.Segment, sz int32) (TunnelAuth_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn TunnelAuth_List{l}, err\n}", "func NewShellCli_renewCertificateNow_Results_List(s *capnp.Segment, sz int32) (ShellCli_renewCertificateNow_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn capnp.StructList[ShellCli_renewCertificateNow_Results](l), err\n}", "func NewRegistrationServer_registerConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_registerConnection_Results_List{l}, err\n}", "func NewService_alive_Results_List(s *capnp.Segment, sz int32) (Service_alive_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 0}, sz)\n\treturn Service_alive_Results_List{l}, err\n}", "func NewResults(del []*asura.ResponseDeliverTx) AsuraResults {\n\tres := make(AsuraResults, len(del))\n\tfor i, d := range del {\n\t\tres[i] = NewResultFromResponse(d)\n\t}\n\treturn res\n}", "func NewGatewayRouter_subscribeTlsKeys_Results_List(s *capnp.Segment, sz int32) (GatewayRouter_subscribeTlsKeys_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn capnp.StructList[GatewayRouter_subscribeTlsKeys_Results](l), err\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewTunnelServer_reconnectTunnel_Params creates a new list of TunnelServer_reconnectTunnel_Params.
func NewTunnelServer_reconnectTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_reconnectTunnel_Params_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 5}, sz) return TunnelServer_reconnectTunnel_Params_List{l}, err }
[ "func NewTunnelServer_reconnectTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_reconnectTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_reconnectTunnel_Results_List{l}, err\n}", "func NewTunnelServer_obsoleteDeclarativeTunnelConnect_Params_List(s *capnp.Segment, sz int32) (TunnelServer_obsoleteDeclarativeTunnelConnect_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_obsoleteDeclarativeTunnelConnect_Params_List{l}, err\n}", "func NewTunnelServer_registerTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_registerTunnel_Params_List{l}, err\n}", "func (s *HostService) NewReconnectHostParams(id string) *ReconnectHostParams {\n\tp := &ReconnectHostParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"id\"] = id\n\treturn p\n}", "func NewTunnelServer_getServerInfo_Params_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_getServerInfo_Params_List{l}, err\n}", "func NewTunnelServer_unregisterTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Params_List{l}, err\n}", "func NewTunnelServer_authenticate_Params_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_authenticate_Params_List{l}, err\n}", "func (r *ReConn) SetReconnectTimeout(d time.Duration) *ReConn {\n\tif !r.dialed {\n\t\tr.reconnectTimeout = d\n\t}\n\treturn r\n}", "func NewReconnectClient(dialer Dialer, opts ...ReconnectOption) (ReconnectClient, error) {\n\toptions := &ReconnectOptions{\n\t\tReconnectWaitBase: time.Second,\n\t\tReconnectWaitMax: 10 * time.Second,\n\t\tRetryClient: &RetryClient{},\n\t}\n\tfor _, opt := range opts {\n\t\tif err := opt(options); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn &reconnectClient{\n\t\tRetryClient: options.RetryClient,\n\t\tdone: make(chan struct{}),\n\t\tdisconnected: make(chan struct{}),\n\t\toptions: options,\n\t\tdialer: dialer,\n\t}, nil\n}", "func (c *Client) InitTunnel(t *Tunnel) (err error) {\n\tfor attempt := uint8(0); attempt <= Settings.MaxRetries; attempt++ {\n\t\terr = func() error {\n\t\t\tif Settings.ShouldLog {\n\t\t\t\tLogger.Println(\"Attempting to initialize tunnel...\")\n\t\t\t\tLogger.Printf(\">>>\\tName: %s | Addr: %s\\n\", t.Name, t.LocalAddress)\n\t\t\t}\n\t\t\ttime.Sleep(1 * time.Second)\n\n\t\t\tjsonData := t.getJSON()\n\n\t\t\tif protocols[t.Proto] == \"http\" {\n\t\t\t\t// IF HTTP APPEND BIND_TLS\n\t\t\t\tjsonData[\"bind_tls\"] = true\n\t\t\t}\n\n\t\t\turl := fmt.Sprintf(Settings.TunnelAPIAddr, c.NGROKLocalAddr)\n\n\t\t\tjsonValue, err := json.Marshal(jsonData)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// INIT RECORD\n\t\t\trecord, err := attemptInitTunnel(url, jsonValue)\n\n\t\t\tif err != nil {\n\t\t\t\tif Settings.ShouldLog {\n\t\t\t\t\tLogger.Printf(\"failed to init tunnel: %s | addr: %s\\n\", t.Name, t.LocalAddress)\n\t\t\t\t}\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tt.RemoteAddress = record.PublicURL\n\t\t\tt.IsCreated = true\n\n\t\t\tif Settings.ShouldLog {\n\t\t\t\tLogger.Println(\"Tunnel Created...\")\n\t\t\t\tLogger.Printf(\">>> Name: %s | Public Addr: %s\\n\", t.Name, t.RemoteAddress)\n\t\t\t}\n\t\t\treturn nil\n\t\t}()\n\t\tif c.LogAPI && err != nil {\n\t\t\tif Settings.ShouldLog {\n\t\t\t\tLogger.Println(err)\n\t\t\t}\n\t\t}\n\t\tif err == nil {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn\n}", "func NewRegistrationServer_registerConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 3}, sz)\n\treturn RegistrationServer_registerConnection_Params_List{l}, err\n}", "func NewShellCli_renewCertificateNow_Params_List(s *capnp.Segment, sz int32) (ShellCli_renewCertificateNow_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn capnp.StructList[ShellCli_renewCertificateNow_Params](l), err\n}", "func NewDcimPowerPanelsListParamsWithTimeout(timeout time.Duration) *DcimPowerPanelsListParams {\n\tvar ()\n\treturn &DcimPowerPanelsListParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "func NewReconnectTrackerWithTimeout(reconTimeout time.Duration) *ReconnectTracker {\n\treturn &ReconnectTracker{\n\t\treconnecting: false,\n\t\treconnectTimeout: reconTimeout,\n\t\tReconnectListener: make(chan bool, 1),\n\t}\n}", "func WithReconnectInterval(d time.Duration) Option {\n\treturn func(m *SSHConnectionManager) {\n\t\tm.reconnectInterval = d\n\t}\n}", "func NewRegistrationServer_unregisterConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Params_List{l}, err\n}", "func (mo *ManagerOptions) reconnectDelay() time.Duration {\n\trecInter := mo.ReconnectInterval\n\tjitter := mo.ReconnectIntervalJitter\n\tdelayJitter := rand.Int63n(int64(jitter))\n\treturn recInter + time.Duration(delayJitter)\n}", "func MaxReconnects(attempts int) func(app *App) {\n\treturn func(a *App) {\n\t\ta.config.MaxReconnects = attempts\n\t}\n}", "func (o *EsmeAccount) SetReconnectDelay(v int) {\n\to.ReconnectDelay = &v\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewResult sets the result field to a newly allocated TunnelRegistration struct, preferring placement in s's segment.
func (s TunnelServer_reconnectTunnel_Results) NewResult() (TunnelRegistration, error) { ss, err := NewTunnelRegistration(s.Struct.Segment()) if err != nil { return TunnelRegistration{}, err } err = s.Struct.SetPtr(0, ss.Struct.ToPtr()) return ss, err }
[ "func (s TunnelServer_registerTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s RegistrationServer_registerConnection_Results) NewResult() (ConnectionResponse, error) {\n\tss, err := NewConnectionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s SessionManager_registerUdpSession_Results) NewResult() (RegisterUdpSessionResponse, error) {\n\tss, err := NewRegisterUdpSessionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegisterUdpSessionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_authenticate_Results) NewResult() (AuthenticateResponse, error) {\n\tss, err := NewAuthenticateResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn AuthenticateResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_getServerInfo_Results) NewResult() (ServerInfo, error) {\n\tss, err := NewServerInfo(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ServerInfo{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s ConfigurationManager_updateConfiguration_Results) NewResult() (UpdateConfigurationResponse, error) {\n\tss, err := NewUpdateConfigurationResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn UpdateConfigurationResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func newResult(ip net.IP, domain, sender, hostname string) (r *Result) {\n\tbsender := []byte(sender)\n\n\tat := bytes.Index(bsender, []byte{'@'})\n\tr = &Result{\n\t\tIP: ip,\n\t\tDomain: []byte(domain),\n\t\tSender: []byte(sender),\n\t\tHostname: []byte(hostname),\n\t\tsenderLocal: bsender[:at],\n\t\tsenderDomain: bsender[at+1:],\n\t}\n\n\tif !libnet.IsHostnameValid(r.Domain, true) {\n\t\tr.Code = ResultCodeNone\n\t\tr.Err = \"invalid domain name\"\n\t\treturn\n\t}\n\n\treturn\n}", "func ConstructResult(hnsNetwork *hcsshim.HNSNetwork, hnsEndpoint *hcsshim.HNSEndpoint) (*current.Result, error) {\n\tresultInterface := &current.Interface{\n\t\tName: hnsEndpoint.Name,\n\t\tMac: hnsEndpoint.MacAddress,\n\t}\n\t_, ipSubnet, err := net.ParseCIDR(hnsNetwork.Subnets[0].AddressPrefix)\n\tif err != nil {\n\t\treturn nil, errors.Annotatef(err, \"failed to parse CIDR from %s\", hnsNetwork.Subnets[0].AddressPrefix)\n\t}\n\n\tvar ipVersion string\n\tif ipv4 := hnsEndpoint.IPAddress.To4(); ipv4 != nil {\n\t\tipVersion = \"4\"\n\t} else if ipv6 := hnsEndpoint.IPAddress.To16(); ipv6 != nil {\n\t\tipVersion = \"6\"\n\t} else {\n\t\treturn nil, fmt.Errorf(\"IPAddress of HNSEndpoint %s isn't a valid ipv4 or ipv6 Address\", hnsEndpoint.Name)\n\t}\n\n\tresultIPConfig := &current.IPConfig{\n\t\tVersion: ipVersion,\n\t\tAddress: net.IPNet{\n\t\t\tIP: hnsEndpoint.IPAddress,\n\t\t\tMask: ipSubnet.Mask},\n\t\tGateway: net.ParseIP(hnsEndpoint.GatewayAddress),\n\t}\n\tresult := &current.Result{}\n\tresult.Interfaces = []*current.Interface{resultInterface}\n\tresult.IPs = []*current.IPConfig{resultIPConfig}\n\n\treturn result, nil\n}", "func newSuccessResult(vres *inventoryviews.SuccessResultView) *SuccessResult {\n\tres := &SuccessResult{}\n\tif vres.OK != nil {\n\t\tres.OK = *vres.OK\n\t}\n\treturn res\n}", "func (m *registers) PushResult(r cell.I) {\n\t// println(\"push result\")\n\tm.dump = pair.Cons(r, m.dump)\n}", "func NewRegisterResult(message *user_methodpb.RegisterResponse) *usermethod.ResponseResult {\n\tresult := &usermethod.ResponseResult{\n\t\tCode: int(message.Code),\n\t}\n\tif message.Message_ != \"\" {\n\t\tresult.Message = &message.Message_\n\t}\n\tif message.Data != nil {\n\t\tresult.Data = make(map[string]string, len(message.Data))\n\t\tfor key, val := range message.Data {\n\t\t\ttk := key\n\t\t\ttv := val\n\t\t\tresult.Data[tk] = tv\n\t\t}\n\t}\n\treturn result\n}", "func newSuccessResult(vres *productviews.SuccessResultView) *SuccessResult {\n\tres := &SuccessResult{}\n\tif vres.OK != nil {\n\t\tres.OK = *vres.OK\n\t}\n\treturn res\n}", "func NewTunnelServer_registerTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_registerTunnel_Results_List{l}, err\n}", "func (p *ResultsServerServiceClient) RegisterSearchResult_(result *SearchResult_, taskType AnnotationTaskType) (err error) {\n if err = p.sendRegisterSearchResult_(result, taskType); err != nil { return }\n return p.recvRegisterSearchResult_()\n}", "func newResult(t reflect.Type, opts resultOptions) (result, error) {\n\tswitch {\n\tcase isIn(t) || (t.Kind() == reflect.Ptr && isIn(t.Elem())) || isEmbed(t, _inPtrType):\n\t\treturn nil, errf(\"cannot provide parameter objects\", \"%v embeds a dig.In\", t)\n\tcase isError(t):\n\t\treturn nil, errf(\"cannot return an error here, return it from the constructor instead\")\n\tcase isOut(t):\n\t\treturn newResultObject(t, opts)\n\tcase isEmbed(t, _outPtrType):\n\t\treturn nil, errf(\n\t\t\t\"cannot build a result object by embedding *dig.Out, embed dig.Out instead\",\n\t\t\t\"%v embeds *dig.Out\", t)\n\tcase t.Kind() == reflect.Ptr && isOut(t.Elem()):\n\t\treturn nil, errf(\n\t\t\t\"cannot return a pointer to a result object, use a value instead\",\n\t\t\t\"%v is a pointer to a struct that embeds dig.Out\", t)\n\tcase len(opts.Group) > 0:\n\t\tg, err := parseGroupString(opts.Group)\n\t\tif err != nil {\n\t\t\treturn nil, errf(\n\t\t\t\t\"cannot parse group %q\", opts.Group, err)\n\t\t}\n\t\trg := resultGrouped{Type: t, Group: g.Name, Flatten: g.Flatten}\n\t\tif g.Flatten {\n\t\t\tif t.Kind() != reflect.Slice {\n\t\t\t\treturn nil, errf(\n\t\t\t\t\t\"flatten can be applied to slices only\",\n\t\t\t\t\t\"%v is not a slice\", t)\n\t\t\t}\n\t\t\trg.Type = rg.Type.Elem()\n\t\t}\n\t\treturn rg, nil\n\tdefault:\n\t\treturn resultSingle{Type: t, Name: opts.Name}, nil\n\t}\n}", "func (m methodInfo) NewResult() interface{} {\n\treturn m.newResultFunc()\n}", "func UA_AddNodesResult_new() []UA_AddNodesResult {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[34]))[:]).([]UA_AddNodesResult)\n}", "func (r *runner) addResult(s result) result {\n\tm, ok := r.metrics[s.doResult.RequestLabel]\n\tif !ok {\n\t\tm = new(Metrics)\n\t\tr.metrics[s.doResult.RequestLabel] = m\n\t}\n\tm.add(s)\n\treturn s\n}", "func (this *SelectResult) BuildNewResult() (*sqltypes.Result, error) {\n\t//fmt.Println(this.tempRows)\n\terr := this.handleRowsGroupBy()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t//sort\n\tthis.sort()\n\t//\n\tthis.optTempFieldsRows()\n\t//\n\tthis.optTempFields()\n\t//\n\tvar rows [][]sqltypes.Value\n\tvar offset, rowcount int64\n\tif this.stmt.Limit != nil && len(this.tempRows) > 0{\n\t\tif this.stmt.Limit.Offset != nil {\n\t\t\ttbufOffset := sqlparser.NewTrackedBuffer(nil)\n\t\t\tthis.stmt.Limit.Offset.Format(tbufOffset)\n\t\t\toffset, err = strconv.ParseInt(tbufOffset.String(), 10, 64)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t\tif this.stmt.Limit.Rowcount != nil {\n\t\t\ttbufRowcount := sqlparser.NewTrackedBuffer(nil)\n\t\t\tthis.stmt.Limit.Rowcount.Format(tbufRowcount)\n\t\t\trowcount, err = strconv.ParseInt(tbufRowcount.String(), 10, 64)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t\t//\n\t\trows = make([][]sqltypes.Value,rowcount)\n\t\t//glog.Infof(\"### limit %d,%d\", offset, rowcount)\n\t\tif offset < int64(len(this.tempRows)) && rowcount > 0 {\n\t\t\tif offset+rowcount < int64(len(this.tempRows)) {\n\t\t\t\tcopy(rows, this.tempRows[offset:offset+rowcount])\n\t\t\t} else {\n\t\t\t\trows = make([][]sqltypes.Value,len(this.tempRows) - int(offset))\n\t\t\t\tcopy(rows, this.tempRows[offset:])\n\t\t\t}\n\t\t}\n\t} else {\n\t\trows = this.tempRows\n\t}\n\t//\n\tnewResult := &sqltypes.Result{\n\t\tFields: this.tempFields,\n\t\tRows: rows,\n\t\tRowsAffected: uint64(len(this.tempRows)),\n\t}\n\treturn newResult, nil\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewTunnelServer_reconnectTunnel_Results creates a new list of TunnelServer_reconnectTunnel_Results.
func NewTunnelServer_reconnectTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_reconnectTunnel_Results_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz) return TunnelServer_reconnectTunnel_Results_List{l}, err }
[ "func NewTunnelServer_registerTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_registerTunnel_Results_List{l}, err\n}", "func NewTunnelServer_reconnectTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_reconnectTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 5}, sz)\n\treturn TunnelServer_reconnectTunnel_Params_List{l}, err\n}", "func (s TunnelServer_reconnectTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewTunnelServer_obsoleteDeclarativeTunnelConnect_Results_List(s *capnp.Segment, sz int32) (TunnelServer_obsoleteDeclarativeTunnelConnect_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_obsoleteDeclarativeTunnelConnect_Results_List{l}, err\n}", "func NewTunnelServer_getServerInfo_Results_List(s *capnp.Segment, sz int32) (TunnelServer_getServerInfo_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_getServerInfo_Results_List{l}, err\n}", "func NewTunnelServer_unregisterTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Results_List{l}, err\n}", "func NewTunnelServer_authenticate_Results_List(s *capnp.Segment, sz int32) (TunnelServer_authenticate_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_authenticate_Results_List{l}, err\n}", "func NewRegistrationServer_registerConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_registerConnection_Results_List{l}, err\n}", "func (s TunnelServer_registerTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewShellCli_renewCertificateNow_Results_List(s *capnp.Segment, sz int32) (ShellCli_renewCertificateNow_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn capnp.StructList[ShellCli_renewCertificateNow_Results](l), err\n}", "func NewRegistrationServer_unregisterConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Results_List{l}, err\n}", "func (np *NgrokProvider) CreateTunnel(t *tunnelProvider.Tunnel) error {\n\n\tfor attempt := uint(0); attempt <= maxRetries; attempt++ {\n\t\terr := func() error {\n\t\t\t//log.Printf(\"Creating tunnel %d attempt \\n\", attempt)\n\t\t\ttime.Sleep(1 * time.Second)\n\t\t\tvar record TunnelResponse\n\t\t\tjsonData := map[string]interface{}{\n\t\t\t\t\"addr\": fmt.Sprintf(\"%s:%s\", t.LocalIP, t.LocalPort),\n\t\t\t\t\"proto\": t.Proto,\n\t\t\t\t\"name\": t.Name,\n\t\t\t\t\"inspect\": t.Inspect,\n\t\t\t\t\"auth\": t.Auth,\n\t\t\t}\n\n\t\t\tif string(t.Proto) == \"http\" {\n\t\t\t\tjsonData[\"bind_tls\"] = true\n\t\t\t}\n\t\t\turl := fmt.Sprintf(\"http://%s/api/tunnels\", np.Client.API)\n\t\t\tjsonValue, err := json.Marshal(jsonData)\n\t\t\tif err != nil {\n\t\t\t\tgolog.Error(err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tres, err := http.Post(url, \"application/json\", bytes.NewBuffer(jsonValue))\n\t\t\tif err != nil {\n\t\t\t\tgolog.Error(err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tdefer res.Body.Close()\n\n\t\t\tif res.StatusCode < 200 || res.StatusCode > 299 {\n\t\t\t\tres, _ := ioutil.ReadAll(res.Body)\n\t\t\t\treturn errors.New(\"error api: \" + string(res))\n\t\t\t}\n\n\t\t\tif err := json.NewDecoder(res.Body).Decode(&record); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tt.RemoteAddress = record.PublicURL\n\t\t\tt.IsCreated = true\n\t\t\tgolog.Info(t.Name + \" is created and Live: -> \" + t.RemoteAddress)\n\t\t\treturn nil\n\t\t}()\n\t\tif np.Client.LogAPI && err != nil {\n\t\t\tgolog.Error(err)\n\t\t}\n\t\tif err == nil {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn nil\n}", "func NewTunnelRegistration_List(s *capnp.Segment, sz int32) (TunnelRegistration_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 6}, sz)\n\treturn TunnelRegistration_List{l}, err\n}", "func (s RegistrationServer_registerConnection_Results) NewResult() (ConnectionResponse, error) {\n\tss, err := NewConnectionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewRegistrationServer_updateLocalConfiguration_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_updateLocalConfiguration_Results_List{l}, err\n}", "func (s TunnelServer_getServerInfo_Results) NewResult() (ServerInfo, error) {\n\tss, err := NewServerInfo(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ServerInfo{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (c *Client) InitTunnel(t *Tunnel) (err error) {\n\tfor attempt := uint8(0); attempt <= Settings.MaxRetries; attempt++ {\n\t\terr = func() error {\n\t\t\tif Settings.ShouldLog {\n\t\t\t\tLogger.Println(\"Attempting to initialize tunnel...\")\n\t\t\t\tLogger.Printf(\">>>\\tName: %s | Addr: %s\\n\", t.Name, t.LocalAddress)\n\t\t\t}\n\t\t\ttime.Sleep(1 * time.Second)\n\n\t\t\tjsonData := t.getJSON()\n\n\t\t\tif protocols[t.Proto] == \"http\" {\n\t\t\t\t// IF HTTP APPEND BIND_TLS\n\t\t\t\tjsonData[\"bind_tls\"] = true\n\t\t\t}\n\n\t\t\turl := fmt.Sprintf(Settings.TunnelAPIAddr, c.NGROKLocalAddr)\n\n\t\t\tjsonValue, err := json.Marshal(jsonData)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// INIT RECORD\n\t\t\trecord, err := attemptInitTunnel(url, jsonValue)\n\n\t\t\tif err != nil {\n\t\t\t\tif Settings.ShouldLog {\n\t\t\t\t\tLogger.Printf(\"failed to init tunnel: %s | addr: %s\\n\", t.Name, t.LocalAddress)\n\t\t\t\t}\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tt.RemoteAddress = record.PublicURL\n\t\t\tt.IsCreated = true\n\n\t\t\tif Settings.ShouldLog {\n\t\t\t\tLogger.Println(\"Tunnel Created...\")\n\t\t\t\tLogger.Printf(\">>> Name: %s | Public Addr: %s\\n\", t.Name, t.RemoteAddress)\n\t\t\t}\n\t\t\treturn nil\n\t\t}()\n\t\tif c.LogAPI && err != nil {\n\t\t\tif Settings.ShouldLog {\n\t\t\t\tLogger.Println(err)\n\t\t\t}\n\t\t}\n\t\tif err == nil {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn\n}", "func NewTunnelServer_registerTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_registerTunnel_Params_List{l}, err\n}", "func (client SyncAgentsClient) ListByServerNextResults(lastResults SyncAgentListResult) (result SyncAgentListResult, err error) {\n\treq, err := lastResults.SyncAgentListResultPreparer()\n\tif err != nil {\n\t\treturn result, autorest.NewErrorWithError(err, \"sql.SyncAgentsClient\", \"ListByServer\", nil, \"Failure preparing next results request\")\n\t}\n\tif req == nil {\n\t\treturn\n\t}\n\n\tresp, err := client.ListByServerSender(req)\n\tif err != nil {\n\t\tresult.Response = autorest.Response{Response: resp}\n\t\treturn result, autorest.NewErrorWithError(err, \"sql.SyncAgentsClient\", \"ListByServer\", resp, \"Failure sending next results request\")\n\t}\n\n\tresult, err = client.ListByServerResponder(resp)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"sql.SyncAgentsClient\", \"ListByServer\", resp, \"Failure responding to next results request\")\n\t}\n\n\treturn\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewRegisterUdpSessionResponse creates a new list of RegisterUdpSessionResponse.
func NewRegisterUdpSessionResponse_List(s *capnp.Segment, sz int32) (RegisterUdpSessionResponse_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz) return RegisterUdpSessionResponse_List{l}, err }
[ "func NewSessionManager_registerUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_registerUdpSession_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn SessionManager_registerUdpSession_Results_List{l}, err\n}", "func UA_CreateSessionResponse_new() []UA_CreateSessionResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[197]))[:]).([]UA_CreateSessionResponse)\n}", "func UA_RegisterNodesResponse_new() []UA_RegisterNodesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[120]))[:]).([]UA_RegisterNodesResponse)\n}", "func (s SessionManager_registerUdpSession_Results) NewResult() (RegisterUdpSessionResponse, error) {\n\tss, err := NewRegisterUdpSessionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegisterUdpSessionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func UA_RegisterServer2Response_new() []UA_RegisterServer2Response {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[165]))[:]).([]UA_RegisterServer2Response)\n}", "func UA_RegisterServerResponse_new() []UA_RegisterServerResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[149]))[:]).([]UA_RegisterServerResponse)\n}", "func UA_CreateSubscriptionResponse_new() []UA_CreateSubscriptionResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[152]))[:]).([]UA_CreateSubscriptionResponse)\n}", "func UA_UnregisterNodesResponse_new() []UA_UnregisterNodesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[129]))[:]).([]UA_UnregisterNodesResponse)\n}", "func NewSessionManager_registerUdpSession_Params_List(s *capnp.Segment, sz int32) (SessionManager_registerUdpSession_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 16, PointerCount: 3}, sz)\n\treturn SessionManager_registerUdpSession_Params_List{l}, err\n}", "func NewSessionManager_unregisterUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_unregisterUdpSession_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn SessionManager_unregisterUdpSession_Results_List{l}, err\n}", "func UA_CloseSessionResponse_new() []UA_CloseSessionResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[176]))[:]).([]UA_CloseSessionResponse)\n}", "func UA_AddNodesResponse_new() []UA_AddNodesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[140]))[:]).([]UA_AddNodesResponse)\n}", "func (m *Marshaller) MarshallRegistrationResponse(messages []string) []byte {\n\tmessagesBytes, err := json.Marshal(messages)\n\tif err != nil {\n\t\tlog.Fatal(err.Error())\n\t}\n\treturn messagesBytes\n}", "func UA_ActivateSessionResponse_new() []UA_ActivateSessionResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[109]))[:]).([]UA_ActivateSessionResponse)\n}", "func UA_WriteResponse_new() []UA_WriteResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[113]))[:]).([]UA_WriteResponse)\n}", "func UA_DeleteSubscriptionsResponse_new() []UA_DeleteSubscriptionsResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[139]))[:]).([]UA_DeleteSubscriptionsResponse)\n}", "func UA_RepublishResponse_new() []UA_RepublishResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[158]))[:]).([]UA_RepublishResponse)\n}", "func NewRegistrationServer_registerConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_registerConnection_Results_List{l}, err\n}", "func NewResponseDevices() *ResponseDevices {\n\tthis := ResponseDevices{}\n\treturn &this\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewSessionManager_registerUdpSession_Params creates a new list of SessionManager_registerUdpSession_Params.
func NewSessionManager_registerUdpSession_Params_List(s *capnp.Segment, sz int32) (SessionManager_registerUdpSession_Params_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 16, PointerCount: 3}, sz) return SessionManager_registerUdpSession_Params_List{l}, err }
[ "func NewSessionManager_unregisterUdpSession_Params_List(s *capnp.Segment, sz int32) (SessionManager_unregisterUdpSession_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn SessionManager_unregisterUdpSession_Params_List{l}, err\n}", "func NewSessionManager_registerUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_registerUdpSession_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn SessionManager_registerUdpSession_Results_List{l}, err\n}", "func NewRegisterUdpSessionResponse_List(s *capnp.Segment, sz int32) (RegisterUdpSessionResponse_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn RegisterUdpSessionResponse_List{l}, err\n}", "func NewTunnelServer_registerTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 3}, sz)\n\treturn TunnelServer_registerTunnel_Params_List{l}, err\n}", "func NewSessionManager_unregisterUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_unregisterUdpSession_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn SessionManager_unregisterUdpSession_Results_List{l}, err\n}", "func (s SessionManager_registerUdpSession_Results) NewResult() (RegisterUdpSessionResponse, error) {\n\tss, err := NewRegisterUdpSessionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegisterUdpSessionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewRegistrationServer_registerConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 3}, sz)\n\treturn RegistrationServer_registerConnection_Params_List{l}, err\n}", "func registerOperationDevicesPostDevicesDeviceidInterfacesBridgeParamFlags(cmd *cobra.Command) error {\n\tif err := registerOperationDevicesPostDevicesDeviceidInterfacesBridgeBodyParamFlags(\"\", cmd); err != nil {\n\t\treturn err\n\t}\n\tif err := registerOperationDevicesPostDevicesDeviceidInterfacesBridgeDeviceIDParamFlags(\"\", cmd); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func NewUpdateRegistryParams() *UpdateRegistryParams {\n\treturn &UpdateRegistryParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewPeerRegistrationPacketByArray(data []byte) (PeerRegistrationRequestPacket, error) {\r\n\tvar p PeerRegistrationRequestPacket\r\n\tp.Command = Command(data[0])\r\n\tp.ID = RadioID(util.ParseUint32(data, 1))\r\n\tp.LinkType = LinkType(data[5])\r\n\treturn p, nil\r\n}", "func (m *udpSessionManager) NewUDP() (HyUDPConn, error) {\n\tm.mutex.Lock()\n\tdefer m.mutex.Unlock()\n\n\tif m.closed {\n\t\treturn nil, coreErrs.ClosedError{}\n\t}\n\n\tid := m.nextID\n\tm.nextID++\n\n\tconn := &udpConn{\n\t\tID: id,\n\t\tD: &frag.Defragger{},\n\t\tReceiveCh: make(chan *protocol.UDPMessage, udpMessageChanSize),\n\t\tSendBuf: make([]byte, protocol.MaxUDPSize),\n\t\tSendFunc: m.io.SendMessage,\n\t}\n\tconn.CloseFunc = func() {\n\t\tm.mutex.Lock()\n\t\tdefer m.mutex.Unlock()\n\t\tm.close(conn)\n\t}\n\tm.m[id] = conn\n\n\treturn conn, nil\n}", "func NewTunnelServer_unregisterTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Params_List{l}, err\n}", "func NewApiSession_Params_List(s *capnp.Segment, sz int32) (ApiSession_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn capnp.StructList[ApiSession_Params](l), err\n}", "func NewDevicesUpdateModulePropertiesParams() *DevicesUpdateModulePropertiesParams {\n\tvar ()\n\treturn &DevicesUpdateModulePropertiesParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func UA_SessionManager_createSession(sm []UA_SessionManager, channel []UA_SecureChannel, request []UA_CreateSessionRequest, session [][]UA_Session) UA_StatusCode {\n\tif UA_UInt32(sm[0].currentSessionCount) >= uint32(uint16((uint16((uint16_t((UA_UInt16(sm[0].server[0].config.maxSessions)))))))) {\n\t\treturn UA_StatusCode((uint32_t((uint32((uint32(2153119744)))))))\n\t}\n\tvar newentry []session_list_entry = make([]session_list_entry, 584/584)\n\tif newentry == nil {\n\t\treturn UA_StatusCode((uint32_t((uint32((uint32(2147680256)))))))\n\t}\n\tUA_atomic_addUInt32((*[100000000]UA_UInt32)(unsafe.Pointer(&sm[0].currentSessionCount))[:], 1)\n\tUA_Session_init((*[100000000]UA_Session)(unsafe.Pointer(&newentry[0].session))[:])\n\tnewentry[0].session.sessionId = UA_NODEID_GUID(1, UA_Guid_random())\n\tnewentry[0].session.header.authenticationToken = UA_NODEID_GUID(1, UA_Guid_random())\n\tif UA_Double(request[0].requestedSessionTimeout) <= UA_Double(sm[0].server[0].config.maxSessionTimeout) && UA_Double(request[0].requestedSessionTimeout) > UA_Double((0)) {\n\t\tnewentry[0].session.timeout = UA_Double(request[0].requestedSessionTimeout)\n\t} else {\n\t\tnewentry[0].session.timeout = UA_Double(sm[0].server[0].config.maxSessionTimeout)\n\t}\n\tUA_Session_updateLifetime((*[100000000]UA_Session)(unsafe.Pointer(&newentry[0].session))[:])\n\tfor {\n\t\tif ((newentry)[0].pointers.le_next = ((*[100000000]session_list)(unsafe.Pointer(&sm[0].sessions))[:])[0].lh_first) != nil {\n\t\t\t((*[100000000]session_list)(unsafe.Pointer(&sm[0].sessions))[:])[0].lh_first[0].pointers.le_prev = (*[100000000][]session_list_entry)(unsafe.Pointer(&(newentry)[0].pointers.le_next))[:]\n\t\t}\n\t\t((*[100000000]session_list)(unsafe.Pointer(&sm[0].sessions))[:])[0].lh_first = newentry\n\t\t(newentry)[0].pointers.le_prev = (*[100000000][]session_list_entry)(unsafe.Pointer(&((*[100000000]session_list)(unsafe.Pointer(&sm[0].sessions))[:])[0].lh_first))[:]\n\t\tif noarch.NotInt((0)) != 0 {\n\t\t\tbreak\n\t\t}\n\t}\n\tsession[0] = (*[100000000]UA_Session)(unsafe.Pointer(&newentry[0].session))[:]\n\treturn 0\n}", "func NewRegistrationServer_unregisterConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Params_List{l}, err\n}", "func UA_CreateSessionRequest_deleteMembers(p []UA_CreateSessionRequest) {\n\tUA_deleteMembers(p, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[191]))[:])\n}", "func (c ConfigQemu) CreateQemuUsbsParams(params map[string]interface{}) {\n\tfor usbID, usbConfMap := range c.QemuUsbs {\n\t\tqemuUsbName := \"usb\" + strconv.Itoa(usbID)\n\n\t\t// Add back to Qemu prams.\n\t\tparams[qemuUsbName] = FormatUsbParam(usbConfMap)\n\t}\n}", "func NewRegistrationServer_updateLocalConfiguration_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_updateLocalConfiguration_Params_List{l}, err\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewResult sets the result field to a newly allocated RegisterUdpSessionResponse struct, preferring placement in s's segment.
func (s SessionManager_registerUdpSession_Results) NewResult() (RegisterUdpSessionResponse, error) { ss, err := NewRegisterUdpSessionResponse(s.Struct.Segment()) if err != nil { return RegisterUdpSessionResponse{}, err } err = s.Struct.SetPtr(0, ss.Struct.ToPtr()) return ss, err }
[ "func (s RegistrationServer_registerConnection_Results) NewResult() (ConnectionResponse, error) {\n\tss, err := NewConnectionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_registerTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewRegisterResult(message *user_methodpb.RegisterResponse) *usermethod.ResponseResult {\n\tresult := &usermethod.ResponseResult{\n\t\tCode: int(message.Code),\n\t}\n\tif message.Message_ != \"\" {\n\t\tresult.Message = &message.Message_\n\t}\n\tif message.Data != nil {\n\t\tresult.Data = make(map[string]string, len(message.Data))\n\t\tfor key, val := range message.Data {\n\t\t\ttk := key\n\t\t\ttv := val\n\t\t\tresult.Data[tk] = tv\n\t\t}\n\t}\n\treturn result\n}", "func (s TunnelServer_reconnectTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewSessionManager_registerUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_registerUdpSession_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn SessionManager_registerUdpSession_Results_List{l}, err\n}", "func newResult(ip net.IP, domain, sender, hostname string) (r *Result) {\n\tbsender := []byte(sender)\n\n\tat := bytes.Index(bsender, []byte{'@'})\n\tr = &Result{\n\t\tIP: ip,\n\t\tDomain: []byte(domain),\n\t\tSender: []byte(sender),\n\t\tHostname: []byte(hostname),\n\t\tsenderLocal: bsender[:at],\n\t\tsenderDomain: bsender[at+1:],\n\t}\n\n\tif !libnet.IsHostnameValid(r.Domain, true) {\n\t\tr.Code = ResultCodeNone\n\t\tr.Err = \"invalid domain name\"\n\t\treturn\n\t}\n\n\treturn\n}", "func NewRegisterUdpSessionResponse_List(s *capnp.Segment, sz int32) (RegisterUdpSessionResponse_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn RegisterUdpSessionResponse_List{l}, err\n}", "func (s ConfigurationManager_updateConfiguration_Results) NewResult() (UpdateConfigurationResponse, error) {\n\tss, err := NewUpdateConfigurationResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn UpdateConfigurationResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_authenticate_Results) NewResult() (AuthenticateResponse, error) {\n\tss, err := NewAuthenticateResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn AuthenticateResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (m *registers) PushResult(r cell.I) {\n\t// println(\"push result\")\n\tm.dump = pair.Cons(r, m.dump)\n}", "func (s TunnelServer_getServerInfo_Results) NewResult() (ServerInfo, error) {\n\tss, err := NewServerInfo(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ServerInfo{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func UA_RegisterNodesResponse_new() []UA_RegisterNodesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[120]))[:]).([]UA_RegisterNodesResponse)\n}", "func setupResult(rrt *ResolverRuntime, rcode int, opaqueResponse interface{}) (ret *dns.Msg) {\n\tswitch t := opaqueResponse.(type) {\n\tcase [][]dns.RR:\n\t\tret = &dns.Msg{Answer: t[0], Ns: t[1], Extra: t[2]}\n\tcase []dns.RR:\n\t\tret = &dns.Msg{Answer: t}\n\tcase dns.RR: /// single RR means a SOA for nxdomain/nodata responses\n\t\tret = &dns.Msg{Ns: []dns.RR{t}}\n\tcase *dns.Msg:\n\t\t//t.Rcode = rcode\n\t\tret = &dns.Msg{MsgHdr: t.MsgHdr, Answer: cloneSection(t.Answer), Ns: cloneSection(t.Ns), Extra: cloneSection(t.Extra)}\n\tdefault:\n\t\tret = &dns.Msg{}\n\t}\n\tret.SetRcode(rrt.original, rcode)\n\tLogInfo(rrt, \"Setting up result as answer to Q [%s] Id [%d] RC [%s]\\n[%v]\\n\\n\", rrt.original.Question[0].String(), rrt.original.Id, dns.RcodeToString[ret.Rcode], ret)\n\treturn\n}", "func (s CoreBanking_createAccount_Results) NewRes() (Response, error) {\n\tss, err := NewResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Response{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (r *runner) addResult(s result) result {\n\tm, ok := r.metrics[s.doResult.RequestLabel]\n\tif !ok {\n\t\tm = new(Metrics)\n\t\tr.metrics[s.doResult.RequestLabel] = m\n\t}\n\tm.add(s)\n\treturn s\n}", "func (p *ResultsServerServiceClient) RegisterSearchResult_(result *SearchResult_, taskType AnnotationTaskType) (err error) {\n if err = p.sendRegisterSearchResult_(result, taskType); err != nil { return }\n return p.recvRegisterSearchResult_()\n}", "func UA_CreateSessionResponse_new() []UA_CreateSessionResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[197]))[:]).([]UA_CreateSessionResponse)\n}", "func newSuccessResult(vres *inventoryviews.SuccessResultView) *SuccessResult {\n\tres := &SuccessResult{}\n\tif vres.OK != nil {\n\t\tres.OK = *vres.OK\n\t}\n\treturn res\n}", "func newResult(t reflect.Type, opts resultOptions) (result, error) {\n\tswitch {\n\tcase isIn(t) || (t.Kind() == reflect.Ptr && isIn(t.Elem())) || isEmbed(t, _inPtrType):\n\t\treturn nil, errf(\"cannot provide parameter objects\", \"%v embeds a dig.In\", t)\n\tcase isError(t):\n\t\treturn nil, errf(\"cannot return an error here, return it from the constructor instead\")\n\tcase isOut(t):\n\t\treturn newResultObject(t, opts)\n\tcase isEmbed(t, _outPtrType):\n\t\treturn nil, errf(\n\t\t\t\"cannot build a result object by embedding *dig.Out, embed dig.Out instead\",\n\t\t\t\"%v embeds *dig.Out\", t)\n\tcase t.Kind() == reflect.Ptr && isOut(t.Elem()):\n\t\treturn nil, errf(\n\t\t\t\"cannot return a pointer to a result object, use a value instead\",\n\t\t\t\"%v is a pointer to a struct that embeds dig.Out\", t)\n\tcase len(opts.Group) > 0:\n\t\tg, err := parseGroupString(opts.Group)\n\t\tif err != nil {\n\t\t\treturn nil, errf(\n\t\t\t\t\"cannot parse group %q\", opts.Group, err)\n\t\t}\n\t\trg := resultGrouped{Type: t, Group: g.Name, Flatten: g.Flatten}\n\t\tif g.Flatten {\n\t\t\tif t.Kind() != reflect.Slice {\n\t\t\t\treturn nil, errf(\n\t\t\t\t\t\"flatten can be applied to slices only\",\n\t\t\t\t\t\"%v is not a slice\", t)\n\t\t\t}\n\t\t\trg.Type = rg.Type.Elem()\n\t\t}\n\t\treturn rg, nil\n\tdefault:\n\t\treturn resultSingle{Type: t, Name: opts.Name}, nil\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewSessionManager_registerUdpSession_Results creates a new list of SessionManager_registerUdpSession_Results.
func NewSessionManager_registerUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_registerUdpSession_Results_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz) return SessionManager_registerUdpSession_Results_List{l}, err }
[ "func NewSessionManager_unregisterUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_unregisterUdpSession_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn SessionManager_unregisterUdpSession_Results_List{l}, err\n}", "func (s SessionManager_registerUdpSession_Results) NewResult() (RegisterUdpSessionResponse, error) {\n\tss, err := NewRegisterUdpSessionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegisterUdpSessionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewRegisterUdpSessionResponse_List(s *capnp.Segment, sz int32) (RegisterUdpSessionResponse_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn RegisterUdpSessionResponse_List{l}, err\n}", "func NewSessionManager_registerUdpSession_Params_List(s *capnp.Segment, sz int32) (SessionManager_registerUdpSession_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 16, PointerCount: 3}, sz)\n\treturn SessionManager_registerUdpSession_Params_List{l}, err\n}", "func NewTunnelServer_registerTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_registerTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn TunnelServer_registerTunnel_Results_List{l}, err\n}", "func NewRegistrationServer_registerConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_registerConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_registerConnection_Results_List{l}, err\n}", "func UA_CreateSessionResponse_new() []UA_CreateSessionResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[197]))[:]).([]UA_CreateSessionResponse)\n}", "func UA_RegisterNodesResponse_new() []UA_RegisterNodesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[120]))[:]).([]UA_RegisterNodesResponse)\n}", "func UA_RegisterServer2Response_new() []UA_RegisterServer2Response {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[165]))[:]).([]UA_RegisterServer2Response)\n}", "func NewSessionManager_unregisterUdpSession_Params_List(s *capnp.Segment, sz int32) (SessionManager_unregisterUdpSession_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn SessionManager_unregisterUdpSession_Params_List{l}, err\n}", "func NewRegistrationServer_unregisterConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Results_List{l}, err\n}", "func NewResults(del []*asura.ResponseDeliverTx) AsuraResults {\n\tres := make(AsuraResults, len(del))\n\tfor i, d := range del {\n\t\tres[i] = NewResultFromResponse(d)\n\t}\n\treturn res\n}", "func NewTunnelServer_unregisterTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Results_List{l}, err\n}", "func (s TunnelServer_registerTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func UA_RegisterServerResponse_new() []UA_RegisterServerResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[149]))[:]).([]UA_RegisterServerResponse)\n}", "func NewRegistrationServer_updateLocalConfiguration_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_updateLocalConfiguration_Results_List{l}, err\n}", "func NewRuntime_memStats_Results_List(s *capnp.Segment, sz int32) (Runtime_memStats_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn Runtime_memStats_Results_List{l}, err\n}", "func UA_UnregisterNodesResponse_new() []UA_UnregisterNodesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[129]))[:]).([]UA_UnregisterNodesResponse)\n}", "func UA_FindServersResponse_new() []UA_FindServersResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[194]))[:]).([]UA_FindServersResponse)\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewSessionManager_unregisterUdpSession_Params creates a new list of SessionManager_unregisterUdpSession_Params.
func NewSessionManager_unregisterUdpSession_Params_List(s *capnp.Segment, sz int32) (SessionManager_unregisterUdpSession_Params_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz) return SessionManager_unregisterUdpSession_Params_List{l}, err }
[ "func NewSessionManager_registerUdpSession_Params_List(s *capnp.Segment, sz int32) (SessionManager_registerUdpSession_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 16, PointerCount: 3}, sz)\n\treturn SessionManager_registerUdpSession_Params_List{l}, err\n}", "func NewSessionManager_unregisterUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_unregisterUdpSession_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn SessionManager_unregisterUdpSession_Results_List{l}, err\n}", "func NewTunnelServer_unregisterTunnel_Params_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Params_List{l}, err\n}", "func NewRegistrationServer_unregisterConnection_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Params_List{l}, err\n}", "func NewSessionManager_registerUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_registerUdpSession_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn SessionManager_registerUdpSession_Results_List{l}, err\n}", "func NewDevicesRemoveAttestationParams() *DevicesRemoveAttestationParams {\n\tvar ()\n\treturn &DevicesRemoveAttestationParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (in *ActionUserTotpDeviceUpdateInput) UnselectParameters(params ...string) *ActionUserTotpDeviceUpdateInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func NewRemoveMembershipParams() *RemoveMembershipParams {\n\tvar ()\n\treturn &RemoveMembershipParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewRegisterUdpSessionResponse_List(s *capnp.Segment, sz int32) (RegisterUdpSessionResponse_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn RegisterUdpSessionResponse_List{l}, err\n}", "func (in *ActionApiServerUnlockTransactionSigningKeyInput) UnselectParameters(params ...string) *ActionApiServerUnlockTransactionSigningKeyInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func (in *ActionIncomingPaymentUpdateInput) UnselectParameters(params ...string) *ActionIncomingPaymentUpdateInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func (in *ActionUserEnvironmentConfigUpdateInput) UnselectParameters(params ...string) *ActionUserEnvironmentConfigUpdateInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func Service_UnregisterNodes(server []UA_Server, session []UA_Session, request []UA_UnregisterNodesRequest, response []UA_UnregisterNodesResponse) {\n\tUA_LOG_DEBUG(UA_Logger(server[0].config.logger), UA_LOGCATEGORY_SESSION, []byte(\"Connection %i | SecureChannel %i | Session %08x-%04x-%04x-%02x%02x-%02x%02x%02x%02x%02x%02x | Processing UnRegisterNodesRequest%.0s\\x00\"), (func() int {\n\t\tif (session)[0].header.channel != nil {\n\t\t\treturn (func() int {\n\t\t\t\tif (session)[0].header.channel[0].connection != nil {\n\t\t\t\t\treturn int((__int32_t((int32_t((UA_Int32((session)[0].header.channel[0].connection[0].sockfd)))))))\n\t\t\t\t}\n\t\t\t\treturn 0\n\t\t\t}())\n\t\t}\n\t\treturn 0\n\t}()), (func() uint32 {\n\t\tif (session)[0].header.channel != nil {\n\t\t\treturn uint32((uint32((uint32_t((UA_UInt32((session)[0].header.channel[0].securityToken.channelId)))))))\n\t\t}\n\t\treturn 0\n\t}()), UA_UInt32((*(session)[0].sessionId.identifier.guid()).data1), int(uint16((uint16((uint16_t((UA_UInt16((*(session)[0].sessionId.identifier.guid()).data2)))))))), int(uint16((uint16((uint16_t((UA_UInt16((*(session)[0].sessionId.identifier.guid()).data3)))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][0])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][1])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][2])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][3])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][4])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][5])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][6])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][7])))))))), []byte(\"\\x00\"))\n\tif uint(request[0].nodesToUnregisterSize) == uint((0)) {\n\t\t//TODO: remove the nodeids from the session if really needed\n\t\tresponse[0].responseHeader.serviceResult = UA_StatusCode((uint32_t((uint32((uint32(2148466688)))))))\n\t}\n\tif UA_UInt32(server[0].config.maxNodesPerRegisterNodes) != UA_UInt32((uint32_t((uint32((0)))))) && uint(request[0].nodesToUnregisterSize) > uint((uint32((uint32((uint32_t((UA_UInt32(server[0].config.maxNodesPerRegisterNodes))))))))) {\n\t\tresponse[0].responseHeader.serviceResult = UA_StatusCode((uint32_t((uint32((uint32(2148532224)))))))\n\t\treturn\n\t}\n}", "func NewRemoveEventLoopGroupParams() *RemoveEventLoopGroupParams {\n\tvar ()\n\treturn &RemoveEventLoopGroupParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func UA_CloseSessionRequest_deleteMembers(p []UA_CloseSessionRequest) {\n\tUA_deleteMembers(p, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[121]))[:])\n}", "func NewDevicesRemoveAttestationParamsWithTimeout(timeout time.Duration) *DevicesRemoveAttestationParams {\n\tvar ()\n\treturn &DevicesRemoveAttestationParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "func NewUnregisterUsingDELETEParams() *UnregisterUsingDELETEParams {\n\treturn &UnregisterUsingDELETEParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (in *ActionUserPaymentCreateInput) UnselectParameters(params ...string) *ActionUserPaymentCreateInput {\n\tif in._selectedParameters == nil {\n\t\treturn in\n\t}\n\n\tfor _, param := range params {\n\t\tdelete(in._selectedParameters, param)\n\t}\n\n\treturn in\n}", "func UA_Client_Service_unregisterNodes(client []UA_Client, request UA_UnregisterNodesRequest) UA_UnregisterNodesResponse {\n\tvar response UA_UnregisterNodesResponse\n\t__UA_Client_Service(client, (*[100000000]UA_UnregisterNodesRequest)(unsafe.Pointer(&request))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[48]))[:], (*[100000000]UA_UnregisterNodesResponse)(unsafe.Pointer(&response))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[129]))[:])\n\treturn response\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewSessionManager_unregisterUdpSession_Results creates a new list of SessionManager_unregisterUdpSession_Results.
func NewSessionManager_unregisterUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_unregisterUdpSession_Results_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz) return SessionManager_unregisterUdpSession_Results_List{l}, err }
[ "func NewSessionManager_registerUdpSession_Results_List(s *capnp.Segment, sz int32) (SessionManager_registerUdpSession_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn SessionManager_registerUdpSession_Results_List{l}, err\n}", "func NewSessionManager_unregisterUdpSession_Params_List(s *capnp.Segment, sz int32) (SessionManager_unregisterUdpSession_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn SessionManager_unregisterUdpSession_Params_List{l}, err\n}", "func NewTunnelServer_unregisterTunnel_Results_List(s *capnp.Segment, sz int32) (TunnelServer_unregisterTunnel_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn TunnelServer_unregisterTunnel_Results_List{l}, err\n}", "func NewRegistrationServer_unregisterConnection_Results_List(s *capnp.Segment, sz int32) (RegistrationServer_unregisterConnection_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn RegistrationServer_unregisterConnection_Results_List{l}, err\n}", "func NewRegisterUdpSessionResponse_List(s *capnp.Segment, sz int32) (RegisterUdpSessionResponse_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 2}, sz)\n\treturn RegisterUdpSessionResponse_List{l}, err\n}", "func (s SessionManager_registerUdpSession_Results) NewResult() (RegisterUdpSessionResponse, error) {\n\tss, err := NewRegisterUdpSessionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegisterUdpSessionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func UA_UnregisterNodesResponse_new() []UA_UnregisterNodesResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[129]))[:]).([]UA_UnregisterNodesResponse)\n}", "func NewSessionManager_registerUdpSession_Params_List(s *capnp.Segment, sz int32) (SessionManager_registerUdpSession_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 16, PointerCount: 3}, sz)\n\treturn SessionManager_registerUdpSession_Params_List{l}, err\n}", "func UA_CloseSessionResponse_new() []UA_CloseSessionResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[176]))[:]).([]UA_CloseSessionResponse)\n}", "func NewAppHooks_drop_Results_List(s *capnp.Segment, sz int32) (AppHooks_drop_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn capnp.StructList[AppHooks_drop_Results](l), err\n}", "func UA_CreateSessionResponse_deleteMembers(p []UA_CreateSessionResponse) {\n\tUA_deleteMembers(p, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[197]))[:])\n}", "func UA_RegisterServer2Response_deleteMembers(p []UA_RegisterServer2Response) {\n\tUA_deleteMembers(p, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[165]))[:])\n}", "func UA_CloseSessionResponse_deleteMembers(p []UA_CloseSessionResponse) {\n\tUA_deleteMembers(p, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[176]))[:])\n}", "func UA_Client_Service_unregisterNodes(client []UA_Client, request UA_UnregisterNodesRequest) UA_UnregisterNodesResponse {\n\tvar response UA_UnregisterNodesResponse\n\t__UA_Client_Service(client, (*[100000000]UA_UnregisterNodesRequest)(unsafe.Pointer(&request))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[48]))[:], (*[100000000]UA_UnregisterNodesResponse)(unsafe.Pointer(&response))[:], (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[129]))[:])\n\treturn response\n}", "func UA_SessionManager_removeSession(sm []UA_SessionManager, token []UA_NodeId) UA_StatusCode {\n\tvar current []session_list_entry\n\tfor current = ((*[100000000]session_list)(unsafe.Pointer(&sm[0].sessions))[:])[0].lh_first; current != nil; current = (current)[0].pointers.le_next {\n\t\tif int((int((UA_NodeId_equal((*[100000000]UA_NodeId)(unsafe.Pointer(&current[0].session.header.authenticationToken))[:], token))))) != 0 {\n\t\t\tbreak\n\t\t}\n\t}\n\tif current == nil {\n\t\treturn UA_StatusCode((uint32_t((uint32((uint32(2149908480)))))))\n\t}\n\treturn removeSession(sm, current)\n}", "func NewRuntime_memStats_Results_List(s *capnp.Segment, sz int32) (Runtime_memStats_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn Runtime_memStats_Results_List{l}, err\n}", "func UnmarshalUuidsResult(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(UuidsResult)\n\terr = core.UnmarshalPrimitive(m, \"uuids\", &obj.Uuids)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "func UA_UnregisterNodesResponse_deleteMembers(p []UA_UnregisterNodesResponse) {\n\tUA_deleteMembers(p, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[129]))[:])\n}", "func Service_UnregisterNodes(server []UA_Server, session []UA_Session, request []UA_UnregisterNodesRequest, response []UA_UnregisterNodesResponse) {\n\tUA_LOG_DEBUG(UA_Logger(server[0].config.logger), UA_LOGCATEGORY_SESSION, []byte(\"Connection %i | SecureChannel %i | Session %08x-%04x-%04x-%02x%02x-%02x%02x%02x%02x%02x%02x | Processing UnRegisterNodesRequest%.0s\\x00\"), (func() int {\n\t\tif (session)[0].header.channel != nil {\n\t\t\treturn (func() int {\n\t\t\t\tif (session)[0].header.channel[0].connection != nil {\n\t\t\t\t\treturn int((__int32_t((int32_t((UA_Int32((session)[0].header.channel[0].connection[0].sockfd)))))))\n\t\t\t\t}\n\t\t\t\treturn 0\n\t\t\t}())\n\t\t}\n\t\treturn 0\n\t}()), (func() uint32 {\n\t\tif (session)[0].header.channel != nil {\n\t\t\treturn uint32((uint32((uint32_t((UA_UInt32((session)[0].header.channel[0].securityToken.channelId)))))))\n\t\t}\n\t\treturn 0\n\t}()), UA_UInt32((*(session)[0].sessionId.identifier.guid()).data1), int(uint16((uint16((uint16_t((UA_UInt16((*(session)[0].sessionId.identifier.guid()).data2)))))))), int(uint16((uint16((uint16_t((UA_UInt16((*(session)[0].sessionId.identifier.guid()).data3)))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][0])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][1])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][2])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][3])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][4])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][5])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][6])))))))), int(uint8((__uint8_t((uint8_t((UA_Byte((*(session)[0].sessionId.identifier.guid()).data4[:][7])))))))), []byte(\"\\x00\"))\n\tif uint(request[0].nodesToUnregisterSize) == uint((0)) {\n\t\t//TODO: remove the nodeids from the session if really needed\n\t\tresponse[0].responseHeader.serviceResult = UA_StatusCode((uint32_t((uint32((uint32(2148466688)))))))\n\t}\n\tif UA_UInt32(server[0].config.maxNodesPerRegisterNodes) != UA_UInt32((uint32_t((uint32((0)))))) && uint(request[0].nodesToUnregisterSize) > uint((uint32((uint32((uint32_t((UA_UInt32(server[0].config.maxNodesPerRegisterNodes))))))))) {\n\t\tresponse[0].responseHeader.serviceResult = UA_StatusCode((uint32_t((uint32((uint32(2148532224)))))))\n\t\treturn\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewUpdateConfigurationResponse creates a new list of UpdateConfigurationResponse.
func NewUpdateConfigurationResponse_List(s *capnp.Segment, sz int32) (UpdateConfigurationResponse_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 1}, sz) return UpdateConfigurationResponse_List{l}, err }
[ "func NewConfigurationUpdate(value []string) *ConfigurationUpdate {\n\tthis := ConfigurationUpdate{}\n\tthis.Value = value\n\treturn &this\n}", "func NewConfigurationManager_updateConfiguration_Results_List(s *capnp.Segment, sz int32) (ConfigurationManager_updateConfiguration_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn ConfigurationManager_updateConfiguration_Results_List{l}, err\n}", "func (s ConfigurationManager_updateConfiguration_Results) NewResult() (UpdateConfigurationResponse, error) {\n\tss, err := NewUpdateConfigurationResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn UpdateConfigurationResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func CreateUpdateExtendConfigResponse() (response *UpdateExtendConfigResponse) {\n\tresponse = &UpdateExtendConfigResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func NewConfigurationManager_updateConfiguration_Params_List(s *capnp.Segment, sz int32) (ConfigurationManager_updateConfiguration_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 1}, sz)\n\treturn ConfigurationManager_updateConfiguration_Params_List{l}, err\n}", "func CreateUpdateProductFilterConfigResponse() (response *UpdateProductFilterConfigResponse) {\n\tresponse = &UpdateProductFilterConfigResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func (s *ConfigurationService) NewUpdateConfigurationParams(name string) *UpdateConfigurationParams {\n\tp := &UpdateConfigurationParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"name\"] = name\n\treturn p\n}", "func (this *AP) __updateConfigurationResponse() {\n\t// AP 给AC发送响应请求\n\tsMsg := this.tlv.packDisc(this.updateHeaderMsg(), this.updateDataMsg())\n\tthis.sendMsg(sMsg)\n\t// 设置下个code 和Action\n\tthis.APStatusCode = 7\n\t// AP 动作 Action 1 请求配置\n\tthis.Action = \"00000001\"\n}", "func NewUpdateResponse(result *fire.Fire) *firepb.UpdateResponse {\n\tmessage := &firepb.UpdateResponse{}\n\tif result.ID != nil {\n\t\tmessage.Id = int32(*result.ID)\n\t}\n\tif result.CreatedAt != nil {\n\t\tmessage.CreatedAt = *result.CreatedAt\n\t}\n\tif result.UpdatedAt != nil {\n\t\tmessage.UpdatedAt = *result.UpdatedAt\n\t}\n\tif result.DeletedAt != nil {\n\t\tmessage.DeletedAt = *result.DeletedAt\n\t}\n\tif result.Name != nil {\n\t\tmessage.Name = *result.Name\n\t}\n\tif result.Description != nil {\n\t\tmessage.Description = *result.Description\n\t}\n\tif result.Start != nil {\n\t\tmessage.Start = *result.Start\n\t}\n\tif result.End != nil {\n\t\tmessage.End = *result.End\n\t}\n\tif result.Logs != nil {\n\t\tmessage.Logs = make([]*firepb.Log, len(result.Logs))\n\t\tfor i, val := range result.Logs {\n\t\t\tmessage.Logs[i] = &firepb.Log{}\n\t\t\tif val.ID != nil {\n\t\t\t\tmessage.Logs[i].Id = int32(*val.ID)\n\t\t\t}\n\t\t\tif val.CreatedAt != nil {\n\t\t\t\tmessage.Logs[i].CreatedAt = *val.CreatedAt\n\t\t\t}\n\t\t\tif val.UpdatedAt != nil {\n\t\t\t\tmessage.Logs[i].UpdatedAt = *val.UpdatedAt\n\t\t\t}\n\t\t\tif val.Name != nil {\n\t\t\t\tmessage.Logs[i].Name = *val.Name\n\t\t\t}\n\t\t\tif val.Size != nil {\n\t\t\t\tmessage.Logs[i].Size = *val.Size\n\t\t\t}\n\t\t\tif val.FireID != nil {\n\t\t\t\tmessage.Logs[i].FireId = int32(*val.FireID)\n\t\t\t}\n\t\t\tif val.AddedAt != nil {\n\t\t\t\tmessage.Logs[i].AddedAt = *val.AddedAt\n\t\t\t}\n\t\t\tif val.Weather != nil {\n\t\t\t\tmessage.Logs[i].Weather = svcFireWeatherToFirepbWeather(val.Weather)\n\t\t\t}\n\t\t}\n\t}\n\tif result.Weathers != nil {\n\t\tmessage.Weathers = make([]*firepb.Weather, len(result.Weathers))\n\t\tfor i, val := range result.Weathers {\n\t\t\tmessage.Weathers[i] = &firepb.Weather{}\n\t\t\tif val.ID != nil {\n\t\t\t\tmessage.Weathers[i].Id = int32(*val.ID)\n\t\t\t}\n\t\t\tif val.CreatedAt != nil {\n\t\t\t\tmessage.Weathers[i].CreatedAt = *val.CreatedAt\n\t\t\t}\n\t\t\tif val.FireID != nil {\n\t\t\t\tmessage.Weathers[i].FireId = int32(*val.FireID)\n\t\t\t}\n\t\t\tif val.LogID != nil {\n\t\t\t\tmessage.Weathers[i].LogId = int32(*val.LogID)\n\t\t\t}\n\t\t\tif val.Humidity != nil {\n\t\t\t\tmessage.Weathers[i].Humidity = *val.Humidity\n\t\t\t}\n\t\t\tif val.WeatherType != nil {\n\t\t\t\tmessage.Weathers[i].WeatherType = *val.WeatherType\n\t\t\t}\n\t\t\tif val.WeatherTime != nil {\n\t\t\t\tmessage.Weathers[i].WeatherTime = *val.WeatherTime\n\t\t\t}\n\t\t\tif val.Temperature != nil {\n\t\t\t\tmessage.Weathers[i].Temperature = svcFireTemperatureToFirepbTemperature(val.Temperature)\n\t\t\t}\n\t\t\tif val.DewPoint != nil {\n\t\t\t\tmessage.Weathers[i].DewPoint = svcFireTemperatureToFirepbTemperature(val.DewPoint)\n\t\t\t}\n\t\t\tif val.Wind != nil {\n\t\t\t\tmessage.Weathers[i].Wind = svcFireWindToFirepbWind(val.Wind)\n\t\t\t}\n\t\t}\n\t}\n\treturn message\n}", "func CreateModifyWebLockUpdateConfigResponse() (response *ModifyWebLockUpdateConfigResponse) {\n\tresponse = &ModifyWebLockUpdateConfigResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func newAppendEntriesResponse(term uint64, success bool, index uint64, commitIndex uint64) *AppendEntriesResponse {\n\treturn &AppendEntriesResponse{\n\t\tTerm: term,\n\t\tSuccess: success,\n\t\tIndex: index,\n\t\tCommitIndex: commitIndex,\n\t}\n}", "func CreateUpdateLivePullStreamInfoConfigResponse() (response *UpdateLivePullStreamInfoConfigResponse) {\n\tresponse = &UpdateLivePullStreamInfoConfigResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func (ca *PlatformAppCatalog) CreateConfigurationProductListing(body AppConfiguration) (GetAppCatalogConfiguration, error) {\n var (\n rawRequest *RawRequest\n response []byte\n err error\n createConfigurationProductListingResponse GetAppCatalogConfiguration\n\t )\n\n \n \n \n \n \n \n \n \n \n \n \n\n \n\n \n \n \n \n \n //Parse req body to map\n var reqBody map[string]interface{}\n reqBodyJSON, err := json.Marshal(body)\n if err != nil {\n \n return GetAppCatalogConfiguration{}, common.NewFDKError(err.Error())\n }\n err = json.Unmarshal([]byte(reqBodyJSON), &reqBody)\n if err != nil {\n \n return GetAppCatalogConfiguration{}, common.NewFDKError(err.Error()) \n }\n \n //API call\n rawRequest = NewRequest(\n ca.config,\n \"post\",\n fmt.Sprintf(\"/service/platform/catalog/v1.0/company/%s/application/%s/product-configuration/\",ca.CompanyID, ca.ApplicationID),\n nil,\n nil,\n reqBody)\n response, err = rawRequest.Execute()\n if err != nil {\n return GetAppCatalogConfiguration{}, err\n\t }\n \n err = json.Unmarshal(response, &createConfigurationProductListingResponse)\n if err != nil {\n return GetAppCatalogConfiguration{}, common.NewFDKError(err.Error())\n }\n return createConfigurationProductListingResponse, nil\n \n }", "func (p *ConfigurationsUpdatePoller) FinalResponse(ctx context.Context) (ConfigurationsUpdateResponse, error) {\n\trespType := ConfigurationsUpdateResponse{}\n\tresp, err := p.pt.FinalResponse(ctx, &respType.Configuration)\n\tif err != nil {\n\t\treturn ConfigurationsUpdateResponse{}, err\n\t}\n\trespType.RawResponse = resp\n\treturn respType, nil\n}", "func UA_ModifySubscriptionResponse_new() []UA_ModifySubscriptionResponse {\n\treturn UA_new((*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[118]))[:]).([]UA_ModifySubscriptionResponse)\n}", "func (client *ConfigurationsClient) batchUpdateCreateRequest(ctx context.Context, resourceGroupName string, serverName string, parameters ConfigurationListForBatchUpdate, options *ConfigurationsBeginBatchUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforMySQL/flexibleServers/{serverName}/updateConfigurations\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif serverName == \"\" {\n\t\treturn nil, errors.New(\"parameter serverName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{serverName}\", url.PathEscape(serverName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func CreateUpdateSummariesResponse() (response *UpdateSummariesResponse) {\n\tresponse = &UpdateSummariesResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func NewCmdUDBConfUpdate(out io.Writer) *cobra.Command {\n\tvar confID, key, value, file string\n\treq := base.BizClient.NewUpdateUDBParamGroupRequest()\n\tcmd := &cobra.Command{\n\t\tUse: \"update\",\n\t\tShort: \"Update parameters of DB's configuration\",\n\t\tLong: \"Update parameters of DB's configuration\",\n\t\tRun: func(c *cobra.Command, args []string) {\n\t\t\tid, err := strconv.Atoi(base.PickResourceID(confID))\n\t\t\tif err != nil {\n\t\t\t\tbase.HandleError(err)\n\t\t\t\treturn\n\t\t\t}\n\t\t\treq.GroupId = &id\n\n\t\t\tif key != \"\" && value != \"\" {\n\t\t\t\treq.Key = &key\n\t\t\t\treq.Value = &value\n\t\t\t\t_, err := base.BizClient.UpdateUDBParamGroup(req)\n\t\t\t\tif err != nil {\n\t\t\t\t\tbase.HandleError(err)\n\t\t\t\t} else {\n\t\t\t\t\tfmt.Printf(\"conf[%s]'sparameter[%s = %s] updated\\n\", confID, key, value)\n\t\t\t\t}\n\t\t\t}\n\t\t\tif file != \"\" {\n\t\t\t\tparams, err := parseParam(file)\n\t\t\t\tif err != nil {\n\t\t\t\t\tbase.HandleError(err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tfor _, p := range params {\n\t\t\t\t\treq.Key = sdk.String(p.Key)\n\t\t\t\t\treq.Value = sdk.String(p.Value)\n\t\t\t\t\t_, err := base.BizClient.UpdateUDBParamGroup(req)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tfmt.Printf(\"conf[%s]'sparameter[%s = %s] failed\\n\", confID, p.Key, p.Value)\n\t\t\t\t\t\tbase.HandleError(err)\n\t\t\t\t\t} else {\n\t\t\t\t\t\tfmt.Printf(\"conf[%s]'sparameter[%s = %s] updated\\n\", confID, p.Key, p.Value)\n\t\t\t\t\t}\n\t\t\t\t\tfmt.Println(\"\")\n\t\t\t\t}\n\t\t\t}\n\t\t},\n\t}\n\n\tflags := cmd.Flags()\n\tflags.SortFlags = false\n\n\tbindRegion(req, flags)\n\tbindZone(req, flags)\n\tbindProjectID(req, flags)\n\n\tflags.StringVar(&confID, \"conf-id\", \"\", \"Required. ConfID of configuration to update\")\n\tflags.StringVar(&key, \"key\", \"\", \"Optional. Key of parameter\")\n\tflags.StringVar(&value, \"value\", \"\", \"Optional. Value of parameter\")\n\tflags.StringVar(&file, \"file\", \"\", \"Optional. Path of file in which each parameter occupies one line with format 'key = value'\")\n\n\tflags.SetFlagValuesFunc(\"conf-id\", func() []string {\n\t\treturn getModifiableConfIDList(\"\", *req.ProjectId, *req.Region, *req.Zone)\n\t})\n\tflags.SetFlagValuesFunc(\"file\", func() []string {\n\t\treturn base.GetFileList(\"\")\n\t})\n\n\tcmd.MarkFlagRequired(\"conf-id\")\n\treturn cmd\n}", "func NewUpdateRequest(res *models.DeploymentGetResponse) *models.DeploymentUpdateRequest {\n\tif res == nil {\n\t\treturn nil\n\t}\n\n\tvar esRefID string\n\tvar req = models.DeploymentUpdateRequest{\n\t\tName: *res.Name,\n\t\tResources: &models.DeploymentUpdateResources{},\n\t\tPruneOrphans: ec.Bool(false),\n\t}\n\n\tfor _, r := range res.Resources.Elasticsearch {\n\t\tif resource, rID := parseElasticsearchGetResponse(r); resource != nil {\n\t\t\treq.Resources.Elasticsearch = append(req.Resources.Elasticsearch,\n\t\t\t\tresource,\n\t\t\t)\n\t\t\tesRefID = rID\n\t\t}\n\t}\n\n\tfor _, r := range res.Resources.Kibana {\n\t\tif resource := parseKibanaGetResponse(r, esRefID); resource != nil {\n\t\t\treq.Resources.Kibana = append(req.Resources.Kibana,\n\t\t\t\tresource,\n\t\t\t)\n\t\t}\n\t}\n\n\tfor _, r := range res.Resources.Apm {\n\t\tif resource := parseApmGetResponse(r, esRefID); resource != nil {\n\t\t\treq.Resources.Apm = append(req.Resources.Apm,\n\t\t\t\tresource,\n\t\t\t)\n\t\t}\n\t}\n\n\tfor _, r := range res.Resources.Appsearch {\n\t\tif resource := parseAppSearchGetResponse(r, esRefID); resource != nil {\n\t\t\treq.Resources.Appsearch = append(req.Resources.Appsearch,\n\t\t\t\tresource,\n\t\t\t)\n\t\t}\n\t}\n\n\tfor _, r := range res.Resources.EnterpriseSearch {\n\t\tif resource := parseEnterpriseSearchGetResponse(r, esRefID); resource != nil {\n\t\t\treq.Resources.EnterpriseSearch = append(req.Resources.EnterpriseSearch,\n\t\t\t\tresource,\n\t\t\t)\n\t\t}\n\t}\n\n\tif res.Settings != nil && res.Settings.Observability != nil {\n\t\treq.Settings = &models.DeploymentUpdateSettings{\n\t\t\tObservability: res.Settings.Observability,\n\t\t}\n\t}\n\n\treturn &req\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewConfigurationManager_updateConfiguration_Params creates a new list of ConfigurationManager_updateConfiguration_Params.
func NewConfigurationManager_updateConfiguration_Params_List(s *capnp.Segment, sz int32) (ConfigurationManager_updateConfiguration_Params_List, error) { l, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 1}, sz) return ConfigurationManager_updateConfiguration_Params_List{l}, err }
[ "func NewUpdateConfigurationsParams() *UpdateConfigurationsParams {\n\treturn &UpdateConfigurationsParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewConfigurationManager_updateConfiguration_Results_List(s *capnp.Segment, sz int32) (ConfigurationManager_updateConfiguration_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn ConfigurationManager_updateConfiguration_Results_List{l}, err\n}", "func (s *ConfigurationService) NewUpdateConfigurationParams(name string) *UpdateConfigurationParams {\n\tp := &UpdateConfigurationParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"name\"] = name\n\treturn p\n}", "func NewUpdateWhitelabelConfigurationParams() *UpdateWhitelabelConfigurationParams {\n\treturn &UpdateWhitelabelConfigurationParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (client *ConfigurationsClient) batchUpdateCreateRequest(ctx context.Context, resourceGroupName string, serverName string, parameters ConfigurationListForBatchUpdate, options *ConfigurationsBeginBatchUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforMySQL/flexibleServers/{serverName}/updateConfigurations\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif serverName == \"\" {\n\t\treturn nil, errors.New(\"parameter serverName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{serverName}\", url.PathEscape(serverName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "func NewConfigurationUpdate(value []string) *ConfigurationUpdate {\n\tthis := ConfigurationUpdate{}\n\tthis.Value = value\n\treturn &this\n}", "func NewRegistrationServer_updateLocalConfiguration_Params_List(s *capnp.Segment, sz int32) (RegistrationServer_updateLocalConfiguration_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn RegistrationServer_updateLocalConfiguration_Params_List{l}, err\n}", "func NewApp_configs_Params_List(s *capnp.Segment, sz int32) (App_configs_Params_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 0}, sz)\n\treturn App_configs_Params_List{l}, err\n}", "func NewUpdateMaintenanceConfigurationParams() *UpdateMaintenanceConfigurationParams {\n\n\treturn &UpdateMaintenanceConfigurationParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (enc *MultiEncoder) UpdateParams(params *PdfObjectDictionary) {\n\tfor _, encoder := range enc.encoders {\n\t\tencoder.UpdateParams(params)\n\t}\n}", "func NewUpdateCryptoConfigParams() *UpdateCryptoConfigParams {\n\tvar ()\n\treturn &UpdateCryptoConfigParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (op ConfigOperator) updateConfiguration(appType string, clientId string, variantId string, newConfig []byte, bindingId string, serviceInstanceName string) {\n\tconfigSecret := op.kubeHelper.findMobileClientConfig(clientId)\n\tpushClient := op.pushClientProvider.getPushClient()\n\n\tif configSecret == nil {\n\t\t// No config secret exists for this client yet. Create one.\n\t\tconfigSecret = op.kubeHelper.createClientConfigSecret(clientId, serviceInstanceName, pushClient.getServiceInstanceId(), pushClient.getApplicationId())\n\t}\n\n\t// Retrieve the current config as an object\n\tvar currentConfig map[string]json.RawMessage\n\tjson.Unmarshal(configSecret.Data[\"config\"], &currentConfig)\n\n\t// Overwrite the old platform config\n\tcurrentConfig[appType] = []byte(newConfig)\n\n\t// Create a string of the complete config object\n\tcurrentConfigString, err := json.Marshal(currentConfig)\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\n\t// Set the new config\n\tconfigSecret.Data[\"uri\"] = []byte(pushClient.getBaseUrl())\n\tconfigSecret.Data[\"config\"] = currentConfigString\n\tconfigSecret.Data[\"name\"] = []byte(\"ups\")\n\tconfigSecret.Data[\"type\"] = []byte(\"push\")\n\n\t// Add the binding annotation to the UPS secret: this is done to link the actual ServiceBinding\n\t// Instance back to this secret. In case the variant is deleted in UPS we can use this ID to delete\n\t// the service binding\n\tbindingAnnotation := fmt.Sprintf(\"binding/%s\", appType)\n\tif configSecret.Annotations == nil {\n\t\tconfigSecret.Annotations = make(map[string]string)\n\t}\n\tconfigSecret.Annotations[bindingAnnotation] = bindingId\n\n\tpushApplicationName, err := pushClient.getPushApplicationName()\n\tif err != nil {\n\t\t// don't fail because of name not fetched. just use the id as the name\n\t\tpushApplicationName = pushClient.getApplicationId()\n\t}\n\n\tlog.Println(\"Adding annotations to mobile client\")\n\top.annotationHelper.addAnnotationToMobileClient(clientId, pushClient.getBaseUrl(), pushClient.getApplicationId(), pushApplicationName, appType, variantId, serviceInstanceName)\n\n\t_, err = op.kubeHelper.updateSecret(configSecret)\n\tif err != nil {\n\t\tlog.Println(err.Error())\n\t} else {\n\t\tlog.Printf(\"%s configuration of %s has been updated\", appType, clientId)\n\t}\n}", "func NewUpdateConfigurationResponse_List(s *capnp.Segment, sz int32) (UpdateConfigurationResponse_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 1}, sz)\n\treturn UpdateConfigurationResponse_List{l}, err\n}", "func (config ConfigQemu) UpdateConfig(vmr *VmRef, client *Client) (err error) {\n\tconfigParams := map[string]interface{}{}\n\n\t//Array to list deleted parameters\n\t//deleteParams := []string{}\n\n\tif config.Agent != 0 {\n\t\tconfigParams[\"agent\"] = config.Agent\n\t}\n\tif config.QemuOs != \"\" {\n\t\tconfigParams[\"ostype\"] = config.QemuOs\n\t}\n\tif config.QemuCores != 0 {\n\t\tconfigParams[\"cores\"] = config.QemuCores\n\t}\n\tif config.Memory != 0 {\n\t\tconfigParams[\"memory\"] = config.Memory\n\t}\n\n\tif config.QemuSockets != 0 {\n\t\tconfigParams[\"sockets\"] = config.QemuSockets\n\t}\n\n\tif config.QemuKVM != nil {\n\t\tconfigParams[\"kvm\"] = *config.QemuKVM\n\t}\n\n\tif config.QemuNuma != nil {\n\t\tconfigParams[\"numa\"] = *config.QemuNuma\n\t}\n\n\tif config.Onboot != nil {\n\t\tconfigParams[\"onboot\"] = *config.Onboot\n\t}\n\n\tif config.Tablet != nil {\n\t\tconfigParams[\"tablet\"] = *config.Tablet\n\t}\n\n\tif config.Args != \"\" {\n\t\tconfigParams[\"args\"] = config.Args\n\t}\n\n\tif config.Tags != \"\" {\n\t\tconfigParams[\"tags\"] = config.Tags\n\t}\n\n\tif config.Startup != \"\" {\n\t\tconfigParams[\"startup\"] = config.Startup\n\t}\n\n\tif config.QemuIso != \"\" {\n\t\tconfigParams[\"ide2\"] = config.QemuIso + \",media=cdrom\"\n\t}\n\n\tif config.Bios != \"\" {\n\t\tconfigParams[\"bios\"] = config.Bios\n\t}\n\n\tif config.Hotplug != \"\" {\n\t\tconfigParams[\"hotplug\"] = config.Hotplug\n\t}\n\n\tif config.Name != \"\" {\n\t\tconfigParams[\"name\"] = config.Name\n\t}\n\n\tif config.Description != \"\" {\n\t\tconfigParams[\"description\"] = config.Description\n\t}\n\n\tif config.Balloon >= 1 {\n\t\tconfigParams[\"balloon\"] = config.Balloon\n\t}\n\n\tif config.QemuVcpus >= 1 {\n\t\tconfigParams[\"vcpus\"] = config.QemuVcpus\n\t}\n\n\tif config.Boot != \"\" {\n\t\tconfigParams[\"boot\"] = config.Boot\n\t}\n\n\tif config.BootDisk != \"\" {\n\t\tconfigParams[\"bootdisk\"] = config.BootDisk\n\t}\n\n\tif config.Hookscript != \"\" {\n\t\tconfigParams[\"hookscript\"] = config.Hookscript\n\t}\n\n\tif config.QemuCpu != \"\" {\n\t\tconfigParams[\"cpu\"] = config.QemuCpu\n\t}\n\n\tif config.Scsihw != \"\" {\n\t\tconfigParams[\"scsihw\"] = config.Scsihw\n\t}\n\n\terr = config.CreateQemuMachineParam(configParams)\n\tif err != nil {\n\t\tlog.Printf(\"[ERROR] %q\", err)\n\t}\n\n\t// Create disks config.\n\tconfigParamsDisk := map[string]interface{}{\n\t\t\"vmid\": vmr.vmId,\n\t}\n\tconfig.CreateQemuDisksParams(configParamsDisk, false)\n\t// TODO keep going if error=\n\t_, err = client.createVMDisks(vmr.node, configParamsDisk)\n\tif err != nil {\n\t\tlog.Printf(\"[ERROR] %q\", err)\n\t}\n\t//Copy the disks to the global configParams\n\tfor key, value := range configParamsDisk {\n\t\t//vmid is only required in createVMDisks\n\t\tif key != \"vmid\" {\n\t\t\tconfigParams[key] = value\n\t\t}\n\t}\n\n\t// Create networks config.\n\tconfig.VmID = vmr.vmId\n\tconfig.CreateQemuNetworksParams(configParams)\n\n\t// Create vga config.\n\tvgaParam := QemuDeviceParam{}\n\tvgaParam = vgaParam.createDeviceParam(config.QemuVga, nil)\n\tif len(vgaParam) > 0 {\n\t\tconfigParams[\"vga\"] = strings.Join(vgaParam, \",\")\n\t}\n\t// Create serial interfaces\n\tconfig.CreateQemuSerialsParams(configParams)\n\n\t// Create usb interfaces\n\tconfig.CreateQemuUsbsParams(configParams)\n\n\tconfig.CreateQemuPCIsParams(configParams)\n\n\t// cloud-init options\n\tif config.CIuser != \"\" {\n\t\tconfigParams[\"ciuser\"] = config.CIuser\n\t}\n\tif config.CIpassword != \"\" {\n\t\tconfigParams[\"cipassword\"] = config.CIpassword\n\t}\n\tif config.CIcustom != \"\" {\n\t\tconfigParams[\"cicustom\"] = config.CIcustom\n\t}\n\tif config.Searchdomain != \"\" {\n\t\tconfigParams[\"searchdomain\"] = config.Searchdomain\n\t}\n\tif config.Nameserver != \"\" {\n\t\tconfigParams[\"nameserver\"] = config.Nameserver\n\t}\n\tif config.Smbios1 != \"\" {\n\t\tconfigParams[\"smbios1\"] = config.Smbios1\n\t}\n\tif config.Sshkeys != \"\" {\n\t\tconfigParams[\"sshkeys\"] = sshKeyUrlEncode(config.Sshkeys)\n\t}\n\terr = config.CreateIpconfigParams(configParams)\n\tif err != nil {\n\t\tlog.Printf(\"[ERROR] %q\", err)\n\t}\n\n\t// if len(deleteParams) > 0 {\n\t// \tconfigParams[\"delete\"] = strings.Join(deleteParams, \", \")\n\t// }\n\n\t_, err = client.SetVmConfig(vmr, configParams)\n\tif err != nil {\n\t\tlog.Print(err)\n\t\treturn err\n\t}\n\n\t_, err = client.UpdateVMHA(vmr, config.HaState, config.HaGroup)\n\tif err != nil {\n\t\tlog.Printf(\"[ERROR] %q\", err)\n\t}\n\n\t_, err = client.UpdateVMPool(vmr, config.Pool)\n\n\treturn err\n}", "func (ap * SystemVariables ) UpdateParametersWithConfiguration(config *varsConfig)error{\n\tvar err error\n\t\n\t\n\t\n\t\n\tif config.getUpdatedFlag(\"rootpassword\"){\n\t\tif err = ap.setRootpassword(config.Rootpassword); err != nil{\n\t\t\treturn fmt.Errorf(\"update parameter rootpassword failed.error:%v\",err)\n\t\t}\n\t}\n\t\n\t\n\t\n\t\n\t\n\t\n\t\n\t\n\t\n\t\n\treturn nil\n}", "func (a *apiActivator) updateQueueParams(maxQueueLength, maxConcurrency int) {\n\ta.breaker.UpdateConcurrency(maxConcurrency)\n\ta.breaker.UpdateQueueLength(maxQueueLength)\n}", "func NewUpdateConfigurationsParamsWithTimeout(timeout time.Duration) *UpdateConfigurationsParams {\n\treturn &UpdateConfigurationsParams{\n\t\ttimeout: timeout,\n\t}\n}", "func (s *Service) UpdateParams(newService *Service) error {\n\ts.Name = newService.Name\n\ts.Image = newService.Image\n\ts.Replicas = newService.Replicas\n\ts.Parallelism = newService.Parallelism\n\n\tvar variables = make([]ServiceEnvVariable, 0)\n\tfor _, variable := range newService.EnvVariables {\n\t\tif len(variable.Name) > 0 && len(variable.Value) > 0 {\n\t\t\tvariables = append(variables, ServiceEnvVariable{\n\t\t\t\tName: prepareEnvVariableName(variable.Name),\n\t\t\t\tValue: variable.Value,\n\t\t\t})\n\t\t}\n\t}\n\ts.EnvVariables = variables\n\n\tvar ports = make([]ServicePublishedPort, 0)\n\tfor _, port := range newService.PublishedPorts {\n\t\tif port.Internal > 0 && port.External > 0 {\n\t\t\tports = append(ports, ServicePublishedPort{\n\t\t\t\tInternal: port.Internal,\n\t\t\t\tExternal: port.External,\n\t\t\t\tProtocol: port.Protocol,\n\t\t\t})\n\t\t}\n\t}\n\ts.PublishedPorts = ports\n\n\treturn nil\n}", "func configStateChange(configTxSlice []*protocol.ConfigTx, blockHash [32]byte) {\n\n\tvar newParameters parameters\n\t//Initialize it to state right now (before validating config txs)\n\tnewParameters = *activeParameters\n\n\tif len(configTxSlice) == 0 {\n\t\treturn\n\t}\n\tvar change bool\n\tfor _, tx := range configTxSlice {\n\t\tswitch tx.Id {\n\t\tcase protocol.FEE_MINIMUM_ID:\n\t\t\tif parameterBoundsChecking(protocol.FEE_MINIMUM_ID, tx.Payload) {\n\t\t\t\tnewParameters.fee_minimum = tx.Payload\n\t\t\t\tchange = true\n\t\t\t}\n\t\tcase protocol.BLOCK_SIZE_ID:\n\t\t\tif parameterBoundsChecking(protocol.BLOCK_SIZE_ID, tx.Payload) {\n\t\t\t\tnewParameters.block_size = tx.Payload\n\t\t\t\tchange = true\n\t\t\t}\n\t\tcase protocol.BLOCK_REWARD_ID:\n\t\t\tif parameterBoundsChecking(protocol.BLOCK_REWARD_ID, tx.Payload) {\n\t\t\t\tnewParameters.block_reward = tx.Payload\n\t\t\t\tchange = true\n\t\t\t}\n\t\tcase protocol.DIFF_INTERVAL_ID:\n\t\t\tif parameterBoundsChecking(protocol.DIFF_INTERVAL_ID, tx.Payload) {\n\t\t\t\tnewParameters.diff_interval = tx.Payload\n\t\t\t\tchange = true\n\t\t\t}\n\t\tcase protocol.BLOCK_INTERVAL_ID:\n\t\t\tif parameterBoundsChecking(protocol.BLOCK_INTERVAL_ID, tx.Payload) {\n\t\t\t\tnewParameters.block_interval = tx.Payload\n\t\t\t\tchange = true\n\t\t\t}\n\t\t}\n\t}\n\n\t//Only add a new parameter struct if a relevant system parameter changed\n\tif change {\n\t\tnewParameters.blockHash = blockHash\n\t\tparameterSlice = append(parameterSlice, newParameters)\n\t\tactiveParameters = &parameterSlice[len(parameterSlice)-1]\n\t\tlogger.Printf(\"Config parameters changed. New configuration: %v\", *activeParameters)\n\t}\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
NewResult sets the result field to a newly allocated UpdateConfigurationResponse struct, preferring placement in s's segment.
func (s ConfigurationManager_updateConfiguration_Results) NewResult() (UpdateConfigurationResponse, error) { ss, err := NewUpdateConfigurationResponse(s.Struct.Segment()) if err != nil { return UpdateConfigurationResponse{}, err } err = s.Struct.SetPtr(0, ss.Struct.ToPtr()) return ss, err }
[ "func NewConfigurationManager_updateConfiguration_Results_List(s *capnp.Segment, sz int32) (ConfigurationManager_updateConfiguration_Results_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 0, PointerCount: 1}, sz)\n\treturn ConfigurationManager_updateConfiguration_Results_List{l}, err\n}", "func ConstructResult(hnsNetwork *hcsshim.HNSNetwork, hnsEndpoint *hcsshim.HNSEndpoint) (*current.Result, error) {\n\tresultInterface := &current.Interface{\n\t\tName: hnsEndpoint.Name,\n\t\tMac: hnsEndpoint.MacAddress,\n\t}\n\t_, ipSubnet, err := net.ParseCIDR(hnsNetwork.Subnets[0].AddressPrefix)\n\tif err != nil {\n\t\treturn nil, errors.Annotatef(err, \"failed to parse CIDR from %s\", hnsNetwork.Subnets[0].AddressPrefix)\n\t}\n\n\tvar ipVersion string\n\tif ipv4 := hnsEndpoint.IPAddress.To4(); ipv4 != nil {\n\t\tipVersion = \"4\"\n\t} else if ipv6 := hnsEndpoint.IPAddress.To16(); ipv6 != nil {\n\t\tipVersion = \"6\"\n\t} else {\n\t\treturn nil, fmt.Errorf(\"IPAddress of HNSEndpoint %s isn't a valid ipv4 or ipv6 Address\", hnsEndpoint.Name)\n\t}\n\n\tresultIPConfig := &current.IPConfig{\n\t\tVersion: ipVersion,\n\t\tAddress: net.IPNet{\n\t\t\tIP: hnsEndpoint.IPAddress,\n\t\t\tMask: ipSubnet.Mask},\n\t\tGateway: net.ParseIP(hnsEndpoint.GatewayAddress),\n\t}\n\tresult := &current.Result{}\n\tresult.Interfaces = []*current.Interface{resultInterface}\n\tresult.IPs = []*current.IPConfig{resultIPConfig}\n\n\treturn result, nil\n}", "func (s RegistrationServer_registerConnection_Results) NewResult() (ConnectionResponse, error) {\n\tss, err := NewConnectionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ConnectionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_authenticate_Results) NewResult() (AuthenticateResponse, error) {\n\tss, err := NewAuthenticateResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn AuthenticateResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (s TunnelServer_getServerInfo_Results) NewResult() (ServerInfo, error) {\n\tss, err := NewServerInfo(s.Struct.Segment())\n\tif err != nil {\n\t\treturn ServerInfo{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func NewUpdateConfigurationResponse_List(s *capnp.Segment, sz int32) (UpdateConfigurationResponse_List, error) {\n\tl, err := capnp.NewCompositeList(s, capnp.ObjectSize{DataSize: 8, PointerCount: 1}, sz)\n\treturn UpdateConfigurationResponse_List{l}, err\n}", "func newDocumentResult(result []byte, err error) *operationResult {\n\treturn newValueResult(bsontype.EmbeddedDocument, result, err)\n}", "func NewConfigurationResultOK(body *ConfigurationResponseBody) *coordinatorapi.ConfigurationResult {\n\tv := &coordinatorapi.ConfigurationResult{\n\t\tExpirationDurationSeconds: *body.ExpirationDurationSeconds,\n\t\tSelectiveDelayMs: *body.SelectiveDelayMs,\n\t}\n\tv.SupportedChainIds = make([]uint32, len(body.SupportedChainIds))\n\tfor i, val := range body.SupportedChainIds {\n\t\tv.SupportedChainIds[i] = val\n\t}\n\n\treturn v\n}", "func SetResult(result interface{}) *Request {\n\treturn defaultClient.R().SetSuccessResult(result)\n}", "func (s TunnelServer_reconnectTunnel_Results) NewResult() (TunnelRegistration, error) {\n\tss, err := NewTunnelRegistration(s.Struct.Segment())\n\tif err != nil {\n\t\treturn TunnelRegistration{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func (o *ServerBaseProfile) SetConfigResult(v ServerConfigResultRelationship) {\n\to.ConfigResult = &v\n}", "func (r *request) SetResult(result interface{}) {\n\tr.Result = result\n}", "func (rm *resourceManager) newVersioningConfiguration(\n\tr *resource,\n) *svcsdk.VersioningConfiguration {\n\tres := &svcsdk.VersioningConfiguration{}\n\n\tif r.ko.Spec.Versioning.Status != nil {\n\t\tres.SetStatus(*r.ko.Spec.Versioning.Status)\n\t}\n\n\treturn res\n}", "func (this *AP) __updateConfigurationResponse() {\n\t// AP 给AC发送响应请求\n\tsMsg := this.tlv.packDisc(this.updateHeaderMsg(), this.updateDataMsg())\n\tthis.sendMsg(sMsg)\n\t// 设置下个code 和Action\n\tthis.APStatusCode = 7\n\t// AP 动作 Action 1 请求配置\n\tthis.Action = \"00000001\"\n}", "func (r *Repository) applyUpdateResult(update Update, result updateResult) {\n\t// 4.b Save all the updated and new config files\n\tfor product, configs := range result.changed {\n\t\tfor path, config := range configs {\n\t\t\tm := r.configs[product]\n\t\t\tm[path] = config\n\t\t}\n\t}\n\tfor path, metadata := range result.metadata {\n\t\tr.metadata[path] = metadata\n\t}\n\n\t// 5.b Clean up the cache of any removed configs\n\tfor _, path := range result.removed {\n\t\tdelete(r.metadata, path)\n\t\tfor _, configs := range r.configs {\n\t\t\tdelete(configs, path)\n\t\t}\n\t}\n}", "func (s SessionManager_registerUdpSession_Results) NewResult() (RegisterUdpSessionResponse, error) {\n\tss, err := NewRegisterUdpSessionResponse(s.Struct.Segment())\n\tif err != nil {\n\t\treturn RegisterUdpSessionResponse{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "func newValueResult(valueType bsontype.Type, data []byte, err error) *operationResult {\n\treturn &operationResult{\n\t\tResult: bson.RawValue{Type: valueType, Value: data},\n\t\tErr: err,\n\t}\n}", "func (k Keeper) SetResult(ctx sdk.Context, reqID string, result *types.AIRequestResult) error {\n\tstore := ctx.KVStore(k.storeKey)\n\n\tbz, err := k.cdc.MarshalBinaryBare(result)\n\tstore.Set(types.ResultStoreKey(reqID), bz)\n\treturn err\n}", "func setupResult(rrt *ResolverRuntime, rcode int, opaqueResponse interface{}) (ret *dns.Msg) {\n\tswitch t := opaqueResponse.(type) {\n\tcase [][]dns.RR:\n\t\tret = &dns.Msg{Answer: t[0], Ns: t[1], Extra: t[2]}\n\tcase []dns.RR:\n\t\tret = &dns.Msg{Answer: t}\n\tcase dns.RR: /// single RR means a SOA for nxdomain/nodata responses\n\t\tret = &dns.Msg{Ns: []dns.RR{t}}\n\tcase *dns.Msg:\n\t\t//t.Rcode = rcode\n\t\tret = &dns.Msg{MsgHdr: t.MsgHdr, Answer: cloneSection(t.Answer), Ns: cloneSection(t.Ns), Extra: cloneSection(t.Extra)}\n\tdefault:\n\t\tret = &dns.Msg{}\n\t}\n\tret.SetRcode(rrt.original, rcode)\n\tLogInfo(rrt, \"Setting up result as answer to Q [%s] Id [%d] RC [%s]\\n[%v]\\n\\n\", rrt.original.Question[0].String(), rrt.original.Id, dns.RcodeToString[ret.Rcode], ret)\n\treturn\n}" ]
{ "objective": { "paired": [], "self": [], "triplet": [ [ "query", "document", "negatives" ] ] } }